Source: C:\Program Files (x86)\CPU Guardian\CPUGuardian.exe |
ReversingLabs: Detection: 33% |
Source: C:\Program Files (x86)\CPU Guardian\Splash.exe |
ReversingLabs: Detection: 29% |
Source: C:\Program Files (x86)\CPU Guardian\updater.exe |
ReversingLabs: Detection: 27% |
Source: C:\Users\user\AppData\Roaming\CPU Guardian\CPU Guardian 2.6.1\install\1652F6D\CPUGuardian.exe |
ReversingLabs: Detection: 33% |
Source: C:\Users\user\AppData\Roaming\CPU Guardian\CPU Guardian 2.6.1\install\1652F6D\Splash.exe |
ReversingLabs: Detection: 29% |
Source: C:\Users\user\Desktop\074kFuPFv8.exe |
EXE: C:\Users\user\AppData\Roaming\CPU Guardian\CPU Guardian 2.6.1\install\1652F6D\InstAct.exe |
Jump to behavior |
Source: C:\Users\user\Desktop\074kFuPFv8.exe |
EXE: C:\Users\user\AppData\Roaming\CPU Guardian\CPU Guardian 2.6.1\install\1652F6D\updater.exe |
Jump to behavior |
Source: C:\Users\user\Desktop\074kFuPFv8.exe |
EXE: C:\Users\user\AppData\Roaming\CPU Guardian\CPU Guardian 2.6.1\install\1652F6D\CPUGuardian.exe |
Jump to behavior |
Source: C:\Users\user\Desktop\074kFuPFv8.exe |
EXE: C:\Users\user\AppData\Roaming\CPU Guardian\CPU Guardian 2.6.1\install\1652F6D\Splash.exe |
Jump to behavior |
Source: C:\Users\user\Desktop\074kFuPFv8.exe |
EXE: C:\Users\user\AppData\Roaming\CPU Guardian\CPU Guardian 2.6.1\install\1652F6D\InstAct.exe |
Jump to behavior |
Source: C:\Users\user\Desktop\074kFuPFv8.exe |
EXE: C:\Users\user\AppData\Roaming\CPU Guardian\CPU Guardian 2.6.1\install\1652F6D\updater.exe |
Jump to behavior |
Source: C:\Users\user\Desktop\074kFuPFv8.exe |
EXE: C:\Users\user\AppData\Roaming\CPU Guardian\CPU Guardian 2.6.1\install\1652F6D\CPUGuardian.exe |
Jump to behavior |
Source: C:\Users\user\Desktop\074kFuPFv8.exe |
EXE: C:\Users\user\AppData\Roaming\CPU Guardian\CPU Guardian 2.6.1\install\1652F6D\Splash.exe |
Jump to behavior |
Source: |
Binary string: d:\BitBucketGit\CPU Guardian\bo\obj\Release\bo.pdbD7^7 P7_CorDllMainmscoree.dll source: 074kFuPFv8.exe, 00000000.00000003.1712561481.000000000544E000.00000004.00000020.00020000.00000000.sdmp, CPUGuardian.exe, 0000000A.00000002.4166623593.0000000008482000.00000002.00000001.01000000.00000013.sdmp, bo.dll.0.dr |
Source: |
Binary string: d:\BitBucketGit\CPU Guardian\RegCleaner\obj\Release\CPUGuardian.pdb source: 074kFuPFv8.exe, 00000000.00000003.1712561481.000000000544E000.00000004.00000020.00020000.00000000.sdmp, CPUGuardian.exe, 0000000A.00000000.1737687137.0000000000272000.00000002.00000001.01000000.00000006.sdmp, CPUGuardian.exe.2.dr |
Source: |
Binary string: C:\src\wix39r2\build\ship\x86\SfxCA.pdb source: 074kFuPFv8.exe, 00000000.00000003.1712561481.0000000005ECF000.00000004.00000020.00020000.00000000.sdmp, Uninst000.CA.dll.2.dr, Uninst000.CA.dll.0.dr |
Source: |
Binary string: d:\BitBucketGit\CPU Guardian\Setup\obj\Release\Setup.pdb source: 074kFuPFv8.exe, 00000000.00000003.1712561481.0000000005E72000.00000004.00000020.00020000.00000000.sdmp, CPUGuardian.exe, 0000000D.00000002.1794851263.0000000006022000.00000002.00000001.01000000.0000000C.sdmp |
Source: |
Binary string: $^q:C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdbd source: CPUGuardian.exe, 0000000A.00000002.4154911978.0000000002B66000.00000004.00000800.00020000.00000000.sdmp |
Source: |
Binary string: <filename>C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb</filename> source: fileerrors_data.10.dr |
Source: |
Binary string: ntkrnlmp.pdb source: CPUGuardian.exe, 0000000A.00000002.4154911978.0000000002B66000.00000004.00000800.00020000.00000000.sdmp |
Source: |
Binary string: d:\BitBucketGit\CPU Guardian\CustomActions\CustomAction1\obj\x86\Release\Uninst000.pdb source: 074kFuPFv8.exe, 00000000.00000003.1712561481.0000000005ED7000.00000004.00000020.00020000.00000000.sdmp, Uninst000.dll.0.dr, Uninst000.dll.2.dr |
Source: |
Binary string: $^qgC:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: CPUGuardian.exe, 0000000A.00000002.4154911978.0000000002B66000.00000004.00000800.00020000.00000000.sdmp |
Source: |
Binary string: d:\BitBucketGit\CPU Guardian\bo\obj\Release\bo.pdb source: 074kFuPFv8.exe, 00000000.00000003.1712561481.000000000544E000.00000004.00000020.00020000.00000000.sdmp, CPUGuardian.exe, CPUGuardian.exe, 0000000A.00000002.4166623593.0000000008482000.00000002.00000001.01000000.00000013.sdmp, bo.dll.0.dr |
Source: |
Binary string: E:\Point\win\Release\stubs\x86\ExternalUi.pdbL source: 074kFuPFv8.exe |
Source: |
Binary string: AcroExch.PDBookmark.1 source: CPUGuardian.exe, 0000000A.00000002.4154911978.0000000002B66000.00000004.00000800.00020000.00000000.sdmp |
Source: |
Binary string: <filename>C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error</filename> source: fileerrors_data.10.dr |
Source: |
Binary string: winload_prod.pdb source: CPUGuardian.exe, 0000000A.00000002.4154911978.0000000002B66000.00000004.00000800.00020000.00000000.sdmp |
Source: |
Binary string: E:\Point\win\Release\stubs\x86\Updater.pdb source: 074kFuPFv8.exe, 00000000.00000003.1712561481.000000000544E000.00000004.00000020.00020000.00000000.sdmp, updater.exe.2.dr |
Source: |
Binary string: d:\BitBucketGit\CPU Guardian\RegCleaner\obj\Release\CPUGuardian.pdb| source: 074kFuPFv8.exe, 00000000.00000003.1712561481.000000000544E000.00000004.00000020.00020000.00000000.sdmp, CPUGuardian.exe, 0000000A.00000000.1737687137.0000000000272000.00000002.00000001.01000000.00000006.sdmp, CPUGuardian.exe.2.dr |
Source: |
Binary string: d:\ComponentFactory\Build Krypton\Source\Krypton Components\ComponentFactory.Krypton.Toolkit\obj\Release\ComponentFactory.Krypton.Toolkit.pdb source: 074kFuPFv8.exe, 00000000.00000003.1712561481.000000000544E000.00000004.00000020.00020000.00000000.sdmp, CPUGuardian.exe, 0000000D.00000002.1795714523.0000000006B42000.00000002.00000001.01000000.0000000D.sdmp, ComponentFactory.Krypton.Toolkit.dll.2.dr |
Source: |
Binary string: d:\BitBucketGit\CPU Guardian\Setup\obj\Release\Setup.pdbL8n8 `8_CorDllMainmscoree.dll source: 074kFuPFv8.exe, 00000000.00000003.1712561481.0000000005E72000.00000004.00000020.00020000.00000000.sdmp, CPUGuardian.exe, 0000000D.00000002.1794851263.0000000006022000.00000002.00000001.01000000.0000000C.sdmp |
Source: |
Binary string: E:\Point\win\Release\custact\x86\AICustAct.pdb source: 074kFuPFv8.exe, 00000000.00000003.1678986166.0000000003E8D000.00000004.00000020.00020000.00000000.sdmp, MSI601F.tmp.2.dr, MSI5FAF.tmp.2.dr, CPUGuardian.msi.0.dr, 5d5e38.msi.2.dr |
Source: |
Binary string: E:\Point\win\Release\custact\x86\ResourceCleaner.pdb source: 074kFuPFv8.exe, 00000000.00000003.1678986166.0000000003EFA000.00000004.00000020.00020000.00000000.sdmp, MSI608E.tmp.2.dr, CPUGuardian.msi.0.dr, 5d5e38.msi.2.dr, MSI63DD.tmp.2.dr |
Source: |
Binary string: $^qeC:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: CPUGuardian.exe, 0000000A.00000002.4154911978.0000000002B66000.00000004.00000800.00020000.00000000.sdmp |
Source: |
Binary string: C:\Users\dahall\Documents\Visual Studio 2010\Projects\TaskService\obj\Release\Microsoft.Win32.TaskScheduler.pdb source: 074kFuPFv8.exe, 00000000.00000003.1712561481.0000000005E72000.00000004.00000020.00020000.00000000.sdmp, CPUGuardian.exe, CPUGuardian.exe, 0000000A.00000002.4177985426.0000000009FC2000.00000002.00000001.01000000.00000014.sdmp, Microsoft.Win32.TaskScheduler.dll.2.dr |
Source: |
Binary string: d:\BitBucketGit\CPU Guardian\Logging\obj\Release\Logging.pdb source: 074kFuPFv8.exe, 00000000.00000003.1712561481.0000000005E43000.00000004.00000020.00020000.00000000.sdmp, CPUGuardian.exe, 0000000D.00000002.1793712666.0000000003422000.00000002.00000001.01000000.0000000A.sdmp, Logging.dll.0.dr |
Source: |
Binary string: $^qmC:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: CPUGuardian.exe, 0000000A.00000002.4154911978.0000000002B66000.00000004.00000800.00020000.00000000.sdmp |
Source: |
Binary string: d:\BitBucketGit\CPU Guardian\InstallerActions\obj\x86\Release\InstAct.pdb source: 074kFuPFv8.exe, 00000000.00000003.1712561481.000000000544E000.00000004.00000020.00020000.00000000.sdmp, InstAct.exe, 0000000B.00000000.1739518695.0000000000AB2000.00000002.00000001.01000000.00000009.sdmp |
Source: |
Binary string: $^qXC:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831d source: CPUGuardian.exe, 0000000A.00000002.4154911978.0000000002B66000.00000004.00000800.00020000.00000000.sdmp |
Source: |
Binary string: C:\Users\dahall\Documents\Visual Studio 2010\Projects\TaskService\obj\Release\Microsoft.Win32.TaskScheduler.pdbt source: 074kFuPFv8.exe, 00000000.00000003.1712561481.0000000005E72000.00000004.00000020.00020000.00000000.sdmp, CPUGuardian.exe, 0000000A.00000002.4177985426.0000000009FC2000.00000002.00000001.01000000.00000014.sdmp, Microsoft.Win32.TaskScheduler.dll.2.dr |
Source: |
Binary string: c:\src\wix39r2\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: 074kFuPFv8.exe, 00000000.00000003.1712561481.0000000005E43000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.0.dr, Microsoft.Deployment.WindowsInstaller.dll.2.dr |
Source: |
Binary string: F.pdb source: 074kFuPFv8.exe, 00000000.00000003.1712561481.000000000544E000.00000004.00000020.00020000.00000000.sdmp, CPUGuardian.exe, 0000000A.00000000.1737687137.0000000000272000.00000002.00000001.01000000.00000006.sdmp, CPUGuardian.exe.2.dr |
Source: |
Binary string: $^q\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2d source: CPUGuardian.exe, 0000000A.00000002.4154911978.0000000002B66000.00000004.00000800.00020000.00000000.sdmp |
Source: |
Binary string: $^qkC:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: CPUGuardian.exe, 0000000A.00000002.4154911978.0000000002B66000.00000004.00000800.00020000.00000000.sdmp |
Source: |
Binary string: E:\Point\win\Release\custact\x86\ShortcutFlags.pdb source: 074kFuPFv8.exe, 00000000.00000003.1678986166.0000000003E8D000.00000004.00000020.00020000.00000000.sdmp, CPUGuardian.msi.0.dr, 5d5e38.msi.2.dr |
Source: |
Binary string: d:\BitBucketGit\CPU Guardian\Splash\obj\x86\Release\Splash.pdb source: 074kFuPFv8.exe, 00000000.00000003.1712561481.000000000544E000.00000004.00000020.00020000.00000000.sdmp, Splash.exe.0.dr, Splash.exe.2.dr |
Source: |
Binary string: <filename>C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error</filename> source: fileerrors_data.10.dr |
Source: |
Binary string: AcroExch.PDBookmark source: CPUGuardian.exe, 0000000A.00000002.4154911978.0000000002B66000.00000004.00000800.00020000.00000000.sdmp |
Source: |
Binary string: E:\Point\win\Release\stubs\x86\ExternalUi.pdb source: 074kFuPFv8.exe |
Source: |
Binary string: $^q6C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdbd source: CPUGuardian.exe, 0000000A.00000002.4154911978.0000000002B66000.00000004.00000800.00020000.00000000.sdmp |
Source: |
Binary string: <filename>C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb</filename> source: fileerrors_data.10.dr |
Source: C:\Windows\System32\msiexec.exe |
File opened: z: |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
File opened: x: |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
File opened: v: |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
File opened: t: |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
File opened: r: |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
File opened: p: |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
File opened: n: |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
File opened: l: |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
File opened: j: |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
File opened: h: |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
File opened: f: |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
File opened: b: |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
File opened: y: |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
File opened: w: |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
File opened: u: |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
File opened: s: |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
File opened: q: |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
File opened: o: |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
File opened: m: |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
File opened: k: |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
File opened: i: |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
File opened: g: |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
File opened: e: |
Jump to behavior |
Source: C:\Program Files (x86)\CPU Guardian\CPUGuardian.exe |
File opened: c: |
Jump to behavior |
Source: C:\Windows\System32\msiexec.exe |
File opened: a: |
Jump to behavior |
Source: C:\Users\user\Desktop\074kFuPFv8.exe |
Code function: 0_2_002ACFAA FindFirstFileW,FindNextFileW,FindNextFileW,FindNextFileW,FindClose,FindClose, |
0_2_002ACFAA |
Source: C:\Users\user\Desktop\074kFuPFv8.exe |
Code function: 0_2_002A9090 __recalloc,_memset,FindFirstFileW,FindClose,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle, |
0_2_002A9090 |
Source: C:\Users\user\Desktop\074kFuPFv8.exe |
Code function: 0_2_002AD1CC FindFirstFileW,FindClose,FindClose, |
0_2_002AD1CC |
Source: C:\Users\user\Desktop\074kFuPFv8.exe |
Code function: 0_2_00299410 FindFirstFileW,FindClose,FindClose, |
0_2_00299410 |
Source: C:\Users\user\Desktop\074kFuPFv8.exe |
Code function: 0_2_002A9A11 _memset,FindFirstFileW,FindClose, |
0_2_002A9A11 |
Source: C:\Users\user\Desktop\074kFuPFv8.exe |
Code function: 0_2_00298750 _memset,FindFirstFileW,FindClose,FindFirstFileW,FindClose,FindClose,FindClose,FindClose,FindClose, |
0_2_00298750 |
Source: C:\Users\user\Desktop\074kFuPFv8.exe |
Code function: 0_2_002B886D FindFirstFileW,FindClose,FindClose, |
0_2_002B886D |
Source: C:\Users\user\Desktop\074kFuPFv8.exe |
Code function: 0_2_00298A30 _wcslen,_memset,FindFirstFileW,FindClose,FindNextFileW,_memcpy_s,_wcslen,FindNextFileW,RemoveDirectoryW,_wcslen,FindNextFileW,DeleteFileW, |
0_2_00298A30 |
Source: C:\Users\user\Desktop\074kFuPFv8.exe |
Code function: 0_2_002BD9FD FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,FindFirstFileW,FindClose,FindNextFileW,FindNextFileW,FindClose, |
0_2_002BD9FD |
Source: C:\Users\user\Desktop\074kFuPFv8.exe |
Code function: 0_2_0029E320 FindClose,FindResourceW,_wcslen,_memcpy_s,FindFirstFileW,_wcslen,GetFullPathNameW,GetFullPathNameW,GetFullPathNameW,_wcsnlen,FindClose,SetLastError,_wcsrchr,_wcsrchr,_wcsnlen, |
0_2_0029E320 |
Source: C:\Users\user\Desktop\074kFuPFv8.exe |
Code function: 0_2_002AB89C FindFirstFileW,FindClose,FindClose, |
0_2_002AB89C |
Source: C:\Users\user\Desktop\074kFuPFv8.exe |
Code function: 0_2_002A7A7F FindFirstFileW,FindClose, |
0_2_002A7A7F |
Source: C:\Users\user\Desktop\074kFuPFv8.exe |
Code function: 0_2_002C7D7A GetWindowsDirectoryW,lstrcmpW,lstrlenW,FindFirstFileW,lstrlenW,DeleteFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW, |
0_2_002C7D7A |
Source: C:\Users\user\Desktop\074kFuPFv8.exe |
Code function: 0_2_00298E90 _wcsrchr,RemoveDirectoryW,GetLogicalDriveStringsW,GetDriveTypeW,FindResourceW,_wcslen,_memcpy_s,_wcslen,__recalloc, |
0_2_00298E90 |
Source: global traffic |
HTTP traffic detected: POST /callback/bo.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: label.shieldapps.bizContent-Length: 309Expect: 100-continueConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: POST /callback/bo.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: label.shieldapps.bizContent-Length: 453Expect: 100-continueConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: POST /callback/bo.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: label.shieldapps.bizContent-Length: 58Expect: 100-continueConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET /guardian-cdn/tip.jpg HTTP/1.1Host: s3.amazonaws.comConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET /guardian-cdn/tip2.jpg HTTP/1.1Host: s3.amazonaws.com |
Source: global traffic |
HTTP traffic detected: POST /callback/bo.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: label.shieldapps.bizContent-Length: 29Expect: 100-continueConnection: Keep-Alive |
Source: 074kFuPFv8.exe, 00000000.00000003.1678986166.0000000003E8D000.00000004.00000020.00020000.00000000.sdmp, MSI601F.tmp.2.dr, MSI5FAF.tmp.2.dr, CPUGuardian.msi.0.dr, 5d5e38.msi.2.dr |
String found in binary or memory: INSERT INTO `` (`Property`, `Order`, `Value`, `Text`) VALUES (?,?,?,?) TEMPORARYComboBoxListBoxSELECT * FROM `%s` WHERE `Property`='%s' AND `Value`='%s'SELECT * FROM `%s` WHERE `Property`='%s'DELETE FROM `%s` WHERE `Property`='%s'RichEdit20W[1]SELECT `Message` FROM `Error` WHERE `Error` = %sSELECT `Text` FROM `UIText` WHERE `Key` = '%s'tmptmpALLUSERS = 1';WS_EX_LAYOUTRTLWS_EX_NOINHERITLAYOUTWS_EX_NOACTIVATEWS_EX_LAYEREDWS_EX_RIGHTWS_EX_RIGHTSCROLLBARWS_EX_WINDOWEDGEWS_EX_TRANSPARENTWS_EX_TOPMOSTWS_EX_TOOLWINDOWWS_EX_STATICEDGEWS_EX_RTLREADINGWS_EX_PALETTEWINDOWWS_EX_OVERLAPPEDWINDOWWS_EX_NOPARENTNOTIFYWS_EX_MDICHILDWS_EX_LTRREADINGWS_EX_LEFTSCROLLBARWS_EX_LEFTWS_EX_DLGMODALFRAMEWS_EX_CONTROLPARENTWS_EX_CONTEXTHELPWS_EX_CLIENTEDGEWS_EX_APPWINDOWWS_EX_ACCEPTFILESWS_TILEDWS_TILEDWINDOWWS_POPUPWS_POPUPWINDOWWS_OVERLAPPEDWS_OVERLAPPEDWINDOWWS_MINIMIZEWS_MINIMIZEBOXWS_MAXIMIZEWS_MAXIMIZEBOXWS_VSCROLLWS_VISIBLEWS_THICKFRAMEWS_TABSTOPWS_SYSMENUWS_SIZEBOXWS_ICONICWS_HSCROLLWS_GROUPWS_DLGFRAMEWS_DISABLEDWS_CLIPSIBLINGSWS_CLIPCHILDRENWS_CHILDWINDOWWS_CHILDWS_CAPTIONWS_BORDERWS_EXAI_TRIAL_MESSAGE_BODYAI_MSM_TRIAL_MESSAGE_BODYAI_APP_FILEAI_README_FILEAI_APP_ARGSGetProcessIdKernel32.dllMsiLogFileLocationrunasRunAsAdminFileRunAsAdminCmdRunAsAdminWorkingDir[AdminToolsFolder][TemplateFolder][StartupFolder][DesktopFolder][ProgramMenuFolder][WindowsVolume][SystemFolder][LocalAppDataFolder][WindowsFolder][AI_ProgramFiles][CommonFiles64Folder][LocalAppDataFolder]Programs\Common\[CommonFilesFolder][ProgramFiles64Folder][LocalAppDataFolder]Programs\[ProgramFilesFolder]MIGRATEFindRelatedProductsMigrateFeatureStatesAI_SETMIXINSTLOCATIONAPPDIRAI_RESTORE_LOCATIONSELECT `ActionProperty` FROM `Upgrade`SELECT `Action`,`Target` FROM `CustomAction`SET_APPDIRSET_SHORTCUTDIRSHORTCUTDIRAI_InstallPerUser = "0"ALLUSERS = "2"MSIINSTALLPERUSER = "1"1ALLUSERSVersionMsi >= "5.0"2AI_InstallPerUser = "1"MSIINSTALLPERUSERMSINEWINSTANCEProductLanguageAI_INTANCE_LOCATIONAI_UPGRADENoOLDPRODUCTSLanguageVersionStringInstallLocationAI_REPLACE_PRODUCTSAI_Replaced_Versions_ListAI_Upgrade_Replace_Question_YesBackUp_AI_Upgrade_Question_YesAI_Upgrade_Question_YesAI_Upgrade_Replace_Question_NoBackUp_AI_Upgrade_Question_NoAI_Upgrade_Question_NoYeslcSELECT `Data` FROM `Binary` WHERE `Name`='AI_DETECTVM_BINARY_IDAI_INSIDEVM2DELETE FROM `Shortcut` WHERE `Shortcut`.`Directory_`='%s'DELETE FROM `IniFile` WHERE `IniFile`.`Section`='InternetShortcut' AND`IniFile`.`DirP |