Gen.Trojan.Heur.TP.ntWbmSScmbi_3ff310bcb9
UDS:DangerousObject.Multi.Generic (Kaspersky), Gen:Trojan.Heur.TP.ntW@bmSScmbi (B) (Emsisoft), Gen:Trojan.Heur.TP.ntW@bmSScmbi (AdAware), ZeroAccess.YR (Lavasoft MAS)
Behaviour: Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 3ff310bcb9359a384061ef12a31ea9de
SHA1: cfc1caccad9a62e8000b989dcef9f0d03a51c9d1
SHA256: d999dacab9cdc09826c67f23125dad2fbf5eaeaa68b8fe3fe705da0480ae8d81
SSDeep: 98304:1Xz udBmYLotgiXK0TW3NoZo9LQKOlkr1:1D ur3LaVToL9OC
Size: 3362816 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2015-01-06 02:36:08
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
cscript.exe:1788
cscript.exe:1304
cscript.exe:1140
cscript.exe:212
cscript.exe:1780
cscript.exe:1300
cscript.exe:492
cscript.exe:1948
cscript.exe:1836
cscript.exe:1076
cscript.exe:1072
cscript.exe:344
cscript.exe:544
cscript.exe:1376
cscript.exe:1520
cscript.exe:548
cscript.exe:284
cscript.exe:1672
cscript.exe:2012
cscript.exe:1792
cscript.exe:1152
cscript.exe:260
cscript.exe:1952
cscript.exe:364
cscript.exe:928
cscript.exe:828
cscript.exe:824
cscript.exe:372
cscript.exe:376
cscript.exe:1080
cscript.exe:1920
cscript.exe:1484
cscript.exe:1716
cscript.exe:1256
cscript.exe:520
cscript.exe:1016
cscript.exe:1236
cscript.exe:304
cscript.exe:380
cscript.exe:1932
cscript.exe:1252
cscript.exe:1936
cscript.exe:1436
cscript.exe:900
cscript.exe:1432
cscript.exe:788
cscript.exe:1536
cscript.exe:644
cscript.exe:1224
cscript.exe:572
cscript.exe:1344
cscript.exe:332
cscript.exe:252
cscript.exe:1900
cscript.exe:1632
cscript.exe:1980
cscript.exe:1500
cscript.exe:1036
cscript.exe:500
cscript.exe:636
cscript.exe:1596
cscript.exe:1864
cscript.exe:280
cscript.exe:780
cscript.exe:868
cscript.exe:1620
cscript.exe:1028
cscript.exe:2024
cscript.exe:1104
cscript.exe:816
cscript.exe:1452
cscript.exe:408
cscript.exe:728
cscript.exe:604
cscript.exe:1160
cscript.exe:1168
cscript.exe:552
cscript.exe:232
cscript.exe:1240
cscript.exe:1964
cscript.exe:1196
cscript.exe:2036
cscript.exe:1112
cscript.exe:2032
cscript.exe:1176
cscript.exe:776
cscript.exe:612
cscript.exe:1272
cscript.exe:616
cscript.exe:1276
cscript.exe:1288
cscript.exe:792
cscript.exe:1608
cscript.exe:1040
cscript.exe:1044
cscript.exe:1604
cscript.exe:940
cscript.exe:1472
cscript.exe:476
cscript.exe:2004
cscript.exe:2008
cscript.exe:1368
%original file name%.exe:1304
%original file name%.exe:1140
%original file name%.exe:1300
%original file name%.exe:212
%original file name%.exe:492
%original file name%.exe:1948
%original file name%.exe:268
%original file name%.exe:1076
%original file name%.exe:624
%original file name%.exe:1072
%original file name%.exe:340
%original file name%.exe:544
%original file name%.exe:280
%original file name%.exe:284
%original file name%.exe:816
%original file name%.exe:2012
%original file name%.exe:1792
%original file name%.exe:1796
%original file name%.exe:1152
%original file name%.exe:264
%original file name%.exe:1228
%original file name%.exe:1016
%original file name%.exe:520
%original file name%.exe:1824
%original file name%.exe:1064
%original file name%.exe:828
%original file name%.exe:824
%original file name%.exe:372
%original file name%.exe:376
%original file name%.exe:1532
%original file name%.exe:1920
%original file name%.exe:1480
%original file name%.exe:1484
%original file name%.exe:1716
%original file name%.exe:1256
%original file name%.exe:1520
%original file name%.exe:364
%original file name%.exe:916
%original file name%.exe:584
%original file name%.exe:1232
%original file name%.exe:1336
%original file name%.exe:304
%original file name%.exe:1984
%original file name%.exe:588
%original file name%.exe:380
%original file name%.exe:1932
%original file name%.exe:1252
%original file name%.exe:1436
%original file name%.exe:1432
%original file name%.exe:788
%original file name%.exe:848
%original file name%.exe:1240
%original file name%.exe:1244
%original file name%.exe:436
%original file name%.exe:1220
%original file name%.exe:332
%original file name%.exe:252
%original file name%.exe:1900
%original file name%.exe:1632
%original file name%.exe:852
%original file name%.exe:1988
%original file name%.exe:1500
%original file name%.exe:652
%original file name%.exe:1036
%original file name%.exe:500
%original file name%.exe:1216
%original file name%.exe:1596
%original file name%.exe:1864
%original file name%.exe:780
%original file name%.exe:220
%original file name%.exe:1992
%original file name%.exe:1028
%original file name%.exe:2024
%original file name%.exe:1672
%original file name%.exe:1452
%original file name%.exe:728
%original file name%.exe:1512
%original file name%.exe:1164
%original file name%.exe:604
%original file name%.exe:1160
%original file name%.exe:552
%original file name%.exe:232
%original file name%.exe:1964
%original file name%.exe:1196
%original file name%.exe:1568
%original file name%.exe:2032
%original file name%.exe:644
%original file name%.exe:1176
%original file name%.exe:776
%original file name%.exe:612
%original file name%.exe:1608
%original file name%.exe:1040
%original file name%.exe:1044
%original file name%.exe:1976
%original file name%.exe:940
%original file name%.exe:1472
%original file name%.exe:356
%original file name%.exe:476
%original file name%.exe:2004
%original file name%.exe:1368
%original file name%.exe:804
The Trojan injects its code into the following process(es):
NesIMIQs.exe:1676
fGAwoYMM.exe:1332
reIEcoQI.exe:580
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process NesIMIQs.exe:1676 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\adm.bmp.exe (2321 bytes)
C:\totalcmd\TCMADMIN.EXE.exe (3073 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dog.bmp.exe (2321 bytes)
C:\totalcmd\TOTALCMD.EXE.exe (30812 bytes)
%Documents and Settings%\All Users\Documents\My Music\Sample Music\New Stories (Highway Blues).wma.exe (7726 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\guitar.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\lift-off.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\kick.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\butterfly.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\palm tree.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\guest.bmp.exe (2321 bytes)
C:\totalcmd\TCUNINST.EXE.exe (3073 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\duck.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\red flower.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dirt bike.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\horses.bmp.exe (2321 bytes)
C:\totalcmd\TCMDX32.EXE.exe (3361 bytes)
%Documents and Settings%\All Users\KAAo.txt (55978 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\pink flower.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\astronaut.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\cat.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\chess.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\ball.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\skater.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Blue hills.jpg.exe (3073 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\beach.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Water lilies.jpg.exe (3361 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Sunset.jpg.exe (3073 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\frog.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\fish.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\airplane.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Winter.jpg.exe (3361 bytes)
C:\totalcmd\TcUsbRun.exe (3073 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Adobe\Reader 9.3\Setup Files\Setup.exe (5441 bytes)
%Documents and Settings%\All Users\Documents\My Music\Sample Music\Beethoven's Symphony No. 9 (Scherzo).wma.exe (7433 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\snowflake.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\drip.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\car.bmp.exe (2321 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\skater.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\car.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dog.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\horses.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\palm tree.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\red flower.bmp (0 bytes)
%Documents and Settings%\All Users\Documents\My Music\Sample Music\Beethoven's Symphony No. 9 (Scherzo).wma (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\lift-off.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\duck.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\fish.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\cat.bmp (0 bytes)
%Documents and Settings%\All Users\Documents\My Music\Sample Music\New Stories (Highway Blues).wma (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\frog.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\ball.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\astronaut.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\beach.bmp (0 bytes)
C:\totalcmd\TCUNINST.EXE (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\snowflake.bmp (0 bytes)
C:\totalcmd\TOTALCMD.EXE (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\airplane.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\chess.bmp (0 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Water lilies.jpg (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dirt bike.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\butterfly.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\guitar.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\pink flower.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\drip.bmp (0 bytes)
C:\totalcmd\TCMADMIN.EXE (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\guest.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\adm.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\kick.bmp (0 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Sunset.jpg (0 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Blue hills.jpg (0 bytes)
C:\totalcmd\TCMDX32.EXE (0 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Winter.jpg (0 bytes)
The process %original file name%.exe:1304 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sWMwEIUg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RekYQIws.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\MSsAwoYQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\uksEIAgk.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\RekYQIws.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\MSsAwoYQ.bat (0 bytes)
The process %original file name%.exe:1140 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QuQEUYcQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ekoUUMsA.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\QuQEUYcQ.bat (0 bytes)
The process %original file name%.exe:1300 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\poYAUQkw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yCMQIcAA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsMoIAsQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\JckAwcMs.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsMoIAsQ.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\JckAwcMs.bat (0 bytes)
The process %original file name%.exe:212 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\iskMYogQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kuIgMQAE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hAQMYUsM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\iMcIIcEE.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\iMcIIcEE.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kuIgMQAE.bat (0 bytes)
The process %original file name%.exe:492 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\oAUcgscY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vsocQswc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\wScwIUEY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\iyksEIoo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kmoQYIoo.bat (112 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (52887 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QEocwUQI.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\vsocQswc.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QEocwUQI.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\oAUcgscY.bat (0 bytes)
The process %original file name%.exe:1948 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aOIwYkQs.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\tcAgcMoY.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\tcAgcMoY.bat (0 bytes)
The process %original file name%.exe:268 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\UAYAsMUU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\fKIQoMgI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\teoAAQwA.bat (4 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (52887 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\fWIUAMMQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LUAIgAws.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AWcsIwsM.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\fWIUAMMQ.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AWcsIwsM.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\teoAAQwA.bat (0 bytes)
The process %original file name%.exe:1076 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\HQIMksMs.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YOgEgYgw.bat (112 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (52887 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\tGYIEMIY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WysEcgsg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\gcoQoMgY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\EOgIgowI.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\WysEcgsg.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\gcoQoMgY.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\EOgIgowI.bat (0 bytes)
The process %original file name%.exe:624 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\wUEkgMEc.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\giUcIQsQ.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\giUcIQsQ.bat (0 bytes)
The process %original file name%.exe:1072 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\doEwMUsQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NIkwkkcM.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\NIkwkkcM.bat (0 bytes)
The process %original file name%.exe:340 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\qaYsQUYE.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zQYkYIoc.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\zQYkYIoc.bat (0 bytes)
The process %original file name%.exe:544 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jWIUEAYg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\tWkQsMAc.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\tWkQsMAc.bat (0 bytes)
The process %original file name%.exe:280 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\loAMUkUQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hyQAIoYE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YQoUMsEw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\UoEMcwIw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hsMYQwIY.bat (112 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (52887 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AekkcEMs.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\loAMUkUQ.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AekkcEMs.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hyQAIoYE.bat (0 bytes)
The process %original file name%.exe:284 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WQgAgcEM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CoUswgEI.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\CoUswgEI.bat (0 bytes)
The process %original file name%.exe:816 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\pkwQYIcQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\igYQMQoE.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\igYQMQoE.bat (0 bytes)
The process %original file name%.exe:2012 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\ymQAccsc.bat (4 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\MuoocogU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\OUAUMYQs.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\PIEkoYco.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\ymQAccsc.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\MuoocogU.bat (0 bytes)
The process %original file name%.exe:1792 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\bmYsoAoo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CKIgEowA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QQIksUIc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\OGogMwQI.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\CKIgEowA.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QQIksUIc.bat (0 bytes)
The process %original file name%.exe:1796 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XMMgwsQA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\OWIsogAk.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\XMMgwsQA.bat (0 bytes)
The process %original file name%.exe:1152 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sysUIwsw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XugEIcIE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hmIgwMUg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DoEgoYwI.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\XugEIcIE.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hmIgwMUg.bat (0 bytes)
The process %original file name%.exe:264 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TyYIEsgs.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yuwMYAgk.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kMYAYMww.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\qIYsEgoc.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\TyYIEsgs.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yuwMYAgk.bat (0 bytes)
The process %original file name%.exe:1228 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\PyUEokgg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DekkoIQk.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\DekkoIQk.bat (0 bytes)
The process %original file name%.exe:1016 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AoEkoQIw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IiAosIgU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\daUMEAwA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aYcMMgwk.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\IiAosIgU.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\daUMEAwA.bat (0 bytes)
The process %original file name%.exe:520 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zOEUcEkQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QwUQUUwc.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\zOEUcEkQ.bat (0 bytes)
The process %original file name%.exe:1824 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\EwEsgUkQ.bat (4 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GWoYQYYg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IewwEsAc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\qEkwQEYE.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\EwEsgUkQ.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IewwEsAc.bat (0 bytes)
The process %original file name%.exe:1064 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zisgIAUs.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xIwYogoA.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\zisgIAUs.bat (0 bytes)
The process %original file name%.exe:828 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\EqEAEAoc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AgYUsggA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LoEsYAcM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TesEsQII.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\EqEAEAoc.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TesEsQII.bat (0 bytes)
The process %original file name%.exe:824 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\PSQgEEsQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vQgAYcYk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\EQwYIQYo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\JeQIwsoY.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\PSQgEEsQ.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\JeQIwsoY.bat (0 bytes)
The process %original file name%.exe:372 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\WgcUUkEc.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\fEkwMAUU.bat (112 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (52887 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YsMYwQYg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HCwYQsoM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\JagkwAkM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vqkAgEss.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\YsMYwQYg.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HCwYQsoM.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\JagkwAkM.bat (0 bytes)
The process %original file name%.exe:376 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LwwYIgQo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lgMIIMYA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\iyEAsokM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DuMEMIso.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\LwwYIgQo.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lgMIIMYA.bat (0 bytes)
The process %original file name%.exe:1532 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AEwUIQsQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QSoUMYIw.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KgogwYMQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zkkssEwo.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\zkkssEwo.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QSoUMYIw.bat (0 bytes)
The process %original file name%.exe:1920 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\guUAIcsM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LMcUsUMU.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\LMcUsUMU.bat (0 bytes)
The process %original file name%.exe:1480 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\eUAsQUkM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nWYoQogc.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nWYoQogc.bat (0 bytes)
The process %original file name%.exe:1484 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\PkkQQYQo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\fAAgAMMU.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\fAAgAMMU.bat (0 bytes)
The process %original file name%.exe:1716 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\SisMoMsw.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\MOgcUEEk.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\SisMoMsw.bat (0 bytes)
The process %original file name%.exe:1256 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xwMogkAw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\FEAQwwUw.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\FEAQwwUw.bat (0 bytes)
The process %original file name%.exe:1520 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aIoQIgUw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RGMgwswY.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\RGMgwswY.bat (0 bytes)
The process %original file name%.exe:364 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aUgQAAwU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\igUAoIMM.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\igUAoIMM.bat (0 bytes)
The process %original file name%.exe:916 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\tkkQAgEU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WGocckws.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\WGocckws.bat (0 bytes)
The process %original file name%.exe:584 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\QiwsoMIo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hMAcckEg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WscQkoYg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WYoEwAYo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ngYQIwMQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HcggMswM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\foQMEckw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ZAwEUQgk.bat (4 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (70516 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\QiwsoMIo.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ZAwEUQgk.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WYoEwAYo.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HcggMswM.bat (0 bytes)
The process %original file name%.exe:1232 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\wMUYsYkY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\JuoYEMAQ.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\wMUYsYkY.bat (0 bytes)
The process %original file name%.exe:1336 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WYAsIAYQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ISUcMcsQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\tIQIoYsk.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GAogAUQI.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\ISUcMcsQ.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\tIQIoYsk.bat (0 bytes)
The process %original file name%.exe:304 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jkskcMUM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\cEoocMcs.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\BUAAQAco.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vIoQAYgk.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\cEoocMcs.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\BUAAQAco.bat (0 bytes)
The process %original file name%.exe:1984 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YYssokMs.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TEcIMUgI.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\TEcIMUgI.bat (0 bytes)
The process %original file name%.exe:588 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AWsoIAYs.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\BkUAkgck.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\AWsoIAYs.bat (0 bytes)
The process %original file name%.exe:380 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\oUMUEEAw.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lSQwowYM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\gYscsQYE.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RaYcsgQc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xwsYMwUw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\MIwQwkYo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RIEAAEQA.bat (112 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (70516 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ZEokAQUU.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\oUMUEEAw.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RaYcsgQc.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\MIwQwkYo.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ZEokAQUU.bat (0 bytes)
The process %original file name%.exe:1932 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nIcAQgAE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\VIkUcAgM.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nIcAQgAE.bat (0 bytes)
The process %original file name%.exe:1252 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NckgsoMA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WkYMIYko.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RCoEAoUA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nKkoswQU.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\NckgsoMA.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nKkoswQU.bat (0 bytes)
The process %original file name%.exe:1436 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\aAQgYksc.bat (4 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\PIMcwcoU.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\aAQgYksc.bat (0 bytes)
The process %original file name%.exe:1432 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WMgccUYU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ocwcMIwM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KyMgMoAg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\OgQwYooU.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\KyMgMoAg.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\OgQwYooU.bat (0 bytes)
The process %original file name%.exe:788 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\fgsMEsMo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\gAMIMwgY.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\gAMIMwgY.bat (0 bytes)
The process %original file name%.exe:848 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YGUYYMIA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jakYoIwY.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\YGUYYMIA.bat (0 bytes)
The process %original file name%.exe:1240 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AEgYEUoM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HiUAUwYU.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\HiUAUwYU.bat (0 bytes)
The process %original file name%.exe:1244 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\guAoQcoE.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LQMkkUUQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\swwIsEcU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HmMAQkok.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\LQMkkUUQ.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\swwIsEcU.bat (0 bytes)
The process %original file name%.exe:436 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\JcYwcIkY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TmkMQgcA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\uGQIkswU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RAskoIYk.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\uGQIkswU.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\JcYwcIkY.bat (0 bytes)
The process %original file name%.exe:1220 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\eccgkYok.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sEcIgEkM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LyggkwMc.bat (4 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (52887 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ImsswskU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nawYcIgY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\BooQkEEE.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\sEcIgEkM.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\eccgkYok.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LyggkwMc.bat (0 bytes)
The process %original file name%.exe:332 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\roYQwsQc.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TCgMYkIA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\uyYMUcEs.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rkQgIcwM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kUYEEsQs.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\pqUsUsYM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YWYAsYss.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NYkQcQsw.bat (4 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (70516 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\YWYAsYss.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NYkQcQsw.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TCgMYkIA.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\pqUsUsYM.bat (0 bytes)
The process %original file name%.exe:252 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NaUwQMwk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LAIUQkAg.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\LAIUQkAg.bat (0 bytes)
The process %original file name%.exe:1900 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\igkoUAIc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XaYQIQAE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zOcQUEQY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rqEcskAg.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\igkoUAIc.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XaYQIQAE.bat (0 bytes)
The process %original file name%.exe:1632 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lSUIkMQA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\UWYEoswg.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\UWYEoswg.bat (0 bytes)
The process %original file name%.exe:852 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\YEoUwAYA.bat (4 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\MQIIooUQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jmswwMok.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KqAAwMMQ.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\YEoUwAYA.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KqAAwMMQ.bat (0 bytes)
The process %original file name%.exe:1988 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vAcQAEgw.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IoskcAUY.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\vAcQAEgw.bat (0 bytes)
The process %original file name%.exe:1500 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\dEoEUQwE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\twQcgcco.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\dEoEUQwE.bat (0 bytes)
The process %original file name%.exe:652 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\All Users\JuwEIgUE\reIEcoQI.exe (3777 bytes)
%Documents and Settings%\%current user%\dUskcAww\fGAwoYMM.exe (3873 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\tegEIkgM.bat (4 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.exe (3849 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YgwwIwkU.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\tegEIkgM.bat (0 bytes)
The process %original file name%.exe:1036 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\sGgQooAs.bat (4 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\wYwogMEA.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\sGgQooAs.bat (0 bytes)
The process %original file name%.exe:500 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RqEUgkME.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yiIUQokg.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\RqEUgkME.bat (0 bytes)
The process %original file name%.exe:1216 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lqIwsMYs.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jcwUEQIo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IqMsgoQU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jAcYkEsE.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\lqIwsMYs.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jcwUEQIo.bat (0 bytes)
The process %original file name%.exe:1596 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nKwcgQQA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DKUwEQso.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TYkkgQow.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Hiwggwgo.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\TYkkgQow.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Hiwggwgo.bat (0 bytes)
The process %original file name%.exe:1864 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DIksokoU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\cGIMYskE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XoIwUEQk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TIUMcMoQ.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\DIksokoU.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\cGIMYskE.bat (0 bytes)
The process %original file name%.exe:780 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KoEwkMUI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GaAMowgU.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\GaAMowgU.bat (0 bytes)
The process %original file name%.exe:220 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\qMkwkQYk.bat (4 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zEMAgsAw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nkYQUwok.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AmckMYkM.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\qMkwkQYk.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nkYQUwok.bat (0 bytes)
The process %original file name%.exe:1992 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\CcQEEAEM.bat (4 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\EwkQwwgw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kkwoocgs.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RoUkEUIc.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\CcQEEAEM.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kkwoocgs.bat (0 bytes)
The process %original file name%.exe:1028 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XUYMEgMs.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\qYYwYkME.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XWkIEQMg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\teEYoAYo.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\qYYwYkME.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XWkIEQMg.bat (0 bytes)
The process %original file name%.exe:2024 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\QYssEwAw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kiEsgIkc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xaQwEoUM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sSAwkYks.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YOcwwcsg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jWcwswAE.bat (112 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (52887 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\sSAwkYks.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kiEsgIkc.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xaQwEoUM.bat (0 bytes)
The process %original file name%.exe:1672 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KGwkUoUE.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\PcggEksg.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\PcggEksg.bat (0 bytes)
The process %original file name%.exe:1452 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WYwMYAQs.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NeocgkYQ.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\WYwMYAQs.bat (0 bytes)
The process %original file name%.exe:728 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ACAMkkss.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aaYUYMQY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XGUwQQMk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xEIMAsIg.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\ACAMkkss.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aaYUYMQY.bat (0 bytes)
The process %original file name%.exe:1512 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TMoUssEQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ZkcAooIc.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\TMoUssEQ.bat (0 bytes)
The process %original file name%.exe:1164 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\awQwUUsU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rugscYQA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TggQsIYU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HAcwgIMU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DcAscwkU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AgQYAwAA.bat (4 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (52887 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\TggQsIYU.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AgQYAwAA.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rugscYQA.bat (0 bytes)
The process %original file name%.exe:604 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aioMMAkw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\luEkMEgY.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\luEkMEgY.bat (0 bytes)
The process %original file name%.exe:1160 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XmEUQUUo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\fGssEEAA.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\XmEUQUUo.bat (0 bytes)
The process %original file name%.exe:552 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RQEUUoMI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QWcsgYgc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\fmMwIcoA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\MWMosYQY.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\RQEUUoMI.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QWcsgYgc.bat (0 bytes)
The process %original file name%.exe:232 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\gsEkcsoE.bat (4 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YYYAkYsA.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\gsEkcsoE.bat (0 bytes)
The process %original file name%.exe:1964 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QUgIwMsQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\dSAkAUAE.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\QUgIwMsQ.bat (0 bytes)
The process %original file name%.exe:1196 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\bwgosEco.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sKMMEAQs.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\bwgosEco.bat (0 bytes)
The process %original file name%.exe:1568 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aiIwoUsQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TIowoAsE.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\TIowoAsE.bat (0 bytes)
The process %original file name%.exe:2032 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nwkQEYoM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vuIMkEMU.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nwkQEYoM.bat (0 bytes)
The process %original file name%.exe:644 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\SagcAEoU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xYYoYEAo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yAUMoUMw.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\pwssIcgc.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\xYYoYEAo.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yAUMoUMw.bat (0 bytes)
The process %original file name%.exe:1176 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\KuIAIEMs.bat (4 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\imkYUkgo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\UsQgoMYI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rUoQsgAs.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\KuIAIEMs.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\imkYUkgo.bat (0 bytes)
The process %original file name%.exe:776 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nKoowUsc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YkYQQwMo.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nKoowUsc.bat (0 bytes)
The process %original file name%.exe:612 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QIwsUwcA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\SyoockcM.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\SyoockcM.bat (0 bytes)
The process %original file name%.exe:1608 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\CeskgssA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\VSgEgIoI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WOwosocE.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rWUkwwkM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yKwsMIIg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jAQwAkMI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jkccUwYA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\fAQIAsEA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mCMwQokQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vcIQEMMc.bat (4 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (105774 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ceMUwkgg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\eyAQoUsY.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\rWUkwwkM.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jAQwAkMI.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jkccUwYA.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\fAQIAsEA.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CeskgssA.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vcIQEMMc.bat (0 bytes)
The process %original file name%.exe:1040 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\AYQoQoUA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QSMsEsUI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jiMIsQYg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KEkAoksM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DOQogQIM.bat (4 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (70516 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\qOsYMIkU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sAIgAQcs.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NIcQEoUE.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\qOsYMIkU.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KEkAoksM.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AYQoQoUA.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DOQogQIM.bat (0 bytes)
The process %original file name%.exe:1044 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NuwoMoYo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\duUQcQkg.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\NuwoMoYo.bat (0 bytes)
The process %original file name%.exe:1976 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\vgsMsYog.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AUEUkIoM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\suwwIwgk.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yykYQIsQ.bat (112 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (52887 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kkoQoMUI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lUEMgkEY.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\suwwIwgk.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kkoQoMUI.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AUEUkIoM.bat (0 bytes)
The process %original file name%.exe:940 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HAcckEUs.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\FAwkkIcE.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\HAcckEUs.bat (0 bytes)
The process %original file name%.exe:1472 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\OGUYwoks.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\fuoAgYQE.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\fuoAgYQE.bat (0 bytes)
The process %original file name%.exe:356 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\QOUkMUos.bat (4 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CuYggYYc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYUgEQks.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HasgUckc.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\QOUkMUos.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CuYggYYc.bat (0 bytes)
The process %original file name%.exe:476 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nqYQYggU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\eYkwYgkA.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\eYkwYgkA.bat (0 bytes)
The process %original file name%.exe:2004 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XSoEUAcI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kaIwIsAI.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\XSoEUAcI.bat (0 bytes)
The process %original file name%.exe:1368 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vioskAgk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\uioEYkEA.bat (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\uioEYkEA.bat (0 bytes)
The process %original file name%.exe:804 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\OqcwMIMk.bat (4 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (17629 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DqkMIIoo.bat (112 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\OqcwMIMk.bat (0 bytes)
Registry activity
The process NesIMIQs.exe:1676 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EA 05 B3 B2 D7 3C 3E 29 E7 9A 19 D3 F8 1D 8D 4E"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NesIMIQs.exe" = "%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.exe"
The process fGAwoYMM.exe:1332 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F7 4C 25 07 DE A3 35 0B 2C 2F 97 4F 98 77 DE 90"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"fGAwoYMM.exe" = "%Documents and Settings%\%current user%\dUskcAww\fGAwoYMM.exe"
The process reIEcoQI.exe:580 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "31 C6 4A F7 FA AF 11 76 8E E0 25 44 4A 2F 57 EC"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NesIMIQs.exe" = "%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.exe"
The process cscript.exe:1788 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "90 CE A2 82 96 A3 E0 56 DA FE F3 39 7A 2B F7 CF"
The process cscript.exe:1304 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "17 E9 A7 89 BE 9B EA 86 E6 DC 0D CC 1F F0 B9 78"
The process cscript.exe:1140 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B6 EE 27 10 D6 CE A6 5B 1F 3B 83 8E C7 28 BF F5"
The process cscript.exe:212 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "03 DD BC 87 C6 E5 A8 C0 0F D4 62 BF 08 D5 F4 D2"
The process cscript.exe:1780 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C9 1E 9C E9 E8 BD FD 4A B8 D5 9E 34 F4 2B E4 21"
The process cscript.exe:1300 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5D 5E EB 36 FA 16 FC B0 7C AF C9 52 46 2B 9F 7F"
The process cscript.exe:492 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "01 61 60 7E 54 81 12 13 1C C6 39 61 62 C1 9A 72"
The process cscript.exe:1948 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "62 B9 6A 3B 1E 96 83 87 52 E7 1F 0B 50 82 0F 71"
The process cscript.exe:1836 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1C 5A 2C 6D DF 75 B3 3A A7 3C 31 E6 F9 99 87 17"
The process cscript.exe:1076 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "62 EB BC 30 DE 3F 0A 24 4F 5D 33 39 8A 5B 99 CD"
The process cscript.exe:1072 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "77 46 29 E9 0A BB 1A 4E 11 84 41 D6 99 48 D5 2E"
The process cscript.exe:344 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6C 60 37 C7 C6 AD 2E 2F D2 1D 95 06 D4 62 65 BE"
The process cscript.exe:544 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "12 40 46 78 78 E2 E7 2E DC 3A 43 42 B7 44 C6 98"
The process cscript.exe:1376 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "20 22 82 B0 98 11 D1 A1 D9 CA 96 9A E9 2F 5C E2"
The process cscript.exe:1520 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E1 F8 24 02 47 F9 5A DA 56 37 D5 6C 01 1F 65 95"
The process cscript.exe:548 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "55 3B 04 47 63 3A 9C 4D 8A 74 77 F9 91 A7 B0 9C"
The process cscript.exe:284 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D1 8B 78 53 BB 54 05 95 AD FC 31 F7 4C 05 80 CE"
The process cscript.exe:1672 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5A F9 80 E0 78 C9 FE 3B 0E 17 B7 DD F7 36 7A 2E"
The process cscript.exe:2012 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E0 11 3A 33 56 01 59 AB B7 D2 A5 E5 A1 B0 FC C2"
The process cscript.exe:1792 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3C 8A 32 38 71 F5 36 BD 62 A9 48 78 26 A7 95 A5"
The process cscript.exe:1152 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F0 DF 2B E1 DD 3B 67 F2 E5 7D 0E A7 B0 54 EA 73"
The process cscript.exe:260 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "74 D6 2F 90 12 20 FE 38 BE 9C F7 D4 3A FA A6 BF"
The process cscript.exe:1952 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2C 25 FE 9B 5C 5D 64 8E 4B 27 F3 6A 35 D7 1D 2B"
The process cscript.exe:364 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "24 D7 49 67 B0 9F C0 56 C4 0B 14 3A 77 5E 3C 77"
The process cscript.exe:928 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "61 EA 96 3F E5 EF ED 92 E4 E8 BB 43 C5 84 A9 D7"
The process cscript.exe:828 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9B 3C A1 E2 94 6F 15 64 DD 21 28 99 B8 40 D5 D3"
The process cscript.exe:824 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "03 37 3F D8 ED 20 5D D0 BD 4E D0 A0 D5 92 0C 7A"
The process cscript.exe:372 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0E C4 F6 96 17 8C 96 8E 4C 8C 04 27 8D C6 DE 3A"
The process cscript.exe:376 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B1 F9 56 C1 8C FE E9 6D 27 6D D5 8A 72 B4 B6 12"
The process cscript.exe:1080 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6F 25 69 11 47 C7 99 38 7E D1 E2 BF 2D 49 BC F3"
The process cscript.exe:1920 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B2 04 D8 DB A7 61 4D A5 F3 90 8C CA D5 AB 3F C6"
The process cscript.exe:1484 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "04 CA 4D CC A2 41 24 FD 17 BB EE 6B 1C 6B 61 9F"
The process cscript.exe:1716 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "01 80 E6 13 02 D2 5B 44 82 BB A6 14 E5 56 C2 CB"
The process cscript.exe:1256 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "31 33 F3 F9 BA 1B EC D7 0C 57 DD 0E 21 E7 3E 27"
The process cscript.exe:520 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "95 F8 EC B3 08 1B B3 AA F9 CD 99 2C 5C 1E 22 46"
The process cscript.exe:1016 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A6 6B 51 C5 19 05 B8 C3 CD 0F F2 DB ED 38 49 96"
The process cscript.exe:1236 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "29 73 94 C8 FA B2 5D 13 8F AF 28 AB 66 55 E6 19"
The process cscript.exe:304 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "69 A8 71 E9 C5 FE D4 2A 38 6C 7F C7 FC 2F AD A7"
The process cscript.exe:380 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "7B 4E 58 E8 4B 0D 7F 5A 65 9D FB AA EC AD CC 77"
The process cscript.exe:1932 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "16 2B DC 25 F0 31 FC 78 67 4F 39 86 9F 90 40 03"
The process cscript.exe:1252 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D0 AC 57 CA 31 92 C3 66 7F C0 C0 F7 09 72 8A 66"
The process cscript.exe:1936 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2D AD C1 8F 79 FA F8 B4 04 27 DD 8A 11 7A 17 32"
The process cscript.exe:1436 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DE 9A D1 19 E2 A4 C5 0B 5D 03 80 4E 27 F7 73 5E"
The process cscript.exe:900 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E6 78 46 54 9D 25 B3 CE 6E 7B 75 B3 15 AE B6 E0"
The process cscript.exe:1432 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "08 75 1E 59 75 BE AF 27 84 98 1A 52 A6 02 AE EE"
The process cscript.exe:788 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5A 1A EE 44 52 75 6A 5F 25 52 7C 33 65 D2 9B 55"
The process cscript.exe:1536 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "4E 67 F1 61 19 8C 0F 2D 7F 16 5A EF 06 B5 B9 B9"
The process cscript.exe:644 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "34 9F F6 87 C2 8D C6 71 ED 53 E7 7F 18 67 73 32"
The process cscript.exe:1224 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "78 B4 03 4C 70 6C 02 C7 9E 42 B3 9A BE A0 8A 12"
The process cscript.exe:572 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0C 5F B4 D8 E2 E2 85 19 BC 8E 31 76 4A 98 6B DB"
The process cscript.exe:1344 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "83 10 28 99 FC 67 24 CA 2F 2B 3A 8C 09 BC 62 CF"
The process cscript.exe:332 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6E 54 41 C9 53 75 AA 6F F9 64 8F 0B E0 C1 29 AF"
The process cscript.exe:252 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F8 3E 70 FD AF AE D7 A9 4F CD 30 5B 1D 0A 1A C1"
The process cscript.exe:1900 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "05 12 BE 99 70 75 1B 4F 75 9F 4E 76 75 47 B1 79"
The process cscript.exe:1632 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FB 50 FC 19 19 74 89 38 E3 5C 5C 80 70 A4 96 CF"
The process cscript.exe:1980 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "80 C1 6B EC 4F 35 EA 25 0F A5 40 E7 77 D4 8B 14"
The process cscript.exe:1500 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F5 76 8B E8 F5 4E 42 BF 93 25 14 C6 57 DE 5D 0F"
The process cscript.exe:1036 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D0 B2 03 1C 4B A0 BB DB 52 F0 30 4B AC D5 8B 47"
The process cscript.exe:500 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "16 C8 65 CC C1 DF F4 E5 37 D8 7A AD EF B9 47 4D"
The process cscript.exe:636 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DD 0F 81 4C 90 AB 61 A3 92 F5 4F F1 95 9A 6D 90"
The process cscript.exe:1596 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "33 EC A5 7F 6B F3 3D AA EE 90 2B AC AC 31 77 3E"
The process cscript.exe:1864 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6F 7C 29 DD A9 EF AE 7D C2 D5 9A 1D 79 87 59 59"
The process cscript.exe:280 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D2 BE 24 51 DC 58 95 C0 35 08 97 66 DC A9 69 44"
The process cscript.exe:780 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0B 40 4D AC 61 E0 61 52 86 2A 86 25 75 FB CE 85"
The process cscript.exe:868 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6F 7C 0C CD 7F EC C5 FA 9C AB 31 7B B9 09 FC 6C"
The process cscript.exe:1620 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "33 E9 50 90 00 72 88 1F 61 0C DF F2 D6 44 46 1F"
The process cscript.exe:1028 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A5 E1 42 E9 9D CB 05 1A E9 2C 80 F1 2D EE 02 78"
The process cscript.exe:2024 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EC 89 BF F7 AC 5E 71 D1 42 49 36 7D 2A 71 6F E6"
The process cscript.exe:1104 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9E 1C 81 71 11 EB C2 5D D8 98 8F 00 59 8A 79 98"
The process cscript.exe:816 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9F ED 55 2D 88 B5 41 7F 44 70 2C E0 DD 3E 3C 52"
The process cscript.exe:1452 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "50 65 1B 7F B5 1F CA BC F9 D5 08 6B F8 CE A8 3D"
The process cscript.exe:408 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "54 AB B1 CA 56 11 82 8B CF A6 04 81 7A F0 2E B6"
The process cscript.exe:728 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1B 58 51 4E 45 A3 7D 1A C1 E8 C3 19 D5 B8 40 90"
The process cscript.exe:604 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "67 CA 4E 30 D4 E4 52 1A 7F 9F D8 39 7D 76 35 59"
The process cscript.exe:1160 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0D B8 C8 14 6A 63 AA 92 BA 65 20 1D D9 68 2D 2F"
The process cscript.exe:1168 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FE AF 8C B4 97 C4 7D 85 30 9E 9D 30 F1 FF 3A 6B"
The process cscript.exe:552 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "16 27 6A 44 5A 9E D2 40 1A 3B AD 1B 1A B3 20 63"
The process cscript.exe:232 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "35 4C 66 34 6D 43 6F F4 E9 9D E8 75 68 29 15 0D"
The process cscript.exe:1240 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "07 B9 FC 4F F0 93 1D 61 3A C1 76 8C 22 7A 92 16"
The process cscript.exe:1964 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "57 FB F3 8B F5 1F 90 04 5A 23 90 98 41 BE AF 5E"
The process cscript.exe:1196 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C3 3D 16 A8 7A 1E 0E 1B 04 BC 52 C1 7D F9 AA AB"
The process cscript.exe:2036 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EA E9 98 87 43 1C 5A 09 07 C1 93 74 8E A1 8A AD"
The process cscript.exe:1112 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C2 6D 39 96 60 26 8C A5 26 C0 A0 42 08 20 4A 32"
The process cscript.exe:2032 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BD 22 B2 61 89 A3 18 73 01 53 3E E3 1B C3 45 68"
The process cscript.exe:1176 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2E 4B CC 87 12 EB 59 CD 43 D6 0F 62 CA 3F 4F F4"
The process cscript.exe:776 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1D 25 FA 1F F3 15 63 C4 3C AF 5F 50 2B 75 5E 62"
The process cscript.exe:612 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6A 80 7B 63 87 60 E3 10 2E B4 E9 F9 C2 6B E8 53"
The process cscript.exe:1272 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E0 BA 65 DF B7 DD F7 6B 7B 35 10 35 71 43 45 46"
The process cscript.exe:616 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1D 77 8D 8E 92 12 95 9C BA 7A 44 8D 3E AD 6F E1"
The process cscript.exe:1276 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "73 A7 30 A3 75 17 D4 57 91 57 C6 8C 8B 32 3D 47"
The process cscript.exe:1288 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "11 60 40 76 75 96 19 B5 85 68 8E 8D BB 93 46 BF"
The process cscript.exe:792 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BB C1 BA 1D 8B A3 2C 93 14 1E D3 7D C3 4D 34 BC"
The process cscript.exe:1608 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "15 40 89 8D D7 9E F8 00 14 01 BC CA 47 47 D9 07"
The process cscript.exe:1040 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2F 63 84 97 ED 25 0E FE 9F D9 98 87 A1 7D 53 E2"
The process cscript.exe:1044 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "20 C4 99 3E 97 DC AF 98 85 10 E7 03 CE 32 28 BB"
The process cscript.exe:1604 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A7 E4 BE 06 5F 6E 6E 46 E1 2F 8C 2F A7 EA 89 54"
The process cscript.exe:940 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BB 92 4F CE 8A C7 EF D1 92 22 02 48 D1 39 6E 70"
The process cscript.exe:1472 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AB 72 30 ED 46 CD 65 D4 09 37 83 DB 31 5D 5A 7F"
The process cscript.exe:476 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E9 17 FB 79 C5 EB 03 B1 3F 20 F0 AE 1E 2F 90 7F"
The process cscript.exe:2004 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "76 C4 91 65 4B 1D 69 D9 0D 45 DF E9 AB AD AB D3"
The process cscript.exe:2008 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "36 67 0A C1 CC E1 15 E9 F1 AD 9B AE 31 A5 EF 14"
The process cscript.exe:1368 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EF E2 F3 89 A4 53 0A A6 1E 87 14 03 5D AF B2 C2"
The process %original file name%.exe:1304 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F6 E9 A8 E8 55 59 59 9A 11 A3 31 FF 97 E7 82 7F"
The process %original file name%.exe:1140 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "4F 53 76 9F B1 36 D7 08 6D 96 EB B7 CC 6D 45 27"
The process %original file name%.exe:1300 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "03 9C 6D 43 89 B0 CF 2E 21 57 FF 97 4D 52 FD 9F"
The process %original file name%.exe:212 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F2 F8 B7 D7 C7 B2 CB 8C 5F 7B 70 62 F0 CF 13 BC"
The process %original file name%.exe:492 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "13 09 95 55 A7 02 AB FA 4F 57 F7 0C 83 08 02 C6"
The process %original file name%.exe:1948 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "04 50 04 F7 4A FA 84 62 50 58 A6 A6 51 2C 32 12"
The process %original file name%.exe:268 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "21 FF 09 D7 D8 41 B9 14 1F 6A 44 8F 36 31 00 06"
The process %original file name%.exe:1076 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D1 A6 6E D3 84 F3 4E B6 CA 8A 3C 39 C1 FE 77 98"
The process %original file name%.exe:624 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AC 78 BB FC 83 D4 A5 21 1C E7 1E 69 22 67 A2 E5"
The process %original file name%.exe:1072 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "74 03 64 6C 8D 63 9F E0 EE 24 53 D2 A2 53 70 45"
The process %original file name%.exe:340 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F9 02 1C 41 D3 18 62 E2 A6 F5 81 15 8D CA D8 B6"
The process %original file name%.exe:544 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6C 7F FE 4E 40 B0 22 EB B1 96 54 A7 48 E8 2B E4"
The process %original file name%.exe:280 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "03 D9 03 71 CB 27 BB D5 19 5A 06 20 EE 73 84 E7"
The process %original file name%.exe:284 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C0 05 A2 03 3C 27 F6 1A 13 89 3C 40 59 E5 6B 7D"
The process %original file name%.exe:816 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B6 0F FC F9 A6 4F 24 7C 1A D1 C1 E0 C5 0E BE 53"
The process %original file name%.exe:2012 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "62 CE 58 01 2A F1 7D 6C 6D E2 23 0C 83 86 5F 70"
The process %original file name%.exe:1792 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E1 56 24 05 51 4A 6E FF 8B 24 58 99 B7 14 CE 21"
The process %original file name%.exe:1796 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "11 DE 12 B5 71 5E D0 17 B5 4F 48 A0 A9 E4 32 A0"
The process %original file name%.exe:1152 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5D E2 54 E0 B8 7C 08 8B D0 34 95 F4 A4 42 73 7E"
The process %original file name%.exe:264 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1D A9 EF 34 7D D3 95 65 85 A9 17 4D 0F 00 2F B4"
The process %original file name%.exe:1228 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A1 3B 56 F0 4E 54 AF 19 75 0C 05 CF D0 CE F2 12"
The process %original file name%.exe:1016 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "33 F6 1D 85 BD 08 68 88 63 0F 1F E7 1E B8 6F 29"
The process %original file name%.exe:520 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F2 CE ED 49 73 1F 25 96 D5 D9 03 C5 C7 B2 E5 68"
The process %original file name%.exe:1824 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "30 0E 9B 05 2A 4E 49 5A 90 30 AC 89 39 32 91 BD"
The process %original file name%.exe:1064 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "58 3E 55 6E 71 62 C8 D9 CF C1 80 83 A7 4A 19 D3"
The process %original file name%.exe:828 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "48 CF 24 00 B6 A5 5C CF 91 A0 50 3B AF E3 1D E7"
The process %original file name%.exe:824 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CD E7 B9 ED 14 6D 06 C9 8C FF EB 51 9A D5 3B 59"
The process %original file name%.exe:372 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "15 C6 B5 6D 34 DA F2 72 BF 59 32 2D 2B 13 F9 FB"
The process %original file name%.exe:376 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "25 CC FB 10 3F E3 7F 46 6B C6 C7 27 29 CF D0 DB"
The process %original file name%.exe:1532 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "44 2D 2A 54 D3 93 B0 5A D7 13 8A 55 E8 8D 22 B3"
The process %original file name%.exe:1920 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "56 FB 67 1F AD 67 72 FA 2D 8F 99 D9 66 85 C8 D9"
The process %original file name%.exe:1480 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "24 51 2E 82 95 BE B2 51 A3 30 20 48 49 BE E1 B6"
The process %original file name%.exe:1484 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "50 F3 E7 7C 18 B1 80 1B 57 71 F5 80 54 A9 76 3B"
The process %original file name%.exe:1716 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2D 6F 0C EF DA BD DC 0A 76 2E 84 40 AA 01 56 85"
The process %original file name%.exe:1256 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6B 22 FB 2E 46 5E 55 AD 22 F2 5C 33 F2 D3 77 CF"
The process %original file name%.exe:1520 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "61 F6 29 B9 F0 EA 9D 7C D8 F3 AA 1E 42 0F 99 3D"
The process %original file name%.exe:364 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6E 7C 02 AB 93 0F 36 DF E8 0A FE 5C 2D 29 C4 B5"
The process %original file name%.exe:916 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9C EA 84 29 5F 1D 0F C0 90 48 4B 7D EC 99 F0 01"
The process %original file name%.exe:584 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9F 5A B2 20 65 19 AD DF EC 8C 81 EA 31 79 A6 91"
The process %original file name%.exe:1232 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D8 DF 07 2B 95 A7 B9 CF 5D E8 70 37 7A 99 52 06"
The process %original file name%.exe:1336 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "29 F3 7A AE E2 E5 3F BD 3F D2 0F 36 B9 3E 55 C7"
The process %original file name%.exe:304 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5C 0A E5 15 81 58 4C 4E 67 C8 9A 1A 69 92 E5 BF"
The process %original file name%.exe:1984 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "84 AB 9E 2E BB 56 1C BF F2 11 2C 74 7D A5 48 4E"
The process %original file name%.exe:588 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BB 1F 88 DD 81 B2 0F 15 4E 7D 31 2C F4 B8 C3 ED"
The process %original file name%.exe:380 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8B 73 6F FC 6F 06 3E AD E9 32 20 8F 3D D4 01 29"
The process %original file name%.exe:1932 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1D 04 F8 05 B2 75 B8 06 DF 2E 5F 90 C2 C7 20 FA"
The process %original file name%.exe:1252 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F6 40 C3 A2 A3 37 64 CF 13 76 98 43 E6 24 B5 6A"
The process %original file name%.exe:1436 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B9 59 EA 66 19 CE 90 B3 13 DF FE 67 2A F1 CD F5"
The process %original file name%.exe:1432 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3A D5 BD 71 62 28 58 16 98 1B D2 70 A6 33 32 0F"
The process %original file name%.exe:788 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "82 55 FC 00 09 E8 70 A2 6C D9 1B 09 E5 81 63 7B"
The process %original file name%.exe:848 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5A 92 AB A5 4D 08 4D CC CF 76 3F CA 7B CF 4B 11"
The process %original file name%.exe:1240 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D6 51 E1 DA CB D5 95 01 D9 5C DD C7 46 41 74 D1"
The process %original file name%.exe:1244 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "87 FB 8C 67 51 97 2E D2 22 CB 1A 8E 5D 97 71 1B"
The process %original file name%.exe:436 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "56 F4 BC E3 52 E6 72 76 52 61 DF 7C 09 A7 51 F1"
The process %original file name%.exe:1220 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2B DF 58 B9 CA 70 45 07 B4 00 37 5D 64 80 A7 DE"
The process %original file name%.exe:332 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "7C D8 37 17 20 B1 95 0B E4 90 6F D9 2D 69 6E 5E"
The process %original file name%.exe:252 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FA B1 1E 3B EA 64 22 A1 37 B7 67 25 B4 3B 1D 97"
The process %original file name%.exe:1900 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FA 5D 43 EE 36 A9 D6 3F DA E8 EB 36 54 44 A1 A5"
The process %original file name%.exe:1632 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A4 9A 87 86 D6 74 11 2E 1F 5E 62 5F 98 BE 50 7C"
The process %original file name%.exe:852 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BE B9 9F A1 A8 CE 53 02 69 0A 41 20 79 5A 67 02"
The process %original file name%.exe:1988 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "42 BC 30 60 F6 B5 F8 56 D2 C0 EB 84 FF 3C 53 8C"
The process %original file name%.exe:1500 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AD 96 9B 08 2F 63 9B A1 F2 8C FA 10 67 37 34 AD"
The process %original file name%.exe:652 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "4B 6F 06 50 63 51 00 81 A0 B6 45 E6 20 5C 8E 78"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"fGAwoYMM.exe" = "%Documents and Settings%\%current user%\dUskcAww\fGAwoYMM.exe"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NesIMIQs.exe" = "%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.exe"
The process %original file name%.exe:1036 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DC 8E 46 23 40 D6 BF F8 63 0F 65 E9 E8 CD 5D BA"
The process %original file name%.exe:500 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "40 01 4A 43 46 17 C1 0B A0 D8 45 B7 53 F8 C5 1B"
The process %original file name%.exe:1216 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5D E7 B6 2B 29 7F BC 46 F3 1E 67 85 A7 67 23 AE"
The process %original file name%.exe:1596 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "42 A4 DA 7C 5A 30 A9 DD 37 57 F4 6A 02 EA 90 47"
The process %original file name%.exe:1864 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F8 F0 C3 09 35 FF F9 B4 82 C3 3E C5 18 D9 EE 8F"
The process %original file name%.exe:780 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "67 91 A1 2D 5C BB 1A 42 28 10 F8 B3 FC 72 82 8C"
The process %original file name%.exe:220 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CB 53 2F D8 2A 04 CB F7 47 DD 40 44 CD A1 30 90"
The process %original file name%.exe:1992 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "64 FE 51 BB 4E B8 A8 E4 4C F3 67 09 FD 19 97 B4"
The process %original file name%.exe:1028 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EC 31 4C 85 07 A0 F7 71 84 C2 D1 2D 99 68 81 00"
The process %original file name%.exe:2024 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F8 25 9F E7 47 0A 20 C1 59 9A 39 94 33 94 8D 85"
The process %original file name%.exe:1672 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1C 8C F9 1C 9B 65 1A 5C BC A4 C1 C0 B4 16 9F 03"
The process %original file name%.exe:1452 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1D 4E 70 C7 AE 45 97 FC 85 F3 15 29 CB 59 25 6A"
The process %original file name%.exe:728 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F9 E2 35 3A F5 AC 09 41 F9 1E F7 2A A1 6D F4 22"
The process %original file name%.exe:1512 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "35 A6 3E 71 C6 BA 66 7E 60 43 07 62 87 E0 94 94"
The process %original file name%.exe:1164 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D8 ED C8 CF B2 39 AE D5 EF 92 C0 EE 65 D5 D5 EC"
The process %original file name%.exe:604 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "74 B4 94 FF D8 AC 69 ED B6 C3 67 AD A4 2E D0 2C"
The process %original file name%.exe:1160 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D8 08 F4 27 C3 1D FC 8C AE 56 52 8D A3 55 70 F0"
The process %original file name%.exe:552 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "76 78 9A 4E C0 46 58 A4 E4 3B 99 19 4F 70 22 EF"
The process %original file name%.exe:232 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "16 1B 5C C6 B1 56 1C 3A 4C 2F DD 04 8C 8B 00 73"
The process %original file name%.exe:1964 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "59 2A 71 9C BF 0F 4D A8 76 1A 5D 1F A5 74 0F 99"
The process %original file name%.exe:1196 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E9 AA EE 28 2E 22 2C 53 74 10 59 31 3B 1C FB 6D"
The process %original file name%.exe:1568 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CB C0 E4 25 10 39 AA D1 8B 5F 34 2C 8D 09 E6 A2"
The process %original file name%.exe:2032 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C7 5A 4F 62 6D 47 0C 2D 3D 33 8E 93 15 5C E3 BF"
The process %original file name%.exe:644 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "4E 11 7D 82 0B 95 ED B0 26 32 C7 55 9C 00 2D 3C"
The process %original file name%.exe:1176 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0A 3F 67 87 33 7D FB 79 89 B2 55 F8 48 74 13 B2"
The process %original file name%.exe:776 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F2 C2 D6 D9 E0 11 24 8A 98 C2 95 51 C3 C3 6C 66"
The process %original file name%.exe:612 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9C 9F E0 40 70 02 D9 1C E4 8E A8 AC 0E 6A 83 FD"
The process %original file name%.exe:1608 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "53 3C 3E F4 B0 6E FE 2D 17 68 97 21 51 7E D9 F8"
The process %original file name%.exe:1040 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D5 FE C9 90 6F 61 3B 41 44 9E 9A 26 1F 37 FB 35"
The process %original file name%.exe:1044 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8E 6C A7 79 FD 37 E8 95 BE 8A 5F C0 C2 41 E9 65"
The process %original file name%.exe:1976 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9A DB A3 FE A1 51 A4 4F 8D 0F C6 C2 89 CC 6F 70"
The process %original file name%.exe:940 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "32 E3 7A B7 9B 09 C2 69 62 BE C8 C5 1E B4 D0 E8"
The process %original file name%.exe:1472 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "36 78 D9 22 0E 17 83 60 81 7B C6 2E AF 54 CD 99"
The process %original file name%.exe:356 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C0 77 C7 11 C9 3A 4C 7A F1 C1 4E BA D1 15 95 61"
The process %original file name%.exe:476 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "02 6C F1 42 D5 B7 D3 32 C1 7F 1F 98 53 C7 4E 24"
The process %original file name%.exe:2004 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1C 6F 57 B3 C3 DD A9 CA C5 4B 1C D2 D3 69 B4 BB"
The process %original file name%.exe:1368 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BA 8E 15 F4 D3 86 9A 1C 43 82 C5 45 5E 66 E9 24"
The process %original file name%.exe:804 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "75 0A 15 A6 F0 94 5A BA C9 C4 8D 3F 96 3F 76 5B"
Dropped PE files
| MD5 | File path |
|---|---|
| 367dae0d20d63ef8c438274cd6bec59b | c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\airplane.bmp.exe |
| 91c0cb7bbe1b09196133ce7ef83ce284 | c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\astronaut.bmp.exe |
| 633c8c9a74e4239f63b36826481ed17c | c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\ball.bmp.exe |
| d5e7159a0ba9bf66f5a798f7329f1848 | c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\beach.bmp.exe |
| 3674b0b5e65eb60026ea3347e63b07a9 | c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\butterfly.bmp.exe |
| c2b09e1881d3a7448bd3b1133499f381 | c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\car.bmp.exe |
| c4168a2d672689e83839ab3c93612a56 | c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\cat.bmp.exe |
| 8cfe7cb13045eee6cb36f0e6ba60231e | c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\chess.bmp.exe |
| 317eecf55acff2c93d0c60b2e99d8ba5 | c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dirt bike.bmp.exe |
| 64139608bbf8c74866c295cb97b329e3 | c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dog.bmp.exe |
| b8b7e8260829d7190b943098e5c324db | c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\drip.bmp.exe |
| f3f213cdc1d6ea6c3ae9004761fafb73 | c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\duck.bmp.exe |
| b478bba422f873b72699023102986b2e | c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\fish.bmp.exe |
| 7ab60bc1eb1ed94ffdd7f507b9514260 | c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\frog.bmp.exe |
| 754e1fc4d11f4dbfdf4fe4207dad68f2 | c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\guitar.bmp.exe |
| de084d538ef0a44b95179940a4369958 | c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\horses.bmp.exe |
| a9c1b00013a44f9406025bef1a7382d3 | c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\kick.bmp.exe |
| 084e5bbbae0b2118f5cb9e520d1a6bbf | c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\lift-off.bmp.exe |
| 000c67abb5c81eed83d9a448333d9aaf | c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\palm tree.bmp.exe |
| 3b589b4d0d0435ec5f56766780ac3f76 | c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\pink flower.bmp.exe |
| aa2556fd2712bc937ac991d35059bd4e | c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\red flower.bmp.exe |
| 63c22897032955f31942133bf5df26ea | c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\skater.bmp.exe |
| fb2588dc5c93858c583d97c9b8b7c78a | c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\snowflake.bmp.exe |
| 91bfb628a19b5d13e134ad68ec5ef1d2 | c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\adm.bmp.exe |
| 542b43b5d25f3872714fe251c77a3e92 | c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\guest.bmp.exe |
| 2b39449f1d64e097203a79abefb49c2c | c:\Documents and Settings\All Users\Documents\My Music\Sample Music\Beethoven's Symphony No. 9 (Scherzo).wma.exe |
| b26698e339d8f49ccf6c8510ad7076bd | c:\Documents and Settings\All Users\Documents\My Music\Sample Music\New Stories (Highway Blues).wma.exe |
| 04f70d087b17d5824b592634d6604b24 | c:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Blue hills.jpg.exe |
| 192c3ae81c6f190901da54fbf9157841 | c:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Sunset.jpg.exe |
| 6f32d45211e4249c3d11bc71f1ac7a39 | c:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Water lilies.jpg.exe |
| cdd73670c49c4646594bc6820b265354 | c:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Winter.jpg.exe |
| 306b5fd86a5ed89c19220cad1d075527 | c:\Documents and Settings\All Users\JuwEIgUE\reIEcoQI.exe |
| 63a1352d4227f7084ae8fe5e204ba3cf | c:\Documents and Settings\All Users\hcYYccwo\NesIMIQs.exe |
| eb38fd751b5ad6b18409b007d446cd6f | c:\Documents and Settings\"%CurrentUserName%"\dUskcAww\fGAwoYMM.exe |
| 93d06beb56c4c3459d8511b5dd4d2a9b | c:\Perl\eg\IEExamples\ie_animated.gif.exe |
| 7ec2a853cfca77f8cbf224b77c5ad77b | c:\Perl\eg\IEExamples\psbwlogo.gif.exe |
| 3b2b5969fa6f3a604e31392f947ee2c1 | c:\Perl\eg\aspSamples\ASbanner.gif.exe |
| c0bf95deee30f4993376e5a20d378861 | c:\Perl\eg\aspSamples\Main_Banner.gif.exe |
| 83d720d099d46423a30492f6790d0c35 | c:\Perl\eg\aspSamples\psbwlogo.gif.exe |
| 95beb11f49ea80a371d12db0fc997273 | c:\Perl\html\images\AS_logo.gif.exe |
| e55da2f5585542741874303e4e13265f | c:\Perl\html\images\PerlCritic_run.png.exe |
| e9b97413bc7de0988219952e053cb7f2 | c:\Perl\html\images\aslogo.gif.exe |
| 801d9d0c4f3beab2fb4724d9443be9f1 | c:\Perl\html\images\ppm_gui.png.exe |
| 7b0d808d2280608c8512afeab9485f63 | c:\Perl\lib\ActivePerl\PPM\images\gecko.png.exe |
| b466aa58461993dbc396d054d4adb760 | c:\Perl\lib\ActivePerl\PPM\images\perl_48x48.png.exe |
| 1f2fc80783b554b600165f647796b042 | c:\Perl\lib\Devel\NYTProf\js\asc.png.exe |
| 099e05451e57ec63c48ada9848c4f13c | c:\Perl\lib\Devel\NYTProf\js\bg.png.exe |
| 7a304002eee4ad0bfaa3c3f5e19dd6e2 | c:\Perl\lib\Devel\NYTProf\js\desc.png.exe |
| 9d955326b5b0e44db256874914d05516 | c:\Perl\lib\Devel\NYTProf\js\jit\gradient.png.exe |
| 41095098837aef9c3742a65670f175a0 | c:\Perl\lib\Devel\NYTProf\js\jit\gradient20.png.exe |
| 55c56ecaea13abada2dbe3f53e79710e | c:\Perl\lib\Devel\NYTProf\js\jit\gradient30.png.exe |
| 8d9bf422e5eda8b90087fb5aa302b0de | c:\Perl\lib\Devel\NYTProf\js\jit\gradient40.png.exe |
| ea0d1ce2fb5c137fdf342cc46ca66902 | c:\Perl\lib\Devel\NYTProf\js\jit\gradient50.png.exe |
| 151ef9765d65e2e1bb5f5b460d050c42 | c:\Perl\lib\Mozilla\CA\cacert.pem.exe |
| 66e68c50c184109efd1f006595734d83 | c:\totalcmd\TCMADMIN.EXE.exe |
| 276f95a6f64f32b95226275021ce7778 | c:\totalcmd\TCMDX32.EXE.exe |
| 7becfa161fa8dedb1b7c789968e82f90 | c:\totalcmd\TCUNINST.EXE.exe |
| 44b78e6bb16c5146a38feee7b5693c6e | c:\totalcmd\TOTALCMD.EXE.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 3354624 | 3353088 | 5.54011 | 2da02d446387451d41a2ae48f4afd887 |
| .rdata | 3358720 | 4096 | 512 | 1.62422 | 0f1e041cf042f9a540c5201fa3a99843 |
| .data | 3362816 | 225 | 512 | 2.87283 | 5499b9b8f78035542bf6034e6b8ef72e |
| .rsrc | 3366912 | 6940 | 7168 | 3.86784 | 7c8872fd466e8c163b1960942102aa6e |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://google.com/ |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
Web Traffic was not found.
The Trojan connects to the servers at the folowing location(s):
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
cscript.exe:1788
cscript.exe:1304
cscript.exe:1140
cscript.exe:212
cscript.exe:1780
cscript.exe:1300
cscript.exe:492
cscript.exe:1948
cscript.exe:1836
cscript.exe:1076
cscript.exe:1072
cscript.exe:344
cscript.exe:544
cscript.exe:1376
cscript.exe:1520
cscript.exe:548
cscript.exe:284
cscript.exe:1672
cscript.exe:2012
cscript.exe:1792
cscript.exe:1152
cscript.exe:260
cscript.exe:1952
cscript.exe:364
cscript.exe:928
cscript.exe:828
cscript.exe:824
cscript.exe:372
cscript.exe:376
cscript.exe:1080
cscript.exe:1920
cscript.exe:1484
cscript.exe:1716
cscript.exe:1256
cscript.exe:520
cscript.exe:1016
cscript.exe:1236
cscript.exe:304
cscript.exe:380
cscript.exe:1932
cscript.exe:1252
cscript.exe:1936
cscript.exe:1436
cscript.exe:900
cscript.exe:1432
cscript.exe:788
cscript.exe:1536
cscript.exe:644
cscript.exe:1224
cscript.exe:572
cscript.exe:1344
cscript.exe:332
cscript.exe:252
cscript.exe:1900
cscript.exe:1632
cscript.exe:1980
cscript.exe:1500
cscript.exe:1036
cscript.exe:500
cscript.exe:636
cscript.exe:1596
cscript.exe:1864
cscript.exe:280
cscript.exe:780
cscript.exe:868
cscript.exe:1620
cscript.exe:1028
cscript.exe:2024
cscript.exe:1104
cscript.exe:816
cscript.exe:1452
cscript.exe:408
cscript.exe:728
cscript.exe:604
cscript.exe:1160
cscript.exe:1168
cscript.exe:552
cscript.exe:232
cscript.exe:1240
cscript.exe:1964
cscript.exe:1196
cscript.exe:2036
cscript.exe:1112
cscript.exe:2032
cscript.exe:1176
cscript.exe:776
cscript.exe:612
cscript.exe:1272
cscript.exe:616
cscript.exe:1276
cscript.exe:1288
cscript.exe:792
cscript.exe:1608
cscript.exe:1040
cscript.exe:1044
cscript.exe:1604
cscript.exe:940
cscript.exe:1472
cscript.exe:476
cscript.exe:2004
cscript.exe:2008
cscript.exe:1368
%original file name%.exe:1304
%original file name%.exe:1140
%original file name%.exe:1300
%original file name%.exe:212
%original file name%.exe:492
%original file name%.exe:1948
%original file name%.exe:268
%original file name%.exe:1076
%original file name%.exe:624
%original file name%.exe:1072
%original file name%.exe:340
%original file name%.exe:544
%original file name%.exe:280
%original file name%.exe:284
%original file name%.exe:816
%original file name%.exe:2012
%original file name%.exe:1792
%original file name%.exe:1796
%original file name%.exe:1152
%original file name%.exe:264
%original file name%.exe:1228
%original file name%.exe:1016
%original file name%.exe:520
%original file name%.exe:1824
%original file name%.exe:1064
%original file name%.exe:828
%original file name%.exe:824
%original file name%.exe:372
%original file name%.exe:376
%original file name%.exe:1532
%original file name%.exe:1920
%original file name%.exe:1480
%original file name%.exe:1484
%original file name%.exe:1716
%original file name%.exe:1256
%original file name%.exe:1520
%original file name%.exe:364
%original file name%.exe:916
%original file name%.exe:584
%original file name%.exe:1232
%original file name%.exe:1336
%original file name%.exe:304
%original file name%.exe:1984
%original file name%.exe:588
%original file name%.exe:380
%original file name%.exe:1932
%original file name%.exe:1252
%original file name%.exe:1436
%original file name%.exe:1432
%original file name%.exe:788
%original file name%.exe:848
%original file name%.exe:1240
%original file name%.exe:1244
%original file name%.exe:436
%original file name%.exe:1220
%original file name%.exe:332
%original file name%.exe:252
%original file name%.exe:1900
%original file name%.exe:1632
%original file name%.exe:852
%original file name%.exe:1988
%original file name%.exe:1500
%original file name%.exe:652
%original file name%.exe:1036
%original file name%.exe:500
%original file name%.exe:1216
%original file name%.exe:1596
%original file name%.exe:1864
%original file name%.exe:780
%original file name%.exe:220
%original file name%.exe:1992
%original file name%.exe:1028
%original file name%.exe:2024
%original file name%.exe:1672
%original file name%.exe:1452
%original file name%.exe:728
%original file name%.exe:1512
%original file name%.exe:1164
%original file name%.exe:604
%original file name%.exe:1160
%original file name%.exe:552
%original file name%.exe:232
%original file name%.exe:1964
%original file name%.exe:1196
%original file name%.exe:1568
%original file name%.exe:2032
%original file name%.exe:644
%original file name%.exe:1176
%original file name%.exe:776
%original file name%.exe:612
%original file name%.exe:1608
%original file name%.exe:1040
%original file name%.exe:1044
%original file name%.exe:1976
%original file name%.exe:940
%original file name%.exe:1472
%original file name%.exe:356
%original file name%.exe:476
%original file name%.exe:2004
%original file name%.exe:1368
%original file name%.exe:804 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\adm.bmp.exe (2321 bytes)
C:\totalcmd\TCMADMIN.EXE.exe (3073 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dog.bmp.exe (2321 bytes)
C:\totalcmd\TOTALCMD.EXE.exe (30812 bytes)
%Documents and Settings%\All Users\Documents\My Music\Sample Music\New Stories (Highway Blues).wma.exe (7726 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\guitar.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\lift-off.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\kick.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\butterfly.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\palm tree.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\guest.bmp.exe (2321 bytes)
C:\totalcmd\TCUNINST.EXE.exe (3073 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\duck.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\red flower.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dirt bike.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\horses.bmp.exe (2321 bytes)
C:\totalcmd\TCMDX32.EXE.exe (3361 bytes)
%Documents and Settings%\All Users\KAAo.txt (55978 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\pink flower.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\astronaut.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\cat.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\chess.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\ball.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\skater.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Blue hills.jpg.exe (3073 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\beach.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Water lilies.jpg.exe (3361 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Sunset.jpg.exe (3073 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\frog.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\fish.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\airplane.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Winter.jpg.exe (3361 bytes)
C:\totalcmd\TcUsbRun.exe (3073 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Adobe\Reader 9.3\Setup Files\Setup.exe (5441 bytes)
%Documents and Settings%\All Users\Documents\My Music\Sample Music\Beethoven's Symphony No. 9 (Scherzo).wma.exe (7433 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\snowflake.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\drip.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\car.bmp.exe (2321 bytes)
C:\3ff310bcb9359a384061ef12a31ea9de (35258 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sWMwEIUg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RekYQIws.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\MSsAwoYQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\uksEIAgk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QuQEUYcQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ekoUUMsA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\poYAUQkw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yCMQIcAA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsMoIAsQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\JckAwcMs.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\iskMYogQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kuIgMQAE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hAQMYUsM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\iMcIIcEE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\oAUcgscY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vsocQswc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\wScwIUEY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\iyksEIoo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kmoQYIoo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QEocwUQI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aOIwYkQs.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\tcAgcMoY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\UAYAsMUU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\fKIQoMgI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\teoAAQwA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\fWIUAMMQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LUAIgAws.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AWcsIwsM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HQIMksMs.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YOgEgYgw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\tGYIEMIY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WysEcgsg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\gcoQoMgY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\EOgIgowI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\wUEkgMEc.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\giUcIQsQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\doEwMUsQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NIkwkkcM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\qaYsQUYE.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zQYkYIoc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jWIUEAYg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\tWkQsMAc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\loAMUkUQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hyQAIoYE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YQoUMsEw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\UoEMcwIw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hsMYQwIY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AekkcEMs.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WQgAgcEM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CoUswgEI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\pkwQYIcQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\igYQMQoE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ymQAccsc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\MuoocogU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\OUAUMYQs.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\PIEkoYco.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\bmYsoAoo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CKIgEowA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QQIksUIc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\OGogMwQI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XMMgwsQA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\OWIsogAk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sysUIwsw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XugEIcIE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hmIgwMUg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DoEgoYwI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TyYIEsgs.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yuwMYAgk.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kMYAYMww.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\qIYsEgoc.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\PyUEokgg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DekkoIQk.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AoEkoQIw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IiAosIgU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\daUMEAwA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aYcMMgwk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zOEUcEkQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QwUQUUwc.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\EwEsgUkQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GWoYQYYg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IewwEsAc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\qEkwQEYE.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zisgIAUs.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xIwYogoA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\EqEAEAoc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AgYUsggA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LoEsYAcM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TesEsQII.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\PSQgEEsQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vQgAYcYk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\EQwYIQYo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\JeQIwsoY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WgcUUkEc.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\fEkwMAUU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YsMYwQYg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HCwYQsoM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\JagkwAkM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vqkAgEss.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LwwYIgQo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lgMIIMYA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\iyEAsokM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DuMEMIso.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AEwUIQsQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QSoUMYIw.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KgogwYMQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zkkssEwo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\guUAIcsM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LMcUsUMU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\eUAsQUkM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nWYoQogc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\PkkQQYQo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\fAAgAMMU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\SisMoMsw.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\MOgcUEEk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xwMogkAw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\FEAQwwUw.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aIoQIgUw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RGMgwswY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aUgQAAwU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\igUAoIMM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\tkkQAgEU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WGocckws.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QiwsoMIo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hMAcckEg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WscQkoYg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WYoEwAYo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ngYQIwMQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HcggMswM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\foQMEckw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ZAwEUQgk.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\wMUYsYkY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\JuoYEMAQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WYAsIAYQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ISUcMcsQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\tIQIoYsk.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GAogAUQI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jkskcMUM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\cEoocMcs.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\BUAAQAco.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vIoQAYgk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YYssokMs.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TEcIMUgI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AWsoIAYs.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\BkUAkgck.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\oUMUEEAw.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lSQwowYM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\gYscsQYE.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RaYcsgQc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xwsYMwUw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\MIwQwkYo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RIEAAEQA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ZEokAQUU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nIcAQgAE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\VIkUcAgM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NckgsoMA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WkYMIYko.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RCoEAoUA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nKkoswQU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aAQgYksc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\PIMcwcoU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WMgccUYU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ocwcMIwM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KyMgMoAg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\OgQwYooU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\fgsMEsMo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\gAMIMwgY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YGUYYMIA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jakYoIwY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AEgYEUoM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HiUAUwYU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\guAoQcoE.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LQMkkUUQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\swwIsEcU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HmMAQkok.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\JcYwcIkY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TmkMQgcA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\uGQIkswU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RAskoIYk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\eccgkYok.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sEcIgEkM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LyggkwMc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ImsswskU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nawYcIgY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\BooQkEEE.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\roYQwsQc.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TCgMYkIA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\uyYMUcEs.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rkQgIcwM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kUYEEsQs.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\pqUsUsYM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YWYAsYss.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NYkQcQsw.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NaUwQMwk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LAIUQkAg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\igkoUAIc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XaYQIQAE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zOcQUEQY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rqEcskAg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lSUIkMQA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\UWYEoswg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YEoUwAYA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\MQIIooUQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jmswwMok.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KqAAwMMQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vAcQAEgw.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IoskcAUY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\dEoEUQwE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\twQcgcco.bat (112 bytes)
%Documents and Settings%\All Users\JuwEIgUE\reIEcoQI.exe (3777 bytes)
%Documents and Settings%\%current user%\dUskcAww\fGAwoYMM.exe (3873 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\tegEIkgM.bat (4 bytes)
%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.exe (3849 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YgwwIwkU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sGgQooAs.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\wYwogMEA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RqEUgkME.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yiIUQokg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lqIwsMYs.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jcwUEQIo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IqMsgoQU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jAcYkEsE.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nKwcgQQA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DKUwEQso.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TYkkgQow.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Hiwggwgo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DIksokoU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\cGIMYskE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XoIwUEQk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TIUMcMoQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KoEwkMUI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GaAMowgU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\qMkwkQYk.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zEMAgsAw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nkYQUwok.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AmckMYkM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CcQEEAEM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\EwkQwwgw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kkwoocgs.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RoUkEUIc.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XUYMEgMs.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\qYYwYkME.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XWkIEQMg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\teEYoAYo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QYssEwAw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kiEsgIkc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xaQwEoUM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sSAwkYks.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YOcwwcsg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jWcwswAE.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KGwkUoUE.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\PcggEksg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WYwMYAQs.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NeocgkYQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ACAMkkss.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aaYUYMQY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XGUwQQMk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xEIMAsIg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TMoUssEQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ZkcAooIc.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\awQwUUsU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rugscYQA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TggQsIYU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HAcwgIMU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DcAscwkU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AgQYAwAA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aioMMAkw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\luEkMEgY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XmEUQUUo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\fGssEEAA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RQEUUoMI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QWcsgYgc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\fmMwIcoA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\MWMosYQY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\gsEkcsoE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YYYAkYsA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QUgIwMsQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\dSAkAUAE.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\bwgosEco.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sKMMEAQs.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aiIwoUsQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TIowoAsE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nwkQEYoM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vuIMkEMU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\SagcAEoU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xYYoYEAo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yAUMoUMw.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\pwssIcgc.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KuIAIEMs.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\imkYUkgo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\UsQgoMYI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rUoQsgAs.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nKoowUsc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YkYQQwMo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QIwsUwcA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\SyoockcM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CeskgssA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\VSgEgIoI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WOwosocE.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rWUkwwkM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yKwsMIIg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jAQwAkMI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jkccUwYA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\fAQIAsEA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mCMwQokQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vcIQEMMc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ceMUwkgg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\eyAQoUsY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AYQoQoUA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QSMsEsUI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jiMIsQYg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KEkAoksM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DOQogQIM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\qOsYMIkU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sAIgAQcs.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NIcQEoUE.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NuwoMoYo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\duUQcQkg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vgsMsYog.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AUEUkIoM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\suwwIwgk.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yykYQIsQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kkoQoMUI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lUEMgkEY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HAcckEUs.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\FAwkkIcE.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\OGUYwoks.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\fuoAgYQE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QOUkMUos.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CuYggYYc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HYUgEQks.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HasgUckc.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nqYQYggU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\eYkwYgkA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XSoEUAcI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kaIwIsAI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vioskAgk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\uioEYkEA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\OqcwMIMk.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DqkMIIoo.bat (112 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NesIMIQs.exe" = "%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"fGAwoYMM.exe" = "%Documents and Settings%\%current user%\dUskcAww\fGAwoYMM.exe" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.