Gen.Variant.Strictor.75166_f01ddda4a5

by malwarelabrobot on March 27th, 2015 in Malware Descriptions.

Gen:Variant.Strictor.75166 (B) (Emsisoft), Gen:Variant.Strictor.75166 (AdAware), Bancos.YR, ZeroAccess.YR, BankerGeneric.YR (Lavasoft MAS)
Behaviour: Banker


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: f01ddda4a50e1cf3d9d9282f4e3470b7
SHA1: 77c77a8e69377af05c2ea9e9476fbde8e35984a0
SHA256: b1727c1a7c31d4645316d6d2bd76433b15c89e26dd1e9c3631f6fb7fae8e086e
SSDeep: 393216:m2EcizjmP0Efhhnnf67Ei/DGA7K7Dge1o1JeLLu193F:wlzw0E/f67z/6MK7DgjKLuv1
Size: 13800448 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2015-02-07 11:53:36
Analyzed on: WindowsXP SP3 32-bit


Summary:

Banker. Steals data relating to online banking systems, e-payment systems and credit card systems.

Payload

No specific payload has been found.

Process activity

The Trojan creates the following process(es):

cscript.exe:1220
cscript.exe:1996
cscript.exe:1972
cscript.exe:1584
cscript.exe:1480
cscript.exe:1572
%original file name%.exe:1704
%original file name%.exe:572
%original file name%.exe:656
%original file name%.exe:736
%original file name%.exe:1012
%original file name%.exe:408

The Trojan injects its code into the following process(es):

zuMEoUcg.exe:1484
hmwooYMM.exe:404
hEMQMIQs.exe:652

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process %original file name%.exe:1704 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\kyUUMQAM.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\huMkkcUs.bat (4 bytes)
C:\f01ddda4a50e1cf3d9d9282f4e3470b7 (94114 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\huMkkcUs.bat (0 bytes)

The process %original file name%.exe:572 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\sEUosgkk.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jkkAoYcI.bat (4 bytes)
C:\f01ddda4a50e1cf3d9d9282f4e3470b7 (94114 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\jkkAoYcI.bat (0 bytes)

The process %original file name%.exe:656 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ZaMYIsAU.bat (112 bytes)
C:\f01ddda4a50e1cf3d9d9282f4e3470b7 (94114 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\roEUwYsM.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\roEUwYsM.bat (0 bytes)

The process %original file name%.exe:736 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\eIcogQcQ.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\xYsMogcg.bat (4 bytes)
C:\f01ddda4a50e1cf3d9d9282f4e3470b7 (94114 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\xYsMogcg.bat (0 bytes)

The process %original file name%.exe:1012 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\pqcIQcEs.bat (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aIYYswEo.bat (112 bytes)
%Documents and Settings%\All Users\xWAMIgUE\zuMEoUcg.exe (7785 bytes)
%Documents and Settings%\All Users\JUsIccwo\hEMQMIQs.exe (7785 bytes)
%Documents and Settings%\%current user%\tiMscAww\hmwooYMM.exe (7737 bytes)
C:\f01ddda4a50e1cf3d9d9282f4e3470b7 (94114 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\pqcIQcEs.bat (0 bytes)

The process %original file name%.exe:408 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\f01ddda4a50e1cf3d9d9282f4e3470b7 (94114 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\wEoUcMoI.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ggkMMQwA.bat (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ggkMMQwA.bat (0 bytes)

The process hmwooYMM.exe:404 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dog.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Documents\My Music\Sample Music\New Stories (Highway Blues).wma.exe (11518 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\adm.bmp.exe (7385 bytes)
C:\totalcmd\TCMADMIN.EXE.exe (7433 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\beach.bmp.exe (7385 bytes)
C:\totalcmd\TOTALCMD.EXE.exe (35505 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\cat.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\snowflake.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\guitar.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\lift-off.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\NAAo.txt (55978 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\kick.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\butterfly.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\palm tree.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\guest.bmp.exe (7385 bytes)
C:\totalcmd\TCUNINST.EXE.exe (7385 bytes)
C:\totalcmd\TcUsbRun.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\duck.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\red flower.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dirt bike.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\horses.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\pink flower.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\astronaut.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\chess.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\ball.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\skater.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Blue hills.jpg.exe (7385 bytes)
\\XP3\PIPE\srvsvc (72 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Water lilies.jpg.exe (7433 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Sunset.jpg.exe (7433 bytes)
C:\totalcmd\TCMDX32.EXE.exe (7433 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\frog.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\fish.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\airplane.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Winter.jpg.exe (7433 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Adobe\Reader 9.3\Setup Files\Setup.exe (7971 bytes)
%Documents and Settings%\All Users\Documents\My Music\Sample Music\Beethoven's Symphony No. 9 (Scherzo).wma.exe (10177 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\drip.bmp.exe (7385 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\car.bmp.exe (7385 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\skater.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\car.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dog.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\palm tree.bmp (0 bytes)
%Documents and Settings%\All Users\Documents\My Music\Sample Music\Beethoven's Symphony No. 9 (Scherzo).wma (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\beach.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\lift-off.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\duck.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\ball.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\fish.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\cat.bmp (0 bytes)
%Documents and Settings%\All Users\Documents\My Music\Sample Music\New Stories (Highway Blues).wma (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\frog.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\red flower.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\astronaut.bmp (0 bytes)
C:\totalcmd\TCMADMIN.EXE (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\butterfly.bmp (0 bytes)
C:\totalcmd\TCUNINST.EXE (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\snowflake.bmp (0 bytes)
C:\totalcmd\TCMDX32.EXE (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\airplane.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\horses.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\chess.bmp (0 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Water lilies.jpg (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dirt bike.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\guitar.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\pink flower.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\drip.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\guest.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\adm.bmp (0 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\kick.bmp (0 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Sunset.jpg (0 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Blue hills.jpg (0 bytes)
%Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Winter.jpg (0 bytes)
C:\totalcmd\TOTALCMD.EXE (0 bytes)

Registry activity

The process cscript.exe:1220 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9B 12 F8 0D 68 6E 03 27 7E EF 3A 4F E2 AC 11 7A"

The process cscript.exe:1996 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "32 4E 98 9F B5 8A 24 BE 36 84 A0 4E 76 28 6F BD"

The process cscript.exe:1972 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CD 41 DC FD 1E FE 1F 6F 4C 56 0F DB DC 12 48 F3"

The process cscript.exe:1584 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EC C5 F1 C0 6A 41 CD 4A 1B E1 6B CF E8 3F 9C 87"

The process cscript.exe:1480 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FC EF D0 9D 3E 3B 96 CB 25 92 03 DA 4C 7B 6E 73"

The process cscript.exe:1572 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "13 C1 E5 BC 7E 94 65 8C B0 8C C5 57 C6 C7 3D 9C"

The process zuMEoUcg.exe:1484 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "66 D9 3E B6 32 F8 DE 9A B8 B3 E8 DE 4E AD 59 BF"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"hEMQMIQs.exe" = "%Documents and Settings%\All Users\JUsIccwo\hEMQMIQs.exe"

The process %original file name%.exe:1704 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8F F1 F4 C2 C8 63 EF DA E2 7A 85 AE 7C 4F DE 24"

The process %original file name%.exe:572 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FC 20 D4 BC 82 FF EB 11 36 E1 59 F3 55 EA 8E DF"

The process %original file name%.exe:656 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "35 8F 4E 3D 58 C4 E3 86 FD A6 20 0B E0 0E A1 60"

The process %original file name%.exe:736 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5C CC 39 3D 6D 88 DF 60 F2 89 C9 70 18 23 2B C5"

The process %original file name%.exe:1012 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3B 1F 50 56 07 AF 72 B5 87 FD E7 FA B2 76 4B AB"

The Trojan adds the reference to itself to be executed when a user logs on:

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"UserInit" = "%System%\userinit.exe,%Documents and Settings%\All Users\JUsIccwo\hEMQMIQs.exe,"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"hmwooYMM.exe" = "%Documents and Settings%\%current user%\tiMscAww\hmwooYMM.exe"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"hEMQMIQs.exe" = "%Documents and Settings%\All Users\JUsIccwo\hEMQMIQs.exe"

The process %original file name%.exe:408 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "93 EB BF 4D F2 37 84 9B 21 B0 AD 96 41 12 4C DA"

The process hmwooYMM.exe:404 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CC 68 B1 BE 59 89 DF D1 58 F0 F7 F1 E2 5C C5 A4"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"hmwooYMM.exe" = "%Documents and Settings%\%current user%\tiMscAww\hmwooYMM.exe"

The process hEMQMIQs.exe:652 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B0 42 39 59 DA D3 04 05 AE 02 2A 48 4C 08 5E BD"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"hEMQMIQs.exe" = "%Documents and Settings%\All Users\JUsIccwo\hEMQMIQs.exe"

Dropped PE files

MD5 File path
ee53479d91399714adb67e81a5686816 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\airplane.bmp.exe
5b55d7184f643c203aba5e5c3bd62806 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\astronaut.bmp.exe
1b5ddfdf45f5cfd311712c441fc39971 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\ball.bmp.exe
0dc06471b13156d0e8f7710adcf0d1cc c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\beach.bmp.exe
84a5c5d64862e113120c4086088c00c9 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\butterfly.bmp.exe
2eb5c92e5e0414f993b56d5ad9daa940 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\car.bmp.exe
83f0a4e71aac9310e6db63e56d7ed22f c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\cat.bmp.exe
48bf5a1e20ddb2a8032a159cdc307c89 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\chess.bmp.exe
5c78d10a08785a35801b9b5d4114d568 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dirt bike.bmp.exe
690e4e70db6aeadf8849cb0b87d62449 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dog.bmp.exe
c954f19c66076400b78926d9030ce668 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\drip.bmp.exe
a2c6cc89f25a8025ef23c4df5fa85ac1 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\duck.bmp.exe
ee4b7311a5904d4005ddaf5026a82092 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\fish.bmp.exe
0c51110a32357ed3ce16c804f698ef6d c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\frog.bmp.exe
511d3f2d7b2814ccb61d862e8f892f4e c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\guitar.bmp.exe
2f58e08b1c4d3f2bbc1b795523261d1e c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\horses.bmp.exe
c72cbc7aaf87b300ac90ef92c6bf85c8 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\kick.bmp.exe
051baa3bc97f43f06e0abbf729dfa94d c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\lift-off.bmp.exe
dc1673cc09955a2def9323054f82b21f c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\palm tree.bmp.exe
44583bccdaaf51941ffb11f18055af3d c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\pink flower.bmp.exe
c77a2a30bda2e6461c49d1cdeff55e33 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\red flower.bmp.exe
317706fd624551becaed109f58afb821 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\skater.bmp.exe
44feffe282e8803b2fe1961b0b4680e0 c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\snowflake.bmp.exe
8e2fad6a66e752c5a6d8453a2c18b0bf c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\adm.bmp.exe
a7ed9f9fa11b15e89a7f713214f31bfa c:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\guest.bmp.exe
d2e3f044a9f7d8521a0128f874f3b3e4 c:\Documents and Settings\All Users\Documents\My Music\Sample Music\Beethoven's Symphony No. 9 (Scherzo).wma.exe
3992d2bc13e25f7c1e8df58ddbe2bca7 c:\Documents and Settings\All Users\Documents\My Music\Sample Music\New Stories (Highway Blues).wma.exe
4f3a4f4210486d4325493c7d17b91fa5 c:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Blue hills.jpg.exe
e2fa46d3608c6ec62e0f8cbd4c6995d9 c:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Sunset.jpg.exe
6a7cce591d8001d870b5ed202f19368f c:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Water lilies.jpg.exe
8b1316ddce62470fd0614125664c2ef0 c:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Winter.jpg.exe
bbf7742c4fd7f613b0b98c2328712f39 c:\Documents and Settings\All Users\JUsIccwo\hEMQMIQs.exe
ec51a0e7af0338bb35bda642129988c3 c:\Documents and Settings\All Users\xWAMIgUE\zuMEoUcg.exe
a5dba446c1172a24a0e694a3e250f18d c:\Documents and Settings\"%CurrentUserName%"\tiMscAww\hmwooYMM.exe

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

VersionInfo

No information is available.

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 4096 13795328 13793280 5.50903 a6c33e9d004ef6855588c01a6bbcaee2
.rdata 13799424 4096 512 2.21967 b38cca560214f22bc211dc7d3e49ea8f
.data 13803520 4 512 0.056519 93b17647208ccc1469f2937acf39a7bb
.rsrc 13807616 4444 4608 3.1495 eea87e84a7d2a885cb58d72912e5292e

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

URL IP
hxxp://google.com/ 216.58.209.206


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

Traffic

GET / HTTP/1.1
Host: google.com


HTTP/1.1 302 Found
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Location: hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=5j0TVde7OY-u8wfQ-oCwAg
Content-Length: 262
Date: Wed, 25 Mar 2015 22:59:50 GMT
Server: GFE/2.0
Alternate-Protocol: 80:quic,p=0.5
<HTML><HEAD><meta http-equiv="content-type" content="te
xt/html;charset=utf-8">.<TITLE>302 Moved</TITLE></HE
AD><BODY>.<H1>302 Moved</H1>.The document has mov
ed.<A HREF="hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=5j0TVde7OY-u
8wfQ-oCwAg">here</A>...</BODY></HTML>..HTTP/1.1 3
02 Found..Cache-Control: private..Content-Type: text/html; charset=UTF
-8..Location: hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=5j0TVde7OY-u8wfQ-
oCwAg..Content-Length: 262..Date: Wed, 25 Mar 2015 22:59:50 GMT..Serve
r: GFE/2.0..Alternate-Protocol: 80:quic,p=0.5..<HTML><HEAD>
;<meta http-equiv="content-type" content="text/html;charset=utf-8"&
gt;.<TITLE>302 Moved</TITLE></HEAD><BODY>.<
H1>302 Moved</H1>.The document has moved.<A HREF="hXXp://w
ww.google.com.ua/?gfe_rd=cr&ei=5j0TVde7OY-u8wfQ-oCwAg">here<
/A>...</BODY></HTML>....


GET / HTTP/1.1
Host: google.com


HTTP/1.1 302 Found
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Location: hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=5D0TVb3RJ4Gu8wfzz4DgDg
Content-Length: 262
Date: Wed, 25 Mar 2015 22:59:48 GMT
Server: GFE/2.0
Alternate-Protocol: 80:quic,p=0.5
<HTML><HEAD><meta http-equiv="content-type" content="te
xt/html;charset=utf-8">.<TITLE>302 Moved</TITLE></HE
AD><BODY>.<H1>302 Moved</H1>.The document has mov
ed.<A HREF="hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=5D0TVb3RJ4Gu
8wfzz4DgDg">here</A>...</BODY></HTML>..HTTP/1.1 3
02 Found..Cache-Control: private..Content-Type: text/html; charset=UTF
-8..Location: hXXp://VVV.google.com.ua/?gfe_rd=cr&ei=5D0TVb3RJ4Gu8wfzz
4DgDg..Content-Length: 262..Date: Wed, 25 Mar 2015 22:59:48 GMT..Serve
r: GFE/2.0..Alternate-Protocol: 80:quic,p=0.5..<HTML><HEAD>
;<meta http-equiv="content-type" content="text/html;charset=utf-8"&
gt;.<TITLE>302 Moved</TITLE></HEAD><BODY>.<
H1>302 Moved</H1>.The document has moved.<A HREF="hXXp://w
ww.google.com.ua/?gfe_rd=cr&ei=5D0TVb3RJ4Gu8wfzz4DgDg">here<
/A>...</BODY></HTML>....


The Trojan connects to the servers at the folowing location(s):

hmwooYMM.exe_404:

.text
.rdata
@.data
J%%Xy
F\V(C^V FTP
C%xSh
%SFtA
6qftP}$KQ}3o^.
A4%SP
.UR$C
Dt%dH
%xom'
<16U@xq`)K
[email protected]?Q@
dz~.dC
=DSSh
D.VWj'[
.>.oB<c
I).Ne%
`ÛX
`)~>.xW
%D|Fc
)e{`%f
,%SRo
l .Cx
.EWLj
X.YSpI&
zMSg
\Idz~.dC
p%XVW
E`\8(]R%x
X-5}XK
E5.GA
;-Jq}m
Q.iomFr
.FGUowgv
X%D?|
$.hws!
;LB=%F!NE
T.gUG
ò]@.
9a.FO
8LY`E3]dI?QqR"NuV.By`
B&?&%S
.iCrnU
%SVD{O<c
43$.jN]
=O6l%S-@
W%Dh_
!]F%Ck
.nF!XH@
}l.QLz
FH.uHr:
de}.oJ
k;;L .Xy
U?9%2X
b)7%c~
%UPUrK
<(.pF78N
.yrQy
.Yv~j4
Windows Internet Explorer
Windows Task Manager
taskmgr.execmd.exetaskkill /F /IM taskmgr.exe /T
zuMEoUcg.exe
9d9282f4e3470b7.exe
ip_%uaH
C <.kYzD
-.be_
.~.lok
.V.lok
n.lok
Microsoft Windows
yJ/$yJ/AW.gX
=_Ý
=_Xn.Sm
=_-Y}P 
advapi32.dll
ntdll.dll
user32.dll
kernel32.dll
Microsoft Windows eine Wiederherstellung in einem Moment beginnen.
.klicken, um zu kopieren
Strafe zahlen. Jeder Versuch, diese Nachricht zu entfernen werden die Dateien, Hardware und Windows-Installation unwiederbringlich besch
ffnen Sie den Internet-Browser. An die Adresse gehen: blockchain.info/wallet und klicken Sie auf 'Erstellen Sie ein neues Wallet'.,
Geben Sie Ihre E-Mail-Adresse (optional) und Ihr Passwort ein. Achten Sie darauf, Ihr Passwort sicher ist.-
Sparen Sie Ihr Passwort sicher, vorzugsweise offline (klicken Notepad)..
Folgen Sie den Anweisungen auf der Website aufgefordert werden, und achten Sie genau auf die Sicherheitsempfehlungen.1
.Machen BitCoin Zahlung:2
|Anmeldung zu Ihrem Bitcoin Wallet blockchain.info/wallet/login5
DKlicken Sie auf "Import / Export".6
- und Kleinschreibung) indem Sie es und klicken Sie auf 'Add Private Key'.7
8Klicken Sie auf "Sweep Key".9
.Internationale Anbieter=
WebbrowserD
&de.bitcoin.it/wiki/G
Kennen Sie die Gefahren der Verletzung des Urheberrechts. Besuchen copyright.gov/help/faq/faq-infringement.html f
~Microsoft Windows will begin a restoration process in a moment.
Operation Global 3 is a coordinated effort by U.S., Canadian and European law enforcement agencies targeting computers with pirated content.$
Open Internet Browser. Go to the address: blockchain.info/wallet and click 'Start A New Wallet'.,
Enter your e-mail address(optional) and password. Make sure your password is secure.-
zSave your password safely, preferably offline(click Notepad)..
Follow the steps prompted on the website and pay close attention to the security recommendations.1
tLogin to your Bitcoin wallet blockchain.info/wallet/login 5
4Click on Import / Export. 6
Enter the paper wallet's private key by typing it manually (case sensitive) and click on 'Add Private Key'.7
$Click 'Sweep Key'.9
.International Exchanges=
&en.bitcoin.it/wiki/G
Know the dangers of copyright infringement. Visit copyright.gov/help/faq/faq-infringement.html for more information.J
un reato federale che porta pene fino a cinque anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (17 USC s.506, 18 USC s.2319)
un crimine federale che comporta pene fino a quindici anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (18 USC s.2339A)
Microsoft Windows inizier
Importo:
Qualsiasi tentativo di rimuovere questo messaggio potrebbe danneggiare il vostro file, hardware e di installazione di Windows oltre il recupero."
Operazione globale III dagli Stati Uniti, Canada, Europa, Australia, Nuova Zelanda e altre forze dell'ordine di tutto il mondo
\Registrazione di un nuovo portafoglio BitCoin: 
Aprire Internet Browser. Vai all'indirizzo: blockchain.info/wallet e cliccare su 'Crea un nuovo Portafoglio'.,
Inserisci il tuo indirizzo e-mail (opzionale) e la password. Assicurati che il tuo password
Salvare la password in modo sicuro, preferibilmente non in linea (fare clic su Notepad)..
Seguire i passaggi spinto sul sito e prestare la massima attenzione alle raccomandazioni di sicurezza.1
|Accedi al tuo portafoglio Bitcoin blockchain.info/wallet/login5
<Clicca su 'Importa / Esporta'.6
Inserire la chiave privata 'Paper Wallet' digitando manualmente (maiuscole e minuscole) e fare clic su 'Add Private Key'.7
2Fare clic su 'Sweep Key'.9
&it.bitcoin.it/wiki/G
Conoscere i pericoli di violazione del copyright. Visita copyright.gov/help/faq/faq-infringement.html per maggiori informazioni.J
Microsoft Windows se iniciar
Fine Importe:
n de Windows sin posibilidad de recuperaci
Operaci
n: blockchain.info/wallet y haga clic en 'Crear un nuevo monedero'.,
gina web y prestar mucha atenci
pAcceda a su cartera blockchain.info/wallet/login Bitcoin5
FHaga clic en "Importar / Exportar".6
sculas) y haga clic en" Add Private Key ".7
2Haga clic en 'Sweep Key'.9
Navegador WebD
&es.bitcoin.it/wiki/G
n de copyright. Visita copyright.gov/help/faq/faq-infringement.html para m

hmwooYMM.exe_404_rwx_00401000_000EA000:

J%%Xy
F\V(C^V FTP
C%xSh
%SFtA
6qftP}$KQ}3o^.
A4%SP
.UR$C
Dt%dH
%xom'
<16U@xq`)K
[email protected]?Q@
dz~.dC
=DSSh
D.VWj'[
.>.oB<c
I).Ne%
`ÛX
`)~>.xW
%D|Fc
)e{`%f
,%SRo
l .Cx
.EWLj
X.YSpI&
zMSg
\Idz~.dC
p%XVW
E`\8(]R%x
X-5}XK
E5.GA
;-Jq}m
Q.iomFr
.FGUowgv
X%D?|
$.hws!
;LB=%F!NE
T.gUG
ò]@.
9a.FO
8LY`E3]dI?QqR"NuV.By`
B&?&%S
.iCrnU
%SVD{O<c
43$.jN]
=O6l%S-@
W%Dh_
!]F%Ck
.nF!XH@
}l.QLz
FH.uHr:
de}.oJ
k;;L .Xy
U?9%2X
b)7%c~
%UPUrK
<(.pF78N
.yrQy
.Yv~j4
Windows Internet Explorer
Windows Task Manager
taskmgr.execmd.exetaskkill /F /IM taskmgr.exe /T
zuMEoUcg.exe
9d9282f4e3470b7.exe
ip_%uaH
C <.kYzD
-.be_
.~.lok
.V.lok
n.lok
Microsoft Windows
yJ/$yJ/AW.gX
=_Ý
=_Xn.Sm
=_-Y}P 
Microsoft Windows eine Wiederherstellung in einem Moment beginnen.
.klicken, um zu kopieren
Strafe zahlen. Jeder Versuch, diese Nachricht zu entfernen werden die Dateien, Hardware und Windows-Installation unwiederbringlich besch
ffnen Sie den Internet-Browser. An die Adresse gehen: blockchain.info/wallet und klicken Sie auf 'Erstellen Sie ein neues Wallet'.,
Geben Sie Ihre E-Mail-Adresse (optional) und Ihr Passwort ein. Achten Sie darauf, Ihr Passwort sicher ist.-
Sparen Sie Ihr Passwort sicher, vorzugsweise offline (klicken Notepad)..
Folgen Sie den Anweisungen auf der Website aufgefordert werden, und achten Sie genau auf die Sicherheitsempfehlungen.1
.Machen BitCoin Zahlung:2
|Anmeldung zu Ihrem Bitcoin Wallet blockchain.info/wallet/login5
DKlicken Sie auf "Import / Export".6
- und Kleinschreibung) indem Sie es und klicken Sie auf 'Add Private Key'.7
8Klicken Sie auf "Sweep Key".9
.Internationale Anbieter=
WebbrowserD
&de.bitcoin.it/wiki/G
Kennen Sie die Gefahren der Verletzung des Urheberrechts. Besuchen copyright.gov/help/faq/faq-infringement.html f
~Microsoft Windows will begin a restoration process in a moment.
Operation Global 3 is a coordinated effort by U.S., Canadian and European law enforcement agencies targeting computers with pirated content.$
Open Internet Browser. Go to the address: blockchain.info/wallet and click 'Start A New Wallet'.,
Enter your e-mail address(optional) and password. Make sure your password is secure.-
zSave your password safely, preferably offline(click Notepad)..
Follow the steps prompted on the website and pay close attention to the security recommendations.1
tLogin to your Bitcoin wallet blockchain.info/wallet/login 5
4Click on Import / Export. 6
Enter the paper wallet's private key by typing it manually (case sensitive) and click on 'Add Private Key'.7
$Click 'Sweep Key'.9
.International Exchanges=
&en.bitcoin.it/wiki/G
Know the dangers of copyright infringement. Visit copyright.gov/help/faq/faq-infringement.html for more information.J
un reato federale che porta pene fino a cinque anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (17 USC s.506, 18 USC s.2319)
un crimine federale che comporta pene fino a quindici anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (18 USC s.2339A)
Microsoft Windows inizier
Importo:
Qualsiasi tentativo di rimuovere questo messaggio potrebbe danneggiare il vostro file, hardware e di installazione di Windows oltre il recupero."
Operazione globale III dagli Stati Uniti, Canada, Europa, Australia, Nuova Zelanda e altre forze dell'ordine di tutto il mondo
\Registrazione di un nuovo portafoglio BitCoin: 
Aprire Internet Browser. Vai all'indirizzo: blockchain.info/wallet e cliccare su 'Crea un nuovo Portafoglio'.,
Inserisci il tuo indirizzo e-mail (opzionale) e la password. Assicurati che il tuo password
Salvare la password in modo sicuro, preferibilmente non in linea (fare clic su Notepad)..
Seguire i passaggi spinto sul sito e prestare la massima attenzione alle raccomandazioni di sicurezza.1
|Accedi al tuo portafoglio Bitcoin blockchain.info/wallet/login5
<Clicca su 'Importa / Esporta'.6
Inserire la chiave privata 'Paper Wallet' digitando manualmente (maiuscole e minuscole) e fare clic su 'Add Private Key'.7
2Fare clic su 'Sweep Key'.9
&it.bitcoin.it/wiki/G
Conoscere i pericoli di violazione del copyright. Visita copyright.gov/help/faq/faq-infringement.html per maggiori informazioni.J
Microsoft Windows se iniciar
Fine Importe:
n de Windows sin posibilidad de recuperaci
Operaci
n: blockchain.info/wallet y haga clic en 'Crear un nuevo monedero'.,
gina web y prestar mucha atenci
pAcceda a su cartera blockchain.info/wallet/login Bitcoin5
FHaga clic en "Importar / Exportar".6
sculas) y haga clic en" Add Private Key ".7
2Haga clic en 'Sweep Key'.9
Navegador WebD
&es.bitcoin.it/wiki/G
n de copyright. Visita copyright.gov/help/faq/faq-infringement.html para m

hmwooYMM.exe_404_rwx_009A0000_00001000:

C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp

hEMQMIQs.exe_652:

.text
.rdata
@.data
7.qU6
TNcMdI
vND.LOrg<
.eH^\
w|.LV
QfC%d
dW0WaZ@%di
O%%Sg
[%dZr
l}9fT{
E!.Lg:
\D.vY
m.TpM
.WYky?
?%sn6
.wbK3
Am%foEW
%d[k#
k[w[.dx
Ho%sd^
.pgVM
.XU\:
.TU:67Y[
mre%s
Rx.AF{-F
.dA}R
9zE46}GF{-A}d8
Rx.AMb
Rx.AJ
Vy-A}y1
]~]{:&]{>
Mr.0M8.wM
F@%uF
[email protected]
r|M-
9Q2.QD
s]{>EkAC.AZ?
]mYS_;-h}_/
%s>Ab
GcMd
7FZZZZ%
&aTF{-A}d8
Rx.AZu`\Vb)
Rx.AN~2
Rx.AF z
x.ASs)
Rx.AF{-6s z
]sc.Pu<
).KQ>6V
yT%FZ
d?%x1
u2S.cp
~%m"%U
R.BFX7
.Cd"w
/1:,*-.1
#k%U,
:EW.yY
%cMV=
hC%x}7
.Gl^z
>fAd:%U
.cW a
]{.iA8
8=d0,.eJ
KV.eb
.CYf?a8
=Btcp
x.sd6
9%1u_
Microsoft Windows
%uNaO
.YtUO
*6*7*4*5*:*
*;*8*9*4*>*
*?*<*=*"*#* *!*&*'*#*"*$*%*%*** *(*)*.*/*,*-*P*R*S*
ntdll.dll
oleaut32.dll
user32.dll
kernel32.dll
Microsoft Windows eine Wiederherstellung in einem Moment beginnen.
.klicken, um zu kopieren
Strafe zahlen. Jeder Versuch, diese Nachricht zu entfernen werden die Dateien, Hardware und Windows-Installation unwiederbringlich besch
ffnen Sie den Internet-Browser. An die Adresse gehen: blockchain.info/wallet und klicken Sie auf 'Erstellen Sie ein neues Wallet'.,
Geben Sie Ihre E-Mail-Adresse (optional) und Ihr Passwort ein. Achten Sie darauf, Ihr Passwort sicher ist.-
Sparen Sie Ihr Passwort sicher, vorzugsweise offline (klicken Notepad)..
Folgen Sie den Anweisungen auf der Website aufgefordert werden, und achten Sie genau auf die Sicherheitsempfehlungen.1
.Machen BitCoin Zahlung:2
|Anmeldung zu Ihrem Bitcoin Wallet blockchain.info/wallet/login5
DKlicken Sie auf "Import / Export".6
- und Kleinschreibung) indem Sie es und klicken Sie auf 'Add Private Key'.7
8Klicken Sie auf "Sweep Key".9
.Internationale Anbieter=
WebbrowserD
&de.bitcoin.it/wiki/G
Kennen Sie die Gefahren der Verletzung des Urheberrechts. Besuchen copyright.gov/help/faq/faq-infringement.html f
~Microsoft Windows will begin a restoration process in a moment.
Operation Global 3 is a coordinated effort by U.S., Canadian and European law enforcement agencies targeting computers with pirated content.$
Open Internet Browser. Go to the address: blockchain.info/wallet and click 'Start A New Wallet'.,
Enter your e-mail address(optional) and password. Make sure your password is secure.-
zSave your password safely, preferably offline(click Notepad)..
Follow the steps prompted on the website and pay close attention to the security recommendations.1
tLogin to your Bitcoin wallet blockchain.info/wallet/login 5
4Click on Import / Export. 6
Enter the paper wallet's private key by typing it manually (case sensitive) and click on 'Add Private Key'.7
$Click 'Sweep Key'.9
.International Exchanges=
&en.bitcoin.it/wiki/G
Know the dangers of copyright infringement. Visit copyright.gov/help/faq/faq-infringement.html for more information.J
un reato federale che porta pene fino a cinque anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (17 USC s.506, 18 USC s.2319)
un crimine federale che comporta pene fino a quindici anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (18 USC s.2339A)
Microsoft Windows inizier
Importo:
Qualsiasi tentativo di rimuovere questo messaggio potrebbe danneggiare il vostro file, hardware e di installazione di Windows oltre il recupero."
Operazione globale III dagli Stati Uniti, Canada, Europa, Australia, Nuova Zelanda e altre forze dell'ordine di tutto il mondo
\Registrazione di un nuovo portafoglio BitCoin: 
Aprire Internet Browser. Vai all'indirizzo: blockchain.info/wallet e cliccare su 'Crea un nuovo Portafoglio'.,
Inserisci il tuo indirizzo e-mail (opzionale) e la password. Assicurati che il tuo password
Salvare la password in modo sicuro, preferibilmente non in linea (fare clic su Notepad)..
Seguire i passaggi spinto sul sito e prestare la massima attenzione alle raccomandazioni di sicurezza.1
|Accedi al tuo portafoglio Bitcoin blockchain.info/wallet/login5
<Clicca su 'Importa / Esporta'.6
Inserire la chiave privata 'Paper Wallet' digitando manualmente (maiuscole e minuscole) e fare clic su 'Add Private Key'.7
2Fare clic su 'Sweep Key'.9
&it.bitcoin.it/wiki/G
Conoscere i pericoli di violazione del copyright. Visita copyright.gov/help/faq/faq-infringement.html per maggiori informazioni.J
Microsoft Windows se iniciar
Fine Importe:
n de Windows sin posibilidad de recuperaci
Operaci
n: blockchain.info/wallet y haga clic en 'Crear un nuevo monedero'.,
gina web y prestar mucha atenci
pAcceda a su cartera blockchain.info/wallet/login Bitcoin5
FHaga clic en "Importar / Exportar".6
sculas) y haga clic en" Add Private Key ".7
2Haga clic en 'Sweep Key'.9
Navegador WebD
&es.bitcoin.it/wiki/G
n de copyright. Visita copyright.gov/help/faq/faq-infringement.html para m

zuMEoUcg.exe_1484:

.text
.rdata
@.data
C{?%f{[
7.qU6
TNcMdI
vND.LOrg<
.eH^\
w|.LV
QfC%d
dW0WaZ@%di
O%%Sg
[%dZr
l}9fT{
E!.Lg:
\D.vY
m.TpM
.WYky?
?%sn6
.wbK3
Am%foEW
%d[k#
k[w[.dx
Ho%sd^
.pgVM
.XU\:
.TU:67Y[
mre%s
Rx.AF{-F
.dA}R
9zE46}GF{-A}d8
Rx.AMb
Rx.AJ
Vy-A}y1
]~]{:&]{>
Mr.0M8.wM
F@%uF
[email protected]
r|M-
9Q2.QD
s]{>EkAC.AZ?
]mYS_;-h}_/
%s>Ab
GcMd
7FZZZZ%
&aTF{-A}d8
Rx.AZu`\Vb)
Rx.AN~2
Rx.AF z
x.ASs)
Rx.AF{-6s z
]sc.Pu<
).KQ>6V
yT%FZ
d?%x1
u2S.cp
~%m"%U
R.BFX7
.Cd"w
/1:,*-.1
#k%U,
:EW.yY
%cMV=
hC%x}7
.Gl^z
>fAd:%U
.cW a
]{.iA8
8=d0,.eJ
KV.eb
.CYf?a8
=Btcp
crTbSu#
x.sd6
4%UMv
4%UEInb
2software\microsoft\windows\currentversion\run
%uNaO
.YtUO
ntdll.dll
kernel32.dll
user32.dll
Microsoft Windows eine Wiederherstellung in einem Moment beginnen.
.klicken, um zu kopieren
Strafe zahlen. Jeder Versuch, diese Nachricht zu entfernen werden die Dateien, Hardware und Windows-Installation unwiederbringlich besch
ffnen Sie den Internet-Browser. An die Adresse gehen: blockchain.info/wallet und klicken Sie auf 'Erstellen Sie ein neues Wallet'.,
Geben Sie Ihre E-Mail-Adresse (optional) und Ihr Passwort ein. Achten Sie darauf, Ihr Passwort sicher ist.-
Sparen Sie Ihr Passwort sicher, vorzugsweise offline (klicken Notepad)..
Folgen Sie den Anweisungen auf der Website aufgefordert werden, und achten Sie genau auf die Sicherheitsempfehlungen.1
.Machen BitCoin Zahlung:2
|Anmeldung zu Ihrem Bitcoin Wallet blockchain.info/wallet/login5
DKlicken Sie auf "Import / Export".6
- und Kleinschreibung) indem Sie es und klicken Sie auf 'Add Private Key'.7
8Klicken Sie auf "Sweep Key".9
.Internationale Anbieter=
WebbrowserD
&de.bitcoin.it/wiki/G
Kennen Sie die Gefahren der Verletzung des Urheberrechts. Besuchen copyright.gov/help/faq/faq-infringement.html f
~Microsoft Windows will begin a restoration process in a moment.
Operation Global 3 is a coordinated effort by U.S., Canadian and European law enforcement agencies targeting computers with pirated content.$
Open Internet Browser. Go to the address: blockchain.info/wallet and click 'Start A New Wallet'.,
Enter your e-mail address(optional) and password. Make sure your password is secure.-
zSave your password safely, preferably offline(click Notepad)..
Follow the steps prompted on the website and pay close attention to the security recommendations.1
tLogin to your Bitcoin wallet blockchain.info/wallet/login 5
4Click on Import / Export. 6
Enter the paper wallet's private key by typing it manually (case sensitive) and click on 'Add Private Key'.7
$Click 'Sweep Key'.9
.International Exchanges=
&en.bitcoin.it/wiki/G
Know the dangers of copyright infringement. Visit copyright.gov/help/faq/faq-infringement.html for more information.J
un reato federale che porta pene fino a cinque anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (17 USC s.506, 18 USC s.2319)
un crimine federale che comporta pene fino a quindici anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (18 USC s.2339A)
Microsoft Windows inizier
Importo:
Qualsiasi tentativo di rimuovere questo messaggio potrebbe danneggiare il vostro file, hardware e di installazione di Windows oltre il recupero."
Operazione globale III dagli Stati Uniti, Canada, Europa, Australia, Nuova Zelanda e altre forze dell'ordine di tutto il mondo
\Registrazione di un nuovo portafoglio BitCoin: 
Aprire Internet Browser. Vai all'indirizzo: blockchain.info/wallet e cliccare su 'Crea un nuovo Portafoglio'.,
Inserisci il tuo indirizzo e-mail (opzionale) e la password. Assicurati che il tuo password
Salvare la password in modo sicuro, preferibilmente non in linea (fare clic su Notepad)..
Seguire i passaggi spinto sul sito e prestare la massima attenzione alle raccomandazioni di sicurezza.1
|Accedi al tuo portafoglio Bitcoin blockchain.info/wallet/login5
<Clicca su 'Importa / Esporta'.6
Inserire la chiave privata 'Paper Wallet' digitando manualmente (maiuscole e minuscole) e fare clic su 'Add Private Key'.7
2Fare clic su 'Sweep Key'.9
&it.bitcoin.it/wiki/G
Conoscere i pericoli di violazione del copyright. Visita copyright.gov/help/faq/faq-infringement.html per maggiori informazioni.J
Microsoft Windows se iniciar
Fine Importe:
n de Windows sin posibilidad de recuperaci
Operaci
n: blockchain.info/wallet y haga clic en 'Crear un nuevo monedero'.,
gina web y prestar mucha atenci
pAcceda a su cartera blockchain.info/wallet/login Bitcoin5
FHaga clic en "Importar / Exportar".6
sculas) y haga clic en" Add Private Key ".7
2Haga clic en 'Sweep Key'.9
Navegador WebD
&es.bitcoin.it/wiki/G
n de copyright. Visita copyright.gov/help/faq/faq-infringement.html para m

hmwooYMM.exe_404_rwx_00A00000_00001000:

%Documents and Settings%\%current user%\tiMscAww\hmwooYMM

hmwooYMM.exe_404_rwx_00A10000_00001000:

%Documents and Settings%\All Users\JUsIccwo\hEMQMIQs

hmwooYMM.exe_404_rwx_00A30000_000E9000:

C{?%f{[
7.qU6
TNcMdI
vND.LOrg<
.eH^\
w|.LV
QfC%d
dW0WaZ@%di
O%%Sg
[%dZr
l}9fT{
E!.Lg:
\D.vY
m.TpM
.WYky?
?%sn6
.wbK3
Am%foEW
%d[k#
k[w[.dx
Ho%sd^
.pgVM
.XU\:
.TU:67Y[
mre%s
Rx.AF{-F
.dA}R
9zE46}GF{-A}d8
Rx.AMb
Rx.AJ
Vy-A}y1
]~]{:&]{>
Mr.0M8.wM
F@%uF
[email protected]
r|M-
9Q2.QD
s]{>EkAC.AZ?
]mYS_;-h}_/
%s>Ab
GcMd
7FZZZZ%
&aTF{-A}d8
Rx.AZu`\Vb)
Rx.AN~2
Rx.AF z
x.ASs)
Rx.AF{-6s z
]sc.Pu<
).KQ>6V
yT%FZ
d?%x1
u2S.cp
~%m"%U
R.BFX7
.Cd"w
/1:,*-.1
#k%U,
:EW.yY
%cMV=
hC%x}7
.Gl^z
>fAd:%U
.cW a
]{.iA8
8=d0,.eJ
KV.eb
.CYf?a8
=Btcp
x.sd6
4%UMv
4%UEInb
%uNaO
.YtUO
Microsoft Windows eine Wiederherstellung in einem Moment beginnen.
.klicken, um zu kopieren
Strafe zahlen. Jeder Versuch, diese Nachricht zu entfernen werden die Dateien, Hardware und Windows-Installation unwiederbringlich besch
ffnen Sie den Internet-Browser. An die Adresse gehen: blockchain.info/wallet und klicken Sie auf 'Erstellen Sie ein neues Wallet'.,
Geben Sie Ihre E-Mail-Adresse (optional) und Ihr Passwort ein. Achten Sie darauf, Ihr Passwort sicher ist.-
Sparen Sie Ihr Passwort sicher, vorzugsweise offline (klicken Notepad)..
Folgen Sie den Anweisungen auf der Website aufgefordert werden, und achten Sie genau auf die Sicherheitsempfehlungen.1
.Machen BitCoin Zahlung:2
|Anmeldung zu Ihrem Bitcoin Wallet blockchain.info/wallet/login5
DKlicken Sie auf "Import / Export".6
- und Kleinschreibung) indem Sie es und klicken Sie auf 'Add Private Key'.7
8Klicken Sie auf "Sweep Key".9
.Internationale Anbieter=
WebbrowserD
&de.bitcoin.it/wiki/G
Kennen Sie die Gefahren der Verletzung des Urheberrechts. Besuchen copyright.gov/help/faq/faq-infringement.html f
~Microsoft Windows will begin a restoration process in a moment.
Operation Global 3 is a coordinated effort by U.S., Canadian and European law enforcement agencies targeting computers with pirated content.$
Open Internet Browser. Go to the address: blockchain.info/wallet and click 'Start A New Wallet'.,
Enter your e-mail address(optional) and password. Make sure your password is secure.-
zSave your password safely, preferably offline(click Notepad)..
Follow the steps prompted on the website and pay close attention to the security recommendations.1
tLogin to your Bitcoin wallet blockchain.info/wallet/login 5
4Click on Import / Export. 6
Enter the paper wallet's private key by typing it manually (case sensitive) and click on 'Add Private Key'.7
$Click 'Sweep Key'.9
.International Exchanges=
&en.bitcoin.it/wiki/G
Know the dangers of copyright infringement. Visit copyright.gov/help/faq/faq-infringement.html for more information.J
un reato federale che porta pene fino a cinque anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (17 USC s.506, 18 USC s.2319)
un crimine federale che comporta pene fino a quindici anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (18 USC s.2339A)
Microsoft Windows inizier
Importo:
Qualsiasi tentativo di rimuovere questo messaggio potrebbe danneggiare il vostro file, hardware e di installazione di Windows oltre il recupero."
Operazione globale III dagli Stati Uniti, Canada, Europa, Australia, Nuova Zelanda e altre forze dell'ordine di tutto il mondo
\Registrazione di un nuovo portafoglio BitCoin: 
Aprire Internet Browser. Vai all'indirizzo: blockchain.info/wallet e cliccare su 'Crea un nuovo Portafoglio'.,
Inserisci il tuo indirizzo e-mail (opzionale) e la password. Assicurati che il tuo password
Salvare la password in modo sicuro, preferibilmente non in linea (fare clic su Notepad)..
Seguire i passaggi spinto sul sito e prestare la massima attenzione alle raccomandazioni di sicurezza.1
|Accedi al tuo portafoglio Bitcoin blockchain.info/wallet/login5
<Clicca su 'Importa / Esporta'.6
Inserire la chiave privata 'Paper Wallet' digitando manualmente (maiuscole e minuscole) e fare clic su 'Add Private Key'.7
2Fare clic su 'Sweep Key'.9
&it.bitcoin.it/wiki/G
Conoscere i pericoli di violazione del copyright. Visita copyright.gov/help/faq/faq-infringement.html per maggiori informazioni.J
Microsoft Windows se iniciar
Fine Importe:
n de Windows sin posibilidad de recuperaci
Operaci
n: blockchain.info/wallet y haga clic en 'Crear un nuevo monedero'.,
gina web y prestar mucha atenci
pAcceda a su cartera blockchain.info/wallet/login Bitcoin5
FHaga clic en "Importar / Exportar".6
sculas) y haga clic en" Add Private Key ".7
2Haga clic en 'Sweep Key'.9
Navegador WebD
&es.bitcoin.it/wiki/G
n de copyright. Visita copyright.gov/help/faq/faq-infringement.html para m

hmwooYMM.exe_404_rwx_00E20000_00001000:

%Documents and Settings%\%current user%\tiMscAww\hmwooYMM.inf

hmwooYMM.exe_404_rwx_00E30000_00001000:

%Documents and Settings%\All Users\JUsIccwo\hEMQMIQs.inf

hmwooYMM.exe_404_rwx_00E40000_00001000:

%Documents and Settings%\%current user%\tiMscAww\hmwooYMM.exe

hmwooYMM.exe_404_rwx_00E50000_00001000:

%Documents and Settings%\All Users\JUsIccwo\hEMQMIQs.exe

hmwooYMM.exe_404_rwx_00E80000_00001000:

hmwooYMM.exe

hmwooYMM.exe_404_rwx_00E90000_00001000:

hEMQMIQs.exe

hmwooYMM.exe_404_rwx_00EA0000_00001000:

taskkill /FI "USERNAME eq adm" /F /IM hmwooYMM.exe

hmwooYMM.exe_404_rwx_00EB0000_00001000:

taskkill /FI "USERNAME eq adm" /F /IM hEMQMIQs.exe

hmwooYMM.exe_404_rwx_00EC0000_00001000:

%Documents and Settings%\All Users\xWAMIgUE\zuMEoUcg.exe

hmwooYMM.exe_404_rwx_00ED0000_00001000:

%Documents and Settings%\All Users\NAAo.txt

hmwooYMM.exe_404_rwx_00EE0000_00001000:

notepad.exe "%Documents and Settings%\All Users\NAAo.txt"

hmwooYMM.exe_404_rwx_00EF0000_00001000:

%Documents and Settings%\All Users\xWAMIgUE

hmwooYMM.exe_404_rwx_01170000_00001000:

.text
`.rdata
@.data

hmwooYMM.exe_404_rwx_01190000_02300000:

kernel32.dll
oleaut32.dll
user32.dll
3*~%X
mj%FT
G~z#.Ct
\%x@P=
'@y%5x
\%8X$
9pT%XI
98$%Xg
`=É
o%sbZ
u8@\%0X
i,%xXl\
p<.Ii
%xh\-
t.vPt
<%0x1
rh.kXv
H%cR:8
.HY)K
4&`.iE
.fVK:,
=#W%S
ug%DK
'.waL
GFJ%F
-bA}q
%S[(b
%cG-Uj7&]q7?]x70]G71UNG
.fpwtnAeE
?%F;#AQ
U&G.EN
[.xy39
0o.bP=
4.OKDd6
oN.cM
/.la",7
".VQF
/~-.lHa
;hh".me
6%shfq
.OP*'
5FÏ
A.Jir
Yb5.FC
>Hd.DT
%XQ5@
6.MMW
aA#.DwK
^<%Dz
`s%XLcp
,!6.nC
V8F/%d[K
.kv$r{_
^=.ufzDk
hhR.SS
*5.kB
.Cf06u
O^i$.lDo
.xd&n
aD>.sjd
etÖ
FC.bI
.dnWM
.lYAQ
.lYA1f
.lYARO
.lYAR
.lYAq3
^.Yc>
.lYAR
.lYA1#
.lYARx
/.nu9
.lYARI
?L>.ZA
0(=:08=60
87.mM8
.lYAA
9`.rY
`%m.qXT#
%m.qY
%m.qXT#
=`.qz
^3q%d
%ulq:)
;2%x{2-|
32%xz2

hmwooYMM.exe_404_rwx_03B90000_01E00000:

.text
`.rdata
@.data
.rsrc
@.reloc
u%Uh`
QSSSh
QVSSh
t.PSh
T$lRSSh| "
UDPQRh
L$ QSSh
L$,QSSh
QSSShlVU
RVSShlVU
t.Ph\
tGHt.Ht&
operand of unlimited repeat could match the empty string
POSIX named classes are supported only within a class
erroffset passed as NULL
POSIX collating elements are not supported
this version of PCRE is not compiled with PCRE_UTF8 support
PCRE does not support \L, \l, \N{name}, \U, or \u
support for \P, \p, and \X has not been compiled
this version of PCRE is not compiled with PCRE_UCP support
\N is not supported in a class
inflate 1.2.5 Copyright 1995-2010 Mark Adler
Please contact the application's support team for more information.
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
operator
GetProcessWindowStation
USER32.DLL
RtlRunOnceExecuteOnce
advapi32_hack::try_hack: bad PE passed
advapi32_hack::try_hack: cannot read import table
advapi32_hack::try_hack: cannot find section .text
.data
advapi32_hack::try_hack: cannot find section .data
advapi32_hack::try_hack: cannot read section .text
Cannot read module %s, error %d
Cannot read exports of %s, error %d
advapi32_hack::try_hack: cannot read exports, error %d
.apiset
Bad .apiset catalog - don`t fit in section
String in cat item %d not in section
Value in cat item %d not in section
Bad referred in cat item %d
Double mapped value in cat item %d not in section
Bad double referred in cat item %d
BaseSrvRegisterWowExec
BaseSrvGetProcessShutdownParam
BaseSrvSetProcessShutdownParam
basesrv.dll
Unknown size of BaseServerApiDispatchTable: %d
ServerDll[%d] %p
csrsrv.dll
CsrExecServerThread
ServerDll[%d]:
ApiDispatchTable: %p %s
ConnectRoutine: %p %s
DisconnectRoutine: %p %s
HardErrorRoutine: %p %s
AddProcessRoutine: %p %s
ShutdownProcessRoutine: %p %s
Cannot open dir %S, error %d
clean_old_drvs: error %d on deleting file %S
Cannot find resource %X
Cannot load resource %X
Resource %d has zero length
Cannot lock resource %X
Cannot unpack resource %X
Cannot create file %S, error %d
1.2.5
Decompress buffer %d bytes too small
DxDvpWaitForVideoPortSync
DxDvpUpdateVideoPort
DxDvpGetVideoPortConnectInfo
DxDvpGetVideoPortOutputFormats
DxDvpGetVideoPortLine
DxDvpGetVideoPortInputFormats
DxDvpGetVideoPortFlipStatus
DxDvpGetVideoPortField
DxDvpGetVideoPortBandwidth
DxDvpFlipVideoPort
DxDvpDestroyVideoPort
DxDvpCreateVideoPort
DxDvpCanCreateVideoPort
DxDdSetColorKey
Cannot read gaDxgFuncs handlers, readed %X bytes
.rdata
Cannot read DxgCoreInterface handlers, readed %X bytes
Unknown acpi table version: %X
SBP2PORT_Mask
STORMINIPORT_Mask
STORPORT_Mask
TCPIP6_Mask
WSOCKTRANSPORT_Mask
FCPORT_Mask
SOFTPCI_Mask
TCPIP_Mask
SCSIMINIPORT_Mask
SCSIPORT_Mask
Unknown KdComponentTableSize size %X
dump_kd_masks return %X bytes, error %d, ntstatus %X
dump_kd_masks return %X bytes, error %d
dump_kd_masks(%s) return %X bytes, error %d, ntstatus %X
dump_kd_masks(%s) return %X bytes, error %d
%-*s: %X
read_kopts_length(%s) return %X bytes, error %d, ntstatus %X
read_kopts_length(%s) return %X bytes, error %d
Cannot alloc %X bytes
Cannot realloc %X bytes for %s
read_kopts(%s) return %X bytes, error %d, ntstatus %X
read_kopts(%s) return %X bytes, error %d
%S (%s): %X
%S (%s):
dump_kopts(%s) return %X bytes, error %d, ntstatus %X
dump_kopts(%s) return %X bytes, error %d
MmSupportWriteWatch
KiPassiveWatchdogTimeout
ViImageExecutionOptions
DbgkErrorPortStartTimeout
DbgkErrorPortCommTimeout
MmDisablePagingExecutive
CmDefaultLanguageId
DbgkpMaxModuleMsgs
IoCountOperations
KeDelayExecutionThread
resolve_IoFreeIrp: bad addr of %s
get_interrupt_dispatch: cannot alloc %d bytes
Unknown kernel options: %S
PsGetProcessWin32WindowStation
KeIsExecutingDpc
bad addr of KeIsExecutingDpc
Bad pnp handler item %d (%d)
Cannot find %s
ks.sys: cannot get KoCreateInstance
ImportContext
ExportContext
SpChangeAccountPasswordFn
CallPackagePassthrough
%SystemRoot%\System32\
GetServiceAccountPassword
DPAPIPasswordChangeForGMSA
GetCredentialKey
INotifyPasswordChanged
%s PolicyChangeNotificationCallbacks
PolicyChangeNotificationCallback[%d]: %d items
[%d] %p %p %p %p %s
lsasrv_hack::try_hack: bad PE passed
lsasrv_hack::try_hack: cannot find section .data
lsasrv_hack::try_hack: cannot read section .data
lsasrv_hack::try_hack: bad section passed
lsasrv_hack::try_hack: cannot read exports, error %d
LsaICallPackagePassthrough
lsasrv.dll
VaultLogonSessionNotification: %p %s
Start of driver %S failed !
WSPJoinLeaf
MSAFD_WSPSendMsg
MSAFD_WSPRecvMsg
mswsock.dll
CheckProc: cannot open process PID %d, error %d, ntstatus %X
CheckProc: cannot open process PID %d, error %d
threaded_processes_checker exception occured, error %X
MyWindowsChecker: len %d, kernel name %s
Cannot get kernel name, error %d
Kill process %d
Check processes in %d threads
Cannot find process %d
Usage: %S [options]
-wmi - report about WMI entries
-uem - check for Unknown Executable Memory
-npo - dump RPC Named Pipes Owner
-rdata - check .rdata sections too
-rpc - report about RPC interfaces
DeriveKey
NotifyChangeKey
EnumKeys
IsAlgSupported
FreeKey
DeleteKey
FinalizeKey
SetKeyProperty
CreatePersistedKey
OpenKey
OpenPrivateKey
ImportKey
ImportMasterKey
GetKeyProperty
GenerateSessionKeys
GenerateMasterKey
ExportKey
CreateEphemeralKey
ComputeEapKeyBlock
ncrypt_hack::check_in_proc: cannot alloc %d bytes
GetKeyStorageInterface
Cannot load %s (copy of %s), error %d
Cannot load module %s, error %d
Cannot read module %s import table
NdisMRegisterMiniportDriver
resolve_minidrivers_list: bad addr of NdisMRegisterMiniportDriver
NdisMRegisterMiniport
resolve_minidrivers_list: cannot find NdisMRegisterMiniport
resolve_minidrivers_list: bad addr of NdisMRegisterMiniport
resolve_miniports_list: cannot find NdisIMInitializeDeviceInstanceEx
resolve_miniports_list: bad addr of NdisIMInitializeDeviceInstanceEx
OID_CO_TAPI_DONT_REPORT_DIGITS
OID_CO_TAPI_REPORT_DIGITS
OID_QOS_OPERATIONAL_PARAMETERS
OID_TCP_TASK_IPSEC_OFFLOAD_V2_ADD_SA_EX
OID_TCP_TASK_IPSEC_OFFLOAD_V2_UPDATE_SA
OID_TCP_TASK_IPSEC_OFFLOAD_V2_DELETE_SA
OID_TCP_TASK_IPSEC_OFFLOAD_V2_ADD_SA
OID_TCP_CONNECTION_OFFLOAD_PARAMETERS
OID_FFP_SUPPORT
OID_TCP_CONNECTION_OFFLOAD_HARDWARE_CAPABILITIES
OID_TCP_CONNECTION_OFFLOAD_CURRENT_CONFIG
OID_TCP_OFFLOAD_HARDWARE_CAPABILITIES
OID_TCP_OFFLOAD_PARAMETERS
OID_TCP_OFFLOAD_CURRENT_CONFIG
OID_TCP6_OFFLOAD_STATS
OID_TCP4_OFFLOAD_STATS
OID_TCP_TASK_IPSEC_DELETE_UDPESP_SA
OID_TCP_TASK_IPSEC_ADD_UDPESP_SA
OID_TCP_SAN_SUPPORT
OID_TCP_TASK_IPSEC_DELETE_SA
OID_TCP_TASK_IPSEC_ADD_SA
OID_TCP_TASK_OFFLOAD
OID_DOT11_SUPPORTED_DSSS_CHANNEL_LIST
OID_DOT11_SUPPORTED_OFDM_FREQUENCY_LIST
OID_DOT11_QOS_TX_QUEUES_SUPPORTED
OID_DOT11_AP_JOIN_REQUEST
OID_DOT11_HR_CCA_MODE_SUPPORTED
OID_DOT11_FREQUENCY_BANDS_SUPPORTED
OID_DOT11_SUPPORTED_DATA_RATES_VALUE
OID_DOT11_SUPPORTED_RX_ANTENNA
OID_DOT11_SUPPORTED_TX_ANTENNA
OID_DOT11_REG_DOMAINS_SUPPORT_VALUE
OID_DOT11_CCA_MODE_SUPPORTED
OID_DOT11_SUPPORTED_POWER_LEVELS
OID_DOT11_DIVERSITY_SUPPORT
OID_DOT11_SUPPORTED_PHY_TYPES
OID_DOT11_OPERATIONAL_RATE_SET
OID_DOT11_JOIN_REQUEST
OID_DOT11_CURRENT_OPERATION_MODE
OID_DOT11_OPERATION_MODE_CAPABILITY
OID_802_11_SUPPORTED_RATES
OID_802_11_NETWORK_TYPES_SUPPORTED
OID_802_11_REMOVE_KEY
OID_802_11_ADD_KEY
OID_IRDA_SUPPORTED_SPEEDS
OID_ATM_SUPPORTED_AAL_TYPES
OID_ATM_SUPPORTED_SERVICE_CATEGORY
OID_ATM_SUPPORTED_VC_RATES
OID_FDDI_PORT_ACTION
OID_FDDI_PORT_HARDWARE_PRESENT
OID_FDDI_PORT_LER_FLAG
OID_FDDI_PORT_PC_WITHHOLD
OID_FDDI_PORT_PCM_STATE
OID_FDDI_PORT_CONNNECT_STATE
OID_FDDI_PORT_LER_ALARM
OID_FDDI_PORT_LER_CUTOFF
OID_FDDI_PORT_LEM_CT
OID_FDDI_PORT_LEM_REJECT_CT
OID_FDDI_PORT_LER_ESTIMATE
OID_FDDI_PORT_LCT_FAIL_CT
OID_FDDI_PORT_EB_ERROR_CT
OID_FDDI_PORT_PC_LS
OID_FDDI_PORT_BS_FLAG
OID_FDDI_PORT_MAINT_LS
OID_FDDI_PORT_INDEX
OID_FDDI_PORT_CONNECTION_CAPABILITIES
OID_FDDI_PORT_PMD_CLASS
OID_FDDI_PORT_MAC_LOOP_TIME
OID_FDDI_PORT_AVAILABLE_PATHS
OID_FDDI_PORT_MAC_PLACEMENT
OID_FDDI_PORT_REQUESTED_PATHS
OID_FDDI_PORT_CURRENT_PATH
OID_FDDI_PORT_MAC_INDICATED
OID_FDDI_PORT_CONNECTION_POLICIES
OID_FDDI_PORT_NEIGHBOR_TYPE
OID_FDDI_PORT_MY_TYPE
OID_FDDI_MAC_DOWNSTREAM_PORT_TYPE
OID_FDDI_SMT_MSG_TIME_STAMP
OID_FDDI_SMT_BYPASS_PRESENT
OID_FDDI_SMT_MAC_INDEXES
OID_FDDI_SMT_PORT_INDEXES
OID_TCP_RSC_STATISTICS
OID_SWITCH_PORT_UPDATED
OID_GEN_OPERATIONAL_STATUS
OID_SWITCH_PORT_TEARDOWN
OID_SWITCH_PORT_FEATURE_STATUS_QUERY
OID_SWITCH_PORT_DELETE
OID_SWITCH_PORT_CREATE
OID_SWITCH_PORT_ARRAY
OID_SWITCH_PORT_PROPERTY_ENUM
OID_SWITCH_PORT_PROPERTY_DELETE
OID_SWITCH_PORT_PROPERTY_UPDATE
OID_SWITCH_PORT_PROPERTY_ADD
OID_NIC_SWITCH_DELETE_VPORT
OID_NIC_SWITCH_ENUM_VPORTS
OID_NIC_SWITCH_VPORT_PARAMETERS
OID_NIC_SWITCH_CREATE_VPORT
OID_GEN_MINIPORT_RESTART_ATTRIBUTES
OID_GEN_PORT_AUTHENTICATION_PARAMETERS
OID_GEN_PORT_STATE
OID_GEN_ENUMERATE_PORTS
OID_GEN_TRANSPORT_HEADER_OFFSET
OID_GEN_SUPPORTED_GUIDS
OID_GEN_MEDIA_SUPPORTED
OID_GEN_SUPPORTED_LIST
Cannot read gWfpGlobal, readed %X bytes
Cannot read Wfp callout count, readed %X bytes
Cannot read Wfp callouts, readed %X bytes
Cannot read WFP index functions, readed %X bytes
iphlpapi.dll
%SystemRoot%\System32\iphlpapi.dll
AllocateAndGetTcpExTableFromStack
AllocateAndGetUdpExTableFromStack
GetExtendedTcpTable
GetExtendedUdpTable
Failed to snapshot TCP endpoints, error %d
Failed to snapshot UDP endpoints, error %d
Cannot alloc %d bytes for UDP extended table
Cannot alloc %d bytes for TCP extended table
ntdll_hack::try_hack: bad PE passed
ntdll_hack::try_hack: cannot find section .text
ntdll_hack::try_hack: cannot read section .text
ntdll_hack::try_hack: bad section passed
ntdll_hack::try_hack: cannot read exports, error %d
%s channel hooks:
ChannelHook[%d]: %p (%p - %s) %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
ChannelHook[%d]: %p (%p) %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
MallocSpy: %p vtbl %p - %s
webclient
msiexec32
msiexec
tftp
ftp32
cmd32
ccmexec32
ccmexec
chrome
opera
firefox
Process PID %d raise dwwin PID %d
Cannot alloc new process PID %d %S
Cannot open svchost process PID %d, error %d
proc_list::read: CreateToolhelp32Snapshot failed with error %d
PID %d Parent PID %d service {%S} %S
PID %d Parent PID %d %S
PID %d Parent PID %d kind {%S} %S
read_service_exe_name(%S): cannot expand string %S
ExWindowStationOpenProcedureCallout
ExWindowStationParseProcedureCallout
ExWindowStationDeleteProcedureCallout
ExWindowStationCloseProcedureCallout
ExWindowStationOkToCloseProcedureCallout
read_w8_callout failed, len %d, returned %d bytes, error %d, ntstatus %X
read_w8_callout failed, len %d, returned %d bytes, error %d
PsWin32CallBack: %p %p %s
check_callouts: cannot alloc %X bytes (size %d)
check_callouts failed, error %d, status %X
check_callouts failed, error %d
Callouts (%d):
%s: %p %s
ark_check_callbacks: cannot read size of callbacks list, error %d, ntstatus %X
ark_check_callbacks: cannot read size of callbacks list, error %d
ark_check_callbacks: cannot read %d bytes (readed %d), error %d, ntstatus %X
ark_check_callbacks: cannot read %d bytes (readed %d), error %d
CB: %S, total %X:
%p (%s)
check_shutdown_callbacks: cannot read size of callbacks list, error %d, ntstatus %X
check_shutdown_callbacks: cannot read size of callbacks list, error %d
check_shutdown_callbacks: cannot read callbacks list of %s, error %d, ntstatus %X
check_shutdown_callbacks: cannot read callbacks list of %s, error %d
%s - %d:
FastIoUnlockAllByKey
MJ_CREATE_NAMED_PIPE
%s!%s.%s patched by %s, addr %p
%s!%s[%d] patched by %s, addr %p
Cannot open driver dumpfile %s, error %d
Cannot open kernel dumpfile %s, error %d
Cannot read driver %s, error %d
hal.dll
Shadow SDT: %p, limit %X
win32k.sys
Cannot relocate section %s.%s
Cannot alloc %X bytes for reading driver section %s.%s
Driver %s!%s has %X patched bytes !
.orig
.kmem
Cannot read driver section %s.%s (flags %X) at %p size %X readed %X, error %d, ntstatus %X
Cannot read driver section %s.%s (flags %X) at %p size %X readed %X, error %d
Cannot read kernel %s, error %d
ntoskrnl.exe
Cannot alloc %X bytes for reading kernel sections
Cannot relocate section %s
KernelSection %s rva %X, size %X, 0x%X relocs has 0x%X patched bytes !
Cannot read (whole) section %s (flags %X) at %p size %X (readed %X), error %d
\SystemRoot\system32\hal.dll
\SystemRoot\system32\halapic.dll
\SystemRoot\system32\halmps.dll
\SystemRoot\system32\halacpi.dll
\SystemRoot\system32\halaacpi.dll
\SystemRoot\system32\halmacpi.dll
%SystemRoot%\System32\hal.dll
halapic.dll
halmps.dll
halacpi.dll
halaacpi.dll
halmacpi.dll
Driver %S DrvObj %p:
DriverUnload patched by %s, addr %p
DriverStartIo patched by %s, addr %p
AddDevice patched by %s, addr %p
Handler %s patched by %s, addr %p
Handler %s patched, addr %p
Handler %d patched by %s, addr %p
Handler %d patched, addr %p
FastIOHandler %s patched by %s, addr %p
FastIOHandler %s patched, addr %p
FastIOHandler %d patched by %s, addr %p
FastIOHandler %d patched, addr %p
FS_FILTER_CALLBACKS %s patched by %s, addr %p
FS_FILTER_CALLBACKS %s patched, addr %p
FS_FILTER_CALLBACKS %d patched by %s, addr %p
FS_FILTER_CALLBACKS %d patched, addr %p
StartIo patched by %s, addr %p
read_fsmjxxx(%S): cannot make full driver name
read_fsmjxxx(%S) failed, error %d, ntstatus %X
read_fsmjxxx(%S) failed, error %d
read_mjxxx(%s): cannot make full driver name
read_mjxxx(%S) failed, error %d, ntstatus %X
read_mjxxx(%S) failed, error %d
Cannot alloc %X bytes for driver %s EAT checking
read_driver_eat %s failed, error %d, status %X
read_driver_eat %s failed, error %d
Export addr %s.%s patched by %s !
Export addr %s.%s patched !
Export addr %s.%d patched by %s !
Export addr %s.%d patched!
\hal.dll
\SystemRoot\system32\drivers\ndis.sys
ndis.sys
drivers\ndis.sys
\SystemRoot\system32\DRIVERS\tdi.sys
tdi.sys
drivers\tdi.sys
\SystemRoot\system32\DRIVERS\tcpip.sys
tcpip.sys
drivers\tcpip.sys
\SystemRoot\system32\DRIVERS\netio.sys
netio.sys
drivers\netio.sys
\SystemRoot\system32\DRIVERS\fltmgr.sys
fltmgr.sys
drivers\fltmgr.sys
\SystemRoot\system32\DRIVERS\ks.sys
ks.sys
drivers\ks.sys
\SystemRoot\system32\DRIVERS\dxg.sys
drivers\dxg.sys
\SystemRoot\system32\DRIVERS\dxgkrnl.sys
drivers\dxgkrnl.sys
\SystemRoot\system32\DRIVERS\watchdog.sys
drivers\watchdog.sys
\SystemRoot\system32\DRIVERS\ksecdd.sys
ksecdd.sys
drivers\ksecdd.sys
\SystemRoot\System32\Drivers\Ntfs.sys
ntfs.sys
\SystemRoot\system32\CLFS.SYS
CLFS.SYS
\SystemRoot\system32\drivers\ataport.sys
ataport.sys
\SystemRoot\system32\drivers\atapi.sys
atapi.sys
\SystemRoot\system32\drivers\peauth.sys
peauth.sys
\SystemRoot\system32\drivers\WDFLDR.sys
WDFLDR.sys
\SystemRoot\system32\drivers\usbstor.sys
usbstor.sys
\SystemRoot\system32\drivers\usbd.sys
usbd.sys
\SystemRoot\system32\drivers\USBPORT.sys
USBPORT.sys
\SystemRoot\system32\drivers\usbohci.sys
usbohci.sys
\SystemRoot\system32\drivers\usbehci.sys
usbehci.sys
\SystemRoot\system32\drivers\usbhub.sys
usbhub.sys
\SystemRoot\system32\drivers\usbccgp.sys
usbccgp.sys
\SystemRoot\system32\drivers\discache.sys
discache.sys
\SystemRoot\system32\drivers\termdd.sys
termdd.sys
\SystemRoot\system32\drivers\rdppr.sys
rdppr.sys
\SystemRoot\system32\drivers\mssmbios.sys
mssmbios.sys
\SystemRoot\system32\drivers\1394BUS.SYS
1394BUS.SYS
\SystemRoot\system32\drivers\BATTC.SYS
BATTC.SYS
\SystemRoot\system32\drivers\bthport.sys
bthport.sys
\SystemRoot\system32\drivers\drmk.sys
drmk.sys
\SystemRoot\system32\drivers\HIDPARSE.SYS
HIDPARSE.SYS
\SystemRoot\system32\drivers\HIDCLASS.SYS
HIDCLASS.SYS
\SystemRoot\system32\drivers\msiscsi.sys
msiscsi.sys
\SystemRoot\system32\drivers\PCIIDEX.SYS
PCIIDEX.SYS
\SystemRoot\system32\drivers\portcls.sys
portcls.sys
\SystemRoot\system32\drivers\smsmdm.sys
smsmdm.sys
\SystemRoot\system32\drivers\STREAM.SYS
STREAM.SYS
\SystemRoot\system32\drivers\vga.sys
vga.sys
\SystemRoot\system32\drivers\VIDEOPRT.SYS
VIDEOPRT.SYS
\SystemRoot\system32\drivers\vmstorfl.sys
vmstorfl.sys
\SystemRoot\system32\drivers\Dxapi.sys
Dxapi.sys
\SystemRoot\system32\drivers\dxgthk.sys
dxgthk.sys
\SystemRoot\system32\drivers\dxgmms1.sys
dxgmms1.sys
\SystemRoot\system32\drivers\spsys.sys
spsys.sys
\SystemRoot\system32\drivers\winhv.sys
winhv.sys
\SystemRoot\system32\drivers\HdAudio.sys
HdAudio.sys
\SystemRoot\System32\cdd.dll
cdd.dll
\SystemRoot\System32\ATMFD.DLL
ATMFD.DLL
\SystemRoot\System32\RDPDD.dll
RDPDD.dll
\SystemRoot\system32\drivers\vwifibus.sys
vwifibus.sys
\SystemRoot\system32\drivers\nwifi.sys
nwifi.sys
\SystemRoot\system32\drivers\vwififlt.sys
vwififlt.sys
\SystemRoot\system32\drivers\wfplwf.sys
wfplwf.sys
\SystemRoot\system32\drivers\wfplwfs.sys
wfplwfs.sys
\SystemRoot\system32\drivers\tmtdi.sys
tmtdi.sys
\SystemRoot\system32\drivers\netvsc60.sys
netvsc60.sys
\SystemRoot\system32\drivers\mslldp.sys
mslldp.sys
\SystemRoot\system32\drivers\netvsc63.sys
netvsc63.sys
\SystemRoot\system32\drivers\ndiscap.sys
ndiscap.sys
\SystemRoot\system32\drivers\agilevpn.sys
agilevpn.sys
\SystemRoot\system32\drivers\asyncmac.sys
asyncmac.sys
\SystemRoot\system32\drivers\mpsdrv.sys
mpsdrv.sys
\SystemRoot\system32\drivers\rspndr.sys
rspndr.sys
\SystemRoot\system32\drivers\ndisuio.sys
ndisuio.sys
\SystemRoot\system32\drivers\lltdio.sys
lltdio.sys
\SystemRoot\system32\drivers\NDProxy.sys
NDProxy.sys
\SystemRoot\system32\drivers\raspppoe.sys
raspppoe.sys
\SystemRoot\system32\drivers\ndiswan.sys
ndiswan.sys
\SystemRoot\system32\drivers\wanarp.sys
wanarp.sys
\SystemRoot\system32\drivers\bthpan.sys
bthpan.sys
\SystemRoot\system32\drivers\rassstp.sys
rassstp.sys
\SystemRoot\system32\drivers\raspptp.sys
raspptp.sys
\SystemRoot\system32\drivers\rasl2tp.sys
rasl2tp.sys
\SystemRoot\system32\drivers\rasacd.sys
rasacd.sys
\SystemRoot\system32\drivers\tunnel.sys
tunnel.sys
\SystemRoot\system32\drivers\tunmp.sys
tunmp.sys
\SystemRoot\system32\drivers\pacer.sys
pacer.sys
\SystemRoot\system32\drivers\NDISTAPI.SYS
NDISTAPI.SYS
\SystemRoot\system32\drivers\msgpc.sys
msgpc.sys
\SystemRoot\system32\drivers\partmgr.sys
partmgr.sys
\SystemRoot\system32\drivers\volmgr.sys
volmgr.sys
\SystemRoot\system32\drivers\volmgrx.sys
volmgrx.sys
\SystemRoot\system32\drivers\mountmgr.sys
mountmgr.sys
\SystemRoot\system32\drivers\iaStor.sys
iaStor.sys
\SystemRoot\system32\drivers\volsnap.sys
volsnap.sys
\SystemRoot\system32\drivers\ACPI.sys
acpi.sys
\SystemRoot\System32\Drivers\WppRecorder.sys
WppRecorder.sys
\SystemRoot\System32\Drivers\Mouclass.sys
Mouclass.sys
\SystemRoot\System32\Drivers\kbdclass.sys
kbdclass.sys
\SystemRoot\System32\Drivers\Fastfat.SYS
Fastfat.sys
\SystemRoot\System32\Drivers\bowser.sys
bowser.sys
\SystemRoot\System32\Drivers\rdbss.sys
rdbss.sys
\SystemRoot\System32\Drivers\msfs.sys
msfs.sys
\SystemRoot\System32\Drivers\NetBIOS.sys
NetBIOS.sys
\SystemRoot\System32\Drivers\mup.sys
mup.sys
\SystemRoot\System32\Drivers\dfs.sys
dfs.sys
\SystemRoot\System32\Drivers\dfsc.sys
dfsc.sys
\SystemRoot\System32\Drivers\npfs.SYS
npfs.sys
\SystemRoot\System32\Drivers\luafv.SYS
luafv.sys
\SystemRoot\System32\Drivers\MRxSmb.SYS
MRxSmb.sys
\SystemRoot\System32\Drivers\MRxSmb10.SYS
MRxSmb10.sys
\SystemRoot\System32\Drivers\MRxSmb20.SYS
MRxSmb20.sys
\SystemRoot\System32\Drivers\MRxDAV.SYS
MRxDAV.sys
\SystemRoot\system32\Drivers\fltmgr.sys
\SystemRoot\system32\Drivers\TDI.SYS
\SystemRoot\system32\Drivers\tdx.sys
\SystemRoot\system32\Drivers\ipfltdrv.sys
\SystemRoot\system32\Drivers\tcpip.sys
\SystemRoot\System32\drivers\afd.sys
afd.sys
\SystemRoot\System32\drivers\netbt.sys
\SystemRoot\System32\drivers\NETIO.sys
\SystemRoot\System32\drivers\srv.sys
srv.sys
\SystemRoot\System32\drivers\srv2.sys
srv2.sys
\SystemRoot\System32\drivers\srvnet.sys
\SystemRoot\System32\drivers\sr.sys
sr.sys
\SystemRoot\System32\win32k.sys
\SystemRoot\System32\drivers\http.sys
http.sys
\SystemRoot\System32\drivers\fwpkclnt.sys
\SystemRoot\system32\DRIVERS\msrpc.sys
msrpc.sys
\SystemRoot\system32\DRIVERS\disk.sys
disk.sys
\SystemRoot\system32\DRIVERS\ftdisk.sys
ftdisk.sys
\SystemRoot\system32\DRIVERS\Storport.SYS
Storport.SYS
\SystemRoot\system32\DRIVERS\CLASSPNP.SYS
CLASSPNP.SYS
\SystemRoot\system32\Drivers\ks.sys
\SystemRoot\System32\Drivers\ksecdd.sys
ksecdd.SYS
\SystemRoot\system32\kdcom.dll
kdcom.dll
\SystemRoot\System32\Drivers\cng.sys
cng.sys
\SystemRoot\system32\PSHED.dll
PSHED.dll
\SystemRoot\system32\CI.dll
CI.dll
\SystemRoot\system32\DRIVERS\WMILIB.SYS
wmilib.sys
Cannot find %s for IAT resolving of %s
Cannot alloc %X bytes for drivers IAT checking
Cannot find %s import %s.%s
Cannot find %s import %s.%d
IAT %s %s.%s patched, addr %p
IAT %s %s.%d patched, addr %p
IAT %s %s.%s patched by %s, addr %p
IAT %s %s.%d patched by %s, addr %p
%s has %d patched IAT entries (total %d)
reading of IAT %s failed, readed %X, actual IAT size %X, error %d
check_exts count failed, error %d, ntstatus %X
check_exts count failed, error %d
check_exts: cannot alloc %X bytes
check_exts failed, error %d, ntstatus %X
check_exts failed, error %d
Ext[%X]:
Handler1: %p %s
Handler2: %p %s
Handler3: %p %s
Table: %X items %p %s
Item[%X]: %p %s
IRP_MJ_CREATE_NAMED_PIPE
Unknown fltmgr: FrameList %X FilterSize %X cbn %X
Unknown fltmgr: FrameList %X FilterSize %X
FltMgr: index %d
FRAME[%d] %p
%s: %p
NormalizeNameComponent: %p %s
NormalizeContextCleanup: %p %s
PreOperation: %p %s
PostOperation: %p %s
check_ks: cannot read size of ks list, error %d, ntstatus %X
check_ks: cannot read size of ks list, error %d
ks count: %X
check_ks: cannot alloc %X bytes
check_ks: cannot read ks list, error %d, ntstatus %X
check_ks: cannot read ks list, error %d
ks[%d] %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
ChangeAccountPassword
ImportSecurityContext
ExportSecurityContext
gKsecpBCryptExtension: %p %s
gKsecpSslExtension: %p %s
SecTable.%s patched %p %s
dxg.sys
dxgkrnl.sys
Win32kCallout: %p %s
SessionStartCallout: %p %s
KTIMER %p DPC %p DefRoutine %p %s
Cannot find KPRCB.DpcRoutineActive
Unknown KPRCB: DpcRoutineActive %X WorkerRoutine %X
Unknown KPRCB: DpcRoutineActive %X
Processor %d:
KTIMERS[%d]: %X
Patched %s   %X by %s
Patched ord.%d   %X by %s
Patched %s   %X
Patched ord.%d   %X
Patched %s by %s
Patched ord.%d by %s
Patched %s
Patched ord.%d
Exception %X occured during EAT checking of %s
check_module_iat(%s) - cannot find exports for %s
check_module_iat(%s): zeroed ImportLookUp, cannot check import
Cannot find ordinal %X in module %s (%s) in import table of %s
Cannot find symbol %s in module %s (%s) in import table of %s
(%s) %s.%s hooked in %s: my IAT %p, must be %p
(%s) %s.%d hooked in %s: my IAT %p, must be %p
apfn %s patched by %s, addr %p
apfn[%d] patched by %s, addr %p
apfn %s patched, addr %p
apfn[%d] patched, addr %p
%s%s!%s patched by %s, addr %p
%s%s![%d] patched by %s, addr %p
%s%s!%s patched, addr %p
%s%s![%d] patched, addr %p
LSA SP %s has %d patched functions in SECPKG_FUNCTION_TABLE:
PID %d: LSA SP %s has %d patched functions in SECPKG_USER_FUNCTION_TABLE:
PID %d: LSA SP %s has %d patched functions in CallPackageDispatch:
ole32 hooked by %s
Cannot relocate section %s!%s
Exception %X occured on checking %s!%s
Module %s!%s has %X patched bytes !
Exception %X occured on check_module_iat(%s)
MyModule: %p %s
%SystemRoot%\System32\ncrypt.dll
%SystemRoot%\System32\ntdsa.dll
%SystemRoot%\System32\kernelbase.dll
%SystemRoot%\System32\kernel32.dll
%SystemRoot%\System32\user32.dll
%SystemRoot%\System32\umpnpmgr.dll
%SystemRoot%\System32\combase.dll
%SystemRoot%\System32\ole32.dll
%SystemRoot%\System32\imm32.dll
%SystemRoot%\System32\rpcrt4.dll
%SystemRoot%\System32\mswsock.dll
%SystemRoot%\System32\advapi32.dll
%SystemRoot%\System32\cryptbase.dll
%SystemRoot%\System32\apisetschema.dll
read_ndis_oid_handlers failed, returned %d bytes, error %d, ntstatus %X
read_ndis_oid_handlers failed, returned %d bytes, error %d
[%X] %s: post %p %s
[%X] %s: pre %p %s
[%X] %s: pre %p (%s) post %p (%s)
[%X] %X: post %p %s
[%X] %X: pre %p %s
[%X] %X: pre %p (%s) post %p (%s)
read_tcp_off_handlers failed, returned %d bytes, error %d, ntstatus %X
read_tcp_off_handlers failed, returned %d bytes, error %d
TcpOfflineHandlers:
TcpOffloadEventIndicate: %p %s
TcpOffloadReceiveIndicate: %p %s
TcpOffloadSendComplete: %p %s
TcpOffloadReceiveComplete: %p %s
TcpOffloadDisconnectComplete: %p %s
TcpOffloadForwardComplete: %p %s
Cannot alloc %X bytes from reading filter block
read_ndis_filter_block: len %d, returned %d bytes, error %d, ntstatus %X
read_ndis_filter_block: len %d, returned %d bytes, error %d
check_ndis - reading of TDI callback failed, error %d, ntstatus %X
check_ndis - reading of TDI callback failed, error %d
check_ndis - reading of TDI PnP handler failed, error %d, ntstatus %X
check_ndis - reading of TDI PnP handler failed, error %d
TDI callback %p patched by %s
TDI PnP handler %p patched by %s
check_ndis - reading of providers count failed, error %d, ntstatus %X
check_ndis - reading of providers count failed, error %d
check_ndis: %d providers
check_ndis: cannot alloc %X bytes
Cannot store provider_block %p (%d)
check_ndis: stored %d provider_blocks
check_ndis - reading of interfaces count failed, error %d, ntstatus %X
check_ndis - reading of interfaces count failed, error %d
check_ndis: %d interfaces, size of miniport %X
Interface[%d]:
check_ndis - reading of protocols count failed, error %d, ntstatus %X
check_ndis - reading of protocols count failed, error %d
check_ndis: %d protocols, size of protocol %X
check_ndis: stored %d protocols
check_ndis - reading of minidrivers count failed, error %d, ntstatus %X
check_ndis - reading of minidrivers count failed, error %d
check_ndis: %d minidrivers, size of minidriver %X, sizeof(ndis50) %X, sizeof(ndis52) %X
Cannot store minidriver %d (%p)
Stored %d mini-drivers
check_ndis - reading of miniports count failed, error %d, ntstatus %X
check_ndis - reading of miniports count failed, error %d
check_ndis: %d miniports, size of miniport %X
check_ndis: read %d miniports, total %X
Miniport[%d] %p:
check_ndis: stored %d miniports, sizeof(miniport_block_w7) %X
check_ndis - reading of open_blocks count failed, error %d, ntstatus %X
check_ndis - reading of open_blocks count failed, error %d
check_ndis: %d open_blocks, size of open_block %X
check_ndis: read %d open_blocks, total %X
Open_Block[%d]:
Cannot store open_block %p (%d)
check_ndis: stored %d open_blocks
check_ndis - reading of filter_drivers count failed, error %d, ntstatus %X
check_ndis - reading of filter_drivers count failed, error %d
check_ndis: %d filter_drivers, size of open_block %X
check_ndis: read %d filter_drivers, total %X
FilterDriver[%d]:
check_ndis: stored %d filter_drivers, %d filter_blocks
Passive
read_punicode_string failed, len %d, returned %d bytes, error %d, ntstatus %X
read_punicode_string failed, len %d, returned %d bytes, error %d
Cannot read NDIS_MINIPORT_INTERRUPT %p
NDIS_MINIPORT_INTERRUPT:
MiniportIsr: %p %s
MiniportDpc: %p %s
Cannot read NDIS_MINIPORT_INTERRUPT_CHARACTERISTICS %p
NDIS_MINIPORT_INTERRUPT_CHARACTERISTICS:
InterruptHandler: %p %s
InterruptDpcHandler: %p %s
DisableInterruptHandler: %p %s
EnableInterruptHandler: %p %s
MessageInterruptHandler: %p %s
MessageInterruptDpcHandler: %p %s
DisableMessageInterruptHandler: %p %s
EnableMessageInterruptHandler: %p %s
MiniportIsr: %p %s
MiniportDpc: %p %s
MiniportMessageIsr: %p %s
MiniportMessageInterruptDpc: %p %s
MiniportIsr: %p %s
MiniportDpc: %p %s
MiniportEnableInterrupt: %p %s
MiniportDisableInterrupt: %p %s
MiniportMessageIsr: %p %s
MiniportMessageInterruptDpc: %p %s
MiniportDisableMessageInterrupt: %p %s
MiniportEnableMessageInterrupt: %p %s
NDIS Protocol[%d]: %S
MajorNdisVersion %d
MinorNdisVersion %d
Flags %X
OpenAdapterCompleteHandler: %p %s
CloseAdapterCompleteHandler: %p %s
SendCompleteHandler: %p %s
TransferDataCompleteHandler: %p %s
ResetCompleteHandler: %p %s
RequestCompleteHandler: %p %s
ReceiveHandler: %p %s
ReceiveCompleteHandler: %p %s
StatusHandler: %p %s
StatusCompleteHandler: %p %s
ReceivePacketHandler: %p %s
BindAdapterHandler: %p %s
UnbindAdapterHandler: %p %s
PnPEventHandler: %p %s
UnloadHandler: %p %s
CoSendCompleteHandler: %p %s
CoStatusHandler: %p %s
CoReceivePacketHandler: %p %s
CoAfRegisterNotifyHandler: %p %s
MajorNdisVersion %d
MinorNdisVersion %d
MajorDriverVersion %d
MinorDriverVersion %d
Flags %X
IsIPv4 %d
IsIPv6 %d
IsNdisTest6 %d
BindAdapterHandlerEx: %p %s
UnbindAdapterHandlerEx: %p %s
OpenAdapterCompleteHandlerEx: %p %s
CloseAdapterCompleteHandlerEx: %p %s
PnPEventHandler: %p %s
UnloadHandler: %p %s
UninstallHandler: %p %s
RequestCompleteHandler: %p %s
StatusHandler: %p %s
StatusCompleteHandler: %p %s
ReceiveNetBufferListsHandler: %p %s
SendNetBufferListsCompleteHandler: %p %s
CoStatusHandler: %p %s
CoAfRegisterNotifyHandler: %p %s
CoReceiveNetBufferListsHandler: %p %s
CoSendNetBufferListsCompleteHandler: %p %s
OpenAdapterCompleteHandler: %p %s
CloseAdapterCompleteHandler: %p %s
SendCompleteHandler: %p %s
TransferDataCompleteHandler: %p %s
ResetCompleteHandler: %p %s
ReceiveHandler: %p %s
ReceiveCompleteHandler: %p %s
ReceivePacketHandler: %p %s
BindAdapterHandler: %p %s
UnbindAdapterHandler: %p %s
CoSendCompleteHandler: %p %s
CoReceivePacketHandler: %p %s
OidRequestCompleteHandler: %p %s
InitiateOffloadCompleteHandler: %p %s
TerminateOffloadCompleteHandler: %p %s
UpdateOffloadCompleteHandler: %p %s
InvalidateOffloadCompleteHandler: %p %s
QueryOffloadCompleteHandler: %p %s
IndicateOffloadEventHandler: %p %s
TcpOffloadSendCompleteHandler: %p %s
TcpOffloadReceiveCompleteHandler: %p %s
TcpOffloadDisconnectCompleteHandler: %p %s
TcpOffloadForwardCompleteHandler: %p %s
TcpOffloadEventHandler: %p %s
TcpOffloadReceiveIndicateHandler: %p %s
Unknown NDIS Type %X and Size %X
DirectOidRequestCompleteHandler: %p %s
AllocateSharedMemoryHandler: %p %s
FreeSharedMemoryHandler: %p %s
Unknown ndis protocol size: %X
NDIS MiniDriver[%d] %p
MajorNdisVersion: %d
MinorNdisVersion: %d
CheckForHangHandler: %p %s
DisableInterruptHandler: %p %s
EnableInterruptHandler: %p %s
HaltHandler %p %s
HandleInterruptHandler: %p %s
InitializeHandler: %p %s
ISRHandler: %p %s
QueryInformationHandler: %p %s
ReconfigureHandler: %p %s
ResetHandler: %p %s
SendHandler: %p %s
SetInformationHandler: %p %s
TransferDataHandler: %p %s
ReturnPacketHandler: %p %s
SendPacketsHandler: %p %s
AllocateCompleteHandler: %p %s
CoCreateVcHandler: %p %s
CoDeleteVcHandler: %p %s
CoActivateVcHandler: %p %s
CoDeactivateVcHandler: %p %s
CoSendPacketsHandler: %p %s
CoRequestHandler: %p %s
CheckForHangHandler: %p %s
DisableInterruptHandler: %p %s
EnableInterruptHandler: %p %s
HaltHandler %p %s
HandleInterruptHandler: %p %s
InitializeHandler: %p %s
ISRHandler: %p %s
QueryInformationHandler: %p %s
ReconfigureHandler: %p %s
ResetHandler: %p %s
SendHandler: %p %s
SetInformationHandler: %p %s
TransferDataHandler: %p %s
ReturnPacketHandler: %p %s
SendPacketsHandler: %p %s
AllocateCompleteHandler: %p %s
CoCreateVcHandler: %p %s
CoDeleteVcHandler: %p %s
CoActivateVcHandler: %p %s
CoDeactivateVcHandler: %p %s
CoSendPacketsHandler: %p %s
CoRequestHandler: %p %s
CancelSendPacketsHandler: %p %s
PnPEventNotifyHandler: %p %s
AdapterShutdownHandler: %p %s
CheckForHangHandler: %p %s
DisableInterruptHandler: %p %s
EnableInterruptHandler: %p %s
HaltHandler %p %s
HandleInterruptHandler: %p %s
InitializeHandler: %p %s
ISRHandler: %p %s
QueryInformationHandler: %p %s
ReconfigureHandler: %p %s
ResetHandler: %p %s
SendHandler: %p %s
SetInformationHandler: %p %s
TransferDataHandler: %p %s
ReturnPacketHandler: %p %s
SendPacketsHandler: %p %s
AllocateCompleteHandler: %p %s
CoCreateVcHandler: %p %s
CoDeleteVcHandler: %p %s
CoActivateVcHandler: %p %s
CoDeactivateVcHandler: %p %s
CoSendPacketsHandler: %p %s
CoRequestHandler: %p %s
CancelSendPacketsHandler: %p %s
PnPEventNotifyHandler: %p %s
AdapterShutdownHandler: %p %s
ISRHandlerEx: %p %s
HandleInterruptHandlerEx: %p %s
InitiateOffloadHandler: %p %s
TerminateOffloadHandler: %p %s
UpdateOffloadHandler: %p %s
InvalidateOffloadHandler: %p %s
QueryOffloadHandler: %p %s
TcpOffloadSendHandler: %p %s
TcpOffloadReceiveHandler: %p %s
TcpOffloadDisconnectHandler: %p %s
TcpOffloadForwardHandler: %p %s
TcpOffloadReceiveReturnHandler: %p %s
ReturnPacketsHandlerEx: %p %s
RequestTimeoutDpcHandler: %p %s
MajorNdisVersion: %d
MinorNdisVersion: %d
MajorDriverVersion: %d
MinorDriverVersion: %d
Flags: %X
SetOptionsHandler: %p %s
InitializeHandlerEx: %p %s
HaltHandlerEx: %p %s
UnloadHandler: %p %s
PauseHandler: %p %s
RestartHandler: %p %s
OidRequestHandler: %p %s
SendNetBufferListsHandler: %p %s
ReturnNetBufferListsHandler: %p %s
CancelSendHandler: %p %s
CheckForHangHandlerEx: %p %s
ResetHandlerEx: %p %s
DevicePnPEventNotifyHandler: %p %s
ShutdownHandlerEx: %p %s
CancelOidRequestHandler: %p %s
DirectOidRequestHandler: %p %s
CancelDirectOidRequestHandler: %p %s
NDIS MiniPort[%d] %p
State: %s
MediaType: %s
AdapterType: %s
DefaultSendAuthorizationState: %s
DefaultRcvAuthorizationState: %s
DefaultPortSendAuthorizationState: %s
DefaultPortRcvAuthorizationState: %s
NextCancelSendNetBufferListsHandler: %p %s
PacketIndicateHandler: %p %s
SendCompleteHandler: %p %s
SendResourcesHandler: %p %s
ResetCompleteHandler: %p %s
DisableInterruptHandler: %p %s
EnableInterruptHandler: %p %s
SendPacketsHandler: %p %s
DeferredSendHandler: %p %s
EthRxIndicateHandler: %p %s
NextSendNetBufferListsHandler: %p %s
EthRxCompleteHandler: %p %s
SavedNextSendNetBufferListsHandler: %p %s
StatusHandler: %p %s
StatusCompleteHandler: %p %s
TDCompleteHandler: %p %s
QueryCompleteHandler: %p %s
SetCompleteHandler: %p %s
WanSendCompleteHandler: %p %s
WanRcvHandler: %p %s
WanRcvCompleteHandler: %p %s
SendNetBufferListsCompleteHandler: %p %s
WSendPacketsHandler: %p %s
NextSendPacketsHandler: %p %s
FinalSendPacketsHandler: %p %s
TopIndicateNetBufferListsHandler: %p %s
TopIndicateLoopbackNetBufferListsHandler: %p %s
Ndis5PacketIndicateHandler: %p %s
MiniportReturnPacketHandler: %p %s
SynchronousReturnPacketHandler: %p %s
TopNdis5PacketIndicateHandler: %p %s
AllocateSharedMemoryHandler: %p %s
FreeSharedMemoryHandler: %p %s
SetBusData: %p %s
GetBusData: %p %s
NoFilter.CancelSendHandler %p %s
NoFilter.SendNetBufferListsCompleteHandler %p %s
NoFilter.IndicateNetBufferListsHandler %p %s
NoFilter.SaveIndicateNetBufferListsHandler %p %s
NoFilter.ReturnNetBufferListsHandler %p %s
NoFilter.SendNetBufferListsHandler %p %s
Next.CancelSendHandler %p %s
Next.SendNetBufferListsCompleteHandler %p %s
Next.IndicateNetBufferListsHandler %p %s
Next.SaveIndicateNetBufferListsHandler %p %s
Next.ReturnNetBufferListsHandler %p %s
Next.SendNetBufferListsHandler %p %s
Name: %S
BaseName: %S
SymbolicLinkName: %S
NextCancelSendNetBufferListsHandler %p %s
TrRxIndicateHandler: %p %s
TrRxCompleteHandler: %p %s
IndicateNetBufferListsHandler: %p %s
NextReturnNetBufferLists: %p %s
SavedIndicateNetBufferListsHandler: %p %s
SavedPacketIndicateHandler: %p %s
ShutdownHandler: %p %s
NDIS MiniPort[%d] %S
BusType: %s
PacketIndicateHandler: %p %s
SendCompleteHandler: %p %s
SendResourcesHandler: %p %s
ResetCompleteHandler: %p %s
DeferredSendHandler: %p %s
EthRxIndicateHandler: %p %s
TrRxIndicateHandler: %p %s
FddiRxIndicateHandler: %p %s
EthRxCompleteHandler: %p %s
TrRxCompleteHandler: %p %s
FddiRxCompleteHandler: %p %s
StatusHandler: %p %s
StatusCompleteHandler: %p %s
TDCompleteHandler: %p %s
QueryCompleteHandler: %p %s
SetCompleteHandler: %p %s
WanSendCompleteHandler: %p %s
WanRcvHandler: %p %s
WanRcvCompleteHandler: %p %s
AdapterInstanceName: %S
OpenBlock [%d] %p
RootName: %S
BindName: %S
ProtocolMajorVersion: %X
NextSendHandler: %p %s
NextReturnNetBufferListsHandler: %p %s
SendHandler: %p %s
TransferDataHandler: %p %s
WanReceiveHandler: %p %s
SendPacketsHandler: %p %s
ResetHandler: %p %s
RequestHandler: %p %s
OidRequestHandler: %p %s
WSendHandler: %p %s
WTransferDataHandler: %p %s
WSendPacketsHandler: %p %s
CancelSendPacketsHandler: %p %s
ProtSendNetBufferListsComplete: %p %s
NextSendNetBufferListsComplete: %p %s
ReceiveNetBufferLists: %p %s
SavedSendNBLHandler: %p %s
SavedSendPacketsHandler: %p %s
SavedCancelSendPacketsHandler: %p %s
SavedSendHandler: %p %s
Ndis5WanSendHandler: %p %s
ProtSendCompleteHandler: %p %s
OidRequestCompleteHandler %p %s
OpenFlags: %X
DirectOidRequestHandler: %p %s
RootName: %S
BindName: %S
Flags: %X
SendHandler: %p %s
WanSendHandler: %p %s
TransferDataHandler: %p %s
WanReceiveHandler: %p %s
SendPacketsHandler: %p %s
ResetHandler: %p %s
RequestHandler: %p %s
WSendHandler: %p %s
WTransferDataHandler: %p %s
WSendPacketsHandler: %p %s
CancelSendPacketsHandler: %p %s
Flags %X
Mtu %X
PromiscuousMode %d
AccessType %s
DirectionType %s
ConnectionType %s
MediaType %s
MediaConnectState %s
AdminStatus %s
OperStatus %s
InterfaceGuid %s
NetworkGuid %s
ifIndex %X
ifDescr %S
ifAlias %S
FilterDriverCharacteristics[%d]:
FriendlyName: %S
UniqueName: %S
ServiceName: %S
SetOptionsHandler: %p %s
SetFilterModuleOptionsHandler: %p %s
AttachHandler: %p %s
DetachHandler: %p %s
RestartHandler: %p %s
PauseHandler: %p %s
SendNetBufferListsHandler: %p %s
SendNetBufferListsCompleteHandler: %p %s
CancelSendNetBufferListsHandler: %p %s
ReceiveNetBufferListsHandler: %p %s
ReturnNetBufferListsHandler: %p %s
OidRequestHandler: %p %s
OidRequestCompleteHandler: %p %s
CancelOidRequestHandler: %p %s
DevicePnPEventNotifyHandler: %p %s
NetPnPEventHandler: %p %s
StatusHandler: %p %s
DirectOidRequestHandler: %p %s
DirectOidRequestCompleteHandler: %p %s
CancelDirectOidRequestHandler: %p %s
InterfaceGuid: %s
FilterState: %s
NextSendNetBufferListsHandler: %p %s
NextSendNetBufferListsCompleteHandler: %p %s
NextIndicateReceiveNetBufferListsHandler: %p %s
NextReturnNetBufferListsHandler: %p %s
NextCancelSendNetBufferListsHandler: %p %s
SetFilterModuleOptionalHandlers: %p %s
OidRequestHandler: %p %s
OidRequestCompleteHandler: %p %s
CancelRequestHandler: %p %s
DevicePnPEventNotifyHandler: %p %s
NetPnPEventHandler: %p %s
StatusHandler: %p %s
FilterSendNetBufferListsHandler: %p %s
FilterIndicateReceiveNetBufferListsHandler: %p %s
FilterCancelSendNetBufferListsHandler: %p %s
InitiateOffloadCompleteHandler: %p %s
TerminateOffloadCompleteHandler: %p %s
UpdateOffloadCompleteHandler: %p %s
InvalidateOffloadCompleteHandler: %p %s
QueryOffloadCompleteHandler: %p %s
IndicateOffloadEventHandler: %p %s
TcpOffloadSendCompleteHandler: %p %s
TcpOffloadReceiveCompleteHandler: %p %s
TcpOffloadDisconnectCompleteHandler: %p %s
TcpOffloadForwardCompleteHandler: %p %s
TcpOffloadEventHandler: %p %s
TcpOffloadReceiveIndicateHandler: %p %s
InitiateOffloadHandler: %p %s
TerminateOffloadHandler: %p %s
UpdateOffloadHandler: %p %s
InvalidateOffloadHandler: %p %s
QueryOffloadHandler: %p %s
TcpOffloadReceiveReturnHandler: %p %s
DirectOidRequestHandler: %p %s
DirectOidRequestCompleteHandler: %p %s
CancelDirectOidRequestHandler: %p %s
TcpOffloadSendHandler: %p %s
TcpOffloadReceiveHandler: %p %s
TcpOffloadDisconnectHandler: %p %s
TcpOffloadForwardHandler: %p %s
Provider[%d]: %p
QueryObjectHandler: %p %s
SetObjectHandler: %p %s
FilterDriverBlock[%d]
InitiateOffloadHandler: %p %s
TerminateOffloadHandler: %p %s
UpdateOffloadHandler: %p %s
InvalidateOffloadHandler: %p %s
QueryOffloadHandler: %p %s
TcpOffloadReceiveReturnHandler: %p %s
TcpOffloadSendHandler: %p %s
TcpOffloadReceiveHandler: %p %s
TcpOffloadDisconnectHandler: %p %s
TcpOffloadForwardHandler: %p %s
ClCreateVcHandler: %p %s
ClDeleteVcHandler: %p %s
ClOidRequestHandler: %p %s
ClOidRequestCompleteHandler: %p %s
ClOpenAfCompleteHandlerEx: %p %s
ClCloseAfCompleteHandler: %p %s
ClRegisterSapCompleteHandler: %p %s
ClDeregisterSapCompleteHandler: %p %s
ClMakeCallCompleteHandler: %p %s
ClModifyCallQoSCompleteHandler: %p %s
ClCloseCallCompleteHandler: %p %s
ClAddPartyCompleteHandler: %p %s
ClDropPartyCompleteHandler: %p %s
ClIncomingCallHandler: %p %s
ClIncomingCallQoSChangeHandler: %p %s
ClIncomingCloseCallHandler: %p %s
ClIncomingDropPartyHandler: %p %s
ClCallConnectedHandler: %p %s
ClNotifyCloseAfHandler: %p %s
CmCreateVcHandler: %p %s
CmDeleteVcHandler: %p %s
CmOpenAfHandler: %p %s
CmCloseAfHandler: %p %s
CmRegisterSapHandler: %p %s
CmDeregisterSapHandler: %p %s
CmMakeCallHandler: %p %s
CmCloseCallHandler: %p %s
CmIncomingCallCompleteHandler: %p %s
CmAddPartyHandler: %p %s
CmDropPartyHandler: %p %s
CmActivateVcCompleteHandler: %p %s
CmDeactivateVcCompleteHandler: %p %s
CmModifyCallQoSHandler: %p %s
CmOidRequestHandler: %p %s
CmOidRequestCompleteHandler: %p %s
CmNotifyCloseAfCompleteHandler: %p %s
DriverVersion: %X
CoCreateVcHandler: %p %s
CoDeleteVcHandler: %p %s
CoActivateVcHandler: %p %s
CoDeactivateVcHandler: %p %s
CoSendNetBufferListsHandler: %p %s
CoRequestHandler: %p %s
CoOidRequestHandler: %p %s
InitiateOffloadHandler: %p %s
TerminateOffloadHandler: %p %s
UpdateOffloadHandler: %p %s
InvalidateOffloadHandler: %p %s
QueryOffloadHandler: %p %s
TcpOffloadSendHandler: %p %s
TcpOffloadReceiveHandler: %p %s
TcpOffloadDisconnectHandler: %p %s
TcpOffloadForwardHandler: %p %s
TcpOffloadReceiveReturnHandler: %p %s
AddDeviceHandler: %p %s
RemoveDeviceHandler: %p %s
FilterResourceRequirementsHandler: %p %s
StartDeviceHandler: %p %s
ServiceName: %S
CoCreateVcHandler: %p %s
CoDeleteVcHandler: %p %s
CoActivateVcHandler: %p %s
CoDeactivateVcHandler: %p %s
CoSendNetBufferListsHandler: %p %s
CoRequestHandler: %p %s
CoOidRequestHandler: %p %s
InitiateOffloadHandler: %p %s
TerminateOffloadHandler: %p %s
UpdateOffloadHandler: %p %s
InvalidateOffloadHandler: %p %s
QueryOffloadHandler: %p %s
TcpOffloadSendHandler: %p %s
TcpOffloadReceiveHandler: %p %s
TcpOffloadDisconnectHandler: %p %s
TcpOffloadForwardHandler: %p %s
TcpOffloadReceiveReturnHandler: %p %s
AddDeviceHandler: %p %s
RemoveDeviceHandler: %p %s
FilterResourceRequirementsHandler: %p %s
StartDeviceHandler: %p %s
OpenNDKAdapterHandler: %p %s
CloseNDKAdapterHandler: %p %s
IdleNotificationHandler: %p %s
CancelIdleNotificationHandler: %p %s
AllocateNetBufferListForwardingContextHandler: %p %s
FreeNetBufferListForwardingContextHandler: %p %s
AddNetBufferListDestinationHandler: %p %s
SetNetBufferListSourceHandler: %p %s
GrowNetBufferListDestinationsHandler: %p %s
GetNetBufferListDestinationsHandler: %p %s
UpdateNetBufferListDestinationsHandler: %p %s
CopyNetBufferListInfoHandler: %p %s
ReferenceSwitchNicHandler: %p %s
DereferenceSwitchNicHandler: %p %s
ReferenceSwitchPortHandler: %p %s
DereferenceSwitchPortHandler: %p %s
ReportFilteredNetBufferListsHandler: %p %s
ImageName: %S
SetNetBufferListSwitchContextHandler: %p %s
GetNetBufferListSwitchContextHandler: %p %s
netio legacy handler %p %s
read netio legacy handler failed, error %d, status %X
read netio legacy handler failed, error %d
%p %s
read netio WfpNblInfoDispTable failed, error %d, status %X
read netio WfpNblInfoDispTable failed, error %d
netio MacShim %p %s
WfpShim[%d] %p %s
Unknown WFP callout size %d
WFP callout[%d]:
ClassifyCallback: %p %s
NotifyCallback: %p %s
uFlowDeleteFunction: %p %s
Exception %X on sysptr seed reading at %p
Decode system scheme - %s
Decode scheme - %s
Cannot read my process cookie, error %X
Trace[%d] %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X (%p) %s
Trace[%d] %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X %p
SystemFunction%3.3d (%p) %s
PFNCLIENT.%s patched by %s (%p)
PFNCLIENT.%s patched %p
check_user32_pfnclient: exception %X occured
PFNCLIENTWORKER.%s patched by %s (%p)
PFNCLIENTWORKER.%s patched %p
ConsoleCtrlHandler[%d]: %s (%p)
ConsoleCtrlHandler[%d]: %p UNKNOWN
ConsoleCtrlHandler: %s (%p)
UnhandledExceptionFilter: %s (%p)
ShimModule: %s (%p)
RtlpStartThreadFunc: %s (%p)
RtlpExitThreadFunc: %s (%p)
RtlpUnhandledExceptionFilter: %s (%p)
RtlSecureMemoryCacheCallback: %s (%p)
TppLogpRoutine: %s (%p)
CsrServerApiRoutine: %s (%p)
LdrpManifestProberRoutine: %s (%p)
LdrpCreateActCtxLanguage: %s (%p)
LdrpReleaseActCtx: %s (%p)
LdrpAppCompatDllRedirectionCallbackFunction: %s (%p)
%s%s!%s patched by %s (addr %p)
%s%s.%d patched by %s (addr %p)
%s%s.%d patched, addr %p
PID %d trace callbacks: %d
Trace[%d] %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X %p %s
Process PID %d has the same token as system process: %p !!!
Process PID %d token: %p
%p %s %8X
%p %s %8X
CheckProc: cannot get modules list for PID %d (%S), error %d, ntstatus %X
CheckProc: cannot get modules list for PID %d (%S), error %d
CheckProcess PID %d (%S):
PEB.PostProcessInitRoutine: %p %s
PEB.PostProcessInitRoutine: %p UNKNOWN
PEB.pShimData: %p
PEB.AppCompat: %p
PEB.FastPebLockRoutine: %p %s
PEB.FastPebLockRoutine: %p UNKNOWN
PEB.FastPebUnlockRoutine: %p %s
PEB.FastPebUnlockRoutine: %p UNKNOWN
Module: %s at %p
Cannot read %s, PID %d, error %d
PID %d: LSA SP %s has %d patched functions in SECPKG_FUNCTION_TABLE:
PID %d: ncrypt has %d patched functions
PID %d: mswsock has %d patched functions in SockProcTable
PID %d: mswsock has %d patched functions in NspVector
PID %d: mswsock has %d patched MSAFD functions
SHAREDINFO.aheList: %p
PID %d: ntdsa has %d patched functions
PID %d - ole32 hooked by %s
PID %d - ole32 hooked by unknown module, addr %p
PID %d: rpcrt4 has %d patched functions
PID %d: basesrv has %d patched user functions
PID %d: winsrv has %d patched user functions
PID %d: winsrv has %d patched cons functions
PID %d: lsasrv has %d patched functions
PID %d: lsasrv has %d patched functions in LsapSspiExtension
PID %d: lsasrv has %d patched functions in LsapLookupExtension
PID %d: lsasrv has %d patched functions in LsapLsasrvIfTable
Cannot alloc %X bytes for EAT checking of %s, PID %d
Cannot read EAT of %s, PID %d
Cannot alloc %X bytes for checking section %s of %s, PID %d
Cannot read section %s content %X bytes of %s, PID %d
Cannot make section %s of %s, PID %d
Module %s section %s has %X patched bytes, PID %d
PID %d: user32 has %d patched imm32 functions
PID %d: advapi32 has %d patched functions
PID %d: kernel32 has %d patched functions
ShimHandler[%d]: %p %s
ShimHandler[%d]: %p UNKNOWN, located at %p
ApplicationRecoveryCallback: %s (%p)
%s, PID %d:
Cannot alloc %X bytes for IAT checking of %s, PID %d
Cannot read IAT (size %X at %p) of %s, PID %d
Cannot find function %s.%s for module %s process %d
Cannot find function %s.%d for module %s process %d
IAT Patched %s.%s in module %s process %d by %s
IAT Patched %s.%s in module %s process %d, addr %p
IAT Patched %s.%d in module %s process %d by %s
IAT Patched %s.%d in module %s process %d
Cannot alloc %X bytes for delayed IAT checking of %s, PID %d
Cannot read delayed IAT (size %X at %p) of %s, PID %d
Cannot find delayed function %s.%s for module %s process %d
Cannot find delayed function %s.%d for module %s process %d
LdrpDllNotificationList: %d
%p %s
Read %d QueuedWorkerItems:
[%d] %p %s
check_drivers_reinit: cannot read size of list, error %d, status %X
check_drivers_reinit: cannot read size of list, error %d
check_drivers_reinit: cannot alloc %X bytes
check_drivers_reinit: cannot read list, error %d, ntstatus %X
check_drivers_reinit: cannot read list, error %d
[%d] Drv %p %s routine %p %s
read_shutdown_notificators: cannot read size of %s, error %d, status %X
read_shutdown_notificators: cannot read size of %s, error %d
read_shutdown_notificators: cannot alloc %X bytes
read_shutdown_notificators: cannot read %s, error %d, ntstatus %X
read_shutdown_notificators: cannot read %s, error %d
[%d] DevObj %p Drv %p (addr %p) %s
[%d] DevObj %p Drv %p %s
MailSlot: %S, server %d (%S)
MailSlot: %S, server %d
NamedPipe: %S, server %d (%S)
NamedPipe: %S, server %d
Flags: %X, server %d (%S)
Flags: %X, creator %d, server %d
Flags: %X, server %d
Endpoints: %d
Endpoint %S PID %d (%S):
Endpoint %S:
RPC controls: %d
%S: %S
%8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X version %d.%d
Cannot load kernel %s
Unknown scheduler: ReadySummary %X DispatcherReadyListHead %X
Unknown scheduler: ReadySummary %X DeferredReadyListHead %X
Unknown scheduler: ReadySummary %X
Readed %d threads, total %d
Thread %p ProcID %X ThreadID %X Win32Thread %p %s
Thread %p ProcID %X ThreadID %X Priority %d Win32Thread %p
Thread %p ProcID %X ThreadID %X %s
Thread %p ProcID %X ThreadID %X Priority %d
reading count of threads on processor %d failed, error %X
%d threads
reading of threads on processor %d failed, error %X
Scheduler index %d
reading count of threads failed, error %X
reading of threads failed, error %X
Cannot find ETHREAD.ServiceTable
Unknown version of ETHREAD, offset %X
Cannot alloc %X bytes for ProcessesAndThreadsInformation
Cannot realloc %X bytes for ProcessesAndThreadsInformation
ProcessesAndThreadsInformation failed, error %X
read_sdt for threadID %X failed, error %d, status %X
read_sdt for threadID %X failed, error %d
ProcessID %X (%S) ThreadID %X SDT %p %s
ProcessID %X ThreadID %X SDT %p %s
read_thread_token for threadID %X failed, error %d, status %X
read_thread_token for threadID %X failed, error %d
ProcessID %X (%S) ThreadID %X token %p ImpersonationLevel %d
ProcessID %X ThreadID %X token %p ImpersonationLevel %d
Cannot detect ETHREAD.StartAddress
Unknown kernel %s, StartAddress %X, IrpList %X, StackLimit %X, StackBase %X
Unknown kernel %s, StartAddress %X, StackLimit %X, StackBase %X
Unknown kernel %s, StartAddress %X, IrpList %X
Unknown kernel %s, StartAddress %X
Cannot read count of system threads, ntstatus %X
Cannot alloc %d bytes
Cannot read system threads, ntstatus %X
%d System Threads
Thread %p Start %p %c stack %p limit %p %s
read IPSec status failed, error %d, status %X
read IPSec status failed, error %d
IPSec status %X
IPSecHandler: %p %s
IPSecQueryStatus: %p %s
IPSecSendCmplt: %p %s
IPSecNdisStatus: %p %s
IPSecRcvFWPacket: %p %s
check_tdi_pnp_clnts: cannot read size of clnts list, error %d, ntstatus %X
check_tdi_pnp_clnts: cannot read size of clnts list, error %d
check_tdi_pnp_clnts: cannot alloc %X bytes
check_tdi_pnp_clnts: cannot read clnts list, error %d, ntstatus %X
check_tdi_pnp_clnts: cannot read clnts list, error %d
TDI PnP clients: %d (readed %d)
[%d]: version %X %S
PnPPowerHandler: %p %s
BindHandler: %p %s
UnBindHandler: %p %s
AddAddressHandler: %p %s
DelAddressHandler: %p %s
Microsoft-Windows-Windows Firewall With Advanced Security
Microsoft-Windows-Kernel-Boot
Microsoft-Windows-EQoS
Microsoft-Windows-XWizards
ASP.NET Events
Microsoft-Windows-UIRibbon
Microsoft-Windows-WPD-CompositeClassDriver
Microsoft-Windows-Wired-AutoConfig
Microsoft-Windows-PrintService
Microsoft-Windows-ApplicationExperience-LookupServiceTrigger
Microsoft-Windows-IDCRL
Microsoft-Windows-MPS-DRV
Microsoft-Windows-P2P-Mesh
Microsoft-Windows-TabletPC-MathRecognizer
Microsoft-Windows-Spell-Checking
Microsoft-Windows-Fax
Microsoft-Windows-GroupPolicy
Microsoft-Windows-Crashdump
Microsoft-Windows-PrintSpooler
Microsoft-Windows-LanguagePackSetup
Microsoft-Windows-OneX
Microsoft-Windows-OfflineFiles-CscApi
Microsoft-Windows-ADSI
Microsoft-Windows-Dhcp-Client
Microsoft-Windows-CertificateServicesClient-AutoEnrollment
Microsoft-Windows-NlaSvc
Microsoft-Windows-Diagnosis-MSDE
Microsoft-Windows-SpoolerWin32SPL
Microsoft-Windows-SPB-ClassExtension
Microsoft-Windows-Kernel-Memory
Microsoft-Windows-Application Server-Applications
Microsoft-Windows-MUI
Microsoft-Windows-P2P-Collab
Microsoft-Windows-Security-Netlogon
Microsoft-Windows-SQM-Events
Microsoft-Windows-USB-USBPORT
Microsoft-Windows-SendTo
Microsoft-Windows-AIT
Microsoft-Windows-P2P-CRP
PrintFilterPipelineSvc_ObjectsGuid
Microsoft-Windows-IME-JPPRED
Microsoft-Windows-WMP
Microsoft-Windows-Eqos-SQM-Provider
MSDADIAG.ETW
Microsoft-Windows-Processor-Aggregator
Microsoft-Windows-ErrorReportingConsole
Microsoft-Windows-SmartCard-TPM-VCard-Module
Microsoft-Windows-User Profiles Service
Microsoft-Windows-Crypto-CNG
Microsoft-Windows-LinkLayerDiscoveryProtocol
Microsoft-Windows-TaskbarCPL
Microsoft-Windows-Networking-Correlation
Microsoft-Windows-RestartManager
Microsoft-Windows-WMPDMCCore
Microsoft-Windows-TCPIP
Microsoft-Windows-MSDTC
Microsoft-Windows-Resources-MrmBc
Microsoft-Windows-Time-Service
Microsoft-Windows-HomeGroup-ProviderService
Microsoft-Windows-DriverFrameworks-UserMode
Microsoft-Windows-Runtime-Networking
Microsoft-Windows-Network-Connection-Broker
Microsoft-Windows-Shell-AppWizCpl
Microsoft-Windows-PDC
Microsoft-Windows-Biometrics
Microsoft-Windows-IME-SCDICCOMPILER
Microsoft-Windows-Wininit
Microsoft-Windows-Dwm-Dwm
Microsoft-Windows-Photo-Image-Codec
Microsoft-Windows-TaskScheduler
Microsoft-Windows-osk
Microsoft-Windows-Kernel-PowerTrigger
Microsoft-Windows-EventLog-WMIProvider
Microsoft-Windows-IME-OEDCompiler
Microsoft-Windows-WER-SystemErrorReporting
Microsoft-Windows-Deplorch
Microsoft-Windows-SPB-HIDI2C
Microsoft-Windows-UxTheme
Microsoft-Windows-BfeTriggerProvider
Microsoft-Windows-Media-Streaming
Microsoft-Windows-Remotefs-UTProvider
Microsoft-Windows-Ntfs-SQM
Microsoft-Windows-User-PnP
Microsoft-Windows-AltTab
Microsoft-Windows-Kernel-StoreMgr
Microsoft-Windows-WindowsColorSystem
Microsoft-Windows-RemoteDesktopServices-RemoteFX-VM-User-Mode-Transport
Microsoft-Windows-MSMPEG2ADEC
Microsoft-Windows-TerminalServices-PnPDevices
Microsoft-Windows-GettingStarted
Microsoft-Windows-Narrator
Windows Wininit Trace
Microsoft-Windows-FileHistory-UI
Microsoft-Windows-MediaFoundation-PlayAPI
Microsoft-Windows-CertificateServicesClient-Lifecycle-System
Microsoft-Windows-BitLocker-Driver-Performance
Microsoft-Windows-PerfProc
Microsoft-Windows-Resource-Leak-Diagnostic
Microsoft-Windows-WebServices
Microsoft-Windows-FileHistory-Service
Microsoft-Windows-MediaEngine
Microsoft-Windows-StartupRepair
Microsoft-Windows-Security-IdentityStore
Microsoft-Windows-IME-SCSetting
Microsoft-Windows-FileHistory-EventListener
Microsoft-Windows-Program-Compatibility-Assistant
Microsoft-Windows-DesktopActivityModerator
Microsoft-Windows-MemoryDiagnostics-Schedule
Microsoft-Windows-FileHistory-Engine
Microsoft-Windows-PerfDisk
Microsoft-Windows-OOBE-Machine-Core
Microsoft-Windows-WLAN-AutoConfig
Microsoft-Windows-FileHistory-ConfigManager
Microsoft-Windows-Search-ProfileNotify
Microsoft-Windows-PerfCtrs
UMPass Driver Trace
Microsoft-Windows-FileHistory-Catalog
Microsoft-Windows-WlanDlg
Microsoft-Windows-CDROM
Microsoft-Windows-Crypto-NCrypt
Certificate Services Client CredentialRoaming Trace
Microsoft-Windows-CredUI
Windows Firewall Service
Microsoft-Windows-FileHistory-Core
Microsoft-Windows-Direct3D11
Microsoft-Windows-DirectoryServices-Deployment
Microsoft-Windows-All-User-Install-Agent
Microsoft-Windows-Kernel-Licensing-StartServiceTrigger
Microsoft-Windows-ServerManager-ManagementProvider
Microsoft-Windows-Diagnosis-ScriptedDiagnosticsProvider
Microsoft-Windows-IIS-W3SVC-WP
Microsoft-Windows-TerminalServices-MediaRedirection-DShow
Microsoft-Windows-Rdms-UI
Microsoft-Windows-Feedback-Service-TriggerProvider
Microsoft-Windows-Eventlog
Microsoft-Windows-CodeIntegrity
Microsoft-Windows-WPDClassInstaller
Microsoft-Windows-NetworkAccessProtection
Microsoft-Windows-UIAutomationCore
Microsoft-Windows-StartLmhosts
Microsoft-Windows-IME-Broker
Microsoft-Windows-Kernel-Process
Microsoft-Windows-CertificateServicesClient
Microsoft-Windows-AppXDeployment
Microsoft-Windows-Shell-Core
Microsoft-Windows-Anytime-Upgrade
Microsoft-Windows-PCI
Microsoft-Windows-WPD-MTPBT
Microsoft-Windows-CertificationAuthorityClient-CertCli
Microsoft-Windows-Srv2
Microsoft-Windows-TunnelDriver-SQM-Provider
Microsoft-Windows-Security-Licensing-SLC
Microsoft-Windows-ATAPort
Microsoft-Windows-Recovery
Microsoft-Windows-GenericRoaming
Microsoft-Windows-Sdbus-SQM
Microsoft-Windows-DirectComposition
Microsoft-Windows-P2PIMSvc
Microsoft-Windows-WCN-Config-Registrar
Microsoft-Windows-WPD-API
Microsoft-Windows-P2P-PNRP
Microsoft-Windows-DeviceUx
Windows Mobile Performance Hooks
Microsoft-Windows-ProcessStateManager
Windows Connect Now
Microsoft-Windows-Networking-RealTimeCommunication
Microsoft-Windows-EventSystem
Microsoft-Windows-Spaceport
Windows Mobile Remote API
Microsoft-Windows-Dhcp-Nap-Enforcement-Client
Microsoft-Windows-WinNat
Windows Mobile AirSync Engine 2
Microsoft-Windows-WCN-Config-Registrar-Secure
Windows Mobile AirSync Engine 1
Microsoft-Windows-Security-Kerberos
Windows Mobile ActiveSync Engine
Microsoft-Windows-WSC-SRV
Microsoft-Windows-Eventlog-ForwardPlugin
Windows Mobile Serial Connectivity
Microsoft-Windows-TerminalServices-SessionBroker-Client
Microsoft-Windows-WMPNSS-PublicAPI
Windows Mobile Desktop Passthrough
Microsoft-Windows-RPC-Events
Microsoft-Windows-LanguageProfile
Microsoft-Windows-Anytime-Upgrade-Events
Microsoft-Windows-Management-UI
Microsoft-Windows-SMBClient
Microsoft-Windows-TerminalServices-RdpSoundDriver
Microsoft-Windows-Dwm-Api
Microsoft-Windows-QoS-qWAVE
Microsoft-Windows-Kernel-Tm-Trigger
Microsoft-Windows-IPNAT
Microsoft-Windows-NetworkBridge
Microsoft-Windows-MPS-CLNT
Microsoft-Windows-Diagnosis-Scheduled
Microsoft-Windows-WMPNSS-Service
Microsoft-Windows-DxpTaskRingtone
Microsoft-Windows-Kernel-AppCompat
Microsoft-Windows-TimeBroker
Microsoft-Windows-DeviceConfidence
Microsoft-Windows-Shell-Shwebsvc
Microsoft-Windows-Diagnostics-Performance
Windows NetworkMap Trace
Microsoft-Windows-TerminalServices-Printers
Microsoft-Windows-AppLocker
Microsoft-Windows-Audio
Microsoft-Windows-LLTD-MapperIO
Microsoft-Windows-HotspotAuth
Microsoft-Windows-Firewall-CPL
Microsoft-Windows-Kernel-IoTrace
Microsoft-Windows-Perflib
Microsoft-Windows-BootUX
Microsoft-Windows-WMPDMCUI
Microsoft-Windows-Disk
Microsoft-Windows-IME-JPLMP
Microsoft-Windows-Security-SPP-UX-Notifications
Microsoft-Windows-TerminalServices-ClientActiveXCore
Microsoft-Windows-IIS-IISReset
Microsoft-Windows-WindowsUIImmersive
Windows Firewall Control Panel
Microsoft-Windows-DeviceSetupManager
Microsoft-Windows-EnrollmentPolicyWebService
Microsoft-Windows-IME-Roaming
Microsoft-Windows-SetupQueue
Microsoft-Windows-SmartCard-Audit
Microsoft-Windows-Servicing
Microsoft-Windows-ACL-UI
Microsoft-Windows-WWAN-CFE
Microsoft-Windows-FCRegSvc
Microsoft-Windows-IIS-IisMetabaseAudit
Microsoft-Windows-Kernel-WDI
Microsoft-Windows-TabletPC-MathInput
Microsoft-Windows-Kernel-General
Windows Media Player Trace
Microsoft-Windows-DxpTaskDLNA
Microsoft-Windows-User Profiles General
Microsoft-Windows-Kernel-WSService-StartServiceTrigger
Microsoft-Windows-WebAuth
Microsoft-Windows-API-Tracing
Microsoft-Windows-FunctionDiscovery
Microsoft-Windows-StickyNotes
Microsoft-Windows-WCN-WscEapPeer-Trace
Microsoft-Windows-QoS-WMI-Diag
Microsoft-Windows-NetworkProvisioning
Microsoft-Windows-Network-DataUsage
Microsoft-Windows-AppSruProv
Microsoft-Windows-WebcamExperience
Microsoft-Windows-EaseOfAccess
Microsoft-Windows-Spellchecking-Host
Microsoft-Windows-IME-CandidateUI
Microsoft-Windows-TPM-WMI
Microsoft-Windows-Security-SPP
Microsoft-Windows-DirectShow-KernelSupport
Microsoft-Windows-Diagnosis-AdvancedTaskManager
Microsoft-Windows-ThemeCPL
Windows Mobile Co-installer
Microsoft-Windows-MPRMSG
Microsoft-Windows-EnhancedStorage-EhStorCertDrv
Microsoft-Windows-NdisImPlatformEventProvider
Microsoft-Windows-FunctionDiscoveryHost
Microsoft-Windows-MediaFoundation-MSVideoDSP
Microsoft-Windows-IME-JPTIP
Windows Kernel Trace
Microsoft-SQLServerDataTools
Microsoft-Windows-ASN1
Microsoft-Windows-Crypto-BCrypt
Microsoft-Windows-HealthCenterCPL
Microsoft-Windows-XAML
Microsoft-Windows-PDFReader
Microsoft-Windows-TerminalServices-ServerUSBDevices
Microsoft-Windows-WWAN-SVC-EVENTS
Microsoft-Windows-Search-ProtocolHandlers
Microsoft-Windows-IdCtrls
Microsoft-Windows-User-ControlPanel
Microsoft-Windows-Runtime-Media
Microsoft-Windows-CAPI2
Windows Mobile Sync Handlers
Microsoft-Windows-PowerCfg
Microsoft-Windows-SrumTelemetry
Microsoft-Windows-Base-Filtering-Engine-Connections
Microsoft-Windows-Sidebar
Microsoft-Windows-NDF-HelperClassDiscovery
Microsoft-Windows-PerfNet
Microsoft-Windows-PortableDeviceStatusProvider
Microsoft-Windows-TabletPC-Platform-Manipulations
Microsoft-Windows-Subsys-SMSS
Microsoft-Windows-LDAP-Client
Microsoft-Windows-Security-SPP-UX-GC
Microsoft-Windows-Media Center Extender
Microsoft-Windows-DiskDiagnostic
Microsoft-Windows-TSF-msutb
Microsoft-Windows-Reliability-Analysis-Agent
{B6501BA0-C61A-C4E6-6FA2-A4E7F8C8E7A0}
Microsoft-Windows-Kernel-Processor-Power
Microsoft-Windows-NCSI
Microsoft-Windows-NetworkConnectivityStatus
Microsoft-Windows-wmvdecod
Microsoft-Windows-ServiceTriggerPerfEventProvider
Microsoft-Windows-Service Pack Installer
Microsoft-Windows-Bluetooth-HidGatt
Microsoft-Windows-TabletPC-Platform-Input-Ninput
Microsoft-Windows-Tcpip-SQM-Provider
Microsoft-Windows-MPS-SRV
Microsoft-Windows-KnownFolders
Microsoft-Windows-NAPIPSecEnf
Microsoft-Windows-EnrollmentWebService
Microsoft-Windows-Deduplication-Change
Microsoft-Windows-OfflineFiles-CscFastSync
Microsoft-Windows-UxInit
Microsoft-Windows-BranchCacheClientEventProvider
Microsoft-Windows-Forwarding
Microsoft-Windows-RPC-Proxy-LBS
Microsoft-Windows-Kernel-Disk
Microsoft-Windows-TriggerEmulatorProvider
Microsoft-Windows-SystemHealthAgent
Microsoft-Windows-Memory-Diagnostic-Task-Handler
Microsoft-Windows-Winsock-WS2HELP
Microsoft-Windows-ThemeUI
Microsoft-Windows-TerminalServices-MediaRedirection
Microsoft-Windows-TerminalServices-ClientUSBDevices
Microsoft-Windows-TabletPC-CoreInkRecognition
Microsoft-Windows-COM
Microsoft-Windows-PnPMgrTriggerProvider
Microsoft-Windows-LoadPerf
Microsoft-Windows-System-Restore
Microsoft-Windows-UserAccountControl
Microsoft-Windows-Services-Svchost
Microsoft-Windows-PushNotifications-Developer
Microsoft-Windows-LiveId
Microsoft-Windows-Security-SPP-UX
Microsoft-Windows-VAN
Microsoft-Windows-FirstUX-PerfInstrumentation
Microsoft-Windows-Kernel-Tm
Microsoft-Windows-Kernel-ShimEngine
Microsoft-Windows-EapHost
Microsoft-Windows-CertPolEng
Microsoft-Windows-MsLbfoEventProvider
Microsoft-Windows-Complus
Microsoft-Windows-EFS
Microsoft-Windows-WwaHost
Microsoft-Windows-ServerManager
Microsoft-Windows-ComDlg32
Microsoft-Windows-MP4SDECD
Microsoft-Windows-PeopleNearMe
Microsoft-Windows-SmartCard-Bluetooth-Profile
Microsoft-Windows-TZUtil
Microsoft-Windows-ApplicationExperience-SwitchBack
Microsoft-Windows-UI-Input-Inking
Microsoft-Windows-VDRVROOT
Windows Firewall NetShell Plugin
Windows Firewall API
Microsoft-Windows-Kernel-Acpi
Microsoft-Windows-WinRM
Microsoft-Windows-Direct3D10_1
Microsoft-Windows-Kernel-LicensingSqm
Microsoft-Windows-SpoolerSpoolss
Microsoft-Windows-FilterManager
Microsoft-Windows-ActionQueue
Microsoft-Windows-IME-KRAPI
Microsoft-Windows-Resource-Exhaustion-Detector
Microsoft-Windows-ApplicationExperienceInfrastructure
Microsoft-Windows-StorSqm
Microsoft-Windows-Search
Microsoft-Windows-HttpEvent
Microsoft-Windows-AxInstallService
Microsoft-Windows-Diagnosis-PerfHost
Microsoft-Windows-International
Microsoft-Windows-CertificateServicesClient-CredentialRoaming
Microsoft-Windows-SoftwareRestrictionPolicies
Microsoft-Windows-Windows Defender
Microsoft-Windows-ShareMedia-ControlPanel
Microsoft-Windows-CertificateServicesClient-Lifecycle-User
Microsoft-Windows-WPD-MTPUS
Microsoft-Windows-DirectWrite
Microsoft-Windows-RPCSS
Microsoft-Windows-DeviceSync
Microsoft-Windows-NcdAutoSetup
Microsoft-Windows-Diagnosis-PCW
Microsoft-Windows-DistributedCOM
ATA Port Driver Tracing Provider
Microsoft-Windows-WebdavClient-LookupServiceTrigger
Microsoft-Windows-USB-USBXHCI
Microsoft-Windows-Diagnosis-PLA
Microsoft-Windows-WlanConn
Microsoft-Windows-Winlogon
Microsoft-Windows-stobject
Microsoft-Windows-Mobile-Broadband-Experience-SmsRouter
Microsoft-Windows-D3D10Level9
Microsoft-Windows-WAS-ListenerAdapter
Microsoft-Windows-ServerManager-MultiMachine
Microsoft-Windows-AppxPackagingOM
Microsoft-Windows-PushNotifications-Platform
Microsoft-Windows-OOBE-Machine-Plugins-Wireless
Microsoft-Windows-IME-JPAPI
SBP2 Port Driver Tracing Provider
Microsoft-Windows-BranchCacheEventProvider
Microsoft-Windows-Immersive-Shell-API
Microsoft-Windows-ntshrui
Microsoft-Windows-KPSSVC
Microsoft-Windows-BitLocker-DrivePreparationTool
Microsoft-Windows-EapMethods-Sim
Microsoft-Windows-Shell-ZipFolder
Microsoft-Windows-Search-Core
Microsoft-Windows-OfflineFiles-CscNetApi
Microsoft-Windows-Diagnosis-WDI
Microsoft-Windows-PortableDeviceSyncProvider
Microsoft-Windows-Diagnostics-PerfTrack-Counters
Microsoft-Windows-Speech-TTS
Microsoft-Windows-Component-Resources-MrmCore-Events
Microsoft-Windows-BranchCache
Microsoft-Windows-SystemEventsBroker
Microsoft-Windows-VolumeControl
Microsoft-Windows-Win32k
Microsoft-Windows-Kernel-WHEA
Microsoft-Windows-P2P-Meetings
Microsoft-Windows-Diagnosis-WDC
Microsoft-Windows-Serial-ClassExtension
Microsoft-Windows-KPSSVC-WPP
Microsoft-Windows-CertificateServices-Deployment
Microsoft-Windows-PerfOS
Microsoft-Windows-ResetEng
Microsoft-Windows-Runtime-Graphics
Microsoft-Windows-IPSEC-SRV
Microsoft-Windows-CorruptedFileRecovery-Server
Windows Mobile Bluetooth Connectivity
Microsoft-Windows-DLNA-Namespace
Microsoft-Windows-WLAN-MediaManager
Certificate Services Client Trace
Microsoft-Windows-BranchCacheSMB
Microsoft-Windows-PrintService-USBMon
Microsoft-Windows-OOBE-Machine
Microsoft-Windows-DXP
Microsoft-Windows-Immersive-Shell
Microsoft-Windows-OOBE-Machine-Plugins
Microsoft-Windows-Reliability-Analysis-Engine
Microsoft-Windows-Application-Experience
Microsoft-Windows-KdsSvc
Microsoft-Windows-MediaFoundation-Platform
Microsoft-Windows-Security-Configuration-Wizard
Microsoft-Windows-DisplayColorCalibration
Windows Mobile Device Center Base
Microsoft-Windows-WPD-MTPClassDriver
Microsoft-Windows-DNS-Client
Microsoft-Windows-MSDTC Client
Microsoft-Windows-NDIS-PacketCapture
Windows Remote Management Trace
Microsoft-Windows-MSPaint
Microsoft-Windows-HomeGroup-ListenerService
Microsoft-Windows-Sensor-Service-Trigger
Microsoft-Windows-EapMethods-Ttls
Microsoft-Windows-Remotefs-Smb
Microsoft-Windows-SMBWitnessClient
Microsoft-Windows-USB-USBHUB
Microsoft-Windows-DirectWrite-FontCache
Microsoft-Windows-WindowsBackup
Microsoft-Windows-NWiFi
Microsoft-Windows-WER-Diag
Microsoft-Windows-UAC
Microsoft-Windows-LUA
Microsoft-Windows-AppID
Microsoft-Windows-IIS-WMSVC
Microsoft-Windows-Shell-OpenWith
Microsoft-Windows-MediaFoundation-MFReadWrite
Microsoft-Windows-BrokerInfrastructure
Microsoft-Windows-Fault-Tolerant-Heap
Microsoft-Windows-Shell-DefaultPrograms
Microsoft-Windows-Dism-Cli
Microsoft-Windows-SMBDirect
Microsoft-Windows-IME-SCTIP
Microsoft-Windows-EnergyEfficiencyWizard
Microsoft-Windows-ParentalControls
Microsoft-Windows-Smartcard-Server
Microsoft-Windows-FMS
Microsoft-Windows-Devices-Location
Microsoft-Windows-LLTD-Responder
Microsoft-Windows-MsLbfoSysEvtProvider
sqlos
Microsoft-Windows-TerminalServices-RemoteConnectionManager
Microsoft-Windows-SCPNP
Microsoft-Windows-Wordpad
WMI_Tracing_Client_Operations
Microsoft-Windows-Security-Audit-Configuration-Client
Microsoft-Windows-EFSADU
Windows Notification Facility Provider
Microsoft-Windows-DiagCpl
Windows NetworkItemFactory Trace
Microsoft-Windows-ApplicationExperience-Cache
Microsoft-Windows-ResourcePublication
Microsoft-Windows-FailoverClustering-Client
Microsoft-Windows-Runtime-Networking-BackgroundTransfer
Microsoft-Windows-AppHost
Microsoft-Windows-NetAdapterCim-Diag
Microsoft-Windows-IIS-FTP
Microsoft-Windows-Iphlpsvc
Microsoft-Windows-WinINet
Microsoft-Windows-TabletPC-InputPersonalization
Microsoft-Windows-SpoolerFilterPipelineSVC
Microsoft-Windows-Globalization
Microsoft-Windows-Bits-Client
Microsoft-Windows-WFP
Microsoft-Windows-Services
Microsoft-Windows-IdleTriggerProvider
Microsoft-Windows-DxgKrnl
Microsoft-Windows-HealthCenter
Microsoft-Windows-OtpCredentialProviderEvt
Microsoft-Windows-MemoryDiagnostics-Results
Microsoft-Windows-Ncasvc
Microsoft-Windows-SystemSettings
Microsoft-Windows-PDH
Microsoft-Windows-WMPNSSUI
Microsoft-Windows-BdeTriggerProvider
Microsoft-Windows-Diagnostics-PerfTrack
Microsoft-Windows-IIS-APPHOSTSVC
Microsoft-Windows-CoreWindow
Microsoft-Windows-Help
Microsoft-Windows-WindowsUpdateClient
Microsoft-Windows-IIS-W3SVC-PerfCounters
Microsoft-Windows-WMI
Microsoft-Windows-TabletPC-Platform-Input-Wisp
Microsoft-Windows-ProcessExitMonitor
Microsoft-Windows-IME-JPSetting
Microsoft-Windows-Diagnosis-Scripted
Microsoft-Windows-GroupPolicyTriggerProvider
File Kernel Trace; Operation Set 2
Microsoft-Windows-IIS-Configuration
Microsoft-Windows-Diagnosis-TaskManager
Microsoft-Windows-Diagnosis-DPS
Microsoft-Windows-UserPnp
Microsoft-Windows-Security-SPP-UX-GenuineCenter-Logging
Microsoft-Windows-Schannel-Events
NetJoin
Microsoft-Windows-TabletPC-InputPanel
Microsoft-Windows-FileServices-ServerManager-EventProvider
Microsoft-Windows-MediaFoundation-Performance
Microsoft-Windows-EndpointTriggerProvider
Microsoft-Windows-IME-KRTIP
Microsoft-Windows-Mobile-Broadband-Experience-SmsApi
Microsoft-Windows-Hyper-V-Netvsc
Microsoft-Windows-DirectSound
Microsoft-Windows-TabletPC-Platform-Input-Core
Microsoft-Windows-PushNotifications-InProc
Microsoft-Windows-Kernel-Network
Microsoft-Windows-DiskDiagnosticResolver
Microsoft-Windows-NdisImPlatformSysEvtProvider
Microsoft-Windows-MeetingSpace
Microsoft-Windows-Base-Filtering-Engine-Resource-Flows
Microsoft-Windows-RasServer
Microsoft-Windows-VHDMP
Microsoft-Windows-WindowsSystemAssessmentTool
Microsoft-Windows-DCLocator
Microsoft-Windows-Diagnosis-MSDT
Microsoft-Windows-WLGPA
SQLSRV32.1
Microsoft-Windows-CertificateServicesClient-CertEnroll
Microsoft-Windows-IME-TCCORE
Microsoft-Windows-SmartCard-Bluetooth-Transport
Microsoft-Windows-WMVENCOD
Microsoft-Windows-mobsync
Microsoft-Windows-EFSTriggerProvider
Microsoft-Windows-DUSER
Microsoft-Windows-DiskDiagnosticDataCollector
Microsoft-Windows-DirectAccess-MediaManager
Microsoft-Windows-DisplaySwitch
Microsoft-Windows-PackageStateRoaming
Microsoft-Windows-Crypto-DPAPI
Microsoft-Windows-IME-CustomerFeedbackManagerUI
sqlserver
Microsoft-Windows-User-Loader
Microsoft-Windows-NetworkProfileTriggerProvider
Microsoft-Windows-NetworkProfile
Windows Firewall API - GP
Microsoft-Windows-CmiSetup
Microsoft-Windows-Sysprep
Microsoft-Windows-Windeploy
Microsoft-Windows-Setup
Microsoft-Windows-OobeLdr
Microsoft-Windows-SetupUGC
Microsoft-Windows-Audit
Microsoft-Windows-SetupCl
Microsoft-Windows-Winsrv
Microsoft-Windows-WinHttp
Microsoft-Windows-RadioManager
Microsoft-Windows-Websocket-Protocol-Component
Microsoft-Windows-WebIO
Microsoft-Windows-Dwm-Core
Microsoft-Windows-Registry-SQM-Provider
Microsoft-Windows-WHEA-Logger
Microsoft-Windows-PeerToPeerDrtEventProvider
Microsoft-Windows-BitLocker-Driver
Microsoft-Windows-SettingSync
Microsoft-Windows-Mobile-Broadband-Experience-Api-Internal
Microsoft-Windows-EnhancedStorage-EhStorTcgDrv
Microsoft-Windows-PowerShell
Microsoft-Windows-DirectShow-Core
Microsoft-Windows-Kernel-Power
Microsoft-Windows-msmpeg2venc
Microsoft-Windows-MPEG2_DLNA-Encoder
Microsoft-Windows-Remote-FileSystem-Log
Microsoft-Windows-Kernel-PnP
Microsoft-Windows-AppXDeployment-Server
Microsoft-Windows-Folder Redirection
Microsoft-Windows-OfflineFiles-CscUM
Microsoft-Windows-ServerManager-DeploymentProvider
Microsoft-Windows-ServiceReportingApi
Microsoft-Windows-StorDiag
Microsoft-Windows-IME-CustomerFeedbackManager
Microsoft-Windows-Kernel-EventTracing
Microsoft-Windows-Kernel-BootDiagnostics
Microsoft-Windows-DXGI
Microsoft-Windows-Build-RegDll
Microsoft-Windows-PNRPSvc
Microsoft-Windows-Ndu
Microsoft-Windows-Firewall
Microsoft-Windows-Wcmsvc
Microsoft-Windows-OLEACC
Microsoft-Windows-MSDTC Client 2
Microsoft-Windows-InputSwitch
Microsoft-Windows-Runtime-WebAPI
Microsoft-Windows-HAL
Microsoft-Windows-International-RegionalOptionsControlPanel
Microsoft-Windows-RPC
Microsoft-Windows-MFH264Enc
Microsoft-Windows-SharedAccess_NAT
Microsoft-Windows-DeviceAssociationService
Microsoft-Windows-Bluetooth-MTPEnum
Microsoft-Windows-BitLocker-API
{C5BFFE2E-9D87-D568-A09E-08FC83D0C7C2}
Microsoft-Windows-IPMIProvider
Microsoft-Windows-IME-TIP
Microsoft-Windows-WindowsToGo-StartupOptions
Microsoft-Windows-Backup
Microsoft-Windows-WMP-MediaDeliveryEngine
Microsoft-Windows-PrintBRM
Microsoft-Windows-ServerManager-ConfigureSMRemoting
Microsoft-Windows-Video-For-Windows
Microsoft-Windows-ClearTypeTextTuner
Microsoft-Windows-Subsys-Csr
Microsoft-Windows-USB-UCX
Microsoft-Windows-RemoteApp and Desktop Connections
Windows Winlogon Trace
Microsoft-Windows-RasSstp
Microsoft-Windows-UAC-FileVirtualization
Microsoft-Windows-ClassicSruMon
Microsoft-Windows-Security-IdentityListener
Microsoft-Windows-WWAN-MM-EVENTS
Microsoft-Windows-MsiServer
Microsoft-Windows-PhotoAcq
Microsoft-Windows-Power-Troubleshooter
Microsoft-Windows-DxpTaskSyncProvider
Microsoft-Windows-Remotefs-Rdbss
Microsoft-Windows-AppIDServiceTrigger
Microsoft-Windows-Kernel-File
Microsoft-Windows-TSF-msctf
Microsoft-Windows-PowerCpl
Microsoft-Windows-LanGPA
Microsoft-Windows-WWAN-MediaManager
Microsoft-Windows-PrimaryNetworkIcon
Microsoft-Windows-OfflineFiles
Microsoft-Windows-UIAnimation
Microsoft-Windows-Security-Auditing
Microsoft-Windows-WCN-Config-Registrar-Wizard-Trace
Microsoft-Windows-WWAN-NDISUIO-EVENTS
Microsoft-Windows-NetworkManagerTriggerProvider
Microsoft-Windows-Winsock-AFD
Microsoft-Windows-Remote-FileSystem-Monitor
Microsoft-Windows-WABSyncProvider
.NET Common Language Runtime
Microsoft-Windows-MSMPEG2VDEC
Microsoft-Windows-DateTimeControlPanel
Windows Firewall Driver
Microsoft-Windows-IIS-W3SVC
Microsoft-Windows-WWAN-UI-EVENTS
Microsoft-Windows-Speech-UserExperience
Microsoft-Windows-Dism-Api
Microsoft-Windows-Store-Client-UI
Microsoft-Windows-Calculator
Microsoft-Windows-Shell-ConnectedAccountState
Microsoft-Windows-PrintDialogs
Microsoft-Windows-Network-and-Sharing-Center
Microsoft-Windows-Crypto-RNG
Microsoft-Windows-MSDTC 2
Microsoft-Windows-SpellChecker
Microsoft-Windows-propsys
Microsoft-Windows-WPD-MTPIP
Microsoft-Windows-Documents
Microsoft-Windows-StorPort
Microsoft-Windows-Magnification
Microsoft-Windows-Shell-AuthUI
Microsoft-Windows-Dwm-Redir
Microsoft-Windows-BTH-BTHUSB
Microsoft-Windows-Ntfs
Microsoft-Windows-Sens
Microsoft-Windows-UserAccessLogging
Microsoft-Windows-RemoteDesktopServices-RdpCoreTS
Microsoft-Windows-COM-Perf
Microsoft-Windows-StorageSpaces-BackgroundAgent
Microsoft-Windows-Kernel-Prefetch
Portable Device Connectivity API Trace
Microsoft-Windows-RemoteAssistance
Microsoft-Windows-MF
Microsoft-Windows-MediaFoundation-MSVProc
Microsoft-Windows-TBS
Microsoft-Windows-FeedbackTool
Microsoft-Windows-WlanPref
Microsoft-Windows-OfflineFiles-CscDclUser
Microsoft-Windows-Http-SQM-Provider
Microsoft-Windows-Wireless-Network-Setup-Wizard-Trace
Microsoft-Windows-MCT
Microsoft-Windows-HotStart
Microsoft-Windows-Diagnostics-Networking
Microsoft-Windows-Sensors
Microsoft-Windows-SmbServer
Microsoft-Windows-USB-USBHUB3
Microsoft-Windows-Dot3MM
Microsoft-Windows-KernelStreaming
Microsoft-Windows-Mobile-Broadband-Experience-Api
Microsoft-Windows-VolumeSnapshot-Driver
Microsoft-Windows-MobilityCenter
Microsoft-Windows-OfflineFiles-CscService
Microsoft-Windows-Superfetch
Microsoft-Windows-IPBusEnum
Microsoft-Windows-Mprddm
Microsoft-Windows-Dwm-Udwm
Microsoft-Windows-AppModel-State
Microsoft-Windows-WCN-FD-Provider-Trace
Microsoft-Windows-Resource-Exhaustion-Resolver
Microsoft-Windows-Iphlpsvc-Trace
Microsoft-Windows-WUSA
Microsoft-Windows-TerminalServices-LocalSessionManager
Microsoft-Windows-RPC-FirewallManager
Microsoft-Windows-WCN-Common-Trace
Microsoft-Windows-MediaFoundation-MFCaptureEngine
Microsoft-Windows-ReadyBoostDriver
Microsoft-Windows-DUI
Microsoft-Windows-WMP-Setup_WM
Microsoft-Windows-Direct3D10
Microsoft-Windows-DfsSvc
Microsoft-Windows-IME-SCCORE
Microsoft-Windows-NTLM
Microsoft-Windows-VWiFi
Microsoft-Windows-Kernel-PnPConfig
Microsoft-Windows-Winsock-SQM
Microsoft-Windows-SpoolerSpoolSV
Microsoft-Windows-Netshell
Microsoft-Windows-UserModePowerService
Microsoft-Windows-HttpService
HTTP Service Trace
Microsoft-Windows-D3D9
Microsoft-Windows-AppModel-Runtime
Microsoft-Windows-CEIP
Microsoft-Windows-Directory-Services-SAM
Microsoft-Windows-SpoolerTCPMon
Microsoft-Windows-ReadyBoost
Microsoft-Windows-L2NACP
Microsoft-Windows-LLTD-Mapper
Microsoft-Windows-Deduplication
Microsoft-Windows-HomeGroup-ControlPanel
Microsoft-Windows-Mobile-Broadband-Experience-Parser-Task
Microsoft-Windows-DomainJoinManagerTriggerProvider
Microsoft-Windows-SruMon
Microsoft-Windows-ELS-Hyphenation
TCPIP Service Trace
Microsoft-Windows-DriverFrameworks-KernelMode
Microsoft-Windows-CorruptedFileRecovery-Client
Microsoft-Windows-WMI-Activity
Microsoft-Windows-COMRuntime
Microsoft-Windows-WAS
Microsoft-Windows-Wnv
Microsoft-Windows-Shsvcs
Microsoft-Windows-NDIS
Microsoft-Windows-WinMDE
File Kernel Trace; Operation Set 1
Microsoft-Windows-Proximity-Common
Microsoft-Windows-Ntfs-UBPM
Microsoft-Windows-Kernel-Registry
Microsoft-Windows-RemoteDesktopServices-RemoteDesktopSessionManager
Microsoft-Windows-TunnelDriver
Microsoft-Windows-QoS-Pacer
Microsoft-Windows-EventCollector
Microsoft-Windows-OOBE-Machine-DUI
Microsoft-Windows-IME-TCTIP
Microsoft-Windows-WCNWiz
Microsoft-Windows-Display
Microsoft-Windows-OcSetup
Microsoft-Windows-DesktopWindowManager-Diag
Microsoft-Windows-FileInfoMinifilter
Microsoft-Windows-TextPredictionEngine
Microsoft-Windows-NetworkGCW
Microsoft-Windows-DHCPv6-Client
Microsoft-Windows-PlayToManager
NDIS_STATUS_TCP_CONNECTION_OFFLOAD_CURRENT_CONFIG
NDIS_STATUS_PORT_STATE
MS_Windows_AeLookupServiceTrigger_Provider
Microsoft_Windows_SQM_Provider
MS_Windows_AIT_Provider
NDIS_TCP_CONNECTION_OFFLOAD_CURRENT_CONFIG
NDIS_TCP_OFFLOAD_CURRENT_CONFIG
PARPORT_WMI_ALLOCATE_FREE_COUNTS_GUID
NDIS_GEN_ENUMERATE_PORTS
GUID_QOS_TC_SUPPORTED
MS1394_PortVendorRegisterAccessGuid
iSCSI_PersistentLoginsGuid
iSCSI_PortalInfoClassGuid
SerailPortPerfGuid
PortClsEvent
UdpIpGuid
TcpIpGuid
iSCSI_OperationsGuid
CTLGUID_usbport
NDIS_STATUS_TCP_CONNECTION_OFFLOAD_HARDWARE_CAPABILITIES
iSCSI_DiscoveryOperationsGuid
SerialPortNameGuid
CTLGUID_WebClntTrace
POINTER_PORT_WMI_STD_DATA_GUID
KEYBOARD_PORT_WMI_STD_DATA_GUID
MSKeyboard_ClassInformationGuid
NDIS_GEN_CO_MEDIA_SUPPORTED
MS_Windows_AeSwitchBack_Provider
SerialPortHWGuid
MS_SM_PortInformationMethods
ataport_CtlGuid
storport_CtlGuid
MS1394_PortDriverInformationGuid
BTHPORT_WMI_HCI_PACKET_INFO
SerialPortCommGuid
iScsiLBOperationsGuid
MS_Windows_AeCache_Provider
NDIS_GEN_PORT_STATE
WindowsBackup TracingControlGuid
WmiMonitorListedSupportedSourceModes_GUID
NDIS_GEN_MEDIA_SUPPORTED
CTLGUID_certprop
BTHPORT_WMI_SDP_SERVER_LOG_INFO
KEYBOARD_PORT_WMI_EXTENDED_ID
iSCSIRedirectPortalGuid
NDIS_GEN_PORT_AUTHENTICATION_PARAMETERS
BTHPORT_WMI_SDP_DATABASE_EVENT
NDIS_TCP_CONNECTION_OFFLOAD_HARDWARE_CAPABILITIES
iSCSI_TCPIPConfigGuid
SerialPortPropertiesGuid
PortCls_IrpProcessing
iSCSI_SecurityConfigOperationsGuid
NDIS_TCP_OFFLOAD_PARAMETERS
PortCls_PowerState
Microsoft_Windows_GameUx
iSCSI_InitiatorLoginStatisticsGuid
MS1394_PortErrorInformationGuid
PortCls_PinState
CTLGUID_PortCls
NDIS_TCP_OFFLOAD_HARDWARE_CAPABILITIES
CTRLGUID_MF_PIPELINE
.PX`i`
`.HBS
&{%UD(_
dump_wmi_guidentries failed, error %d, status %X
dump_wmi_guidentries failed, error %d
dump_wmi_guidentries: cannot alloc %X bytes (total %d)
dump_wmi_guidentries: read failed, error %d, status %X
dump_wmi_guidentries: read failed, error %d
WMI guidentries: total %X readed %X:
[%X] %X flag %X refcnt %X - %s
[%X] %X flag %X refcnt %X %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
dump_wmi_regentries failed, error %d, status %X
dump_wmi_regentries failed, error %d
dump_wmi_regentries: cannot alloc %X bytes (total %d)
dump_wmi_regentries: read failed, error %d, status %X
dump_wmi_regentries: read failed, error %d
WMI regentries: total %X readed %X:
[%X] flags %X refcnt %X dev %p prov %X DS %p %s
[%X] flags %X refcnt %X cb %p prov %X DS %p %s
Etw[%d]:
Type %X Index %X InternalCB %p (%s) %s
Type %X Index %X InternalCB %p %s
Type %X Index %X InternalCB %p (%s) ProviderId: %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
Type %X Index %X InternalCB %p ProviderId: %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
dump_Etw: exception occured, code %X
dump_Etws: exception occured, code %X
KPRCB.EtwSupport %p:
KPRCB[%d].EtwSupport %p:
read_kernel_etws count failed, error %d, ntstatus %X
read_kernel_etws count failed, error %d
read_kernel_etws: cannot alloc %X bytes
read_kernel_etws failed, error %d, ntstatus %X
read_kernel_etws failed, error %d
KEtw[%X]:
KEtw[%X]: RefCount %d, KProvider - %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
KEtw[%X]: RefCount %d %s
[%X] %p %s
Type %X InUse %d Index %X InternalCB %p (%s) %s
Type %X InUse %d Index %X InternalCB %p %s
Type %X InUse %d Index %X InternalCB %p (%s) ProviderId: %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
Type %X InUse %d Index %X InternalCB %p ProviderId: %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
EtwCallback[%d] %p %s:
EtwCallback[%d]:
EtwTrace[%d] %p Ctx %p %s:
EtwTrace[%d] %p Ctx %p %s - %8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
Unknown type %d for Etw[%d]
DEVINTERFACE_MT_TRANSPORT
DEVINTERFACE_KEYBOARD
DEVINTERFACE_COMPORT
DEVINTERFACE_VIAMINIPORT
DEVINTERFACE_STORAGEPORT
DEVINTERFACE_IRPORT
check_pnp_notifiers failed, error %d, status %X
check_pnp_notifiers failed, error %d
check_pnp_notifiers: cannot alloc %X bytes (total %d)
check_pnp_notifiers: read failed, error %d, status %X
check_pnp_notifiers: read failed, error %d
Pnp Notifiers: total %d, readed %d
Pnp[%d] %p %s %s addr %p
Pnp[%d] %s %s addr %p %s
check_pnp_handlers failed, error %d, status %X
check_pnp_handlers failed, error %d
PlugPlayHandlerTable: %d items
PlugPlayHandlerTable[%d] %p %s
PlugPlayHandlerTable[%d] %p
check_sess_notify, error %d, status %X
check_sess_notify, error %d
check_sess_notify: cannot alloc %X bytes (total %d)
check_sess_notify: read failed, error %d, status %X
check_sess_notify: read failed, error %d
IopSessionNotifications: %d
SessionNotifier[%d]: class %d len %X session %p cb %p %s
check_sess_term_ntfs failed, error %d, status %X
check_sess_term_ntfs failed, error %d
check_sess_term_ntfs: cannot alloc %X bytes (total %d)
check_sess_term_ntfs: read failed, error %d, status %X
check_sess_term_ntfs: read failed, error %d
LogonSessionTerminatedRoutines: %d
[%d] %p %s
check_fs_changes failed, error %d, status %X
check_fs_changes failed, error %d
check_fs_changes: cannot alloc %X bytes (total %d)
check_fs_changes: read failed, error %d, status %X
check_fs_changes: read failed, error %d
FS Change notifiers: %d (actual %d)
DriverObj %p addr %p %s
Cannot read count for %s, error %d
Count of %s is too big - %X
Cannot read %s table, error %d
Cannot read entry %d from table of %s, error %d
check_vista_cmp_list get count failed, error %d, status %X
check_vista_cmp_list get count failed, error %d
check_vista_cmp_list failed, error %d, status %X
check_vista_cmp_list failed, error %d
check_ai_cbs: cannot read ExpDisQueryAttributeInformation, error %d, ntstatus %X
check_ai_cbs: cannot read ExpDisQueryAttributeInformation, error %d
ExpDisQueryAttributeInformation %p %s
check_ai_cbs: cannot read ExpDisSetAttributeInformation, error %d, ntstatus %X
check_ai_cbs: cannot read ExpDisSetAttributeInformation, error %d
ExpDisSetAttributeInformation %p %s
check_dbgk_lkmd: cannot read DbgkLkmd_cblist, error %d, ntstatus %X
check_dbgk_lkmd: cannot read DbgkLkmd_cblist, error %d
DbgkLkmd[%d] callback %p %s
check_fsrtl: cannot read FltMgrCallbacks, error %d, ntstatus %X
check_fsrtl: cannot read FltMgrCallbacks, error %d
FltMgrCallbacks: %p %s
check_fsrtl: cannot read FsRtlpMupCalls, error %d, ntstatus %X
check_fsrtl: cannot read FsRtlpMupCalls, error %d
FsRtlpMupCalls: %p %s
check_Iof: cannot read pIofCallDriver, error %d, ntstatus %X
check_Iof: cannot read pIofCallDriver, error %d
pIofCallDriver %p patched by %s
check_Iof: cannot read pIofCompleteRequest, error %d, ntstatus %X
check_Iof: cannot read pIofCompleteRequest, error %d
pIofCompleteRequest %p patched by %s
check_Iof: cannot read pIoAllocateIrp, error %d, ntstatus %X
check_Iof: cannot read pIoAllocateIrp, error %d
pIoAllocateIrp %p patched by %s
check_Iof: cannot read pIoFreeIrp, error %d, ntstatus %X
check_Iof: cannot read pIoFreeIrp, error %d
pIoFreeIrp %p patched by %s
check_Iof: cannot read HvlpHypercallCodeVa, error %d, ntstatus %X
check_Iof: cannot read HvlpHypercallCodeVa, error %d
HvlpHypercallCodeVa %p patched by %s
%SystemRoot%\System32\sxssrv.dll
%SystemRoot%\System32\csrsrv.dll
%SystemRoot%\System32\basesrv.dll
%SystemRoot%\System32\winsrv.dll
%SystemRoot%\System32\lsasrv.dll
%SystemRoot%\System32\ntdll.dll
KiDebugRoutine %p hooked by %s
PspLegoNotifyRoutine %p hooked by %s
KiTimeUpdateNotifyRoutine %p hooked by %s
KiSwapContextNotifyRoutine %p hooked by %s
KiThreadSelectNotifyRoutine %p hooked by %s
Sysenter patched, addr %p not in %s !!!
Mailslot: %S
NamedPipe: %S
DEVCLASS_MULTIPORTSERIAL
DEVCLASS_PORTS
DEVCLASS_KEYBOARD
DEVCLASS_APMSUPPORT
read_dev_chrs(%S) failed, ntstatus %X
DrvObj %p name %S %s
DrvObj %p nameLen %X %s
dev_props failed, status %X
ClassGUID: %S
ClassGUID: %S - %s
Cannot open directory %S, error %X
Cannot realloc %d bytes
Cannot open device directory, error %X
Cannot open driver directory, error %X
Cannot open FileSystem directory, error %X
Unknown HAL private dispatch table version %X
HalAcpiTimerInit: %p %s
HalAcpiTimerCarry: %p %s
HalAcpiMachineStateInit: %p %s
HalAcpiQueryFlags: %p %s
HalAcpiPicStateIntact: %p %s
HalRestoreInterruptControllerState: %p %s
HalPciInterfaceReadConfig: %p %s
HalPciInterfaceWriteConfig: %p %s
HalSetVectorState: %p %s
HalGetApicVersion: %p %s
HalSetMaxLegacyPciBusNumber: %p %s
HalIsVectorValid: %p %s
HalAcpiGetTableDispatch: %p %s
HalAcpiGetRsdpDispatch: %p %s
HalAcpiGetFacsMappingDispatch: %p %s
HalAcpiGetAllTablesDispatch: %p %s
HalAcpiPmRegisterAvailable: %p %s
HalAcpiPmRegisterRead: %p %s
HalAcpiPmRegisterWrite: %p %s
HalHandlerForBus: %p %s
HalHandlerForConfigSpace: %p %s
HalLocateHiberRanges: %p %s
HalRegisterBusHandler: %p %s
HalSetWakeEnable: %p %s
HalSetWakeAlarm: %p %s
HalPciTranslateBusAddress: %p %s
HalPciAssignSlotResources: %p %s
HalHaltSystem: %p %s
HalFindBusAddressTranslation: %p %s
HalResetDisplay: %p %s
HalHandlerForBus: %p %s
HalHandlerForConfigSpace: %p %s
HalLocateHiberRanges: %p %s
HalRegisterBusHandler: %p %s
HalSetWakeEnable: %p %s
HalSetWakeAlarm: %p %s
HalPciTranslateBusAddress: %p %s
HalPciAssignSlotResources: %p %s
HalHaltSystem: %p %s
HalFindBusAddressTranslation: %p %s
HalResetDisplay: %p %s
KdSetupPciDeviceForDebugging: %p %s
KdReleasePciDeviceforDebugging: %p %s
KdGetAcpiTablePhase0: %p %s
KdCheckPowerButton: %p %s
HalVectorToIDTEntry: %p %s
KdMapPhysicalMemory64: %p %s
KdUnmapVirtualAddress: %p %s
HalMmMemoryUsage: %p %s
HalAllocateMapRegisters: %p %s
KdGetPciDataByOffset: %p %s
KdSetPciDataByOffset: %p %s
HalGetInterruptVector: %p %s
HalGetVectorInput: %p %s
HalLoadMicrocode: %p %s
HalUnloadMicrocode: %p %s
HalMcUpdatePostUpdate: %p %s
HalAllocateMessageTarget: %p %s
HalFreeMessageTarget: %p %s
HalDpReplaceBegin: %p %s
HalDpReplaceTarget: %p %s
HalDpReplaceControl: %p %s
HalDpReplaceEnd: %p %s
HalPrepareForBugcheck: %p %s
HalQueryWakeTime: %p %s
HalReportIdleStateUsage: %p %s
HalHandlerForBus: %p %s
HalHandlerForConfigSpace: %p %s
HalLocateHiberRanges: %p %s
HalRegisterBusHandler: %p %s
HalSetWakeEnable: %p %s
HalSetWakeAlarm: %p %s
HalPciTranslateBusAddress: %p %s
HalPciAssignSlotResources: %p %s
HalHaltSystem: %p %s
HalFindBusAddressTranslation: %p %s
HalResetDisplay: %p %s
HalAllocateMapRegisters: %p %s
KdSetupPciDeviceForDebugging: %p %s
KdReleasePciDeviceforDebugging: %p %s
KdGetAcpiTablePhase0: %p %s
KdCheckPowerButton: %p %s
HalVectorToIDTEntry: %p %s
KdMapPhysicalMemory64: %p %s
KdUnmapVirtualAddress: %p %s
KdGetPciDataByOffset: %p %s
KdSetPciDataByOffset: %p %s
HalGetInterruptVector: %p %s
HalGetVectorInput: %p %s
HalLoadMicrocode: %p %s
HalUnloadMicrocode: %p %s
HalMcUpdatePostUpdate: %p %s
HalAllocateMessageTarget: %p %s
HalFreeMessageTarget: %p %s
HalDpReplaceBegin: %p %s
HalDpReplaceTarget: %p %s
HalDpReplaceControl: %p %s
HalDpReplaceEnd: %p %s
HalPrepareForBugcheck: %p %s
HalQueryWakeTime: %p %s
HalReportIdleStateUsage: %p %s
HalTscSynchronization: %p %s
HalWheaInitProcessorGenericSection: %p %s
HalStopLegacyUsbInterrupts: %p %s
HalReadWheaPhysicalMemory: %p %s
HalWriteWheaPhysicalMemory: %p %s
HalDpMaskLevelTriggeredInterrupts: %p %s
HalDpUnmaskLevelTriggeredInterrupts: %p %s
HalDpGetInterruptReplayState: %p %s
HalDpReplayInterrupts: %p %s
HalQueryIoPortAccessSupported: %p %s
HalHandlerForBus: %p %s
HalHandlerForConfigSpace: %p %s
HalLocateHiberRanges: %p %s
HalRegisterBusHandler: %p %s
HalSetWakeEnable: %p %s
HalSetWakeAlarm: %p %s
HalPciTranslateBusAddress: %p %s
HalPciAssignSlotResources: %p %s
HalHaltSystem: %p %s
HalFindBusAddressTranslation: %p %s
HalResetDisplay: %p %s
HalAllocateMapRegisters: %p %s
KdSetupPciDeviceForDebugging: %p %s
KdReleasePciDeviceforDebugging: %p %s
KdGetAcpiTablePhase0: %p %s
KdCheckPowerButton: %p %s
HalVectorToIDTEntry: %p %s
KdMapPhysicalMemory64: %p %s
KdUnmapVirtualAddress: %p %s
KdGetPciDataByOffset: %p %s
KdSetPciDataByOffset: %p %s
HalGetInterruptVector: %p %s
HalGetVectorInput: %p %s
HalLoadMicrocode: %p %s
HalUnloadMicrocode: %p %s
HalMcUpdatePostUpdate: %p %s
HalAllocateMessageTarget: %p %s
HalFreeMessageTarget: %p %s
HalDpReplaceBegin: %p %s
HalDpReplaceTarget: %p %s
HalDpReplaceControl: %p %s
HalDpReplaceEnd: %p %s
HalPrepareForBugcheck: %p %s
HalQueryWakeTime: %p %s
HalReportIdleStateUsage: %p %s
HalTscSynchronization: %p %s
HalWheaInitProcessorGenericSection: %p %s
HalStopLegacyUsbInterrupts: %p %s
HalReadWheaPhysicalMemory: %p %s
HalWriteWheaPhysicalMemory: %p %s
HalInterruptMaskLevelTriggeredLines: %p %s
HalInterruptUnmaskLevelTriggeredLines: %p %s
HalDpGetInterruptReplayState: %p %s
HalDpReplayInterrupts: %p %s
HalQueryIoPortAccessSupported: %p %s
KdSetupIntegratedDeviceForDebugging: %p %s
KdReleaseIntegratedDeviceForDebugging: %p %s
HalEnlightenmentInitialize: %p %s
HalAllocateEarlyPages: %p %s
HalMapEarlyPages: %p %s
HalTimerGetClockOwner: %p %s
HalTimerGetClockConfiguration: %p %s
HalTimerNotifyProcessorFreeze: %p %s
HalTimerPrepareProcessorForIdle: %p %s
HalDiagRegisterLogRoutine: %p %s
HalTimerResumeProcessorFromIdle: %p %s
HalTimerResetLastClockTick: %p %s
HalVectorToIDTEntryEx: %p %s
HalSecondaryInterruptQueryPrimaryInformation: %p %s
HalMaskInterrupt: %p %s
HalUnmaskInterrupt: %p %s
HalIsInterruptTypeSecondary: %p %s
HalAllocateGsivForSecondaryInterrupt: %p %s
HalAddInterruptRemapping: %p %s
HalRemoveInterruptRemapping: %p %s
HalSaveAndDisableEnlightenment: %p %s
HalRestoreHvEnlightenment: %p %s
HalPciEarlyRestore: %p %s
HalInterruptGetLocalIdentifier: %p %s
HalAllocatePmcCounterSet: %p %s
HalCollectPmcCounters: %p %s
HalFreePmcCounterSet: %p %s
HalTimerQueryCycleCounter: %p %s
HalTimerGetNextTickDuration: %p %s
HalPciMarkHiberPhase: %p %s
HalInterruptQueryProcessorRestartEntryPoint: %p %s
HalInterruptRequestSecondaryInterrupt: %p %s
HalInterruptEnumerateUnmaskedInterrupts: %p %s
HalBiosDisplayReset: %p %s
HalGetDmaAdapter: %p %s
HalCheckPowerButton: %p %s
HalMapPhysicalMemoryWriteThrough64: %p %s
HalUnmapVirtualAddress: %p %s
HalKdReadPCIConfig: %p %s
HalKdWritePCIConfig: %p %s
HalTimerQueryWakeTime: %p %s
HalTimerReportIdleStateUsage: %p %s
HalKdEnumerateDebuggingDevices: %p %s
HalFlushIoRectangleExternalCache: %p %s
HalPowerEarlyRestore: %p %s
HalQueryCapsuleCapabilities: %p %s
HalUpdateCapsule: %p %s
HalPciMultiStageResumeCapable: %p %s
check_hal_private_disp_table: cannot read table, error %d, ntstatus %X
check_hal_private_disp_table: cannot read table, error %d
check_hal_disp_table: cannot read table, error %d, ntstatus %X
check_hal_disp_table: cannot read table, error %d
HalQuerySystemInformation: %p %s
HalSetSystemInformation: %p %s
HalQueryBusSlots: %p %s
HalExamineMBR: %p %s
HalIoReadPartitionTable: %p %s
HalIoSetPartitionInformation: %p %s
HalIoWritePartitionTable: %p %s
HalReferenceHandlerForBus %p %s
HalReferenceBusHandler %p %s
HalDereferenceBusHandler %p %s
HalInitPnpDriver %p %s
HalInitPowerManagement %p %s
HalGetDmaAdapter %p %s
HalGetInterruptTranslator %p %s
HalStartMirroring %p %s
HalEndMirroring %p %s
HalMirrorPhysicalMemory %p %s
HalEndOfBoot %p %s
HalMirrorVerify %p %s
HalGetCachedAcpiTable %p %s
HalSetPciErrorHandlerCallback %p %s
read_hal_apci_disp_table return %X bytes, error %d, ntstatus %X
read_hal_apci_disp_table return %X bytes, error %d
Bad HalAcpiDispatchTable version: %X
read_gdt_size failed, error %d, ntstatus %X
read_gdt_size failed, error %d
Cannot alloc %d bytes for GDT entries
read_gdt failed, error %d, ntstatus %X
read_gdt failed, error %d
Descriptor[%d] %s S %d DPL %d type %X base %X limit %X
WinChecker::dump_ldt failed, error %X, ntstatus %X
WinChecker::dump_ldt failed, error %X
WinChecker::dump_ldt: cannot alloc ldt array, size %X
Ldt[%d]:
Base: X
Limit: X
AVL: %d
D/B: %d
DPL: %d
G: %d
P: %d
S: %d
Type: %d
Cannot read code for kinterrupt(%X) thunk, error %d
IDT patched: unknown type %X selector %X addr %p for int%X
IDT patched: unknown selector %X for int%X
IDT patched: int%X has unknown selector %X base %X limit %X addr %p
IDT patched: int%X addr %p by module %s
IDT int%X addr %p KINTERRUPT %p
IDT patched: int%X addr %p
Int%X: selector %X type TASK DPL %X base %X limit %X
Int%X: selector %X type %X DPL %X addr %p base %X limit %X
Int%X: selector %X type %X DPL %X addr %p
read_idt_size failed, error %d, ntstatus %X
read_idt_size failed, error %d
read_idt: cannot alloc %d bytes for IDT storage
read_idt failed, error %d, ntstatus %X
read_idt failed, error %d
Cannot read kinterrupt (%X), error %d
KInterrupt %X (%p):
Size %X type %X
ServiceRoutine %p %s
DispatchAddress %p %s
check_ob_types: cannot read size of ObTypes list, error %d, ntstatus %X
check_ob_types: cannot read size of ObTypes list, error %d
check_ob_types: cannot read %d bytes (readed %d), error %d, ntstatus %X
check_ob_types: cannot read %d bytes (readed %d), error %d
fill_ob_type: cannot read ObType %S (%X), error %d
Cannot read ObType %S (%X), error %d
ObType %S:
DumpProcedure: %p %s
OpenProcedure: %p %s
CloseProcedure: %p %s
DeleteProcedure: %p %s
ParseProcedure: %p %s
SecurityProcedure: %p %s
QueryNameProcedure: %p %s
OkayToCloseProcedure: %p %s
ZwAlpcConnectPortEx
ZwOpenKeyTransactedEx
ZwOpenKeyEx
ZwOpenKeyTransacted
ZwCreateKeyTransacted
ZwAlpcSendWaitReceivePort
ZwAlpcImpersonateClientOfPort
ZwAlpcDisconnectPort
ZwAlpcDeletePortSection
ZwAlpcCreatePortSection
ZwAlpcCreatePort
ZwAlpcConnectPort
ZwAlpcAcceptConnectPort
ZwUnloadKey2
ZwQueryOpenSubKeysEx
ZwLoadKeyEx
ZwQueryPortInformationProcess
ZwWaitForKeyedEvent
ZwReleaseKeyedEvent
ZwOpenKeyedEvent
ZwCreateKeyedEvent
ZwUnloadKeyEx
ZwSaveKeyEx
ZwRenameKey
ZwLockRegistryKey
ZwLockProductActivationKeys
ZwCompressKey
ZwCompactKeys
ZwYieldExecution
ZwUnloadKey
ZwSetValueKey
ZwSetThreadExecutionState
ZwSetInformationKey
ZwSetDefaultHardErrorPort
ZwSecureConnectPort
ZwSaveMergedKeys
ZwSaveKey
ZwRestoreKey
ZwRequestWaitReplyPort
ZwRequestPort
ZwReplyWaitReplyPort
ZwReplyWaitReceivePortEx
ZwReplyWaitReceivePort
ZwReplyPort
ZwReplaceKey
ZwRegisterThreadTerminatePort
ZwQueryValueKey
ZwQueryOpenSubKeys
ZwQueryMultipleValueKey
ZwQueryKey
ZwQueryInformationPort
ZwOpenKey
ZwNotifyChangeMultipleKeys
ZwNotifyChangeKey
ZwLoadKey2
ZwLoadKey
ZwListenPort
ZwImpersonateClientOfPort
ZwFlushKey
ZwEnumerateValueKey
ZwEnumerateKey
ZwDeleteValueKey
ZwDeleteKey
ZwDelayExecution
ZwCreateWaitablePort
ZwCreatePort
ZwCreateNamedPipeFile
ZwCreateKey
ZwConnectPort
ZwCompleteConnectPort
ZwAcceptConnectPort
FindKiServiceTable: relocation type %d found at X
Cannot read body of %s !
Cannot extract index of %s, error %d
kernel %s don`t contains KeServiceDescriptorTable function !
Cannot find SDT in %s
Cannot read ntdll.dll
Cannot read body of %s!
Cannot read body of ZwYieldExecution!
Cannot extract index of ZwYieldExecution, error %d
Cannot extract index of ZwPlugPlayControl , error %d
%s: %p
SDT entry %X (%s) hooked %p %s!
SDT entry %X hooked %p %s!
Need unhook %d items in SSDT
UNHOOK_ITEM: Index %X Offset %X
Unhook SSDT failed, lasterror %d
Unhooked %d SSDT items
NtUserSetProcessRestrictionExemption
NtUserAcquireIAMKey
NtGdiDdDDICreateKeyedMutex2
NtGdiDdDDIOpenKeyedMutex2
NtGdiDdDDIAcquireKeyedMutex2
NtGdiDdDDIReleaseKeyedMutex2
NtUserSetTHQAPublicKey
NtGdiDdDDIReleaseKeyedMutex
NtGdiDdDDIAcquireKeyedMutex
NtGdiDdDDIDestroyKeyedMutex
NtGdiDdDDIOpenKeyedMutex
NtGdiDdDDICreateKeyedMutex
NtUserEndTouchOperation
NtUserSfmDxReportPendingBindingsToDwm
NtGdiDDCCIGetTimingReport
NtUserUnregisterSessionPort
NtUserRegisterSessionPort
NtUserRegisterErrorReportingDialog
NtGdiSetOPMSigningKeyAndSequenceNumbers
NtGdiGetCertificateSize
NtGdiGetCertificate
NtUserWaitForMsgAndEvent
NtUserVkKeyScanEx
NtUserUnregisterHotKey
NtUserUnlockWindowStation
NtUserUnloadKeyboardLayout
NtUserUnhookWindowsHookEx
NtUserSetWindowStationUser
NtUserSetWindowsHookEx
NtUserSetWindowsHookAW
NtUserSetProcessWindowStation
NtUserSetKeyboardState
NtUserSetImeHotKey
NtUserSetConsoleReserveKeys
NtUserRegisterHotKey
NtUserOpenWindowStation
NtUserMapVirtualKeyEx
NtUserLockWindowStation
NtUserLoadKeyboardLayoutEx
NtUserGetProcessWindowStation
NtUserGetKeyState
NtUserGetKeyNameText
NtUserGetKeyboardState
NtUserGetKeyboardLayoutName
NtUserGetKeyboardLayoutList
NtUserGetImeHotKey
NtUserGetCPD
NtUserGetAsyncKeyState
NtUserCreateWindowStation
NtUserCloseWindowStation
NtUserCheckImeHotKey
NtUserCallMsgFilter
NtUserAlterWindowStyle
NtUserActivateKeyboardLayout
NtGdiScaleViewportExtEx
NtGdiDvpWaitForVideoPortSync
NtGdiDvpUpdateVideoPort
NtGdiDvpGetVideoPortConnectInfo
NtGdiDvpGetVideoPortOutputFormats
NtGdiDvpGetVideoPortLine
NtGdiDvpGetVideoPortInputFormats
NtGdiDvpGetVideoPortFlipStatus
NtGdiDvpGetVideoPortField
NtGdiDvpGetVideoPortBandwidth
NtGdiDvpFlipVideoPort
NtGdiDvpDestroyVideoPort
NtGdiDvpCreateVideoPort
NtGdiDvpCanCreateVideoPort
NtGdiDdSetColorKey
read_shadow_sdt failed, error %d
check_win32k_sdt: cannot alloc %d bytes
Cannot read win32k_sdt at %p size %X, error %d
win32k_sdt[%d] (%s) hooked, addr %p %s
win32k_sdt[%d] hooked, addr %p %s
GetNamedPipeServerProcessId
read_kddb read %X bytes, error %d
cannot read MmNonPagedPoolStart (%p), error %d
cannot read MmNonPagedPoolEnd (%p), error %d
cannot read MmPagedPoolStart (%p), error %d
cannot read MmPagedPoolEnd (%p), error %d
cannot read KernelVerifier (%p), error %d
WindowsType: %S
ETHREAD.StartAddress %X
KiProcessorBlock: %p (%X)
KernelVerifier: %X
KeBugCheckCallbackList: %p (%X)
WorkerRoutine: %p %s
IdleFunction: %p %s
IdleFunction: %p %s
KPRCB[%d].WorkerRoutine: %p %s
KPRCB[%d].IdleFunction: %p %s
KPRCB[%d].IdleFunction: %p %s
read_kpcr return %X bytes, error %d, ntstatus %X
read_kpcr return %X bytes, error %d
KPCR[%d] %p major %X minor %X
KPCR[%d] %p
get_os_info return %X bytes, error %d, ntstatus %X
get_os_info return %X bytes, error %d
NtMajorVersion: %d
NtMinorVersion: %d
BuildNumber: %d
GlobalFlag: %X
Processors: %d
MmVerifierFlags %d
MmSystemSize %d %s
DebuggerEnabled %d
DebuggerNotPresent %d
SafeBootMode %d
NXSupportPolicy %X
CR0 %8.8X %s
CR4 %8.8X %s
Cannot open mailslot %S, error %d
get_mail_slot_owner(%S): returned %d bytes, error %d, ntstatus %X
get_mail_slot_owner(%S): returned %d bytes, error %d
Cannot open named pipe %S, error %d
GetNamedPipeServerProcessId(%S) failed, error %d
get_named_pipe_owner(%S): returned %d bytes, error %d, ntstatus %X
get_named_pipe_owner(%S): returned %d bytes, error %d
read_lpc_port_chars: len %d, returned %d bytes, error %d, ntstatus %X
read_lpc_port_chars: len %d, returned %d bytes, error %d
read_unicode_string: len %d, returned %d bytes, error %d, ntstatus %X
read_unicode_string: len %d, returned %d bytes, error %d
read_drivers_list: cannot get size of drivers list, returned %d bytes, error %d, ntstatus %X
read_drivers_list: cannot get size of drivers list, returned %d bytes, error %d
read_drivers_list: cannot alloc %X bytes for driver list
read_drivers_list: cannot read drivers list, error %d, ntstatus %X
read_drivers_list: cannot read drivers list, error %d
%p:%X flags %X LoadCount %d %s
read_KiThreadSelectNotifyRoutine failed, error %d
read_KiSwapContextNotifyRoutine failed, error %d
read_KiTimeUpdateNotifyRoutine failed, error %d
read_PspLegoNotifyRoutine failed, error %d
read_KiDebugRoutine failed, error %d
read_msrs failed, error %d, ntstatus %X
read_msrs failed, error %d
IManageProcess: Cannot OpenProcess %d
IManageProcess: Cannot open process %d
read_win32_process for PID %X failed, error %d, status %X
read_win32_process for PID %X failed, error %d
read_dword(%p, PID %d) failed, error %d, ntstatus %X
read_dword(%p, PID %d) failed, error %d
read_ptr(%p, PID %d) failed, error %d, ntstatus %X
read_ptr(%p, PID %d) failed, error %d
rp_ReadProcessMemory(%p size %X) from %p error %d
read_token for PID %X failed, error %d, status %X
read_token for PID %X failed, error %d
open_proc(%d, access %X) failed, error %d, ntstatus %X
open_proc(%d, access %X) failed, error %d
rp_OpenProcess(%d, access %X) dwRet %d, error %d
rp_TerminateProcess(%p, %X) dwRet %d, error %d
Major %d Minor %d BuildNumber %d PlatformId %d ServicePackMajor %d ServicePackMinor %d SuiteMask %d ProductType %d CSDVersion %S
ProductType: %X
Cannot open RPC control, error %X
msgsvcsend
_ILocalObjectExporter
IVsShell
IWbemLoginClientID
ICertProtect
_IBTFTPApiEvents
_s_PasswordRecovery
wininet_UrlCache
_IObjectExporter
WMsgAPIs
WMsgKAPIs
INCryptKeyIso
HttpProxyMgrProvider
IKeySvcR
WcnTransportRpc
IPortResolve
IWbemLoginHelper
LRpcSIDKey
ISmartCardRootCerts
IDebugPortSupplier2
IAsyncOperation
IPipelineElement
OnlineProviderCertInterface
IBackgroundCopyJobHttpOptions
HttpProxyMgrClient
IStaticPortMappingCollection
IKeySvc
s_WindowsShutdown
IWebBrowser2
IDebugPortSupplierLocale2
IUPnPHttpHeaderControl
WINHTTP_AUTOPROXY_SERVICE
IErcLuaSupport
IDebugPortSupplier3
IKeySvc2
BackupKey
IWerReport
ICertPassage
IStaticPortMapping
IDebugPortSupplierEx2
IWbemLevel1Login
IWebBrowserApp
msgsvc
IShellWindows
RpcBindingFromStringBinding(%S) failed: %d
RpcMgmtInqIfIds(%S) failed: %d
RpcStringBindingCompose failed: %d
RpcBindingFromStringBinding failed: %d
RpcMgmtInqIfIds failed: %d
%8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X version %d.%d : %s
%8.8X-%4.4X-%4.4X-%2.2X%2.2X-%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X version %d.%d : (%s)
RpcMgmtEpEltInqBegin failed: %d
Cannot read npc table, readed %X bytes
rpcrt4
%s.AddressChangeFn: %p %s
rpcrt4_hack::check_myself: exception %d occured
rpcrt4_hack::try_hack: cannot find RpcServerRegisterIfEx
I_RpcInitNdrImports
load_driver(%S) returned %X
Loaded kernel driver: %S
Error loading kernel driver: %ls - 0xx
Error loading kernel driver: %S - 0xx
Error loading kernel driver: %S - OpenSCManager 0xx
tcpip
ClientImmProcessKey
fnHkOPTINLPEVENTMSG
fnHkINLPMSG
fnSENTDDEMSG
fnDWORDOPTINLPMSG
RealMsgWaitForMultipleObjectsEx
PEB.KernelCallbackTable patched, %p
user32_hack::try_hack: bad PE passed
user32_hack::try_hack: cannot read import table
pfnWowMsgBoxIndirectCallback
Unknown apfnDispatch size: %d
%s_hack::try_hack: bad PE passed
%s_hack::try_hack: cannot read exports, error %d
%s_hack::try_hack: cannot find section .data
%s_hack::try_hack: cannot read section .data
%s_hack::try_hack: cannot read section .rdata
%s_hack::try_hack: cannot find section .text
%s_hack::try_hack: cannot read section .text
DxgkReleaseKeyedMutex2
DxgkAcquireKeyedMutex2
DxgkOpenKeyedMutex2
DxgkCreateKeyedMutex2
DxgkReleaseKeyedMutex
DxgkAcquireKeyedMutex
DxgkDestroyKeyedMutex
DxgkOpenKeyedMutex
DxgkCreateKeyedMutex
Cannot read gDxgkInterface, readed %X bytes
WindowHasShadow
DisableProcessWindowsGhosting
zzzUnhookWindowsHook
xxxUpdateWindows
xxxArrangeIconicWindows
SetWindowState
ClearWindowState
SetMsgBox
GetKeyboardType
GetKeyboardLayout
RemotePassthruDisable
xxxRemotePassthruEnable
Cannot read gpsi, readed %X bytes
Cannot read gpsi handlers, readed %X bytes
Cannot read apfnSimpleCall, readed %X bytes
Cannot read gapfnMessageCall, readed %X bytes
Cannot read gapfnScSendMessage, readed %X bytes
Cannot read gaNewProcAddresses, readed %X bytes
Cannot open logfile %S
Cannot create stop event, error %d
Driver %S loaded from %S
SrvGetConsoleKeyboardLayoutName
SrvSetConsoleKeyShortcuts
SrvGetConsoleAliasExes
SrvGetConsoleAliasExesLength
SrvVDMConsoleOperation
SrvGetLargestConsoleWindowSize
SrvExitWindowsEx
winsrv.dll
Unknown size of ConsoleServerApiDispatchTable: %d
Unknown size of UserServerApiDispatchTable: %d
CallUserpExitWindowsEx
GetConsoleAliasExesInternal
GetConsoleAliasExesLengthInternal
SetConsoleKeyShortcuts
GetConsoleKeyboardLayoutNameWorker
SetConsoleOutputCPInternal
GetConsoleOutputCP
GetLargestConsoleWindowSize
reg_ccs_services::read failed - error %d
Cannot open key %S, error %d
SafeSecondaryLog(%d) failed, error %d
SafeSecondaryLog failed, error %d
SafeSendLog(%d) failed, error %d
SafeSendLog failed, error %d
Bad memory %p len %X in dump_hex_buffer
Cannot alloc %d bytes for delayed imports
Cannot alloc %d bytes for imports
read_import_safe(%s) failed %X
Cannot realloc %d bytes for iat
read_delayed_safe(%s) failed %X
store2md_cache: cannot alloc %d bytes
store2md_cache: cannot realloc, alloced %d bytes
wdigest.dll
tspkg.dll
schannel.dll
pku2u.dll
negoexts.dll
msv1_0.dll
livessp.dll
kerberos.dll
umpnpmgr.dll
combase.dll
ntdsa.dll
ntdll.dll
cryptbase.dll
ncrypt.dll
rpcrt4.dll
imm32.dll
user32.dll
kernelbase.dll
kernel32.dll
advapi32.dll
ole32.dll
Cannot alloc %X bytes for relocs
SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\RebootRequired
WS2_32.dll
RPCRT4.dll
GetProcessHeap
GetWindowsDirectoryA
KERNEL32.dll
RegCloseKey
RegOpenKeyExW
RegOpenKeyExA
RegCreateKeyExW
ADVAPI32.dll
GetWindowsDirectoryW
GetCPInfo
RegQueryInfoKeyW
RegEnumKeyW
zcÁ
.?AVMyWindowsChecker@@
.?AV?$rpcrt4_hack@U_IMAGE_NT_HEADERS@@@@
.?AVtcpip_hack@@
.?AV?$import_holder@U_IMAGE_NT_HEADERS@@@CMN@@
.?AVinmem_import_holder@CMN@@
.?AVimport_holder_intf@CMN@@
.?AVmodule_import@CMN@@
<requestedExecutionLevel level="requireAdministrator" uiAccess="false"/>
aR.Rn
X.UJ^A
w%xyW
f.Gkf
%0X0m0
>$?(?,?0?
3&4;456?90:
77g7
7>7[7`7|7
6#8*878^8~8
<#<0<^<@=
11_1
0#101#202
0 11h1J3
< <$<(<,<0<
6%7S7
7*717>7[8
=!>&>9>>>
7&7@7l78N8V8z8
:);4;>;\;
0%0X0
= >$>(>,>0>
?,?4?<?\?|?
.----/01/01/01
KERNEL32.DLL
mscoree.dll
U%SystemRoot%\system32\svchost.exe
%SystemRoot%\system32\svchost
WSOCKTRANSPORT
TCPIP6
TCPIP
STORPORT
STORMINIPORT
SOFTPCI
SCSIPORT
SCSIMINIPORT
SBP2PORT
FCPORT
PassiveWatchdogTimeout
sImageExecutionOptions
ErrorPortStartTimeout
ErrorPortCommTimeout
DisablePagingExecutive
DebuggerMaxModuleMsgs
CountOperations
B\\.\
Psapi.dll
sWindows PowerShell
tHost Process for Windows Tasks
Windows Problem Reporting 32 bit
Windows Problem Reporting
Windows Modules Installer
mWindows Start-Up Application
tWindows Search Indexer
sWindows Server Initial Configuration Tasks
Windows Media Player
Dump Reporting Tool
Error Reporter
rWindows Control Panel 32 bit
Windows Control Panel
Windows Connect Now - Config Registrar Service
Windows Media Player Network Sharing Service
Windows firewall
Windows Error Reporting Service
tWindows Defender
vError reporting service
eWindows update service
Windows Image Acquisition
WebClient
tWindows Security Center Notification App
yWindows Based Script Host
Windows installer 32 bit
Windows installer
Windows 16-bit Virtual Machine
Windows Management Instrumentation
Windows User Mode Driver Manager
MS tftp
MS ftp 32 bit
MS ftp
Microsoft Help and Support Center
Cmd.exe 32 bit
Cmd.exe
Windows Logon User Interface Host
Windows update
tGoogle Chrome
rOpera Internet Browser
Mozilla Thunderbird Mail and News Client
dFirefox browser
Services.exe
%SystemRoot%\msagent\agentsvr.exe
%SystemRoot%\System32\dfrgfat.exe
%SystemRoot%\System32\dfrgntfs.exe
%SystemRoot%\System32\services.exe
%SystemRoot%\System32\svchost.exe
%SystemRoot%\System32\alg.exe
%SystemRoot%\System32\spoolsv.exe
%SystemRoot%\System32\net.exe
%SystemRoot%\System32\net1.exe
%SystemRoot%\System32\cmd.exe
%SystemRoot%\System32\notepad.exe
%SystemRoot%\System32\calc.exe
%SystemRoot%\System32\PTF.exe
%SystemRoot%\System32\tPTF.exe
%SystemRoot%\System32\telnet.exe
%SystemRoot%\System32\taskkill.exe
%SystemRoot%\System32\ctfmon.exe
%SystemRoot%\System32\wdfmgr.exe
%SystemRoot%\System32\mmc.exe
%SystemRoot%\System32\userinit.exe
%SystemRoot%\System32\wbem\wmiprvse.exe
%SystemRoot%\System32\wbem\wmiadap.exe
%SystemRoot%\explorer.exe
%SystemRoot%\System32\lsass.exe
%SystemRoot%\System32\winlogon.exe
%SystemRoot%\System32\LogonUI.exe
%SystemRoot%\System32\wuauclt.exe
%SystemRoot%\System32\wuauclt1.exe
%SystemRoot%\System32\CCM\CcmExec.exe
%SystemRoot%\System32\csrss.exe
%SystemRoot%\System32\smss.exe
\SystemRoot\System32\smss.exe
%SystemRoot%\System32\inetsrv\w3wp.exe
%SystemRoot%\System32\schtasks.exe
%SystemRoot%\System32\tstheme.exe
%SystemRoot%\System32\control.exe
%SystemRoot%\System32\taskmgr.exe
%SystemRoot%\System32\dwwin.exe
%SystemRoot%\System32\drwtsn32.exe
%SystemRoot%\System32\dumprep.exe
%SystemRoot%\System32\dfssvc.exe
%SystemRoot%\System32\dllhost.exe
%SystemRoot%\System32\ntvdm.exe
%SystemRoot%\System32\rundll32.exe
%SystemRoot%\System32\msiexec.exe
%SystemRoot%\System32\mshta.exe
%SystemRoot%\System32\regsvr32.exe
%SystemRoot%\System32\cscript.exe
%SystemRoot%\System32\wscript.exe
%SystemRoot%\System32\wscntfy.exe
%SystemRoot%\System32\mstsc.exe
%SystemRoot%\System32\dashost.exe
far.exe
Far.exe
CLSID\{FC7D9E02-3F9E-11d3-93C0-00C04F72DAF7}\InprocServer32
CLSID\{73FDDC80-AEA9-101A-98A7-00AA00374959}\LocalServer32
CLSID\{0002DF01-0000-0000-C000-000000000046}\LocalServer32
iedw.exe
%SystemRoot%\System32\oobechk.exe
%SystemRoot%\System32\oobe.exe
%SystemRoot%\System32\psxss.exe
%SystemRoot%\System32\internat.exe
AcroRd32.exe
excel.exe
outlook.exe
winword.exe
powerpnt.exe
wmplayer.exe
firefox.exe
thunderbird.exe
Opera.exe
WinRAR.exe
%SystemRoot%\System32\wininit.exe
%SystemRoot%\System32\lsm.exe
%SystemRoot%\System32\dwm.exe
%SystemRoot%\System32\werfault.exe
%SystemRoot%\System32\taskeng.exe
%SystemRoot%\System32\conime.exe
%SystemRoot%\System32\wudfhost.exe
%SystemRoot%\System32\taskhost.exe
%SystemRoot%\System32\conhost.exe
%SystemRoot%\System32\rdpclip.exe
%SystemRoot%\System32\SearchFilterHost.exe
%SystemRoot%\System32\SearchProtocolHost.exe
csrss.exe
svchost.exe
alg.exe
sPptpMiniport
Tcpip
psapi.dll
127.0.0.1
\\.\pipe\
\\.\mailslot\
SOFTWARE\Microsoft\Windows NT\CurrentVersion
\\.\Pipe\
\\.\Mailslot\
ncacn_ip_tcp:
ncadg_ip_udp:
\\pipe\\
SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\
SOFTWARE\Microsoft\PowerShell\1\ShellIds\Microsoft.PowerShell
RemediationExe
SOFTWARE\Classes\SCCM.VAppLauncher\shell\Open\command
SOFTWARE\Classes\CLSID\{00AAB372-0D6D-4976-B5F5-9BC7605E30BB}\LocalServer32
SOFTWARE\Classes\CLSID\{3C296D07-90AE-4FAC-86F9-65EAA8B82D22}\LocalServer32
SOFTWARE\Classes\CLSID\{D63B10C5-BB46-4990-A94F-E40B9D520160}\LocalServer32
SOFTWARE\Classes\CLSID\{03e64e17-b220-4052-9b9b-155f9cb8e016}\LocalServer32
SOFTWARE\Classes\CLSID\{1F69F884-285E-418E-9715-B9EEE402DD5F}\LocalServer32
Software\Microsoft\Windows\CurrentVersion\WINEVT\publishers
Windows checker
1.0.0.3432
wincheck.exe
0, 0, 8, 16

hmwooYMM.exe_404_rwx_05990000_00001000:

.text
.rdata
@.data

hmwooYMM.exe_404_rwx_06290000_00005000:

.text
`.rdata
@.data
.reloc
brieflz.dll

hmwooYMM.exe_404_rwx_062A0000_00020000:

33.52878980,-86.74808730
hXXps://twitter.com/dedricyoung/status/540256799258333184
hXXp://VVV.fortressbtcaz.com/atm-locations/
hXXps://twitter.com/ZenBox_Kiosk/status/544511003741134848
hXXps://twitter.com/holdn2aces/status/539192798285955072
hXXp://bitcoinmerchant.com/atm/
hXXp://newsbtc.com/2014/06/14/los-angeles-slated-get-two-bitcoin-atms-next-week/
hXXp://coinagellc.com/
hXXp://coinucopia.io/
hXXp://coinpath.us/
hXXp://bitcoinmerchant.com/?gd_place=downtown-johnny-browns
VVV.coinspeaker.com/2014/09/10/exclusive-bitaccess-btm-launch-in-san-francisco/
Skyhook Bitcoin ATM machine in San Marcos at Rossi's Pizza & Sports Bar
Rossi's Pizza & Sports Bar
hXXp://bitcoinmerchant.com/places/rossis-pizza/
hXXp://VVV.eventbrite.com/e/the-state-of-crypto-at-hero-city-at-draper-university-tickets-11764007463
hXXp://VVV.publicwire.com/coin-citadel-announces-official-launch-with-installation-of-its-first-bitcoin-atm/
hXXps://xbteller.com/locations/
hXXps://VVV.xbteller.com/amagi-metals-home-second-denver-bitcoin-atm/
hXXps://denverbitcoincenter.com/?page_id=139
hXXp://VVV.reddit.com/r/Bitcoin/comments/28m7bg/photo_of_the_diy_bitcoin_atm_in_fort_collins/
38.92182910,-77.04205270
hXXp://VVV.washingtoncitypaper.com/blogs/citydesk/2014/12/02/the-diner-gets-d-c-s-first-bitcoin-atm/
33.95813880,-83.37524090
hXXp://VVV.reddit.com/r/Bitcoin/comments/2qheol/new_bitcoin_atm_in_downtown_athens_ga/
33.77307770,-84.40334350
hXXp://VVV.coinfucius.io/
33.78539490,-84.41705430
hXXp://VVV.reddit.com/r/Bitcoin/comments/2ddn9w/first_public_bitcoin_atm_vending_machine_in/
33.77444410,-84.37123040
33.94159090,-84.52270910
hXXp://VVV.reddit.com/r/SPSU/comments/2hgykc/bitcoin_atm/
hXXp://VVV.yelp.com/biz_photos/boise-techmall-boise-2?pt=biz_photo&ref=twitter&select=aoi04bUd6dtDxq_Bi5Us7w#aoi04bUd6dtDxq_Bi5Us7w
41.94273670,-87.65328300
hXXp://VVV.chicagotribune.com/news/local/breaking/chi-bitcoin-theres-an-atm-for-that-20140728,0,6190181.story
41.85836980,-87.66027450
hXXp://VVV.redleafchicago.com/2014/11/24/hello-world/
41.91028290,-87.67650120
hXXps://twitter.com/redleafatm/status/550113806098386944
41.88849150,-87.63553370
hXXp://VVV.reddit.com/r/Bitcoin/comments/2gsozf/review_of_robocoin_atm_at_the_merchandise_mart_in/
Skyhook Bitcoin ATM machine in Edwardsville at Unkle Munkeys Coin Club
Unkle Munkeys Coin Club
38.78777230,-89.98093500
hXXps://twitter.com/UnkleMunkeyBrnd/status/523589044459286529/photo/1
41.88127910,-87.83888830
39.77035910,-86.07256720
101 S.Broadway , Leavenworth, KS 66048, United States
39.31801960,-94.92100830
hXXp://VVV.coinsignal.info/content/atm-locations-2/tom-anns-haircolorists-location/
Skyhook Bitcoin ATM machine in Overland Park at New Century Imports LLC
New Century Imports LLC
38.97129120,-94.70203300
38.85501440,-94.67620420
hXXps://twitter.com/bitcoinbeamer/status/538014497118515200
42.35179480,-71.05668790
hXXp://libertyteller.com/
42.37269250,-71.11978470
42.36267440,-71.08670470
42.36345490,-71.10122130
hXXp://VVV.ihavebitcoins.com/featured/restaurant-moksa-near-mit-gets-new-bitcoin-atm/
42.36355600,-71.10113130
hXXps://twitter.com/VeggieGalaxy/status/516761507657707520
42.37258260,-71.11988000
hXXp://zenbox.us/locations/
39.28489060,-76.58884800
hXXp://VVV.baltimoresun.com/business/bs-bz-bitcoin-atm-20141020-story.html
42.49912210,-83.41944430
hXXp://VVV.reddit.com/r/Bitcoin/comments/26v5wi/bitcoin_atm_now_at_the_bronx_deli_of_farmington/
42.97936190,-85.67162640
hXXp://VVV.reddit.com/r/Bitcoin/comments/2emxaa/grand_rapids_bitcoin_atm/
39.10784540,-94.58435200
38.80531710,-94.45661780
hXXp://pressreleases.kcstar.com/release/messages/67131/
38.81283130,-94.47858170
hXXp://VVV.coinsignal.info/content/atm-locations-2/old-gold-guys-raymore-mo-location/
38.58176160,-90.24435210
hXXps://twitter.com/KryptozCom/status/502222720499589120/photo/1
35.91338200,-79.05472740
hXXp://VVV.reddit.com/r/Bitcoin/comments/2jnd7d/north_carolinas_1st_btm/
47.92078110,-97.09040020
hXXp://coinoutletatm.com/university-of-north-dakotas-center-for-innovation-offers-new-feature-for-spring-semester-a-coinoutlet-bitcoin-atm/
Skyhook Bitcoin ATM machine in Grand Forks at DOSHOST.net
DOSHOST.net
47.92156240,-97.09073040
hXXp://VVV.doshost.net/archives/176
41.23908300,-96.01426430
hXXps://VVV.facebook.com/jonasthebtm
42.91533290,-72.24737760
hXXps://VVV.facebook.com/101Deals
42.98514670,-71.46335890
hXXp://VVV.reddit.com/r/Bitcoin/comments/2kw1u1/what_happens_when_you_buy_bitcoin_and_beer_in/
hXXp://VVV.reddit.com/r/Bitcoin/comments/2eeg7q/albuquerque_nm_gets_two_bitcoin_vending_machines/
hXXp://VVV.prweb.com/releases/2014/12/prweb12401593.htm
hXXp://VVV.coinsetter.com/bitcoin-news/2014/05/22/d-becomes-first-casino-offer-robocoin-bitcoin-atm/
hXXp://techcrunch.com/2014/07/30/robocoin-opens-the-first-bitcoin-atm-in-vegas-baby/
hXXp://VVV.reddit.com/r/Bitcoin/comments/2igl72/nu_yalk_pizza_in_reno_nv_is_the_first_place_ive/
42.65414720,-73.75056760
hXXp://VVV.meetup.com/Capital-Region-Bitcoin-Meetup/events/188256382/
40.72318430,-73.95300660
hXXps://twitter.com/GetCoinCafe/status/499756817065730050/photo/1
42.92440570,-78.87723450
hXXp://VVV.reddit.com/r/Bitcoinbuffalo/comments/2lzb29/first_bitcoin_atm_available_on_elmwood_and_bidwell/
40.76572000,-73.99072000
hXXps://VVV.facebook.com/photo.php?fbid=10105453692972440
40.73407350,-74.00059840
hXXp://VVV.reddit.com/r/Bitcoin/comments/2e0s3w/nyc_finally_getting_a_bitcoin_atm_this_thursday/
40.76571540,-73.99068730
hXXp://press.pycbitcoin.com/2014/10/bitcoin-atm-launches-following.html
39.98534430,-83.00557680
hXXps://twitter.com/champbronc2/status/523469285679980544
41.66751060,-81.37184000
36.18479680,-95.99309440
hXXp://VVV.kjrh.com/news/local-news/internet-cafe-opens-in-north-tulsa-offers-bitcoin-machine
Genesis Coin Bitcoin ATM machine in Portland at Float On
Portland
4530 SE Hawthorne Blvd, Portland, OR 97215, United States
hXXp://VVV.reddit.com/r/Bitcoin/comments/2da9o4/so_found_this_today_first_bitcoin_atm_in_oregon/
Robocoin Kiosk Bitcoin ATM machine in Portland at Pioneer Place Mall
700 SW 5th Ave, Portland, OR 97204, United States
hXXp://VVV.bitcoinnw.com/bitcoin-kiosk.html
Skyhook Bitcoin ATM machine in Portland at BrainSilo - PDX Hackerspace
2119 N Kerby Ave #2, Portland, OR 97227, United States
40.04612850,-76.29624260
hXXp://fox43.com/2014/11/14/pas-first-bitcoin-atm-comes-to-lancaster/
32.78545680,-79.93438070
hXXp://newsbtc.com/2014/04/10/south-carolina-gets-first-robocoin-bitcoin-atm/
30.22374910,-97.76737460
hXXp://VVV.youtube.com/watch?v=9Ar8c9XxK4c
30.27983720,-97.71969370
hXXps://twitter.com/coinadvocate/status/508060577668030464
30.26679860,-97.74201950
hXXp://VVV.vcpost.com/articles/21752/20140219/robocoin-to-open-first-bitcoin-atm-in-the-us-on-february-20-2014.htm
30.28229400,-97.74244140
hXXps://twitter.com/TheBitMom/status/493924033717497856
32.81172470,-96.81330560
hXXp://VVV.meetup.com/Dallas-Bitcoin-User-Meetup/events/206533132/
32.78350520,-96.78315360
hXXp://VVV.reddit.com/r/Bitcoin/comments/2e6k65/dallas_welcomes_its_first_bitcoin_atm/
32.80706400,-96.79732070
33.20260650,-97.12707060
hXXp://VVV.reddit.com/r/Bitcoin/comments/2cwqrr/first_bitcoin_atm_near_university_of_north_texas/
29.75210320,-95.35772430
hXXp://VVV.houstonchronicle.com/business/article/Bitcoin-ATM-gives-Houstonians-access-to-digital-5948585.php
CoinOutlet Bitcoin ATM machine in Salt Lake City at Overstock.com Headquarters
Overstock.com Headquarters
hXXp://VVV.nasdaq.com/press-release/overstockcom-installs-bitcoin-atm-at-corporate-hq-20150109-00300
39.00418990,-77.43031500
hXXp://VVV.blockbox.io/bitcoin-machine/
Skyhook Bitcoin ATM machine in Burlington at Blu-Bin
Burlington
49 Church St, Burlington Town Center, Burlington, VT 05401, USA
44.47881370,-73.21287710
hXXps://VVV.cryptocoinsnews.com/first-bitcoin-atm-vermont/
Robocoin Kiosk Bitcoin ATM machine in Seattle at Spitfire Sports Bar
Spitfire Sports Bar
hXXp://newsbtc.com/2014/05/01/two-way-bitcoin-atm-hits-seattle-washington/
hXXp://dailyuw.com/archive/2014/10/01/news/bitcoin-atm-unveiled-condon-hall
hXXp://pointofcoin.com/2015/01/09/bitcoin-atm-now-open-in-vancouver-westfield/
43.04024220,-87.91463640
hXXps://VVV.facebook.com/firstbtmofmke
hXXp://bitcoinagile.com/48B7F/calgary-gets-first-ever-bitcoin-atm-courtesy-of-business-duo_stream
hXXp://btcsolutions.ca/atm/
hXXp://newsbtc.com/2014/02/26/robocoin-bitcoin-atm-debut-north-americas-largest-shopping-mall-thursday/
hXXp://VVV.reddit.com/r/Bitcoin/comments/285ja2/247_bitcoin_atm_available_for_edmonton_and_area/
hXXp://coinrangers.com/coin/
hXXp://VVV.straight.com/blogra/663831/bitcoin-atm-coming-bcit-campus-burnaby
hXXp://VVV.reddit.com/r/BitcoinCA/comments/2qok16/press_release_new_bitcoin_atms_hit_the_tricities/
hXXps://twitter.com/ThirstyCamelCaf/status/518255929633304576
Genesis Coin Bitcoin ATM machine in Port Moody at IBAY Computers
Port Moody
2929 Saint Johns Street, Port Moody, BC V3H 2C2, Canada
hXXp://VVV.bitsent.ca/map
hXXp://VVV.bitnational.com/
hXXps://twitter.com/Cdn_Crypto/status/543480858343403521
Lamassu Bitcoin ATM machine in Vancouver at Decentral.bangtown
Decentral.bangtown
hXXp://VVV.reddit.com/r/Bitcoin/comments/28dfca/quadriga_cx_plans_to_install_30_bitcoin_atms_in/ci9zg3c
hXXp://VVV.straight.com/blogra/669211/more-bitcoin-atms-vancouver
hXXp://VVV.straight.com/blogra/587466/vancouver-now-home-two-bitcoin-atms
hXXp://VVV.coindesk.com/money-spinners-london-break-bitcoin-atm-record/
hXXp://newsbtc.com/2014/06/05/vancouver-second-robocoin-bitcoin-atm/
hXXp://VVV.vancitybuzz.com/2013/10/first-in-line-at-the-worlds-first-bitcoin-atm/
hXXps://twitter.com/btcsolutionsca/status/559194591966949376
hXXp://VVV.bitbrokersinc.com/#atm
hXXp://newsbtc.com/2014/04/21/genesis1-bitcoin-atm-enters-service-whistler-british-columbia/
49.88150330,-97.12862610
hXXp://winnipeg.ctvnews.ca/winnipeg-s-first-bitcoin-atm-now-accepting-cash-1.1688529
49.89338320,-97.11771920
hXXps://VVV.facebook.com/evolutionbitcoin/photos/a.1488240341457496.1073741829.1476806912600839/1493331734281690/
44.63694800,-63.58923930
hXXp://unews.ca/dal-gets-its-own-bitcoin-atm/
44.64621300,-63.57422600
hXXp://VVV.cbc.ca/news/canada/nova-scotia/bitcoin-atm-in-halifax-a-first-in-atlantic-canada-1.2609131
43.52108390,-80.21082490
hXXp://VVV.guelphmercury.com/news-story/4584672-bitcoin-atms-open-door-for-digital-currency-in-guelph/
45.29577870,-75.89239140
hXXp://VVV.reddit.com/r/BitcoinCA/comments/2bk7mc/bitcoin_in_the_burbs729_kanata/
43.57768340,-79.61418730
hXXp://VVV.coindesk.com/money-spinners-canada-grow-already-prominent-atm-presence/
46.33128330,-79.46549620
hXXp://crypto-kiosk.ca/
45.42919230,-75.69278320
hXXp://VVV.resilient21.com/atm/
45.42371560,-75.68125520
hXXp://VVV.reddit.com/r/Bitcoin/comments/25viks/lamassu_atm_now_live_in_father_and_sons_in_ottawa/
43.64514770,-79.39501910
hXXp://VVV.reddit.com/r/Bitcoin/comments/2djjfm/fleet_of_six_new_bitcoin_atms_arrive_in_shopping/
43.64094260,-79.39385000
43.66240410,-79.42280600
hXXp://torontogold.com/buy-bitcoin/
43.66622250,-79.38491910
43.65874250,-79.43919770
hXXps://twitter.com/QuadrigaCoinEx/status/525488493603328000
45.45554590,-73.46503580
hXXp://instacoinatm.com/locations.html
45.43482740,-73.67417530
hXXp://instacoinatm.com/bitcoin-lachine-en.html
45.56092640,-73.74138730
3485 Boulevard, St.Laurent, Montreal Quebec, Canada
45.51312360,-73.57073370
45.53580200,-73.57175980
hXXp://VVV.reddit.com/r/Bitcoin/comments/25df3t/first_2way_bitcoin_atm_in_montreal/
45.49817570,-73.65729260
hXXps://twitter.com/BitcoinBrands/status/519974574566674435
45.51396230,-73.57285980
45.51059480,-73.68914560
45.50008080,-73.57587080
45.52475440,-73.58463930
45.49819020,-73.62641400
hXXp://VVV.autocoinage.com/
45.54618810,-73.57606800
46.83774910,-71.22319340
hXXp://newsbtc.com/2014/04/05/genesis1-bitcoin-atm-goes-active-duty-quebec-city/
45.59196170,-73.58144440
45.89097500,-74.16173320
45.71786010,-73.51134730
hXXp://VVV.fox5vegas.com/story/25851972/first-lamassu-bitcoin-atm-to-open-in-quebec
45.48777730,-73.58653400
hXXp://VVV.reginabitcoin.ca/
hXXps://localbitcoins.com/ad/109315/bitcoin-atm-3-morgan-terrace-bardon-qld-4065-australia
hXXp://ezibit.com.au/atm
Diamond Circle Bitcoin ATM machine in Burleigh Heads at Burleigh Bluff Cafe
Burleigh Heads
Burleigh Bluff Cafe
Old Burleigh Theatre Arcade, Shop 1 / 66 Goodwin Terrace, Burleigh Heads 4220, Australia
diamondcircle.net/blogs/news/15483573-diamond-circle-lauches-bitcoin-atm
hXXp://VVV.canberratimes.com.au/act-news/canberra-latest-addition-to-bitcoin-boom-with-hightech-atm-20140719-zuri2.html
hXXps://twitter.com/genesiscoin/status/502357087439962113
hXXps://twitter.com/MutantB/status/548663007492857856
hXXp://VVV.bitrocket.co/#locations
hXXps://twitter.com/PolyEsterBooks/status/477610976041119744
hXXp://VVV.themercury.com.au/news/tasmania/tasmanias-first-bitcoin-atm-opens-in-launceston/story-fnj4f7k1-1227183495527
hXXp://VVV.reddit.com/r/Bitcoin/comments/2ac2a9/my_first_bitcoin_atm_experience/ciui3j6
hXXps://localbitcoins.com/ad/85099/bitcoin-atm-673-bourke-st-melbourne-vic-3000-australia
hXXp://newsbtc.com/2014/05/29/third-bitcoin-atm-australia-launches-melbourne/
hXXp://VVV.reddit.com/r/Bitcoin/comments/1u09q9/bitcoin_atms_for_australia_the_first_in_melbourne/
hXXps://VVV.getbitcoin.com.au/bitcoin-news/melbournes-chapel-st-gets-new-bitcoin-atm
hXXp://VVV.coinstation.com.au/
hXXp://bitscan.com/articles/sydneys-first-bitcoin-atm-opens-to-the-public/
hXXp://VVV.reddit.com/r/Bitcoin/comments/2cr2ga/bitrocket_launches_bitcoin_machine_at_the_hub/
hXXp://VVV.smh.com.au/business/banking-and-finance/bitcoin-goes-retail-with-westfield-atm-20140415-36ozb.html
50.83102130,-0.13610500
hXXps://twitter.com/martindotnet/status/549213482240204802
50.82617170,-0.13860610
50.82251260,-0.14137330
hXXp://VVV.brightonandhovenews.org/2014/08/21/brighton-gets-uks-second-ever-bitcoin-atm/33812
51.45369470,-2.59485510
hXXp://bitcoinmagazine.com/13315/satoshipoint-bitcoin-atms-uk/
52.23544280,0.15405730
hXXps://twitter.com/nigelstreet/status/522704790644858880
54.14935760,-4.48051590
hXXp://VVV.qwikbit.com/#locations
11:00 - 17:00
55.86577750,-4.26662690
hXXp://VVV.digitalspy.co.uk/gaming/news/a570714/cex-store-trials-bitcoin-purchases-in-glasgow.html
51.52257850,-0.08575830
hXXps://twitter.com/campuslondon/status/529208542147149824
51.51706150,-0.08184590
hXXp://VVV.vaiex.com/ATM/
51.52736830,-0.07827520
hXXp://bitcoinexaminer.org/buying-btc-in-london-just-got-easier-new-lamassu-machine-at-the-old-shoreditch-station/
51.52090530,-0.12117420
hXXp://VVV.coindesk.com/robocoin-machine-heats-competition-londons-bitcoin-atms/
51.52561740,-0.08771120
51.51662110,-0.13318260
51.52229700,-0.07807200
hXXps://coinreport.net/vancouver-bitcoiniacs-expands-globally/
53.48339390,-2.24177420
hXXps://uk.webuy.com/blog/feature.php?article=tag:blogger.com,1999:blog-1918688228918285001.post-1547063677399655692
53.48075070,-2.23406650
hXXp://VVV.bitcoinmanchester.org.uk/meetings/bitcoinmanchester-13/
53.37984650,-1.46291610
hXXps://twitter.com/SheffieldBTC/status/540867944058982401
60.18539810,24.81233980
hXXp://bittimaatti.fi/locations
60.16914630,24.93319580
hXXps://bittiraha.fi/content/kampin-kauppakeskukseen-bitcoin-automaatti
60.17183100,24.94120000
hXXp://hotbutler.com/online/kiosks.html
60.19922800,24.93311400
HotButler Bitcoin ATM machine in Helsinki at Port of Helsinki (West terminal)
Port of Helsinki (West terminal)
60.16112520,24.95788230
60.23755910,24.85771360
hXXps://bittiraha.fi/content/viikkokatsaus-392014-paypal-bittimaatit-simpsonit-greenpeace-ja-bitcoin-kansanedustaja
60.17332440,24.94102480
60.16410100,24.94411100
hXXp://VVV.coindesk.com/localbitcoins-manufacturing-low-cost-bitcoin-atm/
60.16328730,24.93843610
62.24431450,25.74849330
hXXps://bittiraha.fi/bittimaatti#english
61.49911990,23.75485490
hXXp://yle.fi/uutiset/eurot_vaihtuvat_virtuaalirahaksi_uusissa_automaateissa/7503422
62.98835870,27.72729630
60.45023300,22.26080920
52.37217120,4.87659580
52.37953760,4.89438530
hXXp://VVV.reddit.com/r/Bitcoin/comments/2on8l2/amsterdam_new_twoway_mr_bitcoin_atm_café_kobalt/
52.37531800,4.90124400
hXXp://bitcoinexaminer.org/new-btcomatic-vending-machine-arrives-amsterdam/
52.36559890,4.88973580
hXXps://twitter.com/JacobInnopay/status/528226403213647874
51.97791810,5.90557970
hXXps://twitter.com/coindesk/status/497050815031685120
51.98387540,5.91079310
hXXps://twitter.com/fourdigits/status/545957810228723712
52.01123600,4.35799600
hXXp://VVV.reddit.com/r/Bitcoin/comments/28ejm9/cool_news_we_reached_100_bitcoin_atms_worldwide/cia8w3o
52.54163170,5.71310940
hXXps://twitter.com/bitsendnl/status/501368865897869312/photo/1
52.07493490,4.31865720
hXXp://VVV.cryptocoinsnews.com/2014/03/20/bitcoin-community-helps-boulevard-get-btc-atm/
52.07816510,4.30528030
hXXp://coincourant.nl/nieuwe-btm-in-haagse-barbershop-co/
52.21412790,5.14727180
51.58866400,4.52880010
hXXp://VVV.byelex.nl/en/about-byelex/news/byecoin-launches-first-bitcoin-atm-historical-location-brabant
hXXps://VVV.facebook.com/572672896184976/photos/pb.572672896184976.-2207520000.1417980856./679464232172508/
hXXp://VVV.chinadailyasia.com/hknews/2014-11/26/content_15195342.html
hXXps://twitter.com/genesiscoin/status/526458354302873602
24/7/365
hXXp://VVV.cryptocoinsnews.com/news/hk-bitcoin-atm-store-hong-kong-now-open-247365/2014/05/19
hXXp://VVV.reddit.com/r/Bitcoin/comments/27mm2c/bitculus_robocoin_atm_set_up_in_hong_kongs/
hXXp://hongkong.coconuts.co/2014/07/24/spotted-bitcoin-atm-being-set-bonham-road-near-hkus-east-gate
hXXp://VVV.reddit.com/r/Bitcoin/comments/20ai4d/hong_kongs_first_atm_goes_live_at_anx_buy_bitcoin/
1.29210310,103.85555850
hXXp://VVV.straitstimes.com/breaking-news/money/story/bitcoin-atms-open-singapore-20140228
1.31042690,103.86239990
hXXps://twitter.com/villeohman/status/538199194801274881
1.29681800,103.78699000
hXXps://twitter.com/wizgotD/status/515381410308173824
1.29670890,103.85009400
hXXp://coinrepublic.com/4-bitcoin-atms-now-active-in-singapore/
1.29491650,103.84123270
1.30336180,103.85318800
1.29133350,103.85012800
1.28118890,103.84866090
hXXp://imaginarymarkets.com/singapores-robocoin-bitcoin-atm-to-be-deployed-17-march-launch/
1.29179200,103.83982300
hXXp://imaginarymarkets.com/asias-first-bitcoin-atm-tembusu-terminals-pte-ltd-launches-2nd-machine-brings-singapore-count-to-8-eclat-office-club/
1.28755410,103.84928990
hXXp://VVV.bloomberg.com/news/2014-02-27/bitcoin-machine-allowing-cash-exchange-installed-in-singapore.html
1.29680660,103.78694290
hXXps://VVV.facebook.com/tembusu.sg/photos/a.712722372127818.1073741827.644000805666642/712721692127886/?type=1
hXXp://newsbtc.com/2014/05/25/two-way-bitcoin-atm-hits-beijings-art-district/
G/F, no Pelota Basca Avenida , do Dr.Rodrigo Rodrigues no. 1470-1526, Macau, China
hXXps://VVV.facebook.com/572672896184976/photos/a.578346215617644.1073741827.572672896184976/620802604705338/
hXXp://VVV.bitcoinatm.com.hk/#!3-More-Bitcoinnect-in-Macau/c1aes/CBA9F3AD-BFCF-4AD6-9989-1F9ADCBDA51C
hXXp://VVV.coindesk.com/btc-china-launches-first-soft-bitcoin-atm-interface-international-markets/
hXXps://twitter.com/genesiscoin/status/535492734304268288
hXXps://VVV.facebook.com/permalink.php?story_fbid=652703991515199&id=572672896184976
44.31587800,9.32790540
hXXp://VVV.rischiocalcolato.it/2014/12/moneta-digitale-ed-ecco-il-secondo-bitcoin-atm-liguria-chiavari.html
44.42836190,8.89317410
45.47289160,9.21127100
hXXp://VVV.newmoney.it/robocoin-bitcoin-milano/
43.72724720,10.42213790
hXXps://bitcointalk.org/index.php?topic=662410.0
44.69620460,10.62998500
hXXps://bitcointalk.org/index.php?topic=769333.0
41.88223890,12.46731540
hXXp://VVV.coindesk.com/bit-wallet-launches-italys-first-home-grown-bitcoin-atm/
41.90530590,12.51846790
hXXps://twitter.com/RobocoinItalia/status/533560574622568448
46.04025430,13.25319300
hXXps://bitcointalk.org/index.php?topic=626650.0
49.18890020,16.61428180
hXXp://VVV.fxstreet.cz/zpravodajstvi-67660.html
49.83692970,18.28209750
hXXp://VVV.bitcomat.cz/cz/
49.72380190,13.33620840
50.10003050,14.43006950
hXXp://VVV.coindesk.com/czech-bitcoin-atm-maker-general-bytes-ready-ship-worldwide/
50.07688430,14.40529680
hXXp://praguepost.com/finance/39299-bitcoin-center-opens-in-prague
50.09851280,14.43659560
hXXp://praguepost.com/finance/37311-hn-prague-gets-its-first-bitcoin-atm
Delnicka 43, 170 00 Praha 7, Czech Republic
50.10335540,14.45046580
hXXps://twitter.com/generalbytes/status/521562555249352704
50.08632880,14.42709620
hXXps://VVV.facebook.com/wBTCb/posts/1513573152213279
46.21130500,6.14854240
hXXp://VVV.tdg.ch/high-tech/bitcoin-gagne-economie-reelle-geneve/story/27406036
46.20792190,6.14383140
hXXps://VVV.facebook.com/BitcoinSuisse/photos/pb.479796742127588.-2207520000.1420747054./760056330768293/
46.51851660,6.63404870
hXXps://twitter.com/SbexCh/status/538477303995838465
46.00875640,8.95707690
BitXatm Bitcoin ATM machine in St.Gallen at Restaurant Hornli
St.Gallen
47.42566170,9.37537140
47.38483210,8.52094220
hXXps://VVV.facebook.com/media/set/?set=a.612661035507824.1073741833.479796742127588&type=1
47.37103970,8.54350740
hXXp://VVV.bitcoinnews.ch/bitcoin-bankomat-in-zuerich-kafi-schoffel/
BTCPoint Bitcoin ATM machine in Barcelona at MOB (Makers of Barcelona)
41.39185090,2.17717930
hXXps://twitter.com/steffenhiller/status/519055195817660416
38.90942170,1.43016140
hXXp://VVV.noudiari.es/2014/12/abre-en-ibiza-el-primer-cajero-de-bitcoins/
BTCPoint Bitcoin ATM machine in Madrid at Bar-Restaurante La Complutense
40.48560210,-3.36047320
hXXp://VVV.cryptocoinsnews.com/es/noticias-sobre-bitcoin/nuevo-cajero-de-bitcoin-en-madrid/2014/05/28
40.43236760,-3.68716140
hXXps://bitcointalk.org/index.php?topic=655437.msg7750907#msg7750907
40.42088450,-3.69134470
hXXp://VVV.oroyfinanzas.com/2014/10/primer-cajero-bitcoin-mundo-madrid-robocoin/
10.00 - 21.00
50.27049910,19.00498190
hXXp://bitcoinist.net/the-first-robocoin-in-poland/
52.23028580,21.01690850
hXXp://VVV.coindesk.com/poland-gets-first-bitcoin-atm-30-planned/
52.23193530,21.00287500
hXXp://bitcoinomat.pl/bankomat-bitcoin-bobby-burger/
51.09974330,17.02875400
hXXp://VVV.bitello.pl/
19.37081980,-99.16651330
hXXps://twitter.com/BlueDavid/status/482272735142240258
19.05419170,-98.22964580
hXXp://bitsoex.tumblr.com/post/87584183654/bitsos-bitcoin-atm-in-mexico-mexican-bitcoin
hXXp://VVV.coindesk.com/mexicos-first-bitcoin-atms-will-also-deal-altcoins/
46.07609200,14.51149800
hXXp://VVV.reddit.com/r/Bitcoin/comments/22olp3/first_bitcoin_atm_in_slovenia/
46.05259240,14.50379240
hXXps://twitter.com/GoCommunicate/status/507586120306028545
46.05212800,14.50428600
hXXp://VVV.sloveniatimes.com/slovenia-gets-first-bitcoin-atm
45.97346920,14.30303300
hXXps://twitter.com/CoinmachineSi/status/468824419671232514
hXXp://japancryptocoin.org/coinblog/bitcoin-buy-atm-skyhook/
hXXps://twitter.com/wiz/status/555700667155628032
hXXp://VVV.live5news.com/story/25642271/first-bitcoin-atm-launched-in-japan
hXXp://internetcom.jp/busnews/20140618/6.html
hXXp://VVV.coindesk.com/south-korea-launches-first-bitcoin-atm/
hXXps://localbitcoins.com/ad/89406/bitcoin-atm-39-5-jongno-2i-ga-jongno-gu-seoul-south-korea
Tuesdays 5pm-10pm, For opening hours on other days, check on hXXps://hackerspace-bamberg.de
49.90196940,10.89286830
hXXp://log.hackerspace-bamberg.de/post/90992433175/first-open-source-bitcoin-atm-projectskyhook-and
51.47997470,7.21683130
hXXps://VVV.facebook.com/events/1508009722777902/
48.78895690,9.15275710
hXXp://VVV.reddit.com/r/Bitcoin/comments/2k3wuz/the_bitcoin_accepting_bar_of_the_community/
32.06467770,34.77047510
hXXps://coinreport.net/first-israeli-bitcoin-atm-debut/
32.06462000,34.77047970
hXXp://VVV.i24news.tv/en/tv/replay/economy/3852209612001
32.07526250,34.77496880
hXXp://VVV.bitcoinatm.co.il/#!home/mainPage
55.68903600,12.57368900
hXXp://VVV.reddit.com/r/Bitcoin/comments/2m3tvv/denmarks_copencoincom_btcatm_hattrick_3rd_danish/
55.68138990,12.58274530
hXXp://copencoin.com/bitcoin-atms-in-copenhagen
55.67872750,12.57887880
44.42960520,26.10457800
hXXp://bitcoinromania.ro/bancomat/primul-robocoin-bitcoin-atm-in-romania/
44.45234900,26.07710830
hXXp://bitcoinromania.ro/bancomat/sambata-22-noiembrie-1400-bitcoin-atm-2-soft-opening/
3.14320200,101.66743500
hXXp://VVV.coindesk.com/money-spinners-weeks-bitcoin-atm-news-2/
5.43826630,100.31002680
53.34114180,-6.26323250
hXXp://VVV.meetup.com/Bitcoin-Dublin/events/219500057/?eventId=219500057&action=detail
53.34741170,-6.26741900
hXXp://bitcoin-atm.ie/#contact
51.21898230,4.40829430
51.04981530,3.72129120
hXXp://VVV.reddit.com/r/Bitcoin/comments/2hi8x9/first_bitcoin_atm_in_belgium_ghent_just_heard_it/
Skyhook Bitcoin ATM machine in Bois-Colombes at Computer Store PcDuo.fr
Computer Store PcDuo.fr
48.91338820,2.27223980
hXXp://cointelegraph.com/news/112466/french-startup-mineoncloud-announces-third-bitcoin-atm-in-france
48.86772080,2.34985410
hXXp://VVV.coindesk.com/europes-first-bitcoin-centre-open-france/
-23.55371800,-46.68803970
-23.58742430,-46.67904680
hXXp://exame.abril.com.br/seu-dinheiro/noticias/sao-paulo-recebe-1o-caixa-eletronico-de-bitcoins-do-pais
Lamassu Bitcoin ATM machine in Kuta, Bali at Bitcoin.co.id Information Center
Bitcoin.co.id Information Center
-8.70138280,115.16982840
Jalan Monkey Forest 88X, Ubud, Gianyar, Bali 80571, Indonesia
-8.51802720,115.26141470
hXXps://twitter.com/SUWBali/status/533975132658622465
47.07358420,15.43280210
hXXp://VVV.reddit.com/r/Bitcoin/comments/28qqeb/first_austrian_bitcoin_atm_available_on_june_23rd/
48.18629550,16.35486310
hXXps://twitter.com/TeamTimelack/status/497456124829130752
48.14279151,17.10948980
hXXp://VVV.mojbitcoin.sk/
48.71785700,21.26344080
hXXp://VVV.decentralplan.com/
-26.00267480,28.07638430
hXXp://VVV.coindesk.com/africas-first-bitcoin-atm-ready-may-launch/
50.45442590,30.50613500
hXXp://VVV.coinside.ru/2014/09/09/pervoe-posolstvo-bitcoin-v-ukraine/
hXXps://localbitcoins.com/ad/89661/bitcoin-atm-no-151-section-1-dunhua-south-rd-daan-district-taipei-city-taiwan-106
59.33199500,18.06796440
hXXps://VVV.facebook.com/Safello/photos/pb.162293217287730.-2207520000.1414696123./272863666230684/?type=1&theater
hXXps://twitter.com/genesiscoin/status/501242525928013825
42.84321230,74.59018650
hXXp://eurasianet.org/node/68876
-34.54299940,-58.48266100
hXXp://panampost.com/belen-marty/2014/09/09/argentinas-first-bitcoin-atm-open-for-business/
47.49811810,19.05542890
hXXp://bitcoinist.net/first-hungarian-bitcoin-atm-debuts-in-downtown-budapest/
45.81736090,15.97632740
hXXp://crobitcoin.com/prvi-batm-u-hrvatskoj/
42.67065800,23.35110050
hXXp://VVV.bitcoin.bg/bitomat.html
hXXp://VVV.nzherald.co.nz/business/news/article.cfm?c_id=3&objectid=11230162
-25.29692970,-57.58048030
hXXps://VVV.facebook.com/BeOkayParaguay/photos/pb.209762075870385.-2207520000.1415391354./326046260908632/
$500-$600
27.00712470,49.66037450
hXXp://VVV.openstreetmap.org/node/2574072438
Portugal
Avenida Fontes Pereira de Melo 42E, 1050-094 Lisboa, Portugal
38.73223780,-9.14558710
hXXp://bitcoinist.net/portuguese-entrepreneur-launches-first-100-portuguese-made-bitcoin-atm/
Skyhook Bitcoin ATM machine in Makati at Bitmarket.ph Offices
Bitmarket.ph Offices
hXXp://VVV.bitmarket.ph/atm
44.81206010,20.45877970
hXXp://VVV.netokracija.com/bitcoin-atm-beograd-86437
Burlington, VT (1)
Portland, OR (3)
Port Moody, BC (1)
Burleigh Heads (1)
St.Gallen (1)

hmwooYMM.exe_404_rwx_062C0000_00079000:

33.52878980,-86.74808730
hXXps://twitter.com/dedricyoung/status/540256799258333184
hXXp://VVV.fortressbtcaz.com/atm-locations/
hXXps://twitter.com/ZenBox_Kiosk/status/544511003741134848
hXXps://twitter.com/holdn2aces/status/539192798285955072
hXXp://bitcoinmerchant.com/atm/
hXXp://newsbtc.com/2014/06/14/los-angeles-slated-get-two-bitcoin-atms-next-week/
hXXp://coinagellc.com/
hXXp://coinucopia.io/
hXXp://coinpath.us/
hXXp://bitcoinmerchant.com/?gd_place=downtown-johnny-browns
VVV.coinspeaker.com/2014/09/10/exclusive-bitaccess-btm-launch-in-san-francisco/
Skyhook Bitcoin ATM machine in San Marcos at Rossi's Pizza & Sports Bar
Rossi's Pizza & Sports Bar
hXXp://bitcoinmerchant.com/places/rossis-pizza/
hXXp://VVV.eventbrite.com/e/the-state-of-crypto-at-hero-city-at-draper-university-tickets-11764007463
hXXp://VVV.publicwire.com/coin-citadel-announces-official-launch-with-installation-of-its-first-bitcoin-atm/
hXXps://xbteller.com/locations/
hXXps://VVV.xbteller.com/amagi-metals-home-second-denver-bitcoin-atm/
hXXps://denverbitcoincenter.com/?page_id=139
hXXp://VVV.reddit.com/r/Bitcoin/comments/28m7bg/photo_of_the_diy_bitcoin_atm_in_fort_collins/
38.92182910,-77.04205270
hXXp://VVV.washingtoncitypaper.com/blogs/citydesk/2014/12/02/the-diner-gets-d-c-s-first-bitcoin-atm/
33.95813880,-83.37524090
hXXp://VVV.reddit.com/r/Bitcoin/comments/2qheol/new_bitcoin_atm_in_downtown_athens_ga/
33.77307770,-84.40334350
hXXp://VVV.coinfucius.io/
33.78539490,-84.41705430
hXXp://VVV.reddit.com/r/Bitcoin/comments/2ddn9w/first_public_bitcoin_atm_vending_machine_in/
33.77444410,-84.37123040
33.94159090,-84.52270910
hXXp://VVV.reddit.com/r/SPSU/comments/2hgykc/bitcoin_atm/
hXXp://VVV.yelp.com/biz_photos/boise-techmall-boise-2?pt=biz_photo&ref=twitter&select=aoi04bUd6dtDxq_Bi5Us7w#aoi04bUd6dtDxq_Bi5Us7w
41.94273670,-87.65328300
hXXp://VVV.chicagotribune.com/news/local/breaking/chi-bitcoin-theres-an-atm-for-that-20140728,0,6190181.story
41.85836980,-87.66027450
hXXp://VVV.redleafchicago.com/2014/11/24/hello-world/
41.91028290,-87.67650120
hXXps://twitter.com/redleafatm/status/550113806098386944
41.88849150,-87.63553370
hXXp://VVV.reddit.com/r/Bitcoin/comments/2gsozf/review_of_robocoin_atm_at_the_merchandise_mart_in/
Skyhook Bitcoin ATM machine in Edwardsville at Unkle Munkeys Coin Club
Unkle Munkeys Coin Club
38.78777230,-89.98093500
hXXps://twitter.com/UnkleMunkeyBrnd/status/523589044459286529/photo/1
41.88127910,-87.83888830
39.77035910,-86.07256720
101 S.Broadway , Leavenworth, KS 66048, United States
39.31801960,-94.92100830
hXXp://VVV.coinsignal.info/content/atm-locations-2/tom-anns-haircolorists-location/
Skyhook Bitcoin ATM machine in Overland Park at New Century Imports LLC
New Century Imports LLC
38.97129120,-94.70203300
38.85501440,-94.67620420
hXXps://twitter.com/bitcoinbeamer/status/538014497118515200
42.35179480,-71.05668790
hXXp://libertyteller.com/
42.37269250,-71.11978470
42.36267440,-71.08670470
42.36345490,-71.10122130
hXXp://VVV.ihavebitcoins.com/featured/restaurant-moksa-near-mit-gets-new-bitcoin-atm/
42.36355600,-71.10113130
hXXps://twitter.com/VeggieGalaxy/status/516761507657707520
42.37258260,-71.11988000
hXXp://zenbox.us/locations/
39.28489060,-76.58884800
hXXp://VVV.baltimoresun.com/business/bs-bz-bitcoin-atm-20141020-story.html
42.49912210,-83.41944430
hXXp://VVV.reddit.com/r/Bitcoin/comments/26v5wi/bitcoin_atm_now_at_the_bronx_deli_of_farmington/
42.97936190,-85.67162640
hXXp://VVV.reddit.com/r/Bitcoin/comments/2emxaa/grand_rapids_bitcoin_atm/
39.10784540,-94.58435200
38.80531710,-94.45661780
hXXp://pressreleases.kcstar.com/release/messages/67131/
38.81283130,-94.47858170
hXXp://VVV.coinsignal.info/content/atm-locations-2/old-gold-guys-raymore-mo-location/
38.58176160,-90.24435210
hXXps://twitter.com/KryptozCom/status/502222720499589120/photo/1
35.91338200,-79.05472740
hXXp://VVV.reddit.com/r/Bitcoin/comments/2jnd7d/north_carolinas_1st_btm/
47.92078110,-97.09040020
hXXp://coinoutletatm.com/university-of-north-dakotas-center-for-innovation-offers-new-feature-for-spring-semester-a-coinoutlet-bitcoin-atm/
Skyhook Bitcoin ATM machine in Grand Forks at DOSHOST.net
DOSHOST.net
47.92156240,-97.09073040
hXXp://VVV.doshost.net/archives/176
41.23908300,-96.01426430
hXXps://VVV.facebook.com/jonasthebtm
42.91533290,-72.24737760
hXXps://VVV.facebook.com/101Deals
42.98514670,-71.46335890
hXXp://VVV.reddit.com/r/Bitcoin/comments/2kw1u1/what_happens_when_you_buy_bitcoin_and_beer_in/
hXXp://VVV.reddit.com/r/Bitcoin/comments/2eeg7q/albuquerque_nm_gets_two_bitcoin_vending_machines/
hXXp://VVV.prweb.com/releases/2014/12/prweb12401593.htm
hXXp://VVV.coinsetter.com/bitcoin-news/2014/05/22/d-becomes-first-casino-offer-robocoin-bitcoin-atm/
hXXp://techcrunch.com/2014/07/30/robocoin-opens-the-first-bitcoin-atm-in-vegas-baby/
hXXp://VVV.reddit.com/r/Bitcoin/comments/2igl72/nu_yalk_pizza_in_reno_nv_is_the_first_place_ive/
42.65414720,-73.75056760
hXXp://VVV.meetup.com/Capital-Region-Bitcoin-Meetup/events/188256382/
40.72318430,-73.95300660
hXXps://twitter.com/GetCoinCafe/status/499756817065730050/photo/1
42.92440570,-78.87723450
hXXp://VVV.reddit.com/r/Bitcoinbuffalo/comments/2lzb29/first_bitcoin_atm_available_on_elmwood_and_bidwell/
40.76572000,-73.99072000
hXXps://VVV.facebook.com/photo.php?fbid=10105453692972440
40.73407350,-74.00059840
hXXp://VVV.reddit.com/r/Bitcoin/comments/2e0s3w/nyc_finally_getting_a_bitcoin_atm_this_thursday/
40.76571540,-73.99068730
hXXp://press.pycbitcoin.com/2014/10/bitcoin-atm-launches-following.html
39.98534430,-83.00557680
hXXps://twitter.com/champbronc2/status/523469285679980544
41.66751060,-81.37184000
36.18479680,-95.99309440
hXXp://VVV.kjrh.com/news/local-news/internet-cafe-opens-in-north-tulsa-offers-bitcoin-machine
Genesis Coin Bitcoin ATM machine in Portland at Float On
Portland
4530 SE Hawthorne Blvd, Portland, OR 97215, United States
hXXp://VVV.reddit.com/r/Bitcoin/comments/2da9o4/so_found_this_today_first_bitcoin_atm_in_oregon/
Robocoin Kiosk Bitcoin ATM machine in Portland at Pioneer Place Mall
700 SW 5th Ave, Portland, OR 97204, United States
hXXp://VVV.bitcoinnw.com/bitcoin-kiosk.html
Skyhook Bitcoin ATM machine in Portland at BrainSilo - PDX Hackerspace
2119 N Kerby Ave #2, Portland, OR 97227, United States
40.04612850,-76.29624260
hXXp://fox43.com/2014/11/14/pas-first-bitcoin-atm-comes-to-lancaster/
32.78545680,-79.93438070
hXXp://newsbtc.com/2014/04/10/south-carolina-gets-first-robocoin-bitcoin-atm/
30.22374910,-97.76737460
hXXp://VVV.youtube.com/watch?v=9Ar8c9XxK4c
30.27983720,-97.71969370
hXXps://twitter.com/coinadvocate/status/508060577668030464
30.26679860,-97.74201950
hXXp://VVV.vcpost.com/articles/21752/20140219/robocoin-to-open-first-bitcoin-atm-in-the-us-on-february-20-2014.htm
30.28229400,-97.74244140
hXXps://twitter.com/TheBitMom/status/493924033717497856
32.81172470,-96.81330560
hXXp://VVV.meetup.com/Dallas-Bitcoin-User-Meetup/events/206533132/
32.78350520,-96.78315360
hXXp://VVV.reddit.com/r/Bitcoin/comments/2e6k65/dallas_welcomes_its_first_bitcoin_atm/
32.80706400,-96.79732070
33.20260650,-97.12707060
hXXp://VVV.reddit.com/r/Bitcoin/comments/2cwqrr/first_bitcoin_atm_near_university_of_north_texas/
29.75210320,-95.35772430
hXXp://VVV.houstonchronicle.com/business/article/Bitcoin-ATM-gives-Houstonians-access-to-digital-5948585.php
CoinOutlet Bitcoin ATM machine in Salt Lake City at Overstock.com Headquarters
Overstock.com Headquarters
hXXp://VVV.nasdaq.com/press-release/overstockcom-installs-bitcoin-atm-at-corporate-hq-20150109-00300
39.00418990,-77.43031500
hXXp://VVV.blockbox.io/bitcoin-machine/
Skyhook Bitcoin ATM machine in Burlington at Blu-Bin
Burlington
49 Church St, Burlington Town Center, Burlington, VT 05401, USA
44.47881370,-73.21287710
hXXps://VVV.cryptocoinsnews.com/first-bitcoin-atm-vermont/
Robocoin Kiosk Bitcoin ATM machine in Seattle at Spitfire Sports Bar
Spitfire Sports Bar
hXXp://newsbtc.com/2014/05/01/two-way-bitcoin-atm-hits-seattle-washington/
hXXp://dailyuw.com/archive/2014/10/01/news/bitcoin-atm-unveiled-condon-hall
hXXp://pointofcoin.com/2015/01/09/bitcoin-atm-now-open-in-vancouver-westfield/
43.04024220,-87.91463640
hXXps://VVV.facebook.com/firstbtmofmke

hmwooYMM.exe_404_rwx_06350000_00004000:

Burlington, VT (1)
Portland, OR (3)

hmwooYMM.exe_404_rwx_06460000_00001000:

notepad.exe "%Documents and Settings%\%current user%\myfile"

hmwooYMM.exe_404_rwx_06470000_00001000:

%Documents and Settings%\%current user%\myfile

hmwooYMM.exe_404_rwx_06480000_00060000:

.text
`.rdata
@.data
.reloc
t#<.tH
?.tS;
?.tT;
?.tV;
\$83\$4#
3\$(#\$$3
&&&&6666????
""""****
2222::::
$$$$\\\\
00006666
####====
?456789:;<=
<4,$?7/'
(3-!0,1'8"5.*2$
key expansion
msvcrt.dll
KERNEL32.dll
WS2_32.dll
ADVAPI32.dll
client.dll
zcÁ

hmwooYMM.exe_404_rwx_064E0000_00026000:

.text
`.rdata
@.data
.reloc
t#<.tH
?.tS;
?.tT;
?.tV;
\$83\$4#
3\$(#\$$3
&&&&6666????
""""****
2222::::
$$$$\\\\
00006666
####====
?456789:;<=
<4,$?7/'
(3-!0,1'8"5.*2$
key expansion
msvcrt.dll
KERNEL32.dll
WS2_32.dll
ADVAPI32.dll
client.dll
zcÁ

hmwooYMM.exe_404_rwx_06510000_00071000:

HTTP/1.1 200 OK
(7),01444
'9=82<.342

hmwooYMM.exe_404_rwx_06B40000_00001000:

GET /maps/api/staticmap?center=32.33597550,-111.04410110&zoom=14&size=150x150&maptype=roadmap&markers=color:red|label:s|32.33597550,-111.04410110&sensor=false&format=jpg HTTP/1.1
Host:maps.google.com
User Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)

hmwooYMM.exe_404_rwx_06D60000_00020000:

smss.exe
csrss.exe
winlogon.exe
services.exe
lsass.exe
vmacthlp.exe
svchost.exe
spoolsv.exe
explorer.exe
VMwareTray.exe
vmtoolsd.exe
jqs.exe
imapi.exe
alg.exe
sandbox_svc.exe
Procmon.exe
wmiprvse.exe
hmwooYMM.exe
hEMQMIQs.exe
zuMEoUcg.exe
cmd.exe
perl.exe
tshark.exe
%original file name%.exe
cscript.exe

hEMQMIQs.exe_652_rwx_00401000_000EA000:

7.qU6
TNcMdI
vND.LOrg<
.eH^\
w|.LV
QfC%d
dW0WaZ@%di
O%%Sg
[%dZr
l}9fT{
E!.Lg:
\D.vY
m.TpM
.WYky?
?%sn6
.wbK3
Am%foEW
%d[k#
k[w[.dx
Ho%sd^
.pgVM
.XU\:
.TU:67Y[
mre%s
Rx.AF{-F
.dA}R
9zE46}GF{-A}d8
Rx.AMb
Rx.AJ
Vy-A}y1
]~]{:&]{>
Mr.0M8.wM
F@%uF
[email protected]
r|M-
9Q2.QD
s]{>EkAC.AZ?
]mYS_;-h}_/
%s>Ab
GcMd
7FZZZZ%
&aTF{-A}d8
Rx.AZu`\Vb)
Rx.AN~2
Rx.AF z
x.ASs)
Rx.AF{-6s z
]sc.Pu<
).KQ>6V
yT%FZ
d?%x1
u2S.cp
~%m"%U
R.BFX7
.Cd"w
/1:,*-.1
#k%U,
:EW.yY
%cMV=
hC%x}7
.Gl^z
>fAd:%U
.cW a
]{.iA8
8=d0,.eJ
KV.eb
.CYf?a8
=Btcp
x.sd6
9%1u_
Microsoft Windows
%uNaO
.YtUO
Microsoft Windows eine Wiederherstellung in einem Moment beginnen.
.klicken, um zu kopieren
Strafe zahlen. Jeder Versuch, diese Nachricht zu entfernen werden die Dateien, Hardware und Windows-Installation unwiederbringlich besch
ffnen Sie den Internet-Browser. An die Adresse gehen: blockchain.info/wallet und klicken Sie auf 'Erstellen Sie ein neues Wallet'.,
Geben Sie Ihre E-Mail-Adresse (optional) und Ihr Passwort ein. Achten Sie darauf, Ihr Passwort sicher ist.-
Sparen Sie Ihr Passwort sicher, vorzugsweise offline (klicken Notepad)..
Folgen Sie den Anweisungen auf der Website aufgefordert werden, und achten Sie genau auf die Sicherheitsempfehlungen.1
.Machen BitCoin Zahlung:2
|Anmeldung zu Ihrem Bitcoin Wallet blockchain.info/wallet/login5
DKlicken Sie auf "Import / Export".6
- und Kleinschreibung) indem Sie es und klicken Sie auf 'Add Private Key'.7
8Klicken Sie auf "Sweep Key".9
.Internationale Anbieter=
WebbrowserD
&de.bitcoin.it/wiki/G
Kennen Sie die Gefahren der Verletzung des Urheberrechts. Besuchen copyright.gov/help/faq/faq-infringement.html f
~Microsoft Windows will begin a restoration process in a moment.
Operation Global 3 is a coordinated effort by U.S., Canadian and European law enforcement agencies targeting computers with pirated content.$
Open Internet Browser. Go to the address: blockchain.info/wallet and click 'Start A New Wallet'.,
Enter your e-mail address(optional) and password. Make sure your password is secure.-
zSave your password safely, preferably offline(click Notepad)..
Follow the steps prompted on the website and pay close attention to the security recommendations.1
tLogin to your Bitcoin wallet blockchain.info/wallet/login 5
4Click on Import / Export. 6
Enter the paper wallet's private key by typing it manually (case sensitive) and click on 'Add Private Key'.7
$Click 'Sweep Key'.9
.International Exchanges=
&en.bitcoin.it/wiki/G
Know the dangers of copyright infringement. Visit copyright.gov/help/faq/faq-infringement.html for more information.J
un reato federale che porta pene fino a cinque anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (17 USC s.506, 18 USC s.2319)
un crimine federale che comporta pene fino a quindici anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (18 USC s.2339A)
Microsoft Windows inizier
Importo:
Qualsiasi tentativo di rimuovere questo messaggio potrebbe danneggiare il vostro file, hardware e di installazione di Windows oltre il recupero."
Operazione globale III dagli Stati Uniti, Canada, Europa, Australia, Nuova Zelanda e altre forze dell'ordine di tutto il mondo
\Registrazione di un nuovo portafoglio BitCoin: 
Aprire Internet Browser. Vai all'indirizzo: blockchain.info/wallet e cliccare su 'Crea un nuovo Portafoglio'.,
Inserisci il tuo indirizzo e-mail (opzionale) e la password. Assicurati che il tuo password
Salvare la password in modo sicuro, preferibilmente non in linea (fare clic su Notepad)..
Seguire i passaggi spinto sul sito e prestare la massima attenzione alle raccomandazioni di sicurezza.1
|Accedi al tuo portafoglio Bitcoin blockchain.info/wallet/login5
<Clicca su 'Importa / Esporta'.6
Inserire la chiave privata 'Paper Wallet' digitando manualmente (maiuscole e minuscole) e fare clic su 'Add Private Key'.7
2Fare clic su 'Sweep Key'.9
&it.bitcoin.it/wiki/G
Conoscere i pericoli di violazione del copyright. Visita copyright.gov/help/faq/faq-infringement.html per maggiori informazioni.J
Microsoft Windows se iniciar
Fine Importe:
n de Windows sin posibilidad de recuperaci
Operaci
n: blockchain.info/wallet y haga clic en 'Crear un nuevo monedero'.,
gina web y prestar mucha atenci
pAcceda a su cartera blockchain.info/wallet/login Bitcoin5
FHaga clic en "Importar / Exportar".6
sculas) y haga clic en" Add Private Key ".7
2Haga clic en 'Sweep Key'.9
Navegador WebD
&es.bitcoin.it/wiki/G
n de copyright. Visita copyright.gov/help/faq/faq-infringement.html para m

hEMQMIQs.exe_652_rwx_009A0000_00001000:

C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp

hEMQMIQs.exe_652_rwx_00A00000_00001000:

%Documents and Settings%\%current user%\tiMscAww\hmwooYMM

hEMQMIQs.exe_652_rwx_00A10000_00001000:

%Documents and Settings%\All Users\JUsIccwo\hEMQMIQs

hEMQMIQs.exe_652_rwx_00A30000_000E9000:

C{?%f{[
7.qU6
TNcMdI
vND.LOrg<
.eH^\
w|.LV
QfC%d
dW0WaZ@%di
O%%Sg
[%dZr
l}9fT{
E!.Lg:
\D.vY
m.TpM
.WYky?
?%sn6
.wbK3
Am%foEW
%d[k#
k[w[.dx
Ho%sd^
.pgVM
.XU\:
.TU:67Y[
mre%s
Rx.AF{-F
.dA}R
9zE46}GF{-A}d8
Rx.AMb
Rx.AJ
Vy-A}y1
]~]{:&]{>
Mr.0M8.wM
F@%uF
[email protected]
r|M-
9Q2.QD
s]{>EkAC.AZ?
]mYS_;-h}_/
%s>Ab
GcMd
7FZZZZ%
&aTF{-A}d8
Rx.AZu`\Vb)
Rx.AN~2
Rx.AF z
x.ASs)
Rx.AF{-6s z
]sc.Pu<
).KQ>6V
yT%FZ
d?%x1
u2S.cp
~%m"%U
R.BFX7
.Cd"w
/1:,*-.1
#k%U,
:EW.yY
%cMV=
hC%x}7
.Gl^z
>fAd:%U
.cW a
]{.iA8
8=d0,.eJ
KV.eb
.CYf?a8
=Btcp
x.sd6
4%UMv
4%UEInb
%uNaO
.YtUO
Microsoft Windows eine Wiederherstellung in einem Moment beginnen.
.klicken, um zu kopieren
Strafe zahlen. Jeder Versuch, diese Nachricht zu entfernen werden die Dateien, Hardware und Windows-Installation unwiederbringlich besch
ffnen Sie den Internet-Browser. An die Adresse gehen: blockchain.info/wallet und klicken Sie auf 'Erstellen Sie ein neues Wallet'.,
Geben Sie Ihre E-Mail-Adresse (optional) und Ihr Passwort ein. Achten Sie darauf, Ihr Passwort sicher ist.-
Sparen Sie Ihr Passwort sicher, vorzugsweise offline (klicken Notepad)..
Folgen Sie den Anweisungen auf der Website aufgefordert werden, und achten Sie genau auf die Sicherheitsempfehlungen.1
.Machen BitCoin Zahlung:2
|Anmeldung zu Ihrem Bitcoin Wallet blockchain.info/wallet/login5
DKlicken Sie auf "Import / Export".6
- und Kleinschreibung) indem Sie es und klicken Sie auf 'Add Private Key'.7
8Klicken Sie auf "Sweep Key".9
.Internationale Anbieter=
WebbrowserD
&de.bitcoin.it/wiki/G
Kennen Sie die Gefahren der Verletzung des Urheberrechts. Besuchen copyright.gov/help/faq/faq-infringement.html f
~Microsoft Windows will begin a restoration process in a moment.
Operation Global 3 is a coordinated effort by U.S., Canadian and European law enforcement agencies targeting computers with pirated content.$
Open Internet Browser. Go to the address: blockchain.info/wallet and click 'Start A New Wallet'.,
Enter your e-mail address(optional) and password. Make sure your password is secure.-
zSave your password safely, preferably offline(click Notepad)..
Follow the steps prompted on the website and pay close attention to the security recommendations.1
tLogin to your Bitcoin wallet blockchain.info/wallet/login 5
4Click on Import / Export. 6
Enter the paper wallet's private key by typing it manually (case sensitive) and click on 'Add Private Key'.7
$Click 'Sweep Key'.9
.International Exchanges=
&en.bitcoin.it/wiki/G
Know the dangers of copyright infringement. Visit copyright.gov/help/faq/faq-infringement.html for more information.J
un reato federale che porta pene fino a cinque anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (17 USC s.506, 18 USC s.2319)
un crimine federale che comporta pene fino a quindici anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (18 USC s.2339A)
Microsoft Windows inizier
Importo:
Qualsiasi tentativo di rimuovere questo messaggio potrebbe danneggiare il vostro file, hardware e di installazione di Windows oltre il recupero."
Operazione globale III dagli Stati Uniti, Canada, Europa, Australia, Nuova Zelanda e altre forze dell'ordine di tutto il mondo
\Registrazione di un nuovo portafoglio BitCoin: 
Aprire Internet Browser. Vai all'indirizzo: blockchain.info/wallet e cliccare su 'Crea un nuovo Portafoglio'.,
Inserisci il tuo indirizzo e-mail (opzionale) e la password. Assicurati che il tuo password
Salvare la password in modo sicuro, preferibilmente non in linea (fare clic su Notepad)..
Seguire i passaggi spinto sul sito e prestare la massima attenzione alle raccomandazioni di sicurezza.1
|Accedi al tuo portafoglio Bitcoin blockchain.info/wallet/login5
<Clicca su 'Importa / Esporta'.6
Inserire la chiave privata 'Paper Wallet' digitando manualmente (maiuscole e minuscole) e fare clic su 'Add Private Key'.7
2Fare clic su 'Sweep Key'.9
&it.bitcoin.it/wiki/G
Conoscere i pericoli di violazione del copyright. Visita copyright.gov/help/faq/faq-infringement.html per maggiori informazioni.J
Microsoft Windows se iniciar
Fine Importe:
n de Windows sin posibilidad de recuperaci
Operaci
n: blockchain.info/wallet y haga clic en 'Crear un nuevo monedero'.,
gina web y prestar mucha atenci
pAcceda a su cartera blockchain.info/wallet/login Bitcoin5
FHaga clic en "Importar / Exportar".6
sculas) y haga clic en" Add Private Key ".7
2Haga clic en 'Sweep Key'.9
Navegador WebD
&es.bitcoin.it/wiki/G
n de copyright. Visita copyright.gov/help/faq/faq-infringement.html para m

hEMQMIQs.exe_652_rwx_00E20000_00001000:

%Documents and Settings%\%current user%\tiMscAww\hmwooYMM.inf

hEMQMIQs.exe_652_rwx_00E30000_00001000:

%Documents and Settings%\All Users\JUsIccwo\hEMQMIQs.inf

hEMQMIQs.exe_652_rwx_00E40000_00001000:

%Documents and Settings%\%current user%\tiMscAww\hmwooYMM.exe

hEMQMIQs.exe_652_rwx_00E50000_00001000:

%Documents and Settings%\All Users\JUsIccwo\hEMQMIQs.exe

hEMQMIQs.exe_652_rwx_00E80000_00001000:

hmwooYMM.exe

hEMQMIQs.exe_652_rwx_00E90000_00001000:

hEMQMIQs.exe

hEMQMIQs.exe_652_rwx_00EA0000_00001000:

taskkill /FI "USERNAME eq adm" /F /IM hmwooYMM.exe

hEMQMIQs.exe_652_rwx_00EB0000_00001000:

taskkill /FI "USERNAME eq adm" /F /IM hEMQMIQs.exe

hEMQMIQs.exe_652_rwx_00EC0000_00001000:

%Documents and Settings%\All Users\xWAMIgUE\zuMEoUcg.exe

hEMQMIQs.exe_652_rwx_00ED0000_00001000:

%Documents and Settings%\All Users\NAAo.txt

hEMQMIQs.exe_652_rwx_00EE0000_00001000:

notepad.exe "%Documents and Settings%\All Users\NAAo.txt"

hEMQMIQs.exe_652_rwx_00EF0000_00001000:

%Documents and Settings%\All Users\xWAMIgUE

zuMEoUcg.exe_1484_rwx_00401000_000EA000:

C{?%f{[
7.qU6
TNcMdI
vND.LOrg<
.eH^\
w|.LV
QfC%d
dW0WaZ@%di
O%%Sg
[%dZr
l}9fT{
E!.Lg:
\D.vY
m.TpM
.WYky?
?%sn6
.wbK3
Am%foEW
%d[k#
k[w[.dx
Ho%sd^
.pgVM
.XU\:
.TU:67Y[
mre%s
Rx.AF{-F
.dA}R
9zE46}GF{-A}d8
Rx.AMb
Rx.AJ
Vy-A}y1
]~]{:&]{>
Mr.0M8.wM
F@%uF
[email protected]
r|M-
9Q2.QD
s]{>EkAC.AZ?
]mYS_;-h}_/
%s>Ab
GcMd
7FZZZZ%
&aTF{-A}d8
Rx.AZu`\Vb)
Rx.AN~2
Rx.AF z
x.ASs)
Rx.AF{-6s z
]sc.Pu<
).KQ>6V
yT%FZ
d?%x1
u2S.cp
~%m"%U
R.BFX7
.Cd"w
/1:,*-.1
#k%U,
:EW.yY
%cMV=
hC%x}7
.Gl^z
>fAd:%U
.cW a
]{.iA8
8=d0,.eJ
KV.eb
.CYf?a8
=Btcp
crTbSu#
x.sd6
4%UMv
4%UEInb
2software\microsoft\windows\currentversion\run
%uNaO
.YtUO
Microsoft Windows eine Wiederherstellung in einem Moment beginnen.
.klicken, um zu kopieren
Strafe zahlen. Jeder Versuch, diese Nachricht zu entfernen werden die Dateien, Hardware und Windows-Installation unwiederbringlich besch
ffnen Sie den Internet-Browser. An die Adresse gehen: blockchain.info/wallet und klicken Sie auf 'Erstellen Sie ein neues Wallet'.,
Geben Sie Ihre E-Mail-Adresse (optional) und Ihr Passwort ein. Achten Sie darauf, Ihr Passwort sicher ist.-
Sparen Sie Ihr Passwort sicher, vorzugsweise offline (klicken Notepad)..
Folgen Sie den Anweisungen auf der Website aufgefordert werden, und achten Sie genau auf die Sicherheitsempfehlungen.1
.Machen BitCoin Zahlung:2
|Anmeldung zu Ihrem Bitcoin Wallet blockchain.info/wallet/login5
DKlicken Sie auf "Import / Export".6
- und Kleinschreibung) indem Sie es und klicken Sie auf 'Add Private Key'.7
8Klicken Sie auf "Sweep Key".9
.Internationale Anbieter=
WebbrowserD
&de.bitcoin.it/wiki/G
Kennen Sie die Gefahren der Verletzung des Urheberrechts. Besuchen copyright.gov/help/faq/faq-infringement.html f
~Microsoft Windows will begin a restoration process in a moment.
Operation Global 3 is a coordinated effort by U.S., Canadian and European law enforcement agencies targeting computers with pirated content.$
Open Internet Browser. Go to the address: blockchain.info/wallet and click 'Start A New Wallet'.,
Enter your e-mail address(optional) and password. Make sure your password is secure.-
zSave your password safely, preferably offline(click Notepad)..
Follow the steps prompted on the website and pay close attention to the security recommendations.1
tLogin to your Bitcoin wallet blockchain.info/wallet/login 5
4Click on Import / Export. 6
Enter the paper wallet's private key by typing it manually (case sensitive) and click on 'Add Private Key'.7
$Click 'Sweep Key'.9
.International Exchanges=
&en.bitcoin.it/wiki/G
Know the dangers of copyright infringement. Visit copyright.gov/help/faq/faq-infringement.html for more information.J
un reato federale che porta pene fino a cinque anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (17 USC s.506, 18 USC s.2319)
un crimine federale che comporta pene fino a quindici anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (18 USC s.2339A)
Microsoft Windows inizier
Importo:
Qualsiasi tentativo di rimuovere questo messaggio potrebbe danneggiare il vostro file, hardware e di installazione di Windows oltre il recupero."
Operazione globale III dagli Stati Uniti, Canada, Europa, Australia, Nuova Zelanda e altre forze dell'ordine di tutto il mondo
\Registrazione di un nuovo portafoglio BitCoin: 
Aprire Internet Browser. Vai all'indirizzo: blockchain.info/wallet e cliccare su 'Crea un nuovo Portafoglio'.,
Inserisci il tuo indirizzo e-mail (opzionale) e la password. Assicurati che il tuo password
Salvare la password in modo sicuro, preferibilmente non in linea (fare clic su Notepad)..
Seguire i passaggi spinto sul sito e prestare la massima attenzione alle raccomandazioni di sicurezza.1
|Accedi al tuo portafoglio Bitcoin blockchain.info/wallet/login5
<Clicca su 'Importa / Esporta'.6
Inserire la chiave privata 'Paper Wallet' digitando manualmente (maiuscole e minuscole) e fare clic su 'Add Private Key'.7
2Fare clic su 'Sweep Key'.9
&it.bitcoin.it/wiki/G
Conoscere i pericoli di violazione del copyright. Visita copyright.gov/help/faq/faq-infringement.html per maggiori informazioni.J
Microsoft Windows se iniciar
Fine Importe:
n de Windows sin posibilidad de recuperaci
Operaci
n: blockchain.info/wallet y haga clic en 'Crear un nuevo monedero'.,
gina web y prestar mucha atenci
pAcceda a su cartera blockchain.info/wallet/login Bitcoin5
FHaga clic en "Importar / Exportar".6
sculas) y haga clic en" Add Private Key ".7
2Haga clic en 'Sweep Key'.9
Navegador WebD
&es.bitcoin.it/wiki/G
n de copyright. Visita copyright.gov/help/faq/faq-infringement.html para m

zuMEoUcg.exe_1484_rwx_00720000_00001000:

%WinDir%\TEMP

zuMEoUcg.exe_1484_rwx_00780000_00001000:

%Documents and Settings%\LocalService\tiMscAww\hmwooYMM

zuMEoUcg.exe_1484_rwx_00790000_00001000:

%Documents and Settings%\All Users\JUsIccwo\hEMQMIQs

zuMEoUcg.exe_1484_rwx_007B0000_000E9000:

C{?%f{[
7.qU6
TNcMdI
vND.LOrg<
.eH^\
w|.LV
QfC%d
dW0WaZ@%di
O%%Sg
[%dZr
l}9fT{
E!.Lg:
\D.vY
m.TpM
.WYky?
?%sn6
.wbK3
Am%foEW
%d[k#
k[w[.dx
Ho%sd^
.pgVM
.XU\:
.TU:67Y[
mre%s
Rx.AF{-F
.dA}R
9zE46}GF{-A}d8
Rx.AMb
Rx.AJ
Vy-A}y1
]~]{:&]{>
Mr.0M8.wM
F@%uF
[email protected]
r|M-
9Q2.QD
s]{>EkAC.AZ?
]mYS_;-h}_/
%s>Ab
GcMd
7FZZZZ%
&aTF{-A}d8
Rx.AZu`\Vb)
Rx.AN~2
Rx.AF z
x.ASs)
Rx.AF{-6s z
]sc.Pu<
).KQ>6V
yT%FZ
d?%x1
u2S.cp
~%m"%U
R.BFX7
.Cd"w
/1:,*-.1
#k%U,
:EW.yY
%cMV=
hC%x}7
.Gl^z
>fAd:%U
.cW a
]{.iA8
8=d0,.eJ
KV.eb
.CYf?a8
=Btcp
crTbSu#
x.sd6
4%UMv
4%UEInb
%uNaO
.YtUO
Microsoft Windows eine Wiederherstellung in einem Moment beginnen.
.klicken, um zu kopieren
Strafe zahlen. Jeder Versuch, diese Nachricht zu entfernen werden die Dateien, Hardware und Windows-Installation unwiederbringlich besch
ffnen Sie den Internet-Browser. An die Adresse gehen: blockchain.info/wallet und klicken Sie auf 'Erstellen Sie ein neues Wallet'.,
Geben Sie Ihre E-Mail-Adresse (optional) und Ihr Passwort ein. Achten Sie darauf, Ihr Passwort sicher ist.-
Sparen Sie Ihr Passwort sicher, vorzugsweise offline (klicken Notepad)..
Folgen Sie den Anweisungen auf der Website aufgefordert werden, und achten Sie genau auf die Sicherheitsempfehlungen.1
.Machen BitCoin Zahlung:2
|Anmeldung zu Ihrem Bitcoin Wallet blockchain.info/wallet/login5
DKlicken Sie auf "Import / Export".6
- und Kleinschreibung) indem Sie es und klicken Sie auf 'Add Private Key'.7
8Klicken Sie auf "Sweep Key".9
.Internationale Anbieter=
WebbrowserD
&de.bitcoin.it/wiki/G
Kennen Sie die Gefahren der Verletzung des Urheberrechts. Besuchen copyright.gov/help/faq/faq-infringement.html f
~Microsoft Windows will begin a restoration process in a moment.
Operation Global 3 is a coordinated effort by U.S., Canadian and European law enforcement agencies targeting computers with pirated content.$
Open Internet Browser. Go to the address: blockchain.info/wallet and click 'Start A New Wallet'.,
Enter your e-mail address(optional) and password. Make sure your password is secure.-
zSave your password safely, preferably offline(click Notepad)..
Follow the steps prompted on the website and pay close attention to the security recommendations.1
tLogin to your Bitcoin wallet blockchain.info/wallet/login 5
4Click on Import / Export. 6
Enter the paper wallet's private key by typing it manually (case sensitive) and click on 'Add Private Key'.7
$Click 'Sweep Key'.9
.International Exchanges=
&en.bitcoin.it/wiki/G
Know the dangers of copyright infringement. Visit copyright.gov/help/faq/faq-infringement.html for more information.J
un reato federale che porta pene fino a cinque anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (17 USC s.506, 18 USC s.2319)
un crimine federale che comporta pene fino a quindici anni di prigione federale, 250.000 dollari di multa, confisca e la restituzione (18 USC s.2339A)
Microsoft Windows inizier
Importo:
Qualsiasi tentativo di rimuovere questo messaggio potrebbe danneggiare il vostro file, hardware e di installazione di Windows oltre il recupero."
Operazione globale III dagli Stati Uniti, Canada, Europa, Australia, Nuova Zelanda e altre forze dell'ordine di tutto il mondo
\Registrazione di un nuovo portafoglio BitCoin: 
Aprire Internet Browser. Vai all'indirizzo: blockchain.info/wallet e cliccare su 'Crea un nuovo Portafoglio'.,
Inserisci il tuo indirizzo e-mail (opzionale) e la password. Assicurati che il tuo password
Salvare la password in modo sicuro, preferibilmente non in linea (fare clic su Notepad)..
Seguire i passaggi spinto sul sito e prestare la massima attenzione alle raccomandazioni di sicurezza.1
|Accedi al tuo portafoglio Bitcoin blockchain.info/wallet/login5
<Clicca su 'Importa / Esporta'.6
Inserire la chiave privata 'Paper Wallet' digitando manualmente (maiuscole e minuscole) e fare clic su 'Add Private Key'.7
2Fare clic su 'Sweep Key'.9
&it.bitcoin.it/wiki/G
Conoscere i pericoli di violazione del copyright. Visita copyright.gov/help/faq/faq-infringement.html per maggiori informazioni.J
Microsoft Windows se iniciar
Fine Importe:
n de Windows sin posibilidad de recuperaci
Operaci
n: blockchain.info/wallet y haga clic en 'Crear un nuevo monedero'.,
gina web y prestar mucha atenci
pAcceda a su cartera blockchain.info/wallet/login Bitcoin5
FHaga clic en "Importar / Exportar".6
sculas) y haga clic en" Add Private Key ".7
2Haga clic en 'Sweep Key'.9
Navegador WebD
&es.bitcoin.it/wiki/G
n de copyright. Visita copyright.gov/help/faq/faq-infringement.html para m

zuMEoUcg.exe_1484_rwx_00BA0000_00001000:

%Documents and Settings%\LocalService\tiMscAww\hmwooYMM.inf

zuMEoUcg.exe_1484_rwx_00BB0000_00001000:

%Documents and Settings%\All Users\JUsIccwo\hEMQMIQs.inf

zuMEoUcg.exe_1484_rwx_00BC0000_00001000:

%Documents and Settings%\LocalService\tiMscAww\hmwooYMM.exe

zuMEoUcg.exe_1484_rwx_00BD0000_00001000:

%Documents and Settings%\All Users\JUsIccwo\hEMQMIQs.exe

zuMEoUcg.exe_1484_rwx_00C00000_00001000:

hmwooYMM.exe

zuMEoUcg.exe_1484_rwx_00C10000_00001000:

hEMQMIQs.exe

zuMEoUcg.exe_1484_rwx_00C20000_00001000:

taskkill /FI "USERNAME eq SYSTEM" /F /IM hmwooYMM.exe

zuMEoUcg.exe_1484_rwx_00C30000_00001000:

taskkill /FI "USERNAME eq SYSTEM" /F /IM hEMQMIQs.exe


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    cscript.exe:1220
    cscript.exe:1996
    cscript.exe:1972
    cscript.exe:1584
    cscript.exe:1480
    cscript.exe:1572
    %original file name%.exe:1704
    %original file name%.exe:572
    %original file name%.exe:656
    %original file name%.exe:736
    %original file name%.exe:1012
    %original file name%.exe:408

  2. Delete the original Trojan file.
  3. Delete or disinfect the following files created/modified by the Trojan:

    %Documents and Settings%\%current user%\Local Settings\Temp\kyUUMQAM.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\huMkkcUs.bat (4 bytes)
    C:\f01ddda4a50e1cf3d9d9282f4e3470b7 (94114 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\sEUosgkk.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\jkkAoYcI.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ZaMYIsAU.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\roEUwYsM.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\eIcogQcQ.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\xYsMogcg.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\pqcIQcEs.bat (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\aIYYswEo.bat (112 bytes)
    %Documents and Settings%\All Users\xWAMIgUE\zuMEoUcg.exe (7785 bytes)
    %Documents and Settings%\All Users\JUsIccwo\hEMQMIQs.exe (7785 bytes)
    %Documents and Settings%\%current user%\tiMscAww\hmwooYMM.exe (7737 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\wEoUcMoI.bat (112 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\ggkMMQwA.bat (4 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dog.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Documents\My Music\Sample Music\New Stories (Highway Blues).wma.exe (11518 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\adm.bmp.exe (7385 bytes)
    C:\totalcmd\TCMADMIN.EXE.exe (7433 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\beach.bmp.exe (7385 bytes)
    C:\totalcmd\TOTALCMD.EXE.exe (35505 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\cat.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\snowflake.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\guitar.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\lift-off.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\NAAo.txt (55978 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\kick.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\butterfly.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\palm tree.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\guest.bmp.exe (7385 bytes)
    C:\totalcmd\TCUNINST.EXE.exe (7385 bytes)
    C:\totalcmd\TcUsbRun.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\duck.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\red flower.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\dirt bike.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\horses.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\pink flower.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\astronaut.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\chess.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\ball.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\skater.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Blue hills.jpg.exe (7385 bytes)
    \\XP3\PIPE\srvsvc (72 bytes)
    %Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Water lilies.jpg.exe (7433 bytes)
    %Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Sunset.jpg.exe (7433 bytes)
    C:\totalcmd\TCMDX32.EXE.exe (7433 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\frog.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\fish.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\airplane.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Documents\My Pictures\Sample Pictures\Winter.jpg.exe (7433 bytes)
    %Documents and Settings%\%current user%\Local Settings\Application Data\Adobe\Reader 9.3\Setup Files\Setup.exe (7971 bytes)
    %Documents and Settings%\All Users\Documents\My Music\Sample Music\Beethoven's Symphony No. 9 (Scherzo).wma.exe (10177 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\drip.bmp.exe (7385 bytes)
    %Documents and Settings%\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures\car.bmp.exe (7385 bytes)

  4. Delete the following value(s) in the autorun key (How to Work with System Registry):

    [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "hEMQMIQs.exe" = "%Documents and Settings%\All Users\JUsIccwo\hEMQMIQs.exe"

    [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
    "hmwooYMM.exe" = "%Documents and Settings%\%current user%\tiMscAww\hmwooYMM.exe"

  5. Remove the references to the Trojan by modifying the following registry value(s) (How to Work with System Registry):

    [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "UserInit" = "%System%\userinit.exe,%Documents and Settings%\All Users\JUsIccwo\hEMQMIQs.exe,"

  6. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  7. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now