Worm.Win32.AutoItGen_2a11896020

by malwarelabrobot on October 2nd, 2017 in Malware Descriptions.

Trojan.Win32.Autoit.abljc (Kaspersky), Trojan.Win32.Sasfis.FD, VirTool.Win32.DelfInject.FD, Worm.Win32.AutoIt.FD, WormAutoItGen.YR (Lavasoft MAS)
Behaviour: Trojan, Worm, VirTool


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: 2a11896020fa4303955f05b54cb64741
SHA1: dc865766bba1c50757ed3edf818a3dd53e8adc1a
SHA256: 62f061574dba6b512fa22b818c24b11d4c579cbbd23a411a50673d4c600e94fc
SSDeep: 49152:tgGRQGHRa1S9TVY94THr2hpvosWW 1tPTmNeQn1A x7xmUdnYcwstc568Cz0ziDx:3eEYUs0X1tPTGeom0O568Cz0mCK
Size: 3532433 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: Xacti, LLC
Created at: 2016-07-25 03:55:47
Analyzed on: Windows7 SP1 32-bit


Summary:

Worm. A program that is primarily replicating on networks or removable drives.

Payload

No specific payload has been found.

Process activity

The Worm creates the following process(es):

evb30D8.tmp:600
evb16A5.tmp:4092
evb1FF2.tmp:3916
evbD39D.tmp:3016
evb2D99.tmp:1004
evbFE9.tmp:996
evbE9A7.tmp:892
evb2526.tmp:1776
evb14EE.tmp:896
evbE32.tmp:3620
evbE134.tmp:3856
evb26DD.tmp:2924
evbCEB7.tmp:3360
evbC298.tmp:3816
evbC983.tmp:3200
evb7CEA.tmp:2848
evb5B35.tmp:3472
evbE7F0.tmp:3680
evbC5F6.tmp:2720
evbE492.tmp:3820
evb61F1.tmp:1996
evb6398.tmp:3828
evb3E40.tmp:2816
evb393B.tmp:3692
evbDC00.tmp:3400
evb597E.tmp:2868
evbC0F1.tmp:2820
evbF239.tmp:3992
evb90D.tmp:3328
evb4374.tmp:1740
evb22C.tmp:3120
evbF3E0.tmp:3780
evb94.tmp:3044
evbFA9C.tmp:2280
evb327F.tmp:1772
setupQW.exe:2944
evb77CA.tmp:2580
evb33D.tmp:2588
evbFEED.tmp:4004
evbD6FB.tmp:912
evbF76A.tmp:288
evbFDFA.tmp:3800
evb4DBD.tmp:2896
evb35DD.tmp:1804
evbEEDB.tmp:3240
evbFFB1.tmp:2328
evbED24.tmp:3696
evb2884.tmp:2700
evb1E4B.tmp:3352
evbBA49.tmp:4016
evbE649.tmp:140
evbDDB7.tmp:3484
evbFC53.tmp:4044
evb4C06.tmp:3336
Helper.exe:2772
Helper.exe:3808
Helper.exe:4064
evb3FF7.tmp:3004
CL_Debug_Log.txt:2544
evb2A4A.tmp:2904
evbEB7D.tmp:2580
evb6530.tmp:2396
evb603A.tmp:3832
evbDA59.tmp:2800
evb5CEC.tmp:2572
evb57D7.tmp:2844
evbAD4.tmp:1404
evbBF3A.tmp:3704
evb1ABE.tmp:2676
evbF73E.tmp:2224
evb4A30.tmp:944
evb1347.tmp:3896
evbC44F.tmp:1412
evbF8F5.tmp:552
evb5620.tmp:3056
evbD05E.tmp:3184
evbCD00.tmp:100
evb757.tmp:2564
evbF091.tmp:2804
evbC7DB.tmp:1704
%original file name%.exe:1900
t.exe:2044
evbCB39.tmp:3460
evb3AE2.tmp:2160
evb4889.tmp:2616
evb2BF2.tmp:2080
start.exe:2920
evb1190.tmp:3576
evb3784.tmp:2532
evb41CD.tmp:2732
evbD544.tmp:1320
evb46E2.tmp:1388
evb184C.tmp:1028
evb3426.tmp:2948
evbD1F5.tmp:2964
evb52C2.tmp:2960
evb75E4.tmp:892
evb2F40.tmp:1848
evbC8B.tmp:3160
evbE2EB.tmp:3784
evbD8A2.tmp:2828
evb511B.tmp:3488
evb187.tmp:4004
evbDF8D.tmp:2560
evb21D7.tmp:880
evb1C75.tmp:1192
evb4E5.tmp:2184
evb452B.tmp:2724
evb5479.tmp:960
evb3C99.tmp:3704
evb237F.tmp:264
evbFD36.tmp:2328
evb4F64.tmp:3064
evbF597.tmp:4008
evb5E93.tmp:3792

The Worm injects its code into the following process(es):

Helper.exe:3644
Âèäæåò.exe:1956

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process evb30D8.tmp:600 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb30D8.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2F40.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2F49.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb30F8.tmp (0 bytes)

The process evb16A5.tmp:4092 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1525.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb16A5.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb14EE.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb16C5.tmp (0 bytes)

The process evb1FF2.tmp:3916 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1E68.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2012.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1E4B.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1FF2.tmp (0 bytes)

The process evbD39D.tmp:3016 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD3BD.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD1F5.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD39D.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD26B.tmp (0 bytes)

The process evb2D99.tmp:1004 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2BFF.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2D99.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2BF2.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2DB9.tmp (0 bytes)

The process evbFE9.tmp:996 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1009.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE32.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFE9.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE61.tmp (0 bytes)

The process evbE9A7.tmp:892 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE9D6.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE9A7.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE7F0.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE84B.tmp (0 bytes)

The process evb2526.tmp:1776 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2396.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2546.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2526.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb237F.tmp (0 bytes)

The process evb14EE.tmp:896 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb150E.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1347.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1370.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb14EE.tmp (0 bytes)

The process evbE32.tmp:3620 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE32.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCBC.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC8B.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE52.tmp (0 bytes)

The process evbE134.tmp:3856 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE154.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDF8D.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE134.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDFF2.tmp (0 bytes)

The process evb26DD.tmp:2924 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb253B.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb26DD.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb26FD.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2526.tmp (0 bytes)

The process evbCEB7.tmp:3360 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCD00.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCED7.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCD7B.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCEB7.tmp (0 bytes)

The process evbC298.tmp:3816 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC298.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC17A.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC2B8.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC0F1.tmp (0 bytes)

The process evbC983.tmp:3200 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC9A3.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC85D.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC983.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC7DB.tmp (0 bytes)

The process evb7CEA.tmp:2848 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb77AE.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb77CA.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb7CEA.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb7D29.tmp (0 bytes)

The process evb5B35.tmp:3472 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5B35.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5965.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb597E.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5B55.tmp (0 bytes)

The process evbE7F0.tmp:3680 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE649.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE6A6.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE7F0.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE810.tmp (0 bytes)

The process evbC5F6.tmp:2720 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC4D4.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC5F6.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC616.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC44F.tmp (0 bytes)

The process evbE492.tmp:3820 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE34C.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE2EB.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE492.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE4B2.tmp (0 bytes)

The process evb61F1.tmp:1996 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb6211.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb61F1.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb603A.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb6009.tmp (0 bytes)

The process evb6398.tmp:3828 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb61F1.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb61BE.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb6398.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb63B8.tmp (0 bytes)

The process evb3E40.tmp:2816 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3E40.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3C92.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3C99.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3E60.tmp (0 bytes)

The process evb393B.tmp:3692 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3783.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3784.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb395B.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb393B.tmp (0 bytes)

The process evbDC00.tmp:3400 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDC00.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDAC4.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDC20.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDA59.tmp (0 bytes)

The process evb597E.tmp:2868 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb57D7.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb59AE.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb597E.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb57B0.tmp (0 bytes)

The process evbC0F1.tmp:2820 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbBFC5.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbBF3A.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC111.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC0F1.tmp (0 bytes)

The process evbF239.tmp:3992 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF091.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF0E3.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF239.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF259.tmp (0 bytes)

The process evb90D.tmp:3328 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb79E.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb90D.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb757.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb93D.tmp (0 bytes)

The process evb4374.tmp:1740 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb41C0.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4394.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4374.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb41CD.tmp (0 bytes)

The process evb22C.tmp:3120 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb24C.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4E.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb94.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb22C.tmp (0 bytes)

The process evbF3E0.tmp:3780 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF288.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF3E0.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF239.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF400.tmp (0 bytes)

The process evb94.tmp:3044 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFEA8.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFEED.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbB4.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb94.tmp (0 bytes)

The process evbFA9C.tmp:2280 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF93C.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFA9C.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF8F5.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFABC.tmp (0 bytes)

The process evb327F.tmp:1772 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb30D8.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb329F.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb30DF.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb327F.tmp (0 bytes)

The process setupQW.exe:2944 makes changes in the file system.
The Worm creates and/or writes to the following file(s):

%Program Files%\Widget 1.2\Âèäæåò.exe (14857 bytes)
%Program Files%\Widget 1.2\images\gadget_button_2_normal.png (2 bytes)
%Program Files%\Widget 1.2\images\gadget_button_2_hover.png (3 bytes)
%Program Files%\Widget 1.2\images\gadget_button_0_hover.png (3 bytes)
%Program Files%\Widget 1.2\images\gadget_button_1_normal.png (2 bytes)
%Program Files%\Widget 1.2\lang\en-US.xml (61 bytes)
%Program Files%\Widget 1.2\images\gadget_button_2_pressed.png (3 bytes)
%Program Files%\Widget 1.2\images\gadget_button_3_hover.png (480 bytes)
%Program Files%\Widget 1.2\Uninstall.exe (3740 bytes)
%Program Files%\Widget 1.2\images\gadget_button_0_pressed.png (362 bytes)
%Program Files%\Widget 1.2\Gadget.Xml (2 bytes)
%Program Files%\Widget 1.2\images\gadget_button_1_pressed.png (6 bytes)
%Program Files%\Widget 1.2\images\gadget_button_3_pressed.png (3 bytes)
%Program Files%\Widget 1.2\images\gadget_button_4_hover.png (3 bytes)
%Program Files%\Widget 1.2\images\gadget_button_3_normal.png (1 bytes)
%Program Files%\Widget 1.2\images\gadget_button_0_normal.png (1 bytes)
%Program Files%\Widget 1.2\Uninstall.ini (3 bytes)
%Program Files%\Widget 1.2\images\gadget_button_4_normal.png (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\$inst\temp_0.tmp (674 bytes)
%Program Files%\Widget 1.2\images\gadget_button_1_hover.png (6 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\$inst\2.tmp (68 bytes)
%Program Files%\Widget 1.2\images\gadget_button_4_pressed.png (3 bytes)
%Program Files%\Widget 1.2\lang\de-De.xml (1 bytes)
%Program Files%\Widget 1.2\images\gadget_bg.png (24 bytes)
%Program Files%\Widget 1.2\TrayIcon.ico (1641 bytes)

The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\$inst (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\$inst\2.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\$inst\temp_0.tmp (0 bytes)

The process evb77CA.tmp:2580 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb75BB.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb77CA.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb77F9.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb75E4.tmp (0 bytes)

The process evb33D.tmp:2588 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb35E.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb33D.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1D4.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb187.tmp (0 bytes)

The process evbFEED.tmp:4004 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFEED.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFD36.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFF0D.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFCF4.tmp (0 bytes)

The process evbD6FB.tmp:912 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD544.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD5B5.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD71B.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD6FB.tmp (0 bytes)

The process evbF76A.tmp:288 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF739.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFA68.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF797.tmp (0 bytes)

The process evbFDFA.tmp:3800 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFE1A.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFC96.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFC53.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFDFA.tmp (0 bytes)

The process evb4DBD.tmp:2896 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4DDD.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4C06.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4BED.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4DBD.tmp (0 bytes)

The process evb35DD.tmp:1804 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb35DD.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb35FD.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3426.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3429.tmp (0 bytes)

The process evbEEDB.tmp:3240 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbEEDB.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbED24.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbEEFB.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbED79.tmp (0 bytes)

The process evbFFB1.tmp:2328 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFFD1.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFE3B.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFDFA.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFFB1.tmp (0 bytes)

The process evbED24.tmp:3696 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbEBD4.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbED44.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbEB7D.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbED24.tmp (0 bytes)

The process evb2884.tmp:2700 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb26DD.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb28A4.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2884.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb26F0.tmp (0 bytes)

The process evb1E4B.tmp:3352 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1C75.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1E4B.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1E6B.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1CD2.tmp (0 bytes)

The process evbBA49.tmp:4016 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb8FC0.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb7CEA.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE9A4.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbBA49.tmp (0 bytes)

The process evbE649.tmp:140 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE4F1.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE649.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE669.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE492.tmp (0 bytes)

The process evbDDB7.tmp:3484 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDC69.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDDB7.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDC00.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDDD7.tmp (0 bytes)

The process evbFC53.tmp:4044 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFAE1.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFA9C.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFC53.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFC73.tmp (0 bytes)

The process evb4C06.tmp:3336 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4A30.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4C06.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4A29.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4C26.tmp (0 bytes)

The process Helper.exe:2772 makes changes in the file system.
The Worm creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\system.ini (0 bytes)

The process Helper.exe:3644 makes changes in the file system.
The Worm creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbEB9D.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb150E.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb7CEA.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE810.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC111.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb30F8.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD1F5.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1927.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4889.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2546.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5E93.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3784.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4A60.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDF8D.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb656F.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb59AE.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb46E2.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE9A4.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5499.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF75E.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb505.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb6398.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFABC.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC44F.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE649.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb757.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCB39.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb239F.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbED24.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC983.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF239.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb30D8.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb21F8.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb52E2.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF400.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDC00.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbAD4.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1C95.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2526.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb21D7.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1190.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC8B.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb16A5.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5D0C.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb14EE.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC298.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD8A2.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1347.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2884.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFE1A.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFC73.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD6FB.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbEEDB.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb57F7.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4E5.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE2EB.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDA79.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb605A.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF259.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb511B.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb35DD.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb93D.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD216.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5640.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbED44.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDFAD.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb7604.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD544.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3C99.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb48A9.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1C75.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFD56.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD39D.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCED7.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb35E.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF915.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1009.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE52.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCD20.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5B35.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE669.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC9A3.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbEEFB.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb327F.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4F84.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE154.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb7D29.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCAB.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb184C.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb16C5.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb41CD.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF73E.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb187.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbB4.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2012.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF8F5.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF76A.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1367.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF0B2.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4394.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb395B.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC2B8.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3B02.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCD00.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC5F6.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbBF5A.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3CB9.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb11B0.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE4B2.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1E6B.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC46F.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb77CA.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3E40.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFDFA.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE30B.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1ADE.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb786.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3FF7.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb90D.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCEB7.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE32.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2A4A.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5EB3.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2D99.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb61F1.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb6211.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb52C2.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3446.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb35FD.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3E60.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb393B.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb57D7.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb94.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDDB7.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC7DB.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1ABE.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb597E.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC7FC.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb452B.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF597.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb37A4.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2F60.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2A6B.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4702.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD71B.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDA59.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3426.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb237F.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb26DD.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4C06.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbAF4.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2BF2.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDC20.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF5B7.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5479.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFFD1.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb26FD.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE134.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1E4B.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1FF2.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb603A.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFFB1.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbBF3A.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFE9.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4DDD.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbBA49.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4DBD.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb24C.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFA9C.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE9A7.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC0F1.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb33D.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb77F9.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD3BD.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE492.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb6530.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCB5A.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD8C2.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb454B.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3AE2.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFF0D.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5620.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFC53.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb28A4.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC616.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD07E.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE7F0.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2C12.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD564.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFEED.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb329F.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb75E4.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF091.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbEB7D.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFA68.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD05E.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5CEC.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2F40.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFD36.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF3E0.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb63B8.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb513B.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDDD7.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4A30.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5B55.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4F64.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4017.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1B6.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4374.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb22C.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4C26.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE9D6.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb41ED.tmp (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2DB9.tmp (5 bytes)

The process Helper.exe:3808 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF76A.tmp (0 bytes)

The process Helper.exe:4064 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF76A.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbBA49.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF16F.tmp (0 bytes)

The process evb3FF7.tmp:3004 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4017.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3E40.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3FF7.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3E47.tmp (0 bytes)

The process CL_Debug_Log.txt:2544 makes changes in the file system.
The Worm creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\32.exe (2284 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\SystemCheck.xml (4 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\start.bat (508 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\start2.bat (281 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\64.exe (3341 bytes)

The process evb2A4A.tmp:2904 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2895.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2A4A.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2884.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2A6B.tmp (0 bytes)

The process evbEB7D.tmp:2580 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbEA10.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE9A7.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbEB7D.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbEB9D.tmp (0 bytes)

The process evb6530.tmp:2396 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb6530.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb656F.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb6363.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb6398.tmp (0 bytes)

The process evb603A.tmp:3832 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5E64.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5E93.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb605A.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb603A.tmp (0 bytes)

The process evbDA59.tmp:2800 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD8A2.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDA79.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD92E.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDA59.tmp (0 bytes)

The process evb5CEC.tmp:2572 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5CEC.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5B35.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5D0C.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5B1A.tmp (0 bytes)

The process evb57D7.tmp:2844 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb57D7.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb55FB.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5620.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb57F7.tmp (0 bytes)

The process evbAD4.tmp:1404 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb90D.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb952.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbAF4.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbAD4.tmp (0 bytes)

The process evbBF3A.tmp:3704 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbBF3A.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbBF5A.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbBCE8.tmp (0 bytes)

The process evb1ABE.tmp:2676 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb184C.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb193A.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1ADE.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1ABE.tmp (0 bytes)

The process evbF73E.tmp:2224 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF75E.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF5E2.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF597.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF73E.tmp (0 bytes)

The process evb4A30.tmp:944 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4A30.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4874.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4889.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4A60.tmp (0 bytes)

The process evb1347.tmp:3896 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1367.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1347.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1190.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb11BB.tmp (0 bytes)

The process evbC44F.tmp:1412 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC298.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC46F.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC44F.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC31F.tmp (0 bytes)

The process evbF8F5.tmp:552 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF915.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF73E.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF787.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF8F5.tmp (0 bytes)

The process evb5620.tmp:3056 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5640.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5466.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5620.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5479.tmp (0 bytes)

The process evbD05E.tmp:3184 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD07E.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCEB7.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD05E.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCF30.tmp (0 bytes)

The process evbCD00.tmp:100 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCD00.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCB39.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCBB7.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCD20.tmp (0 bytes)

The process evb757.tmp:2564 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb786.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb757.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4E5.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5CA.tmp (0 bytes)

The process evbF091.tmp:2804 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbEEDB.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF091.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF0B2.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbEF2E.tmp (0 bytes)

The process evbC7DB.tmp:1704 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC6B8.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC7FC.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC5F6.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC7DB.tmp (0 bytes)

The process %original file name%.exe:1900 makes changes in the file system.
The Worm creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Roaming\1337\t.exe (98962 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsh79A2.tmp (112956 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsh79A3.tmp\System.dll (23 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\1337\setupQW.exe (18372 bytes)

The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss7992.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsh79A3.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsh79A3.tmp\System.dll (0 bytes)

The process t.exe:2044 makes changes in the file system.
The Worm creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsh7D4A.tmp (101174 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\1337\start.exe (34072 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsh7D4B.tmp\System.dll (23 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\1337\asacpiex.dll (68799 bytes)

The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss7D3A.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsh7D4B.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsh7D4B.tmp\System.dll (0 bytes)

The process evbCB39.tmp:3460 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCA02.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC983.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCB39.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCB5A.tmp (0 bytes)

The process evb3AE2.tmp:2160 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3B02.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3938.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3AE2.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb393B.tmp (0 bytes)

The process evb4889.tmp:2616 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb46E2.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb46CF.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb48A9.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4889.tmp (0 bytes)

The process evb2BF2.tmp:2080 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2C12.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2BF2.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2A5A.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2A4A.tmp (0 bytes)

The process start.exe:2920 makes changes in the file system.
The Worm creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\start.bat (4 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\aut8120.tmp (2569 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\CL_Debug_Log.txt (1711 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\CR_Debug_Log.txt (2 bytes)

The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\aut8120.tmp (0 bytes)

The process evb1190.tmp:3576 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb11B0.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1016.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1190.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFE9.tmp (0 bytes)

The process evb3784.tmp:2532 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb35DD.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb35DE.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3784.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb37A4.tmp (0 bytes)

The process evb41CD.tmp:2732 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb41ED.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb41CD.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3FF7.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3FEC.tmp (0 bytes)

The process evbD544.tmp:1320 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD544.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD410.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD39D.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD564.tmp (0 bytes)

The process evb46E2.tmp:1388 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb452B.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb46E2.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb452A.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4702.tmp (0 bytes)

The process evb184C.tmp:1028 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb184C.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb16A5.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb16CA.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1927.tmp (0 bytes)

The process evb3426.tmp:2948 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3446.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb327F.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3426.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3284.tmp (0 bytes)

The process evbD1F5.tmp:2964 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD1F5.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD0D5.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD05E.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD216.tmp (0 bytes)

The process evb52C2.tmp:2960 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb50FC.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb52E2.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb52C2.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb511B.tmp (0 bytes)

The process evb75E4.tmp:892 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb6530.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb7604.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb692D.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb75E4.tmp (0 bytes)

The process evb2F40.tmp:1848 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2D99.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2F40.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2DA4.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2F60.tmp (0 bytes)

The process evbC8B.tmp:3160 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbB07.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC8B.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbAD4.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCAB.tmp (0 bytes)

The process evbE2EB.tmp:3784 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE197.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE134.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE2EB.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE30B.tmp (0 bytes)

The process evbD8A2.tmp:2828 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD8A2.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD76A.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD6FB.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD8C2.tmp (0 bytes)

The process evb511B.tmp:3488 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb513B.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4F64.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4F57.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb511B.tmp (0 bytes)

The process evb187.tmp:4004 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1B6.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFFB1.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb187.tmp (0 bytes)

The process evbDF8D.tmp:2560 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDDB7.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDE2E.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDF8D.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDFAD.tmp (0 bytes)

The process evb21D7.tmp:880 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb201D.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb21D7.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1FF2.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb21F8.tmp (0 bytes)

The process evb1C75.tmp:1192 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1C75.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1C95.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1ADF.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1ABE.tmp (0 bytes)

The process evb4E5.tmp:2184 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4E5.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb505.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb379.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb33D.tmp (0 bytes)

The process evb452B.tmp:2724 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb452B.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4374.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4375.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb454B.tmp (0 bytes)

The process evb5479.tmp:960 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5499.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb52C2.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb52B1.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5479.tmp (0 bytes)

The process evb3C99.tmp:3704 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3C99.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3ADD.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3AE2.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3CB9.tmp (0 bytes)

The process evb237F.tmp:264 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb21F1.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb239F.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb21D7.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb237F.tmp (0 bytes)

The process evbFD36.tmp:2328 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFB2F.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFD36.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFD56.tmp (0 bytes)

The process evb4F64.tmp:3064 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4F84.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4F64.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4DA2.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4DBD.tmp (0 bytes)

The process evbF597.tmp:4008 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF3E0.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF597.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF42D.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF5B7.tmp (0 bytes)

The process evb5E93.tmp:3792 makes changes in the file system.
The Worm deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5CBF.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5CEC.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5E93.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5EB3.tmp (0 bytes)

Registry activity

The process setupQW.exe:2944 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Widget 1.2 1.2]
"InstallSource" = "C:\Users\"%CurrentUserName%"\AppData\Roaming\1337\"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
"UNCAsIntranet" = "0"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Widget 1.2 1.2]
"DisplayIcon" = "%Program Files%\Widget 1.2\Uninstall.exe"
"Publisher" = "Aqtepq"
"Language" = "1049"
"EstimatedSize" = "1061"
"InstallLocation" = "%Program Files%\Widget 1.2\"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WidjetPro]
"Widget 1.2" = "Widget 1.2"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Widget 1.2 1.2]
"InstallDate" = "20171001"
"NoModify" = "1"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer]
"GlobalAssocChangedCounter" = "47"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Widget 1.2 1.2]
"VersionMinor" = "2"
"UninstallString" = "%Program Files%\Widget 1.2\Uninstall.exe"
"DisplayVersion" = "1.2"
"VersionMajor" = "1"
"DisplayName" = "Widget 1.2 1.2"
"NoRepair" = "1"

The Worm deletes the following value(s) in system registry:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"

The process %original file name%.exe:1900 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
"UNCAsIntranet" = "0"

The Worm deletes the following value(s) in system registry:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"

The process t.exe:2044 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
"UNCAsIntranet" = "0"

The Worm deletes the following value(s) in system registry:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"

The process Âèäæåò.exe:1956 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:

[HKCU\Software\Ashampoo\Ashampoo Gadge It\Виджет]
"InStartup" = "True"
"AlwaysOnTop" = "True"

[HKCU\Software\Microsoft\Direct3D\MostRecentApplication]
"Name" = "Âèäæåò.exe"

[HKCU\Software\Ashampoo\Ashampoo Gadge It\Виджет]
"Culture" = "en-US"
"Top" = "4"

"Left" = "1112"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
"UNCAsIntranet" = "0"

[HKCU\Software\Ashampoo\Ashampoo Gadge It\Виджет]
"FirstStart" = "True"
"NoSound" = "False"

To automatically run itself each time Windows is booted, the Worm adds the following link to its file to the system registry autorun key:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"Виджет" = "%Program Files%\Widget 1.2\Âèäæåò.exe"

The Worm deletes the following value(s) in system registry:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"

Dropped PE files

MD5 File path
5fd1c5913efc5aa72eb25d9393e42154 c:\Program Files\Widget 1.2\Uninstall.exe
7ec2dc7b1f8f981bda11868fd9493234 c:\Program Files\Widget 1.2\Âèäæåò.exe
75170ad2241322535bdecfb593a36005 c:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb6530.tmp
1547e328a2a31bbbd0872f0bf4d43be3 c:\Users\"%CurrentUserName%"\AppData\Roaming\1337\setupQW.exe
d5676405cdffddde484c5ad18ee4c6db c:\Users\"%CurrentUserName%"\AppData\Roaming\1337\start.exe
dc084bb973bcd8848055834f9e338d84 c:\Users\"%CurrentUserName%"\AppData\Roaming\1337\t.exe
c7469faebcffe26ab31ab1969c2542fe c:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Helper.exe

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

VersionInfo

Company Name:
Product Name:
Product Version:
Legal Copyright:
Legal Trademarks:
Original Filename:
Internal Name:
File Version: 7.0.0.0
File Description: description
Comments:
Language: English (United States)

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 4096 24005 24064 4.48543 566b191b40fde4369ae73a05b57df1d2
.rdata 28672 4678 5120 3.46601 6389f916226544852e494114faf192ad
.data 36864 108568 1024 3.61864 72dcd89e8824ae186467be61797ed81e
.ndata 147456 32768 0 0 d41d8cd98f00b204e9800998ecf8427e
.rsrc 180224 17496 17920 3.78365 e25321868725faf414cd7f22c8356252

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

Total found: 5
f4531e0297cc6c977114255f443dc2c7
dc084bb973bcd8848055834f9e338d84
cfb43a3a01053dba33367b16a198d824
ef9c75dacd44f0be1fa9aa211de3ce63
b70475753ba0741d1524be2f36a928fa

URLs

URL IP
hxxp://ezstat.ru/1SbdV6 88.99.66.31


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

Traffic

GET /1SbdV6 HTTP/1.1
Connection: Keep-Alive
Content-Type: text/plain; Charset=UTF-8
Accept: */*
User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
Host: ezstat.ru


HTTP/1.1 200 OK
Server: nginx
Date: Sat, 30 Sep 2017 22:48:00 GMT
Content-Type: image/png
Transfer-Encoding: chunked
Connection: keep-alive
Set-Cookie: PHPSESSID=2cmr9dkhaal6f2d6uua58l4hn3; path=/; HttpOnly
Pragma: no-cache
Set-Cookie: clhf03028ja=194.242.96.218; expires=Wed, 18-Jul-2029 05:49:51 GMT; Max-Age=372236511; path=/
Cache-Control: max-age=315360000
Expires: Thu, 31 Dec 2037 23:55:55 GMT
X-Frame-Options: SAMEORIGIN
74...PNG........IHDR.............%.V.....PLTE....z=.....tRNS.@..f....p
HYs.......... ......IDAT..c`.......qd.....IEND.B`...0..


The Worm connects to the servers at the folowing location(s):

taskeng.exe_2512:

.text
`.data
.rsrc
@.reloc
USER32.dll
msvcrt.dll
ntdll.dll
API-MS-Win-Core-Debug-L1-1-0.dll
API-MS-Win-Core-ErrorHandling-L1-1-0.dll
API-MS-Win-Core-File-L1-1-0.dll
API-MS-Win-Core-Handle-L1-1-0.dll
API-MS-Win-Core-Heap-L1-1-0.dll
API-MS-Win-Core-Interlocked-L1-1-0.dll
API-MS-Win-Core-LibraryLoader-L1-1-0.dll
API-MS-Win-Core-Misc-L1-1-0.dll
API-MS-Win-Core-ProcessEnvironment-L1-1-0.dll
API-MS-Win-Core-ProcessThreads-L1-1-0.dll
API-MS-Win-Core-Profile-L1-1-0.dll
API-MS-Win-Core-Synch-L1-1-0.dll
API-MS-Win-Core-SysInfo-L1-1-0.dll
API-MS-Win-Core-ThreadPool-L1-1-0.dll
API-MS-Win-Security-Base-L1-1-0.dll
ole32.dll
OLEAUT32.dll
RPCRT4.dll
KERNEL32.dll
.TBvf
d:\w7rtm\admin\wmi\jobs\server\session\session\main.cpp
Session::ChannelMsgReceived
d:\w7rtm\admin\wmi\jobs\server\session\session\session.cpp
d:\w7rtm\admin\wmi\jobs\server\session\session\clientchannel2.cpp
d:\w7rtm\admin\wmi\jobs\server\engine\task.cpp
d:\w7rtm\admin\wmi\jobs\server\engine\comhandlerbase.cpp
StopJobMsg
StartJobMsg
ClientPipeName
Invalid parameter passed to C runtime function.
d:\w7rtm\admin\wmi\jobs\common\xml\taskxmlreader.cpp
TaskScheduler.log
j%Xf;
d:\w7rtm\admin\wmi\jobs\server\engine\action.cpp
API-MS-WIN-Service-Management-L1-1-0.dll
API-MS-WIN-Service-winsvc-L1-1-0.dll
ADVAPI32.dll
SHELL32.dll
SHLWAPI.dll
SspiCli.dll
XmlLite.dll
MPR.dll
RegOpenKeyTransactedW
RegCloseKey
RegOpenKeyExW
RegNotifyChangeKeyValue
RegCreateKeyExW
FindExecutableW
MsgWaitForMultipleObjects
EnumThreadWindows
EnumWindows
GetProcessWindowStation
_wcmdln
_amsg_exit
GetProcessHeap
SetProcessShutdownParameters
TaskEng.pdb
version="5.1.0.0"
name="Microsoft.Windows.WMI.TaskScheduler.TaskEng"
<requestedExecutionLevel
8 8$8(878
3=4Z4w4
=!=(=0=4=?=>>
5 5U5_5
5b6u6
-131J1X1o1}1
=$=<=\=|=
Password
hXXp://schemas.microsoft.com/windows/2004/02/mit/task
Mieframe.dll
%SystemRoot%\SYSTEM32\cmd.exe
%SystemRoot%\System32\Tasks
SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Configuration
SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule
SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Handshake
WindowSeconds
InitializeCmdlineProcessing()
pCrimson provider registration failed for taskeng, hr=0x%x
CATCH_KNOWN: %S ==> hr=0x%x [%S(),%d,%S]
InteractiveTokenOrPassword
Murl
%d.%d
%s, (%d)
hXXp://schemas.microsoft.com/cdo/configuration/smtpconnectiontimeout
hXXp://schemas.microsoft.com/cdo/configuration/smtpauthenticate
hXXp://schemas.microsoft.com/cdo/configuration/sendusing
hXXp://schemas.microsoft.com/cdo/configuration/smtpserver
201ef99a-7fa0-444c-9399-19ba84f12a1a
C:\Windows\SYSTEM32\cmd.exe
6.1.7601.17514 (win7sp1_rtm.101119-1850)
taskeng.exe
Windows
Operating System
6.1.7601.17514

Helper.exe_3644:

.text
`.rdata
@.data
.rsrc
@.reloc
B.enigma1
.enigma2
j.Yf;
r%f;M
j.Xf;
j.Zf;
PSSSSSSh
Gt.Ht$
@Ew.AEw
Bv.TBv
Bv.SCv
kernel32.dll
?#%X.y
GetProcessWindowStation
operator
operand of unlimited repeat could match the empty string
POSIX named classes are supported only within a class
erroffset passed as NULL
POSIX collating elements are not supported
this version of PCRE is compiled without UTF support
PCRE does not support \L, \l, \N{name}, \U, or \u
support for \P, \p, and \X has not been compiled
this version of PCRE is not compiled with Unicode property support
\N is not supported in a class
RegDeleteKeyExW
advapi32.dll
Error text not found (please report)
WSOCK32.dll
VERSION.dll
WINMM.dll
COMCTL32.dll
MPR.dll
InternetCrackUrlW
HttpQueryInfoW
HttpOpenRequestW
HttpSendRequestW
FtpOpenFileW
FtpGetFileSize
InternetOpenUrlW
WININET.dll
PSAPI.DLL
IPHLPAPI.DLL
USERENV.dll
UxTheme.dll
GetProcessHeap
CreatePipe
GetWindowsDirectoryW
KERNEL32.dll
OpenWindowStationW
SetProcessWindowStation
CloseWindowStation
MapVirtualKeyW
EnumChildWindows
EnumWindows
VkKeyScanW
GetKeyState
GetKeyboardState
SetKeyboardState
GetAsyncKeyState
keybd_event
EnumThreadWindows
ExitWindowsEx
UnregisterHotKey
RegisterHotKey
GetKeyboardLayoutNameW
USER32.dll
SetViewportOrgEx
GDI32.dll
COMDLG32.dll
RegOpenKeyExW
RegCloseKey
RegCreateKeyExW
RegEnumKeyExW
RegDeleteKeyW
ADVAPI32.dll
ShellExecuteW
SHFileOperationW
ShellExecuteExW
SHELL32.dll
ole32.dll
OLEAUT32.dll
GetCPInfo
zcÁ
(V%dSS%
n..GGHHH
n...GGHHH
n ....HGHHHH
n  ....G.HHH
~~~~{~{{{{
n!! ....HGHHHH
n!!  .....HHHHHH
!!!  ....GGHHH
!!"".....HHHHnv
"""...-.nv
x.Zgu
_C.PV
GQ.ww
Px%4X
.WqmR"
9z.jg6a
V{fDKre.KNJ2
!X.sN
6.oQ_
'%cSG
.M E.nSH
\%Xjg
u4#:.pZ
6A:.jv
.iD%5
g.DU}m
/^ .vt
Z".Yild
<assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" language="*" processorArchitecture="*" publicKeyToken="6595b64144ccf1df"/>
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/>
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/>
<supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/>
<supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/>
<supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"/>
;$;*;0;6;<;|;
=#=(=-=2=7===
3.44484<4@4
3&323^3|3
9 9$9(9,9?9
?#?'? ?/?3?7?;???
4"4&4*4.424
7)868=8=:
= =$=(=,=0=4=8=
0 0$0(0,00040
3"3(313]3
1!1%1)1-1115191=1
< <*<4<{<
<$=4=8=<=
3 3(30383@3
.idata
.edata
P.reloc
P.rsrc
HL%fQ
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
oleaut32.dll
EVariantBadIndexError
!"#$%&*;<=>@[]^_`{|}
Uh0%S
ZwOpenKey
ZwEnumerateValueKey
ZwQueryKey
ZwQueryValueKey
ZwCreateKey
ZwEnumerateKey
ZwSetValueKey
ZwDeleteKey
ZwDeleteValueKey
ZwFlushKey
ZwLoadKey
ZwLoadKey2
ZwNotifyChangeKey
ZwQueryMultipleValueKey
ZwReplaceKey
ZwRestoreKey
ZwSaveKey
ZwSetInformationKey
ZwUnloadKey
ZwOpenKeyEx
ntdll.dll
ZwQuerySection, Unsupported class %d
KeySetValue unsupported value type
ZwQueryValueKey, unsupported class %d
ZwQueryKey, unsupported class %d
ZwQueryObject with unsupported class
WARNING ZwReadFileInformation with unsupported class
ZwSetInformationFile with unsupported class
sxs.dll
THookWindowsAPI
Cannot find function %s in library %s
Cannot find function ordinal %d in library %s
.section
user32.dll
GetKeyboardType
RegOpenKeyExA
RegOpenKeyA
GetWindowsDirectoryA
RtlFormatCurrentUserKeyPath
SHFolder.dll
shlwapi.dll
loaderx86.dll
KWindows
TntWindows
UrlMon
virtualboximportunit
2 2$2(2,2|2
6 6$6(6<6
8#8'8 8/83878;8?8:9`9
9"9&9*9.9
9'9/9<9_9}9
@ÞDaD
/AutoIt3ExecuteScript
/AutoIt3ExecuteLine
CMDLINE
CMDLINERAW
>>>AUTOIT NO CMDEXECUTE<<<
FTPSETPROXY
GUICTRLRECVMSG
GUICTRLSENDMSG
GUIGETMSG
GUIREGISTERMSG
HOTKEYSET
HTTPSETPROXY
HTTPSETUSERAGENT
ISKEYWORD
MAPKEYS
MSGBOX
REGENUMKEY
SHELLEXECUTE
SHELLEXECUTEWAIT
TCPACCEPT
TCPCLOSESOCKET
TCPCONNECT
TCPLISTEN
TCPNAMETOIP
TCPRECV
TCPSEND
TCPSHUTDOWN
TCPSTARTUP
TRAYGETMSG
UDPBIND
UDPCLOSESOCKET
UDPOPEN
UDPRECV
UDPSEND
UDPSHUTDOWN
UDPSTARTUP
SendKeyDownDelay
SendKeyDelay
TCPTimeout
mscoree.dll
combase.dll
- floating point support not loaded
- CRT not initialized
- Attempt to initialize the CRT more than once.
USER32.DLL
789:;<=>?
APPSKEY
WINDOWSDIR
AUTOITEXE
HOTKEYPRESSED
%s (%d) : ==> %s.:
Line %d:
Line %d (File "%s"):
%s (%d) : ==> %s:
AutoIt script files (*.au3, *.a3x)
*.au3;*.a3x
All files (*.*)
KEYS
\\?\UNC\
04090000
%u.%u.%u.%u
0.0.0.0
Mddddd
"%s" (%d) : ==> %s:
\??\%s
GUI_RUNDEFMSG
AUTOITCALLVARIABLE%d
255.255.255.255
Keyword
AUTOIT.ERROR
Null Object assignment in FOR..IN loop
Incorrect Object type in FOR..IN loop
3, 3, 14, 2
HKEY_LOCAL_MACHINE
HKEY_CLASSES_ROOT
HKEY_CURRENT_CONFIG
HKEY_CURRENT_USER
HKEY_USERS
%d/d/d
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Helper.exe
AutoIt supports the __stdcall (WINAPI) and __cdecl calling conventions. The __stdcall (WINAPI) convention is used by default but __cdecl can be used instead. See the DllCall() documentation for details on changing the calling convention.
Missing operator in expression."Unbalanced brackets in expression.
Error parsing function call.0Incorrect number of parameters in function call.'"ReDim" used without an array variable.>Illegal text at the end of statement (one statement per line).1"If" statement has no matching "EndIf" statement.1"Else" statement with no matching "If" statement.2"EndIf" statement with no matching "If" statement.7Too many "Else" statements for matching "If" statement.3"While" statement has no matching "Wend" statement.4"Wend" statement with no matching "While" statement.%Variable used without being declared.XArray variable has incorrect number of subscripts or subscript dimension range exceeded.#Variable subscript badly formatted.*Subscript used on non-accessible variable.&Too many subscripts used for an array.0Missing subscript dimensions in "Dim" statement.NNo variable given for "Dim", "Local", "Global", "Struct" or "Const" statement.
0Expected a "=" operator in assignment statement.*Invalid keyword at the start of this line.
Invalid element in a DllStruct.*Unknown option or bad parameter specified.&Unable to load the internet libraries./"Struct" statement has no matching "EndStruct".HUnable to open file, the maximum number of open files has been exceeded.K"ContinueLoop" statement with no matching "While", "Do" or "For" statement.
Invalid file filter given.*Expected a variable in user function call.1"Do" statement has no matching "Until" statement.2"Until" statement with no matching "Do" statement.#"For" statement is badly formatted.2"Next" statement with no matching "For" statement.N"ExitLoop/ContinueLoop" statements only valid from inside a For/Do/While loop.1"For" statement has no matching "Next" statement.@"Case" statement with no matching "Select"or "Switch" statement.:"EndSelect" statement with no matching "Select" statement.ORecursion level has been exceeded - AutoIt will quit to prevent stack overflow.&Cannot make existing variables static.4Cannot make static variables into regular variables.
3This keyword cannot be used after a "Then" keyword.>"Select" statement is missing "EndSelect" or "Case" statement. "If" statements must have a "Then" keyword. Badly formated Struct statement."Cannot assign values to constants..Cannot make existing variables into constants.9Only Object-type variables allowed in a "With" statement.v"long_ptr", "int_ptr" and "short_ptr" DllCall() types have been deprecated. Use "long*", "int*" and "short*" instead.-Object referenced outside a "With" statement.)Nested "With" statements are not allowed."Variable must be of type "Object".1The requested action with this object has failed.8Variable appears more than once in function declaration.2ReDim array can not be initialized in this manner.1An array variable can not be used in this manner.
Can not redeclare a constant.5Can not redeclare a parameter inside a user function.HCan pass constants by reference only to parameters with "Const" keyword.*Can not initialize a variable with itself.$Incorrect way to use this parameter.:"EndSwitch" statement with no matching "Switch" statement.>"Switch" statement is missing "EndSwitch" or "Case" statement.H"ContinueCase" statement with no matching "Select"or "Switch" statement.
String missing closing quote.!Badly formated variable or macro.*Missing separator character after keyword.
ÞFAULT FOLDER%
Cheking.exe
%SYSTEM FOLDER%
%WINDOWS FOLDER%
%Cookies FOLDER%
hh.exe
write.exe
attrib.exe
chkdsk.exe
compact.exe
find.exe
help.exe
winver.exe
regsvr32.exe
replace.exe
dllhost.exe
ntvdm.exe
tcpsvcs.exe
Was not able to create virtual value at ImportCall_ZwSetValueKey
Was not able to create virtual key at ImportCall_ZwSetValueKey
ImportCall_ZwLoadKey
ImportCall_ZwLoadKey2
ImportCall_ZwNotifyChangeKey
ImportCall_ZwQueryMultipleValueKey
ImportCall_ZwReplaceKey
ImportCall_ZwRestoreKey
ImportCall_ZwSaveKey
ImportCall_ZwSetInformationKey
ImportCall_ZwUnloadKey
evb*.tmp
.manifest
Unsupported call of ZwSetVolumeInformationFile
<>:"/\|?*
7Dispatch methods do not support more than 64 parameters
Cannot assign a %s to a %s%String list does not allow duplicates
Cannot create file "%s". %s
Cannot open file "%s". %s
Invalid property value List capacity out of bounds (%d)
List count out of bounds (%d)
List index out of bounds (%d)
%s.Seek not implemented$Operation not allowed on sorted list
OLE error %.8x.Method '%s' not supported by automation object/Variant does not reference an automation object
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
Invalid variant operation%Invalid variant operation (%s%.8x)
%s5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
Operation not supported
External exception %x
Interface not supported
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Privileged instruction(Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'"Variant method calls not supported
I/O error %d
Integer overflow Invalid floating point operation

Helper.exe_3644_rwx_0051C000_00001000:

ÞFAULT FOLDER%
Cheking.exe

Helper.exe_3644_rwx_0054F000_00005000:

ntdll.dll
.section
kernel32.dll
user32.dll
GetKeyboardType
advapi32.dll
RegOpenKeyExA
RegCloseKey
oleaut32.dll
RegOpenKeyA
GetWindowsDirectoryW
GetWindowsDirectoryA
GetCPInfo


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    evb30D8.tmp:600
    evb16A5.tmp:4092
    evb1FF2.tmp:3916
    evbD39D.tmp:3016
    evb2D99.tmp:1004
    evbFE9.tmp:996
    evbE9A7.tmp:892
    evb2526.tmp:1776
    evb14EE.tmp:896
    evbE32.tmp:3620
    evbE134.tmp:3856
    evb26DD.tmp:2924
    evbCEB7.tmp:3360
    evbC298.tmp:3816
    evbC983.tmp:3200
    evb7CEA.tmp:2848
    evb5B35.tmp:3472
    evbE7F0.tmp:3680
    evbC5F6.tmp:2720
    evbE492.tmp:3820
    evb61F1.tmp:1996
    evb6398.tmp:3828
    evb3E40.tmp:2816
    evb393B.tmp:3692
    evbDC00.tmp:3400
    evb597E.tmp:2868
    evbC0F1.tmp:2820
    evbF239.tmp:3992
    evb90D.tmp:3328
    evb4374.tmp:1740
    evb22C.tmp:3120
    evbF3E0.tmp:3780
    evb94.tmp:3044
    evbFA9C.tmp:2280
    evb327F.tmp:1772
    setupQW.exe:2944
    evb77CA.tmp:2580
    evb33D.tmp:2588
    evbFEED.tmp:4004
    evbD6FB.tmp:912
    evbF76A.tmp:288
    evbFDFA.tmp:3800
    evb4DBD.tmp:2896
    evb35DD.tmp:1804
    evbEEDB.tmp:3240
    evbFFB1.tmp:2328
    evbED24.tmp:3696
    evb2884.tmp:2700
    evb1E4B.tmp:3352
    evbBA49.tmp:4016
    evbE649.tmp:140
    evbDDB7.tmp:3484
    evbFC53.tmp:4044
    evb4C06.tmp:3336
    Helper.exe:2772
    Helper.exe:3808
    Helper.exe:4064
    evb3FF7.tmp:3004
    CL_Debug_Log.txt:2544
    evb2A4A.tmp:2904
    evbEB7D.tmp:2580
    evb6530.tmp:2396
    evb603A.tmp:3832
    evbDA59.tmp:2800
    evb5CEC.tmp:2572
    evb57D7.tmp:2844
    evbAD4.tmp:1404
    evbBF3A.tmp:3704
    evb1ABE.tmp:2676
    evbF73E.tmp:2224
    evb4A30.tmp:944
    evb1347.tmp:3896
    evbC44F.tmp:1412
    evbF8F5.tmp:552
    evb5620.tmp:3056
    evbD05E.tmp:3184
    evbCD00.tmp:100
    evb757.tmp:2564
    evbF091.tmp:2804
    evbC7DB.tmp:1704
    %original file name%.exe:1900
    t.exe:2044
    evbCB39.tmp:3460
    evb3AE2.tmp:2160
    evb4889.tmp:2616
    evb2BF2.tmp:2080
    start.exe:2920
    evb1190.tmp:3576
    evb3784.tmp:2532
    evb41CD.tmp:2732
    evbD544.tmp:1320
    evb46E2.tmp:1388
    evb184C.tmp:1028
    evb3426.tmp:2948
    evbD1F5.tmp:2964
    evb52C2.tmp:2960
    evb75E4.tmp:892
    evb2F40.tmp:1848
    evbC8B.tmp:3160
    evbE2EB.tmp:3784
    evbD8A2.tmp:2828
    evb511B.tmp:3488
    evb187.tmp:4004
    evbDF8D.tmp:2560
    evb21D7.tmp:880
    evb1C75.tmp:1192
    evb4E5.tmp:2184
    evb452B.tmp:2724
    evb5479.tmp:960
    evb3C99.tmp:3704
    evb237F.tmp:264
    evbFD36.tmp:2328
    evb4F64.tmp:3064
    evbF597.tmp:4008
    evb5E93.tmp:3792

  2. Delete the original Worm file.
  3. Delete or disinfect the following files created/modified by the Worm:

    %Program Files%\Widget 1.2\Âèäæåò.exe (14857 bytes)
    %Program Files%\Widget 1.2\images\gadget_button_2_normal.png (2 bytes)
    %Program Files%\Widget 1.2\images\gadget_button_2_hover.png (3 bytes)
    %Program Files%\Widget 1.2\images\gadget_button_0_hover.png (3 bytes)
    %Program Files%\Widget 1.2\images\gadget_button_1_normal.png (2 bytes)
    %Program Files%\Widget 1.2\lang\en-US.xml (61 bytes)
    %Program Files%\Widget 1.2\images\gadget_button_2_pressed.png (3 bytes)
    %Program Files%\Widget 1.2\images\gadget_button_3_hover.png (480 bytes)
    %Program Files%\Widget 1.2\Uninstall.exe (3740 bytes)
    %Program Files%\Widget 1.2\images\gadget_button_0_pressed.png (362 bytes)
    %Program Files%\Widget 1.2\Gadget.Xml (2 bytes)
    %Program Files%\Widget 1.2\images\gadget_button_1_pressed.png (6 bytes)
    %Program Files%\Widget 1.2\images\gadget_button_3_pressed.png (3 bytes)
    %Program Files%\Widget 1.2\images\gadget_button_4_hover.png (3 bytes)
    %Program Files%\Widget 1.2\images\gadget_button_3_normal.png (1 bytes)
    %Program Files%\Widget 1.2\images\gadget_button_0_normal.png (1 bytes)
    %Program Files%\Widget 1.2\Uninstall.ini (3 bytes)
    %Program Files%\Widget 1.2\images\gadget_button_4_normal.png (1 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\$inst\temp_0.tmp (674 bytes)
    %Program Files%\Widget 1.2\images\gadget_button_1_hover.png (6 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\$inst\2.tmp (68 bytes)
    %Program Files%\Widget 1.2\images\gadget_button_4_pressed.png (3 bytes)
    %Program Files%\Widget 1.2\lang\de-De.xml (1 bytes)
    %Program Files%\Widget 1.2\images\gadget_bg.png (24 bytes)
    %Program Files%\Widget 1.2\TrayIcon.ico (1641 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\system.ini (0 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbEB9D.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb150E.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb7CEA.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE810.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC111.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb30F8.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD1F5.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1927.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4889.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2546.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5E93.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3784.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4A60.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDF8D.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb656F.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb59AE.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb46E2.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE9A4.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5499.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF75E.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb505.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb6398.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFABC.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC44F.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE649.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb757.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCB39.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb239F.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbED24.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC983.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF239.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb30D8.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb21F8.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb52E2.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF400.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDC00.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbAD4.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1C95.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2526.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb21D7.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1190.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC8B.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb16A5.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5D0C.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb14EE.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC298.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD8A2.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1347.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2884.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFE1A.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFC73.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD6FB.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbEEDB.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb57F7.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4E5.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE2EB.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDA79.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb605A.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF259.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb511B.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb35DD.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb93D.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD216.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5640.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbED44.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDFAD.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb7604.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD544.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3C99.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb48A9.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1C75.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFD56.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD39D.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCED7.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb35E.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF915.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1009.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE52.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCD20.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5B35.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE669.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC9A3.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbEEFB.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb327F.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4F84.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE154.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb7D29.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCAB.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb184C.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb16C5.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb41CD.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF73E.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb187.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbB4.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2012.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF8F5.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF76A.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1367.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF0B2.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4394.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb395B.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC2B8.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3B02.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCD00.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC5F6.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbBF5A.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3CB9.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb11B0.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE4B2.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1E6B.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC46F.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb77CA.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3E40.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFDFA.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE30B.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1ADE.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb786.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3FF7.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb90D.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCEB7.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE32.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2A4A.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5EB3.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2D99.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb61F1.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb6211.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb52C2.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3446.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb35FD.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3E60.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb393B.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb57D7.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb94.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDDB7.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC7DB.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1ABE.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb597E.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC7FC.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb452B.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF597.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb37A4.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2F60.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2A6B.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4702.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD71B.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDA59.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3426.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb237F.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb26DD.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4C06.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbAF4.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2BF2.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDC20.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF5B7.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5479.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFFD1.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb26FD.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE134.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1E4B.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1FF2.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb603A.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFFB1.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbBF3A.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFE9.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4DDD.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbBA49.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4DBD.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb24C.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFA9C.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE9A7.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC0F1.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb33D.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb77F9.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD3BD.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE492.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb6530.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbCB5A.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD8C2.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb454B.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb3AE2.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFF0D.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5620.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFC53.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb28A4.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbC616.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD07E.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE7F0.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2C12.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD564.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFEED.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb329F.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb75E4.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF091.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbEB7D.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFA68.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbD05E.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5CEC.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2F40.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbFD36.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbF3E0.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb63B8.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb513B.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbDDD7.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4A30.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb5B55.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4F64.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4017.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb1B6.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4374.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb22C.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb4C26.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evbE9D6.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb41ED.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\evb2DB9.tmp (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\32.exe (2284 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\SystemCheck.xml (4 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\start.bat (508 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\start2.bat (281 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\64.exe (3341 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Roaming\1337\t.exe (98962 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsh79A2.tmp (112956 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsh79A3.tmp\System.dll (23 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Roaming\1337\setupQW.exe (18372 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsh7D4A.tmp (101174 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Roaming\1337\start.exe (34072 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsh7D4B.tmp\System.dll (23 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Roaming\1337\asacpiex.dll (68799 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\aut8120.tmp (2569 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\CL_Debug_Log.txt (1711 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\CR_Debug_Log.txt (2 bytes)

  4. Delete the following value(s) in the autorun key (How to Work with System Registry):

    [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
    "Виджет" = "%Program Files%\Widget 1.2\Âèäæåò.exe"

  5. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  6. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now