Worm.Win32.AutoItGen_b18b311282
HEUR:Worm.Script.Generic (Kaspersky), Trojan.Ciusky.Gen.12 (AdAware), Installer.Win32.InnoSetup.FD, Trojan.MSIL.Bladabindi.2.FD, Trojan.Win32.Iconomon.FD, Trojan.Win32.Sasfis.FD, Trojan.Win32.Swrort.3.FD, VirTool.Win32.DelfInject.FD, Worm.Win32.AutoIt.FD, WormAutoItGen.YR (Lavasoft MAS)
Behaviour: Trojan, Worm, Installer, VirTool
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: b18b3112826835cc6b5bf05a545bc349
SHA1: f105d474b7f00419133083b96a44c0c29e53c15a
SHA256: 6e81fce8ea208b28c0aa19853880612e437d258657b32b5b68934256d8e6f861
SSDeep: 393216:ooEEhdxzKQI M2IPq5TYlkpIgciatJ7/Ky2k0CrjYWoB4UiCelHD3hL8p64lc:oopkQvIPyY wbCXCUNiColoe
Size: 19577477 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: AirInstaller
Created at: 2012-06-09 16:19:49
Analyzed on: WindowsXP SP3 32-bit
Summary:
Worm. A program that is primarily replicating on networks or removable drives.
Payload
No specific payload has been found.
Process activity
The Worm creates the following process(es):
PNLYA.exe:1244
PNLYA.exe:1900
%original file name%.exe:396
WScript.exe:1932
bitpro.exe:972
The Worm injects its code into the following process(es):
bitpro.tmp:1936
File activity
The process PNLYA.exe:1900 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\KFCUE\SQYLE (173 bytes)
The process %original file name%.exe:396 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\KFCUE\BCREM (237 bytes)
%Documents and Settings%\%current user%\KFCUE\4f97A63.vbe (7972 bytes)
%Documents and Settings%\%current user%\KFCUE\DBIYS (69539 bytes)
%Documents and Settings%\%current user%\KFCUE\YMQGIX (21 bytes)
%Documents and Settings%\%current user%\KFCUE\bitpro.exe (70955 bytes)
%Documents and Settings%\%current user%\KFCUE\RDYUC (236 bytes)
The Worm deletes the following file(s):
%Documents and Settings%\%current user%\KFCUE\__tmp_rar_sfx_access_check_834562 (0 bytes)
The process WScript.exe:1932 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\KFCUE\PNLYA.exe (186354 bytes)
The process bitpro.exe:972 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\is-6JGI0.tmp\bitpro.tmp (7386 bytes)
The process bitpro.tmp:1936 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\is-U2VND.tmp\_isetup\_shfoldr.dll (23 bytes)
Registry activity
The process PNLYA.exe:1244 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1D 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"GlobalUserOffline" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AF C7 83 B7 08 94 3D CF 86 05 05 AF 28 82 0B 8B"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
The Worm modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Worm modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
To automatically run itself each time Windows is booted, the Worm adds the following link to its file to the system registry autorun key:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ERRWQ" = "%Documents and Settings%\%current user%\KFCUE\4f97A63.vbe"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Worm modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Worm deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process PNLYA.exe:1900 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "04 7C 35 EB 84 26 D8 66 6B 0B 98 11 04 F6 AA 17"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
The process %original file name%.exe:396 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "76 95 A0 61 EF 3D 66 A4 FB 5F 72 D6 39 34 D9 43"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%System%]
"wscript.exe" = "Microsoft (R) Windows Based Script Host"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%Documents and Settings%\%current user%\KFCUE]
"bitpro.exe" = "BurnInTest Setup"
The Worm modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Worm modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Worm modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
The process WScript.exe:1932 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E1 C5 87 86 CC 5F DC 72 E6 CD 2C F7 8E 9F 75 8D"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\"%CurrentUserName%"\KFCUE]
"PNLYA.exe" = "AutoIt v3 Script"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
The Worm modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Worm modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Worm modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
The process bitpro.exe:972 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DB EA BE 5E 79 0A 6D 09 20 C9 78 B3 AC 56 38 3D"
The process bitpro.tmp:1936 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "29 89 F2 3A 90 9D A2 57 10 8D 00 3C BF F7 5F 26"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Programs" = "%Documents and Settings%\%current user%\Start Menu\Programs"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
Dropped PE files
| MD5 | File path |
|---|---|
| 71d8f6d5dc35517275bc38ebcc815f9f | c:\Documents and Settings\"%CurrentUserName%"\KFCUE\PNLYA.exe |
| 7ce3ab09e02ff77497ac63b5dcc1ec13 | c:\Documents and Settings\"%CurrentUserName%"\KFCUE\bitpro.exe |
| 930ff1ab4309e7c3c43205feade66eb1 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\is-6JGI0.tmp\bitpro.tmp |
| 92dc6ef532fbb4a5c3201469a5b5eb63 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\is-U2VND.tmp\_isetup\_shfoldr.dll |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
Company Name: Passmark Software
Product Name: BurnInTest
Product Version: 1,0,0,0
Legal Copyright: Copyright (c) 1999-2013 Passmark Software, Inc.
Legal Trademarks:
Original Filename:
Internal Name:
File Version:
File Description: BurnInTest Setup
Comments:
Language: English (United States)
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 74526 | 74752 | 4.54396 | a8692f5ba740240ef0f9a827376f76f9 |
| .rdata | 81920 | 7445 | 7680 | 3.46159 | d4f36accffde0bf520f52486679ccf0d |
| .data | 90112 | 96036 | 512 | 2.46008 | b6c7edb5b7fec47a37a622cc5d71f3f4 |
| .CRT | 188416 | 32 | 512 | 0.273198 | 439411041ee0b8261668525c5c132cd9 |
| .rsrc | 192512 | 27136 | 27136 | 3.92322 | d416fa0fcd769d7ee9e63906e0f85e5c |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://actscentre.com/bookmarks/images/lib/airlines/UIMeter.exe |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile
Traffic
GET /bookmarks/images/lib/airlines/UIMeter.exe HTTP/1.1
User-Agent: AutoIt
Host: actscentre.com
HTTP/1.1 403 Forbidden
Date: Sun, 15 Jun 2014 03:39:11 GMT
Server: Apache/2.2.24 (Unix) mod_hive/3.6 mod_ssl/2.2.24 OpenSSL/0.9.8e-fips-rhel5 mod_qos/10.10 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 mod_jk/1.2.35
Content-Length: 362
Content-Type: text/html; charset=iso-8859-1<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html>&
lt;head>.<title>403 Forbidden</title>.</head><
body>.<h1>Forbidden</h1>.<p>You don't have permis
sion to access /bookmarks/images/lib/airlines/UIMeter.exe.on this serv
er.</p>.<p>Additionally, a 404 Not Found.error was encount
ered while trying to use an ErrorDocument to handle the request.</p
>.</body></html>.HTTP/1.1 403 Forbidden..Date: Sun, 15
Jun 2014 03:39:11 GMT..Server: Apache/2.2.24 (Unix) mod_hive/3.6 mod_s
sl/2.2.24 OpenSSL/0.9.8e-fips-rhel5 mod_qos/10.10 mod_auth_passthrough
/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 mod_jk/1.2.35..Content-Len
gth: 362..Content-Type: text/html; charset=iso-8859-1..<!DOCTYPE HT
ML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html><head>.<
;title>403 Forbidden</title>.</head><body>.<h1
>Forbidden</h1>.<p>You don't have permission to access
/bookmarks/images/lib/airlines/UIMeter.exe.on this server.</p>.&
lt;p>Additionally, a 404 Not Found.error was encountered while tryi
ng to use an ErrorDocument to handle the request.</p>.</body&
gt;</html>...
The Worm connects to the servers at the folowing location(s):
.text
`.itext
`.data
.idata
.rdata
@.rsrc
ENoMonitorSupportException
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
EVariantBadIndexError
Inno Setup Setup Data (5.5.0) (u)
Inno Setup Messages (5.5.0) (u)
oleaut32.dll
advapi32.dll
RegOpenKeyExW
RegCloseKey
user32.dll
GetKeyboardType
kernel32.dll
MsgWaitForMultipleObjects
ExitWindowsEx
GetWindowsDirectoryW
GetCPInfo
comctl32.dll
KWindows
UrlMon
6MsgIDs
Msgs
name="JR.Inno.Setup"
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
true
.DEFAULT\Control Panel\International
File I/O error %d
lzmadecompsmall: Compressed data is corrupted (%d)
lzmadecompsmall: %s
LzmaDecode failed (%d)
shell32.dll
/SL5="$%x,%d,%d,
Invalid file name - %s
Wed(Monitor support function not initialized
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
Invalid variant operation%Invalid variant operation (%s%.8x)
%s5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
Operation not supported
External exception %x
Interface not supported
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted(Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'"Variant method calls not supported
I/O error %d
Integer overflow Invalid floating point operation
Invalid pointer operation
Passmark Software
1999-2013 Passmark Software, Inc.
WScript.exe_1932:
.text
`.data
.rsrc
@.reloc
ADVAPI32.dll
KERNEL32.dll
NTDLL.DLL
USER32.dll
msvcrt.dll
OLEAUT32.dll
ole32.dll
VERSION.dll
wscript.exe
advapi32.dll
kernel32.dll
%s%s.DLL
wintrust.dll
%d.%d
Invalid parameter passed to C runtime function.
SOFTWARE\Classes\%s\%s
0x%8X
CreateURLMonikerEx
urlmon.dll
@@8X%u
RegCreateKeyA
RegCloseKey
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyExW
RegCreateKeyExA
RegOpenKeyExW
ReportEventW
RegEnumKeyExA
RegOpenKeyExA
GetProcessHeap
GetCPInfo
MsgWaitForMultipleObjects
EnumThreadWindows
wscript.pdb
stdole2.tlbWWW
.ObjectWW
KeyW
WindowsFolderWWW4
%CopyFolderWWL
Windows Script Host (Ver 5.6)W)
Windows Script Host Application InterfaceW%
Windows Script Host Object
ebstrCmdLineW
78t8x8
5Q5F5
Software\Microsoft\Windows Script Host\Settings
Windows Script Host
WScript.CreateObject
WSHRemote.Execute
Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11CF-8B85-00AA005B4383}.\%s.mui
.\%s\%s.mui
%s\%s.mui
%s\%s\%s.mui
%s\%s
Microsoft (R) Windows Based Script Host
5.7.0.16599
Microsoft (R) Windows Script Host
(Windows Script Host (debugging disabled)
Windows Script Host Error
Windows Script Host Input Error
This Unicode version of Windows Script Host will only execute under Windows NT.
Please use the ANSI version of Windows Script Host."
WScript execution time was exceeded on script "%1!ls!".
Script execution was terminated.1Could not locate automation class named "%1!ls!".
Could not connect object.'Could not create object named "%1!ls!".1Initialization of the Windows Script Host failed.6Can't find script engine "%2!ls!" for script "%1!ls!".!Can't change default script host.=An attempt at saving your settings via the //S option failed.(Loading script "%1!ls!" failed (%2!ls!).
Loading your settings failed.,Execution of the Windows Script Host failed.,Unexpected error of the Windows Script Host._Windows Script Host access is disabled on this machine. Contact your administrator for details. Missing job name.*Unicode is not supported on this platform. Command line options are saved.4The default script host is now set to "wscript.exe".4The default script host is now set to "cscript.exe".,Successful execution of Windows Script Host.3Successful remote execution of Windows Script Host.Win32 Error 0x%XWindows Script Host(Windows Script Host (debugging disabled)Usage: WScript scriptname.extension [option...] [arguments...]Use engine for executing scriptChanges the default script host to CScript.exeChanges the default script host to WScript.exe (default)Prevent logo display: No banner will be shown at execution time#WScript Error - Windows Script Host!Input Error - Windows Script HostlThis Unicode version of WScript will only execute under Windows NT.%6!ls! WScript - Script Execution Error!Windows Script Host Remote Script/Remote script object can only be executed once. Unable to execute remote script.bitpro.tmp_1936:
.text`.itext`.data.idata.rdata@.rsrcWindowsENoMonitorSupportException.uvCOu$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)EVariantBadIndexErrorssShifthtKeywordEInvalidOperationUh.pBEInvalidGraphicOperationUhf%CPasswordCharOnKeyDownOnKeyPressOnKeyUpssHorizontalTCustomButton.TButtonStyleAutoHotkeysTKeyEventTKeyPressEventHelpKeywordssHotTrackTWindowStatepoProportionalTWMKeyKeyPreviewPJEWindowStateEXPORTTPSExecTPSRuntimeClassImporterP;PTPSExportedVarTPSCustomDebugExecTPSDebugExect.Htb1.2.1TPasswordEditTPasswordEdit,PasswordEdit(PasswordPasswordPagePasswordLabelPasswordEditPasswordEditLabelCheckPassword version="6.0.0.0"publicKeyToken="6595b64144ccf1df"KWindowsUrlMon6MsgIDsMsgs.rsrc@.relocSoftware\Microsoft\Windows\CurrentVersion\Explorer\User Shell FoldersSoftware\Microsoft\Windows\CurrentVersion\Explorer\Shell Foldersshlwapi.dllSOFTWARE\Microsoft\Windows\CurrentVersionSoftware\Microsoft\Windows\CurrentVersion\ProfileReconciliationRegKeyGetWindowsDirectoryARegOpenKeyARegCreateKeyExASHFOLDER.dlldll\shfolder.dbgFont.ColorFont.HeightFont.NameFont.StyleLines.Stringsname="JR.Inno.Setup"version="1.0.0.0"true MSWHEEL_ROLLMSGMSH_WHEELSUPPORT_MSGMSH_SCROLL_LINES_MSG%s_%dUSER32.DLLSOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutesuxtheme.dllDWMAPI.DLLclWebSnowclWebFloralWhiteclWebLavenderBlushclWebOldLaceclWebIvoryclWebCornSilkclWebBeigeclWebAntiqueWhiteclWebWheatclWebAliceBlueclWebGhostWhiteclWebLavenderclWebSeashellclWebLightYellowclWebPapayaWhipclWebNavajoWhiteclWebMoccasinclWebBurlywoodclWebAzureclWebMintcreamclWebHoneydewclWebLinenclWebLemonChiffonclWebBlanchedAlmondclWebBisqueclWebPeachPuffclWebTanclWebYellowclWebDarkOrangeclWebRedclWebDarkRedclWebMaroonclWebIndianRedclWebSalmonclWebCoralclWebGoldclWebTomatoclWebCrimsonclWebBrownclWebChocolateclWebSandyBrownclWebLightSalmonclWebLightCoralclWebOrangeclWebOrangeRedclWebFirebrickclWebSaddleBrownclWebSiennaclWebPeruclWebDarkSalmonclWebRosyBrownclWebPaleGoldenrodclWebLightGoldenrodYellowclWebOliveclWebForestGreenclWebGreenYellowclWebChartreuseclWebLightGreenclWebAquamarineclWebSeaGreenclWebGoldenRodclWebKhakiclWebOliveDrabclWebGreenclWebYellowGreenclWebLawnGreenclWebPaleGreenclWebMediumAquamarineclWebMediumSeaGreenclWebDarkGoldenRodclWebDarkKhakiclWebDarkOliveGreenclWebDarkgreenclWebLimeGreenclWebLimeclWebSpringGreenclWebMediumSpringGreenclWebDarkSeaGreenclWebLightSeaGreenclWebPaleTurquoiseclWebLightCyanclWebLightBlueclWebLightSkyBlueclWebCornFlowerBlueclWebDarkBlueclWebIndigoclWebMediumTurquoiseclWebTurquoiseclWebCyanclWebPowderBlueclWebSkyBlueclWebRoyalBlueclWebMediumBlueclWebMidnightBlueclWebDarkTurquoiseclWebCadetBlueclWebDarkCyanclWebTealclWebDeepskyBlueclWebDodgerBlueclWebBlueclWebNavyclWebDarkVioletclWebDarkOrchidclWebMagentaclWebDarkMagentaclWebMediumVioletRedclWebPaleVioletRedclWebBlueVioletclWebMediumOrchidclWebMediumPurpleclWebPurpleclWebDeepPinkclWebLightPinkclWebVioletclWebOrchidclWebPlumclWebThistleclWebHotPinkclWebPinkclWebLightSteelBlueclWebMediumSlateBlueclWebLightSlateGrayclWebWhiteclWebLightgreyclWebGrayclWebSteelBlueclWebSlateBlueclWebSlateGrayclWebWhiteSmokeclWebSilverclWebDimGrayclWebMistyRoseclWebDarkSlateBlueclWebDarkSlategrayclWebGainsboroclWebDarkGrayclWebBlack\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\crSQLWait%s (%s)imm32.dllSystem\CurrentControlSet\Control\Keyboard Layouts\%.8xRegDeleteKeyExW.DEFAULT\Control Panel\International%s, ClassID: %s%s, ProgID: "%s"oleacc.dllMSFTEDIT.DLLRICHED20.DLLRstrtmgr.dllFile I/O error %dMessages file "%s" is missing. Please correct the problem or obtain a new copy of the program.HKEY_CLASSES_ROOTHKEY_CURRENT_USERHKEY_LOCAL_MACHINEHKEY_USERSHKEY_PERFORMANCE_DATAHKEY_CURRENT_CONFIGHKEY_DYN_DATAWININIT.INISoftware\Microsoft\Windows\CurrentVersion\SharedDLLsRegCreateKeyExRegOpenKeyExsfc.dllcmd.exe" /C "COMMAND.COM" /CPendingFileRenameOperationsPendingFileRenameOperations2@Software\Microsoft\Windows\CurrentVersion\FontsSoftware\Microsoft\Windows NT\CurrentVersion\FontsIPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)IPropertyStore::SetValue(PKEY_AppUserModel_ID)IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)OLEAUT32.DLLLog opened. (Time zone: UTC%s%.2u:%.2u)%s Log %s #%.3u.txtregsvr32.exe"Cannot register 64-bit DLLs on this version of WindowsHELPER_EXE_AMD64Cannot utilize 64-bit features on this version of Windows64-bit helper EXE wasn't extracted\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8xCreateNamedPipehelper %d 0x%xHelper process PID: %uStopping 64-bit helper process. (PID: %u)Helper process exited with failure code: 0x%xTransactNamedPipe/GetOverlappedResultHelper: Command did not executeSOFTWARE\Microsoft\.NETFramework.NET Framework not foundSOFTWARE\Microsoft\.NETFramework\Policy\v4.0v4.0.30319SOFTWARE\Microsoft\.NETFramework\Policy\v2.0v2.0.50727SOFTWARE\Microsoft\.NETFramework\Policy\v1.1v1.1.4322.NET Framework version %s not foundFusion.dllFailed to load .NET Framework DLL "%s"Failed to get address of .NET Framework CreateAssemblyCache function.NET Framework CreateAssemblyCache function failedMoveFileEx failed (%d).Deleting directory: %sFailed to delete directory (%d). Will retry later.Failed to delete directory (%d). Will delete on restart (if empty).Failed to delete directory (%d).Deleting file: %sFailed to delete the file; it may be in use (%d).The file appears to be in use (%d). Will delete on restart.Decrementing shared count (%d-bit): %sUnregistering 64-bit DLL/OCX: %sUnregistering 32-bit DLL/OCX: %sNot unregistering DLL/OCX again: %sUnregistering 64-bit type library: %sUnregistering 32-bit type library: %sUninstalling from GAC: %sRunning Exec filename:Running Exec parameters:CreateProcess failed (%d).Process exit code: %uRunning ShellExec filename:Running ShellExec parameters:ShellExecuteEx failed (%d).Skipping RunOnceId "%s" filename: %sUnregistering font: %szlib: Internal error. Code %dbzlib: Internal error. Code %dlzmadecomp: %slzmadecomp: Compressed data is corrupted (%d)DecodeToBuf failed (%d)c:\directorySoftware\Microsoft\Windows\CurrentVersion\Explorer\AdvancedCould not find page with ID %dSoftware\Microsoft\Windows\CurrentVersion\Uninstall%s\%s_is1RestartManager found an application using one of our files: %sCan use RestartManager to avoid reboot? %s (%d)PrepareToInstall failed: %sNeed to restart Windows? %s/:*?"<>|\/:*?"<>|%s-%d.bin%s-%d%s.bin..\DISK%d\Asking user for new disk containing "%s".Cannot read an encrypted file before the key has been setLoggedMsgBox returned an unexpected value. Assuming Abort.Software\Microsoft\Windows\CurrentVersion\FontsSoftware\Microsoft\Windows\CurrentVersion\Uninstall\5.5.1 (u)URLInfoAboutURLUpdateInfoCreating directory: %sSetting permissions on directory: %sFailed to set permissions on directory (%d).Setting NTFS compression on directory: %sUnsetting NTFS compression on directory: %sFailed to set NTFS compression state (%d).Failed to set value in Fonts registry key.Failed to open Fonts registry key.Setting permissions on file: %sFailed to set permissions on file (%d).Setting NTFS compression on file: %sUnsetting NTFS compression on file: %sDest filename: %sDest file is protected by Windows File Protection.Time stamp of our file: %sTime stamp of existing file: %sVersion of our file: %u.%u.%u.%uVersion of existing file: %u.%u.%u.%uExisting file is protected by Windows File Protection. Skipping.Uninstaller requires administrator: %sThe existing file appears to be in use (%d). Will replace on restart.The existing file appears to be in use (%d). Retrying.Registering file as a font ("%s")Cannot install files to 64-bit locations on this version of Windowsdesktop.ini.ShellClassInfo{0AFACED1-E828-11D1-9187-B532F1E9575D}target.lnkFilename: %sDesktop.iniSoftware\Microsoft\Windows\CurrentVersion\App Paths\Setting permissions on registry key: %s\%sCould not set permissions on the registry key because it currently does not exist.Failed to set permissions on registry key (%d).Cannot access 64-bit registry keys on this version of WindowsRegistration executable created: %sSoftware\Microsoft\Windows\CurrentVersion\RunOnceRegistering 64-bit DLL/OCX: %sRegistering 32-bit DLL/OCX: %sRegistering 64-bit type library: %sRegistering 32-bit type library: %sDirectory for uninstall files: %sWill append to existing uninstall log: %sWill overwrite existing uninstall log: %sCreating new uninstall log: %sLoggedMsgBox returned an unexpected value. Assuming Cancel.RmShutdown returned an error: %dFatal exception during installation process (%s):ExtractTemporaryFile: The file "%s" was not foundInvalid symbol '%s' foundInvalid token '%s' foundQuerySpawnServer: Unexpected response: $%xCallSpawnServer: Unexpected response: $%xCallSpawnServer: Unexpected status: %dShellExecuteExShellExecuteEx returned hProcess=0Wnd=$%xExpression error '%s'srcexeCannot evaluate "%s" constant during UninstallCannot access a 64-bit key in a "reg" constant on this version of WindowsUnknown custom message name "%s" in "cm" constantCannot expand "pf64" constant on this version of WindowsCannot expand "cf64" constant on this version of WindowsuninstallexeCannot expand "dotnet2064" constant on this version of WindowsCannot expand "dotnet4064" constant on this version of WindowsFailed to expand shell folder constant "%s"Unknown constant "%s"Software\Microsoft\Windows\CurrentVersionSOFTWARE\Microsoft\Windows NT\CurrentVersioncmd.exeCOMMAND.COM\_setup64.tmp_isetup\_shfoldr.dllFailed to get version numbers of _shfoldr.dllshfolder.dllFailed to load DLL "%s"Found pending rename or delete that matches one of our files: %sWindows version: %u.%u.%u%s (NT platform: %s)64-bit Windows: %sProcessor architecture: %sDefaulting to %s for suppressed message box (%s):Message box (%s):User chose %s.MsgBox failed./SPAWNWND=$%x /NOTIFYWND=$%x64-bit install mode: %s_isetup\_isdecmp.dll_isetup\_iscrypt.dll/Password=/SuppressMsgBoxes/DETACHEDMSG-0.binSetup version: Inno Setup version 5.5.1 (u)Original Setup EXE:Not restarting Windows because Setup is being run from the debugger.Restarting Windows.Inno Setup version 5.5.1 (u)Portions Copyright (C) 2000-2012 Martijn Laanhttp://www.innosetup.com/http://www.remobjects.com/psCannot run files in 64-bit locations on this version of WindowsType: ExecType: ShellExecRmRestart returned an error: %dNeed to restart Windows, not attempting to restart applicationsWill not restart Windows automatically.RegDeleteKeyExASystem\CurrentControlSet\Control\WindowsCannot call "%s" function during SetupCannot call "%s" function during UninstallInvalid RootKey valueUnknown custom message name "%s"%u.%.2u.%u%u.%u.%u.%uCannot disable FS redirection on this version of WindowsRuntime Error (at %d:%d):Exception "%s" at address %pTScriptRunner.SetPSExecParameters: Invalid typeTScriptRunner.LoadScript failedRemove shared file %s? User chose %s%s/INITPROCWND=$%x/SECONDPHASE="%s" /FIRSTPHASEWND=$%xOriginal Uninstall EXE:Install was done in 64-bit mode but not running 64-bit Windows nowRemoved all? %sNot restarting Windows because Uninstall is being run from the debugger.isRS-???.tmpisRS-%.3u.tmpDisableProcessWindowsGhostingInterface not supported7Dispatch methods do not support more than 64 parametersException: %sCannot Import %sUnable to insert a line Clipboard does not support IconsText exceeds memo capacity/Menu '%s' is already being used by another form- Dock zone has no controlLError loading dock zone from the stream. Expecting version %d, but found %d.Error setting %s.Count8Listbox (%s) style must be virtual in order to set CountOLE error %.8x.Method '%s' not supported by automation object/Variant does not reference an automation objectError creating window class Cannot focus a disabled or invisible window!Control '%s' has no parent window$Parent given is not a parent of '%s'No help found for %sUnsupported clipboard format%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration groupProperty %s does not existThread creation error: %sThread Error: %s (%d)-Cannot terminate an externally created thread,Cannot wait for an externally created thread$No help viewer that supports filters#''%s'' is not a valid integer valueCannot open file "%s". %sInvalid file name - %sInvalid stream format$''%s'' is not a valid component nameInvalid data type for '%s' List capacity out of bounds (%d)List count out of bounds (%d)List index out of bounds (%d) Out of memory while expanding memory streamError reading %s%s%s: %sFailed to get data for '%s'Resource %s not found"Character index out of bounds (%d)Start index out of bounds (%d)Invalid count (%d)Invalid destination index (%d)Ancestor for '%s' not foundCannot assign a %s to a %sBits index out of range*Can't write to a read-only resource streamECheckSynchronize called from thread $%x, which is NOT the main threadClass %s not foundA class named %s already exists%List does not allow duplicates ($0%x)#A component named %s already exists%String list does not allow duplicatesCannot create file "%s". %sObject lock not owned(Monitor support function not initialized%s (%s, line %d)Abstract Error?Access violation at address %p in module '%s'. %s of address %pSystem Error. Code: %d.Invalid variant operationInvalid NULL variant operation%Invalid variant operation (%s%.8x)%s5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)Operation not supportedExternal exception %xInvalid pointer operationInvalid class typecast0Access violation at address %p. %s of address %pOperation aborted(Exception %s in module %s at %p.Application Error1Format '%s' invalid or incompatible with argumentNo argument for format '%s'"Variant method calls not supportedI/O error %dInteger overflow Invalid floating point operationn%USERPROFILE%r%SYSTEMROOT%5.50.4807.2300Microsoft(R) Windows (R) 2000 Operating SystemDatos de programa%Configuraci51.1052.0.0PNLYA.exe_1244:
.text`.rdata@.data.rsrc@.relocs%j.Zf8crtsu:crtscrtsGetProcessWindowStationoperatoruxtheme.dllkernel32.dlloperand of unlimited repeat could match the empty stringPOSIX named classes are supported only within a classerroffset passed as NULLPOSIX collating elements are not supportedthis version of PCRE is not compiled with PCRE_UTF8 supportPCRE does not support \L, \l, \N{name}, \U, or \usupport for \P, \p, and \X has not been compiledthis version of PCRE is not compiled with PCRE_UCP supportICMP.DLLadvapi32.dllRegDeleteKeyExWError text not found (please report)WSOCK32.dllVERSION.dllWINMM.dllCOMCTL32.dllMPR.dllInternetCrackUrlWHttpQueryInfoWHttpOpenRequestWHttpSendRequestWFtpOpenFileWFtpGetFileSizeInternetOpenUrlWWININET.dllPSAPI.DLLUSERENV.dllGetProcessHeapCreatePipeGetWindowsDirectoryWKERNEL32.dllOpenWindowStationWSetProcessWindowStationCloseWindowStationMapVirtualKeyWEnumChildWindowsEnumWindowsVkKeyScanWGetKeyStateGetKeyboardStateSetKeyboardStateGetAsyncKeyStatekeybd_eventEnumThreadWindowsExitWindowsExUnregisterHotKeyRegisterHotKeyGetKeyboardLayoutNameWUSER32.dllSetViewportOrgExGDI32.dllCOMDLG32.dllRegOpenKeyExWRegCloseKeyRegCreateKeyExWRegEnumKeyExWRegDeleteKeyWADVAPI32.dllShellExecuteWSHFileOperationWShellExecuteExWSHELL32.dllole32.dllOLEAUT32.dllGetCPInfozcÁL.aVFY).ijjrcg%D`-sssh6uW.MW3.3/464(5,50545858 8$8(8,808= =$=(=,=0=4=8=<=@=0 0$0(0,0004080<0:*;3;?;|;112 323[3.5? ?@?`?= =$=(=,=0=4=5 5$5(5,5054585CADjD%D mscoree.dllnKERNEL32.DLL- Attempt to initialize the CRT more than once.- CRT not initialized- floating point support not loadedWUSER32.DLLCMDLINERAWCMDLINE/AutoIt3ExecuteLine/AutoIt3ExecuteScript%s (%d) : ==> %s.:Line %d:Line %d (File "%s"):%s (%d) : ==> %s:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)#NoAutoIt3ExecuteAPPSKEYLine %d:04090000%u.%u.%u.%u0.0.0.0Mddddd%s (%d) : ==> %s:UDPSTARTUPUDPSHUTDOWNUDPSENDUDPRECVUDPOPENUDPCLOSESOCKETUDPBINDTRAYGETMSGTCPSTARTUPTCPSHUTDOWNTCPSENDTCPRECVTCPNAMETOIPTCPLISTENTCPCONNECTTCPCLOSESOCKETTCPACCEPTSHELLEXECUTEWAITSHELLEXECUTEREGENUMKEYMSGBOXISKEYWORDHTTPSETUSERAGENTHTTPSETPROXYHOTKEYSETGUIREGISTERMSGGUIGETMSGGUICTRLSENDMSGGUICTRLRECVMSGFTPSETPROXY\??\%sGUI_RUNDEFMSGSendKeyDelaySendKeyDownDelayTCPTimeoutAUTOITCALLVARIABLE%d255.255.255.255KeywordAutoIt.ErrorNull Object assignment in FOR..IN loopIncorrect Object type in FOR..IN loopHOTKEYPRESSEDAUTOITEXEWINDOWSDIR3, 3, 8, 1HKEY_LOCAL_MACHINEHKEY_CLASSES_ROOTHKEY_CURRENT_CONFIGHKEY_CURRENT_USERHKEY_USERS%d/d/dC:\DOCUME~1\"%CurrentUserName%"\KFCUE\PNLYA.exeAutoIt supports the __stdcall (WINAPI) and __cdecl calling conventions. The __stdcall (WINAPI) convention is used by default but __cdecl can be used instead. See the DllCall() documentation for details on changing the calling convention.Missing operator in expression."Unbalanced brackets in expression.Error parsing function call.0Incorrect number of parameters in function call.'"ReDim" used without an array variable.>Illegal text at the end of statement (one statement per line).1"If" statement has no matching "EndIf" statement.1"Else" statement with no matching "If" statement.2"EndIf" statement with no matching "If" statement.7Too many "Else" statements for matching "If" statement.3"While" statement has no matching "Wend" statement.4"Wend" statement with no matching "While" statement.%Variable used without being declared.XArray variable has incorrect number of subscripts or subscript dimension range exceeded.)Array variable subscript badly formatted.'Subscript used with non-Array variable.&Too many subscripts used for an array.0Missing subscript dimensions in "Dim" statement.NNo variable given for "Dim", "Local", "Global", "Struct" or "Const" statement.0Expected a "=" operator in assignment statement.*Invalid keyword at the start of this line.Invalid element in a DllStruct.*Unknown option or bad parameter specified.&Unable to load the internet libraries./"Struct" statement has no matching "EndStruct".HUnable to open file, the maximum number of open files has been exceeded.K"ContinueLoop" statement with no matching "While", "Do" or "For" statement.Invalid file filter given.*Expected a variable in user function call.1"Do" statement has no matching "Until" statement.2"Until" statement with no matching "Do" statement.#"For" statement is badly formatted.2"Next" statement with no matching "For" statement.N"ExitLoop/ContinueLoop" statements only valid from inside a For/Do/While loop.1"For" statement has no matching "Next" statement.@"Case" statement with no matching "Select"or "Switch" statement.:"EndSelect" statement with no matching "Select" statement.ORecursion level has been exceeded - AutoIt will quit to prevent stack overflow.&Cannot make existing variables static.4Cannot make static variables into regular variables.3This keyword cannot be used after a "Then" keyword.>"Select" statement is missing "EndSelect" or "Case" statement. "If" statements must have a "Then" keyword. Badly formated Struct statement."Cannot assign values to constants..Cannot make existing variables into constants.9Only Object-type variables allowed in a "With" statement.v"long_ptr", "int_ptr" and "short_ptr" DllCall() types have been deprecated. Use "long*", "int*" and "short*" instead.-Object referenced outside a "With" statement.)Nested "With" statements are not allowed."Variable must be of type "Object".1The requested action with this object has failed.8Variable appears more than once in function declaration.2ReDim array can not be initialized in this manner.1An array variable can not be used in this manner.Can not redeclare a constant.5Can not redeclare a parameter inside a user function.HCan pass constants by reference only to parameters with "Const" keyword.*Can not initialize a variable with itself.$Incorrect way to use this parameter.:"EndSwitch" statement with no matching "Switch" statement.>"Switch" statement is missing "EndSwitch" or "Case" statement.H"ContinueCase" statement with no matching "Select"or "Switch" statement.String missing closing quote.!Badly formated variable or macro.*Missing separator character after keyword.http://www.autoitscript.com/autoit3/AutoIt3.execmd.exe_1432:
.text`.data.rsrcKERNEL32.dllNTDLL.DLLmsvcrt.dllUSER32.dllSetConsoleInputExeNameWAPerformUnaryOperation: '%c'APerformArithmeticOperation: '%c'ADVAPI32.dllSHELL32.dllMPR.dllRegEnumKeyWRegDeleteKeyWRegCloseKeyRegOpenKeyWRegCreateKeyExWRegOpenKeyExWShellExecuteExWCmdBatNotificationGetWindowsDirectoryWGetProcessHeapGetCPInfoGetConsoleOutputCP_pipeGetProcessWindowStationcmd.pdbCMD Internal Error %s)(&&())))(&)))&((&)&))&()))&((&)&)&())))(&&()))&))))CMD.EXE()|&=,;"COPYCMD\XCOPY.EXECMDCMDLINEWKERNEL32.DLLSoftware\Policies\Microsoft\Windows\System0123456789cmd.exeDIRCMD%d.%d.dUngetting: '%s'DisableCMDGeToken: (%x) '%s'%s\Shell\Open\Command%x %c*** Unknown type: %xArgs: `%s'Cmd: %s Type: %x%s (%s) %sStart C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\UIMeter.exe:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\UIMeter.exeUME~1\"%CurrentUserName%"\LOCALS~1\Temp\UIMeter.exe.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH%WinDir%;%WinDir%\System32\Wbem;c:\Program Files\WiresharkCMDEXTVERSIONKEYS%Documents and Settings%\%current user%\KFCUEC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp%s %s(%s) %s%s %s%s&()[]{}^=;!%' ,`~d%sd%s-%sd%sd%sdd%sd%sd%s=%sX-X.COM;.EXE;.BAT;.CMD;.VBS;.JS;.WS<> -*/%()|^&=,\CMD.EXEWindows Command Processor5.1.2600.5512 (xpsp.080413-2111)Cmd.ExeWindowsOperating System5.1.2600.5512Press any key to continue . . . %0operable program or batch file.The system cannot execute the specified program.and press any key when ready. %0Microsoft Windows XP [Version %1]%0a pipe operation.KEYS is on.KEYS is off.The process tried to write to a nonexistent pipe.The switch /Y may be preset in the COPYCMD environment variable.to prompt on overwrites unless COPY command is being executed fromSwitches may be preset in the DIRCMD environment variable. OverrideQuits the CMD.EXE program (command interpreter) or the current batchCMD.EXE. If executed from outside a batch script, itwill quit CMD.EXEERRORLEVEL that number. If quitting CMD.EXE, sets the processDisplays or sets a search path for executable files.Type PATH ; to clear all search-path settings and direct cmd.exe to searchChanges the cmd.exe command prompt.$B | (pipe)$V Windows XP version numberDisplays, sets, or removes cmd.exe environment variables.Displays the Windows XP version.Tells cmd.exe whether to verify that your files are written correctly to aRecords comments (remarks) in a batch file or CONFIG.SYS.Press any key to continue . . . %0Directs cmd.exe to a labeled line in a batch program.NOT Specifies that Windows XP should carry outwill execute the command after the ELSE keyword if theI The new environment will be the original environment passedto the cmd.exe and not the current environment.SEPARATE Start 16-bit Windows program in separate memory spaceSHARED Start 16-bit Windows program in shared memory spaceIf it is an internal cmd command or a batch file thenthe command processor is run with the /K switch to cmd.exe.If it is not an internal cmd command or batch file thenparameters These are the parameters passed to the command/programunder Windows XP.Starts a new instance of the Windows XP command interpreterCMD [/A | /U] [/Q] [/D] [/E:ON | /E:OFF] [/F:ON | /F:OFF] [/V:ON | /V:OFF]/D Disable execution of AutoRun commands from registry (see below)/A Causes the output of internal commands to a pipe or file to be ANSI/U Causes the output of internal commands to a pipe or file to bevariable var at execution time. The %var% syntax expands variablesof an executable file.If /D was NOT specified on the command line, then when CMD.EXE starts, iteither or both are present, they are executed first.HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor\AutoRunHKEY_CURRENT_USER\Software\Microsoft\Command Processor\AutoRuncan enable or disable extensions for all invocations of CMD.EXE on afollowing REG_DWORD values in the registry using REGEDT32.EXE:HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor\EnableExtensionsHKEY_CURRENT_USER\Software\Microsoft\Command Processor\EnableExtensionsparticular invocation of CMD.EXE with the /V:ON or /V:OFF switch. Youcan enable or disable completion for all invocations of CMD.EXE on aHKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor\DelayedExpansionHKEY_CURRENT_USER\Software\Microsoft\Command Processor\DelayedExpansionat execution time.CMD.EXE with the /F:ON or /F:OFF switch. You can enable or disablecompletion for all invocations of CMD.EXE on a machine and/or user logonthe registry using REGEDT32.EXE:HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor\CompletionCharHKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor\PathCompletionCharHKEY_CURRENT_USER\Software\Microsoft\Command Processor\CompletionCharHKEY_CURRENT_USER\Software\Microsoft\Command Processor\PathCompletionCharShift key with the control character will move through the list&()[]{}^=;!%' ,`~Command Processor Extensions enabled by default. Use CMD /? for details.ASSOC [.ext[=[fileType]]].ext Specifies the file extension to associate the file type withASSOC .pl=PerlScriptFTYPE PerlScript=perl.exe %%1 %%*script.pl 1 2 3set PATHEXT=.pl;%%PATHEXT%%The restartable option to the COPY command is not supported bythis version of the operating system.The following usage of the path operator in batch-parameterThe unicode output option to CMD.EXE is not supported by thisversion of the operating system.If Command Extensions are enabled the DATE command supportsIf Command Extensions are enabled the TIME command supportsIf Command Extensions are enabled the PROMPT command supportsis pretty simple and supports the following operations, in decreasing! ~ - - unary operators* / %% - arithmetic operators- - arithmetic operators&= ^= |= <<= >>=If you use any of the logical or modulus operators, you will need tovalues. If SET /A is executed from the command line outside of aassignment operator requires an environment variable name to the left ofthe assignment operator. Numeric values are decimal numbers, unlessoccurrence of the remaining portion of str1.Finally, support for delayed environment variable expansion has beenadded. This support is always disabled by default, but may beenabled/disabled via the /V command line switch to CMD.EXE. See CMD /?of text is read, not when it is executed. The following exampleSo the actual FOR loop we are executing is:%Í%% - expands to the current directory string.%ÚTE%% - expands to current date using same format as DATE command.%%CMDEXTVERSION%% - expands to the current Command Processor Extensions%%CMDCMDLINE%% - expands to the original command line that invoked theIf Command Extensions are enabled the SHIFT command supportscontrol is passed to the statement after the label specified. You must%%4 %%5 ...)CMD /? for details.This works because on old versions of CMD.EXE, SETLOCAL does NOTcommand execution.non-executable files may be invoked through their file association justby typing the name of the file as a command. (e.g. WORD.DOC wouldlaunch the application associated with the .DOC file extension).When executing an application that is a 32-bit GUI application, CMD.EXEthe command prompt. This new behavior does NOT occur if executingWhen executing a command line whose first token is the string "CMD "without an extension or path qualifier, then "CMD" is replaced withthe value of the COMSPEC variable. This prevents picking up CMD.EXEWhen executing a command line whose first token does NOT contain anextension, then CMD.EXE uses the value of the PATHEXT.COM;.EXE;.BAT;.CMDWhen searching for an executable, if there is no match on any extension,If Command Extensions are enabled, and running on the Windows XPforms of the FOR command are supported:Walks the directory tree rooted at [drive:]path, executing the FORpasses the first blank separated token from each line of each file.is a quoted string which contains one or more keywords to specifydifferent parsing options. The keywords are:be passed to the for body for each iteration.where a back quoted string is executed as aFOR /F "eol=; tokens=2,3* delims=, " %%i in (myfile.txt) do @echo %%i %%j %%kwould parse each line in myfile.txt, ignoring lines that begin witha semicolon, passing the 2nd and 3rd token from each line to the forline, which is passed to a child CMD.EXE and the output is capturedIF CMDEXTVERSION number commandThe CMDEXTVERSION conditional works just like ERRORLEVEL, except it isCMDEXTVERSION conditional is never true when Command Extensions are%%CMDCMDLINE%% will expand into the original command line passed toCMD.EXE prior to any processing by CMD.EXE, provided that there is notalready an environment variable with the name CMDCMDLINE, in which case%%CMDEXTVERSION%% will expand into a string representation of thecurrent value of CMDEXTVERSION, provided that there is not alreadyan environment variable with the name CMDEXTVERSION, in which case youunder Windows XP, as command line editing is always enabled.CMD.EXE was started with the above path as the current directory.UNC paths are not supported. Defaulting to Windows directory.CMD does not support UNC paths as current directories.UNC paths not supported for current directory. Usingto create temporary drive letter to support UNC currentMissing operand.Missing operator.The COMSPEC environment variable does not point to CMD.EXE.The FAT File System only support Last Write Timesof a batch script is reached, an implied ENDLOCAL is executed for anyapplication execution.The switch /Y may be present in the COPYCMD environment variable.to prompt on overwrites unless MOVE command is being executed fromwhen CMD.EXE started. This value either comes from the current consoleThe COLOR command sets ERRORLEVEL to 1 if an attempt is made to execute
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
PNLYA.exe:1244
PNLYA.exe:1900
%original file name%.exe:396
WScript.exe:1932
bitpro.exe:972 - Delete the original Worm file.
- Delete or disinfect the following files created/modified by the Worm:
%Documents and Settings%\%current user%\KFCUE\SQYLE (173 bytes)
%Documents and Settings%\%current user%\KFCUE\BCREM (237 bytes)
%Documents and Settings%\%current user%\KFCUE\4f97A63.vbe (7972 bytes)
%Documents and Settings%\%current user%\KFCUE\DBIYS (69539 bytes)
%Documents and Settings%\%current user%\KFCUE\YMQGIX (21 bytes)
%Documents and Settings%\%current user%\KFCUE\bitpro.exe (70955 bytes)
%Documents and Settings%\%current user%\KFCUE\RDYUC (236 bytes)
%Documents and Settings%\%current user%\KFCUE\PNLYA.exe (186354 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-6JGI0.tmp\bitpro.tmp (7386 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-U2VND.tmp\_isetup\_shfoldr.dll (23 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ERRWQ" = "%Documents and Settings%\%current user%\KFCUE\4f97A63.vbe" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.