Templatesyard is a blogger resources site is a provider of high quality blogger template with premium looking layout and robust design. The main mission of templatesyard is to provide the best quality blogger templates which are professionally designed and perfectlly seo optimized to deliver best result for your blog. Thank you for choosing Adobe, The Adobe Support Team -----> -----> Adobe After Effects CS4 (Final) + Crack Create motion graphics and visual effects with the industry standard. With Adobe After EffectsCS4 software, you can create compelling motion graphics and blockbuster visual effects with flexible tools that help save you time and deliver.
Adobe After Effect Crack Mac
Adobe After Effects Cs6 Crack Free Download
I'll add some clear results (then I'll shut up I promise)
http://www.virustotal.com/en/analisis/854d292a6495f3bfec172fdf0fbeb80e861e0da6d5a9145ced48dac8ddee650f-1266616557
and
http://www.virustotal.com/en/analisis/70b20bd7957f8f892ebf82f9116a00ee049423332fae8c0354c5b6a69e5cf58a-1266616354
....at least the first one (the one add multiple entries in windows registry) is, clearly, a trojan horse (not 'a trojan horse 'cause it's a keygen', just. a. trojan. horse)
I'll add one of the AV logs too
z:adobe after effects cs4 (final) [rh]aae_cs4_[rh]adobe after effects cs4acs4mc- keygenextra keygenacs4mc-keygen.exe
____________________________
Source
acs4mc-keygen.exe
____________________________
File Actions
Infected file: z:adobe after effects cs4 (final) [rh]aae_cs4_[rh]adobe after effects cs4acs4mc- keygenextra keygenacs4mc-keygen.exe
Removed
____________________________
Registry Actions
Registry entry: HKEY_CLASSES_ROOTCLSID{1DBD6574-D6D0-4782-94C3-69619E719765}
Restart Required
Registry entry: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerShellExecuteHooks->{1DBD6574-D6D0-4782-94C3-69619E719765}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{08223B03-1B38-4A33-A83A-A4D3CC1D6E4E}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{16AF66EB-93C8-49F9-BB09-B4F87CEDCE46}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{29EA67E0-9EE5-4D1A-A056-5B7BDAC4CF97}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{58FF3024-8A83-4B1A-88E9-302F47646EEE}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{5934EA2B-B2C4-4BE7-BF7A-FBA781A12E40}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{93DEE065-EC9B-4505-ADD3-19880AD3C38F}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{950D1600-DE4A-448D-93B4-7BAE5A7A8052}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{A1A6BC2E-C6A1-43C1-8884-A31D772F42B8}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{AD794E6B-90B7-4F9D-8FD6-0C16E3298FF2}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{DA63E650-537C-4042-87BB-9D19D844680B}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{E1D19FCC-4777-4D71-B863-6A0A5B4E59BC}
Restart Required
Registry entry: HKEY_USERSS-1-5-19avs
Restart Required
Registry entry: HKEY_USERSS-1-5-20avs
Restart Required
Registry entry: HKEY_USERSS-1-5-21-1417001333-1958367476-2146625035-1003avs
Restart Required
Registry entry: HKEY_USERS.DEFAULTavs
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{021F087F-4378-545F-74FA-37D345AD7A8C}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{17DFD111-BF3A-4CB4-ADB0-88FCBFE69821}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{1E51C0FD-EE36-434B-AD2A-FD1FF3731C38}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{50A8A8C4-EDC9-4ABD-A0A2-2E2418982189}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{73AE86E6-7F03-4C3B-8980-FB1DA157D3C7}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{B29583D8-033A-4B9F-8553-7C5458F3FB8E}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{E8A3B193-77E3-4FB3-986D-F4FA4828BAFC}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{F99DEFDD-200B-4410-B572-E90883D527D2}
Restart Required
Registry entry: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerShellExecuteHooks->{29EA67E0-9EE5-4D1A-A056-5B7BDAC4CF97}
Restart Required
Registry entry: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerShellExecuteHooks->{DA63E650-537C-4042-87BB-9D19D844680B}
Restart Required
Registry entry: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerShellExecuteHooks->{58FF3024-8A83-4B1A-88E9-302F47646EEE}
Restart Required
Registry entry: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerShellExecuteHooks->{950D1600-DE4A-448D-93B4-7BAE5A7A8052}
Restart Required
Registry entry: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerS
http://www.virustotal.com/en/analisis/854d292a6495f3bfec172fdf0fbeb80e861e0da6d5a9145ced48dac8ddee650f-1266616557
and
http://www.virustotal.com/en/analisis/70b20bd7957f8f892ebf82f9116a00ee049423332fae8c0354c5b6a69e5cf58a-1266616354
....at least the first one (the one add multiple entries in windows registry) is, clearly, a trojan horse (not 'a trojan horse 'cause it's a keygen', just. a. trojan. horse)
I'll add one of the AV logs too
z:adobe after effects cs4 (final) [rh]aae_cs4_[rh]adobe after effects cs4acs4mc- keygenextra keygenacs4mc-keygen.exe
____________________________
Source
acs4mc-keygen.exe
____________________________
File Actions
Infected file: z:adobe after effects cs4 (final) [rh]aae_cs4_[rh]adobe after effects cs4acs4mc- keygenextra keygenacs4mc-keygen.exe
Removed
____________________________
Registry Actions
Registry entry: HKEY_CLASSES_ROOTCLSID{1DBD6574-D6D0-4782-94C3-69619E719765}
Restart Required
Registry entry: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerShellExecuteHooks->{1DBD6574-D6D0-4782-94C3-69619E719765}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{08223B03-1B38-4A33-A83A-A4D3CC1D6E4E}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{16AF66EB-93C8-49F9-BB09-B4F87CEDCE46}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{29EA67E0-9EE5-4D1A-A056-5B7BDAC4CF97}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{58FF3024-8A83-4B1A-88E9-302F47646EEE}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{5934EA2B-B2C4-4BE7-BF7A-FBA781A12E40}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{93DEE065-EC9B-4505-ADD3-19880AD3C38F}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{950D1600-DE4A-448D-93B4-7BAE5A7A8052}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{A1A6BC2E-C6A1-43C1-8884-A31D772F42B8}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{AD794E6B-90B7-4F9D-8FD6-0C16E3298FF2}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{DA63E650-537C-4042-87BB-9D19D844680B}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{E1D19FCC-4777-4D71-B863-6A0A5B4E59BC}
Restart Required
Registry entry: HKEY_USERSS-1-5-19avs
Restart Required
Registry entry: HKEY_USERSS-1-5-20avs
Restart Required
Registry entry: HKEY_USERSS-1-5-21-1417001333-1958367476-2146625035-1003avs
Restart Required
Registry entry: HKEY_USERS.DEFAULTavs
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{021F087F-4378-545F-74FA-37D345AD7A8C}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{17DFD111-BF3A-4CB4-ADB0-88FCBFE69821}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{1E51C0FD-EE36-434B-AD2A-FD1FF3731C38}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{50A8A8C4-EDC9-4ABD-A0A2-2E2418982189}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{73AE86E6-7F03-4C3B-8980-FB1DA157D3C7}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{B29583D8-033A-4B9F-8553-7C5458F3FB8E}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{E8A3B193-77E3-4FB3-986D-F4FA4828BAFC}
Restart Required
Registry entry: HKEY_CLASSES_ROOTCLSID{F99DEFDD-200B-4410-B572-E90883D527D2}
Restart Required
Registry entry: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerShellExecuteHooks->{29EA67E0-9EE5-4D1A-A056-5B7BDAC4CF97}
Restart Required
Registry entry: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerShellExecuteHooks->{DA63E650-537C-4042-87BB-9D19D844680B}
Restart Required
Registry entry: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerShellExecuteHooks->{58FF3024-8A83-4B1A-88E9-302F47646EEE}
Restart Required
Registry entry: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerShellExecuteHooks->{950D1600-DE4A-448D-93B4-7BAE5A7A8052}
Restart Required
Registry entry: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerS