Gen.Variant.Razy.7444_41b6e53ecb
Gen:Variant.Razy.7444 (BitDefender), Trojan:MSIL/Nagoot.A (Microsoft), HEUR:Trojan.Win32.Generic (Kaspersky), Trojan.DownLoader12.46082 (DrWeb), Gen:Variant.Razy.7444 (B) (Emsisoft), GenericRXAG-IX!41B6E53ECBB5 (McAfee), ML.Attribute.HighConfidence (Symantec), Trojan.MSIL.Injector (Ikarus), Gen:Variant.Razy.7444 (FSecure), MSIL8.CERF (AVG), MSIL:GenMalicious-ETX [Trj] (Avast), Gen:Variant.Razy.7444 (AdAware), HackTool.Win32.PassView.FD, GenericAutorunWorm.YR, HackToolPassView.YR (Lavasoft MAS)
Behaviour: Trojan, Worm, HackTool, WormAutorun
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 41b6e53ecbb509f24cb93fdb18aa326f
SHA1: eefa72b1e450e977350765c93e48bb1b7177e41d
SHA256: 5181fa5baa785dddfc90166a3142650f98c93cecd1a6125fdebfd4b454d505c0
SSDeep: 12288:MsHk5NM8gkZszd5UaxrBgkp25FO9pQIkKnSTCWLn8WnyGRvfvUQo2vt:BYM8gLx5Xxr9p2W9iSnSB5yiX1o
Size: 774656 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: MicrosoftVisualC, NETexecutable, UPolyXv05_v6
Company: http://www.rohitab.com
Created at: 2017-05-13 20:53:59
Analyzed on: Windows7 SP1 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
| Behaviour | Description |
|---|---|
| WormAutorun | A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Trojan's file once a user opens a drive's folder in Windows Explorer. |
Process activity
The Trojan creates the following process(es):
vbc.exe:3824
%original file name%.exe:2784
The Trojan injects its code into the following process(es):
DllHost.exe:2548
Windows Update.exe:1240
Windows Update.exe:1468
core.exe:1912
core.exe:1368
%original file name%.exe:1760
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process Windows Update.exe:1240 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ahhhhh.xml (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Payment request confirmation (5441 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ds.ico (102 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ahhhhh.xml (0 bytes)
The process Windows Update.exe:1468 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Roaming\pid.txt (4 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\pidloc.txt (47 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\WindowsUpdate.exe (5441 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\holdermail.txt (0 bytes)
C:\%original file name%.exe (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\holderwb.txt (0 bytes)
The process core.exe:1912 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ayyyyy.xml (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Payment request confirmation (5441 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ayyyyy.xml (0 bytes)
The process core.exe:1368 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\aFFFFF.xml (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Payment request confirmation (5441 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\aFFFFF.xml (0 bytes)
The process vbc.exe:3824 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\holderwb.txt (2 bytes)
The process %original file name%.exe:2784 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\SysInfo.txt (39 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Windows Update.exe (6219 bytes)
The process %original file name%.exe:1760 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\a55555.xml (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ds.ico (102 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Payment request confirmation (5441 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\core.exe (6219 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\a55555.xml (0 bytes)
Registry activity
The process DllHost.exe:2548 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Direct3D\MostRecentApplication]
"Name" = "DllHost.exe"
The process Windows Update.exe:1240 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKCU\Software\Microsoft\Direct3D\MostRecentApplication]
"Name" = "Windows Update.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
The process Windows Update.exe:1468 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Tracing\Windows Update_RASMANCS]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\Windows Update_RASAPI32]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\Windows Update_RASMANCS]
"EnableConsoleTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\Windows Update_RASAPI32]
"EnableConsoleTracing" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"Hidden" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\Windows Update_RASAPI32]
"ConsoleTracingMask" = "4294901760"
"FileDirectory" = "%windir%\tracing"
[HKLM\SOFTWARE\Microsoft\Tracing\Windows Update_RASMANCS]
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Tracing\Windows Update_RASAPI32]
"MaxFileSize" = "1048576"
"FileTracingMask" = "4294901760"
[HKCU\Software\Classes\Local Settings\MuiCache\30\52C64B7E]
"LanguageList" = "en-US, en"
[HKLM\SOFTWARE\Microsoft\Tracing\Windows Update_RASMANCS]
"FileTracingMask" = "4294901760"
"ConsoleTracingMask" = "4294901760"
"FileDirectory" = "%windir%\tracing"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"Windows Update" = "C:\Users\"%CurrentUserName%"\AppData\Roaming\WindowsUpdate.exe"
The process core.exe:1912 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
"UNCAsIntranet" = "0"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
The process core.exe:1368 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
"UNCAsIntranet" = "0"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
The process %original file name%.exe:2784 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
"UNCAsIntranet" = "0"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
The process %original file name%.exe:1760 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached]
"{FFE2A43C-56B9-4BF5-9A79-CC6D4285608A} {00000122-0000-0000-C000-000000000046} 0xFFFF" = "01 00 00 00 00 00 00 00 CD 76 43 72 53 E4 D2 01"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKCU\Software\Microsoft\Direct3D\MostRecentApplication]
"Name" = "%original file name%.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
Dropped PE files
There are no dropped PE files.
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Trojan's file once a user opens a drive's folder in Windows Explorer.
VersionInfo
Company Name:
Product Name:
Product Version: 1.0.0.0
Legal Copyright:
Legal Trademarks:
Original Filename: Payment confirmation form1.exe
Internal Name: Payment confirmation form1.exe
File Version: 1.0.0.0
File Description: Payment request confirmation
Comments: Payment request confirmation
Language: Language Neutral
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 8192 | 772164 | 772608 | 5.07991 | fe9b52a77bccd2118aa2f9eae7249570 |
| .rsrc | 786432 | 888 | 1024 | 1.94091 | 16d0301b979e8f37d443b828794262d5 |
| .reloc | 794624 | 12 | 512 | 0.070639 | e2259f87616e13d9773522eaf4b03df8 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://whatismyipaddress.com/ | |
| smtp.gmail.com |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET / HTTP/1.1
Host: whatismyipaddress.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 59
Date: Tue, 13 Jun 2017 14:43:57 GMT
Connection: keep-aliveAccess Denied (AK1). Contact support@whatismyipaddress.comHTTP/1.1 20
0 OK..Content-Type: text/html..Content-Length: 59..Date: Tue, 13 Jun 2
017 14:43:57 GMT..Connection: keep-alive..Access Denied (AK1). Contac
t support@whatismyipaddress.com..
The Trojan connects to the servers at the folowing location(s):
.text
`.data
.rsrc
@.reloc
KERNEL32.dll
msvcrt.dll
ole32.dll
ntdll.dll
dllhost.pdb
_wcmdln
_amsg_exit
6.1.7600.16385 (win7_rtm.090713-1255)
dllhost.exe
Windows
Operating System
6.1.7600.16385
Windows Update.exe_1468:
.text
`.rsrc
@.reloc
lSystem.Resources.ResourceReader, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
v2.0.50727
CMemoryExecute.dll
CMemoryExecute
PAGE_EXECUTE_READWRITE
.ctor
System.Reflection
System.Runtime.InteropServices
System.Security.Permissions
System.Diagnostics
System.Runtime.CompilerServices
DllImportAttribute
kernel32.dll
ntdll.dll
System.Security
$8fcd4931-91a2-4e18-849b-70de34ab75df
1.0.0.0
System.Security.Permissions.SecurityPermissionAttribute, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdb
mscoree.dll
`.rdata
@.data
.rsrc
D$.SPf
2 34 567
com.apple.Safari
com.apple.WebKit2WebProcess
SELECT origin_url, action_url, username_element, username_value, password_element, password_value, signon_realm, date_created from logins
"Account","Login Name","Password","Web Site","Comments"
3.7.5
SQLite format 3
CREATE TABLE sqlite_master(
sql text
REINDEXEDESCAPEACHECKEYBEFOREIGNOREGEXPLAINSTEADDATABASELECTABLEFTHENDEFERRABLELSEXCEPTRANSACTIONATURALTERAISEXCLUSIVEXISTSAVEPOINTERSECTRIGGEREFERENCESCONSTRAINTOFFSETEMPORARYUNIQUERYATTACHAVINGROUPDATEBEGINNERELEASEBETWEENOTNULLIKECASCADELETECASECOLLATECREATECURRENT_DATEDETACHIMMEDIATEJOINSERTMATCHPLANALYZEPRAGMABORTVALUESVIRTUALIMITWHENWHERENAMEAFTEREPLACEANDEFAULTAUTOINCREMENTCASTCOLUMNCOMMITCONFLICTCROSSCURRENT_TIMESTAMPRIMARYDEFERREDISTINCTDROPFAILFROMFULLGLOBYIFISNULLORDERESTRICTOUTERIGHTROLLBACKROWUNIONUSINGVACUUMVIEWINITIALLY
SELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_logins
PK11_GetInternalKeySlot
PK11_CheckUserPassword
large file support is disabled
unknown operation
SQL logic error or missing database
foreign_keys
sqlite_compileoption_get
sqlite_compileoption_used
sqlite_source_id
sqlite_version
sqlite_attach
sqlite_detach
sqlite_stat1
sqlite_rename_parent
sqlite_rename_trigger
sqlite_rename_table
%Y-%m-%d %H:%M:%S
%Y-%m-%d
%H:%M:%S
SQLITE_
failed to allocate %u bytes of memory
failed memory resize %u to %u bytes
922337203685477580
API call with %s database connection pointer
%s-shm
%s\etilqs_
OsError 0x%x (%u)
Recovered %d frames from WAL file %s
%s-mjX
foreign key constraint failed
unable to use function %s in the requested context
abort at %d in [%s]: %s
constraint failed at %d in [%s]
cannot open savepoint - SQL statements in progress
no such savepoint: %s
cannot %s savepoint - SQL statements in progress
cannot rollback transaction - SQL statements in progress
cannot commit transaction - SQL statements in progress
sqlite_master
SELECT name, rootpage, sql FROM '%q'.%s WHERE %s ORDER BY rowid
cannot change %s wal mode from within a transaction
statement aborts at %d: [%s] %s
misuse of aliased aggregate %s
%s: %s.%s.%s
%s: %s.%s
%s: %s
%r %s BY term out of range - should be between 1 and %d
too many terms in %s BY clause
Expression tree is too large (maximum depth %d)
variable number must be between ?1 and ?%d
too many SQL variables
too many columns in %s
oversized integer: %s%s
misuse of aggregate: %s()
%.*s"%w"%s
%s%.*s"%w"
%s OR name=%Q
type='trigger' AND (%s)
there is already another table or index with this name: %s
sqlite_
table %s may not be altered
view %s may not be altered
UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d 18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
Cannot add a PRIMARY KEY column
UPDATE "%w".%s SET sql = substr(sql,1,%d) || ', ' || %Q || substr(sql,%d) WHERE type = 'table' AND name = %Q
sqlite_altertab_%s
CREATE TABLE %Q.%s(%s)
DELETE FROM %Q.%s WHERE tbl=%Q
SELECT tbl, idx, stat FROM %Q.sqlite_stat1
invalid name: "%s"
too many attached databases - max %d
database %s is already in use
unable to open database: %s
no such database: %s
cannot detach database %s
database %s is locked
%s %T cannot reference objects in database %s
object name reserved for internal use: %s
there is already an index named %s
too many columns on %s
duplicate column name: %s
default value of column [%s] is not constant
table "%s" has more than one primary key
no such collation sequence: %s
CREATE %s %.*s
UPDATE %Q.%s SET type='%s', name=%Q, tbl_name=%Q, rootpage=#%d, sql=%Q WHERE rowid=#%d
view %s is circularly defined
table %s may not be dropped
use DROP TABLE to delete table %s
use DROP VIEW to delete view %s
DELETE FROM %Q.%s WHERE tbl_name=%Q and type!='trigger'
DELETE FROM %Q.sqlite_stat1 WHERE tbl=%Q
foreign key on %s should reference only one column of table %T
number of columns in foreign key does not match the number of columns in the referenced table
unknown column "%s" in foreign key definition
indexed columns are not unique
table %s may not be indexed
views may not be indexed
virtual tables may not be indexed
there is already a table named %s
index %s already exists
sqlite_autoindex_%s_%d
table %s has no column named %s
CREATE%s INDEX %.*s
INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);no such index: %S
index associated with UNIQUE or PRIMARY KEY constraint cannot be dropped
DELETE FROM %Q.%s WHERE name=%Q AND type='index'
DELETE FROM %Q.sqlite_stat1 WHERE idx=%Q
a JOIN clause is required before %s
unable to identify the object to be reindexed
table %s may not be modified
cannot modify %s because it is a view
foreign key mismatch
table %S has %d columns but %d values were supplied
%d values for %d columns
table %S has no column named %s
%s.%s may not be NULL
PRIMARY KEY must be unique
automatic extension loading failed: %s
foreign_key_list
malformed database schema (%s)
%s - %s
unsupported file format
SELECT name, rootpage, sql FROM '%q'.%s ORDER BY rowid
unknown or unsupported join type: %T %T%s%T
RIGHT and FULL OUTER JOINs are not currently supported
a NATURAL join may not have an ON or USING clause
cannot have both ON and USING clauses in the same join
cannot join using column %s - column not present in both tables
%s.%s
%s:%d
no such index: %s
sqlite_subquery_%p_
no such table: %s
cannot create %s trigger on view: %S
cannot create INSTEAD OF trigger on table: %S
INSERT INTO %Q.%s VALUES('trigger',%Q,%Q,0,'CREATE TRIGGER %q')no such trigger: %S
no such column: %s
cannot VACUUM - SQL statements in progress
PRAGMA vacuum_db.synchronous=OFF
SELECT 'CREATE TABLE vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE type='table' AND name!='sqlite_sequence' AND rootpage>0
SELECT 'CREATE INDEX vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE sql LIKE 'CREATE INDEX %'
SELECT 'CREATE UNIQUE INDEX vacuum_db.' || substr(sql,21) FROM sqlite_master WHERE sql LIKE 'CREATE UNIQUE INDEX %'
SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
INSERT INTO vacuum_db.sqlite_master SELECT type, name, tbl_name, rootpage, sql FROM main.sqlite_master WHERE type='view' OR type='trigger' OR (type='table' AND rootpage=0)
UPDATE %Q.%s SET type='table', name=%Q, tbl_name=%Q, rootpage=0, sql=%Q WHERE rowid=#%d
vtable constructor failed: %s
vtable constructor did not declare schema: %s
no such module: %s
table %s: xBestIndex returned an invalid plan
at most %d tables in a join
cannot use index: %s
the INDEXED BY clause is not allowed on UPDATE or DELETE statements within triggers
the NOT INDEXED clause is not allowed on UPDATE or DELETE statements within triggers
unable to close due to unfinished backup operation
unknown database: %s
no such vfs: %s
database corruption at line %d of [%.10s]
misuse at line %d of [%.10s]
cannot open file at line %d of [%.10s]
sqlite3_open
sqlite3_prepare
sqlite3_step
sqlite3_column_text
sqlite3_column_int
sqlite3_column_int64
sqlite3_finalize
sqlite3_close
sqlite3_exec
f:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdb
msvcrt.dll
_wcmdln
COMCTL32.dll
VERSION.dll
FindCloseUrlCache
FindNextUrlCacheEntryW
FindFirstUrlCacheEntryW
WININET.dll
GetWindowsDirectoryW
KERNEL32.dll
EnumChildWindows
USER32.dll
GDI32.dll
comdlg32.dll
RegCloseKey
RegOpenKeyExW
RegEnumKeyExW
ADVAPI32.dll
ShellExecuteW
SHELL32.dll
ole32.dll
5JEw%Xg
<assemblyIdentity type="Win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*"></assemblyIdentity>
hXXp://VVV.usertrust.com1
3hXXp://crl.usertrust.com/AddTrustExternalCARoot.crl05
hXXp://ocsp.usertrust.com0
1hXXp://crl.usertrust.com/UTN-USERFirst-Object.crl05
1hXXp://crl.usertrust.com/UTN-USERFirst-Object.crl0t
1hXXp://crt.usertrust.com/UTNAddTrustObject_CA.crt0%
hXXps://secure.comodo.net/CPS0A
0hXXp://crl.comodoca.com/COMODOCodeSigningCA2.crl0r
0hXXp://crt.comodoca.com/COMODOCodeSigningCA2.crt0$
hXXp://ocsp.comodoca.com0
support@nirsoft.net0
t{SShv%SSW
Mail PassView
Mozilla\Profiles
Software\Mozilla\Mozilla Thunderbird
%s\Main
sqlite3.dll
nss3.dll
%programfiles%\Mozilla Thunderbird
AddExportHeaderLine
%s %s %s
HTTPMail User Name
SMTP USer Name
HTTPMail Server
SMTP Server
POP3 Password2
IMAP Password2
HTTPMail Password2
SMTP Password2
POP3 Port
IMAP Port
HTTPMail Port
SMTP Port
HTTPMail Secure Connection
SMTP Secure Connection
SMTP Display Name
SMTP Email Address
POP3 Password
IMAP Password
HTTP Password
SMTP Password
HTTP User
SMTP User
HTTP Server URL
HTTP Port
HTTPMail Use SSL
SMTP Use SSL
%s\%s
PopPort
PopPassword
SMTPAccount
SMTPServer
SMTPPort
SMTPLogSecure
SMTPPassword
%s\Accounts
LoginName
SavePasswordText
ESMTPUsername
ESMTPPassword
POP3Password
fb.dat
%s@gmail.com
%s@yahoo.com
Software\Microsoft\Windows Messaging Subsystem\Profiles
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
<meta http-equiv='content-type' content='text/html;charset=%s'>
<br><h4>%s <a href="hXXp://VVV.nirsoft.net/" target="newwin">%s</a></h4><p>
smtp
advapi32.dll
comctl32.dll
*.ini
netmsg.dll
Error %d: %s
%s (%s)
menu_%d
dialog_%d
TranslatorURL
_lng.ini
%-18s: %s
%%-%d.%ds
<td bgcolor=#%s nowrap>%s
<td bgcolor=#%s>%s
<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
bgcolor="%s"
<font color="%s">%s</font>
<%s>%s</%s>
</%s>
report.html
*.txt
*.htm;*.html
*.xml
*.csv
Software\NirSoft\MailPassView
MailPassView
/skeepass
/deleteregkey
Failed to load the executable file !
mail.account.account
mail.server
port
mail.identity
signon.signonfilename
mailbox://%s@%s
imap://%s@%s
mailbox://%s
imap://%s
signons.txt
signons.sqlite
prefs.js
Password.NET Messenger Service
User.NET Messenger Service
Passport.Net\*
ps:password
windowslive:name=
Exception %8.8X at address %8.8X in module %s
Stack Data: %s
Code Data: %s
mozsqlite3.dll
psapi.dll
pstorec.dll
5e7e8100-9138-11d1-945a-00c04fc308ff
00000000-0000-0000-0000-000000000000
220D5CD0-853A-11D0-84BC-00C04FD43F8F
220D5CD1-853A-11D0-84BC-00C04FD43F8F
220D5CC1-853A-11D0-84BC-00C04FD43F8F
417E2D75-84BD-11D0-84BB-00C04FD43F8F
shell32.dll
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
shlwapi.dll
<html><head>%s<title>%s</title></head>
%s <h3>%s</h3>
size="%d"
color="#%s"
<font color="%s">
<table border="1" cellpadding="5"><tr%s>
width="%s"
<th%s>%s%s%s
SOFTWARE\Mozilla
mozilla
%s\bin
PathToExe
\sqlite3.dll
\mozsqlite3.dll
Software\Microsoft\Windows Mail
Software\Microsoft\Windows Live Mail
SMTP_Server
SMTP_User_Name
POP3_Password2
IMAP_Password2
NNTP_Password2
SMTP_Password2
SMTP_Email_Address
SMTP_Port
NNTP_Port
IMAP_Port
POP3_Port
SMTP_Secure_Connection
*.oeaccount
\Microsoft\Windows Mail
\Microsoft\Windows Live Mail
f:\Projects\VS2005\mailpv\Release\mailpv.pdb
_acmdln
RPCRT4.dll
GetWindowsDirectoryA
RegDeleteKeyA
RegOpenKeyExA
RegEnumKeyA
RegEnumKeyExA
ShellExecuteA
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="NirSoft" type="win32"></assemblyIdentity><description>NirSoft</description><dependency><dependentAssembly><assemblyIdentity type="Win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*"></assemblyIdentity></dependentAssembly></dependency></assembly>PADPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD
Phulli.exe
Microsoft.VisualBasic
System.Windows.Forms
System.Drawing
System.Management
tapi32.dll
rtm.dll
user32.dll
Phulli.Resources.resources
Phulli.Form1.resources
Phulli.My
WindowsFormsApplicationBase
Microsoft.VisualBasic.ApplicationServices
System.Collections.Generic
.cctor
System.Threading
System.ComponentModel
System.CodeDom.Compiler
Microsoft.VisualBasic.Devices
m_MyWebServicesObjectProvider
get_WebServices
HelpKeywordAttribute
System.ComponentModel.Design
WebServices
Microsoft.VisualBasic.CompilerServices
System.Collections
ContainsKey
InvalidOperationException
MyWebServices
encryptedpassstring
encryptedsmtpstring
portstring
encryptedftphost
encryptedftpuser
encryptedftppass
useftp
websitevisitor
websiteblocker
passstring
smtpstring
ftphost
ftpuser
ftppass
WM_KEYUP
WM_KEYDOWN
WM_SYSKEYDOWN
WM_SYSKEYUP
KeyboardHandle
KeyLog
CleanedPasswordsMAIL
CleanedPasswordsWB
System.IO
get_ExecutablePath
WindowsIdentity
System.Security.Principal
set_WindowState
FormWindowState
UnhookWindowsHookEx
SetWindowsHookEx
SetWindowsHookExA
GetAsyncKeyState
vKey
HookKeyboard
UnhookKeyboard
Operators
get_Keyboard
Keyboard
get_CtrlKeyDown
get_AltKeyDown
KeyboardCallback
set_UseShellExecute
Microsoft.VisualBasic.MyServices
System.Collections.ObjectModel
MsgBox
MsgBoxResult
MsgBoxStyle
ForceSteamLogin
System.Net.NetworkInformation
get_OperationalStatus
OperationalStatus
FakemsgInstall
System.Net.Mail
SmtpClient
System.Globalization
set_Port
System.Net
Microsoft.Win32
RegistryKey
OpenSubKey
System.Security.Cryptography
System.Text
set_Key
stealWebroswers
WebClient
readweb
System.IO.Compression
SendLogsFTP
FtpWebRequest
WebRequest
UploadFTP
secretKey
set_KeySize
get_KeySize
System.Net.Sockets
virtualKey
KeyboardHookDelegate
get_Msg
Phulli.My.Resources
System.Resources
get_CMemoryExecute
get_WebBrowserPassView
WebBrowserPassView
System.Configuration
8.0.0.0
My.Computer
My.Application
My.User
My.Forms
My.WebServices
System.Windows.Forms.Form
My.MyProject.Forms
4System.Web.Services.Protocols.SoapHttpClientProtocol
3System.Resources.Tools.StronglyTypedResourceBuilder
4.0.0.0
KMicrosoft.VisualStudio.Editors.SettingsDesigner.SettingsSingleFileGenerator
11.0.0.0
My.Settings
$1f128a07-8438-4dc0-8205-570da0ccce8d
_CorExeMain
.nn>Q
].WF#y
.ZtJY~U
K.AufBT,I.Xp.tKi[QDUDpBUUR%UURRs?=.MF<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/><requestedExecutionLevel level="asInvoker" uiAccess="false"/>%%0.ßApple Computer\Preferences\keychain.plistLoadPasswordsIELoadPasswordsFirefoxLoadPasswordsChromeLoadPasswordsOperaLoadPasswordsSafariLoadPasswordsSeaMonkeyUseFirefoxProfileFolderUseFirefoxInstallFolderUseChromeProfileFolderUseOperaPasswordFileFirefoxProfileFolderFirefoxInstallFolderChromeProfileFolderOperaPasswordFileAadvapi32.dllcrypt32.dll77770555544333255554433325555443332wand.dat@nss3.dllSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe%programfiles%\Sea Monkey%programfiles%\Mozilla Firefox-signons.txtsignons2.txtsignons3.txt@dllhost.exetaskhost.exetaskhostex.exeMicrosoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.datindex.dathXXps://VVV.google.com/accounts/serviceloginhXXp://VVV.facebook.com/hXXps://login.yahoo.com/config/loginhXXp://hXXps://PTF://@history.datplaces.sqliteMozilla\Firefox\ProfilesMozilla\SeaMonkey\ProfilesMozilla\SeaMonkeyMozilla\Firefoxprofiles.iniProfile%dtntdll.dllsWeb DataLogin DataGoogle\Chrome\User DataGoogle\Chrome SxS\User DataOpera\Opera\wand.datOpera\Opera7\profile\wand.datOpera@"%s"Ashell32.dll\nss3.dll.savevaultcli.dllabe2869f-9b47-4cd9-a358-c22904dba7f7Copy &Password&HTML Report - All ItemsHTML R&eport - Selected ItemsHTML Report - All ItemsHTML Report - Selected ItemsLoad Passwords From...Google ChromeMozilla FirefoxSeaMonkeyFirefox OptionsMaster password:Firefox Profile:Firefox Installation:Chrome OptionsOpera Optionswand.dat file:%d Passwords, %d SelectedWeb Browser Passwords%Choose another Firefox profile folder)Choose the installation folder of Firefox,Choose another profile of Chrome Web browser,Choose the password file of Opera (wand.dat)Loading... %dKeePass csv fileOpera Password FileFirefox 1.xFirefox 2.xFirefox 3.0FirefoxChromeWeb BrowserPasswordPassword StrengthPassword FieldWebBrowserPassView.exeVVV.google.com/Please log in to your Gmail accountVVV.google.com:443/Please log in to your Gmail accountVVV.google.com/Please log in to your Google AccountVVV.google.com:443/Please log in to your Google AccountVVV.google.comdWindowsLive:name=*82BD0E67-9FEA-4748-8672-D5EFE5B779B0Copy Password%d itemsSelect Eudora.ini filename/Select the location of Thunderbird installationEudora.ini fileSMTPWindows MailWindows Live MailServer PortSMTP Server PortMail Password Recoverymailpv.exenoftpDisablecmd\Windows Update.exe\WindowsUpdate.exeSysInfo.txt\pid.txt\pidloc.txtHawkEyeKeylogger\Mozilla\Firefox\Profiles127.0.0.1\SteamAppData.vdf\ClientRegistry.blobDear HawkEye Customers!HawkEye Logger Details:Keylogger Enabled:Operating System:HawkEye_Keylogger_Execution_Confirmed_HawkEye Keylogger | Execution Confirmed |HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advancedautorun.infopen=Sys.exeSys.exeSoftware\Microsoft\Windows\CurrentVersion\RunWindows UpdateC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe\bitcoin\wallet.dat_wallet.datwallet.datMicrosoft.NET\Framework\v2.0.50727\vbc.exeholdermail.txt"holdermail.txtOperating System Intel RecoveryOperating System Platform:Operating System Version:WEB Browser Password StealerMail Messenger Password StealerJDownloader Password StealerHawkEye_Keylogger_Stealer_Records_HawkEye Keylogger | Stealer Records |holderwb.txt"holderwb.txtC:\Users\_Pin0.jpeg_Pin1.jpeg_Pin2.jpeg_Pin3.jpeg_Pin4.jpegHawkEye Keylogger | RuneScape Stealer |HawkEye Keylogger | BitCoin Stealer |Steals the Wallet.DAT file that holds the users bitcoin currency.\.minecraft\lastloginHawkEye Keylogger | MineCraft Stealer |As you can see, this email has the attached file, containing MineCraft Username and Password. Please download it then decrypt the login credential / information with MineCraft Decryptor.HawkEye Keylogger | Keylog Records |Keylog Records.jpegHawkEye_Keylogger_Keylog_Records_hXXp://whatismyipaddress.com/Phulli.Resources:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeWindows Update.exe_1468_rwx_00400000_0009E000:
.text`.rsrc@.reloclSystem.Resources.ResourceReader, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSetv2.0.50727CMemoryExecute.dllCMemoryExecutePAGE_EXECUTE_READWRITE.ctorSystem.ReflectionSystem.Runtime.InteropServicesSystem.Security.PermissionsSystem.DiagnosticsSystem.Runtime.CompilerServicesDllImportAttributekernel32.dllntdll.dllSystem.Security$8fcd4931-91a2-4e18-849b-70de34ab75df1.0.0.0System.Security.Permissions.SecurityPermissionAttribute, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdbmscoree.dll`.rdata@.data.rsrcD$.SPf2 34 567com.apple.Safaricom.apple.WebKit2WebProcessSELECT origin_url, action_url, username_element, username_value, password_element, password_value, signon_realm, date_created from logins"Account","Login Name","Password","Web Site","Comments"3.7.5SQLite format 3CREATE TABLE sqlite_master(sql textREINDEXEDESCAPEACHECKEYBEFOREIGNOREGEXPLAINSTEADDATABASELECTABLEFTHENDEFERRABLELSEXCEPTRANSACTIONATURALTERAISEXCLUSIVEXISTSAVEPOINTERSECTRIGGEREFERENCESCONSTRAINTOFFSETEMPORARYUNIQUERYATTACHAVINGROUPDATEBEGINNERELEASEBETWEENOTNULLIKECASCADELETECASECOLLATECREATECURRENT_DATEDETACHIMMEDIATEJOINSERTMATCHPLANALYZEPRAGMABORTVALUESVIRTUALIMITWHENWHERENAMEAFTEREPLACEANDEFAULTAUTOINCREMENTCASTCOLUMNCOMMITCONFLICTCROSSCURRENT_TIMESTAMPRIMARYDEFERREDISTINCTDROPFAILFROMFULLGLOBYIFISNULLORDERESTRICTOUTERIGHTROLLBACKROWUNIONUSINGVACUUMVIEWINITIALLYSELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_loginsPK11_GetInternalKeySlotPK11_CheckUserPasswordlarge file support is disabledunknown operationSQL logic error or missing databaseforeign_keyssqlite_compileoption_getsqlite_compileoption_usedsqlite_source_idsqlite_versionsqlite_attachsqlite_detachsqlite_stat1sqlite_rename_parentsqlite_rename_triggersqlite_rename_table%Y-%m-%d %H:%M:%S%Y-%m-%d%H:%M:%SSQLITE_failed to allocate %u bytes of memoryfailed memory resize %u to %u bytes922337203685477580API call with %s database connection pointer%s-shm%s\etilqs_OsError 0x%x (%u)Recovered %d frames from WAL file %s%s-mjXforeign key constraint failedunable to use function %s in the requested contextabort at %d in [%s]: %sconstraint failed at %d in [%s]cannot open savepoint - SQL statements in progressno such savepoint: %scannot %s savepoint - SQL statements in progresscannot rollback transaction - SQL statements in progresscannot commit transaction - SQL statements in progresssqlite_masterSELECT name, rootpage, sql FROM '%q'.%s WHERE %s ORDER BY rowidcannot change %s wal mode from within a transactionstatement aborts at %d: [%s] %smisuse of aliased aggregate %s%s: %s.%s.%s%s: %s.%s%s: %s%r %s BY term out of range - should be between 1 and %dtoo many terms in %s BY clauseExpression tree is too large (maximum depth %d)variable number must be between ?1 and ?%dtoo many SQL variablestoo many columns in %soversized integer: %s%smisuse of aggregate: %s()%.*s"%w"%s%s%.*s"%w"%s OR name=%Qtype='trigger' AND (%s)there is already another table or index with this name: %ssqlite_table %s may not be alteredview %s may not be alteredUPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d 18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;Cannot add a PRIMARY KEY columnUPDATE "%w".%s SET sql = substr(sql,1,%d) || ', ' || %Q || substr(sql,%d) WHERE type = 'table' AND name = %Qsqlite_altertab_%sCREATE TABLE %Q.%s(%s)DELETE FROM %Q.%s WHERE tbl=%QSELECT tbl, idx, stat FROM %Q.sqlite_stat1invalid name: "%s"too many attached databases - max %ddatabase %s is already in useunable to open database: %sno such database: %scannot detach database %sdatabase %s is locked%s %T cannot reference objects in database %sobject name reserved for internal use: %sthere is already an index named %stoo many columns on %sduplicate column name: %sdefault value of column [%s] is not constanttable "%s" has more than one primary keyno such collation sequence: %sCREATE %s %.*sUPDATE %Q.%s SET type='%s', name=%Q, tbl_name=%Q, rootpage=#%d, sql=%Q WHERE rowid=#%dview %s is circularly definedtable %s may not be droppeduse DROP TABLE to delete table %suse DROP VIEW to delete view %sDELETE FROM %Q.%s WHERE tbl_name=%Q and type!='trigger'DELETE FROM %Q.sqlite_stat1 WHERE tbl=%Qforeign key on %s should reference only one column of table %Tnumber of columns in foreign key does not match the number of columns in the referenced tableunknown column "%s" in foreign key definitionindexed columns are not uniquetable %s may not be indexedviews may not be indexedvirtual tables may not be indexedthere is already a table named %sindex %s already existssqlite_autoindex_%s_%dtable %s has no column named %sCREATE%s INDEX %.*sINSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);no such index: %Sindex associated with UNIQUE or PRIMARY KEY constraint cannot be droppedDELETE FROM %Q.%s WHERE name=%Q AND type='index'DELETE FROM %Q.sqlite_stat1 WHERE idx=%Qa JOIN clause is required before %sunable to identify the object to be reindexedtable %s may not be modifiedcannot modify %s because it is a viewforeign key mismatchtable %S has %d columns but %d values were supplied%d values for %d columnstable %S has no column named %s%s.%s may not be NULLPRIMARY KEY must be uniqueautomatic extension loading failed: %sforeign_key_listmalformed database schema (%s)%s - %sunsupported file formatSELECT name, rootpage, sql FROM '%q'.%s ORDER BY rowidunknown or unsupported join type: %T %T%s%TRIGHT and FULL OUTER JOINs are not currently supporteda NATURAL join may not have an ON or USING clausecannot have both ON and USING clauses in the same joincannot join using column %s - column not present in both tables%s.%s%s:%dno such index: %ssqlite_subquery_%p_no such table: %scannot create %s trigger on view: %Scannot create INSTEAD OF trigger on table: %SINSERT INTO %Q.%s VALUES('trigger',%Q,%Q,0,'CREATE TRIGGER %q')no such trigger: %Sno such column: %scannot VACUUM - SQL statements in progressPRAGMA vacuum_db.synchronous=OFFSELECT 'CREATE TABLE vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE type='table' AND name!='sqlite_sequence' AND rootpage>0SELECT 'CREATE INDEX vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE sql LIKE 'CREATE INDEX %'SELECT 'CREATE UNIQUE INDEX vacuum_db.' || substr(sql,21) FROM sqlite_master WHERE sql LIKE 'CREATE UNIQUE INDEX %'SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';INSERT INTO vacuum_db.sqlite_master SELECT type, name, tbl_name, rootpage, sql FROM main.sqlite_master WHERE type='view' OR type='trigger' OR (type='table' AND rootpage=0)UPDATE %Q.%s SET type='table', name=%Q, tbl_name=%Q, rootpage=0, sql=%Q WHERE rowid=#%dvtable constructor failed: %svtable constructor did not declare schema: %sno such module: %stable %s: xBestIndex returned an invalid planat most %d tables in a joincannot use index: %sthe INDEXED BY clause is not allowed on UPDATE or DELETE statements within triggersthe NOT INDEXED clause is not allowed on UPDATE or DELETE statements within triggersunable to close due to unfinished backup operationunknown database: %sno such vfs: %sdatabase corruption at line %d of [%.10s]misuse at line %d of [%.10s]cannot open file at line %d of [%.10s]sqlite3_opensqlite3_preparesqlite3_stepsqlite3_column_textsqlite3_column_intsqlite3_column_int64sqlite3_finalizesqlite3_closesqlite3_execf:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdbmsvcrt.dll_wcmdlnCOMCTL32.dllVERSION.dllFindCloseUrlCacheFindNextUrlCacheEntryWFindFirstUrlCacheEntryWWININET.dllGetWindowsDirectoryWKERNEL32.dllEnumChildWindowsUSER32.dllGDI32.dllcomdlg32.dllRegCloseKeyRegOpenKeyExWRegEnumKeyExWADVAPI32.dllShellExecuteWSHELL32.dllole32.dll5JEw%Xg<assemblyIdentity type="Win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*"></assemblyIdentity>hXXp://VVV.usertrust.com13hXXp://crl.usertrust.com/AddTrustExternalCARoot.crl05hXXp://ocsp.usertrust.com01hXXp://crl.usertrust.com/UTN-USERFirst-Object.crl051hXXp://crl.usertrust.com/UTN-USERFirst-Object.crl0t1hXXp://crt.usertrust.com/UTNAddTrustObject_CA.crt0%hXXps://secure.comodo.net/CPS0A0hXXp://crl.comodoca.com/COMODOCodeSigningCA2.crl0r0hXXp://crt.comodoca.com/COMODOCodeSigningCA2.crt0$hXXp://ocsp.comodoca.com0support@nirsoft.net0t{SShv%SSWMail PassViewMozilla\ProfilesSoftware\Mozilla\Mozilla Thunderbird%s\Mainsqlite3.dllnss3.dll%programfiles%\Mozilla ThunderbirdAddExportHeaderLine%s %s %sHTTPMail User NameSMTP USer NameHTTPMail ServerSMTP ServerPOP3 Password2IMAP Password2HTTPMail Password2SMTP Password2POP3 PortIMAP PortHTTPMail PortSMTP PortHTTPMail Secure ConnectionSMTP Secure ConnectionSMTP Display NameSMTP Email AddressPOP3 PasswordIMAP PasswordHTTP PasswordSMTP PasswordHTTP UserSMTP UserHTTP Server URLHTTP PortHTTPMail Use SSLSMTP Use SSL%s\%sPopPortPopPasswordSMTPAccountSMTPServerSMTPPortSMTPLogSecureSMTPPassword%s\AccountsLoginNameSavePasswordTextESMTPUsernameESMTPPasswordPOP3Passwordfb.dat%s@gmail.com%s@yahoo.comSoftware\Microsoft\Windows Messaging Subsystem\ProfilesSoftware\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles<meta http-equiv='content-type' content='text/html;charset=%s'><br><h4>%s <a href="hXXp://VVV.nirsoft.net/" target="newwin">%s</a></h4><p>smtpadvapi32.dllcomctl32.dll*.ininetmsg.dllError %d: %s%s (%s)menu_%ddialog_%dTranslatorURL_lng.ini%-18s: %s%%-%d.%ds<td bgcolor=#%s nowrap>%s<td bgcolor=#%s>%s<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%sbgcolor="%s"<font color="%s">%s</font><%s>%s</%s></%s>report.html*.txt*.htm;*.html*.xml*.csvSoftware\NirSoft\MailPassViewMailPassView/skeepass/deleteregkeyFailed to load the executable file !mail.account.accountmail.serverportmail.identitysignon.signonfilenamemailbox://%s@%simap://%s@%smailbox://%simap://%ssignons.txtsignons.sqliteprefs.jsPassword.NET Messenger ServiceUser.NET Messenger ServicePassport.Net\*ps:passwordwindowslive:name=Exception %8.8X at address %8.8X in module %sStack Data: %sCode Data: %smozsqlite3.dllpsapi.dllpstorec.dll5e7e8100-9138-11d1-945a-00c04fc308ff00000000-0000-0000-0000-000000000000220D5CD0-853A-11D0-84BC-00C04FD43F8F220D5CD1-853A-11D0-84BC-00C04FD43F8F220D5CC1-853A-11D0-84BC-00C04FD43F8F417E2D75-84BD-11D0-84BB-00C04FD43F8Fshell32.dllSoftware\Microsoft\Windows\CurrentVersion\Explorer\Shell Foldersshlwapi.dll<html><head>%s<title>%s</title></head>%s <h3>%s</h3>size="%d"color="#%s"<font color="%s"><table border="1" cellpadding="5"><tr%s>width="%s"<th%s>%s%s%sSOFTWARE\Mozillamozilla%s\binPathToExe\sqlite3.dll\mozsqlite3.dllSoftware\Microsoft\Windows MailSoftware\Microsoft\Windows Live MailSMTP_ServerSMTP_User_NamePOP3_Password2IMAP_Password2NNTP_Password2SMTP_Password2SMTP_Email_AddressSMTP_PortNNTP_PortIMAP_PortPOP3_PortSMTP_Secure_Connection*.oeaccount\Microsoft\Windows Mail\Microsoft\Windows Live Mailf:\Projects\VS2005\mailpv\Release\mailpv.pdb_acmdlnRPCRT4.dllGetWindowsDirectoryARegDeleteKeyARegOpenKeyExARegEnumKeyARegEnumKeyExAShellExecuteA<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="NirSoft" type="win32"></assemblyIdentity><description>NirSoft</description><dependency><dependentAssembly><assemblyIdentity type="Win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*"></assemblyIdentity></dependentAssembly></dependency></assembly>PADPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADPhulli.exeMicrosoft.VisualBasicSystem.Windows.FormsSystem.DrawingSystem.Managementtapi32.dllrtm.dlluser32.dllPhulli.Resources.resourcesPhulli.Form1.resourcesPhulli.MyWindowsFormsApplicationBaseMicrosoft.VisualBasic.ApplicationServicesSystem.Collections.Generic.cctorSystem.ThreadingSystem.ComponentModelSystem.CodeDom.CompilerMicrosoft.VisualBasic.Devicesm_MyWebServicesObjectProviderget_WebServicesHelpKeywordAttributeSystem.ComponentModel.DesignWebServicesMicrosoft.VisualBasic.CompilerServicesSystem.CollectionsContainsKeyInvalidOperationExceptionMyWebServicesencryptedpassstringencryptedsmtpstringportstringencryptedftphostencryptedftpuserencryptedftppassuseftpwebsitevisitorwebsiteblockerpassstringsmtpstringftphostftpuserftppassWM_KEYUPWM_KEYDOWNWM_SYSKEYDOWNWM_SYSKEYUPKeyboardHandleKeyLogCleanedPasswordsMAILCleanedPasswordsWBSystem.IOget_ExecutablePathWindowsIdentitySystem.Security.Principalset_WindowStateFormWindowStateUnhookWindowsHookExSetWindowsHookExSetWindowsHookExAGetAsyncKeyStatevKeyHookKeyboardUnhookKeyboardOperatorsget_KeyboardKeyboardget_CtrlKeyDownget_AltKeyDownKeyboardCallbackset_UseShellExecuteMicrosoft.VisualBasic.MyServicesSystem.Collections.ObjectModelMsgBoxMsgBoxResultMsgBoxStyleForceSteamLoginSystem.Net.NetworkInformationget_OperationalStatusOperationalStatusFakemsgInstallSystem.Net.MailSmtpClientSystem.Globalizationset_PortSystem.NetMicrosoft.Win32RegistryKeyOpenSubKeySystem.Security.CryptographySystem.Textset_KeystealWebroswersWebClientreadwebSystem.IO.CompressionSendLogsFTPFtpWebRequestWebRequestUploadFTPsecretKeyset_KeySizeget_KeySizeSystem.Net.SocketsvirtualKeyKeyboardHookDelegateget_MsgPhulli.My.ResourcesSystem.Resourcesget_CMemoryExecuteget_WebBrowserPassViewWebBrowserPassViewSystem.Configuration8.0.0.0My.ComputerMy.ApplicationMy.UserMy.FormsMy.WebServicesSystem.Windows.Forms.FormMy.MyProject.Forms4System.Web.Services.Protocols.SoapHttpClientProtocol3System.Resources.Tools.StronglyTypedResourceBuilder4.0.0.0KMicrosoft.VisualStudio.Editors.SettingsDesigner.SettingsSingleFileGenerator11.0.0.0My.Settings$1f128a07-8438-4dc0-8205-570da0ccce8d_CorExeMain.nn>Q].WF#y.ZtJY~U K.AufBT,I.Xp.tKi[QDUDpBUUR%UURRs?=.MF<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/><requestedExecutionLevel level="asInvoker" uiAccess="false"/>%%0.ßApple Computer\Preferences\keychain.plistLoadPasswordsIELoadPasswordsFirefoxLoadPasswordsChromeLoadPasswordsOperaLoadPasswordsSafariLoadPasswordsSeaMonkeyUseFirefoxProfileFolderUseFirefoxInstallFolderUseChromeProfileFolderUseOperaPasswordFileFirefoxProfileFolderFirefoxInstallFolderChromeProfileFolderOperaPasswordFileAadvapi32.dllcrypt32.dll77770555544333255554433325555443332wand.dat@nss3.dllSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe%programfiles%\Sea Monkey%programfiles%\Mozilla Firefox-signons.txtsignons2.txtsignons3.txt@dllhost.exetaskhost.exetaskhostex.exeMicrosoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.datindex.dathXXps://VVV.google.com/accounts/serviceloginhXXp://VVV.facebook.com/hXXps://login.yahoo.com/config/loginhXXp://hXXps://PTF://@history.datplaces.sqliteMozilla\Firefox\ProfilesMozilla\SeaMonkey\ProfilesMozilla\SeaMonkeyMozilla\Firefoxprofiles.iniProfile%dtntdll.dllsWeb DataLogin DataGoogle\Chrome\User DataGoogle\Chrome SxS\User DataOpera\Opera\wand.datOpera\Opera7\profile\wand.datOpera@"%s"Ashell32.dll\nss3.dll.savevaultcli.dllabe2869f-9b47-4cd9-a358-c22904dba7f7Copy &Password&HTML Report - All ItemsHTML R&eport - Selected ItemsHTML Report - All ItemsHTML Report - Selected ItemsLoad Passwords From...Google ChromeMozilla FirefoxSeaMonkeyFirefox OptionsMaster password:Firefox Profile:Firefox Installation:Chrome OptionsOpera Optionswand.dat file:%d Passwords, %d SelectedWeb Browser Passwords%Choose another Firefox profile folder)Choose the installation folder of Firefox,Choose another profile of Chrome Web browser,Choose the password file of Opera (wand.dat)Loading... %dKeePass csv fileOpera Password FileFirefox 1.xFirefox 2.xFirefox 3.0FirefoxChromeWeb BrowserPasswordPassword StrengthPassword FieldWebBrowserPassView.exeVVV.google.com/Please log in to your Gmail accountVVV.google.com:443/Please log in to your Gmail accountVVV.google.com/Please log in to your Google AccountVVV.google.com:443/Please log in to your Google AccountVVV.google.comdWindowsLive:name=*82BD0E67-9FEA-4748-8672-D5EFE5B779B0Copy Password%d itemsSelect Eudora.ini filename/Select the location of Thunderbird installationEudora.ini fileSMTPWindows MailWindows Live MailServer PortSMTP Server PortMail Password Recoverymailpv.exenoftpDisablecmd\Windows Update.exe\WindowsUpdate.exeSysInfo.txt\pid.txt\pidloc.txtHawkEyeKeylogger\Mozilla\Firefox\Profiles127.0.0.1\SteamAppData.vdf\ClientRegistry.blobDear HawkEye Customers!HawkEye Logger Details:Keylogger Enabled:Operating System:HawkEye_Keylogger_Execution_Confirmed_HawkEye Keylogger | Execution Confirmed |HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advancedautorun.infopen=Sys.exeSys.exeSoftware\Microsoft\Windows\CurrentVersion\RunWindows UpdateC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe\bitcoin\wallet.dat_wallet.datwallet.datMicrosoft.NET\Framework\v2.0.50727\vbc.exeholdermail.txt"holdermail.txtOperating System Intel RecoveryOperating System Platform:Operating System Version:WEB Browser Password StealerMail Messenger Password StealerJDownloader Password StealerHawkEye_Keylogger_Stealer_Records_HawkEye Keylogger | Stealer Records |holderwb.txt"holderwb.txtC:\Users\_Pin0.jpeg_Pin1.jpeg_Pin2.jpeg_Pin3.jpeg_Pin4.jpegHawkEye Keylogger | RuneScape Stealer |HawkEye Keylogger | BitCoin Stealer |Steals the Wallet.DAT file that holds the users bitcoin currency.\.minecraft\lastloginHawkEye Keylogger | MineCraft Stealer |As you can see, this email has the attached file, containing MineCraft Username and Password. Please download it then decrypt the login credential / information with MineCraft Decryptor.HawkEye Keylogger | Keylog Records |Keylog Records.jpegHawkEye_Keylogger_Keylog_Records_hXXp://whatismyipaddress.com/Phulli.Resources:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeWindows Update.exe_1468_rwx_006B0000_00007000:
%skjZX.nkjZX
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
vbc.exe:3824
%original file name%.exe:2784 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ahhhhh.xml (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Payment request confirmation (5441 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ds.ico (102 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\pid.txt (4 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\pidloc.txt (47 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\WindowsUpdate.exe (5441 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ayyyyy.xml (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\aFFFFF.xml (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\holderwb.txt (2 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\SysInfo.txt (39 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Windows Update.exe (6219 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\a55555.xml (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\core.exe (6219 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"Windows Update" = "C:\Users\"%CurrentUserName%"\AppData\Roaming\WindowsUpdate.exe" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Find and delete all copies of the worm's file together with "autorun.inf" scripts on removable drives.
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.