Gen.Variant.Kazy.535449_9fb0486bcd

by malwarelabrobot on January 21st, 2015 in Malware Descriptions.

HEUR:Trojan.Win32.Generic (Kaspersky), Gen:Variant.Kazy.535449 (B) (Emsisoft), Gen:Variant.Kazy.535449 (AdAware), ZeroAccess.YR (Lavasoft MAS)
Behaviour: Trojan


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: 9fb0486bcd86f30c0ca0466f44c678b6
SHA1: 5ff7d24b853660f665cfb0856a86cd03c630bbc9
SHA256: c8e8e7b5b3bd70189a8ac2bfb565245ba08bb7495fd96f9a1dc4bf8c3960ab1a
SSDeep: 6144:4JnhtSmOkISzFHXp55kA10cpAsxetEtPq6ExMeK5DkMcKa99Hcsmn5Ewh:4JnhtfESZ3yAZysQE06Z5YMcDbHauw
Size: 467968 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2015-01-06 02:36:08
Analyzed on: WindowsXP SP3 32-bit


Summary:

Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).

Payload

No specific payload has been found.

Process activity

The Trojan creates the following process(es):

cscript.exe:2712
cscript.exe:2980
cscript.exe:3076
cscript.exe:668
cscript.exe:2844
cscript.exe:2184
cscript.exe:4024
cscript.exe:3324
cscript.exe:3656
cscript.exe:3808
cscript.exe:3120
cscript.exe:2528
cscript.exe:3256
cscript.exe:3792
cscript.exe:3856
cscript.exe:2156
cscript.exe:1468
cscript.exe:2400
cscript.exe:2292
cscript.exe:2244
cscript.exe:548
cscript.exe:2240
cscript.exe:760
cscript.exe:3760
cscript.exe:1316
cscript.exe:3836
cscript.exe:2916
cscript.exe:3884
cscript.exe:3936
cscript.exe:1796
cscript.exe:2924
cscript.exe:3132
cscript.exe:3804
cscript.exe:3640
cscript.exe:2332
cscript.exe:3248
cscript.exe:2312
cscript.exe:2068
cscript.exe:2144
cscript.exe:2392
cscript.exe:412
cscript.exe:2140
cscript.exe:2792
cscript.exe:2796
cscript.exe:3772
cscript.exe:4092
cscript.exe:3276
cscript.exe:740
cscript.exe:3148
cscript.exe:3208
cscript.exe:2820
cscript.exe:4044
cscript.exe:3384
cscript.exe:2540
cscript.exe:304
cscript.exe:2544
cscript.exe:3024
cscript.exe:4048
cscript.exe:2304
cscript.exe:2412
cscript.exe:2176
cscript.exe:3292
cscript.exe:2660
cscript.exe:1652
cscript.exe:1016
cscript.exe:2668
cscript.exe:3580
cscript.exe:2444
cscript.exe:2936
cscript.exe:3952
cscript.exe:1336
cscript.exe:2932
cscript.exe:1984
cscript.exe:2764
cscript.exe:296
cscript.exe:2836
cscript.exe:248
cscript.exe:2044
cscript.exe:3152
cscript.exe:3012
cscript.exe:1380
cscript.exe:2572
cscript.exe:3468
cscript.exe:3092
cscript.exe:3512
cscript.exe:2376
cscript.exe:1632
cscript.exe:2484
cscript.exe:2616
cscript.exe:620
cscript.exe:2612
cscript.exe:3616
cscript.exe:2476
cscript.exe:2920
cscript.exe:3800
cscript.exe:2452
cscript.exe:2808
cscript.exe:252
cscript.exe:3900
cscript.exe:3296
cscript.exe:2288
cscript.exe:172
cscript.exe:3916
cscript.exe:2880
cscript.exe:3368
cscript.exe:1980
cscript.exe:2976
cscript.exe:2888
cscript.exe:2404
cscript.exe:2160
cscript.exe:3160
cscript.exe:500
cscript.exe:1212
cscript.exe:3600
cscript.exe:2812
cscript.exe:3872
cscript.exe:2088
cscript.exe:3876
cscript.exe:2180
cscript.exe:3520
cscript.exe:3288
cscript.exe:3724
cscript.exe:1912
cscript.exe:1916
cscript.exe:964
cscript.exe:2212
cscript.exe:1992
cscript.exe:3376
cscript.exe:2892
cscript.exe:3964
cscript.exe:2356
cscript.exe:2692
cscript.exe:2860
cscript.exe:4084
cscript.exe:3636
cscript.exe:2432
cscript.exe:3220
cscript.exe:2816
cscript.exe:3064
cscript.exe:236
cscript.exe:3068
cscript.exe:1968
cscript.exe:2224
cscript.exe:1612
cscript.exe:2740
cscript.exe:1692
cscript.exe:2744
cscript.exe:2508
cscript.exe:1560
cscript.exe:200
cscript.exe:204
cscript.exe:3620
cscript.exe:3624
cscript.exe:2728
cscript.exe:1888
cscript.exe:2132
cscript.exe:484
cscript.exe:3052
cscript.exe:2120
cscript.exe:3780
cscript.exe:3540
cscript.exe:1280
cscript.exe:2232
cscript.exe:1288
cscript.exe:3424
cscript.exe:2000
cscript.exe:3192
cscript.exe:2532
cscript.exe:2536
%original file name%.exe:668
%original file name%.exe:3928
%original file name%.exe:3648
%original file name%.exe:2656
%original file name%.exe:2840
%original file name%.exe:1224
%original file name%.exe:4020
%original file name%.exe:3328
%original file name%.exe:3040
%original file name%.exe:4028
%original file name%.exe:1696
%original file name%.exe:1948
%original file name%.exe:2320
%original file name%.exe:2324
%original file name%.exe:3252
%original file name%.exe:3856
%original file name%.exe:2404
%original file name%.exe:3852
%original file name%.exe:2400
%original file name%.exe:3804
%original file name%.exe:3996
%original file name%.exe:3488
%original file name%.exe:3768
%original file name%.exe:3936
%original file name%.exe:2468
%original file name%.exe:2700
%original file name%.exe:3332
%original file name%.exe:3976
%original file name%.exe:264
%original file name%.exe:3560
%original file name%.exe:3240
%original file name%.exe:3244
%original file name%.exe:2068
%original file name%.exe:3844
%original file name%.exe:2416
%original file name%.exe:2060
%original file name%.exe:2256
%original file name%.exe:2064
%original file name%.exe:2252
%original file name%.exe:3812
%original file name%.exe:2900
%original file name%.exe:2284
%original file name%.exe:3776
%original file name%.exe:1324
%original file name%.exe:1080
%original file name%.exe:2772
%original file name%.exe:3944
%original file name%.exe:3828
%original file name%.exe:1924
%original file name%.exe:2552
%original file name%.exe:4044
%original file name%.exe:2308
%original file name%.exe:3476
%original file name%.exe:2780
%original file name%.exe:3380
%original file name%.exe:2300
%original file name%.exe:3172
%original file name%.exe:4048
%original file name%.exe:3388
%original file name%.exe:2984
%original file name%.exe:2268
%original file name%.exe:2384
%original file name%.exe:2072
%original file name%.exe:2264
%original file name%.exe:532
%original file name%.exe:2604
%original file name%.exe:2440
%original file name%.exe:2600
%original file name%.exe:2608
%original file name%.exe:304
%original file name%.exe:3740
%original file name%.exe:2764
%original file name%.exe:3260
%original file name%.exe:3264
%original file name%.exe:2832
%original file name%.exe:3460
%original file name%.exe:3500
%original file name%.exe:3444
%original file name%.exe:1240
%original file name%.exe:3096
%original file name%.exe:2164
%original file name%.exe:3820
%original file name%.exe:3156
%original file name%.exe:2928
%original file name%.exe:620
%original file name%.exe:3596
%original file name%.exe:572
%original file name%.exe:2296
%original file name%.exe:2192
%original file name%.exe:592
%original file name%.exe:3696
%original file name%.exe:2196
%original file name%.exe:1904
%original file name%.exe:3160
%original file name%.exe:3452
%original file name%.exe:2568
%original file name%.exe:3456
%original file name%.exe:4064
%original file name%.exe:3364
%original file name%.exe:3512
%original file name%.exe:2904
%original file name%.exe:2564
%original file name%.exe:1584
%original file name%.exe:1736
%original file name%.exe:656
%original file name%.exe:2688
%original file name%.exe:2792
%original file name%.exe:3892
%original file name%.exe:3084
%original file name%.exe:2112
%original file name%.exe:2680
%original file name%.exe:2816
%original file name%.exe:2420
%original file name%.exe:4036
%original file name%.exe:2588
%original file name%.exe:3728
%original file name%.exe:3076
%original file name%.exe:2956
%original file name%.exe:3284
%original file name%.exe:160
%original file name%.exe:188
%original file name%.exe:3528
%original file name%.exe:3200
%original file name%.exe:3376
%original file name%.exe:3208
%original file name%.exe:2752
%original file name%.exe:1100
%original file name%.exe:2128
%original file name%.exe:2356
%original file name%.exe:2692
%original file name%.exe:2512
%original file name%.exe:2104
%original file name%.exe:2860
%original file name%.exe:3868
%original file name%.exe:4088
%original file name%.exe:3864
%original file name%.exe:3532
%original file name%.exe:3108
%original file name%.exe:4000
%original file name%.exe:2348
%original file name%.exe:3184
%original file name%.exe:2740
%original file name%.exe:2744
%original file name%.exe:324
%original file name%.exe:2508
%original file name%.exe:1560
%original file name%.exe:2504
%original file name%.exe:2640
%original file name%.exe:3620
%original file name%.exe:3624
%original file name%.exe:3708
%original file name%.exe:2932
%original file name%.exe:2972
%original file name%.exe:2132
%original file name%.exe:2976
%original file name%.exe:3704
%original file name%.exe:2332
%original file name%.exe:1280
%original file name%.exe:2336
%original file name%.exe:4012
%original file name%.exe:944
%original file name%.exe:3548
%original file name%.exe:2084
%original file name%.exe:2236
%original file name%.exe:876
%original file name%.exe:2000
%original file name%.exe:476
%original file name%.exe:352
%original file name%.exe:1572
%original file name%.exe:2008
%original file name%.exe:1764

The Trojan injects its code into the following process(es):

fGAwoYMM.exe:1616
reIEcoQI.exe:1276
NesIMIQs.exe:1664

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process %original file name%.exe:668 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\GqYQkgsU.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CIEQQYAo.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\CIEQQYAo.bat (0 bytes)

The process %original file name%.exe:3928 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (34 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\MKQEoEss.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\eeIcUoYk.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WosAskEM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hCcowYEs.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\MKQEoEss.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\eeIcUoYk.bat (0 bytes)

The process %original file name%.exe:3648 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\mwckUsQE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\EKMswkMc.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\mwckUsQE.bat (0 bytes)

The process %original file name%.exe:2656 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\UMgcIoAQ.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\iCUcskwI.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\UMgcIoAQ.bat (0 bytes)

The process %original file name%.exe:2840 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\xUkcIAQo.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DQUEQMoA.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\xUkcIAQo.bat (0 bytes)

The process %original file name%.exe:1224 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\aOgwoIUY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jwYkAwUc.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (34 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\JqkAAIEg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DOsYAkIA.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\jwYkAwUc.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\JqkAAIEg.bat (0 bytes)

The process %original file name%.exe:4020 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\gqIcQYII.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KgQssMYc.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\KgQssMYc.bat (0 bytes)

The process %original file name%.exe:3328 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\zCMoAQMo.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ZSYkcMoo.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ZSYkcMoo.bat (0 bytes)

The process %original file name%.exe:3040 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\vGYYwkoY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YgMAYUAA.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\vGYYwkoY.bat (0 bytes)

The process %original file name%.exe:4028 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\POcMYMAs.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\EeocEEkg.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\POcMYMAs.bat (0 bytes)

The process %original file name%.exe:1696 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\lgcswYoA.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XGkAAkog.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\lgcswYoA.bat (0 bytes)

The process %original file name%.exe:1948 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\igccMAIg.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\dUYkEwAM.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\dUYkEwAM.bat (0 bytes)

The process %original file name%.exe:2320 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\VcAEoYUs.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GWcYgMcI.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\GWcYgMcI.bat (0 bytes)

The process %original file name%.exe:2324 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TsoMEggg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\eokkYwIo.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\TsoMEggg.bat (0 bytes)

The process %original file name%.exe:3252 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\wowccgIg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hggsckkQ.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\hggsckkQ.bat (0 bytes)

The process %original file name%.exe:3856 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\QSMUMEgg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YQUMwoIU.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (51 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GQgwwcUg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ZSQkcYUw.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\PkUEIUAo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xMEIgEUc.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\QSMUMEgg.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ZSQkcYUw.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xMEIgEUc.bat (0 bytes)

The process %original file name%.exe:2404 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\yeEEYcUc.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HesQYgkg.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\HesQYgkg.bat (0 bytes)

The process %original file name%.exe:3852 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\CMsckswQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WCEEIcYM.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\CMsckswQ.bat (0 bytes)

The process %original file name%.exe:2400 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\umwEsUMU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\JgkUQsUs.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\umwEsUMU.bat (0 bytes)

The process %original file name%.exe:3804 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\DScgAEcE.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HIIMQMIg.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\HIIMQMIg.bat (0 bytes)

The process %original file name%.exe:3996 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\TcUwIUMM.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\PekggogI.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\PekggogI.bat (0 bytes)

The process %original file name%.exe:3488 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LUQAYcME.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zKAkMAwY.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\zKAkMAwY.bat (0 bytes)

The process %original file name%.exe:3768 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\CqskwgkI.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\JwogoQUU.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\CqskwgkI.bat (0 bytes)

The process %original file name%.exe:3936 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\zgwcMgQM.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\BkwAMUAQ.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\zgwcMgQM.bat (0 bytes)

The process %original file name%.exe:2468 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\cswggkkM.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\bEMkAEUM.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\bEMkAEUM.bat (0 bytes)

The process %original file name%.exe:2700 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xWcQosQc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hIcUMIQk.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\xWcQosQc.bat (0 bytes)

The process %original file name%.exe:3332 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\GQUkMsMk.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rmEEQsks.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\GQUkMsMk.bat (0 bytes)

The process %original file name%.exe:3976 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\iMwAkEMU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DewogIQA.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\iMwAkEMU.bat (0 bytes)

The process %original file name%.exe:264 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\SQsEIwMk.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WukIcUYY.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\SQsEIwMk.bat (0 bytes)

The process %original file name%.exe:3560 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ogYQAAAY.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lCQAkcYs.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ogYQAAAY.bat (0 bytes)

The process %original file name%.exe:3240 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\sKYcIkkw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YmIQMwMU.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\YmIQMwMU.bat (0 bytes)

The process %original file name%.exe:3244 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\AccEYcEk.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\wCYEkQYM.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\AccEYcEk.bat (0 bytes)

The process %original file name%.exe:2068 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\RckkgwgE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\emcEgAIo.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\RckkgwgE.bat (0 bytes)

The process %original file name%.exe:3844 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\RAsMAcoI.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\VWwIUEAo.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\VWwIUEAo.bat (0 bytes)

The process %original file name%.exe:2416 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\gqocUgwI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\JoQYAoMo.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\JoQYAoMo.bat (0 bytes)

The process %original file name%.exe:2060 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\aSIIgcMQ.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XmssEoAs.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\aSIIgcMQ.bat (0 bytes)

The process %original file name%.exe:2256 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\miMYEQAQ.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\bUckMMkA.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\miMYEQAQ.bat (0 bytes)

The process %original file name%.exe:2064 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\AAoIkMAg.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TsMIAggs.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\AAoIkMAg.bat (0 bytes)

The process %original file name%.exe:2252 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nSYIEIAg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ssYMQIEs.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ssYMQIEs.bat (0 bytes)

The process %original file name%.exe:3812 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\mQIIwQsY.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AOsEwogg.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\AOsEwogg.bat (0 bytes)

The process %original file name%.exe:2900 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ReMcAsUU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\UQAEQgQY.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ReMcAsUU.bat (0 bytes)

The process %original file name%.exe:2284 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\uoYksgwY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\dwEMgIsw.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\uoYksgwY.bat (0 bytes)

The process %original file name%.exe:3776 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\SMoQgcUY.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\UokcwcIU.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\UokcwcIU.bat (0 bytes)

The process %original file name%.exe:1324 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\OGMIwIYE.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\tYcwcsYA.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\tYcwcsYA.bat (0 bytes)

The process %original file name%.exe:1080 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\zMowYEIM.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DWocgoEM.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\zMowYEIM.bat (0 bytes)

The process %original file name%.exe:2772 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\IeUMUQIM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YgwcsoIY.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\YgwcsoIY.bat (0 bytes)

The process %original file name%.exe:3944 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\iwkYcIgE.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\oOEMgYgQ.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (34 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lSYgcIos.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\amkYQUYI.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\iwkYcIgE.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lSYgcIos.bat (0 bytes)

The process %original file name%.exe:3828 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\DgckwEMI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\SQcQwksk.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\SQcQwksk.bat (0 bytes)

The process %original file name%.exe:1924 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\gUYMUgMU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yMIwQAwk.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\yMIwQAwk.bat (0 bytes)

The process %original file name%.exe:2552 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\EqcIcogM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HSEggUkM.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\EqcIcogM.bat (0 bytes)

The process %original file name%.exe:4044 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\rEIUIgws.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lcIYMEcA.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\lcIYMEcA.bat (0 bytes)

The process %original file name%.exe:2308 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\EksUYkgQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GGcwIUQI.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\EksUYkgQ.bat (0 bytes)

The process %original file name%.exe:3476 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\CmckcwYk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TkUEwkkY.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\TkUEwkkY.bat (0 bytes)

The process %original file name%.exe:2780 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\GycIAUYw.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\VkUUMUsc.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\GycIAUYw.bat (0 bytes)

The process %original file name%.exe:3380 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\RKAoYsQs.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jgsIAsow.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\jgsIAsow.bat (0 bytes)

The process %original file name%.exe:2300 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\tCwYkcYQ.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IUgcUwkc.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\IUgcUwkc.bat (0 bytes)

The process %original file name%.exe:3172 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\oCUAoAcI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CKooAEkQ.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\CKooAEkQ.bat (0 bytes)

The process %original file name%.exe:4048 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\UIwcYQkc.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AwkMckks.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\AwkMckks.bat (0 bytes)

The process %original file name%.exe:3388 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AYMMocEc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nAkMMYUM.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\AYMMocEc.bat (0 bytes)

The process %original file name%.exe:2984 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\QEcIQIkM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xqEQckkc.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (34 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\SeMwUAsA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RKsoMMYU.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\QEcIQIkM.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\SeMwUAsA.bat (0 bytes)

The process %original file name%.exe:2268 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\PEwkgIAI.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\PqYgEkUs.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\PEwkgIAI.bat (0 bytes)

The process %original file name%.exe:2384 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\cOUMQowc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jqMEEwcw.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (34 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NecIsAws.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\cYosUcgQ.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\cOUMQowc.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jqMEEwcw.bat (0 bytes)

The process %original file name%.exe:2072 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\qwYwEcsI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\VOoccYEY.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\qwYwEcsI.bat (0 bytes)

The process %original file name%.exe:2264 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NykggMwY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sMEMswYA.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\NykggMwY.bat (0 bytes)

The process %original file name%.exe:532 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\eQkIkcYo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\wqYwAccY.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\wqYwAccY.bat (0 bytes)

The process %original file name%.exe:2604 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\oaUMosIg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AEMQQoMM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\pCUQEYwM.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (34 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NSQsssMs.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\AEMQQoMM.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NSQsssMs.bat (0 bytes)

The process %original file name%.exe:2440 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ACAUEoYI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CgQQYkgg.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\CgQQYkgg.bat (0 bytes)

The process %original file name%.exe:2608 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nWUAsYwQ.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\faoAMYQA.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nWUAsYwQ.bat (0 bytes)

The process %original file name%.exe:304 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\cwsgkcso.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QmUgQsEE.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\QmUgQsEE.bat (0 bytes)

The process %original file name%.exe:3740 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\KGscsYUk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hEoYoYUQ.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\hEoYoYUQ.bat (0 bytes)

The process %original file name%.exe:2764 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\PicgAAUU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\cKQYgEwE.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\cKQYgEwE.bat (0 bytes)

The process %original file name%.exe:3260 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\oKMYAUEA.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lcQUsEMg.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\lcQUsEMg.bat (0 bytes)

The process %original file name%.exe:3264 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\lwsQMYAM.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\iaEQUsok.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\lwsQMYAM.bat (0 bytes)

The process %original file name%.exe:2832 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\eMsMgIsQ.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zwwEMIAE.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\zwwEMIAE.bat (0 bytes)

The process %original file name%.exe:3460 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\OYQIgoQQ.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\PsYUwokI.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\OYQIgoQQ.bat (0 bytes)

The process %original file name%.exe:3500 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CEggYsow.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XekooAIM.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\CEggYsow.bat (0 bytes)

The process %original file name%.exe:3444 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\tqIogYUc.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jyMgkkwc.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\jyMgkkwc.bat (0 bytes)

The process %original file name%.exe:1240 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\WmIIUgoE.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KyooooMA.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\WmIIUgoE.bat (0 bytes)

The process %original file name%.exe:3096 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ECMIgsIk.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kSswMsYo.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ECMIgsIk.bat (0 bytes)

The process %original file name%.exe:2164 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\YQcAMoks.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xswgoAgw.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (34 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ygcEoAcg.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\BWQoYIsA.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ygcEoAcg.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\BWQoYIsA.bat (0 bytes)

The process %original file name%.exe:3820 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\fesUIsMk.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\BQgkwYQQ.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\BQgkwYQQ.bat (0 bytes)

The process %original file name%.exe:3156 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\eaEcUogk.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\wuUgMUYI.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\wuUgMUYI.bat (0 bytes)

The process %original file name%.exe:2928 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\XowkAwQo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\pyogQEog.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\pyogQEog.bat (0 bytes)

The process %original file name%.exe:620 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\EkUEIoUM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xIUYMAUU.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\EkUEIoUM.bat (0 bytes)

The process %original file name%.exe:3596 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\KCgQkkMo.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\WgoQQMUU.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\WgoQQMUU.bat (0 bytes)

The process %original file name%.exe:572 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KIAAwQIc.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\iekUskYM.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\iekUskYM.bat (0 bytes)

The process %original file name%.exe:2296 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\lIAMswUU.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\gWoAMgcI.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\lIAMswUU.bat (0 bytes)

The process %original file name%.exe:2192 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\SuwIcwEs.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rCMMoIIk.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\rCMMoIIk.bat (0 bytes)

The process %original file name%.exe:592 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\fsogocMg.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XUIEkUYE.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\XUIEkUYE.bat (0 bytes)

The process %original file name%.exe:3696 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\AUcMYsUI.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (34 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AMgksEwI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GmYMAcAI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jMgoQAww.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\AUcMYsUI.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GmYMAcAI.bat (0 bytes)

The process %original file name%.exe:2196 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\iuEUUIgI.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kQUIkkEI.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\iuEUUIgI.bat (0 bytes)

The process %original file name%.exe:1904 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\wMEcoIkI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\voMEUYUc.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ooIcUwQc.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (34 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\gCYEcAkc.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\wMEcoIkI.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ooIcUwQc.bat (0 bytes)

The process %original file name%.exe:3160 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\hKMkAoAY.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sigIwIgM.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\hKMkAoAY.bat (0 bytes)

The process %original file name%.exe:3452 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nkMIIUkE.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mScAcEgg.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\mScAcEgg.bat (0 bytes)

The process %original file name%.exe:2568 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\huQsQwkc.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xSgQkcQU.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\xSgQkcQU.bat (0 bytes)

The process %original file name%.exe:3456 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\AmAwMIcI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\pyMEoQcM.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (34 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xywggMYI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TcwIAwAg.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\pyMEoQcM.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AmAwMIcI.bat (0 bytes)

The process %original file name%.exe:4064 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\BusEIIwA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TowQUsUs.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\TowQUsUs.bat (0 bytes)

The process %original file name%.exe:3364 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nGAAIIcA.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hUgIsYgQ.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nGAAIIcA.bat (0 bytes)

The process %original file name%.exe:3512 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\AWoEcUME.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nwsoAMUQ.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nwsoAMUQ.bat (0 bytes)

The process %original file name%.exe:2904 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\eKIIccgA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zWwkoEAs.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\eKIIccgA.bat (0 bytes)

The process %original file name%.exe:2564 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ZEoAgkkM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\dQoUwkIk.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\dQoUwkIk.bat (0 bytes)

The process %original file name%.exe:1584 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nqckIkEk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\bEEAYwME.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\bEEAYwME.bat (0 bytes)

The process %original file name%.exe:1736 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\All Users\JuwEIgUE\reIEcoQI.exe (3993 bytes)
%Documents and Settings%\%current user%\dUskcAww\fGAwoYMM.exe (3969 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\OcgIwsUQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\OCMYUcAk.bat (4 bytes)
%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.exe (4041 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\OCMYUcAk.bat (0 bytes)

The process %original file name%.exe:656 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\BMUYAwcA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XsUAMoUA.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\BMUYAwcA.bat (0 bytes)

The process %original file name%.exe:2688 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\PesUcscs.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rIsUQYQc.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\PesUcscs.bat (0 bytes)

The process %original file name%.exe:2792 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ykYQwIkM.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\dyQMkkIY.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\dyQMkkIY.bat (0 bytes)

The process %original file name%.exe:3892 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\NIUQkAkQ.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jkswsEkk.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\jkswsEkk.bat (0 bytes)

The process %original file name%.exe:3084 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\KQoIkIAg.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\oqAkEAUk.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\oqAkEAUk.bat (0 bytes)

The process %original file name%.exe:2112 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\WoMgckYA.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\bcYEYwYQ.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\bcYEYwYQ.bat (0 bytes)

The process %original file name%.exe:2680 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\EyosMQUQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\qAYoIoUc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hocUcQkU.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (34 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\EyosMQUQ.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\qAYoIoUc.bat (0 bytes)

The process %original file name%.exe:2816 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\bMgIoEwY.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ZMMQsEoU.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ZMMQsEoU.bat (0 bytes)

The process %original file name%.exe:2420 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\lyAcEkEk.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\VGcEkQAg.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\VGcEkQAg.bat (0 bytes)

The process %original file name%.exe:4036 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\tgUkMwIc.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mmAEkUow.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\mmAEkUow.bat (0 bytes)

The process %original file name%.exe:2588 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\iOkckAQE.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ZUcogUwg.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ZUcogUwg.bat (0 bytes)

The process %original file name%.exe:3728 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\qCMskkAY.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\pkUEMEgk.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\saQssYYA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yAEosUAE.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (34 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\pkUEMEgk.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yAEosUAE.bat (0 bytes)

The process %original file name%.exe:3076 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\lSEsoUoI.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LmIUokwc.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\lSEsoUoI.bat (0 bytes)

The process %original file name%.exe:2956 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\AyIwgcks.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\SaUIsQwg.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\SaUIsQwg.bat (0 bytes)

The process %original file name%.exe:3284 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rAUAEQUU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RwYYMUUI.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\rAUAEQUU.bat (0 bytes)

The process %original file name%.exe:160 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\UssswEEg.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NGYoEUYo.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\NGYoEUYo.bat (0 bytes)

The process %original file name%.exe:188 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\dOkQQwIM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\geIAUwsA.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\geIAUwsA.bat (0 bytes)

The process %original file name%.exe:3528 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\JGMQookA.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GYwoAgAg.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\GYwoAgAg.bat (0 bytes)

The process %original file name%.exe:3200 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\RuAAkEoE.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\TIYYoQcE.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\RuAAkEoE.bat (0 bytes)

The process %original file name%.exe:3376 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\lacAwQAI.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NcgAYkco.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\NcgAYkco.bat (0 bytes)

The process %original file name%.exe:3208 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\AkccQIMM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\tagsowos.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\tagsowos.bat (0 bytes)

The process %original file name%.exe:2752 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\dgQwkMEM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\osMYggcU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GGwsoMsA.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (34 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\OKkoAAQI.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\osMYggcU.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\OKkoAAQI.bat (0 bytes)

The process %original file name%.exe:1100 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RUwEckQU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aAYIAoQs.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\aAYIAoQs.bat (0 bytes)

The process %original file name%.exe:2128 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\IkMEwowE.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nuEYEgUw.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nuEYEgUw.bat (0 bytes)

The process %original file name%.exe:2356 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\BAgYcIww.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (34 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jMcckMIw.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sYMMQMII.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rAsYgUgE.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\jMcckMIw.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sYMMQMII.bat (0 bytes)

The process %original file name%.exe:2692 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\uuQMQgkI.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LicsAcYU.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\LicsAcYU.bat (0 bytes)

The process %original file name%.exe:2512 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\GGEwIcMI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\tAgMoQIo.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\tAgMoQIo.bat (0 bytes)

The process %original file name%.exe:2104 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\BQMUoIIc.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KuIccEgg.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\BQMUoIIc.bat (0 bytes)

The process %original file name%.exe:2860 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\MGAIEgkk.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RCUQcoMw.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XAQQQwsM.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (34 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NicQYYQs.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\MGAIEgkk.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RCUQcoMw.bat (0 bytes)

The process %original file name%.exe:3868 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\wQgscsoE.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IgcwkAgQ.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\IgcwkAgQ.bat (0 bytes)

The process %original file name%.exe:4088 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\SUgkEIsU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\iSwkIIUQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nYAUcowI.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (34 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\FkIwwgwM.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\iSwkIIUQ.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\FkIwwgwM.bat (0 bytes)

The process %original file name%.exe:3864 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\beQAIQkE.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\VAYEAgYA.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\VAYEAgYA.bat (0 bytes)

The process %original file name%.exe:3532 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\oKYIQAwQ.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lGYMEwow.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\oKYIQAwQ.bat (0 bytes)

The process %original file name%.exe:3108 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\cwEoksMY.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GuwccwEM.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\cwEoksMY.bat (0 bytes)

The process %original file name%.exe:4000 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\VUkcUssI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mqMYwUMQ.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\VUkcUssI.bat (0 bytes)

The process %original file name%.exe:2348 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\wyQMUUEM.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\uOcowkEA.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\wyQMUUEM.bat (0 bytes)

The process %original file name%.exe:3184 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nCYMUkUw.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XakEMAgM.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\XakEMAgM.bat (0 bytes)

The process %original file name%.exe:2740 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\lssEwIMU.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aCsswQYs.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\lssEwIMU.bat (0 bytes)

The process %original file name%.exe:2744 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\oMIAgkUM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\VgUoYgUY.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\VgUoYgUY.bat (0 bytes)

The process %original file name%.exe:324 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\qCAUUEsA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\uWAUoQoU.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\qCAUUEsA.bat (0 bytes)

The process %original file name%.exe:2508 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\aOEYIMgc.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LEIQcwcc.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\LEIQcwcc.bat (0 bytes)

The process %original file name%.exe:1560 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\qIgIYEMU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\kmkgcYoI.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\kmkgcYoI.bat (0 bytes)

The process %original file name%.exe:2504 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\cEMUIsoQ.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RIkgoggc.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\cEMUIsoQ.bat (0 bytes)

The process %original file name%.exe:2640 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\iaIYAMkk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\YYQUYokA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HeIEccok.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (51 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LUIAssIo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GSIwsgsk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QgogUEEc.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\HeIEccok.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\QgogUEEc.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LUIAssIo.bat (0 bytes)

The process %original file name%.exe:3620 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\leYYgIAA.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HCAIgkEU.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\leYYgIAA.bat (0 bytes)

The process %original file name%.exe:3624 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\EGEAkYMU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\UEwcYAgQ.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\UEwcYAgQ.bat (0 bytes)

The process %original file name%.exe:3708 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vagMQIsM.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\fYEwgYUo.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\vagMQIsM.bat (0 bytes)

The process %original file name%.exe:2932 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\RmEwsoUk.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CIUEYsQc.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\RmEwsoUk.bat (0 bytes)

The process %original file name%.exe:2972 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\WoIUAMEY.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xascsIQo.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\xascsIQo.bat (0 bytes)

The process %original file name%.exe:2132 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\okwsoIUw.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hyogMoIo.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\okwsoIUw.bat (0 bytes)

The process %original file name%.exe:2976 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ZwkIkIYU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NucUUAss.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\NucUUAss.bat (0 bytes)

The process %original file name%.exe:3704 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\JEQEoskw.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\msgwgUMg.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\msgwgUMg.bat (0 bytes)

The process %original file name%.exe:2332 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\jCkgkAUg.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\HuYIIoUk.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\HuYIIoUk.bat (0 bytes)

The process %original file name%.exe:1280 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KeMwMoEU.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\caMcosIE.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\caMcosIE.bat (0 bytes)

The process %original file name%.exe:2336 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\OcYwUYcI.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\FQggEscA.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NywUkMIk.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (34 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LOYQwgwQ.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\OcYwUYcI.bat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\LOYQwgwQ.bat (0 bytes)

The process %original file name%.exe:4012 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\HGUoggcY.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\McksIIYg.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\HGUoggcY.bat (0 bytes)

The process %original file name%.exe:944 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\OiAoIgII.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\fgIEsMMo.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\OiAoIgII.bat (0 bytes)

The process %original file name%.exe:3548 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\cowEIAoA.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\msQsskok.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\cowEIAoA.bat (0 bytes)

The process %original file name%.exe:2084 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NsccsYkM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ImccAsAg.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ImccAsAg.bat (0 bytes)

The process %original file name%.exe:2236 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ZEkEcIIw.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jIcsoYAc.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\jIcsoYAc.bat (0 bytes)

The process %original file name%.exe:876 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\HoowgYIc.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rsYQAYMU.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\rsYQAYMU.bat (0 bytes)

The process %original file name%.exe:2000 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\IAggQMMM.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rsYsUMws.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\rsYsUMws.bat (0 bytes)

The process %original file name%.exe:476 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\zckUwcsU.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RQggUYEo.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\RQggUYEo.bat (0 bytes)

The process %original file name%.exe:352 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\oEcMcQQo.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\NSIgkUYc.bat (112 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\oEcMcQQo.bat (0 bytes)

The process %original file name%.exe:1572 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\amUYIEsY.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\uyAwEIsk.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\amUYIEsY.bat (0 bytes)

The process %original file name%.exe:2008 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\XMcgYcMI.bat (4 bytes)
C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KkIgQEAI.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\XMcgYcMI.bat (0 bytes)

The process %original file name%.exe:1764 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jEIIswgw.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\deQoMggQ.bat (112 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\jEIIswgw.bat (0 bytes)

The process NesIMIQs.exe:1664 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\guest.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Documents\My Music\Sample Music\New Stories (Highway Blues).wma.exe (7726 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\adm.bmp.exe (2321 bytes)
C:\totalcmd\TCMADMIN.EXE.exe (3073 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dog.bmp.exe (2321 bytes)
C:\totalcmd\TOTALCMD.EXE.exe (30812 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\guitar.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\lift-off.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\kick.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\butterfly.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\palm tree.bmp.exe (2321 bytes)
C:\totalcmd\TCUNINST.EXE.exe (3073 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\duck.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\red flower.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dirt bike.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\horses.bmp.exe (2321 bytes)
C:\totalcmd\TCMDX32.EXE.exe (3361 bytes)
%Documents and Settings%\All Users\KAAo.txt (55978 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\pink flower.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Documents\My Music\Sample Music\Beethoven's Symphony No. 9 (Scherzo).wma.exe (7433 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\astronaut.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\cat.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\chess.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\ball.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\skater.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Blue hills.jpg.exe (3073 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\beach.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Water lilies.jpg.exe (3361 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Sunset.jpg.exe (3073 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\frog.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\fish.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\airplane.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Winter.jpg.exe (3361 bytes)
C:\totalcmd\TcUsbRun.exe (3073 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Adobe\Reader 9.3\Setup Files\Setup.exe (5441 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\snowflake.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\drip.bmp.exe (2321 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\car.bmp.exe (2321 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\skater.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\car.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dog.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\horses.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\palm tree.bmp (0 bytes)
%Documents and Settings%\All Users\Documents\My Music\Sample Music\Beethoven's Symphony No. 9 (Scherzo).wma (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\lift-off.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\duck.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\ball.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\fish.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\cat.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\frog.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\red flower.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\astronaut.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\beach.bmp (0 bytes)
C:\totalcmd\TCUNINST.EXE (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\snowflake.bmp (0 bytes)
C:\totalcmd\TOTALCMD.EXE (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\airplane.bmp (0 bytes)
%Documents and Settings%\All Users\Documents\My Music\Sample Music\New Stories (Highway Blues).wma (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\chess.bmp (0 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Water lilies.jpg (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dirt bike.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\butterfly.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\guitar.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\pink flower.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\drip.bmp (0 bytes)
C:\totalcmd\TCMADMIN.EXE (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\guest.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\adm.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\kick.bmp (0 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Sunset.jpg (0 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Blue hills.jpg (0 bytes)
C:\totalcmd\TCMDX32.EXE (0 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Winter.jpg (0 bytes)

Registry activity

The process fGAwoYMM.exe:1616 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B3 F5 5B C4 9E D2 9E 8C 0E 91 AA C5 45 A1 75 3A"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"fGAwoYMM.exe" = "%Documents and Settings%\%current user%\dUskcAww\fGAwoYMM.exe"

The process reIEcoQI.exe:1276 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BB 09 16 EC 05 78 60 F8 B7 17 8D 89 C3 63 31 D6"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NesIMIQs.exe" = "%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.exe"

The process cscript.exe:2712 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3D 23 A1 C7 76 43 3D CC 78 8A 4C 53 A8 F1 4B E8"

The process cscript.exe:2980 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "73 91 AA 25 E1 A2 39 F1 87 AF 6B 43 73 8C C3 6C"

The process cscript.exe:3076 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F9 58 DF 34 B0 88 79 69 C9 6E 8B 97 28 03 A2 E7"

The process cscript.exe:668 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BA 25 C6 ED 69 59 89 93 DC 14 55 51 36 67 F7 3C"

The process cscript.exe:2844 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0C DA 87 45 AF 7C C9 60 59 4F C2 2E 0C A9 AF D2"

The process cscript.exe:2184 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2D 59 5A 38 84 65 4A 05 D2 B4 FA 69 E7 BF 0F D4"

The process cscript.exe:4024 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "4F D1 DE A5 D3 41 18 92 F1 D8 A8 D8 8D 93 AE CF"

The process cscript.exe:3324 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E7 8D 86 30 EF 58 2D 18 30 AA 0B 31 B4 29 7F A7"

The process cscript.exe:3656 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "7A 00 C4 71 B3 DF 37 C2 FB 10 4A 0B 0C E8 A1 A6"

The process cscript.exe:3808 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "48 86 2A 6E 10 97 55 84 EF 80 7C 2F 6E 54 81 04"

The process cscript.exe:3120 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6E E6 CC 7B 8F 4D CF B2 94 FA 6D F5 6E 1A FE DE"

The process cscript.exe:2528 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6C D5 BE 77 D6 AD FD E8 3C E0 14 48 2A 02 9B 37"

The process cscript.exe:3256 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E1 3A 25 4C D0 61 9F E5 CC DD D0 0F 9A 12 00 F3"

The process cscript.exe:3792 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "75 D9 AA F8 11 26 B8 1D 20 01 CD 33 AE A8 93 88"

The process cscript.exe:3856 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DB 6D CA 1F 42 72 93 D5 1E 13 60 71 06 47 8B 82"

The process cscript.exe:2156 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "44 07 35 4C CE C1 BF 84 F2 12 94 A4 32 E9 71 1D"

The process cscript.exe:1468 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C0 A9 F3 0D 51 3A 67 F4 E5 36 48 7A 9C 8A 5B 90"

The process cscript.exe:2400 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5C A7 A0 79 4C 94 AA 4E BF 87 73 C8 7E 30 07 47"

The process cscript.exe:2292 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D8 4D 97 24 BC 6E AE 9C 6B 67 8D E5 54 22 8D 06"

The process cscript.exe:2244 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CC 3E 06 3B C3 B3 DB 93 3A 16 D4 58 2A 9A BA 16"

The process cscript.exe:548 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2D 18 1F 2E 07 A5 13 22 29 57 E6 41 70 B6 B8 9F"

The process cscript.exe:2240 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A7 C6 19 26 13 0A 9F C8 0C 23 5B 89 DA E4 A7 66"

The process cscript.exe:760 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "28 7A CE 7A 29 09 C2 7C B4 DA 94 69 E6 6A D0 32"

The process cscript.exe:3760 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F3 63 1D F4 5A D1 F0 3B DE 7A B3 20 D4 A2 A7 BA"

The process cscript.exe:1316 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E1 57 59 C3 BC C2 D3 66 A7 9C 7D DF E0 9D C1 D1"

The process cscript.exe:3836 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "29 7D A9 06 22 04 F7 9A AD 08 6F F1 63 56 25 52"

The process cscript.exe:2916 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "91 26 D7 67 6B 74 AA 4D D7 0F 32 A3 E8 F1 BE 4B"

The process cscript.exe:3884 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "24 C8 88 71 5E 58 05 04 8F 3B D5 81 5C 17 D2 2B"

The process cscript.exe:3936 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A1 F3 2A D9 84 C6 BF CD 53 58 81 AE 4B 45 63 15"

The process cscript.exe:1796 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F2 DF 23 1E FE 29 BB 9C DE DC F1 D5 F6 E2 09 2C"

The process cscript.exe:2924 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AD 22 48 11 37 EF 06 02 52 53 C8 9E C7 08 BF B6"

The process cscript.exe:3132 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C8 FB D5 18 B3 17 81 47 34 3E 9F E4 E2 9D E7 22"

The process cscript.exe:3804 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F7 35 FD B9 EE 08 83 6B 0E A9 B3 7B 5C 00 46 34"

The process cscript.exe:3640 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EF BD 10 19 F3 CF 1A 88 E2 1B 3B 6C 7D 81 E7 EE"

The process cscript.exe:2332 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8B B2 D7 8E B3 01 FA DF 6E 00 E1 D9 CE E1 9B 7E"

The process cscript.exe:3248 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C5 A7 E8 17 FC 5F D9 82 1A 47 A3 65 F6 6F 30 42"

The process cscript.exe:2312 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F7 3A 61 AF 06 AD 8F 07 C7 D1 1B CD 1C 7A D6 E3"

The process cscript.exe:2068 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B7 E5 3F BD B7 63 58 9D F6 FD 3E 2D 50 AD 7E 04"

The process cscript.exe:2144 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "21 05 67 4A 9D 78 B0 66 F5 0C 5F 53 86 1B FB 69"

The process cscript.exe:2392 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FF 59 A2 0F BE 7C 7B 3A 57 73 E8 2A 7C EE 61 B3"

The process cscript.exe:412 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A4 20 FB 19 15 7E A7 4D 6C 1A 22 EA 93 FB 68 94"

The process cscript.exe:2140 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9F 66 57 C9 90 39 9D AB B9 79 FE 48 00 9F 3A 4C"

The process cscript.exe:2792 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "51 00 80 DE 28 83 E0 5D BD 49 EF 66 B3 B5 C5 19"

The process cscript.exe:2796 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E6 CE 41 D4 DD 80 F0 6C 09 65 EB 8E E2 89 B3 F7"

The process cscript.exe:3772 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9E B9 36 2E 1A 6B DF D4 87 89 63 2E C2 D1 0B 34"

The process cscript.exe:4092 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "13 9C 54 E1 34 71 5C DF 86 FD 57 B5 42 10 F4 FB"

The process cscript.exe:3276 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CF B9 FC BD 7F 23 11 0D 4D F2 D0 BE F7 E9 25 A5"

The process cscript.exe:740 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5F 20 1B EB 2E 86 AF 36 80 BF 6B 95 79 14 A6 CD"

The process cscript.exe:3148 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DC 7D 71 07 B6 07 B8 C3 0D 31 1A 6F 1E 16 06 46"

The process cscript.exe:3208 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D1 3A FC 92 43 D4 A9 83 3B 75 46 CF 28 83 94 0B"

The process cscript.exe:2820 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3A 21 EB 03 27 9C 6E 29 FC DF 90 3A 88 02 8B 20"

The process cscript.exe:4044 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E3 18 FB 16 AC 24 0C 24 C1 7C 4D 6B 40 98 EF 55"

The process cscript.exe:3384 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8F E9 1E 4E A1 DF 58 4F 95 AC C8 CD 1C 8A 5D EC"

The process cscript.exe:2540 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9F 88 CF 9F E9 C4 68 F4 7B 06 A9 7E BF 01 5D 40"

The process cscript.exe:304 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EB 18 CE 44 F3 7E F8 3F 5E 66 C8 D9 A1 C5 DB 19"

The process cscript.exe:2544 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A2 80 55 D7 F3 41 D7 9F A9 1A AA EA 05 34 82 10"

The process cscript.exe:3024 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "53 B3 52 C8 C3 0A 3E 9D 01 41 03 D1 2B ED A8 92"

The process cscript.exe:4048 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "00 50 54 40 C8 2D 4A CD B2 1C B5 66 13 36 44 BC"

The process cscript.exe:2304 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3B AA 85 3E 9C CC 00 FC 70 3D E7 20 3F 0D 93 9D"

The process cscript.exe:2412 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B6 B0 4E 1F F0 7E EB E9 43 DC 01 5E 14 B0 AB BD"

The process cscript.exe:2176 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C9 2B 46 27 08 70 7E E9 E1 68 C3 58 B9 E9 A1 FF"

The process cscript.exe:3292 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "19 60 EB 9D 01 DF A2 23 E5 57 43 F0 8E 60 05 0C"

The process cscript.exe:2660 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9A B5 F9 54 2C F2 04 8F 9B D9 C8 8C E0 E6 9A D6"

The process cscript.exe:1652 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C8 D3 E8 3E 35 FD F9 D8 FE 33 78 2F 12 3F 25 C6"

The process cscript.exe:1016 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "75 A2 AE 7E 1F 3D 1F 4B C0 A7 EA FC 8A 01 CD 10"

The process cscript.exe:2668 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C6 57 CD 41 E3 45 9B 27 71 0A 4F CE C2 1F 1F 62"

The process cscript.exe:3580 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D7 1B 69 8C C6 3B 7E D2 7C FD BB C2 F6 3D 11 E3"

The process cscript.exe:2444 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "41 F6 6F AE 63 B6 36 74 E5 73 66 D1 9B D3 09 C9"

The process cscript.exe:2936 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A9 27 3F AF 27 79 DC 3B 41 F4 39 BF 69 2D DD 8B"

The process cscript.exe:3952 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "78 67 CE A3 84 EF CA A6 8D BB AA F6 71 58 9A 60"

The process cscript.exe:1336 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1B 10 D5 60 A3 DD 6E 91 ED 5C 02 AD 0A 43 01 AC"

The process cscript.exe:2932 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "68 13 C8 C8 D8 28 0C AB 2D 45 5A 7A 00 66 40 45"

The process cscript.exe:1984 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "69 D3 5B 9C EF 4D 58 CE 11 62 74 2D 25 8B B0 6A"

The process cscript.exe:2764 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C1 71 A8 AA 6C 9F 3C 10 83 DC 53 22 14 83 A1 25"

The process cscript.exe:296 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "95 4A 10 01 14 7C FB 63 A8 55 DB 1D A2 D3 0B 8C"

The process cscript.exe:2836 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5A A1 89 DF 54 67 32 8B CF C7 FC 6C 0C 40 44 94"

The process cscript.exe:248 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5D 08 4F 68 8D 14 83 34 EB 4D 0C C9 27 B7 79 34"

The process cscript.exe:2044 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DA 68 12 10 47 30 53 78 7B 99 4C 17 29 18 90 32"

The process cscript.exe:3152 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "53 42 DC 8B 8D BE A1 F1 E9 2E B9 BF C4 8C 5A 20"

The process cscript.exe:3012 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "47 F0 83 C3 10 90 7C 42 C7 AE 1D 42 A0 15 6F 71"

The process cscript.exe:1380 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "01 DA FA EA B7 2C AA 62 49 28 30 E6 80 00 48 EA"

The process cscript.exe:2572 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "69 FA 88 37 A6 9B 0B 28 F3 C0 F8 E6 D1 70 34 24"

The process cscript.exe:3468 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DE F4 5B 1A 43 FA BA 97 F3 F5 C1 BC 5A FA 90 BB"

The process cscript.exe:3092 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "44 80 D7 A0 43 A7 CD 1F 32 B4 A6 46 B1 9F 9D A0"

The process cscript.exe:3512 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DE 00 A7 18 6B 08 C2 35 CF C0 17 1D F7 9A CE 42"

The process cscript.exe:2376 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "58 07 2F 47 75 AD 67 07 C7 7C 12 78 48 62 DC AF"

The process cscript.exe:1632 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BC 3E 7B C0 7C EE C1 4E E7 92 EA 0D 02 A5 DD D8"

The process cscript.exe:2484 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "72 83 BA 86 74 90 11 3D 71 76 71 DE 7A D3 76 CA"

The process cscript.exe:2616 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C3 21 1B 8C 20 DB C7 F4 83 A7 CC 2B 28 3C 86 04"

The process cscript.exe:620 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D7 82 C6 35 0A F6 DC FB 04 4D 95 FB E7 45 8C E8"

The process cscript.exe:2612 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "29 83 B2 CF D6 41 9B 8D 5D E5 6F 60 BC 45 5B 80"

The process cscript.exe:3616 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "48 71 EB 27 A1 42 BE 56 D8 8D 82 36 4D F2 1D F5"

The process cscript.exe:2476 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AF C4 90 96 57 A1 8A D4 DC B3 21 ED 5E FF 10 1E"

The process cscript.exe:2920 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2E F4 44 1D 84 23 2B A2 F8 20 3D 3B FA E1 DE 8F"

The process cscript.exe:3800 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D3 CC FC DD 9B A0 6D 17 3E 04 6B F2 FF 00 6E 67"

The process cscript.exe:2452 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D2 47 2F 91 AA C7 E4 8A 77 C8 AC 43 F3 F6 19 07"

The process cscript.exe:2808 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C6 21 D2 AF A6 EE C7 FC 31 D8 CC F7 40 54 59 14"

The process cscript.exe:252 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5F B1 67 88 53 D2 8B 35 C6 D2 77 15 11 1D 1A B9"

The process cscript.exe:3900 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0B 4C 44 66 91 20 C6 A5 F9 D8 AA A5 C4 CF 1C BF"

The process cscript.exe:3296 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2A 05 3D F0 80 61 09 A5 FE ED 47 5F F1 73 27 E1"

The process cscript.exe:2288 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DC 59 01 4D 4A 6A 14 95 C4 C4 61 E8 4C 69 5C 4A"

The process cscript.exe:172 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "71 85 F3 D7 63 1C F8 2B C4 72 68 C5 0E 0D 6E 77"

The process cscript.exe:3916 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A8 AE 26 82 AA 0E B0 75 58 B5 8D E8 C7 D0 37 C3"

The process cscript.exe:2880 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CB D5 E6 1B 81 0A 62 78 B0 34 A3 19 1F 0B 83 DB"

The process cscript.exe:3368 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "47 75 C6 41 F3 DC 08 12 94 57 59 37 86 A9 D8 06"

The process cscript.exe:1980 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "88 BE 81 5A 86 44 72 75 B6 33 5F 29 E0 80 1A 49"

The process cscript.exe:2976 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "59 11 2B DC CA 50 8B F7 22 B7 41 0E 94 25 DF 7B"

The process cscript.exe:2888 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "90 3B 40 25 1F 85 21 71 9B 9A F8 DD 79 76 1E E7"

The process cscript.exe:2404 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "70 B8 8E 04 10 B0 E5 1C 26 05 59 CC B5 FB 04 64"

The process cscript.exe:2160 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "45 4C 3A 00 F0 A3 A6 D4 56 D4 71 62 5D 03 26 ED"

The process cscript.exe:3160 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E7 02 0F 37 0D 37 13 81 AF 71 18 9A AB 06 F3 41"

The process cscript.exe:500 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F1 8B A3 E9 B1 6E 89 85 59 AB 0E 0C 43 CC 55 33"

The process cscript.exe:1212 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "29 BC 27 BB 5E 67 2B F6 2D 98 30 01 49 3A 72 B5"

The process cscript.exe:3600 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0E 4A 11 05 10 D2 4E 58 F5 98 6B F0 51 FD 8A CF"

The process cscript.exe:2812 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CF 49 E2 DA CB 8A D8 F0 65 3B 29 B0 73 A1 CE 20"

The process cscript.exe:3872 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CA CA 01 48 3E 26 FE 17 15 D9 AB BF 94 00 28 F9"

The process cscript.exe:2088 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A8 C2 C3 CB 04 7A 8B F5 CB E6 4A 87 18 4A 4E CD"

The process cscript.exe:3876 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "44 09 33 F4 80 5B 85 09 E1 86 4A EA 81 DE E0 CF"

The process cscript.exe:2180 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9A DD E8 9A 24 BC D4 3F 38 7B 48 82 97 1B 69 D6"

The process cscript.exe:3520 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5F B1 95 5E 70 D0 EB 4D 9E 2F 12 B8 09 DB 30 D0"

The process cscript.exe:3288 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "96 2B 69 E0 E6 1C D9 C0 2D 39 7A DE 80 25 8C 9D"

The process cscript.exe:3724 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AE 98 CA BB 89 DB 5F 96 5D 67 A4 30 02 46 1E FA"

The process cscript.exe:1912 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D4 54 E0 38 56 D5 05 9B 98 B8 3A 07 E9 87 E7 4F"

The process cscript.exe:1916 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2B 02 CA 42 99 41 2F E6 43 73 50 0F 22 6E A7 AD"

The process cscript.exe:964 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D5 B3 5B 0B 6E 23 74 2E B0 03 59 70 56 95 5D 1A"

The process cscript.exe:2212 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0D D0 C4 E5 BD 3C 53 D6 62 23 9E 1A 40 7D 56 45"

The process cscript.exe:1992 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EA FA 9E ED CC EB 33 9F 77 D7 DA 9E 34 01 E3 CD"

The process cscript.exe:3376 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C5 9A E4 D5 7D 34 C5 A5 7E EE 08 E4 F2 93 45 F2"

The process cscript.exe:2892 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D2 9E A1 1C 08 23 CC 6C E2 5F 9D A0 CE 9E A1 51"

The process cscript.exe:3964 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2F 2A 4A 0D 77 C8 1E A1 D5 C1 CC 7B 50 4B 4A 69"

The process cscript.exe:2356 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "66 75 74 20 B0 B4 99 DC 38 48 87 5A 5D D6 54 B9"

The process cscript.exe:2692 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "81 E9 9E 31 D6 B9 B8 72 85 FF 01 D4 8D 74 96 75"

The process cscript.exe:2860 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CA 26 61 95 5F E5 8D 93 5F 51 D4 68 26 63 71 D5"

The process cscript.exe:4084 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3E 22 96 B8 E8 67 0F 50 A7 14 65 E1 92 01 34 DF"

The process cscript.exe:3636 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8E AA 7D C4 CE 25 1E 65 29 C1 63 D4 5C 0D 5B FA"

The process cscript.exe:2432 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "40 F6 E3 DF 03 11 2D 59 46 A0 17 B7 22 DC 7C 7C"

The process cscript.exe:3220 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6A 09 B7 07 D0 C5 DD 17 3F FF 9C 26 A5 64 2A 99"

The process cscript.exe:2816 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F5 13 97 0D A0 FC 44 66 A7 DF 40 4E BE 6F BC 0B"

The process cscript.exe:3064 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5D 03 8C CE B8 73 B9 34 06 05 34 F4 3E D7 EF A7"

The process cscript.exe:236 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F7 B9 20 75 52 64 31 10 C0 20 8C 17 78 88 D1 34"

The process cscript.exe:3068 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6A 2A 28 35 2F C8 98 88 8D CC 05 B4 4F 8D 3E 3D"

The process cscript.exe:1968 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F0 CA 63 6F A0 11 9A 0A 30 F9 C0 B4 7E 7A 70 AC"

The process cscript.exe:2224 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E9 2F 1A A4 6C 0A BB 27 D6 92 0D 54 9E F0 E8 D4"

The process cscript.exe:1612 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C1 BA 5C 0D 67 BF 5E 8F 34 70 0C 9E 6E 12 5D F1"

The process cscript.exe:2740 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "62 9A 02 96 07 78 F2 77 4E 61 7B 14 BC AE 9A 0F"

The process cscript.exe:1692 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "86 41 B8 02 2B 5F AD BB E1 B4 3F A9 8A D2 9F 0C"

The process cscript.exe:2744 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A4 A6 ED 38 02 FD 95 EB C3 D5 EB 41 A8 E9 FE 3C"

The process cscript.exe:2508 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "ED 23 6C 81 0C 53 2E 9B 92 B5 A5 02 14 94 13 05"

The process cscript.exe:1560 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BA AA C8 FD 2C 12 AB 2C 87 3F 46 CF C9 38 C8 B9"

The process cscript.exe:200 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "49 9C D5 F3 00 1D 60 11 99 B4 6C 1D EE 51 30 6E"

The process cscript.exe:204 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F8 91 F0 CE 74 2B AB 2B 6E 20 F6 2C B8 12 3F 6F"

The process cscript.exe:3620 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "34 55 F4 A2 49 50 1E 14 B7 53 94 CD C0 A5 3C 18"

The process cscript.exe:3624 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B6 4C 7A F4 77 84 A7 EA C3 F8 5D 87 11 CA CD 66"

The process cscript.exe:2728 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D2 2E C0 99 68 30 A7 02 96 22 F9 33 85 71 42 11"

The process cscript.exe:1888 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "99 8A 7F 51 CC 5F 7A 40 BA 15 12 33 CF 45 50 40"

The process cscript.exe:2132 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5A 08 3A 0F 37 F3 FC 52 04 B3 7D D9 36 F9 93 D2"

The process cscript.exe:484 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "43 7E ED EA B9 4B 64 E1 1E 8F DC 6D 0C 68 FE 0D"

The process cscript.exe:3052 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2F D5 67 66 4F 75 90 8F 96 B4 22 B6 EE 49 9A 6B"

The process cscript.exe:2120 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "99 06 C1 F3 82 DA F6 D0 C7 27 7A 5C 61 2B 5F 78"

The process cscript.exe:3780 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "30 8A AE C0 05 22 63 92 CA 0F 7A 43 0F F8 8A 1B"

The process cscript.exe:3540 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "82 5F E3 AB 2F 94 AB 96 13 A5 C5 50 E8 24 FF 32"

The process cscript.exe:1280 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "02 D6 74 95 69 6D 32 57 4C 9C 03 1A 7E A4 E4 EF"

The process cscript.exe:2232 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "51 EB 1A CD 23 21 FE 57 A7 A9 1D 23 34 27 F9 56"

The process cscript.exe:1288 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "90 FE DC 80 62 B1 5A AB 7C 4E 7C 81 E6 4B 64 98"

The process cscript.exe:3424 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "58 F7 06 88 19 13 A0 83 36 F0 0D AC 97 A3 9C 75"

The process cscript.exe:2000 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CF BA A5 F9 13 F7 27 0D 08 C7 57 05 D0 D7 48 E9"

The process cscript.exe:3192 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A6 70 02 B9 11 87 23 85 66 93 86 8E 77 C0 6A 7E"

The process cscript.exe:2532 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5C F4 C6 F5 69 35 BF F3 0B DE 75 86 B9 56 D1 A8"

The process cscript.exe:2536 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A8 7B E0 D6 FD 8E 0F F4 A5 77 DC 44 05 43 AD AC"

The process %original file name%.exe:668 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "27 E1 F1 3C B5 38 5D 39 1F D5 BC 46 E9 09 2F 44"

The process %original file name%.exe:3928 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "87 E1 EE C5 EC 00 10 A9 BC 2F B6 AF C6 DF 49 5D"

The process %original file name%.exe:3648 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C5 33 A3 D7 6E 11 53 C6 47 0B 8A 08 68 17 B9 1D"

The process %original file name%.exe:2656 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F7 B7 17 61 AE 13 2B C9 28 15 41 C0 14 4E 01 FF"

The process %original file name%.exe:2840 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E0 3D C7 89 57 31 5C 62 1D DC F1 7C 14 4C 21 1D"

The process %original file name%.exe:1224 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B9 3B 17 F0 B0 FA C2 BE 51 E7 89 C5 A8 C2 37 27"

The process %original file name%.exe:4020 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "43 D3 67 BA 08 11 78 9A 9E 9F E2 85 28 01 A3 97"

The process %original file name%.exe:3328 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "94 6B 97 7B C1 70 65 D4 E0 5E 42 12 6A F0 D9 6C"

The process %original file name%.exe:3040 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A2 82 6F 24 5E 77 19 78 00 0B A4 14 2B 84 D6 96"

The process %original file name%.exe:4028 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C6 9E 05 4D 3F F9 05 47 F5 F1 00 4C AF 73 B7 E3"

The process %original file name%.exe:1696 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D0 55 B3 7B 97 B7 08 8C 3E 74 96 88 56 12 FF 13"

The process %original file name%.exe:1948 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2F 1C 02 A0 0F 80 B5 1B E1 B5 36 1D 90 D0 E3 94"

The process %original file name%.exe:2320 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "97 94 2C CB A1 36 F3 42 DD 8F AD CD F8 48 EE 07"

The process %original file name%.exe:2324 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "11 99 06 8B 76 64 29 BD D1 D0 AA F3 CC 40 8E F6"

The process %original file name%.exe:3252 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D4 0A 1E 0C D2 03 B5 A4 8D 96 82 1D 16 7D 9C 17"

The process %original file name%.exe:3856 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "34 FE 68 6E 2A 31 22 FE 99 8D 0C B2 F8 2E 0F AB"

The process %original file name%.exe:2404 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "44 DB FD 6A 89 D7 73 CD AF E6 5C D0 7A C2 CF 79"

The process %original file name%.exe:3852 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C6 BF 07 FB F8 EA 7B 77 56 02 E3 86 2A 16 D8 89"

The process %original file name%.exe:2400 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "65 BA EA 00 EB 16 31 46 03 6E 14 2B 84 C2 B8 A8"

The process %original file name%.exe:3804 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "69 C5 5C 08 ED B7 30 F2 B0 CE 23 E4 AD 59 7B 17"

The process %original file name%.exe:3996 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "80 A9 9E C1 F0 A0 80 21 F8 22 6C 6B 10 24 18 AA"

The process %original file name%.exe:3488 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D0 D6 48 79 61 3E 97 C2 C9 F6 12 6B 2E F7 1B 8A"

The process %original file name%.exe:3768 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "51 1D C4 3C DF AE C4 99 D8 97 2C B0 B8 92 BF 8D"

The process %original file name%.exe:3936 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "58 9E 09 BB A1 E9 71 F1 93 47 E9 A6 DA 79 0D 5A"

The process %original file name%.exe:2468 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C9 E8 F2 24 56 85 31 E9 24 E4 13 0B 90 16 25 86"

The process %original file name%.exe:2700 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2D 8D C9 B5 E6 6A 57 AD 55 13 1F E4 2D 61 54 1A"

The process %original file name%.exe:3332 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B9 2E B0 70 B4 19 AD 86 DF FE E9 28 13 35 D6 13"

The process %original file name%.exe:3976 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E8 58 C6 84 9E 48 BE DD C6 06 1D F0 C4 BC 41 A1"

The process %original file name%.exe:264 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BC 94 1B 98 38 88 6D D0 FD ED 1F 75 83 FC 93 0A"

The process %original file name%.exe:3560 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8D 36 C0 67 1A 0F 8F AF A3 58 0D F7 04 51 89 83"

The process %original file name%.exe:3240 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "89 95 12 A6 25 1F CE 8E 92 3E 6D 8C 0A 17 86 99"

The process %original file name%.exe:3244 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "56 76 52 D6 FC 37 FC 09 FE 33 CD 24 EC C1 4B A3"

The process %original file name%.exe:2068 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B7 33 94 67 A4 88 D0 97 4A 9A F2 56 D5 0F CF 14"

The process %original file name%.exe:3844 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1A CE D9 EE 8D 97 57 9C 35 20 A4 9A 15 C2 BB AA"

The process %original file name%.exe:2416 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F4 82 11 2A F2 FC EB 54 8A DF 68 BF 85 A3 C6 70"

The process %original file name%.exe:2060 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5A 7E 92 EF FF 3B DE 9E 22 D9 3C BF A0 AA AB D2"

The process %original file name%.exe:2256 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A5 35 06 66 68 41 5B DB 12 BD F9 FD 95 DC F8 D1"

The process %original file name%.exe:2064 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0B 52 4F 92 47 FA AD 9B 17 B8 D0 2E 07 D1 39 6A"

The process %original file name%.exe:2252 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "09 5F 3B EA 77 8A 80 58 14 F1 F6 EF 97 2A 30 17"

The process %original file name%.exe:3812 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "4D D8 7A 4D 3F 06 AB 4A E1 9A 2C E6 E2 52 CF 9D"

The process %original file name%.exe:2900 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F0 54 27 CD 4F 3D 04 78 48 45 F2 B3 EB A1 03 7A"

The process %original file name%.exe:2284 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A7 BD 29 55 4C 8E D5 BE 62 EC 2B 64 B0 29 41 52"

The process %original file name%.exe:3776 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "27 D8 9F 46 D7 A9 36 FE 34 C8 68 0C 27 83 B1 C6"

The process %original file name%.exe:1324 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D6 7F 0F E6 8E A8 19 68 94 16 70 BA 7E 75 B9 41"

The process %original file name%.exe:1080 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1F 0C E7 B1 6B 30 FA 30 60 12 00 B5 6C D1 35 BB"

The process %original file name%.exe:2772 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9F 7E 14 A0 4F 6C AE C8 7C C5 D2 E1 CF 9C 46 13"

The process %original file name%.exe:3944 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E3 1F 3F 0A 3A B2 CF B9 9B C1 62 17 20 B1 44 05"

The process %original file name%.exe:3828 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2F FF ED B9 0D 40 46 37 DE D3 70 77 BA 47 83 9E"

The process %original file name%.exe:1924 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "97 AC 73 50 AC ED 71 1D AB F6 E7 2A 7F 41 D8 E1"

The process %original file name%.exe:2552 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "4F 4D 50 A3 E8 D8 26 CB C3 56 01 CC 36 9F 35 2F"

The process %original file name%.exe:4044 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "52 1C B1 EE A1 32 62 63 76 C8 4A 57 8C 59 09 64"

The process %original file name%.exe:2308 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9F B8 C5 FF D2 8B B7 BF 22 E4 10 7C 60 86 77 8D"

The process %original file name%.exe:3476 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AD 79 5A E4 84 44 01 24 46 2A 85 2D 95 B2 32 79"

The process %original file name%.exe:2780 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "70 B5 FB CC F9 CA F2 6B A8 60 56 2D A9 DC 26 60"

The process %original file name%.exe:3380 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9C B8 F1 5D A8 B0 58 5B 4B 37 44 74 F6 2E 54 31"

The process %original file name%.exe:2300 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "72 87 52 6F 74 4F E7 78 66 F0 DA CD E6 F7 E9 E1"

The process %original file name%.exe:3172 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AD AC AB C9 A8 55 BA C5 0D B2 2C 56 86 87 AA 0D"

The process %original file name%.exe:4048 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "86 43 F3 DD B8 A1 9D 90 E1 F6 D7 C3 A7 CB 3B 4D"

The process %original file name%.exe:3388 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FD 79 B9 63 E0 8C AD 83 E9 67 67 84 A9 C1 C8 B7"

The process %original file name%.exe:2984 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "10 38 A1 C3 B6 BF 39 A2 D4 BD DA BE 09 EB A8 44"

The process %original file name%.exe:2268 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C4 94 33 9E 1C 0E 71 DF 95 C6 54 44 A1 7E A7 06"

The process %original file name%.exe:2384 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "68 A7 5B BA A6 EA 8D 6C 48 A7 22 8A 19 EC A5 0B"

The process %original file name%.exe:2072 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "00 1E 28 ED FC 23 6A 95 83 07 81 E7 C2 22 44 19"

The process %original file name%.exe:2264 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "7F 94 08 A2 4D C3 25 04 F3 73 22 4E 46 58 A0 1B"

The process %original file name%.exe:532 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EC 48 5E 8E B0 CB A2 77 DE 0F DE E7 D0 D5 34 91"

The process %original file name%.exe:2604 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CF 26 50 33 8A A3 04 86 B8 26 6C 87 60 88 A7 6A"

The process %original file name%.exe:2440 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3F 2A D1 AE 10 AA 48 1F 8C DA 7B 25 6E BA 01 70"

The process %original file name%.exe:2600 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "68 EB 33 89 C8 A2 04 94 19 13 B7 C4 E2 A2 09 14"

The process %original file name%.exe:2608 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "34 C2 BE BC 82 E6 0F AF 03 0A C3 97 ED 8E D6 0C"

The process %original file name%.exe:304 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "02 C6 5E D6 02 70 26 A9 C4 61 F3 B5 98 2A DE 0B"

The process %original file name%.exe:3740 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F2 55 1C C1 F9 9F AC DD 35 E5 0D 29 0C 7D CB 6B"

The process %original file name%.exe:2764 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E1 4D 85 A5 97 A2 62 4B F4 EA 19 3B 1B CA 17 98"

The process %original file name%.exe:3260 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "35 28 7F C9 00 77 7B 8B 93 8A A2 1D 1A 65 86 E7"

The process %original file name%.exe:3264 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "94 A3 6E 38 B8 EC B2 34 E6 A2 E4 E8 B3 14 02 4F"

The process %original file name%.exe:2832 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8E 27 76 A4 A5 BB 5D 0D 46 14 BE 17 71 14 7B 0C"

The process %original file name%.exe:3460 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B4 7B AC 70 9D 3C B4 4F 2B D1 D2 64 1D C8 88 6F"

The process %original file name%.exe:3500 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "61 2F 00 A2 56 7C 91 0E 47 C1 6F 06 1E AD 9F D3"

The process %original file name%.exe:3444 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0F 13 D6 B8 3C 80 9E 2A BB 60 0C 2E 98 70 76 89"

The process %original file name%.exe:1240 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1A 63 2B 29 13 20 6A 89 17 E3 82 BA 5F 36 EC E1"

The process %original file name%.exe:3096 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "4B E2 11 28 47 CB C9 E5 21 B3 69 EB F0 C9 CC 74"

The process %original file name%.exe:2164 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "46 5F C2 62 C2 4E F1 27 14 3E 84 40 98 5B CF BE"

The process %original file name%.exe:3820 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "06 C5 5C 90 12 92 94 ED 35 B5 71 B1 0E FA 3F B2"

The process %original file name%.exe:3156 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "43 90 BE 87 F2 A5 17 F9 0A 6F 81 D8 A0 CE 96 DD"

The process %original file name%.exe:2928 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F0 56 A8 64 4B DC CB FF 0E 01 C1 1B 28 9E B4 C6"

The process %original file name%.exe:620 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B4 E1 80 B1 5C E1 40 A0 5B 16 1E C9 3E 2A 3C 60"

The process %original file name%.exe:3596 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AB 2A F5 22 F2 83 98 33 B0 9B 13 8F 94 32 A0 37"

The process %original file name%.exe:572 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DB E9 19 4F 59 50 F8 F9 5B 58 B7 5A 83 FB F8 2B"

The process %original file name%.exe:2296 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3F 3D 09 03 5B 33 37 8A 48 79 18 02 1E 09 E6 B1"

The process %original file name%.exe:2192 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2A BC 16 8F CA 6E 12 DD 52 9D F9 A3 14 D5 A7 A1"

The process %original file name%.exe:592 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "69 54 BD 53 C2 4D 7B F8 B3 E9 B2 7E 8F F6 51 02"

The process %original file name%.exe:3696 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0A 9B A2 38 69 F6 13 6A 3A 36 3F BF 08 0A 9F 10"

The process %original file name%.exe:2196 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "06 7B F2 E2 86 24 ED A3 29 3E CB F3 E0 13 C9 8F"

The process %original file name%.exe:1904 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "70 E6 B9 C2 16 F2 59 9A 7F D4 F6 9B B8 CE 5D 83"

The process %original file name%.exe:3160 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C5 79 D0 C1 A3 AC AF 02 AC 55 DD 47 FA AC 0A 7B"

The process %original file name%.exe:3452 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AF 82 56 2F 72 4A 98 F2 87 C3 95 21 94 8C 11 A4"

The process %original file name%.exe:2568 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "65 51 75 1B 2A A1 19 2D 24 B7 86 53 C4 51 7F F4"

The process %original file name%.exe:3456 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "97 D5 23 9C 26 96 C7 8F A6 A3 D2 07 2C 06 B1 69"

The process %original file name%.exe:4064 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "18 AB 23 E2 0F 1B BF 16 80 84 7D 1B D4 57 A8 E3"

The process %original file name%.exe:3364 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "41 51 6B 19 A4 17 3B C7 69 4D 5B 75 F8 E0 3A 58"

The process %original file name%.exe:3512 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "50 27 6A 86 80 BC 1F 3F 5B 7C 6F 7B A5 22 FA 69"

The process %original file name%.exe:2904 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A0 FF 24 A8 1A 5F B4 02 E5 C1 C7 CE FB DF DE 9E"

The process %original file name%.exe:2564 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E3 AA 62 93 49 06 2F 5B 16 CA CB 85 0F D9 29 B7"

The process %original file name%.exe:1584 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C3 82 90 CF DD 8F B2 FD 20 E5 49 18 D4 AB E3 B7"

The process %original file name%.exe:1736 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BE CB 74 8B 74 FA 73 F4 C3 BD 25 50 7E E5 43 6B"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"fGAwoYMM.exe" = "%Documents and Settings%\%current user%\dUskcAww\fGAwoYMM.exe"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NesIMIQs.exe" = "%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.exe"

The process %original file name%.exe:656 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3D 0F 18 54 3D B0 89 99 A2 D4 77 D9 2E F7 14 A7"

The process %original file name%.exe:2688 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "92 EF 82 1B 05 0B C5 4A D1 7A F6 AD 4A 16 27 C4"

The process %original file name%.exe:2792 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2A 83 58 36 83 D2 B8 70 58 43 8C 3D EA 4A B3 EE"

The process %original file name%.exe:3892 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D9 D7 BF A7 E9 08 DC 88 2D 1B 73 0C 26 C4 F9 7D"

The process %original file name%.exe:3084 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "07 F5 5F 95 34 AE 72 79 7C DE EE A2 ED D2 C8 1F"

The process %original file name%.exe:2112 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BE 6A 91 D6 80 BD CB 8E D9 A6 8D 62 A6 A3 AF 4A"

The process %original file name%.exe:2680 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "62 A5 FB B7 26 EB A4 11 7A 3D 3F A4 F1 C5 E7 24"

The process %original file name%.exe:2816 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "51 B3 53 24 35 74 6A 7C 66 CC 9A 45 AF CA 47 95"

The process %original file name%.exe:2420 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "65 D8 23 A6 ED 7B 47 7E 6B 26 28 82 E6 C5 0A D3"

The process %original file name%.exe:4036 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E3 89 8C 62 ED B6 97 13 57 9A 6E 89 E7 39 54 A9"

The process %original file name%.exe:2588 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "73 62 96 FB AA 19 47 1B E0 61 47 85 9A 60 9E 19"

The process %original file name%.exe:3728 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1E 64 24 EB A7 8C 58 33 9A B9 8F 69 21 E8 74 41"

The process %original file name%.exe:3076 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EE 15 32 CA B2 6C D3 2A 67 DF E1 08 08 60 A3 09"

The process %original file name%.exe:2956 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "50 3F 1D 67 DE 4C 00 14 29 EB D9 F5 9C CA 6E 9A"

The process %original file name%.exe:3284 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "67 12 3D 9B 50 AE 79 F5 C1 FD 80 1D FC 51 F1 42"

The process %original file name%.exe:160 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CE 80 BB 14 C3 0D 30 27 BE 47 9F 7E F7 FA 5A DE"

The process %original file name%.exe:188 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E9 8F E4 DF BE DA 71 0B 1A AA 86 A8 B2 A6 5D 69"

The process %original file name%.exe:3528 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "4E 8D 3F 23 54 BC 40 D1 C7 9C 1F C4 C2 0C DC 93"

The process %original file name%.exe:3200 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2D A2 F4 8B DD 1F 1F 39 2D 1F D9 0B 84 E1 74 2F"

The process %original file name%.exe:3376 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "58 90 FB D0 3D 4C FE 66 1E BD 2A F1 0F 46 DA 22"

The process %original file name%.exe:3208 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FC 65 83 94 A0 7C 46 B8 EA E1 C4 19 E7 37 D4 4B"

The process %original file name%.exe:2752 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AB BD D8 BB D1 44 6F 96 DE E1 59 58 0E 07 FA D3"

The process %original file name%.exe:1100 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8F 9C 70 9A D3 C6 A8 1F AD BE 9A 9E 90 FC 25 29"

The process %original file name%.exe:2128 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AC FB 4F F1 3B 65 AF 8D F1 87 BE 58 D8 19 76 20"

The process %original file name%.exe:2356 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1B 05 05 A4 D1 5F 2C 4B 4E 5B D2 91 DB 9F 69 2A"

The process %original file name%.exe:2692 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "24 5D 03 52 D0 08 3B 6E CE 2C A7 9D EA 09 0E 8D"

The process %original file name%.exe:2512 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "77 0F 97 75 DB D1 3C D3 B1 5C 02 9D 07 10 F8 53"

The process %original file name%.exe:2104 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FA EB BD B9 9B 52 DC 79 83 0E 14 A9 97 B7 BB 65"

The process %original file name%.exe:2860 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "57 AE 03 A3 0D E1 5A 89 7A 51 90 34 CB C9 CF 18"

The process %original file name%.exe:3868 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DD 2B 47 48 E3 49 09 88 04 E4 D7 99 58 B1 B3 CB"

The process %original file name%.exe:4088 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CF 65 3A 1B FA A0 F1 AD 30 86 1B FB 09 D8 5D 80"

The process %original file name%.exe:3864 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F7 18 94 74 FC A6 96 B8 24 2D 45 5A 36 97 1B 14"

The process %original file name%.exe:3532 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F2 D6 F2 3D 25 03 B5 61 6C A1 31 CF 46 CA 13 64"

The process %original file name%.exe:3108 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6F BB 2C FD F8 94 9E 47 DB 1C 05 61 ED 3F 97 FB"

The process %original file name%.exe:4000 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B7 40 85 32 22 5E DA 7A D0 95 81 D1 87 77 DE 7B"

The process %original file name%.exe:2348 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1D F3 FD 4A 20 97 34 83 B5 27 C6 F9 C9 2D FE 5C"

The process %original file name%.exe:3184 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DE ED C7 E2 CA D3 F5 7F 33 A8 B7 8C A0 EF C5 9B"

The process %original file name%.exe:2740 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AB 94 64 05 C3 5E 1B 1A 6F 2D EC 74 A7 0C 61 F7"

The process %original file name%.exe:2744 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "44 34 79 DA CD 44 83 84 6D 66 E2 0B 49 BE 8A 39"

The process %original file name%.exe:324 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F3 4F 10 17 8A 4D 09 5F F6 8D C8 29 18 CC 96 21"

The process %original file name%.exe:2508 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "34 BF AF 00 7E 4D 04 85 D1 E2 28 A3 70 06 89 C9"

The process %original file name%.exe:1560 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "10 BF CA 35 11 9C 15 7C 0D F5 CE 8C 20 E6 D2 53"

The process %original file name%.exe:2504 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CF C4 26 EF 17 D9 26 19 53 AB 30 33 46 D9 1F 97"

The process %original file name%.exe:2640 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "02 BD 0E D5 BF AD 8C 37 0E C0 40 32 7C 00 F2 CA"

The process %original file name%.exe:3620 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "55 88 B1 E3 9D 7E C3 7B C1 AB 6F B6 46 13 7E 9F"

The process %original file name%.exe:3624 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6A 4C 19 6B 18 1A F6 7C 6F AE 3E A2 D7 34 37 C6"

The process %original file name%.exe:3708 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AB AF 8A 53 99 42 FB BE 94 48 C2 EF 56 AF FA 9B"

The process %original file name%.exe:2932 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "07 06 19 4F A6 E3 8E 67 DB 93 9E 05 91 14 86 1C"

The process %original file name%.exe:2972 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9A 91 F4 15 3F E1 35 C8 AA DE 9C 82 C3 A6 B6 F1"

The process %original file name%.exe:2132 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "7D 30 38 41 39 78 50 E3 F5 67 F5 A7 CB C4 F4 59"

The process %original file name%.exe:2976 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "73 57 CD 3F 91 7F D6 FC DB D9 19 B6 4B 8D A5 1A"

The process %original file name%.exe:3704 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D1 3A 09 86 27 D8 45 ED 7A 10 77 F0 F0 F1 06 0B"

The process %original file name%.exe:2332 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5A 2D 50 EE C3 89 B7 9E CC 1A 90 7D A8 D8 1F 96"

The process %original file name%.exe:1280 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8D 44 58 DF 5E 52 DF E4 F5 70 D7 26 39 6D 0A 05"

The process %original file name%.exe:2336 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E5 19 99 CA 54 45 69 F9 6C BD E9 C3 3B 95 A3 12"

The process %original file name%.exe:4012 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8A EA FE 88 16 8B F8 2C 01 0B C0 C6 D4 33 AF 3B"

The process %original file name%.exe:944 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AF 1F 49 90 F3 C5 30 33 AD EF 10 68 13 AE 52 58"

The process %original file name%.exe:3548 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "35 2D C9 22 BB 54 8A 9A 89 19 65 7E A0 06 CB E4"

The process %original file name%.exe:2084 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "14 25 6F BE 99 AF A1 94 69 4C F5 F2 71 FB B8 64"

The process %original file name%.exe:2236 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3F 4A 19 59 28 62 D8 51 5B CC 16 80 38 B6 12 09"

The process %original file name%.exe:876 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BA F2 65 47 06 DB 8A 7A 3F 35 C1 67 95 CA 97 95"

The process %original file name%.exe:2000 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8A 16 8F 88 81 4C 31 83 65 C5 7F D0 09 00 2D 78"

The process %original file name%.exe:476 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DD 4F 6F 6D 6C 0D E1 77 34 93 19 60 3F FD D3 7A"

The process %original file name%.exe:352 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DD CA 64 9D CB 48 35 FA 38 05 C4 1A EA 6B 05 75"

The process %original file name%.exe:1572 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "34 FD 26 04 C0 F4 34 39 7B 3C 74 91 7D F4 00 3C"

The process %original file name%.exe:2008 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8D FB 2F 39 17 53 B8 CA 54 B8 27 BD C2 06 DD 9B"

The process %original file name%.exe:1764 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B2 31 A0 B4 7D 3F 63 54 7B 91 D1 23 68 5A C0 45"

The process NesIMIQs.exe:1664 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "34 09 C6 86 EA E0 C5 2C A6 43 14 B8 15 E8 E1 C5"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"NesIMIQs.exe" = "%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.exe"

Dropped PE files

MD5 File path
15341af9956c8ecdc542b93da4b706b8 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\airplane.bmp.exe
df15b1886941897f26340f02d0576ca4 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\astronaut.bmp.exe
e956b1f3f455eb093a18357f9befb67d c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\ball.bmp.exe
14021bcb831c193c4875aa84cc32a1fd c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\beach.bmp.exe
4080802a2bf1dbce21f982aa0e041f7a c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\butterfly.bmp.exe
c84fb96853b49c73e60e036764fb05f4 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\car.bmp.exe
65ed6184357211618fa5bc6dfed57a98 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\cat.bmp.exe
e5922e964f57629b90b69d05da22a95f c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\chess.bmp.exe
6124f3aed1eef5ba0f17f0fafdea73ed c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dirt bike.bmp.exe
172b29cdc602d6339547cf9df6c5cc5e c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dog.bmp.exe
d529dee1450dbf3db415caad056748c7 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\drip.bmp.exe
f68b5c1f8e44bf2bcfaa4d91cc139745 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\duck.bmp.exe
4e6b625f3ca395dbfc27ef2aa5ba3461 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\fish.bmp.exe
c56d279db876acbd8ca53eabef2ca006 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\frog.bmp.exe
b6cf0e4fa9dfa76f1cbce89f43bc4e32 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\guitar.bmp.exe
ced9a42f6fe22ddcff4534557281ee59 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\horses.bmp.exe
f63427cd52adbe9ad9a46b88ddc21b42 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\kick.bmp.exe
504a15004642154f1070c8f469c171a9 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\lift-off.bmp.exe
d52994a6d8c26aee07cc2522f4367596 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\palm tree.bmp.exe
1a9778b9ab341fdae2950a58121d9287 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\pink flower.bmp.exe
eb67e053de210829d04d7eb940403004 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\red flower.bmp.exe
3b6a78bbcb83e273a165d021923720ca c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\skater.bmp.exe
5fc08f9999b0764c46bc52a58aad0847 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\snowflake.bmp.exe
0523f9d2a3e3f2c36cf131703c5a9898 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\adm.bmp.exe
f77ea0e274bf1e8022bfe02991e51baa c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\guest.bmp.exe
6a006c6118cadedfb5ea7440187deb2a c:\Documents and Settings\All Users\Documents\My Music\Sample Music\Beethoven's Symphony No. 9 (Scherzo).wma.exe
0c56e524736c51868e899a8324403424 c:\Documents and Settings\All Users\Documents\My Music\Sample Music\New Stories (Highway Blues).wma.exe
4ecdca3edb2ba17be5ccf5208c4f53b2 c:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Blue hills.jpg.exe
3dbe5d8b52b3fdc70c79dec9686a2ce6 c:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Sunset.jpg.exe
05c1563d058c4ecaa60967424d5a3125 c:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Water lilies.jpg.exe
6110007cdb934c462040f658a85581f7 c:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Winter.jpg.exe
4fe7c42ae0589b0e2bc3a8a821daa4da c:\Documents and Settings\All Users\JuwEIgUE\reIEcoQI.exe
fb34dc7a92d122f787ed7696dd7ef9bd c:\Documents and Settings\All Users\hcYYccwo\NesIMIQs.exe
b2642668880f700e144557ffc4a2dfbe c:\Documents and Settings\"%CurrentUserName%"\dUskcAww\fGAwoYMM.exe
5ac18974626b19c7943b4faf9e85d2d5 c:\Perl\eg\IEExamples\ie_animated.gif.exe
ab149135194ab06c2a0ccb3eafaabbc9 c:\Perl\eg\IEExamples\psbwlogo.gif.exe
80759c3d9a4c6c6ddfb33bc23690d66d c:\Perl\eg\aspSamples\ASbanner.gif.exe
52cebd5b8466cb36cb0505314b015128 c:\Perl\eg\aspSamples\Main_Banner.gif.exe
4eefaad24952abd25f0524806f29ee80 c:\Perl\eg\aspSamples\psbwlogo.gif.exe
fcf7159dd49283ae622dd72d900d3ff4 c:\Perl\html\images\AS_logo.gif.exe
fc822689c1d4fbe257230aaa36dd6f79 c:\Perl\html\images\PerlCritic_run.png.exe
45d31f9233580e67311302f8e792caf0 c:\Perl\html\images\aslogo.gif.exe
03345f0746638e9ddd55f2efd49c4072 c:\Perl\html\images\ppm_gui.png.exe
c6f86e66f5d7d999d863d222840ed5ee c:\Perl\lib\ActivePerl\PPM\images\gecko.png.exe
d720151c2197656fe07e00ce6ab8d70b c:\Perl\lib\ActivePerl\PPM\images\perl_48x48.png.exe
0c72888093f13983be46e1e716986524 c:\Perl\lib\Devel\NYTProf\js\asc.png.exe
ac5b6da54623801bd707886298b70275 c:\Perl\lib\Devel\NYTProf\js\bg.png.exe
3764b3cd576382b44d79fa558fd5aa43 c:\Perl\lib\Devel\NYTProf\js\desc.png.exe
6aeb0fc7506c92eabe50b9c2dade4c53 c:\Perl\lib\Devel\NYTProf\js\jit\gradient.png.exe
3538ceb6830688ccb6f5703b44ca723f c:\Perl\lib\Devel\NYTProf\js\jit\gradient20.png.exe
eb83720ddd885cc77851c9b9173bec46 c:\Perl\lib\Devel\NYTProf\js\jit\gradient30.png.exe
0475168d57a12f6d0086117b01631fb6 c:\Perl\lib\Devel\NYTProf\js\jit\gradient40.png.exe
f04a3c519f12c59a40771ea6a16a3af6 c:\Perl\lib\Devel\NYTProf\js\jit\gradient50.png.exe
faac253781bce615f3eb236a26299aa5 c:\Perl\lib\Mozilla\CA\cacert.pem.exe
8d42b1ca7b9cf3fad235d9beb99b7a4a c:\totalcmd\TCMADMIN.EXE.exe
4a406c8852ede90ddf7a006f58242827 c:\totalcmd\TCMDX32.EXE.exe
d609d7ebd3f96b01fad2bd9f2f9f2a75 c:\totalcmd\TCUNINST.EXE.exe
08b0f869023b0960c80f9589e4b2cad9 c:\totalcmd\TOTALCMD.EXE.exe

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

VersionInfo

No information is available.

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 4096 458752 458240 5.50922 1505acea02fbd62fea25f581c3673a4f
.rdata 462848 4096 512 2.15824 2f3d05d88024af89efc9d77966458d4e
.data 466944 232 512 2.57765 0583c7297bd5ff821b64109fb4e1212c
.rsrc 471040 6940 7168 3.9906 7f817863162c044465e7746d318ec890

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

URL IP
hxxp://google.com/ 173.194.113.192


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

Traffic

GET / HTTP/1.1
Host: google.com


HTTP/1.1 302 Found
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Location: hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=QIC9VPoYqq3zB-O9gfgE
Content-Length: 260
Date: Mon, 19 Jan 2015 22:08:00 GMT
Server: GFE/2.0
Alternate-Protocol: 80:quic,p=0.02
<HTML><HEAD><meta http-equiv="content-type" content="te
xt/html;charset=utf-8">.<TITLE>302 Moved</TITLE></HE
AD><BODY>.<H1>302 Moved</H1>.The document has mov
ed.<A HREF="hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=QIC9VPoYqq3z
B-O9gfgE">here</A>...</BODY></HTML>..HTTP/1.1 302
Found..Cache-Control: private..Content-Type: text/html; charset=UTF-8
..Location: hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=QIC9VPoYqq3zB-O9gfg
E..Content-Length: 260..Date: Mon, 19 Jan 2015 22:08:00 GMT..Server: G
FE/2.0..Alternate-Protocol: 80:quic,p=0.02..<HTML><HEAD>&l
t;meta http-equiv="content-type" content="text/html;charset=utf-8">
.<TITLE>302 Moved</TITLE></HEAD><BODY>.<H1&
gt;302 Moved</H1>.The document has moved.<A HREF="hXXp://VVV.
google.com.ua/?gfe_rd=cr&ei=QIC9VPoYqq3zB-O9gfgE">here</A>
;...</BODY></HTML>....


GET / HTTP/1.1
Host: google.com


HTTP/1.1 302 Found
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Location: hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=P4C9VJHBNqKt8wfZr4GgAw
Content-Length: 262
Date: Mon, 19 Jan 2015 22:07:59 GMT
Server: GFE/2.0
Alternate-Protocol: 80:quic,p=0.02
<HTML><HEAD><meta http-equiv="content-type" content="te
xt/html;charset=utf-8">.<TITLE>302 Moved</TITLE></HE
AD><BODY>.<H1>302 Moved</H1>.The document has mov
ed.<A HREF="hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=P4C9VJHBNqKt
8wfZr4GgAw">here</A>...</BODY></HTML>..HTTP/1.1 3
02 Found..Cache-Control: private..Content-Type: text/html; charset=UTF
-8..Location: hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=P4C9VJHBNqKt8wfZr
4GgAw..Content-Length: 262..Date: Mon, 19 Jan 2015 22:07:59 GMT..Serve
r: GFE/2.0..Alternate-Protocol: 80:quic,p=0.02..<HTML><HEAD&g
t;<meta http-equiv="content-type" content="text/html;charset=utf-8"
>.<TITLE>302 Moved</TITLE></HEAD><BODY>.<
;H1>302 Moved</H1>.The document has moved.<A HREF="hXXp://
VVV.google.com.ua/?gfe_rd=cr&ei=P4C9VJHBNqKt8wfZr4GgAw">here<
;/A>...</BODY></HTML>....


GET / HTTP/1.1
Host: google.com


HTTP/1.1 302 Found
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Location: hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=toC9VL_2G42u8wfuz4LgAQ
Content-Length: 262
Date: Mon, 19 Jan 2015 22:09:58 GMT
Server: GFE/2.0
Alternate-Protocol: 80:quic,p=0.02
<HTML><HEAD><meta http-equiv="content-type" content="te
xt/html;charset=utf-8">.<TITLE>302 Moved</TITLE></HE
AD><BODY>.<H1>302 Moved</H1>.The document has mov
ed.<A HREF="hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=toC9VL_2G42u
8wfuz4LgAQ">here</A>...</BODY></HTML>..HTTP/1.1 3
02 Found..Cache-Control: private..Content-Type: text/html; charset=UTF
-8..Location: hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=toC9VL_2G42u8wfuz
4LgAQ..Content-Length: 262..Date: Mon, 19 Jan 2015 22:09:58 GMT..Serve
r: GFE/2.0..Alternate-Protocol: 80:quic,p=0.02..<HTML><HEAD&g
t;<meta http-equiv="content-type" content="text/html;charset=utf-8"
>.<TITLE>302 Moved</TITLE></HEAD><BODY>.<
;H1>302 Moved</H1>.The document has moved.<A HREF="hXXp://
VVV.google.com.ua/?gfe_rd=cr&ei=toC9VL_2G42u8wfuz4LgAQ">here<
;/A>...</BODY></HTML>....


The Trojan connects to the servers at the folowing location(s):

fGAwoYMM.exe_1616:

.text
`.rdata
@.data
3E.Pcq:P!V^
#%Xkq.
g%c!8U
.JF{<
U%Sa@
('%D^q-*
?|Q%f
SE?.rn~M*
.Dhe4
E.IdJWH
%k%cn>x_
?%uRc!
%3.UGiO0
]w.LQ
I 4keyy
L%C['
7.BLP
;.StH 
>.Qlx #6
Microsoft Windows
[email protected]
P.yrBX.
PB]%C
%FoS(
F<.cS
=> 
CryptGetKeyParam
advapi32.dll
user32.dll
kernel32.dll

fGAwoYMM.exe_1616_rwx_00401000_00069000:

3E.Pcq:P!V^
#%Xkq.
g%c!8U
.JF{<
U%Sa@
('%D^q-*
?|Q%f
SE?.rn~M*
.Dhe4
E.IdJWH
%k%cn>x_
?%uRc!
%3.UGiO0
]w.LQ
I 4keyy
L%C['
7.BLP
;.StH 
>.Qlx #6
Microsoft Windows
[email protected]
P.yrBX.
PB]%C
%FoS(
F<.cS
=> 

fGAwoYMM.exe_1616_rwx_00900000_00068000:

3E.Pcq:P!V^
#%Xkq.
.JF{<
U%Sa@
('%D^q-*
?|Q%f
SE?.rn~M*
.Dhe4
E.IdJWH
%k%cn>x_
?%uRc!
%3.UGiO0
]w.LQ
I 4keyy
L%C['
7.BLP
;.StH 
>.Qlx #6
$g.Gd
P.yrBX.
PB]%C
%FoS(
F<.cS

fGAwoYMM.exe_1616_rwx_00980000_00001000:

C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp

NesIMIQs.exe_1664:

.text
`.rdata
@.data
3E.Pcq:P!V^
#%Xkq.
.LF _IqB
*.*IL
i>;.SQ
.Irsm
8I%f_
Hf_S.Qh
A%UM3
D..DZ
hy.jx
s.BIe5@
Z.PfYP
V-.is
#-.qt
.IH-H
i.aZ{k
Windows Internet Explorer
Windows Task Manager
taskmgr.exetaskkill /F /IM taskmgr.exe /T
>.Qlx #6
Microsoft Windows
.iQmT
.fV=e
user32.dll
NtEnumerateValueKey
ntdll.dll
kernel32.dll

fGAwoYMM.exe_1616_rwx_00BB0000_00001000:

D>%x!

fGAwoYMM.exe_1616_rwx_00BC0000_00001000:

%Documents and Settings%\%current user%\dUskcAww\fGAwoYMM

fGAwoYMM.exe_1616_rwx_00BD0000_00001000:

%Documents and Settings%\All Users\hcYYccwo\NesIMIQs

fGAwoYMM.exe_1616_rwx_00BE0000_00001000:

%Documents and Settings%\%current user%\dUskcAww\fGAwoYMM.inf

fGAwoYMM.exe_1616_rwx_00BF0000_00001000:

%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.inf

reIEcoQI.exe_1276:

.text
`.rdata
@.data
3E.Pcq:P!V^
#%Xkq.
.JF{<
U%Sa@
('%D^q-*
?|Q%f
SE?.rn~M*
.Dhe4
E.IdJWH
%k%cn>x_
?%uRc!
%3.UGiO0
]w.LQ
I 4keyy
L%C['
7.BLP
;.StH 
>.Qlx #6
2software\microsoft\windows\currentversion\run
P.yrBX.
PB]%C
%FoS(
F<.cS
user32.dll

fGAwoYMM.exe_1616_rwx_00C00000_00001000:

%Documents and Settings%\%current user%\dUskcAww\fGAwoYMM.exe

fGAwoYMM.exe_1616_rwx_00C10000_00001000:

%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.exe

fGAwoYMM.exe_1616_rwx_00C40000_00001000:

fGAwoYMM.exe

fGAwoYMM.exe_1616_rwx_00C50000_00001000:

NesIMIQs.exe

fGAwoYMM.exe_1616_rwx_00C60000_00001000:

taskkill /FI "USERNAME eq adm" /F /IM fGAwoYMM.exe

fGAwoYMM.exe_1616_rwx_00C70000_00001000:

taskkill /FI "USERNAME eq adm" /F /IM NesIMIQs.exe

fGAwoYMM.exe_1616_rwx_00C80000_00001000:

%Documents and Settings%\All Users\JuwEIgUE\reIEcoQI.exe

fGAwoYMM.exe_1616_rwx_00C90000_00001000:

%Documents and Settings%\All Users\KAAo.txt

fGAwoYMM.exe_1616_rwx_00CA0000_00001000:

notepad.exe "%Documents and Settings%\All Users\KAAo.txt"

fGAwoYMM.exe_1616_rwx_00CB0000_00001000:

%Documents and Settings%\All Users\JuwEIgUE

NesIMIQs.exe_1664_rwx_00401000_00069000:

3E.Pcq:P!V^
#%Xkq.
.LF _IqB
*.*IL
i>;.SQ
.Irsm
8I%f_
Hf_S.Qh
A%UM3
D..DZ
hy.jx
s.BIe5@
Z.PfYP
V-.is
#-.qt
.IH-H
i.aZ{k
Windows Internet Explorer
Windows Task Manager
taskmgr.exetaskkill /F /IM taskmgr.exe /T
>.Qlx #6
Microsoft Windows
.iQmT
.fV=e

NesIMIQs.exe_1664_rwx_00900000_00068000:

3E.Pcq:P!V^
#%Xkq.
.JF{<
U%Sa@
('%D^q-*
?|Q%f
SE?.rn~M*
.Dhe4
E.IdJWH
%k%cn>x_
?%uRc!
%3.UGiO0
]w.LQ
I 4keyy
L%C['
7.BLP
;.StH 
>.Qlx #6
$g.Gd
P.yrBX.
PB]%C
%FoS(
F<.cS

NesIMIQs.exe_1664_rwx_00980000_00001000:

C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp

NesIMIQs.exe_1664_rwx_00BC0000_00001000:

%Documents and Settings%\%current user%\dUskcAww\fGAwoYMM

NesIMIQs.exe_1664_rwx_00BD0000_00001000:

%Documents and Settings%\All Users\hcYYccwo\NesIMIQs

NesIMIQs.exe_1664_rwx_00BE0000_00001000:

%Documents and Settings%\%current user%\dUskcAww\fGAwoYMM.inf

NesIMIQs.exe_1664_rwx_00BF0000_00001000:

%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.inf

NesIMIQs.exe_1664_rwx_00C00000_00001000:

%Documents and Settings%\%current user%\dUskcAww\fGAwoYMM.exe

NesIMIQs.exe_1664_rwx_00C10000_00001000:

%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.exe

NesIMIQs.exe_1664_rwx_00C40000_00001000:

fGAwoYMM.exe

NesIMIQs.exe_1664_rwx_00C50000_00001000:

NesIMIQs.exe

NesIMIQs.exe_1664_rwx_00C60000_00001000:

taskkill /FI "USERNAME eq adm" /F /IM fGAwoYMM.exe

NesIMIQs.exe_1664_rwx_00C70000_00001000:

taskkill /FI "USERNAME eq adm" /F /IM NesIMIQs.exe

NesIMIQs.exe_1664_rwx_00C80000_00001000:

%Documents and Settings%\All Users\JuwEIgUE\reIEcoQI.exe

NesIMIQs.exe_1664_rwx_00C90000_00001000:

%Documents and Settings%\All Users\KAAo.txt

NesIMIQs.exe_1664_rwx_00CA0000_00001000:

notepad.exe "%Documents and Settings%\All Users\KAAo.txt"

NesIMIQs.exe_1664_rwx_00CB0000_00001000:

%Documents and Settings%\All Users\JuwEIgUE

NesIMIQs.exe_1664_rwx_01100000_02300000:

advapi32.dll
ntdll.dll
user32.dll
GetProcessHeap
kernel32.dll
,4:S.La
ß?F
/.lAn
R!%S/S
3.Mi!
HûE
%XtJDw
Sn.Kp
.VeT4x
%UXKK
M%F&&
.Yz6P*v
akM'u.eS
m.DZk
%XP|]p
R%uX`=
z%uXX
$xj%%Xp
X:%uX
(!%uP
(!%u(1
}EPzm%XX
Xj%UX8%m
S;.wV
S;.oW
Cc.bR
S;.OB
S;.oP
S;.wS
S;.OT
S;.WM
#.lR?oo
oe@%D
Y=B%D<
9i.MZh,
IA.utA8aXi,MZm
0-LU1}-
Y.dwb
j.Ld-kd
j.xBE
>%Dxf
j.VXn
"]n#%C
n}.Ct
%Cxx 
.CGI9X
#Cn]%Cog
.Cx`*
.Coa*U
.Csa*U
nÌ}
cnÝVI9
nu%Cx
JC%uH
pcÎ
h\%Coa*U
hZ%Coa*U
hD%Coa*U
hB%COa*Uy
n-DC}
hd%Coa*
hb%Coa*
h`%Coa*
%Coa*
%COa*Uy
.Ce`:Q
.Ca9`
h".Cg`:3
J3%uH
J;%uH
"Cu<%U
h>.Cna:
n9%c~
..CgI$
nLy
hf.CE`:Y
Snk%C
@`#_@`#%@`#
=%UE1
%Cx`*
%Coa*U
%Coa*U|I
%Coa*Uy
%COa*U~M
%COa*U
%Csa*U
xX%CxH 
xH%CxH 
#]n) Cn;.Gl
#CnE.Cn=#
o9%C~
o9Ï
%Cn;BIW
vBE<%U
C@nE%C
d%Cn9
Î`*Q
%Cnyg
hZÎ`:
ht%Cwa:1
%f#9Tf#MSf#
<f#K%f#
&f#%Xf#!%f#g4f#
Ïa:
`2%x$1R
( %Cn
Î`:Y
1%&%1X
n5%Cx
n|n;
Cn!%C
CnI%C
n;.BF
Knu-C}
#CmDE
 %c?j
g%f*A
\n!=Cj%U
]ng%Cp
c[=-q%U
]nm%C
x`5.ee
#Uq%U
=Cq%U
%%xf1
'Cq%U
\nq'Cq%U
]n'%C
%%fm1
st#{st#sst#kst#Sst#Kst#Crt#
rt#{rt#srt#krt#crt#[rt#Cut#
T.YtIxJ"cts
J"cnE.Ce
J"cnuÎ
n!%Cme
#CnL
U|9P%x
 %x>4
ny%CP
%CNy5
g.bUn
|:.Cn
!.Cli
'Cm>.Un
.CtNC
.CxNS
.Cg?L?x
n .Cn
\nqÎ9p
%C'y9Zn
[email protected]
ÉX8
Pn%dN~y1
db.Cih<K
|ú9
.kSBE
0Cny.Czy5
0CniÍ
`=-q%U
n%%4x
.MPFE
y9j.yU
YnE.Qg9
%Cgk!
Un;.zu
Un;.iu
B`r#]n%%Cok!
Un;.Qu
%CXx9X
%'y1Jni%C}j5
C%Xp9H
>&úQ
%Cox5D
N`%C'y5Zn
Nn%C'y5ZnY"C
Nn%C&y5
']nE%Cn
ùXn
.Cns#CE
.Cns#C
d.CneiE&y1
.Cnw C
.CtH!
%Cn_"C~y5
.CqoT
.Cn}(E
%C'y5Zn
.Ctn&
%Cix5
F'y5Zn)%C
%CN{5
%C'y5Zn9"C
N4%C&y9
N2%C&q9
%C&y5
%CN{9J
g%C&i2
YnM.Mj9
IH'q9zn)%C&q1
(Cn!%ClkQJt
nU.Hn
%C'y1*n
%C'y1*ni%C
%C'q9Jn
`=/Hq9Hxj.CxB
&]ns.Cn
#]n;%C
\ns%C
%C'y5Zn)&C
\nE%C&s5
.CnkYRx
#%fkSBx
%Cn9#C|
%Xl?3C
%Xl=3C
"Cm98%U
OnÛe
%fkSB
.KNz9
n).Cn
.Coy9T|
Qn).CnkQB
'Cc>.Un
hd %C
E'y9ZnI%C
'q9JnI%Cn
0%Cni C
:%Cni C
dÏak
hx`%Ct^3
%CxPk
%CnUQRE
!C.yU
na%C&
 %3>.Un
%C?x5\
%Ckk!
c%d>\
%8lw.CA
%8nq.Cm
%Chp9H
aK.kSbx
%CTy9
ng%2x
#Cne%Cy
]qkU
#Cq%U
#Cn1%C
\nY%Cn
%xp1x
%xq1x
#C.ak
D"Cne%C
na%Cn;\Eg
"Cn{%4x
#sn9%Cn
h"%xh
#Cb%CQh

NesIMIQs.exe_1664_rwx_03900000_01E00000:

.text
`.rdata
@.data
.rsrc
@.reloc
u%Uh`
QSSSh
QVSSh
t.PSh
T$lRSSh| "
UDPQRh
L$ QSSh
L$,QSSh
QSSShlVU
RVSShlVU
t.Ph\
tGHt.Ht&
operand of unlimited repeat could match the empty string
POSIX named classes are supported only within a class
erroffset passed as NULL
POSIX collating elements are not supported
this version of PCRE is not compiled with PCRE_UTF8 support
PCRE does not support \L, \l, \N{name}, \U, or \u
support for \P, \p, and \X has not been compiled
this version of PCRE is not compiled with PCRE_UCP support
\N is not supported in a class
inflate 1.2.5 Copyright 1995-2010 Mark Adler
Please contact the application's support team for more information.
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
operator
GetProcessWindowStation
USER32.DLL
RtlRunOnceExecuteOnce
advapi32_hack::try_hack: bad PE passed
advapi32_hack::try_hack: cannot read import table
advapi32_hack::try_hack: cannot find section .text
.data
advapi32_hack::try_hack: cannot find section .data
advapi32_hack::try_hack: cannot read section .text
Cannot read module %s, error %d
Cannot read exports of %s, error %d
advapi32_hack::try_hack: cannot read exports, error %d
.apiset
Bad .apiset catalog - don`t fit in section
String in cat item %d not in section
Value in cat item %d not in section
Bad referred in cat item %d
Double mapped value in cat item %d not in section
Bad double referred in cat item %d
BaseSrvRegisterWowExec
BaseSrvGetProcessShutdownParam
BaseSrvSetProcessShutdownParam
basesrv.dll
Unknown size of BaseServerApiDispatchTable: %d
ServerDll[%d] %p
csrsrv.dll
CsrExecServerThread
ServerDll[%d]:
ApiDispatchTable: %p %s
ConnectRoutine: %p %s
DisconnectRoutine: %p %s
HardErrorRoutine: %p %s
AddProcessRoutine: %p %s
ShutdownProcessRoutine: %p %s
Cannot open dir %S, error %d
clean_old_drvs: error %d on deleting file %S
Cannot find resource %X
Cannot load resource %X
Resource %d has zero length
Cannot lock resource %X
Cannot unpack resource %X
Cannot create file %S, error %d
1.2.5
Decompress buffer %d bytes too small
DxDvpWaitForVideoPortSync
DxDvpUpdateVideoPort
DxDvpGetVideoPortConnectInfo
DxDvpGetVideoPortOutputFormats
DxDvpGetVideoPortLine
DxDvpGetVideoPortInputFormats
DxDvpGetVideoPortFlipStatus
DxDvpGetVideoPortField
DxDvpGetVideoPortBandwidth
DxDvpFlipVideoPort
DxDvpDestroyVideoPort
DxDvpCreateVideoPort
DxDvpCanCreateVideoPort
DxDdSetColorKey
Cannot read gaDxgFuncs handlers, readed %X bytes
.rdata
Cannot read DxgCoreInterface handlers, readed %X bytes
Unknown acpi table version: %X
SBP2PORT_Mask
STORMINIPORT_Mask
STORPORT_Mask
TCPIP6_Mask
WSOCKTRANSPORT_Mask
FCPORT_Mask
SOFTPCI_Mask
TCPIP_Mask
SCSIMINIPORT_Mask
SCSIPORT_Mask
Unknown KdComponentTableSize size %X
dump_kd_masks return %X bytes, error %d, ntstatus %X
dump_kd_masks return %X bytes, error %d
dump_kd_masks(%s) return %X bytes, error %d, ntstatus %X
dump_kd_masks(%s) return %X bytes, error %d
%-*s: %X
read_kopts_length(%s) return %X bytes, error %d, ntstatus %X
read_kopts_length(%s) return %X bytes, error %d
Cannot alloc %X bytes
Cannot realloc %X bytes for %s
read_kopts(%s) return %X bytes, error %d, ntstatus %X
read_kopts(%s) return %X bytes, error %d
%S (%s): %X
%S (%s):
dump_kopts(%s) return %X bytes, error %d, ntstatus %X
dump_kopts(%s) return %X bytes, error %d
MmSupportWriteWatch
KiPassiveWatchdogTimeout
ViImageExecutionOptions
DbgkErrorPortStartTimeout
DbgkErrorPortCommTimeout
MmDisablePagingExecutive
CmDefaultLanguageId
DbgkpMaxModuleMsgs
IoCountOperations
KeDelayExecutionThread
resolve_IoFreeIrp: bad addr of %s
get_interrupt_dispatch: cannot alloc %d bytes
Unknown kernel options: %S
PsGetProcessWin32WindowStation
KeIsExecutingDpc
bad addr of KeIsExecutingDpc
Bad pnp handler item %d (%d)
Cannot find %s
ks.sys: cannot get KoCreateInstance
ImportContext
ExportContext
SpChangeAccountPasswordFn
CallPackagePassthrough
%SystemRoot%\System32\
GetServiceAccountPassword
DPAPIPasswordChangeForGMSA
GetCredentialKey
INotifyPasswordChanged
%s PolicyChangeNotificationCallbacks
PolicyChangeNotificationCallback[%d]: %d items
[%d] %p %p %p %p %s
lsasrv_hack::try_hack: bad PE passed
lsasrv_hack::try_hack: cannot find section .data
lsasrv_hack::try_hack: cannot read section .data
lsasrv_hack::try_hack: bad section passed
lsasrv_hack::try_hack: cannot read exports, error %d
LsaICallPackagePassthrough
lsasrv.dll
VaultLogonSessionNotification: %p %s
Start of driver %S failed !
WSPJoinLeaf
MSAFD_WSPSendMsg
MSAFD_WSPRecvMsg
mswsock.dll
CheckProc: cannot open process PID %d, error %d, ntstatus %X
CheckProc: cannot open process PID %d, error %d
threaded_processes_checker exception occured, error %X
MyWindowsChecker: len %d, kernel name %s
Cannot get kernel name, error %d
Kill process %d
Check processes in %d threads
Cannot find process %d
Usage: %S [options]
-wmi - report about WMI entries
-uem - check for Unknown Executable Memory
-npo - dump RPC Named Pipes Owner
-rdata - check .rdata sections too
-rpc - report about RPC interfaces
DeriveKey
NotifyChangeKey
EnumKeys
IsAlgSupported
FreeKey
DeleteKey
FinalizeKey
SetKeyProperty
CreatePersistedKey
OpenKey
OpenPrivateKey
ImportKey
ImportMasterKey
GetKeyProperty
GenerateSessionKeys
GenerateMasterKey
ExportKey
CreateEphemeralKey
ComputeEapKeyBlock
ncrypt_hack::check_in_proc: cannot alloc %d bytes
GetKeyStorageInterface
Cannot load %s (copy of %s), error %d
Cannot load module %s, error %d
Cannot read module %s import table
NdisMRegisterMiniportDriver
resolve_minidrivers_list: bad addr of NdisMRegisterMiniportDriver
NdisMRegisterMiniport
resolve_minidrivers_list: cannot find NdisMRegisterMiniport
resolve_minidrivers_list: bad addr of NdisMRegisterMiniport
resolve_miniports_list: cannot find NdisIMInitializeDeviceInstanceEx
resolve_miniports_list: bad addr of NdisIMInitializeDeviceInstanceEx
OID_CO_TAPI_DONT_REPORT_DIGITS
OID_CO_TAPI_REPORT_DIGITS
OID_QOS_OPERATIONAL_PARAMETERS
OID_TCP_TASK_IPSEC_OFFLOAD_V2_ADD_SA_EX
OID_TCP_TASK_IPSEC_OFFLOAD_V2_UPDATE_SA
OID_TCP_TASK_IPSEC_OFFLOAD_V2_DELETE_SA
OID_TCP_TASK_IPSEC_OFFLOAD_V2_ADD_SA
OID_TCP_CONNECTION_OFFLOAD_PARAMETERS
OID_FFP_SUPPORT
OID_TCP_CONNECTION_OFFLOAD_HARDWARE_CAPABILITIES
OID_TCP_CONNECTION_OFFLOAD_CURRENT_CONFIG
OID_TCP_OFFLOAD_HARDWARE_CAPABILITIES
OID_TCP_OFFLOAD_PARAMETERS
OID_TCP_OFFLOAD_CURRENT_CONFIG
OID_TCP6_OFFLOAD_STATS
OID_TCP4_OFFLOAD_STATS
OID_TCP_TASK_IPSEC_DELETE_UDPESP_SA
OID_TCP_TASK_IPSEC_ADD_UDPESP_SA
OID_TCP_SAN_SUPPORT
OID_TCP_TASK_IPSEC_DELETE_SA
OID_TCP_TASK_IPSEC_ADD_SA
OID_TCP_TASK_OFFLOAD
OID_DOT11_SUPPORTED_DSSS_CHANNEL_LIST
OID_DOT11_SUPPORTED_OFDM_FREQUENCY_LIST
OID_DOT11_QOS_TX_QUEUES_SUPPORTED
OID_DOT11_AP_JOIN_REQUEST
OID_DOT11_HR_CCA_MODE_SUPPORTED
OID_DOT11_FREQUENCY_BANDS_SUPPORTED
OID_DOT11_SUPPORTED_DATA_RATES_VALUE
OID_DOT11_SUPPORTED_RX_ANTENNA
OID_DOT11_SUPPORTED_TX_ANTENNA
OID_DOT11_REG_DOMAINS_SUPPORT_VALUE
OID_DOT11_CCA_MODE_SUPPORTED
OID_DOT11_SUPPORTED_POWER_LEVELS
OID_DOT11_DIVERSITY_SUPPORT
OID_DOT11_SUPPORTED_PHY_TYPES
OID_DOT11_OPERATIONAL_RATE_SET
OID_DOT11_JOIN_REQUEST
OID_DOT11_CURRENT_OPERATION_MODE
OID_DOT11_OPERATION_MODE_CAPABILITY
OID_802_11_SUPPORTED_RATES
OID_802_11_NETWORK_TYPES_SUPPORTED
OID_802_11_REMOVE_KEY
OID_802_11_ADD_KEY
OID_IRDA_SUPPORTED_SPEEDS
OID_ATM_SUPPORTED_AAL_TYPES
OID_ATM_SUPPORTED_SERVICE_CATEGORY
OID_ATM_SUPPORTED_VC_RATES
OID_FDDI_PORT_ACTION
OID_FDDI_PORT_HARDWARE_PRESENT
OID_FDDI_PORT_LER_FLAG
OID_FDDI_PORT_PC_WITHHOLD
OID_FDDI_PORT_PCM_STATE
OID_FDDI_PORT_CONNNECT_STATE
OID_FDDI_PORT_LER_ALARM
OID_FDDI_PORT_LER_CUTOFF
OID_FDDI_PORT_LEM_CT
OID_FDDI_PORT_LEM_REJECT_CT
OID_FDDI_PORT_LER_ESTIMATE
OID_FDDI_PORT_LCT_FAIL_CT
OID_FDDI_PORT_EB_ERROR_CT
OID_FDDI_PORT_PC_LS
OID_FDDI_PORT_BS_FLAG
OID_FDDI_PORT_MAINT_LS
OID_FDDI_PORT_INDEX
OID_FDDI_PORT_CONNECTION_CAPABILITIES
OID_FDDI_PORT_PMD_CLASS
OID_FDDI_PORT_MAC_LOOP_TIME
OID_FDDI_PORT_AVAILABLE_PATHS
OID_FDDI_PORT_MAC_PLACEMENT
OID_FDDI_PORT_REQUESTED_PATHS
OID_FDDI_PORT_CURRENT_PATH
OID_FDDI_PORT_MAC_INDICATED
OID_FDDI_PORT_CONNECTION_POLICIES
OID_FDDI_PORT_NEIGHBOR_TYPE
OID_FDDI_PORT_MY_TYPE
OID_FDDI_MAC_DOWNSTREAM_PORT_TYPE
OID_FDDI_SMT_MSG_TIME_STAMP
OID_FDDI_SMT_BYPASS_PRESENT
OID_FDDI_SMT_MAC_INDEXES
OID_FDDI_SMT_PORT_INDEXES
OID_TCP_RSC_STATISTICS
OID_SWITCH_PORT_UPDATED
OID_GEN_OPERATIONAL_STATUS
OID_SWITCH_PORT_TEARDOWN
OID_SWITCH_PORT_FEATURE_STATUS_QUERY
OID_SWITCH_PORT_DELETE
OID_SWITCH_PORT_CREATE
OID_SWITCH_PORT_ARRAY
OID_SWITCH_PORT_PROPERTY_ENUM
OID_SWITCH_PORT_PROPERTY_DELETE
OID_SWITCH_PORT_PROPERTY_UPDATE
OID_SWITCH_PORT_PROPERTY_ADD
OID_NIC_SWITCH_DELETE_VPORT
OID_NIC_SWITCH_ENUM_VPORTS
OID_NIC_SWITCH_VPORT_PARAMETERS
OID_NIC_SWITCH_CREATE_VPORT
OID_GEN_MINIPORT_RESTART_ATTRIBUTES
OID_GEN_PORT_AUTHENTICATION_PARAMETERS
OID_GEN_PORT_STATE
OID_GEN_ENUMERATE_PORTS
OID_GEN_TRANSPORT_HEADER_OFFSET
OID_GEN_SUPPORTED_GUIDS
OID_GEN_MEDIA_SUPPORTED
OID_GEN_SUPPORTED_LIST
Cannot read gWfpGlobal, readed %X bytes
Cannot read Wfp callout count, readed %X bytes
Cannot read Wfp callouts, readed %X bytes
Cannot read WFP index functions, readed %X bytes
iphlpapi.dll
%SystemRoot%\System32\iphlpapi.dll
AllocateAndGetTcpExTableFromStack
AllocateAndGetUdpExTableFromStack
GetExtendedTcpTable
GetExtendedUdpTable
Failed to snapshot TCP endpoints, error %d
Failed to snapshot UDP endpoints, error %d
Cannot alloc %d bytes for UDP extended table
Cannot alloc %d bytes for TCP extended table
ntdll_hack::try_hack: bad PE passed
ntdll_hack::try_hack: cannot find section .text
ntdll_hack::try_hack: cannot read section .text
ntdll_hack::try_hack: bad section passed
ntdll_hack::try_hack: cannot read exports, error %d
%s channel hooks:
ChannelHook[%d]: %p (%p - %s) %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
ChannelHook[%d]: %p (%p) %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
MallocSpy: %p vtbl %p - %s
webclient
msiexec32
msiexec
tftp
ftp32
cmd32
ccmexec32
ccmexec
chrome
opera
firefox
Process PID %d raise dwwin PID %d
Cannot alloc new process PID %d %S
Cannot open svchost process PID %d, error %d
proc_list::read: CreateToolhelp32Snapshot failed with error %d
PID %d Parent PID %d service {%S} %S
PID %d Parent PID %d %S
PID %d Parent PID %d kind {%S} %S
read_service_exe_name(%S): cannot expand string %S
ExWindowStationOpenProcedureCallout
ExWindowStationParseProcedureCallout
ExWindowStationDeleteProcedureCallout
ExWindowStationCloseProcedureCallout
ExWindowStationOkToCloseProcedureCallout
read_w8_callout failed, len %d, returned %d bytes, error %d, ntstatus %X
read_w8_callout failed, len %d, returned %d bytes, error %d
PsWin32CallBack: %p %p %s
check_callouts: cannot alloc %X bytes (size %d)
check_callouts failed, error %d, status %X
check_callouts failed, error %d
Callouts (%d):
%s: %p %s
ark_check_callbacks: cannot read size of callbacks list, error %d, ntstatus %X
ark_check_callbacks: cannot read size of callbacks list, error %d
ark_check_callbacks: cannot read %d bytes (readed %d), error %d, ntstatus %X
ark_check_callbacks: cannot read %d bytes (readed %d), error %d
CB: %S, total %X:
%p (%s)
check_shutdown_callbacks: cannot read size of callbacks list, error %d, ntstatus %X
check_shutdown_callbacks: cannot read size of callbacks list, error %d
check_shutdown_callbacks: cannot read callbacks list of %s, error %d, ntstatus %X
check_shutdown_callbacks: cannot read callbacks list of %s, error %d
%s - %d:
FastIoUnlockAllByKey
MJ_CREATE_NAMED_PIPE
%s!%s.%s patched by %s, addr %p
%s!%s[%d] patched by %s, addr %p
Cannot open driver dumpfile %s, error %d
Cannot open kernel dumpfile %s, error %d
Cannot read driver %s, error %d
hal.dll
Shadow SDT: %p, limit %X
win32k.sys
Cannot relocate section %s.%s
Cannot alloc %X bytes for reading driver section %s.%s
Driver %s!%s has %X patched bytes !
.orig
.kmem
Cannot read driver section %s.%s (flags %X) at %p size %X readed %X, error %d, ntstatus %X
Cannot read driver section %s.%s (flags %X) at %p size %X readed %X, error %d
Cannot read kernel %s, error %d
ntoskrnl.exe
Cannot alloc %X bytes for reading kernel sections
Cannot relocate section %s
KernelSection %s rva %X, size %X, 0x%X relocs has 0x%X patched bytes !
Cannot read (whole) section %s (flags %X) at %p size %X (readed %X), error %d
\SystemRoot\system32\hal.dll
\SystemRoot\system32\halapic.dll
\SystemRoot\system32\halmps.dll
\SystemRoot\system32\halacpi.dll
\SystemRoot\system32\halaacpi.dll
\SystemRoot\system32\halmacpi.dll
%SystemRoot%\System32\hal.dll
halapic.dll
halmps.dll
halacpi.dll
halaacpi.dll
halmacpi.dll
Driver %S DrvObj %p:
DriverUnload patched by %s, addr %p
DriverStartIo patched by %s, addr %p
AddDevice patched by %s, addr %p
Handler %s patched by %s, addr %p
Handler %s patched, addr %p
Handler %d patched by %s, addr %p
Handler %d patched, addr %p
FastIOHandler %s patched by %s, addr %p
FastIOHandler %s patched, addr %p
FastIOHandler %d patched by %s, addr %p
FastIOHandler %d patched, addr %p
FS_FILTER_CALLBACKS %s patched by %s, addr %p
FS_FILTER_CALLBACKS %s patched, addr %p
FS_FILTER_CALLBACKS %d patched by %s, addr %p
FS_FILTER_CALLBACKS %d patched, addr %p
StartIo patched by %s, addr %p
read_fsmjxxx(%S): cannot make full driver name
read_fsmjxxx(%S) failed, error %d, ntstatus %X
read_fsmjxxx(%S) failed, error %d
read_mjxxx(%s): cannot make full driver name
read_mjxxx(%S) failed, error %d, ntstatus %X
read_mjxxx(%S) failed, error %d
Cannot alloc %X bytes for driver %s EAT checking
read_driver_eat %s failed, error %d, status %X
read_driver_eat %s failed, error %d
Export addr %s.%s patched by %s !
Export addr %s.%s patched !
Export addr %s.%d patched by %s !
Export addr %s.%d patched!
\hal.dll
\SystemRoot\system32\drivers\ndis.sys
ndis.sys
drivers\ndis.sys
\SystemRoot\system32\DRIVERS\tdi.sys
tdi.sys
drivers\tdi.sys
\SystemRoot\system32\DRIVERS\tcpip.sys
tcpip.sys
drivers\tcpip.sys
\SystemRoot\system32\DRIVERS\netio.sys
netio.sys
drivers\netio.sys
\SystemRoot\system32\DRIVERS\fltmgr.sys
fltmgr.sys
drivers\fltmgr.sys
\SystemRoot\system32\DRIVERS\ks.sys
ks.sys
drivers\ks.sys
\SystemRoot\system32\DRIVERS\dxg.sys
drivers\dxg.sys
\SystemRoot\system32\DRIVERS\dxgkrnl.sys
drivers\dxgkrnl.sys
\SystemRoot\system32\DRIVERS\watchdog.sys
drivers\watchdog.sys
\SystemRoot\system32\DRIVERS\ksecdd.sys
ksecdd.sys
drivers\ksecdd.sys
\SystemRoot\System32\Drivers\Ntfs.sys
ntfs.sys
\SystemRoot\system32\CLFS.SYS
CLFS.SYS
\SystemRoot\system32\drivers\ataport.sys
ataport.sys
\SystemRoot\system32\drivers\atapi.sys
atapi.sys
\SystemRoot\system32\drivers\peauth.sys
peauth.sys
\SystemRoot\system32\drivers\WDFLDR.sys
WDFLDR.sys
\SystemRoot\system32\drivers\usbstor.sys
usbstor.sys
\SystemRoot\system32\drivers\usbd.sys
usbd.sys
\SystemRoot\system32\drivers\USBPORT.sys
USBPORT.sys
\SystemRoot\system32\drivers\usbohci.sys
usbohci.sys
\SystemRoot\system32\drivers\usbehci.sys
usbehci.sys
\SystemRoot\system32\drivers\usbhub.sys
usbhub.sys
\SystemRoot\system32\drivers\usbccgp.sys
usbccgp.sys
\SystemRoot\system32\drivers\discache.sys
discache.sys
\SystemRoot\system32\drivers\termdd.sys
termdd.sys
\SystemRoot\system32\drivers\rdppr.sys
rdppr.sys
\SystemRoot\system32\drivers\mssmbios.sys
mssmbios.sys
\SystemRoot\system32\drivers\1394BUS.SYS
1394BUS.SYS
\SystemRoot\system32\drivers\BATTC.SYS
BATTC.SYS
\SystemRoot\system32\drivers\bthport.sys
bthport.sys
\SystemRoot\system32\drivers\drmk.sys
drmk.sys
\SystemRoot\system32\drivers\HIDPARSE.SYS
HIDPARSE.SYS
\SystemRoot\system32\drivers\HIDCLASS.SYS
HIDCLASS.SYS
\SystemRoot\system32\drivers\msiscsi.sys
msiscsi.sys
\SystemRoot\system32\drivers\PCIIDEX.SYS
PCIIDEX.SYS
\SystemRoot\system32\drivers\portcls.sys
portcls.sys
\SystemRoot\system32\drivers\smsmdm.sys
smsmdm.sys
\SystemRoot\system32\drivers\STREAM.SYS
STREAM.SYS
\SystemRoot\system32\drivers\vga.sys
vga.sys
\SystemRoot\system32\drivers\VIDEOPRT.SYS
VIDEOPRT.SYS
\SystemRoot\system32\drivers\vmstorfl.sys
vmstorfl.sys
\SystemRoot\system32\drivers\Dxapi.sys
Dxapi.sys
\SystemRoot\system32\drivers\dxgthk.sys
dxgthk.sys
\SystemRoot\system32\drivers\dxgmms1.sys
dxgmms1.sys
\SystemRoot\system32\drivers\spsys.sys
spsys.sys
\SystemRoot\system32\drivers\winhv.sys
winhv.sys
\SystemRoot\system32\drivers\HdAudio.sys
HdAudio.sys
\SystemRoot\System32\cdd.dll
cdd.dll
\SystemRoot\System32\ATMFD.DLL
ATMFD.DLL
\SystemRoot\System32\RDPDD.dll
RDPDD.dll
\SystemRoot\system32\drivers\vwifibus.sys
vwifibus.sys
\SystemRoot\system32\drivers\nwifi.sys
nwifi.sys
\SystemRoot\system32\drivers\vwififlt.sys
vwififlt.sys
\SystemRoot\system32\drivers\wfplwf.sys
wfplwf.sys
\SystemRoot\system32\drivers\wfplwfs.sys
wfplwfs.sys
\SystemRoot\system32\drivers\tmtdi.sys
tmtdi.sys
\SystemRoot\system32\drivers\netvsc60.sys
netvsc60.sys
\SystemRoot\system32\drivers\mslldp.sys
mslldp.sys
\SystemRoot\system32\drivers\netvsc63.sys
netvsc63.sys
\SystemRoot\system32\drivers\ndiscap.sys
ndiscap.sys
\SystemRoot\system32\drivers\agilevpn.sys
agilevpn.sys
\SystemRoot\system32\drivers\asyncmac.sys
asyncmac.sys
\SystemRoot\system32\drivers\mpsdrv.sys
mpsdrv.sys
\SystemRoot\system32\drivers\rspndr.sys
rspndr.sys
\SystemRoot\system32\drivers\ndisuio.sys
ndisuio.sys
\SystemRoot\system32\drivers\lltdio.sys
lltdio.sys
\SystemRoot\system32\drivers\NDProxy.sys
NDProxy.sys
\SystemRoot\system32\drivers\raspppoe.sys
raspppoe.sys
\SystemRoot\system32\drivers\ndiswan.sys
ndiswan.sys
\SystemRoot\system32\drivers\wanarp.sys
wanarp.sys
\SystemRoot\system32\drivers\bthpan.sys
bthpan.sys
\SystemRoot\system32\drivers\rassstp.sys
rassstp.sys
\SystemRoot\system32\drivers\raspptp.sys
raspptp.sys
\SystemRoot\system32\drivers\rasl2tp.sys
rasl2tp.sys
\SystemRoot\system32\drivers\rasacd.sys
rasacd.sys
\SystemRoot\system32\drivers\tunnel.sys
tunnel.sys
\SystemRoot\system32\drivers\tunmp.sys
tunmp.sys
\SystemRoot\system32\drivers\pacer.sys
pacer.sys
\SystemRoot\system32\drivers\NDISTAPI.SYS
NDISTAPI.SYS
\SystemRoot\system32\drivers\msgpc.sys
msgpc.sys
\SystemRoot\system32\drivers\partmgr.sys
partmgr.sys
\SystemRoot\system32\drivers\volmgr.sys
volmgr.sys
\SystemRoot\system32\drivers\volmgrx.sys
volmgrx.sys
\SystemRoot\system32\drivers\mountmgr.sys
mountmgr.sys
\SystemRoot\system32\drivers\iaStor.sys
iaStor.sys
\SystemRoot\system32\drivers\volsnap.sys
volsnap.sys
\SystemRoot\system32\drivers\ACPI.sys
acpi.sys
\SystemRoot\System32\Drivers\WppRecorder.sys
WppRecorder.sys
\SystemRoot\System32\Drivers\Mouclass.sys
Mouclass.sys
\SystemRoot\System32\Drivers\kbdclass.sys
kbdclass.sys
\SystemRoot\System32\Drivers\Fastfat.SYS
Fastfat.sys
\SystemRoot\System32\Drivers\bowser.sys
bowser.sys
\SystemRoot\System32\Drivers\rdbss.sys
rdbss.sys
\SystemRoot\System32\Drivers\msfs.sys
msfs.sys
\SystemRoot\System32\Drivers\NetBIOS.sys
NetBIOS.sys
\SystemRoot\System32\Drivers\mup.sys
mup.sys
\SystemRoot\System32\Drivers\dfs.sys
dfs.sys
\SystemRoot\System32\Drivers\dfsc.sys
dfsc.sys
\SystemRoot\System32\Drivers\npfs.SYS
npfs.sys
\SystemRoot\System32\Drivers\luafv.SYS
luafv.sys
\SystemRoot\System32\Drivers\MRxSmb.SYS
MRxSmb.sys
\SystemRoot\System32\Drivers\MRxSmb10.SYS
MRxSmb10.sys
\SystemRoot\System32\Drivers\MRxSmb20.SYS
MRxSmb20.sys
\SystemRoot\System32\Drivers\MRxDAV.SYS
MRxDAV.sys
\SystemRoot\system32\Drivers\fltmgr.sys
\SystemRoot\system32\Drivers\TDI.SYS
\SystemRoot\system32\Drivers\tdx.sys
\SystemRoot\system32\Drivers\ipfltdrv.sys
\SystemRoot\system32\Drivers\tcpip.sys
\SystemRoot\System32\drivers\afd.sys
afd.sys
\SystemRoot\System32\drivers\netbt.sys
\SystemRoot\System32\drivers\NETIO.sys
\SystemRoot\System32\drivers\srv.sys
srv.sys
\SystemRoot\System32\drivers\srv2.sys
srv2.sys
\SystemRoot\System32\drivers\srvnet.sys
\SystemRoot\System32\drivers\sr.sys
sr.sys
\SystemRoot\System32\win32k.sys
\SystemRoot\System32\drivers\http.sys
http.sys
\SystemRoot\System32\drivers\fwpkclnt.sys
\SystemRoot\system32\DRIVERS\msrpc.sys
msrpc.sys
\SystemRoot\system32\DRIVERS\disk.sys
disk.sys
\SystemRoot\system32\DRIVERS\ftdisk.sys
ftdisk.sys
\SystemRoot\system32\DRIVERS\Storport.SYS
Storport.SYS
\SystemRoot\system32\DRIVERS\CLASSPNP.SYS
CLASSPNP.SYS
\SystemRoot\system32\Drivers\ks.sys
\SystemRoot\System32\Drivers\ksecdd.sys
ksecdd.SYS
\SystemRoot\system32\kdcom.dll
kdcom.dll
\SystemRoot\System32\Drivers\cng.sys
cng.sys
\SystemRoot\system32\PSHED.dll
PSHED.dll
\SystemRoot\system32\CI.dll
CI.dll
\SystemRoot\system32\DRIVERS\WMILIB.SYS
wmilib.sys
Cannot find %s for IAT resolving of %s
Cannot alloc %X bytes for drivers IAT checking
Cannot find %s import %s.%s
Cannot find %s import %s.%d
IAT %s %s.%s patched, addr %p
IAT %s %s.%d patched, addr %p
IAT %s %s.%s patched by %s, addr %p
IAT %s %s.%d patched by %s, addr %p
%s has %d patched IAT entries (total %d)
reading of IAT %s failed, readed %X, actual IAT size %X, error %d
check_exts count failed, error %d, ntstatus %X
check_exts count failed, error %d
check_exts: cannot alloc %X bytes
check_exts failed, error %d, ntstatus %X
check_exts failed, error %d
Ext[%X]:
Handler1: %p %s
Handler2: %p %s
Handler3: %p %s
Table: %X items %p %s
Item[%X]: %p %s
IRP_MJ_CREATE_NAMED_PIPE
Unknown fltmgr: FrameList %X FilterSize %X cbn %X
Unknown fltmgr: FrameList %X FilterSize %X
FltMgr: index %d
FRAME[%d] %p
%s: %p
NormalizeNameComponent: %p %s
NormalizeContextCleanup: %p %s
PreOperation: %p %s
PostOperation: %p %s
check_ks: cannot read size of ks list, error %d, ntstatus %X
check_ks: cannot read size of ks list, error %d
ks count: %X
check_ks: cannot alloc %X bytes
check_ks: cannot read ks list, error %d, ntstatus %X
check_ks: cannot read ks list, error %d
ks[%d] %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
ChangeAccountPassword
ImportSecurityContext
ExportSecurityContext
gKsecpBCryptExtension: %p %s
gKsecpSslExtension: %p %s
SecTable.%s patched %p %s
dxg.sys
dxgkrnl.sys
Win32kCallout: %p %s
SessionStartCallout: %p %s
KTIMER %p DPC %p DefRoutine %p %s
Cannot find KPRCB.DpcRoutineActive
Unknown KPRCB: DpcRoutineActive %X WorkerRoutine %X
Unknown KPRCB: DpcRoutineActive %X
Processor %d:
KTIMERS[%d]: %X
Patched %s   %X by %s
Patched ord.%d   %X by %s
Patched %s   %X
Patched ord.%d   %X
Patched %s by %s
Patched ord.%d by %s
Patched %s
Patched ord.%d
Exception %X occured during EAT checking of %s
check_module_iat(%s) - cannot find exports for %s
check_module_iat(%s): zeroed ImportLookUp, cannot check import
Cannot find ordinal %X in module %s (%s) in import table of %s
Cannot find symbol %s in module %s (%s) in import table of %s
(%s) %s.%s hooked in %s: my IAT %p, must be %p
(%s) %s.%d hooked in %s: my IAT %p, must be %p
apfn %s patched by %s, addr %p
apfn[%d] patched by %s, addr %p
apfn %s patched, addr %p
apfn[%d] patched, addr %p
%s%s!%s patched by %s, addr %p
%s%s![%d] patched by %s, addr %p
%s%s!%s patched, addr %p
%s%s![%d] patched, addr %p
LSA SP %s has %d patched functions in SECPKG_FUNCTION_TABLE:
PID %d: LSA SP %s has %d patched functions in SECPKG_USER_FUNCTION_TABLE:
PID %d: LSA SP %s has %d patched functions in CallPackageDispatch:
ole32 hooked by %s
Cannot relocate section %s!%s
Exception %X occured on checking %s!%s
Module %s!%s has %X patched bytes !
Exception %X occured on check_module_iat(%s)
MyModule: %p %s
%SystemRoot%\System32\ncrypt.dll
%SystemRoot%\System32\ntdsa.dll
%SystemRoot%\System32\kernelbase.dll
%SystemRoot%\System32\kernel32.dll
%SystemRoot%\System32\user32.dll
%SystemRoot%\System32\umpnpmgr.dll
%SystemRoot%\System32\combase.dll
%SystemRoot%\System32\ole32.dll
%SystemRoot%\System32\imm32.dll
%SystemRoot%\System32\rpcrt4.dll
%SystemRoot%\System32\mswsock.dll
%SystemRoot%\System32\advapi32.dll
%SystemRoot%\System32\cryptbase.dll
%SystemRoot%\System32\apisetschema.dll
read_ndis_oid_handlers failed, returned %d bytes, error %d, ntstatus %X
read_ndis_oid_handlers failed, returned %d bytes, error %d
[%X] %s: post %p %s
[%X] %s: pre %p %s
[%X] %s: pre %p (%s) post %p (%s)
[%X] %X: post %p %s
[%X] %X: pre %p %s
[%X] %X: pre %p (%s) post %p (%s)
read_tcp_off_handlers failed, returned %d bytes, error %d, ntstatus %X
read_tcp_off_handlers failed, returned %d bytes, error %d
TcpOfflineHandlers:
TcpOffloadEventIndicate: %p %s
TcpOffloadReceiveIndicate: %p %s
TcpOffloadSendComplete: %p %s
TcpOffloadReceiveComplete: %p %s
TcpOffloadDisconnectComplete: %p %s
TcpOffloadForwardComplete: %p %s
Cannot alloc %X bytes from reading filter block
read_ndis_filter_block: len %d, returned %d bytes, error %d, ntstatus %X
read_ndis_filter_block: len %d, returned %d bytes, error %d
check_ndis - reading of TDI callback failed, error %d, ntstatus %X
check_ndis - reading of TDI callback failed, error %d
check_ndis - reading of TDI PnP handler failed, error %d, ntstatus %X
check_ndis - reading of TDI PnP handler failed, error %d
TDI callback %p patched by %s
TDI PnP handler %p patched by %s
check_ndis - reading of providers count failed, error %d, ntstatus %X
check_ndis - reading of providers count failed, error %d
check_ndis: %d providers
check_ndis: cannot alloc %X bytes
Cannot store provider_block %p (%d)
check_ndis: stored %d provider_blocks
check_ndis - reading of interfaces count failed, error %d, ntstatus %X
check_ndis - reading of interfaces count failed, error %d
check_ndis: %d interfaces, size of miniport %X
Interface[%d]:
check_ndis - reading of protocols count failed, error %d, ntstatus %X
check_ndis - reading of protocols count failed, error %d
check_ndis: %d protocols, size of protocol %X
check_ndis: stored %d protocols
check_ndis - reading of minidrivers count failed, error %d, ntstatus %X
check_ndis - reading of minidrivers count failed, error %d
check_ndis: %d minidrivers, size of minidriver %X, sizeof(ndis50) %X, sizeof(ndis52) %X
Cannot store minidriver %d (%p)
Stored %d mini-drivers
check_ndis - reading of miniports count failed, error %d, ntstatus %X
check_ndis - reading of miniports count failed, error %d
check_ndis: %d miniports, size of miniport %X
check_ndis: read %d miniports, total %X
Miniport[%d] %p:
check_ndis: stored %d miniports, sizeof(miniport_block_w7) %X
check_ndis - reading of open_blocks count failed, error %d, ntstatus %X
check_ndis - reading of open_blocks count failed, error %d
check_ndis: %d open_blocks, size of open_block %X
check_ndis: read %d open_blocks, total %X
Open_Block[%d]:
Cannot store open_block %p (%d)
check_ndis: stored %d open_blocks
check_ndis - reading of filter_drivers count failed, error %d, ntstatus %X
check_ndis - reading of filter_drivers count failed, error %d
check_ndis: %d filter_drivers, size of open_block %X
check_ndis: read %d filter_drivers, total %X
FilterDriver[%d]:
check_ndis: stored %d filter_drivers, %d filter_blocks
Passive
read_punicode_string failed, len %d, returned %d bytes, error %d, ntstatus %X
read_punicode_string failed, len %d, returned %d bytes, error %d
Cannot read NDIS_MINIPORT_INTERRUPT %p
NDIS_MINIPORT_INTERRUPT:
MiniportIsr: %p %s
MiniportDpc: %p %s
Cannot read NDIS_MINIPORT_INTERRUPT_CHARACTERISTICS %p
NDIS_MINIPORT_INTERRUPT_CHARACTERISTICS:
InterruptHandler: %p %s
InterruptDpcHandler: %p %s
DisableInterruptHandler: %p %s
EnableInterruptHandler: %p %s
MessageInterruptHandler: %p %s
MessageInterruptDpcHandler: %p %s
DisableMessageInterruptHandler: %p %s
EnableMessageInterruptHandler: %p %s
MiniportIsr: %p %s
MiniportDpc: %p %s
MiniportMessageIsr: %p %s
MiniportMessageInterruptDpc: %p %s
MiniportIsr: %p %s
MiniportDpc: %p %s
MiniportEnableInterrupt: %p %s
MiniportDisableInterrupt: %p %s
MiniportMessageIsr: %p %s
MiniportMessageInterruptDpc: %p %s
MiniportDisableMessageInterrupt: %p %s
MiniportEnableMessageInterrupt: %p %s
NDIS Protocol[%d]: %S
MajorNdisVersion %d
MinorNdisVersion %d
Flags %X
OpenAdapterCompleteHandler: %p %s
CloseAdapterCompleteHandler: %p %s
SendCompleteHandler: %p %s
TransferDataCompleteHandler: %p %s
ResetCompleteHandler: %p %s
RequestCompleteHandler: %p %s
ReceiveHandler: %p %s
ReceiveCompleteHandler: %p %s
StatusHandler: %p %s
StatusCompleteHandler: %p %s
ReceivePacketHandler: %p %s
BindAdapterHandler: %p %s
UnbindAdapterHandler: %p %s
PnPEventHandler: %p %s
UnloadHandler: %p %s
CoSendCompleteHandler: %p %s
CoStatusHandler: %p %s
CoReceivePacketHandler: %p %s
CoAfRegisterNotifyHandler: %p %s
MajorNdisVersion %d
MinorNdisVersion %d
MajorDriverVersion %d
MinorDriverVersion %d
Flags %X
IsIPv4 %d
IsIPv6 %d
IsNdisTest6 %d
BindAdapterHandlerEx: %p %s
UnbindAdapterHandlerEx: %p %s
OpenAdapterCompleteHandlerEx: %p %s
CloseAdapterCompleteHandlerEx: %p %s
PnPEventHandler: %p %s
UnloadHandler: %p %s
UninstallHandler: %p %s
RequestCompleteHandler: %p %s
StatusHandler: %p %s
StatusCompleteHandler: %p %s
ReceiveNetBufferListsHandler: %p %s
SendNetBufferListsCompleteHandler: %p %s
CoStatusHandler: %p %s
CoAfRegisterNotifyHandler: %p %s
CoReceiveNetBufferListsHandler: %p %s
CoSendNetBufferListsCompleteHandler: %p %s
OpenAdapterCompleteHandler: %p %s
CloseAdapterCompleteHandler: %p %s
SendCompleteHandler: %p %s
TransferDataCompleteHandler: %p %s
ResetCompleteHandler: %p %s
ReceiveHandler: %p %s
ReceiveCompleteHandler: %p %s
ReceivePacketHandler: %p %s
BindAdapterHandler: %p %s
UnbindAdapterHandler: %p %s
CoSendCompleteHandler: %p %s
CoReceivePacketHandler: %p %s
OidRequestCompleteHandler: %p %s
InitiateOffloadCompleteHandler: %p %s
TerminateOffloadCompleteHandler: %p %s
UpdateOffloadCompleteHandler: %p %s
InvalidateOffloadCompleteHandler: %p %s
QueryOffloadCompleteHandler: %p %s
IndicateOffloadEventHandler: %p %s
TcpOffloadSendCompleteHandler: %p %s
TcpOffloadReceiveCompleteHandler: %p %s
TcpOffloadDisconnectCompleteHandler: %p %s
TcpOffloadForwardCompleteHandler: %p %s
TcpOffloadEventHandler: %p %s
TcpOffloadReceiveIndicateHandler: %p %s
Unknown NDIS Type %X and Size %X
DirectOidRequestCompleteHandler: %p %s
AllocateSharedMemoryHandler: %p %s
FreeSharedMemoryHandler: %p %s
Unknown ndis protocol size: %X
NDIS MiniDriver[%d] %p
MajorNdisVersion: %d
MinorNdisVersion: %d
CheckForHangHandler: %p %s
DisableInterruptHandler: %p %s
EnableInterruptHandler: %p %s
HaltHandler %p %s
HandleInterruptHandler: %p %s
InitializeHandler: %p %s
ISRHandler: %p %s
QueryInformationHandler: %p %s
ReconfigureHandler: %p %s
ResetHandler: %p %s
SendHandler: %p %s
SetInformationHandler: %p %s
TransferDataHandler: %p %s
ReturnPacketHandler: %p %s
SendPacketsHandler: %p %s
AllocateCompleteHandler: %p %s
CoCreateVcHandler: %p %s
CoDeleteVcHandler: %p %s
CoActivateVcHandler: %p %s
CoDeactivateVcHandler: %p %s
CoSendPacketsHandler: %p %s
CoRequestHandler: %p %s
CheckForHangHandler: %p %s
DisableInterruptHandler: %p %s
EnableInterruptHandler: %p %s
HaltHandler %p %s
HandleInterruptHandler: %p %s
InitializeHandler: %p %s
ISRHandler: %p %s
QueryInformationHandler: %p %s
ReconfigureHandler: %p %s
ResetHandler: %p %s
SendHandler: %p %s
SetInformationHandler: %p %s
TransferDataHandler: %p %s
ReturnPacketHandler: %p %s
SendPacketsHandler: %p %s
AllocateCompleteHandler: %p %s
CoCreateVcHandler: %p %s
CoDeleteVcHandler: %p %s
CoActivateVcHandler: %p %s
CoDeactivateVcHandler: %p %s
CoSendPacketsHandler: %p %s
CoRequestHandler: %p %s
CancelSendPacketsHandler: %p %s
PnPEventNotifyHandler: %p %s
AdapterShutdownHandler: %p %s
CheckForHangHandler: %p %s
DisableInterruptHandler: %p %s
EnableInterruptHandler: %p %s
HaltHandler %p %s
HandleInterruptHandler: %p %s
InitializeHandler: %p %s
ISRHandler: %p %s
QueryInformationHandler: %p %s
ReconfigureHandler: %p %s
ResetHandler: %p %s
SendHandler: %p %s
SetInformationHandler: %p %s
TransferDataHandler: %p %s
ReturnPacketHandler: %p %s
SendPacketsHandler: %p %s
AllocateCompleteHandler: %p %s
CoCreateVcHandler: %p %s
CoDeleteVcHandler: %p %s
CoActivateVcHandler: %p %s
CoDeactivateVcHandler: %p %s
CoSendPacketsHandler: %p %s
CoRequestHandler: %p %s
CancelSendPacketsHandler: %p %s
PnPEventNotifyHandler: %p %s
AdapterShutdownHandler: %p %s
ISRHandlerEx: %p %s
HandleInterruptHandlerEx: %p %s
InitiateOffloadHandler: %p %s
TerminateOffloadHandler: %p %s
UpdateOffloadHandler: %p %s
InvalidateOffloadHandler: %p %s
QueryOffloadHandler: %p %s
TcpOffloadSendHandler: %p %s
TcpOffloadReceiveHandler: %p %s
TcpOffloadDisconnectHandler: %p %s
TcpOffloadForwardHandler: %p %s
TcpOffloadReceiveReturnHandler: %p %s
ReturnPacketsHandlerEx: %p %s
RequestTimeoutDpcHandler: %p %s
MajorNdisVersion: %d
MinorNdisVersion: %d
MajorDriverVersion: %d
MinorDriverVersion: %d
Flags: %X
SetOptionsHandler: %p %s
InitializeHandlerEx: %p %s
HaltHandlerEx: %p %s
UnloadHandler: %p %s
PauseHandler: %p %s
RestartHandler: %p %s
OidRequestHandler: %p %s
SendNetBufferListsHandler: %p %s
ReturnNetBufferListsHandler: %p %s
CancelSendHandler: %p %s
CheckForHangHandlerEx: %p %s
ResetHandlerEx: %p %s
DevicePnPEventNotifyHandler: %p %s
ShutdownHandlerEx: %p %s
CancelOidRequestHandler: %p %s
DirectOidRequestHandler: %p %s
CancelDirectOidRequestHandler: %p %s
NDIS MiniPort[%d] %p
State: %s
MediaType: %s
AdapterType: %s
DefaultSendAuthorizationState: %s
DefaultRcvAuthorizationState: %s
DefaultPortSendAuthorizationState: %s
DefaultPortRcvAuthorizationState: %s
NextCancelSendNetBufferListsHandler: %p %s
PacketIndicateHandler: %p %s
SendCompleteHandler: %p %s
SendResourcesHandler: %p %s
ResetCompleteHandler: %p %s
DisableInterruptHandler: %p %s
EnableInterruptHandler: %p %s
SendPacketsHandler: %p %s
DeferredSendHandler: %p %s
EthRxIndicateHandler: %p %s
NextSendNetBufferListsHandler: %p %s
EthRxCompleteHandler: %p %s
SavedNextSendNetBufferListsHandler: %p %s
StatusHandler: %p %s
StatusCompleteHandler: %p %s
TDCompleteHandler: %p %s
QueryCompleteHandler: %p %s
SetCompleteHandler: %p %s
WanSendCompleteHandler: %p %s
WanRcvHandler: %p %s
WanRcvCompleteHandler: %p %s
SendNetBufferListsCompleteHandler: %p %s
WSendPacketsHandler: %p %s
NextSendPacketsHandler: %p %s
FinalSendPacketsHandler: %p %s
TopIndicateNetBufferListsHandler: %p %s
TopIndicateLoopbackNetBufferListsHandler: %p %s
Ndis5PacketIndicateHandler: %p %s
MiniportReturnPacketHandler: %p %s
SynchronousReturnPacketHandler: %p %s
TopNdis5PacketIndicateHandler: %p %s
AllocateSharedMemoryHandler: %p %s
FreeSharedMemoryHandler: %p %s
SetBusData: %p %s
GetBusData: %p %s
NoFilter.CancelSendHandler %p %s
NoFilter.SendNetBufferListsCompleteHandler %p %s
NoFilter.IndicateNetBufferListsHandler %p %s
NoFilter.SaveIndicateNetBufferListsHandler %p %s
NoFilter.ReturnNetBufferListsHandler %p %s
NoFilter.SendNetBufferListsHandler %p %s
Next.CancelSendHandler %p %s
Next.SendNetBufferListsCompleteHandler %p %s
Next.IndicateNetBufferListsHandler %p %s
Next.SaveIndicateNetBufferListsHandler %p %s
Next.ReturnNetBufferListsHandler %p %s
Next.SendNetBufferListsHandler %p %s
Name: %S
BaseName: %S
SymbolicLinkName: %S
NextCancelSendNetBufferListsHandler %p %s
TrRxIndicateHandler: %p %s
TrRxCompleteHandler: %p %s
IndicateNetBufferListsHandler: %p %s
NextReturnNetBufferLists: %p %s
SavedIndicateNetBufferListsHandler: %p %s
SavedPacketIndicateHandler: %p %s
ShutdownHandler: %p %s
NDIS MiniPort[%d] %S
BusType: %s
PacketIndicateHandler: %p %s
SendCompleteHandler: %p %s
SendResourcesHandler: %p %s
ResetCompleteHandler: %p %s
DeferredSendHandler: %p %s
EthRxIndicateHandler: %p %s
TrRxIndicateHandler: %p %s
FddiRxIndicateHandler: %p %s
EthRxCompleteHandler: %p %s
TrRxCompleteHandler: %p %s
FddiRxCompleteHandler: %p %s
StatusHandler: %p %s
StatusCompleteHandler: %p %s
TDCompleteHandler: %p %s
QueryCompleteHandler: %p %s
SetCompleteHandler: %p %s
WanSendCompleteHandler: %p %s
WanRcvHandler: %p %s
WanRcvCompleteHandler: %p %s
AdapterInstanceName: %S
OpenBlock [%d] %p
RootName: %S
BindName: %S
ProtocolMajorVersion: %X
NextSendHandler: %p %s
NextReturnNetBufferListsHandler: %p %s
SendHandler: %p %s
TransferDataHandler: %p %s
WanReceiveHandler: %p %s
SendPacketsHandler: %p %s
ResetHandler: %p %s
RequestHandler: %p %s
OidRequestHandler: %p %s
WSendHandler: %p %s
WTransferDataHandler: %p %s
WSendPacketsHandler: %p %s
CancelSendPacketsHandler: %p %s
ProtSendNetBufferListsComplete: %p %s
NextSendNetBufferListsComplete: %p %s
ReceiveNetBufferLists: %p %s
SavedSendNBLHandler: %p %s
SavedSendPacketsHandler: %p %s
SavedCancelSendPacketsHandler: %p %s
SavedSendHandler: %p %s
Ndis5WanSendHandler: %p %s
ProtSendCompleteHandler: %p %s
OidRequestCompleteHandler %p %s
OpenFlags: %X
DirectOidRequestHandler: %p %s
RootName: %S
BindName: %S
Flags: %X
SendHandler: %p %s
WanSendHandler: %p %s
TransferDataHandler: %p %s
WanReceiveHandler: %p %s
SendPacketsHandler: %p %s
ResetHandler: %p %s
RequestHandler: %p %s
WSendHandler: %p %s
WTransferDataHandler: %p %s
WSendPacketsHandler: %p %s
CancelSendPacketsHandler: %p %s
Flags %X
Mtu %X
PromiscuousMode %d
AccessType %s
DirectionType %s
ConnectionType %s
MediaType %s
MediaConnectState %s
AdminStatus %s
OperStatus %s
InterfaceGuid %s
NetworkGuid %s
ifIndex %X
ifDescr %S
ifAlias %S
FilterDriverCharacteristics[%d]:
FriendlyName: %S
UniqueName: %S
ServiceName: %S
SetOptionsHandler: %p %s
SetFilterModuleOptionsHandler: %p %s
AttachHandler: %p %s
DetachHandler: %p %s
RestartHandler: %p %s
PauseHandler: %p %s
SendNetBufferListsHandler: %p %s
SendNetBufferListsCompleteHandler: %p %s
CancelSendNetBufferListsHandler: %p %s
ReceiveNetBufferListsHandler: %p %s
ReturnNetBufferListsHandler: %p %s
OidRequestHandler: %p %s
OidRequestCompleteHandler: %p %s
CancelOidRequestHandler: %p %s
DevicePnPEventNotifyHandler: %p %s
NetPnPEventHandler: %p %s
StatusHandler: %p %s
DirectOidRequestHandler: %p %s
DirectOidRequestCompleteHandler: %p %s
CancelDirectOidRequestHandler: %p %s
InterfaceGuid: %s
FilterState: %s
NextSendNetBufferListsHandler: %p %s
NextSendNetBufferListsCompleteHandler: %p %s
NextIndicateReceiveNetBufferListsHandler: %p %s
NextReturnNetBufferListsHandler: %p %s
NextCancelSendNetBufferListsHandler: %p %s
SetFilterModuleOptionalHandlers: %p %s
OidRequestHandler: %p %s
OidRequestCompleteHandler: %p %s
CancelRequestHandler: %p %s
DevicePnPEventNotifyHandler: %p %s
NetPnPEventHandler: %p %s
StatusHandler: %p %s
FilterSendNetBufferListsHandler: %p %s
FilterIndicateReceiveNetBufferListsHandler: %p %s
FilterCancelSendNetBufferListsHandler: %p %s
InitiateOffloadCompleteHandler: %p %s
TerminateOffloadCompleteHandler: %p %s
UpdateOffloadCompleteHandler: %p %s
InvalidateOffloadCompleteHandler: %p %s
QueryOffloadCompleteHandler: %p %s
IndicateOffloadEventHandler: %p %s
TcpOffloadSendCompleteHandler: %p %s
TcpOffloadReceiveCompleteHandler: %p %s
TcpOffloadDisconnectCompleteHandler: %p %s
TcpOffloadForwardCompleteHandler: %p %s
TcpOffloadEventHandler: %p %s
TcpOffloadReceiveIndicateHandler: %p %s
InitiateOffloadHandler: %p %s
TerminateOffloadHandler: %p %s
UpdateOffloadHandler: %p %s
InvalidateOffloadHandler: %p %s
QueryOffloadHandler: %p %s
TcpOffloadReceiveReturnHandler: %p %s
DirectOidRequestHandler: %p %s
DirectOidRequestCompleteHandler: %p %s
CancelDirectOidRequestHandler: %p %s
TcpOffloadSendHandler: %p %s
TcpOffloadReceiveHandler: %p %s
TcpOffloadDisconnectHandler: %p %s
TcpOffloadForwardHandler: %p %s
Provider[%d]: %p
QueryObjectHandler: %p %s
SetObjectHandler: %p %s
FilterDriverBlock[%d]
InitiateOffloadHandler: %p %s
TerminateOffloadHandler: %p %s
UpdateOffloadHandler: %p %s
InvalidateOffloadHandler: %p %s
QueryOffloadHandler: %p %s
TcpOffloadReceiveReturnHandler: %p %s
TcpOffloadSendHandler: %p %s
TcpOffloadReceiveHandler: %p %s
TcpOffloadDisconnectHandler: %p %s
TcpOffloadForwardHandler: %p %s
ClCreateVcHandler: %p %s
ClDeleteVcHandler: %p %s
ClOidRequestHandler: %p %s
ClOidRequestCompleteHandler: %p %s
ClOpenAfCompleteHandlerEx: %p %s
ClCloseAfCompleteHandler: %p %s
ClRegisterSapCompleteHandler: %p %s
ClDeregisterSapCompleteHandler: %p %s
ClMakeCallCompleteHandler: %p %s
ClModifyCallQoSCompleteHandler: %p %s
ClCloseCallCompleteHandler: %p %s
ClAddPartyCompleteHandler: %p %s
ClDropPartyCompleteHandler: %p %s
ClIncomingCallHandler: %p %s
ClIncomingCallQoSChangeHandler: %p %s
ClIncomingCloseCallHandler: %p %s
ClIncomingDropPartyHandler: %p %s
ClCallConnectedHandler: %p %s
ClNotifyCloseAfHandler: %p %s
CmCreateVcHandler: %p %s
CmDeleteVcHandler: %p %s
CmOpenAfHandler: %p %s
CmCloseAfHandler: %p %s
CmRegisterSapHandler: %p %s
CmDeregisterSapHandler: %p %s
CmMakeCallHandler: %p %s
CmCloseCallHandler: %p %s
CmIncomingCallCompleteHandler: %p %s
CmAddPartyHandler: %p %s
CmDropPartyHandler: %p %s
CmActivateVcCompleteHandler: %p %s
CmDeactivateVcCompleteHandler: %p %s
CmModifyCallQoSHandler: %p %s
CmOidRequestHandler: %p %s
CmOidRequestCompleteHandler: %p %s
CmNotifyCloseAfCompleteHandler: %p %s
DriverVersion: %X
CoCreateVcHandler: %p %s
CoDeleteVcHandler: %p %s
CoActivateVcHandler: %p %s
CoDeactivateVcHandler: %p %s
CoSendNetBufferListsHandler: %p %s
CoRequestHandler: %p %s
CoOidRequestHandler: %p %s
InitiateOffloadHandler: %p %s
TerminateOffloadHandler: %p %s
UpdateOffloadHandler: %p %s
InvalidateOffloadHandler: %p %s
QueryOffloadHandler: %p %s
TcpOffloadSendHandler: %p %s
TcpOffloadReceiveHandler: %p %s
TcpOffloadDisconnectHandler: %p %s
TcpOffloadForwardHandler: %p %s
TcpOffloadReceiveReturnHandler: %p %s
AddDeviceHandler: %p %s
RemoveDeviceHandler: %p %s
FilterResourceRequirementsHandler: %p %s
StartDeviceHandler: %p %s
ServiceName: %S
CoCreateVcHandler: %p %s
CoDeleteVcHandler: %p %s
CoActivateVcHandler: %p %s
CoDeactivateVcHandler: %p %s
CoSendNetBufferListsHandler: %p %s
CoRequestHandler: %p %s
CoOidRequestHandler: %p %s
InitiateOffloadHandler: %p %s
TerminateOffloadHandler: %p %s
UpdateOffloadHandler: %p %s
InvalidateOffloadHandler: %p %s
QueryOffloadHandler: %p %s
TcpOffloadSendHandler: %p %s
TcpOffloadReceiveHandler: %p %s
TcpOffloadDisconnectHandler: %p %s
TcpOffloadForwardHandler: %p %s
TcpOffloadReceiveReturnHandler: %p %s
AddDeviceHandler: %p %s
RemoveDeviceHandler: %p %s
FilterResourceRequirementsHandler: %p %s
StartDeviceHandler: %p %s
OpenNDKAdapterHandler: %p %s
CloseNDKAdapterHandler: %p %s
IdleNotificationHandler: %p %s
CancelIdleNotificationHandler: %p %s
AllocateNetBufferListForwardingContextHandler: %p %s
FreeNetBufferListForwardingContextHandler: %p %s
AddNetBufferListDestinationHandler: %p %s
SetNetBufferListSourceHandler: %p %s
GrowNetBufferListDestinationsHandler: %p %s
GetNetBufferListDestinationsHandler: %p %s
UpdateNetBufferListDestinationsHandler: %p %s
CopyNetBufferListInfoHandler: %p %s
ReferenceSwitchNicHandler: %p %s
DereferenceSwitchNicHandler: %p %s
ReferenceSwitchPortHandler: %p %s
DereferenceSwitchPortHandler: %p %s
ReportFilteredNetBufferListsHandler: %p %s
ImageName: %S
SetNetBufferListSwitchContextHandler: %p %s
GetNetBufferListSwitchContextHandler: %p %s
netio legacy handler %p %s
read netio legacy handler failed, error %d, status %X
read netio legacy handler failed, error %d
%p %s
read netio WfpNblInfoDispTable failed, error %d, status %X
read netio WfpNblInfoDispTable failed, error %d
netio MacShim %p %s
WfpShim[%d] %p %s
Unknown WFP callout size %d
WFP callout[%d]:
ClassifyCallback: %p %s
NotifyCallback: %p %s
uFlowDeleteFunction: %p %s
Exception %X on sysptr seed reading at %p
Decode system scheme - %s
Decode scheme - %s
Cannot read my process cookie, error %X
Trace[%d] %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X (%p) %s
Trace[%d] %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X %p
SystemFunction%3.3d (%p) %s
PFNCLIENT.%s patched by %s (%p)
PFNCLIENT.%s patched %p
check_user32_pfnclient: exception %X occured
PFNCLIENTWORKER.%s patched by %s (%p)
PFNCLIENTWORKER.%s patched %p
ConsoleCtrlHandler[%d]: %s (%p)
ConsoleCtrlHandler[%d]: %p UNKNOWN
ConsoleCtrlHandler: %s (%p)
UnhandledExceptionFilter: %s (%p)
ShimModule: %s (%p)
RtlpStartThreadFunc: %s (%p)
RtlpExitThreadFunc: %s (%p)
RtlpUnhandledExceptionFilter: %s (%p)
RtlSecureMemoryCacheCallback: %s (%p)
TppLogpRoutine: %s (%p)
CsrServerApiRoutine: %s (%p)
LdrpManifestProberRoutine: %s (%p)
LdrpCreateActCtxLanguage: %s (%p)
LdrpReleaseActCtx: %s (%p)
LdrpAppCompatDllRedirectionCallbackFunction: %s (%p)
%s%s!%s patched by %s (addr %p)
%s%s.%d patched by %s (addr %p)
%s%s.%d patched, addr %p
PID %d trace callbacks: %d
Trace[%d] %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X %p %s
Process PID %d has the same token as system process: %p !!!
Process PID %d token: %p
%p %s %8X
%p %s %8X
CheckProc: cannot get modules list for PID %d (%S), error %d, ntstatus %X
CheckProc: cannot get modules list for PID %d (%S), error %d
CheckProcess PID %d (%S):
PEB.PostProcessInitRoutine: %p %s
PEB.PostProcessInitRoutine: %p UNKNOWN
PEB.pShimData: %p
PEB.AppCompat: %p
PEB.FastPebLockRoutine: %p %s
PEB.FastPebLockRoutine: %p UNKNOWN
PEB.FastPebUnlockRoutine: %p %s
PEB.FastPebUnlockRoutine: %p UNKNOWN
Module: %s at %p
Cannot read %s, PID %d, error %d
PID %d: LSA SP %s has %d patched functions in SECPKG_FUNCTION_TABLE:
PID %d: ncrypt has %d patched functions
PID %d: mswsock has %d patched functions in SockProcTable
PID %d: mswsock has %d patched functions in NspVector
PID %d: mswsock has %d patched MSAFD functions
SHAREDINFO.aheList: %p
PID %d: ntdsa has %d patched functions
PID %d - ole32 hooked by %s
PID %d - ole32 hooked by unknown module, addr %p
PID %d: rpcrt4 has %d patched functions
PID %d: basesrv has %d patched user functions
PID %d: winsrv has %d patched user functions
PID %d: winsrv has %d patched cons functions
PID %d: lsasrv has %d patched functions
PID %d: lsasrv has %d patched functions in LsapSspiExtension
PID %d: lsasrv has %d patched functions in LsapLookupExtension
PID %d: lsasrv has %d patched functions in LsapLsasrvIfTable
Cannot alloc %X bytes for EAT checking of %s, PID %d
Cannot read EAT of %s, PID %d
Cannot alloc %X bytes for checking section %s of %s, PID %d
Cannot read section %s content %X bytes of %s, PID %d
Cannot make section %s of %s, PID %d
Module %s section %s has %X patched bytes, PID %d
PID %d: user32 has %d patched imm32 functions
PID %d: advapi32 has %d patched functions
PID %d: kernel32 has %d patched functions
ShimHandler[%d]: %p %s
ShimHandler[%d]: %p UNKNOWN, located at %p
ApplicationRecoveryCallback: %s (%p)
%s, PID %d:
Cannot alloc %X bytes for IAT checking of %s, PID %d
Cannot read IAT (size %X at %p) of %s, PID %d
Cannot find function %s.%s for module %s process %d
Cannot find function %s.%d for module %s process %d
IAT Patched %s.%s in module %s process %d by %s
IAT Patched %s.%s in module %s process %d, addr %p
IAT Patched %s.%d in module %s process %d by %s
IAT Patched %s.%d in module %s process %d
Cannot alloc %X bytes for delayed IAT checking of %s, PID %d
Cannot read delayed IAT (size %X at %p) of %s, PID %d
Cannot find delayed function %s.%s for module %s process %d
Cannot find delayed function %s.%d for module %s process %d
LdrpDllNotificationList: %d
%p %s
Read %d QueuedWorkerItems:
[%d] %p %s
check_drivers_reinit: cannot read size of list, error %d, status %X
check_drivers_reinit: cannot read size of list, error %d
check_drivers_reinit: cannot alloc %X bytes
check_drivers_reinit: cannot read list, error %d, ntstatus %X
check_drivers_reinit: cannot read list, error %d
[%d] Drv %p %s routine %p %s
read_shutdown_notificators: cannot read size of %s, error %d, status %X
read_shutdown_notificators: cannot read size of %s, error %d
read_shutdown_notificators: cannot alloc %X bytes
read_shutdown_notificators: cannot read %s, error %d, ntstatus %X
read_shutdown_notificators: cannot read %s, error %d
[%d] DevObj %p Drv %p (addr %p) %s
[%d] DevObj %p Drv %p %s
MailSlot: %S, server %d (%S)
MailSlot: %S, server %d
NamedPipe: %S, server %d (%S)
NamedPipe: %S, server %d
Flags: %X, server %d (%S)
Flags: %X, creator %d, server %d
Flags: %X, server %d
Endpoints: %d
Endpoint %S PID %d (%S):
Endpoint %S:
RPC controls: %d
%S: %S
%8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X version %d.%d
Cannot load kernel %s
Unknown scheduler: ReadySummary %X DispatcherReadyListHead %X
Unknown scheduler: ReadySummary %X DeferredReadyListHead %X
Unknown scheduler: ReadySummary %X
Readed %d threads, total %d
Thread %p ProcID %X ThreadID %X Win32Thread %p %s
Thread %p ProcID %X ThreadID %X Priority %d Win32Thread %p
Thread %p ProcID %X ThreadID %X %s
Thread %p ProcID %X ThreadID %X Priority %d
reading count of threads on processor %d failed, error %X
%d threads
reading of threads on processor %d failed, error %X
Scheduler index %d
reading count of threads failed, error %X
reading of threads failed, error %X
Cannot find ETHREAD.ServiceTable
Unknown version of ETHREAD, offset %X
Cannot alloc %X bytes for ProcessesAndThreadsInformation
Cannot realloc %X bytes for ProcessesAndThreadsInformation
ProcessesAndThreadsInformation failed, error %X
read_sdt for threadID %X failed, error %d, status %X
read_sdt for threadID %X failed, error %d
ProcessID %X (%S) ThreadID %X SDT %p %s
ProcessID %X ThreadID %X SDT %p %s
read_thread_token for threadID %X failed, error %d, status %X
read_thread_token for threadID %X failed, error %d
ProcessID %X (%S) ThreadID %X token %p ImpersonationLevel %d
ProcessID %X ThreadID %X token %p ImpersonationLevel %d
Cannot detect ETHREAD.StartAddress
Unknown kernel %s, StartAddress %X, IrpList %X, StackLimit %X, StackBase %X
Unknown kernel %s, StartAddress %X, StackLimit %X, StackBase %X
Unknown kernel %s, StartAddress %X, IrpList %X
Unknown kernel %s, StartAddress %X
Cannot read count of system threads, ntstatus %X
Cannot alloc %d bytes
Cannot read system threads, ntstatus %X
%d System Threads
Thread %p Start %p %c stack %p limit %p %s
read IPSec status failed, error %d, status %X
read IPSec status failed, error %d
IPSec status %X
IPSecHandler: %p %s
IPSecQueryStatus: %p %s
IPSecSendCmplt: %p %s
IPSecNdisStatus: %p %s
IPSecRcvFWPacket: %p %s
check_tdi_pnp_clnts: cannot read size of clnts list, error %d, ntstatus %X
check_tdi_pnp_clnts: cannot read size of clnts list, error %d
check_tdi_pnp_clnts: cannot alloc %X bytes
check_tdi_pnp_clnts: cannot read clnts list, error %d, ntstatus %X
check_tdi_pnp_clnts: cannot read clnts list, error %d
TDI PnP clients: %d (readed %d)
[%d]: version %X %S
PnPPowerHandler: %p %s
BindHandler: %p %s
UnBindHandler: %p %s
AddAddressHandler: %p %s
DelAddressHandler: %p %s
Microsoft-Windows-Windows Firewall With Advanced Security
Microsoft-Windows-Kernel-Boot
Microsoft-Windows-EQoS
Microsoft-Windows-XWizards
ASP.NET Events
Microsoft-Windows-UIRibbon
Microsoft-Windows-WPD-CompositeClassDriver
Microsoft-Windows-Wired-AutoConfig
Microsoft-Windows-PrintService
Microsoft-Windows-ApplicationExperience-LookupServiceTrigger
Microsoft-Windows-IDCRL
Microsoft-Windows-MPS-DRV
Microsoft-Windows-P2P-Mesh
Microsoft-Windows-TabletPC-MathRecognizer
Microsoft-Windows-Spell-Checking
Microsoft-Windows-Fax
Microsoft-Windows-GroupPolicy
Microsoft-Windows-Crashdump
Microsoft-Windows-PrintSpooler
Microsoft-Windows-LanguagePackSetup
Microsoft-Windows-OneX
Microsoft-Windows-OfflineFiles-CscApi
Microsoft-Windows-ADSI
Microsoft-Windows-Dhcp-Client
Microsoft-Windows-CertificateServicesClient-AutoEnrollment
Microsoft-Windows-NlaSvc
Microsoft-Windows-Diagnosis-MSDE
Microsoft-Windows-SpoolerWin32SPL
Microsoft-Windows-SPB-ClassExtension
Microsoft-Windows-Kernel-Memory
Microsoft-Windows-Application Server-Applications
Microsoft-Windows-MUI
Microsoft-Windows-P2P-Collab
Microsoft-Windows-Security-Netlogon
Microsoft-Windows-SQM-Events
Microsoft-Windows-USB-USBPORT
Microsoft-Windows-SendTo
Microsoft-Windows-AIT
Microsoft-Windows-P2P-CRP
PrintFilterPipelineSvc_ObjectsGuid
Microsoft-Windows-IME-JPPRED
Microsoft-Windows-WMP
Microsoft-Windows-Eqos-SQM-Provider
MSDADIAG.ETW
Microsoft-Windows-Processor-Aggregator
Microsoft-Windows-ErrorReportingConsole
Microsoft-Windows-SmartCard-TPM-VCard-Module
Microsoft-Windows-User Profiles Service
Microsoft-Windows-Crypto-CNG
Microsoft-Windows-LinkLayerDiscoveryProtocol
Microsoft-Windows-TaskbarCPL
Microsoft-Windows-Networking-Correlation
Microsoft-Windows-RestartManager
Microsoft-Windows-WMPDMCCore
Microsoft-Windows-TCPIP
Microsoft-Windows-MSDTC
Microsoft-Windows-Resources-MrmBc
Microsoft-Windows-Time-Service
Microsoft-Windows-HomeGroup-ProviderService
Microsoft-Windows-DriverFrameworks-UserMode
Microsoft-Windows-Runtime-Networking
Microsoft-Windows-Network-Connection-Broker
Microsoft-Windows-Shell-AppWizCpl
Microsoft-Windows-PDC
Microsoft-Windows-Biometrics
Microsoft-Windows-IME-SCDICCOMPILER
Microsoft-Windows-Wininit
Microsoft-Windows-Dwm-Dwm
Microsoft-Windows-Photo-Image-Codec
Microsoft-Windows-TaskScheduler
Microsoft-Windows-osk
Microsoft-Windows-Kernel-PowerTrigger
Microsoft-Windows-EventLog-WMIProvider
Microsoft-Windows-IME-OEDCompiler
Microsoft-Windows-WER-SystemErrorReporting
Microsoft-Windows-Deplorch
Microsoft-Windows-SPB-HIDI2C
Microsoft-Windows-UxTheme
Microsoft-Windows-BfeTriggerProvider
Microsoft-Windows-Media-Streaming
Microsoft-Windows-Remotefs-UTProvider
Microsoft-Windows-Ntfs-SQM
Microsoft-Windows-User-PnP
Microsoft-Windows-AltTab
Microsoft-Windows-Kernel-StoreMgr
Microsoft-Windows-WindowsColorSystem
Microsoft-Windows-RemoteDesktopServices-RemoteFX-VM-User-Mode-Transport
Microsoft-Windows-MSMPEG2ADEC
Microsoft-Windows-TerminalServices-PnPDevices
Microsoft-Windows-GettingStarted
Microsoft-Windows-Narrator
Windows Wininit Trace
Microsoft-Windows-FileHistory-UI
Microsoft-Windows-MediaFoundation-PlayAPI
Microsoft-Windows-CertificateServicesClient-Lifecycle-System
Microsoft-Windows-BitLocker-Driver-Performance
Microsoft-Windows-PerfProc
Microsoft-Windows-Resource-Leak-Diagnostic
Microsoft-Windows-WebServices
Microsoft-Windows-FileHistory-Service
Microsoft-Windows-MediaEngine
Microsoft-Windows-StartupRepair
Microsoft-Windows-Security-IdentityStore
Microsoft-Windows-IME-SCSetting
Microsoft-Windows-FileHistory-EventListener
Microsoft-Windows-Program-Compatibility-Assistant
Microsoft-Windows-DesktopActivityModerator
Microsoft-Windows-MemoryDiagnostics-Schedule
Microsoft-Windows-FileHistory-Engine
Microsoft-Windows-PerfDisk
Microsoft-Windows-OOBE-Machine-Core
Microsoft-Windows-WLAN-AutoConfig
Microsoft-Windows-FileHistory-ConfigManager
Microsoft-Windows-Search-ProfileNotify
Microsoft-Windows-PerfCtrs
UMPass Driver Trace
Microsoft-Windows-FileHistory-Catalog
Microsoft-Windows-WlanDlg
Microsoft-Windows-CDROM
Microsoft-Windows-Crypto-NCrypt
Certificate Services Client CredentialRoaming Trace
Microsoft-Windows-CredUI
Windows Firewall Service
Microsoft-Windows-FileHistory-Core
Microsoft-Windows-Direct3D11
Microsoft-Windows-DirectoryServices-Deployment
Microsoft-Windows-All-User-Install-Agent
Microsoft-Windows-Kernel-Licensing-StartServiceTrigger
Microsoft-Windows-ServerManager-ManagementProvider
Microsoft-Windows-Diagnosis-ScriptedDiagnosticsProvider
Microsoft-Windows-IIS-W3SVC-WP
Microsoft-Windows-TerminalServices-MediaRedirection-DShow
Microsoft-Windows-Rdms-UI
Microsoft-Windows-Feedback-Service-TriggerProvider
Microsoft-Windows-Eventlog
Microsoft-Windows-CodeIntegrity
Microsoft-Windows-WPDClassInstaller
Microsoft-Windows-NetworkAccessProtection
Microsoft-Windows-UIAutomationCore
Microsoft-Windows-StartLmhosts
Microsoft-Windows-IME-Broker
Microsoft-Windows-Kernel-Process
Microsoft-Windows-CertificateServicesClient
Microsoft-Windows-AppXDeployment
Microsoft-Windows-Shell-Core
Microsoft-Windows-Anytime-Upgrade
Microsoft-Windows-PCI
Microsoft-Windows-WPD-MTPBT
Microsoft-Windows-CertificationAuthorityClient-CertCli
Microsoft-Windows-Srv2
Microsoft-Windows-TunnelDriver-SQM-Provider
Microsoft-Windows-Security-Licensing-SLC
Microsoft-Windows-ATAPort
Microsoft-Windows-Recovery
Microsoft-Windows-GenericRoaming
Microsoft-Windows-Sdbus-SQM
Microsoft-Windows-DirectComposition
Microsoft-Windows-P2PIMSvc
Microsoft-Windows-WCN-Config-Registrar
Microsoft-Windows-WPD-API
Microsoft-Windows-P2P-PNRP
Microsoft-Windows-DeviceUx
Windows Mobile Performance Hooks
Microsoft-Windows-ProcessStateManager
Windows Connect Now
Microsoft-Windows-Networking-RealTimeCommunication
Microsoft-Windows-EventSystem
Microsoft-Windows-Spaceport
Windows Mobile Remote API
Microsoft-Windows-Dhcp-Nap-Enforcement-Client
Microsoft-Windows-WinNat
Windows Mobile AirSync Engine 2
Microsoft-Windows-WCN-Config-Registrar-Secure
Windows Mobile AirSync Engine 1
Microsoft-Windows-Security-Kerberos
Windows Mobile ActiveSync Engine
Microsoft-Windows-WSC-SRV
Microsoft-Windows-Eventlog-ForwardPlugin
Windows Mobile Serial Connectivity
Microsoft-Windows-TerminalServices-SessionBroker-Client
Microsoft-Windows-WMPNSS-PublicAPI
Windows Mobile Desktop Passthrough
Microsoft-Windows-RPC-Events
Microsoft-Windows-LanguageProfile
Microsoft-Windows-Anytime-Upgrade-Events
Microsoft-Windows-Management-UI
Microsoft-Windows-SMBClient
Microsoft-Windows-TerminalServices-RdpSoundDriver
Microsoft-Windows-Dwm-Api
Microsoft-Windows-QoS-qWAVE
Microsoft-Windows-Kernel-Tm-Trigger
Microsoft-Windows-IPNAT
Microsoft-Windows-NetworkBridge
Microsoft-Windows-MPS-CLNT
Microsoft-Windows-Diagnosis-Scheduled
Microsoft-Windows-WMPNSS-Service
Microsoft-Windows-DxpTaskRingtone
Microsoft-Windows-Kernel-AppCompat
Microsoft-Windows-TimeBroker
Microsoft-Windows-DeviceConfidence
Microsoft-Windows-Shell-Shwebsvc
Microsoft-Windows-Diagnostics-Performance
Windows NetworkMap Trace
Microsoft-Windows-TerminalServices-Printers
Microsoft-Windows-AppLocker
Microsoft-Windows-Audio
Microsoft-Windows-LLTD-MapperIO
Microsoft-Windows-HotspotAuth
Microsoft-Windows-Firewall-CPL
Microsoft-Windows-Kernel-IoTrace
Microsoft-Windows-Perflib
Microsoft-Windows-BootUX
Microsoft-Windows-WMPDMCUI
Microsoft-Windows-Disk
Microsoft-Windows-IME-JPLMP
Microsoft-Windows-Security-SPP-UX-Notifications
Microsoft-Windows-TerminalServices-ClientActiveXCore
Microsoft-Windows-IIS-IISReset
Microsoft-Windows-WindowsUIImmersive
Windows Firewall Control Panel
Microsoft-Windows-DeviceSetupManager
Microsoft-Windows-EnrollmentPolicyWebService
Microsoft-Windows-IME-Roaming
Microsoft-Windows-SetupQueue
Microsoft-Windows-SmartCard-Audit
Microsoft-Windows-Servicing
Microsoft-Windows-ACL-UI
Microsoft-Windows-WWAN-CFE
Microsoft-Windows-FCRegSvc
Microsoft-Windows-IIS-IisMetabaseAudit
Microsoft-Windows-Kernel-WDI
Microsoft-Windows-TabletPC-MathInput
Microsoft-Windows-Kernel-General
Windows Media Player Trace
Microsoft-Windows-DxpTaskDLNA
Microsoft-Windows-User Profiles General
Microsoft-Windows-Kernel-WSService-StartServiceTrigger
Microsoft-Windows-WebAuth
Microsoft-Windows-API-Tracing
Microsoft-Windows-FunctionDiscovery
Microsoft-Windows-StickyNotes
Microsoft-Windows-WCN-WscEapPeer-Trace
Microsoft-Windows-QoS-WMI-Diag
Microsoft-Windows-NetworkProvisioning
Microsoft-Windows-Network-DataUsage
Microsoft-Windows-AppSruProv
Microsoft-Windows-WebcamExperience
Microsoft-Windows-EaseOfAccess
Microsoft-Windows-Spellchecking-Host
Microsoft-Windows-IME-CandidateUI
Microsoft-Windows-TPM-WMI
Microsoft-Windows-Security-SPP
Microsoft-Windows-DirectShow-KernelSupport
Microsoft-Windows-Diagnosis-AdvancedTaskManager
Microsoft-Windows-ThemeCPL
Windows Mobile Co-installer
Microsoft-Windows-MPRMSG
Microsoft-Windows-EnhancedStorage-EhStorCertDrv
Microsoft-Windows-NdisImPlatformEventProvider
Microsoft-Windows-FunctionDiscoveryHost
Microsoft-Windows-MediaFoundation-MSVideoDSP
Microsoft-Windows-IME-JPTIP
Windows Kernel Trace
Microsoft-SQLServerDataTools
Microsoft-Windows-ASN1
Microsoft-Windows-Crypto-BCrypt
Microsoft-Windows-HealthCenterCPL
Microsoft-Windows-XAML
Microsoft-Windows-PDFReader
Microsoft-Windows-TerminalServices-ServerUSBDevices
Microsoft-Windows-WWAN-SVC-EVENTS
Microsoft-Windows-Search-ProtocolHandlers
Microsoft-Windows-IdCtrls
Microsoft-Windows-User-ControlPanel
Microsoft-Windows-Runtime-Media
Microsoft-Windows-CAPI2
Windows Mobile Sync Handlers
Microsoft-Windows-PowerCfg
Microsoft-Windows-SrumTelemetry
Microsoft-Windows-Base-Filtering-Engine-Connections
Microsoft-Windows-Sidebar
Microsoft-Windows-NDF-HelperClassDiscovery
Microsoft-Windows-PerfNet
Microsoft-Windows-PortableDeviceStatusProvider
Microsoft-Windows-TabletPC-Platform-Manipulations
Microsoft-Windows-Subsys-SMSS
Microsoft-Windows-LDAP-Client
Microsoft-Windows-Security-SPP-UX-GC
Microsoft-Windows-Media Center Extender
Microsoft-Windows-DiskDiagnostic
Microsoft-Windows-TSF-msutb
Microsoft-Windows-Reliability-Analysis-Agent
{B6501BA0-C61A-C4E6-6FA2-A4E7F8C8E7A0}
Microsoft-Windows-Kernel-Processor-Power
Microsoft-Windows-NCSI
Microsoft-Windows-NetworkConnectivityStatus
Microsoft-Windows-wmvdecod
Microsoft-Windows-ServiceTriggerPerfEventProvider
Microsoft-Windows-Service Pack Installer
Microsoft-Windows-Bluetooth-HidGatt
Microsoft-Windows-TabletPC-Platform-Input-Ninput
Microsoft-Windows-Tcpip-SQM-Provider
Microsoft-Windows-MPS-SRV
Microsoft-Windows-KnownFolders
Microsoft-Windows-NAPIPSecEnf
Microsoft-Windows-EnrollmentWebService
Microsoft-Windows-Deduplication-Change
Microsoft-Windows-OfflineFiles-CscFastSync
Microsoft-Windows-UxInit
Microsoft-Windows-BranchCacheClientEventProvider
Microsoft-Windows-Forwarding
Microsoft-Windows-RPC-Proxy-LBS
Microsoft-Windows-Kernel-Disk
Microsoft-Windows-TriggerEmulatorProvider
Microsoft-Windows-SystemHealthAgent
Microsoft-Windows-Memory-Diagnostic-Task-Handler
Microsoft-Windows-Winsock-WS2HELP
Microsoft-Windows-ThemeUI
Microsoft-Windows-TerminalServices-MediaRedirection
Microsoft-Windows-TerminalServices-ClientUSBDevices
Microsoft-Windows-TabletPC-CoreInkRecognition
Microsoft-Windows-COM
Microsoft-Windows-PnPMgrTriggerProvider
Microsoft-Windows-LoadPerf
Microsoft-Windows-System-Restore
Microsoft-Windows-UserAccountControl
Microsoft-Windows-Services-Svchost
Microsoft-Windows-PushNotifications-Developer
Microsoft-Windows-LiveId
Microsoft-Windows-Security-SPP-UX
Microsoft-Windows-VAN
Microsoft-Windows-FirstUX-PerfInstrumentation
Microsoft-Windows-Kernel-Tm
Microsoft-Windows-Kernel-ShimEngine
Microsoft-Windows-EapHost
Microsoft-Windows-CertPolEng
Microsoft-Windows-MsLbfoEventProvider
Microsoft-Windows-Complus
Microsoft-Windows-EFS
Microsoft-Windows-WwaHost
Microsoft-Windows-ServerManager
Microsoft-Windows-ComDlg32
Microsoft-Windows-MP4SDECD
Microsoft-Windows-PeopleNearMe
Microsoft-Windows-SmartCard-Bluetooth-Profile
Microsoft-Windows-TZUtil
Microsoft-Windows-ApplicationExperience-SwitchBack
Microsoft-Windows-UI-Input-Inking
Microsoft-Windows-VDRVROOT
Windows Firewall NetShell Plugin
Windows Firewall API
Microsoft-Windows-Kernel-Acpi
Microsoft-Windows-WinRM
Microsoft-Windows-Direct3D10_1
Microsoft-Windows-Kernel-LicensingSqm
Microsoft-Windows-SpoolerSpoolss
Microsoft-Windows-FilterManager
Microsoft-Windows-ActionQueue
Microsoft-Windows-IME-KRAPI
Microsoft-Windows-Resource-Exhaustion-Detector
Microsoft-Windows-ApplicationExperienceInfrastructure
Microsoft-Windows-StorSqm
Microsoft-Windows-Search
Microsoft-Windows-HttpEvent
Microsoft-Windows-AxInstallService
Microsoft-Windows-Diagnosis-PerfHost
Microsoft-Windows-International
Microsoft-Windows-CertificateServicesClient-CredentialRoaming
Microsoft-Windows-SoftwareRestrictionPolicies
Microsoft-Windows-Windows Defender
Microsoft-Windows-ShareMedia-ControlPanel
Microsoft-Windows-CertificateServicesClient-Lifecycle-User
Microsoft-Windows-WPD-MTPUS
Microsoft-Windows-DirectWrite
Microsoft-Windows-RPCSS
Microsoft-Windows-DeviceSync
Microsoft-Windows-NcdAutoSetup
Microsoft-Windows-Diagnosis-PCW
Microsoft-Windows-DistributedCOM
ATA Port Driver Tracing Provider
Microsoft-Windows-WebdavClient-LookupServiceTrigger
Microsoft-Windows-USB-USBXHCI
Microsoft-Windows-Diagnosis-PLA
Microsoft-Windows-WlanConn
Microsoft-Windows-Winlogon
Microsoft-Windows-stobject
Microsoft-Windows-Mobile-Broadband-Experience-SmsRouter
Microsoft-Windows-D3D10Level9
Microsoft-Windows-WAS-ListenerAdapter
Microsoft-Windows-ServerManager-MultiMachine
Microsoft-Windows-AppxPackagingOM
Microsoft-Windows-PushNotifications-Platform
Microsoft-Windows-OOBE-Machine-Plugins-Wireless
Microsoft-Windows-IME-JPAPI
SBP2 Port Driver Tracing Provider
Microsoft-Windows-BranchCacheEventProvider
Microsoft-Windows-Immersive-Shell-API
Microsoft-Windows-ntshrui
Microsoft-Windows-KPSSVC
Microsoft-Windows-BitLocker-DrivePreparationTool
Microsoft-Windows-EapMethods-Sim
Microsoft-Windows-Shell-ZipFolder
Microsoft-Windows-Search-Core
Microsoft-Windows-OfflineFiles-CscNetApi
Microsoft-Windows-Diagnosis-WDI
Microsoft-Windows-PortableDeviceSyncProvider
Microsoft-Windows-Diagnostics-PerfTrack-Counters
Microsoft-Windows-Speech-TTS
Microsoft-Windows-Component-Resources-MrmCore-Events
Microsoft-Windows-BranchCache
Microsoft-Windows-SystemEventsBroker
Microsoft-Windows-VolumeControl
Microsoft-Windows-Win32k
Microsoft-Windows-Kernel-WHEA
Microsoft-Windows-P2P-Meetings
Microsoft-Windows-Diagnosis-WDC
Microsoft-Windows-Serial-ClassExtension
Microsoft-Windows-KPSSVC-WPP
Microsoft-Windows-CertificateServices-Deployment
Microsoft-Windows-PerfOS
Microsoft-Windows-ResetEng
Microsoft-Windows-Runtime-Graphics
Microsoft-Windows-IPSEC-SRV
Microsoft-Windows-CorruptedFileRecovery-Server
Windows Mobile Bluetooth Connectivity
Microsoft-Windows-DLNA-Namespace
Microsoft-Windows-WLAN-MediaManager
Certificate Services Client Trace
Microsoft-Windows-BranchCacheSMB
Microsoft-Windows-PrintService-USBMon
Microsoft-Windows-OOBE-Machine
Microsoft-Windows-DXP
Microsoft-Windows-Immersive-Shell
Microsoft-Windows-OOBE-Machine-Plugins
Microsoft-Windows-Reliability-Analysis-Engine
Microsoft-Windows-Application-Experience
Microsoft-Windows-KdsSvc
Microsoft-Windows-MediaFoundation-Platform
Microsoft-Windows-Security-Configuration-Wizard
Microsoft-Windows-DisplayColorCalibration
Windows Mobile Device Center Base
Microsoft-Windows-WPD-MTPClassDriver
Microsoft-Windows-DNS-Client
Microsoft-Windows-MSDTC Client
Microsoft-Windows-NDIS-PacketCapture
Windows Remote Management Trace
Microsoft-Windows-MSPaint
Microsoft-Windows-HomeGroup-ListenerService
Microsoft-Windows-Sensor-Service-Trigger
Microsoft-Windows-EapMethods-Ttls
Microsoft-Windows-Remotefs-Smb
Microsoft-Windows-SMBWitnessClient
Microsoft-Windows-USB-USBHUB
Microsoft-Windows-DirectWrite-FontCache
Microsoft-Windows-WindowsBackup
Microsoft-Windows-NWiFi
Microsoft-Windows-WER-Diag
Microsoft-Windows-UAC
Microsoft-Windows-LUA
Microsoft-Windows-AppID
Microsoft-Windows-IIS-WMSVC
Microsoft-Windows-Shell-OpenWith
Microsoft-Windows-MediaFoundation-MFReadWrite
Microsoft-Windows-BrokerInfrastructure
Microsoft-Windows-Fault-Tolerant-Heap
Microsoft-Windows-Shell-DefaultPrograms
Microsoft-Windows-Dism-Cli
Microsoft-Windows-SMBDirect
Microsoft-Windows-IME-SCTIP
Microsoft-Windows-EnergyEfficiencyWizard
Microsoft-Windows-ParentalControls
Microsoft-Windows-Smartcard-Server
Microsoft-Windows-FMS
Microsoft-Windows-Devices-Location
Microsoft-Windows-LLTD-Responder
Microsoft-Windows-MsLbfoSysEvtProvider
sqlos
Microsoft-Windows-TerminalServices-RemoteConnectionManager
Microsoft-Windows-SCPNP
Microsoft-Windows-Wordpad
WMI_Tracing_Client_Operations
Microsoft-Windows-Security-Audit-Configuration-Client
Microsoft-Windows-EFSADU
Windows Notification Facility Provider
Microsoft-Windows-DiagCpl
Windows NetworkItemFactory Trace
Microsoft-Windows-ApplicationExperience-Cache
Microsoft-Windows-ResourcePublication
Microsoft-Windows-FailoverClustering-Client
Microsoft-Windows-Runtime-Networking-BackgroundTransfer
Microsoft-Windows-AppHost
Microsoft-Windows-NetAdapterCim-Diag
Microsoft-Windows-IIS-FTP
Microsoft-Windows-Iphlpsvc
Microsoft-Windows-WinINet
Microsoft-Windows-TabletPC-InputPersonalization
Microsoft-Windows-SpoolerFilterPipelineSVC
Microsoft-Windows-Globalization
Microsoft-Windows-Bits-Client
Microsoft-Windows-WFP
Microsoft-Windows-Services
Microsoft-Windows-IdleTriggerProvider
Microsoft-Windows-DxgKrnl
Microsoft-Windows-HealthCenter
Microsoft-Windows-OtpCredentialProviderEvt
Microsoft-Windows-MemoryDiagnostics-Results
Microsoft-Windows-Ncasvc
Microsoft-Windows-SystemSettings
Microsoft-Windows-PDH
Microsoft-Windows-WMPNSSUI
Microsoft-Windows-BdeTriggerProvider
Microsoft-Windows-Diagnostics-PerfTrack
Microsoft-Windows-IIS-APPHOSTSVC
Microsoft-Windows-CoreWindow
Microsoft-Windows-Help
Microsoft-Windows-WindowsUpdateClient
Microsoft-Windows-IIS-W3SVC-PerfCounters
Microsoft-Windows-WMI
Microsoft-Windows-TabletPC-Platform-Input-Wisp
Microsoft-Windows-ProcessExitMonitor
Microsoft-Windows-IME-JPSetting
Microsoft-Windows-Diagnosis-Scripted
Microsoft-Windows-GroupPolicyTriggerProvider
File Kernel Trace; Operation Set 2
Microsoft-Windows-IIS-Configuration
Microsoft-Windows-Diagnosis-TaskManager
Microsoft-Windows-Diagnosis-DPS
Microsoft-Windows-UserPnp
Microsoft-Windows-Security-SPP-UX-GenuineCenter-Logging
Microsoft-Windows-Schannel-Events
NetJoin
Microsoft-Windows-TabletPC-InputPanel
Microsoft-Windows-FileServices-ServerManager-EventProvider
Microsoft-Windows-MediaFoundation-Performance
Microsoft-Windows-EndpointTriggerProvider
Microsoft-Windows-IME-KRTIP
Microsoft-Windows-Mobile-Broadband-Experience-SmsApi
Microsoft-Windows-Hyper-V-Netvsc
Microsoft-Windows-DirectSound
Microsoft-Windows-TabletPC-Platform-Input-Core
Microsoft-Windows-PushNotifications-InProc
Microsoft-Windows-Kernel-Network
Microsoft-Windows-DiskDiagnosticResolver
Microsoft-Windows-NdisImPlatformSysEvtProvider
Microsoft-Windows-MeetingSpace
Microsoft-Windows-Base-Filtering-Engine-Resource-Flows
Microsoft-Windows-RasServer
Microsoft-Windows-VHDMP
Microsoft-Windows-WindowsSystemAssessmentTool
Microsoft-Windows-DCLocator
Microsoft-Windows-Diagnosis-MSDT
Microsoft-Windows-WLGPA
SQLSRV32.1
Microsoft-Windows-CertificateServicesClient-CertEnroll
Microsoft-Windows-IME-TCCORE
Microsoft-Windows-SmartCard-Bluetooth-Transport
Microsoft-Windows-WMVENCOD
Microsoft-Windows-mobsync
Microsoft-Windows-EFSTriggerProvider
Microsoft-Windows-DUSER
Microsoft-Windows-DiskDiagnosticDataCollector
Microsoft-Windows-DirectAccess-MediaManager
Microsoft-Windows-DisplaySwitch
Microsoft-Windows-PackageStateRoaming
Microsoft-Windows-Crypto-DPAPI
Microsoft-Windows-IME-CustomerFeedbackManagerUI
sqlserver
Microsoft-Windows-User-Loader
Microsoft-Windows-NetworkProfileTriggerProvider
Microsoft-Windows-NetworkProfile
Windows Firewall API - GP
Microsoft-Windows-CmiSetup
Microsoft-Windows-Sysprep
Microsoft-Windows-Windeploy
Microsoft-Windows-Setup
Microsoft-Windows-OobeLdr
Microsoft-Windows-SetupUGC
Microsoft-Windows-Audit
Microsoft-Windows-SetupCl
Microsoft-Windows-Winsrv
Microsoft-Windows-WinHttp
Microsoft-Windows-RadioManager
Microsoft-Windows-Websocket-Protocol-Component
Microsoft-Windows-WebIO
Microsoft-Windows-Dwm-Core
Microsoft-Windows-Registry-SQM-Provider
Microsoft-Windows-WHEA-Logger
Microsoft-Windows-PeerToPeerDrtEventProvider
Microsoft-Windows-BitLocker-Driver
Microsoft-Windows-SettingSync
Microsoft-Windows-Mobile-Broadband-Experience-Api-Internal
Microsoft-Windows-EnhancedStorage-EhStorTcgDrv
Microsoft-Windows-PowerShell
Microsoft-Windows-DirectShow-Core
Microsoft-Windows-Kernel-Power
Microsoft-Windows-msmpeg2venc
Microsoft-Windows-MPEG2_DLNA-Encoder
Microsoft-Windows-Remote-FileSystem-Log
Microsoft-Windows-Kernel-PnP
Microsoft-Windows-AppXDeployment-Server
Microsoft-Windows-Folder Redirection
Microsoft-Windows-OfflineFiles-CscUM
Microsoft-Windows-ServerManager-DeploymentProvider
Microsoft-Windows-ServiceReportingApi
Microsoft-Windows-StorDiag
Microsoft-Windows-IME-CustomerFeedbackManager
Microsoft-Windows-Kernel-EventTracing
Microsoft-Windows-Kernel-BootDiagnostics
Microsoft-Windows-DXGI
Microsoft-Windows-Build-RegDll
Microsoft-Windows-PNRPSvc
Microsoft-Windows-Ndu
Microsoft-Windows-Firewall
Microsoft-Windows-Wcmsvc
Microsoft-Windows-OLEACC
Microsoft-Windows-MSDTC Client 2
Microsoft-Windows-InputSwitch
Microsoft-Windows-Runtime-WebAPI
Microsoft-Windows-HAL
Microsoft-Windows-International-RegionalOptionsControlPanel
Microsoft-Windows-RPC
Microsoft-Windows-MFH264Enc
Microsoft-Windows-SharedAccess_NAT
Microsoft-Windows-DeviceAssociationService
Microsoft-Windows-Bluetooth-MTPEnum
Microsoft-Windows-BitLocker-API
{C5BFFE2E-9D87-D568-A09E-08FC83D0C7C2}
Microsoft-Windows-IPMIProvider
Microsoft-Windows-IME-TIP
Microsoft-Windows-WindowsToGo-StartupOptions
Microsoft-Windows-Backup
Microsoft-Windows-WMP-MediaDeliveryEngine
Microsoft-Windows-PrintBRM
Microsoft-Windows-ServerManager-ConfigureSMRemoting
Microsoft-Windows-Video-For-Windows
Microsoft-Windows-ClearTypeTextTuner
Microsoft-Windows-Subsys-Csr
Microsoft-Windows-USB-UCX
Microsoft-Windows-RemoteApp and Desktop Connections
Windows Winlogon Trace
Microsoft-Windows-RasSstp
Microsoft-Windows-UAC-FileVirtualization
Microsoft-Windows-ClassicSruMon
Microsoft-Windows-Security-IdentityListener
Microsoft-Windows-WWAN-MM-EVENTS
Microsoft-Windows-MsiServer
Microsoft-Windows-PhotoAcq
Microsoft-Windows-Power-Troubleshooter
Microsoft-Windows-DxpTaskSyncProvider
Microsoft-Windows-Remotefs-Rdbss
Microsoft-Windows-AppIDServiceTrigger
Microsoft-Windows-Kernel-File
Microsoft-Windows-TSF-msctf
Microsoft-Windows-PowerCpl
Microsoft-Windows-LanGPA
Microsoft-Windows-WWAN-MediaManager
Microsoft-Windows-PrimaryNetworkIcon
Microsoft-Windows-OfflineFiles
Microsoft-Windows-UIAnimation
Microsoft-Windows-Security-Auditing
Microsoft-Windows-WCN-Config-Registrar-Wizard-Trace
Microsoft-Windows-WWAN-NDISUIO-EVENTS
Microsoft-Windows-NetworkManagerTriggerProvider
Microsoft-Windows-Winsock-AFD
Microsoft-Windows-Remote-FileSystem-Monitor
Microsoft-Windows-WABSyncProvider
.NET Common Language Runtime
Microsoft-Windows-MSMPEG2VDEC
Microsoft-Windows-DateTimeControlPanel
Windows Firewall Driver
Microsoft-Windows-IIS-W3SVC
Microsoft-Windows-WWAN-UI-EVENTS
Microsoft-Windows-Speech-UserExperience
Microsoft-Windows-Dism-Api
Microsoft-Windows-Store-Client-UI
Microsoft-Windows-Calculator
Microsoft-Windows-Shell-ConnectedAccountState
Microsoft-Windows-PrintDialogs
Microsoft-Windows-Network-and-Sharing-Center
Microsoft-Windows-Crypto-RNG
Microsoft-Windows-MSDTC 2
Microsoft-Windows-SpellChecker
Microsoft-Windows-propsys
Microsoft-Windows-WPD-MTPIP
Microsoft-Windows-Documents
Microsoft-Windows-StorPort
Microsoft-Windows-Magnification
Microsoft-Windows-Shell-AuthUI
Microsoft-Windows-Dwm-Redir
Microsoft-Windows-BTH-BTHUSB
Microsoft-Windows-Ntfs
Microsoft-Windows-Sens
Microsoft-Windows-UserAccessLogging
Microsoft-Windows-RemoteDesktopServices-RdpCoreTS
Microsoft-Windows-COM-Perf
Microsoft-Windows-StorageSpaces-BackgroundAgent
Microsoft-Windows-Kernel-Prefetch
Portable Device Connectivity API Trace
Microsoft-Windows-RemoteAssistance
Microsoft-Windows-MF
Microsoft-Windows-MediaFoundation-MSVProc
Microsoft-Windows-TBS
Microsoft-Windows-FeedbackTool
Microsoft-Windows-WlanPref
Microsoft-Windows-OfflineFiles-CscDclUser
Microsoft-Windows-Http-SQM-Provider
Microsoft-Windows-Wireless-Network-Setup-Wizard-Trace
Microsoft-Windows-MCT
Microsoft-Windows-HotStart
Microsoft-Windows-Diagnostics-Networking
Microsoft-Windows-Sensors
Microsoft-Windows-SmbServer
Microsoft-Windows-USB-USBHUB3
Microsoft-Windows-Dot3MM
Microsoft-Windows-KernelStreaming
Microsoft-Windows-Mobile-Broadband-Experience-Api
Microsoft-Windows-VolumeSnapshot-Driver
Microsoft-Windows-MobilityCenter
Microsoft-Windows-OfflineFiles-CscService
Microsoft-Windows-Superfetch
Microsoft-Windows-IPBusEnum
Microsoft-Windows-Mprddm
Microsoft-Windows-Dwm-Udwm
Microsoft-Windows-AppModel-State
Microsoft-Windows-WCN-FD-Provider-Trace
Microsoft-Windows-Resource-Exhaustion-Resolver
Microsoft-Windows-Iphlpsvc-Trace
Microsoft-Windows-WUSA
Microsoft-Windows-TerminalServices-LocalSessionManager
Microsoft-Windows-RPC-FirewallManager
Microsoft-Windows-WCN-Common-Trace
Microsoft-Windows-MediaFoundation-MFCaptureEngine
Microsoft-Windows-ReadyBoostDriver
Microsoft-Windows-DUI
Microsoft-Windows-WMP-Setup_WM
Microsoft-Windows-Direct3D10
Microsoft-Windows-DfsSvc
Microsoft-Windows-IME-SCCORE
Microsoft-Windows-NTLM
Microsoft-Windows-VWiFi
Microsoft-Windows-Kernel-PnPConfig
Microsoft-Windows-Winsock-SQM
Microsoft-Windows-SpoolerSpoolSV
Microsoft-Windows-Netshell
Microsoft-Windows-UserModePowerService
Microsoft-Windows-HttpService
HTTP Service Trace
Microsoft-Windows-D3D9
Microsoft-Windows-AppModel-Runtime
Microsoft-Windows-CEIP
Microsoft-Windows-Directory-Services-SAM
Microsoft-Windows-SpoolerTCPMon
Microsoft-Windows-ReadyBoost
Microsoft-Windows-L2NACP
Microsoft-Windows-LLTD-Mapper
Microsoft-Windows-Deduplication
Microsoft-Windows-HomeGroup-ControlPanel
Microsoft-Windows-Mobile-Broadband-Experience-Parser-Task
Microsoft-Windows-DomainJoinManagerTriggerProvider
Microsoft-Windows-SruMon
Microsoft-Windows-ELS-Hyphenation
TCPIP Service Trace
Microsoft-Windows-DriverFrameworks-KernelMode
Microsoft-Windows-CorruptedFileRecovery-Client
Microsoft-Windows-WMI-Activity
Microsoft-Windows-COMRuntime
Microsoft-Windows-WAS
Microsoft-Windows-Wnv
Microsoft-Windows-Shsvcs
Microsoft-Windows-NDIS
Microsoft-Windows-WinMDE
File Kernel Trace; Operation Set 1
Microsoft-Windows-Proximity-Common
Microsoft-Windows-Ntfs-UBPM
Microsoft-Windows-Kernel-Registry
Microsoft-Windows-RemoteDesktopServices-RemoteDesktopSessionManager
Microsoft-Windows-TunnelDriver
Microsoft-Windows-QoS-Pacer
Microsoft-Windows-EventCollector
Microsoft-Windows-OOBE-Machine-DUI
Microsoft-Windows-IME-TCTIP
Microsoft-Windows-WCNWiz
Microsoft-Windows-Display
Microsoft-Windows-OcSetup
Microsoft-Windows-DesktopWindowManager-Diag
Microsoft-Windows-FileInfoMinifilter
Microsoft-Windows-TextPredictionEngine
Microsoft-Windows-NetworkGCW
Microsoft-Windows-DHCPv6-Client
Microsoft-Windows-PlayToManager
NDIS_STATUS_TCP_CONNECTION_OFFLOAD_CURRENT_CONFIG
NDIS_STATUS_PORT_STATE
MS_Windows_AeLookupServiceTrigger_Provider
Microsoft_Windows_SQM_Provider
MS_Windows_AIT_Provider
NDIS_TCP_CONNECTION_OFFLOAD_CURRENT_CONFIG
NDIS_TCP_OFFLOAD_CURRENT_CONFIG
PARPORT_WMI_ALLOCATE_FREE_COUNTS_GUID
NDIS_GEN_ENUMERATE_PORTS
GUID_QOS_TC_SUPPORTED
MS1394_PortVendorRegisterAccessGuid
iSCSI_PersistentLoginsGuid
iSCSI_PortalInfoClassGuid
SerailPortPerfGuid
PortClsEvent
UdpIpGuid
TcpIpGuid
iSCSI_OperationsGuid
CTLGUID_usbport
NDIS_STATUS_TCP_CONNECTION_OFFLOAD_HARDWARE_CAPABILITIES
iSCSI_DiscoveryOperationsGuid
SerialPortNameGuid
CTLGUID_WebClntTrace
POINTER_PORT_WMI_STD_DATA_GUID
KEYBOARD_PORT_WMI_STD_DATA_GUID
MSKeyboard_ClassInformationGuid
NDIS_GEN_CO_MEDIA_SUPPORTED
MS_Windows_AeSwitchBack_Provider
SerialPortHWGuid
MS_SM_PortInformationMethods
ataport_CtlGuid
storport_CtlGuid
MS1394_PortDriverInformationGuid
BTHPORT_WMI_HCI_PACKET_INFO
SerialPortCommGuid
iScsiLBOperationsGuid
MS_Windows_AeCache_Provider
NDIS_GEN_PORT_STATE
WindowsBackup TracingControlGuid
WmiMonitorListedSupportedSourceModes_GUID
NDIS_GEN_MEDIA_SUPPORTED
CTLGUID_certprop
BTHPORT_WMI_SDP_SERVER_LOG_INFO
KEYBOARD_PORT_WMI_EXTENDED_ID
iSCSIRedirectPortalGuid
NDIS_GEN_PORT_AUTHENTICATION_PARAMETERS
BTHPORT_WMI_SDP_DATABASE_EVENT
NDIS_TCP_CONNECTION_OFFLOAD_HARDWARE_CAPABILITIES
iSCSI_TCPIPConfigGuid
SerialPortPropertiesGuid
PortCls_IrpProcessing
iSCSI_SecurityConfigOperationsGuid
NDIS_TCP_OFFLOAD_PARAMETERS
PortCls_PowerState
Microsoft_Windows_GameUx
iSCSI_InitiatorLoginStatisticsGuid
MS1394_PortErrorInformationGuid
PortCls_PinState
CTLGUID_PortCls
NDIS_TCP_OFFLOAD_HARDWARE_CAPABILITIES
CTRLGUID_MF_PIPELINE
.PX`i`
`.HBS
&{%UD(_
dump_wmi_guidentries failed, error %d, status %X
dump_wmi_guidentries failed, error %d
dump_wmi_guidentries: cannot alloc %X bytes (total %d)
dump_wmi_guidentries: read failed, error %d, status %X
dump_wmi_guidentries: read failed, error %d
WMI guidentries: total %X readed %X:
[%X] %X flag %X refcnt %X - %s
[%X] %X flag %X refcnt %X %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
dump_wmi_regentries failed, error %d, status %X
dump_wmi_regentries failed, error %d
dump_wmi_regentries: cannot alloc %X bytes (total %d)
dump_wmi_regentries: read failed, error %d, status %X
dump_wmi_regentries: read failed, error %d
WMI regentries: total %X readed %X:
[%X] flags %X refcnt %X dev %p prov %X DS %p %s
[%X] flags %X refcnt %X cb %p prov %X DS %p %s
Etw[%d]:
Type %X Index %X InternalCB %p (%s) %s
Type %X Index %X InternalCB %p %s
Type %X Index %X InternalCB %p (%s) ProviderId: %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
Type %X Index %X InternalCB %p ProviderId: %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
dump_Etw: exception occured, code %X
dump_Etws: exception occured, code %X
KPRCB.EtwSupport %p:
KPRCB[%d].EtwSupport %p:
read_kernel_etws count failed, error %d, ntstatus %X
read_kernel_etws count failed, error %d
read_kernel_etws: cannot alloc %X bytes
read_kernel_etws failed, error %d, ntstatus %X
read_kernel_etws failed, error %d
KEtw[%X]:
KEtw[%X]: RefCount %d, KProvider - %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
KEtw[%X]: RefCount %d %s
[%X] %p %s
Type %X InUse %d Index %X InternalCB %p (%s) %s
Type %X InUse %d Index %X InternalCB %p %s
Type %X InUse %d Index %X InternalCB %p (%s) ProviderId: %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
Type %X InUse %d Index %X InternalCB %p ProviderId: %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
EtwCallback[%d] %p %s:
EtwCallback[%d]:
EtwTrace[%d] %p Ctx %p %s:
EtwTrace[%d] %p Ctx %p %s - %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
Unknown type %d for Etw[%d]
DEVINTERFACE_MT_TRANSPORT
DEVINTERFACE_KEYBOARD
DEVINTERFACE_COMPORT
DEVINTERFACE_VIAMINIPORT
DEVINTERFACE_STORAGEPORT
DEVINTERFACE_IRPORT
check_pnp_notifiers failed, error %d, status %X
check_pnp_notifiers failed, error %d
check_pnp_notifiers: cannot alloc %X bytes (total %d)
check_pnp_notifiers: read failed, error %d, status %X
check_pnp_notifiers: read failed, error %d
Pnp Notifiers: total %d, readed %d
Pnp[%d] %p %s %s addr %p
Pnp[%d] %s %s addr %p %s
check_pnp_handlers failed, error %d, status %X
check_pnp_handlers failed, error %d
PlugPlayHandlerTable: %d items
PlugPlayHandlerTable[%d] %p %s
PlugPlayHandlerTable[%d] %p
check_sess_notify, error %d, status %X
check_sess_notify, error %d
check_sess_notify: cannot alloc %X bytes (total %d)
check_sess_notify: read failed, error %d, status %X
check_sess_notify: read failed, error %d
IopSessionNotifications: %d
SessionNotifier[%d]: class %d len %X session %p cb %p %s
check_sess_term_ntfs failed, error %d, status %X
check_sess_term_ntfs failed, error %d
check_sess_term_ntfs: cannot alloc %X bytes (total %d)
check_sess_term_ntfs: read failed, error %d, status %X
check_sess_term_ntfs: read failed, error %d
LogonSessionTerminatedRoutines: %d
[%d] %p %s
check_fs_changes failed, error %d, status %X
check_fs_changes failed, error %d
check_fs_changes: cannot alloc %X bytes (total %d)
check_fs_changes: read failed, error %d, status %X
check_fs_changes: read failed, error %d
FS Change notifiers: %d (actual %d)
DriverObj %p addr %p %s
Cannot read count for %s, error %d
Count of %s is too big - %X
Cannot read %s table, error %d
Cannot read entry %d from table of %s, error %d
check_vista_cmp_list get count failed, error %d, status %X
check_vista_cmp_list get count failed, error %d
check_vista_cmp_list failed, error %d, status %X
check_vista_cmp_list failed, error %d
check_ai_cbs: cannot read ExpDisQueryAttributeInformation, error %d, ntstatus %X
check_ai_cbs: cannot read ExpDisQueryAttributeInformation, error %d
ExpDisQueryAttributeInformation %p %s
check_ai_cbs: cannot read ExpDisSetAttributeInformation, error %d, ntstatus %X
check_ai_cbs: cannot read ExpDisSetAttributeInformation, error %d
ExpDisSetAttributeInformation %p %s
check_dbgk_lkmd: cannot read DbgkLkmd_cblist, error %d, ntstatus %X
check_dbgk_lkmd: cannot read DbgkLkmd_cblist, error %d
DbgkLkmd[%d] callback %p %s
check_fsrtl: cannot read FltMgrCallbacks, error %d, ntstatus %X
check_fsrtl: cannot read FltMgrCallbacks, error %d
FltMgrCallbacks: %p %s
check_fsrtl: cannot read FsRtlpMupCalls, error %d, ntstatus %X
check_fsrtl: cannot read FsRtlpMupCalls, error %d
FsRtlpMupCalls: %p %s
check_Iof: cannot read pIofCallDriver, error %d, ntstatus %X
check_Iof: cannot read pIofCallDriver, error %d
pIofCallDriver %p patched by %s
check_Iof: cannot read pIofCompleteRequest, error %d, ntstatus %X
check_Iof: cannot read pIofCompleteRequest, error %d
pIofCompleteRequest %p patched by %s
check_Iof: cannot read pIoAllocateIrp, error %d, ntstatus %X
check_Iof: cannot read pIoAllocateIrp, error %d
pIoAllocateIrp %p patched by %s
check_Iof: cannot read pIoFreeIrp, error %d, ntstatus %X
check_Iof: cannot read pIoFreeIrp, error %d
pIoFreeIrp %p patched by %s
check_Iof: cannot read HvlpHypercallCodeVa, error %d, ntstatus %X
check_Iof: cannot read HvlpHypercallCodeVa, error %d
HvlpHypercallCodeVa %p patched by %s
%SystemRoot%\System32\sxssrv.dll
%SystemRoot%\System32\csrsrv.dll
%SystemRoot%\System32\basesrv.dll
%SystemRoot%\System32\winsrv.dll
%SystemRoot%\System32\lsasrv.dll
%SystemRoot%\System32\ntdll.dll
KiDebugRoutine %p hooked by %s
PspLegoNotifyRoutine %p hooked by %s
KiTimeUpdateNotifyRoutine %p hooked by %s
KiSwapContextNotifyRoutine %p hooked by %s
KiThreadSelectNotifyRoutine %p hooked by %s
Sysenter patched, addr %p not in %s !!!
Mailslot: %S
NamedPipe: %S
DEVCLASS_MULTIPORTSERIAL
DEVCLASS_PORTS
DEVCLASS_KEYBOARD
DEVCLASS_APMSUPPORT
read_dev_chrs(%S) failed, ntstatus %X
DrvObj %p name %S %s
DrvObj %p nameLen %X %s
dev_props failed, status %X
ClassGUID: %S
ClassGUID: %S - %s
Cannot open directory %S, error %X
Cannot realloc %d bytes
Cannot open device directory, error %X
Cannot open driver directory, error %X
Cannot open FileSystem directory, error %X
Unknown HAL private dispatch table version %X
HalAcpiTimerInit: %p %s
HalAcpiTimerCarry: %p %s
HalAcpiMachineStateInit: %p %s
HalAcpiQueryFlags: %p %s
HalAcpiPicStateIntact: %p %s
HalRestoreInterruptControllerState: %p %s
HalPciInterfaceReadConfig: %p %s
HalPciInterfaceWriteConfig: %p %s
HalSetVectorState: %p %s
HalGetApicVersion: %p %s
HalSetMaxLegacyPciBusNumber: %p %s
HalIsVectorValid: %p %s
HalAcpiGetTableDispatch: %p %s
HalAcpiGetRsdpDispatch: %p %s
HalAcpiGetFacsMappingDispatch: %p %s
HalAcpiGetAllTablesDispatch: %p %s
HalAcpiPmRegisterAvailable: %p %s
HalAcpiPmRegisterRead: %p %s
HalAcpiPmRegisterWrite: %p %s
HalHandlerForBus: %p %s
HalHandlerForConfigSpace: %p %s
HalLocateHiberRanges: %p %s
HalRegisterBusHandler: %p %s
HalSetWakeEnable: %p %s
HalSetWakeAlarm: %p %s
HalPciTranslateBusAddress: %p %s
HalPciAssignSlotResources: %p %s
HalHaltSystem: %p %s
HalFindBusAddressTranslation: %p %s
HalResetDisplay: %p %s
HalHandlerForBus: %p %s
HalHandlerForConfigSpace: %p %s
HalLocateHiberRanges: %p %s
HalRegisterBusHandler: %p %s
HalSetWakeEnable: %p %s
HalSetWakeAlarm: %p %s
HalPciTranslateBusAddress: %p %s
HalPciAssignSlotResources: %p %s
HalHaltSystem: %p %s
HalFindBusAddressTranslation: %p %s
HalResetDisplay: %p %s
KdSetupPciDeviceForDebugging: %p %s
KdReleasePciDeviceforDebugging: %p %s
KdGetAcpiTablePhase0: %p %s
KdCheckPowerButton: %p %s
HalVectorToIDTEntry: %p %s
KdMapPhysicalMemory64: %p %s
KdUnmapVirtualAddress: %p %s
HalMmMemoryUsage: %p %s
HalAllocateMapRegisters: %p %s
KdGetPciDataByOffset: %p %s
KdSetPciDataByOffset: %p %s
HalGetInterruptVector: %p %s
HalGetVectorInput: %p %s
HalLoadMicrocode: %p %s
HalUnloadMicrocode: %p %s
HalMcUpdatePostUpdate: %p %s
HalAllocateMessageTarget: %p %s
HalFreeMessageTarget: %p %s
HalDpReplaceBegin: %p %s
HalDpReplaceTarget: %p %s
HalDpReplaceControl: %p %s
HalDpReplaceEnd: %p %s
HalPrepareForBugcheck: %p %s
HalQueryWakeTime: %p %s
HalReportIdleStateUsage: %p %s
HalHandlerForBus: %p %s
HalHandlerForConfigSpace: %p %s
HalLocateHiberRanges: %p %s
HalRegisterBusHandler: %p %s
HalSetWakeEnable: %p %s
HalSetWakeAlarm: %p %s
HalPciTranslateBusAddress: %p %s
HalPciAssignSlotResources: %p %s
HalHaltSystem: %p %s
HalFindBusAddressTranslation: %p %s
HalResetDisplay: %p %s
HalAllocateMapRegisters: %p %s
KdSetupPciDeviceForDebugging: %p %s
KdReleasePciDeviceforDebugging: %p %s
KdGetAcpiTablePhase0: %p %s
KdCheckPowerButton: %p %s
HalVectorToIDTEntry: %p %s
KdMapPhysicalMemory64: %p %s
KdUnmapVirtualAddress: %p %s
KdGetPciDataByOffset: %p %s
KdSetPciDataByOffset: %p %s
HalGetInterruptVector: %p %s
HalGetVectorInput: %p %s
HalLoadMicrocode: %p %s
HalUnloadMicrocode: %p %s
HalMcUpdatePostUpdate: %p %s
HalAllocateMessageTarget: %p %s
HalFreeMessageTarget: %p %s
HalDpReplaceBegin: %p %s
HalDpReplaceTarget: %p %s
HalDpReplaceControl: %p %s
HalDpReplaceEnd: %p %s
HalPrepareForBugcheck: %p %s
HalQueryWakeTime: %p %s
HalReportIdleStateUsage: %p %s
HalTscSynchronization: %p %s
HalWheaInitProcessorGenericSection: %p %s
HalStopLegacyUsbInterrupts: %p %s
HalReadWheaPhysicalMemory: %p %s
HalWriteWheaPhysicalMemory: %p %s
HalDpMaskLevelTriggeredInterrupts: %p %s
HalDpUnmaskLevelTriggeredInterrupts: %p %s
HalDpGetInterruptReplayState: %p %s
HalDpReplayInterrupts: %p %s
HalQueryIoPortAccessSupported: %p %s
HalHandlerForBus: %p %s
HalHandlerForConfigSpace: %p %s
HalLocateHiberRanges: %p %s
HalRegisterBusHandler: %p %s
HalSetWakeEnable: %p %s
HalSetWakeAlarm: %p %s
HalPciTranslateBusAddress: %p %s
HalPciAssignSlotResources: %p %s
HalHaltSystem: %p %s
HalFindBusAddressTranslation: %p %s
HalResetDisplay: %p %s
HalAllocateMapRegisters: %p %s
KdSetupPciDeviceForDebugging: %p %s
KdReleasePciDeviceforDebugging: %p %s
KdGetAcpiTablePhase0: %p %s
KdCheckPowerButton: %p %s
HalVectorToIDTEntry: %p %s
KdMapPhysicalMemory64: %p %s
KdUnmapVirtualAddress: %p %s
KdGetPciDataByOffset: %p %s
KdSetPciDataByOffset: %p %s
HalGetInterruptVector: %p %s
HalGetVectorInput: %p %s
HalLoadMicrocode: %p %s
HalUnloadMicrocode: %p %s
HalMcUpdatePostUpdate: %p %s
HalAllocateMessageTarget: %p %s
HalFreeMessageTarget: %p %s
HalDpReplaceBegin: %p %s
HalDpReplaceTarget: %p %s
HalDpReplaceControl: %p %s
HalDpReplaceEnd: %p %s
HalPrepareForBugcheck: %p %s
HalQueryWakeTime: %p %s
HalReportIdleStateUsage: %p %s
HalTscSynchronization: %p %s
HalWheaInitProcessorGenericSection: %p %s
HalStopLegacyUsbInterrupts: %p %s
HalReadWheaPhysicalMemory: %p %s
HalWriteWheaPhysicalMemory: %p %s
HalInterruptMaskLevelTriggeredLines: %p %s
HalInterruptUnmaskLevelTriggeredLines: %p %s
HalDpGetInterruptReplayState: %p %s
HalDpReplayInterrupts: %p %s
HalQueryIoPortAccessSupported: %p %s
KdSetupIntegratedDeviceForDebugging: %p %s
KdReleaseIntegratedDeviceForDebugging: %p %s
HalEnlightenmentInitialize: %p %s
HalAllocateEarlyPages: %p %s
HalMapEarlyPages: %p %s
HalTimerGetClockOwner: %p %s
HalTimerGetClockConfiguration: %p %s
HalTimerNotifyProcessorFreeze: %p %s
HalTimerPrepareProcessorForIdle: %p %s
HalDiagRegisterLogRoutine: %p %s
HalTimerResumeProcessorFromIdle: %p %s
HalTimerResetLastClockTick: %p %s
HalVectorToIDTEntryEx: %p %s
HalSecondaryInterruptQueryPrimaryInformation: %p %s
HalMaskInterrupt: %p %s
HalUnmaskInterrupt: %p %s
HalIsInterruptTypeSecondary: %p %s
HalAllocateGsivForSecondaryInterrupt: %p %s
HalAddInterruptRemapping: %p %s
HalRemoveInterruptRemapping: %p %s
HalSaveAndDisableEnlightenment: %p %s
HalRestoreHvEnlightenment: %p %s
HalPciEarlyRestore: %p %s
HalInterruptGetLocalIdentifier: %p %s
HalAllocatePmcCounterSet: %p %s
HalCollectPmcCounters: %p %s
HalFreePmcCounterSet: %p %s
HalTimerQueryCycleCounter: %p %s
HalTimerGetNextTickDuration: %p %s
HalPciMarkHiberPhase: %p %s
HalInterruptQueryProcessorRestartEntryPoint: %p %s
HalInterruptRequestSecondaryInterrupt: %p %s
HalInterruptEnumerateUnmaskedInterrupts: %p %s
HalBiosDisplayReset: %p %s
HalGetDmaAdapter: %p %s
HalCheckPowerButton: %p %s
HalMapPhysicalMemoryWriteThrough64: %p %s
HalUnmapVirtualAddress: %p %s
HalKdReadPCIConfig: %p %s
HalKdWritePCIConfig: %p %s
HalTimerQueryWakeTime: %p %s
HalTimerReportIdleStateUsage: %p %s
HalKdEnumerateDebuggingDevices: %p %s
HalFlushIoRectangleExternalCache: %p %s
HalPowerEarlyRestore: %p %s
HalQueryCapsuleCapabilities: %p %s
HalUpdateCapsule: %p %s
HalPciMultiStageResumeCapable: %p %s
check_hal_private_disp_table: cannot read table, error %d, ntstatus %X
check_hal_private_disp_table: cannot read table, error %d
check_hal_disp_table: cannot read table, error %d, ntstatus %X
check_hal_disp_table: cannot read table, error %d
HalQuerySystemInformation: %p %s
HalSetSystemInformation: %p %s
HalQueryBusSlots: %p %s
HalExamineMBR: %p %s
HalIoReadPartitionTable: %p %s
HalIoSetPartitionInformation: %p %s
HalIoWritePartitionTable: %p %s
HalReferenceHandlerForBus %p %s
HalReferenceBusHandler %p %s
HalDereferenceBusHandler %p %s
HalInitPnpDriver %p %s
HalInitPowerManagement %p %s
HalGetDmaAdapter %p %s
HalGetInterruptTranslator %p %s
HalStartMirroring %p %s
HalEndMirroring %p %s
HalMirrorPhysicalMemory %p %s
HalEndOfBoot %p %s
HalMirrorVerify %p %s
HalGetCachedAcpiTable %p %s
HalSetPciErrorHandlerCallback %p %s
read_hal_apci_disp_table return %X bytes, error %d, ntstatus %X
read_hal_apci_disp_table return %X bytes, error %d
Bad HalAcpiDispatchTable version: %X
read_gdt_size failed, error %d, ntstatus %X
read_gdt_size failed, error %d
Cannot alloc %d bytes for GDT entries
read_gdt failed, error %d, ntstatus %X
read_gdt failed, error %d
Descriptor[%d] %s S %d DPL %d type %X base %X limit %X
WinChecker::dump_ldt failed, error %X, ntstatus %X
WinChecker::dump_ldt failed, error %X
WinChecker::dump_ldt: cannot alloc ldt array, size %X
Ldt[%d]:
Base: X
Limit: X
AVL: %d
D/B: %d
DPL: %d
G: %d
P: %d
S: %d
Type: %d
Cannot read code for kinterrupt(%X) thunk, error %d
IDT patched: unknown type %X selector %X addr %p for int%X
IDT patched: unknown selector %X for int%X
IDT patched: int%X has unknown selector %X base %X limit %X addr %p
IDT patched: int%X addr %p by module %s
IDT int%X addr %p KINTERRUPT %p
IDT patched: int%X addr %p
Int%X: selector %X type TASK DPL %X base %X limit %X
Int%X: selector %X type %X DPL %X addr %p base %X limit %X
Int%X: selector %X type %X DPL %X addr %p
read_idt_size failed, error %d, ntstatus %X
read_idt_size failed, error %d
read_idt: cannot alloc %d bytes for IDT storage
read_idt failed, error %d, ntstatus %X
read_idt failed, error %d
Cannot read kinterrupt (%X), error %d
KInterrupt %X (%p):
Size %X type %X
ServiceRoutine %p %s
DispatchAddress %p %s
check_ob_types: cannot read size of ObTypes list, error %d, ntstatus %X
check_ob_types: cannot read size of ObTypes list, error %d
check_ob_types: cannot read %d bytes (readed %d), error %d, ntstatus %X
check_ob_types: cannot read %d bytes (readed %d), error %d
fill_ob_type: cannot read ObType %S (%X), error %d
Cannot read ObType %S (%X), error %d
ObType %S:
DumpProcedure: %p %s
OpenProcedure: %p %s
CloseProcedure: %p %s
DeleteProcedure: %p %s
ParseProcedure: %p %s
SecurityProcedure: %p %s
QueryNameProcedure: %p %s
OkayToCloseProcedure: %p %s
ZwAlpcConnectPortEx
ZwOpenKeyTransactedEx
ZwOpenKeyEx
ZwOpenKeyTransacted
ZwCreateKeyTransacted
ZwAlpcSendWaitReceivePort
ZwAlpcImpersonateClientOfPort
ZwAlpcDisconnectPort
ZwAlpcDeletePortSection
ZwAlpcCreatePortSection
ZwAlpcCreatePort
ZwAlpcConnectPort
ZwAlpcAcceptConnectPort
ZwUnloadKey2
ZwQueryOpenSubKeysEx
ZwLoadKeyEx
ZwQueryPortInformationProcess
ZwWaitForKeyedEvent
ZwReleaseKeyedEvent
ZwOpenKeyedEvent
ZwCreateKeyedEvent
ZwUnloadKeyEx
ZwSaveKeyEx
ZwRenameKey
ZwLockRegistryKey
ZwLockProductActivationKeys
ZwCompressKey
ZwCompactKeys
ZwYieldExecution
ZwUnloadKey
ZwSetValueKey
ZwSetThreadExecutionState
ZwSetInformationKey
ZwSetDefaultHardErrorPort
ZwSecureConnectPort
ZwSaveMergedKeys
ZwSaveKey
ZwRestoreKey
ZwRequestWaitReplyPort
ZwRequestPort
ZwReplyWaitReplyPort
ZwReplyWaitReceivePortEx
ZwReplyWaitReceivePort
ZwReplyPort
ZwReplaceKey
ZwRegisterThreadTerminatePort
ZwQueryValueKey
ZwQueryOpenSubKeys
ZwQueryMultipleValueKey
ZwQueryKey
ZwQueryInformationPort
ZwOpenKey
ZwNotifyChangeMultipleKeys
ZwNotifyChangeKey
ZwLoadKey2
ZwLoadKey
ZwListenPort
ZwImpersonateClientOfPort
ZwFlushKey
ZwEnumerateValueKey
ZwEnumerateKey
ZwDeleteValueKey
ZwDeleteKey
ZwDelayExecution
ZwCreateWaitablePort
ZwCreatePort
ZwCreateNamedPipeFile
ZwCreateKey
ZwConnectPort
ZwCompleteConnectPort
ZwAcceptConnectPort
FindKiServiceTable: relocation type %d found at X
Cannot read body of %s !
Cannot extract index of %s, error %d
kernel %s don`t contains KeServiceDescriptorTable function !
Cannot find SDT in %s
Cannot read ntdll.dll
Cannot read body of %s!
Cannot read body of ZwYieldExecution!
Cannot extract index of ZwYieldExecution, error %d
Cannot extract index of ZwPlugPlayControl , error %d
%s: %p
SDT entry %X (%s) hooked %p %s!
SDT entry %X hooked %p %s!
Need unhook %d items in SSDT
UNHOOK_ITEM: Index %X Offset %X
Unhook SSDT failed, lasterror %d
Unhooked %d SSDT items
NtUserSetProcessRestrictionExemption
NtUserAcquireIAMKey
NtGdiDdDDICreateKeyedMutex2
NtGdiDdDDIOpenKeyedMutex2
NtGdiDdDDIAcquireKeyedMutex2
NtGdiDdDDIReleaseKeyedMutex2
NtUserSetTHQAPublicKey
NtGdiDdDDIReleaseKeyedMutex
NtGdiDdDDIAcquireKeyedMutex
NtGdiDdDDIDestroyKeyedMutex
NtGdiDdDDIOpenKeyedMutex
NtGdiDdDDICreateKeyedMutex
NtUserEndTouchOperation
NtUserSfmDxReportPendingBindingsToDwm
NtGdiDDCCIGetTimingReport
NtUserUnregisterSessionPort
NtUserRegisterSessionPort
NtUserRegisterErrorReportingDialog
NtGdiSetOPMSigningKeyAndSequenceNumbers
NtGdiGetCertificateSize
NtGdiGetCertificate
NtUserWaitForMsgAndEvent
NtUserVkKeyScanEx
NtUserUnregisterHotKey
NtUserUnlockWindowStation
NtUserUnloadKeyboardLayout
NtUserUnhookWindowsHookEx
NtUserSetWindowStationUser
NtUserSetWindowsHookEx
NtUserSetWindowsHookAW
NtUserSetProcessWindowStation
NtUserSetKeyboardState
NtUserSetImeHotKey
NtUserSetConsoleReserveKeys
NtUserRegisterHotKey
NtUserOpenWindowStation
NtUserMapVirtualKeyEx
NtUserLockWindowStation
NtUserLoadKeyboardLayoutEx
NtUserGetProcessWindowStation
NtUserGetKeyState
NtUserGetKeyNameText
NtUserGetKeyboardState
NtUserGetKeyboardLayoutName
NtUserGetKeyboardLayoutList
NtUserGetImeHotKey
NtUserGetCPD
NtUserGetAsyncKeyState
NtUserCreateWindowStation
NtUserCloseWindowStation
NtUserCheckImeHotKey
NtUserCallMsgFilter
NtUserAlterWindowStyle
NtUserActivateKeyboardLayout
NtGdiScaleViewportExtEx
NtGdiDvpWaitForVideoPortSync
NtGdiDvpUpdateVideoPort
NtGdiDvpGetVideoPortConnectInfo
NtGdiDvpGetVideoPortOutputFormats
NtGdiDvpGetVideoPortLine
NtGdiDvpGetVideoPortInputFormats
NtGdiDvpGetVideoPortFlipStatus
NtGdiDvpGetVideoPortField
NtGdiDvpGetVideoPortBandwidth
NtGdiDvpFlipVideoPort
NtGdiDvpDestroyVideoPort
NtGdiDvpCreateVideoPort
NtGdiDvpCanCreateVideoPort
NtGdiDdSetColorKey
read_shadow_sdt failed, error %d
check_win32k_sdt: cannot alloc %d bytes
Cannot read win32k_sdt at %p size %X, error %d
win32k_sdt[%d] (%s) hooked, addr %p %s
win32k_sdt[%d] hooked, addr %p %s
GetNamedPipeServerProcessId
read_kddb read %X bytes, error %d
cannot read MmNonPagedPoolStart (%p), error %d
cannot read MmNonPagedPoolEnd (%p), error %d
cannot read MmPagedPoolStart (%p), error %d
cannot read MmPagedPoolEnd (%p), error %d
cannot read KernelVerifier (%p), error %d
WindowsType: %S
ETHREAD.StartAddress %X
KiProcessorBlock: %p (%X)
KernelVerifier: %X
KeBugCheckCallbackList: %p (%X)
WorkerRoutine: %p %s
IdleFunction: %p %s
IdleFunction: %p %s
KPRCB[%d].WorkerRoutine: %p %s
KPRCB[%d].IdleFunction: %p %s
KPRCB[%d].IdleFunction: %p %s
read_kpcr return %X bytes, error %d, ntstatus %X
read_kpcr return %X bytes, error %d
KPCR[%d] %p major %X minor %X
KPCR[%d] %p
get_os_info return %X bytes, error %d, ntstatus %X
get_os_info return %X bytes, error %d
NtMajorVersion: %d
NtMinorVersion: %d
BuildNumber: %d
GlobalFlag: %X
Processors: %d
MmVerifierFlags %d
MmSystemSize %d %s
DebuggerEnabled %d
DebuggerNotPresent %d
SafeBootMode %d
NXSupportPolicy %X
CR0 %8.8X %s
CR4 %8.8X %s
Cannot open mailslot %S, error %d
get_mail_slot_owner(%S): returned %d bytes, error %d, ntstatus %X
get_mail_slot_owner(%S): returned %d bytes, error %d
Cannot open named pipe %S, error %d
GetNamedPipeServerProcessId(%S) failed, error %d
get_named_pipe_owner(%S): returned %d bytes, error %d, ntstatus %X
get_named_pipe_owner(%S): returned %d bytes, error %d
read_lpc_port_chars: len %d, returned %d bytes, error %d, ntstatus %X
read_lpc_port_chars: len %d, returned %d bytes, error %d
read_unicode_string: len %d, returned %d bytes, error %d, ntstatus %X
read_unicode_string: len %d, returned %d bytes, error %d
read_drivers_list: cannot get size of drivers list, returned %d bytes, error %d, ntstatus %X
read_drivers_list: cannot get size of drivers list, returned %d bytes, error %d
read_drivers_list: cannot alloc %X bytes for driver list
read_drivers_list: cannot read drivers list, error %d, ntstatus %X
read_drivers_list: cannot read drivers list, error %d
%p:%X flags %X LoadCount %d %s
read_KiThreadSelectNotifyRoutine failed, error %d
read_KiSwapContextNotifyRoutine failed, error %d
read_KiTimeUpdateNotifyRoutine failed, error %d
read_PspLegoNotifyRoutine failed, error %d
read_KiDebugRoutine failed, error %d
read_msrs failed, error %d, ntstatus %X
read_msrs failed, error %d
IManageProcess: Cannot OpenProcess %d
IManageProcess: Cannot open process %d
read_win32_process for PID %X failed, error %d, status %X
read_win32_process for PID %X failed, error %d
read_dword(%p, PID %d) failed, error %d, ntstatus %X
read_dword(%p, PID %d) failed, error %d
read_ptr(%p, PID %d) failed, error %d, ntstatus %X
read_ptr(%p, PID %d) failed, error %d
rp_ReadProcessMemory(%p size %X) from %p error %d
read_token for PID %X failed, error %d, status %X
read_token for PID %X failed, error %d
open_proc(%d, access %X) failed, error %d, ntstatus %X
open_proc(%d, access %X) failed, error %d
rp_OpenProcess(%d, access %X) dwRet %d, error %d
rp_TerminateProcess(%p, %X) dwRet %d, error %d
Major %d Minor %d BuildNumber %d PlatformId %d ServicePackMajor %d ServicePackMinor %d SuiteMask %d ProductType %d CSDVersion %S
ProductType: %X
Cannot open RPC control, error %X
msgsvcsend
_ILocalObjectExporter
IVsShell
IWbemLoginClientID
ICertProtect
_IBTFTPApiEvents
_s_PasswordRecovery
wininet_UrlCache
_IObjectExporter
WMsgAPIs
WMsgKAPIs
INCryptKeyIso
HttpProxyMgrProvider
IKeySvcR
WcnTransportRpc
IPortResolve
IWbemLoginHelper
LRpcSIDKey
ISmartCardRootCerts
IDebugPortSupplier2
IAsyncOperation
IPipelineElement
OnlineProviderCertInterface
IBackgroundCopyJobHttpOptions
HttpProxyMgrClient
IStaticPortMappingCollection
IKeySvc
s_WindowsShutdown
IWebBrowser2
IDebugPortSupplierLocale2
IUPnPHttpHeaderControl
WINHTTP_AUTOPROXY_SERVICE
IErcLuaSupport
IDebugPortSupplier3
IKeySvc2
BackupKey
IWerReport
ICertPassage
IStaticPortMapping
IDebugPortSupplierEx2
IWbemLevel1Login
IWebBrowserApp
msgsvc
IShellWindows
RpcBindingFromStringBinding(%S) failed: %d
RpcMgmtInqIfIds(%S) failed: %d
RpcStringBindingCompose failed: %d
RpcBindingFromStringBinding failed: %d
RpcMgmtInqIfIds failed: %d
%8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X version %d.%d : %s
%8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X version %d.%d : (%s)
RpcMgmtEpEltInqBegin failed: %d
Cannot read npc table, readed %X bytes
rpcrt4
%s.AddressChangeFn: %p %s
rpcrt4_hack::check_myself: exception %d occured
rpcrt4_hack::try_hack: cannot find RpcServerRegisterIfEx
I_RpcInitNdrImports
load_driver(%S) returned %X
Loaded kernel driver: %S
Error loading kernel driver: %ls - 0xx
Error loading kernel driver: %S - 0xx
Error loading kernel driver: %S - OpenSCManager 0xx
tcpip
ClientImmProcessKey
fnHkOPTINLPEVENTMSG
fnHkINLPMSG
fnSENTDDEMSG
fnDWORDOPTINLPMSG
RealMsgWaitForMultipleObjectsEx
PEB.KernelCallbackTable patched, %p
user32_hack::try_hack: bad PE passed
user32_hack::try_hack: cannot read import table
pfnWowMsgBoxIndirectCallback
Unknown apfnDispatch size: %d
%s_hack::try_hack: bad PE passed
%s_hack::try_hack: cannot read exports, error %d
%s_hack::try_hack: cannot find section .data
%s_hack::try_hack: cannot read section .data
%s_hack::try_hack: cannot read section .rdata
%s_hack::try_hack: cannot find section .text
%s_hack::try_hack: cannot read section .text
DxgkReleaseKeyedMutex2
DxgkAcquireKeyedMutex2
DxgkOpenKeyedMutex2
DxgkCreateKeyedMutex2
DxgkReleaseKeyedMutex
DxgkAcquireKeyedMutex
DxgkDestroyKeyedMutex
DxgkOpenKeyedMutex
DxgkCreateKeyedMutex
Cannot read gDxgkInterface, readed %X bytes
WindowHasShadow
DisableProcessWindowsGhosting
zzzUnhookWindowsHook
xxxUpdateWindows
xxxArrangeIconicWindows
SetWindowState
ClearWindowState
SetMsgBox
GetKeyboardType
GetKeyboardLayout
RemotePassthruDisable
xxxRemotePassthruEnable
Cannot read gpsi, readed %X bytes
Cannot read gpsi handlers, readed %X bytes
Cannot read apfnSimpleCall, readed %X bytes
Cannot read gapfnMessageCall, readed %X bytes
Cannot read gapfnScSendMessage, readed %X bytes
Cannot read gaNewProcAddresses, readed %X bytes
Cannot open logfile %S
Cannot create stop event, error %d
Driver %S loaded from %S
SrvGetConsoleKeyboardLayoutName
SrvSetConsoleKeyShortcuts
SrvGetConsoleAliasExes
SrvGetConsoleAliasExesLength
SrvVDMConsoleOperation
SrvGetLargestConsoleWindowSize
SrvExitWindowsEx
winsrv.dll
Unknown size of ConsoleServerApiDispatchTable: %d
Unknown size of UserServerApiDispatchTable: %d
CallUserpExitWindowsEx
GetConsoleAliasExesInternal
GetConsoleAliasExesLengthInternal
SetConsoleKeyShortcuts
GetConsoleKeyboardLayoutNameWorker
SetConsoleOutputCPInternal
GetConsoleOutputCP
GetLargestConsoleWindowSize
reg_ccs_services::read failed - error %d
Cannot open key %S, error %d
SafeSecondaryLog(%d) failed, error %d
SafeSecondaryLog failed, error %d
SafeSendLog(%d) failed, error %d
SafeSendLog failed, error %d
Bad memory %p len %X in dump_hex_buffer
Cannot alloc %d bytes for delayed imports
Cannot alloc %d bytes for imports
read_import_safe(%s) failed %X
Cannot realloc %d bytes for iat
read_delayed_safe(%s) failed %X
store2md_cache: cannot alloc %d bytes
store2md_cache: cannot realloc, alloced %d bytes
wdigest.dll
tspkg.dll
schannel.dll
pku2u.dll
negoexts.dll
msv1_0.dll
livessp.dll
kerberos.dll
umpnpmgr.dll
combase.dll
ntdsa.dll
ntdll.dll
cryptbase.dll
ncrypt.dll
rpcrt4.dll
imm32.dll
user32.dll
kernelbase.dll
kernel32.dll
advapi32.dll
ole32.dll
Cannot alloc %X bytes for relocs
SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\RebootRequired
WS2_32.dll
RPCRT4.dll
GetProcessHeap
GetWindowsDirectoryA
KERNEL32.dll
RegCloseKey
RegOpenKeyExW
RegOpenKeyExA
RegCreateKeyExW
ADVAPI32.dll
GetWindowsDirectoryW
GetCPInfo
RegQueryInfoKeyW
RegEnumKeyW
zcÁ
.?AVMyWindowsChecker@@
.?AV?$rpcrt4_hack@U_IMAGE_NT_HEADERS@@@@
.?AVtcpip_hack@@
.?AV?$import_holder@U_IMAGE_NT_HEADERS@@@CMN@@
.?AVinmem_import_holder@CMN@@
.?AVimport_holder_intf@CMN@@
.?AVmodule_import@CMN@@
<requestedExecutionLevel level="requireAdministrator" uiAccess="false"/>
aR.Rn
X.UJ^A
w%xyW
f.Gkf
%0X0m0
>$?(?,?0?
3&4;456?90:
77g7
7>7[7`7|7
6#8*878^8~8
<#<0<^<@=
11_1
0#101#202
0 11h1J3
< <$<(<,<0<
6%7S7
7*717>7[8
=!>&>9>>>
7&7@7l78N8V8z8
:);4;>;\;
0%0X0
= >$>(>,>0>
?,?4?<?\?|?
.----/01/01/01
KERNEL32.DLL
mscoree.dll
U%SystemRoot%\system32\svchost.exe
%SystemRoot%\system32\svchost
WSOCKTRANSPORT
TCPIP6
TCPIP
STORPORT
STORMINIPORT
SOFTPCI
SCSIPORT
SCSIMINIPORT
SBP2PORT
FCPORT
PassiveWatchdogTimeout
sImageExecutionOptions
ErrorPortStartTimeout
ErrorPortCommTimeout
DisablePagingExecutive
DebuggerMaxModuleMsgs
CountOperations
B\\.\
Psapi.dll
sWindows PowerShell
tHost Process for Windows Tasks
Windows Problem Reporting 32 bit
Windows Problem Reporting
Windows Modules Installer
mWindows Start-Up Application
tWindows Search Indexer
sWindows Server Initial Configuration Tasks
Windows Media Player
Dump Reporting Tool
Error Reporter
rWindows Control Panel 32 bit
Windows Control Panel
Windows Connect Now - Config Registrar Service
Windows Media Player Network Sharing Service
Windows firewall
Windows Error Reporting Service
tWindows Defender
vError reporting service
eWindows update service
Windows Image Acquisition
WebClient
tWindows Security Center Notification App
yWindows Based Script Host
Windows installer 32 bit
Windows installer
Windows 16-bit Virtual Machine
Windows Management Instrumentation
Windows User Mode Driver Manager
MS tftp
MS ftp 32 bit
MS ftp
Microsoft Help and Support Center
Cmd.exe 32 bit
Cmd.exe
Windows Logon User Interface Host
Windows update
tGoogle Chrome
rOpera Internet Browser
Mozilla Thunderbird Mail and News Client
dFirefox browser
Services.exe
%SystemRoot%\msagent\agentsvr.exe
%SystemRoot%\System32\dfrgfat.exe
%SystemRoot%\System32\dfrgntfs.exe
%SystemRoot%\System32\services.exe
%SystemRoot%\System32\svchost.exe
%SystemRoot%\System32\alg.exe
%SystemRoot%\System32\spoolsv.exe
%SystemRoot%\System32\net.exe
%SystemRoot%\System32\net1.exe
%SystemRoot%\System32\cmd.exe
%SystemRoot%\System32\notepad.exe
%SystemRoot%\System32\calc.exe
%SystemRoot%\System32\PTF.exe
%SystemRoot%\System32\tPTF.exe
%SystemRoot%\System32\telnet.exe
%SystemRoot%\System32\taskkill.exe
%SystemRoot%\System32\ctfmon.exe
%SystemRoot%\System32\wdfmgr.exe
%SystemRoot%\System32\mmc.exe
%SystemRoot%\System32\userinit.exe
%SystemRoot%\System32\wbem\wmiprvse.exe
%SystemRoot%\System32\wbem\wmiadap.exe
%SystemRoot%\explorer.exe
%SystemRoot%\System32\lsass.exe
%SystemRoot%\System32\winlogon.exe
%SystemRoot%\System32\LogonUI.exe
%SystemRoot%\System32\wuauclt.exe
%SystemRoot%\System32\wuauclt1.exe
%SystemRoot%\System32\CCM\CcmExec.exe
%SystemRoot%\System32\csrss.exe
%SystemRoot%\System32\smss.exe
\SystemRoot\System32\smss.exe
%SystemRoot%\System32\inetsrv\w3wp.exe
%SystemRoot%\System32\schtasks.exe
%SystemRoot%\System32\tstheme.exe
%SystemRoot%\System32\control.exe
%SystemRoot%\System32\taskmgr.exe
%SystemRoot%\System32\dwwin.exe
%SystemRoot%\System32\drwtsn32.exe
%SystemRoot%\System32\dumprep.exe
%SystemRoot%\System32\dfssvc.exe
%SystemRoot%\System32\dllhost.exe
%SystemRoot%\System32\ntvdm.exe
%SystemRoot%\System32\rundll32.exe
%SystemRoot%\System32\msiexec.exe
%SystemRoot%\System32\mshta.exe
%SystemRoot%\System32\regsvr32.exe
%SystemRoot%\System32\cscript.exe
%SystemRoot%\System32\wscript.exe
%SystemRoot%\System32\wscntfy.exe
%SystemRoot%\System32\mstsc.exe
%SystemRoot%\System32\dashost.exe
far.exe
Far.exe
CLSID\{FC7D9E02-3F9E-11d3-93C0-00C04F72DAF7}\InprocServer32
CLSID\{73FDDC80-AEA9-101A-98A7-00AA00374959}\LocalServer32
CLSID\{0002DF01-0000-0000-C000-000000000046}\LocalServer32
iedw.exe
%SystemRoot%\System32\oobechk.exe
%SystemRoot%\System32\oobe.exe
%SystemRoot%\System32\psxss.exe
%SystemRoot%\System32\internat.exe
AcroRd32.exe
excel.exe
outlook.exe
winword.exe
powerpnt.exe
wmplayer.exe
firefox.exe
thunderbird.exe
Opera.exe
WinRAR.exe
%SystemRoot%\System32\wininit.exe
%SystemRoot%\System32\lsm.exe
%SystemRoot%\System32\dwm.exe
%SystemRoot%\System32\werfault.exe
%SystemRoot%\System32\taskeng.exe
%SystemRoot%\System32\conime.exe
%SystemRoot%\System32\wudfhost.exe
%SystemRoot%\System32\taskhost.exe
%SystemRoot%\System32\conhost.exe
%SystemRoot%\System32\rdpclip.exe
%SystemRoot%\System32\SearchFilterHost.exe
%SystemRoot%\System32\SearchProtocolHost.exe
csrss.exe
svchost.exe
alg.exe
sPptpMiniport
Tcpip
psapi.dll
127.0.0.1
\\.\pipe\
\\.\mailslot\
SOFTWARE\Microsoft\Windows NT\CurrentVersion
\\.\Pipe\
\\.\Mailslot\
ncacn_ip_tcp:
ncadg_ip_udp:
\\pipe\\
SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\
SOFTWARE\Microsoft\PowerShell\1\ShellIds\Microsoft.PowerShell
RemediationExe
SOFTWARE\Classes\SCCM.VAppLauncher\shell\Open\command
SOFTWARE\Classes\CLSID\{00AAB372-0D6D-4976-B5F5-9BC7605E30BB}\LocalServer32
SOFTWARE\Classes\CLSID\{3C296D07-90AE-4FAC-86F9-65EAA8B82D22}\LocalServer32
SOFTWARE\Classes\CLSID\{D63B10C5-BB46-4990-A94F-E40B9D520160}\LocalServer32
SOFTWARE\Classes\CLSID\{03e64e17-b220-4052-9b9b-155f9cb8e016}\LocalServer32
SOFTWARE\Classes\CLSID\{1F69F884-285E-418E-9715-B9EEE402DD5F}\LocalServer32
Software\Microsoft\Windows\CurrentVersion\WINEVT\publishers
Windows checker
1.0.0.3432
wincheck.exe
0, 0, 8, 16

NesIMIQs.exe_1664_rwx_05740000_00001000:

.text
`.rdata
@.data

NesIMIQs.exe_1664_rwx_05750000_00001000:

.text
`.rdata
@.data

NesIMIQs.exe_1664_rwx_06010000_00001000:

notepad.exe "%Documents and Settings%\%current user%\myfile"

NesIMIQs.exe_1664_rwx_06020000_00001000:

%Documents and Settings%\%current user%\myfile

reIEcoQI.exe_1276_rwx_00401000_00069000:

3E.Pcq:P!V^
#%Xkq.
.JF{<
U%Sa@
('%D^q-*
?|Q%f
SE?.rn~M*
.Dhe4
E.IdJWH
%k%cn>x_
?%uRc!
%3.UGiO0
]w.LQ
I 4keyy
L%C['
7.BLP
;.StH 
>.Qlx #6
2software\microsoft\windows\currentversion\run
P.yrBX.
PB]%C
%FoS(
F<.cS

reIEcoQI.exe_1276_rwx_00680000_00068000:

3E.Pcq:P!V^
#%Xkq.
.JF{<
U%Sa@
('%D^q-*
?|Q%f
SE?.rn~M*
.Dhe4
E.IdJWH
%k%cn>x_
?%uRc!
%3.UGiO0
]w.LQ
I 4keyy
L%C['
7.BLP
;.StH 
>.Qlx #6
$g.Gd
P.yrBX.
PB]%C
%FoS(
F<.cS

reIEcoQI.exe_1276_rwx_00700000_00001000:

%WinDir%\TEMP

reIEcoQI.exe_1276_rwx_00940000_00001000:

%Documents and Settings%\LocalService\dUskcAww\fGAwoYMM

reIEcoQI.exe_1276_rwx_00950000_00001000:

%Documents and Settings%\All Users\hcYYccwo\NesIMIQs

reIEcoQI.exe_1276_rwx_00960000_00001000:

%Documents and Settings%\LocalService\dUskcAww\fGAwoYMM.inf

reIEcoQI.exe_1276_rwx_00970000_00001000:

%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.inf

reIEcoQI.exe_1276_rwx_00980000_00001000:

%Documents and Settings%\LocalService\dUskcAww\fGAwoYMM.exe

reIEcoQI.exe_1276_rwx_00990000_00001000:

%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.exe

reIEcoQI.exe_1276_rwx_009C0000_00001000:

fGAwoYMM.exe

reIEcoQI.exe_1276_rwx_009D0000_00001000:

NesIMIQs.exe

reIEcoQI.exe_1276_rwx_009E0000_00001000:

taskkill /FI "USERNAME eq SYSTEM" /F /IM fGAwoYMM.exe

reIEcoQI.exe_1276_rwx_009F0000_00001000:

taskkill /FI "USERNAME eq SYSTEM" /F /IM NesIMIQs.exe


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    cscript.exe:2712
    cscript.exe:2980
    cscript.exe:3076
    cscript.exe:668
    cscript.exe:2844
    cscript.exe:2184
    cscript.exe:4024
    cscript.exe:3324
    cscript.exe:3656
    cscript.exe:3808
    cscript.exe:3120
    cscript.exe:2528
    cscript.exe:3256
    cscript.exe:3792
    cscript.exe:3856
    cscript.exe:2156
    cscript.exe:1468
    cscript.exe:2400
    cscript.exe:2292
    cscript.exe:2244
    cscript.exe:548
    cscript.exe:2240
    cscript.exe:760
    cscript.exe:3760
    cscript.exe:1316
    cscript.exe:3836
    cscript.exe:2916
    cscript.exe:3884
    cscript.exe:3936
    cscript.exe:1796
    cscript.exe:2924
    cscript.exe:3132
    cscript.exe:3804
    cscript.exe:3640
    cscript.exe:2332
    cscript.exe:3248
    cscript.exe:2312
    cscript.exe:2068
    cscript.exe:2144
    cscript.exe:2392
    cscript.exe:412
    cscript.exe:2140
    cscript.exe:2792
    cscript.exe:2796
    cscript.exe:3772
    cscript.exe:4092
    cscript.exe:3276
    cscript.exe:740
    cscript.exe:3148
    cscript.exe:3208
    cscript.exe:2820
    cscript.exe:4044
    cscript.exe:3384
    cscript.exe:2540
    cscript.exe:304
    cscript.exe:2544
    cscript.exe:3024
    cscript.exe:4048
    cscript.exe:2304
    cscript.exe:2412
    cscript.exe:2176
    cscript.exe:3292
    cscript.exe:2660
    cscript.exe:1652
    cscript.exe:1016
    cscript.exe:2668
    cscript.exe:3580
    cscript.exe:2444
    cscript.exe:2936
    cscript.exe:3952
    cscript.exe:1336
    cscript.exe:2932
    cscript.exe:1984
    cscript.exe:2764
    cscript.exe:296
    cscript.exe:2836
    cscript.exe:248
    cscript.exe:2044
    cscript.exe:3152
    cscript.exe:3012
    cscript.exe:1380
    cscript.exe:2572
    cscript.exe:3468
    cscript.exe:3092
    cscript.exe:3512
    cscript.exe:2376
    cscript.exe:1632
    cscript.exe:2484
    cscript.exe:2616
    cscript.exe:620
    cscript.exe:2612
    cscript.exe:3616
    cscript.exe:2476
    cscript.exe:2920
    cscript.exe:3800
    cscript.exe:2452
    cscript.exe:2808
    cscript.exe:252
    cscript.exe:3900
    cscript.exe:3296
    cscript.exe:2288
    cscript.exe:172
    cscript.exe:3916
    cscript.exe:2880
    cscript.exe:3368
    cscript.exe:1980
    cscript.exe:2976
    cscript.exe:2888
    cscript.exe:2404
    cscript.exe:2160
    cscript.exe:3160
    cscript.exe:500
    cscript.exe:1212
    cscript.exe:3600
    cscript.exe:2812
    cscript.exe:3872
    cscript.exe:2088
    cscript.exe:3876
    cscript.exe:2180
    cscript.exe:3520
    cscript.exe:3288
    cscript.exe:3724
    cscript.exe:1912
    cscript.exe:1916
    cscript.exe:964
    cscript.exe:2212
    cscript.exe:1992
    cscript.exe:3376
    cscript.exe:2892
    cscript.exe:3964
    cscript.exe:2356
    cscript.exe:2692
    cscript.exe:2860
    cscript.exe:4084
    cscript.exe:3636
    cscript.exe:2432
    cscript.exe:3220
    cscript.exe:2816
    cscript.exe:3064
    cscript.exe:236
    cscript.exe:3068
    cscript.exe:1968
    cscript.exe:2224
    cscript.exe:1612
    cscript.exe:2740
    cscript.exe:1692
    cscript.exe:2744
    cscript.exe:2508
    cscript.exe:1560
    cscript.exe:200
    cscript.exe:204
    cscript.exe:3620
    cscript.exe:3624
    cscript.exe:2728
    cscript.exe:1888
    cscript.exe:2132
    cscript.exe:484
    cscript.exe:3052
    cscript.exe:2120
    cscript.exe:3780
    cscript.exe:3540
    cscript.exe:1280
    cscript.exe:2232
    cscript.exe:1288
    cscript.exe:3424
    cscript.exe:2000
    cscript.exe:3192
    cscript.exe:2532
    cscript.exe:2536
    %original file name%.exe:668
    %original file name%.exe:3928
    %original file name%.exe:3648
    %original file name%.exe:2656
    %original file name%.exe:2840
    %original file name%.exe:1224
    %original file name%.exe:4020
    %original file name%.exe:3328
    %original file name%.exe:3040
    %original file name%.exe:4028
    %original file name%.exe:1696
    %original file name%.exe:1948
    %original file name%.exe:2320
    %original file name%.exe:2324
    %original file name%.exe:3252
    %original file name%.exe:3856
    %original file name%.exe:2404
    %original file name%.exe:3852
    %original file name%.exe:2400
    %original file name%.exe:3804
    %original file name%.exe:3996
    %original file name%.exe:3488
    %original file name%.exe:3768
    %original file name%.exe:3936
    %original file name%.exe:2468
    %original file name%.exe:2700
    %original file name%.exe:3332
    %original file name%.exe:3976
    %original file name%.exe:264
    %original file name%.exe:3560
    %original file name%.exe:3240
    %original file name%.exe:3244
    %original file name%.exe:2068
    %original file name%.exe:3844
    %original file name%.exe:2416
    %original file name%.exe:2060
    %original file name%.exe:2256
    %original file name%.exe:2064
    %original file name%.exe:2252
    %original file name%.exe:3812
    %original file name%.exe:2900
    %original file name%.exe:2284
    %original file name%.exe:3776
    %original file name%.exe:1324
    %original file name%.exe:1080
    %original file name%.exe:2772
    %original file name%.exe:3944
    %original file name%.exe:3828
    %original file name%.exe:1924
    %original file name%.exe:2552
    %original file name%.exe:4044
    %original file name%.exe:2308
    %original file name%.exe:3476
    %original file name%.exe:2780
    %original file name%.exe:3380
    %original file name%.exe:2300
    %original file name%.exe:3172
    %original file name%.exe:4048
    %original file name%.exe:3388
    %original file name%.exe:2984
    %original file name%.exe:2268
    %original file name%.exe:2384
    %original file name%.exe:2072
    %original file name%.exe:2264
    %original file name%.exe:532
    %original file name%.exe:2604
    %original file name%.exe:2440
    %original file name%.exe:2600
    %original file name%.exe:2608
    %original file name%.exe:304
    %original file name%.exe:3740
    %original file name%.exe:2764
    %original file name%.exe:3260
    %original file name%.exe:3264
    %original file name%.exe:2832
    %original file name%.exe:3460
    %original file name%.exe:3500
    %original file name%.exe:3444
    %original file name%.exe:1240
    %original file name%.exe:3096
    %original file name%.exe:2164
    %original file name%.exe:3820
    %original file name%.exe:3156
    %original file name%.exe:2928
    %original file name%.exe:620
    %original file name%.exe:3596
    %original file name%.exe:572
    %original file name%.exe:2296
    %original file name%.exe:2192
    %original file name%.exe:592
    %original file name%.exe:3696
    %original file name%.exe:2196
    %original file name%.exe:1904
    %original file name%.exe:3160
    %original file name%.exe:3452
    %original file name%.exe:2568
    %original file name%.exe:3456
    %original file name%.exe:4064
    %original file name%.exe:3364
    %original file name%.exe:3512
    %original file name%.exe:2904
    %original file name%.exe:2564
    %original file name%.exe:1584
    %original file name%.exe:1736
    %original file name%.exe:656
    %original file name%.exe:2688
    %original file name%.exe:2792
    %original file name%.exe:3892
    %original file name%.exe:3084
    %original file name%.exe:2112
    %original file name%.exe:2680
    %original file name%.exe:2816
    %original file name%.exe:2420
    %original file name%.exe:4036
    %original file name%.exe:2588
    %original file name%.exe:3728
    %original file name%.exe:3076
    %original file name%.exe:2956
    %original file name%.exe:3284
    %original file name%.exe:160
    %original file name%.exe:188
    %original file name%.exe:3528
    %original file name%.exe:3200
    %original file name%.exe:3376
    %original file name%.exe:3208
    %original file name%.exe:2752
    %original file name%.exe:1100
    %original file name%.exe:2128
    %original file name%.exe:2356
    %original file name%.exe:2692
    %original file name%.exe:2512
    %original file name%.exe:2104
    %original file name%.exe:2860
    %original file name%.exe:3868
    %original file name%.exe:4088
    %original file name%.exe:3864
    %original file name%.exe:3532
    %original file name%.exe:3108
    %original file name%.exe:4000
    %original file name%.exe:2348
    %original file name%.exe:3184
    %original file name%.exe:2740
    %original file name%.exe:2744
    %original file name%.exe:324
    %original file name%.exe:2508
    %original file name%.exe:1560
    %original file name%.exe:2504
    %original file name%.exe:2640
    %original file name%.exe:3620
    %original file name%.exe:3624
    %original file name%.exe:3708
    %original file name%.exe:2932
    %original file name%.exe:2972
    %original file name%.exe:2132
    %original file name%.exe:2976
    %original file name%.exe:3704
    %original file name%.exe:2332
    %original file name%.exe:1280
    %original file name%.exe:2336
    %original file name%.exe:4012
    %original file name%.exe:944
    %original file name%.exe:3548
    %original file name%.exe:2084
    %original file name%.exe:2236
    %original file name%.exe:876
    %original file name%.exe:2000
    %original file name%.exe:476
    %original file name%.exe:352
    %original file name%.exe:1572
    %original file name%.exe:2008
    %original file name%.exe:1764

  2. Delete the original Trojan file.
  3. Delete or disinfect the following files created/modified by the Trojan:

    %Documents and Settings%\%current user%\Local Settings\Temp\GqYQkgsU.bat (112 bytes)
    C:\9fb0486bcd86f30c0ca0466f44c678b6 (17 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\CIEQQYAo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\MKQEoEss.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\eeIcUoYk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\WosAskEM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\hCcowYEs.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\mwckUsQE.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\EKMswkMc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\UMgcIoAQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\iCUcskwI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\xUkcIAQo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\DQUEQMoA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\aOgwoIUY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\jwYkAwUc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\JqkAAIEg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\DOsYAkIA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\gqIcQYII.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\KgQssMYc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\zCMoAQMo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ZSYkcMoo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\vGYYwkoY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\YgMAYUAA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\POcMYMAs.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\EeocEEkg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\lgcswYoA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XGkAAkog.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\igccMAIg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\dUYkEwAM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\VcAEoYUs.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GWcYgMcI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\TsoMEggg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\eokkYwIo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\wowccgIg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\hggsckkQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\QSMUMEgg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\YQUMwoIU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GQgwwcUg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ZSQkcYUw.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\PkUEIUAo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\xMEIgEUc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\yeEEYcUc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\HesQYgkg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\CMsckswQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\WCEEIcYM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\umwEsUMU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\JgkUQsUs.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\DScgAEcE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\HIIMQMIg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\TcUwIUMM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\PekggogI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\LUQAYcME.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\zKAkMAwY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\CqskwgkI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\JwogoQUU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\zgwcMgQM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\BkwAMUAQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\cswggkkM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\bEMkAEUM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\xWcQosQc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\hIcUMIQk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GQUkMsMk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\rmEEQsks.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\iMwAkEMU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\DewogIQA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\SQsEIwMk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\WukIcUYY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ogYQAAAY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\lCQAkcYs.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\sKYcIkkw.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\YmIQMwMU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\AccEYcEk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\wCYEkQYM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\RckkgwgE.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\emcEgAIo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\RAsMAcoI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\VWwIUEAo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\gqocUgwI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\JoQYAoMo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\aSIIgcMQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XmssEoAs.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\miMYEQAQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\bUckMMkA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\AAoIkMAg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\TsMIAggs.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nSYIEIAg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ssYMQIEs.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\mQIIwQsY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\AOsEwogg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ReMcAsUU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\UQAEQgQY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\uoYksgwY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\dwEMgIsw.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\SMoQgcUY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\UokcwcIU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\OGMIwIYE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\tYcwcsYA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\zMowYEIM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\DWocgoEM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IeUMUQIM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\YgwcsoIY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\iwkYcIgE.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\oOEMgYgQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\lSYgcIos.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\amkYQUYI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\DgckwEMI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\SQcQwksk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\gUYMUgMU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\yMIwQAwk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\EqcIcogM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\HSEggUkM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\rEIUIgws.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\lcIYMEcA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\EksUYkgQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GGcwIUQI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\CmckcwYk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\TkUEwkkY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GycIAUYw.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\VkUUMUsc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\RKAoYsQs.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\jgsIAsow.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\tCwYkcYQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IUgcUwkc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\oCUAoAcI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\CKooAEkQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\UIwcYQkc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\AwkMckks.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\AYMMocEc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nAkMMYUM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\QEcIQIkM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\xqEQckkc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\SeMwUAsA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\RKsoMMYU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\PEwkgIAI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\PqYgEkUs.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\cOUMQowc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\jqMEEwcw.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\NecIsAws.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\cYosUcgQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\qwYwEcsI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\VOoccYEY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\NykggMwY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\sMEMswYA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\eQkIkcYo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\wqYwAccY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\oaUMosIg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\AEMQQoMM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\pCUQEYwM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\NSQsssMs.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ACAUEoYI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\CgQQYkgg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nWUAsYwQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\faoAMYQA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\cwsgkcso.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\QmUgQsEE.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\KGscsYUk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\hEoYoYUQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\PicgAAUU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\cKQYgEwE.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\oKMYAUEA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\lcQUsEMg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\lwsQMYAM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\iaEQUsok.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\eMsMgIsQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\zwwEMIAE.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\OYQIgoQQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\PsYUwokI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\CEggYsow.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XekooAIM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\tqIogYUc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\jyMgkkwc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\WmIIUgoE.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\KyooooMA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ECMIgsIk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\kSswMsYo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\YQcAMoks.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\xswgoAgw.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ygcEoAcg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\BWQoYIsA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\fesUIsMk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\BQgkwYQQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\eaEcUogk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\wuUgMUYI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XowkAwQo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\pyogQEog.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\EkUEIoUM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\xIUYMAUU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\KCgQkkMo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\WgoQQMUU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\KIAAwQIc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\iekUskYM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\lIAMswUU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\gWoAMgcI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\SuwIcwEs.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\rCMMoIIk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\fsogocMg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XUIEkUYE.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\AUcMYsUI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\AMgksEwI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GmYMAcAI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\jMgoQAww.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\iuEUUIgI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\kQUIkkEI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\wMEcoIkI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\voMEUYUc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ooIcUwQc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\gCYEcAkc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\hKMkAoAY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\sigIwIgM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nkMIIUkE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\mScAcEgg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\huQsQwkc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\xSgQkcQU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\AmAwMIcI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\pyMEoQcM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\xywggMYI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\TcwIAwAg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\BusEIIwA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\TowQUsUs.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nGAAIIcA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\hUgIsYgQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\AWoEcUME.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nwsoAMUQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\eKIIccgA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\zWwkoEAs.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ZEoAgkkM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\dQoUwkIk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nqckIkEk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\bEEAYwME.bat (4 bytes)
    %Documents and Settings%\All Users\JuwEIgUE\reIEcoQI.exe (3993 bytes)
    %Documents and Settings%\%current user%\dUskcAww\fGAwoYMM.exe (3969 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\OcgIwsUQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\OCMYUcAk.bat (4 bytes)
    %Documents and Settings%\All Users\hcYYccwo\NesIMIQs.exe (4041 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\BMUYAwcA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XsUAMoUA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\PesUcscs.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\rIsUQYQc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ykYQwIkM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\dyQMkkIY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\NIUQkAkQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\jkswsEkk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\KQoIkIAg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\oqAkEAUk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\WoMgckYA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\bcYEYwYQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\EyosMQUQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\qAYoIoUc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\hocUcQkU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\bMgIoEwY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ZMMQsEoU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\lyAcEkEk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\VGcEkQAg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\tgUkMwIc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\mmAEkUow.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\iOkckAQE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ZUcogUwg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\qCMskkAY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\pkUEMEgk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\saQssYYA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\yAEosUAE.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\lSEsoUoI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\LmIUokwc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\AyIwgcks.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\SaUIsQwg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\rAUAEQUU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\RwYYMUUI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\UssswEEg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\NGYoEUYo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\dOkQQwIM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\geIAUwsA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\JGMQookA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GYwoAgAg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\RuAAkEoE.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\TIYYoQcE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\lacAwQAI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\NcgAYkco.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\AkccQIMM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\tagsowos.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\dgQwkMEM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\osMYggcU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GGwsoMsA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\OKkoAAQI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\RUwEckQU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\aAYIAoQs.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IkMEwowE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nuEYEgUw.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\BAgYcIww.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\jMcckMIw.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\sYMMQMII.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\rAsYgUgE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\uuQMQgkI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\LicsAcYU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GGEwIcMI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\tAgMoQIo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\BQMUoIIc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\KuIccEgg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\MGAIEgkk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\RCUQcoMw.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XAQQQwsM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\NicQYYQs.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\wQgscsoE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IgcwkAgQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\SUgkEIsU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\iSwkIIUQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nYAUcowI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\FkIwwgwM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\beQAIQkE.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\VAYEAgYA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\oKYIQAwQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\lGYMEwow.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\cwEoksMY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GuwccwEM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\VUkcUssI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\mqMYwUMQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\wyQMUUEM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\uOcowkEA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nCYMUkUw.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XakEMAgM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\lssEwIMU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\aCsswQYs.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\oMIAgkUM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\VgUoYgUY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\qCAUUEsA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\uWAUoQoU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\aOEYIMgc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\LEIQcwcc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\qIgIYEMU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\kmkgcYoI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\cEMUIsoQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\RIkgoggc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\iaIYAMkk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\YYQUYokA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\HeIEccok.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\LUIAssIo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GSIwsgsk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\QgogUEEc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\leYYgIAA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\HCAIgkEU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\EGEAkYMU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\UEwcYAgQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\vagMQIsM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\fYEwgYUo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\RmEwsoUk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\CIUEYsQc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\WoIUAMEY.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\xascsIQo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\okwsoIUw.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\hyogMoIo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ZwkIkIYU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\NucUUAss.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\JEQEoskw.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\msgwgUMg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\jCkgkAUg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\HuYIIoUk.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\KeMwMoEU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\caMcosIE.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\OcYwUYcI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\FQggEscA.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\NywUkMIk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\LOYQwgwQ.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\HGUoggcY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\McksIIYg.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\OiAoIgII.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\fgIEsMMo.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\cowEIAoA.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\msQsskok.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\NsccsYkM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ImccAsAg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ZEkEcIIw.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\jIcsoYAc.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\HoowgYIc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\rsYQAYMU.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IAggQMMM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\rsYsUMws.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\zckUwcsU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\RQggUYEo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\oEcMcQQo.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\NSIgkUYc.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\amUYIEsY.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\uyAwEIsk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XMcgYcMI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\KkIgQEAI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\jEIIswgw.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\deQoMggQ.bat (112 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\guest.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Documents\My Music\Sample Music\New Stories (Highway Blues).wma.exe (7726 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\adm.bmp.exe (2321 bytes)
    C:\totalcmd\TCMADMIN.EXE.exe (3073 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dog.bmp.exe (2321 bytes)
    C:\totalcmd\TOTALCMD.EXE.exe (30812 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\guitar.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\lift-off.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\kick.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\butterfly.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\palm tree.bmp.exe (2321 bytes)
    C:\totalcmd\TCUNINST.EXE.exe (3073 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\duck.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\red flower.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dirt bike.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\horses.bmp.exe (2321 bytes)
    C:\totalcmd\TCMDX32.EXE.exe (3361 bytes)
    %Documents and Settings%\All Users\KAAo.txt (55978 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\pink flower.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Documents\My Music\Sample Music\Beethoven's Symphony No. 9 (Scherzo).wma.exe (7433 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\astronaut.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\cat.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\chess.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\ball.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\skater.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Blue hills.jpg.exe (3073 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\beach.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Water lilies.jpg.exe (3361 bytes)
    %Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Sunset.jpg.exe (3073 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\frog.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\fish.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\airplane.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Winter.jpg.exe (3361 bytes)
    C:\totalcmd\TcUsbRun.exe (3073 bytes)
    %Documents and Settings%\%current user%\Local Settings\Application Data\Adobe\Reader 9.3\Setup Files\Setup.exe (5441 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\snowflake.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\drip.bmp.exe (2321 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\car.bmp.exe (2321 bytes)

  4. Delete the following value(s) in the autorun key (How to Work with System Registry):

    [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
    "fGAwoYMM.exe" = "%Documents and Settings%\%current user%\dUskcAww\fGAwoYMM.exe"

    [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "NesIMIQs.exe" = "%Documents and Settings%\All Users\hcYYccwo\NesIMIQs.exe"

  5. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  6. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now