Honorbuddy 5.1 error

honorbuddy 5.1 error

DLL) Win32 Dynamic Link Library (generic); 5.1% .EXE) Win32 Executable (generic) W:\Projects\Honorbuddy\MiniLoader\obj\x86\Release\MiniLoader.pdb. Outsourcing the problem to a person (relay attack): The bot sends static snapshots to 5.1 Major Types of Machine Learning Supervised Learning Supervised. That Work in 5.1 and are kept up to date! Will be awarded +rep - Current Status (16/02/2013) - Currently trying to fix Problem with Nova Shadow Priest PQR.

Opinion, you: Honorbuddy 5.1 error

ERROR BOOT FROM ATAPI CD-ROM NO EMULATION
Honorbuddy 5.1 error
Honorbuddy 5.1 error
Honorbuddy 5.1 error

Honorbuddy 5.1 error - join. happens

QIAcube User Manual En

  • Version 1.1 June 2008

    Sample & Assay Technologies

    QIAcube User Manual

  • Trademarks: QIAGEN, QIAamp, QIAcube, QIAprep, QIAquick, DNeasy, EpiTect, MinElute, RNeasy (QIAGEN Group); DNA-ExitusPlus (AppliChem); Gigasept, Lysetol, Mikrozid (Schlke & Mayr GmbH); DECON-QUAT (Veltek Associates, Inc.); RNaseZap (Ambion, Inc.).

    20072008 QIAGEN, all rights reserved.

  • Contents

    QIAcube User Manual 06/2008 Contents-1

    Contents

    1 Safety Information 1-1 1.1 Proper use 1-1 1.2 Electrical safety 1-2 1.3 Environment 1-3 1.4 Biological safety 1-4 1.5 Chemicals 1-6 1.6 Waste disposal 1-7 1.7 Mechanical hazards 1-7 1.8 Heat hazard 1-8 1.9 Translations of warnings and cautions 1-8 1.10 Symbols on the QIAcube 1-26

    2 Introduction 2-1 2.1 About this user manual 2-1 2.2 General information 2-2 2.2.1 Technical assistance 2-2 2.2.2 Policy statement 2-2 2.2.3 Version management 2-2 2.3 Intended use of the QIAcube 2-3 2.3.1 Requirements for QIAcube users 2-3

    3 General Description 3-1 3.1 QIAcube principle 3-2 3.2 External features of the QIAcube 3-4 3.3 Internal features of the QIAcube 3-7

  • Contents

    Contents-2 QIAcube User Manual 06/2008

    4 Installation Procedures 4-1 4.1 Requirements 4-1 4.2 AC power connection 4-2 4.3 Unpacking the QIAcube 4-2 4.4 Installing the QIAcube 4-4 4.5 Packing the QIAcube 4-7

    5 Operating Procedures 5-1 5.1 QIAcube software 5-2 5.2 Running a QIAGEN protocol 5-2 5.2.1 Starting a protocol 5-3 5.2.2 End of the protocol run 5-9 5.2.3 Stopping a protocol 5-9 5.3 Setting up the worktable 5-9 5.3.1 Loading the reagent bottle rack 5-9 5.3.2 Loading the tip racks 5-11 5.3.3 Loading the rotor adapters 5-12 5.3.4 Loading the samples 5-16 5.3.5 Loading accessory buffers 5-18 5.4 Installing and deleting protocols 5-20 5.5 Saving data files 5-23 5.6 General information 5-26 5.7 Operating the shaker 5-29 5.8 Operating the centrifuge 5-32

    6 Maintenance Procedures 6-1 6.1 Regular maintenance procedure 6-4 6.2 Daily maintenance procedure 6-4 6.3 Monthly maintenance procedure 6-5 6.4 Periodic maintenance procedure 6-6

  • Contents

    QIAcube User Manual 06/2008 Contents-3

    6.4.1 Cleaning the centrifuge 6-6 6.4.2 Cleaning the instrument 6-10 6.4.3 Tightness test 6-10 6.5 Decontaminating the QIAcube 6-11 6.6 Cleaning the QIAcube centrifuge after a plastic crash 6-12 6.6.1 Opening the centrifuge lid 6-12 6.6.2 Cleaning the rotor and buckets 6-12 6.6.3 Cleaning the centrifuge 6-13 6.6.4 Cleaning the worktable 6-15 6.6.5 Cleaning the gripper unit 6-16 6.6.6 Installing the centrifuge rotor and buckets 6-17 6.6.7 Operating the centrifuge after cleaning 6-18

    7 Troubleshooting 7-1 7.1 General information 7-1 7.2 Resolving error messages and warnings 7-1 7.2.1 Load check errors 7-2 7.2.2 Protocol errors 7-4 7.2.3 File system errors 7-7 7.2.4 General instrument errors 7-8 7.2.5 General troubleshooting 7-14 7.2.6 Protocol interruption 7-14 7.2.7 Centrifuge 7-15 7.2.8 Shaker 7-20 7.2.9 Touchscreen 7-20 7.2.10 USB stick 7-20 7.2.11 Reagent volume detection 7-21

  • Contents

    Contents-4 QIAcube User Manual 06/2008

    8 Glossary 8-1

    Appendix A A-1 Technical data A-1 Environmental conditions A-1 Waste Electrical and Electronic Equipment (WEEE) A-3 FCC declaration A-4 EC declaration of conformity A-6

    Appendix B B-1 Loading the centrifuge and shaker B-1

    Appendix C C-1 QIAcube accessories C-1

    Appendix D D-1 Liability clause D-1 Index Index-1

  • Safety Information

    QIAcube User Manual 06/2008 1-1

    1 Safety Information Before using the QIAcube, it is essential that you read this user manual carefully and pay particular attention to the safety information. The instructions and safety information in the user manual must be followed to ensure safe operation of the instrument and to maintain the instrument in a safe condition.

    The following types of safety information appear throughout this manual.

    WARNING

    The term WARNING is used to inform you about situations that could result in personal injury to you or other persons. Details about these circumstances are given in a box like this one.

    CAUTION

    The term CAUTION is used to inform you about situations that could result in damage to the instrument or other equipment. Details about these circumstances are given in a box like this one.

    The advice given in this manual is intended to supplement, not supersede, the normal safety requirements prevailing in the users country.

    1.1 Proper use

    WARNING

    Risk of personal injury and material damage [W1] Improper use of the QIAcube may cause personal injuries or damage to the instrument. The QIAcube must only be operated by qualified personnel who have been appropriately trained. Servicing of the QIAcube must only be performed by QIAGEN Field Service Specialists.

    Perform the maintenance as described in Section 6. QIAGEN charges for repairs that are required due to incorrect maintenance.

  • Safety Information

    1-2 QIAcube User Manual 06/2008

    WARNING

    Risk of personal injury and material damage [W2] The QIAcube is too heavy to be lifted by one person. To avoid personal injury or damage to the instrument, do not lift the instrument alone.

    WARNING

    Risk of personal injury and material damage [W3] Do not attempt to move the QIAcube during operation.

    CAUTION

    Damage to the instrument [C1] Avoid spilling water or chemicals onto the QIAcube. Damage caused by water or chemical spillage will void your warranty.

    In case of emergency, switch off the QIAcube at the power switch at the front of the instrument and unplug the power cord from the power outlet.

    CAUTION

    Damage to the instrument [C2] Only use QIAGEN spin columns and QIAGEN Spin Kits with the QIAcube. Damage caused by use of other types of spin column or chemistries will void your warranty.

    1.2 Electrical safety Disconnect the line power cord from the power outlet before servicing.

  • Safety Information

    QIAcube User Manual 06/2008 1-3

    WARNING

    Electrical hazard [W4] Any interruption of the protective conductor (earth/ground lead) inside or outside the instrument or disconnection of the protective conductor terminal is likely to make the instrument dangerous. Intentional interruption is prohibited. Lethal voltages inside the instrument When the instrument is connected to line power, terminals may be live, and opening covers or removing parts is likely to expose live parts.

    To ensure satisfactory and safe operation of the QIAcube, follow the advice below: The line power cord must be connected to a line power

    outlet that has a protective conductor (earth/ground). Do not adjust or replace internal parts of the instrument. Do not operate the instrument with any covers or parts

    removed. If liquid has spilled inside the instrument, switch off the

    instrument, disconnect it from the power outlet, and contact QIAGEN Technical Services.

    If the instrument becomes electrically unsafe, prevent other personnel from operating it, and contact QIAGEN Technical Services; the instrument may be electrically unsafe when:

    It or the line power cord appears to be damaged. It has been stored under unfavorable conditions for a

    prolonged period. It has been subjected to severe transport stresses.

    1.3 Environment

    Operating conditions

    WARNING

    Explosive atmosphere [W5] The QIAcube is not designed for use in an explosive atmosphere.

  • Safety Information

    1-4 QIAcube User Manual 06/2008

    WARNING

    Risk of explosion [W6] The QIAcube is intended for use with reagents and substances supplied with QIAGEN kits. Use of other reagents and substances may lead to fire or explosion.

    CAUTION

    Damage to the instrument [C3] Direct sunlight may bleach parts of the instrument and cause damage to plastic parts. The QIAcube must be located out of direct sunlight.

    1.4 Biological safety Specimens and reagents containing materials from humans should be treated as potentially infectious. Use safe laboratory procedures as outlined in publications such as Biosafety in Microbiological and Biomedical Laboratories, HHS ( www.cdc.gov/od/ohs/biosfty/biosfty.htm ).

    Samples

    Samples may contain infectious agents. You should be aware of the health hazard presented by such agents and should use, store, and dispose of such samples according to the required safety regulations.

  • Safety Information

    QIAcube User Manual 06/2008 1-5

    WARNING

    Samples containing infectious agents [W7] Some samples used with this instrument may contain infectious agents. Handle such samples with the greatest of care and in accordance with the required safety regulations. Always wear safety glasses, 2 pairs of gloves, and a lab coat. The responsible body (e.g., laboratory manager) must take the necessary precautions to ensure that the surrounding workplace is safe, and that the instrument operators are suitably trained and not exposed to hazardous levels of infectious agents as defined in the applicable Material Safety Data Sheets (MSDSs) or OSHA,* ACGIH, or COSHH documents. Venting for fumes and disposal of wastes must be in accordance with all national, state, and local health and safety regulations and laws.

    * OSHA: Occupational Safety and Health Administration (United States of America). ACGIH: American Conference of Government Industrial Hygienists (United States of America). COSHH: Control of Substances Hazardous to Health (United Kingdom).

  • Safety Information

    1

  • Some interesting things are happening with my computer. Please help

    Thanks for your help Louis!

     

     HEres the speccy link for you : http://speccy.piriform.com/results/izzJhTDZT3jzQMQY4X3ZvFK

     

    And here is the info from MiniToolBox:

     

     

    MiniToolBox by Farbar  Version: 30-11-2014
    Ran by Christopher (administrator) on 19-02-2015 at 18:25:12
    Running from "C:\Users\Christopher\Downloads"
    Microsoft Windows 7 Ultimate  Service Pack 1 (X64)
    Boot Mode: Normal
    ***************************************************************************

    ========================= Event log errors: ===============================

    Application errors:
    ==================
    Error: (02/19/2015 05:19:52 PM) (Source: WinMgmt) (User: )
    Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

    Error: (02/19/2015 05:17:14 PM) (Source: Application Error) (User: )
    Description: Faulting application name: CsrBtOBEXService.exe, version: 2.1.63.0, time stamp: 0x4f68683b
    Faulting module name: CsrBtOBEXService.exe, version: 2.1.63.0, time stamp: 0x4f68683b
    Exception code: 0xc0000005
    Fault offset: 0x0000000000006f58
    Faulting process id: 0x7a8
    Faulting application start time: 0xCsrBtOBEXService.exe0
    Faulting application path: CsrBtOBEXService.exe1
    Faulting module path: CsrBtOBEXService.exe2
    Report Id: CsrBtOBEXService.exe3

    Error: (02/18/2015 11:08:50 AM) (Source: Application Error) (User: )
    Description: Faulting application name: plugin-container.exe, version: 35.0.1.5500, time stamp: 0x54c1f9f3
    Faulting module name: mozalloc.dll, version: 35.0.1.5500, time stamp: 0x54c1f224
    Exception code: 0x80000003
    Fault offset: 0x00001425
    Faulting process id: 0x894
    Faulting application start time: 0xplugin-container.exe0
    Faulting application path: plugin-container.exe1
    Faulting module path: plugin-container.exe2
    Report Id: plugin-container.exe3

    Error: (02/17/2015 10:27:00 PM) (Source: Application Error) (User: )
    Description: Faulting application name: plugin-container.exe, version: 35.0.1.5500, time stamp: 0x54c1f9f3
    Faulting module name: mozalloc.dll, version: 35.0.1.5500, time stamp: 0x54c1f224
    Exception code: 0x80000003
    Fault offset: 0x00001425
    Faulting process id: 0x1698
    Faulting application start time: 0xplugin-container.exe0
    Faulting application path: plugin-container.exe1
    Faulting module path: plugin-container.exe2
    Report Id: plugin-container.exe3

    Error: (02/17/2015 10:07:13 AM) (Source: Application Hang) (User: )
    Description: The program Explorer.EXE version 6.1.7601.17567 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Action Center control panel.

    Process ID: ce8

    Start Time: 01d04a22428ed36c

    Termination Time: 17277

    Application Path: C:\Windows\Explorer.EXE

    Report Id: 8d42b15e-b6b6-11e4-8cad-fcaa142e3789

    Error: (02/17/2015 03:29:04 AM) (Source: Application Error) (User: )
    Description: Faulting application name: GUI.exe, version: 1.0.0.1, time stamp: 0x4f0fc8d2
    Faulting module name: HM.dll, version: 1.0.0.1, time stamp: 0x527a12fd
    Exception code: 0xc0000005
    Fault offset: 0x000087e3
    Faulting process id: 0xe24
    Faulting application start time: 0xGUI.exe0
    Faulting application path: GUI.exe1
    Faulting module path: GUI.exe2
    Report Id: GUI.exe3

    Error: (02/16/2015 02:55:16 PM) (Source: WinMgmt) (User: )
    Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

    Error: (02/16/2015 02:53:40 PM) (Source: ESENT) (User: )
    Description: taskhost (3124) WebCacheLocal: Error -1811 occurred while opening logfile C:\Users\Christopher\AppData\Local\Microsoft\Windows\WebCache\V0100023.log.

    Error: (02/16/2015 03:46:15 AM) (Source: WinMgmt) (User: )
    Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

    Error: (02/13/2015 07:34:31 AM) (Source: Application Error) (User: )
    Description: Faulting application name: plugin-container.exe, version: 35.0.1.5500, time stamp: 0x54c1f9f3
    Faulting module name: mozalloc.dll, version: 35.0.1.5500, time stamp: 0x54c1f224
    Exception code: 0x80000003
    Fault offset: 0x00001425
    Faulting process id: 0x1acc
    Faulting application start time: 0xplugin-container.exe0
    Faulting application path: plugin-container.exe1
    Faulting module path: plugin-container.exe2
    Report Id: plugin-container.exe3


    System errors:
    =============
    Error: (02/19/2015 05:19:08 PM) (Source: DCOM) (User: NT AUTHORITY)
    Description: application-specificLocalLaunch{C97FCC79-E628-407D-AE68-A06AD6D8B4D1}{344ED43D-D086-4961-86A6-1106F4ACAD9B}NT AUTHORITYSYSTEMS-1-5-18LocalHost (Using LRPC)

    Error: (02/19/2015 05:18:08 PM) (Source: Service Control Manager) (User: )
    Description: The following boot-start or system-start driver(s) failed to load:
    UsbCharger

    Error: (02/19/2015 05:17:15 PM) (Source: Service Control Manager) (User: )
    Description: The CSR OBEX Service service terminated unexpectedly.  It has done this 1 time(s).

    Error: (02/19/2015 05:17:10 PM) (Source: DCOM) (User: )
    Description: {F9717507-6651-4EDB-BFF7-AE615179BCCF}

    Error: (02/19/2015 04:03:58 PM) (Source: BTHUSB) (User: )
    Description: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.

    Error: (02/16/2015 02:54:34 PM) (Source: DCOM) (User: NT AUTHORITY)
    Description: application-specificLocalLaunch{C97FCC79-E628-407D-AE68-A06AD6D8B4D1}{344ED43D-D086-4961-86A6-1106F4ACAD9B}NT AUTHORITYSYSTEMS-1-5-18LocalHost (Using LRPC)

    Error: (02/16/2015 02:53:33 PM) (Source: Service Control Manager) (User: )
    Description: The following boot-start or system-start driver(s) failed to load:
    UsbCharger

    Error: (02/16/2015 02:53:31 PM) (Source: EventLog) (User: )
    Description: The previous system shutdown at 2:50:23 PM on ‎2/‎16/‎2015 was unexpected.

    Error: (02/16/2015 04:45:07 AM) (Source: BTHUSB) (User: )
    Description: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.

    Error: (02/16/2015 04:14:57 AM) (Source: BTHUSB) (User: )
    Description: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.


    Microsoft Office Sessions:
    =========================
    Error: (02/19/2015 05:19:52 PM) (Source: WinMgmt)(User: )
    Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

    Error: (02/19/2015 05:17:14 PM) (Source: Application Error)(User: )
    Description: CsrBtOBEXService.exe2.1.63.04f68683bCsrBtOBEXService.exe2.1.63.04f68683bc00000050000000000006f587a801d04a223e820520C:\Program Files\CSR\CSR Harmony Wireless Software Stack\CsrBtOBEXService.exeC:\Program Files\CSR\CSR Harmony Wireless Software Stack\CsrBtOBEXService.exe0e4b0fd8-b885-11e4-8cad-fcaa142e3789

    Error: (02/18/2015 11:08:50 AM) (Source: Application Error)(User: )
    Description: plugin-container.exe35.0.1.550054c1f9f3mozalloc.dll35.0.1.550054c1f224800000030000142589401d04b9363eef6d9F:\Program Files (x86)\Mozilla Firefox\plugin-container.exeF:\Program Files (x86)\Mozilla Firefox\mozalloc.dll6cf19b4e-b788-11e4-8cad-fcaa142e3789

    Error: (02/17/2015 10:27:00 PM) (Source: Application Error)(User: )
    Description: plugin-container.exe35.0.1.550054c1f9f3mozalloc.dll35.0.1.550054c1f2248000000300001425169801d04ad617570e1dF:\Program Files (x86)\Mozilla Firefox\plugin-container.exeF:\Program Files (x86)\Mozilla Firefox\mozalloc.dllff981e0d-b71d-11e4-8cad-fcaa142e3789

    Error: (02/17/2015 10:07:13 AM) (Source: Application Hang)(User: )
    Description: Explorer.EXE6.1.7601.17567ce801d04a22428ed36c17277C:\Windows\Explorer.EXE8d42b15e-b6b6-11e4-8cad-fcaa142e3789

    Error: (02/17/2015 03:29:04 AM) (Source: Application Error)(User: )
    Description: GUI.exe1.0.0.14f0fc8d2HM.dll1.0.0.1527a12fdc0000005000087e3e2401d04a2242eef4d5C:\Program Files (x86)\GIGABYTE\ET6\GUI.exeC:\Program Files (x86)\GIGABYTE\ET6\HM.dll07ecd075-b67f-11e4-8cad-fcaa142e3789

    Error: (02/16/2015 02:55:16 PM) (Source: WinMgmt)(User: )
    Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

    Error: (02/16/2015 02:53:40 PM) (Source: ESENT)(User: )
    Description: taskhost3124WebCacheLocal: C:\Users\Christopher\AppData\Local\Microsoft\Windows\WebCache\V0100023.log-1811

    Error: (02/16/2015 03:46:15 AM) (Source: WinMgmt)(User: )
    Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

    Error: (02/13/2015 07:34:31 AM) (Source: Application Error)(User: )
    Description: plugin-container.exe35.0.1.550054c1f9f3mozalloc.dll35.0.1.550054c1f22480000003000014251acc01d04782670be511F:\Program Files (x86)\Mozilla Firefox\plugin-container.exeF:\Program Files (x86)\Mozilla Firefox\mozalloc.dlla83ea096-b37c-11e4-aa5a-fcaa142e3789



    @BIOS (HKLM-x32\...\{B2DC3F08-2EB2-49A5-AA24-15DFC8B1CB83}) (Version: 2.33 - GIGABYTE)
    =========================== Installed Programs ============================
    µTorrent (HKCU\...\uTorrent) (Version: 3.4.2.38656 - BitTorrent Inc.)
    3TB+Unlock B12.1102.1 (HKLM-x32\...\{17630FD1-B14A-4CA5-A627-B6B5F7DD41CF}) (Version: 1.00.0001 - GIGABYTE)
    7-Zip 9.20 (x64 edition) (HKLM\...\{23170F69-40C1-2702-0920-000001000000}) (Version: 9.20.00.0 - Igor Pavlov)
    Adobe Flash Player 16 NPAPI (HKLM-x32\...\Adobe Flash Player NPAPI) (Version: 16.0.0.305 - Adobe Systems Incorporated)
    Adobe Reader 9.3 (HKLM-x32\...\{AC76BA86-7AD7-1033-7B44-A93000000001}) (Version: 9.3.0 - Adobe Systems Incorporated)
    Age of Wonders 3 (HKLM-x32\...\Age of Wonders 3_R.G. Mechanics_is1) (Version:  - R.G. Mechanics, markfiter)
    AIDA64 Extreme v5.00 (HKLM-x32\...\AIDA64 Extreme_is1) (Version: 5.00 - FinalWire Ltd.)
    AMD Accelerated Video Transcoding (Version: 13.30.100.41120 - Advanced Micro Devices, Inc.) Hidden
    AMD Catalyst Control Center (x32 Version: 2014.1120.2123.38423 - Advanced Micro Devices, Inc.) Hidden
    AMD Catalyst Install Manager (HKLM\...\{F2A7CE36-57BF-5C86-952D-90DBF3746D82}) (Version: 8.0.916.0 - Advanced Micro Devices, Inc.)
    AMD Drag and Drop Transcoding (Version: 2.00.0000 - Advanced Micro Devices, Inc.) Hidden
    AMD Fuel (Version: 2014.1120.2123.38423 - Advanced Micro Devices, Inc.) Hidden
    AMD Steady Video Plug-In  (Version: 2.07.0000 - AMD) Hidden
    AMD Wireless Display v3.0 (Version: 1.0.0.15 - Advanced Micro Devices, Inc.) Hidden
    Anno 2070 version 2.0 (HKLM-x32\...\{B6249B57-3A35-4E06-A747-F79AE49F275D}_is1) (Version: 2.0 - )
    Apple Application Support (HKLM-x32\...\{46F044A5-CE8B-4196-984E-5BD6525E361D}) (Version: 2.3.6 - Apple Inc.)
    Apple Software Update (HKLM-x32\...\{789A5B64-9DD9-4BA5-915A-F0FC0A1B7BFE}) (Version: 2.1.3.127 - Apple Inc.)
    Arma III (HKLM-x32\...\Arma III_R.G. Mechanics_is1) (Version:  - R.G. Mechanics, markfiter)
    Ask Mr. Robot Client (HKCU\...\4080185637.www.askmrrobot.com) (Version:  - www.askmrrobot.com)
    AutoGreen B12.1220.1 (HKLM-x32\...\InstallShield_{C75FAD21-EC08-42F3-92D6-C9C0AB355345}) (Version: 1.00.0000 - GIGABYTE)
    AutoGreen B12.1220.1 (x32 Version: 1.00.0000 - GIGABYTE) Hidden
    AVS Video Converter 9.0 (HKLM-x32\...\AVS4YOU Video Converter 7_is1) (Version: 9.0.1.566 - Online Media Technologies Ltd.)
    Battle.net (HKLM-x32\...\Battle.net) (Version:  - Blizzard Entertainment)
    Battlefield™ Hardline Beta (HKLM-x32\...\{F5526D9D-13AD-4270-8707-AC921D168299}) (Version: 1.0.0.1 - Electronic Arts)
    Battlelog Web Plugins (HKLM-x32\...\Battlelog Web Plugins) (Version: 2.6.2 - EA Digital Illusions CE AB)
    BitRaider Streaming Client (HKLM-x32\...\BitRaider Streaming Client) (Version: 1.3.3.4098 - BitRaider, LLC)
    Bonjour (HKLM\...\{B91110FB-33B4-468B-90C2-4D5E8AE3FAE1}) (Version: 2.0.2.0 - Apple Inc.)
    Bonjour Print Services (HKLM\...\{0DA20600-6130-443B-9D4B-F30520315FA6}) (Version: 2.0.2.0 - Apple Inc.)
    Catalyst Control Center - Branding (x32 Version: 1.00.0000 - Advanced Micro Devices, Inc.) Hidden
    Catalyst Control Center Graphics Previews Common (x32 Version: 2014.1120.2123.38423 - Advanced Micro Devices, Inc.) Hidden
    Catalyst Control Center InstallProxy (x32 Version: 2014.1120.2123.38423 - Advanced Micro Devices, Inc.) Hidden
    Catalyst Control Center Localization All (x32 Version: 2014.1120.2123.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Chinese Standard (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Chinese Traditional (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Czech (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Danish (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Dutch (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help English (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Finnish (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help French (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help German (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Greek (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Hungarian (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Italian (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Japanese (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Korean (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Norwegian (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Polish (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Portuguese (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Russian (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Spanish (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Swedish (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Thai (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Turkish (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    ccc-utility64 (Version: 2014.1120.2123.38423 - Advanced Micro Devices, Inc.) Hidden
    CCleaner, ?????? 4.14.4808 (HKLM-x32\...\{80BD3FC0-9C5F-4ADA-83C7-91DC8E24D0B2}_is1) (Version: 4.14.4808 - Salat Production)
    CherryTree version 0.35.7 (HKLM-x32\...\{DBA7384C-E1C6-44B5-A3B4-C94F2F0B8C0C}_is1) (Version: 0.35.7 - Giuseppe Penone)
    Cities XXL (HKLM-x32\...\Cities XXL_R.G. Mechanics_is1) (Version:  - R.G. Mechanics, markfiter)
    CSR Harmony Wireless Software Stack (HKLM\...\{17DEA095-8EE1-49A2-AC5A-9663DB098FA9}) (Version: 2.1.63.0 - Cambridge Silicon Radio Limited.)
    Curse Client (HKCU\...\101a9f93b8f0bb6f) (Version: 5.1.1.820 - Curse)
    CyberLink PowerDirector 13 (HKLM-x32\...\{BA385AFC-00B1-417C-8C20-74B996EF3AF0}) (Version: 13.0.2326.0 - CyberLink Corp.)
    CyberLink WaveEditor 2 (HKLM-x32\...\{324F76CC-D8DD-4D87-B77D-D4AF5E1AA7B3}) (Version: 2.0 - CyberLink Corp.)
    D3DX10 (x32 Version: 15.4.2368.0902 - Microsoft) Hidden
    Dolby Home Theater v4 (HKLM-x32\...\{B26438B4-BF51-49C3-9567-7F14A5E40CB9}) (Version: 7.2.8000.17 - Dolby Laboratories Inc)
    Dragon Age Inquisition version 1.1.0 (HKLM-x32\...\Dragon Age Inquisition_is1) (Version: 1.1.0 - dzrepack)
    Dxtory version 2.0.127 (HKLM-x32\...\Dxtory2.0_is1) (Version: 2.0.127 - ExKode Co. Ltd.)
    Dying Light (HKLM-x32\...\Dying Light_R.G. Mechanics_is1) (Version:  - R.G. Mechanics, ProZorg_tm)
    Easy Tune 6 B13.1111.1 (HKLM-x32\...\InstallShield_{457D7505-D665-4F95-91C3-ECB8C56E9ACA}) (Version: 1.00.0000 - GIGABYTE)
    Easy Tune 6 B13.1111.1 (x32 Version: 1.00.0000 - GIGABYTE) Hidden
    Europa Universalis IV (HKLM-x32\...\Europa Universalis IV_is1) (Version:  - Paradox Interactive)
    f.lux (HKCU\...\Flux) (Version:  - )
    Futuremark SystemInfo (HKLM-x32\...\{2FE4C157-30AD-47F3-9D93-D9A2AFF25D3F}) (Version: 4.33.485.0 - Futuremark)
    Google Drive (HKLM-x32\...\{65EACBB4-B0B8-4A5B-AE46-22DBE15C70B5}) (Version: 1.19.8406.6504 - Google, Inc.)
    Google Toolbar for Internet Explorer (HKLM-x32\...\{2318C2B1-4965-11d4-9B18-009027A5CD4F}) (Version: 7.5.5111.1712 - Google Inc.)
    Google Toolbar for Internet Explorer (x32 Version: 1.0.0 - Google Inc.) Hidden
    Google Update Helper (x32 Version: 1.3.25.11 - Google Inc.) Hidden
    Google Update Helper (x32 Version: 1.3.26.9 - Google Inc.) Hidden
    Honorbuddy (HKCU\...\{512505bd-8999-44e0-993e-97d60c730784}) (Version: 2.5.12646.765 - Bossland GmbH)
    Honorbuddy (x32 Version: 2.5.12646.765 - Bossland GmbH) Hidden
    Intel® Wireless Bluetooth®(patch version 17.1.1440.2) (HKLM\...\{302600C1-6BDF-4FD1-1409-148929CC1385}) (Version: 17.1.1409.0488 - Intel Corporation)
    Java 8 Update 31 (HKLM-x32\...\{26A24AE4-039D-4CA4-87B4-2F83218031F0}) (Version: 8.0.310 - Oracle Corporation)
    Java Auto Updater (x32 Version: 2.8.31.13 - Oracle Corporation) Hidden
    Malwarebytes Anti-Malware version 2.0.4.1028 (HKLM-x32\...\Malwarebytes Anti-Malware_is1) (Version: 2.0.4.1028 - Malwarebytes Corporation)
    marvell 91xx driver (HKLM-x32\...\MagniDriver) (Version: 1.2.0.1039 - Marvell)
    Microsoft .NET Framework 4.5.1 (HKLM\...\{92FB6C44-E685-45AD-9B20-CADF4CABA132} - 1033) (Version: 4.5.50938 - Microsoft Corporation)
    Microsoft .NET Framework 4.5.1 (Version: 4.5.50938 - Microsoft Corporation) Hidden
    Microsoft Application Error Reporting (Version: 12.0.6015.5000 - Microsoft Corporation) Hidden
    Microsoft Mouse and Keyboard Center (HKLM\...\Microsoft Mouse and Keyboard Center) (Version: 2.3.188.0 - Microsoft Corporation)
    Microsoft Mouse and Keyboard Center (Version: 2.3.188.0 - Microsoft Corporation) Hidden
    Microsoft Security Client (Version: 4.7.0205.0 - Microsoft Corporation) Hidden
    Microsoft Security Essentials (HKLM\...\Microsoft Security Client) (Version: 4.7.205.0 - Microsoft Corporation)
    Microsoft Silverlight (HKLM\...\{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}) (Version: 5.1.30514.0 - Microsoft Corporation)
    Microsoft SQL Server 2005 Compact Edition [ENU] (HKLM-x32\...\{F0B430D1-B6AA-473D-9B06-AA3DD01FD0B8}) (Version: 3.1.0000 - Microsoft Corporation)
    Microsoft Visual C++ 2005 Redistributable (HKLM-x32\...\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}) (Version: 8.0.61001 - Microsoft Corporation)
    Microsoft Visual C++ 2008 Redistributable - x64 9.0.21022 (HKLM\...\{350AA351-21FA-3270-8B7A-835434E766AD}) (Version: 9.0.21022 - Microsoft Corporation)
    Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729 (HKLM\...\{2DFD8316-9EF1-3210-908C-4CB61961C1AC}) (Version: 9.0.30729 - Microsoft Corporation)
    Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.17 (HKLM\...\{8220EEFE-38CD-377E-8595-13398D740ACE}) (Version: 9.0.30729 - Microsoft Corporation)
    Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.6161 (HKLM\...\{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}) (Version: 9.0.30729.6161 - Microsoft Corporation)
    Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729 (HKLM-x32\...\{527BBE2F-1FED-3D8B-91CB-4DB0F838E69E}) (Version: 9.0.30729 - Microsoft Corporation)
    Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (HKLM-x32\...\{9A25302D-30C0-39D9-BD6F-21E6EC160475}) (Version: 9.0.30729 - Microsoft Corporation)
    Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148 (HKLM-x32\...\{1F1C2DFC-2D24-3E06-BCB8-725134ADF989}) (Version: 9.0.30729.4148 - Microsoft Corporation)
    Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (HKLM-x32\...\{9BE518E6-ECC6-35A9-88E4-87755C07200F}) (Version: 9.0.30729.6161 - Microsoft Corporation)
    Microsoft Visual C++ 2010 Redistributable - x64 10.0.40219 (HKLM\...\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}) (Version: 10.0.40219 - Microsoft Corporation)
    Microsoft Visual C++ 2010 Redistributable - x86 10.0.40219 (HKLM-x32\...\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}) (Version: 10.0.40219 - Microsoft Corporation)
    Microsoft Visual C++ 2012 Redistributable (x64) - 11.0.60610 (HKLM-x32\...\{a1909659-0a08-4554-8af1-2175904903a1}) (Version: 11.0.60610.1 - Microsoft Corporation)
    Microsoft Visual C++ 2012 Redistributable (x64) - 11.0.61030 (HKLM-x32\...\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}) (Version: 11.0.61030.0 - Microsoft Corporation)
    Microsoft Visual C++ 2012 Redistributable (x86) - 11.0.51106 (HKLM-x32\...\{8e70e4e1-06d7-470b-9f74-a51bef21088e}) (Version: 11.0.51106.1 - Microsoft Corporation)
    Microsoft Visual C++ 2012 Redistributable (x86) - 11.0.60610 (HKLM-x32\...\{95716cce-fc71-413f-8ad5-56c2892d4b3a}) (Version: 11.0.60610.1 - Microsoft Corporation)
    Microsoft Visual C++ 2012 Redistributable (x86) - 11.0.61030 (HKLM-x32\...\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}) (Version: 11.0.61030.0 - Microsoft Corporation)
    Microsoft Visual C++ 2012 x64 Additional Runtime - 11.0.50727 (Version: 11.0.50727 - Microsoft Corporation) Hidden
    Microsoft Visual C++ 2012 x64 Additional Runtime - 11.0.61030 (Version: 11.0.61030 - Microsoft Corporation) Hidden
    Microsoft Visual C++ 2012 x64 Minimum Runtime - 11.0.50727 (Version: 11.0.50727 - Microsoft Corporation) Hidden
    Microsoft Visual C++ 2012 x64 Minimum Runtime - 11.0.61030 (Version: 11.0.61030 - Microsoft Corporation) Hidden
    Microsoft Visual C++ 2012 x86 Additional Runtime - 11.0.50727 (x32 Version: 11.0.50727 - Microsoft Corporation) Hidden
    Microsoft Visual C++ 2012 x86 Additional Runtime - 11.0.61030 (x32 Version: 11.0.61030 - Microsoft Corporation) Hidden
    Microsoft Visual C++ 2012 x86 Minimum Runtime - 11.0.50727 (x32 Version: 11.0.50727 - Microsoft Corporation) Hidden
    Microsoft Visual C++ 2012 x86 Minimum Runtime - 11.0.61030 (x32 Version: 11.0.61030 - Microsoft Corporation) Hidden
    Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 (HKLM-x32\...\{f65db027-aff3-4070-886a-0d87064aabb1}) (Version: 12.0.30501.0 - Microsoft Corporation)
    Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 (x32 Version: 12.0.21005 - Microsoft Corporation) Hidden
    Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (x32 Version: 12.0.21005 - Microsoft Corporation) Hidden
    Movie Maker (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    Mozilla Firefox 34.0.5 (x86 en-US) (HKLM-x32\...\Mozilla Firefox 34.0.5 (x86 en-US)) (Version: 34.0.5 - Mozilla)
    Mozilla Firefox 35.0.1 (x86 en-US) (HKCU\...\Mozilla Firefox 35.0.1 (x86 en-US)) (Version: 35.0.1 - Mozilla)
    Mozilla Maintenance Service (HKLM-x32\...\MozillaMaintenanceService) (Version: 34.0.5 - Mozilla)
    MSVCRT (x32 Version: 15.4.2862.0708 - Microsoft) Hidden
    MSVCRT110 (x32 Version: 16.4.1108.0727 - Microsoft) Hidden
    MSVCRT110_amd64 (Version: 16.4.1109.0912 - Microsoft) Hidden
    NewBlue Video Essentials for Windows (HKLM-x32\...\NewBlue Video Essentials for Windows) (Version: 3.0 - NewBlue)
    NVIDIA PhysX (HKLM-x32\...\{80407BA7-7763-4395-AB98-5233F1B34E65}) (Version: 9.13.1220 - NVIDIA Corporation)
    ON_OFF Charge 2 B13.1028.1 (HKLM-x32\...\InstallShield_{6B4ED6F7-BB88-4945-B0C6-01410E1BAC3A}) (Version: 1.00.0000 - GIGABYTE)
    ON_OFF Charge 2 B13.1028.1 (x32 Version: 1.00.0000 - GIGABYTE) Hidden
    Origin (HKLM-x32\...\Origin) (Version: 9.5.5.2850 - Electronic Arts, Inc.)
    Photo Gallery (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    Plantronics RIG Dolby Game Audio (HKLM-x32\...\{1B6D9EA4-D1D6-4225-ADBB-441707C49D02}) (Version: 1.31.35.2 - Plantronics, Inc)
    Platform (x32 Version: 1.42 - VIA Technologies, Inc.) Hidden
    PowerISO (HKLM-x32\...\PowerISO) (Version: 6.1 - Power Software Ltd)
    proDAD Adorage 3.0 (64bit) (HKLM\...\proDAD-Adorage-3.0) (Version: 3.0.108.1 - proDAD GmbH)
    PunkBuster Services (HKLM-x32\...\PunkBusterSvc) (Version: 0.994 - Even Balance, Inc.)
    QuickTime 7 (HKLM-x32\...\{3D2CBC2C-65D4-4463-87AB-BB2C859C1F3E}) (Version: 7.76.80.95 - Apple Inc.)
    Rainmeter (HKLM-x32\...\Rainmeter) (Version: 3.1 r2290 - )
    Raptr (HKLM-x32\...\Raptr) (Version:  - )
    Realtek Ethernet Controller Driver (HKLM-x32\...\{8833FFB6-5B0C-4764-81AA-06DFEED9A476}) (Version: 7.49.927.2011 - Realtek)
    Realtek HDMI Audio Driver for ATI (HKLM-x32\...\{5449FB4F-1802-4D5B-A6D8-087DB1142147}) (Version: 6.0.1.6650 - Realtek Semiconductor Corp.)
    Realtek High Definition Audio Driver (HKLM-x32\...\{F132AF7F-7BCA-4EDE-8A7C-958108FE7DBC}) (Version: 6.0.1.7106 - Realtek Semiconductor Corp.)
    SeaTools for Windows (HKLM-x32\...\SeaTools for Windows) (Version:  - Seagate Technology)
    Sherlock Holmes Crimes and Punishments (HKLM-x32\...\Sherlock Holmes Crimes and Punishments_is1) (Version:  - )
    Sid Meier's Civilization V (HKLM-x32\...\steam app 8930) (Version:  - 2K Games, Inc.)
    SimCity 2000 Special Edition (HKLM-x32\...\{59D2C751-F7BE-4E9F-9C8C-1F16013802C7}) (Version: 2.0.0.1 - Electronic Arts)
    Skype Click to Call (HKLM-x32\...\{6D1221A9-17BF-4EC0-81F2-27D30EC30701}) (Version: 7.3.16540.9015 - Microsoft Corporation)
    Skype™ 7.0 (HKLM-x32\...\{24991BA0-F0EE-44AD-9CC8-5EC50AECF6B7}) (Version: 7.0.102 - Skype Technologies S.A.)
    SmartSound Quicktracks 5 (HKLM-x32\...\InstallShield_{2F8BA3FD-1FA9-4279-B696-712ABB12F09F}) (Version: 5.1.8 - SmartSound Software Inc.)
    SmartSound Quicktracks 5 (x32 Version: 5.1.8 - SmartSound Software Inc.) Hidden
    SpeedFan (remove only) (HKLM-x32\...\SpeedFan) (Version:  - )
    Spotify (HKCU\...\Spotify) (Version: 0.9.15.27.g87efe634 - Spotify AB)
    Star Wars The Old Republic (HKLM-x32\...\swtor_swtor) (Version:  - Bioware/EA)
    Star Wars: The Old Republic (HKLM-x32\...\{3B11D799-48E0-48ED-BFD7-EA655676D8BB}) (Version: 1.00 - Electronic Arts, Inc.)
    System Requirements Lab (HKLM-x32\...\{8DCAB1D8-F20C-4733-9B5F-646DDFEB59C9}) (Version: 6.1.1.0 - Husdawg, LLC)
    System Requirements Lab Detection (HKLM-x32\...\{EF639962-8CC7-4670-9F69-7045F125D8BB}) (Version: 2.2.3.0 - Husdawg, LLC)
    Theme Hospital (HKLM-x32\...\{5118A4C2-C8A4-4CE5-AC37-F3E51C25402F}) (Version: 3.0.0.2 - Electronic Arts)
    Tropico 5 Waterborne (HKLM-x32\...\Tropico 5 Waterborne_is1) (Version:  - )
    UAS&TURBO DRIVER CONTROL TOOL 1.0.0.13 (HKLM-x32\...\{078BD51D-BC3A-4178-93DE-57FFE92A83DE}}_is1) (Version:  - GIGA-BYTE TECHNOLOGY CO., LTD.)
    Unity Web Player (HKCU\...\UnityWebPlayer) (Version: 4.6.1f1 - Unity Technologies ApS)
    Uplay (HKLM-x32\...\Uplay) (Version: 4.9 - Ubisoft)
    VIA Platform Device Manager (HKLM-x32\...\InstallShield_{20D4A895-748C-4D88-871C-FDB1695B0169}) (Version: 1.42 - VIA Technologies, Inc.)
    Watch_Dogs (HKLM-x32\...\Uplay Install 274) (Version:  - Ubisoft)
    WD My Cloud (HKLM\...\{432F3CFC-ED41-4CDC-9D8F-6643C8A71CEA}) (Version: 1.0.6.13 - Western Digital Technologies, Inc.)
    Windows Live Communications Platform (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    Windows Live Essentials (HKLM-x32\...\WinLiveSuite) (Version: 16.4.3528.0331 - Microsoft Corporation)
    Windows Live Essentials (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    Windows Live ID Sign-in Assistant (Version: 7.250.4311.0 - Microsoft Corporation) Hidden
    Windows Live Installer (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    Windows Live Photo Common (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    Windows Live PIMT Platform (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    Windows Live SOXE (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    Windows Live SOXE Definitions (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    Windows Live UX Platform (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    Windows Live UX Platform Language Pack (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    Windows Live Writer (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    Windows Live Writer Resources (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    World of Warcraft (HKLM-x32\...\World of Warcraft) (Version:  - Blizzard Entertainment)
    World of Warcraft Beta (HKLM-x32\...\World of Warcraft Beta) (Version:  - Blizzard Entertainment)
    World of Warcraft Public Test (HKLM-x32\...\World of Warcraft Public Test) (Version:  - Blizzard Entertainment)

    ========================= Memory info: ===================================

    Percentage of memory in use: 44%
    Total physical RAM: 8156.61 MB
    Available physical RAM: 4526.79 MB
    Total Pagefile: 16311.41 MB
    Available Pagefile: 12259.44 MB
    Total Virtual: 4095.88 MB
    Available Virtual: 3973.15 MB

    ========================= Partitions: =====================================

    1 Drive c: () (Fixed) (Total:238.47 GB) (Free:47.06 GB) NTFS
    3 Drive e: (Movies) (Fixed) (Total:491.98 GB) (Free:21.21 GB) NTFS
    4 Drive f: () (Fixed) (Total:439.53 GB) (Free:40.89 GB) NTFS

    ========================= Users: ========================================

    User accounts for \\CHRISTOPHER-PC

    Administrator            Christopher              Guest                    


    **** End of log ****
     


    1 Using machine learning to detect bots in World of Warcraft By Ian D. Stevens A thesis submitted for the degree of Bachelor of Information Technology (Honours) School of Computer and Information Science University of South Australia Principle Supervisor: Wolfgang Mayer

    2

    3 Declaration I declare that this thesis does not incorporate without acknowledgment any material previously submitted for a degree or diploma in any university; and that to the best of my knowledge it does not contain any materials previously published or written by another person except where due reference is made in the text. Signature of Author:... Ian David Stevens Cape Town 24th October 2016 ii

    4 Abstract A game bot is an automated program that takes control of an avatar in a game to perform certain tasks. These game bots ruin the various aspects of the game for people who are playing the game as it was intended to be played. Most of the game companies state they do not allow botting in their game and it violates their user policy agreement. There are many different systems in place that are design to classify character in a game as a human or a bot, however, these systems are far from perfect, and they can have adverse effects on the game they were trying to improve by increasing latency, ruining the immersion of the game, or invading the players privacy. This paper proposes a bot detection method that avoids the aforementioned short falls of current systems. We look at various factors of game play in typical tasks and how bots and humans differ in executing these tasks using scientific analysis. Based on these factors we construct a classifier that can learn to tell the difference between a human and bot. In this paper we aim to show that by carefully observing these human traits we can design a classifier that can successfully detect bots while not interfering in other areas of the game. Using the popular massively multiplayer online game World of Warcraft we tested our classifier with real human test cases and popular bots used in the game. The results showed our classifier achieved a 87.65% Accuracy rate. iii

    55 algorithm The k-means algorithm iv

    6 CONTENTS CONTENTS Support vector machines (SVM) The EM algorithm AdaBoost knn Naïve Bayes CART Artificial neural network (ANN) Methodology Research Questions Conditions for the experiment The Location The WoW server Player Data Collectoin The bot programs Bot data collection Data pre-processing Classifier architecture and training Results Calculating the information gain for each attribute First Test Second test Missing attribute test Bot profile outliers Extra attribute test Discussion 52 9 Future Work Conclusion References 59 v

    7

    8 Chapter 1 Introduction 1.1 Background A game bot is an automated program that takes control of an avatar in a game to perform certain tasks. Bots are designed to level up characters, gather items in games, and/or give gamers an unfair edge by aiding in a function of game play. These bots cause various problems in the game and can ruin the enjoyment of the game for non botting players. When players use game bots to level up their characters, they are misrepresenting their skill level. These players join high level raids or dungeons but do not perform to their expected skill level. Players that level up their characters properly get annoyed and angry for failing an in game challenge due to being paired with players that do not have the skill level one would expect when considering the character level they have achieved. Bots that are designed to gather items normally end up gathering in the same area farming a specific item. Actual players find it hard to farm large amounts of these items because the bots farm all the spawn points faster and more efficiently than human players can. Some bots farm large amounts of a single item and then sell them in the in-game auction house for a low price, thus damaging the game economy. 1

    9 This lowers the values of that specific item, making it a lot easier than it should be for players to acquire. Players that farm those items properly can no longer get the expected selling price for the item. Some bots are aimed to perform a task while a human is playing, aim bots in first person shooters is a common example as they auto-focus a player s crosshairs on to an enemy players or unfriendly Non Player Characters, consequentially eliminating the skill component required to be good at these games. These bots make it hard for legitimate player to compete. If players are competing against a player that seam unbeatable it discourages the normal player. Game companies today have designed various methods to identify bots form legitimate players. When a player is discovered to be botting, various disciplinary actions can be taken against their account. Most typically botting results in banning of the associated account. Bot detection algorithms need to be able to detect a high number of bots while not misclassifying any legitimate players as a bot and taking action against actually innocent players. Most bot detection programs implemented in high end games achieve this but normally at the expense to another factor of the gaming experience. Bot detection methods implemented in games can: slow down the game, ruin the immersion of the game, take up processing power, or invade the player s privacy. Many of the bot detection programs are easy to counter, as soon as they comes out, a new patch for the bot program is released to counter it and dishonest players can carry on cheating undetected. 1.2 Plan of Development We commence this paper with a bit of background, starting with the economy of gaming, which looks at how much money is involved in the world of gaming and what motivates people go to such extremes to farm items. It discusses the trading of virtual items for real money and how much some of these items are worth. The history of gold farming looks at the creation of the virtual economy and how it came to be. It examines previously used systems to farm items Chapter 1 2 Ian D. Stevens

    10 on a large scale. The literature review looks at a wide range of different techniques proposed for bot detection. It discusses both the merits and the pitfalls of these techniques and analyse which the best possible solution for bot detection is. Machine learning and data mining takes a looks at the history of machine learning and what is involved in the process. It examines the top methods used in data mining that could be applied to our classifier. The methodology describes a method of bot detection in the popular massively multiplayer online role playing game (MMORPG), World of Warcraft (WoW), created by Blizzard Entertainment, that will avoid the traditional shortfalls common to game bot detection methods. The proposed method looks at gathering a small amount of data from the game so as to avoid unnecessarily adding strain to the system. The information gathered is used to identify different factors about a player s farming style. These different factors are selected according to how difficult it would be for a bot to replicate. Using all these different factors the author creates a machine learning classifier to distinguish between bots and legitimate players. The results look at how well the described method can be used to classify bots. It looks at various factors such as true positives and false negatives, it also discuss the effect of adding more test cases to train the classifier before testing it. We look at using less factors, which means less strain on the system, and see its impact on the results of the experiment. It examines how well the classifier handles outliers, i.e. bot profiles set up in an illogical or irregular way. We look into examining potential future work that could be done to improve the described method and test. In our conclusion we answer the research question purposed in this paper. Chapter 1 3 Ian D. Stevens

    11 1.3 Project Objectives Bot Detection Using Machine Learning Algorithms This paper aims to fundamentally answer the following research questions: Can bots be identified to a sufficient level by using efficiency factors related to gold farming? Can bots be identified to a sufficient level by using fewer efficiency factors related to gold farming? How well does the proposed method deal with bot profile outliers, can it identify a bot that is setup in an illogical way and detrimental to the farming of items? Chapter 1 4 Ian D. Stevens

    12 Chapter 2 The Economy of Gaming Many people both developers and players alike are not convinced botting is not a pressing and serious issue. It is quite likely that this is due to a lack of understanding in the amount of money and the economy involved in gaming. In recent years the world of gaming has taken a turn towards making money through playing games. The public has seen the rise of professional gamers, people who have taken playing games and turned them into a very lucrative profession [1]. The professional gaming scene is becoming bigger and bigger. The top professional gamers earn salaries close to that of professional sports men. The highest earning e-sport player is Peter Dager a DOTA 2 player and captain of the team Evil Geniuses whose total earnings come to $2,178, (US) [1]. The majority of this money came from his team s recent win of the 2015 DOTA 2 international, held by Valve. This tournament had the highest prize pool of any e-sport competition with the winning team getting $6,634,661 and the finals being shown on ESPN [2]. Although DOTA 2 s International has the biggest prize pool, its viewers (4.5 million) are not close to that of Riot s League of Legends World Championship, which had 36 million unique viewers [3]. 5

    13 Professional or competitive gaming is not the only medium through which players turn gaming into a profitable pastime. Many gamers have inventively turned to selling virtual items for real money or real money transfers (RMT). Arguably the biggest sale in video game history for virtual items occurred in the Entropia Universe, a Sci-Fi massively multiplayer online role playing game (MMORPG) [4]. This game has some of the most expensive virtual items and many of players have made money by selling the items they have acquired through playing the game. One individual who stands out is Jon Jacobs who sold Club Neverdie in 2010 for $635,000(US). He sold it off in sections with the biggest individual sale coming to $335,000 [5]. There are two opposing opinions on the buying and selling of virtual items in online games. One is that it is acceptable, and game companies seek ways to help players do it safely and efficiently. Much of the time, however, money is exchanged but the virtual item is not. Game companies that support RMT provide a platform to minimize the chances of this happening. The other opinion is that involving real-world currency in the gaming world can have negative effects on the game immersion and economy. Most massively multiplayer online games (MMOs) in Japan prohibit RMT. It can cause inflation of certain items and make it harder for the typical player to acquire, or conversely, detract from in-game achievements that can now be acquired with money rather than skill. RTM players also camp out areas with high value items and steal other players items, in order to have highly marketable and valuable items to sell [6]. Chapter 2 6 Ian D. Stevens

    14 In the past, game operators would look for players associated with suspicious activities, such as having multiple accounts or reports from other players that pointed to RMT. If a player was suspected of RMT the game operators would manually observe him to make sure their suspicions were correct, because if they were found to be guilty their account would be banned. This approach was very time consuming for the game staff. Itsuki et al. looked at developing a more efficient approach to minimize the total number of suspect for RTM. This approach involved mining through the log data for the game checking for: Total action count: Total number of action records Activity time: The time that the player has been preforming a task Total chat count: The amount the player speaks to another player Total currency handled: the amount of currency the player accumulated Looking at the above factors Itsuki et al. managed to narrow down the list of suspicions suspects [6]. With RMT generating so much money and becoming such a large factor in the gaming society a lot of players would spend countless hours just collecting in game item to sell. Chapter 2 7 Ian D. Stevens

    15 Chapter 3 The History of Gold Farming Gold farming is a common practice in MMO; it describes the action of acquiring in-game currency and then later selling it for real-world money. Richard Heeks identified three major events that he attributed the start of gold farming to: The launch of Ultima Online, which became the first true massivelymultiplayer online game. The launch of ebay, which provided a low-cost mechanism for the offer and sale of virtual items. The Asian currency crisis in which Asian governments sought to spend their way out of the crisis by investing heavily in broadband infrastructure. Some of those who became unemployed set up new businesses such as PC kiosks in which games could be played, and others among the unemployed turned to games playing to fill their empty hours. As a result, a strong games culture including gaming skills and entrepreneurship took root in East Asia. [7] These three events were a catalyst for the beginning of the virtual economy. The origin of commercialized gold farming is in South Korean, where cybercafés were being turned into operations for gold farming [8]. 8

    16 The exchange of virtual world goods was slowly becoming a capitalist economy all of its own. At the beginning of the 21st century it exhibited typical late-phase features of capitalist society. Wage labour: where entrepreneurs would pay hired workers to farm gold on their behalf. Offshoring: where they migrated the labour cost to low income areas (in this case mainly East Asia and China) to cut production cost. Automation: The cutting of time and financial cost by using bots that can imitate the actions of real players and can be used to farm virtual items [4]. As with any system that indicates the potential to make money, some untoward actions we bound to happen. Liu Dali, a prisoner at the Jixi labour camp was forced to play online games for the benefit of the guards. He stated that, the prison bosses made more money forcing inmates to play games than they do forcing people to do manual labour. The 300 prisoners were forced to play games in 12 hour shifts and would earn 5,000-6,000rmb [ ] a day. The prisoners never saw any of the money they earned and the computers were never turned off [9]. The virtual market has become such a lucrative business that different countries have started to impose tax on the buying and selling of virtual items [10]. As one can see, gold farming and professional gaming is a sizeable and lucrative market, and a large part of this is due to the creation of gaming bots. Many bots can be set to act in different ways, follow a certain route, and gather different types of resources, respond to a player talking to you, and to log off after a certain amount of time as not to raise suspicion. Some games like Rosh Online encourage the use of game bots and allow the users 6 hours of botting per day, but other games like World of Warcraft (WoW) are against it because of the various problems they cause that were discussed earlier. Bot makers also implement different strategies when designing their bots depending on the platform being targeted. Chapter 3 9 Ian D. Stevens

    17 Chapter 4 Literature Review 4.1 Looking at the Bots A game bot is an automated program that takes control of an avatar in a game to preforms certain tasks. They are normally used to perform mindless repetitive task that the human player does not want to do or do not have time to do. They can also be used to enhance a certain aspect of game play such as aim bots in a first person shooter. Bots are effective as they can be playing the game 24/7. Most game companies do not allow bots, though many players still use them. Companies have developed different strategies to detect bots in their games, however, this has caused bot to evolve and to be programmed to avoid detection. There are two general approaches when creating a bot: Custom game client: The bot companies create their own custom game client that is designed to interact with the server the way the normal game client would. This method takes a lot of work as the bot designers have to reverse engineer the real game client so it interacts with the game sever exactly like the original would. As games are become more complex this form of bot development is being phased out of high end MMORPGs but it is a good approach to creating bots for mobile games such as Clash of Clans [12]. 10

    18 Manipulating game interface: This method involves sending mouse and keyboard inputs to the game the way a normal human player would. This approach is use more often in today s MMORPGs as they are easier to develop. To understand the current state of the game, the bots scan pixel values of larger areas of the screen and uses text recognition software to understand what is happening inside the game [12]. Just as game bots differ so does the approach used to detect them and where the detection takes place. 4.2 Where it Happens The bot detection process happens at different parts of the game s architecture. The main concern is how to detect bots without having a negative effect on that part of the games architecture. Kang et al. identified three areas where bot detection can take place as seen in Table 1: client-side, networkside, and server-side [13]. Client-side involves detecting the bot by analysing the player s computer. This can involve but is not limited to, looking what programs are running on the player s computer, monitor key strokes and mouse movement, and adding elements in to the game that will not show on the monitor but a bot will recognise and interact with. An example of this is Blizzard s warden system for WoW. It is very effective and in May 2015 Blizzard banned more than 100,000 WoW accounts which they claimed to be using bots and made HonorBuddy (A popular botting program for WoW) close up its authentication system [14]. The Warden System comes with its own problems as people are concerned it violates their privacy. In Blizzard Entertainment s end user policy, it states that their client software may transmit certain geographic information of information regarding your computer (capabilities, game data Processing, etc) [15] and this information is used to tell if you are running botting software on your computer. This added to the fact that Blizzard will not disclose how the system works or what information it is looking for/sending has made many a WoW players concerned about their privacy. If Blizzard did disclose how Warden works then bot companies can work out how to construct their bots in such a way to go unnoticed. Chapter 4 11 Ian D. Stevens

    19 Network-side detection looks at the traffic between the player and the server. There are two popular methods to achieve bot detection on the network-side. The first is traffic monitoring, this normally involves learning specific traits of traffic that humans/bots exhibit while playing a game. It then builds a model to classify the suspected players as either a human or a bot based on their traffic tendencies [13, 16, 17]. The second is network protocol change, an example is L2s-Guard, it protects against reading, editing, and spoofing network packets, stopping third party programs from accessing your game information and controlling your avatar [13, 18]. Server-side detection involves looking at the behaviour of the avatar by monitoring their inputs that are stored on the server. Detecting bots through server-side detection has an advantage because it does not interfere with the player in any way, be it on his computer or his network connection. It normally looks for actions that are inconsistent with the way a human plays. Some of the more common things to look for would be: Amount of time spent in the game, if the player has been active for long periods of time this is a common indicator that a bot is controlling the avatar Checking the players inventory, if the player is consistently selling a certain type of item he may be using a bot to gather resources for him The avatar does not respond to other players when they attempt to communicate These problems are easily overcome as bot designers implement settings to go unnoticed, log off after a specified time, implement a built in chat system or simply log off as soon as a game s GM tries to talk to them. To detect bot through server-side detection research has been done in checking for human characteristics that are harder to emulate. We talk about some of these human characteristics later in the paper. There have been a wide variety of different approaches when it comes to detecting game bots and a lot of academic research has been done on the subject. All of these approaches seem to suffer from one shortfall or another though. Chapter 4 12 Ian D. Stevens

    20 4.3 Common Bot Detection Methods Ah Kang et al. This type of bot detection test works best when it needs to be a once off test such as making an account for a social networking site. It does not work well when it has to be continually checking for a bot, i.e. in online games. Outsourcing the problem to a person (relay attack): The bot sends static snapshots to the human solver and receives and copies their answer. Another way is the bot utilises streaming software to send the game frames/interactions to the solver and then receives their answer. Chapter 4 13 Ian D. Stevens

    21 2. Automated attacks using image processing and machine learning. Using image processing and machine learning algorithms they identify images with common themes/objects [21, 22]. Gao et al. attempted to solve both these problems by amalgamating emerging images (EI) and dynamic cognitive games (DCG). DCG it is known to be resistant to relay attacks. This is because when a human plays a flash based game rendered on their computer they are more proficient than if a bot had to stream a game to solver, this is because of the latency of the communication channel between the bot and the solver [21]. Gao et al. also incorporated pseudo 3D object rotation, incomplete object contour and tiling background, to reduce the information exposure through the superimposition of consecutive frames, and a fast frame rate to resist the relay attack based on streaming. Their technique was resistant to automated attacks and made it difficult to perform relay attacks and easy for them to be detected [22] Traffic Analysis Traffic analysis monitors various factors (release time of client commands, magnitude of traffic burstiness, sensitivity to different networks conditions, etc) of the behaviour of the traffic coming from the user s computer [17, 23]. Through these factors it can identified whether the game is being played by a bot or person. Some traffic analysis techniques (probing or chatting) suffer from a major flaw. They generate additional packets which can lead to slowing the connection down thus making the game less enjoyable for the user [8, 15]. Due to this flaw in traffic analysis, it does not lend itself well to bot detection in online games. Chapter 4 14 Ian D. Stevens

    22 Yuanchao Lu et al. trained hidden Markov models (HMMs) with network samples of game bots and tested avatars of interest against the common behaviour found with the HMMs. Yuanchao Lu et al. restricted themselves to time-based traffic analysis. By doing so the researchers did not interfere with the packet timing (the player s connection speed). To protect games privacy traffic is encrypted end-to-end or by directing game packets through anonymity networks such as Tor [17]. This method obtains a detection rate higher than 0.8 and a false negative, false positive rate of less than 0.2 using less than 2,000 packets to train the HMMs. This method of bot detection is very flexible as it can not only be applied to different types of MMOs but possibly to detect bots used in other areas such as click fraud. Bot makers may be able to overcome this detection method by delaying game packets randomly or to match human behaviour User Behaviour Analysis There has been a lot of research done in this field as there are countless human characteristics that researches can look for when trying to identify a bot in a game. Most research considers human characteristics that are hard for a program to mimic. Features that are considered AI-complete (implying that developing these features for a bot would be equivalent to that of solving the central artificial intelligence problem) would be a first choice when looking for bots in online games, unfortunately however, most game features in game would not be considered AI complete. Nonetheless, there are still player-game interactions that are notably difficult for bots to reproduce. Interacting with other players is a big part of playing a MMO and although bots come with chatting responses to evade GM monitoring they cannot mimic the complexity of how humans talk to each other. Kang et al. worked on detecting game bots by looking at the speech patterns mainly based on content and the repetitiveness of their speech [24]. Chapter 4 15 Ian D. Stevens

    23 Talking is just one part of socialising in online games, players typically like to form groups or parties to perform certain activities together. The reasons why human form parties is usually to complete a quest that requires more people or is too hard for one person to accomplish. Bots on the other hand form parties to gather resources, the bots normally form parties of two players and one gathers the items while the other acts as a bodyguard. Kang et al. looked at the party-play log to identify bots in MMORPGS. Looking at the duration parties stayed together Kang et al. identified potential bot parties as they tend to stay together longer, to farm more. After that the suspicious party s actions were looked at to see if there was a high rate of gathering actions compared to total actions [13]. Chung et al. took into account that bots can be programmed to accomplish different tasks. Also importantly identified were the typical behavioural features that a player might exhibit while playing the game as shown in Table 2. These features build up the basic categories within a game: battle, collect, and move. Categorising a player based on their different play styles made bot detection much easier. The test focused on the difference between humans and bots and not on the fact that different players have different ways of playing. Due to this fact the test done to identify bots in each group were simpler, putting less strain on the system and could sample the data at low resolution [25]. Chapter 4 16 Ian D. Stevens

    24 Figure 4.1: Description of Behavioural Features [13] Chapter 4 17 Ian D. Stevens

    25 4.3.4 Moving Path Analysis Moving path analysis involves recording the path taking of an avatar and based off certain attributes classify it as a bot or a human. Human movement is often random while a bot is determined by a set of way points and will only differ from this path to attack a monster or to farm an item. Mitterhofer et al. looked at the path taken by a number of different players and transformed that data into intermediate results such as waypoints or path segments. It was shown that a detection metric could be developed based on the amount of time an avatar visits a way point of takes the same path segment [26]. Chen et al. took a different approach and identified four features based off how an avatar moves: 1. Ideal activity, the amount of time a player stays in one place. 2. Pace, the speed of the avatar in the game. A player can move at different speed with in the game 3. Path, Lingering, For an avatar at (x, y) at time t, if its distance from (x, y) was always less than d during the period (t, t + p), we say that the avatar was lingering during (t, t+p), given the parameters (d, p). Smoothness,...determines whether an avatar moves in straight or zig-zag patterns. Detour If an avatar is at (x 1, y 1 ) at time t1 and at (x 2, y 2 ) at time t2, we compute the detour by dividing the length of the movement by the effective offset of an avatar during the period (t 1, t 2 ). 4. Turn, the change of direction the avatar undergoes Looking at these factors Chen et al. managed to classify bot in Quake 2 using knn and SVM algorithms [27]. Chapter 4 18 Ian D. Stevens

    26 4.3.5 Human Observational Proofs As we have discussed a common way to design a bot is through manipulating the game interface. In is only natural to look if there is a difference between the input a bot provides and the input a human player provides. Barik et al. developed a concept called spatial game signatures, where they look at if they could identify a bot by the position of mouse clicks on the screen. They found that not all mouse clicks are normally distributed about the centre of the screen. Using this information they were able to detect bots in social games [28]. Dominguez et al. took it a step further and mapped different cognitive processes to different ways people used their input devices. This map between cognitive thought and input supplied would be extremely hard for bot programmers to install. This process is still in early development phase and has not been tested/tried in a real word scenario; however the results showed that different cognitive processes involved in solving a task have physical manifestations that can be detected through low-level input pattern-mining [29]. Chapter 4 19 Ian D. Stevens

    27 4.4 Literature review conclusion There have been many different bot detection methods created and they all come with their own pros and cons, as is shown in Table 2 below. Figure 4.2: Table 2: Recent Research on Bot Detection [13] There is still room to improve on bot detection methods as none are perfect. That is why many games today are still plagued with bot users ruining the game for non-botting players. When developing a detection method it is crucial to have as little impact on the game experience as possible, not to take up too much processing power, and respect the player s privacy. Due to these facts, the best place to detect bots is server side detection as it does not interfere with the player s game experience or privacy in any way. Bot companies are constantly programming their product to avoid being detected. Detection methods that focus on behaviour/answers that are hard for a bot to mimic will last longer and not be countered by the next update for the bot. A different variation of bot detection works better depending on the platform or type of game. This paper will be looking at WoW, a MMORPG. Chapter 4 20 Ian D. Stevens

    28 Bots have evolved past traffic analysis as they often delay sending packets to avoid detection as appear more like a human. Moving path analysis is also fading away as bots today change up their recorded route from time to time and never mine a specific root too often. HOP analysis is a promising area of research but needs further investigation. Due to these facts, the best candidate out of all the methods examined for bot detection is behavioural analysis. The next thing to examine is the best machine learning algorithm so use. Chapter 4 21 Ian D. Stevens

    29 Chapter 5 Machine Learning and Data Mining In this section we look at the fundamentals of machine learning and the best data mining algorithms. This will give us some insight as to what would be the best algorithm for us to use. Learning with regards to machines involves the machine changing its structure, program or data (based on its inputs or in response to external information in such a manner that its expected future performance improves. Machine learning programs are structured to solve tasks associated with artificial intelligence (AI) These changes they refer to might be either enhancements to already performing systems or ad initio synthesis of new systems. Most of the models used in machine learning are based of certain aspects of biological learning [30,31]. The primary goal of machine learning research is to develop general approaches to solve different learning problems. Theses learning problems could include: Optical character recognition: categorize images of handwritten characters by the letters represented Face detection: find faces in images (or indicate if a face is present) Spam filtering: identify messages as spam or non-spam 22

    30 Topic spotting: categorize news articles (say) as to whether they are about politics, sports, entertainment, etc. Spoken language understanding: within the context of a limited domain, determine the meaning of something uttered by a speaker to the extent that it can be classified into one of a fixed set of categories Medical diagnosis: diagnose a patient as a sufferer or non-sufferer of some disease Customer segmentation: predict, for instance, which customers will respond to a particular promotion Fraud detection: identify credit card transactions (for instance) which may be fraudulent in nature weather prediction: predict, for instance, whether or not it will rain tomorrow [32]. 5.1 Major Types of Machine Learning Supervised Learning Supervised learning involves having already knowing the values of a set f, which a part of a larger set E. From this sample set f it constructs a hypothesis, h, that agrees with the already know values of, f. This hypothesis, h, is then applied to the reminder of the unknown samples in E. The values of E are not always correct but are a best guess based off of the knowledge we have gained from f. An example of supervised learning is curve-fitting: Suppose you are given points belonging to a two-dimensional function f. You want to construct a function h, where h belongs to the set of seconddegree functions that would incorporate all the points already given to you. You show there a two-dimensional parabolic surface above the x 1, x 2 planes that fits all the points. That parabolic surface is the hypothesis you have constructed from you already known variables [33,34]. Chapter 5 23 Ian D. Stevens

    31 5.1.2 Unsupervised learning In unsupervised learning, we simply have a training set of vectors without function values for them. Unsupervised learning then partitions the training set into subsets in some appropriate way. This method of learning still revolves around learning a function, the value of the function is the name of the subset to which an input vector belongs. Unsupervised learning is typically used to cluster and label significant data [33,34]. 5.2 General Problems Data Mining Algorithms Solve Regression: the goal of a regression based machine learning program is to estimate a real-valued variable yσr given a pattern x. An example of this is to estimate the value of stock in the upcoming days, the yield of a semiconductor fabrication plant given the current process, or the iron content of ore given mass spectroscopy measurements [33]. Classification: the goal of a classification based machine learning program is to answer the question: given a pattern x drawn form a domain x, estimate which value an associated random variable y {1,..., n} will assume. This has much practical application. A simple example of this a bank wanting to know if a home owner might default on his loan. The bank already know information about the home owner such as income data, his credit history, etc. using this information as the pattern x it can be estimated whether the home owner, y, will default on his loan or not default, not default [33]. Clustering: the goal of a classification based machine learning program is to group data sets into subsets. A typical approach for clustering would be to identify how different one instance of that data set is from another. It works out the distance bases on information about the instances. It groups the closest instances together and moves on till all instances belong to a cluster. An example of this is constructing the wildlife families. We take the different attributes about animals: Diet, gestation periods, number if toes, etc. Using this information we grope the different animals into their families [33]. Chapter 5 24 Ian D. Stevens

    32 5.3 Top data mining algorithms Xindong Wu et al. listed the top 10 algorithms in data mining [30]. The following section looks at the algorithms that can be applied to detecting bots and discusses whether or not it s the best solution to the problem. The problem of detecting bots can be broken down into a classification or a clustering problem. Classification in this case refers to training a program to be able to tell an input as either a human or a bot. Clustering on the other hand, can take all the data gathered in the experiment and cluster it into two groups, one would be the bots and the other the humans. When new data comes in it would test to see which cluster it belongs to C4.5 algorithm The top ranked data mining algorithms was the C4.5 algorithm for building a decision tree. A decision tree classifies an instance by sorting them down the tree from the root (top of the tree) to some leaf node (bottom of the tree), which provides the classification of the instance. Each node in the tree specifies a test of some attribute of the instance, and each branch descending from that node corresponds to one of the possible values for the attribute. In our example, the instances would be the data gathered from a WoW session. The attributes would be the faming factors that humans and bot seem to differ on. The algorithm for the C4.5 decision tree is [35]: Basic algorithm (a greedy algorithm) Tree is constructed in a top-down recursive divide-and-conquer manner At start, all the training examples are at the root Attributes are categorical (if continuous-valued, they are discretized in advance) Examples are partitioned recursively based on selected attributes Test attributes are selected on the basis of a heuristic or statistical measure (e.g., information gain) Chapter 5 25 Ian D. Stevens

    33 Conditions for stopping partitioning All samples for a given node belong to the same class There are no remaining attributes for further partitioning majority voting is employed for classifying the leaf There are no samples left Information gain represents to what degree an attribute can be used to classify data. The attribute with the highest information gain is put as the first leaf of the tree, because it does the most work in classifying the data. To work out the information gain we use the following formula: Entropy = p(a) log 2 (p(a)) p(b) log 2 (p(b)) (5.1) Where p(a) is the probability of a in the given set. Information Gain (T, X) = Entropy(T ) Entropy(T, X) (5.2) This information is extremely useful not only for constructing our decision tree but for telling us which factor is contributing the least to the decision tree and we can see what impact it will have on the classification if it is taken out [36]. After the tree is constructed it is then pruned, a technique designed to reduces the size of the decision tree by taking away sections that do not contribute much to the classification process. In doing so pruning reduces overfitting. The pruning algorithm in C4.5 is based on the estimate of the error rate associated with a set of N cases, E of which do not belong to the most frequent class. The algorithm calculates the upper limit of the binomial probability when E events have gone through N trails and the results recorded, using a default confidence value of Chapter 5 26 Ian D. Stevens

    34 Pruning is then carried out from the leaves to the root. The estimated error for a leaf tested with N cases and E errors is N times the error rate calculated above. The algorithm looks at the subtree and adds all the estimated errors of the branches together, call it H, and compares it to the estimated error if the subtree was a leaf, call it T. If it turns out that H is greater than T, the subtree will be pruned. The algorithm also checks if the estimated error if the subtree was replaced by one of its branches, if this appears to be beneficial then the subtree will be replaced [36] The k-means algorithm K-means clustering is an algorithm to classify or to group your objects based on attributes/features into k number of groups/clusters. The number of groups depends on the k where k is a positive integer and works as follows. A designated centroid or centre of the clusters is designated for each cluster. This can take the form of a random data point or the first data point in the sequence to be looked at. Treat each of these centroids as their own cluster. The algorithm then iterates between two steps: Step 1: The distance between all the data points and the centre of all the different clusters is calculated. The default distance algorithm is the Euclidean distance formula. Group each data point to their closest cluster, with ties broken arbitrarily. Step 2: After each data point has been clustered into their respective clusters, the algorithm recalculates the centroid of the cluster based on the newly assigned data point. If the data points come with a probability measure (weights), then the recalculated centroid is calculated using these weights (weighted mean). The algorithm keeps iterating between these two steps until there is no change in the assignment of data points to clusters. One of the main short falls of this approach is it will converge to a local optimum, so the cluster could depend on the location of the initial centroids. This can be countered to an extent by running the algorithms multiple times, each one with different starting centroids, or by doing limited local search about the converged solution [35-36]. Chapter 5 27 Ian D. Stevens

    35 5.3.3 Support vector machines (SVM) For a binary classification problem a support vector machine finds the best function to distinguish between members of the two classes. It achieves this by finding the hyperplanes that separate the data. Of course there are many such hyperplanes that accomplish this task but support vector machines strive to find the one that creates the largest margin between the two classes. The margin is the amount of space between the two classes separated by the hyperplane. The way it accomplishes this is by maximizing the following function with respect to w (w vector) and b: L p = 1 2 w t α i y i ( w x i + b) + i=1 t α i (5.3) where t is the number of training examples, and α i, i = 1,..., t, are nonnegative numbers such that the derivatives of L p with respect to α i are zero. A i are the Lagrange multipliers and L p is called the Lagrangian. In this equation, the vector w and constant b define the hyperplane [36] The EM algorithm Finite mixture models are being increasingly used to model the distributions of a wide variety of random phenomena and to cluster data sets. Xindong Wu et al focused on mixture models, which can be used to cluster continuous data and to estimate the underlying density function. These models can be fitted by maximum likelihood via the EM (Expectation-Maximization) algorithm. We will talk about its relevance to cluster analyses. The EM algorithm laid out by Xindong wu et al. is as follows: i=1 Chapter 5 28 Ian D. Stevens

    36 We let the p-dimensional vector (y = (y 1,..., y p ) t ) contain the values of p variables measured on each of n (independent) entities to be clustered, and we let yj denote the value of y corresponding to the j t h entity (j = 1,..., n). With the mixture approach to clustering, y 1,..., y n are assumed to be an observed random sample from mixture of a finite number, say g, of groups in some unknown proportions π 1,..., π g. The mixture density of y j is expressed as: f(y i ) = g i = 1π i f i (y j ; θ i )(j = 1,..., n) (5.4) Where the mixing proportions π 1,..., π g sum to one and the group-conditional density f i (y j ; θ i ) is specified up to a vector θ i of unknown parameters (i = 1,..., g). The vector of all the unknown parameters is given by: = (π 1,..., π g 1, θ T 1,..., θ Tg ) T (5.5) where the superscript T denotes vector transpose. Using an estimate of, this approach gives a probabilistic clustering of the data into g clusters in terms of estimates of the posterior probabilities of component membership, τ i (y j ) = π i f i (y j ; θ i )f(y j ) (5.6) where τ i (y j ) is the posterior probability that y j (really the entity with observation y j ) belongs to the i t h component of the mixture (i = 1,..., g; j = 1,..., n). The parameter vector can be estimated by maximum likelihood. The maximum likelihood estimate (MLE) of, ˆ, is given by an appropriate root of the likelihood equation: where log logl() = 0 (5.7) L() = n j = 1logf(y j ) (5.8) is the log likelihood function for. Solutions of (6) corresponding to local maximizers can be obtained via the expectation maximization (EM) algorithm [17]. For the modeling of continuous data, the component-conditional densities are usually taken to belong to the same parametric family, for example, the normal. In this case, Chapter 5 29 Ian D. Stevens

    37 f i (y j ; θ i ) = φ(y j ; µ i, i)) (5.9) where φ(y j ; µ i, i) denotes the p-dimensional multivariate normal distribution with mean vector µ and covariance matrix AdaBoost Ada boost is a type of ensemble learning algorithm which means it creates multiple learners to solve a problem. It is a very popular algorithm with very accurate prediction and can be programmed in just 10 lines of code. Let X be the instance space and Y the set of class labels (in our case {bot, human}). The algorithm assigns equal weights to all the training examples. The algorithm creates a base /learning function f : X Y. This base learner is tested with all the training examples. The weights of the incorrectly classified examples will be increases. The algorithm creates another bases learning function this time taking into account the updated weights. This process is iterated over a certain number of rounds. The final model is derived by weighted majority voting of all the base learning functions, the weights of the learners are determined during the training process [36] knn K-Nearest neighbour or knn is typical used as a classification algorithm. The k term represents a number that decides how many neighbours influence the classification and is an odd number to eliminate the possibility of a tie condition. How it works is when k is 1 it takes a point x and finds the closest point to x, let s call it y. The label of y is already known. It labels x as the same as y. Chapter 5 30 Ian D. Stevens

    View more

    GE62 2QD APACHE PRO - Installed wrong firmware

    Good day gents,

    I was trying to update my EC and BIOS, but ended up flashing 'msi ge 62 2qd apache' EC. Managed to boot up fine somehow but realised I flashed the wrong file when I booted up.

    Then I downloaded the appropriate EC for Apache Pro, but now it says error or wrong version.

    What should I do to rectify this? I was aiming for the fan issues.

    Best Regards,
    Dan


    Attached below, system info:

    ------------------
    System Information
    ------------------
    Serial Number:                9S716J212416ZF7000088
    Product Name:                 GE62 2QD
    OS:                           Microsoft Windows 10 Home Single Language 64-bit
    Windows Product Key:          6F4BT
    HDI Build:                    ZS7-1792BM4-ES2   3.TC5.A23.9.0.1  
    BIOS Version:                 E16J2IMS.114
    BIOS Release Date:            2015/09/23
    EC Version:                   16J2EMS1 Ver5.08, 07/13/2015
    CPU:                          Intel(R) Core(TM) i7-5700HQ CPU @ 2.70GHz
    Memory:                       8192 MB @ 800 MHz
                                   - 8192 MB, DDR3-1600, Kingston MSI16D3LS1MNG/8G  
    Graphics:                     NVIDIA GeForce GTX 960M, 2048 MB
    Graphics:                     Intel(R) HD Graphics 5600, 1024 MB
    VBIOS Version:                82.07.7c.00.28
    Drive:                        HDD, HGST HTS721010A9E630, 931.51 GB
    Network:                      TAP-Windows Adapter V9
    Network:                      Intel(R) Dual Band Wireless-AC 3160
    Network:                      Killer E2200 Gigabit Ethernet Controller

    ---------------------
    Programs and Features
    ---------------------
    Curse Client , 5.1.1.844
    Infinity , 2.3.2
    Python 3.6.0 (Anaconda3 4.3.0 64-bit) , 4.3.0
    Slack , 2.4.1
    Spotify , 1.0.48.103.g15edf1ec
    ?Torrent , 3.4.9.42606
    Telegram Desktop version 0.10.19 , 0.10.19
    Windows Driver Package - Google, Inc. (WinUSB) AndroidUsbDeviceClass  (08/28/2014 11.0.0000.00000) , 08/28/2014 11.0.0000.00000
    KB9X Radio Switch Driver , 1.1.0.0
    CCleaner , 5.22
    FileOpen Client B969 , B969
    FinchVPN 3.2.1.0 , 3.2.1.0
    Hola? 1.34.855 - Better Internet , 1.34.855
    JDownloader 2 , 2.0
    SteelSeries Engine 3.3.3 , 3.3.3
    Synaptics Pointing Device Driver , 19.0.6.1
    TAP-Windows 9.9.2 , 9.9.2
    TeamSpeak 3 Client , 3.0.19
    VLC media player , 2.2.1
    Vulkan Run Time Libraries 1.0.26.0 , 1.0.26.0
    WinRAR 5.40 (64-bit) , 5.40.0
    Corel Graphics - Windows Shell Extension , 17.1.0.572
    CorelDRAW Graphics Suite X7 (64-Bit) , 17.6.0.1021
    Intel(R) ME UninstallLegacy , 1.0.1.0
    CheckDevicesConfigurator , 1.2.701
    CorelDRAW Graphics Suite X7 - IPM (x64) , 17.6
    CorelDRAW Graphics Suite X7 - Photozoom Plugin (x64) , 17.0
    Microsoft Visual C++ 2010  x64 Redistributable - 10.0.40219 , 10.0.40219
    CorelDRAW Graphics Suite X7 - CT (x64) , 17.6
    Intel(R) PRO/Wireless Driver , 18.40.0004.4493
    CorelDRAW Graphics Suite X7 - Draw (x64) , 17.6
    CorelDRAW Graphics Suite X7 - Capture (x64) , 17.6
    Intel(R) Rapid Storage Technology , 13.5.0.1056
    CorelDRAW Graphics Suite X7 - PL (x64) , 17.6
    Intel(R) Wireless Bluetooth(R)(patch version 17.1.1512.771) , 17.1.1501.0514
    Qualcomm Atheros Network Manager , 1.1.48.1060
    Microsoft Visual C++ 2012 x64 Additional Runtime - 11.0.61030 , 11.0.61030
    Corel Graphics - Windows Shell Extension 32 Bit , 17.1.572
    CorelDRAW Graphics Suite X7 - EN (x64) , 17.6
    Microsoft SQL Server 2012 Native Client  , 11.0.2100.60
    CorelDRAW Graphics Suite X7 - JP (x64) , 17.6
    CorelDRAW Graphics Suite X7 - Custom Data (x64) , 17.6
    CorelDRAW Graphics Suite X7 - FontNav (x64) , 17.6
    Qualcomm Atheros Killer E220x Drivers , 1.1.48.1060
    ProductDaemonSetup , 1.2.701
    CorelDRAW Graphics Suite X7 - VBA (x64) , 17.6
    CorelDRAW Graphics Suite X7 - Setup Files (x64) , 17.6
    Intel? Trusted Connect Service Client , 1.39.141.0
    Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.6161 , 9.0.30729.6161
    TortoiseSVN 1.9.4.27285 (64 bit) , 1.9.27285
    CorelDRAW Graphics Suite X7 - ES (x64) , 17.6
    CorelDRAW Graphics Suite X7 - NL (x64) , 17.6
    Intel(R) Management Engine Components , 10.0.39.1003
    Microsoft Visual C++ 2005 Redistributable (x64) , 8.0.59192
    PaperPort Image Printer 64-bit , 14.00.0000
    NahimicSettingsConfigurator , 1.2.701
    Qualcomm Atheros Bandwidth Control Filter Driver , 1.1.48.1060
    CorelDRAW Graphics Suite X7 - IT (x64) , 17.6
    Intel? PROSet/Wireless WiFi Software , 18.40.2.0828
    CorelDRAW Graphics Suite X7 - RU (x64) , 17.6
    CorelDRAW Graphics Suite X7 - DE (x64) , 17.6
    Microsoft Visual Basic for Applications 7.1 (x64) , 7.1.00.00
    Microsoft Office Professional Plus 2013 , 15.0.4569.1506
    Microsoft Access MUI (English) 2013 , 15.0.4569.1506
    Microsoft Excel MUI (English) 2013 , 15.0.4569.1506
    Microsoft PowerPoint MUI (English) 2013 , 15.0.4569.1506
    Microsoft Publisher MUI (English) 2013 , 15.0.4569.1506
    Microsoft Outlook MUI (English) 2013 , 15.0.4569.1506
    Microsoft Word MUI (English) 2013 , 15.0.4569.1506
    Microsoft Office Korrekturhilfen 2013 - Deutsch , 15.0.4569.1506
    Microsoft Office Proofing Tools 2013 - English , 15.0.4569.1506
    Outils de v?rification linguistique 2013 de Microsoft Office - Fran?ais , 15.0.4569.1506
    ???????? ???????? ???????????? Microsoft Office 2013 ? ??????? , 15.0.4569.1506
    ?????? ????????? ????????? Microsoft Office 2013 ? ?????????? ???? , 15.0.4569.1506
    Microsoft Office Proofing Tools 2013 - Espa?ol , 15.0.4569.1506
    Microsoft Office Proofing (English) 2013 , 15.0.4569.1506
    Microsoft Office Proofing (Russian) 2013 , 15.0.4569.1506
    Microsoft Office Proofing (Ukrainian) 2013 , 15.0.4569.1506
    Microsoft InfoPath MUI (English) 2013 , 15.0.4569.1506
    Microsoft Visio Professional 2013 , 15.0.4569.1506
    Microsoft Visio MUI (English) 2013 , 15.0.4569.1506
    Microsoft Visio MUI (Russian) 2013 , 15.0.4569.1506
    Microsoft Visio MUI (Ukrainian) 2013 , 15.0.4569.1506
    Microsoft Office Shared MUI (English) 2013 , 15.0.4569.1506
    Microsoft Office Shared MUI (Russian) 2013 , 15.0.4569.1506
    Microsoft Office Shared MUI (Ukrainian) 2013 , 15.0.4569.1506
    Microsoft DCF MUI (English) 2013 , 15.0.4569.1506
    Microsoft OneNote MUI (English) 2013 , 15.0.4569.1506
    Microsoft Groove MUI (English) 2013 , 15.0.4569.1506
    Microsoft Office 32-bit Components 2013 , 15.0.4569.1506
    Microsoft Office Shared 32-bit MUI (English) 2013 , 15.0.4569.1506
    Microsoft Office Shared 32-bit MUI (Russian) 2013 , 15.0.4569.1506
    Microsoft Office Shared 32-bit MUI (Ukrainian) 2013 , 15.0.4569.1506
    Microsoft Office OSM MUI (English) 2013 , 15.0.4569.1506
    Microsoft Office OSM MUI (Russian) 2013 , 15.0.4569.1506
    Microsoft Office OSM MUI (Ukrainian) 2013 , 15.0.4569.1506
    Microsoft Office OSM UX MUI (English) 2013 , 15.0.4569.1506
    Microsoft Office Shared Setup Metadata MUI (English) 2013 , 15.0.4569.1506
    Microsoft Access Setup Metadata MUI (English) 2013 , 15.0.4569.1506
    Microsoft Lync MUI (English) 2013 , 15.0.4569.1506
    Microsoft Visual Basic for Applications 7.1 (x64) English , 7.1.0.0
    CorelDRAW Graphics Suite X7 - Common (x64) , 17.6
    Microsoft Visual C++ 2013 x64 Additional Runtime - 12.0.21005 , 12.0.21005
    Microsoft Application Error Reporting , 12.0.6015.5000
    CorelDRAW Graphics Suite X7 - VideoBrowser (x64) , 17.6
    CGS17_Setup_x64 , 17.6
    Microsoft Visual C++ 2013 x64 Minimum Runtime - 12.0.21005 , 12.0.21005
    M-Files 2015.2 , 11.2.4320.77
    Ansel , 373.06
    NVIDIA Control Panel 376.54 , 376.54
    NVIDIA Graphics Driver 376.54 , 376.54
    NVIDIA GeForce Experience 3.0.5.22 , 3.0.5.22
    NVIDIA Optimus Update 2.13.0.21 , 2.13.0.21
    NVIDIA PhysX System Software 9.16.0318 , 9.16.0318
    NVIDIA Update 2.13.0.21 , 2.13.0.21
    SHIELD Streaming , 7.1.0310
    NVIDIA Wireless Controller Service , 2.13.0.21
    NVIDIA Install Application , 2.1002.236.2037
    NVIDIA Backend , 2.13.0.21
    NVIDIA Container , 1.0
    NVIDIA LocalSystem Container , 1.0
    NVIDIA Message Bus for NvContainer , 1.0
    NVIDIA NetworkService Container , 1.0
    NVIDIA User Container , 1.0
    NVIDIA Elevated User Container , 1.0
    NVIDIA Display Container , 1.0
    NVIDIA Display Container LS , 1.0
    NvNodejs , 3.0.5.22
    NVIDIA Watchdog Plugin for NvContainer , 1.0
    NvTelemetry , 1.0.0.0
    Nvidia Share , 1.5.0.0
    NVIDIA ShadowPlay 2.13.0.21 , 2.13.0.21
    SHIELD Wireless Controller Driver , 3.0.5.22
    NVIDIA Update Core , 2.13.0.21
    NVIDIA Virtual Audio 1.2.41 , 1.2.41
    LauncherSetup , 1.2.701
    Intel(R) Product Improvement Program , 2.1.28.3
    CorelDRAW Graphics Suite X7 - Connect (x64) , 17.6
    Intel(R) Chipset Device Software , 10.0.22
    CorelDRAW Graphics Suite X7 - Redist (x64) , 17.0
    CorelDRAW Graphics Suite X7 - PHOTO-PAINT (x64) , 17.6
    WinZip 17.5 , 17.5.10562
    UIInstallUpgrade , 1.2.701
    Microsoft Visual C++ 2012 x64 Minimum Runtime - 11.0.61030 , 11.0.61030
    CorelDRAW Graphics Suite X7 - Filters (x64) , 17.6
    CorelDRAW Graphics Suite X7 - Writing Tools (x64) , 17.6
    SCM , 13.015.07154
    CorelDRAW Graphics Suite X7 - CZ (x64) , 17.6
    AudioFXSetup , 1.2.701
    MSVCRT110_amd64 , 16.4.1109.0912
    CorelDRAW Graphics Suite X7 - IPM Content (x64) , 17.0
    QuickBooks Runtime Redistributable , 1.00.0000
    ABBYY PDF Transformer+ , 4.1.241
    CorelDRAW Graphics Suite X7 - CS (x64) , 17.6
    CorelDRAW Graphics Suite X7 - BR (x64) , 17.6
    CorelDRAW Graphics Suite X7 - FR (x64) , 17.6
    Microsoft Visual Studio 2010 Tools for Office Runtime (x64) , 10.0.60830
    4K Stogram 2.2 , 2.2.2.1222
    Abacre Restaurant Point of Sale v8.8 , 8.8
    Advanced Find and Replace v7.8.1 , 7.8.1
    MSI Afterburner 4.2.0 , 4.2.0
    Dropbox , 21.4.25
    Google Chrome , 57.0.2987.98
    MSI Remind Manager , 1.0.1412.1801
    Help Desk , 1.0.1508.1802
    Dragon Gaming Center , 1.0.1501.2801
    Sizing Options , 2.0.1412.1501
    K-Lite Mega Codec Pack 11.4.0 , 11.4.0
    Malwarebytes Anti-Malware version 2.2.1.1043 , 2.2.1.1043
    Mozilla Thunderbird 45.8.0 (x86 en-US) , 45.8.0
    Mozilla Maintenance Service , 45.8.0.6273
    OpenVPN 2.3.4-I001  , 2.3.4-I001
    PowerISO , 6.6
    qBittorrent 3.3.3 , 3.3.3
    RivaTuner Statistics Server 6.4.1 , 6.4.1
    TeamViewer 11 , 11.0.65452
    VeraCrypt , 1.16
    Watch_Dogs 2 , 1.07.141
    Xilisoft Video Converter Platinum , 7.8.14.20160322
    Rosetta Stone Language Training , 5.0.37.0
    Windows Live UX Platform , 16.4.3528.0331
    Windows Live UX Platform Language Pack , 16.4.3528.0331
    Microsoft Visual C++ 2013 Redistributable (x64) - 12.0.30501 , 12.0.30501.0
    Google Drive , 1.32.4066.7445
    Photo Gallery , 16.4.3528.0331
    IPTInstaller , 4.0.9
    Dropbox Update Helper , 1.3.59.1
    Windows Live Essentials , 16.4.3528.0331
    Windows Live Temel Par?alar , 16.4.3528.0331
    Microsoft Visual C++ 2015 x86 Additional Runtime - 14.0.23506 , 14.0.23506
    WTFast 4.1 , 4.1.2.761
    Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 , 12.0.21005
    Nahimic for MSI , 1.2.7
    Movie Maker , 16.4.3528.0331
    MSXML 4.0 SP3 Parser , 4.30.2100.0
    Galer?a de fotos , 16.4.3528.0331
    Windows Live Photo Common , 16.4.3528.0331
    Windows Live ??? , 16.4.3528.0331
    Galeria de Fotografias , 16.4.3528.0331
    HTC Sync Manager , 3.1.72.3
    Microsoft Visual C++ 2015 Redistributable (x86) - 14.0.23506 , 14.0.23506.0
    Photo Common , 16.4.3528.0331
    Java 8 Update 77 , 8.0.770.3
    Nuance PDF Viewer Plus , 5.30.3290
    Mailbird , 2.1.25
    Intel(R) Driver Update Utility 2.6 , 2.6.0.32
    QuickBooks Enterprise Solutions 16.0 , 26.0.4001.2607
    Rosetta Stone Ltd Services , 3.2.21
    Microsoft Visual C++ 2012 x86 Additional Runtime - 11.0.60610 , 11.0.60610
    ???????????? , 16.4.3528.0331
    Intel? Driver Update Utility , 2.6.0.32
    Microsoft ASP.NET MVC 4 Runtime , 4.0.40804.0
    Windows Live Communications Platform , 16.4.3528.0331
    Galerie de photos , 16.4.3528.0331
    Java Auto Updater , 2.8.77.3
    Foto-galerija , 16.4.3528.0331
    HTC Driver Installer , 4.17.0.001
    CloakMe version 2 , 2
    Intel(R) Wireless Bluetooth(R) , 18.1.1611.3223
    QuickBooks , 26.0.4001.2607
    Boot Configure , 20.014.12127
    Realtek Card Reader , 6.3.9600.39062
    Google Update Helper , 1.3.32.7
    Battery Calibration , 1.0.1405.0701
    Windows Live Installer , 16.4.3528.0331
    Microsoft Visual C++ 2015 x86 Minimum Runtime - 14.0.23506 , 14.0.23506
    Skype? 7.13 , 7.13.101
    Honorbuddy , 3.0.16425.864
    Microsoft Visual C++ 2005 Redistributable , 8.0.61001
    MSI Social Media Collection , 1.14.2251
    SUPER CHARGER , 1.2.024
    ?????????? (????????????? ??????) , 16.4.3528.0331
    Business Plan Pro 11.0 , 11.14.0002
    Warcraft Logs Uploader , 4.14
    Intel? PROSet/Wireless Software , 18.40.4
    MSVCRT , 15.4.2862.0708
    MSVCRT110 , 16.4.1108.0727
    Microsoft Visual C++ 2012 Redistributable (x86) - 11.0.60610 , 11.0.60610.1
    FossLook Client , 1.0.0.0
    Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 , 9.0.30729.6161
    Galeria de Fotos , 16.4.3528.0331
    Nuance PaperPort 12 , 12.1.0006
    MSI to redistribute MS VS2005 CRT libraries , 8.0.50727.42
    Adobe Refresh Manager , 1.8.0
    Adobe Acrobat Reader DC , 15.023.20070
    Evernote v. 5.9 , 5.9.0.8665
    Windows Live PIMT Platform , 16.4.3528.0331
    ?????????? , 16.4.3528.0331
    Brother MFL-Pro Suite MFC-J200 , 1.0.0.0
    Foto?raf Galerisi , 16.4.3528.0331
    Windows Live , 16.4.3528.0331
    Adobe AIR , 23.0.0.257
    FossLook Application Server , 6.5.18
    Office Timeline , 3.10.4
    Manager , 16.11.43
    Microsoft Visual C++ 2012 Redistributable (x64) - 11.0.61030 , 11.0.61030.0
    Windows Live SOXE , 16.4.3528.0331
    ???? ????? , 16.4.3528.0331
    ???????? ?????????? Windows Live , 16.4.3528.0331
    Windows Live SOXE Definitions , 16.4.3528.0331
    Intel(R) C++ Redistributables for Windows* on Intel(R) 64 , 11.1.048
    D3DX10 , 15.4.2368.0902
    Qualcomm Atheros Killer Performance Suite , 1.1.48.1060
    Microsoft Visual C++ 2012 x86 Minimum Runtime - 11.0.60610 , 11.0.60610
    ??? , 16.4.3528.0331
    Microsoft SQL Server 2005 Compact Edition [ENU] , 3.1.0000
    Microsoft Visual C++ 2010  x86 Redistributable - 10.0.40219 , 10.0.40219
    Intel(R) Processor Graphics , 20.19.15.4531
    Realtek High Definition Audio Driver , 6.0.1.7622
    WD Security , 1.3.0.18
    Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 , 12.0.30501.0
    ?????? Windows Live , 16.4.3528.0331
    Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 , 12.0.21005
    Microsoft Visual C++ 2008 Redistributable - x86 9.0.21022 , 9.0.21022

    -------------
    OS Activation
    -------------

    Name: Windows(R), CoreSingleLanguage edition
    Description: Windows(R) Operating System, RETAIL channel
    Partial Product Key: 6F4BT
    License Status: Licensed

     

    Incident Response

    Risk Assessment

    Fingerprint
    Reads the active computer name
    Reads the cryptographic machine GUID

    Indicators

    Not all malicious and suspicious indicators are displayed. Get your own cloud service or the full version to view all details.

    • Environment Awareness
      • Queries volume information
        details
        "<Input Sample>" queries volume information of "%WINDIR%\Microsoft.NET\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.dll" at 00043703-00003392-0000010C-100140190
        "<Input Sample>" queries volume information of "C:\Soniredu.exe" at 00043703-00003392-0000010C-100149093
        source
        API Call
        relevance
        2/10
    • External Systems
    • General
      • Contains PDB pathways
        details
        "W:\Projects\Honorbuddy\MiniLoader\obj\x86\Release\MiniLoader.pdb"
        source
        String
        relevance
        1/10
      • Loads the .NET runtime environment
        details
        "<Input Sample>" loaded module "%WINDIR%\Microsoft.NET\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.dll" at 6C700000
        "<Input Sample>" loaded module "%WINDIR%\assembly\NativeImages_v4.0.30319_32\mscorlib\d1265d6159ea876f9d63ea4c1361b587\mscorlib.ni.dll" at 67F30000
        source
        Loaded Module
    • Installation/Persistance
      • Connects to LPC ports
        details
        "<Input Sample>" connecting to "\ThemeApiPort"
        source
        API Call
        relevance
        1/10
      • Touches files in the Windows directory
        details
        "<Input Sample>" touched file "%WINDIR%\Microsoft.NET\Framework\v1.0.3705\clr.dll"
        "<Input Sample>" touched file "C:\Windows\Microsoft.NET\Framework\v1.0.3705\mscorwks.dll"
        "<Input Sample>" touched file "C:\Windows\Microsoft.NET\Framework\v1.1.4322\clr.dll"
        "<Input Sample>" touched file "C:\Windows\Microsoft.NET\Framework\v1.1.4322\mscorwks.dll"
        "<Input Sample>" touched file "C:\Windows\Microsoft.NET\Framework\v2.0.50727\clr.dll"
        "<Input Sample>" touched file "C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorwks.dll"
        "<Input Sample>" touched file "C:\Windows\Microsoft.NET\Framework\v4.0.30319\clr.dll"
        "<Input Sample>" touched file "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Config\machine.config"
        "<Input Sample>" touched file "C:\Windows\Globalization\Sorting\SortDefault.nls"
        "<Input Sample>" touched file "C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\51e2934144ba15628ba5a31be2dae7dc\mscorlib.ni.dll.aux"
        "<Input Sample>" touched file "C:\Windows\Microsoft.NET\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.dll"
        "<Input Sample>" touched file "C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\d1265d6159ea876f9d63ea4c1361b587\mscorlib.ni.dll.aux"
        "<Input Sample>" touched file "C:\Windows\Microsoft.NET\Framework\v4.0.30319\sortdefault.nlp"
        "<Input Sample>" touched file "C:\Windows\System32\rsaenh.dll"
        "<Input Sample>" touched file "C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb"
        "<Input Sample>" touched file "C:\Windows\symbols\dll\mscorlib.pdb"
        source
        API Call
        relevance
        7/10
    • System Security
    • Unusual Characteristics
      • Matched Compiler/Packer signature
        details
        "Soniredu.exe.bin" was detected as "Microsoft visual C# v7.0 / Basic .NET"
        source
        Static Parser
        relevance
        10/10

    File Details

    All Details:

    File Sections

    DetailsNameEntropyVirtual AddressVirtual SizeRaw SizeMD5Characteristics
    Name
    .text
    Entropy
    5.15403058696
    Virtual Address
    0x2000
    Virtual Size
    0xf68
    Raw Size
    0x1000
    MD5
    9677b978390743eca7df61716ceef044
    .text5.154030586960x20000xf680x10009677b978390743eca7df61716ceef044-
    Name
    .rsrc
    Entropy
    4.08354700604
    Virtual Address
    0x4000
    Virtual Size
    0x5bc
    Raw Size
    0x600
    MD5
    ba61178dc3725b24b57d97e2da30e665
    .rsrc4.083547006040x40000x5bc0x600ba61178dc3725b24b57d97e2da30e665-
    Name
    .reloc
    Entropy
    0.0815394123432
    Virtual Address
    0x6000
    Virtual Size
    0xc
    Raw Size
    0x200
    MD5
    f9f1f54b1d1f9d83b288c5c7b1681507
    .reloc0.08153941234320x60000xc0x200f9f1f54b1d1f9d83b288c5c7b1681507-

    File Resources

    Screenshots

    Loading content, please wait...

    Hybrid Analysis

    Tip: Click an analysed process below to view more details.

    Analysed 1 process in total.

    Logged Script Calls Logged Stdout Extracted Streams Memory Dumps
    Reduced Monitoring Network Activityy Network Error Multiscan Match

    Network Analysis

    DNS Requests

    No relevant DNS requests were made.

    HTTP Traffic

    No relevant HTTP requests were made.

    honorbuddy 5.1 error

    Honorbuddy 5.1 error - that interfere

    GE62 2QD APACHE PRO - Installed wrong firmware

    Good day gents,

    I was trying to update my EC and BIOS, but ended up flashing 'msi ge 62 2qd apache' EC. Managed to boot up fine somehow but realised I flashed the wrong file when I booted up.

    Then I downloaded the appropriate EC for Apache Pro, but now it says error or wrong version.

    What should I do to rectify this? I was aiming for the fan issues.

    Best Regards,
    Dan


    Attached below, system info:

    ------------------
    System Information
    ------------------
    Serial Number:                9S716J212416ZF7000088
    Product Name:                 GE62 2QD
    OS:                           Microsoft Windows 10 Home Single Language 64-bit
    Windows Product Key:          6F4BT
    HDI Build:                    ZS7-1792BM4-ES2   3.TC5.A23.9.0.1  
    BIOS Version:                 E16J2IMS.114
    BIOS Release Date:            2015/09/23
    EC Version:                   16J2EMS1 Ver5.08, 07/13/2015
    CPU:                          Intel(R) Core(TM) i7-5700HQ CPU @ 2.70GHz
    Memory:                       8192 MB @ 800 MHz
                                   - 8192 MB, DDR3-1600, Kingston MSI16D3LS1MNG/8G  
    Graphics:                     NVIDIA GeForce GTX 960M, 2048 MB
    Graphics:                     Intel(R) HD Graphics 5600, 1024 MB
    VBIOS Version:                82.07.7c.00.28
    Drive:                        HDD, HGST HTS721010A9E630, 931.51 GB
    Network:                      TAP-Windows Adapter V9
    Network:                      Intel(R) Dual Band Wireless-AC 3160
    Network:                      Killer E2200 Gigabit Ethernet Controller

    ---------------------
    Programs and Features
    ---------------------
    Curse Client , 5.1.1.844
    Infinity , 2.3.2
    Python 3.6.0 (Anaconda3 4.3.0 64-bit) , 4.3.0
    Slack , 2.4.1
    Spotify , 1.0.48.103.g15edf1ec
    ?Torrent , 3.4.9.42606
    Telegram Desktop version 0.10.19 , 0.10.19
    Windows Driver Package - Google, Inc. (WinUSB) AndroidUsbDeviceClass  (08/28/2014 11.0.0000.00000) , 08/28/2014 11.0.0000.00000
    KB9X Radio Switch Driver , 1.1.0.0
    CCleaner , 5.22
    FileOpen Client B969 , B969
    FinchVPN 3.2.1.0 , 3.2.1.0
    Hola? 1.34.855 - Better Internet , 1.34.855
    JDownloader 2 , 2.0
    SteelSeries Engine 3.3.3 , 3.3.3
    Synaptics Pointing Device Driver , 19.0.6.1
    TAP-Windows 9.9.2 , 9.9.2
    TeamSpeak 3 Client , 3.0.19
    VLC media player , 2.2.1
    Vulkan Run Time Libraries 1.0.26.0 , 1.0.26.0
    WinRAR 5.40 (64-bit) , 5.40.0
    Corel Graphics - Windows Shell Extension , 17.1.0.572
    CorelDRAW Graphics Suite X7 (64-Bit) , 17.6.0.1021
    Intel(R) ME UninstallLegacy , 1.0.1.0
    CheckDevicesConfigurator , 1.2.701
    CorelDRAW Graphics Suite X7 - IPM (x64) , 17.6
    CorelDRAW Graphics Suite X7 - Photozoom Plugin (x64) , 17.0
    Microsoft Visual C++ 2010  x64 Redistributable - 10.0.40219 , 10.0.40219
    CorelDRAW Graphics Suite X7 - CT (x64) , 17.6
    Intel(R) PRO/Wireless Driver , 18.40.0004.4493
    CorelDRAW Graphics Suite X7 - Draw (x64) , 17.6
    CorelDRAW Graphics Suite X7 - Capture (x64) , 17.6
    Intel(R) Rapid Storage Technology , 13.5.0.1056
    CorelDRAW Graphics Suite X7 - PL (x64) , 17.6
    Intel(R) Wireless Bluetooth(R)(patch version 17.1.1512.771) , 17.1.1501.0514
    Qualcomm Atheros Network Manager , 1.1.48.1060
    Microsoft Visual C++ 2012 x64 Additional Runtime - 11.0.61030 , 11.0.61030
    Corel Graphics - Windows Shell Extension 32 Bit , 17.1.572
    CorelDRAW Graphics Suite X7 - EN (x64) , 17.6
    Microsoft SQL Server 2012 Native Client  , 11.0.2100.60
    CorelDRAW Graphics Suite X7 - JP (x64) , 17.6
    CorelDRAW Graphics Suite X7 - Custom Data (x64) , 17.6
    CorelDRAW Graphics Suite X7 - FontNav (x64) , 17.6
    Qualcomm Atheros Killer E220x Drivers , 1.1.48.1060
    ProductDaemonSetup , 1.2.701
    CorelDRAW Graphics Suite X7 - VBA (x64) , 17.6
    CorelDRAW Graphics Suite X7 - Setup Files (x64) , 17.6
    Intel? Trusted Connect Service Client , 1.39.141.0
    Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.6161 , 9.0.30729.6161
    TortoiseSVN 1.9.4.27285 (64 bit) , 1.9.27285
    CorelDRAW Graphics Suite X7 - ES (x64) , 17.6
    CorelDRAW Graphics Suite X7 - NL (x64) , 17.6
    Intel(R) Management Engine Components , 10.0.39.1003
    Microsoft Visual C++ 2005 Redistributable (x64) , 8.0.59192
    PaperPort Image Printer 64-bit , 14.00.0000
    NahimicSettingsConfigurator , 1.2.701
    Qualcomm Atheros Bandwidth Control Filter Driver , 1.1.48.1060
    CorelDRAW Graphics Suite X7 - IT (x64) , 17.6
    Intel? PROSet/Wireless WiFi Software , 18.40.2.0828
    CorelDRAW Graphics Suite X7 - RU (x64) , 17.6
    CorelDRAW Graphics Suite X7 - DE (x64) , 17.6
    Microsoft Visual Basic for Applications 7.1 (x64) , 7.1.00.00
    Microsoft Office Professional Plus 2013 , 15.0.4569.1506
    Microsoft Access MUI (English) 2013 , 15.0.4569.1506
    Microsoft Excel MUI (English) 2013 , 15.0.4569.1506
    Microsoft PowerPoint MUI (English) 2013 , 15.0.4569.1506
    Microsoft Publisher MUI (English) 2013 , 15.0.4569.1506
    Microsoft Outlook MUI (English) 2013 , 15.0.4569.1506
    Microsoft Word MUI (English) 2013 , 15.0.4569.1506
    Microsoft Office Korrekturhilfen 2013 - Deutsch , 15.0.4569.1506
    Microsoft Office Proofing Tools 2013 - English , 15.0.4569.1506
    Outils de v?rification linguistique 2013 de Microsoft Office - Fran?ais , 15.0.4569.1506
    ???????? ???????? ???????????? Microsoft Office 2013 ? ??????? , 15.0.4569.1506
    ?????? ????????? ????????? Microsoft Office 2013 ? ?????????? ???? , 15.0.4569.1506
    Microsoft Office Proofing Tools 2013 - Espa?ol , 15.0.4569.1506
    Microsoft Office Proofing (English) 2013 , 15.0.4569.1506
    Microsoft Office Proofing (Russian) 2013 , 15.0.4569.1506
    Microsoft Office Proofing (Ukrainian) 2013 , 15.0.4569.1506
    Microsoft InfoPath MUI (English) 2013 , 15.0.4569.1506
    Microsoft Visio Professional 2013 , 15.0.4569.1506
    Microsoft Visio MUI (English) 2013 , 15.0.4569.1506
    Microsoft Visio MUI (Russian) 2013 , 15.0.4569.1506
    Microsoft Visio MUI (Ukrainian) 2013 , 15.0.4569.1506
    Microsoft Office Shared MUI (English) 2013 , 15.0.4569.1506
    Microsoft Office Shared MUI (Russian) 2013 , 15.0.4569.1506
    Microsoft Office Shared MUI (Ukrainian) 2013 , 15.0.4569.1506
    Microsoft DCF MUI (English) 2013 , 15.0.4569.1506
    Microsoft OneNote MUI (English) 2013 , 15.0.4569.1506
    Microsoft Groove MUI (English) 2013 , 15.0.4569.1506
    Microsoft Office 32-bit Components 2013 , 15.0.4569.1506
    Microsoft Office Shared 32-bit MUI (English) 2013 , 15.0.4569.1506
    Microsoft Office Shared 32-bit MUI (Russian) 2013 , 15.0.4569.1506
    Microsoft Office Shared 32-bit MUI (Ukrainian) 2013 , 15.0.4569.1506
    Microsoft Office OSM MUI (English) 2013 , 15.0.4569.1506
    Microsoft Office OSM MUI (Russian) 2013 , 15.0.4569.1506
    Microsoft Office OSM MUI (Ukrainian) 2013 , 15.0.4569.1506
    Microsoft Office OSM UX MUI (English) 2013 , 15.0.4569.1506
    Microsoft Office Shared Setup Metadata MUI (English) 2013 , 15.0.4569.1506
    Microsoft Access Setup Metadata MUI (English) 2013 , 15.0.4569.1506
    Microsoft Lync MUI (English) 2013 , 15.0.4569.1506
    Microsoft Visual Basic for Applications 7.1 (x64) English , 7.1.0.0
    CorelDRAW Graphics Suite X7 - Common (x64) , 17.6
    Microsoft Visual C++ 2013 x64 Additional Runtime - 12.0.21005 , 12.0.21005
    Microsoft Application Error Reporting , 12.0.6015.5000
    CorelDRAW Graphics Suite X7 - VideoBrowser (x64) , 17.6
    CGS17_Setup_x64 , 17.6
    Microsoft Visual C++ 2013 x64 Minimum Runtime - 12.0.21005 , 12.0.21005
    M-Files 2015.2 , 11.2.4320.77
    Ansel , 373.06
    NVIDIA Control Panel 376.54 , 376.54
    NVIDIA Graphics Driver 376.54 , 376.54
    NVIDIA GeForce Experience 3.0.5.22 , 3.0.5.22
    NVIDIA Optimus Update 2.13.0.21 , 2.13.0.21
    NVIDIA PhysX System Software 9.16.0318 , 9.16.0318
    NVIDIA Update 2.13.0.21 , 2.13.0.21
    SHIELD Streaming , 7.1.0310
    NVIDIA Wireless Controller Service , 2.13.0.21
    NVIDIA Install Application , 2.1002.236.2037
    NVIDIA Backend , 2.13.0.21
    NVIDIA Container , 1.0
    NVIDIA LocalSystem Container , 1.0
    NVIDIA Message Bus for NvContainer , 1.0
    NVIDIA NetworkService Container , 1.0
    NVIDIA User Container , 1.0
    NVIDIA Elevated User Container , 1.0
    NVIDIA Display Container , 1.0
    NVIDIA Display Container LS , 1.0
    NvNodejs , 3.0.5.22
    NVIDIA Watchdog Plugin for NvContainer , 1.0
    NvTelemetry , 1.0.0.0
    Nvidia Share , 1.5.0.0
    NVIDIA ShadowPlay 2.13.0.21 , 2.13.0.21
    SHIELD Wireless Controller Driver , 3.0.5.22
    NVIDIA Update Core , 2.13.0.21
    NVIDIA Virtual Audio 1.2.41 , 1.2.41
    LauncherSetup , 1.2.701
    Intel(R) Product Improvement Program , 2.1.28.3
    CorelDRAW Graphics Suite X7 - Connect (x64) , 17.6
    Intel(R) Chipset Device Software , 10.0.22
    CorelDRAW Graphics Suite X7 - Redist (x64) , 17.0
    CorelDRAW Graphics Suite X7 - PHOTO-PAINT (x64) , 17.6
    WinZip 17.5 , 17.5.10562
    UIInstallUpgrade , 1.2.701
    Microsoft Visual C++ 2012 x64 Minimum Runtime - 11.0.61030 , 11.0.61030
    CorelDRAW Graphics Suite X7 - Filters (x64) , 17.6
    CorelDRAW Graphics Suite X7 - Writing Tools (x64) , 17.6
    SCM , 13.015.07154
    CorelDRAW Graphics Suite X7 - CZ (x64) , 17.6
    AudioFXSetup , 1.2.701
    MSVCRT110_amd64 , 16.4.1109.0912
    CorelDRAW Graphics Suite X7 - IPM Content (x64) , 17.0
    QuickBooks Runtime Redistributable , 1.00.0000
    ABBYY PDF Transformer+ , 4.1.241
    CorelDRAW Graphics Suite X7 - CS (x64) , 17.6
    CorelDRAW Graphics Suite X7 - BR (x64) , 17.6
    CorelDRAW Graphics Suite X7 - FR (x64) , 17.6
    Microsoft Visual Studio 2010 Tools for Office Runtime (x64) , 10.0.60830
    4K Stogram 2.2 , 2.2.2.1222
    Abacre Restaurant Point of Sale v8.8 , 8.8
    Advanced Find and Replace v7.8.1 , 7.8.1
    MSI Afterburner 4.2.0 , 4.2.0
    Dropbox , 21.4.25
    Google Chrome , 57.0.2987.98
    MSI Remind Manager , 1.0.1412.1801
    Help Desk , 1.0.1508.1802
    Dragon Gaming Center , 1.0.1501.2801
    Sizing Options , 2.0.1412.1501
    K-Lite Mega Codec Pack 11.4.0 , 11.4.0
    Malwarebytes Anti-Malware version 2.2.1.1043 , 2.2.1.1043
    Mozilla Thunderbird 45.8.0 (x86 en-US) , 45.8.0
    Mozilla Maintenance Service , 45.8.0.6273
    OpenVPN 2.3.4-I001  , 2.3.4-I001
    PowerISO , 6.6
    qBittorrent 3.3.3 , 3.3.3
    RivaTuner Statistics Server 6.4.1 , 6.4.1
    TeamViewer 11 , 11.0.65452
    VeraCrypt , 1.16
    Watch_Dogs 2 , 1.07.141
    Xilisoft Video Converter Platinum , 7.8.14.20160322
    Rosetta Stone Language Training , 5.0.37.0
    Windows Live UX Platform , 16.4.3528.0331
    Windows Live UX Platform Language Pack , 16.4.3528.0331
    Microsoft Visual C++ 2013 Redistributable (x64) - 12.0.30501 , 12.0.30501.0
    Google Drive , 1.32.4066.7445
    Photo Gallery , 16.4.3528.0331
    IPTInstaller , 4.0.9
    Dropbox Update Helper , 1.3.59.1
    Windows Live Essentials , 16.4.3528.0331
    Windows Live Temel Par?alar , 16.4.3528.0331
    Microsoft Visual C++ 2015 x86 Additional Runtime - 14.0.23506 , 14.0.23506
    WTFast 4.1 , 4.1.2.761
    Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 , 12.0.21005
    Nahimic for MSI , 1.2.7
    Movie Maker , 16.4.3528.0331
    MSXML 4.0 SP3 Parser , 4.30.2100.0
    Galer?a de fotos , 16.4.3528.0331
    Windows Live Photo Common , 16.4.3528.0331
    Windows Live ??? , 16.4.3528.0331
    Galeria de Fotografias , 16.4.3528.0331
    HTC Sync Manager , 3.1.72.3
    Microsoft Visual C++ 2015 Redistributable (x86) - 14.0.23506 , 14.0.23506.0
    Photo Common , 16.4.3528.0331
    Java 8 Update 77 , 8.0.770.3
    Nuance PDF Viewer Plus , 5.30.3290
    Mailbird , 2.1.25
    Intel(R) Driver Update Utility 2.6 , 2.6.0.32
    QuickBooks Enterprise Solutions 16.0 , 26.0.4001.2607
    Rosetta Stone Ltd Services , 3.2.21
    Microsoft Visual C++ 2012 x86 Additional Runtime - 11.0.60610 , 11.0.60610
    ???????????? , 16.4.3528.0331
    Intel? Driver Update Utility , 2.6.0.32
    Microsoft ASP.NET MVC 4 Runtime , 4.0.40804.0
    Windows Live Communications Platform , 16.4.3528.0331
    Galerie de photos , 16.4.3528.0331
    Java Auto Updater , 2.8.77.3
    Foto-galerija , 16.4.3528.0331
    HTC Driver Installer , 4.17.0.001
    CloakMe version 2 , 2
    Intel(R) Wireless Bluetooth(R) , 18.1.1611.3223
    QuickBooks , 26.0.4001.2607
    Boot Configure , 20.014.12127
    Realtek Card Reader , 6.3.9600.39062
    Google Update Helper , 1.3.32.7
    Battery Calibration , 1.0.1405.0701
    Windows Live Installer , 16.4.3528.0331
    Microsoft Visual C++ 2015 x86 Minimum Runtime - 14.0.23506 , 14.0.23506
    Skype? 7.13 , 7.13.101
    Honorbuddy , 3.0.16425.864
    Microsoft Visual C++ 2005 Redistributable , 8.0.61001
    MSI Social Media Collection , 1.14.2251
    SUPER CHARGER , 1.2.024
    ?????????? (????????????? ??????) , 16.4.3528.0331
    Business Plan Pro 11.0 , 11.14.0002
    Warcraft Logs Uploader , 4.14
    Intel? PROSet/Wireless Software , 18.40.4
    MSVCRT , 15.4.2862.0708
    MSVCRT110 , 16.4.1108.0727
    Microsoft Visual C++ 2012 Redistributable (x86) - 11.0.60610 , 11.0.60610.1
    FossLook Client , 1.0.0.0
    Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 , 9.0.30729.6161
    Galeria de Fotos , 16.4.3528.0331
    Nuance PaperPort 12 , 12.1.0006
    MSI to redistribute MS VS2005 CRT libraries , 8.0.50727.42
    Adobe Refresh Manager , 1.8.0
    Adobe Acrobat Reader DC , 15.023.20070
    Evernote v. 5.9 , 5.9.0.8665
    Windows Live PIMT Platform , 16.4.3528.0331
    ?????????? , 16.4.3528.0331
    Brother MFL-Pro Suite MFC-J200 , 1.0.0.0
    Foto?raf Galerisi , 16.4.3528.0331
    Windows Live , 16.4.3528.0331
    Adobe AIR , 23.0.0.257
    FossLook Application Server , 6.5.18
    Office Timeline , 3.10.4
    Manager , 16.11.43
    Microsoft Visual C++ 2012 Redistributable (x64) - 11.0.61030 , 11.0.61030.0
    Windows Live SOXE , 16.4.3528.0331
    ???? ????? , 16.4.3528.0331
    ???????? ?????????? Windows Live , 16.4.3528.0331
    Windows Live SOXE Definitions , 16.4.3528.0331
    Intel(R) C++ Redistributables for Windows* on Intel(R) 64 , 11.1.048
    D3DX10 , 15.4.2368.0902
    Qualcomm Atheros Killer Performance Suite , 1.1.48.1060
    Microsoft Visual C++ 2012 x86 Minimum Runtime - 11.0.60610 , 11.0.60610
    ??? , 16.4.3528.0331
    Microsoft SQL Server 2005 Compact Edition [ENU] , 3.1.0000
    Microsoft Visual C++ 2010  x86 Redistributable - 10.0.40219 , 10.0.40219
    Intel(R) Processor Graphics , 20.19.15.4531
    Realtek High Definition Audio Driver , 6.0.1.7622
    WD Security , 1.3.0.18
    Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 , 12.0.30501.0
    ?????? Windows Live , 16.4.3528.0331
    Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 , 12.0.21005
    Microsoft Visual C++ 2008 Redistributable - x86 9.0.21022 , 9.0.21022

    -------------
    OS Activation
    -------------

    Name: Windows(R), CoreSingleLanguage edition
    Description: Windows(R) Operating System, RETAIL channel
    Partial Product Key: 6F4BT
    License Status: Licensed

     

    Last Chaos ep4 - Connector : can't bind listen sess

    You last visited: Today at 14:02


    • Please register to post and access all features, it's quick, easy and FREE!


    Discussion on Last Chaos ep4 - Connector : can't bind listen sess within the Last Chaos forum part of the MMORPGs category.


    Old11/29/2016, 18:44  
     
    elite*gold: 0

    The Black Market: 0/0/0

    Join Date: Jul 2013

    Posts: 14

    Received Thanks: 0

    Last Chaos ep4 - Connector : can't bind listen sess


    Help

    WritebackTmp: 0 kB
    CommitLimit: 509996 kB
    Committed_AS: 383620 kB
    VmallocTotal: 34359738367 kB
    VmallocUsed: 7076 kB
    VmallocChunk: 34359719416 kB
    HardwareCorrupted: 0 kB
    AnonHugePages: 14336 kB
    HugePages_Total: 0
    HugePages_Free: 0
    HugePages_Rsvd: 0
    HugePages_Surp: 0
    Hugepagesize: 2048 kB
    DirectMap4k: 8048 kB
    DirectMap2M: 1040384 kB

    2016-11-29 11:34:43,150 INFO - MYSQL CLIENT VERSION : 5.1.73
    2016-11-29 11:34:43,152 INFO - SYSTEM > Finding Connection Limit
    2016-11-29 11:34:43,152 INFO - SYSTEM > Initialize Server Socket
    2016-11-29 11:34:43,153 INFO - SYSTEM > Entering Connector Loop
    2016-11-29 11:34:43,153 ERROR - bnf - acceptor_.bind error. error[Address already in use] / host[91.221.37.210] / port[4006]
    Connector : can't bind listen session
    :смущен:

    LeoraGames is offline  
    Old11/29/2016, 18:48  
     
    EEOI's Avatar
     
    elite*gold: 0

    The Black Market: 14/0/0

    Join Date: Feb 2010

    Posts: 3,050

    Received Thanks: 2,513

    Scheint so als wäre der port schon belegt.

    EEOI is online now  
    Old11/29/2016, 18:55  
     
    elite*gold: 0

    The Black Market: 0/0/0

    Join Date: Jul 2013

    Posts: 14

    Received Thanks: 0

    Ich habe schon die Ports gewechselt, hat nicht geholfen

    LeoraGames is offline  
    Old11/29/2016, 18:59  
     
    EEOI's Avatar
     
    elite*gold: 0

    The Black Market: 14/0/0

    Join Date: Feb 2010

    Posts: 3,050

    Received Thanks: 2,513

    ports auch offen?

    EEOI is online now  
    Old11/29/2016, 19:04  
     
    elite*gold: 0

    The Black Market: 0/0/0

    Join Date: Jul 2013

    Posts: 14

    Received Thanks: 0

    Ich weiß nicht, ich bin ein Neuling

    LeoraGames is offline  
    Old11/29/2016, 19:30  
     
    EEOI's Avatar
     
    elite*gold: 0

    The Black Market: 14/0/0

    Join Date: Feb 2010

    Posts: 3,050

    Received Thanks: 2,513

    Du musst den Port auch öffnen wenn du darauf verbinden willst, oder du lässt alles local laufen.

    EEOI is online now  
    Old11/29/2016, 19:37  
     
    elite*gold: 0

    The Black Market: 0/0/0

    Join Date: Jul 2013

    Posts: 14

    Received Thanks: 0

    Wie man Ports auf linux-prompt

    Простите, я русский(

    LeoraGames is offline  
    Old11/29/2016, 19:40  
     
    elite*gold: 0

    The Black Market: 0/0/0

    Join Date: Jul 2012

    Posts: 19

    Received Thanks: 3

    2016-11-29 11:34:43,153 ERROR - bnf - acceptor_.bind error. error[Address already in use] / host[91.221.37.210] / port[4006]

    Your log says all, you're trying to bind an IP and port in use.
    Connector on public ip: very bad idea. I think you will send more posts here like "Help, they shut down my LC server" in a few weeks
    LikeToMove2 is offline  
    Old11/29/2016, 19:43  
     
    elite*gold: 0

    The Black Market: 0/0/0

    Join Date: Jul 2013

    Posts: 14

    Received Thanks: 0

    Quote:

    Originally Posted by LikeToMove2View Post
    2016-11-29 11:34:43,153 ERROR - bnf - acceptor_.bind error. error[Address already in use] / host[91.221.37.210] / port[4006]

    Your log says all, you're trying to bind an IP and port in use.
    Connector on public ip: very bad idea. I think you will send more posts here like "Help, they shut down my LC server" in a few weeks

    Dies ist ein Test-Hosting

    Sagen Sie mir, wie es besser ist
    LeoraGames is offline  
    Old11/29/2016, 23:41  
     
    elite*gold: 0

    The Black Market: 0/0/0

    Join Date: Nov 2016

    Posts: 5

    Received Thanks: 1

    just reboot your host, its binded which means already in use.

    Vlentix is offline  
    Old11/30/2016, 09:54  
     
    elite*gold: 0

    The Black Market: 0/0/0

    Join Date: Jul 2013

    Posts: 14

    Received Thanks: 0

    Reload hosting, that's what happened

    LeoraGames is offline  
    Old11/30/2016, 13:29  
     
    elite*gold: 0

    The Black Market: 0/0/0

    Join Date: Nov 2016

    Posts: 5

    Received Thanks: 1

    Quote:

    Originally Posted by LeoraGamesView Post
    Reload hosting, that's what happened

    the ip should be 127.0.0.1
    Vlentix is offline  
    Old12/02/2016, 14:31  
     
    elite*gold: 110

    The Black Market: 1/0/0

    Join Date: Aug 2010

    Posts: 292

    Received Thanks: 168

    Messenger - SubHelper - Connector -Helper mit IP: 127.0.0.1

    GameServer und LoginServer mit deine Vps : IP 91.221.37.210

    Midicas.popo is offline  
    Old12/02/2016, 17:13  
     
    elite*gold: 0

    The Black Market: 0/0/0

    Join Date: Jul 2012

    Posts: 19

    Received Thanks: 3

    Quote:

    Originally Posted by Midicas.popoView Post

    Messenger - SubHelper - Connector -Helper mit IP: 127.0.0.1

    GameServer und LoginServer mit deine Vps : IP 91.221.37.210

    Usually yes, if you don't use custom APIs to ask connector some custom tasks
    LikeToMove2 is offline  
    Old12/02/2016, 22:27  
     
    elite*gold: 265

    The Black Market: 0/0/0

    Join Date: Jul 2009

    Posts: 727

    Received Thanks: 2,105

    I think what your problem was that you still had the Connector running.
    Then you maybe rebooted the servers, but that only restarts the gameservers.
    You have to explicitly kill the Connector.

    Wizatek is offline  

    QIAcube User Manual En

  • Version 1.1 June 2008

    Sample & Assay Technologies

    QIAcube User Manual

  • Trademarks: QIAGEN, QIAamp, QIAcube, QIAprep, QIAquick, DNeasy, EpiTect, MinElute, RNeasy (QIAGEN Group); DNA-ExitusPlus (AppliChem); Gigasept, Lysetol, Mikrozid (Schlke & Mayr GmbH); DECON-QUAT (Veltek Associates, Inc.); RNaseZap (Ambion, Inc.).

    20072008 QIAGEN, all rights reserved.

  • Contents

    QIAcube User Manual 06/2008 Contents-1

    Contents

    1 Safety Information 1-1 1.1 Proper use 1-1 1.2 Electrical safety 1-2 1.3 Environment 1-3 1.4 Biological safety 1-4 1.5 Chemicals 1-6 1.6 Waste disposal 1-7 1.7 Mechanical hazards 1-7 1.8 Heat hazard 1-8 1.9 Translations of warnings and cautions 1-8 1.10 Symbols on the QIAcube 1-26

    2 Introduction 2-1 2.1 About this user manual 2-1 2.2 General information 2-2 2.2.1 Technical assistance 2-2 2.2.2 Policy statement 2-2 2.2.3 Version management 2-2 2.3 Intended use of the QIAcube 2-3 2.3.1 Requirements for QIAcube users 2-3

    3 General Description 3-1 3.1 QIAcube principle 3-2 3.2 External features of the QIAcube 3-4 3.3 Internal features of the QIAcube 3-7

  • Contents

    Contents-2 QIAcube User Manual 06/2008

    4 Installation Procedures 4-1 4.1 Requirements 4-1 4.2 AC power connection 4-2 4.3 Unpacking the QIAcube 4-2 4.4 Installing the QIAcube 4-4 4.5 Packing the QIAcube 4-7

    5 Operating Procedures 5-1 5.1 QIAcube software 5-2 5.2 Running a QIAGEN protocol 5-2 5.2.1 Starting a protocol 5-3 5.2.2 End of the protocol run 5-9 5.2.3 Stopping a protocol 5-9 5.3 Setting up the worktable 5-9 5.3.1 Loading the reagent bottle rack 5-9 5.3.2 Loading the tip racks 5-11 5.3.3 Loading the rotor adapters 5-12 5.3.4 Loading the samples 5-16 5.3.5 Loading accessory buffers 5-18 5.4 Installing and deleting protocols 5-20 5.5 Saving data files 5-23 5.6 General information 5-26 5.7 Operating the shaker 5-29 5.8 Operating the centrifuge 5-32

    6 Maintenance Procedures 6-1 6.1 Regular maintenance procedure 6-4 6.2 Daily maintenance procedure 6-4 6.3 Monthly maintenance procedure 6-5 6.4 Periodic maintenance procedure 6-6

  • Contents

    QIAcube User Manual 06/2008 Contents-3

    6.4.1 Cleaning the centrifuge 6-6 6.4.2 Cleaning the instrument 6-10 6.4.3 Tightness test 6-10 6.5 Decontaminating the QIAcube 6-11 6.6 Cleaning the QIAcube centrifuge after a plastic crash 6-12 6.6.1 Opening the centrifuge lid 6-12 6.6.2 Cleaning the rotor and buckets 6-12 6.6.3 Cleaning the centrifuge 6-13 6.6.4 Cleaning the worktable 6-15 6.6.5 Cleaning the gripper unit 6-16 6.6.6 Installing the centrifuge rotor and buckets 6-17 6.6.7 Operating the centrifuge after cleaning 6-18

    7 Troubleshooting 7-1 7.1 General information 7-1 7.2 Resolving error messages and warnings 7-1 7.2.1 Load check errors 7-2 7.2.2 Protocol errors 7-4 7.2.3 File system errors 7-7 7.2.4 General instrument errors 7-8 7.2.5 General troubleshooting 7-14 7.2.6 Protocol interruption 7-14 7.2.7 Centrifuge 7-15 7.2.8 Shaker 7-20 7.2.9 Touchscreen 7-20 7.2.10 USB stick 7-20 7.2.11 Reagent volume detection 7-21

  • Contents

    Contents-4 QIAcube User Manual 06/2008

    8 Glossary 8-1

    Appendix A A-1 Technical data A-1 Environmental conditions A-1 Waste Electrical and Electronic Equipment (WEEE) A-3 FCC declaration A-4 EC declaration of conformity A-6

    Appendix B B-1 Loading the centrifuge and shaker B-1

    Appendix C C-1 QIAcube accessories C-1

    Appendix D D-1 Liability clause D-1 Index Index-1

  • Safety Information

    QIAcube User Manual 06/2008 1-1

    1 Safety Information Before using the QIAcube, it is essential that you read this user manual carefully and pay particular attention to the safety information. The instructions and safety information in the user manual must be followed to ensure safe operation of the instrument and to maintain the instrument in a safe condition.

    The following types of safety information appear throughout this manual.

    WARNING

    The term WARNING is used to inform you about situations that could result in personal injury to you or other persons. Details about these circumstances are given in a box like this one.

    CAUTION

    The term CAUTION is used to inform you about situations that could result in damage to the instrument or other equipment. Details about these circumstances are given in a box like this one.

    The advice given in this manual is intended to supplement, not supersede, the normal safety requirements prevailing in the users country.

    1.1 Proper use

    WARNING

    Risk of personal injury and material damage [W1] Improper use of the QIAcube may cause personal injuries or damage to the instrument. The QIAcube must only be operated by qualified personnel who have been appropriately trained. Servicing of the QIAcube must only be performed by QIAGEN Field Service Specialists.

    Perform the maintenance as described in Section 6. QIAGEN charges for repairs that are required due to incorrect maintenance.

  • Safety Information

    1-2 QIAcube User Manual 06/2008

    WARNING

    Risk of personal injury and material damage [W2] The QIAcube is too heavy to be lifted by one person. To avoid personal injury or damage to the instrument, do not lift the instrument alone.

    WARNING

    Risk of personal injury and material damage [W3] Do not attempt to move the QIAcube during operation.

    CAUTION

    Damage to the instrument [C1] Avoid spilling water or chemicals onto the QIAcube. Damage caused by water or chemical spillage will void your warranty.

    In case of emergency, switch off the QIAcube at the power switch at the front of the instrument and unplug the power cord from the power outlet.

    CAUTION

    Damage to the instrument [C2] Only use QIAGEN spin columns and QIAGEN Spin Kits with the QIAcube. Damage caused by use of other types of spin column or chemistries will void your warranty.

    1.2 Electrical safety Disconnect the line power cord from the power outlet before servicing.

  • Safety Information

    QIAcube User Manual 06/2008 1-3

    WARNING

    Electrical hazard [W4] Any interruption of the protective conductor (earth/ground lead) inside or outside the instrument or disconnection of the protective conductor terminal is likely to make the instrument dangerous. Intentional interruption is prohibited. Lethal voltages inside the instrument When the instrument is connected to line power, terminals may be live, and opening covers or removing parts is likely to expose live parts.

    To ensure satisfactory and safe operation of the QIAcube, follow the advice below: The line power cord must be connected to a line power

    outlet that has a protective conductor (earth/ground). Do not adjust or replace internal parts of the instrument. Do not operate the instrument with any covers or parts

    removed. If liquid has spilled inside the instrument, switch off the

    instrument, disconnect it from the power outlet, and contact QIAGEN Technical Services.

    If the instrument becomes electrically unsafe, prevent other personnel from operating it, and contact QIAGEN Technical Services; the instrument may be electrically unsafe when:

    It or the line power cord appears to be damaged. It has been stored under unfavorable conditions for a

    prolonged period. It has been subjected to severe transport stresses.

    1.3 Environment

    Operating conditions

    WARNING

    Explosive atmosphere [W5] The QIAcube is not designed for use in an explosive atmosphere.

  • Safety Information

    1-4 QIAcube User Manual 06/2008

    WARNING

    Risk of explosion [W6] The QIAcube is intended for use with reagents and substances supplied with QIAGEN kits. Use of other reagents and substances may lead to fire or explosion.

    CAUTION

    Damage to the instrument [C3] Direct sunlight may bleach parts of the instrument and cause damage to plastic parts. The QIAcube must be located out of direct sunlight.

    1.4 Biological safety Specimens and reagents containing materials from humans should be treated as potentially infectious. Use safe laboratory procedures as outlined in publications such as Biosafety in Microbiological and Biomedical Laboratories, HHS ( www.cdc.gov/od/ohs/biosfty/biosfty.htm ).

    Samples

    Samples may contain infectious agents. You should be aware of the health hazard presented by such agents and should use, store, and dispose of such samples according to the required safety regulations.

  • Safety Information

    QIAcube User Manual 06/2008 1-5

    WARNING

    Samples containing infectious agents [W7] Some samples used with this instrument may contain infectious agents. Handle such samples with the greatest of care and in accordance with the required safety regulations. Always wear safety glasses, 2 pairs of gloves, and a lab coat. The responsible body (e.g., laboratory manager) must take the necessary precautions to ensure that the surrounding workplace is safe, and that the instrument operators are suitably trained and not exposed to hazardous levels of infectious agents as defined in the applicable Material Safety Data Sheets (MSDSs) or OSHA,* ACGIH, or COSHH documents. Venting for fumes and disposal of wastes must be in accordance with all national, state, and local health and safety regulations and laws.

    * OSHA: Occupational Safety and Health Administration (United States of America). ACGIH: American Conference of Government Industrial Hygienists (United States of America). COSHH: Control of Substances Hazardous to Health (United Kingdom).

  • Safety Information

    1

  • Some interesting things are happening with my computer. Please help

    Thanks for your help Louis!

     

     HEres the speccy link for you : http://speccy.piriform.com/results/izzJhTDZT3jzQMQY4X3ZvFK

     

    And here is the info from MiniToolBox:

     

     

    MiniToolBox by Farbar  Version: 30-11-2014
    Ran by Christopher (administrator) on 19-02-2015 at 18:25:12
    Running from "C:\Users\Christopher\Downloads"
    Microsoft Windows 7 Ultimate  Service Pack 1 (X64)
    Boot Mode: Normal
    ***************************************************************************

    ========================= Event log errors: ===============================

    Application errors:
    ==================
    Error: (02/19/2015 05:19:52 PM) (Source: WinMgmt) (User: )
    Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

    Error: (02/19/2015 05:17:14 PM) (Source: Application Error) (User: )
    Description: Faulting application name: CsrBtOBEXService.exe, version: 2.1.63.0, time stamp: 0x4f68683b
    Faulting module name: CsrBtOBEXService.exe, version: 2.1.63.0, time stamp: 0x4f68683b
    Exception code: 0xc0000005
    Fault offset: 0x0000000000006f58
    Faulting process id: 0x7a8
    Faulting application start time: 0xCsrBtOBEXService.exe0
    Faulting application path: CsrBtOBEXService.exe1
    Faulting module path: CsrBtOBEXService.exe2
    Report Id: CsrBtOBEXService.exe3

    Error: (02/18/2015 11:08:50 AM) (Source: Application Error) (User: )
    Description: Faulting application name: plugin-container.exe, version: 35.0.1.5500, time stamp: 0x54c1f9f3
    Faulting module name: mozalloc.dll, version: 35.0.1.5500, time stamp: 0x54c1f224
    Exception code: 0x80000003
    Fault offset: 0x00001425
    Faulting process id: 0x894
    Faulting application start time: 0xplugin-container.exe0
    Faulting application path: plugin-container.exe1
    Faulting module path: plugin-container.exe2
    Report Id: plugin-container.exe3

    Error: (02/17/2015 10:27:00 PM) (Source: Application Error) (User: )
    Description: Faulting application name: plugin-container.exe, version: 35.0.1.5500, time stamp: 0x54c1f9f3
    Faulting module name: mozalloc.dll, version: 35.0.1.5500, time stamp: 0x54c1f224
    Exception code: 0x80000003
    Fault offset: 0x00001425
    Faulting process id: 0x1698
    Faulting application start time: 0xplugin-container.exe0
    Faulting application path: plugin-container.exe1
    Faulting module path: plugin-container.exe2
    Report Id: plugin-container.exe3

    Error: (02/17/2015 10:07:13 AM) (Source: Application Hang) (User: )
    Description: The program Explorer.EXE version 6.1.7601.17567 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Action Center control panel.

    Process ID: ce8

    Start Time: 01d04a22428ed36c

    Termination Time: 17277

    Application Path: C:\Windows\Explorer.EXE

    Report Id: 8d42b15e-b6b6-11e4-8cad-fcaa142e3789

    Error: (02/17/2015 03:29:04 AM) (Source: Application Error) (User: )
    Description: Faulting application name: GUI.exe, version: 1.0.0.1, time stamp: 0x4f0fc8d2
    Faulting module name: HM.dll, version: 1.0.0.1, time stamp: 0x527a12fd
    Exception code: 0xc0000005
    Fault offset: 0x000087e3
    Faulting process id: 0xe24
    Faulting application start time: 0xGUI.exe0
    Faulting application path: GUI.exe1
    Faulting module path: GUI.exe2
    Report Id: GUI.exe3

    Error: (02/16/2015 02:55:16 PM) (Source: WinMgmt) (User: )
    Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

    Error: (02/16/2015 02:53:40 PM) (Source: ESENT) (User: )
    Description: taskhost (3124) WebCacheLocal: Error -1811 occurred while opening logfile C:\Users\Christopher\AppData\Local\Microsoft\Windows\WebCache\V0100023.log.

    Error: (02/16/2015 03:46:15 AM) (Source: WinMgmt) (User: )
    Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

    Error: (02/13/2015 07:34:31 AM) (Source: Application Error) (User: )
    Description: Faulting application name: plugin-container.exe, version: 35.0.1.5500, time stamp: 0x54c1f9f3
    Faulting module name: mozalloc.dll, version: 35.0.1.5500, time stamp: 0x54c1f224
    Exception code: 0x80000003
    Fault offset: 0x00001425
    Faulting process id: 0x1acc
    Faulting application start time: 0xplugin-container.exe0
    Faulting application path: plugin-container.exe1
    Faulting module path: plugin-container.exe2
    Report Id: plugin-container.exe3


    System errors:
    =============
    Error: (02/19/2015 05:19:08 PM) (Source: DCOM) (User: NT AUTHORITY)
    Description: application-specificLocalLaunch{C97FCC79-E628-407D-AE68-A06AD6D8B4D1}{344ED43D-D086-4961-86A6-1106F4ACAD9B}NT AUTHORITYSYSTEMS-1-5-18LocalHost (Using LRPC)

    Error: (02/19/2015 05:18:08 PM) (Source: Service Control Manager) (User: )
    Description: The following boot-start or system-start driver(s) failed to load:
    UsbCharger

    Error: (02/19/2015 05:17:15 PM) (Source: Service Control Manager) (User: )
    Description: The CSR OBEX Service service terminated unexpectedly.  It has done this 1 time(s).

    Error: (02/19/2015 05:17:10 PM) (Source: DCOM) (User: )
    Description: {F9717507-6651-4EDB-BFF7-AE615179BCCF}

    Error: (02/19/2015 04:03:58 PM) (Source: BTHUSB) (User: )
    Description: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.

    Error: (02/16/2015 02:54:34 PM) (Source: DCOM) (User: NT AUTHORITY)
    Description: application-specificLocalLaunch{C97FCC79-E628-407D-AE68-A06AD6D8B4D1}{344ED43D-D086-4961-86A6-1106F4ACAD9B}NT AUTHORITYSYSTEMS-1-5-18LocalHost (Using LRPC)

    Error: (02/16/2015 02:53:33 PM) (Source: Service Control Manager) (User: )
    Description: The following boot-start or system-start driver(s) failed to load:
    UsbCharger

    Error: (02/16/2015 02:53:31 PM) (Source: EventLog) (User: )
    Description: The previous system shutdown at 2:50:23 PM on ‎2/‎16/‎2015 was unexpected.

    Error: (02/16/2015 04:45:07 AM) (Source: BTHUSB) (User: )
    Description: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.

    Error: (02/16/2015 04:14:57 AM) (Source: BTHUSB) (User: )
    Description: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.


    Microsoft Office Sessions:
    =========================
    Error: (02/19/2015 05:19:52 PM) (Source: WinMgmt)(User: )
    Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

    Error: (02/19/2015 05:17:14 PM) (Source: Application Error)(User: )
    Description: CsrBtOBEXService.exe2.1.63.04f68683bCsrBtOBEXService.exe2.1.63.04f68683bc00000050000000000006f587a801d04a223e820520C:\Program Files\CSR\CSR Harmony Wireless Software Stack\CsrBtOBEXService.exeC:\Program Files\CSR\CSR Harmony Wireless Software Stack\CsrBtOBEXService.exe0e4b0fd8-b885-11e4-8cad-fcaa142e3789

    Error: (02/18/2015 11:08:50 AM) (Source: Application Error)(User: )
    Description: plugin-container.exe35.0.1.550054c1f9f3mozalloc.dll35.0.1.550054c1f224800000030000142589401d04b9363eef6d9F:\Program Files (x86)\Mozilla Firefox\plugin-container.exeF:\Program Files (x86)\Mozilla Firefox\mozalloc.dll6cf19b4e-b788-11e4-8cad-fcaa142e3789

    Error: (02/17/2015 10:27:00 PM) (Source: Application Error)(User: )
    Description: plugin-container.exe35.0.1.550054c1f9f3mozalloc.dll35.0.1.550054c1f2248000000300001425169801d04ad617570e1dF:\Program Files (x86)\Mozilla Firefox\plugin-container.exeF:\Program Files (x86)\Mozilla Firefox\mozalloc.dllff981e0d-b71d-11e4-8cad-fcaa142e3789

    Error: (02/17/2015 10:07:13 AM) (Source: Application Hang)(User: )
    Description: Explorer.EXE6.1.7601.17567ce801d04a22428ed36c17277C:\Windows\Explorer.EXE8d42b15e-b6b6-11e4-8cad-fcaa142e3789

    Error: (02/17/2015 03:29:04 AM) (Source: Application Error)(User: )
    Description: GUI.exe1.0.0.14f0fc8d2HM.dll1.0.0.1527a12fdc0000005000087e3e2401d04a2242eef4d5C:\Program Files (x86)\GIGABYTE\ET6\GUI.exeC:\Program Files (x86)\GIGABYTE\ET6\HM.dll07ecd075-b67f-11e4-8cad-fcaa142e3789

    Error: (02/16/2015 02:55:16 PM) (Source: WinMgmt)(User: )
    Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

    Error: (02/16/2015 02:53:40 PM) (Source: ESENT)(User: )
    Description: taskhost3124WebCacheLocal: C:\Users\Christopher\AppData\Local\Microsoft\Windows\WebCache\V0100023.log-1811

    Error: (02/16/2015 03:46:15 AM) (Source: WinMgmt)(User: )
    Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

    Error: (02/13/2015 07:34:31 AM) (Source: Application Error)(User: )
    Description: plugin-container.exe35.0.1.550054c1f9f3mozalloc.dll35.0.1.550054c1f22480000003000014251acc01d04782670be511F:\Program Files (x86)\Mozilla Firefox\plugin-container.exeF:\Program Files (x86)\Mozilla Firefox\mozalloc.dlla83ea096-b37c-11e4-aa5a-fcaa142e3789



    @BIOS (HKLM-x32\...\{B2DC3F08-2EB2-49A5-AA24-15DFC8B1CB83}) (Version: 2.33 - GIGABYTE)
    =========================== Installed Programs ============================
    µTorrent (HKCU\...\uTorrent) (Version: 3.4.2.38656 - BitTorrent Inc.)
    3TB+Unlock B12.1102.1 (HKLM-x32\...\{17630FD1-B14A-4CA5-A627-B6B5F7DD41CF}) (Version: 1.00.0001 - GIGABYTE)
    7-Zip 9.20 (x64 edition) (HKLM\...\{23170F69-40C1-2702-0920-000001000000}) (Version: 9.20.00.0 - Igor Pavlov)
    Adobe Flash Player 16 NPAPI (HKLM-x32\...\Adobe Flash Player NPAPI) (Version: 16.0.0.305 - Adobe Systems Incorporated)
    Adobe Reader 9.3 (HKLM-x32\...\{AC76BA86-7AD7-1033-7B44-A93000000001}) (Version: 9.3.0 - Adobe Systems Incorporated)
    Age of Wonders 3 (HKLM-x32\...\Age of Wonders 3_R.G. Mechanics_is1) (Version:  - R.G. Mechanics, markfiter)
    AIDA64 Extreme v5.00 (HKLM-x32\...\AIDA64 Extreme_is1) (Version: 5.00 - FinalWire Ltd.)
    AMD Accelerated Video Transcoding (Version: 13.30.100.41120 - Advanced Micro Devices, Inc.) Hidden
    AMD Catalyst Control Center (x32 Version: 2014.1120.2123.38423 - Advanced Micro Devices, Inc.) Hidden
    AMD Catalyst Install Manager (HKLM\...\{F2A7CE36-57BF-5C86-952D-90DBF3746D82}) (Version: 8.0.916.0 - Advanced Micro Devices, Inc.)
    AMD Drag and Drop Transcoding (Version: 2.00.0000 - Advanced Micro Devices, Inc.) Hidden
    AMD Fuel (Version: 2014.1120.2123.38423 - Advanced Micro Devices, Inc.) Hidden
    AMD Steady Video Plug-In  (Version: 2.07.0000 - AMD) Hidden
    AMD Wireless Display v3.0 (Version: 1.0.0.15 - Advanced Micro Devices, Inc.) Hidden
    Anno 2070 version 2.0 (HKLM-x32\...\{B6249B57-3A35-4E06-A747-F79AE49F275D}_is1) (Version: 2.0 - )
    Apple Application Support (HKLM-x32\...\{46F044A5-CE8B-4196-984E-5BD6525E361D}) (Version: 2.3.6 - Apple Inc.)
    Apple Software Update (HKLM-x32\...\{789A5B64-9DD9-4BA5-915A-F0FC0A1B7BFE}) (Version: 2.1.3.127 - Apple Inc.)
    Arma III (HKLM-x32\...\Arma III_R.G. Mechanics_is1) (Version:  - R.G. Mechanics, markfiter)
    Ask Mr. Robot Client (HKCU\...\4080185637.www.askmrrobot.com) (Version:  - www.askmrrobot.com)
    AutoGreen B12.1220.1 (HKLM-x32\...\InstallShield_{C75FAD21-EC08-42F3-92D6-C9C0AB355345}) (Version: 1.00.0000 - GIGABYTE)
    AutoGreen B12.1220.1 (x32 Version: 1.00.0000 - GIGABYTE) Hidden
    AVS Video Converter 9.0 (HKLM-x32\...\AVS4YOU Video Converter 7_is1) (Version: 9.0.1.566 - Online Media Technologies Ltd.)
    Battle.net (HKLM-x32\...\Battle.net) (Version:  - Blizzard Entertainment)
    Battlefield™ Hardline Beta (HKLM-x32\...\{F5526D9D-13AD-4270-8707-AC921D168299}) (Version: 1.0.0.1 - Electronic Arts)
    Battlelog Web Plugins (HKLM-x32\...\Battlelog Web Plugins) (Version: 2.6.2 - EA Digital Illusions CE AB)
    BitRaider Streaming Client (HKLM-x32\...\BitRaider Streaming Client) (Version: 1.3.3.4098 - BitRaider, LLC)
    Bonjour (HKLM\...\{B91110FB-33B4-468B-90C2-4D5E8AE3FAE1}) (Version: 2.0.2.0 - Apple Inc.)
    Bonjour Print Services (HKLM\...\{0DA20600-6130-443B-9D4B-F30520315FA6}) (Version: 2.0.2.0 - Apple Inc.)
    Catalyst Control Center - Branding (x32 Version: 1.00.0000 - Advanced Micro Devices, Inc.) Hidden
    Catalyst Control Center Graphics Previews Common (x32 Version: 2014.1120.2123.38423 - Advanced Micro Devices, Inc.) Hidden
    Catalyst Control Center InstallProxy (x32 Version: 2014.1120.2123.38423 - Advanced Micro Devices, Inc.) Hidden
    Catalyst Control Center Localization All (x32 Version: 2014.1120.2123.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Chinese Standard (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Chinese Traditional (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Czech (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Danish (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Dutch (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help English (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Finnish (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help French (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help German (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Greek (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Hungarian (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Italian (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Japanese (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Korean (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Norwegian (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Polish (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Portuguese (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Russian (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Spanish (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Swedish (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Thai (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    CCC Help Turkish (x32 Version: 2014.1120.2122.38423 - Advanced Micro Devices, Inc.) Hidden
    ccc-utility64 (Version: 2014.1120.2123.38423 - Advanced Micro Devices, Inc.) Hidden
    CCleaner, ?????? 4.14.4808 (HKLM-x32\...\{80BD3FC0-9C5F-4ADA-83C7-91DC8E24D0B2}_is1) (Version: 4.14.4808 - Salat Production)
    CherryTree version 0.35.7 (HKLM-x32\...\{DBA7384C-E1C6-44B5-A3B4-C94F2F0B8C0C}_is1) (Version: 0.35.7 - Giuseppe Penone)
    Cities XXL (HKLM-x32\...\Cities XXL_R.G. Mechanics_is1) (Version:  - R.G. Mechanics, markfiter)
    CSR Harmony Wireless Software Stack (HKLM\...\{17DEA095-8EE1-49A2-AC5A-9663DB098FA9}) (Version: 2.1.63.0 - Cambridge Silicon Radio Limited.)
    Curse Client (HKCU\...\101a9f93b8f0bb6f) (Version: 5.1.1.820 - Curse)
    CyberLink PowerDirector 13 (HKLM-x32\...\{BA385AFC-00B1-417C-8C20-74B996EF3AF0}) (Version: 13.0.2326.0 - CyberLink Corp.)
    CyberLink WaveEditor 2 (HKLM-x32\...\{324F76CC-D8DD-4D87-B77D-D4AF5E1AA7B3}) (Version: 2.0 - CyberLink Corp.)
    D3DX10 (x32 Version: 15.4.2368.0902 - Microsoft) Hidden
    Dolby Home Theater v4 (HKLM-x32\...\{B26438B4-BF51-49C3-9567-7F14A5E40CB9}) (Version: 7.2.8000.17 - Dolby Laboratories Inc)
    Dragon Age Inquisition version 1.1.0 (HKLM-x32\...\Dragon Age Inquisition_is1) (Version: 1.1.0 - dzrepack)
    Dxtory version 2.0.127 (HKLM-x32\...\Dxtory2.0_is1) (Version: 2.0.127 - ExKode Co. Ltd.)
    Dying Light (HKLM-x32\...\Dying Light_R.G. Mechanics_is1) (Version:  - R.G. Mechanics, ProZorg_tm)
    Easy Tune 6 B13.1111.1 (HKLM-x32\...\InstallShield_{457D7505-D665-4F95-91C3-ECB8C56E9ACA}) (Version: 1.00.0000 - GIGABYTE)
    Easy Tune 6 B13.1111.1 (x32 Version: 1.00.0000 - GIGABYTE) Hidden
    Europa Universalis IV (HKLM-x32\...\Europa Universalis IV_is1) (Version:  - Paradox Interactive)
    f.lux (HKCU\...\Flux) (Version:  - )
    Futuremark SystemInfo (HKLM-x32\...\{2FE4C157-30AD-47F3-9D93-D9A2AFF25D3F}) (Version: 4.33.485.0 - Futuremark)
    Google Drive (HKLM-x32\...\{65EACBB4-B0B8-4A5B-AE46-22DBE15C70B5}) (Version: 1.19.8406.6504 - Google, Inc.)
    Google Toolbar for Internet Explorer (HKLM-x32\...\{2318C2B1-4965-11d4-9B18-009027A5CD4F}) (Version: 7.5.5111.1712 - Google Inc.)
    Google Toolbar for Internet Explorer (x32 Version: 1.0.0 - Google Inc.) Hidden
    Google Update Helper (x32 Version: 1.3.25.11 - Google Inc.) Hidden
    Google Update Helper (x32 Version: 1.3.26.9 - Google Inc.) Hidden
    Honorbuddy (HKCU\...\{512505bd-8999-44e0-993e-97d60c730784}) (Version: 2.5.12646.765 - Bossland GmbH)
    Honorbuddy (x32 Version: 2.5.12646.765 - Bossland GmbH) Hidden
    Intel® Wireless Bluetooth®(patch version 17.1.1440.2) (HKLM\...\{302600C1-6BDF-4FD1-1409-148929CC1385}) (Version: 17.1.1409.0488 - Intel Corporation)
    Java 8 Update 31 (HKLM-x32\...\{26A24AE4-039D-4CA4-87B4-2F83218031F0}) (Version: 8.0.310 - Oracle Corporation)
    Java Auto Updater (x32 Version: 2.8.31.13 - Oracle Corporation) Hidden
    Malwarebytes Anti-Malware version 2.0.4.1028 (HKLM-x32\...\Malwarebytes Anti-Malware_is1) (Version: 2.0.4.1028 - Malwarebytes Corporation)
    marvell 91xx driver (HKLM-x32\...\MagniDriver) (Version: 1.2.0.1039 - Marvell)
    Microsoft .NET Framework 4.5.1 (HKLM\...\{92FB6C44-E685-45AD-9B20-CADF4CABA132} - 1033) (Version: 4.5.50938 - Microsoft Corporation)
    Microsoft .NET Framework 4.5.1 (Version: 4.5.50938 - Microsoft Corporation) Hidden
    Microsoft Application Error Reporting (Version: 12.0.6015.5000 - Microsoft Corporation) Hidden
    Microsoft Mouse and Keyboard Center (HKLM\...\Microsoft Mouse and Keyboard Center) (Version: 2.3.188.0 - Microsoft Corporation)
    Microsoft Mouse and Keyboard Center (Version: 2.3.188.0 - Microsoft Corporation) Hidden
    Microsoft Security Client (Version: 4.7.0205.0 - Microsoft Corporation) Hidden
    Microsoft Security Essentials (HKLM\...\Microsoft Security Client) (Version: 4.7.205.0 - Microsoft Corporation)
    Microsoft Silverlight (HKLM\...\{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}) (Version: 5.1.30514.0 - Microsoft Corporation)
    Microsoft SQL Server 2005 Compact Edition [ENU] (HKLM-x32\...\{F0B430D1-B6AA-473D-9B06-AA3DD01FD0B8}) (Version: 3.1.0000 - Microsoft Corporation)
    Microsoft Visual C++ 2005 Redistributable (HKLM-x32\...\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}) (Version: 8.0.61001 - Microsoft Corporation)
    Microsoft Visual C++ 2008 Redistributable - x64 9.0.21022 (HKLM\...\{350AA351-21FA-3270-8B7A-835434E766AD}) (Version: 9.0.21022 - Microsoft Corporation)
    Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729 (HKLM\...\{2DFD8316-9EF1-3210-908C-4CB61961C1AC}) (Version: 9.0.30729 - Microsoft Corporation)
    Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.17 (HKLM\...\{8220EEFE-38CD-377E-8595-13398D740ACE}) (Version: 9.0.30729 - Microsoft Corporation)
    Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.6161 (HKLM\...\{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}) (Version: 9.0.30729.6161 - Microsoft Corporation)
    Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729 (HKLM-x32\...\{527BBE2F-1FED-3D8B-91CB-4DB0F838E69E}) (Version: 9.0.30729 - Microsoft Corporation)
    Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (HKLM-x32\...\{9A25302D-30C0-39D9-BD6F-21E6EC160475}) (Version: 9.0.30729 - Microsoft Corporation)
    Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148 (HKLM-x32\...\{1F1C2DFC-2D24-3E06-BCB8-725134ADF989}) (Version: 9.0.30729.4148 - Microsoft Corporation)
    Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (HKLM-x32\...\{9BE518E6-ECC6-35A9-88E4-87755C07200F}) (Version: 9.0.30729.6161 - Microsoft Corporation)
    Microsoft Visual C++ 2010 Redistributable - x64 10.0.40219 (HKLM\...\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}) (Version: 10.0.40219 - Microsoft Corporation)
    Microsoft Visual C++ 2010 Redistributable - x86 10.0.40219 (HKLM-x32\...\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}) (Version: 10.0.40219 - Microsoft Corporation)
    Microsoft Visual C++ 2012 Redistributable (x64) - 11.0.60610 (HKLM-x32\...\{a1909659-0a08-4554-8af1-2175904903a1}) (Version: 11.0.60610.1 - Microsoft Corporation)
    Microsoft Visual C++ 2012 Redistributable (x64) - 11.0.61030 (HKLM-x32\...\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}) (Version: 11.0.61030.0 - Microsoft Corporation)
    Microsoft Visual C++ 2012 Redistributable (x86) - 11.0.51106 (HKLM-x32\...\{8e70e4e1-06d7-470b-9f74-a51bef21088e}) (Version: 11.0.51106.1 - Microsoft Corporation)
    Microsoft Visual C++ 2012 Redistributable (x86) - 11.0.60610 (HKLM-x32\...\{95716cce-fc71-413f-8ad5-56c2892d4b3a}) (Version: 11.0.60610.1 - Microsoft Corporation)
    Microsoft Visual C++ 2012 Redistributable (x86) - 11.0.61030 (HKLM-x32\...\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}) (Version: 11.0.61030.0 - Microsoft Corporation)
    Microsoft Visual C++ 2012 x64 Additional Runtime - 11.0.50727 (Version: 11.0.50727 - Microsoft Corporation) Hidden
    Microsoft Visual C++ 2012 x64 Additional Runtime - 11.0.61030 (Version: 11.0.61030 - Microsoft Corporation) Hidden
    Microsoft Visual C++ 2012 x64 Minimum Runtime - 11.0.50727 (Version: 11.0.50727 - Microsoft Corporation) Hidden
    Microsoft Visual C++ 2012 x64 Minimum Runtime - 11.0.61030 (Version: 11.0.61030 - Microsoft Corporation) Hidden
    Microsoft Visual C++ 2012 x86 Additional Runtime - 11.0.50727 (x32 Version: 11.0.50727 - Microsoft Corporation) Hidden
    Microsoft Visual C++ 2012 x86 Additional Runtime - 11.0.61030 (x32 Version: 11.0.61030 - Microsoft Corporation) Hidden
    Microsoft Visual C++ 2012 x86 Minimum Runtime - 11.0.50727 (x32 Version: 11.0.50727 - Microsoft Corporation) Hidden
    Microsoft Visual C++ 2012 x86 Minimum Runtime - 11.0.61030 (x32 Version: 11.0.61030 - Microsoft Corporation) Hidden
    Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 (HKLM-x32\...\{f65db027-aff3-4070-886a-0d87064aabb1}) (Version: 12.0.30501.0 - Microsoft Corporation)
    Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 (x32 Version: 12.0.21005 - Microsoft Corporation) Hidden
    Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (x32 Version: 12.0.21005 - Microsoft Corporation) Hidden
    Movie Maker (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    Mozilla Firefox 34.0.5 (x86 en-US) (HKLM-x32\...\Mozilla Firefox 34.0.5 (x86 en-US)) (Version: 34.0.5 - Mozilla)
    Mozilla Firefox 35.0.1 (x86 en-US) (HKCU\...\Mozilla Firefox 35.0.1 (x86 en-US)) (Version: 35.0.1 - Mozilla)
    Mozilla Maintenance Service (HKLM-x32\...\MozillaMaintenanceService) (Version: 34.0.5 - Mozilla)
    MSVCRT (x32 Version: 15.4.2862.0708 - Microsoft) Hidden
    MSVCRT110 (x32 Version: 16.4.1108.0727 - Microsoft) Hidden
    MSVCRT110_amd64 (Version: 16.4.1109.0912 - Microsoft) Hidden
    NewBlue Video Essentials for Windows (HKLM-x32\...\NewBlue Video Essentials for Windows) (Version: 3.0 - NewBlue)
    NVIDIA PhysX (HKLM-x32\...\{80407BA7-7763-4395-AB98-5233F1B34E65}) (Version: 9.13.1220 - NVIDIA Corporation)
    ON_OFF Charge 2 B13.1028.1 (HKLM-x32\...\InstallShield_{6B4ED6F7-BB88-4945-B0C6-01410E1BAC3A}) (Version: 1.00.0000 - GIGABYTE)
    ON_OFF Charge 2 B13.1028.1 (x32 Version: 1.00.0000 - GIGABYTE) Hidden
    Origin (HKLM-x32\...\Origin) (Version: 9.5.5.2850 - Electronic Arts, Inc.)
    Photo Gallery (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    Plantronics RIG Dolby Game Audio (HKLM-x32\...\{1B6D9EA4-D1D6-4225-ADBB-441707C49D02}) (Version: 1.31.35.2 - Plantronics, Inc)
    Platform (x32 Version: 1.42 - VIA Technologies, Inc.) Hidden
    PowerISO (HKLM-x32\...\PowerISO) (Version: 6.1 - Power Software Ltd)
    proDAD Adorage 3.0 (64bit) (HKLM\...\proDAD-Adorage-3.0) (Version: 3.0.108.1 - proDAD GmbH)
    PunkBuster Services (HKLM-x32\...\PunkBusterSvc) (Version: 0.994 - Even Balance, Inc.)
    QuickTime 7 (HKLM-x32\...\{3D2CBC2C-65D4-4463-87AB-BB2C859C1F3E}) (Version: 7.76.80.95 - Apple Inc.)
    Rainmeter (HKLM-x32\...\Rainmeter) (Version: 3.1 r2290 - )
    Raptr (HKLM-x32\...\Raptr) (Version:  - )
    Realtek Ethernet Controller Driver (HKLM-x32\...\{8833FFB6-5B0C-4764-81AA-06DFEED9A476}) (Version: 7.49.927.2011 - Realtek)
    Realtek HDMI Audio Driver for ATI (HKLM-x32\...\{5449FB4F-1802-4D5B-A6D8-087DB1142147}) (Version: 6.0.1.6650 - Realtek Semiconductor Corp.)
    Realtek High Definition Audio Driver (HKLM-x32\...\{F132AF7F-7BCA-4EDE-8A7C-958108FE7DBC}) (Version: 6.0.1.7106 - Realtek Semiconductor Corp.)
    SeaTools for Windows (HKLM-x32\...\SeaTools for Windows) (Version:  - Seagate Technology)
    Sherlock Holmes Crimes and Punishments (HKLM-x32\...\Sherlock Holmes Crimes and Punishments_is1) (Version:  - )
    Sid Meier's Civilization V (HKLM-x32\...\steam app 8930) (Version:  - 2K Games, Inc.)
    SimCity 2000 Special Edition (HKLM-x32\...\{59D2C751-F7BE-4E9F-9C8C-1F16013802C7}) (Version: 2.0.0.1 - Electronic Arts)
    Skype Click to Call (HKLM-x32\...\{6D1221A9-17BF-4EC0-81F2-27D30EC30701}) (Version: 7.3.16540.9015 - Microsoft Corporation)
    Skype™ 7.0 (HKLM-x32\...\{24991BA0-F0EE-44AD-9CC8-5EC50AECF6B7}) (Version: 7.0.102 - Skype Technologies S.A.)
    SmartSound Quicktracks 5 (HKLM-x32\...\InstallShield_{2F8BA3FD-1FA9-4279-B696-712ABB12F09F}) (Version: 5.1.8 - SmartSound Software Inc.)
    SmartSound Quicktracks 5 (x32 Version: 5.1.8 - SmartSound Software Inc.) Hidden
    SpeedFan (remove only) (HKLM-x32\...\SpeedFan) (Version:  - )
    Spotify (HKCU\...\Spotify) (Version: 0.9.15.27.g87efe634 - Spotify AB)
    Star Wars The Old Republic (HKLM-x32\...\swtor_swtor) (Version:  - Bioware/EA)
    Star Wars: The Old Republic (HKLM-x32\...\{3B11D799-48E0-48ED-BFD7-EA655676D8BB}) (Version: 1.00 - Electronic Arts, Inc.)
    System Requirements Lab (HKLM-x32\...\{8DCAB1D8-F20C-4733-9B5F-646DDFEB59C9}) (Version: 6.1.1.0 - Husdawg, LLC)
    System Requirements Lab Detection (HKLM-x32\...\{EF639962-8CC7-4670-9F69-7045F125D8BB}) (Version: 2.2.3.0 - Husdawg, LLC)
    Theme Hospital (HKLM-x32\...\{5118A4C2-C8A4-4CE5-AC37-F3E51C25402F}) (Version: 3.0.0.2 - Electronic Arts)
    Tropico 5 Waterborne (HKLM-x32\...\Tropico 5 Waterborne_is1) (Version:  - )
    UAS&TURBO DRIVER CONTROL TOOL 1.0.0.13 (HKLM-x32\...\{078BD51D-BC3A-4178-93DE-57FFE92A83DE}}_is1) (Version:  - GIGA-BYTE TECHNOLOGY CO., LTD.)
    Unity Web Player (HKCU\...\UnityWebPlayer) (Version: 4.6.1f1 - Unity Technologies ApS)
    Uplay (HKLM-x32\...\Uplay) (Version: 4.9 - Ubisoft)
    VIA Platform Device Manager (HKLM-x32\...\InstallShield_{20D4A895-748C-4D88-871C-FDB1695B0169}) (Version: 1.42 - VIA Technologies, Inc.)
    Watch_Dogs (HKLM-x32\...\Uplay Install 274) (Version:  - Ubisoft)
    WD My Cloud (HKLM\...\{432F3CFC-ED41-4CDC-9D8F-6643C8A71CEA}) (Version: 1.0.6.13 - Western Digital Technologies, Inc.)
    Windows Live Communications Platform (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    Windows Live Essentials (HKLM-x32\...\WinLiveSuite) (Version: 16.4.3528.0331 - Microsoft Corporation)
    Windows Live Essentials (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    Windows Live ID Sign-in Assistant (Version: 7.250.4311.0 - Microsoft Corporation) Hidden
    Windows Live Installer (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    Windows Live Photo Common (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    Windows Live PIMT Platform (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    Windows Live SOXE (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    Windows Live SOXE Definitions (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    Windows Live UX Platform (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    Windows Live UX Platform Language Pack (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    Windows Live Writer (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    Windows Live Writer Resources (x32 Version: 16.4.3528.0331 - Microsoft Corporation) Hidden
    World of Warcraft (HKLM-x32\...\World of Warcraft) (Version:  - Blizzard Entertainment)
    World of Warcraft Beta (HKLM-x32\...\World of Warcraft Beta) (Version:  - Blizzard Entertainment)
    World of Warcraft Public Test (HKLM-x32\...\World of Warcraft Public Test) (Version:  - Blizzard Entertainment)

    ========================= Memory info: ===================================

    Percentage of memory in use: 44%
    Total physical RAM: 8156.61 MB
    Available physical RAM: 4526.79 MB
    Total Pagefile: 16311.41 MB
    Available Pagefile: 12259.44 MB
    Total Virtual: 4095.88 MB
    Available Virtual: 3973.15 MB

    ========================= Partitions: =====================================

    1 Drive c: () (Fixed) (Total:238.47 GB) (Free:47.06 GB) NTFS
    3 Drive e: (Movies) (Fixed) (Total:491.98 GB) (Free:21.21 GB) NTFS
    4 Drive f: () (Fixed) (Total:439.53 GB) (Free:40.89 GB) NTFS

    ========================= Users: ========================================

    User accounts for \\CHRISTOPHER-PC

    Administrator            Christopher              Guest                    


    **** End of log ****
     


    Buddy Bots infected with trojan.

    Published on 12-19-2012 01:55 PM

    Comments

    Yesterday 18 December Buddy Bots developer Hawker announced that their build server was infected with a trojan keylogger. Hawker also mentioned that this trojan was specifically designed to attack Demonbuddy and Honorbuddy, but it infected some different builds as well.


    The products that were infected with this trojan were:
    - 1 release of Arelog
    - 1 release of GW2Buddy
    - HonorbuddyBETA release of last week
    - DemonbuddyBETA release of last week


    All users of Buddy Bot products are advised to scan their computer with Microsoft Security Essentials, which detects and destroys the trojan. Reset your World of Warcraft, Diablo 3 and/or Guild Wars 2 passwords as well, just to be safe.


    In light of the 18 December banwave, speculations have arisen that the trojan might somehow be connected to the banwaves.

    This article was originally published in forum thread: Buddy Bots infected with trojan. started by 08449View original post

    Incident Response

    Risk Assessment

    Fingerprint
    Reads the active computer name
    Reads the cryptographic machine GUID

    Indicators

    Not all malicious and suspicious indicators are displayed. Get your own cloud service or the full version to view all details.

    • Environment Awareness
      • Queries volume information
        details
        "<Input Sample>" queries volume information of "%WINDIR%\Microsoft.NET\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.dll" at 00043703-00003392-0000010C-100140190
        "<Input Sample>" queries volume information of "C:\Soniredu.exe" at 00043703-00003392-0000010C-100149093
        source
        API Call
        relevance
        2/10
    • External Systems
    • General
      • Contains PDB pathways
        details
        "W:\Projects\Honorbuddy\MiniLoader\obj\x86\Release\MiniLoader.pdb"
        source
        String
        relevance
        1/10
      • Loads the .NET runtime environment
        details
        "<Input Sample>" loaded module "%WINDIR%\Microsoft.NET\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.dll" at 6C700000
        "<Input Sample>" loaded module "%WINDIR%\assembly\NativeImages_v4.0.30319_32\mscorlib\d1265d6159ea876f9d63ea4c1361b587\mscorlib.ni.dll" at 67F30000
        source
        Loaded Module
    • Installation/Persistance
      • Connects to LPC ports
        details
        "<Input Sample>" connecting to "\ThemeApiPort"
        source
        API Call
        relevance
        1/10
      • Touches files in the Windows directory
        details
        "<Input Sample>" touched file "%WINDIR%\Microsoft.NET\Framework\v1.0.3705\clr.dll"
        "<Input Sample>" touched file "C:\Windows\Microsoft.NET\Framework\v1.0.3705\mscorwks.dll"
        "<Input Sample>" touched file "C:\Windows\Microsoft.NET\Framework\v1.1.4322\clr.dll"
        "<Input Sample>" touched file "C:\Windows\Microsoft.NET\Framework\v1.1.4322\mscorwks.dll"
        "<Input Sample>" touched file "C:\Windows\Microsoft.NET\Framework\v2.0.50727\clr.dll"
        "<Input Sample>" touched file "C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorwks.dll"
        "<Input Sample>" touched file "C:\Windows\Microsoft.NET\Framework\v4.0.30319\clr.dll"
        "<Input Sample>" touched file "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Config\machine.config"
        "<Input Sample>" touched file "C:\Windows\Globalization\Sorting\SortDefault.nls"
        "<Input Sample>" touched file "C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\51e2934144ba15628ba5a31be2dae7dc\mscorlib.ni.dll.aux"
        "<Input Sample>" touched file "C:\Windows\Microsoft.NET\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.dll"
        "<Input Sample>" touched file "C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\d1265d6159ea876f9d63ea4c1361b587\mscorlib.ni.dll.aux"
        "<Input Sample>" touched file "C:\Windows\Microsoft.NET\Framework\v4.0.30319\sortdefault.nlp"
        "<Input Sample>" touched file "C:\Windows\System32\rsaenh.dll"
        "<Input Sample>" touched file "C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb"
        "<Input Sample>" touched file "C:\Windows\symbols\dll\mscorlib.pdb"
        source
        API Call
        relevance
        7/10
    • System Security
    • Unusual Characteristics
      • Matched Compiler/Packer signature
        details
        "Soniredu.exe.bin" was detected as "Microsoft visual C# v7.0 / Basic .NET"
        source
        Static Parser
        relevance
        10/10

    File Details

    All Details:

    File Sections

    DetailsNameEntropyVirtual AddressVirtual SizeRaw SizeMD5Characteristics
    Name
    .text
    Entropy
    5.15403058696
    Virtual Address
    0x2000
    Virtual Size
    0xf68
    Raw Size
    0x1000
    MD5
    9677b978390743eca7df61716ceef044
    .text5.154030586960x20000xf680x10009677b978390743eca7df61716ceef044-
    Name
    .rsrc
    Entropy
    4.08354700604
    Virtual Address
    0x4000
    Virtual Size
    0x5bc
    Raw Size
    0x600
    MD5
    ba61178dc3725b24b57d97e2da30e665
    .rsrc4.083547006040x40000x5bc0x600ba61178dc3725b24b57d97e2da30e665-
    Name
    .reloc
    Entropy
    0.0815394123432
    Virtual Address
    0x6000
    Virtual Size
    0xc
    Raw Size
    0x200
    MD5
    f9f1f54b1d1f9d83b288c5c7b1681507
    .reloc0.08153941234320x60000xc0x200f9f1f54b1d1f9d83b288c5c7b1681507-

    File Resources

    Screenshots

    Loading content, please wait...

    Hybrid Analysis

    Tip: Click an analysed process below to view more details.

    Analysed 1 process in total.

    Logged Script Calls Logged Stdout Extracted Streams Memory Dumps
    Reduced Monitoring Network Activityy Network Error Multiscan Match

    Network Analysis

    DNS Requests

    No relevant DNS requests were made.

    HTTP Traffic

    No relevant HTTP requests were made.

    You can watch a thematic video

    Mengenali Setiap Custom Rom Yang Membutuhkan Tambahan Firmware Supaya Tidak Error 7

    1 Comments

    Leave a Comment