Gen.Trojan.Heur.KqWrLgVAjmif_013174ebb4

by malwarelabrobot on January 21st, 2015 in Malware Descriptions.

Gen:Trojan.Heur.KqW@rLgVAjmif (BitDefender), Packed.Win32.Gena.a (Kaspersky), Trojan.Win32.Generic.pak!cobra (VIPRE), Win32.VirLock.6 (DrWeb), Gen:Trojan.Heur.KqW@rLgVAjmif (B) (Emsisoft), Generic Obfuscated.g (McAfee), WS.Reputation.1 (Symantec), Virus-Ransom.FileLocker (Ikarus), Gen:Trojan.Heur.KqW@rLgVAjmif (FSecure), Generic_r.EKW (AVG), Win32:MalOb-FE [Cryp] (Avast), Gen:Trojan.Heur.KqW@rLgVAjmif (AdAware), ZeroAccess.YR (Lavasoft MAS)
Behaviour: Ransom, Trojan, Virus, Packed


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: 013174ebb48cbff2718649c4ac5163a5
SHA1: a4ba358b64ad1f3f203d2d6c25ffa7d9522632c8
SHA256: d25abf302863fd1374a77b6b8c8fd32c29bdb71d36e8b86b49aa82c4a70996b1
SSDeep: 12288:lwtUklj8SkRKb3es5v7Ep3d1/ZylUq7GemKcxaltBuxi:lyt8tsV7EBd1/UlUqqeAaltB1
Size: 604160 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2015-01-06 02:36:08
Analyzed on: WindowsXP SP3 32-bit


Summary:

Ransom. Disables the compromised computer or restricts access to certain data so that the victim can no longer use it. The victim is expected to send payment to the hijacker to restore access to the blocked data or re-enable the system.

Payload

No specific payload has been found.

Process activity

The Trojan creates the following process(es):

cscript.exe:1788
cscript.exe:2656
cscript.exe:1264
cscript.exe:3416
cscript.exe:2096
cscript.exe:3324
cscript.exe:3656
cscript.exe:2996
cscript.exe:4028
cscript.exe:2320
cscript.exe:1836
cscript.exe:2488
cscript.exe:2324
cscript.exe:2484
cscript.exe:624
cscript.exe:2528
cscript.exe:3256
cscript.exe:344
cscript.exe:2404
cscript.exe:2952
cscript.exe:2400
cscript.exe:1376
cscript.exe:548
cscript.exe:284
cscript.exe:1672
cscript.exe:2444
cscript.exe:3488
cscript.exe:3764
cscript.exe:2852
cscript.exe:2700
cscript.exe:3336
cscript.exe:4036
cscript.exe:3408
cscript.exe:2452
cscript.exe:2260
cscript.exe:3560
cscript.exe:2556
cscript.exe:3240
cscript.exe:3032
cscript.exe:2496
cscript.exe:3840
cscript.exe:3844
cscript.exe:3412
cscript.exe:2148
cscript.exe:3948
cscript.exe:2900
cscript.exe:2284
cscript.exe:4092
cscript.exe:3940
cscript.exe:1328
cscript.exe:3828
cscript.exe:776
cscript.exe:396
cscript.exe:3476
cscript.exe:1716
cscript.exe:2980
cscript.exe:2984
cscript.exe:2664
cscript.exe:492
cscript.exe:368
cscript.exe:3952
cscript.exe:1016
cscript.exe:916
cscript.exe:2668
cscript.exe:3664
cscript.exe:1236
cscript.exe:3816
cscript.exe:3660
cscript.exe:580
cscript.exe:2932
cscript.exe:304
cscript.exe:380
cscript.exe:3152
cscript.exe:240
cscript.exe:824
cscript.exe:3316
cscript.exe:3464
cscript.exe:3460
cscript.exe:2576
cscript.exe:788
cscript.exe:3468
cscript.exe:2676
cscript.exe:432
cscript.exe:3692
cscript.exe:2372
cscript.exe:516
cscript.exe:1156
cscript.exe:2592
cscript.exe:1220
cscript.exe:3752
cscript.exe:2924
cscript.exe:332
cscript.exe:3824
cscript.exe:2196
cscript.exe:2800
cscript.exe:2200
cscript.exe:3216
cscript.exe:2256
cscript.exe:3364
cscript.exe:2888
cscript.exe:3516
cscript.exe:1988
cscript.exe:1500
cscript.exe:2688
cscript.exe:3892
cscript.exe:3084
cscript.exe:2112
cscript.exe:2680
cscript.exe:500
cscript.exe:1468
cscript.exe:2428
cscript.exe:3604
cscript.exe:3632
cscript.exe:2332
cscript.exe:2264
cscript.exe:3072
cscript.exe:2180
cscript.exe:2956
cscript.exe:3720
cscript.exe:3528
cscript.exe:3176
cscript.exe:3884
cscript.exe:3204
cscript.exe:3880
cscript.exe:3444
cscript.exe:2024
cscript.exe:3012
cscript.exe:2108
cscript.exe:2356
cscript.exe:1108
cscript.exe:1512
cscript.exe:4080
cscript.exe:604
cscript.exe:2732
cscript.exe:3636
cscript.exe:2432
cscript.exe:1168
cscript.exe:2436
cscript.exe:552
cscript.exe:3060
cscript.exe:3536
cscript.exe:2944
cscript.exe:1052
cscript.exe:2340
cscript.exe:1056
cscript.exe:1964
cscript.exe:2224
cscript.exe:3436
cscript.exe:2740
cscript.exe:3972
cscript.exe:3976
cscript.exe:3916
cscript.exe:2724
cscript.exe:3912
cscript.exe:2640
cscript.exe:2644
cscript.exe:3704
cscript.exe:2120
cscript.exe:3780
cscript.exe:3228
cscript.exe:3788
cscript.exe:3420
cscript.exe:3548
cscript.exe:3220
cscript.exe:356
cscript.exe:476
cscript.exe:352
cscript.exe:3980
cscript.exe:3340
%original file name%.exe:216
%original file name%.exe:1140
%original file name%.exe:3716
%original file name%.exe:1300
%original file name%.exe:2848
%original file name%.exe:3496
%original file name%.exe:2652
%original file name%.exe:3648
%original file name%.exe:3920
%original file name%.exe:1264
%original file name%.exe:3320
%original file name%.exe:3324
%original file name%.exe:4020
%original file name%.exe:3656
%original file name%.exe:3132
%original file name%.exe:3556
%original file name%.exe:2520
%original file name%.exe:2036
%original file name%.exe:3796
%original file name%.exe:3124
%original file name%.exe:3856
%original file name%.exe:2404
%original file name%.exe:3852
%original file name%.exe:280
%original file name%.exe:3992
%original file name%.exe:816
%original file name%.exe:3488
%original file name%.exe:3568
%original file name%.exe:3832
%original file name%.exe:716
%original file name%.exe:3484
%original file name%.exe:3932
%original file name%.exe:264
%original file name%.exe:268
%original file name%.exe:2260
%original file name%.exe:2552
%original file name%.exe:2992
%original file name%.exe:1064
%original file name%.exe:2996
%original file name%.exe:2496
%original file name%.exe:928
%original file name%.exe:2060
%original file name%.exe:372
%original file name%.exe:3036
%original file name%.exe:3772
%original file name%.exe:708
%original file name%.exe:2472
%original file name%.exe:2904
%original file name%.exe:1328
%original file name%.exe:3944
%original file name%.exe:1236
%original file name%.exe:332
%original file name%.exe:2824
%original file name%.exe:2820
%original file name%.exe:3300
%original file name%.exe:3476
%original file name%.exe:2988
%original file name%.exe:2300
%original file name%.exe:4048
%original file name%.exe:2304
%original file name%.exe:3388
%original file name%.exe:2804
%original file name%.exe:2072
%original file name%.exe:364
%original file name%.exe:2668
%original file name%.exe:3664
%original file name%.exe:3956
%original file name%.exe:2768
%original file name%.exe:2600
%original file name%.exe:3748
%original file name%.exe:3588
%original file name%.exe:2284
%original file name%.exe:1136
%original file name%.exe:3740
%original file name%.exe:2764
%original file name%.exe:3152
%original file name%.exe:240
%original file name%.exe:780
%original file name%.exe:2040
%original file name%.exe:3396
%original file name%.exe:1840
%original file name%.exe:3016
%original file name%.exe:1240
%original file name%.exe:436
%original file name%.exe:2164
%original file name%.exe:2376
%original file name%.exe:1984
%original file name%.exe:2888
%original file name%.exe:2616
%original file name%.exe:2328
%original file name%.exe:3616
%original file name%.exe:2456
%original file name%.exe:1228
%original file name%.exe:3000
%original file name%.exe:3164
%original file name%.exe:3008
%original file name%.exe:3292
%original file name%.exe:2568
%original file name%.exe:3216
%original file name%.exe:2204
%original file name%.exe:3212
%original file name%.exe:3692
%original file name%.exe:3360
%original file name%.exe:2156
%original file name%.exe:2684
%original file name%.exe:1036
%original file name%.exe:3080
%original file name%.exe:636
%original file name%.exe:2812
%original file name%.exe:2628
%original file name%.exe:2424
%original file name%.exe:3876
%original file name%.exe:2180
%original file name%.exe:3520
%original file name%.exe:3724
%original file name%.exe:3284
%original file name%.exe:3280
%original file name%.exe:868
%original file name%.exe:3688
%original file name%.exe:3680
%original file name%.exe:1028
%original file name%.exe:2024
%original file name%.exe:1672
%original file name%.exe:1976
%original file name%.exe:2100
%original file name%.exe:728
%original file name%.exe:604
%original file name%.exe:4084
%original file name%.exe:4088
%original file name%.exe:3064
%original file name%.exe:2436
%original file name%.exe:3672
%original file name%.exe:3060
%original file name%.exe:3536
%original file name%.exe:2940
%original file name%.exe:2132
%original file name%.exe:2340
%original file name%.exe:1056
%original file name%.exe:3344
%original file name%.exe:2740
%original file name%.exe:2704
%original file name%.exe:1756
%original file name%.exe:2504
%original file name%.exe:3188
%original file name%.exe:2648
%original file name%.exe:3916
%original file name%.exe:2876
%original file name%.exe:2640
%original file name%.exe:3056
%original file name%.exe:3236
%original file name%.exe:2976
%original file name%.exe:2536
%original file name%.exe:2120
%original file name%.exe:2332
%original file name%.exe:3428
%original file name%.exe:2228
%original file name%.exe:2336
%original file name%.exe:4012
%original file name%.exe:3788
%original file name%.exe:1604
%original file name%.exe:3424
%original file name%.exe:1472
%original file name%.exe:3988
%original file name%.exe:3192
%original file name%.exe:3980
%original file name%.exe:804

The Trojan injects its code into the following process(es):

fGAwoYMM.exe:844
reIEcoQI.exe:348
NesIMIQs.exe:1524

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process %original file name%.exe:216 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ywkIUMgU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zYEwAAEE.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\zYEwAAEE.bat (0 bytes)

The process %original file name%.exe:1140 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\fEoscoAU.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\pKoMAEAo.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\fEoscoAU.bat (0 bytes)

The process %original file name%.exe:3716 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\GuowgswI.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ROsoEgAo.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\GuowgswI.bat (0 bytes)

The process %original file name%.exe:1300 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\swggckwc.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\paggQYQA.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\swggckwc.bat (0 bytes)

The process %original file name%.exe:2848 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\JwQcMgQk.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\PqwkwUAI.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\JwQcMgQk.bat (0 bytes)

The process %original file name%.exe:3496 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\IOQAsoYI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XwsoYwYI.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\XwsoYwYI.bat (0 bytes)

The process %original file name%.exe:2652 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CUUQUogA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rUYMQYsU.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\CUUQUogA.bat (0 bytes)

The process %original file name%.exe:3648 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\GCgIsIMA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zOsEwcIg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\pqgIooIU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ckkQQEQE.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\PmAoYUsI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vKQckYcM.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (480 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\GCgIsIMA.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vKQckYcM.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zOsEwcIg.bat (0 bytes)

The process %original file name%.exe:3920 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\zowcoswQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\BWgYwckk.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\BWgYwckk.bat (0 bytes)

The process %original file name%.exe:1264 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\wmIgAsMk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\dqkAUUUQ.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\dqkAUUUQ.bat (0 bytes)

The process %original file name%.exe:3320 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\bkIIgQgw.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vwQAcoEw.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\bkIIgQgw.bat (0 bytes)

The process %original file name%.exe:3324 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\mYEwsAoc.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HQIwMksk.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\HQIwMksk.bat (0 bytes)

The process %original file name%.exe:4020 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\SqEsMYwQ.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vSIEIYII.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\SqEsMYwQ.bat (0 bytes)

The process %original file name%.exe:3656 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\dIAMswEk.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NYAEAEoU.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\NYAEAEoU.bat (0 bytes)

The process %original file name%.exe:3132 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\RSUkgggk.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KUIYwsgc.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\KUIYwsgc.bat (0 bytes)

The process %original file name%.exe:3556 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\vGokUsYw.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LeggskAE.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TEEQcoUY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hggMQAIo.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (320 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\hggMQAIo.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vGokUsYw.bat (0 bytes)

The process %original file name%.exe:2520 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\gyIQcAMs.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HuEgUAkg.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\HuEgUAkg.bat (0 bytes)

The process %original file name%.exe:2036 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nSosYwss.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xcgcMAwo.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nSosYwss.bat (0 bytes)

The process %original file name%.exe:3796 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\RgAYosQk.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\EgwEokcA.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\EgwEokcA.bat (0 bytes)

The process %original file name%.exe:3124 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\HiswMsQc.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\qeQkwYcQ.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\HiswMsQc.bat (0 bytes)

The process %original file name%.exe:3856 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\PQkkcscI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KwQwcgsc.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\KwQwcgsc.bat (0 bytes)

The process %original file name%.exe:2404 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\mogMMIIw.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\PkQQYogc.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\PkQQYogc.bat (0 bytes)

The process %original file name%.exe:3852 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\uAIYYYQY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aiUwQAwI.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\aiUwQAwI.bat (0 bytes)

The process %original file name%.exe:280 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\SWwkgoUw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\bUgkgUQY.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\bUgkgUQY.bat (0 bytes)

The process %original file name%.exe:3992 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ImIUAEQw.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nQAYAcso.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nQAYAcso.bat (0 bytes)

The process %original file name%.exe:816 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\qogMscYM.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\cUwkEgMk.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\cUwkEgMk.bat (0 bytes)

The process %original file name%.exe:3488 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\SsAMoAkE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DSMEAocw.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\SsAMoAkE.bat (0 bytes)

The process %original file name%.exe:3568 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\LioQQAog.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\SWQAMwIM.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\LioQQAog.bat (0 bytes)

The process %original file name%.exe:3832 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\haocoMQI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\SGcokcYE.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\haocoMQI.bat (0 bytes)

The process %original file name%.exe:716 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\All Users\JuwEIgUE\reIEcoQI.exe (4017 bytes)
%Documents and Settings%\%current user%\dUskcAww\fGAwoYMM.exe (3849 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rIEMgYgA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HqQoAAwo.bat (4 bytes)
%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.exe (3921 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\HqQoAAwo.bat (0 bytes)

The process %original file name%.exe:3484 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\oSIEoAAY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\raMEsIYE.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\raMEsIYE.bat (0 bytes)

The process %original file name%.exe:3932 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\haEcIwMs.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kwAswIwI.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\haEcIwMs.bat (0 bytes)

The process %original file name%.exe:264 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\KEAIAUsY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AQQQsoMg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\uasMEwMU.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (320 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\beEgscgw.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\KEAIAUsY.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\uasMEwMU.bat (0 bytes)

The process %original file name%.exe:268 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\hskEYcwI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\dMQcYwAg.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\dMQcYwAg.bat (0 bytes)

The process %original file name%.exe:2260 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ZGEsUgQw.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vioYAYUc.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RmYwgoQY.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (320 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\tyEIEokE.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ZGEsUgQw.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RmYwgoQY.bat (0 bytes)

The process %original file name%.exe:2552 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\MwkcEcUA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zscAMcMg.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (320 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\MmEQUQYo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HosoQowY.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\MwkcEcUA.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zscAMcMg.bat (0 bytes)

The process %original file name%.exe:2992 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\jsgYMcYw.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yOUcwUAY.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\yOUcwUAY.bat (0 bytes)

The process %original file name%.exe:1064 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\gOcwYAsA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\bgQQMgIo.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\bgQQMgIo.bat (0 bytes)

The process %original file name%.exe:2996 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\DeIAcIEA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\uGAcYUcU.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\DeIAcIEA.bat (0 bytes)

The process %original file name%.exe:2496 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\IksYIgwc.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nuUYUUYM.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nuUYUUYM.bat (0 bytes)

The process %original file name%.exe:928 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\NWQkAEcg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\VGoEMMoI.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\NWQkAEcg.bat (0 bytes)

The process %original file name%.exe:2060 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\AuIYgAEk.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YugMMAcE.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\AuIYgAEk.bat (0 bytes)

The process %original file name%.exe:372 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\BmcswUMc.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XoIgokgQ.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\BmcswUMc.bat (0 bytes)

The process %original file name%.exe:3036 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ywsQsIQE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\VSMcwUso.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KIwIwcsw.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (320 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\JuUMgYgQ.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ywsQsIQE.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KIwIwcsw.bat (0 bytes)

The process %original file name%.exe:3772 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ESQkQkMo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QScUUEAc.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (320 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\OYMwQQEw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lOEgkAUo.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ESQkQkMo.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lOEgkAUo.bat (0 bytes)

The process %original file name%.exe:708 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\dGUMoQgA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\VEoIQocU.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\VEoIQocU.bat (0 bytes)

The process %original file name%.exe:2472 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\JuYMYwAg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\cMEcgUUo.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\cMEcgUUo.bat (0 bytes)

The process %original file name%.exe:2904 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\mKEEAocE.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mukQQwYc.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\mKEEAocE.bat (0 bytes)

The process %original file name%.exe:1328 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\aiwAMYUw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lAwoMQco.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\lAwoMQco.bat (0 bytes)

The process %original file name%.exe:3944 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\qsQcwUwI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lmUkAcEw.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\qsQcwUwI.bat (0 bytes)

The process %original file name%.exe:1236 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\EIMIwIwI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\JIcAoUQo.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\JIcAoUQo.bat (0 bytes)

The process %original file name%.exe:332 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\akAIQcUA.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RgEgQEQc.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\RgEgQEQc.bat (0 bytes)

The process %original file name%.exe:2824 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\uMwQoMgo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XIosQQQw.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (320 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\koAwgMkE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NIMAgIkg.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\XIosQQQw.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\koAwgMkE.bat (0 bytes)

The process %original file name%.exe:2820 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\tKYIwwss.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\EAMkkwMo.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\EAMkkwMo.bat (0 bytes)

The process %original file name%.exe:3300 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\DOUocwQM.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\UQcgQwgc.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\UQcgQwgc.bat (0 bytes)

The process %original file name%.exe:3476 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\cQwEgckI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CsIMMkYA.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\CsIMMkYA.bat (0 bytes)

The process %original file name%.exe:2988 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\bigIcUwI.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QIEMYUYk.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\QIEMYUYk.bat (0 bytes)

The process %original file name%.exe:2300 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\eKIQkIMA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\raYMwwMI.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\raYMwwMI.bat (0 bytes)

The process %original file name%.exe:4048 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ZCEYUkco.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\gccggIAU.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\gccggIAU.bat (0 bytes)

The process %original file name%.exe:2304 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\qmoAcIQQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\oUcwEUwM.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\qmoAcIQQ.bat (0 bytes)

The process %original file name%.exe:3388 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\OWgcssEw.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\bOskEgUI.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\OWgcssEw.bat (0 bytes)

The process %original file name%.exe:2804 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ZuQgMoQg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ZmwIcsYs.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ZmwIcsYs.bat (0 bytes)

The process %original file name%.exe:2072 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\KCYssksE.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lYoMoQIc.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\KCYssksE.bat (0 bytes)

The process %original file name%.exe:364 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nIoksYAs.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vQAMUUEg.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nIoksYAs.bat (0 bytes)

The process %original file name%.exe:2668 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\zKcUgIQs.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\FcMAkIkc.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\FcMAkIkc.bat (0 bytes)

The process %original file name%.exe:3664 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QcoUEckc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DoQwckIo.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\QcoUEckc.bat (0 bytes)

The process %original file name%.exe:3956 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\qUQQoIYg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jeggAEEM.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\jeggAEEM.bat (0 bytes)

The process %original file name%.exe:2768 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\cMIsgMUA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IEkEkgkI.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\cMIsgMUA.bat (0 bytes)

The process %original file name%.exe:2600 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\tYgwQEYE.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\iwAMMMso.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\iwAMMMso.bat (0 bytes)

The process %original file name%.exe:3748 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\XocsEIcg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\dsMMIIcM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\emggUgwQ.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (320 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\SIEggYos.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\emggUgwQ.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\SIEggYos.bat (0 bytes)

The process %original file name%.exe:3588 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\vQkogIkQ.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LiwUAgMA.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\LiwUAgMA.bat (0 bytes)

The process %original file name%.exe:2284 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\noooEgoI.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hcskoYcg.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\hcskoYcg.bat (0 bytes)

The process %original file name%.exe:1136 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\hSEckogE.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ZIsUQYIA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\pQgcgsgY.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (320 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HUEMYcEg.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ZIsUQYIA.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HUEMYcEg.bat (0 bytes)

The process %original file name%.exe:3740 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\SgwAMIkQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mOoMAcwE.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\mOoMAcwE.bat (0 bytes)

The process %original file name%.exe:2764 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\XMAkQosA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vcEoQUok.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\vcEoQUok.bat (0 bytes)

The process %original file name%.exe:3152 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\aeIgIIUc.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IUsYwcEQ.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\aeIgIIUc.bat (0 bytes)

The process %original file name%.exe:240 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\gMMMwEAk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nQEoAwIE.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nQEoAwIE.bat (0 bytes)

The process %original file name%.exe:780 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\wwkMgcEc.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ZewcMUcs.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\wwkMgcEc.bat (0 bytes)

The process %original file name%.exe:2040 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\uAYcMAsI.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AYQgoMIs.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\AYQgoMIs.bat (0 bytes)

The process %original file name%.exe:3396 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\XWwgEYAs.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\BCQYAAwo.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\XWwgEYAs.bat (0 bytes)

The process %original file name%.exe:1840 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\vyEUwQUk.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ZQgMwcks.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ZQgMwcks.bat (0 bytes)

The process %original file name%.exe:3016 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nMMYcYQo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sAwkgcAQ.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\sAwkgcAQ.bat (0 bytes)

The process %original file name%.exe:1240 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\uWwEIYQk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\gCYEcMQk.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\gCYEcMQk.bat (0 bytes)

The process %original file name%.exe:436 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\xakIMIwM.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HaAsUYYQ.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\xakIMIwM.bat (0 bytes)

The process %original file name%.exe:2164 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\zeMcUcMI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\COAwkggg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\bWAEIMMI.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (320 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\PmAIcYIA.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\zeMcUcMI.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\bWAEIMMI.bat (0 bytes)

The process %original file name%.exe:2376 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\MUQUcEoQ.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\cwYQQMkU.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\MUQUcEoQ.bat (0 bytes)

The process %original file name%.exe:1984 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\RogQcAwA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\POsAEokI.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\RogQcAwA.bat (0 bytes)

The process %original file name%.exe:2888 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\CuEIUoMA.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LMMEMQos.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\LMMEMQos.bat (0 bytes)

The process %original file name%.exe:2616 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\USoAwYUM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LIAcsEkg.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\LIAcsEkg.bat (0 bytes)

The process %original file name%.exe:2328 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\AsIYcYsI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\FcwcMIgw.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\FcwcMIgw.bat (0 bytes)

The process %original file name%.exe:3616 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\zAcEwckI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DCsIMssg.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\DCsIMssg.bat (0 bytes)

The process %original file name%.exe:2456 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\WaYscsEY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\OwooskQI.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\WaYscsEY.bat (0 bytes)

The process %original file name%.exe:1228 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\eeYwIEYI.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NQQMkcoI.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\NQQMkcoI.bat (0 bytes)

The process %original file name%.exe:3000 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\MWMkYYck.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\wqEosUAw.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\MWMkYYck.bat (0 bytes)

The process %original file name%.exe:3164 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\qyogscck.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\SiUQQgUg.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\qyogscck.bat (0 bytes)

The process %original file name%.exe:3008 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\euEYEooc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yKQEMEMo.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\euEYEooc.bat (0 bytes)

The process %original file name%.exe:3292 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\oOQQIYEY.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\BccgkwUs.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\oOQQIYEY.bat (0 bytes)

The process %original file name%.exe:2568 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\QcsoYoYo.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IyIkYIgo.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\QcsoYoYo.bat (0 bytes)

The process %original file name%.exe:3216 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\AWccMMsU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NcQUgwEk.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\NcQUgwEk.bat (0 bytes)

The process %original file name%.exe:2204 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\jeYEQIck.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\MqoAgkME.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\jeYEQIck.bat (0 bytes)

The process %original file name%.exe:3212 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\DQQsEQEU.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XMQwMAYg.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\DQQsEQEU.bat (0 bytes)

The process %original file name%.exe:3692 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\WmccgYUo.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TmscYcYo.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\WmccgYUo.bat (0 bytes)

The process %original file name%.exe:3360 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\EuksoIko.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nKYEkYQY.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nKYEkYQY.bat (0 bytes)

The process %original file name%.exe:2156 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\kIssskQY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\voYcoAgs.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\PIUMIMsw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hygIEYQA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jUAoIMEs.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (480 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ygIgYIkE.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\hygIEYQA.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kIssskQY.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ygIgYIkE.bat (0 bytes)

The process %original file name%.exe:2684 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\KGMIQooM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XCMAkEEk.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\XCMAkEEk.bat (0 bytes)

The process %original file name%.exe:1036 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ywAMEwUA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\iEAocUcg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\syUsUAAQ.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (320 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mEowoYUQ.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ywAMEwUA.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\iEAocUcg.bat (0 bytes)

The process %original file name%.exe:3080 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\uAwUcIow.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sCYgwoMY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\EcUwgAcQ.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (320 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\FEQkYUkc.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\EcUwgAcQ.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\FEQkYUkc.bat (0 bytes)

The process %original file name%.exe:636 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\MockwQIA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\icoQoIIg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\EkAYUUYA.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (320 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mOIoskUU.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\MockwQIA.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\icoQoIIg.bat (0 bytes)

The process %original file name%.exe:2812 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\RIcoogUo.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XwYEcYks.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\XwYEcYks.bat (0 bytes)

The process %original file name%.exe:2628 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\uKUYswYc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RIMQgwwY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lQAAIcAM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WCkgokwM.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (320 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\uKUYswYc.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lQAAIcAM.bat (0 bytes)

The process %original file name%.exe:2424 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\dsYMIkIE.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\FqAMIEUI.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\FqAMIEUI.bat (0 bytes)

The process %original file name%.exe:3876 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\hKYIkoME.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CasEAkgw.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\CasEAkgw.bat (0 bytes)

The process %original file name%.exe:2180 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\uCQooEgQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LEYkkgow.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\LEYkkgow.bat (0 bytes)

The process %original file name%.exe:3520 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\jacMsskQ.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ZeEoUosk.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\jacMsskQ.bat (0 bytes)

The process %original file name%.exe:3724 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\pwMUsUoM.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zGssIIMQ.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\zGssIIMQ.bat (0 bytes)

The process %original file name%.exe:3284 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\OSwEIook.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sMUoUcoo.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\OSwEIook.bat (0 bytes)

The process %original file name%.exe:3280 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\WeUcwkwE.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KeskIswY.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\KeskIswY.bat (0 bytes)

The process %original file name%.exe:868 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ngkcYcEM.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\tWwAkUoU.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\tWwAkUoU.bat (0 bytes)

The process %original file name%.exe:3688 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\IYQocoYU.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\EAcskEko.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\IYQocoYU.bat (0 bytes)

The process %original file name%.exe:3680 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\KkUwsgUo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\smokIIwQ.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\KkUwsgUo.bat (0 bytes)

The process %original file name%.exe:1028 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\AaMQIkgE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LAgEcIgc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yAkEoAQU.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (320 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\wsgEkYsE.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\AaMQIkgE.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LAgEcIgc.bat (0 bytes)

The process %original file name%.exe:2024 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\SkMAYwQo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QqkkgAsU.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\QqkkgAsU.bat (0 bytes)

The process %original file name%.exe:1672 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\cMQMQwEQ.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rqUIwckU.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\rqUIwckU.bat (0 bytes)

The process %original file name%.exe:1976 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\dukokIAY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RqoIMMAo.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\RqoIMMAo.bat (0 bytes)

The process %original file name%.exe:2100 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\DMQIMEsQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\fqwMIMMU.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\fqwMIMMU.bat (0 bytes)

The process %original file name%.exe:728 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\JecAQsEQ.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\JecAQsEQ.bat (0 bytes)

The process %original file name%.exe:604 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\OWQYksMk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ZKgcsQwU.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ZKgcsQwU.bat (0 bytes)

The process %original file name%.exe:4084 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\piQcIoYc.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NAkkcQwY.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\piQcIoYc.bat (0 bytes)

The process %original file name%.exe:4088 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\mUIkYkYQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mSsgQIQY.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\mUIkYkYQ.bat (0 bytes)

The process %original file name%.exe:3064 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\cyMUgEMM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WkkAsswA.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\WkkAsswA.bat (0 bytes)

The process %original file name%.exe:2436 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\bsEQMAAo.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hgksIYsQ.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\hgksIYsQ.bat (0 bytes)

The process %original file name%.exe:3672 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\WqkIwAQk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\fEsYYkQk.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hKsEsoEY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\FeEoAwII.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\MQAIUcQM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\myQsMEoM.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (480 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\fEsYYkQk.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\FeEoAwII.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hKsEsoEY.bat (0 bytes)

The process %original file name%.exe:3060 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\pMAwkcAU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\uOwAYYAo.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (320 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GOMYEYUo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LSYEkUQM.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\pMAwkcAU.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GOMYEYUo.bat (0 bytes)

The process %original file name%.exe:3536 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\WOwIsMgc.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\MAAQwMgM.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\MAAQwMgM.bat (0 bytes)

The process %original file name%.exe:2940 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\UisgwMQg.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vEsEQMIM.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\UisgwMQg.bat (0 bytes)

The process %original file name%.exe:2132 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\UGIMoYQQ.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NMcgMIYo.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\NMcgMIYo.bat (0 bytes)

The process %original file name%.exe:2340 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\iiQksQck.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\waoYIgYE.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\waoYIgYE.bat (0 bytes)

The process %original file name%.exe:1056 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\lQEUQsIY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\wowgAwsw.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (320 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\cEYEQgYw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XyYoYAcE.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\lQEUQsIY.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\wowgAwsw.bat (0 bytes)

The process %original file name%.exe:3344 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\PqsAscow.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TUgoQwgQ.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\PqsAscow.bat (0 bytes)

The process %original file name%.exe:2740 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\KksccYYg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\gGwsMMQQ.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (320 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\iqgUYcIo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vsccQkgM.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\KksccYYg.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vsccQkgM.bat (0 bytes)

The process %original file name%.exe:2704 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\MiwYAoso.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\fegkYUAg.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\MiwYAoso.bat (0 bytes)

The process %original file name%.exe:1756 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\eMUUokgo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xaAYEUEo.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\xaAYEUEo.bat (0 bytes)

The process %original file name%.exe:2504 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\KsEYYEko.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zeYIocAY.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\zeYIocAY.bat (0 bytes)

The process %original file name%.exe:3188 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\FiMwcwwk.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vIUIYcMM.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\vIUIYcMM.bat (0 bytes)

The process %original file name%.exe:2648 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\FEkkccMI.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DUocIwwY.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\FEkkccMI.bat (0 bytes)

The process %original file name%.exe:3916 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\yKwYYEEA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\qGUMwIwo.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\qGUMwIwo.bat (0 bytes)

The process %original file name%.exe:2876 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\pmwkUYAs.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\BSckkooM.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\BSckkooM.bat (0 bytes)

The process %original file name%.exe:2640 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\qKAYswkM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\dWUkAMII.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\dWUkAMII.bat (0 bytes)

The process %original file name%.exe:3056 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\aQgMUEQM.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\leYgEAYU.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\aQgMUEQM.bat (0 bytes)

The process %original file name%.exe:3236 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\gEoIgoMs.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kiwEEUAc.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\kiwEEUAc.bat (0 bytes)

The process %original file name%.exe:2976 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\JMUYMYIQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\VkMAwAMk.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\VkMAwAMk.bat (0 bytes)

The process %original file name%.exe:2536 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\KIQsAkIM.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\iYwQEsUc.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\KIQsAkIM.bat (0 bytes)

The process %original file name%.exe:2120 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\JwUIYswQ.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\tAgkYwEo.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\tAgkYwEo.bat (0 bytes)

The process %original file name%.exe:2332 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\DOcoYwwg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\bOsYAAUU.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\bOsYAAUU.bat (0 bytes)

The process %original file name%.exe:3428 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\cWgoEUEU.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CUMEsIgY.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\CUMEsIgY.bat (0 bytes)

The process %original file name%.exe:2228 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\BEwIEcAM.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yUMIckAk.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\yUMIckAk.bat (0 bytes)

The process %original file name%.exe:2336 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\oAoIMAIY.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jMQYcEYI.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\jMQYcEYI.bat (0 bytes)

The process %original file name%.exe:4012 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\uwwQMQYc.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\MGIoYMMo.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\uwwQMQYc.bat (0 bytes)

The process %original file name%.exe:3788 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\egkgAgYw.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xQYMgIYg.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\xQYMgIYg.bat (0 bytes)

The process %original file name%.exe:1604 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\JekkswcM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QEMowMsc.bat (4 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (320 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CcEUYYsU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\FGEskwYc.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\QEMowMsc.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\FGEskwYc.bat (0 bytes)

The process %original file name%.exe:3424 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\oQEYwkMU.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\eQAAYAwA.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\eQAAYAwA.bat (0 bytes)

The process %original file name%.exe:1472 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\JkMgkkwg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aGwAwMwY.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\JkMgkkwg.bat (0 bytes)

The process %original file name%.exe:3988 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\kYUYIcAE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sakckQww.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\kYUYIcAE.bat (0 bytes)

The process %original file name%.exe:3192 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\wQYIAEcQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mKkosEUs.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\UucYYAEs.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (320 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RwIcMsIs.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\wQYIAEcQ.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RwIcMsIs.bat (0 bytes)

The process %original file name%.exe:3980 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\agkooIAw.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\gaQQgcEc.bat (112 bytes)
C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\agkooIAw.bat (0 bytes)

The process %original file name%.exe:804 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YAcUMgQs.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vYcQscgI.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\YAcUMgQs.bat (0 bytes)

The process NesIMIQs.exe:1524 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dog.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Documents\My Music\Sample Music\New Stories (Highway Blues).wma.exe (7726 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\adm.bmp.exe (2321 bytes)
C:\totalcmd\TOTALCMD.EXE.exe (30812 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\snowflake.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\guitar.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\lift-off.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Sunset.jpg.exe (3073 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\kick.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\butterfly.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\palm tree.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\guest.bmp.exe (2321 bytes)
C:\totalcmd\TCMADMIN.EXE.exe (3073 bytes)
C:\totalcmd\TCUNINST.EXE.exe (3073 bytes)
C:\totalcmd\TcUsbRun.exe (3073 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\duck.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\red flower.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dirt bike.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\horses.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\KAAo.txt (55978 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\astronaut.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\cat.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\chess.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\ball.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\skater.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Blue hills.jpg.exe (3073 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\beach.bmp.exe (3073 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Water lilies.jpg.exe (3361 bytes)
C:\totalcmd\TCMDX32.EXE.exe (3361 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\frog.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\fish.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\airplane.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\pink flower.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Winter.jpg.exe (3361 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Adobe\Reader 9.3\Setup Files\Setup.exe (5441 bytes)
%Documents and Settings%\All Users\Documents\My Music\Sample Music\Beethoven's Symphony No. 9 (Scherzo).wma.exe (7433 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\drip.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\car.bmp.exe (2321 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\skater.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\chess.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dog.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\horses.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\palm tree.bmp (0 bytes)
%Documents and Settings%\All Users\Documents\My Music\Sample Music\Beethoven's Symphony No. 9 (Scherzo).wma (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\lift-off.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\duck.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\ball.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\snowflake.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\fish.bmp (0 bytes)
%Documents and Settings%\All Users\Documents\My Music\Sample Music\New Stories (Highway Blues).wma (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\frog.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\red flower.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\astronaut.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\beach.bmp (0 bytes)
C:\totalcmd\TCUNINST.EXE (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\airplane.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\car.bmp (0 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Water lilies.jpg (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dirt bike.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\cat.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\butterfly.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\guitar.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\pink flower.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\drip.bmp (0 bytes)
C:\totalcmd\TCMADMIN.EXE (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\guest.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\adm.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\kick.bmp (0 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Sunset.jpg (0 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Blue hills.jpg (0 bytes)
C:\totalcmd\TCMDX32.EXE (0 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Winter.jpg (0 bytes)
C:\totalcmd\TOTALCMD.EXE (0 bytes)

Registry activity

The process cscript.exe:1788 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "12 11 D5 AA DD EF 25 E5 5B 05 E2 35 3B E0 D7 BB"

The process cscript.exe:2656 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "86 13 53 55 29 EF 13 AD D3 A8 F5 B8 09 FB D8 1C"

The process cscript.exe:1264 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "50 B0 13 66 8C 8F 3F F0 0F B1 25 66 BC 8B 0D 88"

The process cscript.exe:3416 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "34 94 DF 91 84 AB 39 C4 2D AA DE 37 D8 7D 9F 22"

The process cscript.exe:2096 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E2 08 45 53 7F C3 FF BF 51 8A 62 0A F9 D9 29 A3"

The process cscript.exe:3324 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "53 83 DE EB 3B BC 48 AF 56 CF 30 C4 72 D9 BD E7"

The process cscript.exe:3656 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B8 B9 6A 8F C3 F9 0C B5 96 CE A4 53 CD 8C EC 5A"

The process cscript.exe:2996 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "33 6E AF 26 1C BD 91 FC C3 AE 07 34 34 07 B8 15"

The process cscript.exe:4028 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0C 15 E5 B1 E5 F8 84 6B 3F 50 5F 0E 0A BE 2F BC"

The process cscript.exe:2320 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8F C9 2C 25 B5 77 C4 B1 4F 1B 90 71 A9 9F A7 14"

The process cscript.exe:1836 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F0 05 71 D8 8A 66 49 FE 6F D0 BE B3 88 52 F8 0E"

The process cscript.exe:2488 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "89 AF 46 19 FE 2E B6 36 A6 F5 C7 8B 2F C6 09 2B"

The process cscript.exe:2324 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "96 9C 41 A9 D6 40 00 95 60 20 68 86 FF C1 B9 9D"

The process cscript.exe:2484 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "58 CD 86 E2 28 01 9B 15 98 97 67 20 E0 87 5A A3"

The process cscript.exe:624 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6F 83 61 57 C7 8A CE CF 7D 3C BD E0 C7 9D 08 2D"

The process cscript.exe:2528 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "99 B1 C1 36 E0 0F 56 A3 95 34 BB 86 66 F2 79 C7"

The process cscript.exe:3256 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CB 42 2A 7F 12 BB 18 44 F7 1D E8 02 2E 05 A2 FC"

The process cscript.exe:344 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E7 9E 17 47 64 01 8B 67 7B A0 34 0C 82 F3 97 0B"

The process cscript.exe:2404 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "04 97 3C 3E E9 64 85 39 FB 96 3C 80 A6 FA 44 0C"

The process cscript.exe:2952 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D3 44 D8 1D 46 C1 EA 66 E3 18 C3 61 86 6A 01 95"

The process cscript.exe:2400 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "97 ED 2B 41 D9 D2 C8 D1 C9 DA 69 3E C3 06 10 B0"

The process cscript.exe:1376 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "88 DC DA 2A 52 E1 26 DD D5 FB A7 3A 28 BD 2B 28"

The process cscript.exe:548 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D2 E1 6A D8 F5 F5 27 29 2B 0C 68 83 95 18 7B 83"

The process cscript.exe:284 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "66 D1 AA 9E A1 23 A9 7B F7 5E 68 CB EA 96 53 19"

The process cscript.exe:1672 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FA A8 30 B6 08 02 B0 DD 6E B6 41 12 B4 91 0F 15"

The process cscript.exe:2444 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "10 9E 8D 12 1C C1 41 7B 94 54 F9 75 1B 8A DB EF"

The process cscript.exe:3488 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A2 DF 7C F0 86 84 35 F9 C6 83 E8 95 03 A0 00 97"

The process cscript.exe:3764 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E4 E9 42 16 98 52 9E 8C BD E2 7F 31 72 83 D1 4D"

The process cscript.exe:2852 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D7 07 49 85 5C 6D 58 0B E4 07 48 94 97 6E 08 3B"

The process cscript.exe:2700 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "63 6C 9F 52 17 52 10 F8 23 FB 43 31 31 CF CC 18"

The process cscript.exe:3336 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BD 58 04 CF A9 EC 91 B9 7D 21 9D FB 31 AA 92 B9"

The process cscript.exe:4036 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D2 2C D5 2B 43 E3 6D 14 CC F7 39 E7 DF 03 80 41"

The process cscript.exe:3408 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1A 99 B1 0D 30 BE 40 19 BB 91 3F 21 9E 11 DE A9"

The process cscript.exe:2452 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3D E1 46 F2 DA 1C F3 52 B4 FC 47 6B 6C A7 4F FE"

The process cscript.exe:2260 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B4 CD 1C D7 7F AD 5A ED F3 DE 6E 93 66 84 00 21"

The process cscript.exe:3560 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B5 70 A2 55 9D 58 9E EA 01 33 93 C4 2F C7 08 08"

The process cscript.exe:2556 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DB E9 C8 3D 16 EB 08 7A B7 8D 2B B6 9F 49 54 3B"

The process cscript.exe:3240 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C7 4C 37 DB 0A C0 8C 09 95 61 16 A0 90 0A 41 AF"

The process cscript.exe:3032 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A1 F3 74 AB 59 6B C2 DE E4 B6 2D E5 1E D9 DF 34"

The process cscript.exe:2496 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "46 0E EF 9F 34 C2 94 E5 54 60 05 86 3B E6 FF 7A"

The process cscript.exe:3840 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "80 CA 0C 0D F5 3D DD 48 C6 84 B9 7F 53 B7 B3 65"

The process cscript.exe:3844 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BF B8 54 A5 28 E1 FF DA 55 D4 5F 0C C3 B5 64 29"

The process cscript.exe:3412 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "4D 1A A4 5B AF 56 71 C0 B7 C3 19 4D 52 0A D6 07"

The process cscript.exe:2148 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "08 77 C9 BE D6 55 61 78 22 1B 07 FF F6 9F C4 FD"

The process cscript.exe:3948 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "59 E2 86 7E 3F 07 5C F8 54 19 E0 33 00 DC 18 FA"

The process cscript.exe:2900 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DC 01 59 D4 7C 74 67 67 8C 9F 82 6F A0 53 86 16"

The process cscript.exe:2284 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AC CD EE 30 EF C6 ED 29 7E DF E6 59 2E 19 31 89"

The process cscript.exe:4092 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "58 2B 8A 2F 30 C8 AD 3E F1 0A 2D 50 43 CD D9 40"

The process cscript.exe:3940 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "39 75 F4 67 75 31 CE 14 5C 2C D2 80 DC 2B 19 49"

The process cscript.exe:1328 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F4 3B C5 A2 17 FF 7D 63 11 23 9B 0A E1 84 18 CA"

The process cscript.exe:3828 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B6 97 B9 56 4B 59 F9 DB 27 56 DF 69 23 4D DA 70"

The process cscript.exe:776 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "86 85 95 4A 2C B4 00 B4 D3 94 4C 7C 33 60 FF 0A"

The process cscript.exe:396 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "13 8B 44 8A 5F FE 09 27 E4 52 66 42 61 29 83 E9"

The process cscript.exe:3476 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "42 32 E5 80 2F 19 E3 08 D4 9C 95 F0 03 8A E1 43"

The process cscript.exe:1716 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "7B ED 96 1F AE F7 4F 1B 73 A1 D4 21 18 A8 71 74"

The process cscript.exe:2980 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "7A AF A6 57 8A EC 3A DC 5C 53 2F 07 E1 AF F4 FA"

The process cscript.exe:2984 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "85 38 96 A0 75 99 85 90 39 C5 63 07 EA 8B F9 24"

The process cscript.exe:2664 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "79 8E F2 1B 68 C6 C6 50 19 5C 49 9A 39 DF D9 60"

The process cscript.exe:492 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "87 36 24 E1 06 C3 B8 E9 E9 43 83 06 52 A5 E1 1D"

The process cscript.exe:368 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "12 CB 6D 9D 05 63 7B 04 BF 21 EC 16 95 90 9A EB"

The process cscript.exe:3952 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "7B 5C 72 8A 61 A6 D0 81 62 AA 94 54 B2 2C 4A 92"

The process cscript.exe:1016 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3B E6 E6 88 56 44 11 C7 B4 40 91 C3 E4 B4 98 B3"

The process cscript.exe:916 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D9 DE 35 B1 9E 3C 54 45 3C 72 C0 A2 C9 BF 88 31"

The process cscript.exe:2668 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D0 76 12 5F 4B A0 DC 3C 70 2D DB 4D 3C 5A 92 B7"

The process cscript.exe:3664 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "02 53 51 37 DD EE FB DD AD 56 5A B9 73 E9 76 7B"

The process cscript.exe:1236 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6A B3 FA 62 24 72 9F 49 BB A1 F2 D2 64 6D F8 6E"

The process cscript.exe:3816 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "74 B0 37 BD 5E 73 73 42 F3 9E E1 F2 65 09 CA D1"

The process cscript.exe:3660 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A2 D5 8B EC 30 32 EB A2 1B FA 7D 2D 0F 39 C2 55"

The process cscript.exe:580 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FB 02 3E 85 17 DE F7 00 30 0B 1E 27 EC E0 E4 E6"

The process cscript.exe:2932 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "68 83 DF 74 7F 47 0C 0C 7D 40 B1 35 1B 44 69 49"

The process cscript.exe:304 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C4 92 C2 55 FC 71 95 03 50 29 95 62 2F B2 40 B4"

The process cscript.exe:380 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5D DA 03 9C CB D4 2F CA AD 47 F2 8B F4 D0 1A C8"

The process cscript.exe:3152 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "14 F1 1E E6 74 33 46 DE D0 B4 E7 B1 2D 15 73 96"

The process cscript.exe:240 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "25 5A A8 39 5C 3B 1F C9 79 73 6F C4 0E 21 6B 8A"

The process cscript.exe:824 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DF 05 51 FD E9 CC 6B AA D5 17 B3 71 CF 9A 7E 7C"

The process cscript.exe:3316 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FB 13 BC AD F1 D2 7F C3 8A 77 E6 A1 84 A4 84 B7"

The process cscript.exe:3464 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "06 1F E9 21 EF D3 69 C3 3B 47 BB 2B 82 ED 4B B1"

The process cscript.exe:3460 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CE 71 C0 CC D7 09 2D F1 C7 5F AE 7A 74 F1 84 44"

The process cscript.exe:2576 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FE B7 A3 52 6F 20 66 BC 50 2B 32 1C D2 3C 90 E3"

The process cscript.exe:788 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F9 B1 03 17 58 DB 94 E2 57 FB 2B 6A 4B 24 78 9C"

The process cscript.exe:3468 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F9 FD 55 13 80 E4 0D 72 63 DC 50 13 ED D7 A3 44"

The process cscript.exe:2676 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "49 4F 58 4A F0 7C 46 0F 5F BC F7 BA 8B 93 E0 1E"

The process cscript.exe:432 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BE DC 91 F3 F1 D9 62 E9 11 02 F5 BD F5 1F CE 76"

The process cscript.exe:3692 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "13 DB 13 DF DD E3 D3 82 CF 8D 21 2F 4C 1E 97 07"

The process cscript.exe:2372 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "08 00 6D 6E 00 14 4F 7C 0F 24 23 5B D1 BA C6 BF"

The process cscript.exe:516 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E3 3C 28 FC 64 C9 F6 9E D7 DF 11 A9 72 3B AD F8"

The process cscript.exe:1156 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "81 B0 4C 38 97 AC B0 82 CB DD 3B 2A 28 B8 8B A6"

The process cscript.exe:2592 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "82 CE 04 24 2F 84 E8 41 FC 1B 58 A4 84 02 56 FC"

The process cscript.exe:1220 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "50 60 D6 C9 2F EE 02 96 AF 87 CE AF AF 7D F0 3F"

The process cscript.exe:3752 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "94 A8 57 49 B9 03 4C 63 99 F7 CF A3 29 F5 91 64"

The process cscript.exe:2924 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "47 01 1F 7F 84 42 44 83 9C C3 6C B2 C7 7F DD ED"

The process cscript.exe:332 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "74 6E 7A C6 8F 7C 29 A9 2A 6F 4F 4D 0C 0B CC 42"

The process cscript.exe:3824 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8D 1C 4D CF 7A 00 16 AA 58 BD E0 EF 5C 8F CC 27"

The process cscript.exe:2196 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "67 A9 BA 9C 13 2C 63 EA 2C 75 90 0D B5 D9 BD 48"

The process cscript.exe:2800 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "44 5D 64 A2 4A 88 96 C9 05 C8 F1 8E B1 91 F9 9D"

The process cscript.exe:2200 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CB 5F 5B 5C 35 BC B3 75 48 0F 5B 09 83 1A 62 21"

The process cscript.exe:3216 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0C 66 89 D9 FD 69 8E 82 31 F4 B9 20 F2 BA F1 9B"

The process cscript.exe:2256 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B8 0B E6 97 6F 53 A9 CE CA E6 28 AA 52 5A C7 03"

The process cscript.exe:3364 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D5 93 11 F9 AB 0B 3E DE 8B 93 B7 52 5A 6D FC 51"

The process cscript.exe:2888 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "79 41 D9 12 C2 BA 3A EC D9 49 D0 C8 B7 7D B7 D8"

The process cscript.exe:3516 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F6 43 C0 B6 C8 7E CD A0 74 9F AD 5C 5B 63 BB DE"

The process cscript.exe:1988 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E8 12 17 A2 A9 55 67 61 B3 D9 81 6E D3 6C 0C 00"

The process cscript.exe:1500 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "94 3D 47 38 C6 60 49 40 21 4D 53 55 54 21 25 7E"

The process cscript.exe:2688 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B4 3F 20 BE A5 71 79 4D 01 40 A3 36 DF 7B 1B CC"

The process cscript.exe:3892 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "77 61 3E 56 57 D7 10 9E F9 51 B6 72 54 5B 29 F3"

The process cscript.exe:3084 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "46 81 3A BF E4 63 59 73 D3 F2 50 19 51 ED AF 26"

The process cscript.exe:2112 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "23 7A 30 4E 0B 8F D9 66 A7 70 72 26 85 53 82 07"

The process cscript.exe:2680 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E5 7A 5D 91 9C 54 5C DC 48 8C 38 54 ED 58 47 FA"

The process cscript.exe:500 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "86 49 DF 4D D2 6D 78 55 2F 96 45 8C 45 DB 79 76"

The process cscript.exe:1468 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F5 62 9D B7 90 DB E8 EE 78 37 99 6E 16 15 6A 74"

The process cscript.exe:2428 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "52 E0 BB A2 B2 B8 7A 3C 00 80 1C 26 7F BB 33 9E"

The process cscript.exe:3604 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B7 D4 CB 87 D2 B1 29 F2 58 35 B1 34 06 2B 1A 7F"

The process cscript.exe:3632 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1F 68 F9 D6 80 BA BF 35 0B 5B 64 42 6D E6 BA 47"

The process cscript.exe:2332 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F7 22 4A 38 F2 55 E0 3D 69 02 6B 71 7B 65 7B 05"

The process cscript.exe:2264 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CD 7F 3D 3F DA AE 74 CA 17 65 2F BE 67 F4 6F F5"

The process cscript.exe:3072 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "12 E0 A7 48 E9 3F 8A 82 35 23 22 2B 41 BE 78 FC"

The process cscript.exe:2180 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "97 59 97 FC 80 5B D2 D1 B9 14 0A 59 3A 8B 84 9A"

The process cscript.exe:2956 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "22 D1 66 78 8E 32 E6 40 8A 3C CA 7F 7D ED 2A E9"

The process cscript.exe:3720 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DA C6 26 F5 52 55 D0 B0 FD A5 B4 72 48 75 83 AF"

The process cscript.exe:3528 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CE 33 6A A4 D4 63 0E CE 85 F8 32 3D 7F E2 01 CA"

The process cscript.exe:3176 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8D 04 1F 63 F0 FF 5E 13 3B F2 4B 15 BB 48 4C BF"

The process cscript.exe:3884 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EE 03 D5 F9 AC F1 BC F9 51 90 F4 FC EB 48 65 A8"

The process cscript.exe:3204 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B2 C9 77 61 05 78 BB 2D 95 99 2A 2D BB 20 4A F7"

The process cscript.exe:3880 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "12 8A 8B C3 36 B7 B3 C6 BE F2 9E CE EA D3 93 FA"

The process cscript.exe:3444 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2C 88 EF 8B AD BA 09 8B 8E 01 D8 56 72 6C B7 37"

The process cscript.exe:2024 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "73 79 E9 3A 53 AC 2E 1A 50 25 AE E7 3A 4D 88 D5"

The process cscript.exe:3012 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "00 21 F8 8A 05 45 03 3E 49 C5 C8 8A 21 03 E3 F0"

The process cscript.exe:2108 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "03 72 BC 75 EB DC 99 08 A7 6B 13 13 3E 67 D7 2B"

The process cscript.exe:2356 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "34 C0 40 E2 E9 DB 11 23 E5 59 61 D6 59 63 6E 2D"

The process cscript.exe:1108 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "66 37 D2 9D 07 2E C9 23 F6 46 5A A4 12 6D 55 25"

The process cscript.exe:1512 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0A 2D 3E 27 8E EA 36 1F 11 FA 18 CF 42 7B CE 1E"

The process cscript.exe:4080 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AA 80 A1 CA 99 74 44 5E DF 76 70 F1 B3 9F 79 84"

The process cscript.exe:604 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "71 20 C4 B5 AB D1 5E 88 CB F4 48 E5 34 94 C2 08"

The process cscript.exe:2732 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FA 5E BF 7D DA C7 3A 34 60 FC 5B 15 16 52 21 E9"

The process cscript.exe:3636 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C2 E3 A6 75 5E 00 D2 14 31 42 D6 95 48 E6 5B 32"

The process cscript.exe:2432 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "67 DD 99 C4 F9 08 46 3B 73 31 DC CD A1 F8 E0 09"

The process cscript.exe:1168 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "91 FD 45 49 C6 F2 32 D0 AD 73 E1 98 D7 57 D6 B4"

The process cscript.exe:2436 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A2 40 6A 05 C9 3E AC C7 24 8A B1 1C EF 4D FE CC"

The process cscript.exe:552 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "38 86 49 09 5A E0 6B D1 37 91 50 49 38 4A D1 54"

The process cscript.exe:3060 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A9 03 80 4A 5B 87 C1 F2 EF 23 6E 4C 61 A2 E1 44"

The process cscript.exe:3536 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0C CB FA 62 81 50 CE 06 1A AB 32 65 7B 72 CA A4"

The process cscript.exe:2944 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6D 28 CC 91 C4 30 B8 5D A4 8C 45 4A 30 86 96 A5"

The process cscript.exe:1052 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "27 F4 08 B5 92 A5 37 52 CE 8B 08 58 88 60 9F 7B"

The process cscript.exe:2340 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "50 CE 4C 3C 42 6B 92 E8 A8 01 88 24 BD DF 8C 35"

The process cscript.exe:1056 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "49 F1 1D 71 0C F4 FA 90 04 F5 C1 A1 00 D1 54 3D"

The process cscript.exe:1964 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "39 CE 9B 16 48 2E EB BC DF E9 B1 A3 9B 1A 33 5A"

The process cscript.exe:2224 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F6 72 6B 2F 4F 45 61 19 71 02 3D 9B 12 88 77 A9"

The process cscript.exe:3436 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "34 EC E2 25 3B AE 01 63 61 C6 60 7B 08 5B B6 B5"

The process cscript.exe:2740 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C6 8E BF BD DA 5E 50 E3 5B C7 0D A6 11 FC 40 94"

The process cscript.exe:3972 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "70 33 2D F5 E8 58 DC 5A 33 56 8E AA 4A EC 2B EA"

The process cscript.exe:3976 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CB 8F 60 AB C3 62 3C FA 8D 51 66 AF 4C 45 20 BD"

The process cscript.exe:3916 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BE B9 D1 75 59 05 3F 79 76 AF 83 D8 EB 01 7F BE"

The process cscript.exe:2724 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8D 78 B3 AA D7 33 76 08 38 76 12 2A C5 A1 D8 4D"

The process cscript.exe:3912 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C1 B1 EE FB E6 7E D4 2C 3C EE A1 97 21 50 C9 EB"

The process cscript.exe:2640 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6B 3E B2 BB 81 79 C4 75 22 32 10 FA 8D 2F 50 3A"

The process cscript.exe:2644 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C2 16 E8 C7 EA 6D 09 02 0B F8 B4 5F B0 6D 20 BD"

The process cscript.exe:3704 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8E F2 A3 3D 13 B3 41 6D 33 38 90 D8 11 40 F9 64"

The process cscript.exe:2120 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "94 20 63 CE AA B5 39 54 E3 F5 47 79 2C D1 69 72"

The process cscript.exe:3780 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "66 02 D0 34 2A 27 AB C6 FC CE 2A E0 77 A0 67 39"

The process cscript.exe:3228 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5A EB 4A DC 51 9A 60 60 AF 12 A3 E9 F7 D1 DD F5"

The process cscript.exe:3788 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "7D 84 C2 8E 17 B3 00 74 A5 04 E6 28 4A 6B AA F4"

The process cscript.exe:3420 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "39 48 E1 DF 72 08 4E 67 DF 72 0B E6 70 E3 F8 E1"

The process cscript.exe:3548 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EF 0A 91 83 ED 0E 8A 87 FB 6C 64 1D CA 74 7F F9"

The process cscript.exe:3220 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "88 89 69 90 C7 8E 99 12 6B 6A 86 55 D3 F6 FB FF"

The process cscript.exe:356 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "94 02 8F 95 8F A1 00 E9 7A 61 3C 7B 66 21 08 F7"

The process cscript.exe:476 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F1 53 00 FD 58 2B 56 8D BB 35 E2 2E 0C 07 A0 2B"

The process cscript.exe:352 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E0 7C EF B4 B2 0D 5D 7E 58 6B 0F EB 08 15 15 41"

The process cscript.exe:3980 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C5 00 43 6C 09 8A DB A2 9C A1 F3 D6 24 05 6F B8"

The process cscript.exe:3340 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5F BE BB 8E C9 B9 72 59 64 0A D9 52 49 56 A3 DA"

The process fGAwoYMM.exe:844 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0E 58 2D 99 05 A3 D0 F0 30 23 E7 38 33 85 72 71"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"fGAwoYMM.exe" = "%Documents and Settings%\%current user%\dUskcAww\fGAwoYMM.exe"

The process %original file name%.exe:216 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3A 9E 9B 2D 04 37 98 67 DF 23 0D 8B C6 69 36 AD"

The process %original file name%.exe:1140 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B4 8F AA BD 92 39 32 C5 F6 4E AF 53 0D 4B 3F 6C"

The process %original file name%.exe:3716 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "09 43 15 CD 74 30 B6 0E 01 33 8F 32 3A 4B DD 2A"

The process %original file name%.exe:1300 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F3 C0 07 4E 79 F4 7F 8E C6 26 70 88 78 6D 12 C4"

The process %original file name%.exe:2848 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8C D3 93 D6 96 AE 40 C2 F5 48 F7 0C DC 8F 49 A5"

The process %original file name%.exe:3496 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "00 02 52 1A 35 A8 DA 6A CC 40 78 A1 6A 47 BB 06"

The process %original file name%.exe:2652 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1D EB 18 F3 BA 33 75 4A F4 C3 12 70 E7 FB CB EA"

The process %original file name%.exe:3648 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "58 21 7C 80 62 D1 61 93 0B 08 24 BC 2D 9E 8B EB"

The process %original file name%.exe:3920 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "06 72 44 0C F1 F2 D8 A9 8A 12 AE DB 55 FE 59 DE"

The process %original file name%.exe:1264 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "55 31 A3 CE 5D 77 DA C6 FD 20 0D CC 6E FB 61 EF"

The process %original file name%.exe:3320 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F0 0D 45 E0 F2 00 55 6A B7 A3 39 AC F1 AB AB 21"

The process %original file name%.exe:3324 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F0 AD D0 77 3E EC DE 19 44 A8 43 78 8C AF AF 3F"

The process %original file name%.exe:4020 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "63 7D E5 B8 B8 A3 2F 80 28 57 D7 40 44 0D 14 A1"

The process %original file name%.exe:3656 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "37 8D 1F D8 04 65 7E 2B 4D 65 20 81 86 D3 B0 29"

The process %original file name%.exe:3132 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B7 EC 30 DB 1C B9 65 38 82 D5 82 55 BA E5 07 B8"

The process %original file name%.exe:3556 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2B A2 7F BD 1C 9F 95 68 FA 7F 1C E5 7F F0 59 1D"

The process %original file name%.exe:2520 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C4 46 15 A0 D3 76 90 62 F9 FB 58 48 AD 34 EE D3"

The process %original file name%.exe:2036 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F9 45 A0 F7 11 B4 10 73 33 13 9A A2 54 0A B6 F7"

The process %original file name%.exe:3796 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FC 82 4B F2 27 A9 AB 54 34 72 59 8A 05 FD 7A C9"

The process %original file name%.exe:3124 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "91 4B 20 FC 5D 1B EF 47 63 11 7F 41 CA E2 8A 53"

The process %original file name%.exe:3856 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "7D 65 18 FE DA 39 BE AD AE B0 E5 7D 42 EA EA D6"

The process %original file name%.exe:2404 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E4 9E 89 23 EA 40 29 1E 34 86 9E AB 0C 8B 95 D8"

The process %original file name%.exe:3852 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B3 D7 BF 6B 18 58 96 9E EB 78 FF 74 79 17 53 33"

The process %original file name%.exe:280 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "24 D7 2E 94 AE 8F B6 3E 22 43 28 E4 B2 E3 63 1B"

The process %original file name%.exe:3992 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D2 38 C5 40 CC 0B 28 70 58 0C 35 AB 37 63 99 C5"

The process %original file name%.exe:816 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "69 41 6B BA EB BE B1 7A 93 28 7C AE E4 D8 02 DA"

The process %original file name%.exe:3488 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EE 1A 39 11 97 4C F0 1C 3E 44 7F FF 19 BC FC 54"

The process %original file name%.exe:3568 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AD 2D F7 0D DE EC 85 00 83 56 F1 B0 71 50 6A 4E"

The process %original file name%.exe:3832 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6C 0F 02 19 5F ED 0C B2 CF 44 72 FF 27 87 35 CA"

The process %original file name%.exe:716 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D0 78 C8 74 23 8F C2 0B F3 AA 0D 1F 60 4A 60 B3"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"fGAwoYMM.exe" = "%Documents and Settings%\%current user%\dUskcAww\fGAwoYMM.exe"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NesIMIQs.exe" = "%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.exe"

The process %original file name%.exe:3484 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5D 6B 49 85 AB 33 82 BA 39 7C 40 30 25 8D F3 79"

The process %original file name%.exe:3932 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "66 EE 8F 65 73 FF 32 9E 64 CD 05 E8 3D 4D 2D 77"

The process %original file name%.exe:264 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "82 11 CE AD 8C CD 78 99 DA B6 81 7B 4A E0 56 81"

The process %original file name%.exe:268 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6D 27 FD 6E AB 62 2B 6D ED 8E 1F 79 EF 20 EA 7D"

The process %original file name%.exe:2260 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3B 8E 55 12 E1 38 6D 31 1C 51 0D 99 91 F8 BE 74"

The process %original file name%.exe:2552 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F0 10 91 24 C9 10 9F DB 64 4F 04 B5 36 D5 48 38"

The process %original file name%.exe:2992 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C7 0C 3A CD B3 04 5B 16 4B 99 CE 3E 32 44 93 33"

The process %original file name%.exe:1064 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "39 9F 78 C0 39 D0 8E 3F 52 38 E2 37 0B 1C 16 B7"

The process %original file name%.exe:2996 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D9 DE 66 E8 B7 E6 7A C5 DA 09 6C FA 29 3A D6 B8"

The process %original file name%.exe:2496 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "45 C0 F8 4C F4 35 3A F2 85 C6 1B ED 51 F6 F9 4E"

The process %original file name%.exe:928 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0B 2B 08 91 88 6E 85 FF 62 76 42 1E B6 41 B7 BF"

The process %original file name%.exe:2060 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EF C5 3C B8 3F D5 CD 7A 69 3B 7C 93 80 AC C4 AE"

The process %original file name%.exe:372 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "96 A5 F0 03 6C 8F 32 37 2A A9 8C 9D 3B 0F 36 4C"

The process %original file name%.exe:3036 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "4B 37 2A 0F A8 79 15 D8 03 BA DC 9E 2E 76 6C E3"

The process %original file name%.exe:3772 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "41 BC 20 A3 1A 8F 7F D9 90 FB B7 AE EF DB 6C C7"

The process %original file name%.exe:708 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "79 2A EF 57 05 9D 73 18 CF E2 F8 11 06 92 B3 7E"

The process %original file name%.exe:2472 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2D 8E 5C B9 67 7E 76 3F 4F 09 63 F8 3E D1 0D 46"

The process %original file name%.exe:2904 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EA 23 BF 64 AF 4C C5 E3 E6 5E 87 05 2A F3 4F FD"

The process %original file name%.exe:1328 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C4 1D 3E 15 5C 73 84 A9 6B 52 31 9E F7 7F 74 5F"

The process %original file name%.exe:3944 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E6 92 64 2E 6B 5C BA F2 C0 73 73 24 70 1F 30 61"

The process %original file name%.exe:1236 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "40 DE D2 82 35 32 CF 5E 51 AE 2E FC 61 84 02 81"

The process %original file name%.exe:332 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0D E7 D1 C3 21 B8 6B 6E 98 8E 40 0E D4 3B B9 B6"

The process %original file name%.exe:2824 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F3 39 95 3C A8 34 B3 2B FF C7 B8 C1 B8 52 90 08"

The process %original file name%.exe:2820 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "84 0E 45 07 B6 44 92 A0 14 C7 53 FA 43 E8 9A 5F"

The process %original file name%.exe:3300 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "18 32 09 3A 23 D5 32 4B 85 6D 93 94 17 A7 60 57"

The process %original file name%.exe:3476 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FB D5 30 AB C4 38 B1 A3 4D B0 24 95 6E 8E C8 64"

The process %original file name%.exe:2988 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8C 33 EA AE 2A D6 E8 AF BC 22 F6 BA 0B 6E A3 07"

The process %original file name%.exe:2300 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "79 C9 AC 47 BD E1 A4 2E 97 0F 27 ED 67 B6 4E 65"

The process %original file name%.exe:4048 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "40 46 C5 39 D4 D6 75 2A F9 BB B1 40 87 35 45 03"

The process %original file name%.exe:2304 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FE 0A 20 E9 31 AB BF 39 C1 03 34 48 11 94 1F B9"

The process %original file name%.exe:3388 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "74 90 36 CC 15 57 FE 9D D3 7C B9 1C 88 FC FC A8"

The process %original file name%.exe:2804 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0C C4 E4 DF C9 C6 1D 64 72 D2 5F 99 47 2D E0 97"

The process %original file name%.exe:2072 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B9 C2 3F E8 28 AD 9B 62 95 9D 0A DD 18 C7 22 F6"

The process %original file name%.exe:364 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "17 05 7A 38 DF AD 51 EC A8 FE F7 28 7A CA 79 56"

The process %original file name%.exe:2668 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6B 30 77 12 9C DD B4 FF 34 1E 35 FE DF 1F 81 9A"

The process %original file name%.exe:3664 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "66 06 A9 E9 28 9D 8B 33 22 C4 1C AE 6F E6 24 3E"

The process %original file name%.exe:3956 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FE F4 CD 6E C2 88 B7 0A 4D BF 38 C5 3B 28 C1 7D"

The process %original file name%.exe:2768 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "4C C8 29 CC 0D E5 64 B6 99 74 70 C8 98 D0 05 6D"

The process %original file name%.exe:2600 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8B 99 63 02 51 69 B5 D1 B4 37 3E 43 6B 3B D9 B2"

The process %original file name%.exe:3748 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "4A 10 17 E5 80 25 33 1C 28 0E 5B E4 2F 03 9B DD"

The process %original file name%.exe:3588 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "80 75 30 D5 E4 27 B8 C6 8F A5 E9 CB 09 63 42 A8"

The process %original file name%.exe:2284 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "96 76 E6 65 85 58 FC 1E E7 6D E7 12 37 0E AE 56"

The process %original file name%.exe:1136 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8A 03 63 8E 00 05 63 27 5B 5C 76 8A F4 F4 A4 10"

The process %original file name%.exe:3740 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E2 8E E9 80 47 ED C2 CC BC 45 F5 59 03 86 59 CF"

The process %original file name%.exe:2764 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B0 41 85 1E C1 0D 79 58 D2 6E 56 B0 9D BA 19 69"

The process %original file name%.exe:3152 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6A C5 57 C7 E8 65 85 03 9F 71 D1 AF 56 EC A0 C8"

The process %original file name%.exe:240 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "55 CB E7 82 C6 F3 92 33 86 DF B1 5A C3 49 70 03"

The process %original file name%.exe:780 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D6 4D B8 74 8D C3 A8 9F 59 14 73 01 64 2C 3C 1A"

The process %original file name%.exe:2040 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FB 20 A7 91 C1 B8 2D 03 B7 47 1C BE B8 1F BD 55"

The process %original file name%.exe:3396 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1F AE 9F EA 32 95 23 DC 89 61 21 9B 54 0C 36 F2"

The process %original file name%.exe:1840 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9A 0D C9 C4 98 85 E3 6F 9E 8C E1 EC 95 BE 24 F3"

The process %original file name%.exe:3016 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8F 6E 52 DE FE 36 A4 CA 04 8D 8F 8D 63 19 2A B8"

The process %original file name%.exe:1240 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D8 89 70 6F CD 56 48 14 FF 63 68 42 E7 F2 00 D4"

The process %original file name%.exe:436 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "56 DA 4D B2 AB DC 91 CC 13 6B 6C 6C D5 C8 A6 CD"

The process %original file name%.exe:2164 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1D 5D E9 37 1E 3B B0 F3 A4 E2 91 00 B5 10 D5 E8"

The process %original file name%.exe:2376 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AA 3E 27 0C 35 A4 83 1C 7D C5 4B B0 FA 87 89 29"

The process %original file name%.exe:1984 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FA 56 9D 46 3E D5 89 C1 2D 03 CD 70 A8 58 42 A7"

The process %original file name%.exe:2888 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F6 8B FC 51 A1 86 47 32 6C C5 33 36 EB 86 BC 7C"

The process %original file name%.exe:2616 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "07 46 5D 8D DE 99 8F F0 19 6B 98 DB 7D 6D AA 47"

The process %original file name%.exe:2328 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "76 C5 9B 93 32 77 ED B1 9E 0F 20 5A 8E 67 86 A7"

The process %original file name%.exe:3616 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AA 0E 4B D4 BB 4F 4C 92 72 78 27 33 26 3D 65 D1"

The process %original file name%.exe:2456 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5F 0E 63 FF D8 FA 85 5B 77 C0 EE 20 F9 D4 10 E9"

The process %original file name%.exe:1228 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8F FA 2A 11 76 2E 4E 07 E0 3C 36 ED 9E FB 03 AB"

The process %original file name%.exe:3000 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "47 50 34 CC DA 23 E6 E1 EF 7B B7 7C D4 F5 02 9D"

The process %original file name%.exe:3164 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2C D6 06 66 36 DA AB 13 9D 78 3C 98 33 8B 9C 8E"

The process %original file name%.exe:3008 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "7F 1A 2B F9 E2 C5 E0 F6 27 B4 35 AE 4A 91 45 0C"

The process %original file name%.exe:3292 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D6 53 D9 B7 A9 7F 2F F3 97 DF 80 EB 8B 6F 73 06"

The process %original file name%.exe:2568 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E0 D4 02 3F B1 89 58 CF A9 5D 50 03 9A A1 F0 AF"

The process %original file name%.exe:3216 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9A 27 99 4D C0 BB 2B 69 1F 6F 4E 23 5B A2 92 9D"

The process %original file name%.exe:2204 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "31 A9 8E 4D DE AF C4 A0 E1 91 DD 5A C5 99 5F EA"

The process %original file name%.exe:3212 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A3 68 4C 01 89 BC 8F 0B 15 C9 C7 90 2E 3A D2 F3"

The process %original file name%.exe:3692 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "65 A2 4D 80 82 04 53 33 BF C5 F5 05 6F 9C 98 D6"

The process %original file name%.exe:3360 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CA 87 96 6F D0 B1 B3 44 8C AC 5D 38 C7 63 22 55"

The process %original file name%.exe:2156 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F2 9E 7E 40 0A A6 C5 A1 2C 0A 1A 44 40 C2 AC 62"

The process %original file name%.exe:2684 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "39 81 F8 90 DC B1 D3 E8 89 36 A2 09 3F 29 82 E7"

The process %original file name%.exe:1036 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F4 F5 83 7D FD 93 E4 56 7C EF DD DE FD 3B EC 6D"

The process %original file name%.exe:3080 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D9 44 08 B7 50 98 5E A8 CF 2B A6 7F 78 59 64 BA"

The process %original file name%.exe:636 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "ED BA 58 D3 96 F1 25 39 54 E3 2D 17 0A 39 A8 7C"

The process %original file name%.exe:2812 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "11 3A 9F 99 B8 C2 85 FE 47 25 2E 17 60 13 DB DB"

The process %original file name%.exe:2628 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A1 07 4A 64 D9 B2 73 DB 81 27 31 3B DC D0 84 3B"

The process %original file name%.exe:2424 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "62 AF 08 89 A8 0E 0C 25 2A 6E 39 C1 53 9D E8 15"

The process %original file name%.exe:3876 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D2 CC 1E 26 05 83 1C 8B 62 3D 51 5A 53 A9 68 25"

The process %original file name%.exe:2180 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "57 62 80 EF A1 15 96 65 E6 19 A5 41 D3 4F 0E 1E"

The process %original file name%.exe:3520 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "85 A1 CD CA B6 9B 3E F6 34 01 4F F2 0E 2F A6 38"

The process %original file name%.exe:3724 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "7A 27 5A 3A 45 54 0D CD A2 43 1F D3 52 89 30 80"

The process %original file name%.exe:3284 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "67 34 A5 15 1B E0 36 0F 16 62 4A DE DB DD 85 6D"

The process %original file name%.exe:3280 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B7 25 6F 15 07 8E 18 03 EE 53 DF FF AB 19 FC 14"

The process %original file name%.exe:868 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "84 6B D7 A5 33 40 B7 FA E7 08 99 93 18 96 E8 21"

The process %original file name%.exe:3688 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BA 3F 75 A2 21 8D 93 64 E0 E8 4D 42 5B 6C D6 5C"

The process %original file name%.exe:3680 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "63 03 BF 8A EA DD 05 F7 76 E9 91 9A C6 77 A0 5D"

The process %original file name%.exe:1028 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "92 66 5B F4 D4 B2 26 FC B5 B1 1C 65 EC 33 C0 45"

The process %original file name%.exe:2024 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "46 D6 E3 43 82 BF 2B 0B 51 7A 4F 82 4D 68 3A 55"

The process %original file name%.exe:1672 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5C 1F 68 2C 36 1D 4D 0C D7 48 37 AF 60 27 58 07"

The process %original file name%.exe:1976 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "88 48 CC 87 A4 8B 61 DE 10 02 94 06 A4 82 EF 61"

The process %original file name%.exe:2100 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FA 38 6F 56 BA 41 B6 00 BA 32 B2 6B 73 81 2A 13"

The process %original file name%.exe:728 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A9 91 D7 99 4A C0 A3 24 A8 89 20 4B 93 24 4E 6B"

The process %original file name%.exe:604 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "70 AF 21 48 2C 51 B3 62 4B 7A 0E 03 B3 BF F6 AE"

The process %original file name%.exe:4084 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "95 AB 6B 54 C5 18 AC C6 0D 07 3C 33 F1 33 68 CA"

The process %original file name%.exe:4088 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "93 4A D5 A7 1C B9 71 22 51 1F 44 20 A4 DB 04 A2"

The process %original file name%.exe:3064 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "93 86 C6 3B A9 0E 13 0A 27 A6 A4 E7 4F 0B AF DC"

The process %original file name%.exe:2436 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "61 F5 38 99 50 F1 B9 66 06 8B B7 DF 8B 12 D4 9B"

The process %original file name%.exe:3672 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3C 2E 8D 4B 0E 93 44 E7 8D 84 D4 4B 3D 25 AE 3F"

The process %original file name%.exe:3060 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B6 5C E8 40 97 89 C2 AD D2 3C 0B 60 56 59 07 F7"

The process %original file name%.exe:3536 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B5 D4 2F A0 ED 41 48 6F 68 16 A8 F8 D8 6A 29 14"

The process %original file name%.exe:2940 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "68 D4 67 4F 6E 2B A5 C5 AE 7C 3A BB E6 A0 C6 9D"

The process %original file name%.exe:2132 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1A 53 D7 55 9F 35 3E C9 8E 2C B7 1B DD 25 99 FD"

The process %original file name%.exe:2340 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5D 42 5A 50 53 B9 0E 6E D2 00 C6 94 C4 17 60 D6"

The process %original file name%.exe:1056 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A3 80 72 D0 A6 BE 9C E5 4F 7E 76 0C B5 E0 98 3C"

The process %original file name%.exe:3344 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "36 C6 20 65 28 61 1F 46 3D 52 CB 3A BF 27 FB 40"

The process %original file name%.exe:2740 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1D 5A CE 5B 87 5B AF 9D 8E A0 BB 70 68 0F 9E 43"

The process %original file name%.exe:2704 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "7B 0D EA 8F 41 4D F9 03 4F FE E9 A3 2C DA 88 43"

The process %original file name%.exe:1756 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EC 08 D1 4F B4 8E DC FF 22 23 02 7A FF 91 9B 6C"

The process %original file name%.exe:2504 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8A 03 4D 79 AF 74 57 8F 1F 41 23 EB 37 B3 77 01"

The process %original file name%.exe:3188 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EF 4C 8B 65 46 61 33 B6 15 59 3F E0 62 14 F9 72"

The process %original file name%.exe:2648 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B8 D9 56 E5 AE B1 65 C5 9A 21 78 18 27 D4 82 4A"

The process %original file name%.exe:3916 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "32 AA 53 23 EC 2A D2 06 14 F4 44 04 36 CA 63 21"

The process %original file name%.exe:2876 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "99 D6 C9 4A 36 B9 E9 58 50 CA 71 1D 23 5A 0E AD"

The process %original file name%.exe:2640 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "17 2E 45 A4 FB 58 C3 AC 9E 0B 95 4A 93 94 A4 1E"

The process %original file name%.exe:3056 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D6 7C 53 E3 4B 87 D8 5B A8 EF 1C 6E 09 CA 07 6F"

The process %original file name%.exe:3236 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "64 27 53 BE 4D C7 6C BF 76 E5 B9 09 7D 04 CC A3"

The process %original file name%.exe:2976 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1F 8D B5 A4 C4 F6 F0 83 A7 BF 5B A5 26 9D F3 29"

The process %original file name%.exe:2536 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "85 CA 5B 28 94 4A C2 87 1B D0 D7 91 87 85 83 FB"

The process %original file name%.exe:2120 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "83 60 52 81 F8 6D 2D 34 D2 3C 62 BA 07 AB 0A 2E"

The process %original file name%.exe:2332 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "75 61 70 50 8F 7B 4A 8C 12 AE BE 84 8D 44 67 5D"

The process %original file name%.exe:3428 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EE B1 0F 81 85 3A 52 C9 63 CB 39 5E 22 11 B0 AF"

The process %original file name%.exe:2228 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "40 ED CB 5E 51 9A 67 46 3F A6 35 9B 81 3C 4D 11"

The process %original file name%.exe:2336 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2C 33 EA 35 59 DE 77 43 C8 ED 13 A9 C5 C9 7C FE"

The process %original file name%.exe:4012 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9B 92 B1 5A 39 64 01 4F 7E A6 BB BC A3 8B BC DD"

The process %original file name%.exe:3788 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "69 99 52 D9 12 0A 0A A0 6C E6 00 19 1E CA F1 91"

The process %original file name%.exe:1604 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DC DF 0D FD F8 E1 B4 A5 28 06 A5 AF B7 3B 6F 3C"

The process %original file name%.exe:3424 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6B 43 E9 D4 BF C9 C9 97 99 B7 EF 88 D1 CE 34 80"

The process %original file name%.exe:1472 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D6 EB EA DE F5 38 8C 59 CB 46 B6 94 8F 67 26 36"

The process %original file name%.exe:3988 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B9 08 13 20 B5 66 9A D4 B6 53 8D 73 7E 4E 5D 5D"

The process %original file name%.exe:3192 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BE 79 7B BE D3 F0 9A 75 7C A4 DF 93 75 7C E3 BA"

The process %original file name%.exe:3980 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "50 A0 1B 43 F6 0A 8D 28 34 12 37 9F 9E AC E5 59"

The process %original file name%.exe:804 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FF 48 83 A3 A8 C8 2C 3B 4F 18 80 7A 4F 05 51 4A"

The process reIEcoQI.exe:348 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DB 9C 78 B3 19 CE 8D 3F 8B 2E C6 55 9D 8D C0 A9"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NesIMIQs.exe" = "%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.exe"

The process NesIMIQs.exe:1524 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B3 56 60 83 A6 F7 EC 4B 39 DE 12 13 F6 3D AA 8D"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NesIMIQs.exe" = "%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.exe"

Dropped PE files

MD5 File path
36173ba1b0117fc252fe3bfdfb4da2c4 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\airplane.bmp.exe
7e21fd769c0d635d3dd8b785ec21fd6e c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\astronaut.bmp.exe
00c808d9ae46dd71c623931fae0d731d c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\ball.bmp.exe
ccf45c9308b64e46c71bcb4c4280023c c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\beach.bmp.exe
82a350398d2e78502201c1fc6770b225 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\butterfly.bmp.exe
404dcaed7582787c31fab08bef54f264 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\car.bmp.exe
3f9ac1977603777c370cdfc5838c479b c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\cat.bmp.exe
01f1968a601d6c34d07718488a97290c c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\chess.bmp.exe
1e1100c75eb13521555592938b5a2d33 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dirt bike.bmp.exe
b3ad9f48faa7871c8a970925110450b5 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dog.bmp.exe
1a5001e92e4c52f103aea970ee73f0b2 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\drip.bmp.exe
cbbc2d8cef21f9c49cca18a4f24b70f6 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\duck.bmp.exe
c420fb7b5965c67b2d34536f1394f6f7 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\fish.bmp.exe
f3a15e1606eab8be793cf8ef80808803 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\frog.bmp.exe
141588a8a8531592c26bf5e3bb47a0ed c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\guitar.bmp.exe
d5b13770bc981c942e745bf59dd422d9 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\horses.bmp.exe
80c42bd07da5c5fcf0e4af5339c14292 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\kick.bmp.exe
908059ebf3c14d0abaebba59a239edd5 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\lift-off.bmp.exe
fbd3925038ad832c7104a6885c3af40f c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\palm tree.bmp.exe
22a20287eb7feeb5e8e2322639500763 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\pink flower.bmp.exe
c52067ac43271bb2f82fd629eece871e c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\red flower.bmp.exe
1431c4f4b04ad19afd4d66b1db77c674 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\skater.bmp.exe
6377beced94934082b6b99d9574ca122 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\snowflake.bmp.exe
a96b1890cbdc87f26a17a32d5b73833c c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\adm.bmp.exe
7b15061ef6556670c4ca7c7bc5a1ab47 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\guest.bmp.exe
caf6ec7f4696753a26d07292419921e1 c:\Documents and Settings\All Users\Documents\My Music\Sample Music\Beethoven's Symphony No. 9 (Scherzo).wma.exe
d3d6c5f304e3e8a947502fc9ede0821c c:\Documents and Settings\All Users\Documents\My Music\Sample Music\New Stories (Highway Blues).wma.exe
83a709b1dc8bdeac0f2085dc73986ba3 c:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Blue hills.jpg.exe
a85fa7d3de511525a3de18f47a2b8b07 c:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Sunset.jpg.exe
c7ae4c0baa032a494b0b3bbfb6cd1319 c:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Water lilies.jpg.exe
556870943214d6cb3366f46e356cfb6c c:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Winter.jpg.exe
d4d11c55654f5879ce87b5cfe80406d4 c:\Documents and Settings\All Users\JuwEIgUE\reIEcoQI.exe
eb23fd2fbf938f7ab298224cccaea8fd c:\Documents and Settings\All Users\hcYYccwo\NesIMIQs.exe
2a4993dfbdb10a26dbd4eed392e3f1de c:\Documents and Settings\"%CurrentUserName%"\dUskcAww\fGAwoYMM.exe
a7a5aa46691f4e560814d6658298fbe6 c:\Perl\eg\IEExamples\ie_animated.gif.exe
2dbfafb6728b78c872f898cfabd5c859 c:\Perl\eg\IEExamples\psbwlogo.gif.exe
f848175b19121f2128f5da593fee4fb0 c:\Perl\eg\aspSamples\ASbanner.gif.exe
ce5649f8d663c5ea5c2bbd25a3e73182 c:\Perl\eg\aspSamples\Main_Banner.gif.exe
25409aa5841ce127de235db4652668bd c:\Perl\eg\aspSamples\psbwlogo.gif.exe
7f704823c5795a2f7dedd1d72bdb026e c:\Perl\html\images\AS_logo.gif.exe
8d4c399e15383c964f6777fbe3cb4866 c:\Perl\html\images\PerlCritic_run.png.exe
619fce4c7508cda5781d24066a0eb0bd c:\Perl\html\images\aslogo.gif.exe
601d35f04e8354c5874cc513fe1b3244 c:\Perl\html\images\ppm_gui.png.exe
088768ff997f1944d82ee5779a74ca4b c:\Perl\lib\ActivePerl\PPM\images\gecko.png.exe
67542ade23f36552a14382f590270e51 c:\Perl\lib\ActivePerl\PPM\images\perl_48x48.png.exe
cdf576fbc7d4504c6234e7a1a9ce8153 c:\Perl\lib\Devel\NYTProf\js\asc.png.exe
78276b6546855e7dc218664060138456 c:\Perl\lib\Devel\NYTProf\js\bg.png.exe
067eded966317e6aa1cb7ad6494f802f c:\Perl\lib\Devel\NYTProf\js\desc.png.exe
ee874ee11624f10a2f6fdd83d343fa89 c:\Perl\lib\Devel\NYTProf\js\jit\gradient.png.exe
e2d2dcc1c76eed1a851f8b28d410727e c:\Perl\lib\Devel\NYTProf\js\jit\gradient20.png.exe
ee524b29d2b9e282f9acfa0f11ada26b c:\Perl\lib\Devel\NYTProf\js\jit\gradient30.png.exe
07af8df2a6f93c93eea94033431c508a c:\Perl\lib\Devel\NYTProf\js\jit\gradient40.png.exe
21336bede05491139bdbd83e78edff72 c:\Perl\lib\Devel\NYTProf\js\jit\gradient50.png.exe
db05add590e89c7a74293b943d772554 c:\Perl\lib\Mozilla\CA\cacert.pem.exe
1729c4e99549bdb7e4e4d71c60562724 c:\totalcmd\TCMADMIN.EXE.exe
bc6fe2879eeffb8744a3d6813c5693ec c:\totalcmd\TCMDX32.EXE.exe
243313d70ffd01fc181a92ccafd875e7 c:\totalcmd\TCUNINST.EXE.exe
0455d210e09cd58e1ecd740e96e77d51 c:\totalcmd\TOTALCMD.EXE.exe

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

VersionInfo

No information is available.

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 4096 598016 596992 5.4183 084137082fd55d15adf6388f46c2842c
.rdata 602112 4096 512 2.30207 9e24f70605db1a34b7649236910d2995
.data 606208 160 512 1.88635 f7d555eae801fd70a6d5b8954c673985
.rsrc 610304 4444 4608 3.756 05012fcf2b51e47785872996da5be84b

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

URL IP
hxxp://google.com/ 74.125.205.138


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

Traffic

GET / HTTP/1.1
Host: google.com


HTTP/1.1 302 Found
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Location: hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=cH69VJPxGpKu8weS84LgCg
Content-Length: 262
Date: Mon, 19 Jan 2015 22:00:16 GMT
Server: GFE/2.0
Alternate-Protocol: 80:quic,p=0.02
<HTML><HEAD><meta http-equiv="content-type" content="te
xt/html;charset=utf-8">.<TITLE>302 Moved</TITLE></HE
AD><BODY>.<H1>302 Moved</H1>.The document has mov
ed.<A HREF="hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=cH69VJPxGpKu
8weS84LgCg">here</A>...</BODY></HTML>..HTTP/1.1 3
02 Found..Cache-Control: private..Content-Type: text/html; charset=UTF
-8..Location: hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=cH69VJPxGpKu8weS8
4LgCg..Content-Length: 262..Date: Mon, 19 Jan 2015 22:00:16 GMT..Serve
r: GFE/2.0..Alternate-Protocol: 80:quic,p=0.02..<HTML><HEAD&g
t;<meta http-equiv="content-type" content="text/html;charset=utf-8"
>.<TITLE>302 Moved</TITLE></HEAD><BODY>.<
;H1>302 Moved</H1>.The document has moved.<A HREF="hXXp://
VVV.google.com.ua/?gfe_rd=cr&ei=cH69VJPxGpKu8weS84LgCg">here<
;/A>...</BODY></HTML>....


GET / HTTP/1.1
Host: google.com


HTTP/1.1 302 Found
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Location: hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=1369VKmQMsOCYLKGgOgM
Content-Length: 260
Date: Mon, 19 Jan 2015 22:01:59 GMT
Server: GFE/2.0
Alternate-Protocol: 80:quic,p=0.02
<HTML><HEAD><meta http-equiv="content-type" content="te
xt/html;charset=utf-8">.<TITLE>302 Moved</TITLE></HE
AD><BODY>.<H1>302 Moved</H1>.The document has mov
ed.<A HREF="hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=1369VKmQMsOC
YLKGgOgM">here</A>...</BODY></HTML>..HTTP/1.1 302
Found..Cache-Control: private..Content-Type: text/html; charset=UTF-8
..Location: hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=1369VKmQMsOCYLKGgOg
M..Content-Length: 260..Date: Mon, 19 Jan 2015 22:01:59 GMT..Server: G
FE/2.0..Alternate-Protocol: 80:quic,p=0.02..<HTML><HEAD>&l
t;meta http-equiv="content-type" content="text/html;charset=utf-8">
.<TITLE>302 Moved</TITLE></HEAD><BODY>.<H1&
gt;302 Moved</H1>.The document has moved.<A HREF="hXXp://VVV.
google.com.ua/?gfe_rd=cr&ei=1369VKmQMsOCYLKGgOgM">here</A>
;...</BODY></HTML>....


GET / HTTP/1.1
Host: google.com


HTTP/1.1 302 Found
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Location: hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=uX69VKrfHoKu8wfdsYGQDQ
Content-Length: 262
Date: Mon, 19 Jan 2015 22:01:29 GMT
Server: GFE/2.0
Alternate-Protocol: 80:quic,p=0.02
<HTML><HEAD><meta http-equiv="content-type" content="te
xt/html;charset=utf-8">.<TITLE>302 Moved</TITLE></HE
AD><BODY>.<H1>302 Moved</H1>.The document has mov
ed.<A HREF="hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=uX69VKrfHoKu
8wfdsYGQDQ">here</A>...</BODY></HTML>..HTTP/1.1 3
02 Found..Cache-Control: private..Content-Type: text/html; charset=UTF
-8..Location: hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=uX69VKrfHoKu8wfds
YGQDQ..Content-Length: 262..Date: Mon, 19 Jan 2015 22:01:29 GMT..Serve
r: GFE/2.0..Alternate-Protocol: 80:quic,p=0.02..<HTML><HEAD&g
t;<meta http-equiv="content-type" content="text/html;charset=utf-8"
>.<TITLE>302 Moved</TITLE></HEAD><BODY>.<
;H1>302 Moved</H1>.The document has moved.<A HREF="hXXp://
VVV.google.com.ua/?gfe_rd=cr&ei=uX69VKrfHoKu8wfdsYGQDQ">here<
;/A>...</BODY></HTML>....


GET / HTTP/1.1
Host: google.com


HTTP/1.1 302 Found
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Location: hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=cH69VLnFIY2u8wfuz4LgAQ
Content-Length: 262
Date: Mon, 19 Jan 2015 22:00:16 GMT
Server: GFE/2.0
Alternate-Protocol: 80:quic,p=0.02
<HTML><HEAD><meta http-equiv="content-type" content="te
xt/html;charset=utf-8">.<TITLE>302 Moved</TITLE></HE
AD><BODY>.<H1>302 Moved</H1>.The document has mov
ed.<A HREF="hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=cH69VLnFIY2u
8wfuz4LgAQ">here</A>...</BODY></HTML>..HTTP/1.1 3
02 Found..Cache-Control: private..Content-Type: text/html; charset=UTF
-8..Location: hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=cH69VLnFIY2u8wfuz
4LgAQ..Content-Length: 262..Date: Mon, 19 Jan 2015 22:00:16 GMT..Serve
r: GFE/2.0..Alternate-Protocol: 80:quic,p=0.02..<HTML><HEAD&g
t;<meta http-equiv="content-type" content="text/html;charset=utf-8"
>.<TITLE>302 Moved</TITLE></HEAD><BODY>.<
;H1>302 Moved</H1>.The document has moved.<A HREF="hXXp://
VVV.google.com.ua/?gfe_rd=cr&ei=cH69VLnFIY2u8wfuz4LgAQ">here<
;/A>...</BODY></HTML>....


The Trojan connects to the servers at the folowing location(s):

fGAwoYMM.exe_844:

.text
`.rdata
@.data
3E.Pcq:P!V^
#%Xkq.
.JF{<
U%Sa@
('%D^q-*
?|Q%f
SE?.rn~M*
.Dhe4
E.IdJWH
%k%cn>x_
?%uRc!
%3.UGiO0
]w.LQ
I 4keyy
L%C['
7.BLP
;.StH 
>.Qlx #6
Microsoft Windows
P.yrBX.
PB]%C
%FoS(
F<.cS
advapi32.dll
GetProcessHeap
kernel32.dll

fGAwoYMM.exe_844_rwx_00401000_00069000:

3E.Pcq:P!V^
#%Xkq.
.JF{<
U%Sa@
('%D^q-*
?|Q%f
SE?.rn~M*
.Dhe4
E.IdJWH
%k%cn>x_
?%uRc!
%3.UGiO0
]w.LQ
I 4keyy
L%C['
7.BLP
;.StH 
>.Qlx #6
Microsoft Windows
P.yrBX.
PB]%C
%FoS(
F<.cS

fGAwoYMM.exe_844_rwx_00900000_00068000:

3E.Pcq:P!V^
#%Xkq.
.JF{<
U%Sa@
('%D^q-*
?|Q%f
SE?.rn~M*
.Dhe4
E.IdJWH
%k%cn>x_
?%uRc!
%3.UGiO0
]w.LQ
I 4keyy
L%C['
7.BLP
;.StH 
>.Qlx #6
$g.Gd
P.yrBX.
PB]%C
%FoS(
F<.cS

fGAwoYMM.exe_844_rwx_00980000_00001000:

C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp

NesIMIQs.exe_1524:

.text
`.rdata
@.data
3E.Pcq:P!V^
#%Xkq.
.JF{<
U%Sa@
('%D^q-*
?|Q%f
SE?.rn~M*
.Dhe4
E.IdJWH
%k%cn>x_
?%uRc!
%3.UGiO0
]w.LQ
I 4keyy
L%C['
7.BLP
>.Qlx #6
Microsoft Windows
kernel32.dll
advapi32.dll
oleaut32.dll
user32.dll

fGAwoYMM.exe_844_rwx_00BC0000_00001000:

%Documents and Settings%\%current user%\dUskcAww\fGAwoYMM

fGAwoYMM.exe_844_rwx_00BD0000_00001000:

%Documents and Settings%\All Users\hcYYccwo\NesIMIQs

fGAwoYMM.exe_844_rwx_00BE0000_00001000:

%Documents and Settings%\%current user%\dUskcAww\fGAwoYMM.inf

fGAwoYMM.exe_844_rwx_00BF0000_00001000:

%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.inf

fGAwoYMM.exe_844_rwx_00C00000_00001000:

%Documents and Settings%\%current user%\dUskcAww\fGAwoYMM.exe

fGAwoYMM.exe_844_rwx_00C10000_00001000:

%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.exe

fGAwoYMM.exe_844_rwx_00C40000_00001000:

fGAwoYMM.exe

fGAwoYMM.exe_844_rwx_00C50000_00001000:

NesIMIQs.exe

reIEcoQI.exe_348:

.text
`.rdata
@.data
3E.Pcq:P!V^
#%Xkq.
.JF{<
U%Sa@
('%D^q-*
?|Q%f
SE?.rn~M*
.Dhe4
E.IdJWH
%k%cn>x_
?%uRc!
%3.UGiO0
]w.LQ
I 4keyy
L%C['
7.BLP
;.StH 
>.Qlx #6
2software\microsoft\windows\currentversion\run
P.yrBX.
PB]%C
%FoS(
F<.cS
GetCPInfoExW
GetProcessHeap
kernel32.dll
user32.dll

fGAwoYMM.exe_844_rwx_00C60000_00001000:

taskkill /FI "USERNAME eq adm" /F /IM fGAwoYMM.exe

fGAwoYMM.exe_844_rwx_00C70000_00001000:

taskkill /FI "USERNAME eq adm" /F /IM NesIMIQs.exe

fGAwoYMM.exe_844_rwx_00C80000_00001000:

%Documents and Settings%\All Users\JuwEIgUE\reIEcoQI.exe

fGAwoYMM.exe_844_rwx_00C90000_00001000:

%Documents and Settings%\All Users\KAAo.txt

fGAwoYMM.exe_844_rwx_00CA0000_00001000:

notepad.exe "%Documents and Settings%\All Users\KAAo.txt"

fGAwoYMM.exe_844_rwx_00CB0000_00001000:

%Documents and Settings%\All Users\JuwEIgUE

NesIMIQs.exe_1524_rwx_00401000_00069000:

3E.Pcq:P!V^
#%Xkq.
.JF{<
U%Sa@
('%D^q-*
?|Q%f
SE?.rn~M*
.Dhe4
E.IdJWH
%k%cn>x_
?%uRc!
%3.UGiO0
]w.LQ
I 4keyy
L%C['
7.BLP
>.Qlx #6
Microsoft Windows

NesIMIQs.exe_1524_rwx_00900000_00068000:

3E.Pcq:P!V^
#%Xkq.
.JF{<
U%Sa@
('%D^q-*
?|Q%f
SE?.rn~M*
.Dhe4
E.IdJWH
%k%cn>x_
?%uRc!
%3.UGiO0
]w.LQ
I 4keyy
L%C['
7.BLP
;.StH 
>.Qlx #6
$g.Gd
P.yrBX.
PB]%C
%FoS(
F<.cS

NesIMIQs.exe_1524_rwx_00980000_00001000:

C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp

NesIMIQs.exe_1524_rwx_00BC0000_00001000:

%Documents and Settings%\%current user%\dUskcAww\fGAwoYMM

NesIMIQs.exe_1524_rwx_00BD0000_00001000:

%Documents and Settings%\All Users\hcYYccwo\NesIMIQs

NesIMIQs.exe_1524_rwx_00BE0000_00001000:

%Documents and Settings%\%current user%\dUskcAww\fGAwoYMM.inf

NesIMIQs.exe_1524_rwx_00BF0000_00001000:

%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.inf

NesIMIQs.exe_1524_rwx_00C00000_00001000:

%Documents and Settings%\%current user%\dUskcAww\fGAwoYMM.exe

NesIMIQs.exe_1524_rwx_00C10000_00001000:

%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.exe

NesIMIQs.exe_1524_rwx_00C40000_00001000:

fGAwoYMM.exe

NesIMIQs.exe_1524_rwx_00C50000_00001000:

NesIMIQs.exe

NesIMIQs.exe_1524_rwx_00C60000_00001000:

taskkill /FI "USERNAME eq adm" /F /IM fGAwoYMM.exe

NesIMIQs.exe_1524_rwx_00C70000_00001000:

taskkill /FI "USERNAME eq adm" /F /IM NesIMIQs.exe

NesIMIQs.exe_1524_rwx_00C80000_00001000:

%Documents and Settings%\All Users\JuwEIgUE\reIEcoQI.exe

NesIMIQs.exe_1524_rwx_00C90000_00001000:

%Documents and Settings%\All Users\KAAo.txt

NesIMIQs.exe_1524_rwx_00CA0000_00001000:

notepad.exe "%Documents and Settings%\All Users\KAAo.txt"

NesIMIQs.exe_1524_rwx_00CB0000_00001000:

%Documents and Settings%\All Users\JuwEIgUE

NesIMIQs.exe_1524_rwx_01100000_02300000:

kernel32.dll
user32.dll
==ay.yfbs
%SHq|>
,#EXEJ
x%uiL0$
jz.hS
N(%DS
pE%4U
L4H.HW
lR.ao
4.jIV
-;<%c
,,.bWIP>5
.bSHP>
B%C!(
U2&3.pg
$m.ReAm
%x5?0
w5%c>
:.GuK>R
:.HuK<R
:.euK?R
:.buK<R
:.buK>R
:.huK?R
:.TuK?R
%uK?R
E>55G%d
%s^K5
{jKW5%F?
%.xuK<R
%.xuK>R
W5%f>
7d%U<
%.tuK?R
%.fuK<R
%.auK>R
%uK>R
%.muK<R
%.luK>R
%.ouK>R
%.ouK R
%.WuK<R
%.SuK<R
EI5%S~
w4%c>
%.puK<R
%.puK>R
%x5HB
Å"Z
{jKW5%f
Å"Z
_5.qO
5u\f%d:c
%X5Hb
%X5HU
%X5H/
%X5Hi
%XuHp
'S,N%S
%X5H8
%X5Ha
Z^%UZ
5%D^Ku
Å"Z^
;H%S2
3.Spj9
%C=|k
%C.|k
R>%S3oD
3o5%u
Ä|k
3r.DTj
3O5%u
3.Sv\&
3.Spj!
Ku<%Dul
Z~.MZ
lZ~%dZ
3.Spj)
3.Spk6
3.Spk.
Ä|KP
%x6hv
%X6HI
%s^K52
3.Sr\&
#9.dR_
jQ6.Bj}
[6WU%D
3.Sp|'
VURl>
s.SRZ>
x%ST91

NesIMIQs.exe_1524_rwx_03900000_01E00000:

.text
`.rdata
@.data
.rsrc
@.reloc
u%Uh`
QSSSh
QVSSh
t.PSh
T$lRSSh| "
UDPQRh
L$ QSSh
L$,QSSh
QSSShlVU
RVSShlVU
t.Ph\
tGHt.Ht&
operand of unlimited repeat could match the empty string
POSIX named classes are supported only within a class
erroffset passed as NULL
POSIX collating elements are not supported
this version of PCRE is not compiled with PCRE_UTF8 support
PCRE does not support \L, \l, \N{name}, \U, or \u
support for \P, \p, and \X has not been compiled
this version of PCRE is not compiled with PCRE_UCP support
\N is not supported in a class
inflate 1.2.5 Copyright 1995-2010 Mark Adler
Please contact the application's support team for more information.
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
operator
GetProcessWindowStation
USER32.DLL
RtlRunOnceExecuteOnce
advapi32_hack::try_hack: bad PE passed
advapi32_hack::try_hack: cannot read import table
advapi32_hack::try_hack: cannot find section .text
.data
advapi32_hack::try_hack: cannot find section .data
advapi32_hack::try_hack: cannot read section .text
Cannot read module %s, error %d
Cannot read exports of %s, error %d
advapi32_hack::try_hack: cannot read exports, error %d
.apiset
Bad .apiset catalog - don`t fit in section
String in cat item %d not in section
Value in cat item %d not in section
Bad referred in cat item %d
Double mapped value in cat item %d not in section
Bad double referred in cat item %d
BaseSrvRegisterWowExec
BaseSrvGetProcessShutdownParam
BaseSrvSetProcessShutdownParam
basesrv.dll
Unknown size of BaseServerApiDispatchTable: %d
ServerDll[%d] %p
csrsrv.dll
CsrExecServerThread
ServerDll[%d]:
ApiDispatchTable: %p %s
ConnectRoutine: %p %s
DisconnectRoutine: %p %s
HardErrorRoutine: %p %s
AddProcessRoutine: %p %s
ShutdownProcessRoutine: %p %s
Cannot open dir %S, error %d
clean_old_drvs: error %d on deleting file %S
Cannot find resource %X
Cannot load resource %X
Resource %d has zero length
Cannot lock resource %X
Cannot unpack resource %X
Cannot create file %S, error %d
1.2.5
Decompress buffer %d bytes too small
DxDvpWaitForVideoPortSync
DxDvpUpdateVideoPort
DxDvpGetVideoPortConnectInfo
DxDvpGetVideoPortOutputFormats
DxDvpGetVideoPortLine
DxDvpGetVideoPortInputFormats
DxDvpGetVideoPortFlipStatus
DxDvpGetVideoPortField
DxDvpGetVideoPortBandwidth
DxDvpFlipVideoPort
DxDvpDestroyVideoPort
DxDvpCreateVideoPort
DxDvpCanCreateVideoPort
DxDdSetColorKey
Cannot read gaDxgFuncs handlers, readed %X bytes
.rdata
Cannot read DxgCoreInterface handlers, readed %X bytes
Unknown acpi table version: %X
SBP2PORT_Mask
STORMINIPORT_Mask
STORPORT_Mask
TCPIP6_Mask
WSOCKTRANSPORT_Mask
FCPORT_Mask
SOFTPCI_Mask
TCPIP_Mask
SCSIMINIPORT_Mask
SCSIPORT_Mask
Unknown KdComponentTableSize size %X
dump_kd_masks return %X bytes, error %d, ntstatus %X
dump_kd_masks return %X bytes, error %d
dump_kd_masks(%s) return %X bytes, error %d, ntstatus %X
dump_kd_masks(%s) return %X bytes, error %d
%-*s: %X
read_kopts_length(%s) return %X bytes, error %d, ntstatus %X
read_kopts_length(%s) return %X bytes, error %d
Cannot alloc %X bytes
Cannot realloc %X bytes for %s
read_kopts(%s) return %X bytes, error %d, ntstatus %X
read_kopts(%s) return %X bytes, error %d
%S (%s): %X
%S (%s):
dump_kopts(%s) return %X bytes, error %d, ntstatus %X
dump_kopts(%s) return %X bytes, error %d
MmSupportWriteWatch
KiPassiveWatchdogTimeout
ViImageExecutionOptions
DbgkErrorPortStartTimeout
DbgkErrorPortCommTimeout
MmDisablePagingExecutive
CmDefaultLanguageId
DbgkpMaxModuleMsgs
IoCountOperations
KeDelayExecutionThread
resolve_IoFreeIrp: bad addr of %s
get_interrupt_dispatch: cannot alloc %d bytes
Unknown kernel options: %S
PsGetProcessWin32WindowStation
KeIsExecutingDpc
bad addr of KeIsExecutingDpc
Bad pnp handler item %d (%d)
Cannot find %s
ks.sys: cannot get KoCreateInstance
ImportContext
ExportContext
SpChangeAccountPasswordFn
CallPackagePassthrough
%SystemRoot%\System32\
GetServiceAccountPassword
DPAPIPasswordChangeForGMSA
GetCredentialKey
INotifyPasswordChanged
%s PolicyChangeNotificationCallbacks
PolicyChangeNotificationCallback[%d]: %d items
[%d] %p %p %p %p %s
lsasrv_hack::try_hack: bad PE passed
lsasrv_hack::try_hack: cannot find section .data
lsasrv_hack::try_hack: cannot read section .data
lsasrv_hack::try_hack: bad section passed
lsasrv_hack::try_hack: cannot read exports, error %d
LsaICallPackagePassthrough
lsasrv.dll
VaultLogonSessionNotification: %p %s
Start of driver %S failed !
WSPJoinLeaf
MSAFD_WSPSendMsg
MSAFD_WSPRecvMsg
mswsock.dll
CheckProc: cannot open process PID %d, error %d, ntstatus %X
CheckProc: cannot open process PID %d, error %d
threaded_processes_checker exception occured, error %X
MyWindowsChecker: len %d, kernel name %s
Cannot get kernel name, error %d
Kill process %d
Check processes in %d threads
Cannot find process %d
Usage: %S [options]
-wmi - report about WMI entries
-uem - check for Unknown Executable Memory
-npo - dump RPC Named Pipes Owner
-rdata - check .rdata sections too
-rpc - report about RPC interfaces
DeriveKey
NotifyChangeKey
EnumKeys
IsAlgSupported
FreeKey
DeleteKey
FinalizeKey
SetKeyProperty
CreatePersistedKey
OpenKey
OpenPrivateKey
ImportKey
ImportMasterKey
GetKeyProperty
GenerateSessionKeys
GenerateMasterKey
ExportKey
CreateEphemeralKey
ComputeEapKeyBlock
ncrypt_hack::check_in_proc: cannot alloc %d bytes
GetKeyStorageInterface
Cannot load %s (copy of %s), error %d
Cannot load module %s, error %d
Cannot read module %s import table
NdisMRegisterMiniportDriver
resolve_minidrivers_list: bad addr of NdisMRegisterMiniportDriver
NdisMRegisterMiniport
resolve_minidrivers_list: cannot find NdisMRegisterMiniport
resolve_minidrivers_list: bad addr of NdisMRegisterMiniport
resolve_miniports_list: cannot find NdisIMInitializeDeviceInstanceEx
resolve_miniports_list: bad addr of NdisIMInitializeDeviceInstanceEx
OID_CO_TAPI_DONT_REPORT_DIGITS
OID_CO_TAPI_REPORT_DIGITS
OID_QOS_OPERATIONAL_PARAMETERS
OID_TCP_TASK_IPSEC_OFFLOAD_V2_ADD_SA_EX
OID_TCP_TASK_IPSEC_OFFLOAD_V2_UPDATE_SA
OID_TCP_TASK_IPSEC_OFFLOAD_V2_DELETE_SA
OID_TCP_TASK_IPSEC_OFFLOAD_V2_ADD_SA
OID_TCP_CONNECTION_OFFLOAD_PARAMETERS
OID_FFP_SUPPORT
OID_TCP_CONNECTION_OFFLOAD_HARDWARE_CAPABILITIES
OID_TCP_CONNECTION_OFFLOAD_CURRENT_CONFIG
OID_TCP_OFFLOAD_HARDWARE_CAPABILITIES
OID_TCP_OFFLOAD_PARAMETERS
OID_TCP_OFFLOAD_CURRENT_CONFIG
OID_TCP6_OFFLOAD_STATS
OID_TCP4_OFFLOAD_STATS
OID_TCP_TASK_IPSEC_DELETE_UDPESP_SA
OID_TCP_TASK_IPSEC_ADD_UDPESP_SA
OID_TCP_SAN_SUPPORT
OID_TCP_TASK_IPSEC_DELETE_SA
OID_TCP_TASK_IPSEC_ADD_SA
OID_TCP_TASK_OFFLOAD
OID_DOT11_SUPPORTED_DSSS_CHANNEL_LIST
OID_DOT11_SUPPORTED_OFDM_FREQUENCY_LIST
OID_DOT11_QOS_TX_QUEUES_SUPPORTED
OID_DOT11_AP_JOIN_REQUEST
OID_DOT11_HR_CCA_MODE_SUPPORTED
OID_DOT11_FREQUENCY_BANDS_SUPPORTED
OID_DOT11_SUPPORTED_DATA_RATES_VALUE
OID_DOT11_SUPPORTED_RX_ANTENNA
OID_DOT11_SUPPORTED_TX_ANTENNA
OID_DOT11_REG_DOMAINS_SUPPORT_VALUE
OID_DOT11_CCA_MODE_SUPPORTED
OID_DOT11_SUPPORTED_POWER_LEVELS
OID_DOT11_DIVERSITY_SUPPORT
OID_DOT11_SUPPORTED_PHY_TYPES
OID_DOT11_OPERATIONAL_RATE_SET
OID_DOT11_JOIN_REQUEST
OID_DOT11_CURRENT_OPERATION_MODE
OID_DOT11_OPERATION_MODE_CAPABILITY
OID_802_11_SUPPORTED_RATES
OID_802_11_NETWORK_TYPES_SUPPORTED
OID_802_11_REMOVE_KEY
OID_802_11_ADD_KEY
OID_IRDA_SUPPORTED_SPEEDS
OID_ATM_SUPPORTED_AAL_TYPES
OID_ATM_SUPPORTED_SERVICE_CATEGORY
OID_ATM_SUPPORTED_VC_RATES
OID_FDDI_PORT_ACTION
OID_FDDI_PORT_HARDWARE_PRESENT
OID_FDDI_PORT_LER_FLAG
OID_FDDI_PORT_PC_WITHHOLD
OID_FDDI_PORT_PCM_STATE
OID_FDDI_PORT_CONNNECT_STATE
OID_FDDI_PORT_LER_ALARM
OID_FDDI_PORT_LER_CUTOFF
OID_FDDI_PORT_LEM_CT
OID_FDDI_PORT_LEM_REJECT_CT
OID_FDDI_PORT_LER_ESTIMATE
OID_FDDI_PORT_LCT_FAIL_CT
OID_FDDI_PORT_EB_ERROR_CT
OID_FDDI_PORT_PC_LS
OID_FDDI_PORT_BS_FLAG
OID_FDDI_PORT_MAINT_LS
OID_FDDI_PORT_INDEX
OID_FDDI_PORT_CONNECTION_CAPABILITIES
OID_FDDI_PORT_PMD_CLASS
OID_FDDI_PORT_MAC_LOOP_TIME
OID_FDDI_PORT_AVAILABLE_PATHS
OID_FDDI_PORT_MAC_PLACEMENT
OID_FDDI_PORT_REQUESTED_PATHS
OID_FDDI_PORT_CURRENT_PATH
OID_FDDI_PORT_MAC_INDICATED
OID_FDDI_PORT_CONNECTION_POLICIES
OID_FDDI_PORT_NEIGHBOR_TYPE
OID_FDDI_PORT_MY_TYPE
OID_FDDI_MAC_DOWNSTREAM_PORT_TYPE
OID_FDDI_SMT_MSG_TIME_STAMP
OID_FDDI_SMT_BYPASS_PRESENT
OID_FDDI_SMT_MAC_INDEXES
OID_FDDI_SMT_PORT_INDEXES
OID_TCP_RSC_STATISTICS
OID_SWITCH_PORT_UPDATED
OID_GEN_OPERATIONAL_STATUS
OID_SWITCH_PORT_TEARDOWN
OID_SWITCH_PORT_FEATURE_STATUS_QUERY
OID_SWITCH_PORT_DELETE
OID_SWITCH_PORT_CREATE
OID_SWITCH_PORT_ARRAY
OID_SWITCH_PORT_PROPERTY_ENUM
OID_SWITCH_PORT_PROPERTY_DELETE
OID_SWITCH_PORT_PROPERTY_UPDATE
OID_SWITCH_PORT_PROPERTY_ADD
OID_NIC_SWITCH_DELETE_VPORT
OID_NIC_SWITCH_ENUM_VPORTS
OID_NIC_SWITCH_VPORT_PARAMETERS
OID_NIC_SWITCH_CREATE_VPORT
OID_GEN_MINIPORT_RESTART_ATTRIBUTES
OID_GEN_PORT_AUTHENTICATION_PARAMETERS
OID_GEN_PORT_STATE
OID_GEN_ENUMERATE_PORTS
OID_GEN_TRANSPORT_HEADER_OFFSET
OID_GEN_SUPPORTED_GUIDS
OID_GEN_MEDIA_SUPPORTED
OID_GEN_SUPPORTED_LIST
Cannot read gWfpGlobal, readed %X bytes
Cannot read Wfp callout count, readed %X bytes
Cannot read Wfp callouts, readed %X bytes
Cannot read WFP index functions, readed %X bytes
iphlpapi.dll
%SystemRoot%\System32\iphlpapi.dll
AllocateAndGetTcpExTableFromStack
AllocateAndGetUdpExTableFromStack
GetExtendedTcpTable
GetExtendedUdpTable
Failed to snapshot TCP endpoints, error %d
Failed to snapshot UDP endpoints, error %d
Cannot alloc %d bytes for UDP extended table
Cannot alloc %d bytes for TCP extended table
ntdll_hack::try_hack: bad PE passed
ntdll_hack::try_hack: cannot find section .text
ntdll_hack::try_hack: cannot read section .text
ntdll_hack::try_hack: bad section passed
ntdll_hack::try_hack: cannot read exports, error %d
%s channel hooks:
ChannelHook[%d]: %p (%p - %s) %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
ChannelHook[%d]: %p (%p) %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
MallocSpy: %p vtbl %p - %s
webclient
msiexec32
msiexec
tftp
ftp32
cmd32
ccmexec32
ccmexec
chrome
opera
firefox
Process PID %d raise dwwin PID %d
Cannot alloc new process PID %d %S
Cannot open svchost process PID %d, error %d
proc_list::read: CreateToolhelp32Snapshot failed with error %d
PID %d Parent PID %d service {%S} %S
PID %d Parent PID %d %S
PID %d Parent PID %d kind {%S} %S
read_service_exe_name(%S): cannot expand string %S
ExWindowStationOpenProcedureCallout
ExWindowStationParseProcedureCallout
ExWindowStationDeleteProcedureCallout
ExWindowStationCloseProcedureCallout
ExWindowStationOkToCloseProcedureCallout
read_w8_callout failed, len %d, returned %d bytes, error %d, ntstatus %X
read_w8_callout failed, len %d, returned %d bytes, error %d
PsWin32CallBack: %p %p %s
check_callouts: cannot alloc %X bytes (size %d)
check_callouts failed, error %d, status %X
check_callouts failed, error %d
Callouts (%d):
%s: %p %s
ark_check_callbacks: cannot read size of callbacks list, error %d, ntstatus %X
ark_check_callbacks: cannot read size of callbacks list, error %d
ark_check_callbacks: cannot read %d bytes (readed %d), error %d, ntstatus %X
ark_check_callbacks: cannot read %d bytes (readed %d), error %d
CB: %S, total %X:
%p (%s)
check_shutdown_callbacks: cannot read size of callbacks list, error %d, ntstatus %X
check_shutdown_callbacks: cannot read size of callbacks list, error %d
check_shutdown_callbacks: cannot read callbacks list of %s, error %d, ntstatus %X
check_shutdown_callbacks: cannot read callbacks list of %s, error %d
%s - %d:
FastIoUnlockAllByKey
MJ_CREATE_NAMED_PIPE
%s!%s.%s patched by %s, addr %p
%s!%s[%d] patched by %s, addr %p
Cannot open driver dumpfile %s, error %d
Cannot open kernel dumpfile %s, error %d
Cannot read driver %s, error %d
hal.dll
Shadow SDT: %p, limit %X
win32k.sys
Cannot relocate section %s.%s
Cannot alloc %X bytes for reading driver section %s.%s
Driver %s!%s has %X patched bytes !
.orig
.kmem
Cannot read driver section %s.%s (flags %X) at %p size %X readed %X, error %d, ntstatus %X
Cannot read driver section %s.%s (flags %X) at %p size %X readed %X, error %d
Cannot read kernel %s, error %d
ntoskrnl.exe
Cannot alloc %X bytes for reading kernel sections
Cannot relocate section %s
KernelSection %s rva %X, size %X, 0x%X relocs has 0x%X patched bytes !
Cannot read (whole) section %s (flags %X) at %p size %X (readed %X), error %d
\SystemRoot\system32\hal.dll
\SystemRoot\system32\halapic.dll
\SystemRoot\system32\halmps.dll
\SystemRoot\system32\halacpi.dll
\SystemRoot\system32\halaacpi.dll
\SystemRoot\system32\halmacpi.dll
%SystemRoot%\System32\hal.dll
halapic.dll
halmps.dll
halacpi.dll
halaacpi.dll
halmacpi.dll
Driver %S DrvObj %p:
DriverUnload patched by %s, addr %p
DriverStartIo patched by %s, addr %p
AddDevice patched by %s, addr %p
Handler %s patched by %s, addr %p
Handler %s patched, addr %p
Handler %d patched by %s, addr %p
Handler %d patched, addr %p
FastIOHandler %s patched by %s, addr %p
FastIOHandler %s patched, addr %p
FastIOHandler %d patched by %s, addr %p
FastIOHandler %d patched, addr %p
FS_FILTER_CALLBACKS %s patched by %s, addr %p
FS_FILTER_CALLBACKS %s patched, addr %p
FS_FILTER_CALLBACKS %d patched by %s, addr %p
FS_FILTER_CALLBACKS %d patched, addr %p
StartIo patched by %s, addr %p
read_fsmjxxx(%S): cannot make full driver name
read_fsmjxxx(%S) failed, error %d, ntstatus %X
read_fsmjxxx(%S) failed, error %d
read_mjxxx(%s): cannot make full driver name
read_mjxxx(%S) failed, error %d, ntstatus %X
read_mjxxx(%S) failed, error %d
Cannot alloc %X bytes for driver %s EAT checking
read_driver_eat %s failed, error %d, status %X
read_driver_eat %s failed, error %d
Export addr %s.%s patched by %s !
Export addr %s.%s patched !
Export addr %s.%d patched by %s !
Export addr %s.%d patched!
\hal.dll
\SystemRoot\system32\drivers\ndis.sys
ndis.sys
drivers\ndis.sys
\SystemRoot\system32\DRIVERS\tdi.sys
tdi.sys
drivers\tdi.sys
\SystemRoot\system32\DRIVERS\tcpip.sys
tcpip.sys
drivers\tcpip.sys
\SystemRoot\system32\DRIVERS\netio.sys
netio.sys
drivers\netio.sys
\SystemRoot\system32\DRIVERS\fltmgr.sys
fltmgr.sys
drivers\fltmgr.sys
\SystemRoot\system32\DRIVERS\ks.sys
ks.sys
drivers\ks.sys
\SystemRoot\system32\DRIVERS\dxg.sys
drivers\dxg.sys
\SystemRoot\system32\DRIVERS\dxgkrnl.sys
drivers\dxgkrnl.sys
\SystemRoot\system32\DRIVERS\watchdog.sys
drivers\watchdog.sys
\SystemRoot\system32\DRIVERS\ksecdd.sys
ksecdd.sys
drivers\ksecdd.sys
\SystemRoot\System32\Drivers\Ntfs.sys
ntfs.sys
\SystemRoot\system32\CLFS.SYS
CLFS.SYS
\SystemRoot\system32\drivers\ataport.sys
ataport.sys
\SystemRoot\system32\drivers\atapi.sys
atapi.sys
\SystemRoot\system32\drivers\peauth.sys
peauth.sys
\SystemRoot\system32\drivers\WDFLDR.sys
WDFLDR.sys
\SystemRoot\system32\drivers\usbstor.sys
usbstor.sys
\SystemRoot\system32\drivers\usbd.sys
usbd.sys
\SystemRoot\system32\drivers\USBPORT.sys
USBPORT.sys
\SystemRoot\system32\drivers\usbohci.sys
usbohci.sys
\SystemRoot\system32\drivers\usbehci.sys
usbehci.sys
\SystemRoot\system32\drivers\usbhub.sys
usbhub.sys
\SystemRoot\system32\drivers\usbccgp.sys
usbccgp.sys
\SystemRoot\system32\drivers\discache.sys
discache.sys
\SystemRoot\system32\drivers\termdd.sys
termdd.sys
\SystemRoot\system32\drivers\rdppr.sys
rdppr.sys
\SystemRoot\system32\drivers\mssmbios.sys
mssmbios.sys
\SystemRoot\system32\drivers\1394BUS.SYS
1394BUS.SYS
\SystemRoot\system32\drivers\BATTC.SYS
BATTC.SYS
\SystemRoot\system32\drivers\bthport.sys
bthport.sys
\SystemRoot\system32\drivers\drmk.sys
drmk.sys
\SystemRoot\system32\drivers\HIDPARSE.SYS
HIDPARSE.SYS
\SystemRoot\system32\drivers\HIDCLASS.SYS
HIDCLASS.SYS
\SystemRoot\system32\drivers\msiscsi.sys
msiscsi.sys
\SystemRoot\system32\drivers\PCIIDEX.SYS
PCIIDEX.SYS
\SystemRoot\system32\drivers\portcls.sys
portcls.sys
\SystemRoot\system32\drivers\smsmdm.sys
smsmdm.sys
\SystemRoot\system32\drivers\STREAM.SYS
STREAM.SYS
\SystemRoot\system32\drivers\vga.sys
vga.sys
\SystemRoot\system32\drivers\VIDEOPRT.SYS
VIDEOPRT.SYS
\SystemRoot\system32\drivers\vmstorfl.sys
vmstorfl.sys
\SystemRoot\system32\drivers\Dxapi.sys
Dxapi.sys
\SystemRoot\system32\drivers\dxgthk.sys
dxgthk.sys
\SystemRoot\system32\drivers\dxgmms1.sys
dxgmms1.sys
\SystemRoot\system32\drivers\spsys.sys
spsys.sys
\SystemRoot\system32\drivers\winhv.sys
winhv.sys
\SystemRoot\system32\drivers\HdAudio.sys
HdAudio.sys
\SystemRoot\System32\cdd.dll
cdd.dll
\SystemRoot\System32\ATMFD.DLL
ATMFD.DLL
\SystemRoot\System32\RDPDD.dll
RDPDD.dll
\SystemRoot\system32\drivers\vwifibus.sys
vwifibus.sys
\SystemRoot\system32\drivers\nwifi.sys
nwifi.sys
\SystemRoot\system32\drivers\vwififlt.sys
vwififlt.sys
\SystemRoot\system32\drivers\wfplwf.sys
wfplwf.sys
\SystemRoot\system32\drivers\wfplwfs.sys
wfplwfs.sys
\SystemRoot\system32\drivers\tmtdi.sys
tmtdi.sys
\SystemRoot\system32\drivers\netvsc60.sys
netvsc60.sys
\SystemRoot\system32\drivers\mslldp.sys
mslldp.sys
\SystemRoot\system32\drivers\netvsc63.sys
netvsc63.sys
\SystemRoot\system32\drivers\ndiscap.sys
ndiscap.sys
\SystemRoot\system32\drivers\agilevpn.sys
agilevpn.sys
\SystemRoot\system32\drivers\asyncmac.sys
asyncmac.sys
\SystemRoot\system32\drivers\mpsdrv.sys
mpsdrv.sys
\SystemRoot\system32\drivers\rspndr.sys
rspndr.sys
\SystemRoot\system32\drivers\ndisuio.sys
ndisuio.sys
\SystemRoot\system32\drivers\lltdio.sys
lltdio.sys
\SystemRoot\system32\drivers\NDProxy.sys
NDProxy.sys
\SystemRoot\system32\drivers\raspppoe.sys
raspppoe.sys
\SystemRoot\system32\drivers\ndiswan.sys
ndiswan.sys
\SystemRoot\system32\drivers\wanarp.sys
wanarp.sys
\SystemRoot\system32\drivers\bthpan.sys
bthpan.sys
\SystemRoot\system32\drivers\rassstp.sys
rassstp.sys
\SystemRoot\system32\drivers\raspptp.sys
raspptp.sys
\SystemRoot\system32\drivers\rasl2tp.sys
rasl2tp.sys
\SystemRoot\system32\drivers\rasacd.sys
rasacd.sys
\SystemRoot\system32\drivers\tunnel.sys
tunnel.sys
\SystemRoot\system32\drivers\tunmp.sys
tunmp.sys
\SystemRoot\system32\drivers\pacer.sys
pacer.sys
\SystemRoot\system32\drivers\NDISTAPI.SYS
NDISTAPI.SYS
\SystemRoot\system32\drivers\msgpc.sys
msgpc.sys
\SystemRoot\system32\drivers\partmgr.sys
partmgr.sys
\SystemRoot\system32\drivers\volmgr.sys
volmgr.sys
\SystemRoot\system32\drivers\volmgrx.sys
volmgrx.sys
\SystemRoot\system32\drivers\mountmgr.sys
mountmgr.sys
\SystemRoot\system32\drivers\iaStor.sys
iaStor.sys
\SystemRoot\system32\drivers\volsnap.sys
volsnap.sys
\SystemRoot\system32\drivers\ACPI.sys
acpi.sys
\SystemRoot\System32\Drivers\WppRecorder.sys
WppRecorder.sys
\SystemRoot\System32\Drivers\Mouclass.sys
Mouclass.sys
\SystemRoot\System32\Drivers\kbdclass.sys
kbdclass.sys
\SystemRoot\System32\Drivers\Fastfat.SYS
Fastfat.sys
\SystemRoot\System32\Drivers\bowser.sys
bowser.sys
\SystemRoot\System32\Drivers\rdbss.sys
rdbss.sys
\SystemRoot\System32\Drivers\msfs.sys
msfs.sys
\SystemRoot\System32\Drivers\NetBIOS.sys
NetBIOS.sys
\SystemRoot\System32\Drivers\mup.sys
mup.sys
\SystemRoot\System32\Drivers\dfs.sys
dfs.sys
\SystemRoot\System32\Drivers\dfsc.sys
dfsc.sys
\SystemRoot\System32\Drivers\npfs.SYS
npfs.sys
\SystemRoot\System32\Drivers\luafv.SYS
luafv.sys
\SystemRoot\System32\Drivers\MRxSmb.SYS
MRxSmb.sys
\SystemRoot\System32\Drivers\MRxSmb10.SYS
MRxSmb10.sys
\SystemRoot\System32\Drivers\MRxSmb20.SYS
MRxSmb20.sys
\SystemRoot\System32\Drivers\MRxDAV.SYS
MRxDAV.sys
\SystemRoot\system32\Drivers\fltmgr.sys
\SystemRoot\system32\Drivers\TDI.SYS
\SystemRoot\system32\Drivers\tdx.sys
\SystemRoot\system32\Drivers\ipfltdrv.sys
\SystemRoot\system32\Drivers\tcpip.sys
\SystemRoot\System32\drivers\afd.sys
afd.sys
\SystemRoot\System32\drivers\netbt.sys
\SystemRoot\System32\drivers\NETIO.sys
\SystemRoot\System32\drivers\srv.sys
srv.sys
\SystemRoot\System32\drivers\srv2.sys
srv2.sys
\SystemRoot\System32\drivers\srvnet.sys
\SystemRoot\System32\drivers\sr.sys
sr.sys
\SystemRoot\System32\win32k.sys
\SystemRoot\System32\drivers\http.sys
http.sys
\SystemRoot\System32\drivers\fwpkclnt.sys
\SystemRoot\system32\DRIVERS\msrpc.sys
msrpc.sys
\SystemRoot\system32\DRIVERS\disk.sys
disk.sys
\SystemRoot\system32\DRIVERS\ftdisk.sys
ftdisk.sys
\SystemRoot\system32\DRIVERS\Storport.SYS
Storport.SYS
\SystemRoot\system32\DRIVERS\CLASSPNP.SYS
CLASSPNP.SYS
\SystemRoot\system32\Drivers\ks.sys
\SystemRoot\System32\Drivers\ksecdd.sys
ksecdd.SYS
\SystemRoot\system32\kdcom.dll
kdcom.dll
\SystemRoot\System32\Drivers\cng.sys
cng.sys
\SystemRoot\system32\PSHED.dll
PSHED.dll
\SystemRoot\system32\CI.dll
CI.dll
\SystemRoot\system32\DRIVERS\WMILIB.SYS
wmilib.sys
Cannot find %s for IAT resolving of %s
Cannot alloc %X bytes for drivers IAT checking
Cannot find %s import %s.%s
Cannot find %s import %s.%d
IAT %s %s.%s patched, addr %p
IAT %s %s.%d patched, addr %p
IAT %s %s.%s patched by %s, addr %p
IAT %s %s.%d patched by %s, addr %p
%s has %d patched IAT entries (total %d)
reading of IAT %s failed, readed %X, actual IAT size %X, error %d
check_exts count failed, error %d, ntstatus %X
check_exts count failed, error %d
check_exts: cannot alloc %X bytes
check_exts failed, error %d, ntstatus %X
check_exts failed, error %d
Ext[%X]:
Handler1: %p %s
Handler2: %p %s
Handler3: %p %s
Table: %X items %p %s
Item[%X]: %p %s
IRP_MJ_CREATE_NAMED_PIPE
Unknown fltmgr: FrameList %X FilterSize %X cbn %X
Unknown fltmgr: FrameList %X FilterSize %X
FltMgr: index %d
FRAME[%d] %p
%s: %p
NormalizeNameComponent: %p %s
NormalizeContextCleanup: %p %s
PreOperation: %p %s
PostOperation: %p %s
check_ks: cannot read size of ks list, error %d, ntstatus %X
check_ks: cannot read size of ks list, error %d
ks count: %X
check_ks: cannot alloc %X bytes
check_ks: cannot read ks list, error %d, ntstatus %X
check_ks: cannot read ks list, error %d
ks[%d] %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
ChangeAccountPassword
ImportSecurityContext
ExportSecurityContext
gKsecpBCryptExtension: %p %s
gKsecpSslExtension: %p %s
SecTable.%s patched %p %s
dxg.sys
dxgkrnl.sys
Win32kCallout: %p %s
SessionStartCallout: %p %s
KTIMER %p DPC %p DefRoutine %p %s
Cannot find KPRCB.DpcRoutineActive
Unknown KPRCB: DpcRoutineActive %X WorkerRoutine %X
Unknown KPRCB: DpcRoutineActive %X
Processor %d:
KTIMERS[%d]: %X
Patched %s   %X by %s
Patched ord.%d   %X by %s
Patched %s   %X
Patched ord.%d   %X
Patched %s by %s
Patched ord.%d by %s
Patched %s
Patched ord.%d
Exception %X occured during EAT checking of %s
check_module_iat(%s) - cannot find exports for %s
check_module_iat(%s): zeroed ImportLookUp, cannot check import
Cannot find ordinal %X in module %s (%s) in import table of %s
Cannot find symbol %s in module %s (%s) in import table of %s
(%s) %s.%s hooked in %s: my IAT %p, must be %p
(%s) %s.%d hooked in %s: my IAT %p, must be %p
apfn %s patched by %s, addr %p
apfn[%d] patched by %s, addr %p
apfn %s patched, addr %p
apfn[%d] patched, addr %p
%s%s!%s patched by %s, addr %p
%s%s![%d] patched by %s, addr %p
%s%s!%s patched, addr %p
%s%s![%d] patched, addr %p
LSA SP %s has %d patched functions in SECPKG_FUNCTION_TABLE:
PID %d: LSA SP %s has %d patched functions in SECPKG_USER_FUNCTION_TABLE:
PID %d: LSA SP %s has %d patched functions in CallPackageDispatch:
ole32 hooked by %s
Cannot relocate section %s!%s
Exception %X occured on checking %s!%s
Module %s!%s has %X patched bytes !
Exception %X occured on check_module_iat(%s)
MyModule: %p %s
%SystemRoot%\System32\ncrypt.dll
%SystemRoot%\System32\ntdsa.dll
%SystemRoot%\System32\kernelbase.dll
%SystemRoot%\System32\kernel32.dll
%SystemRoot%\System32\user32.dll
%SystemRoot%\System32\umpnpmgr.dll
%SystemRoot%\System32\combase.dll
%SystemRoot%\System32\ole32.dll
%SystemRoot%\System32\imm32.dll
%SystemRoot%\System32\rpcrt4.dll
%SystemRoot%\System32\mswsock.dll
%SystemRoot%\System32\advapi32.dll
%SystemRoot%\System32\cryptbase.dll
%SystemRoot%\System32\apisetschema.dll
read_ndis_oid_handlers failed, returned %d bytes, error %d, ntstatus %X
read_ndis_oid_handlers failed, returned %d bytes, error %d
[%X] %s: post %p %s
[%X] %s: pre %p %s
[%X] %s: pre %p (%s) post %p (%s)
[%X] %X: post %p %s
[%X] %X: pre %p %s
[%X] %X: pre %p (%s) post %p (%s)
read_tcp_off_handlers failed, returned %d bytes, error %d, ntstatus %X
read_tcp_off_handlers failed, returned %d bytes, error %d
TcpOfflineHandlers:
TcpOffloadEventIndicate: %p %s
TcpOffloadReceiveIndicate: %p %s
TcpOffloadSendComplete: %p %s
TcpOffloadReceiveComplete: %p %s
TcpOffloadDisconnectComplete: %p %s
TcpOffloadForwardComplete: %p %s
Cannot alloc %X bytes from reading filter block
read_ndis_filter_block: len %d, returned %d bytes, error %d, ntstatus %X
read_ndis_filter_block: len %d, returned %d bytes, error %d
check_ndis - reading of TDI callback failed, error %d, ntstatus %X
check_ndis - reading of TDI callback failed, error %d
check_ndis - reading of TDI PnP handler failed, error %d, ntstatus %X
check_ndis - reading of TDI PnP handler failed, error %d
TDI callback %p patched by %s
TDI PnP handler %p patched by %s
check_ndis - reading of providers count failed, error %d, ntstatus %X
check_ndis - reading of providers count failed, error %d
check_ndis: %d providers
check_ndis: cannot alloc %X bytes
Cannot store provider_block %p (%d)
check_ndis: stored %d provider_blocks
check_ndis - reading of interfaces count failed, error %d, ntstatus %X
check_ndis - reading of interfaces count failed, error %d
check_ndis: %d interfaces, size of miniport %X
Interface[%d]:
check_ndis - reading of protocols count failed, error %d, ntstatus %X
check_ndis - reading of protocols count failed, error %d
check_ndis: %d protocols, size of protocol %X
check_ndis: stored %d protocols
check_ndis - reading of minidrivers count failed, error %d, ntstatus %X
check_ndis - reading of minidrivers count failed, error %d
check_ndis: %d minidrivers, size of minidriver %X, sizeof(ndis50) %X, sizeof(ndis52) %X
Cannot store minidriver %d (%p)
Stored %d mini-drivers
check_ndis - reading of miniports count failed, error %d, ntstatus %X
check_ndis - reading of miniports count failed, error %d
check_ndis: %d miniports, size of miniport %X
check_ndis: read %d miniports, total %X
Miniport[%d] %p:
check_ndis: stored %d miniports, sizeof(miniport_block_w7) %X
check_ndis - reading of open_blocks count failed, error %d, ntstatus %X
check_ndis - reading of open_blocks count failed, error %d
check_ndis: %d open_blocks, size of open_block %X
check_ndis: read %d open_blocks, total %X
Open_Block[%d]:
Cannot store open_block %p (%d)
check_ndis: stored %d open_blocks
check_ndis - reading of filter_drivers count failed, error %d, ntstatus %X
check_ndis - reading of filter_drivers count failed, error %d
check_ndis: %d filter_drivers, size of open_block %X
check_ndis: read %d filter_drivers, total %X
FilterDriver[%d]:
check_ndis: stored %d filter_drivers, %d filter_blocks
Passive
read_punicode_string failed, len %d, returned %d bytes, error %d, ntstatus %X
read_punicode_string failed, len %d, returned %d bytes, error %d
Cannot read NDIS_MINIPORT_INTERRUPT %p
NDIS_MINIPORT_INTERRUPT:
MiniportIsr: %p %s
MiniportDpc: %p %s
Cannot read NDIS_MINIPORT_INTERRUPT_CHARACTERISTICS %p
NDIS_MINIPORT_INTERRUPT_CHARACTERISTICS:
InterruptHandler: %p %s
InterruptDpcHandler: %p %s
DisableInterruptHandler: %p %s
EnableInterruptHandler: %p %s
MessageInterruptHandler: %p %s
MessageInterruptDpcHandler: %p %s
DisableMessageInterruptHandler: %p %s
EnableMessageInterruptHandler: %p %s
MiniportIsr: %p %s
MiniportDpc: %p %s
MiniportMessageIsr: %p %s
MiniportMessageInterruptDpc: %p %s
MiniportIsr: %p %s
MiniportDpc: %p %s
MiniportEnableInterrupt: %p %s
MiniportDisableInterrupt: %p %s
MiniportMessageIsr: %p %s
MiniportMessageInterruptDpc: %p %s
MiniportDisableMessageInterrupt: %p %s
MiniportEnableMessageInterrupt: %p %s
NDIS Protocol[%d]: %S
MajorNdisVersion %d
MinorNdisVersion %d
Flags %X
OpenAdapterCompleteHandler: %p %s
CloseAdapterCompleteHandler: %p %s
SendCompleteHandler: %p %s
TransferDataCompleteHandler: %p %s
ResetCompleteHandler: %p %s
RequestCompleteHandler: %p %s
ReceiveHandler: %p %s
ReceiveCompleteHandler: %p %s
StatusHandler: %p %s
StatusCompleteHandler: %p %s
ReceivePacketHandler: %p %s
BindAdapterHandler: %p %s
UnbindAdapterHandler: %p %s
PnPEventHandler: %p %s
UnloadHandler: %p %s
CoSendCompleteHandler: %p %s
CoStatusHandler: %p %s
CoReceivePacketHandler: %p %s
CoAfRegisterNotifyHandler: %p %s
MajorNdisVersion %d
MinorNdisVersion %d
MajorDriverVersion %d
MinorDriverVersion %d
Flags %X
IsIPv4 %d
IsIPv6 %d
IsNdisTest6 %d
BindAdapterHandlerEx: %p %s
UnbindAdapterHandlerEx: %p %s
OpenAdapterCompleteHandlerEx: %p %s
CloseAdapterCompleteHandlerEx: %p %s
PnPEventHandler: %p %s
UnloadHandler: %p %s
UninstallHandler: %p %s
RequestCompleteHandler: %p %s
StatusHandler: %p %s
StatusCompleteHandler: %p %s
ReceiveNetBufferListsHandler: %p %s
SendNetBufferListsCompleteHandler: %p %s
CoStatusHandler: %p %s
CoAfRegisterNotifyHandler: %p %s
CoReceiveNetBufferListsHandler: %p %s
CoSendNetBufferListsCompleteHandler: %p %s
OpenAdapterCompleteHandler: %p %s
CloseAdapterCompleteHandler: %p %s
SendCompleteHandler: %p %s
TransferDataCompleteHandler: %p %s
ResetCompleteHandler: %p %s
ReceiveHandler: %p %s
ReceiveCompleteHandler: %p %s
ReceivePacketHandler: %p %s
BindAdapterHandler: %p %s
UnbindAdapterHandler: %p %s
CoSendCompleteHandler: %p %s
CoReceivePacketHandler: %p %s
OidRequestCompleteHandler: %p %s
InitiateOffloadCompleteHandler: %p %s
TerminateOffloadCompleteHandler: %p %s
UpdateOffloadCompleteHandler: %p %s
InvalidateOffloadCompleteHandler: %p %s
QueryOffloadCompleteHandler: %p %s
IndicateOffloadEventHandler: %p %s
TcpOffloadSendCompleteHandler: %p %s
TcpOffloadReceiveCompleteHandler: %p %s
TcpOffloadDisconnectCompleteHandler: %p %s
TcpOffloadForwardCompleteHandler: %p %s
TcpOffloadEventHandler: %p %s
TcpOffloadReceiveIndicateHandler: %p %s
Unknown NDIS Type %X and Size %X
DirectOidRequestCompleteHandler: %p %s
AllocateSharedMemoryHandler: %p %s
FreeSharedMemoryHandler: %p %s
Unknown ndis protocol size: %X
NDIS MiniDriver[%d] %p
MajorNdisVersion: %d
MinorNdisVersion: %d
CheckForHangHandler: %p %s
DisableInterruptHandler: %p %s
EnableInterruptHandler: %p %s
HaltHandler %p %s
HandleInterruptHandler: %p %s
InitializeHandler: %p %s
ISRHandler: %p %s
QueryInformationHandler: %p %s
ReconfigureHandler: %p %s
ResetHandler: %p %s
SendHandler: %p %s
SetInformationHandler: %p %s
TransferDataHandler: %p %s
ReturnPacketHandler: %p %s
SendPacketsHandler: %p %s
AllocateCompleteHandler: %p %s
CoCreateVcHandler: %p %s
CoDeleteVcHandler: %p %s
CoActivateVcHandler: %p %s
CoDeactivateVcHandler: %p %s
CoSendPacketsHandler: %p %s
CoRequestHandler: %p %s
CheckForHangHandler: %p %s
DisableInterruptHandler: %p %s
EnableInterruptHandler: %p %s
HaltHandler %p %s
HandleInterruptHandler: %p %s
InitializeHandler: %p %s
ISRHandler: %p %s
QueryInformationHandler: %p %s
ReconfigureHandler: %p %s
ResetHandler: %p %s
SendHandler: %p %s
SetInformationHandler: %p %s
TransferDataHandler: %p %s
ReturnPacketHandler: %p %s
SendPacketsHandler: %p %s
AllocateCompleteHandler: %p %s
CoCreateVcHandler: %p %s
CoDeleteVcHandler: %p %s
CoActivateVcHandler: %p %s
CoDeactivateVcHandler: %p %s
CoSendPacketsHandler: %p %s
CoRequestHandler: %p %s
CancelSendPacketsHandler: %p %s
PnPEventNotifyHandler: %p %s
AdapterShutdownHandler: %p %s
CheckForHangHandler: %p %s
DisableInterruptHandler: %p %s
EnableInterruptHandler: %p %s
HaltHandler %p %s
HandleInterruptHandler: %p %s
InitializeHandler: %p %s
ISRHandler: %p %s
QueryInformationHandler: %p %s
ReconfigureHandler: %p %s
ResetHandler: %p %s
SendHandler: %p %s
SetInformationHandler: %p %s
TransferDataHandler: %p %s
ReturnPacketHandler: %p %s
SendPacketsHandler: %p %s
AllocateCompleteHandler: %p %s
CoCreateVcHandler: %p %s
CoDeleteVcHandler: %p %s
CoActivateVcHandler: %p %s
CoDeactivateVcHandler: %p %s
CoSendPacketsHandler: %p %s
CoRequestHandler: %p %s
CancelSendPacketsHandler: %p %s
PnPEventNotifyHandler: %p %s
AdapterShutdownHandler: %p %s
ISRHandlerEx: %p %s
HandleInterruptHandlerEx: %p %s
InitiateOffloadHandler: %p %s
TerminateOffloadHandler: %p %s
UpdateOffloadHandler: %p %s
InvalidateOffloadHandler: %p %s
QueryOffloadHandler: %p %s
TcpOffloadSendHandler: %p %s
TcpOffloadReceiveHandler: %p %s
TcpOffloadDisconnectHandler: %p %s
TcpOffloadForwardHandler: %p %s
TcpOffloadReceiveReturnHandler: %p %s
ReturnPacketsHandlerEx: %p %s
RequestTimeoutDpcHandler: %p %s
MajorNdisVersion: %d
MinorNdisVersion: %d
MajorDriverVersion: %d
MinorDriverVersion: %d
Flags: %X
SetOptionsHandler: %p %s
InitializeHandlerEx: %p %s
HaltHandlerEx: %p %s
UnloadHandler: %p %s
PauseHandler: %p %s
RestartHandler: %p %s
OidRequestHandler: %p %s
SendNetBufferListsHandler: %p %s
ReturnNetBufferListsHandler: %p %s
CancelSendHandler: %p %s
CheckForHangHandlerEx: %p %s
ResetHandlerEx: %p %s
DevicePnPEventNotifyHandler: %p %s
ShutdownHandlerEx: %p %s
CancelOidRequestHandler: %p %s
DirectOidRequestHandler: %p %s
CancelDirectOidRequestHandler: %p %s
NDIS MiniPort[%d] %p
State: %s
MediaType: %s
AdapterType: %s
DefaultSendAuthorizationState: %s
DefaultRcvAuthorizationState: %s
DefaultPortSendAuthorizationState: %s
DefaultPortRcvAuthorizationState: %s
NextCancelSendNetBufferListsHandler: %p %s
PacketIndicateHandler: %p %s
SendCompleteHandler: %p %s
SendResourcesHandler: %p %s
ResetCompleteHandler: %p %s
DisableInterruptHandler: %p %s
EnableInterruptHandler: %p %s
SendPacketsHandler: %p %s
DeferredSendHandler: %p %s
EthRxIndicateHandler: %p %s
NextSendNetBufferListsHandler: %p %s
EthRxCompleteHandler: %p %s
SavedNextSendNetBufferListsHandler: %p %s
StatusHandler: %p %s
StatusCompleteHandler: %p %s
TDCompleteHandler: %p %s
QueryCompleteHandler: %p %s
SetCompleteHandler: %p %s
WanSendCompleteHandler: %p %s
WanRcvHandler: %p %s
WanRcvCompleteHandler: %p %s
SendNetBufferListsCompleteHandler: %p %s
WSendPacketsHandler: %p %s
NextSendPacketsHandler: %p %s
FinalSendPacketsHandler: %p %s
TopIndicateNetBufferListsHandler: %p %s
TopIndicateLoopbackNetBufferListsHandler: %p %s
Ndis5PacketIndicateHandler: %p %s
MiniportReturnPacketHandler: %p %s
SynchronousReturnPacketHandler: %p %s
TopNdis5PacketIndicateHandler: %p %s
AllocateSharedMemoryHandler: %p %s
FreeSharedMemoryHandler: %p %s
SetBusData: %p %s
GetBusData: %p %s
NoFilter.CancelSendHandler %p %s
NoFilter.SendNetBufferListsCompleteHandler %p %s
NoFilter.IndicateNetBufferListsHandler %p %s
NoFilter.SaveIndicateNetBufferListsHandler %p %s
NoFilter.ReturnNetBufferListsHandler %p %s
NoFilter.SendNetBufferListsHandler %p %s
Next.CancelSendHandler %p %s
Next.SendNetBufferListsCompleteHandler %p %s
Next.IndicateNetBufferListsHandler %p %s
Next.SaveIndicateNetBufferListsHandler %p %s
Next.ReturnNetBufferListsHandler %p %s
Next.SendNetBufferListsHandler %p %s
Name: %S
BaseName: %S
SymbolicLinkName: %S
NextCancelSendNetBufferListsHandler %p %s
TrRxIndicateHandler: %p %s
TrRxCompleteHandler: %p %s
IndicateNetBufferListsHandler: %p %s
NextReturnNetBufferLists: %p %s
SavedIndicateNetBufferListsHandler: %p %s
SavedPacketIndicateHandler: %p %s
ShutdownHandler: %p %s
NDIS MiniPort[%d] %S
BusType: %s
PacketIndicateHandler: %p %s
SendCompleteHandler: %p %s
SendResourcesHandler: %p %s
ResetCompleteHandler: %p %s
DeferredSendHandler: %p %s
EthRxIndicateHandler: %p %s
TrRxIndicateHandler: %p %s
FddiRxIndicateHandler: %p %s
EthRxCompleteHandler: %p %s
TrRxCompleteHandler: %p %s
FddiRxCompleteHandler: %p %s
StatusHandler: %p %s
StatusCompleteHandler: %p %s
TDCompleteHandler: %p %s
QueryCompleteHandler: %p %s
SetCompleteHandler: %p %s
WanSendCompleteHandler: %p %s
WanRcvHandler: %p %s
WanRcvCompleteHandler: %p %s
AdapterInstanceName: %S
OpenBlock [%d] %p
RootName: %S
BindName: %S
ProtocolMajorVersion: %X
NextSendHandler: %p %s
NextReturnNetBufferListsHandler: %p %s
SendHandler: %p %s
TransferDataHandler: %p %s
WanReceiveHandler: %p %s
SendPacketsHandler: %p %s
ResetHandler: %p %s
RequestHandler: %p %s
OidRequestHandler: %p %s
WSendHandler: %p %s
WTransferDataHandler: %p %s
WSendPacketsHandler: %p %s
CancelSendPacketsHandler: %p %s
ProtSendNetBufferListsComplete: %p %s
NextSendNetBufferListsComplete: %p %s
ReceiveNetBufferLists: %p %s
SavedSendNBLHandler: %p %s
SavedSendPacketsHandler: %p %s
SavedCancelSendPacketsHandler: %p %s
SavedSendHandler: %p %s
Ndis5WanSendHandler: %p %s
ProtSendCompleteHandler: %p %s
OidRequestCompleteHandler %p %s
OpenFlags: %X
DirectOidRequestHandler: %p %s
RootName: %S
BindName: %S
Flags: %X
SendHandler: %p %s
WanSendHandler: %p %s
TransferDataHandler: %p %s
WanReceiveHandler: %p %s
SendPacketsHandler: %p %s
ResetHandler: %p %s
RequestHandler: %p %s
WSendHandler: %p %s
WTransferDataHandler: %p %s
WSendPacketsHandler: %p %s
CancelSendPacketsHandler: %p %s
Flags %X
Mtu %X
PromiscuousMode %d
AccessType %s
DirectionType %s
ConnectionType %s
MediaType %s
MediaConnectState %s
AdminStatus %s
OperStatus %s
InterfaceGuid %s
NetworkGuid %s
ifIndex %X
ifDescr %S
ifAlias %S
FilterDriverCharacteristics[%d]:
FriendlyName: %S
UniqueName: %S
ServiceName: %S
SetOptionsHandler: %p %s
SetFilterModuleOptionsHandler: %p %s
AttachHandler: %p %s
DetachHandler: %p %s
RestartHandler: %p %s
PauseHandler: %p %s
SendNetBufferListsHandler: %p %s
SendNetBufferListsCompleteHandler: %p %s
CancelSendNetBufferListsHandler: %p %s
ReceiveNetBufferListsHandler: %p %s
ReturnNetBufferListsHandler: %p %s
OidRequestHandler: %p %s
OidRequestCompleteHandler: %p %s
CancelOidRequestHandler: %p %s
DevicePnPEventNotifyHandler: %p %s
NetPnPEventHandler: %p %s
StatusHandler: %p %s
DirectOidRequestHandler: %p %s
DirectOidRequestCompleteHandler: %p %s
CancelDirectOidRequestHandler: %p %s
InterfaceGuid: %s
FilterState: %s
NextSendNetBufferListsHandler: %p %s
NextSendNetBufferListsCompleteHandler: %p %s
NextIndicateReceiveNetBufferListsHandler: %p %s
NextReturnNetBufferListsHandler: %p %s
NextCancelSendNetBufferListsHandler: %p %s
SetFilterModuleOptionalHandlers: %p %s
OidRequestHandler: %p %s
OidRequestCompleteHandler: %p %s
CancelRequestHandler: %p %s
DevicePnPEventNotifyHandler: %p %s
NetPnPEventHandler: %p %s
StatusHandler: %p %s
FilterSendNetBufferListsHandler: %p %s
FilterIndicateReceiveNetBufferListsHandler: %p %s
FilterCancelSendNetBufferListsHandler: %p %s
InitiateOffloadCompleteHandler: %p %s
TerminateOffloadCompleteHandler: %p %s
UpdateOffloadCompleteHandler: %p %s
InvalidateOffloadCompleteHandler: %p %s
QueryOffloadCompleteHandler: %p %s
IndicateOffloadEventHandler: %p %s
TcpOffloadSendCompleteHandler: %p %s
TcpOffloadReceiveCompleteHandler: %p %s
TcpOffloadDisconnectCompleteHandler: %p %s
TcpOffloadForwardCompleteHandler: %p %s
TcpOffloadEventHandler: %p %s
TcpOffloadReceiveIndicateHandler: %p %s
InitiateOffloadHandler: %p %s
TerminateOffloadHandler: %p %s
UpdateOffloadHandler: %p %s
InvalidateOffloadHandler: %p %s
QueryOffloadHandler: %p %s
TcpOffloadReceiveReturnHandler: %p %s
DirectOidRequestHandler: %p %s
DirectOidRequestCompleteHandler: %p %s
CancelDirectOidRequestHandler: %p %s
TcpOffloadSendHandler: %p %s
TcpOffloadReceiveHandler: %p %s
TcpOffloadDisconnectHandler: %p %s
TcpOffloadForwardHandler: %p %s
Provider[%d]: %p
QueryObjectHandler: %p %s
SetObjectHandler: %p %s
FilterDriverBlock[%d]
InitiateOffloadHandler: %p %s
TerminateOffloadHandler: %p %s
UpdateOffloadHandler: %p %s
InvalidateOffloadHandler: %p %s
QueryOffloadHandler: %p %s
TcpOffloadReceiveReturnHandler: %p %s
TcpOffloadSendHandler: %p %s
TcpOffloadReceiveHandler: %p %s
TcpOffloadDisconnectHandler: %p %s
TcpOffloadForwardHandler: %p %s
ClCreateVcHandler: %p %s
ClDeleteVcHandler: %p %s
ClOidRequestHandler: %p %s
ClOidRequestCompleteHandler: %p %s
ClOpenAfCompleteHandlerEx: %p %s
ClCloseAfCompleteHandler: %p %s
ClRegisterSapCompleteHandler: %p %s
ClDeregisterSapCompleteHandler: %p %s
ClMakeCallCompleteHandler: %p %s
ClModifyCallQoSCompleteHandler: %p %s
ClCloseCallCompleteHandler: %p %s
ClAddPartyCompleteHandler: %p %s
ClDropPartyCompleteHandler: %p %s
ClIncomingCallHandler: %p %s
ClIncomingCallQoSChangeHandler: %p %s
ClIncomingCloseCallHandler: %p %s
ClIncomingDropPartyHandler: %p %s
ClCallConnectedHandler: %p %s
ClNotifyCloseAfHandler: %p %s
CmCreateVcHandler: %p %s
CmDeleteVcHandler: %p %s
CmOpenAfHandler: %p %s
CmCloseAfHandler: %p %s
CmRegisterSapHandler: %p %s
CmDeregisterSapHandler: %p %s
CmMakeCallHandler: %p %s
CmCloseCallHandler: %p %s
CmIncomingCallCompleteHandler: %p %s
CmAddPartyHandler: %p %s
CmDropPartyHandler: %p %s
CmActivateVcCompleteHandler: %p %s
CmDeactivateVcCompleteHandler: %p %s
CmModifyCallQoSHandler: %p %s
CmOidRequestHandler: %p %s
CmOidRequestCompleteHandler: %p %s
CmNotifyCloseAfCompleteHandler: %p %s
DriverVersion: %X
CoCreateVcHandler: %p %s
CoDeleteVcHandler: %p %s
CoActivateVcHandler: %p %s
CoDeactivateVcHandler: %p %s
CoSendNetBufferListsHandler: %p %s
CoRequestHandler: %p %s
CoOidRequestHandler: %p %s
InitiateOffloadHandler: %p %s
TerminateOffloadHandler: %p %s
UpdateOffloadHandler: %p %s
InvalidateOffloadHandler: %p %s
QueryOffloadHandler: %p %s
TcpOffloadSendHandler: %p %s
TcpOffloadReceiveHandler: %p %s
TcpOffloadDisconnectHandler: %p %s
TcpOffloadForwardHandler: %p %s
TcpOffloadReceiveReturnHandler: %p %s
AddDeviceHandler: %p %s
RemoveDeviceHandler: %p %s
FilterResourceRequirementsHandler: %p %s
StartDeviceHandler: %p %s
ServiceName: %S
CoCreateVcHandler: %p %s
CoDeleteVcHandler: %p %s
CoActivateVcHandler: %p %s
CoDeactivateVcHandler: %p %s
CoSendNetBufferListsHandler: %p %s
CoRequestHandler: %p %s
CoOidRequestHandler: %p %s
InitiateOffloadHandler: %p %s
TerminateOffloadHandler: %p %s
UpdateOffloadHandler: %p %s
InvalidateOffloadHandler: %p %s
QueryOffloadHandler: %p %s
TcpOffloadSendHandler: %p %s
TcpOffloadReceiveHandler: %p %s
TcpOffloadDisconnectHandler: %p %s
TcpOffloadForwardHandler: %p %s
TcpOffloadReceiveReturnHandler: %p %s
AddDeviceHandler: %p %s
RemoveDeviceHandler: %p %s
FilterResourceRequirementsHandler: %p %s
StartDeviceHandler: %p %s
OpenNDKAdapterHandler: %p %s
CloseNDKAdapterHandler: %p %s
IdleNotificationHandler: %p %s
CancelIdleNotificationHandler: %p %s
AllocateNetBufferListForwardingContextHandler: %p %s
FreeNetBufferListForwardingContextHandler: %p %s
AddNetBufferListDestinationHandler: %p %s
SetNetBufferListSourceHandler: %p %s
GrowNetBufferListDestinationsHandler: %p %s
GetNetBufferListDestinationsHandler: %p %s
UpdateNetBufferListDestinationsHandler: %p %s
CopyNetBufferListInfoHandler: %p %s
ReferenceSwitchNicHandler: %p %s
DereferenceSwitchNicHandler: %p %s
ReferenceSwitchPortHandler: %p %s
DereferenceSwitchPortHandler: %p %s
ReportFilteredNetBufferListsHandler: %p %s
ImageName: %S
SetNetBufferListSwitchContextHandler: %p %s
GetNetBufferListSwitchContextHandler: %p %s
netio legacy handler %p %s
read netio legacy handler failed, error %d, status %X
read netio legacy handler failed, error %d
%p %s
read netio WfpNblInfoDispTable failed, error %d, status %X
read netio WfpNblInfoDispTable failed, error %d
netio MacShim %p %s
WfpShim[%d] %p %s
Unknown WFP callout size %d
WFP callout[%d]:
ClassifyCallback: %p %s
NotifyCallback: %p %s
uFlowDeleteFunction: %p %s
Exception %X on sysptr seed reading at %p
Decode system scheme - %s
Decode scheme - %s
Cannot read my process cookie, error %X
Trace[%d] %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X (%p) %s
Trace[%d] %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X %p
SystemFunction%3.3d (%p) %s
PFNCLIENT.%s patched by %s (%p)
PFNCLIENT.%s patched %p
check_user32_pfnclient: exception %X occured
PFNCLIENTWORKER.%s patched by %s (%p)
PFNCLIENTWORKER.%s patched %p
ConsoleCtrlHandler[%d]: %s (%p)
ConsoleCtrlHandler[%d]: %p UNKNOWN
ConsoleCtrlHandler: %s (%p)
UnhandledExceptionFilter: %s (%p)
ShimModule: %s (%p)
RtlpStartThreadFunc: %s (%p)
RtlpExitThreadFunc: %s (%p)
RtlpUnhandledExceptionFilter: %s (%p)
RtlSecureMemoryCacheCallback: %s (%p)
TppLogpRoutine: %s (%p)
CsrServerApiRoutine: %s (%p)
LdrpManifestProberRoutine: %s (%p)
LdrpCreateActCtxLanguage: %s (%p)
LdrpReleaseActCtx: %s (%p)
LdrpAppCompatDllRedirectionCallbackFunction: %s (%p)
%s%s!%s patched by %s (addr %p)
%s%s.%d patched by %s (addr %p)
%s%s.%d patched, addr %p
PID %d trace callbacks: %d
Trace[%d] %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X %p %s
Process PID %d has the same token as system process: %p !!!
Process PID %d token: %p
%p %s %8X
%p %s %8X
CheckProc: cannot get modules list for PID %d (%S), error %d, ntstatus %X
CheckProc: cannot get modules list for PID %d (%S), error %d
CheckProcess PID %d (%S):
PEB.PostProcessInitRoutine: %p %s
PEB.PostProcessInitRoutine: %p UNKNOWN
PEB.pShimData: %p
PEB.AppCompat: %p
PEB.FastPebLockRoutine: %p %s
PEB.FastPebLockRoutine: %p UNKNOWN
PEB.FastPebUnlockRoutine: %p %s
PEB.FastPebUnlockRoutine: %p UNKNOWN
Module: %s at %p
Cannot read %s, PID %d, error %d
PID %d: LSA SP %s has %d patched functions in SECPKG_FUNCTION_TABLE:
PID %d: ncrypt has %d patched functions
PID %d: mswsock has %d patched functions in SockProcTable
PID %d: mswsock has %d patched functions in NspVector
PID %d: mswsock has %d patched MSAFD functions
SHAREDINFO.aheList: %p
PID %d: ntdsa has %d patched functions
PID %d - ole32 hooked by %s
PID %d - ole32 hooked by unknown module, addr %p
PID %d: rpcrt4 has %d patched functions
PID %d: basesrv has %d patched user functions
PID %d: winsrv has %d patched user functions
PID %d: winsrv has %d patched cons functions
PID %d: lsasrv has %d patched functions
PID %d: lsasrv has %d patched functions in LsapSspiExtension
PID %d: lsasrv has %d patched functions in LsapLookupExtension
PID %d: lsasrv has %d patched functions in LsapLsasrvIfTable
Cannot alloc %X bytes for EAT checking of %s, PID %d
Cannot read EAT of %s, PID %d
Cannot alloc %X bytes for checking section %s of %s, PID %d
Cannot read section %s content %X bytes of %s, PID %d
Cannot make section %s of %s, PID %d
Module %s section %s has %X patched bytes, PID %d
PID %d: user32 has %d patched imm32 functions
PID %d: advapi32 has %d patched functions
PID %d: kernel32 has %d patched functions
ShimHandler[%d]: %p %s
ShimHandler[%d]: %p UNKNOWN, located at %p
ApplicationRecoveryCallback: %s (%p)
%s, PID %d:
Cannot alloc %X bytes for IAT checking of %s, PID %d
Cannot read IAT (size %X at %p) of %s, PID %d
Cannot find function %s.%s for module %s process %d
Cannot find function %s.%d for module %s process %d
IAT Patched %s.%s in module %s process %d by %s
IAT Patched %s.%s in module %s process %d, addr %p
IAT Patched %s.%d in module %s process %d by %s
IAT Patched %s.%d in module %s process %d
Cannot alloc %X bytes for delayed IAT checking of %s, PID %d
Cannot read delayed IAT (size %X at %p) of %s, PID %d
Cannot find delayed function %s.%s for module %s process %d
Cannot find delayed function %s.%d for module %s process %d
LdrpDllNotificationList: %d
%p %s
Read %d QueuedWorkerItems:
[%d] %p %s
check_drivers_reinit: cannot read size of list, error %d, status %X
check_drivers_reinit: cannot read size of list, error %d
check_drivers_reinit: cannot alloc %X bytes
check_drivers_reinit: cannot read list, error %d, ntstatus %X
check_drivers_reinit: cannot read list, error %d
[%d] Drv %p %s routine %p %s
read_shutdown_notificators: cannot read size of %s, error %d, status %X
read_shutdown_notificators: cannot read size of %s, error %d
read_shutdown_notificators: cannot alloc %X bytes
read_shutdown_notificators: cannot read %s, error %d, ntstatus %X
read_shutdown_notificators: cannot read %s, error %d
[%d] DevObj %p Drv %p (addr %p) %s
[%d] DevObj %p Drv %p %s
MailSlot: %S, server %d (%S)
MailSlot: %S, server %d
NamedPipe: %S, server %d (%S)
NamedPipe: %S, server %d
Flags: %X, server %d (%S)
Flags: %X, creator %d, server %d
Flags: %X, server %d
Endpoints: %d
Endpoint %S PID %d (%S):
Endpoint %S:
RPC controls: %d
%S: %S
%8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X version %d.%d
Cannot load kernel %s
Unknown scheduler: ReadySummary %X DispatcherReadyListHead %X
Unknown scheduler: ReadySummary %X DeferredReadyListHead %X
Unknown scheduler: ReadySummary %X
Readed %d threads, total %d
Thread %p ProcID %X ThreadID %X Win32Thread %p %s
Thread %p ProcID %X ThreadID %X Priority %d Win32Thread %p
Thread %p ProcID %X ThreadID %X %s
Thread %p ProcID %X ThreadID %X Priority %d
reading count of threads on processor %d failed, error %X
%d threads
reading of threads on processor %d failed, error %X
Scheduler index %d
reading count of threads failed, error %X
reading of threads failed, error %X
Cannot find ETHREAD.ServiceTable
Unknown version of ETHREAD, offset %X
Cannot alloc %X bytes for ProcessesAndThreadsInformation
Cannot realloc %X bytes for ProcessesAndThreadsInformation
ProcessesAndThreadsInformation failed, error %X
read_sdt for threadID %X failed, error %d, status %X
read_sdt for threadID %X failed, error %d
ProcessID %X (%S) ThreadID %X SDT %p %s
ProcessID %X ThreadID %X SDT %p %s
read_thread_token for threadID %X failed, error %d, status %X
read_thread_token for threadID %X failed, error %d
ProcessID %X (%S) ThreadID %X token %p ImpersonationLevel %d
ProcessID %X ThreadID %X token %p ImpersonationLevel %d
Cannot detect ETHREAD.StartAddress
Unknown kernel %s, StartAddress %X, IrpList %X, StackLimit %X, StackBase %X
Unknown kernel %s, StartAddress %X, StackLimit %X, StackBase %X
Unknown kernel %s, StartAddress %X, IrpList %X
Unknown kernel %s, StartAddress %X
Cannot read count of system threads, ntstatus %X
Cannot alloc %d bytes
Cannot read system threads, ntstatus %X
%d System Threads
Thread %p Start %p %c stack %p limit %p %s
read IPSec status failed, error %d, status %X
read IPSec status failed, error %d
IPSec status %X
IPSecHandler: %p %s
IPSecQueryStatus: %p %s
IPSecSendCmplt: %p %s
IPSecNdisStatus: %p %s
IPSecRcvFWPacket: %p %s
check_tdi_pnp_clnts: cannot read size of clnts list, error %d, ntstatus %X
check_tdi_pnp_clnts: cannot read size of clnts list, error %d
check_tdi_pnp_clnts: cannot alloc %X bytes
check_tdi_pnp_clnts: cannot read clnts list, error %d, ntstatus %X
check_tdi_pnp_clnts: cannot read clnts list, error %d
TDI PnP clients: %d (readed %d)
[%d]: version %X %S
PnPPowerHandler: %p %s
BindHandler: %p %s
UnBindHandler: %p %s
AddAddressHandler: %p %s
DelAddressHandler: %p %s
Microsoft-Windows-Windows Firewall With Advanced Security
Microsoft-Windows-Kernel-Boot
Microsoft-Windows-EQoS
Microsoft-Windows-XWizards
ASP.NET Events
Microsoft-Windows-UIRibbon
Microsoft-Windows-WPD-CompositeClassDriver
Microsoft-Windows-Wired-AutoConfig
Microsoft-Windows-PrintService
Microsoft-Windows-ApplicationExperience-LookupServiceTrigger
Microsoft-Windows-IDCRL
Microsoft-Windows-MPS-DRV
Microsoft-Windows-P2P-Mesh
Microsoft-Windows-TabletPC-MathRecognizer
Microsoft-Windows-Spell-Checking
Microsoft-Windows-Fax
Microsoft-Windows-GroupPolicy
Microsoft-Windows-Crashdump
Microsoft-Windows-PrintSpooler
Microsoft-Windows-LanguagePackSetup
Microsoft-Windows-OneX
Microsoft-Windows-OfflineFiles-CscApi
Microsoft-Windows-ADSI
Microsoft-Windows-Dhcp-Client
Microsoft-Windows-CertificateServicesClient-AutoEnrollment
Microsoft-Windows-NlaSvc
Microsoft-Windows-Diagnosis-MSDE
Microsoft-Windows-SpoolerWin32SPL
Microsoft-Windows-SPB-ClassExtension
Microsoft-Windows-Kernel-Memory
Microsoft-Windows-Application Server-Applications
Microsoft-Windows-MUI
Microsoft-Windows-P2P-Collab
Microsoft-Windows-Security-Netlogon
Microsoft-Windows-SQM-Events
Microsoft-Windows-USB-USBPORT
Microsoft-Windows-SendTo
Microsoft-Windows-AIT
Microsoft-Windows-P2P-CRP
PrintFilterPipelineSvc_ObjectsGuid
Microsoft-Windows-IME-JPPRED
Microsoft-Windows-WMP
Microsoft-Windows-Eqos-SQM-Provider
MSDADIAG.ETW
Microsoft-Windows-Processor-Aggregator
Microsoft-Windows-ErrorReportingConsole
Microsoft-Windows-SmartCard-TPM-VCard-Module
Microsoft-Windows-User Profiles Service
Microsoft-Windows-Crypto-CNG
Microsoft-Windows-LinkLayerDiscoveryProtocol
Microsoft-Windows-TaskbarCPL
Microsoft-Windows-Networking-Correlation
Microsoft-Windows-RestartManager
Microsoft-Windows-WMPDMCCore
Microsoft-Windows-TCPIP
Microsoft-Windows-MSDTC
Microsoft-Windows-Resources-MrmBc
Microsoft-Windows-Time-Service
Microsoft-Windows-HomeGroup-ProviderService
Microsoft-Windows-DriverFrameworks-UserMode
Microsoft-Windows-Runtime-Networking
Microsoft-Windows-Network-Connection-Broker
Microsoft-Windows-Shell-AppWizCpl
Microsoft-Windows-PDC
Microsoft-Windows-Biometrics
Microsoft-Windows-IME-SCDICCOMPILER
Microsoft-Windows-Wininit
Microsoft-Windows-Dwm-Dwm
Microsoft-Windows-Photo-Image-Codec
Microsoft-Windows-TaskScheduler
Microsoft-Windows-osk
Microsoft-Windows-Kernel-PowerTrigger
Microsoft-Windows-EventLog-WMIProvider
Microsoft-Windows-IME-OEDCompiler
Microsoft-Windows-WER-SystemErrorReporting
Microsoft-Windows-Deplorch
Microsoft-Windows-SPB-HIDI2C
Microsoft-Windows-UxTheme
Microsoft-Windows-BfeTriggerProvider
Microsoft-Windows-Media-Streaming
Microsoft-Windows-Remotefs-UTProvider
Microsoft-Windows-Ntfs-SQM
Microsoft-Windows-User-PnP
Microsoft-Windows-AltTab
Microsoft-Windows-Kernel-StoreMgr
Microsoft-Windows-WindowsColorSystem
Microsoft-Windows-RemoteDesktopServices-RemoteFX-VM-User-Mode-Transport
Microsoft-Windows-MSMPEG2ADEC
Microsoft-Windows-TerminalServices-PnPDevices
Microsoft-Windows-GettingStarted
Microsoft-Windows-Narrator
Windows Wininit Trace
Microsoft-Windows-FileHistory-UI
Microsoft-Windows-MediaFoundation-PlayAPI
Microsoft-Windows-CertificateServicesClient-Lifecycle-System
Microsoft-Windows-BitLocker-Driver-Performance
Microsoft-Windows-PerfProc
Microsoft-Windows-Resource-Leak-Diagnostic
Microsoft-Windows-WebServices
Microsoft-Windows-FileHistory-Service
Microsoft-Windows-MediaEngine
Microsoft-Windows-StartupRepair
Microsoft-Windows-Security-IdentityStore
Microsoft-Windows-IME-SCSetting
Microsoft-Windows-FileHistory-EventListener
Microsoft-Windows-Program-Compatibility-Assistant
Microsoft-Windows-DesktopActivityModerator
Microsoft-Windows-MemoryDiagnostics-Schedule
Microsoft-Windows-FileHistory-Engine
Microsoft-Windows-PerfDisk
Microsoft-Windows-OOBE-Machine-Core
Microsoft-Windows-WLAN-AutoConfig
Microsoft-Windows-FileHistory-ConfigManager
Microsoft-Windows-Search-ProfileNotify
Microsoft-Windows-PerfCtrs
UMPass Driver Trace
Microsoft-Windows-FileHistory-Catalog
Microsoft-Windows-WlanDlg
Microsoft-Windows-CDROM
Microsoft-Windows-Crypto-NCrypt
Certificate Services Client CredentialRoaming Trace
Microsoft-Windows-CredUI
Windows Firewall Service
Microsoft-Windows-FileHistory-Core
Microsoft-Windows-Direct3D11
Microsoft-Windows-DirectoryServices-Deployment
Microsoft-Windows-All-User-Install-Agent
Microsoft-Windows-Kernel-Licensing-StartServiceTrigger
Microsoft-Windows-ServerManager-ManagementProvider
Microsoft-Windows-Diagnosis-ScriptedDiagnosticsProvider
Microsoft-Windows-IIS-W3SVC-WP
Microsoft-Windows-TerminalServices-MediaRedirection-DShow
Microsoft-Windows-Rdms-UI
Microsoft-Windows-Feedback-Service-TriggerProvider
Microsoft-Windows-Eventlog
Microsoft-Windows-CodeIntegrity
Microsoft-Windows-WPDClassInstaller
Microsoft-Windows-NetworkAccessProtection
Microsoft-Windows-UIAutomationCore
Microsoft-Windows-StartLmhosts
Microsoft-Windows-IME-Broker
Microsoft-Windows-Kernel-Process
Microsoft-Windows-CertificateServicesClient
Microsoft-Windows-AppXDeployment
Microsoft-Windows-Shell-Core
Microsoft-Windows-Anytime-Upgrade
Microsoft-Windows-PCI
Microsoft-Windows-WPD-MTPBT
Microsoft-Windows-CertificationAuthorityClient-CertCli
Microsoft-Windows-Srv2
Microsoft-Windows-TunnelDriver-SQM-Provider
Microsoft-Windows-Security-Licensing-SLC
Microsoft-Windows-ATAPort
Microsoft-Windows-Recovery
Microsoft-Windows-GenericRoaming
Microsoft-Windows-Sdbus-SQM
Microsoft-Windows-DirectComposition
Microsoft-Windows-P2PIMSvc
Microsoft-Windows-WCN-Config-Registrar
Microsoft-Windows-WPD-API
Microsoft-Windows-P2P-PNRP
Microsoft-Windows-DeviceUx
Windows Mobile Performance Hooks
Microsoft-Windows-ProcessStateManager
Windows Connect Now
Microsoft-Windows-Networking-RealTimeCommunication
Microsoft-Windows-EventSystem
Microsoft-Windows-Spaceport
Windows Mobile Remote API
Microsoft-Windows-Dhcp-Nap-Enforcement-Client
Microsoft-Windows-WinNat
Windows Mobile AirSync Engine 2
Microsoft-Windows-WCN-Config-Registrar-Secure
Windows Mobile AirSync Engine 1
Microsoft-Windows-Security-Kerberos
Windows Mobile ActiveSync Engine
Microsoft-Windows-WSC-SRV
Microsoft-Windows-Eventlog-ForwardPlugin
Windows Mobile Serial Connectivity
Microsoft-Windows-TerminalServices-SessionBroker-Client
Microsoft-Windows-WMPNSS-PublicAPI
Windows Mobile Desktop Passthrough
Microsoft-Windows-RPC-Events
Microsoft-Windows-LanguageProfile
Microsoft-Windows-Anytime-Upgrade-Events
Microsoft-Windows-Management-UI
Microsoft-Windows-SMBClient
Microsoft-Windows-TerminalServices-RdpSoundDriver
Microsoft-Windows-Dwm-Api
Microsoft-Windows-QoS-qWAVE
Microsoft-Windows-Kernel-Tm-Trigger
Microsoft-Windows-IPNAT
Microsoft-Windows-NetworkBridge
Microsoft-Windows-MPS-CLNT
Microsoft-Windows-Diagnosis-Scheduled
Microsoft-Windows-WMPNSS-Service
Microsoft-Windows-DxpTaskRingtone
Microsoft-Windows-Kernel-AppCompat
Microsoft-Windows-TimeBroker
Microsoft-Windows-DeviceConfidence
Microsoft-Windows-Shell-Shwebsvc
Microsoft-Windows-Diagnostics-Performance
Windows NetworkMap Trace
Microsoft-Windows-TerminalServices-Printers
Microsoft-Windows-AppLocker
Microsoft-Windows-Audio
Microsoft-Windows-LLTD-MapperIO
Microsoft-Windows-HotspotAuth
Microsoft-Windows-Firewall-CPL
Microsoft-Windows-Kernel-IoTrace
Microsoft-Windows-Perflib
Microsoft-Windows-BootUX
Microsoft-Windows-WMPDMCUI
Microsoft-Windows-Disk
Microsoft-Windows-IME-JPLMP
Microsoft-Windows-Security-SPP-UX-Notifications
Microsoft-Windows-TerminalServices-ClientActiveXCore
Microsoft-Windows-IIS-IISReset
Microsoft-Windows-WindowsUIImmersive
Windows Firewall Control Panel
Microsoft-Windows-DeviceSetupManager
Microsoft-Windows-EnrollmentPolicyWebService
Microsoft-Windows-IME-Roaming
Microsoft-Windows-SetupQueue
Microsoft-Windows-SmartCard-Audit
Microsoft-Windows-Servicing
Microsoft-Windows-ACL-UI
Microsoft-Windows-WWAN-CFE
Microsoft-Windows-FCRegSvc
Microsoft-Windows-IIS-IisMetabaseAudit
Microsoft-Windows-Kernel-WDI
Microsoft-Windows-TabletPC-MathInput
Microsoft-Windows-Kernel-General
Windows Media Player Trace
Microsoft-Windows-DxpTaskDLNA
Microsoft-Windows-User Profiles General
Microsoft-Windows-Kernel-WSService-StartServiceTrigger
Microsoft-Windows-WebAuth
Microsoft-Windows-API-Tracing
Microsoft-Windows-FunctionDiscovery
Microsoft-Windows-StickyNotes
Microsoft-Windows-WCN-WscEapPeer-Trace
Microsoft-Windows-QoS-WMI-Diag
Microsoft-Windows-NetworkProvisioning
Microsoft-Windows-Network-DataUsage
Microsoft-Windows-AppSruProv
Microsoft-Windows-WebcamExperience
Microsoft-Windows-EaseOfAccess
Microsoft-Windows-Spellchecking-Host
Microsoft-Windows-IME-CandidateUI
Microsoft-Windows-TPM-WMI
Microsoft-Windows-Security-SPP
Microsoft-Windows-DirectShow-KernelSupport
Microsoft-Windows-Diagnosis-AdvancedTaskManager
Microsoft-Windows-ThemeCPL
Windows Mobile Co-installer
Microsoft-Windows-MPRMSG
Microsoft-Windows-EnhancedStorage-EhStorCertDrv
Microsoft-Windows-NdisImPlatformEventProvider
Microsoft-Windows-FunctionDiscoveryHost
Microsoft-Windows-MediaFoundation-MSVideoDSP
Microsoft-Windows-IME-JPTIP
Windows Kernel Trace
Microsoft-SQLServerDataTools
Microsoft-Windows-ASN1
Microsoft-Windows-Crypto-BCrypt
Microsoft-Windows-HealthCenterCPL
Microsoft-Windows-XAML
Microsoft-Windows-PDFReader
Microsoft-Windows-TerminalServices-ServerUSBDevices
Microsoft-Windows-WWAN-SVC-EVENTS
Microsoft-Windows-Search-ProtocolHandlers
Microsoft-Windows-IdCtrls
Microsoft-Windows-User-ControlPanel
Microsoft-Windows-Runtime-Media
Microsoft-Windows-CAPI2
Windows Mobile Sync Handlers
Microsoft-Windows-PowerCfg
Microsoft-Windows-SrumTelemetry
Microsoft-Windows-Base-Filtering-Engine-Connections
Microsoft-Windows-Sidebar
Microsoft-Windows-NDF-HelperClassDiscovery
Microsoft-Windows-PerfNet
Microsoft-Windows-PortableDeviceStatusProvider
Microsoft-Windows-TabletPC-Platform-Manipulations
Microsoft-Windows-Subsys-SMSS
Microsoft-Windows-LDAP-Client
Microsoft-Windows-Security-SPP-UX-GC
Microsoft-Windows-Media Center Extender
Microsoft-Windows-DiskDiagnostic
Microsoft-Windows-TSF-msutb
Microsoft-Windows-Reliability-Analysis-Agent
{B6501BA0-C61A-C4E6-6FA2-A4E7F8C8E7A0}
Microsoft-Windows-Kernel-Processor-Power
Microsoft-Windows-NCSI
Microsoft-Windows-NetworkConnectivityStatus
Microsoft-Windows-wmvdecod
Microsoft-Windows-ServiceTriggerPerfEventProvider
Microsoft-Windows-Service Pack Installer
Microsoft-Windows-Bluetooth-HidGatt
Microsoft-Windows-TabletPC-Platform-Input-Ninput
Microsoft-Windows-Tcpip-SQM-Provider
Microsoft-Windows-MPS-SRV
Microsoft-Windows-KnownFolders
Microsoft-Windows-NAPIPSecEnf
Microsoft-Windows-EnrollmentWebService
Microsoft-Windows-Deduplication-Change
Microsoft-Windows-OfflineFiles-CscFastSync
Microsoft-Windows-UxInit
Microsoft-Windows-BranchCacheClientEventProvider
Microsoft-Windows-Forwarding
Microsoft-Windows-RPC-Proxy-LBS
Microsoft-Windows-Kernel-Disk
Microsoft-Windows-TriggerEmulatorProvider
Microsoft-Windows-SystemHealthAgent
Microsoft-Windows-Memory-Diagnostic-Task-Handler
Microsoft-Windows-Winsock-WS2HELP
Microsoft-Windows-ThemeUI
Microsoft-Windows-TerminalServices-MediaRedirection
Microsoft-Windows-TerminalServices-ClientUSBDevices
Microsoft-Windows-TabletPC-CoreInkRecognition
Microsoft-Windows-COM
Microsoft-Windows-PnPMgrTriggerProvider
Microsoft-Windows-LoadPerf
Microsoft-Windows-System-Restore
Microsoft-Windows-UserAccountControl
Microsoft-Windows-Services-Svchost
Microsoft-Windows-PushNotifications-Developer
Microsoft-Windows-LiveId
Microsoft-Windows-Security-SPP-UX
Microsoft-Windows-VAN
Microsoft-Windows-FirstUX-PerfInstrumentation
Microsoft-Windows-Kernel-Tm
Microsoft-Windows-Kernel-ShimEngine
Microsoft-Windows-EapHost
Microsoft-Windows-CertPolEng
Microsoft-Windows-MsLbfoEventProvider
Microsoft-Windows-Complus
Microsoft-Windows-EFS
Microsoft-Windows-WwaHost
Microsoft-Windows-ServerManager
Microsoft-Windows-ComDlg32
Microsoft-Windows-MP4SDECD
Microsoft-Windows-PeopleNearMe
Microsoft-Windows-SmartCard-Bluetooth-Profile
Microsoft-Windows-TZUtil
Microsoft-Windows-ApplicationExperience-SwitchBack
Microsoft-Windows-UI-Input-Inking
Microsoft-Windows-VDRVROOT
Windows Firewall NetShell Plugin
Windows Firewall API
Microsoft-Windows-Kernel-Acpi
Microsoft-Windows-WinRM
Microsoft-Windows-Direct3D10_1
Microsoft-Windows-Kernel-LicensingSqm
Microsoft-Windows-SpoolerSpoolss
Microsoft-Windows-FilterManager
Microsoft-Windows-ActionQueue
Microsoft-Windows-IME-KRAPI
Microsoft-Windows-Resource-Exhaustion-Detector
Microsoft-Windows-ApplicationExperienceInfrastructure
Microsoft-Windows-StorSqm
Microsoft-Windows-Search
Microsoft-Windows-HttpEvent
Microsoft-Windows-AxInstallService
Microsoft-Windows-Diagnosis-PerfHost
Microsoft-Windows-International
Microsoft-Windows-CertificateServicesClient-CredentialRoaming
Microsoft-Windows-SoftwareRestrictionPolicies
Microsoft-Windows-Windows Defender
Microsoft-Windows-ShareMedia-ControlPanel
Microsoft-Windows-CertificateServicesClient-Lifecycle-User
Microsoft-Windows-WPD-MTPUS
Microsoft-Windows-DirectWrite
Microsoft-Windows-RPCSS
Microsoft-Windows-DeviceSync
Microsoft-Windows-NcdAutoSetup
Microsoft-Windows-Diagnosis-PCW
Microsoft-Windows-DistributedCOM
ATA Port Driver Tracing Provider
Microsoft-Windows-WebdavClient-LookupServiceTrigger
Microsoft-Windows-USB-USBXHCI
Microsoft-Windows-Diagnosis-PLA
Microsoft-Windows-WlanConn
Microsoft-Windows-Winlogon
Microsoft-Windows-stobject
Microsoft-Windows-Mobile-Broadband-Experience-SmsRouter
Microsoft-Windows-D3D10Level9
Microsoft-Windows-WAS-ListenerAdapter
Microsoft-Windows-ServerManager-MultiMachine
Microsoft-Windows-AppxPackagingOM
Microsoft-Windows-PushNotifications-Platform
Microsoft-Windows-OOBE-Machine-Plugins-Wireless
Microsoft-Windows-IME-JPAPI
SBP2 Port Driver Tracing Provider
Microsoft-Windows-BranchCacheEventProvider
Microsoft-Windows-Immersive-Shell-API
Microsoft-Windows-ntshrui
Microsoft-Windows-KPSSVC
Microsoft-Windows-BitLocker-DrivePreparationTool
Microsoft-Windows-EapMethods-Sim
Microsoft-Windows-Shell-ZipFolder
Microsoft-Windows-Search-Core
Microsoft-Windows-OfflineFiles-CscNetApi
Microsoft-Windows-Diagnosis-WDI
Microsoft-Windows-PortableDeviceSyncProvider
Microsoft-Windows-Diagnostics-PerfTrack-Counters
Microsoft-Windows-Speech-TTS
Microsoft-Windows-Component-Resources-MrmCore-Events
Microsoft-Windows-BranchCache
Microsoft-Windows-SystemEventsBroker
Microsoft-Windows-VolumeControl
Microsoft-Windows-Win32k
Microsoft-Windows-Kernel-WHEA
Microsoft-Windows-P2P-Meetings
Microsoft-Windows-Diagnosis-WDC
Microsoft-Windows-Serial-ClassExtension
Microsoft-Windows-KPSSVC-WPP
Microsoft-Windows-CertificateServices-Deployment
Microsoft-Windows-PerfOS
Microsoft-Windows-ResetEng
Microsoft-Windows-Runtime-Graphics
Microsoft-Windows-IPSEC-SRV
Microsoft-Windows-CorruptedFileRecovery-Server
Windows Mobile Bluetooth Connectivity
Microsoft-Windows-DLNA-Namespace
Microsoft-Windows-WLAN-MediaManager
Certificate Services Client Trace
Microsoft-Windows-BranchCacheSMB
Microsoft-Windows-PrintService-USBMon
Microsoft-Windows-OOBE-Machine
Microsoft-Windows-DXP
Microsoft-Windows-Immersive-Shell
Microsoft-Windows-OOBE-Machine-Plugins
Microsoft-Windows-Reliability-Analysis-Engine
Microsoft-Windows-Application-Experience
Microsoft-Windows-KdsSvc
Microsoft-Windows-MediaFoundation-Platform
Microsoft-Windows-Security-Configuration-Wizard
Microsoft-Windows-DisplayColorCalibration
Windows Mobile Device Center Base
Microsoft-Windows-WPD-MTPClassDriver
Microsoft-Windows-DNS-Client
Microsoft-Windows-MSDTC Client
Microsoft-Windows-NDIS-PacketCapture
Windows Remote Management Trace
Microsoft-Windows-MSPaint
Microsoft-Windows-HomeGroup-ListenerService
Microsoft-Windows-Sensor-Service-Trigger
Microsoft-Windows-EapMethods-Ttls
Microsoft-Windows-Remotefs-Smb
Microsoft-Windows-SMBWitnessClient
Microsoft-Windows-USB-USBHUB
Microsoft-Windows-DirectWrite-FontCache
Microsoft-Windows-WindowsBackup
Microsoft-Windows-NWiFi
Microsoft-Windows-WER-Diag
Microsoft-Windows-UAC
Microsoft-Windows-LUA
Microsoft-Windows-AppID
Microsoft-Windows-IIS-WMSVC
Microsoft-Windows-Shell-OpenWith
Microsoft-Windows-MediaFoundation-MFReadWrite
Microsoft-Windows-BrokerInfrastructure
Microsoft-Windows-Fault-Tolerant-Heap
Microsoft-Windows-Shell-DefaultPrograms
Microsoft-Windows-Dism-Cli
Microsoft-Windows-SMBDirect
Microsoft-Windows-IME-SCTIP
Microsoft-Windows-EnergyEfficiencyWizard
Microsoft-Windows-ParentalControls
Microsoft-Windows-Smartcard-Server
Microsoft-Windows-FMS
Microsoft-Windows-Devices-Location
Microsoft-Windows-LLTD-Responder
Microsoft-Windows-MsLbfoSysEvtProvider
sqlos
Microsoft-Windows-TerminalServices-RemoteConnectionManager
Microsoft-Windows-SCPNP
Microsoft-Windows-Wordpad
WMI_Tracing_Client_Operations
Microsoft-Windows-Security-Audit-Configuration-Client
Microsoft-Windows-EFSADU
Windows Notification Facility Provider
Microsoft-Windows-DiagCpl
Windows NetworkItemFactory Trace
Microsoft-Windows-ApplicationExperience-Cache
Microsoft-Windows-ResourcePublication
Microsoft-Windows-FailoverClustering-Client
Microsoft-Windows-Runtime-Networking-BackgroundTransfer
Microsoft-Windows-AppHost
Microsoft-Windows-NetAdapterCim-Diag
Microsoft-Windows-IIS-FTP
Microsoft-Windows-Iphlpsvc
Microsoft-Windows-WinINet
Microsoft-Windows-TabletPC-InputPersonalization
Microsoft-Windows-SpoolerFilterPipelineSVC
Microsoft-Windows-Globalization
Microsoft-Windows-Bits-Client
Microsoft-Windows-WFP
Microsoft-Windows-Services
Microsoft-Windows-IdleTriggerProvider
Microsoft-Windows-DxgKrnl
Microsoft-Windows-HealthCenter
Microsoft-Windows-OtpCredentialProviderEvt
Microsoft-Windows-MemoryDiagnostics-Results
Microsoft-Windows-Ncasvc
Microsoft-Windows-SystemSettings
Microsoft-Windows-PDH
Microsoft-Windows-WMPNSSUI
Microsoft-Windows-BdeTriggerProvider
Microsoft-Windows-Diagnostics-PerfTrack
Microsoft-Windows-IIS-APPHOSTSVC
Microsoft-Windows-CoreWindow
Microsoft-Windows-Help
Microsoft-Windows-WindowsUpdateClient
Microsoft-Windows-IIS-W3SVC-PerfCounters
Microsoft-Windows-WMI
Microsoft-Windows-TabletPC-Platform-Input-Wisp
Microsoft-Windows-ProcessExitMonitor
Microsoft-Windows-IME-JPSetting
Microsoft-Windows-Diagnosis-Scripted
Microsoft-Windows-GroupPolicyTriggerProvider
File Kernel Trace; Operation Set 2
Microsoft-Windows-IIS-Configuration
Microsoft-Windows-Diagnosis-TaskManager
Microsoft-Windows-Diagnosis-DPS
Microsoft-Windows-UserPnp
Microsoft-Windows-Security-SPP-UX-GenuineCenter-Logging
Microsoft-Windows-Schannel-Events
NetJoin
Microsoft-Windows-TabletPC-InputPanel
Microsoft-Windows-FileServices-ServerManager-EventProvider
Microsoft-Windows-MediaFoundation-Performance
Microsoft-Windows-EndpointTriggerProvider
Microsoft-Windows-IME-KRTIP
Microsoft-Windows-Mobile-Broadband-Experience-SmsApi
Microsoft-Windows-Hyper-V-Netvsc
Microsoft-Windows-DirectSound
Microsoft-Windows-TabletPC-Platform-Input-Core
Microsoft-Windows-PushNotifications-InProc
Microsoft-Windows-Kernel-Network
Microsoft-Windows-DiskDiagnosticResolver
Microsoft-Windows-NdisImPlatformSysEvtProvider
Microsoft-Windows-MeetingSpace
Microsoft-Windows-Base-Filtering-Engine-Resource-Flows
Microsoft-Windows-RasServer
Microsoft-Windows-VHDMP
Microsoft-Windows-WindowsSystemAssessmentTool
Microsoft-Windows-DCLocator
Microsoft-Windows-Diagnosis-MSDT
Microsoft-Windows-WLGPA
SQLSRV32.1
Microsoft-Windows-CertificateServicesClient-CertEnroll
Microsoft-Windows-IME-TCCORE
Microsoft-Windows-SmartCard-Bluetooth-Transport
Microsoft-Windows-WMVENCOD
Microsoft-Windows-mobsync
Microsoft-Windows-EFSTriggerProvider
Microsoft-Windows-DUSER
Microsoft-Windows-DiskDiagnosticDataCollector
Microsoft-Windows-DirectAccess-MediaManager
Microsoft-Windows-DisplaySwitch
Microsoft-Windows-PackageStateRoaming
Microsoft-Windows-Crypto-DPAPI
Microsoft-Windows-IME-CustomerFeedbackManagerUI
sqlserver
Microsoft-Windows-User-Loader
Microsoft-Windows-NetworkProfileTriggerProvider
Microsoft-Windows-NetworkProfile
Windows Firewall API - GP
Microsoft-Windows-CmiSetup
Microsoft-Windows-Sysprep
Microsoft-Windows-Windeploy
Microsoft-Windows-Setup
Microsoft-Windows-OobeLdr
Microsoft-Windows-SetupUGC
Microsoft-Windows-Audit
Microsoft-Windows-SetupCl
Microsoft-Windows-Winsrv
Microsoft-Windows-WinHttp
Microsoft-Windows-RadioManager
Microsoft-Windows-Websocket-Protocol-Component
Microsoft-Windows-WebIO
Microsoft-Windows-Dwm-Core
Microsoft-Windows-Registry-SQM-Provider
Microsoft-Windows-WHEA-Logger
Microsoft-Windows-PeerToPeerDrtEventProvider
Microsoft-Windows-BitLocker-Driver
Microsoft-Windows-SettingSync
Microsoft-Windows-Mobile-Broadband-Experience-Api-Internal
Microsoft-Windows-EnhancedStorage-EhStorTcgDrv
Microsoft-Windows-PowerShell
Microsoft-Windows-DirectShow-Core
Microsoft-Windows-Kernel-Power
Microsoft-Windows-msmpeg2venc
Microsoft-Windows-MPEG2_DLNA-Encoder
Microsoft-Windows-Remote-FileSystem-Log
Microsoft-Windows-Kernel-PnP
Microsoft-Windows-AppXDeployment-Server
Microsoft-Windows-Folder Redirection
Microsoft-Windows-OfflineFiles-CscUM
Microsoft-Windows-ServerManager-DeploymentProvider
Microsoft-Windows-ServiceReportingApi
Microsoft-Windows-StorDiag
Microsoft-Windows-IME-CustomerFeedbackManager
Microsoft-Windows-Kernel-EventTracing
Microsoft-Windows-Kernel-BootDiagnostics
Microsoft-Windows-DXGI
Microsoft-Windows-Build-RegDll
Microsoft-Windows-PNRPSvc
Microsoft-Windows-Ndu
Microsoft-Windows-Firewall
Microsoft-Windows-Wcmsvc
Microsoft-Windows-OLEACC
Microsoft-Windows-MSDTC Client 2
Microsoft-Windows-InputSwitch
Microsoft-Windows-Runtime-WebAPI
Microsoft-Windows-HAL
Microsoft-Windows-International-RegionalOptionsControlPanel
Microsoft-Windows-RPC
Microsoft-Windows-MFH264Enc
Microsoft-Windows-SharedAccess_NAT
Microsoft-Windows-DeviceAssociationService
Microsoft-Windows-Bluetooth-MTPEnum
Microsoft-Windows-BitLocker-API
{C5BFFE2E-9D87-D568-A09E-08FC83D0C7C2}
Microsoft-Windows-IPMIProvider
Microsoft-Windows-IME-TIP
Microsoft-Windows-WindowsToGo-StartupOptions
Microsoft-Windows-Backup
Microsoft-Windows-WMP-MediaDeliveryEngine
Microsoft-Windows-PrintBRM
Microsoft-Windows-ServerManager-ConfigureSMRemoting
Microsoft-Windows-Video-For-Windows
Microsoft-Windows-ClearTypeTextTuner
Microsoft-Windows-Subsys-Csr
Microsoft-Windows-USB-UCX
Microsoft-Windows-RemoteApp and Desktop Connections
Windows Winlogon Trace
Microsoft-Windows-RasSstp
Microsoft-Windows-UAC-FileVirtualization
Microsoft-Windows-ClassicSruMon
Microsoft-Windows-Security-IdentityListener
Microsoft-Windows-WWAN-MM-EVENTS
Microsoft-Windows-MsiServer
Microsoft-Windows-PhotoAcq
Microsoft-Windows-Power-Troubleshooter
Microsoft-Windows-DxpTaskSyncProvider
Microsoft-Windows-Remotefs-Rdbss
Microsoft-Windows-AppIDServiceTrigger
Microsoft-Windows-Kernel-File
Microsoft-Windows-TSF-msctf
Microsoft-Windows-PowerCpl
Microsoft-Windows-LanGPA
Microsoft-Windows-WWAN-MediaManager
Microsoft-Windows-PrimaryNetworkIcon
Microsoft-Windows-OfflineFiles
Microsoft-Windows-UIAnimation
Microsoft-Windows-Security-Auditing
Microsoft-Windows-WCN-Config-Registrar-Wizard-Trace
Microsoft-Windows-WWAN-NDISUIO-EVENTS
Microsoft-Windows-NetworkManagerTriggerProvider
Microsoft-Windows-Winsock-AFD
Microsoft-Windows-Remote-FileSystem-Monitor
Microsoft-Windows-WABSyncProvider
.NET Common Language Runtime
Microsoft-Windows-MSMPEG2VDEC
Microsoft-Windows-DateTimeControlPanel
Windows Firewall Driver
Microsoft-Windows-IIS-W3SVC
Microsoft-Windows-WWAN-UI-EVENTS
Microsoft-Windows-Speech-UserExperience
Microsoft-Windows-Dism-Api
Microsoft-Windows-Store-Client-UI
Microsoft-Windows-Calculator
Microsoft-Windows-Shell-ConnectedAccountState
Microsoft-Windows-PrintDialogs
Microsoft-Windows-Network-and-Sharing-Center
Microsoft-Windows-Crypto-RNG
Microsoft-Windows-MSDTC 2
Microsoft-Windows-SpellChecker
Microsoft-Windows-propsys
Microsoft-Windows-WPD-MTPIP
Microsoft-Windows-Documents
Microsoft-Windows-StorPort
Microsoft-Windows-Magnification
Microsoft-Windows-Shell-AuthUI
Microsoft-Windows-Dwm-Redir
Microsoft-Windows-BTH-BTHUSB
Microsoft-Windows-Ntfs
Microsoft-Windows-Sens
Microsoft-Windows-UserAccessLogging
Microsoft-Windows-RemoteDesktopServices-RdpCoreTS
Microsoft-Windows-COM-Perf
Microsoft-Windows-StorageSpaces-BackgroundAgent
Microsoft-Windows-Kernel-Prefetch
Portable Device Connectivity API Trace
Microsoft-Windows-RemoteAssistance
Microsoft-Windows-MF
Microsoft-Windows-MediaFoundation-MSVProc
Microsoft-Windows-TBS
Microsoft-Windows-FeedbackTool
Microsoft-Windows-WlanPref
Microsoft-Windows-OfflineFiles-CscDclUser
Microsoft-Windows-Http-SQM-Provider
Microsoft-Windows-Wireless-Network-Setup-Wizard-Trace
Microsoft-Windows-MCT
Microsoft-Windows-HotStart
Microsoft-Windows-Diagnostics-Networking
Microsoft-Windows-Sensors
Microsoft-Windows-SmbServer
Microsoft-Windows-USB-USBHUB3
Microsoft-Windows-Dot3MM
Microsoft-Windows-KernelStreaming
Microsoft-Windows-Mobile-Broadband-Experience-Api
Microsoft-Windows-VolumeSnapshot-Driver
Microsoft-Windows-MobilityCenter
Microsoft-Windows-OfflineFiles-CscService
Microsoft-Windows-Superfetch
Microsoft-Windows-IPBusEnum
Microsoft-Windows-Mprddm
Microsoft-Windows-Dwm-Udwm
Microsoft-Windows-AppModel-State
Microsoft-Windows-WCN-FD-Provider-Trace
Microsoft-Windows-Resource-Exhaustion-Resolver
Microsoft-Windows-Iphlpsvc-Trace
Microsoft-Windows-WUSA
Microsoft-Windows-TerminalServices-LocalSessionManager
Microsoft-Windows-RPC-FirewallManager
Microsoft-Windows-WCN-Common-Trace
Microsoft-Windows-MediaFoundation-MFCaptureEngine
Microsoft-Windows-ReadyBoostDriver
Microsoft-Windows-DUI
Microsoft-Windows-WMP-Setup_WM
Microsoft-Windows-Direct3D10
Microsoft-Windows-DfsSvc
Microsoft-Windows-IME-SCCORE
Microsoft-Windows-NTLM
Microsoft-Windows-VWiFi
Microsoft-Windows-Kernel-PnPConfig
Microsoft-Windows-Winsock-SQM
Microsoft-Windows-SpoolerSpoolSV
Microsoft-Windows-Netshell
Microsoft-Windows-UserModePowerService
Microsoft-Windows-HttpService
HTTP Service Trace
Microsoft-Windows-D3D9
Microsoft-Windows-AppModel-Runtime
Microsoft-Windows-CEIP
Microsoft-Windows-Directory-Services-SAM
Microsoft-Windows-SpoolerTCPMon
Microsoft-Windows-ReadyBoost
Microsoft-Windows-L2NACP
Microsoft-Windows-LLTD-Mapper
Microsoft-Windows-Deduplication
Microsoft-Windows-HomeGroup-ControlPanel
Microsoft-Windows-Mobile-Broadband-Experience-Parser-Task
Microsoft-Windows-DomainJoinManagerTriggerProvider
Microsoft-Windows-SruMon
Microsoft-Windows-ELS-Hyphenation
TCPIP Service Trace
Microsoft-Windows-DriverFrameworks-KernelMode
Microsoft-Windows-CorruptedFileRecovery-Client
Microsoft-Windows-WMI-Activity
Microsoft-Windows-COMRuntime
Microsoft-Windows-WAS
Microsoft-Windows-Wnv
Microsoft-Windows-Shsvcs
Microsoft-Windows-NDIS
Microsoft-Windows-WinMDE
File Kernel Trace; Operation Set 1
Microsoft-Windows-Proximity-Common
Microsoft-Windows-Ntfs-UBPM
Microsoft-Windows-Kernel-Registry
Microsoft-Windows-RemoteDesktopServices-RemoteDesktopSessionManager
Microsoft-Windows-TunnelDriver
Microsoft-Windows-QoS-Pacer
Microsoft-Windows-EventCollector
Microsoft-Windows-OOBE-Machine-DUI
Microsoft-Windows-IME-TCTIP
Microsoft-Windows-WCNWiz
Microsoft-Windows-Display
Microsoft-Windows-OcSetup
Microsoft-Windows-DesktopWindowManager-Diag
Microsoft-Windows-FileInfoMinifilter
Microsoft-Windows-TextPredictionEngine
Microsoft-Windows-NetworkGCW
Microsoft-Windows-DHCPv6-Client
Microsoft-Windows-PlayToManager
NDIS_STATUS_TCP_CONNECTION_OFFLOAD_CURRENT_CONFIG
NDIS_STATUS_PORT_STATE
MS_Windows_AeLookupServiceTrigger_Provider
Microsoft_Windows_SQM_Provider
MS_Windows_AIT_Provider
NDIS_TCP_CONNECTION_OFFLOAD_CURRENT_CONFIG
NDIS_TCP_OFFLOAD_CURRENT_CONFIG
PARPORT_WMI_ALLOCATE_FREE_COUNTS_GUID
NDIS_GEN_ENUMERATE_PORTS
GUID_QOS_TC_SUPPORTED
MS1394_PortVendorRegisterAccessGuid
iSCSI_PersistentLoginsGuid
iSCSI_PortalInfoClassGuid
SerailPortPerfGuid
PortClsEvent
UdpIpGuid
TcpIpGuid
iSCSI_OperationsGuid
CTLGUID_usbport
NDIS_STATUS_TCP_CONNECTION_OFFLOAD_HARDWARE_CAPABILITIES
iSCSI_DiscoveryOperationsGuid
SerialPortNameGuid
CTLGUID_WebClntTrace
POINTER_PORT_WMI_STD_DATA_GUID
KEYBOARD_PORT_WMI_STD_DATA_GUID
MSKeyboard_ClassInformationGuid
NDIS_GEN_CO_MEDIA_SUPPORTED
MS_Windows_AeSwitchBack_Provider
SerialPortHWGuid
MS_SM_PortInformationMethods
ataport_CtlGuid
storport_CtlGuid
MS1394_PortDriverInformationGuid
BTHPORT_WMI_HCI_PACKET_INFO
SerialPortCommGuid
iScsiLBOperationsGuid
MS_Windows_AeCache_Provider
NDIS_GEN_PORT_STATE
WindowsBackup TracingControlGuid
WmiMonitorListedSupportedSourceModes_GUID
NDIS_GEN_MEDIA_SUPPORTED
CTLGUID_certprop
BTHPORT_WMI_SDP_SERVER_LOG_INFO
KEYBOARD_PORT_WMI_EXTENDED_ID
iSCSIRedirectPortalGuid
NDIS_GEN_PORT_AUTHENTICATION_PARAMETERS
BTHPORT_WMI_SDP_DATABASE_EVENT
NDIS_TCP_CONNECTION_OFFLOAD_HARDWARE_CAPABILITIES
iSCSI_TCPIPConfigGuid
SerialPortPropertiesGuid
PortCls_IrpProcessing
iSCSI_SecurityConfigOperationsGuid
NDIS_TCP_OFFLOAD_PARAMETERS
PortCls_PowerState
Microsoft_Windows_GameUx
iSCSI_InitiatorLoginStatisticsGuid
MS1394_PortErrorInformationGuid
PortCls_PinState
CTLGUID_PortCls
NDIS_TCP_OFFLOAD_HARDWARE_CAPABILITIES
CTRLGUID_MF_PIPELINE
.PX`i`
`.HBS
&{%UD(_
dump_wmi_guidentries failed, error %d, status %X
dump_wmi_guidentries failed, error %d
dump_wmi_guidentries: cannot alloc %X bytes (total %d)
dump_wmi_guidentries: read failed, error %d, status %X
dump_wmi_guidentries: read failed, error %d
WMI guidentries: total %X readed %X:
[%X] %X flag %X refcnt %X - %s
[%X] %X flag %X refcnt %X %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
dump_wmi_regentries failed, error %d, status %X
dump_wmi_regentries failed, error %d
dump_wmi_regentries: cannot alloc %X bytes (total %d)
dump_wmi_regentries: read failed, error %d, status %X
dump_wmi_regentries: read failed, error %d
WMI regentries: total %X readed %X:
[%X] flags %X refcnt %X dev %p prov %X DS %p %s
[%X] flags %X refcnt %X cb %p prov %X DS %p %s
Etw[%d]:
Type %X Index %X InternalCB %p (%s) %s
Type %X Index %X InternalCB %p %s
Type %X Index %X InternalCB %p (%s) ProviderId: %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
Type %X Index %X InternalCB %p ProviderId: %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
dump_Etw: exception occured, code %X
dump_Etws: exception occured, code %X
KPRCB.EtwSupport %p:
KPRCB[%d].EtwSupport %p:
read_kernel_etws count failed, error %d, ntstatus %X
read_kernel_etws count failed, error %d
read_kernel_etws: cannot alloc %X bytes
read_kernel_etws failed, error %d, ntstatus %X
read_kernel_etws failed, error %d
KEtw[%X]:
KEtw[%X]: RefCount %d, KProvider - %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
KEtw[%X]: RefCount %d %s
[%X] %p %s
Type %X InUse %d Index %X InternalCB %p (%s) %s
Type %X InUse %d Index %X InternalCB %p %s
Type %X InUse %d Index %X InternalCB %p (%s) ProviderId: %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
Type %X InUse %d Index %X InternalCB %p ProviderId: %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
EtwCallback[%d] %p %s:
EtwCallback[%d]:
EtwTrace[%d] %p Ctx %p %s:
EtwTrace[%d] %p Ctx %p %s - %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
Unknown type %d for Etw[%d]
DEVINTERFACE_MT_TRANSPORT
DEVINTERFACE_KEYBOARD
DEVINTERFACE_COMPORT
DEVINTERFACE_VIAMINIPORT
DEVINTERFACE_STORAGEPORT
DEVINTERFACE_IRPORT
check_pnp_notifiers failed, error %d, status %X
check_pnp_notifiers failed, error %d
check_pnp_notifiers: cannot alloc %X bytes (total %d)
check_pnp_notifiers: read failed, error %d, status %X
check_pnp_notifiers: read failed, error %d
Pnp Notifiers: total %d, readed %d
Pnp[%d] %p %s %s addr %p
Pnp[%d] %s %s addr %p %s
check_pnp_handlers failed, error %d, status %X
check_pnp_handlers failed, error %d
PlugPlayHandlerTable: %d items
PlugPlayHandlerTable[%d] %p %s
PlugPlayHandlerTable[%d] %p
check_sess_notify, error %d, status %X
check_sess_notify, error %d
check_sess_notify: cannot alloc %X bytes (total %d)
check_sess_notify: read failed, error %d, status %X
check_sess_notify: read failed, error %d
IopSessionNotifications: %d
SessionNotifier[%d]: class %d len %X session %p cb %p %s
check_sess_term_ntfs failed, error %d, status %X
check_sess_term_ntfs failed, error %d
check_sess_term_ntfs: cannot alloc %X bytes (total %d)
check_sess_term_ntfs: read failed, error %d, status %X
check_sess_term_ntfs: read failed, error %d
LogonSessionTerminatedRoutines: %d
[%d] %p %s
check_fs_changes failed, error %d, status %X
check_fs_changes failed, error %d
check_fs_changes: cannot alloc %X bytes (total %d)
check_fs_changes: read failed, error %d, status %X
check_fs_changes: read failed, error %d
FS Change notifiers: %d (actual %d)
DriverObj %p addr %p %s
Cannot read count for %s, error %d
Count of %s is too big - %X
Cannot read %s table, error %d
Cannot read entry %d from table of %s, error %d
check_vista_cmp_list get count failed, error %d, status %X
check_vista_cmp_list get count failed, error %d
check_vista_cmp_list failed, error %d, status %X
check_vista_cmp_list failed, error %d
check_ai_cbs: cannot read ExpDisQueryAttributeInformation, error %d, ntstatus %X
check_ai_cbs: cannot read ExpDisQueryAttributeInformation, error %d
ExpDisQueryAttributeInformation %p %s
check_ai_cbs: cannot read ExpDisSetAttributeInformation, error %d, ntstatus %X
check_ai_cbs: cannot read ExpDisSetAttributeInformation, error %d
ExpDisSetAttributeInformation %p %s
check_dbgk_lkmd: cannot read DbgkLkmd_cblist, error %d, ntstatus %X
check_dbgk_lkmd: cannot read DbgkLkmd_cblist, error %d
DbgkLkmd[%d] callback %p %s
check_fsrtl: cannot read FltMgrCallbacks, error %d, ntstatus %X
check_fsrtl: cannot read FltMgrCallbacks, error %d
FltMgrCallbacks: %p %s
check_fsrtl: cannot read FsRtlpMupCalls, error %d, ntstatus %X
check_fsrtl: cannot read FsRtlpMupCalls, error %d
FsRtlpMupCalls: %p %s
check_Iof: cannot read pIofCallDriver, error %d, ntstatus %X
check_Iof: cannot read pIofCallDriver, error %d
pIofCallDriver %p patched by %s
check_Iof: cannot read pIofCompleteRequest, error %d, ntstatus %X
check_Iof: cannot read pIofCompleteRequest, error %d
pIofCompleteRequest %p patched by %s
check_Iof: cannot read pIoAllocateIrp, error %d, ntstatus %X
check_Iof: cannot read pIoAllocateIrp, error %d
pIoAllocateIrp %p patched by %s
check_Iof: cannot read pIoFreeIrp, error %d, ntstatus %X
check_Iof: cannot read pIoFreeIrp, error %d
pIoFreeIrp %p patched by %s
check_Iof: cannot read HvlpHypercallCodeVa, error %d, ntstatus %X
check_Iof: cannot read HvlpHypercallCodeVa, error %d
HvlpHypercallCodeVa %p patched by %s
%SystemRoot%\System32\sxssrv.dll
%SystemRoot%\System32\csrsrv.dll
%SystemRoot%\System32\basesrv.dll
%SystemRoot%\System32\winsrv.dll
%SystemRoot%\System32\lsasrv.dll
%SystemRoot%\System32\ntdll.dll
KiDebugRoutine %p hooked by %s
PspLegoNotifyRoutine %p hooked by %s
KiTimeUpdateNotifyRoutine %p hooked by %s
KiSwapContextNotifyRoutine %p hooked by %s
KiThreadSelectNotifyRoutine %p hooked by %s
Sysenter patched, addr %p not in %s !!!
Mailslot: %S
NamedPipe: %S
DEVCLASS_MULTIPORTSERIAL
DEVCLASS_PORTS
DEVCLASS_KEYBOARD
DEVCLASS_APMSUPPORT
read_dev_chrs(%S) failed, ntstatus %X
DrvObj %p name %S %s
DrvObj %p nameLen %X %s
dev_props failed, status %X
ClassGUID: %S
ClassGUID: %S - %s
Cannot open directory %S, error %X
Cannot realloc %d bytes
Cannot open device directory, error %X
Cannot open driver directory, error %X
Cannot open FileSystem directory, error %X
Unknown HAL private dispatch table version %X
HalAcpiTimerInit: %p %s
HalAcpiTimerCarry: %p %s
HalAcpiMachineStateInit: %p %s
HalAcpiQueryFlags: %p %s
HalAcpiPicStateIntact: %p %s
HalRestoreInterruptControllerState: %p %s
HalPciInterfaceReadConfig: %p %s
HalPciInterfaceWriteConfig: %p %s
HalSetVectorState: %p %s
HalGetApicVersion: %p %s
HalSetMaxLegacyPciBusNumber: %p %s
HalIsVectorValid: %p %s
HalAcpiGetTableDispatch: %p %s
HalAcpiGetRsdpDispatch: %p %s
HalAcpiGetFacsMappingDispatch: %p %s
HalAcpiGetAllTablesDispatch: %p %s
HalAcpiPmRegisterAvailable: %p %s
HalAcpiPmRegisterRead: %p %s
HalAcpiPmRegisterWrite: %p %s
HalHandlerForBus: %p %s
HalHandlerForConfigSpace: %p %s
HalLocateHiberRanges: %p %s
HalRegisterBusHandler: %p %s
HalSetWakeEnable: %p %s
HalSetWakeAlarm: %p %s
HalPciTranslateBusAddress: %p %s
HalPciAssignSlotResources: %p %s
HalHaltSystem: %p %s
HalFindBusAddressTranslation: %p %s
HalResetDisplay: %p %s
HalHandlerForBus: %p %s
HalHandlerForConfigSpace: %p %s
HalLocateHiberRanges: %p %s
HalRegisterBusHandler: %p %s
HalSetWakeEnable: %p %s
HalSetWakeAlarm: %p %s
HalPciTranslateBusAddress: %p %s
HalPciAssignSlotResources: %p %s
HalHaltSystem: %p %s
HalFindBusAddressTranslation: %p %s
HalResetDisplay: %p %s
KdSetupPciDeviceForDebugging: %p %s
KdReleasePciDeviceforDebugging: %p %s
KdGetAcpiTablePhase0: %p %s
KdCheckPowerButton: %p %s
HalVectorToIDTEntry: %p %s
KdMapPhysicalMemory64: %p %s
KdUnmapVirtualAddress: %p %s
HalMmMemoryUsage: %p %s
HalAllocateMapRegisters: %p %s
KdGetPciDataByOffset: %p %s
KdSetPciDataByOffset: %p %s
HalGetInterruptVector: %p %s
HalGetVectorInput: %p %s
HalLoadMicrocode: %p %s
HalUnloadMicrocode: %p %s
HalMcUpdatePostUpdate: %p %s
HalAllocateMessageTarget: %p %s
HalFreeMessageTarget: %p %s
HalDpReplaceBegin: %p %s
HalDpReplaceTarget: %p %s
HalDpReplaceControl: %p %s
HalDpReplaceEnd: %p %s
HalPrepareForBugcheck: %p %s
HalQueryWakeTime: %p %s
HalReportIdleStateUsage: %p %s
HalHandlerForBus: %p %s
HalHandlerForConfigSpace: %p %s
HalLocateHiberRanges: %p %s
HalRegisterBusHandler: %p %s
HalSetWakeEnable: %p %s
HalSetWakeAlarm: %p %s
HalPciTranslateBusAddress: %p %s
HalPciAssignSlotResources: %p %s
HalHaltSystem: %p %s
HalFindBusAddressTranslation: %p %s
HalResetDisplay: %p %s
HalAllocateMapRegisters: %p %s
KdSetupPciDeviceForDebugging: %p %s
KdReleasePciDeviceforDebugging: %p %s
KdGetAcpiTablePhase0: %p %s
KdCheckPowerButton: %p %s
HalVectorToIDTEntry: %p %s
KdMapPhysicalMemory64: %p %s
KdUnmapVirtualAddress: %p %s
KdGetPciDataByOffset: %p %s
KdSetPciDataByOffset: %p %s
HalGetInterruptVector: %p %s
HalGetVectorInput: %p %s
HalLoadMicrocode: %p %s
HalUnloadMicrocode: %p %s
HalMcUpdatePostUpdate: %p %s
HalAllocateMessageTarget: %p %s
HalFreeMessageTarget: %p %s
HalDpReplaceBegin: %p %s
HalDpReplaceTarget: %p %s
HalDpReplaceControl: %p %s
HalDpReplaceEnd: %p %s
HalPrepareForBugcheck: %p %s
HalQueryWakeTime: %p %s
HalReportIdleStateUsage: %p %s
HalTscSynchronization: %p %s
HalWheaInitProcessorGenericSection: %p %s
HalStopLegacyUsbInterrupts: %p %s
HalReadWheaPhysicalMemory: %p %s
HalWriteWheaPhysicalMemory: %p %s
HalDpMaskLevelTriggeredInterrupts: %p %s
HalDpUnmaskLevelTriggeredInterrupts: %p %s
HalDpGetInterruptReplayState: %p %s
HalDpReplayInterrupts: %p %s
HalQueryIoPortAccessSupported: %p %s
HalHandlerForBus: %p %s
HalHandlerForConfigSpace: %p %s
HalLocateHiberRanges: %p %s
HalRegisterBusHandler: %p %s
HalSetWakeEnable: %p %s
HalSetWakeAlarm: %p %s
HalPciTranslateBusAddress: %p %s
HalPciAssignSlotResources: %p %s
HalHaltSystem: %p %s
HalFindBusAddressTranslation: %p %s
HalResetDisplay: %p %s
HalAllocateMapRegisters: %p %s
KdSetupPciDeviceForDebugging: %p %s
KdReleasePciDeviceforDebugging: %p %s
KdGetAcpiTablePhase0: %p %s
KdCheckPowerButton: %p %s
HalVectorToIDTEntry: %p %s
KdMapPhysicalMemory64: %p %s
KdUnmapVirtualAddress: %p %s
KdGetPciDataByOffset: %p %s
KdSetPciDataByOffset: %p %s
HalGetInterruptVector: %p %s
HalGetVectorInput: %p %s
HalLoadMicrocode: %p %s
HalUnloadMicrocode: %p %s
HalMcUpdatePostUpdate: %p %s
HalAllocateMessageTarget: %p %s
HalFreeMessageTarget: %p %s
HalDpReplaceBegin: %p %s
HalDpReplaceTarget: %p %s
HalDpReplaceControl: %p %s
HalDpReplaceEnd: %p %s
HalPrepareForBugcheck: %p %s
HalQueryWakeTime: %p %s
HalReportIdleStateUsage: %p %s
HalTscSynchronization: %p %s
HalWheaInitProcessorGenericSection: %p %s
HalStopLegacyUsbInterrupts: %p %s
HalReadWheaPhysicalMemory: %p %s
HalWriteWheaPhysicalMemory: %p %s
HalInterruptMaskLevelTriggeredLines: %p %s
HalInterruptUnmaskLevelTriggeredLines: %p %s
HalDpGetInterruptReplayState: %p %s
HalDpReplayInterrupts: %p %s
HalQueryIoPortAccessSupported: %p %s
KdSetupIntegratedDeviceForDebugging: %p %s
KdReleaseIntegratedDeviceForDebugging: %p %s
HalEnlightenmentInitialize: %p %s
HalAllocateEarlyPages: %p %s
HalMapEarlyPages: %p %s
HalTimerGetClockOwner: %p %s
HalTimerGetClockConfiguration: %p %s
HalTimerNotifyProcessorFreeze: %p %s
HalTimerPrepareProcessorForIdle: %p %s
HalDiagRegisterLogRoutine: %p %s
HalTimerResumeProcessorFromIdle: %p %s
HalTimerResetLastClockTick: %p %s
HalVectorToIDTEntryEx: %p %s
HalSecondaryInterruptQueryPrimaryInformation: %p %s
HalMaskInterrupt: %p %s
HalUnmaskInterrupt: %p %s
HalIsInterruptTypeSecondary: %p %s
HalAllocateGsivForSecondaryInterrupt: %p %s
HalAddInterruptRemapping: %p %s
HalRemoveInterruptRemapping: %p %s
HalSaveAndDisableEnlightenment: %p %s
HalRestoreHvEnlightenment: %p %s
HalPciEarlyRestore: %p %s
HalInterruptGetLocalIdentifier: %p %s
HalAllocatePmcCounterSet: %p %s
HalCollectPmcCounters: %p %s
HalFreePmcCounterSet: %p %s
HalTimerQueryCycleCounter: %p %s
HalTimerGetNextTickDuration: %p %s
HalPciMarkHiberPhase: %p %s
HalInterruptQueryProcessorRestartEntryPoint: %p %s
HalInterruptRequestSecondaryInterrupt: %p %s
HalInterruptEnumerateUnmaskedInterrupts: %p %s
HalBiosDisplayReset: %p %s
HalGetDmaAdapter: %p %s
HalCheckPowerButton: %p %s
HalMapPhysicalMemoryWriteThrough64: %p %s
HalUnmapVirtualAddress: %p %s
HalKdReadPCIConfig: %p %s
HalKdWritePCIConfig: %p %s
HalTimerQueryWakeTime: %p %s
HalTimerReportIdleStateUsage: %p %s
HalKdEnumerateDebuggingDevices: %p %s
HalFlushIoRectangleExternalCache: %p %s
HalPowerEarlyRestore: %p %s
HalQueryCapsuleCapabilities: %p %s
HalUpdateCapsule: %p %s
HalPciMultiStageResumeCapable: %p %s
check_hal_private_disp_table: cannot read table, error %d, ntstatus %X
check_hal_private_disp_table: cannot read table, error %d
check_hal_disp_table: cannot read table, error %d, ntstatus %X
check_hal_disp_table: cannot read table, error %d
HalQuerySystemInformation: %p %s
HalSetSystemInformation: %p %s
HalQueryBusSlots: %p %s
HalExamineMBR: %p %s
HalIoReadPartitionTable: %p %s
HalIoSetPartitionInformation: %p %s
HalIoWritePartitionTable: %p %s
HalReferenceHandlerForBus %p %s
HalReferenceBusHandler %p %s
HalDereferenceBusHandler %p %s
HalInitPnpDriver %p %s
HalInitPowerManagement %p %s
HalGetDmaAdapter %p %s
HalGetInterruptTranslator %p %s
HalStartMirroring %p %s
HalEndMirroring %p %s
HalMirrorPhysicalMemory %p %s
HalEndOfBoot %p %s
HalMirrorVerify %p %s
HalGetCachedAcpiTable %p %s
HalSetPciErrorHandlerCallback %p %s
read_hal_apci_disp_table return %X bytes, error %d, ntstatus %X
read_hal_apci_disp_table return %X bytes, error %d
Bad HalAcpiDispatchTable version: %X
read_gdt_size failed, error %d, ntstatus %X
read_gdt_size failed, error %d
Cannot alloc %d bytes for GDT entries
read_gdt failed, error %d, ntstatus %X
read_gdt failed, error %d
Descriptor[%d] %s S %d DPL %d type %X base %X limit %X
WinChecker::dump_ldt failed, error %X, ntstatus %X
WinChecker::dump_ldt failed, error %X
WinChecker::dump_ldt: cannot alloc ldt array, size %X
Ldt[%d]:
Base: X
Limit: X
AVL: %d
D/B: %d
DPL: %d
G: %d
P: %d
S: %d
Type: %d
Cannot read code for kinterrupt(%X) thunk, error %d
IDT patched: unknown type %X selector %X addr %p for int%X
IDT patched: unknown selector %X for int%X
IDT patched: int%X has unknown selector %X base %X limit %X addr %p
IDT patched: int%X addr %p by module %s
IDT int%X addr %p KINTERRUPT %p
IDT patched: int%X addr %p
Int%X: selector %X type TASK DPL %X base %X limit %X
Int%X: selector %X type %X DPL %X addr %p base %X limit %X
Int%X: selector %X type %X DPL %X addr %p
read_idt_size failed, error %d, ntstatus %X
read_idt_size failed, error %d
read_idt: cannot alloc %d bytes for IDT storage
read_idt failed, error %d, ntstatus %X
read_idt failed, error %d
Cannot read kinterrupt (%X), error %d
KInterrupt %X (%p):
Size %X type %X
ServiceRoutine %p %s
DispatchAddress %p %s
check_ob_types: cannot read size of ObTypes list, error %d, ntstatus %X
check_ob_types: cannot read size of ObTypes list, error %d
check_ob_types: cannot read %d bytes (readed %d), error %d, ntstatus %X
check_ob_types: cannot read %d bytes (readed %d), error %d
fill_ob_type: cannot read ObType %S (%X), error %d
Cannot read ObType %S (%X), error %d
ObType %S:
DumpProcedure: %p %s
OpenProcedure: %p %s
CloseProcedure: %p %s
DeleteProcedure: %p %s
ParseProcedure: %p %s
SecurityProcedure: %p %s
QueryNameProcedure: %p %s
OkayToCloseProcedure: %p %s
ZwAlpcConnectPortEx
ZwOpenKeyTransactedEx
ZwOpenKeyEx
ZwOpenKeyTransacted
ZwCreateKeyTransacted
ZwAlpcSendWaitReceivePort
ZwAlpcImpersonateClientOfPort
ZwAlpcDisconnectPort
ZwAlpcDeletePortSection
ZwAlpcCreatePortSection
ZwAlpcCreatePort
ZwAlpcConnectPort
ZwAlpcAcceptConnectPort
ZwUnloadKey2
ZwQueryOpenSubKeysEx
ZwLoadKeyEx
ZwQueryPortInformationProcess
ZwWaitForKeyedEvent
ZwReleaseKeyedEvent
ZwOpenKeyedEvent
ZwCreateKeyedEvent
ZwUnloadKeyEx
ZwSaveKeyEx
ZwRenameKey
ZwLockRegistryKey
ZwLockProductActivationKeys
ZwCompressKey
ZwCompactKeys
ZwYieldExecution
ZwUnloadKey
ZwSetValueKey
ZwSetThreadExecutionState
ZwSetInformationKey
ZwSetDefaultHardErrorPort
ZwSecureConnectPort
ZwSaveMergedKeys
ZwSaveKey
ZwRestoreKey
ZwRequestWaitReplyPort
ZwRequestPort
ZwReplyWaitReplyPort
ZwReplyWaitReceivePortEx
ZwReplyWaitReceivePort
ZwReplyPort
ZwReplaceKey
ZwRegisterThreadTerminatePort
ZwQueryValueKey
ZwQueryOpenSubKeys
ZwQueryMultipleValueKey
ZwQueryKey
ZwQueryInformationPort
ZwOpenKey
ZwNotifyChangeMultipleKeys
ZwNotifyChangeKey
ZwLoadKey2
ZwLoadKey
ZwListenPort
ZwImpersonateClientOfPort
ZwFlushKey
ZwEnumerateValueKey
ZwEnumerateKey
ZwDeleteValueKey
ZwDeleteKey
ZwDelayExecution
ZwCreateWaitablePort
ZwCreatePort
ZwCreateNamedPipeFile
ZwCreateKey
ZwConnectPort
ZwCompleteConnectPort
ZwAcceptConnectPort
FindKiServiceTable: relocation type %d found at X
Cannot read body of %s !
Cannot extract index of %s, error %d
kernel %s don`t contains KeServiceDescriptorTable function !
Cannot find SDT in %s
Cannot read ntdll.dll
Cannot read body of %s!
Cannot read body of ZwYieldExecution!
Cannot extract index of ZwYieldExecution, error %d
Cannot extract index of ZwPlugPlayControl , error %d
%s: %p
SDT entry %X (%s) hooked %p %s!
SDT entry %X hooked %p %s!
Need unhook %d items in SSDT
UNHOOK_ITEM: Index %X Offset %X
Unhook SSDT failed, lasterror %d
Unhooked %d SSDT items
NtUserSetProcessRestrictionExemption
NtUserAcquireIAMKey
NtGdiDdDDICreateKeyedMutex2
NtGdiDdDDIOpenKeyedMutex2
NtGdiDdDDIAcquireKeyedMutex2
NtGdiDdDDIReleaseKeyedMutex2
NtUserSetTHQAPublicKey
NtGdiDdDDIReleaseKeyedMutex
NtGdiDdDDIAcquireKeyedMutex
NtGdiDdDDIDestroyKeyedMutex
NtGdiDdDDIOpenKeyedMutex
NtGdiDdDDICreateKeyedMutex
NtUserEndTouchOperation
NtUserSfmDxReportPendingBindingsToDwm
NtGdiDDCCIGetTimingReport
NtUserUnregisterSessionPort
NtUserRegisterSessionPort
NtUserRegisterErrorReportingDialog
NtGdiSetOPMSigningKeyAndSequenceNumbers
NtGdiGetCertificateSize
NtGdiGetCertificate
NtUserWaitForMsgAndEvent
NtUserVkKeyScanEx
NtUserUnregisterHotKey
NtUserUnlockWindowStation
NtUserUnloadKeyboardLayout
NtUserUnhookWindowsHookEx
NtUserSetWindowStationUser
NtUserSetWindowsHookEx
NtUserSetWindowsHookAW
NtUserSetProcessWindowStation
NtUserSetKeyboardState
NtUserSetImeHotKey
NtUserSetConsoleReserveKeys
NtUserRegisterHotKey
NtUserOpenWindowStation
NtUserMapVirtualKeyEx
NtUserLockWindowStation
NtUserLoadKeyboardLayoutEx
NtUserGetProcessWindowStation
NtUserGetKeyState
NtUserGetKeyNameText
NtUserGetKeyboardState
NtUserGetKeyboardLayoutName
NtUserGetKeyboardLayoutList
NtUserGetImeHotKey
NtUserGetCPD
NtUserGetAsyncKeyState
NtUserCreateWindowStation
NtUserCloseWindowStation
NtUserCheckImeHotKey
NtUserCallMsgFilter
NtUserAlterWindowStyle
NtUserActivateKeyboardLayout
NtGdiScaleViewportExtEx
NtGdiDvpWaitForVideoPortSync
NtGdiDvpUpdateVideoPort
NtGdiDvpGetVideoPortConnectInfo
NtGdiDvpGetVideoPortOutputFormats
NtGdiDvpGetVideoPortLine
NtGdiDvpGetVideoPortInputFormats
NtGdiDvpGetVideoPortFlipStatus
NtGdiDvpGetVideoPortField
NtGdiDvpGetVideoPortBandwidth
NtGdiDvpFlipVideoPort
NtGdiDvpDestroyVideoPort
NtGdiDvpCreateVideoPort
NtGdiDvpCanCreateVideoPort
NtGdiDdSetColorKey
read_shadow_sdt failed, error %d
check_win32k_sdt: cannot alloc %d bytes
Cannot read win32k_sdt at %p size %X, error %d
win32k_sdt[%d] (%s) hooked, addr %p %s
win32k_sdt[%d] hooked, addr %p %s
GetNamedPipeServerProcessId
read_kddb read %X bytes, error %d
cannot read MmNonPagedPoolStart (%p), error %d
cannot read MmNonPagedPoolEnd (%p), error %d
cannot read MmPagedPoolStart (%p), error %d
cannot read MmPagedPoolEnd (%p), error %d
cannot read KernelVerifier (%p), error %d
WindowsType: %S
ETHREAD.StartAddress %X
KiProcessorBlock: %p (%X)
KernelVerifier: %X
KeBugCheckCallbackList: %p (%X)
WorkerRoutine: %p %s
IdleFunction: %p %s
IdleFunction: %p %s
KPRCB[%d].WorkerRoutine: %p %s
KPRCB[%d].IdleFunction: %p %s
KPRCB[%d].IdleFunction: %p %s
read_kpcr return %X bytes, error %d, ntstatus %X
read_kpcr return %X bytes, error %d
KPCR[%d] %p major %X minor %X
KPCR[%d] %p
get_os_info return %X bytes, error %d, ntstatus %X
get_os_info return %X bytes, error %d
NtMajorVersion: %d
NtMinorVersion: %d
BuildNumber: %d
GlobalFlag: %X
Processors: %d
MmVerifierFlags %d
MmSystemSize %d %s
DebuggerEnabled %d
DebuggerNotPresent %d
SafeBootMode %d
NXSupportPolicy %X
CR0 %8.8X %s
CR4 %8.8X %s
Cannot open mailslot %S, error %d
get_mail_slot_owner(%S): returned %d bytes, error %d, ntstatus %X
get_mail_slot_owner(%S): returned %d bytes, error %d
Cannot open named pipe %S, error %d
GetNamedPipeServerProcessId(%S) failed, error %d
get_named_pipe_owner(%S): returned %d bytes, error %d, ntstatus %X
get_named_pipe_owner(%S): returned %d bytes, error %d
read_lpc_port_chars: len %d, returned %d bytes, error %d, ntstatus %X
read_lpc_port_chars: len %d, returned %d bytes, error %d
read_unicode_string: len %d, returned %d bytes, error %d, ntstatus %X
read_unicode_string: len %d, returned %d bytes, error %d
read_drivers_list: cannot get size of drivers list, returned %d bytes, error %d, ntstatus %X
read_drivers_list: cannot get size of drivers list, returned %d bytes, error %d
read_drivers_list: cannot alloc %X bytes for driver list
read_drivers_list: cannot read drivers list, error %d, ntstatus %X
read_drivers_list: cannot read drivers list, error %d
%p:%X flags %X LoadCount %d %s
read_KiThreadSelectNotifyRoutine failed, error %d
read_KiSwapContextNotifyRoutine failed, error %d
read_KiTimeUpdateNotifyRoutine failed, error %d
read_PspLegoNotifyRoutine failed, error %d
read_KiDebugRoutine failed, error %d
read_msrs failed, error %d, ntstatus %X
read_msrs failed, error %d
IManageProcess: Cannot OpenProcess %d
IManageProcess: Cannot open process %d
read_win32_process for PID %X failed, error %d, status %X
read_win32_process for PID %X failed, error %d
read_dword(%p, PID %d) failed, error %d, ntstatus %X
read_dword(%p, PID %d) failed, error %d
read_ptr(%p, PID %d) failed, error %d, ntstatus %X
read_ptr(%p, PID %d) failed, error %d
rp_ReadProcessMemory(%p size %X) from %p error %d
read_token for PID %X failed, error %d, status %X
read_token for PID %X failed, error %d
open_proc(%d, access %X) failed, error %d, ntstatus %X
open_proc(%d, access %X) failed, error %d
rp_OpenProcess(%d, access %X) dwRet %d, error %d
rp_TerminateProcess(%p, %X) dwRet %d, error %d
Major %d Minor %d BuildNumber %d PlatformId %d ServicePackMajor %d ServicePackMinor %d SuiteMask %d ProductType %d CSDVersion %S
ProductType: %X
Cannot open RPC control, error %X
msgsvcsend
_ILocalObjectExporter
IVsShell
IWbemLoginClientID
ICertProtect
_IBTFTPApiEvents
_s_PasswordRecovery
wininet_UrlCache
_IObjectExporter
WMsgAPIs
WMsgKAPIs
INCryptKeyIso
HttpProxyMgrProvider
IKeySvcR
WcnTransportRpc
IPortResolve
IWbemLoginHelper
LRpcSIDKey
ISmartCardRootCerts
IDebugPortSupplier2
IAsyncOperation
IPipelineElement
OnlineProviderCertInterface
IBackgroundCopyJobHttpOptions
HttpProxyMgrClient
IStaticPortMappingCollection
IKeySvc
s_WindowsShutdown
IWebBrowser2
IDebugPortSupplierLocale2
IUPnPHttpHeaderControl
WINHTTP_AUTOPROXY_SERVICE
IErcLuaSupport
IDebugPortSupplier3
IKeySvc2
BackupKey
IWerReport
ICertPassage
IStaticPortMapping
IDebugPortSupplierEx2
IWbemLevel1Login
IWebBrowserApp
msgsvc
IShellWindows
RpcBindingFromStringBinding(%S) failed: %d
RpcMgmtInqIfIds(%S) failed: %d
RpcStringBindingCompose failed: %d
RpcBindingFromStringBinding failed: %d
RpcMgmtInqIfIds failed: %d
%8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X version %d.%d : %s
%8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X version %d.%d : (%s)
RpcMgmtEpEltInqBegin failed: %d
Cannot read npc table, readed %X bytes
rpcrt4
%s.AddressChangeFn: %p %s
rpcrt4_hack::check_myself: exception %d occured
rpcrt4_hack::try_hack: cannot find RpcServerRegisterIfEx
I_RpcInitNdrImports
load_driver(%S) returned %X
Loaded kernel driver: %S
Error loading kernel driver: %ls - 0xx
Error loading kernel driver: %S - 0xx
Error loading kernel driver: %S - OpenSCManager 0xx
tcpip
ClientImmProcessKey
fnHkOPTINLPEVENTMSG
fnHkINLPMSG
fnSENTDDEMSG
fnDWORDOPTINLPMSG
RealMsgWaitForMultipleObjectsEx
PEB.KernelCallbackTable patched, %p
user32_hack::try_hack: bad PE passed
user32_hack::try_hack: cannot read import table
pfnWowMsgBoxIndirectCallback
Unknown apfnDispatch size: %d
%s_hack::try_hack: bad PE passed
%s_hack::try_hack: cannot read exports, error %d
%s_hack::try_hack: cannot find section .data
%s_hack::try_hack: cannot read section .data
%s_hack::try_hack: cannot read section .rdata
%s_hack::try_hack: cannot find section .text
%s_hack::try_hack: cannot read section .text
DxgkReleaseKeyedMutex2
DxgkAcquireKeyedMutex2
DxgkOpenKeyedMutex2
DxgkCreateKeyedMutex2
DxgkReleaseKeyedMutex
DxgkAcquireKeyedMutex
DxgkDestroyKeyedMutex
DxgkOpenKeyedMutex
DxgkCreateKeyedMutex
Cannot read gDxgkInterface, readed %X bytes
WindowHasShadow
DisableProcessWindowsGhosting
zzzUnhookWindowsHook
xxxUpdateWindows
xxxArrangeIconicWindows
SetWindowState
ClearWindowState
SetMsgBox
GetKeyboardType
GetKeyboardLayout
RemotePassthruDisable
xxxRemotePassthruEnable
Cannot read gpsi, readed %X bytes
Cannot read gpsi handlers, readed %X bytes
Cannot read apfnSimpleCall, readed %X bytes
Cannot read gapfnMessageCall, readed %X bytes
Cannot read gapfnScSendMessage, readed %X bytes
Cannot read gaNewProcAddresses, readed %X bytes
Cannot open logfile %S
Cannot create stop event, error %d
Driver %S loaded from %S
SrvGetConsoleKeyboardLayoutName
SrvSetConsoleKeyShortcuts
SrvGetConsoleAliasExes
SrvGetConsoleAliasExesLength
SrvVDMConsoleOperation
SrvGetLargestConsoleWindowSize
SrvExitWindowsEx
winsrv.dll
Unknown size of ConsoleServerApiDispatchTable: %d
Unknown size of UserServerApiDispatchTable: %d
CallUserpExitWindowsEx
GetConsoleAliasExesInternal
GetConsoleAliasExesLengthInternal
SetConsoleKeyShortcuts
GetConsoleKeyboardLayoutNameWorker
SetConsoleOutputCPInternal
GetConsoleOutputCP
GetLargestConsoleWindowSize
reg_ccs_services::read failed - error %d
Cannot open key %S, error %d
SafeSecondaryLog(%d) failed, error %d
SafeSecondaryLog failed, error %d
SafeSendLog(%d) failed, error %d
SafeSendLog failed, error %d
Bad memory %p len %X in dump_hex_buffer
Cannot alloc %d bytes for delayed imports
Cannot alloc %d bytes for imports
read_import_safe(%s) failed %X
Cannot realloc %d bytes for iat
read_delayed_safe(%s) failed %X
store2md_cache: cannot alloc %d bytes
store2md_cache: cannot realloc, alloced %d bytes
wdigest.dll
tspkg.dll
schannel.dll
pku2u.dll
negoexts.dll
msv1_0.dll
livessp.dll
kerberos.dll
umpnpmgr.dll
combase.dll
ntdsa.dll
ntdll.dll
cryptbase.dll
ncrypt.dll
rpcrt4.dll
imm32.dll
user32.dll
kernelbase.dll
kernel32.dll
advapi32.dll
ole32.dll
Cannot alloc %X bytes for relocs
SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\RebootRequired
WS2_32.dll
RPCRT4.dll
GetProcessHeap
GetWindowsDirectoryA
KERNEL32.dll
RegCloseKey
RegOpenKeyExW
RegOpenKeyExA
RegCreateKeyExW
ADVAPI32.dll
GetWindowsDirectoryW
GetCPInfo
RegQueryInfoKeyW
RegEnumKeyW
zcÁ
.?AVMyWindowsChecker@@
.?AV?$rpcrt4_hack@U_IMAGE_NT_HEADERS@@@@
.?AVtcpip_hack@@
.?AV?$import_holder@U_IMAGE_NT_HEADERS@@@CMN@@
.?AVinmem_import_holder@CMN@@
.?AVimport_holder_intf@CMN@@
.?AVmodule_import@CMN@@
<requestedExecutionLevel level="requireAdministrator" uiAccess="false"/>
aR.Rn
X.UJ^A
w%xyW
f.Gkf
%0X0m0
>$?(?,?0?
3&4;456?90:
77g7
7>7[7`7|7
6#8*878^8~8
<#<0<^<@=
11_1
0#101#202
0 11h1J3
< <$<(<,<0<
6%7S7
7*717>7[8
=!>&>9>>>
7&7@7l78N8V8z8
:);4;>;\;
0%0X0
= >$>(>,>0>
?,?4?<?\?|?
.----/01/01/01
KERNEL32.DLL
mscoree.dll
U%SystemRoot%\system32\svchost.exe
%SystemRoot%\system32\svchost
WSOCKTRANSPORT
TCPIP6
TCPIP
STORPORT
STORMINIPORT
SOFTPCI
SCSIPORT
SCSIMINIPORT
SBP2PORT
FCPORT
PassiveWatchdogTimeout
sImageExecutionOptions
ErrorPortStartTimeout
ErrorPortCommTimeout
DisablePagingExecutive
DebuggerMaxModuleMsgs
CountOperations
B\\.\
Psapi.dll
sWindows PowerShell
tHost Process for Windows Tasks
Windows Problem Reporting 32 bit
Windows Problem Reporting
Windows Modules Installer
mWindows Start-Up Application
tWindows Search Indexer
sWindows Server Initial Configuration Tasks
Windows Media Player
Dump Reporting Tool
Error Reporter
rWindows Control Panel 32 bit
Windows Control Panel
Windows Connect Now - Config Registrar Service
Windows Media Player Network Sharing Service
Windows firewall
Windows Error Reporting Service
tWindows Defender
vError reporting service
eWindows update service
Windows Image Acquisition
WebClient
tWindows Security Center Notification App
yWindows Based Script Host
Windows installer 32 bit
Windows installer
Windows 16-bit Virtual Machine
Windows Management Instrumentation
Windows User Mode Driver Manager
MS tftp
MS ftp 32 bit
MS ftp
Microsoft Help and Support Center
Cmd.exe 32 bit
Cmd.exe
Windows Logon User Interface Host
Windows update
tGoogle Chrome
rOpera Internet Browser
Mozilla Thunderbird Mail and News Client
dFirefox browser
Services.exe
%SystemRoot%\msagent\agentsvr.exe
%SystemRoot%\System32\dfrgfat.exe
%SystemRoot%\System32\dfrgntfs.exe
%SystemRoot%\System32\services.exe
%SystemRoot%\System32\svchost.exe
%SystemRoot%\System32\alg.exe
%SystemRoot%\System32\spoolsv.exe
%SystemRoot%\System32\net.exe
%SystemRoot%\System32\net1.exe
%SystemRoot%\System32\cmd.exe
%SystemRoot%\System32\notepad.exe
%SystemRoot%\System32\calc.exe
%SystemRoot%\System32\PTF.exe
%SystemRoot%\System32\tPTF.exe
%SystemRoot%\System32\telnet.exe
%SystemRoot%\System32\taskkill.exe
%SystemRoot%\System32\ctfmon.exe
%SystemRoot%\System32\wdfmgr.exe
%SystemRoot%\System32\mmc.exe
%SystemRoot%\System32\userinit.exe
%SystemRoot%\System32\wbem\wmiprvse.exe
%SystemRoot%\System32\wbem\wmiadap.exe
%SystemRoot%\explorer.exe
%SystemRoot%\System32\lsass.exe
%SystemRoot%\System32\winlogon.exe
%SystemRoot%\System32\LogonUI.exe
%SystemRoot%\System32\wuauclt.exe
%SystemRoot%\System32\wuauclt1.exe
%SystemRoot%\System32\CCM\CcmExec.exe
%SystemRoot%\System32\csrss.exe
%SystemRoot%\System32\smss.exe
\SystemRoot\System32\smss.exe
%SystemRoot%\System32\inetsrv\w3wp.exe
%SystemRoot%\System32\schtasks.exe
%SystemRoot%\System32\tstheme.exe
%SystemRoot%\System32\control.exe
%SystemRoot%\System32\taskmgr.exe
%SystemRoot%\System32\dwwin.exe
%SystemRoot%\System32\drwtsn32.exe
%SystemRoot%\System32\dumprep.exe
%SystemRoot%\System32\dfssvc.exe
%SystemRoot%\System32\dllhost.exe
%SystemRoot%\System32\ntvdm.exe
%SystemRoot%\System32\rundll32.exe
%SystemRoot%\System32\msiexec.exe
%SystemRoot%\System32\mshta.exe
%SystemRoot%\System32\regsvr32.exe
%SystemRoot%\System32\cscript.exe
%SystemRoot%\System32\wscript.exe
%SystemRoot%\System32\wscntfy.exe
%SystemRoot%\System32\mstsc.exe
%SystemRoot%\System32\dashost.exe
far.exe
Far.exe
CLSID\{FC7D9E02-3F9E-11d3-93C0-00C04F72DAF7}\InprocServer32
CLSID\{73FDDC80-AEA9-101A-98A7-00AA00374959}\LocalServer32
CLSID\{0002DF01-0000-0000-C000-000000000046}\LocalServer32
iedw.exe
%SystemRoot%\System32\oobechk.exe
%SystemRoot%\System32\oobe.exe
%SystemRoot%\System32\psxss.exe
%SystemRoot%\System32\internat.exe
AcroRd32.exe
excel.exe
outlook.exe
winword.exe
powerpnt.exe
wmplayer.exe
firefox.exe
thunderbird.exe
Opera.exe
WinRAR.exe
%SystemRoot%\System32\wininit.exe
%SystemRoot%\System32\lsm.exe
%SystemRoot%\System32\dwm.exe
%SystemRoot%\System32\werfault.exe
%SystemRoot%\System32\taskeng.exe
%SystemRoot%\System32\conime.exe
%SystemRoot%\System32\wudfhost.exe
%SystemRoot%\System32\taskhost.exe
%SystemRoot%\System32\conhost.exe
%SystemRoot%\System32\rdpclip.exe
%SystemRoot%\System32\SearchFilterHost.exe
%SystemRoot%\System32\SearchProtocolHost.exe
csrss.exe
svchost.exe
alg.exe
sPptpMiniport
Tcpip
psapi.dll
127.0.0.1
\\.\pipe\
\\.\mailslot\
SOFTWARE\Microsoft\Windows NT\CurrentVersion
\\.\Pipe\
\\.\Mailslot\
ncacn_ip_tcp:
ncadg_ip_udp:
\\pipe\\
SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\
SOFTWARE\Microsoft\PowerShell\1\ShellIds\Microsoft.PowerShell
RemediationExe
SOFTWARE\Classes\SCCM.VAppLauncher\shell\Open\command
SOFTWARE\Classes\CLSID\{00AAB372-0D6D-4976-B5F5-9BC7605E30BB}\LocalServer32
SOFTWARE\Classes\CLSID\{3C296D07-90AE-4FAC-86F9-65EAA8B82D22}\LocalServer32
SOFTWARE\Classes\CLSID\{D63B10C5-BB46-4990-A94F-E40B9D520160}\LocalServer32
SOFTWARE\Classes\CLSID\{03e64e17-b220-4052-9b9b-155f9cb8e016}\LocalServer32
SOFTWARE\Classes\CLSID\{1F69F884-285E-418E-9715-B9EEE402DD5F}\LocalServer32
Software\Microsoft\Windows\CurrentVersion\WINEVT\publishers
Windows checker
1.0.0.3432
wincheck.exe
0, 0, 8, 16

NesIMIQs.exe_1524_rwx_05740000_00001000:

.text
`.rdata
@.data

NesIMIQs.exe_1524_rwx_05750000_00001000:

.text
`.rdata
@.data

NesIMIQs.exe_1524_rwx_05FC0000_00004000:

Web Client Network
Microsoft Windows Network

NesIMIQs.exe_1524_rwx_05FF0000_00004000:

Microsoft Windows Network

reIEcoQI.exe_348_rwx_00401000_00069000:

3E.Pcq:P!V^
#%Xkq.
.JF{<
U%Sa@
('%D^q-*
?|Q%f
SE?.rn~M*
.Dhe4
E.IdJWH
%k%cn>x_
?%uRc!
%3.UGiO0
]w.LQ
I 4keyy
L%C['
7.BLP
;.StH 
>.Qlx #6
2software\microsoft\windows\currentversion\run
P.yrBX.
PB]%C
%FoS(
F<.cS

reIEcoQI.exe_348_rwx_00680000_00068000:

3E.Pcq:P!V^
#%Xkq.
.JF{<
U%Sa@
('%D^q-*
?|Q%f
SE?.rn~M*
.Dhe4
E.IdJWH
%k%cn>x_
?%uRc!
%3.UGiO0
]w.LQ
I 4keyy
L%C['
7.BLP
;.StH 
>.Qlx #6
$g.Gd
P.yrBX.
PB]%C
%FoS(
F<.cS

reIEcoQI.exe_348_rwx_00700000_00001000:

%WinDir%\TEMP

reIEcoQI.exe_348_rwx_00940000_00001000:

%Documents and Settings%\LocalService\dUskcAww\fGAwoYMM

reIEcoQI.exe_348_rwx_00950000_00001000:

%Documents and Settings%\All Users\hcYYccwo\NesIMIQs

reIEcoQI.exe_348_rwx_00960000_00001000:

%Documents and Settings%\LocalService\dUskcAww\fGAwoYMM.inf

reIEcoQI.exe_348_rwx_00970000_00001000:

%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.inf

reIEcoQI.exe_348_rwx_00980000_00001000:

%Documents and Settings%\LocalService\dUskcAww\fGAwoYMM.exe

reIEcoQI.exe_348_rwx_00990000_00001000:

%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.exe

reIEcoQI.exe_348_rwx_009C0000_00001000:

fGAwoYMM.exe

reIEcoQI.exe_348_rwx_009D0000_00001000:

NesIMIQs.exe

reIEcoQI.exe_348_rwx_009E0000_00001000:

taskkill /FI "USERNAME eq SYSTEM" /F /IM fGAwoYMM.exe

reIEcoQI.exe_348_rwx_009F0000_00001000:

taskkill /FI "USERNAME eq SYSTEM" /F /IM NesIMIQs.exe


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    cscript.exe:1788
    cscript.exe:2656
    cscript.exe:1264
    cscript.exe:3416
    cscript.exe:2096
    cscript.exe:3324
    cscript.exe:3656
    cscript.exe:2996
    cscript.exe:4028
    cscript.exe:2320
    cscript.exe:1836
    cscript.exe:2488
    cscript.exe:2324
    cscript.exe:2484
    cscript.exe:624
    cscript.exe:2528
    cscript.exe:3256
    cscript.exe:344
    cscript.exe:2404
    cscript.exe:2952
    cscript.exe:2400
    cscript.exe:1376
    cscript.exe:548
    cscript.exe:284
    cscript.exe:1672
    cscript.exe:2444
    cscript.exe:3488
    cscript.exe:3764
    cscript.exe:2852
    cscript.exe:2700
    cscript.exe:3336
    cscript.exe:4036
    cscript.exe:3408
    cscript.exe:2452
    cscript.exe:2260
    cscript.exe:3560
    cscript.exe:2556
    cscript.exe:3240
    cscript.exe:3032
    cscript.exe:2496
    cscript.exe:3840
    cscript.exe:3844
    cscript.exe:3412
    cscript.exe:2148
    cscript.exe:3948
    cscript.exe:2900
    cscript.exe:2284
    cscript.exe:4092
    cscript.exe:3940
    cscript.exe:1328
    cscript.exe:3828
    cscript.exe:776
    cscript.exe:396
    cscript.exe:3476
    cscript.exe:1716
    cscript.exe:2980
    cscript.exe:2984
    cscript.exe:2664
    cscript.exe:492
    cscript.exe:368
    cscript.exe:3952
    cscript.exe:1016
    cscript.exe:916
    cscript.exe:2668
    cscript.exe:3664
    cscript.exe:1236
    cscript.exe:3816
    cscript.exe:3660
    cscript.exe:580
    cscript.exe:2932
    cscript.exe:304
    cscript.exe:380
    cscript.exe:3152
    cscript.exe:240
    cscript.exe:824
    cscript.exe:3316
    cscript.exe:3464
    cscript.exe:3460
    cscript.exe:2576
    cscript.exe:788
    cscript.exe:3468
    cscript.exe:2676
    cscript.exe:432
    cscript.exe:3692
    cscript.exe:2372
    cscript.exe:516
    cscript.exe:1156
    cscript.exe:2592
    cscript.exe:1220
    cscript.exe:3752
    cscript.exe:2924
    cscript.exe:332
    cscript.exe:3824
    cscript.exe:2196
    cscript.exe:2800
    cscript.exe:2200
    cscript.exe:3216
    cscript.exe:2256
    cscript.exe:3364
    cscript.exe:2888
    cscript.exe:3516
    cscript.exe:1988
    cscript.exe:1500
    cscript.exe:2688
    cscript.exe:3892
    cscript.exe:3084
    cscript.exe:2112
    cscript.exe:2680
    cscript.exe:500
    cscript.exe:1468
    cscript.exe:2428
    cscript.exe:3604
    cscript.exe:3632
    cscript.exe:2332
    cscript.exe:2264
    cscript.exe:3072
    cscript.exe:2180
    cscript.exe:2956
    cscript.exe:3720
    cscript.exe:3528
    cscript.exe:3176
    cscript.exe:3884
    cscript.exe:3204
    cscript.exe:3880
    cscript.exe:3444
    cscript.exe:2024
    cscript.exe:3012
    cscript.exe:2108
    cscript.exe:2356
    cscript.exe:1108
    cscript.exe:1512
    cscript.exe:4080
    cscript.exe:604
    cscript.exe:2732
    cscript.exe:3636
    cscript.exe:2432
    cscript.exe:1168
    cscript.exe:2436
    cscript.exe:552
    cscript.exe:3060
    cscript.exe:3536
    cscript.exe:2944
    cscript.exe:1052
    cscript.exe:2340
    cscript.exe:1056
    cscript.exe:1964
    cscript.exe:2224
    cscript.exe:3436
    cscript.exe:2740
    cscript.exe:3972
    cscript.exe:3976
    cscript.exe:3916
    cscript.exe:2724
    cscript.exe:3912
    cscript.exe:2640
    cscript.exe:2644
    cscript.exe:3704
    cscript.exe:2120
    cscript.exe:3780
    cscript.exe:3228
    cscript.exe:3788
    cscript.exe:3420
    cscript.exe:3548
    cscript.exe:3220
    cscript.exe:356
    cscript.exe:476
    cscript.exe:352
    cscript.exe:3980
    cscript.exe:3340
    %original file name%.exe:216
    %original file name%.exe:1140
    %original file name%.exe:3716
    %original file name%.exe:1300
    %original file name%.exe:2848
    %original file name%.exe:3496
    %original file name%.exe:2652
    %original file name%.exe:3648
    %original file name%.exe:3920
    %original file name%.exe:1264
    %original file name%.exe:3320
    %original file name%.exe:3324
    %original file name%.exe:4020
    %original file name%.exe:3656
    %original file name%.exe:3132
    %original file name%.exe:3556
    %original file name%.exe:2520
    %original file name%.exe:2036
    %original file name%.exe:3796
    %original file name%.exe:3124
    %original file name%.exe:3856
    %original file name%.exe:2404
    %original file name%.exe:3852
    %original file name%.exe:280
    %original file name%.exe:3992
    %original file name%.exe:816
    %original file name%.exe:3488
    %original file name%.exe:3568
    %original file name%.exe:3832
    %original file name%.exe:716
    %original file name%.exe:3484
    %original file name%.exe:3932
    %original file name%.exe:264
    %original file name%.exe:268
    %original file name%.exe:2260
    %original file name%.exe:2552
    %original file name%.exe:2992
    %original file name%.exe:1064
    %original file name%.exe:2996
    %original file name%.exe:2496
    %original file name%.exe:928
    %original file name%.exe:2060
    %original file name%.exe:372
    %original file name%.exe:3036
    %original file name%.exe:3772
    %original file name%.exe:708
    %original file name%.exe:2472
    %original file name%.exe:2904
    %original file name%.exe:1328
    %original file name%.exe:3944
    %original file name%.exe:1236
    %original file name%.exe:332
    %original file name%.exe:2824
    %original file name%.exe:2820
    %original file name%.exe:3300
    %original file name%.exe:3476
    %original file name%.exe:2988
    %original file name%.exe:2300
    %original file name%.exe:4048
    %original file name%.exe:2304
    %original file name%.exe:3388
    %original file name%.exe:2804
    %original file name%.exe:2072
    %original file name%.exe:364
    %original file name%.exe:2668
    %original file name%.exe:3664
    %original file name%.exe:3956
    %original file name%.exe:2768
    %original file name%.exe:2600
    %original file name%.exe:3748
    %original file name%.exe:3588
    %original file name%.exe:2284
    %original file name%.exe:1136
    %original file name%.exe:3740
    %original file name%.exe:2764
    %original file name%.exe:3152
    %original file name%.exe:240
    %original file name%.exe:780
    %original file name%.exe:2040
    %original file name%.exe:3396
    %original file name%.exe:1840
    %original file name%.exe:3016
    %original file name%.exe:1240
    %original file name%.exe:436
    %original file name%.exe:2164
    %original file name%.exe:2376
    %original file name%.exe:1984
    %original file name%.exe:2888
    %original file name%.exe:2616
    %original file name%.exe:2328
    %original file name%.exe:3616
    %original file name%.exe:2456
    %original file name%.exe:1228
    %original file name%.exe:3000
    %original file name%.exe:3164
    %original file name%.exe:3008
    %original file name%.exe:3292
    %original file name%.exe:2568
    %original file name%.exe:3216
    %original file name%.exe:2204
    %original file name%.exe:3212
    %original file name%.exe:3692
    %original file name%.exe:3360
    %original file name%.exe:2156
    %original file name%.exe:2684
    %original file name%.exe:1036
    %original file name%.exe:3080
    %original file name%.exe:636
    %original file name%.exe:2812
    %original file name%.exe:2628
    %original file name%.exe:2424
    %original file name%.exe:3876
    %original file name%.exe:2180
    %original file name%.exe:3520
    %original file name%.exe:3724
    %original file name%.exe:3284
    %original file name%.exe:3280
    %original file name%.exe:868
    %original file name%.exe:3688
    %original file name%.exe:3680
    %original file name%.exe:1028
    %original file name%.exe:2024
    %original file name%.exe:1672
    %original file name%.exe:1976
    %original file name%.exe:2100
    %original file name%.exe:728
    %original file name%.exe:604
    %original file name%.exe:4084
    %original file name%.exe:4088
    %original file name%.exe:3064
    %original file name%.exe:2436
    %original file name%.exe:3672
    %original file name%.exe:3060
    %original file name%.exe:3536
    %original file name%.exe:2940
    %original file name%.exe:2132
    %original file name%.exe:2340
    %original file name%.exe:1056
    %original file name%.exe:3344
    %original file name%.exe:2740
    %original file name%.exe:2704
    %original file name%.exe:1756
    %original file name%.exe:2504
    %original file name%.exe:3188
    %original file name%.exe:2648
    %original file name%.exe:3916
    %original file name%.exe:2876
    %original file name%.exe:2640
    %original file name%.exe:3056
    %original file name%.exe:3236
    %original file name%.exe:2976
    %original file name%.exe:2536
    %original file name%.exe:2120
    %original file name%.exe:2332
    %original file name%.exe:3428
    %original file name%.exe:2228
    %original file name%.exe:2336
    %original file name%.exe:4012
    %original file name%.exe:3788
    %original file name%.exe:1604
    %original file name%.exe:3424
    %original file name%.exe:1472
    %original file name%.exe:3988
    %original file name%.exe:3192
    %original file name%.exe:3980
    %original file name%.exe:804

  2. Delete the original Trojan file.
  3. Delete or disinfect the following files created/modified by the Trojan:

    %Documents and Settings%\%current user%\Local Settings\Temp\ywkIUMgU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\zYEwAAEE.bat (4 bytes)
    C:\013174ebb48cbff2718649c4ac5163a5 (160 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\fEoscoAU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\pKoMAEAo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GuowgswI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ROsoEgAo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\swggckwc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\paggQYQA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\JwQcMgQk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\PqwkwUAI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IOQAsoYI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XwsoYwYI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\CUUQUogA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\rUYMQYsU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GCgIsIMA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\zOsEwcIg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\pqgIooIU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ckkQQEQE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\PmAoYUsI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\vKQckYcM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\zowcoswQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\BWgYwckk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\wmIgAsMk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\dqkAUUUQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\bkIIgQgw.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\vwQAcoEw.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\mYEwsAoc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\HQIwMksk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\SqEsMYwQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\vSIEIYII.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\dIAMswEk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\NYAEAEoU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\RSUkgggk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\KUIYwsgc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\vGokUsYw.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\LeggskAE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\TEEQcoUY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\hggMQAIo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\gyIQcAMs.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\HuEgUAkg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nSosYwss.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\xcgcMAwo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\RgAYosQk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\EgwEokcA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\HiswMsQc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\qeQkwYcQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\PQkkcscI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\KwQwcgsc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\mogMMIIw.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\PkQQYogc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\uAIYYYQY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\aiUwQAwI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\SWwkgoUw.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\bUgkgUQY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ImIUAEQw.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nQAYAcso.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\qogMscYM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\cUwkEgMk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\SsAMoAkE.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\DSMEAocw.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\LioQQAog.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\SWQAMwIM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\haocoMQI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\SGcokcYE.bat (112 bytes)
    %Documents and Settings%\All Users\JuwEIgUE\reIEcoQI.exe (4017 bytes)
    %Documents and Settings%\%current user%\dUskcAww\fGAwoYMM.exe (3849 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\rIEMgYgA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\HqQoAAwo.bat (4 bytes)
    %Documents and Settings%\All Users\hcYYccwo\NesIMIQs.exe (3921 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\oSIEoAAY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\raMEsIYE.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\haEcIwMs.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\kwAswIwI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\KEAIAUsY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\AQQQsoMg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\uasMEwMU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\beEgscgw.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\hskEYcwI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\dMQcYwAg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ZGEsUgQw.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\vioYAYUc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\RmYwgoQY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\tyEIEokE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\MwkcEcUA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\zscAMcMg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\MmEQUQYo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\HosoQowY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\jsgYMcYw.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\yOUcwUAY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\gOcwYAsA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\bgQQMgIo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\DeIAcIEA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\uGAcYUcU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IksYIgwc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nuUYUUYM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\NWQkAEcg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\VGoEMMoI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\AuIYgAEk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\YugMMAcE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\BmcswUMc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XoIgokgQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ywsQsIQE.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\VSMcwUso.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\KIwIwcsw.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\JuUMgYgQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ESQkQkMo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\QScUUEAc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\OYMwQQEw.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\lOEgkAUo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\dGUMoQgA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\VEoIQocU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\JuYMYwAg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\cMEcgUUo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\mKEEAocE.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\mukQQwYc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\aiwAMYUw.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\lAwoMQco.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\qsQcwUwI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\lmUkAcEw.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\EIMIwIwI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\JIcAoUQo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\akAIQcUA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\RgEgQEQc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\uMwQoMgo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XIosQQQw.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\koAwgMkE.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\NIMAgIkg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\tKYIwwss.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\EAMkkwMo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\DOUocwQM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\UQcgQwgc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\cQwEgckI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\CsIMMkYA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\bigIcUwI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\QIEMYUYk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\eKIQkIMA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\raYMwwMI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ZCEYUkco.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\gccggIAU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\qmoAcIQQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\oUcwEUwM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\OWgcssEw.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\bOskEgUI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ZuQgMoQg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ZmwIcsYs.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\KCYssksE.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\lYoMoQIc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nIoksYAs.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\vQAMUUEg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\zKcUgIQs.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\FcMAkIkc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\QcoUEckc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\DoQwckIo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\qUQQoIYg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\jeggAEEM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\cMIsgMUA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IEkEkgkI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\tYgwQEYE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\iwAMMMso.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XocsEIcg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\dsMMIIcM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\emggUgwQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\SIEggYos.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\vQkogIkQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\LiwUAgMA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\noooEgoI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\hcskoYcg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\hSEckogE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ZIsUQYIA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\pQgcgsgY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\HUEMYcEg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\SgwAMIkQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\mOoMAcwE.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XMAkQosA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\vcEoQUok.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\aeIgIIUc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IUsYwcEQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\gMMMwEAk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nQEoAwIE.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\wwkMgcEc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ZewcMUcs.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\uAYcMAsI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\AYQgoMIs.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XWwgEYAs.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\BCQYAAwo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\vyEUwQUk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ZQgMwcks.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nMMYcYQo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\sAwkgcAQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\uWwEIYQk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\gCYEcMQk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\xakIMIwM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\HaAsUYYQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\zeMcUcMI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\COAwkggg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\bWAEIMMI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\PmAIcYIA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\MUQUcEoQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\cwYQQMkU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\RogQcAwA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\POsAEokI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\CuEIUoMA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\LMMEMQos.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\USoAwYUM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\LIAcsEkg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\AsIYcYsI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\FcwcMIgw.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\zAcEwckI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\DCsIMssg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\WaYscsEY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\OwooskQI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\eeYwIEYI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\NQQMkcoI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\MWMkYYck.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\wqEosUAw.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\qyogscck.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\SiUQQgUg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\euEYEooc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\yKQEMEMo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\oOQQIYEY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\BccgkwUs.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\QcsoYoYo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IyIkYIgo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\AWccMMsU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\NcQUgwEk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\jeYEQIck.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\MqoAgkME.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\DQQsEQEU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XMQwMAYg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\WmccgYUo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\TmscYcYo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\EuksoIko.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nKYEkYQY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\kIssskQY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\voYcoAgs.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\PIUMIMsw.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\hygIEYQA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\jUAoIMEs.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ygIgYIkE.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\KGMIQooM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XCMAkEEk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ywAMEwUA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\iEAocUcg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\syUsUAAQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\mEowoYUQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\uAwUcIow.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\sCYgwoMY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\EcUwgAcQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\FEQkYUkc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\MockwQIA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\icoQoIIg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\EkAYUUYA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\mOIoskUU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\RIcoogUo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XwYEcYks.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\uKUYswYc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\RIMQgwwY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\lQAAIcAM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\WCkgokwM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\dsYMIkIE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\FqAMIEUI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\hKYIkoME.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\CasEAkgw.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\uCQooEgQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\LEYkkgow.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\jacMsskQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ZeEoUosk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\pwMUsUoM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\zGssIIMQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\OSwEIook.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\sMUoUcoo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\WeUcwkwE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\KeskIswY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ngkcYcEM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\tWwAkUoU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IYQocoYU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\EAcskEko.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\KkUwsgUo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\smokIIwQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\AaMQIkgE.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\LAgEcIgc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\yAkEoAQU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\wsgEkYsE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\SkMAYwQo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\QqkkgAsU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\cMQMQwEQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\rqUIwckU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\dukokIAY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\RqoIMMAo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\DMQIMEsQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\fqwMIMMU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\JecAQsEQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\OWQYksMk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ZKgcsQwU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\piQcIoYc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\NAkkcQwY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\mUIkYkYQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\mSsgQIQY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\cyMUgEMM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\WkkAsswA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\bsEQMAAo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\hgksIYsQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\WqkIwAQk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\fEsYYkQk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\hKsEsoEY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\FeEoAwII.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\MQAIUcQM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\myQsMEoM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\pMAwkcAU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\uOwAYYAo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GOMYEYUo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\LSYEkUQM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\WOwIsMgc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\MAAQwMgM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\UisgwMQg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\vEsEQMIM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\UGIMoYQQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\NMcgMIYo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\iiQksQck.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\waoYIgYE.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\lQEUQsIY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\wowgAwsw.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\cEYEQgYw.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XyYoYAcE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\PqsAscow.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\TUgoQwgQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\KksccYYg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\gGwsMMQQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\iqgUYcIo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\vsccQkgM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\MiwYAoso.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\fegkYUAg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\eMUUokgo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\xaAYEUEo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\KsEYYEko.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\zeYIocAY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\FiMwcwwk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\vIUIYcMM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\FEkkccMI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\DUocIwwY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\yKwYYEEA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\qGUMwIwo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\pmwkUYAs.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\BSckkooM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\qKAYswkM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\dWUkAMII.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\aQgMUEQM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\leYgEAYU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\gEoIgoMs.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\kiwEEUAc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\JMUYMYIQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\VkMAwAMk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\KIQsAkIM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\iYwQEsUc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\JwUIYswQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\tAgkYwEo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\DOcoYwwg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\bOsYAAUU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\cWgoEUEU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\CUMEsIgY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\BEwIEcAM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\yUMIckAk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\oAoIMAIY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\jMQYcEYI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\uwwQMQYc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\MGIoYMMo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\egkgAgYw.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\xQYMgIYg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\JekkswcM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\QEMowMsc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\CcEUYYsU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\FGEskwYc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\oQEYwkMU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\eQAAYAwA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\JkMgkkwg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\aGwAwMwY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\kYUYIcAE.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\sakckQww.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\wQYIAEcQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\mKkosEUs.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\UucYYAEs.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\RwIcMsIs.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\agkooIAw.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\gaQQgcEc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\YAcUMgQs.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\vYcQscgI.bat (112 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dog.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Documents\My Music\Sample Music\New Stories (Highway Blues).wma.exe (7726 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\adm.bmp.exe (2321 bytes)
    C:\totalcmd\TOTALCMD.EXE.exe (30812 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\snowflake.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\guitar.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\lift-off.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Sunset.jpg.exe (3073 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\kick.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\butterfly.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\palm tree.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\guest.bmp.exe (2321 bytes)
    C:\totalcmd\TCMADMIN.EXE.exe (3073 bytes)
    C:\totalcmd\TCUNINST.EXE.exe (3073 bytes)
    C:\totalcmd\TcUsbRun.exe (3073 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\duck.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\red flower.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dirt bike.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\horses.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\KAAo.txt (55978 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\astronaut.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\cat.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\chess.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\ball.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\skater.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Blue hills.jpg.exe (3073 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\beach.bmp.exe (3073 bytes)
    %Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Water lilies.jpg.exe (3361 bytes)
    C:\totalcmd\TCMDX32.EXE.exe (3361 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\frog.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\fish.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\airplane.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\pink flower.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Winter.jpg.exe (3361 bytes)
    %Documents and Settings%\%current user%\Local Settings\Application Data\Adobe\Reader 9.3\Setup Files\Setup.exe (5441 bytes)
    %Documents and Settings%\All Users\Documents\My Music\Sample Music\Beethoven's Symphony No. 9 (Scherzo).wma.exe (7433 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\drip.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\car.bmp.exe (2321 bytes)

  4. Delete the following value(s) in the autorun key (How to Work with System Registry):

    [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
    "fGAwoYMM.exe" = "%Documents and Settings%\%current user%\dUskcAww\fGAwoYMM.exe"

    [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "NesIMIQs.exe" = "%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.exe"

  5. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  6. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now