Installer.Win32.InnoSetup.2_5b15c7e4d4

by malwarelabrobot on June 23rd, 2017 in Malware Descriptions.

Installer.Win32.InnoSetup.2.FD, Trojan.NSIS.StartPage.FD, Trojan.Win32.Sasfis.FD, mzpefinder_pcap_file.YR (Lavasoft MAS)
Behaviour: Trojan, Installer


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: 5b15c7e4d47a0eb4e54b5858b1bd57e3
SHA1: 029ab8393cea49c973a23b2d02ab2ad1ba343ec5
SHA256: 8e95686a4c0962895d1deedb04919ac4c50dcd1ebd65afe47bca229cb9d076f5
SSDeep: 12288:R0nyfXuIBDtfuAXulmKwS3nPdLH6aj a0nvED2YJKxNBGJLFNv0: ny/f9uAD5SFsxBG9Fq
Size: 576376 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: DriverPack
Created at: 2015-02-15 10:00:31
Analyzed on: Windows7 SP1 32-bit


Summary:

Installer. An installation package.

Payload

No specific payload has been found.

Process activity

The Installer creates the following process(es):

Install JDownloader.exe:3420
%original file name%.exe:3428

The Installer injects its code into the following process(es):

13142587242731626932.exe:3104
131425872413744245.exe:1480

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process 13142587242731626932.exe:3104 makes changes in the file system.
The Installer creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\images\BG.jpg (44 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\css\sdk-ui\images\progress-bg2.png (978 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\images\Color_Button_Hover.png (863 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\images\Color_Button.png (846 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\css\sdk-ui\checkbox.css (190 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\csshover3.htc (2 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\css\sdk-ui\images\button-bg.png (131 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\00052E5F.log (8 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\css\ie6_main.css (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\images\Grey_Button.png (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\css\sdk-ui\images\progress-bg-corner.png (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\images\Close.png (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\bootstrap_26010.html (156 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\css\sdk-ui\images\progress-bg.png (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\images\Loader.gif (10 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\images\Grey_Button_Hover.png (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\form.bmp.Mask (244 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\images\Close_Hover.png (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\00052EFB.log (16 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\css\sdk-ui\button.css (417 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\locale\EN.locale (4 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\css\sdk-ui\progress-bar.css (480 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\css\main.css (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\css\sdk-ui\browse.css (337 bytes)

The Installer deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\00052E5F.log (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\00052EFB.log (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\bootstrap_26010.html (0 bytes)

The process Install JDownloader.exe:3420 makes changes in the file system.
The Installer creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1EC7.tmp\System.dll (23 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1EC7.tmp\inetc.dll (46 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\131425872413744245.exe (6033 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\WebInstaller[1].exe (4648 bytes)

The Installer deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1EC7.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsh1E97.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1EC7.tmp\inetc.dll (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1EC7.tmp\System.dll (0 bytes)

The process 131425872413744245.exe:1480 makes changes in the file system.
The Installer creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc2186.tmp\ns2196.tmp (14 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc2186.tmp\nsExec.dll (14 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\JDownloader2Setup[1].exe (88373 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc20E9.tmp (1857 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc2186.tmp\ns22DF.tmp (14 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc2186.tmp\inetc.dll (808 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc2186.tmp\System.dll (23 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\13142587242731626932.exe (93292 bytes)

The Installer deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc20E8.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc2186.tmp\ns2196.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc2186.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc2186.tmp\ns22DF.tmp (0 bytes)

The process %original file name%.exe:3428 makes changes in the file system.
The Installer creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\RarSFX0\Install JDownloader.exe (2820 bytes)

The Installer deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\RarSFX0\__tmp_rar_sfx_access_check_334528 (0 bytes)

Registry activity

The process 13142587242731626932.exe:3104 makes changes in the system registry.
The Installer creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Tracing\13142587242731626932_RASMANCS]
"FileDirectory" = "%windir%\tracing"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"

[HKLM\SOFTWARE\Microsoft\Tracing\13142587242731626932_RASMANCS]
"EnableFileTracing" = "0"
"MaxFileSize" = "1048576"
"ConsoleTracingMask" = "4294901760"

[HKLM\SOFTWARE\Microsoft\Tracing\13142587242731626932_RASAPI32]
"ConsoleTracingMask" = "4294901760"
"EnableFileTracing" = "0"
"EnableConsoleTracing" = "0"
"FileTracingMask" = "4294901760"

[HKLM\SOFTWARE\Microsoft\Tracing\13142587242731626932_RASMANCS]
"EnableConsoleTracing" = "0"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "46 00 00 00 3E 00 00 00 09 00 00 00 00 00 00 00"

[HKLM\SOFTWARE\Microsoft\Tracing\13142587242731626932_RASMANCS]
"FileTracingMask" = "4294901760"

[HKLM\SOFTWARE\Microsoft\Tracing\13142587242731626932_RASAPI32]
"MaxFileSize" = "1048576"
"FileDirectory" = "%windir%\tracing"

Proxy settings are disabled:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"

The Installer deletes the following value(s) in system registry:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyServer"
"ProxyOverride"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
"ProxyBypass"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"

The process Install JDownloader.exe:3420 makes changes in the system registry.
The Installer creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Tracing\Install JDownloader_RASAPI32]
"EnableConsoleTracing" = "0"
"FileDirectory" = "%windir%\tracing"

[HKLM\SOFTWARE\Microsoft\Tracing\Install JDownloader_RASMANCS]
"MaxFileSize" = "1048576"
"FileDirectory" = "%windir%\tracing"
"FileTracingMask" = "4294901760"
"EnableFileTracing" = "0"
"EnableConsoleTracing" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\Install JDownloader_RASAPI32]
"EnableFileTracing" = "0"
"FileTracingMask" = "4294901760"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"

[HKLM\SOFTWARE\Microsoft\Tracing\Install JDownloader_RASMANCS]
"ConsoleTracingMask" = "4294901760"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "46 00 00 00 3C 00 00 00 09 00 00 00 00 00 00 00"

[HKLM\SOFTWARE\Microsoft\Tracing\Install JDownloader_RASAPI32]
"ConsoleTracingMask" = "4294901760"

"MaxFileSize" = "1048576"

Proxy settings are disabled:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"

The Installer deletes the following value(s) in system registry:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyOverride"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyServer"
"AutoConfigURL"

The process 131425872413744245.exe:1480 makes changes in the system registry.
The Installer creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Tracing\131425872413744245_RASMANCS]
"MaxFileSize" = "1048576"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"

[HKLM\SOFTWARE\Microsoft\Tracing\131425872413744245_RASMANCS]
"ConsoleTracingMask" = "4294901760"

[HKLM\SOFTWARE\Microsoft\Tracing\131425872413744245_RASAPI32]
"EnableConsoleTracing" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\131425872413744245_RASMANCS]
"FileDirectory" = "%windir%\tracing"

[HKLM\SOFTWARE\Microsoft\Tracing\131425872413744245_RASAPI32]
"MaxFileSize" = "1048576"

[HKLM\SOFTWARE\Microsoft\Tracing\131425872413744245_RASMANCS]
"EnableConsoleTracing" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\131425872413744245_RASAPI32]
"FileTracingMask" = "4294901760"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "46 00 00 00 3D 00 00 00 09 00 00 00 00 00 00 00"

[HKLM\SOFTWARE\Microsoft\Tracing\131425872413744245_RASAPI32]
"ConsoleTracingMask" = "4294901760"
"FileDirectory" = "%windir%\tracing"

[HKLM\SOFTWARE\Microsoft\Tracing\131425872413744245_RASMANCS]
"FileTracingMask" = "4294901760"

[HKLM\SOFTWARE\Microsoft\Tracing\131425872413744245_RASAPI32]
"EnableFileTracing" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\131425872413744245_RASMANCS]
"EnableFileTracing" = "0"

Proxy settings are disabled:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"

The Installer deletes the following value(s) in system registry:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyOverride"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyServer"
"AutoConfigURL"

The process %original file name%.exe:3428 makes changes in the system registry.
The Installer creates and/or sets the following values in system registry:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
"UNCAsIntranet" = "0"

The Installer deletes the following value(s) in system registry:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"

Dropped PE files

MD5 File path
1b565d6bed32cebd8087bc5228f8b3b4 c:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\WebInstaller[1].exe
6417fb5f72d5477e37431aec2005c85e c:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\JDownloader2Setup[1].exe
1b565d6bed32cebd8087bc5228f8b3b4 c:\Users\"%CurrentUserName%"\AppData\Local\Temp\131425872413744245.exe
6417fb5f72d5477e37431aec2005c85e c:\Users\"%CurrentUserName%"\AppData\Local\Temp\13142587242731626932.exe
e6d17971f0a6265a9efd7c57e6709bd0 c:\Users\"%CurrentUserName%"\AppData\Local\Temp\RarSFX0\Install JDownloader.exe
a436db0c473a087eb61ff5c53c34ba27 c:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc2186.tmp\System.dll
c498ae64b4971132bba676873978de1e c:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc2186.tmp\inetc.dll
14f5984b926208de2aafb55dd9971d4a c:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc2186.tmp\nsExec.dll

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

VersionInfo

No information is available.

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 4096 165770 165888 4.6575 d06d79869523ea3421d1bec81acb4dd3
.rdata 172032 20435 20480 3.73605 ae7c16bd625a124b8fbf6ecc9002c4ff
.data 192512 136232 5632 2.40214 6754819d963e719555064632286f5a0d
.rsrc 331776 20391 20992 3.13521 5cb33bf1077f4e3b41d62c950dd7d4ae

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

URL IP
hxxp://installer.jdownloader.org/wb131425872413744245two 85.131.130.148
hxxp://installer.jdownloader.org/rand_13142587242731626932/2434/1/windows/32/__/0/jdownloader2 85.131.130.148
hxxp://fetch.jdcdn.org/download/dl/forward?rand_13142587242731626932/2434/1/windows/32/__/0/jdownloader2 148.251.68.18
hxxp://rp.dodedore.com/ 54.171.164.13
hxxp://os.dodedore.com/JDownloader2/ 52.49.117.98
hxxp://rp.Dodedore.com/
hxxp://os.Dodedore.com/JDownloader2/


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

ET POLICY PE EXE or DLL Windows file download HTTP
ET SHELLCODE Possible TCP x86 JMP to CALL Shellcode Detected
ET TROJAN VMProtect Packed Binary Inbound via HTTP - Likely Hostile

Traffic

POST / HTTP/1.1
Accept: */*
Host: rp.Dodedore.com
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
Content-Length: 1152
Cache-Control: no-cache

...3E.Q)_l.y...K.C.....^..S..G.gRw.&4..( ..v.E.......:../uo.j...o.h.. .N}.I.p...I..
.j..)t%..*.....^k$...*gJ...G.0..P|4.;.$....s.{..pw.wWe.*..9Y..T.P.(....A......e.......ms..V ....dJ..w.T`........... ...8.....U_3[....ZqD......ty7..Ak.]....f...\c.....R.. .h...4.%t...g.eD.g....*L.%J2.K......'.[2sLL.. Fjn....*..O.tZ\S....7.u..v2~.#f..td.A..M.!Q.v....*..{6....j.9.....R......d-......Z..J.
.6}.#M0T.L<.:L.k9.
...Z?.
.x6" 0M....}..B.`...q.mXP....`...T..8.._...'....x^.........p...
.._...mJP"....e{..v.5........R"R6...Z..TeE.v.3.v.....]d......3.y......%2...s;Fo7.cO...0m.$x.."...z..CK..v.4..........{.NT..u.......V.....NZ......O..T.z..Ks...<..(..p."g.6d.O....qh.U..*..P..[?.C.G..^..>o....Al._..$.....8..4%.D..Q8..".....@n
Y...X.L&..K]5.K.....6f...P^.v..#Ls.s*8b.<t.....<.0.7..>.M|..$....m.../M0.6dJ#......j...a8W~d.q......c.......o....
t...Z.j8f..b.....~....q\...\6.......?q.a.k.;Z.}...b.2..R...~=[.E..{~~EO.#.q....i.....O.K....w..@...i....^\G.....v{35.......1Z3,mtS....]sf.....0.Dms.".5<IZ.a.!..[).!..'..Q).........h.......j....*ic....u.C..l..Ht7T...M....J..O@eT.dK7.9=S...T].... 1...`.#..j..."S.A .&.......
.."........
.I.;V.$EU.I 9...._n...0.*...
HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Thu, 22 Jun 2017 06:40:40 GMT
Content-Length: 0
Connection: keep-alive
HTTP/1.1 200 OK..Content-Type: text/html; charset=UTF-8..Date: Thu, 22
Jun 2017 06:40:40 GMT..Content-Length: 0..Connection: keep-alive..


GET /download/dl/forward?rand_13142587242731626932/2434/1/windows/32/__/0/jdownloader2 HTTP/1.1
User-Agent: AppworkWI_2434_jdownloader2
Host: fetch.jdcdn.org
Connection: Keep-Alive
Cache-Control: no-cache


HTTP/1.1 200 OK
Server: nginx/1.11.11
Date: Thu, 22 Jun 2017 06:40:37 GMT
Content-Type: application/octet-stream
Content-Length: 1677234
Connection: close
JCGI: 1
Access-Control-Allow-Origin: *
Content-Disposition: attachment; filename="JDownloader2Setup.exe"
MZP.....................@.............................................
..!..L.!..This program must be run under Win32..$7....................
......................................................................
..............................................PE..L....^B*............
..............................@.......................................
@......@..............................P.......\.......................
......................................................................
..............CODE....0........................... ..`DATA....P.......
....................@...BSS......................................idata
..P...........................@....tls................................
.....rdata..............................@..P.reloc....................
..........@..P.rsrc...\...........................@..P.............@..
....................@..P..............................................
......................................................................
..............................................string................&l
t;.@.....m.@..........)@..(@..(@..)@.....$)@..Free..0)@..InitInstance.
.L)@..CleanupInstance..h(@..ClassType..l(@..ClassName...(@..ClassNameI
s.VWUQ.................4$............$.... .$.A..5<.@..8.^..~...;.$
s...$;.s...;.v.h.@.. .WS.......u.....@......6..<.@.u.Z]_^[..@.SVWU.
.......L.@....?.........]..3;{..,.....C.......>.tP.F..C..F.)C..{..u
>........5..;.u...........>.t!............<$.u....V........3.
..YZ]_^[...SVWU.....$.....L.@....?.........].....;.t.;s.u.;s.uW;{.

<<< skipped >>>

POST /JDownloader2/ HTTP/1.1
Accept: */*
Host: os.Dodedore.com
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
Content-Length: 1456
Cache-Control: no-cache

.^.S...N)Tw?.G{&..k"m.......o....*..Txm..2.2c..p.l.......`..JQG..S.?^ ....t..x
kUN....,-...t.x.....T..JbP'./wm.....#.SL..q .Myi... ....y{..5.............l......
iI..k..u3..].K...2.>...&....aI.U.[>....h...~...r`s....'....\KT..!.......uL.d.....,......d.o..A#}B....a.8.#..Y\.l.Y.1.Q....]s'....Q.^.C'|...bYn...zva...?v..N....=...2..'..@Uo..@.n&W.2..../5$.Wol..i..7i.(...X...(|.I.S.`..4...;...1. $.J&..i...x.S.....r..`...{......T......".C...._H..}..V...1.B.(.)7.n....U.1=.b......L_'.0....[./..s `..Ln.;..Z.......Y.......@.u.2...%."a9..'0e~.W.YP.I.X(.....@.......]...}.i/.....sTe......J.T-....m....{,LO....5.a......Xa..
X......u.....
.Y?5#B........q.7...(.D>...X.HG_.../
#^3..R%4....z..VSc.O
:$,.<Z.q).@5...)......-.....\,..x.2....F.....#....L[..Pq..........T!;....:......u.o.x...A7..
....:y..^.....X..1.0:.Rf.
.
....I...t.1!...u.L6!.hZ............p..l...Z...w..K..8.).IWs...'.
e.T...|_....gP&(..H...@....qcez&..(.~.m.:...iK.~.At..zjZ.......G.ut. D..~w.`..<..f]..#........_.6.3 ..Y...
r7..f.......1.7.B".G...bZ...4$...bk.....{..J...Pm. ....$B.G....\.H...`J......O..M...f4.....`.>.f@pHi*.z....J.!z.....IE..[..X...4....C..H..@5v..q/ 0...@.....33..c.Z.lkf...8...y{c!X.".........8.(Tm.8..P].....~._...m'6....o..f.T.3...U.]...@.(G..:.V..a.Nv....uL.....z.:=....f.>....7.Je.............I.hi.~?<R..5..yo%....O...=..q<.*..4
HTTP/1.1 200 OK
Cache-Control: no-cache
Content-Type: text/plain
Date: Thu, 22 Jun 2017 06:40:40 GMT
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Server: nginx
X-ICSCT-CC: UA
X-ICSCT-GICSET: 137155icut
X-ICSCT-IP: 194.242.96.218
X-ICSCT-SERVER-NAME: ads.slave-150-prod-eu-west-1a-002b667586b33e4ff
X-ICSCT-TIMESTAMP: 20170622014040808
X-ICSCT-VERSION: 1.5.2
X-ICSCT-XC: 1f3cfb072bc5ded412eb0f20eaa0b3fa349c056a
X-ICSCT-XS: 91bba9083b637bbb85f2bc525458ea3d2e0cb405
X-Robots-Tag: none
transfer-encoding: chunked
Connection: keep-alive
1ee0...GO8..G8......$a....l1RpG.N......I.Y...F...<.&.^..7. .B:g...n
..t..1.o..0..V620...,....d......9.....g.{....H8m~...g.s.P..p!..v..../=
...../.......u`......u0:........m*p...1}...]....._k......{....'Q&...q.
..~.(.............\1.{y....o...4...Z.?ap.,.Sf..._3C.h.O.K.r.-..v.}P._.
.H...._..<.xB?s7.V.{Q..It.#..W>..Q._E.....)`..d..q......f.SK.-..
B .....<.p..A.=.........Y......,......#H.....s.........ZND7...th...
......../4.piBv....Y.-.......PU.8...{.y8.....U.....(%@...,...{...EP^Q.
.i.J....I...\..E.....n.sv.[u....F...%`.....$.A...:..m0...Ip......4j.]c
=..).V...B;...cp..b.k.].\n.1?[.T.S..>...r......4.m..Lf~..........e.
..T...:...2Fb<[. ...2>J0.............[w.$;.@.@.T....g..P...sW3.y
....> W...H.v...........(D....a?....y........6.B#.R.......@...d....
..0o...UU.......,Q.....'...:..1Y$[....z......].>...U[...Fp.P.Q{.&*(
..../'.v....I....r_wz}R....Y....J.%S..J..C#........Q.z.......B..;.....
26...FF. .....Y........0...l..^....u......w.3.)1........(..9....{.4o.(
.CR.?.....ljt..}..h}i... h1.g.0.)._G..w........6Lp. ..p......<U....
...V!.:...^S.P....z.&...'.7EsS$.)...IV........3b..D.........i2>{...
....P.....".Pe.."$.....FE...J...%{.1...<I;W..H.Q.Y...9....g4gP.....
....E.... hg.i%._.HWe7N(CL..P....K"E(..I.JE8..P".6...>...`..JJO..&l
t;...M.43`...b......[t.iyY;...*J............d........k......$#..Dq..#S
.&.k......i....Z.h....I.>..%ei..0.!<.M......F.......F?.k...QW...
_..r0...H...6.|....z..k.....9j.....D..(y@..5s..Ldr..x!.N$../.~.,......
f...z.J.Ow.$Oy.u...&B.]..(..N..s.z..l.b....I _].,.l..5.!..D&..H...

<<< skipped >>>

GET /rand_13142587242731626932/2434/1/windows/32/__/0/jdownloader2 HTTP/1.1
User-Agent: AppworkWI_2434_jdownloader2
Host: installer.jdownloader.org
Connection: Keep-Alive
Cache-Control: no-cache


HTTP/1.1 302 Found
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Location: hXXp://fetch.jdcdn.org/download/dl/forward?rand_13142587242731626932/2434/1/windows/32/__/0/jdownloader2
Content-Length: 0
Connection: close
Date: Thu, 22 Jun 2017 06:40:37 GMT
Server: lighttpd/1.4.35


GET /wb131425872413744245two HTTP/1.1
User-Agent: AppworkWI_26062015_1
Host: installer.jdownloader.org
Connection: Keep-Alive
Cache-Control: no-cache


HTTP/1.1 200 OK
Content-Disposition: attachment; filename="WebInstaller.exe"
Content-Type: application/octet-stream
Accept-Ranges: bytes
Content-Length: 79736
Connection: close
Date: Thu, 22 Jun 2017 06:40:36 GMT
Server: lighttpd/1.4.35
MZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$.......1p.:u..iu..i
u..i...iw..iu..i...i...id..i!2.i...i...it..iRichu..i........PE..L.....
oS.................\...........2.......p....@.........................
.........2.......................................s.......p...Y........
..H$..0............................................................p..
.............................text....[.......\.................. ..`.r
data.......p.......`..............@..@.data................r..........
....@....ndata...0...@...........................rsrc....Y...p...Z...v
..............@..@....................................................
......................................................................
......................................................................
......................................................................
......................................................................
............................................U....\.}..t .}.F.E.u..H...
..6B..H.P.u..u..u....r@..B...SV.5.6B..E.WP.u....r@..e...E..E.P.u....r@
..}..e....Lp@........FR..VV..U... M.......M....3.....FQ.....NU..M.....
.....VT..U.....FP..E...............E.P.M...Tp@..E...E.P.E.P.u....r@..u
....E..9}...w....~X.te.v4..Dp@....E.tU.}.j.W.E......E.......@p@..vXW..
Hp@..u..5<p@.W...E..E.h ...Pj.h..B.W...r@..u.W...u....E.P.u...\r@._
^3.[.....L$...7B...Si.....VW.T.....tO.q.3.;5.7B.sB..i......D.......t.G
.....t...O..t .....u...3....3...F.....;5.7B.r._^[...U..QQ.U.SV..i.

<<< skipped >>>

The Installer connects to the servers at the folowing location(s):

131425872413744245.exe_1480:

.text
`.rdata
@.data
.ndata
.rsrc
uDSSh
hu2.iu
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
GetWindowsDirectoryA
KERNEL32.dll
ExitWindowsEx
USER32.dll
GDI32.dll
SHFileOperationA
ShellExecuteA
SHELL32.dll
RegEnumKeyA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
ADVAPI32.dll
COMCTL32.dll
ole32.dll
VERSION.dll
verifying installer: %d%%
unpacking data: %d%%
... %d%%
hXXp://nsis.sf.net/NSIS_Error
~nsu.tmp
%u.%u%s%s
RegDeleteKeyExA
%s=%s
*?|<>/":
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\13142587242731626932.exe
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc2186.tmp\System.dll
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc2186.tmp
u.Uj@
MSVCRT.dll
HttpSendRequestA
HttpSendRequestExA
HttpQueryInfoA
FtpCreateDirectoryA
FtpOpenFileA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpEndRequestA
InternetCrackUrlA
WININET.dll
inetc.dll
Open URL Error
URL Parts Error
FtpCreateDir failed (550)
Error FTP path (550)
Downloading %s
%dkB (%d%%) of %dkB @ %d.dkB/s
(%d %s%s remaining)
REST %d
SIZE %s
Content-Length: %d
Content-Type: application/x-www-form-urlencoded
Authorization: basic %s
Proxy-authorization: basic %s
%s:%s
FtpCommandA
wininet.dll
%u MB
%u kB
%u bytes
%d:d:d
%s - %s
(Err=%d)
NSIS_Inetc (Mozilla)
Filename: %s
/password
Uploading %s
9!9-9B9}9
2.dll
nsExec.dll
:":2:7:@:
@.reloc
%Program Files%
SOFTWARE\Microsoft\Windows NT\CurrentVersion
SOFTWARE\Microsoft\Windows\CurrentVersion
\System.dll
\nsExec.dll
\inetc.dll
$$\wininit.ini
.reloc
OZ@%x
Execute: C:\Users\"%CurrentUserName%"\AppData\Local\Temp\13142587242731626932.exe
nsc2186.tmp
dm\AppData\Local\Temp\13142587242731626932.exe
2186.tmp
400702836
070283600
ttp://VVV.jdownloader.org/
se check your internet connection and try again or contact us at support@jdownloader.org.
: 2434 $
"C:\Users\"%CurrentUserName%"\AppData\Local\Temp\131425872413744245.exe"
C:\Users\"%CurrentUserName%"\AppData\Local\Temp
131425872413744245.exe
ers\"%CurrentUserName%"\AppData\Local\Temp\nsc20E8.tmp
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\131425872413744245.exe
-737540699
131425872427472269
131425872393220020
131425872393376021
1677234
13142587242731626932
hXXp://installer.jdownloader.org/
Webinstallation failed. Please check your internet connection and try again or contact us at support@jdownloader.org.
windows
FAILEDEXEC
hXXp://VVV.jdownloader.org/
B.ô<?
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="*" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v3.0b0</description><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="*" publicKeyToken="6595b64144ccf1df" language="*" /></dependentAssembly></dependency></assembly>
04090000
CompanyWebsite
hXXp://VVV.jdownloader.org
JDownloader2 (BETA) Setup for Windows
2.0.0.5

131425872413744245.exe_1480_rwx_10004000_00001000:

callback%d

13142587242731626932.exe_3104:

.idata
.rdata
P.reloc
P.rsrc
kernel32.dll
.DEFAULT\Control Panel\International
File I/O error %d
lzmadecompsmall: Compressed data is corrupted (%d)
lzmadecompsmall: %s
LzmaDecode failed (%d)
shell32.dll
/SUPPRESSMSGBOXES
/PASSWORD=password
Specifies the password to use.
For more detailed information, please visit hXXp://VVV.jrsoftware.org/ishelp/index.php?topic=setupcmdline
/SL5="$%x,%d,%d,
Inno Setup Setup Data (5.5.7)
Inno Setup Messages (5.5.3)
mu2.iu
user32.dll
oleaut32.dll
advapi32.dll
RegOpenKeyExA
RegCloseKey
GetWindowsDirectoryA
MsgWaitForMultipleObjects
ExitWindowsEx
comctl32.dll
name="JR.Inno.Setup"
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
<windowsSettings>
<dpiAware xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
</windowsSettings>
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/>
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/>
<supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/>
<supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/>
<supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"/>
!'%s' is not a valid integer value('%s' is not a valid floating point value
'%s' is not a valid date
'%s' is not a valid time!'%s' is not a valid date and time
I/O error %d
Integer overflow Invalid floating point operation
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted%Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'
Invalid variant operation"Variant method calls not supported
External exception %x
2.3.4.6
5.2.7

13142587242731626932.exe_3104_rwx_01400000_000D1000:

<0">%S
.sD;J"
e.GHa
 rT%sv
.muSZ
q9?%sbW
55M%Xeif_
F*.lO7
_Z.kLr
%F/.`
Q.ZT%lj
w&.Fw
YcRt0
;.%f~
>œ1z
>.Svk
A%2xk
%C@yyaW]
O.hp(
!*;^]=?$;
.rwOd
g..Hm
QweB
|$K
{L&.ci
.Av>Q
%S)1d
VDu.LN{9c
].IT`
4t%SNq
 j%2sw
y*mM%X
Q%u"l
Z.FP9
}.xujHQ
K,%s>Q
wI%7Uj
%u,Vqd
cð\j
eJ%CU`
%SJO 
S6.%fl!
CD.ja
R.AqO
hLl|j|^%s
%DKn^?|7
%f[-G
yu<
%corF
-ea}r
.OVPx
$A.lP
%DT#n
\%dG&|5t
UDPc
.yr~9
OJKA%Xa
cI.QMN
W.z%sN
.TQ1BU
j.vU 
Y6Q(%CH
ya-%u$=
g!Y.ws/
%xF[Sb
..oZX
SB%f^c<
.rmS8
$W.uE
t*R%x
dlt.vZ
Bnl%d
.gfCr

13142587242731626932.exe_3104_rwx_014E0000_000D0000:

.Az>;
Fg.
kuDp
.Vriay
ñfb
^,PE
H..xB
]pÂ
P.JJs
&%U4T
KnRs%C\#
tjv.VX
o.Jm@
g`p
M/;3%u
}O..Nb
$/1.cP
%FV?}Hp5
R=.Qr
q$.TAR
^%S6G
lTD.Yg
%fyhmY
5.rE!
}!v%x
q=1.vJ
0~.ZH
9e%U:2[n
37%cO7
@.jRqX
].rba
r%ukqy\
F%X-X
ôH3
K><.SAd
!.RT>V&
.lZ%N K
|.UWI
B&.a^.ZHK
R.XOG
fl.xIq:q
8#.BjL
L.KLY
.zGh@wZ
# {g7%UE
.DEK]
u%xck
:{(.uC
.RlS}7
(;B%u
ùeD
AtH%F
y.iqz
x?jw%C
%6Sfgf
.xM$?4
.KgvE
.eK61
r6V.DqQ
_(.BS0
T|@
 2-%x
9(S.ad
ecÜ
.gg`K
.lBkV
p08a%x
xO!.zF;
"h4 g.nH_
.Pg3,
'g.IZ"
2#.MM
\Ru%U

13142587242731626932.exe_3104_rwx_01790000_000C3000:

f.EJm
eM%XbeY
h%fkb
~*I^G.lj
'4.cM
.uGL;
J.VUgY
ÛU9F
.qU{n
*%FLS
-Enf}
%d !7
iq.En
.lh,sc"N
EL9'.ja
D&.jY>C
G.xBG
.XYtt
4.frn
V.Fjf
Em.pJ
url~\9
2.MmC
MMfV%D
I-vx}
>F%SN
b.NhIt
4W%Xo
<.IEx
Ju.pf%K
..uK>
%Fh@-
m C.iP3
W8K%d
wzq(pWeB
aweb0
 e.XD
9J%xQh
V .jSC{
Z_].BAh
%U |,
r.HK 
?|.OK9
.Eh\,
D.uJl
t=%d|u
-J2%s/.f
Jb.ysj~
%.SF\
&.LmX!
df%S(8x
MA.nm1
We.DS
.XVk3vDK
k.PSJZ`
%C,rB
.EUw$
.qk5BIPA1g.
/5.XI
W{%d<
U|.kb
GZX%F
eF[.Pi
.reHb
%U\O|
e/CL%D
{?M.WKvq
j.voA/
/Z.Nu

13142587242731626932.exe_3104_rwx_01931000_00192000:

kernel32.dll
MSWHEEL_ROLLMSG
MSH_WHEELSUPPORT_MSG
MSH_SCROLL_LINES_MSG
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
htKeyword
EInvalidOperation
u%CNu
%s[%d]
%s_%d
.Owner
EInvalidGraphicOperation
USER32.DLL
comctl32.dll
UrlMon
IE(AL("%s",4),"AL(\"%0:s\",3)","JK(\"%1:s\",\"%0:s\")")
JumpID("","%s")
TKeyEvent
TKeyPressEvent
HelpKeywordD?
crSQLWait
%s (%s)
IMM32.DLL
AutoHotkeys|
AutoHotkeys
ssHotTrack
TWindowState
poProportional
TWMKey
KeyPreviewp
WindowState
OnKeyDown
OnKeyPress
OnKeyUp,
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
vcltest3.dll
User32.dll
A`bng`@ikc-4,uUxlxs-4,Ht.HA
Vh-0,Cd`jiVhlxwd-0,tLcibD.ZP
Portuguese
ZkkdDocjn^g-4,o.ye
^ioM-3,iiziGmwItI.cG
\h-2,Jfal\`dgxj-4.DZ
,-\ T,/.Om
hcl.sf
-24,rqaxvdj*`x,.EQ Q,hep Q ,,BIDWUAT\XGOZUWRKX^Ralvvoxg],,1 R,`migr-2,*fh-1,oaubs R,t`ngs,.(JJKS]B[XPD@^]T]OP]]eduykpdR]mv8>13@efd,, TB-c
webqskv`T-Y
oj-2,`ac<<*kcb.jo
ak-2,`ob<< T,jcb.je
Ufwm`j U,[x`f`saka-0,oqan` U,edmmiogve Q,yd-0 Q,mddmka(vgq`n-0,q(cklff,.lfhzliuka(ggw-0,u P-:.\
A-4,gmqskaj W,CjinlCkcg,.ECOQ@BE\ECG,.mt R,`ks R-2,qwravsgj? W,w-2,mie,.ECOQET]JATIZKW R,gjtvkec,,,.Bnnk> W.],t
IN]JVN]K]KJ]B]F^UF@@]\v-2,ujbRBjazsnc^s`lkr-1,`-1,].jl
7Teah P,Ckh`-3,fkgo-2,7*NNYO.uh
1.2.3
 P,=3/.sY
Gx-21,\igh]ixyj-42,M.DJ
A`qjz``-0,ZkdkNgij.pc
Kcqjpc`-0,Aaj-1,gEdafa`.pM
Kf`, -1 W,hefc,.cxb`,,juoocbz,,.I,x
Kn` R-1,/-2,`zfoiauk UU,/\`kjgsmk,.miajim/gv(aaq(kkcaaka^.s
Ecezcb-4 S,Tmeic6.fA
Bc/K-33,`-1.jG
Jbhblnrefc V,H-0,bv-1,li.AT
Uju-0,c-2 W,Ht-2,h-4.Rq
Ijv-1,h-0,jm Q,Jq-1,n-2,/,.u`l,.lnmw Q,ll`oj`zh`m-2 Q,xjzi`vz Q,kbz`.^l
Q-0,iznjib Q,`u,.tgu-0,qyi-1,ulb.a-F
Ob-4,/dcdzfe, kh-3,`/r-2,jld.vL
V-1,ns-4-.,hx V,lmdeehea,.mdhi Q,hi`onezhdh-2f.a
ebP-3,dLfnda`-4,`yj-4.PL
Hetoczb-3,ih W,cziu`m-1,webk W,ocbiioxncb-4- -,,kcnbk,,sc,,ofboik,,cbb,, T.BG
Lfak R,fi,.m-12-.,pl-30,gz-02 R,h-2,k R,yn-2,q`ai R,`a,.R-0,`v-0,)Bafl/ SR,zz-2,rllzkgh,.kgnlkefz-0,)-0,a R,m`yle`of)i-1,md/mw-02,kl-2,/-2,g-0,ykp U,/zppf`e)n`m-2,gkp)GKCM/-1,gxzkq-2,/zm)boil/-2,w-0,j P.j-G
Xbzscbxdn W,Hhfb,.Rc-2,k;* N,z
Lz,--1,`k`-1 U,zenq,.yg`,.kfik,-`k,.yg`,.-3,jwxh-2 U,fl-1 U,lhjk,.ngd`jja,.-3,fkmh/rk,-cd-2,y/q-1,dja,.y` U,jbxkbbna,.d-0- -.,_jvzl-2,qgch U,jbxkbbna,.laa,.dhka-4,fki,-ldmej, .x`
Qj-0,zb-21,gmh(zkj(km-0,a-1,f/latadabk( V,qj-0,zb-21-.,m`2,..cn
Sggwb/cwb/lj W,bmwb/qjr-2,a`t/adwn`ib/mc W,kmricmdcflb, /ddnckk`/vmb/fjpanjfk,,R.r
Naplfaff*ffq*hfkfkc,.*cfkd,.cm-2,`kmkj W,vb-1,bcn,.nq*-2,swie) W.e
Ibav V,DHNB,,-4,jwyh-1,r-4--,nti,--4,g-43,fhk,-fh,,]-2,itt/Kcij VQ -,zhmocc,,y` V-0,b-2,m,,zfrd,--0,ne-3,/ui-4,yc-3-- W,v-3,bmgnav V,bb/Tmchc,,-3,zv-1,b-2,r U.xA
PHgyj`go`Mkma`m-1,exg-1,*^-2,`,, U,(ye-4,(gcbg-1,ah T .,wefma,,i`kx`kv,,lasbdaeh(gw,,k-0,v-3,m`p`q,.mb(-3,vco-1,a-40 P.c?
 R -,/zyxf`l Q,nijha,.jg-0,ky Q-1,bnd-4 P.j K
,.)pz-1,dbc,.vb-2-.,ula,.mb-1,id* P.^ N
Qe-0,ud T-1,cpqkuu T,gaok-1,ce(,.ktwz V,ca,.oo T,Jivjbi``,.kn`k(nA
Yd-00,l U-1,mxpk-02 U,gogj-1,mm),.-0,lwxm-0,v,.-4,`qfg-1,q,.@]Q^([d`ol U-22,yuaz-2 U,yaei,.khp-2,m)aa-4,giaim U-1,mzqoz-2- C,Y
Mfvje-2 S,Io-3 S,haogaj PS,Pazbh,.mkq`ep>,.C.i
 Q ,,On-3,iNgxbf\dvh5,-.xH
Blmiqkghd/zi S,Lfsmd-2 V,Nn-3 V,wgk V,efbc S,f-2 V,``cvojzcov,.blx`jlnjcg/ojqjobzn.n
Bm-2,mirk-1,c`,.hohk`gik,.oj,.Mnq`eu T,Cov>,..i,F
 U.Ie
Cnr S,M`dmkl-3,jaa*Qoamf,.xkp,.-1,ow,.-0,e S,:.y
_yexofebk,.Hc-0,``cmji-3-,,k-33,c-1-,,ocji,,j-1,ca6,..Gg
Iip/Tcr-2,di W,luif-0,bh, /r-3,k5 W.rB
Lc` W-1,g`n-1,ggs,.lqjlgv=,.t,.
\zh-0,lehah,-rz-12,dakhe/\hsyj-4 Q,mnnj/-0,b Q,z-1,h.lZ
 T .-0,b-21,kh2,..Sc
E``aclzfia,..yq
 W ,,oc-1,bgcjhnh1,,.FF
 S .,gx-03,Lckk5,,.Jj
]fm,,-0,kyyl-21,im,.zmgim,,h`l,,y-1,gz`jmh)afi)jajokz,, Q.Cd
AcfhTcph W-4,dh-4,zonson,-dbkc`o V -,hfn,-qkfxb0*.U-\
Scbtvhdxci W-3,c-3,bx V,ba,,reb,,`dki V-3,nvc QW,each-3,ci<,,tht-1,icti V,ebmbhu6 V.BQ
Rok,,uh-03,eb,.hth-31,cc,.-3,giii V,t-01,vh-1,x(.I,v
Kc`bmozegb,.e-0-,,ay-1-,,aj(akag-3,w,, P,o-03,zi`x2,,.IC
Aasliaef U,oga`bapdzkp U,feq U,lagk,.bp`k`,, T.`
]DKizHi-4,exc-1,Hc`hk-3.GI
L_LCUNTF, KHC.op
0.0.0.0
3?:96=>?59:;.ZQ
6?0N2=.Lq
;768>1-80
cabinet.dll
\fgejnhg,.Dhr,.f-3- ,z`b, -2,gbyz,..8y
]bmmdi,,-0,g,,iw-13,ml-1-,,xgm,,jfdi,,yam,,LEH P,/ocbai,,x-2,q,,-3,joy`nz,,-02,axi5(.wC
000000000000
 ;7.Q,>N-Y,[ T,Tc.Uv
Piwapxn`e,,aok`bj R,ci,.deu-2,v,,fzvij-3,v PW-2,goh`f,,fzvij-3,v,,n-2 R,of`aikbgh WV,deion`ntkb` WS ,,Ozv-1,Ukq6 W.b=
Eb-1,tw, -1,bsd-1,s S,jzsff-3,s S,mononj,  S,lanml,.aly,.tfhaig*,.Ow-43,Ufx4 W-3h
Bpzpfkz R,Bz-1,mu2,.aff)v W,nawil,.qh-21,ab(hkkm4 R .-<
JDT,,odki)dt,,-2,bh,,kd`,,obu,,@cJidbuu)h-4,x-0,ldx`bi,, Q,34<DO,. P,)jhegj W,xf,-bt-24,fo-2--,a`hy W,j`ab,,-2,b W,xah W,h`-3,l P,)ls6).BT
Y]H.if
d-3,tdcQqdc.Lb
)hix.CB
Y^`acxziagKphh-01,hy,.kle,.jh, mzhjzmi, afar,.gchk V-C.8
,.Roj-0,a4nN
 W,Irgs,,\okyo4 W.eB
ch_strtup_urls
 R,Kvev,.Xmn-0,k6 R.I]
ole32.dll
olepro32.dll
IWebBrowser
IWebBrowserApp
IWebBrowser2
TEWBWindowSetResizable
TEWBWindowSetLeft
TEWBWindowSetTop
TEWBWindowSetWidth
TEWBWindowSetHeight
bstrUrlContext
bstrUrl
OnWindowSetResizablet
OnWindowSetLeft
OnWindowSetTop
OnWindowSetWidth
OnWindowSetHeight\
grfKeyState
TComTargetExecEvent
CmdGroup
nCmdID
nCmdexecopt
hhctrl.ocx
URLMON.DLL
SHDOCLC.DLL
rcmDefault
rcmDebug
DontExecuteScripts
DontExecuteJava
DontExecuteActiveX
DisableUrlIfEncodingUTF8
EnableUrlIfEncodingUTF8
CheckFontSupportsCodePage
DisableSubmitUrlInUTF8
EnableSubmitUrlInUTF8
lpMsg
PMsg
pguidCmdGroup
TTranslateUrlEvent
pchURLIn
ppchURLOut
CmdID
pszUrl
pszUrlContext
szPassWord
ErrorUrl
OptionKeyPath
OverrideOptionKeyPath
OnTranslateUrl
OnCommandExec
'%s' is not supported.
TMsgEvent
TKeyEventEx
Port
Password
poPortrait
OnKeyDownX(
0.750000
3333333
\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent
\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform
User-agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
User-agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)(
This object does not support this method (
Unsupported type for Parameter with Index %d
Method call unsuccessful. Object: %s, Method: %s, Exception: %s , Source: %s.
hXXp://
hXXps://
Icbodfii*zw,.kiskx/N`y-0,fbfjuCkafio-2,).bu
Rfhzlif,.chs,.Hfoobbs,.qoskdc Q,zj W,ukwjh`dsd P  ,).\,u
CJ[hx.Xu
,, S,/kdfcdkh/ymj/dk-10,licj-4- .Zp
Kaxmcangf`h S,M-0,agck-1 S,ko-0,b/h-2,lb,.ng\k-2,uj-1,/la,.zqc4/?.j
NAER_[URNDT].Lw
Baxbjanho`h,,D-0,ahjk-1-,,bo-0,m V,o-0,xcc-4,x V,`` RV.Ja
Mimjihbc,.@ogatbp,.Omik Q-3,a-4,tiwz Q-0,e-2 Q,ha`hi`,.eya,.uc T,b`oo,.nj T,^sergmick Q,Akjd R,L N
ymighko,,h`xihhs,,-0,izc-0,xoh.ED
LJ_.ge
fxk S,Cym^rk.Um
8dQ399tCPkiOj
eiOnKeyDown
eiOnKeyPress
eiOnKeyUp
OnKeyDown
OnKeyUp
Handler with EventID = %s already exists.
Error on IConnectionPoint.Advise
Source don't have connection point for [%s]
@jgico,.qi, k-2,ryofr, zmc, gklnmqod`) V,n-1,w<, ^.1
RZ-3,i-1,/ImznQ.Hy
MAPI32.DLL
LeftPopup
Nomfbz S,k-4,kb-1,h,.pkekg-2,akg(yopc,-gm(U^ S,G^,.tayf S-14,gdoh-1 S-1,t-3,f2,--8.h
)bs-1,fu Q-1,hnrkm,  Q,y`si,.dbr-2,h`d,.3 W.\,y
/h-24,`-4,/-4,nd-1,hk Q,/zfyg,-bh-13,njj,-5,-.ZZ
YR-0,xh]izn.cQ
Ah-1,cif,.znykf W,ua0 W-c G
2.1.0.0
This exe was created with an old version of HtmlAppMaker.
[_FMTZG].mF
WDM.DM
uaixcbzaShz.CP
z-1,o-2,Nl-3,f`a.uz
Ekcffn*-3,l*fkvdib S,b-3,go_C*exeg S-3,bo S,lefoe-2,cmm*-4,qf0*-_X
-0,cnyzgcEi.Tc
R-2,ll`,.age-0,b R,n`ogdzlmi,.cphc U,ah`ck`,.ckkk,  U.b
V-2,h-3,g-2,d`a/ya V-1,h`b/yfc/aaa QSP.hq
https
Hal U,wkysa-1- ,Pvb, lw,.bkrogl`4, [._
Sf[.t,T*.lJ,e
Vco`lhf T,Iif T,qi Q,pmc Q,bjjmkrooc U,Ssh? V,Ae
Fad,,bop,,hkfb*-2,voikp-4,l-0,o`s,.pidz,-.>e
D`zc R,km-2,v-2,gwgk2,.,-bigl P.cm
MSGALL
irsoMsgDialog
irsoJoinPath
irsoGetCmdLineParam
irsoGetCmdLineCount
irsoGetCmdLineIndexOf
irsoGetCmdLineParamValue
irsoGetCmdLineAll
irsoRegCreateKey
irsoRegCreateKeyTree
irsoRegDeleteKey
irsoIsRegKeyExists
irsoRegListKeyValues
irsoRegListKeyKeys
irsoRegSearchKeyKeys
irsoRegCopyKey
irsoGetRegKeyInfo
irsoHttpGetData
irsoHttpGetDataInThread
irsoLibraryExecuteProc
irsoLibraryExecuteProcW
irsoLibraryExecuteProcWithResult
!irsoLibraryExecuteProcWithResultW
irsoExecute
irsoExecuteDllInProcess
irsoSaveExecuteUsingCMD
irsoIsMutexExists
irsoCreatePipeServer
irsoStopPipeServer
irsoSendDataToPipeServer
irsoSetDebugLogUrl
irsoGetDebugLogUrl
irsoGetWebBrowserHandle
irsoGetCurExeCheckSum
irsoGetExeInjection
iubnyybRolkanldf.RW
b-1,[-1,e.Hv
.html
H-4,njBdi-2,o-4,r.vY
\-2,adn,.loy-1,aihzmn)cm-3,aal*, gzyf\mm@-2,IzyGfy-2,odflj*-].d
-4,fhxXahcxgw.rg
gghYcjrf.ae
jehGbeags.qB
PIPE_DATA
PIPE
LNYCD_^.eP
HMVH9>.PE
U`mgtqxw W,`dzu-1,*-1,bhexba0,.OqgbRL*Luj-22,bw*aeooms R,y,.N@=,.adfbedie W,v-43,wjxz W,ly,.ij-2-.,bkklk`n P.e,W
Nombmj T,zg,.`g-0,ofbm,.pfm,.LzebQG(Lva-42,a-1,(afdmmp)-0-.,MK?,.bodbfoke TS,(\aia-2,p-1,q,.s-1,aza,.nombmj*._c
Fxed[E(J-1,c-40,k-3,(glfmkz, -0,(GI?(hmddlmkc,.mdzkmlq,.ha-0,ondmj R-=.I
/,.ghlzvub-3 U,ajb`= S,u.^
-3,1 T-1,`-4,b-4,w37 P,abov=.vN
Hiaokl(wa(-0,bxm(wfm(aag-1,pzzis,.naok2(8-C
Gio`bhi T,mtai, jagjj,.tjrf>, Nk
^ovh,.ei`cghi,.shf`iqc4 V.Q,n
Pno-1,a Q,y,.ehezlcx,.mhyzehik T,t-4,`jodi( V-3,fmu*-3,viikwu*ymjf,.gje-2,a(.e,d
Fas US,MHKUGIPD,, W,fncjdoj W,csaj U,gguvu,.wwnmbvr RW,qigt U,q-1,hfd-2,t U,vgki Q,mhkugipd,.upo`nkfW.\
Oenwfns S,gerwoebf,.bo S,ZNSNGE@WK, rwold S,gx Q,`-0,ysf`-4,mz,.ytm`bod R  ,bl`-4,hm-0,bod PU,1.9
[d-3,k, -3,k-12,h-1-.,_DCKO,-A[_,- R .,hl`)-4--,jk-4,h-1,cbck,.bk,.zch-1,k,,-3-.,oebzfn-4-.,ge-3,zoenk,.yx``bci P  ,na`-4,d`-0,bci PU.iV
KMEBGX, -41,myx(hnjiygx(-1,b-1,m,,xizzn-3 T ,-0,c-04,bndi, -3,mmxcf,,b-4,(xcm-1-,,jbgxciz,,bb-0,xjbki, cn,,-4,da-4- ,ef-44,md`n-3,(ex,,-0,x-3,oc.FC
ung`.Nr
gbo`dhfm.cV
Slqz`-0,vOrHfchg8,.Rlaaom R-1,dzvos-2 RSQ,jm`u`l-0,d)uguam-0,u)c`n-2,jks)pkr-2,c-1,u)va Q,htahm R,bnfr P.]-F
Tktzg-1,sOuOcco`=,.Tktzg-1,s,.u-0,dmckc RV,zuoh-2,aktgii V,mh`r-1,hb V,zh,.rfb,.hkp,.v-1,hmc-2,t,.g`c,.rkuco`fzo``,.rfn-2 V,aik(.ba
Xa-2,vkvzCyEjocj4 R,Legno`,.ve T-1,gypop-3 T,oq*ejocj,./*q-2,gx T,jkn T,`m-3 T,orzvato,.J
irsoExecutePackage
irsoReportPackageError
irsoReportPackageSkip
irsoReportPackageQuit
irsoReportPackageSuccess
irsoReportPackageInfo
irsoGetPackageFilenameFromHttp
irsoGetPackageExecExitCode
irsoGetPackageExecResult
irsoGetPackageDwnldUrls
irsoSetPackageRelProgressShare
irsoGetFireFoxEXE
irsoGetIEEXE
irsoGetChromeEXE
irsoGetOperaEXE
irsoGetFireFoxVer
irsoGetChromeVer
irsoGetOperaVer
irsoUninstallAddExeCmd
irsoUninstallAddOpenBrowserCmd
irsoUninstallAddRegistryKey
irsoUninstallExecute
irsoReportStart
irsoReportInfo
irsoSetExclusiveExec
isroSetReportUrl
-11,jycmjaOaahDgvyc-11.Pg
Iakyhk-1,_goa,,@L/oloakaj/xk,.yiv-2,fcj4/.J_
zfc.bz
]no^dun.Vx
D`khnzhbc,.oby,.gbx`e S.Lh
Og`jeo,.czm-13,elk,,-1,i-1,ma-0-.,jedk,,hmzio-1,kh6(.I-A
Im`jce,.c-1,g-13,cfk,,zc-1,mgq,.jcnk,,-2,c-2-,,dmz,,lm-0,bn8,..I,*
\fuj-1,w U,P\O U,qah`k,.nlvcbqff,-U>
\GCAPMA][.oj
TcUlue.PL
W`mmqzeon,.wvamaff P,4.]
z`o1caig2,.hf5b Q,0cfh)914`,,34`6;ia2f=ae-3,L1
e-1,f.Cw
Kh`k-0,dbi/ydk/Zmzlei-1,/oe`n-4,u PQS.gZ
-0,ilCcbd.LG
)h-4,k.bR
Poymok-4-.,po-3-.,t-0,nmb-23,hrbt,.bvhmrzhj W,gc,.jaik=,..hb
Ukszv.ra
[eckbn R-2,a, kgg-4,khbbxl,.blzzjneky R,N[B,,-G.9
FbghLbtaYhe.AU
1.2.1
deflate 1.2.1 Copyright 1995-2003 Jean-loup Gailly
inflate 1.2.1 Copyright 1995-2003 Mark Adler
?456789:;<=
!"#$%&'()* ,-./0123
1iu2.iu
333333333333333333
33333833
3333339
3333333333333338
:*"*"$3338
33333333
33333333333
3333333333338
33338?383
333333333333
:*3:"$3338
333333333333333
j>!%f
.pTA=.
P#.Cry
4%Svc
32.lb}tg
5%SE%}:b
Wq.Zis
].OhY
z%S~x
%uqu(
[%x\|:
~.pF~
Xq.oV
*Ufbq|.RJ
,rn%S<
.GDL|I~
Cx.Oh
f!%xw
Q.opxa
s%O.ye
V%dQ2'rWDGy!
WeB|n
,7'gJsshI;*&
*VsshJ00aW*<~CsszT:
1?%X/6~C-=oBp^
c{v.wE>'iNw oE*!cR&
&Gv.wE>'iNw eK:
 ;cUq0kJ31kE4 7]".iG 0b
wz1 Uo%U<!cV m
{2$.fI
].QY3[
%f$D\
4.FRff
ao%U/2d
6=yR>?fG :eHqo%U/2d
GetProcessHeap
GetCPInfo
RegQueryInfoKeyA
RegOpenKeyExA
RegFlushKey
RegEnumKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
SetViewportOrgEx
UnhookWindowsHookEx
SetWindowsHookExA
MapVirtualKeyA
LoadKeyboardLayoutA
GetKeyboardState
GetKeyboardLayoutList
GetKeyboardLayout
GetKeyState
GetKeyNameTextA
GetAsyncKeyState
EnumWindows
EnumThreadWindows
EnumChildWindows
ActivateKeyboardLayout
GetKeyboardType
"$ %),'8
38000=344
4? 3!0 3!6
H.JXA
1 0 .'7(2':
- /*-( ,'.-!$$$&'('/*) ,*/.)*72-7)
&)"%&$&'&",,/- '
944(@32%2u8
.PMDF<7I
2222444424
.idata
.edata
P.reloc
P.rsrc
*/.)*72-7)
SOFTWARE\Microsoft\Windows NT\CurrentVersion
errorUrl
\bin\SubWCRev.exe
Please login as administrator and try again.
OLE error %.8x%License information for %s is invalidPLicense information for %s not found. You cannot use this control in design modeNUnable to retrieve a pointer to a running object registered with OLE for %s/%s
Clipboard does not support Icons/Menu '%s' is already being used by another form
No help found for %s#No context-sensitive help installed$No topic-based help system installed
OLE error %.8x.Method '%s' not supported by automation object/Variant does not reference an automation object7Dispatch methods do not support more than 64 parameters
Error creating window class Cannot focus a disabled or invisible window!Control '%s' has no parent window
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
Property %s does not exist
Metafile is not valid!Cannot change the size of an icon Invalid operation on TOleGraphic
Unsupported clipboard format
Invalid stream format$''%s'' is not a valid component name
Invalid data type for '%s' List capacity out of bounds (%d)
List count out of bounds (%d)
List index out of bounds (%d) Out of memory while expanding memory stream
Error reading %s%s%s: %s
Failed to get data for '%s'
Failed to set data for '%s'
Resource %s not found
Ancestor for '%s' not found
Cannot assign a %s to a %s
Bits index out of range*Can't write to a read-only resource streamECheckSynchronize called from thread $%x, which is NOT the main thread
Class %s not found
A class named %s already exists%List does not allow duplicates ($0%x)#A component named %s already exists%String list does not allow duplicates
Cannot create file %s
Cannot open file %s
External exception %x
Interface not supported
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Privileged instruction%Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'
Invalid variant operation"Variant method calls not supported
!'%s' is not a valid integer value('%s' is not a valid floating point value
'%s' is not a valid GUID value
I/O error %d
Integer overflow Invalid floating point operation


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    Install JDownloader.exe:3420
    %original file name%.exe:3428

  2. Delete the original Installer file.
  3. Delete or disinfect the following files created/modified by the Installer:

    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\images\BG.jpg (44 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\css\sdk-ui\images\progress-bg2.png (978 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\images\Color_Button_Hover.png (863 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\images\Color_Button.png (846 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\css\sdk-ui\checkbox.css (190 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\csshover3.htc (2 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\css\sdk-ui\images\button-bg.png (131 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\00052E5F.log (8 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\css\ie6_main.css (1 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\images\Grey_Button.png (1 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\css\sdk-ui\images\progress-bg-corner.png (1 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\images\Close.png (1 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\bootstrap_26010.html (156 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\css\sdk-ui\images\progress-bg.png (1 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\images\Loader.gif (10 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\images\Grey_Button_Hover.png (1 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\form.bmp.Mask (244 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\images\Close_Hover.png (1 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\00052EFB.log (16 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\css\sdk-ui\button.css (417 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\locale\EN.locale (4 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\css\sdk-ui\progress-bar.css (480 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\css\main.css (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\inH33955136881\css\sdk-ui\browse.css (337 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1EC7.tmp\System.dll (23 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc1EC7.tmp\inetc.dll (46 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\131425872413744245.exe (6033 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\WebInstaller[1].exe (4648 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc2186.tmp\ns2196.tmp (14 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc2186.tmp\nsExec.dll (14 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\JDownloader2Setup[1].exe (88373 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc20E9.tmp (1857 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc2186.tmp\ns22DF.tmp (14 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc2186.tmp\inetc.dll (808 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsc2186.tmp\System.dll (23 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\13142587242731626932.exe (93292 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\RarSFX0\Install JDownloader.exe (2820 bytes)

  4. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  5. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now