Gen.Variant.Zusy.107066_647051fb68
HEUR:Trojan.Win32.Generic (Kaspersky), Gen:Variant.Zusy.107066 (B) (Emsisoft), Gen:Variant.Zusy.107066 (AdAware), Trojan-PSW.Win32.Zbot.6.FD, GenericInjector.YR, BackdoorCaphaw_QKKBAL.YR, TrojanPSWZbot.YR (Lavasoft MAS)
Behaviour: Trojan-PSW, Trojan, Backdoor
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 647051fb684825194ba8435dd02b52a5
SHA1: 43f200da697f4459bc9f5d075757d00a249f03a5
SHA256: 0b2153670e710a1f9a6892493d55f495c6197b98e48826b8d7af7021a7a30894
SSDeep: 6144:pKSU5EyclVSzSgspPmVI8bSWt8L3GIjvtMjxhyqWHEr:pcfclXgslmqM8L2kvtP
Size: 343040 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: MicrosoftVisualC, NETexecutable, UPolyXv05_v6
Company: no certificate found
Created at: 2014-08-23 12:56:45
Analyzed on: Windows7 SP1 32-bit
Summary:
Trojan-PSW. Trojan program intended for stealing users passwords.
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
WinMail.exe:1720
%original file name%.exe:2920
bamyg.exe:600
The Trojan injects its code into the following process(es):
taskhost.exe:1940
Dwm.exe:2008
Explorer.EXE:2024
conhost.exe:3352
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process WinMail.exe:1720 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\WindowsMail.MSMessageStore (46008 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\TarD079.tmp (2712 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Drafts\winmail.fol (560 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\7FA01E3F-00000001.eml (1924 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Backup\temp\WindowsMail.pat (16 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ppcrlui_1720_2 (1281 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Junk E-mail\winmail.fol (592 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Backup\temp\edb00002.log (2 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Sent Items\winmail.fol (592 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\CabD078.tmp (51 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Deleted Items\winmail.fol (608 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\7FA01E3F-00000001.eml:OECustomProperty (260 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Outbox\winmail.fol (560 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\winmail.fol (544 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\tmp.edb (1728 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\edb.log (27096 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\edb.chk (300 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E6024EAC88E6B6165D49FE3C95ADD735 (558 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Backup\temp\WindowsMail.MSMessageStore (99 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E6024EAC88E6B6165D49FE3C95ADD735 (968 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\WindowsMail.pat (400 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\edbtmp.log (3466 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Backup\old\WindowsMail.pat (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\TarD079.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\edb00001.log (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\CabD078.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Backup\old\WindowsMail.MSMessageStore (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\edbtmp.log (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ppcrlui_1720_2.ui (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ppcrlui_1720_2 (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Backup\old\edb00001.log (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Backup\old (0 bytes)
The process %original file name%.exe:2920 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\tmp13faec87.bat (179 bytes)
C:\debug.txt (6090 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Amhe\bamyg.exe (687 bytes)
The process bamyg.exe:600 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\debug.txt (25704 bytes)
Registry activity
The process WinMail.exe:1720 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\IdentityCRL\Dynamic Salt]
"Size" = "330"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKCU\Software\Microsoft\Windows Mail]
"Compact Check Count" = "2"
"Settings Upgraded" = "10"
[HKCU\Software\Classes\Local Settings\MuiCache\30\52C64B7E]
"LanguageList" = "en-US, en"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKCU\Software\Microsoft\Windows Mail\Junk Mail\Block Senders List]
"Version" = "327680"
[HKCU\Identities\{C692FCB0-9162-422E-94A4-4CD072B19CA9}]
"Identity Ordinal" = "1"
[HKCU\Software\Microsoft\Windows Mail]
"LastBackup" = "E1 07 02 00 03 00 16 00 17 00 23 00 17 00 D1 01"
"Running" = "1"
"V7StoreMigDone" = "01 00 00 00"
"StoreMigratedV5" = "1"
[HKCU\Software\Microsoft\Windows Mail\Junk Mail\Safe Senders List]
"Version" = "327680"
[HKCU\Software\Microsoft\Windows Mail\Mail]
"Welcome Message" = "0"
[HKCU\Software\Microsoft\Windows Mail]
"SpoolerDlgPos" = "2C 00 00 00 00 00 00 00 01 00 00 00 FF FF FF FF"
[HKCU\Software\Microsoft\IdentityCRL\Dynamic Salt]
"Value" = "01 00 00 00 D0 8C 9D DF 01 15 D1 11 8C 7A 00 C0"
[HKCU\Identities]
"Identity Ordinal" = "2"
[HKCU\Software\Microsoft\Windows Mail\Mail]
"Secure Safe Attachments" = "1"
"Default_CodePage" = "28591"
[HKCU\Software\Microsoft\WAB]
"NamedPropCount" = "1"
[HKCU\Software\Microsoft\IAM\Accounts]
"ConnectionSettingsMigrated" = "1"
[HKCU\Software\Microsoft\Windows Mail]
"SpoolerTack" = "0"
[HKCU\Software\Microsoft\IAM]
"Default News Account" = "account{CE54EE8F-8454-4E11-A69C-0E6F9BED6C0A}.oeaccount"
"Default LDAP Account" = "account{5F33D8D7-3326-4E0C-969F-F201824EF068}.oeaccount"
[HKCU\Software\Microsoft\Windows Mail]
"lastrun" = "3E 68 10 5A 64 8D D2 01"
[HKCU\Software\Microsoft\Windows Mail\Mail]
"Safe Attachments" = "1"
[HKCU\Software\Microsoft\IAM]
"Server ID" = "2"
[HKCU\Software\Microsoft\WAB]
"NamedProps" = "04 20 06 00 00 00 00 00 C0 00 00 00 00 00 00 46"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\WAB]
"NamedPropCount"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKCU\Identities]
"Changing"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Identities]
"IncomingID"
"OutgoingID"
[HKCU\Software\Microsoft\WAB]
"NamedProps"
Dropped PE files
| MD5 | File path |
|---|---|
| 7f8611ca23012901531cf87b536e64a7 | c:\Users\"%CurrentUserName%"\AppData\Roaming\Amhe\bamyg.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
The Trojan installs the following user-mode hooks in WININET.dll:
HttpSendRequestExA
HttpSendRequestA
HttpSendRequestW
HttpSendRequestExW
InternetReadFileExA
InternetQueryDataAvailable
InternetReadFile
HttpQueryInfoA
InternetCloseHandle
The Trojan installs the following user-mode hooks in CRYPT32.dll:
PFXImportCertStore
The Trojan installs the following user-mode hooks in USER32.dll:
SetCursorPos
ReleaseCapture
SetCapture
GetMessagePos
DefDlgProcW
CallWindowProcA
DefMDIChildProcA
DefFrameProcA
GetUpdateRgn
DefFrameProcW
DefMDIChildProcW
DefDlgProcA
GetClipboardData
GetMessageW
TranslateMessage
PeekMessageW
EndPaint
BeginPaint
GetDC
ReleaseDC
DefWindowProcW
GetWindowDC
GetDCEx
CallWindowProcW
PeekMessageA
GetMessageA
RegisterClassExW
RegisterClassW
RegisterClassA
DefWindowProcA
GetUpdateRect
GetCursorPos
GetCapture
RegisterClassExA
OpenInputDesktop
SwitchDesktop
The Trojan installs the following user-mode hooks in WS2_32.dll:
send
WSASend
closesocket
The Trojan installs the following user-mode hooks in kernel32.dll:
GetFileAttributesExW
The Trojan installs the following user-mode hooks in ntdll.dll:
LdrLoadDll
ZwCreateUserProcess
Propagation
VersionInfo
Company Name: VMware, Inc.
Product Name: VMware Tools
Product Version: 9.6.0 build-1294478
Legal Copyright: Copyright (c) 1998-2013 VMware, Inc.
Legal Trademarks:
Original Filename: storePwd.exe
Internal Name: storePwd
File Version: 9.6.0 build-1294478
File Description: VMware easy install utility
Comments:
Language: Chinese (Simplified, PRC)
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 8192 | 185364 | 185856 | 5.41858 | 0148af41266a86a87705c1181a29d766 |
| .rsrc | 196608 | 155716 | 156160 | 4.34805 | 30ef3ff02f9139aa38e93fc8792619ff |
| .reloc | 360448 | 12 | 512 | 0.070639 | 35cc3f31a2ed0bee44d35e454b0b0b94 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://a1363.dscg.akamai.net/pki/crl/products/CodeSignPCA.crl | |
| hxxp://clients.l.google.com/ocsp/MEkwRzBFMEMwQTAJBgUrDgMCGgUABBTy4Gr5hYodjXCbSRkjeqm1Gih+ZAQUSt0GFhu89mi1dvWBtrtiGrpagS8CCEAdrg7dKqon | |
| hxxp://crl.microsoft.com/pki/crl/products/CodeSignPCA.crl | |
| hxxp://clients1.google.com/ocsp/MEkwRzBFMEMwQTAJBgUrDgMCGgUABBTy4Gr5hYodjXCbSRkjeqm1Gih+ZAQUSt0GFhu89mi1dvWBtrtiGrpagS8CCEAdrg7dKqon | |
| time.windows.com | |
| dns.msftncsi.com |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET /pki/crl/products/CodeSignPCA.crl HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: crl.microsoft.com
HTTP/1.1 200 OK
Content-Type: application/pkix-crl
Last-Modified: Mon, 16 Apr 2012 23:49:48 GMT
Accept-Ranges: bytes
ETag: "0f6669b2b1ccd1:0"
Server: Microsoft-IIS/8.5
VTag: 438195957300000000
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Content-Length: 558
Cache-Control: max-age=900
Date: Wed, 22 Feb 2017 23:35:29 GMT
Connection: keep-alive0..*0......0...*.H........0..1.0...U....US1.0...U....Washington1.0...U
....Redmond1.0...U....Microsoft Corporation1 0)..U..."Copyright (c) 20
00 Microsoft Corp.1#0!..U....Microsoft Code Signing PCA..111110211944Z
..420416234935Z.7050...U.#..0...%. K].rT....*.....S.0... .....7.......
..0...*.H...............&..%PIu@.....\0KF....0..^.h9=.1jT,5.L....Ed ..
6.......i.6.xva....oX.^f'....s...!......O...h.1a..Ud);.?....J_...Fu...
.<v.zx..t..h.0JU%.nk;..B[4.?&Zm^..M.!.'...w.u.\T..Tr..Ch.[.z:....#.
..T.4Ct.......,...c..}F..U....:..7J...%.#..D6 . ....G..#....T..G;.....
.HTTP/1.1 200 OK..Content-Type: application/pkix-crl..Last-Modified: M
on, 16 Apr 2012 23:49:48 GMT..Accept-Ranges: bytes..ETag: "0f6669b2b1c
cd1:0"..Server: Microsoft-IIS/8.5..VTag: 438195957300000000..P3P: CP="
ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo
CNT COM INT NAV ONL PHY PRE PUR UNI"..X-Powered-By: ASP.NET..Content-L
ength: 558..Cache-Control: max-age=900..Date: Wed, 22 Feb 2017 23:35:2
9 GMT..Connection: keep-alive..0..*0......0...*.H........0..1.0...U...
.US1.0...U....Washington1.0...U....Redmond1.0...U....Microsoft Corpora
tion1 0)..U..."Copyright (c) 2000 Microsoft Corp.1#0!..U....Microsoft
Code Signing PCA..111110211944Z..420416234935Z.7050...U.#..0...%. K].r
T....*.....S.0... .....7.........0...*.H...............&..%PIu@.....\0
KF....0..^.h9=.1jT,5.L....Ed ..6.......i.6.xva....oX.^f'....s...!.....
.O...h.1a..Ud);.?....J_...Fu....<v.zx..t..h.0JU%.nk;..B[4.?&Zm^..M.
!.'...w.u.\T..Tr..Ch.[.z:....#...T.4Ct.......,...c..}F..U....:..7J<<< skipped >>>
GET /ocsp/MEkwRzBFMEMwQTAJBgUrDgMCGgUABBTy4Gr5hYodjXCbSRkjeqm1Gih+ZAQUSt0GFhu89mi1dvWBtrtiGrpagS8CCEAdrg7dKqon HTTP/1.1
Cache-Control: max-age = 345600
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: clients1.google.com
HTTP/1.1 404 Not Found
Date: Wed, 22 Feb 2017 23:36:04 GMT
Content-Type: text/html; charset=UTF-8
Server: ocsp_responder
Content-Length: 1668
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN<!DOCTYPE html>.<html lang=en>. <meta charset=utf-8>
;. <meta name=viewport content="initial-scale=1, minimum-scale=1,
width=device-width">. <title>Error 404 (Not Found)!!1</ti
tle>. <style>. *{margin:0;padding:0}html,code{font:15px/2
2px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body
{margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px
}* > body{background:url(//VVV.google.com/images/errors/robot.png)
100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:h
idden}ins{color:#777;text-decoration:none}a img{border:0}@media screen
and (max-width:772px){body{background:none;margin-top:0;max-width:non
e;padding-right:0}}#logo{background:url(//VVV.google.com/images/brandi
ng/googlelogo/1x/googlelogo_color_150x54dp.png) no-repeat;margin-left:
-5px}@media only screen and (min-resolution:192dpi){#logo{background:u
rl(//VVV.google.com/images/branding/googlelogo/2x/googlelogo_color_150
x54dp.png) no-repeat 0% 0%/100% 100%;-moz-border-image:url(//VVV.googl
e.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) 0}}
@media only screen and (-webkit-min-device-pixel-ratio:2){#logo{backgr
ound:url(//VVV.google.com/images/branding/googlelogo/2x/googlelogo_col
or_150x54dp.png) no-repeat;-webkit-background-size:100% 100%}}#logo{di
splay:inline-block;height:54px;width:150px}. </style>. <a h
ref=//VVV.google.com/><span id=logo aria-label=Google></sp
an></a>. <p><b>404.</b> <ins>Tha<<< skipped >>>
The Trojan connects to the servers at the folowing location(s):
.text
`.data
.reloc
esbhmm.dvj
%8;>(.)'&0
49;:610.
>#):>)9/9"
.%3/0-;(
/(=%?2>%!
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\winapitables.cpp
PR_OpenTCPSocket
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\corehook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncpaint.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\dynamicconfig.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\remotescript.cpp
userExecute
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\report.cpp
initReportFile
hXXp://VVV.google.com/webhp
Report::startServerSession
Report::writeData
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\userhook.cpp
gdiplus.dll
GdiplusShutdown
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\screenshot.cpp
ole32.dll
gdi32.dll
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\coreinstall.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncmouse.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\core.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\corecontrol.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\rfb.cpp
userenv.dll
del "%s"
if exist "%s" goto d
del /F "%s"
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1)
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\wininet.cpp
HTTP/1.1
urlmon.dll
cabinet.dll
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\wahook.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\binstorage.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\comlibrary.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\nspr4hook.cpp
hXXp://
hXXps://
analizeHttpResponse
HTTP/1.
analizeHttpResponseBody
Nspr4Hook::hookerPrOpenTcpSocket
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\backconnectbot.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\coreinject.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\certstorehook.cpp
exportStore
CertStoreHook::_hookerPfxImportCertStore
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\httpgrabber.cpp
HttpGrabber::_addUrlMaskToList
HttpGrabber::analizeRequestData
HttpGrabber::_executeInjects
HttpGrabber::_createFakeResponse
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\wininethook.cpp
onHttpSendRequest
WininetHook::hookerHttpQueryInfoA
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\sockethook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\softwaregrabber.cpp
enumWindowsMailMessagesAndFolders
SoftwareGrabber::_emailWindowsMail
SoftwareGrabber::_emailWindowsAddressBook
SoftwareGrabber::_emailWindowsContacts
ftpFlashFxp3Proc
ftpTotalCommanderProc
ftpWsFtpProc
ftpFileZillaProc
ftpFtpCommanderProc
ftpSmartFtpProc
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\tcpserver.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncserver.cpp
SSShxUY
\u.QPW
PSSj%S
GetProcessHeap
KERNEL32.dll
ExitWindowsEx
GetKeyboardState
MapVirtualKeyW
MsgWaitForMultipleObjects
SetKeyboardState
OpenWindowStationW
GetProcessWindowStation
CreateWindowStationW
CloseWindowStation
SetProcessWindowStation
USER32.dll
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
RegEnumKeyExW
ADVAPI32.dll
PathIsURLW
UrlUnescapeA
SHDeleteKeyW
SHLWAPI.dll
ShellExecuteW
SHELL32.dll
Secur32.dll
SetViewportOrgEx
GDI32.dll
WS2_32.dll
PFXImportCertStore
CertDeleteCertificateFromStore
CertOpenSystemStoreW
CertCloseStore
CertEnumCertificatesInStore
CertDuplicateCertificateContext
PFXExportCertStoreEx
CRYPT32.dll
HttpSendRequestExA
HttpQueryInfoA
HttpSendRequestExW
HttpSendRequestW
HttpSendRequestA
InternetCrackUrlA
HttpOpenRequestA
HttpAddRequestHeadersA
GetUrlCacheEntryInfoW
HttpAddRequestHeadersW
WININET.dll
OLEAUT32.dll
NETAPI32.dll
> ?,?2?{?5!5-545\5
8`9|9>:~:
Failed to unhook WinApi at index %u
count != realCount, %u != %u
NULL WinApi founded at index %u
Failed to hook WinApi at index %u
nspr4.dll
nss3.dll
Process %u already infected.
Bad context.Eip, current 0xX, needed 0xX
Loaded, moduleFileName=%s
Hooks installed for nspr4.dll
Post message failed for window class [%s]
"%S" => "%s".
PID of new bot is %u.
Trying download config "%S".
Trying download "%S".
normalDelay=%u, errorDelay=%u
commandLine=[%s]
Executing command "%s".
Command "%s" failed.
Unknown command "%s".
Founded script with size %u
reportFile=[%s].
pSending report.
cFailed, %u.
Started, %u.
Removed "%s".
Founded "%s".
Failed to move file "%s" => "%s".
CFGID_URL_SERVER_0 is empty.
Stopped, %u.
url=%S
Writed new report: retVal=%u, type=%u, dataSize=%u
userInputBufferSize=%u, userInputBuffer=%s
Called, format=%u
Failed to load gdiplus.dll.
Failed to load ole32.dll.
Failed to load gdi32.dll.
Failed to create folder: %s
Failed to create file: %s
Basic file: %s
Creating process for session %u.
activeSession=%u.
sessionsCount=%u.
sessions[%u].State=%u, sessions[%u].SessionId=%u
Current OS guid {X-X-X-XX}.pes.userPaths.coreFile=[%S], pes.userPaths.reportFile=[%S], pes.userPaths.regKey=[%S], pes.userPaths.regDynamicConfig=[%S], pes.userPaths.regLocalConfig=[%S], pes.userPaths.regLocalSettings=[%S]
Bad paths coreData.paths.process=%s, coreData.paths.home=%s.
Updating existing bot %u.%u.%u.%u to current version.
Updating finished with code %u.
Existing bot %u.%u.%u.%u not need update.
startupPath=[%s].
userenv.dll not founded.
Founded user: name=[%s], profileDir=[%s].
Copied to "%s".
Failed to copy itself to statup folder of user "%s".
cBad windows version %u.
scoreData.currentUser.id="0xX", coreData.currentUser.sessionId="%u"
Rights detected as %s.
Version: %u.%u.%u.%u
Integrity level: %u
coreData.proccessFlags: 0xX
Full path: %s
Command line: %s
Bot home: %s
SID: %s
baseConfig hash=0xX
eFailed coreData.proccessFlags.
Failed coreData.modules.current.
Failed coreData.globalHandles.stopEvent.
Failed coreData.globalHandles.stopedEvent.
kernel32.dll
"%s" %s
/c "%s"
debug.txt
C:\debug.txt
[u:u:u] TC=0u, PID=u(0xX), TID=u(0xX), LE=%u(0x%X), F=%S, FL=%S (%u)
{8EEEA37C-5CEF-11DD-9810-2A4256D89593}EXCEPTION: Code=0xX
Flags=0xX
pstrURI=%S
Bad opcode detected at offset %u for function 0x%p
Very long opcode detected at offset %u for function 0x%p
Relative JMP/CALL(X) detected.
%sx.%s
%sx
(1)Failed to read "%s", position %I64u, size %I64u
(2)Failed to read file "%s", position %I64u, size %I64u, readed=%u
(2)File corrupted "%s", position %I64u, size %I64u, newOffset=%I64u
(2)Failed to change pointer in file "%s", position %I64u, size %I64u, sh.size=%u
CoCreateInstance failed, result=0xX.
path=[%s].
.Bad HTTP-version: header=%S, headerSize=%u
Bad Transfer-Encoding header: header=%S, headerSize=%u
Bad Content-Length header: header=%S, headerSize=%u
HRIF_DEFINED_LENGTH, curSize=%u, info->contentLength=%u.
HRIF_DEFINED_CHUNKED, curSize=%u.
HRIF_DEFINED_CLOSE, curSize=%u.
info->contentEndOffset=%u.
Connection 0x%p removed from table, current connectionsCount=%u.
Pending data detected, nc->pendingResponse.size=%u, nc->pendingResponse.pos=%u, size=%u
nc->responseSize=%u
Analize successed, contentSize=%u.
Injects accepted, contentSize=%u.
Response postfix detected, size=%u
Pending data detected, nc->pendingRequest.size=%u, nc->pendingRequest.pos=%u, size=%u
All pending data sended, nc->pendingRequest.realSize=%u.
Not all pending data sended, nc->pendingRequest.pos=%u, nc->pendingRequest.realSize=%u.
Bytes to skip detected, nc->writeBytesToSkip=%u.
writeBytesToSkip=%u.
Protocol error detected, fd=0x%p, count=%i, writeBytesToSkip=%u.
New request detected, fillRequestData()=%u.
Request changed, newRequestSize=%u, nc->pendingRequest.realSize=%u.
Failed to connect to local IPv4 port %u.
Global\XXX
mutexName=[%s]
newImage=0x%p, thread=0xX
Failed to wait for thread end, newImage=0x%p, thread=0xX
Failed to create remote thread in process with id=%u.
Failed to alloc code in process with id=%u.
Failed to open process with id=%u.
pe.th32ProcessID=%u
Exporting %s
eClearing %s
Called, data->cbData=%u, password=%s, flags=0xX
Inject for [%S] is blacklisted.
Inject [%s] alredy executed today.
requestData->url=[%S] matched [%S].
Unknown inject detected, curInject->flags=0xX!
requestData->handle=[0x%p], requestData->url=[%S], requestData->referer=[%S], requestData->contentType=[%S], requestData->verb=[%u], requestData->postDataSize=[%u].
Detected blocking url [%S] for current url.
requestData->url=[%S] matched [%S] for filter type %u.
Current url blocked.
Accepted %u injects for current URL.
POST-data replaced [%S].
Wating for blocking url [%S].
fakeConnect.fakeUrl=[%S].
Changed local cache urlW="%s", cacheEntry->lpszLocalFileName="%s"
(connections[connectionIndex].injects != NULL) == true
(connections[connectionIndex].postData != NULL) == true
Called, infoLevel=%u (0xX)
USER/PASS, argOffset=%u, dataSize=%u, argSize=%u
argument=%s
protocolType=%u
folderProps->szName=[%S].
path=[%s]
Failed to load [%s].
%s failed.
freeResult=0xX
hr=0xX
cinitialPort=%u.
New initialPort=%u.
SysShadow
WindowStation::_SetThreadDesktopEx() failed.
Root process created, pid=%u.
Global\{B33A7606-CF82-B0B7-8B9E-85EEC04AAB2B}C:\Users\"%CurrentUserName%"\AppData\Roaming\Ihquo\yrpuu.yxx
C:\Users\"%CurrentUserName%"\AppData\Roaming\Ihquo
yrpuu.yxx
C:\Users\"%CurrentUserName%"\AppData\Roaming
{2541C423-7DA7-26CC-8B9E-85EEC04AAB2B}
Dwm.exe_2008_rwx_004C0000_0002F000:
.text
`.data
.reloc
esbhmm.dvj
%8;>(.)'&0
49;:610.
>#):>)9/9"
.%3/0-;(
/(=%?2>%!
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\winapitables.cpp
PR_OpenTCPSocket
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\corehook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncpaint.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\dynamicconfig.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\remotescript.cpp
userExecute
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\report.cpp
initReportFile
hXXp://VVV.google.com/webhp
Report::startServerSession
Report::writeData
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\userhook.cpp
gdiplus.dll
GdiplusShutdown
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\screenshot.cpp
ole32.dll
gdi32.dll
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\coreinstall.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncmouse.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\core.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\corecontrol.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\rfb.cpp
userenv.dll
del "%s"
if exist "%s" goto d
del /F "%s"
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1)
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\wininet.cpp
HTTP/1.1
urlmon.dll
cabinet.dll
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\wahook.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\binstorage.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\comlibrary.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\nspr4hook.cpp
hXXp://
hXXps://
analizeHttpResponse
HTTP/1.
analizeHttpResponseBody
Nspr4Hook::hookerPrOpenTcpSocket
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\backconnectbot.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\coreinject.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\certstorehook.cpp
exportStore
CertStoreHook::_hookerPfxImportCertStore
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\httpgrabber.cpp
HttpGrabber::_addUrlMaskToList
HttpGrabber::analizeRequestData
HttpGrabber::_executeInjects
HttpGrabber::_createFakeResponse
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\wininethook.cpp
onHttpSendRequest
WininetHook::hookerHttpQueryInfoA
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\sockethook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\softwaregrabber.cpp
enumWindowsMailMessagesAndFolders
SoftwareGrabber::_emailWindowsMail
SoftwareGrabber::_emailWindowsAddressBook
SoftwareGrabber::_emailWindowsContacts
ftpFlashFxp3Proc
ftpTotalCommanderProc
ftpWsFtpProc
ftpFileZillaProc
ftpFtpCommanderProc
ftpSmartFtpProc
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\tcpserver.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncserver.cpp
SSShxUL
\u.QPW
PSSj%S
GetProcessHeap
KERNEL32.dll
ExitWindowsEx
GetKeyboardState
MapVirtualKeyW
MsgWaitForMultipleObjects
SetKeyboardState
OpenWindowStationW
GetProcessWindowStation
CreateWindowStationW
CloseWindowStation
SetProcessWindowStation
USER32.dll
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
RegEnumKeyExW
ADVAPI32.dll
PathIsURLW
UrlUnescapeA
SHDeleteKeyW
SHLWAPI.dll
ShellExecuteW
SHELL32.dll
Secur32.dll
SetViewportOrgEx
GDI32.dll
WS2_32.dll
PFXImportCertStore
CertDeleteCertificateFromStore
CertOpenSystemStoreW
CertCloseStore
CertEnumCertificatesInStore
CertDuplicateCertificateContext
PFXExportCertStoreEx
CRYPT32.dll
HttpSendRequestExA
HttpQueryInfoA
HttpSendRequestExW
HttpSendRequestW
HttpSendRequestA
InternetCrackUrlA
HttpOpenRequestA
HttpAddRequestHeadersA
GetUrlCacheEntryInfoW
HttpAddRequestHeadersW
WININET.dll
OLEAUT32.dll
NETAPI32.dll
> ?,?2?{?5!5-545\5
8`9|9>:~:
Failed to unhook WinApi at index %u
count != realCount, %u != %u
NULL WinApi founded at index %u
Failed to hook WinApi at index %u
nspr4.dll
nss3.dll
Process %u already infected.
Bad context.Eip, current 0xX, needed 0xX
Loaded, moduleFileName=%s
Hooks installed for nspr4.dll
Post message failed for window class [%s]
"%S" => "%s".
PID of new bot is %u.
Trying download config "%S".
Trying download "%S".
normalDelay=%u, errorDelay=%u
commandLine=[%s]
Executing command "%s".
Command "%s" failed.
Unknown command "%s".
Founded script with size %u
reportFile=[%s].
pSending report.
cFailed, %u.
Started, %u.
Removed "%s".
Founded "%s".
Failed to move file "%s" => "%s".
CFGID_URL_SERVER_0 is empty.
Stopped, %u.
url=%S
Writed new report: retVal=%u, type=%u, dataSize=%u
userInputBufferSize=%u, userInputBuffer=%s
Called, format=%u
Failed to load gdiplus.dll.
Failed to load ole32.dll.
Failed to load gdi32.dll.
Failed to create folder: %s
Failed to create file: %s
Basic file: %s
Creating process for session %u.
activeSession=%u.
sessionsCount=%u.
sessions[%u].State=%u, sessions[%u].SessionId=%u
Current OS guid {X-X-X-XX}.pes.userPaths.coreFile=[%S], pes.userPaths.reportFile=[%S], pes.userPaths.regKey=[%S], pes.userPaths.regDynamicConfig=[%S], pes.userPaths.regLocalConfig=[%S], pes.userPaths.regLocalSettings=[%S]
Bad paths coreData.paths.process=%s, coreData.paths.home=%s.
Updating existing bot %u.%u.%u.%u to current version.
Updating finished with code %u.
Existing bot %u.%u.%u.%u not need update.
startupPath=[%s].
userenv.dll not founded.
Founded user: name=[%s], profileDir=[%s].
Copied to "%s".
Failed to copy itself to statup folder of user "%s".
cBad windows version %u.
scoreData.currentUser.id="0xX", coreData.currentUser.sessionId="%u"
Rights detected as %s.
Version: %u.%u.%u.%u
Integrity level: %u
coreData.proccessFlags: 0xX
Full path: %s
Command line: %s
Bot home: %s
SID: %s
baseConfig hash=0xX
eFailed coreData.proccessFlags.
Failed coreData.modules.current.
Failed coreData.globalHandles.stopEvent.
Failed coreData.globalHandles.stopedEvent.
kernel32.dll
"%s" %s
/c "%s"
debug.txt
C:\debug.txt
[u:u:u] TC=0u, PID=u(0xX), TID=u(0xX), LE=%u(0x%X), F=%S, FL=%S (%u)
{8EEEA37C-5CEF-11DD-9810-2A4256D89593}EXCEPTION: Code=0xX
Flags=0xX
pstrURI=%S
Bad opcode detected at offset %u for function 0x%p
Very long opcode detected at offset %u for function 0x%p
Relative JMP/CALL(X) detected.
%sx.%s
%sx
(1)Failed to read "%s", position %I64u, size %I64u
(2)Failed to read file "%s", position %I64u, size %I64u, readed=%u
(2)File corrupted "%s", position %I64u, size %I64u, newOffset=%I64u
(2)Failed to change pointer in file "%s", position %I64u, size %I64u, sh.size=%u
CoCreateInstance failed, result=0xX.
path=[%s].
.Bad HTTP-version: header=%S, headerSize=%u
Bad Transfer-Encoding header: header=%S, headerSize=%u
Bad Content-Length header: header=%S, headerSize=%u
HRIF_DEFINED_LENGTH, curSize=%u, info->contentLength=%u.
HRIF_DEFINED_CHUNKED, curSize=%u.
HRIF_DEFINED_CLOSE, curSize=%u.
info->contentEndOffset=%u.
Connection 0x%p removed from table, current connectionsCount=%u.
Pending data detected, nc->pendingResponse.size=%u, nc->pendingResponse.pos=%u, size=%u
nc->responseSize=%u
Analize successed, contentSize=%u.
Injects accepted, contentSize=%u.
Response postfix detected, size=%u
Pending data detected, nc->pendingRequest.size=%u, nc->pendingRequest.pos=%u, size=%u
All pending data sended, nc->pendingRequest.realSize=%u.
Not all pending data sended, nc->pendingRequest.pos=%u, nc->pendingRequest.realSize=%u.
Bytes to skip detected, nc->writeBytesToSkip=%u.
writeBytesToSkip=%u.
Protocol error detected, fd=0x%p, count=%i, writeBytesToSkip=%u.
New request detected, fillRequestData()=%u.
Request changed, newRequestSize=%u, nc->pendingRequest.realSize=%u.
Failed to connect to local IPv4 port %u.
Global\XXX
mutexName=[%s]
newImage=0x%p, thread=0xX
Failed to wait for thread end, newImage=0x%p, thread=0xX
Failed to create remote thread in process with id=%u.
Failed to alloc code in process with id=%u.
Failed to open process with id=%u.
pe.th32ProcessID=%u
Exporting %s
eClearing %s
Called, data->cbData=%u, password=%s, flags=0xX
Inject for [%S] is blacklisted.
Inject [%s] alredy executed today.
requestData->url=[%S] matched [%S].
Unknown inject detected, curInject->flags=0xX!
requestData->handle=[0x%p], requestData->url=[%S], requestData->referer=[%S], requestData->contentType=[%S], requestData->verb=[%u], requestData->postDataSize=[%u].
Detected blocking url [%S] for current url.
requestData->url=[%S] matched [%S] for filter type %u.
Current url blocked.
Accepted %u injects for current URL.
POST-data replaced [%S].
Wating for blocking url [%S].
fakeConnect.fakeUrl=[%S].
Changed local cache urlW="%s", cacheEntry->lpszLocalFileName="%s"
(connections[connectionIndex].injects != NULL) == true
(connections[connectionIndex].postData != NULL) == true
Called, infoLevel=%u (0xX)
USER/PASS, argOffset=%u, dataSize=%u, argSize=%u
argument=%s
protocolType=%u
folderProps->szName=[%S].
path=[%s]
Failed to load [%s].
%s failed.
freeResult=0xX
hr=0xX
cinitialPort=%u.
New initialPort=%u.
SysShadow
WindowStation::_SetThreadDesktopEx() failed.
Root process created, pid=%u.
Global\{B33A7606-CF82-B0B7-8B9E-85EEC04AAB2B}:\Users\"%CurrentUserName%"\AppData\Roaming\Ihquo\yrpuu.yxx
C:\Users\"%CurrentUserName%"\AppData\Roaming\Ihquo
yrpuu.yxx
C:\Users\"%CurrentUserName%"\AppData\Roaming
{2541C423-7DA7-26CC-8B9E-85EEC04AAB2B}
Explorer.EXE_2024_rwx_02D60000_0002F000:
.text
`.data
.reloc
esbhmm.dvj
%8;>(.)'&0
49;:610.
>#):>)9/9"
.%3/0-;(
/(=%?2>%!
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\winapitables.cpp
PR_OpenTCPSocket
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\corehook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncpaint.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\dynamicconfig.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\remotescript.cpp
userExecute
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\report.cpp
initReportFile
hXXp://VVV.google.com/webhp
Report::startServerSession
Report::writeData
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\userhook.cpp
gdiplus.dll
GdiplusShutdown
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\screenshot.cpp
ole32.dll
gdi32.dll
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\coreinstall.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncmouse.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\core.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\corecontrol.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\rfb.cpp
userenv.dll
del "%s"
if exist "%s" goto d
del /F "%s"
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1)
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\wininet.cpp
HTTP/1.1
urlmon.dll
cabinet.dll
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\wahook.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\binstorage.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\comlibrary.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\nspr4hook.cpp
hXXp://
hXXps://
analizeHttpResponse
HTTP/1.
analizeHttpResponseBody
Nspr4Hook::hookerPrOpenTcpSocket
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\backconnectbot.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\coreinject.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\certstorehook.cpp
exportStore
CertStoreHook::_hookerPfxImportCertStore
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\httpgrabber.cpp
HttpGrabber::_addUrlMaskToList
HttpGrabber::analizeRequestData
HttpGrabber::_executeInjects
HttpGrabber::_createFakeResponse
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\wininethook.cpp
onHttpSendRequest
WininetHook::hookerHttpQueryInfoA
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\sockethook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\softwaregrabber.cpp
enumWindowsMailMessagesAndFolders
SoftwareGrabber::_emailWindowsMail
SoftwareGrabber::_emailWindowsAddressBook
SoftwareGrabber::_emailWindowsContacts
ftpFlashFxp3Proc
ftpTotalCommanderProc
ftpWsFtpProc
ftpFileZillaProc
ftpFtpCommanderProc
ftpSmartFtpProc
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\tcpserver.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncserver.cpp
SSShxU
\u.QPW
PSSj%S
GetProcessHeap
KERNEL32.dll
ExitWindowsEx
GetKeyboardState
MapVirtualKeyW
MsgWaitForMultipleObjects
SetKeyboardState
OpenWindowStationW
GetProcessWindowStation
CreateWindowStationW
CloseWindowStation
SetProcessWindowStation
USER32.dll
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
RegEnumKeyExW
ADVAPI32.dll
PathIsURLW
UrlUnescapeA
SHDeleteKeyW
SHLWAPI.dll
ShellExecuteW
SHELL32.dll
Secur32.dll
SetViewportOrgEx
GDI32.dll
WS2_32.dll
PFXImportCertStore
CertDeleteCertificateFromStore
CertOpenSystemStoreW
CertCloseStore
CertEnumCertificatesInStore
CertDuplicateCertificateContext
PFXExportCertStoreEx
CRYPT32.dll
HttpSendRequestExA
HttpQueryInfoA
HttpSendRequestExW
HttpSendRequestW
HttpSendRequestA
InternetCrackUrlA
HttpOpenRequestA
HttpAddRequestHeadersA
GetUrlCacheEntryInfoW
HttpAddRequestHeadersW
WININET.dll
OLEAUT32.dll
NETAPI32.dll
> ?,?2?{?5!5-545\5
8`9|9>:~:
Failed to unhook WinApi at index %u
count != realCount, %u != %u
NULL WinApi founded at index %u
Failed to hook WinApi at index %u
nspr4.dll
nss3.dll
Process %u already infected.
Bad context.Eip, current 0xX, needed 0xX
Loaded, moduleFileName=%s
Hooks installed for nspr4.dll
Post message failed for window class [%s]
"%S" => "%s".
PID of new bot is %u.
Trying download config "%S".
Trying download "%S".
normalDelay=%u, errorDelay=%u
commandLine=[%s]
Executing command "%s".
Command "%s" failed.
Unknown command "%s".
Founded script with size %u
reportFile=[%s].
pSending report.
cFailed, %u.
Started, %u.
Removed "%s".
Founded "%s".
Failed to move file "%s" => "%s".
CFGID_URL_SERVER_0 is empty.
Stopped, %u.
url=%S
Writed new report: retVal=%u, type=%u, dataSize=%u
userInputBufferSize=%u, userInputBuffer=%s
Called, format=%u
Failed to load gdiplus.dll.
Failed to load ole32.dll.
Failed to load gdi32.dll.
Failed to create folder: %s
Failed to create file: %s
Basic file: %s
Creating process for session %u.
activeSession=%u.
sessionsCount=%u.
sessions[%u].State=%u, sessions[%u].SessionId=%u
Current OS guid {X-X-X-XX}.pes.userPaths.coreFile=[%S], pes.userPaths.reportFile=[%S], pes.userPaths.regKey=[%S], pes.userPaths.regDynamicConfig=[%S], pes.userPaths.regLocalConfig=[%S], pes.userPaths.regLocalSettings=[%S]
Bad paths coreData.paths.process=%s, coreData.paths.home=%s.
Updating existing bot %u.%u.%u.%u to current version.
Updating finished with code %u.
Existing bot %u.%u.%u.%u not need update.
startupPath=[%s].
userenv.dll not founded.
Founded user: name=[%s], profileDir=[%s].
Copied to "%s".
Failed to copy itself to statup folder of user "%s".
cBad windows version %u.
scoreData.currentUser.id="0xX", coreData.currentUser.sessionId="%u"
Rights detected as %s.
Version: %u.%u.%u.%u
Integrity level: %u
coreData.proccessFlags: 0xX
Full path: %s
Command line: %s
Bot home: %s
SID: %s
baseConfig hash=0xX
eFailed coreData.proccessFlags.
Failed coreData.modules.current.
Failed coreData.globalHandles.stopEvent.
Failed coreData.globalHandles.stopedEvent.
kernel32.dll
"%s" %s
/c "%s"
debug.txt
C:\debug.txt
[u:u:u] TC=0u, PID=u(0xX), TID=u(0xX), LE=%u(0x%X), F=%S, FL=%S (%u)
{8EEEA37C-5CEF-11DD-9810-2A4256D89593}EXCEPTION: Code=0xX
Flags=0xX
pstrURI=%S
Bad opcode detected at offset %u for function 0x%p
Very long opcode detected at offset %u for function 0x%p
Relative JMP/CALL(X) detected.
%sx.%s
%sx
(1)Failed to read "%s", position %I64u, size %I64u
(2)Failed to read file "%s", position %I64u, size %I64u, readed=%u
(2)File corrupted "%s", position %I64u, size %I64u, newOffset=%I64u
(2)Failed to change pointer in file "%s", position %I64u, size %I64u, sh.size=%u
CoCreateInstance failed, result=0xX.
path=[%s].
.Bad HTTP-version: header=%S, headerSize=%u
Bad Transfer-Encoding header: header=%S, headerSize=%u
Bad Content-Length header: header=%S, headerSize=%u
HRIF_DEFINED_LENGTH, curSize=%u, info->contentLength=%u.
HRIF_DEFINED_CHUNKED, curSize=%u.
HRIF_DEFINED_CLOSE, curSize=%u.
info->contentEndOffset=%u.
Connection 0x%p removed from table, current connectionsCount=%u.
Pending data detected, nc->pendingResponse.size=%u, nc->pendingResponse.pos=%u, size=%u
nc->responseSize=%u
Analize successed, contentSize=%u.
Injects accepted, contentSize=%u.
Response postfix detected, size=%u
Pending data detected, nc->pendingRequest.size=%u, nc->pendingRequest.pos=%u, size=%u
All pending data sended, nc->pendingRequest.realSize=%u.
Not all pending data sended, nc->pendingRequest.pos=%u, nc->pendingRequest.realSize=%u.
Bytes to skip detected, nc->writeBytesToSkip=%u.
writeBytesToSkip=%u.
Protocol error detected, fd=0x%p, count=%i, writeBytesToSkip=%u.
New request detected, fillRequestData()=%u.
Request changed, newRequestSize=%u, nc->pendingRequest.realSize=%u.
Failed to connect to local IPv4 port %u.
Global\XXX
mutexName=[%s]
newImage=0x%p, thread=0xX
Failed to wait for thread end, newImage=0x%p, thread=0xX
Failed to create remote thread in process with id=%u.
Failed to alloc code in process with id=%u.
Failed to open process with id=%u.
pe.th32ProcessID=%u
Exporting %s
eClearing %s
Called, data->cbData=%u, password=%s, flags=0xX
Inject for [%S] is blacklisted.
Inject [%s] alredy executed today.
requestData->url=[%S] matched [%S].
Unknown inject detected, curInject->flags=0xX!
requestData->handle=[0x%p], requestData->url=[%S], requestData->referer=[%S], requestData->contentType=[%S], requestData->verb=[%u], requestData->postDataSize=[%u].
Detected blocking url [%S] for current url.
requestData->url=[%S] matched [%S] for filter type %u.
Current url blocked.
Accepted %u injects for current URL.
POST-data replaced [%S].
Wating for blocking url [%S].
fakeConnect.fakeUrl=[%S].
Changed local cache urlW="%s", cacheEntry->lpszLocalFileName="%s"
(connections[connectionIndex].injects != NULL) == true
(connections[connectionIndex].postData != NULL) == true
Called, infoLevel=%u (0xX)
USER/PASS, argOffset=%u, dataSize=%u, argSize=%u
argument=%s
protocolType=%u
folderProps->szName=[%S].
path=[%s]
Failed to load [%s].
%s failed.
freeResult=0xX
hr=0xX
cinitialPort=%u.
New initialPort=%u.
SysShadow
WindowStation::_SetThreadDesktopEx() failed.
Root process created, pid=%u.
Global\{B33A7606-CF82-B0B7-8B9E-85EEC04AAB2B}C:\Users\"%CurrentUserName%"\AppData\Roaming
{2541C423-7DA7-26CC-8B9E-85EEC04AAB2B}
conhost.exe_3352_rwx_00350000_0002F000:
.text
`.data
.reloc
esbhmm.dvj
%8;>(.)'&0
49;:610.
>#):>)9/9"
.%3/0-;(
/(=%?2>%!
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\winapitables.cpp
PR_OpenTCPSocket
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\corehook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncpaint.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\dynamicconfig.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\remotescript.cpp
userExecute
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\report.cpp
initReportFile
hXXp://VVV.google.com/webhp
Report::startServerSession
Report::writeData
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\userhook.cpp
gdiplus.dll
GdiplusShutdown
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\screenshot.cpp
ole32.dll
gdi32.dll
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\coreinstall.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncmouse.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\core.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\corecontrol.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\rfb.cpp
userenv.dll
del "%s"
if exist "%s" goto d
del /F "%s"
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1)
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\wininet.cpp
HTTP/1.1
urlmon.dll
cabinet.dll
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\wahook.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\binstorage.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\comlibrary.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\nspr4hook.cpp
hXXp://
hXXps://
analizeHttpResponse
HTTP/1.
analizeHttpResponseBody
Nspr4Hook::hookerPrOpenTcpSocket
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\backconnectbot.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\coreinject.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\certstorehook.cpp
exportStore
CertStoreHook::_hookerPfxImportCertStore
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\httpgrabber.cpp
HttpGrabber::_addUrlMaskToList
HttpGrabber::analizeRequestData
HttpGrabber::_executeInjects
HttpGrabber::_createFakeResponse
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\wininethook.cpp
onHttpSendRequest
WininetHook::hookerHttpQueryInfoA
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\sockethook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\softwaregrabber.cpp
enumWindowsMailMessagesAndFolders
SoftwareGrabber::_emailWindowsMail
SoftwareGrabber::_emailWindowsAddressBook
SoftwareGrabber::_emailWindowsContacts
ftpFlashFxp3Proc
ftpTotalCommanderProc
ftpWsFtpProc
ftpFileZillaProc
ftpFtpCommanderProc
ftpSmartFtpProc
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\tcpserver.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncserver.cpp
SSShxU5
\u.QPW
PSSj%S
GetProcessHeap
KERNEL32.dll
ExitWindowsEx
GetKeyboardState
MapVirtualKeyW
MsgWaitForMultipleObjects
SetKeyboardState
OpenWindowStationW
GetProcessWindowStation
CreateWindowStationW
CloseWindowStation
SetProcessWindowStation
USER32.dll
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
RegEnumKeyExW
ADVAPI32.dll
PathIsURLW
UrlUnescapeA
SHDeleteKeyW
SHLWAPI.dll
ShellExecuteW
SHELL32.dll
Secur32.dll
SetViewportOrgEx
GDI32.dll
WS2_32.dll
PFXImportCertStore
CertDeleteCertificateFromStore
CertOpenSystemStoreW
CertCloseStore
CertEnumCertificatesInStore
CertDuplicateCertificateContext
PFXExportCertStoreEx
CRYPT32.dll
HttpSendRequestExA
HttpQueryInfoA
HttpSendRequestExW
HttpSendRequestW
HttpSendRequestA
InternetCrackUrlA
HttpOpenRequestA
HttpAddRequestHeadersA
GetUrlCacheEntryInfoW
HttpAddRequestHeadersW
WININET.dll
OLEAUT32.dll
NETAPI32.dll
> ?,?2?{?5!5-545\5
8`9|9>:~:
Failed to unhook WinApi at index %u
count != realCount, %u != %u
NULL WinApi founded at index %u
Failed to hook WinApi at index %u
nspr4.dll
nss3.dll
Process %u already infected.
Bad context.Eip, current 0xX, needed 0xX
Loaded, moduleFileName=%s
Hooks installed for nspr4.dll
Post message failed for window class [%s]
"%S" => "%s".
PID of new bot is %u.
Trying download config "%S".
Trying download "%S".
normalDelay=%u, errorDelay=%u
commandLine=[%s]
Executing command "%s".
Command "%s" failed.
Unknown command "%s".
Founded script with size %u
reportFile=[%s].
pSending report.
cFailed, %u.
Started, %u.
Removed "%s".
Founded "%s".
Failed to move file "%s" => "%s".
CFGID_URL_SERVER_0 is empty.
Stopped, %u.
url=%S
Writed new report: retVal=%u, type=%u, dataSize=%u
userInputBufferSize=%u, userInputBuffer=%s
Called, format=%u
Failed to load gdiplus.dll.
Failed to load ole32.dll.
Failed to load gdi32.dll.
Failed to create folder: %s
Failed to create file: %s
Basic file: %s
Creating process for session %u.
activeSession=%u.
sessionsCount=%u.
sessions[%u].State=%u, sessions[%u].SessionId=%u
Current OS guid {X-X-X-XX}.pes.userPaths.coreFile=[%S], pes.userPaths.reportFile=[%S], pes.userPaths.regKey=[%S], pes.userPaths.regDynamicConfig=[%S], pes.userPaths.regLocalConfig=[%S], pes.userPaths.regLocalSettings=[%S]
Bad paths coreData.paths.process=%s, coreData.paths.home=%s.
Updating existing bot %u.%u.%u.%u to current version.
Updating finished with code %u.
Existing bot %u.%u.%u.%u not need update.
startupPath=[%s].
userenv.dll not founded.
Founded user: name=[%s], profileDir=[%s].
Copied to "%s".
Failed to copy itself to statup folder of user "%s".
cBad windows version %u.
scoreData.currentUser.id="0xX", coreData.currentUser.sessionId="%u"
Rights detected as %s.
Version: %u.%u.%u.%u
Integrity level: %u
coreData.proccessFlags: 0xX
Full path: %s
Command line: %s
Bot home: %s
SID: %s
baseConfig hash=0xX
eFailed coreData.proccessFlags.
Failed coreData.modules.current.
Failed coreData.globalHandles.stopEvent.
Failed coreData.globalHandles.stopedEvent.
kernel32.dll
"%s" %s
/c "%s"
debug.txt
C:\debug.txt
[u:u:u] TC=0u, PID=u(0xX), TID=u(0xX), LE=%u(0x%X), F=%S, FL=%S (%u)
{8EEEA37C-5CEF-11DD-9810-2A4256D89593}EXCEPTION: Code=0xX
Flags=0xX
pstrURI=%S
Bad opcode detected at offset %u for function 0x%p
Very long opcode detected at offset %u for function 0x%p
Relative JMP/CALL(X) detected.
%sx.%s
%sx
(1)Failed to read "%s", position %I64u, size %I64u
(2)Failed to read file "%s", position %I64u, size %I64u, readed=%u
(2)File corrupted "%s", position %I64u, size %I64u, newOffset=%I64u
(2)Failed to change pointer in file "%s", position %I64u, size %I64u, sh.size=%u
CoCreateInstance failed, result=0xX.
path=[%s].
.Bad HTTP-version: header=%S, headerSize=%u
Bad Transfer-Encoding header: header=%S, headerSize=%u
Bad Content-Length header: header=%S, headerSize=%u
HRIF_DEFINED_LENGTH, curSize=%u, info->contentLength=%u.
HRIF_DEFINED_CHUNKED, curSize=%u.
HRIF_DEFINED_CLOSE, curSize=%u.
info->contentEndOffset=%u.
Connection 0x%p removed from table, current connectionsCount=%u.
Pending data detected, nc->pendingResponse.size=%u, nc->pendingResponse.pos=%u, size=%u
nc->responseSize=%u
Analize successed, contentSize=%u.
Injects accepted, contentSize=%u.
Response postfix detected, size=%u
Pending data detected, nc->pendingRequest.size=%u, nc->pendingRequest.pos=%u, size=%u
All pending data sended, nc->pendingRequest.realSize=%u.
Not all pending data sended, nc->pendingRequest.pos=%u, nc->pendingRequest.realSize=%u.
Bytes to skip detected, nc->writeBytesToSkip=%u.
writeBytesToSkip=%u.
Protocol error detected, fd=0x%p, count=%i, writeBytesToSkip=%u.
New request detected, fillRequestData()=%u.
Request changed, newRequestSize=%u, nc->pendingRequest.realSize=%u.
Failed to connect to local IPv4 port %u.
Global\XXX
mutexName=[%s]
newImage=0x%p, thread=0xX
Failed to wait for thread end, newImage=0x%p, thread=0xX
Failed to create remote thread in process with id=%u.
Failed to alloc code in process with id=%u.
Failed to open process with id=%u.
pe.th32ProcessID=%u
Exporting %s
eClearing %s
Called, data->cbData=%u, password=%s, flags=0xX
Inject for [%S] is blacklisted.
Inject [%s] alredy executed today.
requestData->url=[%S] matched [%S].
Unknown inject detected, curInject->flags=0xX!
requestData->handle=[0x%p], requestData->url=[%S], requestData->referer=[%S], requestData->contentType=[%S], requestData->verb=[%u], requestData->postDataSize=[%u].
Detected blocking url [%S] for current url.
requestData->url=[%S] matched [%S] for filter type %u.
Current url blocked.
Accepted %u injects for current URL.
POST-data replaced [%S].
Wating for blocking url [%S].
fakeConnect.fakeUrl=[%S].
Changed local cache urlW="%s", cacheEntry->lpszLocalFileName="%s"
(connections[connectionIndex].injects != NULL) == true
(connections[connectionIndex].postData != NULL) == true
Called, infoLevel=%u (0xX)
USER/PASS, argOffset=%u, dataSize=%u, argSize=%u
argument=%s
protocolType=%u
folderProps->szName=[%S].
path=[%s]
Failed to load [%s].
%s failed.
freeResult=0xX
hr=0xX
cinitialPort=%u.
New initialPort=%u.
SysShadow
WindowStation::_SetThreadDesktopEx() failed.
Root process created, pid=%u.
Global\{B33A7606-CF82-B0B7-8B9E-85EEC04AAB2B}C:\Users\"%CurrentUserName%"\AppData\Roaming
{2541C423-7DA7-26CC-8B9E-85EEC04AAB2B}
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Scan a system with an anti-rootkit tool.
- Terminate malicious process(es) (How to End a Process With the Task Manager):
WinMail.exe:1720
%original file name%.exe:2920
bamyg.exe:600 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\WindowsMail.MSMessageStore (46008 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\TarD079.tmp (2712 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Drafts\winmail.fol (560 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\7FA01E3F-00000001.eml (1924 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Backup\temp\WindowsMail.pat (16 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ppcrlui_1720_2 (1281 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Junk E-mail\winmail.fol (592 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Backup\temp\edb00002.log (2 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Sent Items\winmail.fol (592 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\CabD078.tmp (51 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Deleted Items\winmail.fol (608 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\7FA01E3F-00000001.eml:OECustomProperty (260 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Outbox\winmail.fol (560 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\winmail.fol (544 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\tmp.edb (1728 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\edb.log (27096 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\edb.chk (300 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E6024EAC88E6B6165D49FE3C95ADD735 (558 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Backup\temp\WindowsMail.MSMessageStore (99 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E6024EAC88E6B6165D49FE3C95ADD735 (968 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\WindowsMail.pat (400 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\edbtmp.log (3466 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\tmp13faec87.bat (179 bytes)
C:\debug.txt (6090 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Amhe\bamyg.exe (687 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.