Gen.Variant.Kazy.530639_6ed750e80b

by malwarelabrobot on March 28th, 2015 in Malware Descriptions.

HEUR:Trojan.Win32.Generic (Kaspersky), Gen:Variant.Kazy.530639 (B) (Emsisoft), Gen:Variant.Kazy.530639 (AdAware), ZeroAccess.YR (Lavasoft MAS)
Behaviour: Trojan


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: 6ed750e80b585b72e5a7b8b97e9a7f62
SHA1: db754a6610b0066c475868468ad3170f8006845f
SHA256: 0c179bd3fb0bdd2e3959df89bbe7f8debc2039fd9195b37b69b849c01bc9970b
SSDeep: 24576:deiMQbRiL29rq5n2ny174FqQADA0SmFHxr iMDesoWyWO2:dSQ1pq5n2EW4VOr
Size: 1034240 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2015-02-07 11:53:36
Analyzed on: WindowsXP SP3 32-bit


Summary:

Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).

Payload

No specific payload has been found.

Process activity

The Trojan creates the following process(es):

cscript.exe:468
cscript.exe:884
cscript.exe:312
cscript.exe:1168
cscript.exe:1200
cscript.exe:1876
cscript.exe:272
cscript.exe:844
cscript.exe:496
cscript.exe:1784
cscript.exe:204
cscript.exe:1948
cscript.exe:852
cscript.exe:536
cscript.exe:1076
cscript.exe:1732
cscript.exe:1072
cscript.exe:1252
cscript.exe:544
cscript.exe:1652
cscript.exe:548
cscript.exe:1564
cscript.exe:1244
cscript.exe:996
cscript.exe:1312
cscript.exe:208
cscript.exe:676
cscript.exe:1612
cscript.exe:920
cscript.exe:1956
cscript.exe:168
cscript.exe:164
cscript.exe:224
cscript.exe:1508
cscript.exe:372
cscript.exe:1640
cscript.exe:1188
cscript.exe:1824
cscript.exe:1628
cscript.exe:968
cscript.exe:1604
cscript.exe:1240
cscript.exe:2000
cscript.exe:1980
cscript.exe:476
cscript.exe:532
cscript.exe:1100
cscript.exe:436
cscript.exe:1004
cscript.exe:820
cscript.exe:1416
cscript.exe:1512
%original file name%.exe:1788
%original file name%.exe:1324
%original file name%.exe:884
%original file name%.exe:1780
%original file name%.exe:1564
%original file name%.exe:1168
%original file name%.exe:332
%original file name%.exe:272
%original file name%.exe:996
%original file name%.exe:1640
%original file name%.exe:176
%original file name%.exe:496
%original file name%.exe:1488
%original file name%.exe:1784
%original file name%.exe:204
%original file name%.exe:692
%original file name%.exe:1588
%original file name%.exe:1056
%original file name%.exe:668
%original file name%.exe:1072
%original file name%.exe:1136
%original file name%.exe:956
%original file name%.exe:1500
%original file name%.exe:548
%original file name%.exe:1400
%original file name%.exe:528
%original file name%.exe:828
%original file name%.exe:1236
%original file name%.exe:448
%original file name%.exe:756
%original file name%.exe:896
%original file name%.exe:1792
%original file name%.exe:676
%original file name%.exe:1356
%original file name%.exe:1152
%original file name%.exe:244
%original file name%.exe:1512
%original file name%.exe:164
%original file name%.exe:224
%original file name%.exe:480
%original file name%.exe:868
%original file name%.exe:900
%original file name%.exe:852
%original file name%.exe:1188
%original file name%.exe:1528
%original file name%.exe:928
%original file name%.exe:356
%original file name%.exe:1980
%original file name%.exe:532
%original file name%.exe:1668
%original file name%.exe:920
%original file name%.exe:1572
%original file name%.exe:1004
%original file name%.exe:1380
%original file name%.exe:376

The Trojan injects its code into the following process(es):

rSwooYMM.exe:1108
jWcYYUcg.exe:524
FeEQMIQs.exe:1552

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process rSwooYMM.exe:1108 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dog.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Documents\My Music\Sample Music\New Stories (Highway Blues).wma.exe (11518 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\adm.bmp.exe (7385 bytes)
C:\totalcmd\TCMADMIN.EXE.exe (7433 bytes)
C:\totalcmd\TOTALCMD.EXE.exe (35505 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\snowflake.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\guitar.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\lift-off.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\kick.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\butterfly.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\palm tree.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\guest.bmp.exe (7385 bytes)
C:\totalcmd\TCUNINST.EXE.exe (7385 bytes)
C:\totalcmd\TcUsbRun.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\duck.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\red flower.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dirt bike.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\MAAo.txt (55978 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\horses.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\pink flower.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\astronaut.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\cat.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\chess.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\ball.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\skater.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Blue hills.jpg.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\beach.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Water lilies.jpg.exe (7433 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Sunset.jpg.exe (7433 bytes)
C:\totalcmd\TCMDX32.EXE.exe (7433 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\frog.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\fish.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\airplane.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Winter.jpg.exe (7433 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Adobe\Reader 9.3\Setup Files\Setup.exe (7971 bytes)
%Documents and Settings%\All Users\Documents\My Music\Sample Music\Beethoven's Symphony No. 9 (Scherzo).wma.exe (10177 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\drip.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\car.bmp.exe (7385 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\skater.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\chess.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dog.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\horses.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\palm tree.bmp (0 bytes)
%Documents and Settings%\All Users\Documents\My Music\Sample Music\Beethoven's Symphony No. 9 (Scherzo).wma (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\lift-off.bmp (0 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Sunset.jpg (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\duck.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\ball.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dirt bike.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\fish.bmp (0 bytes)
C:\totalcmd\TCMDX32.EXE (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\cat.bmp (0 bytes)
%Documents and Settings%\All Users\Documents\My Music\Sample Music\New Stories (Highway Blues).wma (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\frog.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\red flower.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\astronaut.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\beach.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\guitar.bmp (0 bytes)
C:\totalcmd\TCUNINST.EXE (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\snowflake.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\airplane.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\car.bmp (0 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Water lilies.jpg (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\butterfly.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\pink flower.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\drip.bmp (0 bytes)
C:\totalcmd\TCMADMIN.EXE (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\guest.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\adm.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\kick.bmp (0 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Blue hills.jpg (0 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Winter.jpg (0 bytes)
C:\totalcmd\TOTALCMD.EXE (0 bytes)

The process %original file name%.exe:1788 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\HEAoIgUQ.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\uYIskYcU.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\uYIskYcU.bat (0 bytes)

The process %original file name%.exe:1324 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\eYAkcIsw.bat (4 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (74 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KAAwgEUk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TEQsYUsA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HEIYwggc.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\eYAkcIsw.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TEQsYUsA.bat (0 bytes)

The process %original file name%.exe:884 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\EqAMIYwY.bat (4 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (74 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\VIYgswYI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\MkgAEYoY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\BigYMEgw.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\EqAMIYwY.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\MkgAEYoY.bat (0 bytes)

The process %original file name%.exe:1780 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\xQMwMAYM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hsEYUMAw.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (148 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\gYUogwAA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sukQYUME.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\SAksokMk.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yGoMQwwY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zuIwgwME.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\EQgwogog.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\yGoMQwwY.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\EQgwogog.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zuIwgwME.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\SAksokMk.bat (0 bytes)

The process %original file name%.exe:1564 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\NeockEow.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DEwAocgM.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\DEwAocgM.bat (0 bytes)

The process %original file name%.exe:1168 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ssUYYYEQ.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HggcwEEM.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\HggcwEEM.bat (0 bytes)

The process %original file name%.exe:332 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RyEAkEsE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sSsUoQIw.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\RyEAkEsE.bat (0 bytes)

The process %original file name%.exe:272 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\xiEUcAYM.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IAkYsAcc.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\IAkYsAcc.bat (0 bytes)

The process %original file name%.exe:996 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\dasIsQkI.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsscEoEw.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nsscEoEw.bat (0 bytes)

The process %original file name%.exe:1640 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\FaAMckUA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LiYcwYYQ.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\FaAMckUA.bat (0 bytes)

The process %original file name%.exe:176 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\lCskAMAc.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\dkoQgcQI.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\dkoQgcQI.bat (0 bytes)

The process %original file name%.exe:496 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\GacAQMYA.bat (4 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\EigMAUQY.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\GacAQMYA.bat (0 bytes)

The process %original file name%.exe:1488 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\qGAkAMoQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nyQEYcYE.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\qGAkAMoQ.bat (0 bytes)

The process %original file name%.exe:1784 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\bskwIMok.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LMMoQsMU.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\bskwIMok.bat (0 bytes)

The process %original file name%.exe:204 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\NgAIcwQQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\SmcUwwkA.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\NgAIcwQQ.bat (0 bytes)

The process %original file name%.exe:692 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ZUgUgwcI.bat (4 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (74 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lUQssoII.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sEgMoIko.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ruMwYAYE.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ZUgUgwcI.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lUQssoII.bat (0 bytes)

The process %original file name%.exe:1588 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nSkwUMoI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XsUQkYAE.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nSkwUMoI.bat (0 bytes)

The process %original file name%.exe:1056 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XIwkkMoo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\PCgAIkQw.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\XIwkkMoo.bat (0 bytes)

The process %original file name%.exe:668 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\BEwMYsEI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yKwUoAAE.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\BEwMYsEI.bat (0 bytes)

The process %original file name%.exe:1072 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\AksAIAgg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aiQIocgY.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (74 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ygUYUIkU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hycEIYUs.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\AksAIAgg.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ygUYUIkU.bat (0 bytes)

The process %original file name%.exe:1136 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\GAAMEoUs.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yeYUosEs.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\yeYUosEs.bat (0 bytes)

The process %original file name%.exe:956 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\zWQQsosA.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RUoUUEUU.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\RUoUUEUU.bat (0 bytes)

The process %original file name%.exe:1500 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GoMkIYEw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XOYAAwww.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\XOYAAwww.bat (0 bytes)

The process %original file name%.exe:548 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\aWYUgsAs.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\FaAQgwwI.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\aWYUgsAs.bat (0 bytes)

The process %original file name%.exe:1400 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ZwIEAYwY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\fOEQowoc.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\fOEQowoc.bat (0 bytes)

The process %original file name%.exe:528 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XasYsgMo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WKkgUAIc.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\WKkgUAIc.bat (0 bytes)

The process %original file name%.exe:828 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\acwEgkEQ.bat (4 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YgMIkUsY.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\acwEgkEQ.bat (0 bytes)

The process %original file name%.exe:1236 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\jassQkkg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LUYQskYw.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\jassQkkg.bat (0 bytes)

The process %original file name%.exe:448 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\NwIscAww\rSwooYMM.exe (7713 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TmkMcYYg.bat (112 bytes)
%Documents and Settings%\All Users\BOAMIgUE\jWcYYUcg.exe (7737 bytes)
%Documents and Settings%\All Users\hUEQccwo\FeEQMIQs.exe (7761 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XowMowgo.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\XowMowgo.bat (0 bytes)

The process %original file name%.exe:756 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\jGwQwMwI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\EcwggIoQ.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (74 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\neUEAowU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GKYIgIEU.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\neUEAowU.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GKYIgIEU.bat (0 bytes)

The process %original file name%.exe:896 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XygAcQsM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WgEYowgY.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\XygAcQsM.bat (0 bytes)

The process %original file name%.exe:1792 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\VSYwQoUo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ugMsAsQM.bat (4 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (74 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ksQAUYYo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vYoQgsUM.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ugMsAsQM.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ksQAUYYo.bat (0 bytes)

The process %original file name%.exe:676 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\PckcgAIo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vaUgoMgI.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (74 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XYEYcYEU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ZIMQUkQY.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\PckcgAIo.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ZIMQUkQY.bat (0 bytes)

The process %original file name%.exe:1356 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\aYwgkQYk.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GIoUMosQ.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\GIoUMosQ.bat (0 bytes)

The process %original file name%.exe:1152 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\kiwwMUEQ.bat (4 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zwEIsAAI.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\kiwwMUEQ.bat (0 bytes)

The process %original file name%.exe:244 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\KIIoUQsk.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (74 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\OWQcIsAQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\BIccgscI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jscYcMII.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\OWQcIsAQ.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jscYcMII.bat (0 bytes)

The process %original file name%.exe:1512 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\6ed750e80b585b72e5a7b8b97e9a7f62 (148 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\BEkQwwEo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NKwQkUkg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XCkAksQk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\PWsEkQcU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\tOgMkkgc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\iKccYIYw.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\SkgwcEIU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zaIAMwAU.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\iKccYIYw.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zaIAMwAU.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NKwQkUkg.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\tOgMkkgc.bat (0 bytes)

The process %original file name%.exe:164 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\cOEwMsck.bat (4 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\icEgEUwo.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\cOEwMsck.bat (0 bytes)

The process %original file name%.exe:224 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\gYAYQAwI.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\syIUEcgg.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\syIUEcgg.bat (0 bytes)

The process %original file name%.exe:480 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\EQEYUMcE.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (74 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\qaMQIIwg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\iSYAYQsw.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HuIkwooQ.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\iSYAYQsw.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HuIkwooQ.bat (0 bytes)

The process %original file name%.exe:868 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\qEgskkUI.bat (4 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\wwIkYEwA.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\qEgskkUI.bat (0 bytes)

The process %original file name%.exe:900 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\bQAYkIEM.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\leQAEEQA.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\leQAEEQA.bat (0 bytes)

The process %original file name%.exe:852 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\saUAUEQs.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (111 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xgMkkwcI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\OgUAcYcY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\EcMsIEEU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nkIcMQUI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KIYEwwkA.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\KIYEwwkA.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xgMkkwcI.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nkIcMQUI.bat (0 bytes)

The process %original file name%.exe:1188 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\FkAkwgkI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\cegQAsog.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\FkAkwgkI.bat (0 bytes)

The process %original file name%.exe:1528 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\pUMscoQI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\VkIssEYE.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\pUMscoQI.bat (0 bytes)

The process %original file name%.exe:928 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\pYoQQEMc.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IYIkogQA.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\IYIkogQA.bat (0 bytes)

The process %original file name%.exe:356 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\poIIMcos.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rUwssQgY.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\poIIMcos.bat (0 bytes)

The process %original file name%.exe:1980 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\FAYQgIgc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\leAQYIkM.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\FAYQgIgc.bat (0 bytes)

The process %original file name%.exe:532 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\usMUMAcI.bat (4 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (74 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\MAwwswws.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\dqwEowIk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\VsgcYUco.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\usMUMAcI.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\MAwwswws.bat (0 bytes)

The process %original file name%.exe:1668 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ySwIEUII.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\UEoAwEoo.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ySwIEUII.bat (0 bytes)

The process %original file name%.exe:920 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jQccMsEY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xyYwkkcM.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\xyYwkkcM.bat (0 bytes)

The process %original file name%.exe:1572 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\JQAEoAAs.bat (4 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HwsMcsAE.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\JQAEoAAs.bat (0 bytes)

The process %original file name%.exe:1004 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\OCMAowIc.bat (112 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vQYEMUQw.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\vQYEMUQw.bat (0 bytes)

The process %original file name%.exe:376 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\TYQAMckY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rmoYIYMU.bat (4 bytes)
C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\rmoYIYMU.bat (0 bytes)

The process FeEQMIQs.exe:1552 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\All Users\MAAo.txt (8082 bytes)

The Trojan deletes the following file(s):

Registry activity

The process cscript.exe:468 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AE BA 4D F4 84 A6 64 BB E7 F0 36 C4 D3 A6 B9 25"

The process cscript.exe:884 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DB 5E EE F0 4E F9 F7 5D 0C 6F 4D 46 46 17 A0 D1"

The process cscript.exe:312 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C9 E4 49 D4 6C DB 32 01 4D E6 81 30 34 B1 84 4A"

The process cscript.exe:1168 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "47 82 82 3A F9 14 99 2A EB FC 8E 4E 63 C7 6B B7"

The process cscript.exe:1200 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3F 71 34 23 48 6A 99 F7 16 76 80 4A 51 10 02 8D"

The process cscript.exe:1876 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F5 68 1E C3 AF F9 C0 42 56 5C 6C CC 71 55 FE 98"

The process cscript.exe:272 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C1 35 AF 64 E8 F9 8B 98 77 8D 1E BA 02 96 29 A0"

The process cscript.exe:844 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8C F3 5A 54 5B 18 63 9C 83 B6 43 5B 08 33 07 B5"

The process cscript.exe:496 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CF E9 13 8E EE 1A 26 AD 31 B5 85 61 26 50 6B 7A"

The process cscript.exe:1784 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "43 07 0B 36 8C 4E 78 38 17 3B 4A 9C 99 33 E0 A0"

The process cscript.exe:204 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BB 31 97 FD 80 C4 25 C1 74 75 8C 6B 15 14 68 69"

The process cscript.exe:1948 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3A A7 D5 E4 64 BF 0D C6 60 D0 B5 27 C6 99 BC E0"

The process cscript.exe:852 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "29 23 77 13 02 F5 F4 A5 83 DF D2 8D 12 B1 49 F5"

The process cscript.exe:536 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C1 A9 BB 97 E0 62 00 B0 72 D9 A6 C0 50 32 5E 5C"

The process cscript.exe:1076 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A3 82 5D CD C2 D8 21 23 E7 1C FA 99 F7 3C 5A 23"

The process cscript.exe:1732 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "ED 44 9C C6 2A 72 98 AC 0B FF 94 C4 95 9C 48 19"

The process cscript.exe:1072 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C8 40 AD CB A5 5F AE 5D 6C 1A EA 31 CD A5 88 9C"

The process cscript.exe:1252 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "54 4A 81 98 DF 3B BC 52 FF F7 3E 7D 79 24 58 38"

The process cscript.exe:544 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A2 FE 04 FA 2F 0E DF 0A E9 66 86 93 BB A7 E9 2E"

The process cscript.exe:1652 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F0 7B 70 14 FB 1C 08 8E 43 96 3A 98 A6 00 AC 14"

The process cscript.exe:548 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "42 F9 56 97 F9 F8 EE E2 DA 79 AF 12 A9 5F 17 87"

The process cscript.exe:1564 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8E 44 80 43 C4 10 C1 7B 58 C2 A0 4A 7C B4 ED CE"

The process cscript.exe:1244 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "35 81 F3 22 1C 81 80 B3 1A FE 38 66 48 C6 05 D0"

The process cscript.exe:996 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8C DB 60 AE 4F B7 36 B5 9F DC C8 0F 74 35 5C EA"

The process cscript.exe:1312 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "86 1F CD 6E BC D3 52 69 FB B6 B5 27 1D 67 82 6A"

The process cscript.exe:208 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F9 87 87 66 30 FA 04 B0 D9 01 D5 B7 F8 31 9B C0"

The process cscript.exe:676 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0D B3 77 2C 40 FA 7D 15 00 8B A4 08 76 2C 74 79"

The process cscript.exe:1612 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "11 BB AB 40 DC 67 CE B7 48 B3 C8 4F DF DF FA 69"

The process cscript.exe:920 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E1 AF 63 2E B5 8B B3 05 91 78 AD 01 82 85 AB A5"

The process cscript.exe:1956 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A4 0F A7 B3 78 BB 4D E2 09 55 D7 3D 64 B7 EC 18"

The process cscript.exe:168 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "97 6C 0B 7C 5D 31 BA 23 D8 14 11 A7 C9 86 15 F4"

The process cscript.exe:164 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "56 BE 57 C6 82 9C 07 41 CD 67 D8 EE 6D FB 00 14"

The process cscript.exe:224 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F7 E7 BF DC F2 D9 BA 9F 39 6F 5E 8F 67 E0 79 9B"

The process cscript.exe:1508 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "99 18 1B 2B 12 3B 00 31 A8 24 0C A3 77 47 72 5E"

The process cscript.exe:372 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "04 B4 A6 39 28 9C 00 12 95 53 A3 65 30 EF BA 7A"

The process cscript.exe:1640 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B2 56 40 97 C3 0B B0 E7 71 FE 49 30 99 D7 F7 5B"

The process cscript.exe:1188 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "78 7E E9 41 F8 CD 8E E9 99 0D C7 1D FD C4 EE A3"

The process cscript.exe:1824 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "98 12 03 23 B1 E9 56 3B 09 52 C7 40 7F 71 F1 C2"

The process cscript.exe:1628 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "28 39 19 65 BF 2F D5 73 AE 0A 55 20 4B F0 25 3C"

The process cscript.exe:968 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6B 51 22 BF 2C E6 FB 89 58 08 88 E6 8E 6F 40 8C"

The process cscript.exe:1604 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1C C5 DE D6 DB D0 B4 04 61 57 43 EF 2B 4E 77 E0"

The process cscript.exe:1240 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3E 7F 68 A5 C4 3E 64 A2 5D B3 A9 E9 CD 82 11 EA"

The process cscript.exe:2000 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CC 67 07 A9 44 EF 5A 5F D7 22 01 D9 03 C8 EB FF"

The process cscript.exe:1980 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E7 EE 52 CF D5 A9 E7 77 A8 3F 2A 05 E2 76 A1 FE"

The process cscript.exe:476 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "7F AB 50 B2 46 FB D1 71 34 78 5B D1 C4 9D E5 4E"

The process cscript.exe:532 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "31 D3 C7 F1 D1 B9 E1 74 55 81 09 45 64 46 D6 CF"

The process cscript.exe:1100 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "47 E8 1F 11 05 3A 35 40 51 26 10 EA 0E 8F 3F 3B"

The process cscript.exe:436 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B0 36 D2 B7 2B 2A 65 9E E0 88 25 D4 E0 69 C8 B7"

The process cscript.exe:1004 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "17 F9 23 01 14 AE CE 5B 03 15 49 FF EC D2 CB F0"

The process cscript.exe:820 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "96 61 29 66 08 BE B6 A3 6A 9F EB 04 3F 1B 36 FB"

The process cscript.exe:1416 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "69 5F 26 6C CD BB 71 EE 55 54 5B CB E7 5F 23 27"

The process cscript.exe:1512 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BE 9B 8F 23 78 6B 31 12 78 C3 63 47 1C 9C AC AE"

The process rSwooYMM.exe:1108 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6C DA EF 8A D3 6E 9F 61 AA 65 5B 83 20 90 1E 1D"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"rSwooYMM.exe" = "%Documents and Settings%\%current user%\NwIscAww\rSwooYMM.exe"

The process %original file name%.exe:1788 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A3 D6 07 D4 47 4D CB AA 4E 06 2E 86 D5 8B A1 B0"

The process %original file name%.exe:1324 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9F 18 37 0C 9D 04 A2 72 67 62 EE 9B 97 37 A9 A1"

The process %original file name%.exe:884 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "4D 39 6C 4D CB 3E 64 F7 74 BA 06 26 CA 4E E4 49"

The process %original file name%.exe:1780 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "48 CE 98 20 5F 58 F5 EF 73 BF 79 52 74 07 10 53"

The process %original file name%.exe:1564 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5B 07 DD F9 A0 09 A6 27 7F DC BA A2 DC F7 98 5B"

The process %original file name%.exe:1168 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C1 4F 9D 83 64 79 C7 0A A2 7C DA 3B F5 97 CA 4D"

The process %original file name%.exe:332 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "4A DE 92 E6 59 03 F4 9D 55 0C E5 EB BE CE EC B7"

The process %original file name%.exe:272 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8C 17 18 C8 F9 FC 52 CB 25 75 FB 91 B4 63 7B 32"

The process %original file name%.exe:996 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "65 A2 8A A7 32 28 D3 7E A8 42 9E B6 16 95 B9 05"

The process %original file name%.exe:1640 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "43 93 55 E5 02 7C A3 4C 7D 59 0E A8 0F 92 0B 45"

The process %original file name%.exe:176 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "50 B4 6B B1 A2 5D EE F1 F5 74 1A 9F EC 54 9C 84"

The process %original file name%.exe:496 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C6 E8 DE 6E 2E 1F F2 11 79 EA 01 C3 66 03 41 83"

The process %original file name%.exe:1488 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "88 9D C9 3C A3 B0 A0 BD CA 40 71 60 F2 9B 3F 6C"

The process %original file name%.exe:1784 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E3 4A B9 D2 33 9D 22 30 0C 09 0A FF 03 EE FD 59"

The process %original file name%.exe:204 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "09 49 59 83 51 71 6F 9C 43 35 D6 B3 7E 4D D8 ED"

The process %original file name%.exe:692 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "58 46 32 D1 BC E9 A8 F1 DE 9B B1 2C AB 6F 7A EC"

The process %original file name%.exe:1588 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1B 9F FE 73 C9 03 63 0C 6E 9E 28 56 C4 5B 18 E9"

The process %original file name%.exe:1056 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "73 9B AB FE D7 D7 1F 50 21 11 0B 97 48 E5 18 39"

The process %original file name%.exe:668 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "15 BF 72 4E F8 D1 3D 89 48 59 C5 34 16 9F 52 85"

The process %original file name%.exe:1072 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8D 69 50 24 FD 10 72 E3 47 CB F0 F2 BD B3 88 01"

The process %original file name%.exe:1136 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "83 AD 9D E9 50 54 72 7B 00 66 4C 8A 91 DE 08 26"

The process %original file name%.exe:956 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E5 D8 91 F4 03 78 55 A6 64 73 79 D9 64 0E BC 53"

The process %original file name%.exe:1500 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B1 C9 B3 44 FB A7 34 77 08 20 DB 8F 45 C8 B0 F1"

The process %original file name%.exe:548 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "03 1C BA 99 2D 2A 54 EC CE E0 00 C1 49 00 66 BB"

The process %original file name%.exe:1400 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "75 E7 E7 61 5C 80 12 1F 10 31 D5 73 63 EB 0B 11"

The process %original file name%.exe:528 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "78 C2 36 FA 91 44 F8 E4 B5 06 8A 58 CC 0C 58 E8"

The process %original file name%.exe:828 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6B ED 69 8E 55 23 D3 38 40 FE 20 5E EE 5D 04 75"

The process %original file name%.exe:1236 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "04 4A 86 3D 63 5C 14 6C 38 92 A6 3D B0 6F 59 38"

The process %original file name%.exe:448 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A3 4C 42 69 D5 5F 3E 19 74 57 4A 76 A5 A4 BD 00"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"FeEQMIQs.exe" = "%Documents and Settings%\All Users\hUEQccwo\FeEQMIQs.exe"

The Trojan adds the reference to itself to be executed when a user logs on:

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"UserInit" = "%System%\userinit.exe,%Documents and Settings%\All Users\hUEQccwo\FeEQMIQs.exe,"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"rSwooYMM.exe" = "%Documents and Settings%\%current user%\NwIscAww\rSwooYMM.exe"

The process %original file name%.exe:756 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FE BF B1 BE 83 74 99 51 97 AB C4 EA 16 FE AB F0"

The process %original file name%.exe:896 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AC AC C5 4D 16 F0 B4 47 CA DA 53 2B 14 DE 5F 41"

The process %original file name%.exe:1792 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E2 6F C3 3D 75 44 C4 8E 86 8D 85 C9 C6 7E 44 69"

The process %original file name%.exe:676 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "64 CD 48 10 45 F6 FC FA 26 33 AF B5 7A 5D 5E 12"

The process %original file name%.exe:1356 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "7F 73 1D EF 89 5B 6D EF 4B AD 8E 40 75 DD 4C 9B"

The process %original file name%.exe:1152 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0E 10 8E BF 26 17 C6 B6 14 A9 C4 22 7E 73 D7 C1"

The process %original file name%.exe:244 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3B 9D 3E 45 29 27 80 80 AD A3 51 1F 86 5D CF DA"

The process %original file name%.exe:1512 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "82 AD 07 0A 63 7C 99 AB AD DB 1C 15 F0 C0 89 D6"

The process %original file name%.exe:164 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "40 1B 24 60 D0 26 C8 15 9F D4 13 1F 39 CE D6 91"

The process %original file name%.exe:224 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BD 23 C9 6A A8 F6 0E 36 DC EC 08 9F FA BC 81 B7"

The process %original file name%.exe:480 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F6 D9 61 A5 E9 5D B2 DC A5 45 91 A6 AD 27 FD 6B"

The process %original file name%.exe:868 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "08 81 F3 7A 69 6D 7F 69 1E FF 14 11 C6 EC 15 84"

The process %original file name%.exe:900 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1A 6E C6 AC 88 00 04 B8 62 5E 99 DE 9E 50 7B 18"

The process %original file name%.exe:852 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "7C FE 29 DE 4E 51 A2 23 25 04 3B 24 F0 AA 36 8E"

The process %original file name%.exe:1188 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C0 F5 BF B6 D6 D3 41 B1 ED 84 57 A6 FD 90 94 18"

The process %original file name%.exe:1528 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C3 3E 20 CE 55 A3 04 BF 0E 47 FD EE 65 9E E0 BC"

The process %original file name%.exe:928 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3C 64 6F 5C 0F 9A D3 61 E2 E8 10 CF 88 74 13 D8"

The process %original file name%.exe:356 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "85 F4 BC B4 94 4A 1E 51 2E 5D 5A 01 F8 6E 8F 35"

The process %original file name%.exe:1980 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EB 16 0F 38 7A 62 D5 4C AC A7 1C 43 F7 41 A4 11"

The process %original file name%.exe:532 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "17 5A D3 07 2C 18 FB 53 49 1A 07 00 5E 20 4B E9"

The process %original file name%.exe:1668 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "09 25 62 D3 4D BD E7 81 4B B1 89 84 22 C2 32 70"

The process %original file name%.exe:920 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8A 22 F1 38 7E 07 F7 90 0F 4C 1C 26 05 75 A3 F3"

The process %original file name%.exe:1572 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8C 77 3D CD 92 71 0A 0E 6A E1 18 89 5A FC 09 3E"

The process %original file name%.exe:1004 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BF 26 F6 BE 0F FE CB 46 EE 3C CE A9 AD EA D2 9C"

The process %original file name%.exe:1380 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "52 88 40 8C 8B 53 79 5F 88 27 01 3B E7 61 3D 78"

The process %original file name%.exe:376 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C1 71 23 38 FF A6 6A 01 4A F7 1F 7F 99 37 97 7F"

The process jWcYYUcg.exe:524 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C2 C0 BF 1E 7C 08 B7 E4 A5 F0 A5 0E AD 42 C8 33"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"FeEQMIQs.exe" = "%Documents and Settings%\All Users\hUEQccwo\FeEQMIQs.exe"

The process FeEQMIQs.exe:1552 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "14 91 D8 BF 3A FC D5 66 6D C9 FE A3 A1 69 50 59"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"FeEQMIQs.exe" = "%Documents and Settings%\All Users\hUEQccwo\FeEQMIQs.exe"

Dropped PE files

MD5 File path
72423a6ce0e3159984a468de15703710 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\airplane.bmp.exe
5b5b0eb4167ce12cc926f2fb53d1129a c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\astronaut.bmp.exe
98463f977a11fd7cad0bd699bf29544d c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\ball.bmp.exe
b12807ae1553ca2523be57b80e1501d1 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\beach.bmp.exe
f7394d4980c95074a0fd87f45c74bbb3 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\butterfly.bmp.exe
882d5b65392e98ad56d5fea509cb459f c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\car.bmp.exe
0cd4e6a39814e05e3c1685b469d14228 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\cat.bmp.exe
b1cf27e857a66f33e5715d58bb6d874e c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\chess.bmp.exe
61e848d1c8a4a572091a6398636ec74c c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dirt bike.bmp.exe
27e49e856efc520c29969b5dd3bd4905 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dog.bmp.exe
483ee407c8ebe7dfa5674ef0f9c5b09d c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\drip.bmp.exe
d2e8d282d18e8663adf8e3a10255ba41 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\duck.bmp.exe
614e763e4cf451593ec3b37702d8385e c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\fish.bmp.exe
31bf54791e97e8e4d639bfe8657ffc9c c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\frog.bmp.exe
2ef0b9b7d69cdcbb7346d243b212c807 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\guitar.bmp.exe
aa8eeef1ad387ec48359efd3a0cdeece c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\horses.bmp.exe
f0cf9b9168bc6aad73842c9a5de4819a c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\kick.bmp.exe
e034897055c48f1ca46b0b6972cd2408 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\lift-off.bmp.exe
a6396d3978098c2e34b30f253e25927a c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\palm tree.bmp.exe
12f834893e525c1de23d0bd7cd146adc c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\pink flower.bmp.exe
45caa11388d5d89660c5449718f5dc15 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\red flower.bmp.exe
7b4d2771a9e116ddb7fd26c030dc4351 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\skater.bmp.exe
e8141109baf488b3369c96226a624218 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\snowflake.bmp.exe
b639fcf3cc1cfe022cf5429425048d16 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\adm.bmp.exe
cd89bd22a8d68d51caec7c6328895f4a c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\guest.bmp.exe
50c4409b32e725287ccae6892ebb7f80 c:\Documents and Settings\All Users\BOAMIgUE\jWcYYUcg.exe
08922f80cf4809b73d8fdd92177fed51 c:\Documents and Settings\All Users\Documents\My Music\Sample Music\Beethoven's Symphony No. 9 (Scherzo).wma.exe
a63f1860e90ee8fbbbd0bbf966b86b41 c:\Documents and Settings\All Users\Documents\My Music\Sample Music\New Stories (Highway Blues).wma.exe
79251342f5c2391b945f1c7ae10a2c8d c:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Blue hills.jpg.exe
f5e8439ac391b580c414414ffdd3df5a c:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Sunset.jpg.exe
d84af9ef0ea2c1c218eee96b809a9386 c:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Water lilies.jpg.exe
3bfcea80ff38c952fc993cc98c190fd5 c:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Winter.jpg.exe
c726617d0af843eaff8b82b069795b04 c:\Documents and Settings\All Users\hUEQccwo\FeEQMIQs.exe
3b9eedb28ef0e26ee6c43685295c65e5 c:\Documents and Settings\"%CurrentUserName%"\NwIscAww\rSwooYMM.exe
897a8648f92ad3030742bc25e90ffe21 c:\Perl\eg\IEExamples\ie_animated.gif.exe
970c2204fe4ac3d229076cbdb3bd770b c:\Perl\eg\aspSamples\ASbanner.gif.exe
0a51001dcac93a342516a8b2f4c2a380 c:\Perl\eg\aspSamples\Main_Banner.gif.exe
4c65720ac204c93b7a52bd7a1d7ae69d c:\Perl\eg\aspSamples\psbwlogo.gif.exe
1dc0593f7aa2964c46718956739a06ca c:\Perl\lib\ActivePerl\PPM\images\gecko.png.exe
91acca2dd5b8fa114997c5d789f77451 c:\Perl\lib\ActivePerl\PPM\images\perl_48x48.png.exe
7e092ab14714760ca5906566433bc384 c:\Perl\lib\Devel\NYTProf\js\asc.png.exe
c9b62583b6f41bd33ef03bbe11ea8cb1 c:\Perl\lib\Devel\NYTProf\js\bg.png.exe
7d64cc07ac1cb241ca7438441e973b81 c:\Perl\lib\Devel\NYTProf\js\desc.png.exe
33d8dc2c20548e49234e956b4b0db4c5 c:\Perl\lib\Devel\NYTProf\js\jit\gradient.png.exe
bc9545d484fddaac611556ee440eef3d c:\Perl\lib\Devel\NYTProf\js\jit\gradient20.png.exe
d54695000d2d86c2e706557fc3b91ccc c:\Perl\lib\Devel\NYTProf\js\jit\gradient30.png.exe
3b6be6b9f65cda06003d44e1e8850db0 c:\Perl\lib\Devel\NYTProf\js\jit\gradient40.png.exe
ce9d992089209fac4193bb873b7702df c:\Perl\lib\Devel\NYTProf\js\jit\gradient50.png.exe

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

VersionInfo

No information is available.

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 4096 1028096 1027072 5.44381 b5b941f1a3be2c51dbf5ca7aea0f6031
.rdata 1032192 4096 512 1.81588 bd8420a28242473773ae7c7753b2b4be
.data 1036288 4 512 0.056519 dfbec37c22852e1f8e679c7f20f7d72e
.rsrc 1040384 4444 4608 2.04642 f9638897d2011e145125c3512d20e7f3

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

URL IP
hxxp://google.com/ 173.194.112.65


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

Traffic

GET / HTTP/1.1
Host: google.com


HTTP/1.1 302 Found
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Location: hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=29IVVevgLOOG8QflqIGYBA
Content-Length: 262
Date: Fri, 27 Mar 2015 21:59:55 GMT
Server: GFE/2.0
Alternate-Protocol: 80:quic,p=0.5
<HTML><HEAD><meta http-equiv="content-type" content="te
xt/html;charset=utf-8">.<TITLE>302 Moved</TITLE></HE
AD><BODY>.<H1>302 Moved</H1>.The document has mov
ed.<A HREF="hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=29IVVevgLOOG
8QflqIGYBA">here</A>...</BODY></HTML>....


GET / HTTP/1.1
Host: google.com


HTTP/1.1 302 Found
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Location: hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=3NIVVY3ULOKG8Qe61YCYBQ
Content-Length: 262
Date: Fri, 27 Mar 2015 21:59:56 GMT
Server: GFE/2.0
Alternate-Protocol: 80:quic,p=0.5
<HTML><HEAD><meta http-equiv="content-type" content="te
xt/html;charset=utf-8">.<TITLE>302 Moved</TITLE></HE
AD><BODY>.<H1>302 Moved</H1>.The document has mov
ed.<A HREF="hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=3NIVVY3ULOKG
8Qe61YCYBQ">here</A>...</BODY></HTML>....


The Trojan connects to the servers at the folowing location(s):

rSwooYMM.exe_1108:

.text
.rdata
@.data
7.qU6
TNcMdI
vND.LOrg<
.eH^\
w|.LV
QfC%d
dW0WaZ@%di
O%%Sg
[%dZr
l}9fT{
E!.Lg:
\D.vY
m.TpM
.WYky?
?%sn6
.wbK3
Am%foEW
%d[k#
k[w[.dx
Ho%sd^
.pgVM
.XU\:
.TU:67Y[
mre%s
Rx.AF{-F
.dA}R
9zE46}GF{-A}d8
Rx.AMb
Rx.AJ
Vy-A}y1
]~]{:&]{>
Mr.0M8.wM
F@%uF
[email protected]
r|M-
9Q2.QD
s]{>EkAC.AZ?
]mYS_;-h}_/
%s>Ab
GcMd
7FZZZZ%
&aTF{-A}d8
Rx.AZu`\Vb)
Rx.AN~2
Rx.AF z
x.ASs)
Rx.AF{-6s z
]sc.Pu<
).KQ>6V
yT%FZ
d?%x1
u2S.cp
~%m"%U
R.BFX7
.Cd"w
/1:,*-.1
#k%U,
:EW.yY
%cMV=
hC%x}7
.Gl^z
>fAd:%U
.cW a
]{.iA8
8=d0,.eJ
KV.eb
.CYf?a8
=Btcp
õ(r'
Yy.IA9
Microsoft Windows
z.vPV
#qcFtPV
]a.PV
x!.PV
]q.RV
oleaut32.dll
RegOpenKeyW
advapi32.dll
kernel32.dll
user32.dll
Microsoft Windows eine Wiederherstellung in einem Moment beginnen.
.klicken, um zu kopieren
Strafe zahlen. Jeder Versuch, diese Nachricht zu entfernen werden die Dateien, Hardware und Windows-Installation unwiederbringlich besch
ffnen Sie den Internet-Browser. An die Adresse gehen: blockchain.info/wallet und klicken Sie auf 'Erstellen Sie ein neues Wallet'.,
Geben Sie Ihre E-Mail-Adresse (optional) und Ihr Passwort ein. Achten Sie darauf, Ihr Passwort sicher ist.-
Sparen Sie Ihr Passwort sicher, vorzugsweise offline (klicken Notepad)..
Folgen Sie den Anweisungen auf der Website aufgefordert werden, und achten Sie genau auf die Sicherheitsempfehlungen.1
.Machen BitCoin Zahlung:2
|Anmeldung zu Ihrem Bitcoin Wallet blockchain.info/wallet/login5
DKlicken Sie auf "Import / Export".6
- und Kleinschreibung) indem Sie es und klicken Sie auf 'Add Private Key'.7
8Klicken Sie auf "Sweep Key".9
.Internationale Anbieter=
WebbrowserD
&de.bitcoin.it/wiki/G
Kennen Sie die Gefahren der Verletzung des Urheberrechts. Besuchen copyright.gov/help/faq/faq-infringement.html f
~Microsoft Windows will begin a restoration process in a moment.
Operation Global 3 is a coordinated effort by U.S., Canadian and European law enforcement agencies targeting computers with pirated content.$
Open Internet Browser. Go to the address: blockchain.info/wallet and click 'Start A New Wallet'.,
Enter your e-mail address(optional) and password. Make sure your password is secure.-
zSave your password safely, preferably offline(click Notepad)..
Follow the steps prompted on the website and pay close attention to the security recommendations.1
tLogin to your Bitcoin wallet blockchain.info/wallet/login 5
4Click on Import / Export. 6
Enter the paper wallet's private key by typing it manually (case sensitive) and click on 'Add Private Key'.7
$Click 'Sweep Key'.9
.International Exchanges=
&en.bitcoin.it/wiki/G
Know the dangers of copyright infringement. Visit copyright.gov/help/faq/faq-infringement.html for more information.J
un reato federale che porta pene fino a cinque anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (17 USC s.506, 18 USC s.2319)
un crimine federale che comporta pene fino a quindici anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (18 USC s.2339A)
Microsoft Windows inizier
Importo:
Qualsiasi tentativo di rimuovere questo messaggio potrebbe danneggiare il vostro file, hardware e di installazione di Windows oltre il recupero."
Operazione globale III dagli Stati Uniti, Canada, Europa, Australia, Nuova Zelanda e altre forze dell'ordine di tutto il mondo
\Registrazione di un nuovo portafoglio BitCoin: 
Aprire Internet Browser. Vai all'indirizzo: blockchain.info/wallet e cliccare su 'Crea un nuovo Portafoglio'.,
Inserisci il tuo indirizzo e-mail (opzionale) e la password. Assicurati che il tuo password
Salvare la password in modo sicuro, preferibilmente non in linea (fare clic su Notepad)..
Seguire i passaggi spinto sul sito e prestare la massima attenzione alle raccomandazioni di sicurezza.1
|Accedi al tuo portafoglio Bitcoin blockchain.info/wallet/login5
<Clicca su 'Importa / Esporta'.6
Inserire la chiave privata 'Paper Wallet' digitando manualmente (maiuscole e minuscole) e fare clic su 'Add Private Key'.7
2Fare clic su 'Sweep Key'.9
&it.bitcoin.it/wiki/G
Conoscere i pericoli di violazione del copyright. Visita copyright.gov/help/faq/faq-infringement.html per maggiori informazioni.J
Microsoft Windows se iniciar
Fine Importe:
n de Windows sin posibilidad de recuperaci
Operaci
n: blockchain.info/wallet y haga clic en 'Crear un nuevo monedero'.,
gina web y prestar mucha atenci
pAcceda a su cartera blockchain.info/wallet/login Bitcoin5
FHaga clic en "Importar / Exportar".6
sculas) y haga clic en" Add Private Key ".7
2Haga clic en 'Sweep Key'.9
Navegador WebD
&es.bitcoin.it/wiki/G
n de copyright. Visita copyright.gov/help/faq/faq-infringement.html para m

rSwooYMM.exe_1108_rwx_00401000_000EA000:

7.qU6
TNcMdI
vND.LOrg<
.eH^\
w|.LV
QfC%d
dW0WaZ@%di
O%%Sg
[%dZr
l}9fT{
E!.Lg:
\D.vY
m.TpM
.WYky?
?%sn6
.wbK3
Am%foEW
%d[k#
k[w[.dx
Ho%sd^
.pgVM
.XU\:
.TU:67Y[
mre%s
Rx.AF{-F
.dA}R
9zE46}GF{-A}d8
Rx.AMb
Rx.AJ
Vy-A}y1
]~]{:&]{>
Mr.0M8.wM
F@%uF
[email protected]
r|M-
9Q2.QD
s]{>EkAC.AZ?
]mYS_;-h}_/
%s>Ab
GcMd
7FZZZZ%
&aTF{-A}d8
Rx.AZu`\Vb)
Rx.AN~2
Rx.AF z
x.ASs)
Rx.AF{-6s z
]sc.Pu<
).KQ>6V
yT%FZ
d?%x1
u2S.cp
~%m"%U
R.BFX7
.Cd"w
/1:,*-.1
#k%U,
:EW.yY
%cMV=
hC%x}7
.Gl^z
>fAd:%U
.cW a
]{.iA8
8=d0,.eJ
KV.eb
.CYf?a8
=Btcp
õ(r'
Yy.IA9
Microsoft Windows
z.vPV
#qcFtPV
]a.PV
x!.PV
]q.RV
Microsoft Windows eine Wiederherstellung in einem Moment beginnen.
.klicken, um zu kopieren
Strafe zahlen. Jeder Versuch, diese Nachricht zu entfernen werden die Dateien, Hardware und Windows-Installation unwiederbringlich besch
ffnen Sie den Internet-Browser. An die Adresse gehen: blockchain.info/wallet und klicken Sie auf 'Erstellen Sie ein neues Wallet'.,
Geben Sie Ihre E-Mail-Adresse (optional) und Ihr Passwort ein. Achten Sie darauf, Ihr Passwort sicher ist.-
Sparen Sie Ihr Passwort sicher, vorzugsweise offline (klicken Notepad)..
Folgen Sie den Anweisungen auf der Website aufgefordert werden, und achten Sie genau auf die Sicherheitsempfehlungen.1
.Machen BitCoin Zahlung:2
|Anmeldung zu Ihrem Bitcoin Wallet blockchain.info/wallet/login5
DKlicken Sie auf "Import / Export".6
- und Kleinschreibung) indem Sie es und klicken Sie auf 'Add Private Key'.7
8Klicken Sie auf "Sweep Key".9
.Internationale Anbieter=
WebbrowserD
&de.bitcoin.it/wiki/G
Kennen Sie die Gefahren der Verletzung des Urheberrechts. Besuchen copyright.gov/help/faq/faq-infringement.html f
~Microsoft Windows will begin a restoration process in a moment.
Operation Global 3 is a coordinated effort by U.S., Canadian and European law enforcement agencies targeting computers with pirated content.$
Open Internet Browser. Go to the address: blockchain.info/wallet and click 'Start A New Wallet'.,
Enter your e-mail address(optional) and password. Make sure your password is secure.-
zSave your password safely, preferably offline(click Notepad)..
Follow the steps prompted on the website and pay close attention to the security recommendations.1
tLogin to your Bitcoin wallet blockchain.info/wallet/login 5
4Click on Import / Export. 6
Enter the paper wallet's private key by typing it manually (case sensitive) and click on 'Add Private Key'.7
$Click 'Sweep Key'.9
.International Exchanges=
&en.bitcoin.it/wiki/G
Know the dangers of copyright infringement. Visit copyright.gov/help/faq/faq-infringement.html for more information.J
un reato federale che porta pene fino a cinque anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (17 USC s.506, 18 USC s.2319)
un crimine federale che comporta pene fino a quindici anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (18 USC s.2339A)
Microsoft Windows inizier
Importo:
Qualsiasi tentativo di rimuovere questo messaggio potrebbe danneggiare il vostro file, hardware e di installazione di Windows oltre il recupero."
Operazione globale III dagli Stati Uniti, Canada, Europa, Australia, Nuova Zelanda e altre forze dell'ordine di tutto il mondo
\Registrazione di un nuovo portafoglio BitCoin: 
Aprire Internet Browser. Vai all'indirizzo: blockchain.info/wallet e cliccare su 'Crea un nuovo Portafoglio'.,
Inserisci il tuo indirizzo e-mail (opzionale) e la password. Assicurati che il tuo password
Salvare la password in modo sicuro, preferibilmente non in linea (fare clic su Notepad)..
Seguire i passaggi spinto sul sito e prestare la massima attenzione alle raccomandazioni di sicurezza.1
|Accedi al tuo portafoglio Bitcoin blockchain.info/wallet/login5
<Clicca su 'Importa / Esporta'.6
Inserire la chiave privata 'Paper Wallet' digitando manualmente (maiuscole e minuscole) e fare clic su 'Add Private Key'.7
2Fare clic su 'Sweep Key'.9
&it.bitcoin.it/wiki/G
Conoscere i pericoli di violazione del copyright. Visita copyright.gov/help/faq/faq-infringement.html per maggiori informazioni.J
Microsoft Windows se iniciar
Fine Importe:
n de Windows sin posibilidad de recuperaci
Operaci
n: blockchain.info/wallet y haga clic en 'Crear un nuevo monedero'.,
gina web y prestar mucha atenci
pAcceda a su cartera blockchain.info/wallet/login Bitcoin5
FHaga clic en "Importar / Exportar".6
sculas) y haga clic en" Add Private Key ".7
2Haga clic en 'Sweep Key'.9
Navegador WebD
&es.bitcoin.it/wiki/G
n de copyright. Visita copyright.gov/help/faq/faq-infringement.html para m

rSwooYMM.exe_1108_rwx_009A0000_00001000:

C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp

FeEQMIQs.exe_1552:

.text
.rdata
@.data
7.qU6
TNcMdI
vND.LOrg<
.eH^\
w|.LV
QfC%d
dW0WaZ@%di
O%%Sg
[%dZr
l}9fT{
E!.Lg:
\D.vY
m.TpM
.WYky?
?%sn6
.wbK3
Am%foEW
%d[k#
k[w[.dx
Ho%sd^
.pgVM
.XU\:
.TU:67Y[
mre%s
Rx.AF{-F
.dA}R
9zE46}GF{-A}d8
Rx.AMb
Rx.AJ
Vy-A}y1
]~]{:&]{>
Mr.0M8.wM
F@%uF
[email protected]
r|M-
9Q2.QD
s]{>EkAC.AZ?
]mYS_;-h}_/
%s>Ab
GcMd
7FZZZZ%
&aTF{-A}d8
Rx.AZu`\Vb)
Rx.AN~2
Rx.AF z
x.ASs)
Rx.AF{-6s z
]sc.Pu<
).KQ>6V
yT%FZ
d?%x1
u2S.cp
~%m"%U
R.BFX7
.Cd"w
/1:,*-.1
#k%U,
:EW.yY
%cMV=
hC%x}7
.Gl^z
>fAd:%U
.cW a
]{.iA8
8=d0,.eJ
KV.eb
.CYf?a8
=Btcp
j.FAb
(.DG-\
Microsoft Windows
oMw%s
KH%CsO
   k%s
advapi32.dll
ntdll.dll
oleaut32.dll
user32.dll
GetProcessHeap
kernel32.dll
Microsoft Windows eine Wiederherstellung in einem Moment beginnen.
.klicken, um zu kopieren
Strafe zahlen. Jeder Versuch, diese Nachricht zu entfernen werden die Dateien, Hardware und Windows-Installation unwiederbringlich besch
ffnen Sie den Internet-Browser. An die Adresse gehen: blockchain.info/wallet und klicken Sie auf 'Erstellen Sie ein neues Wallet'.,
Geben Sie Ihre E-Mail-Adresse (optional) und Ihr Passwort ein. Achten Sie darauf, Ihr Passwort sicher ist.-
Sparen Sie Ihr Passwort sicher, vorzugsweise offline (klicken Notepad)..
Folgen Sie den Anweisungen auf der Website aufgefordert werden, und achten Sie genau auf die Sicherheitsempfehlungen.1
.Machen BitCoin Zahlung:2
|Anmeldung zu Ihrem Bitcoin Wallet blockchain.info/wallet/login5
DKlicken Sie auf "Import / Export".6
- und Kleinschreibung) indem Sie es und klicken Sie auf 'Add Private Key'.7
8Klicken Sie auf "Sweep Key".9
.Internationale Anbieter=
WebbrowserD
&de.bitcoin.it/wiki/G
Kennen Sie die Gefahren der Verletzung des Urheberrechts. Besuchen copyright.gov/help/faq/faq-infringement.html f
~Microsoft Windows will begin a restoration process in a moment.
Operation Global 3 is a coordinated effort by U.S., Canadian and European law enforcement agencies targeting computers with pirated content.$
Open Internet Browser. Go to the address: blockchain.info/wallet and click 'Start A New Wallet'.,
Enter your e-mail address(optional) and password. Make sure your password is secure.-
zSave your password safely, preferably offline(click Notepad)..
Follow the steps prompted on the website and pay close attention to the security recommendations.1
tLogin to your Bitcoin wallet blockchain.info/wallet/login 5
4Click on Import / Export. 6
Enter the paper wallet's private key by typing it manually (case sensitive) and click on 'Add Private Key'.7
$Click 'Sweep Key'.9
.International Exchanges=
&en.bitcoin.it/wiki/G
Know the dangers of copyright infringement. Visit copyright.gov/help/faq/faq-infringement.html for more information.J
un reato federale che porta pene fino a cinque anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (17 USC s.506, 18 USC s.2319)
un crimine federale che comporta pene fino a quindici anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (18 USC s.2339A)
Microsoft Windows inizier
Importo:
Qualsiasi tentativo di rimuovere questo messaggio potrebbe danneggiare il vostro file, hardware e di installazione di Windows oltre il recupero."
Operazione globale III dagli Stati Uniti, Canada, Europa, Australia, Nuova Zelanda e altre forze dell'ordine di tutto il mondo
\Registrazione di un nuovo portafoglio BitCoin: 
Aprire Internet Browser. Vai all'indirizzo: blockchain.info/wallet e cliccare su 'Crea un nuovo Portafoglio'.,
Inserisci il tuo indirizzo e-mail (opzionale) e la password. Assicurati che il tuo password
Salvare la password in modo sicuro, preferibilmente non in linea (fare clic su Notepad)..
Seguire i passaggi spinto sul sito e prestare la massima attenzione alle raccomandazioni di sicurezza.1
|Accedi al tuo portafoglio Bitcoin blockchain.info/wallet/login5
<Clicca su 'Importa / Esporta'.6
Inserire la chiave privata 'Paper Wallet' digitando manualmente (maiuscole e minuscole) e fare clic su 'Add Private Key'.7
2Fare clic su 'Sweep Key'.9
&it.bitcoin.it/wiki/G
Conoscere i pericoli di violazione del copyright. Visita copyright.gov/help/faq/faq-infringement.html per maggiori informazioni.J
Microsoft Windows se iniciar
Fine Importe:
n de Windows sin posibilidad de recuperaci
Operaci
n: blockchain.info/wallet y haga clic en 'Crear un nuevo monedero'.,
gina web y prestar mucha atenci
pAcceda a su cartera blockchain.info/wallet/login Bitcoin5
FHaga clic en "Importar / Exportar".6
sculas) y haga clic en" Add Private Key ".7
2Haga clic en 'Sweep Key'.9
Navegador WebD
&es.bitcoin.it/wiki/G
n de copyright. Visita copyright.gov/help/faq/faq-infringement.html para m

rSwooYMM.exe_1108_rwx_00A00000_00001000:

%Documents and Settings%\%current user%\NwIscAww\rSwooYMM

rSwooYMM.exe_1108_rwx_00A10000_00001000:

%Documents and Settings%\All Users\hUEQccwo\FeEQMIQs

rSwooYMM.exe_1108_rwx_00A30000_000E9000:

C{?%f{[
7.qU6
TNcMdI
vND.LOrg<
.eH^\
w|.LV
QfC%d
dW0WaZ@%di
O%%Sg
[%dZr
l}9fT{
E!.Lg:
\D.vY
m.TpM
.WYky?
?%sn6
.wbK3
Am%foEW
%d[k#
k[w[.dx
Ho%sd^
.pgVM
.XU\:
.TU:67Y[
mre%s
Rx.AF{-F
.dA}R
9zE46}GF{-A}d8
Rx.AMb
Rx.AJ
Vy-A}y1
]~]{:&]{>
Mr.0M8.wM
F@%uF
[email protected]
r|M-
9Q2.QD
s]{>EkAC.AZ?
]mYS_;-h}_/
%s>Ab
GcMd
7FZZZZ%
&aTF{-A}d8
Rx.AZu`\Vb)
Rx.AN~2
Rx.AF z
x.ASs)
Rx.AF{-6s z
]sc.Pu<
).KQ>6V
yT%FZ
d?%x1
u2S.cp
~%m"%U
R.BFX7
.Cd"w
/1:,*-.1
#k%U,
:EW.yY
%cMV=
hC%x}7
.Gl^z
>fAd:%U
.cW a
]{.iA8
8=d0,.eJ
KV.eb
.CYf?a8
=Btcp
x.sd6
4%UMv
4%UEInb
%uNaO
.YtUO
Microsoft Windows eine Wiederherstellung in einem Moment beginnen.
.klicken, um zu kopieren
Strafe zahlen. Jeder Versuch, diese Nachricht zu entfernen werden die Dateien, Hardware und Windows-Installation unwiederbringlich besch
ffnen Sie den Internet-Browser. An die Adresse gehen: blockchain.info/wallet und klicken Sie auf 'Erstellen Sie ein neues Wallet'.,
Geben Sie Ihre E-Mail-Adresse (optional) und Ihr Passwort ein. Achten Sie darauf, Ihr Passwort sicher ist.-
Sparen Sie Ihr Passwort sicher, vorzugsweise offline (klicken Notepad)..
Folgen Sie den Anweisungen auf der Website aufgefordert werden, und achten Sie genau auf die Sicherheitsempfehlungen.1
.Machen BitCoin Zahlung:2
|Anmeldung zu Ihrem Bitcoin Wallet blockchain.info/wallet/login5
DKlicken Sie auf "Import / Export".6
- und Kleinschreibung) indem Sie es und klicken Sie auf 'Add Private Key'.7
8Klicken Sie auf "Sweep Key".9
.Internationale Anbieter=
WebbrowserD
&de.bitcoin.it/wiki/G
Kennen Sie die Gefahren der Verletzung des Urheberrechts. Besuchen copyright.gov/help/faq/faq-infringement.html f
~Microsoft Windows will begin a restoration process in a moment.
Operation Global 3 is a coordinated effort by U.S., Canadian and European law enforcement agencies targeting computers with pirated content.$
Open Internet Browser. Go to the address: blockchain.info/wallet and click 'Start A New Wallet'.,
Enter your e-mail address(optional) and password. Make sure your password is secure.-
zSave your password safely, preferably offline(click Notepad)..
Follow the steps prompted on the website and pay close attention to the security recommendations.1
tLogin to your Bitcoin wallet blockchain.info/wallet/login 5
4Click on Import / Export. 6
Enter the paper wallet's private key by typing it manually (case sensitive) and click on 'Add Private Key'.7
$Click 'Sweep Key'.9
.International Exchanges=
&en.bitcoin.it/wiki/G
Know the dangers of copyright infringement. Visit copyright.gov/help/faq/faq-infringement.html for more information.J
un reato federale che porta pene fino a cinque anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (17 USC s.506, 18 USC s.2319)
un crimine federale che comporta pene fino a quindici anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (18 USC s.2339A)
Microsoft Windows inizier
Importo:
Qualsiasi tentativo di rimuovere questo messaggio potrebbe danneggiare il vostro file, hardware e di installazione di Windows oltre il recupero."
Operazione globale III dagli Stati Uniti, Canada, Europa, Australia, Nuova Zelanda e altre forze dell'ordine di tutto il mondo
\Registrazione di un nuovo portafoglio BitCoin: 
Aprire Internet Browser. Vai all'indirizzo: blockchain.info/wallet e cliccare su 'Crea un nuovo Portafoglio'.,
Inserisci il tuo indirizzo e-mail (opzionale) e la password. Assicurati che il tuo password
Salvare la password in modo sicuro, preferibilmente non in linea (fare clic su Notepad)..
Seguire i passaggi spinto sul sito e prestare la massima attenzione alle raccomandazioni di sicurezza.1
|Accedi al tuo portafoglio Bitcoin blockchain.info/wallet/login5
<Clicca su 'Importa / Esporta'.6
Inserire la chiave privata 'Paper Wallet' digitando manualmente (maiuscole e minuscole) e fare clic su 'Add Private Key'.7
2Fare clic su 'Sweep Key'.9
&it.bitcoin.it/wiki/G
Conoscere i pericoli di violazione del copyright. Visita copyright.gov/help/faq/faq-infringement.html per maggiori informazioni.J
Microsoft Windows se iniciar
Fine Importe:
n de Windows sin posibilidad de recuperaci
Operaci
n: blockchain.info/wallet y haga clic en 'Crear un nuevo monedero'.,
gina web y prestar mucha atenci
pAcceda a su cartera blockchain.info/wallet/login Bitcoin5
FHaga clic en "Importar / Exportar".6
sculas) y haga clic en" Add Private Key ".7
2Haga clic en 'Sweep Key'.9
Navegador WebD
&es.bitcoin.it/wiki/G
n de copyright. Visita copyright.gov/help/faq/faq-infringement.html para m

rSwooYMM.exe_1108_rwx_00E20000_00001000:

%Documents and Settings%\%current user%\NwIscAww\rSwooYMM.inf

rSwooYMM.exe_1108_rwx_00E30000_00001000:

%Documents and Settings%\All Users\hUEQccwo\FeEQMIQs.inf

jWcYYUcg.exe_524:

.text
.rdata
@.data
C{?%f{[
7.qU6
TNcMdI
vND.LOrg<
.eH^\
w|.LV
QfC%d
dW0WaZ@%di
O%%Sg
[%dZr
l}9fT{
E!.Lg:
\D.vY
m.TpM
.WYky?
?%sn6
.wbK3
Am%foEW
%d[k#
k[w[.dx
Ho%sd^
.pgVM
.XU\:
.TU:67Y[
mre%s
Rx.AF{-F
.dA}R
9zE46}GF{-A}d8
Rx.AMb
Rx.AJ
Vy-A}y1
]~]{:&]{>
Mr.0M8.wM
F@%uF
[email protected]
r|M-
9Q2.QD
s]{>EkAC.AZ?
]mYS_;-h}_/
%s>Ab
GcMd
7FZZZZ%
&aTF{-A}d8
Rx.AZu`\Vb)
Rx.AN~2
Rx.AF z
x.ASs)
Rx.AF{-6s z
]sc.Pu<
).KQ>6V
yT%FZ
d?%x1
u2S.cp
~%m"%U
R.BFX7
.Cd"w
/1:,*-.1
#k%U,
:EW.yY
%cMV=
hC%x}7
.Gl^z
>fAd:%U
.cW a
]{.iA8
8=d0,.eJ
KV.eb
.CYf?a8
=Btcp
c.lI'
c.fI!
x.sd6
4%UMv
4%UEInb
2software\microsoft\windows\currentversion\run
%uNaO
.YtUO
ZwOpenKey
ZwQueryValueKey
ntdll.dll
kernel32.dll
user32.dll
Microsoft Windows eine Wiederherstellung in einem Moment beginnen.
.klicken, um zu kopieren
Strafe zahlen. Jeder Versuch, diese Nachricht zu entfernen werden die Dateien, Hardware und Windows-Installation unwiederbringlich besch
ffnen Sie den Internet-Browser. An die Adresse gehen: blockchain.info/wallet und klicken Sie auf 'Erstellen Sie ein neues Wallet'.,
Geben Sie Ihre E-Mail-Adresse (optional) und Ihr Passwort ein. Achten Sie darauf, Ihr Passwort sicher ist.-
Sparen Sie Ihr Passwort sicher, vorzugsweise offline (klicken Notepad)..
Folgen Sie den Anweisungen auf der Website aufgefordert werden, und achten Sie genau auf die Sicherheitsempfehlungen.1
.Machen BitCoin Zahlung:2
|Anmeldung zu Ihrem Bitcoin Wallet blockchain.info/wallet/login5
DKlicken Sie auf "Import / Export".6
- und Kleinschreibung) indem Sie es und klicken Sie auf 'Add Private Key'.7
8Klicken Sie auf "Sweep Key".9
.Internationale Anbieter=
WebbrowserD
&de.bitcoin.it/wiki/G
Kennen Sie die Gefahren der Verletzung des Urheberrechts. Besuchen copyright.gov/help/faq/faq-infringement.html f
~Microsoft Windows will begin a restoration process in a moment.
Operation Global 3 is a coordinated effort by U.S., Canadian and European law enforcement agencies targeting computers with pirated content.$
Open Internet Browser. Go to the address: blockchain.info/wallet and click 'Start A New Wallet'.,
Enter your e-mail address(optional) and password. Make sure your password is secure.-
zSave your password safely, preferably offline(click Notepad)..
Follow the steps prompted on the website and pay close attention to the security recommendations.1
tLogin to your Bitcoin wallet blockchain.info/wallet/login 5
4Click on Import / Export. 6
Enter the paper wallet's private key by typing it manually (case sensitive) and click on 'Add Private Key'.7
$Click 'Sweep Key'.9
.International Exchanges=
&en.bitcoin.it/wiki/G
Know the dangers of copyright infringement. Visit copyright.gov/help/faq/faq-infringement.html for more information.J
un reato federale che porta pene fino a cinque anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (17 USC s.506, 18 USC s.2319)
un crimine federale che comporta pene fino a quindici anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (18 USC s.2339A)
Microsoft Windows inizier
Importo:
Qualsiasi tentativo di rimuovere questo messaggio potrebbe danneggiare il vostro file, hardware e di installazione di Windows oltre il recupero."
Operazione globale III dagli Stati Uniti, Canada, Europa, Australia, Nuova Zelanda e altre forze dell'ordine di tutto il mondo
\Registrazione di un nuovo portafoglio BitCoin: 
Aprire Internet Browser. Vai all'indirizzo: blockchain.info/wallet e cliccare su 'Crea un nuovo Portafoglio'.,
Inserisci il tuo indirizzo e-mail (opzionale) e la password. Assicurati che il tuo password
Salvare la password in modo sicuro, preferibilmente non in linea (fare clic su Notepad)..
Seguire i passaggi spinto sul sito e prestare la massima attenzione alle raccomandazioni di sicurezza.1
|Accedi al tuo portafoglio Bitcoin blockchain.info/wallet/login5
<Clicca su 'Importa / Esporta'.6
Inserire la chiave privata 'Paper Wallet' digitando manualmente (maiuscole e minuscole) e fare clic su 'Add Private Key'.7
2Fare clic su 'Sweep Key'.9
&it.bitcoin.it/wiki/G
Conoscere i pericoli di violazione del copyright. Visita copyright.gov/help/faq/faq-infringement.html per maggiori informazioni.J
Microsoft Windows se iniciar
Fine Importe:
n de Windows sin posibilidad de recuperaci
Operaci
n: blockchain.info/wallet y haga clic en 'Crear un nuevo monedero'.,
gina web y prestar mucha atenci
pAcceda a su cartera blockchain.info/wallet/login Bitcoin5
FHaga clic en "Importar / Exportar".6
sculas) y haga clic en" Add Private Key ".7
2Haga clic en 'Sweep Key'.9
Navegador WebD
&es.bitcoin.it/wiki/G
n de copyright. Visita copyright.gov/help/faq/faq-infringement.html para m

rSwooYMM.exe_1108_rwx_00E40000_00001000:

%Documents and Settings%\%current user%\NwIscAww\rSwooYMM.exe

rSwooYMM.exe_1108_rwx_00E50000_00001000:

%Documents and Settings%\All Users\hUEQccwo\FeEQMIQs.exe

rSwooYMM.exe_1108_rwx_00E80000_00001000:

rSwooYMM.exe

rSwooYMM.exe_1108_rwx_00E90000_00001000:

FeEQMIQs.exe

rSwooYMM.exe_1108_rwx_00EA0000_00001000:

taskkill /FI "USERNAME eq adm" /F /IM rSwooYMM.exe

rSwooYMM.exe_1108_rwx_00EB0000_00001000:

taskkill /FI "USERNAME eq adm" /F /IM FeEQMIQs.exe

rSwooYMM.exe_1108_rwx_00EC0000_00001000:

%Documents and Settings%\All Users\BOAMIgUE\jWcYYUcg.exe

rSwooYMM.exe_1108_rwx_00ED0000_00001000:

%Documents and Settings%\All Users\MAAo.txt

rSwooYMM.exe_1108_rwx_00EE0000_00001000:

notepad.exe "%Documents and Settings%\All Users\MAAo.txt"

rSwooYMM.exe_1108_rwx_00EF0000_00001000:

%Documents and Settings%\All Users\BOAMIgUE

rSwooYMM.exe_1108_rwx_01170000_00001000:

.text
`.rdata
@.data

rSwooYMM.exe_1108_rwx_01190000_02300000:

ole32.dll
advapi32.dll
ntdll.dll
user32.dll
kernel32.dll
Zc.ih
~W?.tKX
nV.uIfG^'
.npM d
%%fKr2
d.ud~
%d:jD
%do>%
Sqz%x)
_.uq]k
X.pf}
.ew9k
K-M}O
N6%xK
vd.uz
u/f3%F?QF"\
*cm.nP
_Tj%DN
-O}4d
HR
Oz6MvB"%U
GM.rm
.cEh(
(J!%uc7
R%u4Z
3D9.UFF
!..MQ
h%s9`
.Das&
.bBIf
]RI.jr
|?.NW
CMdu#
CMdG3
.FMq3@
1y>g.pX<
_.II`
L.GvrM
#;.sA;|i!j
.iY|.
.OY4 
K.Ecs
C.EasnG9[
J.Zf#
CD.RX
R.TSv
Tc.EPl
_%u*U
S.Pm{N
.Tz[4A-y
ÍXTN
tSQlkj
ed.Os
.LGX69f
G.KO-
k;.Ek
X.IKL
XB.hb
)rD%c
Me.Rq
ty.Ky
uv;.iR
%F_O/_?a
 r%SE
:.xhq
3l.Nm
H%x 9
i.gj]
UdpLbz
G.Qn3>
e,.Or
(?')9'22
p:`%S
HP@%S
!cte.kO
!cD%.kI[
 Olr.kH
.kOS(;:C
#sr%xWP
 Ol".kI{
 Olb.kI{
.kOS(;
 %X>hBv
 %X>hFv
pOÜ
21i.mn
LCrT
?x
px
qx
'7f!f.FA
'7&1n6f1f.Fa
pp
/f.FR
n.fqe
4Sf.FQ
f.Fac
n.fQg6Fa*
/f.FQ
/l.FR
".Fqa6F
/f.FA
/m.fr
/n.fR
:y
0y
8y
ex
/l.FB
/c.Fq
o.fag6FB
M!|`*8yQd
%xQ
Qb6&
&/fAf.FQb6F
.qtyip
.qt9Rp
.qti-p
.qti(p
.qti p
46Am6vQf.FR
f.Fqc
7&Ao.FQ
*|j.7fAg.FQ
/m.FB
/l.fb
n.faf
-Qpn}
Ds%uj
97q
b.&qn.fAf.F
Ax
&7Fab.FQ
77b6&an.fAd
/n.faf.F
 x
/d.FR
&.fae6F
.fae6F
f.fae6F
8-pK}
g.Fqa6F
/b.FQ
/g.Fq
n.fqf6FA
/f.Fq
/f.Fab.&
f.fae
Cx
qx
/c.Fb
%x#7F
%x"7F
/n.Fa
/`.Fb
/d.Fb
F:\FQ
qxB
%x#7F"
[7;n.Fb
/a.FB
/f.Fb
/f.FB
Cx
;y
/d.Fr
px
p:8yb
' (/qxW.fB
/o.Fr
/g.FR
ux
Q9
/f.Fa
n.fQf6F
7&an.FQ
n6faf.FQb6F
pT%X0
"qx
-Q{
qp%Sp
%x!7FR
r#o
/a.BA
/~.fR
b.f1f.fq
/2
j.Fqa
.fqf.FQ`
px'/fQf.Fqa
!x
3q%Ss
)x
.Zpt)
/n.fAd6F
0x
pz;y
pJ8y
3y
p*8y
&/fqf.FQa6&
^.fqd
!x
e.fAe.fQf.fqe>
1*|R
.flD4p
.FLf$pp
.fL;4p
t-28}
.BAe;bA
.bAf:]
.bA%:E
.fll5p
-S}.<
.fLL0p
.BAe:U
.bA&>]
.BAg6v
.bA'6R
.BAD*]
.BA&*]
.bA':E
.Fln0pp
t-68}
.bAG:E
.bAd:E
.bAg:E
6.smWu
.BA%:U
.BAd*]
.BA'*]
.bAg:Ub
.BAg*E
.fL.<ptu
.fL^=pt
.BAf?]
.BAd E
.FLJ>p,q
p;%Sp
.BA&>}
6R;%Sp
.BA$:E
.bA$:U
.bAd6^
.bAF.]
.FLR?pp
.FLB?pp
.FLn?ppM
.FlB8pp
.FLj8ppm
.Fl8?p
.FL0?p
.Fl(?p
.FL*?pp
.Fl"?pp
.fl(?p
.JY5.r
.fl@9p
.bAD:U
.bAE:E
.bAd:U
.BAd*E
.FLv5p,q_
.bA$:E
.BAE:U
.BAF:]
.BA%:]
6Rs-h}
6Rs-K}
6Rs-6}
.bAe:]
.BAe:]
.BA$*E
.BBeHp
7.ZE7.z
.bA :U
.be%;E
.fl`8p
.bB%:p
.BBe2p
.BBeQp
.BBm)p
/1.BA
.FLj:pp
.BAE:]
.BAD:E
.BA$:U
.bAD:E
.bA$:]
.BAg:E
.BA&*
.bA%.2
%U7bA
.bA'*E
%w-r8}(
%S]F8u?0
.BA&>]
.BA$6R
.BAG*
 .Be'
.BA&:}
.bef?]
.BA%>bA
%;}^$;}^
W-28}
.bAe>bA
D}%xE
.bAv:]
.BA4:E
R-%8U
.bAF:]
r%dN$
.BAD*E

rSwooYMM.exe_1108_rwx_05990000_00001000:

.text
.rdata
@.data

FeEQMIQs.exe_1552_rwx_00401000_000EA000:

7.qU6
TNcMdI
vND.LOrg<
.eH^\
w|.LV
QfC%d
dW0WaZ@%di
O%%Sg
[%dZr
l}9fT{
E!.Lg:
\D.vY
m.TpM
.WYky?
?%sn6
.wbK3
Am%foEW
%d[k#
k[w[.dx
Ho%sd^
.pgVM
.XU\:
.TU:67Y[
mre%s
Rx.AF{-F
.dA}R
9zE46}GF{-A}d8
Rx.AMb
Rx.AJ
Vy-A}y1
]~]{:&]{>
Mr.0M8.wM
F@%uF
[email protected]
r|M-
9Q2.QD
s]{>EkAC.AZ?
]mYS_;-h}_/
%s>Ab
GcMd
7FZZZZ%
&aTF{-A}d8
Rx.AZu`\Vb)
Rx.AN~2
Rx.AF z
x.ASs)
Rx.AF{-6s z
]sc.Pu<
).KQ>6V
yT%FZ
d?%x1
u2S.cp
~%m"%U
R.BFX7
.Cd"w
/1:,*-.1
#k%U,
:EW.yY
%cMV=
hC%x}7
.Gl^z
>fAd:%U
.cW a
]{.iA8
8=d0,.eJ
KV.eb
.CYf?a8
=Btcp
j.FAb
(.DG-\
Microsoft Windows
oMw%s
KH%CsO
   k%s
Microsoft Windows eine Wiederherstellung in einem Moment beginnen.
.klicken, um zu kopieren
Strafe zahlen. Jeder Versuch, diese Nachricht zu entfernen werden die Dateien, Hardware und Windows-Installation unwiederbringlich besch
ffnen Sie den Internet-Browser. An die Adresse gehen: blockchain.info/wallet und klicken Sie auf 'Erstellen Sie ein neues Wallet'.,
Geben Sie Ihre E-Mail-Adresse (optional) und Ihr Passwort ein. Achten Sie darauf, Ihr Passwort sicher ist.-
Sparen Sie Ihr Passwort sicher, vorzugsweise offline (klicken Notepad)..
Folgen Sie den Anweisungen auf der Website aufgefordert werden, und achten Sie genau auf die Sicherheitsempfehlungen.1
.Machen BitCoin Zahlung:2
|Anmeldung zu Ihrem Bitcoin Wallet blockchain.info/wallet/login5
DKlicken Sie auf "Import / Export".6
- und Kleinschreibung) indem Sie es und klicken Sie auf 'Add Private Key'.7
8Klicken Sie auf "Sweep Key".9
.Internationale Anbieter=
WebbrowserD
&de.bitcoin.it/wiki/G
Kennen Sie die Gefahren der Verletzung des Urheberrechts. Besuchen copyright.gov/help/faq/faq-infringement.html f
~Microsoft Windows will begin a restoration process in a moment.
Operation Global 3 is a coordinated effort by U.S., Canadian and European law enforcement agencies targeting computers with pirated content.$
Open Internet Browser. Go to the address: blockchain.info/wallet and click 'Start A New Wallet'.,
Enter your e-mail address(optional) and password. Make sure your password is secure.-
zSave your password safely, preferably offline(click Notepad)..
Follow the steps prompted on the website and pay close attention to the security recommendations.1
tLogin to your Bitcoin wallet blockchain.info/wallet/login 5
4Click on Import / Export. 6
Enter the paper wallet's private key by typing it manually (case sensitive) and click on 'Add Private Key'.7
$Click 'Sweep Key'.9
.International Exchanges=
&en.bitcoin.it/wiki/G
Know the dangers of copyright infringement. Visit copyright.gov/help/faq/faq-infringement.html for more information.J
un reato federale che porta pene fino a cinque anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (17 USC s.506, 18 USC s.2319)
un crimine federale che comporta pene fino a quindici anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (18 USC s.2339A)
Microsoft Windows inizier
Importo:
Qualsiasi tentativo di rimuovere questo messaggio potrebbe danneggiare il vostro file, hardware e di installazione di Windows oltre il recupero."
Operazione globale III dagli Stati Uniti, Canada, Europa, Australia, Nuova Zelanda e altre forze dell'ordine di tutto il mondo
\Registrazione di un nuovo portafoglio BitCoin: 
Aprire Internet Browser. Vai all'indirizzo: blockchain.info/wallet e cliccare su 'Crea un nuovo Portafoglio'.,
Inserisci il tuo indirizzo e-mail (opzionale) e la password. Assicurati che il tuo password
Salvare la password in modo sicuro, preferibilmente non in linea (fare clic su Notepad)..
Seguire i passaggi spinto sul sito e prestare la massima attenzione alle raccomandazioni di sicurezza.1
|Accedi al tuo portafoglio Bitcoin blockchain.info/wallet/login5
<Clicca su 'Importa / Esporta'.6
Inserire la chiave privata 'Paper Wallet' digitando manualmente (maiuscole e minuscole) e fare clic su 'Add Private Key'.7
2Fare clic su 'Sweep Key'.9
&it.bitcoin.it/wiki/G
Conoscere i pericoli di violazione del copyright. Visita copyright.gov/help/faq/faq-infringement.html per maggiori informazioni.J
Microsoft Windows se iniciar
Fine Importe:
n de Windows sin posibilidad de recuperaci
Operaci
n: blockchain.info/wallet y haga clic en 'Crear un nuevo monedero'.,
gina web y prestar mucha atenci
pAcceda a su cartera blockchain.info/wallet/login Bitcoin5
FHaga clic en "Importar / Exportar".6
sculas) y haga clic en" Add Private Key ".7
2Haga clic en 'Sweep Key'.9
Navegador WebD
&es.bitcoin.it/wiki/G
n de copyright. Visita copyright.gov/help/faq/faq-infringement.html para m

FeEQMIQs.exe_1552_rwx_009A0000_00001000:

C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp

FeEQMIQs.exe_1552_rwx_00A00000_00001000:

%Documents and Settings%\%current user%\NwIscAww\rSwooYMM

FeEQMIQs.exe_1552_rwx_00A10000_00001000:

%Documents and Settings%\All Users\hUEQccwo\FeEQMIQs

FeEQMIQs.exe_1552_rwx_00A30000_000E9000:

C{?%f{[
7.qU6
TNcMdI
vND.LOrg<
.eH^\
w|.LV
QfC%d
dW0WaZ@%di
O%%Sg
[%dZr
l}9fT{
E!.Lg:
\D.vY
m.TpM
.WYky?
?%sn6
.wbK3
Am%foEW
%d[k#
k[w[.dx
Ho%sd^
.pgVM
.XU\:
.TU:67Y[
mre%s
Rx.AF{-F
.dA}R
9zE46}GF{-A}d8
Rx.AMb
Rx.AJ
Vy-A}y1
]~]{:&]{>
Mr.0M8.wM
F@%uF
[email protected]
r|M-
9Q2.QD
s]{>EkAC.AZ?
]mYS_;-h}_/
%s>Ab
GcMd
7FZZZZ%
&aTF{-A}d8
Rx.AZu`\Vb)
Rx.AN~2
Rx.AF z
x.ASs)
Rx.AF{-6s z
]sc.Pu<
).KQ>6V
yT%FZ
d?%x1
u2S.cp
~%m"%U
R.BFX7
.Cd"w
/1:,*-.1
#k%U,
:EW.yY
%cMV=
hC%x}7
.Gl^z
>fAd:%U
.cW a
]{.iA8
8=d0,.eJ
KV.eb
.CYf?a8
=Btcp
x.sd6
4%UMv
4%UEInb
%uNaO
.YtUO
Microsoft Windows eine Wiederherstellung in einem Moment beginnen.
.klicken, um zu kopieren
Strafe zahlen. Jeder Versuch, diese Nachricht zu entfernen werden die Dateien, Hardware und Windows-Installation unwiederbringlich besch
ffnen Sie den Internet-Browser. An die Adresse gehen: blockchain.info/wallet und klicken Sie auf 'Erstellen Sie ein neues Wallet'.,
Geben Sie Ihre E-Mail-Adresse (optional) und Ihr Passwort ein. Achten Sie darauf, Ihr Passwort sicher ist.-
Sparen Sie Ihr Passwort sicher, vorzugsweise offline (klicken Notepad)..
Folgen Sie den Anweisungen auf der Website aufgefordert werden, und achten Sie genau auf die Sicherheitsempfehlungen.1
.Machen BitCoin Zahlung:2
|Anmeldung zu Ihrem Bitcoin Wallet blockchain.info/wallet/login5
DKlicken Sie auf "Import / Export".6
- und Kleinschreibung) indem Sie es und klicken Sie auf 'Add Private Key'.7
8Klicken Sie auf "Sweep Key".9
.Internationale Anbieter=
WebbrowserD
&de.bitcoin.it/wiki/G
Kennen Sie die Gefahren der Verletzung des Urheberrechts. Besuchen copyright.gov/help/faq/faq-infringement.html f
~Microsoft Windows will begin a restoration process in a moment.
Operation Global 3 is a coordinated effort by U.S., Canadian and European law enforcement agencies targeting computers with pirated content.$
Open Internet Browser. Go to the address: blockchain.info/wallet and click 'Start A New Wallet'.,
Enter your e-mail address(optional) and password. Make sure your password is secure.-
zSave your password safely, preferably offline(click Notepad)..
Follow the steps prompted on the website and pay close attention to the security recommendations.1
tLogin to your Bitcoin wallet blockchain.info/wallet/login 5
4Click on Import / Export. 6
Enter the paper wallet's private key by typing it manually (case sensitive) and click on 'Add Private Key'.7
$Click 'Sweep Key'.9
.International Exchanges=
&en.bitcoin.it/wiki/G
Know the dangers of copyright infringement. Visit copyright.gov/help/faq/faq-infringement.html for more information.J
un reato federale che porta pene fino a cinque anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (17 USC s.506, 18 USC s.2319)
un crimine federale che comporta pene fino a quindici anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (18 USC s.2339A)
Microsoft Windows inizier
Importo:
Qualsiasi tentativo di rimuovere questo messaggio potrebbe danneggiare il vostro file, hardware e di installazione di Windows oltre il recupero."
Operazione globale III dagli Stati Uniti, Canada, Europa, Australia, Nuova Zelanda e altre forze dell'ordine di tutto il mondo
\Registrazione di un nuovo portafoglio BitCoin: 
Aprire Internet Browser. Vai all'indirizzo: blockchain.info/wallet e cliccare su 'Crea un nuovo Portafoglio'.,
Inserisci il tuo indirizzo e-mail (opzionale) e la password. Assicurati che il tuo password
Salvare la password in modo sicuro, preferibilmente non in linea (fare clic su Notepad)..
Seguire i passaggi spinto sul sito e prestare la massima attenzione alle raccomandazioni di sicurezza.1
|Accedi al tuo portafoglio Bitcoin blockchain.info/wallet/login5
<Clicca su 'Importa / Esporta'.6
Inserire la chiave privata 'Paper Wallet' digitando manualmente (maiuscole e minuscole) e fare clic su 'Add Private Key'.7
2Fare clic su 'Sweep Key'.9
&it.bitcoin.it/wiki/G
Conoscere i pericoli di violazione del copyright. Visita copyright.gov/help/faq/faq-infringement.html per maggiori informazioni.J
Microsoft Windows se iniciar
Fine Importe:
n de Windows sin posibilidad de recuperaci
Operaci
n: blockchain.info/wallet y haga clic en 'Crear un nuevo monedero'.,
gina web y prestar mucha atenci
pAcceda a su cartera blockchain.info/wallet/login Bitcoin5
FHaga clic en "Importar / Exportar".6
sculas) y haga clic en" Add Private Key ".7
2Haga clic en 'Sweep Key'.9
Navegador WebD
&es.bitcoin.it/wiki/G
n de copyright. Visita copyright.gov/help/faq/faq-infringement.html para m

FeEQMIQs.exe_1552_rwx_00E20000_00001000:

%Documents and Settings%\%current user%\NwIscAww\rSwooYMM.inf

FeEQMIQs.exe_1552_rwx_00E30000_00001000:

%Documents and Settings%\All Users\hUEQccwo\FeEQMIQs.inf

FeEQMIQs.exe_1552_rwx_00E40000_00001000:

%Documents and Settings%\%current user%\NwIscAww\rSwooYMM.exe

FeEQMIQs.exe_1552_rwx_00E50000_00001000:

%Documents and Settings%\All Users\hUEQccwo\FeEQMIQs.exe

FeEQMIQs.exe_1552_rwx_00E80000_00001000:

rSwooYMM.exe

FeEQMIQs.exe_1552_rwx_00E90000_00001000:

FeEQMIQs.exe

FeEQMIQs.exe_1552_rwx_00EA0000_00001000:

taskkill /FI "USERNAME eq adm" /F /IM rSwooYMM.exe

FeEQMIQs.exe_1552_rwx_00EB0000_00001000:

taskkill /FI "USERNAME eq adm" /F /IM FeEQMIQs.exe

FeEQMIQs.exe_1552_rwx_00EC0000_00001000:

%Documents and Settings%\All Users\BOAMIgUE\jWcYYUcg.exe

FeEQMIQs.exe_1552_rwx_00ED0000_00001000:

%Documents and Settings%\All Users\MAAo.txt

FeEQMIQs.exe_1552_rwx_00EE0000_00001000:

notepad.exe "%Documents and Settings%\All Users\MAAo.txt"

FeEQMIQs.exe_1552_rwx_00EF0000_00001000:

%Documents and Settings%\All Users\BOAMIgUE

FeEQMIQs.exe_1552_rwx_01170000_00001000:

.text
`.rdata
@.data

FeEQMIQs.exe_1552_rwx_01190000_02300000:

"<"&"?">"
"<"&"?"9"3"
kernel32.dll
advapi32.dll
ntdll.dll
GetProcessWindowStation
user32.dll
:.Sv=
Jw.ds
(%s1q
K.gQ0
CmdW?
x%u{1Q
S%xXC
4%D-'
2rxn.op
M*.%F
i!0.cer
)!.rQj"D|j
8%.vo(
.yCAO
..zuR
Z{:.Kn
.ssEYQ
AÉr
UT\.eH
c{%xg
jo.Hj
6.Nst
^.tH>#
.bUq$
.Fdv[;
.txt\
};.Jxy 
'.Jd9@
t6.Gs[t
tB<
.nvJ.
ZRO%cN8
Uv;%xN
5-.rqV
6g%Dg
p%d&~
4b.DmZ
5%F}NT,
K-oFFXP}
]x.vx
SQl8L9
.xGQ?W
%.dr-
:]7,6-0,
q.UmG
D=s.Mt
H|.yIq
?CW#.UW
sa%cls
.WrhwLd~
,.bSz
{()!:!`[
c'.aV
%f>>t
/n.VW
.Ub)7H
.Jg>t
*1"/ $::"
;Q.Yc
_F%f_
@^%CN
.wo}4
qv.je
)|6.We
_F%F_
3amK.am
Ezmk=zm 2zmk.zm #zm
.keKNG
N%D:w
mK .mk
PgE_F%f
Pgz_F%f
.Izv/
Pge_F%f
3wo%f
.wXNX
.GdV:
.GE:w
T.ocs
I.de~
OK.RnnAN
Jj.ek_
w*k.Lu
.vUly
%d^Te
WEBXs
.Hlk'Hl
lkW.mkU.m
lk].mk
adKwadkqadKiadkdadk^adkXadkQadKHadkAadk=adk9adk4adk.adk(adk"adk
SCmd
I.NN2
ws.oX`V
a.ngaE
evÎk
ftpV
o.oek_
FtpV
.vLSc
jCMdk
.oe )oeK$oe
Cn.MV=
Cn.MVE
EC.gz
.gf4Q
EC.gE
CC.gC
1Fek.Fe
G<.Oey
e (.ek
.Hek/
j%Udk
4h.ek
.spV>jj
ev.Iek
uGO.EB
uDO.EB
;%Cniq
.FE[b{ek
[email protected]
n'aF.bF
j.UeKnGanV~
.VX|$
-ek}#dk}
dK{%d
-ek}s
d |%d |Id 
dk|%dk|Idk
-ek}clk~
e ~%d 
dkeXe
dK|%d
|%dk|
%dksNd p
dK|%dK|IdK
-ek}!ek}
d x.ekt
dkm.ek]
dk].eKX
dkW.eKR
dk/.ek
%xekVtd
^ek.Pdk
.eK~.e
ek<.ek
(.ek~-d
dk9.dk0
dk*%d
dkk"
ek}%dk}Idk

FeEQMIQs.exe_1552_rwx_03B90000_01E00000:

.text
`.rdata
@.data
.rsrc
@.reloc
u%Uh`
QSSSh
QVSSh
t.PSh
T$lRSSh| "
UDPQRh
L$ QSSh
L$,QSSh
QSSShlVU
RVSShlVU
t.Ph\
tGHt.Ht&
operand of unlimited repeat could match the empty string
POSIX named classes are supported only within a class
erroffset passed as NULL
POSIX collating elements are not supported
this version of PCRE is not compiled with PCRE_UTF8 support
PCRE does not support \L, \l, \N{name}, \U, or \u
support for \P, \p, and \X has not been compiled
this version of PCRE is not compiled with PCRE_UCP support
\N is not supported in a class
inflate 1.2.5 Copyright 1995-2010 Mark Adler
Please contact the application's support team for more information.
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
operator
GetProcessWindowStation
USER32.DLL
RtlRunOnceExecuteOnce
advapi32_hack::try_hack: bad PE passed
advapi32_hack::try_hack: cannot read import table
advapi32_hack::try_hack: cannot find section .text
.data
advapi32_hack::try_hack: cannot find section .data
advapi32_hack::try_hack: cannot read section .text
Cannot read module %s, error %d
Cannot read exports of %s, error %d
advapi32_hack::try_hack: cannot read exports, error %d
.apiset
Bad .apiset catalog - don`t fit in section
String in cat item %d not in section
Value in cat item %d not in section
Bad referred in cat item %d
Double mapped value in cat item %d not in section
Bad double referred in cat item %d
BaseSrvRegisterWowExec
BaseSrvGetProcessShutdownParam
BaseSrvSetProcessShutdownParam
basesrv.dll
Unknown size of BaseServerApiDispatchTable: %d
ServerDll[%d] %p
csrsrv.dll
CsrExecServerThread
ServerDll[%d]:
ApiDispatchTable: %p %s
ConnectRoutine: %p %s
DisconnectRoutine: %p %s
HardErrorRoutine: %p %s
AddProcessRoutine: %p %s
ShutdownProcessRoutine: %p %s
Cannot open dir %S, error %d
clean_old_drvs: error %d on deleting file %S
Cannot find resource %X
Cannot load resource %X
Resource %d has zero length
Cannot lock resource %X
Cannot unpack resource %X
Cannot create file %S, error %d
1.2.5
Decompress buffer %d bytes too small
DxDvpWaitForVideoPortSync
DxDvpUpdateVideoPort
DxDvpGetVideoPortConnectInfo
DxDvpGetVideoPortOutputFormats
DxDvpGetVideoPortLine
DxDvpGetVideoPortInputFormats
DxDvpGetVideoPortFlipStatus
DxDvpGetVideoPortField
DxDvpGetVideoPortBandwidth
DxDvpFlipVideoPort
DxDvpDestroyVideoPort
DxDvpCreateVideoPort
DxDvpCanCreateVideoPort
DxDdSetColorKey
Cannot read gaDxgFuncs handlers, readed %X bytes
.rdata
Cannot read DxgCoreInterface handlers, readed %X bytes
Unknown acpi table version: %X
SBP2PORT_Mask
STORMINIPORT_Mask
STORPORT_Mask
TCPIP6_Mask
WSOCKTRANSPORT_Mask
FCPORT_Mask
SOFTPCI_Mask
TCPIP_Mask
SCSIMINIPORT_Mask
SCSIPORT_Mask
Unknown KdComponentTableSize size %X
dump_kd_masks return %X bytes, error %d, ntstatus %X
dump_kd_masks return %X bytes, error %d
dump_kd_masks(%s) return %X bytes, error %d, ntstatus %X
dump_kd_masks(%s) return %X bytes, error %d
%-*s: %X
read_kopts_length(%s) return %X bytes, error %d, ntstatus %X
read_kopts_length(%s) return %X bytes, error %d
Cannot alloc %X bytes
Cannot realloc %X bytes for %s
read_kopts(%s) return %X bytes, error %d, ntstatus %X
read_kopts(%s) return %X bytes, error %d
%S (%s): %X
%S (%s):
dump_kopts(%s) return %X bytes, error %d, ntstatus %X
dump_kopts(%s) return %X bytes, error %d
MmSupportWriteWatch
KiPassiveWatchdogTimeout
ViImageExecutionOptions
DbgkErrorPortStartTimeout
DbgkErrorPortCommTimeout
MmDisablePagingExecutive
CmDefaultLanguageId
DbgkpMaxModuleMsgs
IoCountOperations
KeDelayExecutionThread
resolve_IoFreeIrp: bad addr of %s
get_interrupt_dispatch: cannot alloc %d bytes
Unknown kernel options: %S
PsGetProcessWin32WindowStation
KeIsExecutingDpc
bad addr of KeIsExecutingDpc
Bad pnp handler item %d (%d)
Cannot find %s
ks.sys: cannot get KoCreateInstance
ImportContext
ExportContext
SpChangeAccountPasswordFn
CallPackagePassthrough
%SystemRoot%\System32\
GetServiceAccountPassword
DPAPIPasswordChangeForGMSA
GetCredentialKey
INotifyPasswordChanged
%s PolicyChangeNotificationCallbacks
PolicyChangeNotificationCallback[%d]: %d items
[%d] %p %p %p %p %s
lsasrv_hack::try_hack: bad PE passed
lsasrv_hack::try_hack: cannot find section .data
lsasrv_hack::try_hack: cannot read section .data
lsasrv_hack::try_hack: bad section passed
lsasrv_hack::try_hack: cannot read exports, error %d
LsaICallPackagePassthrough
lsasrv.dll
VaultLogonSessionNotification: %p %s
Start of driver %S failed !
WSPJoinLeaf
MSAFD_WSPSendMsg
MSAFD_WSPRecvMsg
mswsock.dll
CheckProc: cannot open process PID %d, error %d, ntstatus %X
CheckProc: cannot open process PID %d, error %d
threaded_processes_checker exception occured, error %X
MyWindowsChecker: len %d, kernel name %s
Cannot get kernel name, error %d
Kill process %d
Check processes in %d threads
Cannot find process %d
Usage: %S [options]
-wmi - report about WMI entries
-uem - check for Unknown Executable Memory
-npo - dump RPC Named Pipes Owner
-rdata - check .rdata sections too
-rpc - report about RPC interfaces
DeriveKey
NotifyChangeKey
EnumKeys
IsAlgSupported
FreeKey
DeleteKey
FinalizeKey
SetKeyProperty
CreatePersistedKey
OpenKey
OpenPrivateKey
ImportKey
ImportMasterKey
GetKeyProperty
GenerateSessionKeys
GenerateMasterKey
ExportKey
CreateEphemeralKey
ComputeEapKeyBlock
ncrypt_hack::check_in_proc: cannot alloc %d bytes
GetKeyStorageInterface
Cannot load %s (copy of %s), error %d
Cannot load module %s, error %d
Cannot read module %s import table
NdisMRegisterMiniportDriver
resolve_minidrivers_list: bad addr of NdisMRegisterMiniportDriver
NdisMRegisterMiniport
resolve_minidrivers_list: cannot find NdisMRegisterMiniport
resolve_minidrivers_list: bad addr of NdisMRegisterMiniport
resolve_miniports_list: cannot find NdisIMInitializeDeviceInstanceEx
resolve_miniports_list: bad addr of NdisIMInitializeDeviceInstanceEx
OID_CO_TAPI_DONT_REPORT_DIGITS
OID_CO_TAPI_REPORT_DIGITS
OID_QOS_OPERATIONAL_PARAMETERS
OID_TCP_TASK_IPSEC_OFFLOAD_V2_ADD_SA_EX
OID_TCP_TASK_IPSEC_OFFLOAD_V2_UPDATE_SA
OID_TCP_TASK_IPSEC_OFFLOAD_V2_DELETE_SA
OID_TCP_TASK_IPSEC_OFFLOAD_V2_ADD_SA
OID_TCP_CONNECTION_OFFLOAD_PARAMETERS
OID_FFP_SUPPORT
OID_TCP_CONNECTION_OFFLOAD_HARDWARE_CAPABILITIES
OID_TCP_CONNECTION_OFFLOAD_CURRENT_CONFIG
OID_TCP_OFFLOAD_HARDWARE_CAPABILITIES
OID_TCP_OFFLOAD_PARAMETERS
OID_TCP_OFFLOAD_CURRENT_CONFIG
OID_TCP6_OFFLOAD_STATS
OID_TCP4_OFFLOAD_STATS
OID_TCP_TASK_IPSEC_DELETE_UDPESP_SA
OID_TCP_TASK_IPSEC_ADD_UDPESP_SA
OID_TCP_SAN_SUPPORT
OID_TCP_TASK_IPSEC_DELETE_SA
OID_TCP_TASK_IPSEC_ADD_SA
OID_TCP_TASK_OFFLOAD
OID_DOT11_SUPPORTED_DSSS_CHANNEL_LIST
OID_DOT11_SUPPORTED_OFDM_FREQUENCY_LIST
OID_DOT11_QOS_TX_QUEUES_SUPPORTED
OID_DOT11_AP_JOIN_REQUEST
OID_DOT11_HR_CCA_MODE_SUPPORTED
OID_DOT11_FREQUENCY_BANDS_SUPPORTED
OID_DOT11_SUPPORTED_DATA_RATES_VALUE
OID_DOT11_SUPPORTED_RX_ANTENNA
OID_DOT11_SUPPORTED_TX_ANTENNA
OID_DOT11_REG_DOMAINS_SUPPORT_VALUE
OID_DOT11_CCA_MODE_SUPPORTED
OID_DOT11_SUPPORTED_POWER_LEVELS
OID_DOT11_DIVERSITY_SUPPORT
OID_DOT11_SUPPORTED_PHY_TYPES
OID_DOT11_OPERATIONAL_RATE_SET
OID_DOT11_JOIN_REQUEST
OID_DOT11_CURRENT_OPERATION_MODE
OID_DOT11_OPERATION_MODE_CAPABILITY
OID_802_11_SUPPORTED_RATES
OID_802_11_NETWORK_TYPES_SUPPORTED
OID_802_11_REMOVE_KEY
OID_802_11_ADD_KEY
OID_IRDA_SUPPORTED_SPEEDS
OID_ATM_SUPPORTED_AAL_TYPES
OID_ATM_SUPPORTED_SERVICE_CATEGORY
OID_ATM_SUPPORTED_VC_RATES
OID_FDDI_PORT_ACTION
OID_FDDI_PORT_HARDWARE_PRESENT
OID_FDDI_PORT_LER_FLAG
OID_FDDI_PORT_PC_WITHHOLD
OID_FDDI_PORT_PCM_STATE
OID_FDDI_PORT_CONNNECT_STATE
OID_FDDI_PORT_LER_ALARM
OID_FDDI_PORT_LER_CUTOFF
OID_FDDI_PORT_LEM_CT
OID_FDDI_PORT_LEM_REJECT_CT
OID_FDDI_PORT_LER_ESTIMATE
OID_FDDI_PORT_LCT_FAIL_CT
OID_FDDI_PORT_EB_ERROR_CT
OID_FDDI_PORT_PC_LS
OID_FDDI_PORT_BS_FLAG
OID_FDDI_PORT_MAINT_LS
OID_FDDI_PORT_INDEX
OID_FDDI_PORT_CONNECTION_CAPABILITIES
OID_FDDI_PORT_PMD_CLASS
OID_FDDI_PORT_MAC_LOOP_TIME
OID_FDDI_PORT_AVAILABLE_PATHS
OID_FDDI_PORT_MAC_PLACEMENT
OID_FDDI_PORT_REQUESTED_PATHS
OID_FDDI_PORT_CURRENT_PATH
OID_FDDI_PORT_MAC_INDICATED
OID_FDDI_PORT_CONNECTION_POLICIES
OID_FDDI_PORT_NEIGHBOR_TYPE
OID_FDDI_PORT_MY_TYPE
OID_FDDI_MAC_DOWNSTREAM_PORT_TYPE
OID_FDDI_SMT_MSG_TIME_STAMP
OID_FDDI_SMT_BYPASS_PRESENT
OID_FDDI_SMT_MAC_INDEXES
OID_FDDI_SMT_PORT_INDEXES
OID_TCP_RSC_STATISTICS
OID_SWITCH_PORT_UPDATED
OID_GEN_OPERATIONAL_STATUS
OID_SWITCH_PORT_TEARDOWN
OID_SWITCH_PORT_FEATURE_STATUS_QUERY
OID_SWITCH_PORT_DELETE
OID_SWITCH_PORT_CREATE
OID_SWITCH_PORT_ARRAY
OID_SWITCH_PORT_PROPERTY_ENUM
OID_SWITCH_PORT_PROPERTY_DELETE
OID_SWITCH_PORT_PROPERTY_UPDATE
OID_SWITCH_PORT_PROPERTY_ADD
OID_NIC_SWITCH_DELETE_VPORT
OID_NIC_SWITCH_ENUM_VPORTS
OID_NIC_SWITCH_VPORT_PARAMETERS
OID_NIC_SWITCH_CREATE_VPORT
OID_GEN_MINIPORT_RESTART_ATTRIBUTES
OID_GEN_PORT_AUTHENTICATION_PARAMETERS
OID_GEN_PORT_STATE
OID_GEN_ENUMERATE_PORTS
OID_GEN_TRANSPORT_HEADER_OFFSET
OID_GEN_SUPPORTED_GUIDS
OID_GEN_MEDIA_SUPPORTED
OID_GEN_SUPPORTED_LIST
Cannot read gWfpGlobal, readed %X bytes
Cannot read Wfp callout count, readed %X bytes
Cannot read Wfp callouts, readed %X bytes
Cannot read WFP index functions, readed %X bytes
iphlpapi.dll
%SystemRoot%\System32\iphlpapi.dll
AllocateAndGetTcpExTableFromStack
AllocateAndGetUdpExTableFromStack
GetExtendedTcpTable
GetExtendedUdpTable
Failed to snapshot TCP endpoints, error %d
Failed to snapshot UDP endpoints, error %d
Cannot alloc %d bytes for UDP extended table
Cannot alloc %d bytes for TCP extended table
ntdll_hack::try_hack: bad PE passed
ntdll_hack::try_hack: cannot find section .text
ntdll_hack::try_hack: cannot read section .text
ntdll_hack::try_hack: bad section passed
ntdll_hack::try_hack: cannot read exports, error %d
%s channel hooks:
ChannelHook[%d]: %p (%p - %s) %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
ChannelHook[%d]: %p (%p) %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
MallocSpy: %p vtbl %p - %s
webclient
msiexec32
msiexec
tftp
ftp32
cmd32
ccmexec32
ccmexec
chrome
opera
firefox
Process PID %d raise dwwin PID %d
Cannot alloc new process PID %d %S
Cannot open svchost process PID %d, error %d
proc_list::read: CreateToolhelp32Snapshot failed with error %d
PID %d Parent PID %d service {%S} %S
PID %d Parent PID %d %S
PID %d Parent PID %d kind {%S} %S
read_service_exe_name(%S): cannot expand string %S
ExWindowStationOpenProcedureCallout
ExWindowStationParseProcedureCallout
ExWindowStationDeleteProcedureCallout
ExWindowStationCloseProcedureCallout
ExWindowStationOkToCloseProcedureCallout
read_w8_callout failed, len %d, returned %d bytes, error %d, ntstatus %X
read_w8_callout failed, len %d, returned %d bytes, error %d
PsWin32CallBack: %p %p %s
check_callouts: cannot alloc %X bytes (size %d)
check_callouts failed, error %d, status %X
check_callouts failed, error %d
Callouts (%d):
%s: %p %s
ark_check_callbacks: cannot read size of callbacks list, error %d, ntstatus %X
ark_check_callbacks: cannot read size of callbacks list, error %d
ark_check_callbacks: cannot read %d bytes (readed %d), error %d, ntstatus %X
ark_check_callbacks: cannot read %d bytes (readed %d), error %d
CB: %S, total %X:
%p (%s)
check_shutdown_callbacks: cannot read size of callbacks list, error %d, ntstatus %X
check_shutdown_callbacks: cannot read size of callbacks list, error %d
check_shutdown_callbacks: cannot read callbacks list of %s, error %d, ntstatus %X
check_shutdown_callbacks: cannot read callbacks list of %s, error %d
%s - %d:
FastIoUnlockAllByKey
MJ_CREATE_NAMED_PIPE
%s!%s.%s patched by %s, addr %p
%s!%s[%d] patched by %s, addr %p
Cannot open driver dumpfile %s, error %d
Cannot open kernel dumpfile %s, error %d
Cannot read driver %s, error %d
hal.dll
Shadow SDT: %p, limit %X
win32k.sys
Cannot relocate section %s.%s
Cannot alloc %X bytes for reading driver section %s.%s
Driver %s!%s has %X patched bytes !
.orig
.kmem
Cannot read driver section %s.%s (flags %X) at %p size %X readed %X, error %d, ntstatus %X
Cannot read driver section %s.%s (flags %X) at %p size %X readed %X, error %d
Cannot read kernel %s, error %d
ntoskrnl.exe
Cannot alloc %X bytes for reading kernel sections
Cannot relocate section %s
KernelSection %s rva %X, size %X, 0x%X relocs has 0x%X patched bytes !
Cannot read (whole) section %s (flags %X) at %p size %X (readed %X), error %d
\SystemRoot\system32\hal.dll
\SystemRoot\system32\halapic.dll
\SystemRoot\system32\halmps.dll
\SystemRoot\system32\halacpi.dll
\SystemRoot\system32\halaacpi.dll
\SystemRoot\system32\halmacpi.dll
%SystemRoot%\System32\hal.dll
halapic.dll
halmps.dll
halacpi.dll
halaacpi.dll
halmacpi.dll
Driver %S DrvObj %p:
DriverUnload patched by %s, addr %p
DriverStartIo patched by %s, addr %p
AddDevice patched by %s, addr %p
Handler %s patched by %s, addr %p
Handler %s patched, addr %p
Handler %d patched by %s, addr %p
Handler %d patched, addr %p
FastIOHandler %s patched by %s, addr %p
FastIOHandler %s patched, addr %p
FastIOHandler %d patched by %s, addr %p
FastIOHandler %d patched, addr %p
FS_FILTER_CALLBACKS %s patched by %s, addr %p
FS_FILTER_CALLBACKS %s patched, addr %p
FS_FILTER_CALLBACKS %d patched by %s, addr %p
FS_FILTER_CALLBACKS %d patched, addr %p
StartIo patched by %s, addr %p
read_fsmjxxx(%S): cannot make full driver name
read_fsmjxxx(%S) failed, error %d, ntstatus %X
read_fsmjxxx(%S) failed, error %d
read_mjxxx(%s): cannot make full driver name
read_mjxxx(%S) failed, error %d, ntstatus %X
read_mjxxx(%S) failed, error %d
Cannot alloc %X bytes for driver %s EAT checking
read_driver_eat %s failed, error %d, status %X
read_driver_eat %s failed, error %d
Export addr %s.%s patched by %s !
Export addr %s.%s patched !
Export addr %s.%d patched by %s !
Export addr %s.%d patched!
\hal.dll
\SystemRoot\system32\drivers\ndis.sys
ndis.sys
drivers\ndis.sys
\SystemRoot\system32\DRIVERS\tdi.sys
tdi.sys
drivers\tdi.sys
\SystemRoot\system32\DRIVERS\tcpip.sys
tcpip.sys
drivers\tcpip.sys
\SystemRoot\system32\DRIVERS\netio.sys
netio.sys
drivers\netio.sys
\SystemRoot\system32\DRIVERS\fltmgr.sys
fltmgr.sys
drivers\fltmgr.sys
\SystemRoot\system32\DRIVERS\ks.sys
ks.sys
drivers\ks.sys
\SystemRoot\system32\DRIVERS\dxg.sys
drivers\dxg.sys
\SystemRoot\system32\DRIVERS\dxgkrnl.sys
drivers\dxgkrnl.sys
\SystemRoot\system32\DRIVERS\watchdog.sys
drivers\watchdog.sys
\SystemRoot\system32\DRIVERS\ksecdd.sys
ksecdd.sys
drivers\ksecdd.sys
\SystemRoot\System32\Drivers\Ntfs.sys
ntfs.sys
\SystemRoot\system32\CLFS.SYS
CLFS.SYS
\SystemRoot\system32\drivers\ataport.sys
ataport.sys
\SystemRoot\system32\drivers\atapi.sys
atapi.sys
\SystemRoot\system32\drivers\peauth.sys
peauth.sys
\SystemRoot\system32\drivers\WDFLDR.sys
WDFLDR.sys
\SystemRoot\system32\drivers\usbstor.sys
usbstor.sys
\SystemRoot\system32\drivers\usbd.sys
usbd.sys
\SystemRoot\system32\drivers\USBPORT.sys
USBPORT.sys
\SystemRoot\system32\drivers\usbohci.sys
usbohci.sys
\SystemRoot\system32\drivers\usbehci.sys
usbehci.sys
\SystemRoot\system32\drivers\usbhub.sys
usbhub.sys
\SystemRoot\system32\drivers\usbccgp.sys
usbccgp.sys
\SystemRoot\system32\drivers\discache.sys
discache.sys
\SystemRoot\system32\drivers\termdd.sys
termdd.sys
\SystemRoot\system32\drivers\rdppr.sys
rdppr.sys
\SystemRoot\system32\drivers\mssmbios.sys
mssmbios.sys
\SystemRoot\system32\drivers\1394BUS.SYS
1394BUS.SYS
\SystemRoot\system32\drivers\BATTC.SYS
BATTC.SYS
\SystemRoot\system32\drivers\bthport.sys
bthport.sys
\SystemRoot\system32\drivers\drmk.sys
drmk.sys
\SystemRoot\system32\drivers\HIDPARSE.SYS
HIDPARSE.SYS
\SystemRoot\system32\drivers\HIDCLASS.SYS
HIDCLASS.SYS
\SystemRoot\system32\drivers\msiscsi.sys
msiscsi.sys
\SystemRoot\system32\drivers\PCIIDEX.SYS
PCIIDEX.SYS
\SystemRoot\system32\drivers\portcls.sys
portcls.sys
\SystemRoot\system32\drivers\smsmdm.sys
smsmdm.sys
\SystemRoot\system32\drivers\STREAM.SYS
STREAM.SYS
\SystemRoot\system32\drivers\vga.sys
vga.sys
\SystemRoot\system32\drivers\VIDEOPRT.SYS
VIDEOPRT.SYS
\SystemRoot\system32\drivers\vmstorfl.sys
vmstorfl.sys
\SystemRoot\system32\drivers\Dxapi.sys
Dxapi.sys
\SystemRoot\system32\drivers\dxgthk.sys
dxgthk.sys
\SystemRoot\system32\drivers\dxgmms1.sys
dxgmms1.sys
\SystemRoot\system32\drivers\spsys.sys
spsys.sys
\SystemRoot\system32\drivers\winhv.sys
winhv.sys
\SystemRoot\system32\drivers\HdAudio.sys
HdAudio.sys
\SystemRoot\System32\cdd.dll
cdd.dll
\SystemRoot\System32\ATMFD.DLL
ATMFD.DLL
\SystemRoot\System32\RDPDD.dll
RDPDD.dll
\SystemRoot\system32\drivers\vwifibus.sys
vwifibus.sys
\SystemRoot\system32\drivers\nwifi.sys
nwifi.sys
\SystemRoot\system32\drivers\vwififlt.sys
vwififlt.sys
\SystemRoot\system32\drivers\wfplwf.sys
wfplwf.sys
\SystemRoot\system32\drivers\wfplwfs.sys
wfplwfs.sys
\SystemRoot\system32\drivers\tmtdi.sys
tmtdi.sys
\SystemRoot\system32\drivers\netvsc60.sys
netvsc60.sys
\SystemRoot\system32\drivers\mslldp.sys
mslldp.sys
\SystemRoot\system32\drivers\netvsc63.sys
netvsc63.sys
\SystemRoot\system32\drivers\ndiscap.sys
ndiscap.sys
\SystemRoot\system32\drivers\agilevpn.sys
agilevpn.sys
\SystemRoot\system32\drivers\asyncmac.sys
asyncmac.sys
\SystemRoot\system32\drivers\mpsdrv.sys
mpsdrv.sys
\SystemRoot\system32\drivers\rspndr.sys
rspndr.sys
\SystemRoot\system32\drivers\ndisuio.sys
ndisuio.sys
\SystemRoot\system32\drivers\lltdio.sys
lltdio.sys
\SystemRoot\system32\drivers\NDProxy.sys
NDProxy.sys
\SystemRoot\system32\drivers\raspppoe.sys
raspppoe.sys
\SystemRoot\system32\drivers\ndiswan.sys
ndiswan.sys
\SystemRoot\system32\drivers\wanarp.sys
wanarp.sys
\SystemRoot\system32\drivers\bthpan.sys
bthpan.sys
\SystemRoot\system32\drivers\rassstp.sys
rassstp.sys
\SystemRoot\system32\drivers\raspptp.sys
raspptp.sys
\SystemRoot\system32\drivers\rasl2tp.sys
rasl2tp.sys
\SystemRoot\system32\drivers\rasacd.sys
rasacd.sys
\SystemRoot\system32\drivers\tunnel.sys
tunnel.sys
\SystemRoot\system32\drivers\tunmp.sys
tunmp.sys
\SystemRoot\system32\drivers\pacer.sys
pacer.sys
\SystemRoot\system32\drivers\NDISTAPI.SYS
NDISTAPI.SYS
\SystemRoot\system32\drivers\msgpc.sys
msgpc.sys
\SystemRoot\system32\drivers\partmgr.sys
partmgr.sys
\SystemRoot\system32\drivers\volmgr.sys
volmgr.sys
\SystemRoot\system32\drivers\volmgrx.sys
volmgrx.sys
\SystemRoot\system32\drivers\mountmgr.sys
mountmgr.sys
\SystemRoot\system32\drivers\iaStor.sys
iaStor.sys
\SystemRoot\system32\drivers\volsnap.sys
volsnap.sys
\SystemRoot\system32\drivers\ACPI.sys
acpi.sys
\SystemRoot\System32\Drivers\WppRecorder.sys
WppRecorder.sys
\SystemRoot\System32\Drivers\Mouclass.sys
Mouclass.sys
\SystemRoot\System32\Drivers\kbdclass.sys
kbdclass.sys
\SystemRoot\System32\Drivers\Fastfat.SYS
Fastfat.sys
\SystemRoot\System32\Drivers\bowser.sys
bowser.sys
\SystemRoot\System32\Drivers\rdbss.sys
rdbss.sys
\SystemRoot\System32\Drivers\msfs.sys
msfs.sys
\SystemRoot\System32\Drivers\NetBIOS.sys
NetBIOS.sys
\SystemRoot\System32\Drivers\mup.sys
mup.sys
\SystemRoot\System32\Drivers\dfs.sys
dfs.sys
\SystemRoot\System32\Drivers\dfsc.sys
dfsc.sys
\SystemRoot\System32\Drivers\npfs.SYS
npfs.sys
\SystemRoot\System32\Drivers\luafv.SYS
luafv.sys
\SystemRoot\System32\Drivers\MRxSmb.SYS
MRxSmb.sys
\SystemRoot\System32\Drivers\MRxSmb10.SYS
MRxSmb10.sys
\SystemRoot\System32\Drivers\MRxSmb20.SYS
MRxSmb20.sys
\SystemRoot\System32\Drivers\MRxDAV.SYS
MRxDAV.sys
\SystemRoot\system32\Drivers\fltmgr.sys
\SystemRoot\system32\Drivers\TDI.SYS
\SystemRoot\system32\Drivers\tdx.sys
\SystemRoot\system32\Drivers\ipfltdrv.sys
\SystemRoot\system32\Drivers\tcpip.sys
\SystemRoot\System32\drivers\afd.sys
afd.sys
\SystemRoot\System32\drivers\netbt.sys
\SystemRoot\System32\drivers\NETIO.sys
\SystemRoot\System32\drivers\srv.sys
srv.sys
\SystemRoot\System32\drivers\srv2.sys
srv2.sys
\SystemRoot\System32\drivers\srvnet.sys
\SystemRoot\System32\drivers\sr.sys
sr.sys
\SystemRoot\System32\win32k.sys
\SystemRoot\System32\drivers\http.sys
http.sys
\SystemRoot\System32\drivers\fwpkclnt.sys
\SystemRoot\system32\DRIVERS\msrpc.sys
msrpc.sys
\SystemRoot\system32\DRIVERS\disk.sys
disk.sys
\SystemRoot\system32\DRIVERS\ftdisk.sys
ftdisk.sys
\SystemRoot\system32\DRIVERS\Storport.SYS
Storport.SYS
\SystemRoot\system32\DRIVERS\CLASSPNP.SYS
CLASSPNP.SYS
\SystemRoot\system32\Drivers\ks.sys
\SystemRoot\System32\Drivers\ksecdd.sys
ksecdd.SYS
\SystemRoot\system32\kdcom.dll
kdcom.dll
\SystemRoot\System32\Drivers\cng.sys
cng.sys
\SystemRoot\system32\PSHED.dll
PSHED.dll
\SystemRoot\system32\CI.dll
CI.dll
\SystemRoot\system32\DRIVERS\WMILIB.SYS
wmilib.sys
Cannot find %s for IAT resolving of %s
Cannot alloc %X bytes for drivers IAT checking
Cannot find %s import %s.%s
Cannot find %s import %s.%d
IAT %s %s.%s patched, addr %p
IAT %s %s.%d patched, addr %p
IAT %s %s.%s patched by %s, addr %p
IAT %s %s.%d patched by %s, addr %p
%s has %d patched IAT entries (total %d)
reading of IAT %s failed, readed %X, actual IAT size %X, error %d
check_exts count failed, error %d, ntstatus %X
check_exts count failed, error %d
check_exts: cannot alloc %X bytes
check_exts failed, error %d, ntstatus %X
check_exts failed, error %d
Ext[%X]:
Handler1: %p %s
Handler2: %p %s
Handler3: %p %s
Table: %X items %p %s
Item[%X]: %p %s
IRP_MJ_CREATE_NAMED_PIPE
Unknown fltmgr: FrameList %X FilterSize %X cbn %X
Unknown fltmgr: FrameList %X FilterSize %X
FltMgr: index %d
FRAME[%d] %p
%s: %p
NormalizeNameComponent: %p %s
NormalizeContextCleanup: %p %s
PreOperation: %p %s
PostOperation: %p %s
check_ks: cannot read size of ks list, error %d, ntstatus %X
check_ks: cannot read size of ks list, error %d
ks count: %X
check_ks: cannot alloc %X bytes
check_ks: cannot read ks list, error %d, ntstatus %X
check_ks: cannot read ks list, error %d
ks[%d] %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
ChangeAccountPassword
ImportSecurityContext
ExportSecurityContext
gKsecpBCryptExtension: %p %s
gKsecpSslExtension: %p %s
SecTable.%s patched %p %s
dxg.sys
dxgkrnl.sys
Win32kCallout: %p %s
SessionStartCallout: %p %s
KTIMER %p DPC %p DefRoutine %p %s
Cannot find KPRCB.DpcRoutineActive
Unknown KPRCB: DpcRoutineActive %X WorkerRoutine %X
Unknown KPRCB: DpcRoutineActive %X
Processor %d:
KTIMERS[%d]: %X
Patched %s   %X by %s
Patched ord.%d   %X by %s
Patched %s   %X
Patched ord.%d   %X
Patched %s by %s
Patched ord.%d by %s
Patched %s
Patched ord.%d
Exception %X occured during EAT checking of %s
check_module_iat(%s) - cannot find exports for %s
check_module_iat(%s): zeroed ImportLookUp, cannot check import
Cannot find ordinal %X in module %s (%s) in import table of %s
Cannot find symbol %s in module %s (%s) in import table of %s
(%s) %s.%s hooked in %s: my IAT %p, must be %p
(%s) %s.%d hooked in %s: my IAT %p, must be %p
apfn %s patched by %s, addr %p
apfn[%d] patched by %s, addr %p
apfn %s patched, addr %p
apfn[%d] patched, addr %p
%s%s!%s patched by %s, addr %p
%s%s![%d] patched by %s, addr %p
%s%s!%s patched, addr %p
%s%s![%d] patched, addr %p
LSA SP %s has %d patched functions in SECPKG_FUNCTION_TABLE:
PID %d: LSA SP %s has %d patched functions in SECPKG_USER_FUNCTION_TABLE:
PID %d: LSA SP %s has %d patched functions in CallPackageDispatch:
ole32 hooked by %s
Cannot relocate section %s!%s
Exception %X occured on checking %s!%s
Module %s!%s has %X patched bytes !
Exception %X occured on check_module_iat(%s)
MyModule: %p %s
%SystemRoot%\System32\ncrypt.dll
%SystemRoot%\System32\ntdsa.dll
%SystemRoot%\System32\kernelbase.dll
%SystemRoot%\System32\kernel32.dll
%SystemRoot%\System32\user32.dll
%SystemRoot%\System32\umpnpmgr.dll
%SystemRoot%\System32\combase.dll
%SystemRoot%\System32\ole32.dll
%SystemRoot%\System32\imm32.dll
%SystemRoot%\System32\rpcrt4.dll
%SystemRoot%\System32\mswsock.dll
%SystemRoot%\System32\advapi32.dll
%SystemRoot%\System32\cryptbase.dll
%SystemRoot%\System32\apisetschema.dll
read_ndis_oid_handlers failed, returned %d bytes, error %d, ntstatus %X
read_ndis_oid_handlers failed, returned %d bytes, error %d
[%X] %s: post %p %s
[%X] %s: pre %p %s
[%X] %s: pre %p (%s) post %p (%s)
[%X] %X: post %p %s
[%X] %X: pre %p %s
[%X] %X: pre %p (%s) post %p (%s)
read_tcp_off_handlers failed, returned %d bytes, error %d, ntstatus %X
read_tcp_off_handlers failed, returned %d bytes, error %d
TcpOfflineHandlers:
TcpOffloadEventIndicate: %p %s
TcpOffloadReceiveIndicate: %p %s
TcpOffloadSendComplete: %p %s
TcpOffloadReceiveComplete: %p %s
TcpOffloadDisconnectComplete: %p %s
TcpOffloadForwardComplete: %p %s
Cannot alloc %X bytes from reading filter block
read_ndis_filter_block: len %d, returned %d bytes, error %d, ntstatus %X
read_ndis_filter_block: len %d, returned %d bytes, error %d
check_ndis - reading of TDI callback failed, error %d, ntstatus %X
check_ndis - reading of TDI callback failed, error %d
check_ndis - reading of TDI PnP handler failed, error %d, ntstatus %X
check_ndis - reading of TDI PnP handler failed, error %d
TDI callback %p patched by %s
TDI PnP handler %p patched by %s
check_ndis - reading of providers count failed, error %d, ntstatus %X
check_ndis - reading of providers count failed, error %d
check_ndis: %d providers
check_ndis: cannot alloc %X bytes
Cannot store provider_block %p (%d)
check_ndis: stored %d provider_blocks
check_ndis - reading of interfaces count failed, error %d, ntstatus %X
check_ndis - reading of interfaces count failed, error %d
check_ndis: %d interfaces, size of miniport %X
Interface[%d]:
check_ndis - reading of protocols count failed, error %d, ntstatus %X
check_ndis - reading of protocols count failed, error %d
check_ndis: %d protocols, size of protocol %X
check_ndis: stored %d protocols
check_ndis - reading of minidrivers count failed, error %d, ntstatus %X
check_ndis - reading of minidrivers count failed, error %d
check_ndis: %d minidrivers, size of minidriver %X, sizeof(ndis50) %X, sizeof(ndis52) %X
Cannot store minidriver %d (%p)
Stored %d mini-drivers
check_ndis - reading of miniports count failed, error %d, ntstatus %X
check_ndis - reading of miniports count failed, error %d
check_ndis: %d miniports, size of miniport %X
check_ndis: read %d miniports, total %X
Miniport[%d] %p:
check_ndis: stored %d miniports, sizeof(miniport_block_w7) %X
check_ndis - reading of open_blocks count failed, error %d, ntstatus %X
check_ndis - reading of open_blocks count failed, error %d
check_ndis: %d open_blocks, size of open_block %X
check_ndis: read %d open_blocks, total %X
Open_Block[%d]:
Cannot store open_block %p (%d)
check_ndis: stored %d open_blocks
check_ndis - reading of filter_drivers count failed, error %d, ntstatus %X
check_ndis - reading of filter_drivers count failed, error %d
check_ndis: %d filter_drivers, size of open_block %X
check_ndis: read %d filter_drivers, total %X
FilterDriver[%d]:
check_ndis: stored %d filter_drivers, %d filter_blocks
Passive
read_punicode_string failed, len %d, returned %d bytes, error %d, ntstatus %X
read_punicode_string failed, len %d, returned %d bytes, error %d
Cannot read NDIS_MINIPORT_INTERRUPT %p
NDIS_MINIPORT_INTERRUPT:
MiniportIsr: %p %s
MiniportDpc: %p %s
Cannot read NDIS_MINIPORT_INTERRUPT_CHARACTERISTICS %p
NDIS_MINIPORT_INTERRUPT_CHARACTERISTICS:
InterruptHandler: %p %s
InterruptDpcHandler: %p %s
DisableInterruptHandler: %p %s
EnableInterruptHandler: %p %s
MessageInterruptHandler: %p %s
MessageInterruptDpcHandler: %p %s
DisableMessageInterruptHandler: %p %s
EnableMessageInterruptHandler: %p %s
MiniportIsr: %p %s
MiniportDpc: %p %s
MiniportMessageIsr: %p %s
MiniportMessageInterruptDpc: %p %s
MiniportIsr: %p %s
MiniportDpc: %p %s
MiniportEnableInterrupt: %p %s
MiniportDisableInterrupt: %p %s
MiniportMessageIsr: %p %s
MiniportMessageInterruptDpc: %p %s
MiniportDisableMessageInterrupt: %p %s
MiniportEnableMessageInterrupt: %p %s
NDIS Protocol[%d]: %S
MajorNdisVersion %d
MinorNdisVersion %d
Flags %X
OpenAdapterCompleteHandler: %p %s
CloseAdapterCompleteHandler: %p %s
SendCompleteHandler: %p %s
TransferDataCompleteHandler: %p %s
ResetCompleteHandler: %p %s
RequestCompleteHandler: %p %s
ReceiveHandler: %p %s
ReceiveCompleteHandler: %p %s
StatusHandler: %p %s
StatusCompleteHandler: %p %s
ReceivePacketHandler: %p %s
BindAdapterHandler: %p %s
UnbindAdapterHandler: %p %s
PnPEventHandler: %p %s
UnloadHandler: %p %s
CoSendCompleteHandler: %p %s
CoStatusHandler: %p %s
CoReceivePacketHandler: %p %s
CoAfRegisterNotifyHandler: %p %s
MajorNdisVersion %d
MinorNdisVersion %d
MajorDriverVersion %d
MinorDriverVersion %d
Flags %X
IsIPv4 %d
IsIPv6 %d
IsNdisTest6 %d
BindAdapterHandlerEx: %p %s
UnbindAdapterHandlerEx: %p %s
OpenAdapterCompleteHandlerEx: %p %s
CloseAdapterCompleteHandlerEx: %p %s
PnPEventHandler: %p %s
UnloadHandler: %p %s
UninstallHandler: %p %s
RequestCompleteHandler: %p %s
StatusHandler: %p %s
StatusCompleteHandler: %p %s
ReceiveNetBufferListsHandler: %p %s
SendNetBufferListsCompleteHandler: %p %s
CoStatusHandler: %p %s
CoAfRegisterNotifyHandler: %p %s
CoReceiveNetBufferListsHandler: %p %s
CoSendNetBufferListsCompleteHandler: %p %s
OpenAdapterCompleteHandler: %p %s
CloseAdapterCompleteHandler: %p %s
SendCompleteHandler: %p %s
TransferDataCompleteHandler: %p %s
ResetCompleteHandler: %p %s
ReceiveHandler: %p %s
ReceiveCompleteHandler: %p %s
ReceivePacketHandler: %p %s
BindAdapterHandler: %p %s
UnbindAdapterHandler: %p %s
CoSendCompleteHandler: %p %s
CoReceivePacketHandler: %p %s
OidRequestCompleteHandler: %p %s
InitiateOffloadCompleteHandler: %p %s
TerminateOffloadCompleteHandler: %p %s
UpdateOffloadCompleteHandler: %p %s
InvalidateOffloadCompleteHandler: %p %s
QueryOffloadCompleteHandler: %p %s
IndicateOffloadEventHandler: %p %s
TcpOffloadSendCompleteHandler: %p %s
TcpOffloadReceiveCompleteHandler: %p %s
TcpOffloadDisconnectCompleteHandler: %p %s
TcpOffloadForwardCompleteHandler: %p %s
TcpOffloadEventHandler: %p %s
TcpOffloadReceiveIndicateHandler: %p %s
Unknown NDIS Type %X and Size %X
DirectOidRequestCompleteHandler: %p %s
AllocateSharedMemoryHandler: %p %s
FreeSharedMemoryHandler: %p %s
Unknown ndis protocol size: %X
NDIS MiniDriver[%d] %p
MajorNdisVersion: %d
MinorNdisVersion: %d
CheckForHangHandler: %p %s
DisableInterruptHandler: %p %s
EnableInterruptHandler: %p %s
HaltHandler %p %s
HandleInterruptHandler: %p %s
InitializeHandler: %p %s
ISRHandler: %p %s
QueryInformationHandler: %p %s
ReconfigureHandler: %p %s
ResetHandler: %p %s
SendHandler: %p %s
SetInformationHandler: %p %s
TransferDataHandler: %p %s
ReturnPacketHandler: %p %s
SendPacketsHandler: %p %s
AllocateCompleteHandler: %p %s
CoCreateVcHandler: %p %s
CoDeleteVcHandler: %p %s
CoActivateVcHandler: %p %s
CoDeactivateVcHandler: %p %s
CoSendPacketsHandler: %p %s
CoRequestHandler: %p %s
CheckForHangHandler: %p %s
DisableInterruptHandler: %p %s
EnableInterruptHandler: %p %s
HaltHandler %p %s
HandleInterruptHandler: %p %s
InitializeHandler: %p %s
ISRHandler: %p %s
QueryInformationHandler: %p %s
ReconfigureHandler: %p %s
ResetHandler: %p %s
SendHandler: %p %s
SetInformationHandler: %p %s
TransferDataHandler: %p %s
ReturnPacketHandler: %p %s
SendPacketsHandler: %p %s
AllocateCompleteHandler: %p %s
CoCreateVcHandler: %p %s
CoDeleteVcHandler: %p %s
CoActivateVcHandler: %p %s
CoDeactivateVcHandler: %p %s
CoSendPacketsHandler: %p %s
CoRequestHandler: %p %s
CancelSendPacketsHandler: %p %s
PnPEventNotifyHandler: %p %s
AdapterShutdownHandler: %p %s
CheckForHangHandler: %p %s
DisableInterruptHandler: %p %s
EnableInterruptHandler: %p %s
HaltHandler %p %s
HandleInterruptHandler: %p %s
InitializeHandler: %p %s
ISRHandler: %p %s
QueryInformationHandler: %p %s
ReconfigureHandler: %p %s
ResetHandler: %p %s
SendHandler: %p %s
SetInformationHandler: %p %s
TransferDataHandler: %p %s
ReturnPacketHandler: %p %s
SendPacketsHandler: %p %s
AllocateCompleteHandler: %p %s
CoCreateVcHandler: %p %s
CoDeleteVcHandler: %p %s
CoActivateVcHandler: %p %s
CoDeactivateVcHandler: %p %s
CoSendPacketsHandler: %p %s
CoRequestHandler: %p %s
CancelSendPacketsHandler: %p %s
PnPEventNotifyHandler: %p %s
AdapterShutdownHandler: %p %s
ISRHandlerEx: %p %s
HandleInterruptHandlerEx: %p %s
InitiateOffloadHandler: %p %s
TerminateOffloadHandler: %p %s
UpdateOffloadHandler: %p %s
InvalidateOffloadHandler: %p %s
QueryOffloadHandler: %p %s
TcpOffloadSendHandler: %p %s
TcpOffloadReceiveHandler: %p %s
TcpOffloadDisconnectHandler: %p %s
TcpOffloadForwardHandler: %p %s
TcpOffloadReceiveReturnHandler: %p %s
ReturnPacketsHandlerEx: %p %s
RequestTimeoutDpcHandler: %p %s
MajorNdisVersion: %d
MinorNdisVersion: %d
MajorDriverVersion: %d
MinorDriverVersion: %d
Flags: %X
SetOptionsHandler: %p %s
InitializeHandlerEx: %p %s
HaltHandlerEx: %p %s
UnloadHandler: %p %s
PauseHandler: %p %s
RestartHandler: %p %s
OidRequestHandler: %p %s
SendNetBufferListsHandler: %p %s
ReturnNetBufferListsHandler: %p %s
CancelSendHandler: %p %s
CheckForHangHandlerEx: %p %s
ResetHandlerEx: %p %s
DevicePnPEventNotifyHandler: %p %s
ShutdownHandlerEx: %p %s
CancelOidRequestHandler: %p %s
DirectOidRequestHandler: %p %s
CancelDirectOidRequestHandler: %p %s
NDIS MiniPort[%d] %p
State: %s
MediaType: %s
AdapterType: %s
DefaultSendAuthorizationState: %s
DefaultRcvAuthorizationState: %s
DefaultPortSendAuthorizationState: %s
DefaultPortRcvAuthorizationState: %s
NextCancelSendNetBufferListsHandler: %p %s
PacketIndicateHandler: %p %s
SendCompleteHandler: %p %s
SendResourcesHandler: %p %s
ResetCompleteHandler: %p %s
DisableInterruptHandler: %p %s
EnableInterruptHandler: %p %s
SendPacketsHandler: %p %s
DeferredSendHandler: %p %s
EthRxIndicateHandler: %p %s
NextSendNetBufferListsHandler: %p %s
EthRxCompleteHandler: %p %s
SavedNextSendNetBufferListsHandler: %p %s
StatusHandler: %p %s
StatusCompleteHandler: %p %s
TDCompleteHandler: %p %s
QueryCompleteHandler: %p %s
SetCompleteHandler: %p %s
WanSendCompleteHandler: %p %s
WanRcvHandler: %p %s
WanRcvCompleteHandler: %p %s
SendNetBufferListsCompleteHandler: %p %s
WSendPacketsHandler: %p %s
NextSendPacketsHandler: %p %s
FinalSendPacketsHandler: %p %s
TopIndicateNetBufferListsHandler: %p %s
TopIndicateLoopbackNetBufferListsHandler: %p %s
Ndis5PacketIndicateHandler: %p %s
MiniportReturnPacketHandler: %p %s
SynchronousReturnPacketHandler: %p %s
TopNdis5PacketIndicateHandler: %p %s
AllocateSharedMemoryHandler: %p %s
FreeSharedMemoryHandler: %p %s
SetBusData: %p %s
GetBusData: %p %s
NoFilter.CancelSendHandler %p %s
NoFilter.SendNetBufferListsCompleteHandler %p %s
NoFilter.IndicateNetBufferListsHandler %p %s
NoFilter.SaveIndicateNetBufferListsHandler %p %s
NoFilter.ReturnNetBufferListsHandler %p %s
NoFilter.SendNetBufferListsHandler %p %s
Next.CancelSendHandler %p %s
Next.SendNetBufferListsCompleteHandler %p %s
Next.IndicateNetBufferListsHandler %p %s
Next.SaveIndicateNetBufferListsHandler %p %s
Next.ReturnNetBufferListsHandler %p %s
Next.SendNetBufferListsHandler %p %s
Name: %S
BaseName: %S
SymbolicLinkName: %S
NextCancelSendNetBufferListsHandler %p %s
TrRxIndicateHandler: %p %s
TrRxCompleteHandler: %p %s
IndicateNetBufferListsHandler: %p %s
NextReturnNetBufferLists: %p %s
SavedIndicateNetBufferListsHandler: %p %s
SavedPacketIndicateHandler: %p %s
ShutdownHandler: %p %s
NDIS MiniPort[%d] %S
BusType: %s
PacketIndicateHandler: %p %s
SendCompleteHandler: %p %s
SendResourcesHandler: %p %s
ResetCompleteHandler: %p %s
DeferredSendHandler: %p %s
EthRxIndicateHandler: %p %s
TrRxIndicateHandler: %p %s
FddiRxIndicateHandler: %p %s
EthRxCompleteHandler: %p %s
TrRxCompleteHandler: %p %s
FddiRxCompleteHandler: %p %s
StatusHandler: %p %s
StatusCompleteHandler: %p %s
TDCompleteHandler: %p %s
QueryCompleteHandler: %p %s
SetCompleteHandler: %p %s
WanSendCompleteHandler: %p %s
WanRcvHandler: %p %s
WanRcvCompleteHandler: %p %s
AdapterInstanceName: %S
OpenBlock [%d] %p
RootName: %S
BindName: %S
ProtocolMajorVersion: %X
NextSendHandler: %p %s
NextReturnNetBufferListsHandler: %p %s
SendHandler: %p %s
TransferDataHandler: %p %s
WanReceiveHandler: %p %s
SendPacketsHandler: %p %s
ResetHandler: %p %s
RequestHandler: %p %s
OidRequestHandler: %p %s
WSendHandler: %p %s
WTransferDataHandler: %p %s
WSendPacketsHandler: %p %s
CancelSendPacketsHandler: %p %s
ProtSendNetBufferListsComplete: %p %s
NextSendNetBufferListsComplete: %p %s
ReceiveNetBufferLists: %p %s
SavedSendNBLHandler: %p %s
SavedSendPacketsHandler: %p %s
SavedCancelSendPacketsHandler: %p %s
SavedSendHandler: %p %s
Ndis5WanSendHandler: %p %s
ProtSendCompleteHandler: %p %s
OidRequestCompleteHandler %p %s
OpenFlags: %X
DirectOidRequestHandler: %p %s
RootName: %S
BindName: %S
Flags: %X
SendHandler: %p %s
WanSendHandler: %p %s
TransferDataHandler: %p %s
WanReceiveHandler: %p %s
SendPacketsHandler: %p %s
ResetHandler: %p %s
RequestHandler: %p %s
WSendHandler: %p %s
WTransferDataHandler: %p %s
WSendPacketsHandler: %p %s
CancelSendPacketsHandler: %p %s
Flags %X
Mtu %X
PromiscuousMode %d
AccessType %s
DirectionType %s
ConnectionType %s
MediaType %s
MediaConnectState %s
AdminStatus %s
OperStatus %s
InterfaceGuid %s
NetworkGuid %s
ifIndex %X
ifDescr %S
ifAlias %S
FilterDriverCharacteristics[%d]:
FriendlyName: %S
UniqueName: %S
ServiceName: %S
SetOptionsHandler: %p %s
SetFilterModuleOptionsHandler: %p %s
AttachHandler: %p %s
DetachHandler: %p %s
RestartHandler: %p %s
PauseHandler: %p %s
SendNetBufferListsHandler: %p %s
SendNetBufferListsCompleteHandler: %p %s
CancelSendNetBufferListsHandler: %p %s
ReceiveNetBufferListsHandler: %p %s
ReturnNetBufferListsHandler: %p %s
OidRequestHandler: %p %s
OidRequestCompleteHandler: %p %s
CancelOidRequestHandler: %p %s
DevicePnPEventNotifyHandler: %p %s
NetPnPEventHandler: %p %s
StatusHandler: %p %s
DirectOidRequestHandler: %p %s
DirectOidRequestCompleteHandler: %p %s
CancelDirectOidRequestHandler: %p %s
InterfaceGuid: %s
FilterState: %s
NextSendNetBufferListsHandler: %p %s
NextSendNetBufferListsCompleteHandler: %p %s
NextIndicateReceiveNetBufferListsHandler: %p %s
NextReturnNetBufferListsHandler: %p %s
NextCancelSendNetBufferListsHandler: %p %s
SetFilterModuleOptionalHandlers: %p %s
OidRequestHandler: %p %s
OidRequestCompleteHandler: %p %s
CancelRequestHandler: %p %s
DevicePnPEventNotifyHandler: %p %s
NetPnPEventHandler: %p %s
StatusHandler: %p %s
FilterSendNetBufferListsHandler: %p %s
FilterIndicateReceiveNetBufferListsHandler: %p %s
FilterCancelSendNetBufferListsHandler: %p %s
InitiateOffloadCompleteHandler: %p %s
TerminateOffloadCompleteHandler: %p %s
UpdateOffloadCompleteHandler: %p %s
InvalidateOffloadCompleteHandler: %p %s
QueryOffloadCompleteHandler: %p %s
IndicateOffloadEventHandler: %p %s
TcpOffloadSendCompleteHandler: %p %s
TcpOffloadReceiveCompleteHandler: %p %s
TcpOffloadDisconnectCompleteHandler: %p %s
TcpOffloadForwardCompleteHandler: %p %s
TcpOffloadEventHandler: %p %s
TcpOffloadReceiveIndicateHandler: %p %s
InitiateOffloadHandler: %p %s
TerminateOffloadHandler: %p %s
UpdateOffloadHandler: %p %s
InvalidateOffloadHandler: %p %s
QueryOffloadHandler: %p %s
TcpOffloadReceiveReturnHandler: %p %s
DirectOidRequestHandler: %p %s
DirectOidRequestCompleteHandler: %p %s
CancelDirectOidRequestHandler: %p %s
TcpOffloadSendHandler: %p %s
TcpOffloadReceiveHandler: %p %s
TcpOffloadDisconnectHandler: %p %s
TcpOffloadForwardHandler: %p %s
Provider[%d]: %p
QueryObjectHandler: %p %s
SetObjectHandler: %p %s
FilterDriverBlock[%d]
InitiateOffloadHandler: %p %s
TerminateOffloadHandler: %p %s
UpdateOffloadHandler: %p %s
InvalidateOffloadHandler: %p %s
QueryOffloadHandler: %p %s
TcpOffloadReceiveReturnHandler: %p %s
TcpOffloadSendHandler: %p %s
TcpOffloadReceiveHandler: %p %s
TcpOffloadDisconnectHandler: %p %s
TcpOffloadForwardHandler: %p %s
ClCreateVcHandler: %p %s
ClDeleteVcHandler: %p %s
ClOidRequestHandler: %p %s
ClOidRequestCompleteHandler: %p %s
ClOpenAfCompleteHandlerEx: %p %s
ClCloseAfCompleteHandler: %p %s
ClRegisterSapCompleteHandler: %p %s
ClDeregisterSapCompleteHandler: %p %s
ClMakeCallCompleteHandler: %p %s
ClModifyCallQoSCompleteHandler: %p %s
ClCloseCallCompleteHandler: %p %s
ClAddPartyCompleteHandler: %p %s
ClDropPartyCompleteHandler: %p %s
ClIncomingCallHandler: %p %s
ClIncomingCallQoSChangeHandler: %p %s
ClIncomingCloseCallHandler: %p %s
ClIncomingDropPartyHandler: %p %s
ClCallConnectedHandler: %p %s
ClNotifyCloseAfHandler: %p %s
CmCreateVcHandler: %p %s
CmDeleteVcHandler: %p %s
CmOpenAfHandler: %p %s
CmCloseAfHandler: %p %s
CmRegisterSapHandler: %p %s
CmDeregisterSapHandler: %p %s
CmMakeCallHandler: %p %s
CmCloseCallHandler: %p %s
CmIncomingCallCompleteHandler: %p %s
CmAddPartyHandler: %p %s
CmDropPartyHandler: %p %s
CmActivateVcCompleteHandler: %p %s
CmDeactivateVcCompleteHandler: %p %s
CmModifyCallQoSHandler: %p %s
CmOidRequestHandler: %p %s
CmOidRequestCompleteHandler: %p %s
CmNotifyCloseAfCompleteHandler: %p %s
DriverVersion: %X
CoCreateVcHandler: %p %s
CoDeleteVcHandler: %p %s
CoActivateVcHandler: %p %s
CoDeactivateVcHandler: %p %s
CoSendNetBufferListsHandler: %p %s
CoRequestHandler: %p %s
CoOidRequestHandler: %p %s
InitiateOffloadHandler: %p %s
TerminateOffloadHandler: %p %s
UpdateOffloadHandler: %p %s
InvalidateOffloadHandler: %p %s
QueryOffloadHandler: %p %s
TcpOffloadSendHandler: %p %s
TcpOffloadReceiveHandler: %p %s
TcpOffloadDisconnectHandler: %p %s
TcpOffloadForwardHandler: %p %s
TcpOffloadReceiveReturnHandler: %p %s
AddDeviceHandler: %p %s
RemoveDeviceHandler: %p %s
FilterResourceRequirementsHandler: %p %s
StartDeviceHandler: %p %s
ServiceName: %S
CoCreateVcHandler: %p %s
CoDeleteVcHandler: %p %s
CoActivateVcHandler: %p %s
CoDeactivateVcHandler: %p %s
CoSendNetBufferListsHandler: %p %s
CoRequestHandler: %p %s
CoOidRequestHandler: %p %s
InitiateOffloadHandler: %p %s
TerminateOffloadHandler: %p %s
UpdateOffloadHandler: %p %s
InvalidateOffloadHandler: %p %s
QueryOffloadHandler: %p %s
TcpOffloadSendHandler: %p %s
TcpOffloadReceiveHandler: %p %s
TcpOffloadDisconnectHandler: %p %s
TcpOffloadForwardHandler: %p %s
TcpOffloadReceiveReturnHandler: %p %s
AddDeviceHandler: %p %s
RemoveDeviceHandler: %p %s
FilterResourceRequirementsHandler: %p %s
StartDeviceHandler: %p %s
OpenNDKAdapterHandler: %p %s
CloseNDKAdapterHandler: %p %s
IdleNotificationHandler: %p %s
CancelIdleNotificationHandler: %p %s
AllocateNetBufferListForwardingContextHandler: %p %s
FreeNetBufferListForwardingContextHandler: %p %s
AddNetBufferListDestinationHandler: %p %s
SetNetBufferListSourceHandler: %p %s
GrowNetBufferListDestinationsHandler: %p %s
GetNetBufferListDestinationsHandler: %p %s
UpdateNetBufferListDestinationsHandler: %p %s
CopyNetBufferListInfoHandler: %p %s
ReferenceSwitchNicHandler: %p %s
DereferenceSwitchNicHandler: %p %s
ReferenceSwitchPortHandler: %p %s
DereferenceSwitchPortHandler: %p %s
ReportFilteredNetBufferListsHandler: %p %s
ImageName: %S
SetNetBufferListSwitchContextHandler: %p %s
GetNetBufferListSwitchContextHandler: %p %s
netio legacy handler %p %s
read netio legacy handler failed, error %d, status %X
read netio legacy handler failed, error %d
%p %s
read netio WfpNblInfoDispTable failed, error %d, status %X
read netio WfpNblInfoDispTable failed, error %d
netio MacShim %p %s
WfpShim[%d] %p %s
Unknown WFP callout size %d
WFP callout[%d]:
ClassifyCallback: %p %s
NotifyCallback: %p %s
uFlowDeleteFunction: %p %s
Exception %X on sysptr seed reading at %p
Decode system scheme - %s
Decode scheme - %s
Cannot read my process cookie, error %X
Trace[%d] %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X (%p) %s
Trace[%d] %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X %p
SystemFunction%3.3d (%p) %s
PFNCLIENT.%s patched by %s (%p)
PFNCLIENT.%s patched %p
check_user32_pfnclient: exception %X occured
PFNCLIENTWORKER.%s patched by %s (%p)
PFNCLIENTWORKER.%s patched %p
ConsoleCtrlHandler[%d]: %s (%p)
ConsoleCtrlHandler[%d]: %p UNKNOWN
ConsoleCtrlHandler: %s (%p)
UnhandledExceptionFilter: %s (%p)
ShimModule: %s (%p)
RtlpStartThreadFunc: %s (%p)
RtlpExitThreadFunc: %s (%p)
RtlpUnhandledExceptionFilter: %s (%p)
RtlSecureMemoryCacheCallback: %s (%p)
TppLogpRoutine: %s (%p)
CsrServerApiRoutine: %s (%p)
LdrpManifestProberRoutine: %s (%p)
LdrpCreateActCtxLanguage: %s (%p)
LdrpReleaseActCtx: %s (%p)
LdrpAppCompatDllRedirectionCallbackFunction: %s (%p)
%s%s!%s patched by %s (addr %p)
%s%s.%d patched by %s (addr %p)
%s%s.%d patched, addr %p
PID %d trace callbacks: %d
Trace[%d] %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X %p %s
Process PID %d has the same token as system process: %p !!!
Process PID %d token: %p
%p %s %8X
%p %s %8X
CheckProc: cannot get modules list for PID %d (%S), error %d, ntstatus %X
CheckProc: cannot get modules list for PID %d (%S), error %d
CheckProcess PID %d (%S):
PEB.PostProcessInitRoutine: %p %s
PEB.PostProcessInitRoutine: %p UNKNOWN
PEB.pShimData: %p
PEB.AppCompat: %p
PEB.FastPebLockRoutine: %p %s
PEB.FastPebLockRoutine: %p UNKNOWN
PEB.FastPebUnlockRoutine: %p %s
PEB.FastPebUnlockRoutine: %p UNKNOWN
Module: %s at %p
Cannot read %s, PID %d, error %d
PID %d: LSA SP %s has %d patched functions in SECPKG_FUNCTION_TABLE:
PID %d: ncrypt has %d patched functions
PID %d: mswsock has %d patched functions in SockProcTable
PID %d: mswsock has %d patched functions in NspVector
PID %d: mswsock has %d patched MSAFD functions
SHAREDINFO.aheList: %p
PID %d: ntdsa has %d patched functions
PID %d - ole32 hooked by %s
PID %d - ole32 hooked by unknown module, addr %p
PID %d: rpcrt4 has %d patched functions
PID %d: basesrv has %d patched user functions
PID %d: winsrv has %d patched user functions
PID %d: winsrv has %d patched cons functions
PID %d: lsasrv has %d patched functions
PID %d: lsasrv has %d patched functions in LsapSspiExtension
PID %d: lsasrv has %d patched functions in LsapLookupExtension
PID %d: lsasrv has %d patched functions in LsapLsasrvIfTable
Cannot alloc %X bytes for EAT checking of %s, PID %d
Cannot read EAT of %s, PID %d
Cannot alloc %X bytes for checking section %s of %s, PID %d
Cannot read section %s content %X bytes of %s, PID %d
Cannot make section %s of %s, PID %d
Module %s section %s has %X patched bytes, PID %d
PID %d: user32 has %d patched imm32 functions
PID %d: advapi32 has %d patched functions
PID %d: kernel32 has %d patched functions
ShimHandler[%d]: %p %s
ShimHandler[%d]: %p UNKNOWN, located at %p
ApplicationRecoveryCallback: %s (%p)
%s, PID %d:
Cannot alloc %X bytes for IAT checking of %s, PID %d
Cannot read IAT (size %X at %p) of %s, PID %d
Cannot find function %s.%s for module %s process %d
Cannot find function %s.%d for module %s process %d
IAT Patched %s.%s in module %s process %d by %s
IAT Patched %s.%s in module %s process %d, addr %p
IAT Patched %s.%d in module %s process %d by %s
IAT Patched %s.%d in module %s process %d
Cannot alloc %X bytes for delayed IAT checking of %s, PID %d
Cannot read delayed IAT (size %X at %p) of %s, PID %d
Cannot find delayed function %s.%s for module %s process %d
Cannot find delayed function %s.%d for module %s process %d
LdrpDllNotificationList: %d
%p %s
Read %d QueuedWorkerItems:
[%d] %p %s
check_drivers_reinit: cannot read size of list, error %d, status %X
check_drivers_reinit: cannot read size of list, error %d
check_drivers_reinit: cannot alloc %X bytes
check_drivers_reinit: cannot read list, error %d, ntstatus %X
check_drivers_reinit: cannot read list, error %d
[%d] Drv %p %s routine %p %s
read_shutdown_notificators: cannot read size of %s, error %d, status %X
read_shutdown_notificators: cannot read size of %s, error %d
read_shutdown_notificators: cannot alloc %X bytes
read_shutdown_notificators: cannot read %s, error %d, ntstatus %X
read_shutdown_notificators: cannot read %s, error %d
[%d] DevObj %p Drv %p (addr %p) %s
[%d] DevObj %p Drv %p %s
MailSlot: %S, server %d (%S)
MailSlot: %S, server %d
NamedPipe: %S, server %d (%S)
NamedPipe: %S, server %d
Flags: %X, server %d (%S)
Flags: %X, creator %d, server %d
Flags: %X, server %d
Endpoints: %d
Endpoint %S PID %d (%S):
Endpoint %S:
RPC controls: %d
%S: %S
%8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X version %d.%d
Cannot load kernel %s
Unknown scheduler: ReadySummary %X DispatcherReadyListHead %X
Unknown scheduler: ReadySummary %X DeferredReadyListHead %X
Unknown scheduler: ReadySummary %X
Readed %d threads, total %d
Thread %p ProcID %X ThreadID %X Win32Thread %p %s
Thread %p ProcID %X ThreadID %X Priority %d Win32Thread %p
Thread %p ProcID %X ThreadID %X %s
Thread %p ProcID %X ThreadID %X Priority %d
reading count of threads on processor %d failed, error %X
%d threads
reading of threads on processor %d failed, error %X
Scheduler index %d
reading count of threads failed, error %X
reading of threads failed, error %X
Cannot find ETHREAD.ServiceTable
Unknown version of ETHREAD, offset %X
Cannot alloc %X bytes for ProcessesAndThreadsInformation
Cannot realloc %X bytes for ProcessesAndThreadsInformation
ProcessesAndThreadsInformation failed, error %X
read_sdt for threadID %X failed, error %d, status %X
read_sdt for threadID %X failed, error %d
ProcessID %X (%S) ThreadID %X SDT %p %s
ProcessID %X ThreadID %X SDT %p %s
read_thread_token for threadID %X failed, error %d, status %X
read_thread_token for threadID %X failed, error %d
ProcessID %X (%S) ThreadID %X token %p ImpersonationLevel %d
ProcessID %X ThreadID %X token %p ImpersonationLevel %d
Cannot detect ETHREAD.StartAddress
Unknown kernel %s, StartAddress %X, IrpList %X, StackLimit %X, StackBase %X
Unknown kernel %s, StartAddress %X, StackLimit %X, StackBase %X
Unknown kernel %s, StartAddress %X, IrpList %X
Unknown kernel %s, StartAddress %X
Cannot read count of system threads, ntstatus %X
Cannot alloc %d bytes
Cannot read system threads, ntstatus %X
%d System Threads
Thread %p Start %p %c stack %p limit %p %s
read IPSec status failed, error %d, status %X
read IPSec status failed, error %d
IPSec status %X
IPSecHandler: %p %s
IPSecQueryStatus: %p %s
IPSecSendCmplt: %p %s
IPSecNdisStatus: %p %s
IPSecRcvFWPacket: %p %s
check_tdi_pnp_clnts: cannot read size of clnts list, error %d, ntstatus %X
check_tdi_pnp_clnts: cannot read size of clnts list, error %d
check_tdi_pnp_clnts: cannot alloc %X bytes
check_tdi_pnp_clnts: cannot read clnts list, error %d, ntstatus %X
check_tdi_pnp_clnts: cannot read clnts list, error %d
TDI PnP clients: %d (readed %d)
[%d]: version %X %S
PnPPowerHandler: %p %s
BindHandler: %p %s
UnBindHandler: %p %s
AddAddressHandler: %p %s
DelAddressHandler: %p %s
Microsoft-Windows-Windows Firewall With Advanced Security
Microsoft-Windows-Kernel-Boot
Microsoft-Windows-EQoS
Microsoft-Windows-XWizards
ASP.NET Events
Microsoft-Windows-UIRibbon
Microsoft-Windows-WPD-CompositeClassDriver
Microsoft-Windows-Wired-AutoConfig
Microsoft-Windows-PrintService
Microsoft-Windows-ApplicationExperience-LookupServiceTrigger
Microsoft-Windows-IDCRL
Microsoft-Windows-MPS-DRV
Microsoft-Windows-P2P-Mesh
Microsoft-Windows-TabletPC-MathRecognizer
Microsoft-Windows-Spell-Checking
Microsoft-Windows-Fax
Microsoft-Windows-GroupPolicy
Microsoft-Windows-Crashdump
Microsoft-Windows-PrintSpooler
Microsoft-Windows-LanguagePackSetup
Microsoft-Windows-OneX
Microsoft-Windows-OfflineFiles-CscApi
Microsoft-Windows-ADSI
Microsoft-Windows-Dhcp-Client
Microsoft-Windows-CertificateServicesClient-AutoEnrollment
Microsoft-Windows-NlaSvc
Microsoft-Windows-Diagnosis-MSDE
Microsoft-Windows-SpoolerWin32SPL
Microsoft-Windows-SPB-ClassExtension
Microsoft-Windows-Kernel-Memory
Microsoft-Windows-Application Server-Applications
Microsoft-Windows-MUI
Microsoft-Windows-P2P-Collab
Microsoft-Windows-Security-Netlogon
Microsoft-Windows-SQM-Events
Microsoft-Windows-USB-USBPORT
Microsoft-Windows-SendTo
Microsoft-Windows-AIT
Microsoft-Windows-P2P-CRP
PrintFilterPipelineSvc_ObjectsGuid
Microsoft-Windows-IME-JPPRED
Microsoft-Windows-WMP
Microsoft-Windows-Eqos-SQM-Provider
MSDADIAG.ETW
Microsoft-Windows-Processor-Aggregator
Microsoft-Windows-ErrorReportingConsole
Microsoft-Windows-SmartCard-TPM-VCard-Module
Microsoft-Windows-User Profiles Service
Microsoft-Windows-Crypto-CNG
Microsoft-Windows-LinkLayerDiscoveryProtocol
Microsoft-Windows-TaskbarCPL
Microsoft-Windows-Networking-Correlation
Microsoft-Windows-RestartManager
Microsoft-Windows-WMPDMCCore
Microsoft-Windows-TCPIP
Microsoft-Windows-MSDTC
Microsoft-Windows-Resources-MrmBc
Microsoft-Windows-Time-Service
Microsoft-Windows-HomeGroup-ProviderService
Microsoft-Windows-DriverFrameworks-UserMode
Microsoft-Windows-Runtime-Networking
Microsoft-Windows-Network-Connection-Broker
Microsoft-Windows-Shell-AppWizCpl
Microsoft-Windows-PDC
Microsoft-Windows-Biometrics
Microsoft-Windows-IME-SCDICCOMPILER
Microsoft-Windows-Wininit
Microsoft-Windows-Dwm-Dwm
Microsoft-Windows-Photo-Image-Codec
Microsoft-Windows-TaskScheduler
Microsoft-Windows-osk
Microsoft-Windows-Kernel-PowerTrigger
Microsoft-Windows-EventLog-WMIProvider
Microsoft-Windows-IME-OEDCompiler
Microsoft-Windows-WER-SystemErrorReporting
Microsoft-Windows-Deplorch
Microsoft-Windows-SPB-HIDI2C
Microsoft-Windows-UxTheme
Microsoft-Windows-BfeTriggerProvider
Microsoft-Windows-Media-Streaming
Microsoft-Windows-Remotefs-UTProvider
Microsoft-Windows-Ntfs-SQM
Microsoft-Windows-User-PnP
Microsoft-Windows-AltTab
Microsoft-Windows-Kernel-StoreMgr
Microsoft-Windows-WindowsColorSystem
Microsoft-Windows-RemoteDesktopServices-RemoteFX-VM-User-Mode-Transport
Microsoft-Windows-MSMPEG2ADEC
Microsoft-Windows-TerminalServices-PnPDevices
Microsoft-Windows-GettingStarted
Microsoft-Windows-Narrator
Windows Wininit Trace
Microsoft-Windows-FileHistory-UI
Microsoft-Windows-MediaFoundation-PlayAPI
Microsoft-Windows-CertificateServicesClient-Lifecycle-System
Microsoft-Windows-BitLocker-Driver-Performance
Microsoft-Windows-PerfProc
Microsoft-Windows-Resource-Leak-Diagnostic
Microsoft-Windows-WebServices
Microsoft-Windows-FileHistory-Service
Microsoft-Windows-MediaEngine
Microsoft-Windows-StartupRepair
Microsoft-Windows-Security-IdentityStore
Microsoft-Windows-IME-SCSetting
Microsoft-Windows-FileHistory-EventListener
Microsoft-Windows-Program-Compatibility-Assistant
Microsoft-Windows-DesktopActivityModerator
Microsoft-Windows-MemoryDiagnostics-Schedule
Microsoft-Windows-FileHistory-Engine
Microsoft-Windows-PerfDisk
Microsoft-Windows-OOBE-Machine-Core
Microsoft-Windows-WLAN-AutoConfig
Microsoft-Windows-FileHistory-ConfigManager
Microsoft-Windows-Search-ProfileNotify
Microsoft-Windows-PerfCtrs
UMPass Driver Trace
Microsoft-Windows-FileHistory-Catalog
Microsoft-Windows-WlanDlg
Microsoft-Windows-CDROM
Microsoft-Windows-Crypto-NCrypt
Certificate Services Client CredentialRoaming Trace
Microsoft-Windows-CredUI
Windows Firewall Service
Microsoft-Windows-FileHistory-Core
Microsoft-Windows-Direct3D11
Microsoft-Windows-DirectoryServices-Deployment
Microsoft-Windows-All-User-Install-Agent
Microsoft-Windows-Kernel-Licensing-StartServiceTrigger
Microsoft-Windows-ServerManager-ManagementProvider
Microsoft-Windows-Diagnosis-ScriptedDiagnosticsProvider
Microsoft-Windows-IIS-W3SVC-WP
Microsoft-Windows-TerminalServices-MediaRedirection-DShow
Microsoft-Windows-Rdms-UI
Microsoft-Windows-Feedback-Service-TriggerProvider
Microsoft-Windows-Eventlog
Microsoft-Windows-CodeIntegrity
Microsoft-Windows-WPDClassInstaller
Microsoft-Windows-NetworkAccessProtection
Microsoft-Windows-UIAutomationCore
Microsoft-Windows-StartLmhosts
Microsoft-Windows-IME-Broker
Microsoft-Windows-Kernel-Process
Microsoft-Windows-CertificateServicesClient
Microsoft-Windows-AppXDeployment
Microsoft-Windows-Shell-Core
Microsoft-Windows-Anytime-Upgrade
Microsoft-Windows-PCI
Microsoft-Windows-WPD-MTPBT
Microsoft-Windows-CertificationAuthorityClient-CertCli
Microsoft-Windows-Srv2
Microsoft-Windows-TunnelDriver-SQM-Provider
Microsoft-Windows-Security-Licensing-SLC
Microsoft-Windows-ATAPort
Microsoft-Windows-Recovery
Microsoft-Windows-GenericRoaming
Microsoft-Windows-Sdbus-SQM
Microsoft-Windows-DirectComposition
Microsoft-Windows-P2PIMSvc
Microsoft-Windows-WCN-Config-Registrar
Microsoft-Windows-WPD-API
Microsoft-Windows-P2P-PNRP
Microsoft-Windows-DeviceUx
Windows Mobile Performance Hooks
Microsoft-Windows-ProcessStateManager
Windows Connect Now
Microsoft-Windows-Networking-RealTimeCommunication
Microsoft-Windows-EventSystem
Microsoft-Windows-Spaceport
Windows Mobile Remote API
Microsoft-Windows-Dhcp-Nap-Enforcement-Client
Microsoft-Windows-WinNat
Windows Mobile AirSync Engine 2
Microsoft-Windows-WCN-Config-Registrar-Secure
Windows Mobile AirSync Engine 1
Microsoft-Windows-Security-Kerberos
Windows Mobile ActiveSync Engine
Microsoft-Windows-WSC-SRV
Microsoft-Windows-Eventlog-ForwardPlugin
Windows Mobile Serial Connectivity
Microsoft-Windows-TerminalServices-SessionBroker-Client
Microsoft-Windows-WMPNSS-PublicAPI
Windows Mobile Desktop Passthrough
Microsoft-Windows-RPC-Events
Microsoft-Windows-LanguageProfile
Microsoft-Windows-Anytime-Upgrade-Events
Microsoft-Windows-Management-UI
Microsoft-Windows-SMBClient
Microsoft-Windows-TerminalServices-RdpSoundDriver
Microsoft-Windows-Dwm-Api
Microsoft-Windows-QoS-qWAVE
Microsoft-Windows-Kernel-Tm-Trigger
Microsoft-Windows-IPNAT
Microsoft-Windows-NetworkBridge
Microsoft-Windows-MPS-CLNT
Microsoft-Windows-Diagnosis-Scheduled
Microsoft-Windows-WMPNSS-Service
Microsoft-Windows-DxpTaskRingtone
Microsoft-Windows-Kernel-AppCompat
Microsoft-Windows-TimeBroker
Microsoft-Windows-DeviceConfidence
Microsoft-Windows-Shell-Shwebsvc
Microsoft-Windows-Diagnostics-Performance
Windows NetworkMap Trace
Microsoft-Windows-TerminalServices-Printers
Microsoft-Windows-AppLocker
Microsoft-Windows-Audio
Microsoft-Windows-LLTD-MapperIO
Microsoft-Windows-HotspotAuth
Microsoft-Windows-Firewall-CPL
Microsoft-Windows-Kernel-IoTrace
Microsoft-Windows-Perflib
Microsoft-Windows-BootUX
Microsoft-Windows-WMPDMCUI
Microsoft-Windows-Disk
Microsoft-Windows-IME-JPLMP
Microsoft-Windows-Security-SPP-UX-Notifications
Microsoft-Windows-TerminalServices-ClientActiveXCore
Microsoft-Windows-IIS-IISReset
Microsoft-Windows-WindowsUIImmersive
Windows Firewall Control Panel
Microsoft-Windows-DeviceSetupManager
Microsoft-Windows-EnrollmentPolicyWebService
Microsoft-Windows-IME-Roaming
Microsoft-Windows-SetupQueue
Microsoft-Windows-SmartCard-Audit
Microsoft-Windows-Servicing
Microsoft-Windows-ACL-UI
Microsoft-Windows-WWAN-CFE
Microsoft-Windows-FCRegSvc
Microsoft-Windows-IIS-IisMetabaseAudit
Microsoft-Windows-Kernel-WDI
Microsoft-Windows-TabletPC-MathInput
Microsoft-Windows-Kernel-General
Windows Media Player Trace
Microsoft-Windows-DxpTaskDLNA
Microsoft-Windows-User Profiles General
Microsoft-Windows-Kernel-WSService-StartServiceTrigger
Microsoft-Windows-WebAuth
Microsoft-Windows-API-Tracing
Microsoft-Windows-FunctionDiscovery
Microsoft-Windows-StickyNotes
Microsoft-Windows-WCN-WscEapPeer-Trace
Microsoft-Windows-QoS-WMI-Diag
Microsoft-Windows-NetworkProvisioning
Microsoft-Windows-Network-DataUsage
Microsoft-Windows-AppSruProv
Microsoft-Windows-WebcamExperience
Microsoft-Windows-EaseOfAccess
Microsoft-Windows-Spellchecking-Host
Microsoft-Windows-IME-CandidateUI
Microsoft-Windows-TPM-WMI
Microsoft-Windows-Security-SPP
Microsoft-Windows-DirectShow-KernelSupport
Microsoft-Windows-Diagnosis-AdvancedTaskManager
Microsoft-Windows-ThemeCPL
Windows Mobile Co-installer
Microsoft-Windows-MPRMSG
Microsoft-Windows-EnhancedStorage-EhStorCertDrv
Microsoft-Windows-NdisImPlatformEventProvider
Microsoft-Windows-FunctionDiscoveryHost
Microsoft-Windows-MediaFoundation-MSVideoDSP
Microsoft-Windows-IME-JPTIP
Windows Kernel Trace
Microsoft-SQLServerDataTools
Microsoft-Windows-ASN1
Microsoft-Windows-Crypto-BCrypt
Microsoft-Windows-HealthCenterCPL
Microsoft-Windows-XAML
Microsoft-Windows-PDFReader
Microsoft-Windows-TerminalServices-ServerUSBDevices
Microsoft-Windows-WWAN-SVC-EVENTS
Microsoft-Windows-Search-ProtocolHandlers
Microsoft-Windows-IdCtrls
Microsoft-Windows-User-ControlPanel
Microsoft-Windows-Runtime-Media
Microsoft-Windows-CAPI2
Windows Mobile Sync Handlers
Microsoft-Windows-PowerCfg
Microsoft-Windows-SrumTelemetry
Microsoft-Windows-Base-Filtering-Engine-Connections
Microsoft-Windows-Sidebar
Microsoft-Windows-NDF-HelperClassDiscovery
Microsoft-Windows-PerfNet
Microsoft-Windows-PortableDeviceStatusProvider
Microsoft-Windows-TabletPC-Platform-Manipulations
Microsoft-Windows-Subsys-SMSS
Microsoft-Windows-LDAP-Client
Microsoft-Windows-Security-SPP-UX-GC
Microsoft-Windows-Media Center Extender
Microsoft-Windows-DiskDiagnostic
Microsoft-Windows-TSF-msutb
Microsoft-Windows-Reliability-Analysis-Agent
{B6501BA0-C61A-C4E6-6FA2-A4E7F8C8E7A0}
Microsoft-Windows-Kernel-Processor-Power
Microsoft-Windows-NCSI
Microsoft-Windows-NetworkConnectivityStatus
Microsoft-Windows-wmvdecod
Microsoft-Windows-ServiceTriggerPerfEventProvider
Microsoft-Windows-Service Pack Installer
Microsoft-Windows-Bluetooth-HidGatt
Microsoft-Windows-TabletPC-Platform-Input-Ninput
Microsoft-Windows-Tcpip-SQM-Provider
Microsoft-Windows-MPS-SRV
Microsoft-Windows-KnownFolders
Microsoft-Windows-NAPIPSecEnf
Microsoft-Windows-EnrollmentWebService
Microsoft-Windows-Deduplication-Change
Microsoft-Windows-OfflineFiles-CscFastSync
Microsoft-Windows-UxInit
Microsoft-Windows-BranchCacheClientEventProvider
Microsoft-Windows-Forwarding
Microsoft-Windows-RPC-Proxy-LBS
Microsoft-Windows-Kernel-Disk
Microsoft-Windows-TriggerEmulatorProvider
Microsoft-Windows-SystemHealthAgent
Microsoft-Windows-Memory-Diagnostic-Task-Handler
Microsoft-Windows-Winsock-WS2HELP
Microsoft-Windows-ThemeUI
Microsoft-Windows-TerminalServices-MediaRedirection
Microsoft-Windows-TerminalServices-ClientUSBDevices
Microsoft-Windows-TabletPC-CoreInkRecognition
Microsoft-Windows-COM
Microsoft-Windows-PnPMgrTriggerProvider
Microsoft-Windows-LoadPerf
Microsoft-Windows-System-Restore
Microsoft-Windows-UserAccountControl
Microsoft-Windows-Services-Svchost
Microsoft-Windows-PushNotifications-Developer
Microsoft-Windows-LiveId
Microsoft-Windows-Security-SPP-UX
Microsoft-Windows-VAN
Microsoft-Windows-FirstUX-PerfInstrumentation
Microsoft-Windows-Kernel-Tm
Microsoft-Windows-Kernel-ShimEngine
Microsoft-Windows-EapHost
Microsoft-Windows-CertPolEng
Microsoft-Windows-MsLbfoEventProvider
Microsoft-Windows-Complus
Microsoft-Windows-EFS
Microsoft-Windows-WwaHost
Microsoft-Windows-ServerManager
Microsoft-Windows-ComDlg32
Microsoft-Windows-MP4SDECD
Microsoft-Windows-PeopleNearMe
Microsoft-Windows-SmartCard-Bluetooth-Profile
Microsoft-Windows-TZUtil
Microsoft-Windows-ApplicationExperience-SwitchBack
Microsoft-Windows-UI-Input-Inking
Microsoft-Windows-VDRVROOT
Windows Firewall NetShell Plugin
Windows Firewall API
Microsoft-Windows-Kernel-Acpi
Microsoft-Windows-WinRM
Microsoft-Windows-Direct3D10_1
Microsoft-Windows-Kernel-LicensingSqm
Microsoft-Windows-SpoolerSpoolss
Microsoft-Windows-FilterManager
Microsoft-Windows-ActionQueue
Microsoft-Windows-IME-KRAPI
Microsoft-Windows-Resource-Exhaustion-Detector
Microsoft-Windows-ApplicationExperienceInfrastructure
Microsoft-Windows-StorSqm
Microsoft-Windows-Search
Microsoft-Windows-HttpEvent
Microsoft-Windows-AxInstallService
Microsoft-Windows-Diagnosis-PerfHost
Microsoft-Windows-International
Microsoft-Windows-CertificateServicesClient-CredentialRoaming
Microsoft-Windows-SoftwareRestrictionPolicies
Microsoft-Windows-Windows Defender
Microsoft-Windows-ShareMedia-ControlPanel
Microsoft-Windows-CertificateServicesClient-Lifecycle-User
Microsoft-Windows-WPD-MTPUS
Microsoft-Windows-DirectWrite
Microsoft-Windows-RPCSS
Microsoft-Windows-DeviceSync
Microsoft-Windows-NcdAutoSetup
Microsoft-Windows-Diagnosis-PCW
Microsoft-Windows-DistributedCOM
ATA Port Driver Tracing Provider
Microsoft-Windows-WebdavClient-LookupServiceTrigger
Microsoft-Windows-USB-USBXHCI
Microsoft-Windows-Diagnosis-PLA
Microsoft-Windows-WlanConn
Microsoft-Windows-Winlogon
Microsoft-Windows-stobject
Microsoft-Windows-Mobile-Broadband-Experience-SmsRouter
Microsoft-Windows-D3D10Level9
Microsoft-Windows-WAS-ListenerAdapter
Microsoft-Windows-ServerManager-MultiMachine
Microsoft-Windows-AppxPackagingOM
Microsoft-Windows-PushNotifications-Platform
Microsoft-Windows-OOBE-Machine-Plugins-Wireless
Microsoft-Windows-IME-JPAPI
SBP2 Port Driver Tracing Provider
Microsoft-Windows-BranchCacheEventProvider
Microsoft-Windows-Immersive-Shell-API
Microsoft-Windows-ntshrui
Microsoft-Windows-KPSSVC
Microsoft-Windows-BitLocker-DrivePreparationTool
Microsoft-Windows-EapMethods-Sim
Microsoft-Windows-Shell-ZipFolder
Microsoft-Windows-Search-Core
Microsoft-Windows-OfflineFiles-CscNetApi
Microsoft-Windows-Diagnosis-WDI
Microsoft-Windows-PortableDeviceSyncProvider
Microsoft-Windows-Diagnostics-PerfTrack-Counters
Microsoft-Windows-Speech-TTS
Microsoft-Windows-Component-Resources-MrmCore-Events
Microsoft-Windows-BranchCache
Microsoft-Windows-SystemEventsBroker
Microsoft-Windows-VolumeControl
Microsoft-Windows-Win32k
Microsoft-Windows-Kernel-WHEA
Microsoft-Windows-P2P-Meetings
Microsoft-Windows-Diagnosis-WDC
Microsoft-Windows-Serial-ClassExtension
Microsoft-Windows-KPSSVC-WPP
Microsoft-Windows-CertificateServices-Deployment
Microsoft-Windows-PerfOS
Microsoft-Windows-ResetEng
Microsoft-Windows-Runtime-Graphics
Microsoft-Windows-IPSEC-SRV
Microsoft-Windows-CorruptedFileRecovery-Server
Windows Mobile Bluetooth Connectivity
Microsoft-Windows-DLNA-Namespace
Microsoft-Windows-WLAN-MediaManager
Certificate Services Client Trace
Microsoft-Windows-BranchCacheSMB
Microsoft-Windows-PrintService-USBMon
Microsoft-Windows-OOBE-Machine
Microsoft-Windows-DXP
Microsoft-Windows-Immersive-Shell
Microsoft-Windows-OOBE-Machine-Plugins
Microsoft-Windows-Reliability-Analysis-Engine
Microsoft-Windows-Application-Experience
Microsoft-Windows-KdsSvc
Microsoft-Windows-MediaFoundation-Platform
Microsoft-Windows-Security-Configuration-Wizard
Microsoft-Windows-DisplayColorCalibration
Windows Mobile Device Center Base
Microsoft-Windows-WPD-MTPClassDriver
Microsoft-Windows-DNS-Client
Microsoft-Windows-MSDTC Client
Microsoft-Windows-NDIS-PacketCapture
Windows Remote Management Trace
Microsoft-Windows-MSPaint
Microsoft-Windows-HomeGroup-ListenerService
Microsoft-Windows-Sensor-Service-Trigger
Microsoft-Windows-EapMethods-Ttls
Microsoft-Windows-Remotefs-Smb
Microsoft-Windows-SMBWitnessClient
Microsoft-Windows-USB-USBHUB
Microsoft-Windows-DirectWrite-FontCache
Microsoft-Windows-WindowsBackup
Microsoft-Windows-NWiFi
Microsoft-Windows-WER-Diag
Microsoft-Windows-UAC
Microsoft-Windows-LUA
Microsoft-Windows-AppID
Microsoft-Windows-IIS-WMSVC
Microsoft-Windows-Shell-OpenWith
Microsoft-Windows-MediaFoundation-MFReadWrite
Microsoft-Windows-BrokerInfrastructure
Microsoft-Windows-Fault-Tolerant-Heap
Microsoft-Windows-Shell-DefaultPrograms
Microsoft-Windows-Dism-Cli
Microsoft-Windows-SMBDirect
Microsoft-Windows-IME-SCTIP
Microsoft-Windows-EnergyEfficiencyWizard
Microsoft-Windows-ParentalControls
Microsoft-Windows-Smartcard-Server
Microsoft-Windows-FMS
Microsoft-Windows-Devices-Location
Microsoft-Windows-LLTD-Responder
Microsoft-Windows-MsLbfoSysEvtProvider
sqlos
Microsoft-Windows-TerminalServices-RemoteConnectionManager
Microsoft-Windows-SCPNP
Microsoft-Windows-Wordpad
WMI_Tracing_Client_Operations
Microsoft-Windows-Security-Audit-Configuration-Client
Microsoft-Windows-EFSADU
Windows Notification Facility Provider
Microsoft-Windows-DiagCpl
Windows NetworkItemFactory Trace
Microsoft-Windows-ApplicationExperience-Cache
Microsoft-Windows-ResourcePublication
Microsoft-Windows-FailoverClustering-Client
Microsoft-Windows-Runtime-Networking-BackgroundTransfer
Microsoft-Windows-AppHost
Microsoft-Windows-NetAdapterCim-Diag
Microsoft-Windows-IIS-FTP
Microsoft-Windows-Iphlpsvc
Microsoft-Windows-WinINet
Microsoft-Windows-TabletPC-InputPersonalization
Microsoft-Windows-SpoolerFilterPipelineSVC
Microsoft-Windows-Globalization
Microsoft-Windows-Bits-Client
Microsoft-Windows-WFP
Microsoft-Windows-Services
Microsoft-Windows-IdleTriggerProvider
Microsoft-Windows-DxgKrnl
Microsoft-Windows-HealthCenter
Microsoft-Windows-OtpCredentialProviderEvt
Microsoft-Windows-MemoryDiagnostics-Results
Microsoft-Windows-Ncasvc
Microsoft-Windows-SystemSettings
Microsoft-Windows-PDH
Microsoft-Windows-WMPNSSUI
Microsoft-Windows-BdeTriggerProvider
Microsoft-Windows-Diagnostics-PerfTrack
Microsoft-Windows-IIS-APPHOSTSVC
Microsoft-Windows-CoreWindow
Microsoft-Windows-Help
Microsoft-Windows-WindowsUpdateClient
Microsoft-Windows-IIS-W3SVC-PerfCounters
Microsoft-Windows-WMI
Microsoft-Windows-TabletPC-Platform-Input-Wisp
Microsoft-Windows-ProcessExitMonitor
Microsoft-Windows-IME-JPSetting
Microsoft-Windows-Diagnosis-Scripted
Microsoft-Windows-GroupPolicyTriggerProvider
File Kernel Trace; Operation Set 2
Microsoft-Windows-IIS-Configuration
Microsoft-Windows-Diagnosis-TaskManager
Microsoft-Windows-Diagnosis-DPS
Microsoft-Windows-UserPnp
Microsoft-Windows-Security-SPP-UX-GenuineCenter-Logging
Microsoft-Windows-Schannel-Events
NetJoin
Microsoft-Windows-TabletPC-InputPanel
Microsoft-Windows-FileServices-ServerManager-EventProvider
Microsoft-Windows-MediaFoundation-Performance
Microsoft-Windows-EndpointTriggerProvider
Microsoft-Windows-IME-KRTIP
Microsoft-Windows-Mobile-Broadband-Experience-SmsApi
Microsoft-Windows-Hyper-V-Netvsc
Microsoft-Windows-DirectSound
Microsoft-Windows-TabletPC-Platform-Input-Core
Microsoft-Windows-PushNotifications-InProc
Microsoft-Windows-Kernel-Network
Microsoft-Windows-DiskDiagnosticResolver
Microsoft-Windows-NdisImPlatformSysEvtProvider
Microsoft-Windows-MeetingSpace
Microsoft-Windows-Base-Filtering-Engine-Resource-Flows
Microsoft-Windows-RasServer
Microsoft-Windows-VHDMP
Microsoft-Windows-WindowsSystemAssessmentTool
Microsoft-Windows-DCLocator
Microsoft-Windows-Diagnosis-MSDT
Microsoft-Windows-WLGPA
SQLSRV32.1
Microsoft-Windows-CertificateServicesClient-CertEnroll
Microsoft-Windows-IME-TCCORE
Microsoft-Windows-SmartCard-Bluetooth-Transport
Microsoft-Windows-WMVENCOD
Microsoft-Windows-mobsync
Microsoft-Windows-EFSTriggerProvider
Microsoft-Windows-DUSER
Microsoft-Windows-DiskDiagnosticDataCollector
Microsoft-Windows-DirectAccess-MediaManager
Microsoft-Windows-DisplaySwitch
Microsoft-Windows-PackageStateRoaming
Microsoft-Windows-Crypto-DPAPI
Microsoft-Windows-IME-CustomerFeedbackManagerUI
sqlserver
Microsoft-Windows-User-Loader
Microsoft-Windows-NetworkProfileTriggerProvider
Microsoft-Windows-NetworkProfile
Windows Firewall API - GP
Microsoft-Windows-CmiSetup
Microsoft-Windows-Sysprep
Microsoft-Windows-Windeploy
Microsoft-Windows-Setup
Microsoft-Windows-OobeLdr
Microsoft-Windows-SetupUGC
Microsoft-Windows-Audit
Microsoft-Windows-SetupCl
Microsoft-Windows-Winsrv
Microsoft-Windows-WinHttp
Microsoft-Windows-RadioManager
Microsoft-Windows-Websocket-Protocol-Component
Microsoft-Windows-WebIO
Microsoft-Windows-Dwm-Core
Microsoft-Windows-Registry-SQM-Provider
Microsoft-Windows-WHEA-Logger
Microsoft-Windows-PeerToPeerDrtEventProvider
Microsoft-Windows-BitLocker-Driver
Microsoft-Windows-SettingSync
Microsoft-Windows-Mobile-Broadband-Experience-Api-Internal
Microsoft-Windows-EnhancedStorage-EhStorTcgDrv
Microsoft-Windows-PowerShell
Microsoft-Windows-DirectShow-Core
Microsoft-Windows-Kernel-Power
Microsoft-Windows-msmpeg2venc
Microsoft-Windows-MPEG2_DLNA-Encoder
Microsoft-Windows-Remote-FileSystem-Log
Microsoft-Windows-Kernel-PnP
Microsoft-Windows-AppXDeployment-Server
Microsoft-Windows-Folder Redirection
Microsoft-Windows-OfflineFiles-CscUM
Microsoft-Windows-ServerManager-DeploymentProvider
Microsoft-Windows-ServiceReportingApi
Microsoft-Windows-StorDiag
Microsoft-Windows-IME-CustomerFeedbackManager
Microsoft-Windows-Kernel-EventTracing
Microsoft-Windows-Kernel-BootDiagnostics
Microsoft-Windows-DXGI
Microsoft-Windows-Build-RegDll
Microsoft-Windows-PNRPSvc
Microsoft-Windows-Ndu
Microsoft-Windows-Firewall
Microsoft-Windows-Wcmsvc
Microsoft-Windows-OLEACC
Microsoft-Windows-MSDTC Client 2
Microsoft-Windows-InputSwitch
Microsoft-Windows-Runtime-WebAPI
Microsoft-Windows-HAL
Microsoft-Windows-International-RegionalOptionsControlPanel
Microsoft-Windows-RPC
Microsoft-Windows-MFH264Enc
Microsoft-Windows-SharedAccess_NAT
Microsoft-Windows-DeviceAssociationService
Microsoft-Windows-Bluetooth-MTPEnum
Microsoft-Windows-BitLocker-API
{C5BFFE2E-9D87-D568-A09E-08FC83D0C7C2}
Microsoft-Windows-IPMIProvider
Microsoft-Windows-IME-TIP
Microsoft-Windows-WindowsToGo-StartupOptions
Microsoft-Windows-Backup
Microsoft-Windows-WMP-MediaDeliveryEngine
Microsoft-Windows-PrintBRM
Microsoft-Windows-ServerManager-ConfigureSMRemoting
Microsoft-Windows-Video-For-Windows
Microsoft-Windows-ClearTypeTextTuner
Microsoft-Windows-Subsys-Csr
Microsoft-Windows-USB-UCX
Microsoft-Windows-RemoteApp and Desktop Connections
Windows Winlogon Trace
Microsoft-Windows-RasSstp
Microsoft-Windows-UAC-FileVirtualization
Microsoft-Windows-ClassicSruMon
Microsoft-Windows-Security-IdentityListener
Microsoft-Windows-WWAN-MM-EVENTS
Microsoft-Windows-MsiServer
Microsoft-Windows-PhotoAcq
Microsoft-Windows-Power-Troubleshooter
Microsoft-Windows-DxpTaskSyncProvider
Microsoft-Windows-Remotefs-Rdbss
Microsoft-Windows-AppIDServiceTrigger
Microsoft-Windows-Kernel-File
Microsoft-Windows-TSF-msctf
Microsoft-Windows-PowerCpl
Microsoft-Windows-LanGPA
Microsoft-Windows-WWAN-MediaManager
Microsoft-Windows-PrimaryNetworkIcon
Microsoft-Windows-OfflineFiles
Microsoft-Windows-UIAnimation
Microsoft-Windows-Security-Auditing
Microsoft-Windows-WCN-Config-Registrar-Wizard-Trace
Microsoft-Windows-WWAN-NDISUIO-EVENTS
Microsoft-Windows-NetworkManagerTriggerProvider
Microsoft-Windows-Winsock-AFD
Microsoft-Windows-Remote-FileSystem-Monitor
Microsoft-Windows-WABSyncProvider
.NET Common Language Runtime
Microsoft-Windows-MSMPEG2VDEC
Microsoft-Windows-DateTimeControlPanel
Windows Firewall Driver
Microsoft-Windows-IIS-W3SVC
Microsoft-Windows-WWAN-UI-EVENTS
Microsoft-Windows-Speech-UserExperience
Microsoft-Windows-Dism-Api
Microsoft-Windows-Store-Client-UI
Microsoft-Windows-Calculator
Microsoft-Windows-Shell-ConnectedAccountState
Microsoft-Windows-PrintDialogs
Microsoft-Windows-Network-and-Sharing-Center
Microsoft-Windows-Crypto-RNG
Microsoft-Windows-MSDTC 2
Microsoft-Windows-SpellChecker
Microsoft-Windows-propsys
Microsoft-Windows-WPD-MTPIP
Microsoft-Windows-Documents
Microsoft-Windows-StorPort
Microsoft-Windows-Magnification
Microsoft-Windows-Shell-AuthUI
Microsoft-Windows-Dwm-Redir
Microsoft-Windows-BTH-BTHUSB
Microsoft-Windows-Ntfs
Microsoft-Windows-Sens
Microsoft-Windows-UserAccessLogging
Microsoft-Windows-RemoteDesktopServices-RdpCoreTS
Microsoft-Windows-COM-Perf
Microsoft-Windows-StorageSpaces-BackgroundAgent
Microsoft-Windows-Kernel-Prefetch
Portable Device Connectivity API Trace
Microsoft-Windows-RemoteAssistance
Microsoft-Windows-MF
Microsoft-Windows-MediaFoundation-MSVProc
Microsoft-Windows-TBS
Microsoft-Windows-FeedbackTool
Microsoft-Windows-WlanPref
Microsoft-Windows-OfflineFiles-CscDclUser
Microsoft-Windows-Http-SQM-Provider
Microsoft-Windows-Wireless-Network-Setup-Wizard-Trace
Microsoft-Windows-MCT
Microsoft-Windows-HotStart
Microsoft-Windows-Diagnostics-Networking
Microsoft-Windows-Sensors
Microsoft-Windows-SmbServer
Microsoft-Windows-USB-USBHUB3
Microsoft-Windows-Dot3MM
Microsoft-Windows-KernelStreaming
Microsoft-Windows-Mobile-Broadband-Experience-Api
Microsoft-Windows-VolumeSnapshot-Driver
Microsoft-Windows-MobilityCenter
Microsoft-Windows-OfflineFiles-CscService
Microsoft-Windows-Superfetch
Microsoft-Windows-IPBusEnum
Microsoft-Windows-Mprddm
Microsoft-Windows-Dwm-Udwm
Microsoft-Windows-AppModel-State
Microsoft-Windows-WCN-FD-Provider-Trace
Microsoft-Windows-Resource-Exhaustion-Resolver
Microsoft-Windows-Iphlpsvc-Trace
Microsoft-Windows-WUSA
Microsoft-Windows-TerminalServices-LocalSessionManager
Microsoft-Windows-RPC-FirewallManager
Microsoft-Windows-WCN-Common-Trace
Microsoft-Windows-MediaFoundation-MFCaptureEngine
Microsoft-Windows-ReadyBoostDriver
Microsoft-Windows-DUI
Microsoft-Windows-WMP-Setup_WM
Microsoft-Windows-Direct3D10
Microsoft-Windows-DfsSvc
Microsoft-Windows-IME-SCCORE
Microsoft-Windows-NTLM
Microsoft-Windows-VWiFi
Microsoft-Windows-Kernel-PnPConfig
Microsoft-Windows-Winsock-SQM
Microsoft-Windows-SpoolerSpoolSV
Microsoft-Windows-Netshell
Microsoft-Windows-UserModePowerService
Microsoft-Windows-HttpService
HTTP Service Trace
Microsoft-Windows-D3D9
Microsoft-Windows-AppModel-Runtime
Microsoft-Windows-CEIP
Microsoft-Windows-Directory-Services-SAM
Microsoft-Windows-SpoolerTCPMon
Microsoft-Windows-ReadyBoost
Microsoft-Windows-L2NACP
Microsoft-Windows-LLTD-Mapper
Microsoft-Windows-Deduplication
Microsoft-Windows-HomeGroup-ControlPanel
Microsoft-Windows-Mobile-Broadband-Experience-Parser-Task
Microsoft-Windows-DomainJoinManagerTriggerProvider
Microsoft-Windows-SruMon
Microsoft-Windows-ELS-Hyphenation
TCPIP Service Trace
Microsoft-Windows-DriverFrameworks-KernelMode
Microsoft-Windows-CorruptedFileRecovery-Client
Microsoft-Windows-WMI-Activity
Microsoft-Windows-COMRuntime
Microsoft-Windows-WAS
Microsoft-Windows-Wnv
Microsoft-Windows-Shsvcs
Microsoft-Windows-NDIS
Microsoft-Windows-WinMDE
File Kernel Trace; Operation Set 1
Microsoft-Windows-Proximity-Common
Microsoft-Windows-Ntfs-UBPM
Microsoft-Windows-Kernel-Registry
Microsoft-Windows-RemoteDesktopServices-RemoteDesktopSessionManager
Microsoft-Windows-TunnelDriver
Microsoft-Windows-QoS-Pacer
Microsoft-Windows-EventCollector
Microsoft-Windows-OOBE-Machine-DUI
Microsoft-Windows-IME-TCTIP
Microsoft-Windows-WCNWiz
Microsoft-Windows-Display
Microsoft-Windows-OcSetup
Microsoft-Windows-DesktopWindowManager-Diag
Microsoft-Windows-FileInfoMinifilter
Microsoft-Windows-TextPredictionEngine
Microsoft-Windows-NetworkGCW
Microsoft-Windows-DHCPv6-Client
Microsoft-Windows-PlayToManager
NDIS_STATUS_TCP_CONNECTION_OFFLOAD_CURRENT_CONFIG
NDIS_STATUS_PORT_STATE
MS_Windows_AeLookupServiceTrigger_Provider
Microsoft_Windows_SQM_Provider
MS_Windows_AIT_Provider
NDIS_TCP_CONNECTION_OFFLOAD_CURRENT_CONFIG
NDIS_TCP_OFFLOAD_CURRENT_CONFIG
PARPORT_WMI_ALLOCATE_FREE_COUNTS_GUID
NDIS_GEN_ENUMERATE_PORTS
GUID_QOS_TC_SUPPORTED
MS1394_PortVendorRegisterAccessGuid
iSCSI_PersistentLoginsGuid
iSCSI_PortalInfoClassGuid
SerailPortPerfGuid
PortClsEvent
UdpIpGuid
TcpIpGuid
iSCSI_OperationsGuid
CTLGUID_usbport
NDIS_STATUS_TCP_CONNECTION_OFFLOAD_HARDWARE_CAPABILITIES
iSCSI_DiscoveryOperationsGuid
SerialPortNameGuid
CTLGUID_WebClntTrace
POINTER_PORT_WMI_STD_DATA_GUID
KEYBOARD_PORT_WMI_STD_DATA_GUID
MSKeyboard_ClassInformationGuid
NDIS_GEN_CO_MEDIA_SUPPORTED
MS_Windows_AeSwitchBack_Provider
SerialPortHWGuid
MS_SM_PortInformationMethods
ataport_CtlGuid
storport_CtlGuid
MS1394_PortDriverInformationGuid
BTHPORT_WMI_HCI_PACKET_INFO
SerialPortCommGuid
iScsiLBOperationsGuid
MS_Windows_AeCache_Provider
NDIS_GEN_PORT_STATE
WindowsBackup TracingControlGuid
WmiMonitorListedSupportedSourceModes_GUID
NDIS_GEN_MEDIA_SUPPORTED
CTLGUID_certprop
BTHPORT_WMI_SDP_SERVER_LOG_INFO
KEYBOARD_PORT_WMI_EXTENDED_ID
iSCSIRedirectPortalGuid
NDIS_GEN_PORT_AUTHENTICATION_PARAMETERS
BTHPORT_WMI_SDP_DATABASE_EVENT
NDIS_TCP_CONNECTION_OFFLOAD_HARDWARE_CAPABILITIES
iSCSI_TCPIPConfigGuid
SerialPortPropertiesGuid
PortCls_IrpProcessing
iSCSI_SecurityConfigOperationsGuid
NDIS_TCP_OFFLOAD_PARAMETERS
PortCls_PowerState
Microsoft_Windows_GameUx
iSCSI_InitiatorLoginStatisticsGuid
MS1394_PortErrorInformationGuid
PortCls_PinState
CTLGUID_PortCls
NDIS_TCP_OFFLOAD_HARDWARE_CAPABILITIES
CTRLGUID_MF_PIPELINE
.PX`i`
`.HBS
&{%UD(_
dump_wmi_guidentries failed, error %d, status %X
dump_wmi_guidentries failed, error %d
dump_wmi_guidentries: cannot alloc %X bytes (total %d)
dump_wmi_guidentries: read failed, error %d, status %X
dump_wmi_guidentries: read failed, error %d
WMI guidentries: total %X readed %X:
[%X] %X flag %X refcnt %X - %s
[%X] %X flag %X refcnt %X %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
dump_wmi_regentries failed, error %d, status %X
dump_wmi_regentries failed, error %d
dump_wmi_regentries: cannot alloc %X bytes (total %d)
dump_wmi_regentries: read failed, error %d, status %X
dump_wmi_regentries: read failed, error %d
WMI regentries: total %X readed %X:
[%X] flags %X refcnt %X dev %p prov %X DS %p %s
[%X] flags %X refcnt %X cb %p prov %X DS %p %s
Etw[%d]:
Type %X Index %X InternalCB %p (%s) %s
Type %X Index %X InternalCB %p %s
Type %X Index %X InternalCB %p (%s) ProviderId: %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
Type %X Index %X InternalCB %p ProviderId: %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
dump_Etw: exception occured, code %X
dump_Etws: exception occured, code %X
KPRCB.EtwSupport %p:
KPRCB[%d].EtwSupport %p:
read_kernel_etws count failed, error %d, ntstatus %X
read_kernel_etws count failed, error %d
read_kernel_etws: cannot alloc %X bytes
read_kernel_etws failed, error %d, ntstatus %X
read_kernel_etws failed, error %d
KEtw[%X]:
KEtw[%X]: RefCount %d, KProvider - %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
KEtw[%X]: RefCount %d %s
[%X] %p %s
Type %X InUse %d Index %X InternalCB %p (%s) %s
Type %X InUse %d Index %X InternalCB %p %s
Type %X InUse %d Index %X InternalCB %p (%s) ProviderId: %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
Type %X InUse %d Index %X InternalCB %p ProviderId: %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
EtwCallback[%d] %p %s:
EtwCallback[%d]:
EtwTrace[%d] %p Ctx %p %s:
EtwTrace[%d] %p Ctx %p %s - %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
Unknown type %d for Etw[%d]
DEVINTERFACE_MT_TRANSPORT
DEVINTERFACE_KEYBOARD
DEVINTERFACE_COMPORT
DEVINTERFACE_VIAMINIPORT
DEVINTERFACE_STORAGEPORT
DEVINTERFACE_IRPORT
check_pnp_notifiers failed, error %d, status %X
check_pnp_notifiers failed, error %d
check_pnp_notifiers: cannot alloc %X bytes (total %d)
check_pnp_notifiers: read failed, error %d, status %X
check_pnp_notifiers: read failed, error %d
Pnp Notifiers: total %d, readed %d
Pnp[%d] %p %s %s addr %p
Pnp[%d] %s %s addr %p %s
check_pnp_handlers failed, error %d, status %X
check_pnp_handlers failed, error %d
PlugPlayHandlerTable: %d items
PlugPlayHandlerTable[%d] %p %s
PlugPlayHandlerTable[%d] %p
check_sess_notify, error %d, status %X
check_sess_notify, error %d
check_sess_notify: cannot alloc %X bytes (total %d)
check_sess_notify: read failed, error %d, status %X
check_sess_notify: read failed, error %d
IopSessionNotifications: %d
SessionNotifier[%d]: class %d len %X session %p cb %p %s
check_sess_term_ntfs failed, error %d, status %X
check_sess_term_ntfs failed, error %d
check_sess_term_ntfs: cannot alloc %X bytes (total %d)
check_sess_term_ntfs: read failed, error %d, status %X
check_sess_term_ntfs: read failed, error %d
LogonSessionTerminatedRoutines: %d
[%d] %p %s
check_fs_changes failed, error %d, status %X
check_fs_changes failed, error %d
check_fs_changes: cannot alloc %X bytes (total %d)
check_fs_changes: read failed, error %d, status %X
check_fs_changes: read failed, error %d
FS Change notifiers: %d (actual %d)
DriverObj %p addr %p %s
Cannot read count for %s, error %d
Count of %s is too big - %X
Cannot read %s table, error %d
Cannot read entry %d from table of %s, error %d
check_vista_cmp_list get count failed, error %d, status %X
check_vista_cmp_list get count failed, error %d
check_vista_cmp_list failed, error %d, status %X
check_vista_cmp_list failed, error %d
check_ai_cbs: cannot read ExpDisQueryAttributeInformation, error %d, ntstatus %X
check_ai_cbs: cannot read ExpDisQueryAttributeInformation, error %d
ExpDisQueryAttributeInformation %p %s
check_ai_cbs: cannot read ExpDisSetAttributeInformation, error %d, ntstatus %X
check_ai_cbs: cannot read ExpDisSetAttributeInformation, error %d
ExpDisSetAttributeInformation %p %s
check_dbgk_lkmd: cannot read DbgkLkmd_cblist, error %d, ntstatus %X
check_dbgk_lkmd: cannot read DbgkLkmd_cblist, error %d
DbgkLkmd[%d] callback %p %s
check_fsrtl: cannot read FltMgrCallbacks, error %d, ntstatus %X
check_fsrtl: cannot read FltMgrCallbacks, error %d
FltMgrCallbacks: %p %s
check_fsrtl: cannot read FsRtlpMupCalls, error %d, ntstatus %X
check_fsrtl: cannot read FsRtlpMupCalls, error %d
FsRtlpMupCalls: %p %s
check_Iof: cannot read pIofCallDriver, error %d, ntstatus %X
check_Iof: cannot read pIofCallDriver, error %d
pIofCallDriver %p patched by %s
check_Iof: cannot read pIofCompleteRequest, error %d, ntstatus %X
check_Iof: cannot read pIofCompleteRequest, error %d
pIofCompleteRequest %p patched by %s
check_Iof: cannot read pIoAllocateIrp, error %d, ntstatus %X
check_Iof: cannot read pIoAllocateIrp, error %d
pIoAllocateIrp %p patched by %s
check_Iof: cannot read pIoFreeIrp, error %d, ntstatus %X
check_Iof: cannot read pIoFreeIrp, error %d
pIoFreeIrp %p patched by %s
check_Iof: cannot read HvlpHypercallCodeVa, error %d, ntstatus %X
check_Iof: cannot read HvlpHypercallCodeVa, error %d
HvlpHypercallCodeVa %p patched by %s
%SystemRoot%\System32\sxssrv.dll
%SystemRoot%\System32\csrsrv.dll
%SystemRoot%\System32\basesrv.dll
%SystemRoot%\System32\winsrv.dll
%SystemRoot%\System32\lsasrv.dll
%SystemRoot%\System32\ntdll.dll
KiDebugRoutine %p hooked by %s
PspLegoNotifyRoutine %p hooked by %s
KiTimeUpdateNotifyRoutine %p hooked by %s
KiSwapContextNotifyRoutine %p hooked by %s
KiThreadSelectNotifyRoutine %p hooked by %s
Sysenter patched, addr %p not in %s !!!
Mailslot: %S
NamedPipe: %S
DEVCLASS_MULTIPORTSERIAL
DEVCLASS_PORTS
DEVCLASS_KEYBOARD
DEVCLASS_APMSUPPORT
read_dev_chrs(%S) failed, ntstatus %X
DrvObj %p name %S %s
DrvObj %p nameLen %X %s
dev_props failed, status %X
ClassGUID: %S
ClassGUID: %S - %s
Cannot open directory %S, error %X
Cannot realloc %d bytes
Cannot open device directory, error %X
Cannot open driver directory, error %X
Cannot open FileSystem directory, error %X
Unknown HAL private dispatch table version %X
HalAcpiTimerInit: %p %s
HalAcpiTimerCarry: %p %s
HalAcpiMachineStateInit: %p %s
HalAcpiQueryFlags: %p %s
HalAcpiPicStateIntact: %p %s
HalRestoreInterruptControllerState: %p %s
HalPciInterfaceReadConfig: %p %s
HalPciInterfaceWriteConfig: %p %s
HalSetVectorState: %p %s
HalGetApicVersion: %p %s
HalSetMaxLegacyPciBusNumber: %p %s
HalIsVectorValid: %p %s
HalAcpiGetTableDispatch: %p %s
HalAcpiGetRsdpDispatch: %p %s
HalAcpiGetFacsMappingDispatch: %p %s
HalAcpiGetAllTablesDispatch: %p %s
HalAcpiPmRegisterAvailable: %p %s
HalAcpiPmRegisterRead: %p %s
HalAcpiPmRegisterWrite: %p %s
HalHandlerForBus: %p %s
HalHandlerForConfigSpace: %p %s
HalLocateHiberRanges: %p %s
HalRegisterBusHandler: %p %s
HalSetWakeEnable: %p %s
HalSetWakeAlarm: %p %s
HalPciTranslateBusAddress: %p %s
HalPciAssignSlotResources: %p %s
HalHaltSystem: %p %s
HalFindBusAddressTranslation: %p %s
HalResetDisplay: %p %s
HalHandlerForBus: %p %s
HalHandlerForConfigSpace: %p %s
HalLocateHiberRanges: %p %s
HalRegisterBusHandler: %p %s
HalSetWakeEnable: %p %s
HalSetWakeAlarm: %p %s
HalPciTranslateBusAddress: %p %s
HalPciAssignSlotResources: %p %s
HalHaltSystem: %p %s
HalFindBusAddressTranslation: %p %s
HalResetDisplay: %p %s
KdSetupPciDeviceForDebugging: %p %s
KdReleasePciDeviceforDebugging: %p %s
KdGetAcpiTablePhase0: %p %s
KdCheckPowerButton: %p %s
HalVectorToIDTEntry: %p %s
KdMapPhysicalMemory64: %p %s
KdUnmapVirtualAddress: %p %s
HalMmMemoryUsage: %p %s
HalAllocateMapRegisters: %p %s
KdGetPciDataByOffset: %p %s
KdSetPciDataByOffset: %p %s
HalGetInterruptVector: %p %s
HalGetVectorInput: %p %s
HalLoadMicrocode: %p %s
HalUnloadMicrocode: %p %s
HalMcUpdatePostUpdate: %p %s
HalAllocateMessageTarget: %p %s
HalFreeMessageTarget: %p %s
HalDpReplaceBegin: %p %s
HalDpReplaceTarget: %p %s
HalDpReplaceControl: %p %s
HalDpReplaceEnd: %p %s
HalPrepareForBugcheck: %p %s
HalQueryWakeTime: %p %s
HalReportIdleStateUsage: %p %s
HalHandlerForBus: %p %s
HalHandlerForConfigSpace: %p %s
HalLocateHiberRanges: %p %s
HalRegisterBusHandler: %p %s
HalSetWakeEnable: %p %s
HalSetWakeAlarm: %p %s
HalPciTranslateBusAddress: %p %s
HalPciAssignSlotResources: %p %s
HalHaltSystem: %p %s
HalFindBusAddressTranslation: %p %s
HalResetDisplay: %p %s
HalAllocateMapRegisters: %p %s
KdSetupPciDeviceForDebugging: %p %s
KdReleasePciDeviceforDebugging: %p %s
KdGetAcpiTablePhase0: %p %s
KdCheckPowerButton: %p %s
HalVectorToIDTEntry: %p %s
KdMapPhysicalMemory64: %p %s
KdUnmapVirtualAddress: %p %s
KdGetPciDataByOffset: %p %s
KdSetPciDataByOffset: %p %s
HalGetInterruptVector: %p %s
HalGetVectorInput: %p %s
HalLoadMicrocode: %p %s
HalUnloadMicrocode: %p %s
HalMcUpdatePostUpdate: %p %s
HalAllocateMessageTarget: %p %s
HalFreeMessageTarget: %p %s
HalDpReplaceBegin: %p %s
HalDpReplaceTarget: %p %s
HalDpReplaceControl: %p %s
HalDpReplaceEnd: %p %s
HalPrepareForBugcheck: %p %s
HalQueryWakeTime: %p %s
HalReportIdleStateUsage: %p %s
HalTscSynchronization: %p %s
HalWheaInitProcessorGenericSection: %p %s
HalStopLegacyUsbInterrupts: %p %s
HalReadWheaPhysicalMemory: %p %s
HalWriteWheaPhysicalMemory: %p %s
HalDpMaskLevelTriggeredInterrupts: %p %s
HalDpUnmaskLevelTriggeredInterrupts: %p %s
HalDpGetInterruptReplayState: %p %s
HalDpReplayInterrupts: %p %s
HalQueryIoPortAccessSupported: %p %s
HalHandlerForBus: %p %s
HalHandlerForConfigSpace: %p %s
HalLocateHiberRanges: %p %s
HalRegisterBusHandler: %p %s
HalSetWakeEnable: %p %s
HalSetWakeAlarm: %p %s
HalPciTranslateBusAddress: %p %s
HalPciAssignSlotResources: %p %s
HalHaltSystem: %p %s
HalFindBusAddressTranslation: %p %s
HalResetDisplay: %p %s
HalAllocateMapRegisters: %p %s
KdSetupPciDeviceForDebugging: %p %s
KdReleasePciDeviceforDebugging: %p %s
KdGetAcpiTablePhase0: %p %s
KdCheckPowerButton: %p %s
HalVectorToIDTEntry: %p %s
KdMapPhysicalMemory64: %p %s
KdUnmapVirtualAddress: %p %s
KdGetPciDataByOffset: %p %s
KdSetPciDataByOffset: %p %s
HalGetInterruptVector: %p %s
HalGetVectorInput: %p %s
HalLoadMicrocode: %p %s
HalUnloadMicrocode: %p %s
HalMcUpdatePostUpdate: %p %s
HalAllocateMessageTarget: %p %s
HalFreeMessageTarget: %p %s
HalDpReplaceBegin: %p %s
HalDpReplaceTarget: %p %s
HalDpReplaceControl: %p %s
HalDpReplaceEnd: %p %s
HalPrepareForBugcheck: %p %s
HalQueryWakeTime: %p %s
HalReportIdleStateUsage: %p %s
HalTscSynchronization: %p %s
HalWheaInitProcessorGenericSection: %p %s
HalStopLegacyUsbInterrupts: %p %s
HalReadWheaPhysicalMemory: %p %s
HalWriteWheaPhysicalMemory: %p %s
HalInterruptMaskLevelTriggeredLines: %p %s
HalInterruptUnmaskLevelTriggeredLines: %p %s
HalDpGetInterruptReplayState: %p %s
HalDpReplayInterrupts: %p %s
HalQueryIoPortAccessSupported: %p %s
KdSetupIntegratedDeviceForDebugging: %p %s
KdReleaseIntegratedDeviceForDebugging: %p %s
HalEnlightenmentInitialize: %p %s
HalAllocateEarlyPages: %p %s
HalMapEarlyPages: %p %s
HalTimerGetClockOwner: %p %s
HalTimerGetClockConfiguration: %p %s
HalTimerNotifyProcessorFreeze: %p %s
HalTimerPrepareProcessorForIdle: %p %s
HalDiagRegisterLogRoutine: %p %s
HalTimerResumeProcessorFromIdle: %p %s
HalTimerResetLastClockTick: %p %s
HalVectorToIDTEntryEx: %p %s
HalSecondaryInterruptQueryPrimaryInformation: %p %s
HalMaskInterrupt: %p %s
HalUnmaskInterrupt: %p %s
HalIsInterruptTypeSecondary: %p %s
HalAllocateGsivForSecondaryInterrupt: %p %s
HalAddInterruptRemapping: %p %s
HalRemoveInterruptRemapping: %p %s
HalSaveAndDisableEnlightenment: %p %s
HalRestoreHvEnlightenment: %p %s
HalPciEarlyRestore: %p %s
HalInterruptGetLocalIdentifier: %p %s
HalAllocatePmcCounterSet: %p %s
HalCollectPmcCounters: %p %s
HalFreePmcCounterSet: %p %s
HalTimerQueryCycleCounter: %p %s
HalTimerGetNextTickDuration: %p %s
HalPciMarkHiberPhase: %p %s
HalInterruptQueryProcessorRestartEntryPoint: %p %s
HalInterruptRequestSecondaryInterrupt: %p %s
HalInterruptEnumerateUnmaskedInterrupts: %p %s
HalBiosDisplayReset: %p %s
HalGetDmaAdapter: %p %s
HalCheckPowerButton: %p %s
HalMapPhysicalMemoryWriteThrough64: %p %s
HalUnmapVirtualAddress: %p %s
HalKdReadPCIConfig: %p %s
HalKdWritePCIConfig: %p %s
HalTimerQueryWakeTime: %p %s
HalTimerReportIdleStateUsage: %p %s
HalKdEnumerateDebuggingDevices: %p %s
HalFlushIoRectangleExternalCache: %p %s
HalPowerEarlyRestore: %p %s
HalQueryCapsuleCapabilities: %p %s
HalUpdateCapsule: %p %s
HalPciMultiStageResumeCapable: %p %s
check_hal_private_disp_table: cannot read table, error %d, ntstatus %X
check_hal_private_disp_table: cannot read table, error %d
check_hal_disp_table: cannot read table, error %d, ntstatus %X
check_hal_disp_table: cannot read table, error %d
HalQuerySystemInformation: %p %s
HalSetSystemInformation: %p %s
HalQueryBusSlots: %p %s
HalExamineMBR: %p %s
HalIoReadPartitionTable: %p %s
HalIoSetPartitionInformation: %p %s
HalIoWritePartitionTable: %p %s
HalReferenceHandlerForBus %p %s
HalReferenceBusHandler %p %s
HalDereferenceBusHandler %p %s
HalInitPnpDriver %p %s
HalInitPowerManagement %p %s
HalGetDmaAdapter %p %s
HalGetInterruptTranslator %p %s
HalStartMirroring %p %s
HalEndMirroring %p %s
HalMirrorPhysicalMemory %p %s
HalEndOfBoot %p %s
HalMirrorVerify %p %s
HalGetCachedAcpiTable %p %s
HalSetPciErrorHandlerCallback %p %s
read_hal_apci_disp_table return %X bytes, error %d, ntstatus %X
read_hal_apci_disp_table return %X bytes, error %d
Bad HalAcpiDispatchTable version: %X
read_gdt_size failed, error %d, ntstatus %X
read_gdt_size failed, error %d
Cannot alloc %d bytes for GDT entries
read_gdt failed, error %d, ntstatus %X
read_gdt failed, error %d
Descriptor[%d] %s S %d DPL %d type %X base %X limit %X
WinChecker::dump_ldt failed, error %X, ntstatus %X
WinChecker::dump_ldt failed, error %X
WinChecker::dump_ldt: cannot alloc ldt array, size %X
Ldt[%d]:
Base: X
Limit: X
AVL: %d
D/B: %d
DPL: %d
G: %d
P: %d
S: %d
Type: %d
Cannot read code for kinterrupt(%X) thunk, error %d
IDT patched: unknown type %X selector %X addr %p for int%X
IDT patched: unknown selector %X for int%X
IDT patched: int%X has unknown selector %X base %X limit %X addr %p
IDT patched: int%X addr %p by module %s
IDT int%X addr %p KINTERRUPT %p
IDT patched: int%X addr %p
Int%X: selector %X type TASK DPL %X base %X limit %X
Int%X: selector %X type %X DPL %X addr %p base %X limit %X
Int%X: selector %X type %X DPL %X addr %p
read_idt_size failed, error %d, ntstatus %X
read_idt_size failed, error %d
read_idt: cannot alloc %d bytes for IDT storage
read_idt failed, error %d, ntstatus %X
read_idt failed, error %d
Cannot read kinterrupt (%X), error %d
KInterrupt %X (%p):
Size %X type %X
ServiceRoutine %p %s
DispatchAddress %p %s
check_ob_types: cannot read size of ObTypes list, error %d, ntstatus %X
check_ob_types: cannot read size of ObTypes list, error %d
check_ob_types: cannot read %d bytes (readed %d), error %d, ntstatus %X
check_ob_types: cannot read %d bytes (readed %d), error %d
fill_ob_type: cannot read ObType %S (%X), error %d
Cannot read ObType %S (%X), error %d
ObType %S:
DumpProcedure: %p %s
OpenProcedure: %p %s
CloseProcedure: %p %s
DeleteProcedure: %p %s
ParseProcedure: %p %s
SecurityProcedure: %p %s
QueryNameProcedure: %p %s
OkayToCloseProcedure: %p %s
ZwAlpcConnectPortEx
ZwOpenKeyTransactedEx
ZwOpenKeyEx
ZwOpenKeyTransacted
ZwCreateKeyTransacted
ZwAlpcSendWaitReceivePort
ZwAlpcImpersonateClientOfPort
ZwAlpcDisconnectPort
ZwAlpcDeletePortSection
ZwAlpcCreatePortSection
ZwAlpcCreatePort
ZwAlpcConnectPort
ZwAlpcAcceptConnectPort
ZwUnloadKey2
ZwQueryOpenSubKeysEx
ZwLoadKeyEx
ZwQueryPortInformationProcess
ZwWaitForKeyedEvent
ZwReleaseKeyedEvent
ZwOpenKeyedEvent
ZwCreateKeyedEvent
ZwUnloadKeyEx
ZwSaveKeyEx
ZwRenameKey
ZwLockRegistryKey
ZwLockProductActivationKeys
ZwCompressKey
ZwCompactKeys
ZwYieldExecution
ZwUnloadKey
ZwSetValueKey
ZwSetThreadExecutionState
ZwSetInformationKey
ZwSetDefaultHardErrorPort
ZwSecureConnectPort
ZwSaveMergedKeys
ZwSaveKey
ZwRestoreKey
ZwRequestWaitReplyPort
ZwRequestPort
ZwReplyWaitReplyPort
ZwReplyWaitReceivePortEx
ZwReplyWaitReceivePort
ZwReplyPort
ZwReplaceKey
ZwRegisterThreadTerminatePort
ZwQueryValueKey
ZwQueryOpenSubKeys
ZwQueryMultipleValueKey
ZwQueryKey
ZwQueryInformationPort
ZwOpenKey
ZwNotifyChangeMultipleKeys
ZwNotifyChangeKey
ZwLoadKey2
ZwLoadKey
ZwListenPort
ZwImpersonateClientOfPort
ZwFlushKey
ZwEnumerateValueKey
ZwEnumerateKey
ZwDeleteValueKey
ZwDeleteKey
ZwDelayExecution
ZwCreateWaitablePort
ZwCreatePort
ZwCreateNamedPipeFile
ZwCreateKey
ZwConnectPort
ZwCompleteConnectPort
ZwAcceptConnectPort
FindKiServiceTable: relocation type %d found at X
Cannot read body of %s !
Cannot extract index of %s, error %d
kernel %s don`t contains KeServiceDescriptorTable function !
Cannot find SDT in %s
Cannot read ntdll.dll
Cannot read body of %s!
Cannot read body of ZwYieldExecution!
Cannot extract index of ZwYieldExecution, error %d
Cannot extract index of ZwPlugPlayControl , error %d
%s: %p
SDT entry %X (%s) hooked %p %s!
SDT entry %X hooked %p %s!
Need unhook %d items in SSDT
UNHOOK_ITEM: Index %X Offset %X
Unhook SSDT failed, lasterror %d
Unhooked %d SSDT items
NtUserSetProcessRestrictionExemption
NtUserAcquireIAMKey
NtGdiDdDDICreateKeyedMutex2
NtGdiDdDDIOpenKeyedMutex2
NtGdiDdDDIAcquireKeyedMutex2
NtGdiDdDDIReleaseKeyedMutex2
NtUserSetTHQAPublicKey
NtGdiDdDDIReleaseKeyedMutex
NtGdiDdDDIAcquireKeyedMutex
NtGdiDdDDIDestroyKeyedMutex
NtGdiDdDDIOpenKeyedMutex
NtGdiDdDDICreateKeyedMutex
NtUserEndTouchOperation
NtUserSfmDxReportPendingBindingsToDwm
NtGdiDDCCIGetTimingReport
NtUserUnregisterSessionPort
NtUserRegisterSessionPort
NtUserRegisterErrorReportingDialog
NtGdiSetOPMSigningKeyAndSequenceNumbers
NtGdiGetCertificateSize
NtGdiGetCertificate
NtUserWaitForMsgAndEvent
NtUserVkKeyScanEx
NtUserUnregisterHotKey
NtUserUnlockWindowStation
NtUserUnloadKeyboardLayout
NtUserUnhookWindowsHookEx
NtUserSetWindowStationUser
NtUserSetWindowsHookEx
NtUserSetWindowsHookAW
NtUserSetProcessWindowStation
NtUserSetKeyboardState
NtUserSetImeHotKey
NtUserSetConsoleReserveKeys
NtUserRegisterHotKey
NtUserOpenWindowStation
NtUserMapVirtualKeyEx
NtUserLockWindowStation
NtUserLoadKeyboardLayoutEx
NtUserGetProcessWindowStation
NtUserGetKeyState
NtUserGetKeyNameText
NtUserGetKeyboardState
NtUserGetKeyboardLayoutName
NtUserGetKeyboardLayoutList
NtUserGetImeHotKey
NtUserGetCPD
NtUserGetAsyncKeyState
NtUserCreateWindowStation
NtUserCloseWindowStation
NtUserCheckImeHotKey
NtUserCallMsgFilter
NtUserAlterWindowStyle
NtUserActivateKeyboardLayout
NtGdiScaleViewportExtEx
NtGdiDvpWaitForVideoPortSync
NtGdiDvpUpdateVideoPort
NtGdiDvpGetVideoPortConnectInfo
NtGdiDvpGetVideoPortOutputFormats
NtGdiDvpGetVideoPortLine
NtGdiDvpGetVideoPortInputFormats
NtGdiDvpGetVideoPortFlipStatus
NtGdiDvpGetVideoPortField
NtGdiDvpGetVideoPortBandwidth
NtGdiDvpFlipVideoPort
NtGdiDvpDestroyVideoPort
NtGdiDvpCreateVideoPort
NtGdiDvpCanCreateVideoPort
NtGdiDdSetColorKey
read_shadow_sdt failed, error %d
check_win32k_sdt: cannot alloc %d bytes
Cannot read win32k_sdt at %p size %X, error %d
win32k_sdt[%d] (%s) hooked, addr %p %s
win32k_sdt[%d] hooked, addr %p %s
GetNamedPipeServerProcessId
read_kddb read %X bytes, error %d
cannot read MmNonPagedPoolStart (%p), error %d
cannot read MmNonPagedPoolEnd (%p), error %d
cannot read MmPagedPoolStart (%p), error %d
cannot read MmPagedPoolEnd (%p), error %d
cannot read KernelVerifier (%p), error %d
WindowsType: %S
ETHREAD.StartAddress %X
KiProcessorBlock: %p (%X)
KernelVerifier: %X
KeBugCheckCallbackList: %p (%X)
WorkerRoutine: %p %s
IdleFunction: %p %s
IdleFunction: %p %s
KPRCB[%d].WorkerRoutine: %p %s
KPRCB[%d].IdleFunction: %p %s
KPRCB[%d].IdleFunction: %p %s
read_kpcr return %X bytes, error %d, ntstatus %X
read_kpcr return %X bytes, error %d
KPCR[%d] %p major %X minor %X
KPCR[%d] %p
get_os_info return %X bytes, error %d, ntstatus %X
get_os_info return %X bytes, error %d
NtMajorVersion: %d
NtMinorVersion: %d
BuildNumber: %d
GlobalFlag: %X
Processors: %d
MmVerifierFlags %d
MmSystemSize %d %s
DebuggerEnabled %d
DebuggerNotPresent %d
SafeBootMode %d
NXSupportPolicy %X
CR0 %8.8X %s
CR4 %8.8X %s
Cannot open mailslot %S, error %d
get_mail_slot_owner(%S): returned %d bytes, error %d, ntstatus %X
get_mail_slot_owner(%S): returned %d bytes, error %d
Cannot open named pipe %S, error %d
GetNamedPipeServerProcessId(%S) failed, error %d
get_named_pipe_owner(%S): returned %d bytes, error %d, ntstatus %X
get_named_pipe_owner(%S): returned %d bytes, error %d
read_lpc_port_chars: len %d, returned %d bytes, error %d, ntstatus %X
read_lpc_port_chars: len %d, returned %d bytes, error %d
read_unicode_string: len %d, returned %d bytes, error %d, ntstatus %X
read_unicode_string: len %d, returned %d bytes, error %d
read_drivers_list: cannot get size of drivers list, returned %d bytes, error %d, ntstatus %X
read_drivers_list: cannot get size of drivers list, returned %d bytes, error %d
read_drivers_list: cannot alloc %X bytes for driver list
read_drivers_list: cannot read drivers list, error %d, ntstatus %X
read_drivers_list: cannot read drivers list, error %d
%p:%X flags %X LoadCount %d %s
read_KiThreadSelectNotifyRoutine failed, error %d
read_KiSwapContextNotifyRoutine failed, error %d
read_KiTimeUpdateNotifyRoutine failed, error %d
read_PspLegoNotifyRoutine failed, error %d
read_KiDebugRoutine failed, error %d
read_msrs failed, error %d, ntstatus %X
read_msrs failed, error %d
IManageProcess: Cannot OpenProcess %d
IManageProcess: Cannot open process %d
read_win32_process for PID %X failed, error %d, status %X
read_win32_process for PID %X failed, error %d
read_dword(%p, PID %d) failed, error %d, ntstatus %X
read_dword(%p, PID %d) failed, error %d
read_ptr(%p, PID %d) failed, error %d, ntstatus %X
read_ptr(%p, PID %d) failed, error %d
rp_ReadProcessMemory(%p size %X) from %p error %d
read_token for PID %X failed, error %d, status %X
read_token for PID %X failed, error %d
open_proc(%d, access %X) failed, error %d, ntstatus %X
open_proc(%d, access %X) failed, error %d
rp_OpenProcess(%d, access %X) dwRet %d, error %d
rp_TerminateProcess(%p, %X) dwRet %d, error %d
Major %d Minor %d BuildNumber %d PlatformId %d ServicePackMajor %d ServicePackMinor %d SuiteMask %d ProductType %d CSDVersion %S
ProductType: %X
Cannot open RPC control, error %X
msgsvcsend
_ILocalObjectExporter
IVsShell
IWbemLoginClientID
ICertProtect
_IBTFTPApiEvents
_s_PasswordRecovery
wininet_UrlCache
_IObjectExporter
WMsgAPIs
WMsgKAPIs
INCryptKeyIso
HttpProxyMgrProvider
IKeySvcR
WcnTransportRpc
IPortResolve
IWbemLoginHelper
LRpcSIDKey
ISmartCardRootCerts
IDebugPortSupplier2
IAsyncOperation
IPipelineElement
OnlineProviderCertInterface
IBackgroundCopyJobHttpOptions
HttpProxyMgrClient
IStaticPortMappingCollection
IKeySvc
s_WindowsShutdown
IWebBrowser2
IDebugPortSupplierLocale2
IUPnPHttpHeaderControl
WINHTTP_AUTOPROXY_SERVICE
IErcLuaSupport
IDebugPortSupplier3
IKeySvc2
BackupKey
IWerReport
ICertPassage
IStaticPortMapping
IDebugPortSupplierEx2
IWbemLevel1Login
IWebBrowserApp
msgsvc
IShellWindows
RpcBindingFromStringBinding(%S) failed: %d
RpcMgmtInqIfIds(%S) failed: %d
RpcStringBindingCompose failed: %d
RpcBindingFromStringBinding failed: %d
RpcMgmtInqIfIds failed: %d
%8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X version %d.%d : %s
%8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X version %d.%d : (%s)
RpcMgmtEpEltInqBegin failed: %d
Cannot read npc table, readed %X bytes
rpcrt4
%s.AddressChangeFn: %p %s
rpcrt4_hack::check_myself: exception %d occured
rpcrt4_hack::try_hack: cannot find RpcServerRegisterIfEx
I_RpcInitNdrImports
load_driver(%S) returned %X
Loaded kernel driver: %S
Error loading kernel driver: %ls - 0xx
Error loading kernel driver: %S - 0xx
Error loading kernel driver: %S - OpenSCManager 0xx
tcpip
ClientImmProcessKey
fnHkOPTINLPEVENTMSG
fnHkINLPMSG
fnSENTDDEMSG
fnDWORDOPTINLPMSG
RealMsgWaitForMultipleObjectsEx
PEB.KernelCallbackTable patched, %p
user32_hack::try_hack: bad PE passed
user32_hack::try_hack: cannot read import table
pfnWowMsgBoxIndirectCallback
Unknown apfnDispatch size: %d
%s_hack::try_hack: bad PE passed
%s_hack::try_hack: cannot read exports, error %d
%s_hack::try_hack: cannot find section .data
%s_hack::try_hack: cannot read section .data
%s_hack::try_hack: cannot read section .rdata
%s_hack::try_hack: cannot find section .text
%s_hack::try_hack: cannot read section .text
DxgkReleaseKeyedMutex2
DxgkAcquireKeyedMutex2
DxgkOpenKeyedMutex2
DxgkCreateKeyedMutex2
DxgkReleaseKeyedMutex
DxgkAcquireKeyedMutex
DxgkDestroyKeyedMutex
DxgkOpenKeyedMutex
DxgkCreateKeyedMutex
Cannot read gDxgkInterface, readed %X bytes
WindowHasShadow
DisableProcessWindowsGhosting
zzzUnhookWindowsHook
xxxUpdateWindows
xxxArrangeIconicWindows
SetWindowState
ClearWindowState
SetMsgBox
GetKeyboardType
GetKeyboardLayout
RemotePassthruDisable
xxxRemotePassthruEnable
Cannot read gpsi, readed %X bytes
Cannot read gpsi handlers, readed %X bytes
Cannot read apfnSimpleCall, readed %X bytes
Cannot read gapfnMessageCall, readed %X bytes
Cannot read gapfnScSendMessage, readed %X bytes
Cannot read gaNewProcAddresses, readed %X bytes
Cannot open logfile %S
Cannot create stop event, error %d
Driver %S loaded from %S
SrvGetConsoleKeyboardLayoutName
SrvSetConsoleKeyShortcuts
SrvGetConsoleAliasExes
SrvGetConsoleAliasExesLength
SrvVDMConsoleOperation
SrvGetLargestConsoleWindowSize
SrvExitWindowsEx
winsrv.dll
Unknown size of ConsoleServerApiDispatchTable: %d
Unknown size of UserServerApiDispatchTable: %d
CallUserpExitWindowsEx
GetConsoleAliasExesInternal
GetConsoleAliasExesLengthInternal
SetConsoleKeyShortcuts
GetConsoleKeyboardLayoutNameWorker
SetConsoleOutputCPInternal
GetConsoleOutputCP
GetLargestConsoleWindowSize
reg_ccs_services::read failed - error %d
Cannot open key %S, error %d
SafeSecondaryLog(%d) failed, error %d
SafeSecondaryLog failed, error %d
SafeSendLog(%d) failed, error %d
SafeSendLog failed, error %d
Bad memory %p len %X in dump_hex_buffer
Cannot alloc %d bytes for delayed imports
Cannot alloc %d bytes for imports
read_import_safe(%s) failed %X
Cannot realloc %d bytes for iat
read_delayed_safe(%s) failed %X
store2md_cache: cannot alloc %d bytes
store2md_cache: cannot realloc, alloced %d bytes
wdigest.dll
tspkg.dll
schannel.dll
pku2u.dll
negoexts.dll
msv1_0.dll
livessp.dll
kerberos.dll
umpnpmgr.dll
combase.dll
ntdsa.dll
ntdll.dll
cryptbase.dll
ncrypt.dll
rpcrt4.dll
imm32.dll
user32.dll
kernelbase.dll
kernel32.dll
advapi32.dll
ole32.dll
Cannot alloc %X bytes for relocs
SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\RebootRequired
WS2_32.dll
RPCRT4.dll
GetProcessHeap
GetWindowsDirectoryA
KERNEL32.dll
RegCloseKey
RegOpenKeyExW
RegOpenKeyExA
RegCreateKeyExW
ADVAPI32.dll
GetWindowsDirectoryW
GetCPInfo
RegQueryInfoKeyW
RegEnumKeyW
zcÁ
.?AVMyWindowsChecker@@
.?AV?$rpcrt4_hack@U_IMAGE_NT_HEADERS@@@@
.?AVtcpip_hack@@
.?AV?$import_holder@U_IMAGE_NT_HEADERS@@@CMN@@
.?AVinmem_import_holder@CMN@@
.?AVimport_holder_intf@CMN@@
.?AVmodule_import@CMN@@
<requestedExecutionLevel level="requireAdministrator" uiAccess="false"/>
aR.Rn
X.UJ^A
w%xyW
f.Gkf
%0X0m0
>$?(?,?0?
3&4;456?90:
77g7
7>7[7`7|7
6#8*878^8~8
<#<0<^<@=
11_1
0#101#202
0 11h1J3
< <$<(<,<0<
6%7S7
7*717>7[8
=!>&>9>>>
7&7@7l78N8V8z8
:);4;>;\;
0%0X0
= >$>(>,>0>
?,?4?<?\?|?
.----/01/01/01
KERNEL32.DLL
mscoree.dll
U%SystemRoot%\system32\svchost.exe
%SystemRoot%\system32\svchost
WSOCKTRANSPORT
TCPIP6
TCPIP
STORPORT
STORMINIPORT
SOFTPCI
SCSIPORT
SCSIMINIPORT
SBP2PORT
FCPORT
PassiveWatchdogTimeout
sImageExecutionOptions
ErrorPortStartTimeout
ErrorPortCommTimeout
DisablePagingExecutive
DebuggerMaxModuleMsgs
CountOperations
B\\.\
Psapi.dll
sWindows PowerShell
tHost Process for Windows Tasks
Windows Problem Reporting 32 bit
Windows Problem Reporting
Windows Modules Installer
mWindows Start-Up Application
tWindows Search Indexer
sWindows Server Initial Configuration Tasks
Windows Media Player
Dump Reporting Tool
Error Reporter
rWindows Control Panel 32 bit
Windows Control Panel
Windows Connect Now - Config Registrar Service
Windows Media Player Network Sharing Service
Windows firewall
Windows Error Reporting Service
tWindows Defender
vError reporting service
eWindows update service
Windows Image Acquisition
WebClient
tWindows Security Center Notification App
yWindows Based Script Host
Windows installer 32 bit
Windows installer
Windows 16-bit Virtual Machine
Windows Management Instrumentation
Windows User Mode Driver Manager
MS tftp
MS ftp 32 bit
MS ftp
Microsoft Help and Support Center
Cmd.exe 32 bit
Cmd.exe
Windows Logon User Interface Host
Windows update
tGoogle Chrome
rOpera Internet Browser
Mozilla Thunderbird Mail and News Client
dFirefox browser
Services.exe
%SystemRoot%\msagent\agentsvr.exe
%SystemRoot%\System32\dfrgfat.exe
%SystemRoot%\System32\dfrgntfs.exe
%SystemRoot%\System32\services.exe
%SystemRoot%\System32\svchost.exe
%SystemRoot%\System32\alg.exe
%SystemRoot%\System32\spoolsv.exe
%SystemRoot%\System32\net.exe
%SystemRoot%\System32\net1.exe
%SystemRoot%\System32\cmd.exe
%SystemRoot%\System32\notepad.exe
%SystemRoot%\System32\calc.exe
%SystemRoot%\System32\PTF.exe
%SystemRoot%\System32\tPTF.exe
%SystemRoot%\System32\telnet.exe
%SystemRoot%\System32\taskkill.exe
%SystemRoot%\System32\ctfmon.exe
%SystemRoot%\System32\wdfmgr.exe
%SystemRoot%\System32\mmc.exe
%SystemRoot%\System32\userinit.exe
%SystemRoot%\System32\wbem\wmiprvse.exe
%SystemRoot%\System32\wbem\wmiadap.exe
%SystemRoot%\explorer.exe
%SystemRoot%\System32\lsass.exe
%SystemRoot%\System32\winlogon.exe
%SystemRoot%\System32\LogonUI.exe
%SystemRoot%\System32\wuauclt.exe
%SystemRoot%\System32\wuauclt1.exe
%SystemRoot%\System32\CCM\CcmExec.exe
%SystemRoot%\System32\csrss.exe
%SystemRoot%\System32\smss.exe
\SystemRoot\System32\smss.exe
%SystemRoot%\System32\inetsrv\w3wp.exe
%SystemRoot%\System32\schtasks.exe
%SystemRoot%\System32\tstheme.exe
%SystemRoot%\System32\control.exe
%SystemRoot%\System32\taskmgr.exe
%SystemRoot%\System32\dwwin.exe
%SystemRoot%\System32\drwtsn32.exe
%SystemRoot%\System32\dumprep.exe
%SystemRoot%\System32\dfssvc.exe
%SystemRoot%\System32\dllhost.exe
%SystemRoot%\System32\ntvdm.exe
%SystemRoot%\System32\rundll32.exe
%SystemRoot%\System32\msiexec.exe
%SystemRoot%\System32\mshta.exe
%SystemRoot%\System32\regsvr32.exe
%SystemRoot%\System32\cscript.exe
%SystemRoot%\System32\wscript.exe
%SystemRoot%\System32\wscntfy.exe
%SystemRoot%\System32\mstsc.exe
%SystemRoot%\System32\dashost.exe
far.exe
Far.exe
CLSID\{FC7D9E02-3F9E-11d3-93C0-00C04F72DAF7}\InprocServer32
CLSID\{73FDDC80-AEA9-101A-98A7-00AA00374959}\LocalServer32
CLSID\{0002DF01-0000-0000-C000-000000000046}\LocalServer32
iedw.exe
%SystemRoot%\System32\oobechk.exe
%SystemRoot%\System32\oobe.exe
%SystemRoot%\System32\psxss.exe
%SystemRoot%\System32\internat.exe
AcroRd32.exe
excel.exe
outlook.exe
winword.exe
powerpnt.exe
wmplayer.exe
firefox.exe
thunderbird.exe
Opera.exe
WinRAR.exe
%SystemRoot%\System32\wininit.exe
%SystemRoot%\System32\lsm.exe
%SystemRoot%\System32\dwm.exe
%SystemRoot%\System32\werfault.exe
%SystemRoot%\System32\taskeng.exe
%SystemRoot%\System32\conime.exe
%SystemRoot%\System32\wudfhost.exe
%SystemRoot%\System32\taskhost.exe
%SystemRoot%\System32\conhost.exe
%SystemRoot%\System32\rdpclip.exe
%SystemRoot%\System32\SearchFilterHost.exe
%SystemRoot%\System32\SearchProtocolHost.exe
csrss.exe
svchost.exe
alg.exe
sPptpMiniport
Tcpip
psapi.dll
127.0.0.1
\\.\pipe\
\\.\mailslot\
SOFTWARE\Microsoft\Windows NT\CurrentVersion
\\.\Pipe\
\\.\Mailslot\
ncacn_ip_tcp:
ncadg_ip_udp:
\\pipe\\
SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\
SOFTWARE\Microsoft\PowerShell\1\ShellIds\Microsoft.PowerShell
RemediationExe
SOFTWARE\Classes\SCCM.VAppLauncher\shell\Open\command
SOFTWARE\Classes\CLSID\{00AAB372-0D6D-4976-B5F5-9BC7605E30BB}\LocalServer32
SOFTWARE\Classes\CLSID\{3C296D07-90AE-4FAC-86F9-65EAA8B82D22}\LocalServer32
SOFTWARE\Classes\CLSID\{D63B10C5-BB46-4990-A94F-E40B9D520160}\LocalServer32
SOFTWARE\Classes\CLSID\{03e64e17-b220-4052-9b9b-155f9cb8e016}\LocalServer32
SOFTWARE\Classes\CLSID\{1F69F884-285E-418E-9715-B9EEE402DD5F}\LocalServer32
Software\Microsoft\Windows\CurrentVersion\WINEVT\publishers
Windows checker
1.0.0.3432
wincheck.exe
0, 0, 8, 16

FeEQMIQs.exe_1552_rwx_05990000_00001000:

.text
.rdata
@.data

FeEQMIQs.exe_1552_rwx_06230000_00004000:

Web Client Network
Microsoft Windows Network

FeEQMIQs.exe_1552_rwx_06240000_00004000:

Microsoft Windows Network

FeEQMIQs.exe_1552_rwx_06250000_00004000:

Microsoft Windows Network
\\WEBHOST

jWcYYUcg.exe_524_rwx_00401000_000EA000:

C{?%f{[
7.qU6
TNcMdI
vND.LOrg<
.eH^\
w|.LV
QfC%d
dW0WaZ@%di
O%%Sg
[%dZr
l}9fT{
E!.Lg:
\D.vY
m.TpM
.WYky?
?%sn6
.wbK3
Am%foEW
%d[k#
k[w[.dx
Ho%sd^
.pgVM
.XU\:
.TU:67Y[
mre%s
Rx.AF{-F
.dA}R
9zE46}GF{-A}d8
Rx.AMb
Rx.AJ
Vy-A}y1
]~]{:&]{>
Mr.0M8.wM
F@%uF
[email protected]
r|M-
9Q2.QD
s]{>EkAC.AZ?
]mYS_;-h}_/
%s>Ab
GcMd
7FZZZZ%
&aTF{-A}d8
Rx.AZu`\Vb)
Rx.AN~2
Rx.AF z
x.ASs)
Rx.AF{-6s z
]sc.Pu<
).KQ>6V
yT%FZ
d?%x1
u2S.cp
~%m"%U
R.BFX7
.Cd"w
/1:,*-.1
#k%U,
:EW.yY
%cMV=
hC%x}7
.Gl^z
>fAd:%U
.cW a
]{.iA8
8=d0,.eJ
KV.eb
.CYf?a8
=Btcp
c.lI'
c.fI!
x.sd6
4%UMv
4%UEInb
2software\microsoft\windows\currentversion\run
%uNaO
.YtUO
Microsoft Windows eine Wiederherstellung in einem Moment beginnen.
.klicken, um zu kopieren
Strafe zahlen. Jeder Versuch, diese Nachricht zu entfernen werden die Dateien, Hardware und Windows-Installation unwiederbringlich besch
ffnen Sie den Internet-Browser. An die Adresse gehen: blockchain.info/wallet und klicken Sie auf 'Erstellen Sie ein neues Wallet'.,
Geben Sie Ihre E-Mail-Adresse (optional) und Ihr Passwort ein. Achten Sie darauf, Ihr Passwort sicher ist.-
Sparen Sie Ihr Passwort sicher, vorzugsweise offline (klicken Notepad)..
Folgen Sie den Anweisungen auf der Website aufgefordert werden, und achten Sie genau auf die Sicherheitsempfehlungen.1
.Machen BitCoin Zahlung:2
|Anmeldung zu Ihrem Bitcoin Wallet blockchain.info/wallet/login5
DKlicken Sie auf "Import / Export".6
- und Kleinschreibung) indem Sie es und klicken Sie auf 'Add Private Key'.7
8Klicken Sie auf "Sweep Key".9
.Internationale Anbieter=
WebbrowserD
&de.bitcoin.it/wiki/G
Kennen Sie die Gefahren der Verletzung des Urheberrechts. Besuchen copyright.gov/help/faq/faq-infringement.html f
~Microsoft Windows will begin a restoration process in a moment.
Operation Global 3 is a coordinated effort by U.S., Canadian and European law enforcement agencies targeting computers with pirated content.$
Open Internet Browser. Go to the address: blockchain.info/wallet and click 'Start A New Wallet'.,
Enter your e-mail address(optional) and password. Make sure your password is secure.-
zSave your password safely, preferably offline(click Notepad)..
Follow the steps prompted on the website and pay close attention to the security recommendations.1
tLogin to your Bitcoin wallet blockchain.info/wallet/login 5
4Click on Import / Export. 6
Enter the paper wallet's private key by typing it manually (case sensitive) and click on 'Add Private Key'.7
$Click 'Sweep Key'.9
.International Exchanges=
&en.bitcoin.it/wiki/G
Know the dangers of copyright infringement. Visit copyright.gov/help/faq/faq-infringement.html for more information.J
un reato federale che porta pene fino a cinque anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (17 USC s.506, 18 USC s.2319)
un crimine federale che comporta pene fino a quindici anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (18 USC s.2339A)
Microsoft Windows inizier
Importo:
Qualsiasi tentativo di rimuovere questo messaggio potrebbe danneggiare il vostro file, hardware e di installazione di Windows oltre il recupero."
Operazione globale III dagli Stati Uniti, Canada, Europa, Australia, Nuova Zelanda e altre forze dell'ordine di tutto il mondo
\Registrazione di un nuovo portafoglio BitCoin: 
Aprire Internet Browser. Vai all'indirizzo: blockchain.info/wallet e cliccare su 'Crea un nuovo Portafoglio'.,
Inserisci il tuo indirizzo e-mail (opzionale) e la password. Assicurati che il tuo password
Salvare la password in modo sicuro, preferibilmente non in linea (fare clic su Notepad)..
Seguire i passaggi spinto sul sito e prestare la massima attenzione alle raccomandazioni di sicurezza.1
|Accedi al tuo portafoglio Bitcoin blockchain.info/wallet/login5
<Clicca su 'Importa / Esporta'.6
Inserire la chiave privata 'Paper Wallet' digitando manualmente (maiuscole e minuscole) e fare clic su 'Add Private Key'.7
2Fare clic su 'Sweep Key'.9
&it.bitcoin.it/wiki/G
Conoscere i pericoli di violazione del copyright. Visita copyright.gov/help/faq/faq-infringement.html per maggiori informazioni.J
Microsoft Windows se iniciar
Fine Importe:
n de Windows sin posibilidad de recuperaci
Operaci
n: blockchain.info/wallet y haga clic en 'Crear un nuevo monedero'.,
gina web y prestar mucha atenci
pAcceda a su cartera blockchain.info/wallet/login Bitcoin5
FHaga clic en "Importar / Exportar".6
sculas) y haga clic en" Add Private Key ".7
2Haga clic en 'Sweep Key'.9
Navegador WebD
&es.bitcoin.it/wiki/G
n de copyright. Visita copyright.gov/help/faq/faq-infringement.html para m

jWcYYUcg.exe_524_rwx_00720000_00001000:

%WinDir%\TEMP

jWcYYUcg.exe_524_rwx_00780000_00001000:

%Documents and Settings%\LocalService\NwIscAww\rSwooYMM

jWcYYUcg.exe_524_rwx_00790000_00001000:

%Documents and Settings%\All Users\hUEQccwo\FeEQMIQs

jWcYYUcg.exe_524_rwx_007B0000_000E9000:

C{?%f{[
7.qU6
TNcMdI
vND.LOrg<
.eH^\
w|.LV
QfC%d
dW0WaZ@%di
O%%Sg
[%dZr
l}9fT{
E!.Lg:
\D.vY
m.TpM
.WYky?
?%sn6
.wbK3
Am%foEW
%d[k#
k[w[.dx
Ho%sd^
.pgVM
.XU\:
.TU:67Y[
mre%s
Rx.AF{-F
.dA}R
9zE46}GF{-A}d8
Rx.AMb
Rx.AJ
Vy-A}y1
]~]{:&]{>
Mr.0M8.wM
F@%uF
[email protected]
r|M-
9Q2.QD
s]{>EkAC.AZ?
]mYS_;-h}_/
%s>Ab
GcMd
7FZZZZ%
&aTF{-A}d8
Rx.AZu`\Vb)
Rx.AN~2
Rx.AF z
x.ASs)
Rx.AF{-6s z
]sc.Pu<
).KQ>6V
yT%FZ
d?%x1
u2S.cp
~%m"%U
R.BFX7
.Cd"w
/1:,*-.1
#k%U,
:EW.yY
%cMV=
hC%x}7
.Gl^z
>fAd:%U
.cW a
]{.iA8
8=d0,.eJ
KV.eb
.CYf?a8
=Btcp
x.sd6
4%UMv
4%UEInb
%uNaO
.YtUO
Microsoft Windows eine Wiederherstellung in einem Moment beginnen.
.klicken, um zu kopieren
Strafe zahlen. Jeder Versuch, diese Nachricht zu entfernen werden die Dateien, Hardware und Windows-Installation unwiederbringlich besch
ffnen Sie den Internet-Browser. An die Adresse gehen: blockchain.info/wallet und klicken Sie auf 'Erstellen Sie ein neues Wallet'.,
Geben Sie Ihre E-Mail-Adresse (optional) und Ihr Passwort ein. Achten Sie darauf, Ihr Passwort sicher ist.-
Sparen Sie Ihr Passwort sicher, vorzugsweise offline (klicken Notepad)..
Folgen Sie den Anweisungen auf der Website aufgefordert werden, und achten Sie genau auf die Sicherheitsempfehlungen.1
.Machen BitCoin Zahlung:2
|Anmeldung zu Ihrem Bitcoin Wallet blockchain.info/wallet/login5
DKlicken Sie auf "Import / Export".6
- und Kleinschreibung) indem Sie es und klicken Sie auf 'Add Private Key'.7
8Klicken Sie auf "Sweep Key".9
.Internationale Anbieter=
WebbrowserD
&de.bitcoin.it/wiki/G
Kennen Sie die Gefahren der Verletzung des Urheberrechts. Besuchen copyright.gov/help/faq/faq-infringement.html f
~Microsoft Windows will begin a restoration process in a moment.
Operation Global 3 is a coordinated effort by U.S., Canadian and European law enforcement agencies targeting computers with pirated content.$
Open Internet Browser. Go to the address: blockchain.info/wallet and click 'Start A New Wallet'.,
Enter your e-mail address(optional) and password. Make sure your password is secure.-
zSave your password safely, preferably offline(click Notepad)..
Follow the steps prompted on the website and pay close attention to the security recommendations.1
tLogin to your Bitcoin wallet blockchain.info/wallet/login 5
4Click on Import / Export. 6
Enter the paper wallet's private key by typing it manually (case sensitive) and click on 'Add Private Key'.7
$Click 'Sweep Key'.9
.International Exchanges=
&en.bitcoin.it/wiki/G
Know the dangers of copyright infringement. Visit copyright.gov/help/faq/faq-infringement.html for more information.J
un reato federale che porta pene fino a cinque anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (17 USC s.506, 18 USC s.2319)
un crimine federale che comporta pene fino a quindici anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (18 USC s.2339A)
Microsoft Windows inizier
Importo:
Qualsiasi tentativo di rimuovere questo messaggio potrebbe danneggiare il vostro file, hardware e di installazione di Windows oltre il recupero."
Operazione globale III dagli Stati Uniti, Canada, Europa, Australia, Nuova Zelanda e altre forze dell'ordine di tutto il mondo
\Registrazione di un nuovo portafoglio BitCoin: 
Aprire Internet Browser. Vai all'indirizzo: blockchain.info/wallet e cliccare su 'Crea un nuovo Portafoglio'.,
Inserisci il tuo indirizzo e-mail (opzionale) e la password. Assicurati che il tuo password
Salvare la password in modo sicuro, preferibilmente non in linea (fare clic su Notepad)..
Seguire i passaggi spinto sul sito e prestare la massima attenzione alle raccomandazioni di sicurezza.1
|Accedi al tuo portafoglio Bitcoin blockchain.info/wallet/login5
<Clicca su 'Importa / Esporta'.6
Inserire la chiave privata 'Paper Wallet' digitando manualmente (maiuscole e minuscole) e fare clic su 'Add Private Key'.7
2Fare clic su 'Sweep Key'.9
&it.bitcoin.it/wiki/G
Conoscere i pericoli di violazione del copyright. Visita copyright.gov/help/faq/faq-infringement.html per maggiori informazioni.J
Microsoft Windows se iniciar
Fine Importe:
n de Windows sin posibilidad de recuperaci
Operaci
n: blockchain.info/wallet y haga clic en 'Crear un nuevo monedero'.,
gina web y prestar mucha atenci
pAcceda a su cartera blockchain.info/wallet/login Bitcoin5
FHaga clic en "Importar / Exportar".6
sculas) y haga clic en" Add Private Key ".7
2Haga clic en 'Sweep Key'.9
Navegador WebD
&es.bitcoin.it/wiki/G
n de copyright. Visita copyright.gov/help/faq/faq-infringement.html para m

jWcYYUcg.exe_524_rwx_00BA0000_00001000:

%Documents and Settings%\LocalService\NwIscAww\rSwooYMM.inf

jWcYYUcg.exe_524_rwx_00BB0000_00001000:

%Documents and Settings%\All Users\hUEQccwo\FeEQMIQs.inf

jWcYYUcg.exe_524_rwx_00BC0000_00001000:

%Documents and Settings%\LocalService\NwIscAww\rSwooYMM.exe

jWcYYUcg.exe_524_rwx_00BD0000_00001000:

%Documents and Settings%\All Users\hUEQccwo\FeEQMIQs.exe

jWcYYUcg.exe_524_rwx_00C00000_00001000:

rSwooYMM.exe

jWcYYUcg.exe_524_rwx_00C10000_00001000:

FeEQMIQs.exe

jWcYYUcg.exe_524_rwx_00C20000_00001000:

taskkill /FI "USERNAME eq SYSTEM" /F /IM rSwooYMM.exe

jWcYYUcg.exe_524_rwx_00C30000_00001000:

taskkill /FI "USERNAME eq SYSTEM" /F /IM FeEQMIQs.exe


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    cscript.exe:468
    cscript.exe:884
    cscript.exe:312
    cscript.exe:1168
    cscript.exe:1200
    cscript.exe:1876
    cscript.exe:272
    cscript.exe:844
    cscript.exe:496
    cscript.exe:1784
    cscript.exe:204
    cscript.exe:1948
    cscript.exe:852
    cscript.exe:536
    cscript.exe:1076
    cscript.exe:1732
    cscript.exe:1072
    cscript.exe:1252
    cscript.exe:544
    cscript.exe:1652
    cscript.exe:548
    cscript.exe:1564
    cscript.exe:1244
    cscript.exe:996
    cscript.exe:1312
    cscript.exe:208
    cscript.exe:676
    cscript.exe:1612
    cscript.exe:920
    cscript.exe:1956
    cscript.exe:168
    cscript.exe:164
    cscript.exe:224
    cscript.exe:1508
    cscript.exe:372
    cscript.exe:1640
    cscript.exe:1188
    cscript.exe:1824
    cscript.exe:1628
    cscript.exe:968
    cscript.exe:1604
    cscript.exe:1240
    cscript.exe:2000
    cscript.exe:1980
    cscript.exe:476
    cscript.exe:532
    cscript.exe:1100
    cscript.exe:436
    cscript.exe:1004
    cscript.exe:820
    cscript.exe:1416
    cscript.exe:1512
    %original file name%.exe:1788
    %original file name%.exe:1324
    %original file name%.exe:884
    %original file name%.exe:1780
    %original file name%.exe:1564
    %original file name%.exe:1168
    %original file name%.exe:332
    %original file name%.exe:272
    %original file name%.exe:996
    %original file name%.exe:1640
    %original file name%.exe:176
    %original file name%.exe:496
    %original file name%.exe:1488
    %original file name%.exe:1784
    %original file name%.exe:204
    %original file name%.exe:692
    %original file name%.exe:1588
    %original file name%.exe:1056
    %original file name%.exe:668
    %original file name%.exe:1072
    %original file name%.exe:1136
    %original file name%.exe:956
    %original file name%.exe:1500
    %original file name%.exe:548
    %original file name%.exe:1400
    %original file name%.exe:528
    %original file name%.exe:828
    %original file name%.exe:1236
    %original file name%.exe:448
    %original file name%.exe:756
    %original file name%.exe:896
    %original file name%.exe:1792
    %original file name%.exe:676
    %original file name%.exe:1356
    %original file name%.exe:1152
    %original file name%.exe:244
    %original file name%.exe:1512
    %original file name%.exe:164
    %original file name%.exe:224
    %original file name%.exe:480
    %original file name%.exe:868
    %original file name%.exe:900
    %original file name%.exe:852
    %original file name%.exe:1188
    %original file name%.exe:1528
    %original file name%.exe:928
    %original file name%.exe:356
    %original file name%.exe:1980
    %original file name%.exe:532
    %original file name%.exe:1668
    %original file name%.exe:920
    %original file name%.exe:1572
    %original file name%.exe:1004
    %original file name%.exe:1380
    %original file name%.exe:376

  2. Delete the original Trojan file.
  3. Delete or disinfect the following files created/modified by the Trojan:

    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dog.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Documents\My Music\Sample Music\New Stories (Highway Blues).wma.exe (11518 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\adm.bmp.exe (7385 bytes)
    C:\totalcmd\TCMADMIN.EXE.exe (7433 bytes)
    C:\totalcmd\TOTALCMD.EXE.exe (35505 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\snowflake.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\guitar.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\lift-off.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\kick.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\butterfly.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\palm tree.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\guest.bmp.exe (7385 bytes)
    C:\totalcmd\TCUNINST.EXE.exe (7385 bytes)
    C:\totalcmd\TcUsbRun.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\duck.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\red flower.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dirt bike.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\MAAo.txt (55978 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\horses.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\pink flower.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\astronaut.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\cat.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\chess.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\ball.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\skater.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Blue hills.jpg.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\beach.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Water lilies.jpg.exe (7433 bytes)
    %Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Sunset.jpg.exe (7433 bytes)
    C:\totalcmd\TCMDX32.EXE.exe (7433 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\frog.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\fish.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\airplane.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Winter.jpg.exe (7433 bytes)
    %Documents and Settings%\%current user%\Local Settings\Application Data\Adobe\Reader 9.3\Setup Files\Setup.exe (7971 bytes)
    %Documents and Settings%\All Users\Documents\My Music\Sample Music\Beethoven's Symphony No. 9 (Scherzo).wma.exe (10177 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\drip.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\car.bmp.exe (7385 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\HEAoIgUQ.bat (112 bytes)
    C:\6ed750e80b585b72e5a7b8b97e9a7f62 (37 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\uYIskYcU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\eYAkcIsw.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\KAAwgEUk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\TEQsYUsA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\HEIYwggc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\EqAMIYwY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\VIYgswYI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\MkgAEYoY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\BigYMEgw.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\xQMwMAYM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\hsEYUMAw.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\gYUogwAA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\sukQYUME.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\SAksokMk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\yGoMQwwY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\zuIwgwME.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\EQgwogog.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\NeockEow.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\DEwAocgM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ssUYYYEQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\HggcwEEM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\RyEAkEsE.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\sSsUoQIw.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\xiEUcAYM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IAkYsAcc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\dasIsQkI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsscEoEw.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\FaAMckUA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\LiYcwYYQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\lCskAMAc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\dkoQgcQI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GacAQMYA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\EigMAUQY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\qGAkAMoQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nyQEYcYE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\bskwIMok.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\LMMoQsMU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\NgAIcwQQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\SmcUwwkA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ZUgUgwcI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\lUQssoII.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\sEgMoIko.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ruMwYAYE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nSkwUMoI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XsUQkYAE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XIwkkMoo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\PCgAIkQw.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\BEwMYsEI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\yKwUoAAE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\AksAIAgg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\aiQIocgY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ygUYUIkU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\hycEIYUs.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GAAMEoUs.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\yeYUosEs.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\zWQQsosA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\RUoUUEUU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GoMkIYEw.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XOYAAwww.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\aWYUgsAs.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\FaAQgwwI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ZwIEAYwY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\fOEQowoc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XasYsgMo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\WKkgUAIc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\acwEgkEQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\YgMIkUsY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\jassQkkg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\LUYQskYw.bat (112 bytes)
    %Documents and Settings%\%current user%\NwIscAww\rSwooYMM.exe (7713 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\TmkMcYYg.bat (112 bytes)
    %Documents and Settings%\All Users\BOAMIgUE\jWcYYUcg.exe (7737 bytes)
    %Documents and Settings%\All Users\hUEQccwo\FeEQMIQs.exe (7761 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XowMowgo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\jGwQwMwI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\EcwggIoQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\neUEAowU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GKYIgIEU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XygAcQsM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\WgEYowgY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\VSYwQoUo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ugMsAsQM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ksQAUYYo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\vYoQgsUM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\PckcgAIo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\vaUgoMgI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XYEYcYEU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ZIMQUkQY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\aYwgkQYk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GIoUMosQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\kiwwMUEQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\zwEIsAAI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\KIIoUQsk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\OWQcIsAQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\BIccgscI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\jscYcMII.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\BEkQwwEo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\NKwQkUkg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XCkAksQk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\PWsEkQcU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\tOgMkkgc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\iKccYIYw.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\SkgwcEIU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\zaIAMwAU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\cOEwMsck.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\icEgEUwo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\gYAYQAwI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\syIUEcgg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\EQEYUMcE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\qaMQIIwg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\iSYAYQsw.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\HuIkwooQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\qEgskkUI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\wwIkYEwA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\bQAYkIEM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\leQAEEQA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\saUAUEQs.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\xgMkkwcI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\OgUAcYcY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\EcMsIEEU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nkIcMQUI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\KIYEwwkA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\FkAkwgkI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\cegQAsog.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\pUMscoQI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\VkIssEYE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\pYoQQEMc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IYIkogQA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\poIIMcos.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\rUwssQgY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\FAYQgIgc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\leAQYIkM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\usMUMAcI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\MAwwswws.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\dqwEowIk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\VsgcYUco.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ySwIEUII.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\UEoAwEoo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\jQccMsEY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\xyYwkkcM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\JQAEoAAs.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\HwsMcsAE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\OCMAowIc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\vQYEMUQw.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\TYQAMckY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\rmoYIYMU.bat (4 bytes)

  4. Delete the following value(s) in the autorun key (How to Work with System Registry):

    [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
    "rSwooYMM.exe" = "%Documents and Settings%\%current user%\NwIscAww\rSwooYMM.exe"

    [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "FeEQMIQs.exe" = "%Documents and Settings%\All Users\hUEQccwo\FeEQMIQs.exe"

  5. Remove the references to the Trojan by modifying the following registry value(s) (How to Work with System Registry):

    [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "UserInit" = "%System%\userinit.exe,%Documents and Settings%\All Users\hUEQccwo\FeEQMIQs.exe,"

  6. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  7. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now