SearchProtectToolbar_pcap_225a9744de

by malwarelabrobot on December 14th, 2016 in Malware Descriptions.

not-a-virus:HEUR:AdWare.Win32.Techsnab.gen (Kaspersky), Installer.Win32.InnoSetup.FD, Trojan.Win32.Iconomon.FD, Trojan.Win32.Swrort.3.FD, SearchProtectToolbar_pcap.YR, SearchProtectToolbar.YR, PUPSpigot.YR (Lavasoft MAS)
Behaviour: Trojan, Installer, PUP, Adware


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: 225a9744de3e6129b6ab58a5e579bd54
SHA1: bce334bc3724e5d73f1f5d6c690de77e995600a5
SHA256: 4edfce26047345d7a097a99b6f2515814913316fcc0b87869ea4eeaa103b3565
SSDeep: 12288:DSxGH0TCzDDLS0QxdUVLFAYbquKq8MUOgPDhi9TeQJJRgq1ixWobE r//xpEB11k:GxGU6pkUP3blDOPYh7gKYEmJwYOq9
Size: 748000 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: BorlandDelphi30, UPolyXv05_v6
Company: no certificate found
Created at: 2015-07-27 11:42:21
Analyzed on: Windows7 SP1 32-bit


Summary:

Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).

Payload

No specific payload has been found.

Process activity

The Trojan creates the following process(es):

%original file name%.exe:3900
json_parser.exe:3724
3ED4.tmp.exe:2840

The Trojan injects its code into the following process(es):

5735.tmp.exe:2704
225a9744de3e6129b6ab58a5e579bd54.tmp:3504
mshta.exe:3128

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process 5735.tmp.exe:2704 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\images\main_icon.png (4 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\i18n\pt.json (6 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\scripts\uninstall.js (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\scripts\common.js (350 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\images\main_utorrent.ico (107 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\scripts\es5-shim.js (11 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\install.1481592506.zip (283430 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\scripts\install.js (15 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\i18n\de.json (6 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\images\yandex_horz_ru.png (7 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\index.hta.log (26 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\i18n\es.json (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\i18n\ru.json (9 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\index.hta (739 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\3rdparty\FS.ocx (998 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\uTorrent\settings.dat.new (73 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-732923889-1296844034-1208581001-1000\1f91d2d17ea675d4c2c3192e241743f9_88dcd395-b062-45b3-a6cd-79f37c0eba08 (105 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\i18n\it.json (6 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\shell_scripts\shell_install_offer.js (7 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\shell_scripts\check_if_cscript_is_working.js (18 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\styles\common.css (102 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\images\bt_icon_48px.png (3 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\shell_scripts\shell_ping_after_close.js (312 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\i18n\fr.json (6 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\utt74C2.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\uninstall.hta (575 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\scripts\initialize.js (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\i18n\en.json (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\images\logo_Yandex_RU_UA_vertical.png (6 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\images\loading.gif (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\KZOAZ8RX.txt (89 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\images\main_bittorrent.ico (103 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\images\search_protect.png (3 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\styles\installer.css (587 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\3rdparty\FS.dll (933 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\images\yandex_browser_setup.bmp (204 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\i18n\br.json (6 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\images\yandex_horz.png (8 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\FQ2SF55J.txt (88 bytes)

The Trojan deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\FQ2SF55J.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\utt74C2.tmp (0 bytes)

The process %original file name%.exe:3900 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-SGS15.tmp\225a9744de3e6129b6ab58a5e579bd54.tmp (50 bytes)

The process json_parser.exe:3724 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\3ED4.tmp.exe (9610 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\5735.tmp.exe (196683 bytes)

The process 3ED4.tmp.exe:2840 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Roaming\Admin Cleaner\Admin Cleaner.exe (601 bytes)

The process 225a9744de3e6129b6ab58a5e579bd54.tmp:3504 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-NC661.tmp\myimge2-inner.bmp (2321 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-NC661.tmp\Button.png (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-NC661.tmp\InnoCallback.dll (130 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-NC661.tmp\myimge2-top.bmp (7547 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-NC661.tmp\json_parser.exe (8384 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-NC661.tmp\_isetup\_shfoldr.dll (47 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-NC661.tmp\myimge2-bottom.bmp (1281 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-NC661.tmp\botva2.dll (71 bytes)

The process mshta.exe:3128 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GPS1JHSL\json[1].js (321 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\index.hta.log (33 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\images\main_utorrent.ico (110 bytes)

Registry activity

The process 5735.tmp.exe:2704 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCR\CLSID\{4E120188-0CAC-468C-B2D9-9D1F079EBC25}]
"(Default)" = "ActiveBinderX Control"

[HKCR\Interface\{8ACDC97A-ED69-44A0-9FA7-214AB3450F2D}\TypeLib]
"Version" = "1.0"

[HKCU\Software\Classes\FalconBetaAccount]
"remote_access_client_id" = "8042463263"

[HKCU\Software\BitTorrent\uTorrent]
"OfferProvider" = ""

[HKCR\CLSID\{4E120188-0CAC-468C-B2D9-9D1F079EBC25}\Verb]
"(Default)" = ""

[HKCR\TypeLib\{C86D85A1-58F7-4E88-993F-F6435AAAAE5F}\1.0]
"(Default)" = "ActiveBinderProj Library"

[HKCR\Interface\{8ACDC97A-ED69-44A0-9FA7-214AB3450F2D}]
"(Default)" = "FS"

[HKCR\Interface\{C936EC34-11FC-4F15-81C3-8AA143BA8E4B}\TypeLib]
"(Default)" = "{C86D85A1-58F7-4E88-993F-F6435AAAAE5F}"

[HKCR\FS.ActiveBinderX]
"(Default)" = "ActiveBinderX Control"

[HKCR\TypeLib\{C86D85A1-58F7-4E88-993F-F6435AAAAE5F}\1.0\0\win32]
"(Default)" = "C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\3rdparty\FS.ocx"

[HKCU\Software\Classes\Local Settings\MuiCache\2F\52C64B7E]
"LanguageList" = "en-US, en"

[HKCR\CLSID\{4E120188-0CAC-468C-B2D9-9D1F079EBC25}\ToolboxBitmap32]
"(Default)" = "C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\3rdparty\FS.ocx,1"

[HKCR\Interface\{8ACDC97A-ED69-44A0-9FA7-214AB3450F2D}\TypeLib]
"(Default)" = "{C86D85A1-58F7-4E88-993F-F6435AAAAE5F}"

[HKCU\Software\BitTorrent\uTorrent]
"OfferViaCAU" = "0"

[HKCR\Interface\{C936EC34-11FC-4F15-81C3-8AA143BA8E4B}]
"(Default)" = "IActiveBinderXEvents"

[HKCR\CLSID\{4E120188-0CAC-468C-B2D9-9D1F079EBC25}\Version]
"(Default)" = "1.0"

[HKCR\CLSID\{4E120188-0CAC-468C-B2D9-9D1F079EBC25}\InprocServer32]
"ThreadingModel" = "Apartment"

[HKCR\FS.ActiveBinderX\Clsid]
"(Default)" = "{4E120188-0CAC-468C-B2D9-9D1F079EBC25}"

[HKCR\CLSID\{4E120188-0CAC-468C-B2D9-9D1F079EBC25}\ProgID]
"(Default)" = "FS.ActiveBinderX"

[HKCR\CLSID\{4E120188-0CAC-468C-B2D9-9D1F079EBC25}\Control]
"(Default)" = ""

[HKCR\CLSID\{4E120188-0CAC-468C-B2D9-9D1F079EBC25}\MiscStatus]
"(Default)" = "0"

[HKCR\Interface\{C936EC34-11FC-4F15-81C3-8AA143BA8E4B}\TypeLib]
"Version" = "1.0"

[HKCR\Interface\{8ACDC97A-ED69-44A0-9FA7-214AB3450F2D}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"

[HKCR\Interface\{C936EC34-11FC-4F15-81C3-8AA143BA8E4B}\ProxyStubClsid]
"(Default)" = "{00020420-0000-0000-C000-000000000046}"

[HKCR\CLSID\{4E120188-0CAC-468C-B2D9-9D1F079EBC25}\Verb\0]
"(Default)" = "Properties,0,2"

[HKCR\Interface\{8ACDC97A-ED69-44A0-9FA7-214AB3450F2D}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"

[HKCR\TypeLib\{C86D85A1-58F7-4E88-993F-F6435AAAAE5F}\1.0\FLAGS]
"(Default)" = "2"

[HKCR\CLSID\{4E120188-0CAC-468C-B2D9-9D1F079EBC25}\TypeLib]
"(Default)" = "{C86D85A1-58F7-4E88-993F-F6435AAAAE5F}"

[HKCR\CLSID\{4E120188-0CAC-468C-B2D9-9D1F079EBC25}\MiscStatus\1]
"(Default)" = "205201"

[HKCU\Software\BitTorrent\uTorrent]
"OfferName" = ""

[HKCR\Interface\{C936EC34-11FC-4F15-81C3-8AA143BA8E4B}\ProxyStubClsid32]
"(Default)" = "{00020420-0000-0000-C000-000000000046}"

[HKCR\CLSID\{4E120188-0CAC-468C-B2D9-9D1F079EBC25}\InprocServer32]
"(Default)" = "C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\3rdparty\FS.ocx"

[HKCU\Software\BitTorrent\uTorrent]
"OfferAccepted" = "0"

[HKCR\TypeLib\{C86D85A1-58F7-4E88-993F-F6435AAAAE5F}\1.0\HELPDIR]
"(Default)" = "C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\3rdparty\"

The process json_parser.exe:3724 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCU\Software\Classes\Local Settings\MuiCache\2F\52C64B7E]
"LanguageList" = "en-US, en"

The process 3ED4.tmp.exe:2840 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\SecureWebChannel]
"channel" = "split24banner4"

[HKCU\Software\Classes\Local Settings\MuiCache\2F\52C64B7E]
"LanguageList" = "en-US, en"

The process 225a9744de3e6129b6ab58a5e579bd54.tmp:3504 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCU\Software\Microsoft\RestartManager\Session0000]
"Sequence" = "1"
"Owner" = "B0 0D 00 00 89 FF 88 28 E0 54 D2 01"
"SessionHash" = "6C 8F D5 1F EF DC 24 CF F9 63 FC FF F2 53 C4 E1"

The process mshta.exe:3128 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"

[HKLM\SOFTWARE\Microsoft\Tracing\mshta_RASMANCS]
"MaxFileSize" = "1048576"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad]
"WpadLastNetwork" = "{24C5EDBC-2851-452A-B521-5DA992F6C1B5}"

[HKLM\SOFTWARE\Microsoft\Tracing\mshta_RASAPI32]
"EnableFileTracing" = "0"

[HKLM\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication]
"ID" = "1299588363"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"DefaultConnectionSettings" = "46 00 00 00 09 00 00 00 09 00 00 00 00 00 00 00"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{24C5EDBC-2851-452A-B521-5DA992F6C1B5}]
"WpadDecision" = "3"
"WpadDecisionTime" = "60 32 5C 3F E0 54 D2 01"

[HKLM\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication]
"Name" = "mshta.exe"

[HKLM\SOFTWARE\Microsoft\Tracing\mshta_RASAPI32]
"FileDirectory" = "%windir%\tracing"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\00-50-56-e1-da-d8]
"WpadDecision" = "3"
"WpadDecisionReason" = "1"

[HKLM\SOFTWARE\Microsoft\Tracing\mshta_RASAPI32]
"EnableConsoleTracing" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\mshta_RASMANCS]
"EnableConsoleTracing" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\mshta_RASAPI32]
"FileTracingMask" = "4294901760"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "46 00 00 00 36 00 00 00 09 00 00 00 00 00 00 00"

[HKLM\SOFTWARE\Microsoft\Tracing\mshta_RASMANCS]
"FileTracingMask" = "4294901760"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{24C5EDBC-2851-452A-B521-5DA992F6C1B5}]
"WpadNetworkName" = "Network 2"

[HKLM\SOFTWARE\Microsoft\Tracing\mshta_RASMANCS]
"EnableFileTracing" = "0"

[HKLM\SOFTWARE\Microsoft\Tracing\mshta_RASAPI32]
"ConsoleTracingMask" = "4294901760"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{24C5EDBC-2851-452A-B521-5DA992F6C1B5}]
"WpadDecisionReason" = "1"

[HKLM\SOFTWARE\Microsoft\Tracing\mshta_RASAPI32]
"MaxFileSize" = "1048576"

[HKLM\SOFTWARE\Microsoft\Tracing\mshta_RASMANCS]
"ConsoleTracingMask" = "4294901760"
"FileDirectory" = "%windir%\tracing"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\00-50-56-e1-da-d8]
"WpadDecisionTime" = "60 32 5C 3F E0 54 D2 01"

Proxy settings are disabled:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"

The Trojan deletes the following value(s) in system registry:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyServer"
"ProxyOverride"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
"ProxyBypass"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"

Dropped PE files

MD5 File path
ef251252347e7a778604d84869050b24 c:\Users\"%CurrentUserName%"\AppData\Local\Temp\3ED4.tmp.exe
5fe59fc57869508e1c84812dbd36ce3b c:\Users\"%CurrentUserName%"\AppData\Local\Temp\5735.tmp.exe
eaba486ca44ce139b1a6c2520fe61837 c:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\3rdparty\FS.dll
eed49c88dba5f2aa10cbd3acf66d899d c:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\3rdparty\FS.ocx
1c55ae5ef9980e3b1028447da6105c75 c:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-NC661.tmp\InnoCallback.dll
92dc6ef532fbb4a5c3201469a5b5eb63 c:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-NC661.tmp\_isetup\_shfoldr.dll
0177746573eed407f8dca8a9e441aa49 c:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-NC661.tmp\botva2.dll
8463f282c7853dcd4c103349cca49ee0 c:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-NC661.tmp\json_parser.exe
50543804e854b4f0f72c1ba31ebe005a c:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-SGS15.tmp\225a9744de3e6129b6ab58a5e579bd54.tmp
ef251252347e7a778604d84869050b24 c:\Users\"%CurrentUserName%"\AppData\Roaming\Admin Cleaner\Admin Cleaner.exe

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

VersionInfo

Company Name:
Product Name: Rapid Installer
Product Version: 1.5.0.9
Legal Copyright:
Legal Trademarks:
Original Filename:
Internal Name:
File Version: 1.5.0.9
File Description: Rapid Installer Setup
Comments: This installation was built with Inno Setup.
Language: English (United States)

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 4096 61748 61952 4.43035 1b89617b988c8bd575544f47f0d04258
.itext 69632 2884 3072 3.97952 25478d452b599b551fe11bfb5904d2d0
.data 73728 3208 3584 1.55787 0c3e63b09234b01ce16cff38df28bb6f
.bss 77824 22200 0 0 d41d8cd98f00b204e9800998ecf8427e
.idata 102400 3536 3584 3.44625 93d91a2b90e60bd758fc0c4908856ae1
.tls 106496 8 0 0 d41d8cd98f00b204e9800998ecf8427e
.rdata 110592 24 512 0.14174 3dffc444ccc131c9dcee18db49ee6403
.rsrc 114688 38928 39424 4.39585 687c628e396172c062bdc4bc6f269897

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

URL IP
hxxp://com-utorrent-prod-bench-290894750.us-east-1.elb.amazonaws.com/e?i=50
hxxp://download-new.utorrent.com/endpoint/hydra-ut/os/win7/track/stable/browser/ie/os-region/US/os-lang/en/os-ver/6.1/enc-ver/110339694/
hxxp://com-utorrent-prod-bench-290894750.us-east-1.elb.amazonaws.com/e?i=50&e=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
hxxp://ip-api.com/json?callback=jQuery19106746168183429846_1481592518848&_=1481592518849
hxxp://download-lb.utorrent.com/endpoint/hydra-ut/os/win7/track/stable/browser/ie/os-region/US/os-lang/en/os-ver/6.1/enc-ver/110339694/ 67.215.238.66
hxxp://i-50.b-000.xyz.bench.utorrent.com/e?i=50 23.21.92.252
hxxp://i-50.b-000.xyz.bench.utorrent.com/e?i=50&e=eyJldmVudE5hbWUiOiJoeWRyYTEiLCJhY3Rpb24iOiJvZmZlciIsInBpZCI6IjI3MDQiLCJoIjoiRzEwTXRkbU1Bd3M5Zy1LRyIsInYiOiIxMTAzMzk2OTQiLCJiIjo0MjYwNiwiY2wiOiJ1VG9ycmVudCIsImxuZyI6InJ1Iiwib3NhIjoiMzIiLCJzbG5nIjoiZW4iLCJkYiI6IldpbmRvd3MgSW50ZXJuZXQgRXhwbG9yZXIiLCJkYnYiOiI5LjAiLCJpYnIiOlt7Im5hbWUiOiJGaXJlZm94IiwidmVyc2lvbiI6IjQ5LjAiLCJleGVOYW1lIjoiZmlyZWZveCJ9LHsibmFtZSI6Ikdvb2dsZSBDaHJvbWUiLCJ2ZXJzaW9uIjoiNTQuMCIsImV4ZU5hbWUiOiJjaHJvbWUifSx7Im5hbWUiOiJXaW5kb3dzIEludGVybmV0IEV4cGxvcmVyIiwidmVyc2lvbiI6IjkuMCIsImV4ZU5hbWUiOiJpZXhwbG9yZSJ9XSwib2ZmZXJ0eXBlIjoicHJpbWFyeSIsInByb3ZpZGVyIjoiSXJvblNyYyIsImhvd21hbnkiOjEsIm9mZmVyc2hvd24iOjAsInN0YXR1cyI6ImZhaWxfdG9fbG9hZF9ETEwiLCJpcm9uc3JjX29mZmVyX3ZlcnNpb24iOiIxLjAifQ== 23.21.92.252
router.utorrent.com 82.221.103.244
s3-us-west-2.amazonaws.com 52.218.128.124
zinkdata.info 104.24.113.101
router.bittorrent.com 67.215.246.10
api.mediaconfig.net 104.27.181.218
s3.amazonaws.com 54.231.81.51


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

ET POLICY External IP Lookup ip-api.com
ET SHELLCODE Possible TCP x86 JMP to CALL Shellcode Detected

Traffic

POST /e?i=50 HTTP/1.1
Host: i-50.b-000.xyz.bench.utorrent.com
User-Agent: Hydra HttpRequest
Connection: close
Content-Length: 261

{"eventName":"hydra1","action":"packDownloadResult","type":"i","result":"1","cau":"0","pv":"","cc":"0","bkt1":"0","ssb":"11","v":"110339694","cl":"uTorrent","osv":"6.1","l":"en","pid":"2704","h":"G10MtdmMAws9g-KG","sid":"G10MtdmMAws9g-KG1481592506","order":"2"}
HTTP/1.1 200 OK
Content-Type: text/html
Date: Tue, 13 Dec 2016 01:28:36 GMT
Server: nginx
X-Powered-By: PHP/5.4.30
Content-Length: 21
Connection: Close
{"response_code":200}..


POST /e?i=50 HTTP/1.1
Host: i-50.b-000.xyz.bench.utorrent.com
User-Agent: Hydra HttpRequest
Connection: close
Content-Length: 234

{"eventName":"hydra1","action":"begin","type":"i","cau":"0","pv":"","cc":"0","bkt1":"0","ssb":"1","v":"110339694","cl":"uTorrent","osv":"6.1","l":"en","pid":"2704","h":"G10MtdmMAws9g-KG","sid":"G10MtdmMAws9g-KG1481592506","order":"0"}
HTTP/1.1 200 OK
Content-Type: text/html
Date: Tue, 13 Dec 2016 01:28:26 GMT
Server: nginx
X-Powered-By: PHP/5.4.30
Content-Length: 21
Connection: Close
{"response_code":200}..


GET /e?i=50&e=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 HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
Host: i-50.b-000.xyz.bench.utorrent.com


HTTP/1.1 200 OK
Content-Type: text/html
Date: Tue, 13 Dec 2016 01:28:44 GMT
Server: nginx
X-Powered-By: PHP/5.4.30
Content-Length: 21
Connection: keep-alive
{"response_code":200}..


GET /endpoint/hydra-ut/os/win7/track/stable/browser/ie/os-region/US/os-lang/en/os-ver/6.1/enc-ver/110339694/ HTTP/1.1
Host: download-lb.utorrent.com
User-Agent: Hydra HttpRequest
Connection: close
Content-Length: 0


HTTP/1.1 200 OK
Server: nginx/1.6.1
Date: Tue, 13 Dec 2016 01:28:27 GMT
Content-Type: application/octet-stream
Content-Length: 2433654
Connection: close
X-bt-sig: 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
Last-Modified: Sat, 03 Dec 2016 05:00:32  0000
Accept-Ranges: none
Content-Disposition: attachment; filename="hta.zip"
X-bt-size: 2433654
Cache-Control: private
X-rl-mx: true
Rule-UUID: de7f6050-4f7c-45cf-a888-37b23152e2e9
Content-MD5: 02223ce88259588a0d32e646627f2c41
Expires: Tue, 01 Jan 1980 00:00:00  0000
X-bt-hash: 902ff0e993d2c3635b3961db756c77d0ec8987db
PK........Af.I..c.............index.hta<html>..<head>.    
<title>Loading...</title>. <meta charset="utf-8">
. <meta http-equiv="X-UA-Compatible" content="IE=9">. <
meta http-equiv="MSThemeCompatible" content="yes">.. <script
src="scripts/initialize.js"></script>.. <link rel="styl
esheet" href="styles/common.css"/>.. <!--[if lte IE 8]>.
<script src="scripts/es5-shim.js"></script>. <![en
dif]-->..</head>..<style>. * {. overflow: hi
dden;. margin: 0px;. padding: 0px;. z-index: 0;.
}.</style>..<body class="installer_body">. <!-- t
his is the loading img while loading offer page -->. <div id=
'loading_img'></div>.</body>..<script src="scripts/c
ommon.js"></script>..<script src="scripts/install.js">&
lt;/script>..</html>.PK........Af.Iw[Yy?...?.......uninstall.
hta<html>..<head>. <title>Loading...</title>
;. <meta charset="utf-8">. <meta http-equiv="X-UA-Compa
tible" content="IE=9">. <meta http-equiv="MSThemeCompatible"
content="yes">.. <script src="scripts/initialize.js"></
script>.. <link rel="stylesheet" href="styles/common.css"/>
;... <!--[if lte IE 8]>. <script language="javascri
pt" type="text/javascript" src='scripts/es5-shim.js'></script>
;. <![endif]-->..</head>..<body class="installer

<<< skipped >>>

GET /json?callback=jQuery19106746168183429846_1481592518848&_=1481592518849 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0E; .NET4.0C)
Host: ip-api.com
Connection: Keep-Alive


HTTP/1.1 200 OK
Access-Control-Allow-Origin: *
Content-Type: text/javascript; charset=utf-8
Date: Tue, 13 Dec 2016 01:28:46 GMT
Content-Length: 321
jQuery19106746168183429846_1481592518848({"as":"AS31561 PITLINE-AS","c
ity":"Kharkiv","country":"Ukraine","countryCode":"UA","isp":"Pitline L
td","lat":49.9808,"lon":36.2527,"org":"Pitline Ltd","query":"194.242.9
6.226","region":"63","regionName":"Kharkivs'ka Oblast'","status":"succ
ess","timezone":"Europe/Kiev","zip":""});HTTP/1.1 200 OK..Access-Contr
ol-Allow-Origin: *..Content-Type: text/javascript; charset=utf-8..Date
: Tue, 13 Dec 2016 01:28:46 GMT..Content-Length: 321..jQuery1910674616
8183429846_1481592518848({"as":"AS31561 PITLINE-AS","city":"Kharkiv","
country":"Ukraine","countryCode":"UA","isp":"Pitline Ltd","lat":49.980
8,"lon":36.2527,"org":"Pitline Ltd","query":"194.242.96.226","region":
"63","regionName":"Kharkivs'ka Oblast'","status":"success","timezone":
"Europe/Kiev","zip":""});..


POST /e?i=50 HTTP/1.1
Host: i-50.b-000.xyz.bench.utorrent.com
User-Agent: Hydra HttpRequest
Connection: close
Content-Length: 270

{"eventName":"hydra1","action":"INFO","type":"i","res":"1916x902","cts":"1481592516","pv":"","cau":"0","cc":"0","bkt1":"0","ssb":"11","v":"110339694","cl":"uTorrent","osv":"6.1","l":"en","pid":"2704","h":"G10MtdmMAws9g-KG","sid":"G10MtdmMAws9g-KG1481592506","order":"3"}
HTTP/1.1 200 OK
Content-Type: text/html
Date: Tue, 13 Dec 2016 01:28:36 GMT
Server: nginx
X-Powered-By: PHP/5.4.30
Content-Length: 21
Connection: Close
{"response_code":200}..


POST /e?i=50 HTTP/1.1
Host: i-50.b-000.xyz.bench.utorrent.com
User-Agent: Hydra HttpRequest
Connection: close
Content-Length: 248

{"eventName":"hydra1","action":"packDownloadStarted","type":"i","cau":"0","pv":"","cc":"0","bkt1":"0","ssb":"1","v":"110339694","cl":"uTorrent","osv":"6.1","l":"en","pid":"2704","h":"G10MtdmMAws9g-KG","sid":"G10MtdmMAws9g-KG1481592506","order":"1"}
HTTP/1.1 200 OK
Content-Type: text/html
Date: Tue, 13 Dec 2016 01:28:26 GMT
Server: nginx
X-Powered-By: PHP/5.4.30
Content-Length: 21
Connection: Close
{"response_code":200}..


The Trojan connects to the servers at the folowing location(s):

%original file name%.exe_3900:

.text
`.itext
`.data
.idata
.rdata
@.rsrc
ENoMonitorSupportException
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
Inno Setup Setup Data (5.5.6) (u)
Inno Setup Messages (5.5.3) (u)
oleaut32.dll
advapi32.dll
RegOpenKeyExW
RegCloseKey
user32.dll
GetKeyboardType
kernel32.dll
MsgWaitForMultipleObjects
ExitWindowsEx
GetWindowsDirectoryW
GetCPInfo
comctl32.dll
KWindows
6MsgIDs
Msgs
name="JR.Inno.Setup"
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
<windowsSettings>
<dpiAware xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
</windowsSettings>
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/>
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/>
<supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/>
<supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/>
<supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"/>
.DEFAULT\Control Panel\International
File I/O error %d
lzmadecompsmall: Compressed data is corrupted (%d)
lzmadecompsmall: %s
LzmaDecode failed (%d)
/SUPPRESSMSGBOXES
/PASSWORD=password
Specifies the password to use.
For more detailed information, please visit hXXp://VVV.jrsoftware.org/ishelp/index.php?topic=setupcmdline
shell32.dll
/SL5="$%x,%d,%d,
Invalid file name - %s
Invalid variant operation
External exception %x
Interface not supported
Object lock not owned(Monitor support function not initialized
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted(Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'"Variant method calls not supported
I/O error %d
Integer overflow Invalid floating point operation
Invalid pointer operation
1.5.0.9
1.5.0.9

225a9744de3e6129b6ab58a5e579bd54.tmp_3504:

.text
`.itext
`.data
.idata
.rdata
@.rsrc
Windows
ENoMonitorSupportException
.uvCOu
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
EVariantBadIndexError
ssShift
htKeyword
EInvalidOperation
Uh.AB
UhÛ
EInvalidGraphicOperation
PasswordChar
OnKeyDown
OnKeyPressTOE
OnKeyUp
ssHorizontal
OnKeyUpX
TCustomButton.TButtonStyle
AutoHotkeys
TKeyEvent
TKeyPressEvent
HelpKeywordl
ssHotTrack
TWindowState
poProportional
TWMKey
KeyPreview
WindowState
EXPORT
TPSExec
TPSRuntimeClassImporterP{P
TPSExportedVar
TPSCustomDebugExec
TPSDebugExec
Uh.JJ
t.Htb
1.2.1
TPasswordEdit
PasswordEdit(
Password
PasswordPage
PasswordLabel
PasswordEdit
PasswordEditLabel
CheckPassword
<requestedExecutionLevel level="
IMsg
FormKeyDown
PasswordCheckHash
TKeyNameConst
TOutputMsgWizardPage
TOutputMsgMemoWizardPage
MsgLabel
Msg1Label
Msg2Label
function CreateOutputMsgPage(const AfterID: Integer; const ACaption, ADescription, AMsg: String): TOutputMsgWizardPage;
function CreateOutputMsgMemoPage(const AfterID: Integer; const ACaption, ADescription, ASubCaption: String; const AMsg: AnsiString): TOutputMsgMemoWizardPage;
function MsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons: Integer): Integer;
function GetIniString(const Section, Key, Default, Filename: String): String;
function GetIniInt(const Section, Key: String; const Default, Min, Max: Longint; const Filename: String): Longint;
function GetIniBool(const Section, Key: String; const Default: Boolean; const Filename: String): Boolean;
function IniKeyExists(const Section, Key, Filename: String): Boolean;
function SetIniString(const Section, Key, Value, Filename: String): Boolean;
function SetIniInt(const Section, Key: String; const Value: Longint; const Filename: String): Boolean;
function SetIniBool(const Section, Key: String; const Value: Boolean; const Filename: String): Boolean;
procedure DeleteIniEntry(const Section, Key, Filename: String);
function GetCmdTail: String;
function StringChangeEx(var S: String; const FromStr, ToStr: String; const SupportDBCS: Boolean): Integer;
function RegValueExists(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;
function RegQueryStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;
function RegQueryMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;
function RegDeleteKeyIncludingSubkeys(const RootKey: Integer; const SubkeyName: String): Boolean;
function RegDeleteKeyIfEmpty(const RootKey: Integer; const SubkeyName: String): Boolean;
function RegKeyExists(const RootKey: Integer; const SubKeyName: String): Boolean;
function RegDeleteValue(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;
function RegGetSubkeyNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;
function RegGetValueNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;
function RegQueryDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultDWord: Cardinal): Boolean;
function RegQueryBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: AnsiString): Boolean;
function RegWriteStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteExpandStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: Cardinal): Boolean;
function RegWriteBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: AnsiString): Boolean;
function CheckForMutexes(Mutexes: String): Boolean;
function Exec(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;
function ExecAsOriginalUser(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;
function ShellExec(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;
function ShellExecAsOriginalUser(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;
function MakePendingFileRenameOperationsChecksum: String;
function CreateShellLink(const Filename, Description, ShortcutTo, Parameters, WorkingDir, IconFilename: String; const IconIndex, ShowCmd: Integer): String;
function ExitSetupMsgBox: Boolean;
function GetWindowsVersion: Cardinal;
procedure GetWindowsVersionEx(var Version: TWindowsVersion);
function GetWindowsVersionString: String;
function SuppressibleMsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons, Default: Integer): Integer;
function CustomMessage(const MsgName: String): String;
function SendMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Longint;
function PostMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;
function SendNotifyMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;
function SendBroadcastMessage(const Msg, WParam, LParam: Longint): Longint;
function PostBroadcastMessage(const Msg, WParam, LParam: Longint): Boolean;
function SendBroadcastNotifyMessage(const Msg, WParam, LParam: Longint): Boolean;
procedure RaiseException(const Msg: String);
function SetPreviousData(const PreviousDataKey: Integer; const ValueName, ValueData: String): Boolean;
CREATEOUTPUTMSGPAGE
CREATEOUTPUTMSGMEMOPAGE
MSGBOX
INIKEYEXISTS
GETCMDTAIL
REGKEYEXISTS
REGDELETEKEYINCLUDINGSUBKEYS
REGDELETEKEYIFEMPTY
REGGETSUBKEYNAMES
CHECKFORMUTEXES
SHELLEXEC
SHELLEXECASORIGINALUSER
MAKEPENDINGFILERENAMEOPERATIONSCHECKSUM
EXITSETUPMSGBOX
GETWINDOWSVERSION
GETWINDOWSVERSIONSTRING
SUPPRESSIBLEMSGBOX
GetWindowsVersionEx
IMsgt
Inno Setup Setup Data (5.5.6) (u)
Inno Setup Messages (5.5.3) (u)
CKv.AKv
oleaut32.dll
advapi32.dll
RegOpenKeyExW
RegCloseKey
user32.dll
GetKeyboardType
kernel32.dll
UnhookWindowsHookEx
SetWindowsHookExW
MsgWaitForMultipleObjectsEx
MsgWaitForMultipleObjects
MapVirtualKeyW
LoadKeyboardLayoutW
GetKeyboardState
GetKeyboardLayoutNameW
GetKeyboardLayoutList
GetKeyboardLayout
GetKeyState
GetKeyNameTextW
GetAsyncKeyState
ExitWindowsEx
EnumWindows
EnumThreadWindows
EnumChildWindows
ActivateKeyboardLayout
msimg32.dll
gdi32.dll
SetViewportOrgEx
version.dll
mpr.dll
TransactNamedPipe
SetNamedPipeHandleState
GetWindowsDirectoryW
GetCPInfo
CreateNamedPipeW
RegQueryInfoKeyW
RegFlushKey
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
comctl32.dll
ole32.dll
shell32.dll
ShellExecuteExW
ShellExecuteW
comdlg32.dll
`.rdata
@.data
.pdata
COMCTL32.dll
SHLWAPI.dll
SetProcessShutdownParameters
KERNEL32.dll
ADVAPI32.dll
SHELL32.dll
OLEAUT32.dll
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="*" publicKeyToken="6595b64144ccf1df" language="*"></assemblyIdentity></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"></supportedOS><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"></supportedOS><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"></supportedOS><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"></supportedOS><supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"></supportedOS></application></compatibility></assembly>PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGX
KWindows
6MsgIDs
Msgs
UrlMon
.rsrc
@.reloc
Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
shlwapi.dll
SOFTWARE\Microsoft\Windows\CurrentVersion
Software\Microsoft\Windows\CurrentVersion\ProfileReconciliation
RegKey
GetWindowsDirectoryA
RegOpenKeyA
RegCreateKeyExA
SHFOLDER.dll
dll\shfolder.dbg
Font.Color
Font.Height
Font.Name
Font.Style
Lines.Strings
name="JR.Inno.Setup"
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
<windowsSettings>
<dpiAware xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
</windowsSettings>
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/>
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/>
<supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/>
<supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/>
<supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"/>
MSWHEEL_ROLLMSG
MSH_WHEELSUPPORT_MSG
MSH_SCROLL_LINES_MSG
%s_%d
USER32.DLL
SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes
uxtheme.dll
DWMAPI.DLL
clWebSnow
clWebFloralWhite
clWebLavenderBlush
clWebOldLace
clWebIvory
clWebCornSilk
clWebBeige
clWebAntiqueWhite
clWebWheat
clWebAliceBlue
clWebGhostWhite
clWebLavender
clWebSeashell
clWebLightYellow
clWebPapayaWhip
clWebNavajoWhite
clWebMoccasin
clWebBurlywood
clWebAzure
clWebMintcream
clWebHoneydew
clWebLinen
clWebLemonChiffon
clWebBlanchedAlmond
clWebBisque
clWebPeachPuff
clWebTan
clWebYellow
clWebDarkOrange
clWebRed
clWebDarkRed
clWebMaroon
clWebIndianRed
clWebSalmon
clWebCoral
clWebGold
clWebTomato
clWebCrimson
clWebBrown
clWebChocolate
clWebSandyBrown
clWebLightSalmon
clWebLightCoral
clWebOrange
clWebOrangeRed
clWebFirebrick
clWebSaddleBrown
clWebSienna
clWebPeru
clWebDarkSalmon
clWebRosyBrown
clWebPaleGoldenrod
clWebLightGoldenrodYellow
clWebOlive
clWebForestGreen
clWebGreenYellow
clWebChartreuse
clWebLightGreen
clWebAquamarine
clWebSeaGreen
clWebGoldenRod
clWebKhaki
clWebOliveDrab
clWebGreen
clWebYellowGreen
clWebLawnGreen
clWebPaleGreen
clWebMediumAquamarine
clWebMediumSeaGreen
clWebDarkGoldenRod
clWebDarkKhaki
clWebDarkOliveGreen
clWebDarkgreen
clWebLimeGreen
clWebLime
clWebSpringGreen
clWebMediumSpringGreen
clWebDarkSeaGreen
clWebLightSeaGreen
clWebPaleTurquoise
clWebLightCyan
clWebLightBlue
clWebLightSkyBlue
clWebCornFlowerBlue
clWebDarkBlue
clWebIndigo
clWebMediumTurquoise
clWebTurquoise
clWebCyan
clWebPowderBlue
clWebSkyBlue
clWebRoyalBlue
clWebMediumBlue
clWebMidnightBlue
clWebDarkTurquoise
clWebCadetBlue
clWebDarkCyan
clWebTeal
clWebDeepskyBlue
clWebDodgerBlue
clWebBlue
clWebNavy
clWebDarkViolet
clWebDarkOrchid
clWebMagenta
clWebDarkMagenta
clWebMediumVioletRed
clWebPaleVioletRed
clWebBlueViolet
clWebMediumOrchid
clWebMediumPurple
clWebPurple
clWebDeepPink
clWebLightPink
clWebViolet
clWebOrchid
clWebPlum
clWebThistle
clWebHotPink
clWebPink
clWebLightSteelBlue
clWebMediumSlateBlue
clWebLightSlateGray
clWebWhite
clWebLightgrey
clWebGray
clWebSteelBlue
clWebSlateBlue
clWebSlateGray
clWebWhiteSmoke
clWebSilver
clWebDimGray
clWebMistyRose
clWebDarkSlateBlue
clWebDarkSlategray
clWebGainsboro
clWebDarkGray
clWebBlack
\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\
crSQLWait
%s (%s)
imm32.dll
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
RegDeleteKeyExW
.DEFAULT\Control Panel\International
%s, ClassID: %s
%s, ProgID: "%s"
oleacc.dll
MSFTEDIT.DLL
RICHED20.DLL
Rstrtmgr.dll
File I/O error %d
Messages file "%s" is missing. Please correct the problem or obtain a new copy of the program.
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_PERFORMANCE_DATA
HKEY_CURRENT_CONFIG
HKEY_DYN_DATA
WININIT.INI
Software\Microsoft\Windows\CurrentVersion\SharedDLLs
RegCreateKeyEx
RegOpenKeyEx
sfc.dll
cmd.exe" /C "
COMMAND.COM" /C
PendingFileRenameOperations
PendingFileRenameOperations2
@Software\Microsoft\Windows\CurrentVersion\Fonts
Software\Microsoft\Windows NT\CurrentVersion\Fonts
IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)
IPropertyStore::SetValue(PKEY_AppUserModel_ID)
IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)
IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption)
OLEAUT32.DLL
Log opened. (Time zone: UTC%s%.2u:%.2u)
%s Log %s #%.3u.txt
regsvr32.exe"
Cannot register 64-bit DLLs on this version of Windows
HELPER_EXE_AMD64
Cannot utilize 64-bit features on this version of Windows
64-bit helper EXE wasn't extracted
\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x
CreateNamedPipe
helper %d 0x%x
Helper process PID: %u
Stopping 64-bit helper process. (PID: %u)
Helper process exited with failure code: 0x%x
TransactNamedPipe/GetOverlappedResult
Helper: Command did not execute
SOFTWARE\Microsoft\.NETFramework
.NET Framework not found
SOFTWARE\Microsoft\.NETFramework\Policy\v4.0
v4.0.30319
SOFTWARE\Microsoft\.NETFramework\Policy\v2.0
v2.0.50727
SOFTWARE\Microsoft\.NETFramework\Policy\v1.1
v1.1.4322
.NET Framework version %s not found
Fusion.dll
Failed to load .NET Framework DLL "%s"
Failed to get address of .NET Framework CreateAssemblyCache function
.NET Framework CreateAssemblyCache function failed
MoveFileEx failed (%d).
Deleting directory: %s
Failed to delete directory (%d). Will retry later.
Failed to delete directory (%d). Will delete on restart (if empty).
Failed to delete directory (%d).
Deleting file: %s
Failed to delete the file; it may be in use (%d).
The file appears to be in use (%d). Will delete on restart.
Decrementing shared count (%d-bit): %s
Unregistering 64-bit DLL/OCX: %s
Unregistering 32-bit DLL/OCX: %s
Not unregistering DLL/OCX again: %s
Unregistering 64-bit type library: %s
Unregistering 32-bit type library: %s
Uninstalling from GAC: %s
Running Exec filename:
Running Exec parameters:
CreateProcess failed (%d).
Process exit code: %u
Running ShellExec filename:
Running ShellExec parameters:
ShellExecuteEx failed (%d).
Skipping RunOnceId "%s" filename: %s
Unregistering font: %s
zlib: Internal error. Code %d
bzlib: Internal error. Code %d
lzmadecomp: %s
lzmadecomp: Compressed data is corrupted (%d)
DecodeToBuf failed (%d)
c:\directory
Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Could not find page with ID %d
Software\Microsoft\Windows\CurrentVersion\Uninstall
%s\%s_is1
RestartManager found an application using one of our files: %s
Can use RestartManager to avoid reboot? %s (%d)
PrepareToInstall failed: %s
Need to restart Windows? %s
/:*?"<>|
\/:*?"<>|
%s-%d.bin
%s-%d%s.bin
..\DISK%d\
Asking user for new disk containing "%s".
Cannot read an encrypted file before the key has been set
LoggedMsgBox returned an unexpected value. Assuming Abort.
Software\Microsoft\Windows\CurrentVersion\Fonts
Software\Microsoft\Windows\CurrentVersion\Uninstall\
5.5.6 (u)
URLInfoAbout
URLUpdateInfo
Creating directory: %s
Setting permissions on directory: %s
Failed to set permissions on directory (%d).
Setting NTFS compression on directory: %s
Unsetting NTFS compression on directory: %s
Failed to set NTFS compression state (%d).
Failed to set value in Fonts registry key.
Failed to open Fonts registry key.
Setting permissions on file: %s
Failed to set permissions on file (%d).
Setting NTFS compression on file: %s
Unsetting NTFS compression on file: %s
Dest filename: %s
Dest file is protected by Windows File Protection.
Time stamp of our file: %s
Time stamp of existing file: %s
Version of our file: %u.%u.%u.%u
Version of existing file: %u.%u.%u.%u
Existing file is protected by Windows File Protection. Skipping.
Uninstaller requires administrator: %s
The existing file appears to be in use (%d). Will replace on restart.
The existing file appears to be in use (%d). Retrying.
Registering file as a font ("%s")
Cannot install files to 64-bit locations on this version of Windows
desktop.ini
.ShellClassInfo
{0AFACED1-E828-11D1-9187-B532F1E9575D}
target.lnk
Desktop.ini
Software\Microsoft\Windows\CurrentVersion\App Paths\
Section: %s
Entry: %s
Value: %s
Updating the .INI file.
Successfully updated the .INI file.
Skipping updating the .INI file, only updating uninstall log.
Setting permissions on registry key: %s\%s
Could not set permissions on the registry key because it currently does not exist.
Failed to set permissions on registry key (%d).
Cannot access 64-bit registry keys on this version of Windows
Registration executable created: %s
Software\Microsoft\Windows\CurrentVersion\RunOnce
Registering 64-bit DLL/OCX: %s
Registering 32-bit DLL/OCX: %s
Registering 64-bit type library: %s
Registering 32-bit type library: %s
Directory for uninstall files: %s
Will append to existing uninstall log: %s
Will overwrite existing uninstall log: %s
Creating new uninstall log: %s
LoggedMsgBox returned an unexpected value. Assuming Cancel.
RmShutdown returned an error: %d
Fatal exception during installation process (%s):
ExtractTemporaryFile: The file "%s" was not found
ExtractTemporaryFiles: No files matching "%s" found
Invalid symbol '%s' found
Invalid token '%s' found
QuerySpawnServer: Unexpected response: $%x
CallSpawnServer: Unexpected response: $%x
CallSpawnServer: Unexpected status: %d
ShellExecuteEx
ShellExecuteEx returned hProcess=0
Wnd=$%x
Expression error '%s'
SuppressMsgBoxes
srcexe
Cannot evaluate "%s" constant during Uninstall
Cannot access a 64-bit key in a "reg" constant on this version of Windows
Unknown custom message name "%s" in "cm" constant
Cannot expand "pf64" constant on this version of Windows
Cannot expand "cf64" constant on this version of Windows
uninstallexe
Cannot expand "dotnet2064" constant on this version of Windows
Cannot expand "dotnet4064" constant on this version of Windows
Failed to expand shell folder constant "%s"
Unknown constant "%s"
Software\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows NT\CurrentVersion
cmd.exe
COMMAND.COM
\_setup64.tmp
_isetup\_shfoldr.dll
Failed to get version numbers of _shfoldr.dll
shfolder.dll
Failed to load DLL "%s"
Found pending rename or delete that matches one of our files: %s
Windows version: %u.%u.%u%s (NT platform: %s)
64-bit Windows: %s
Processor architecture: %s
Defaulting to %s for suppressed message box (%s):
Message box (%s):
User chose %s.
MsgBox failed.
/SPAWNWND=$%x /NOTIFYWND=$%x
64-bit install mode: %s
_isetup\_isdecmp.dll
_isetup\_iscrypt.dll
/Password=
/SuppressMsgBoxes
/DETACHEDMSG
-0.bin
Setup version: Inno Setup version 5.5.6 (u)
Original Setup EXE:
Not restarting Windows because Setup is being run from the debugger.
Restarting Windows.
Inno Setup version 5.5.6 (u)
Portions Copyright (C) 2000-2015 Martijn Laan
hXXp://VVV.innosetup.com/
hXXp://VVV.remobjects.com/ps
hXXp://VVV.graphical-installer.com/
Cannot run files in 64-bit locations on this version of Windows
Type: Exec
Type: ShellExec
RmRestart returned an error: %d
Need to restart Windows, not attempting to restart applications
Will not restart Windows automatically.
RegDeleteKeyExA
System\CurrentControlSet\Control\Windows
Cannot call "%s" function during Setup
Cannot call "%s" function during Uninstall
Invalid RootKey value
Unknown custom message name "%s"
%u.%.2u.%u
%u.%u.%u.%u
Cannot disable FS redirection on this version of Windows
Runtime Error (at %d:%d):
Exception "%s" at address %p
TScriptRunner.SetPSExecParameters: Invalid type
TScriptRunner.LoadScript failed
Remove shared file %s? User chose %s%s
/INITPROCWND=$%x
/SECONDPHASE="%s" /FIRSTPHASEWND=$%x
Original Uninstall EXE:
Install was done in 64-bit mode but not running 64-bit Windows now
Removed all? %s
Not restarting Windows because Uninstall is being run from the debugger.
isRS-???.tmp
isRS-%.3u.tmp
DisableProcessWindowsGhosting
Interface not supported
7Dispatch methods do not support more than 64 parameters
Exception: %s
Cannot Import %s
Unable to insert a line Clipboard does not support Icons
Text exceeds memo capacity/Menu '%s' is already being used by another form
- Dock zone has no controlLError loading dock zone from the stream. Expecting version %d, but found %d.
Error setting %s.Count8Listbox (%s) style must be virtual in order to set Count
OLE error %.8x.Method '%s' not supported by automation object/Variant does not reference an automation object
Error creating window class Cannot focus a disabled or invisible window!Control '%s' has no parent window$Parent given is not a parent of '%s'
No help found for %s
Unsupported clipboard format
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
Property %s does not exist
Thread creation error: %s
Thread Error: %s (%d)-Cannot terminate an externally created thread,Cannot wait for an externally created thread$No help viewer that supports filters#''%s'' is not a valid integer value
Cannot open file "%s". %s
Invalid file name - %s
Invalid stream format$''%s'' is not a valid component name
Invalid data type for '%s' List capacity out of bounds (%d)
List count out of bounds (%d)
List index out of bounds (%d) Out of memory while expanding memory stream
Error reading %s%s%s: %s
Failed to get data for '%s'
Resource %s not found"Character index out of bounds (%d)
Start index out of bounds (%d)
Invalid count (%d)
Invalid destination index (%d)
Ancestor for '%s' not found
Cannot assign a %s to a %s
Bits index out of range*Can't write to a read-only resource streamECheckSynchronize called from thread $%x, which is NOT the main thread
Class %s not found
A class named %s already exists%List does not allow duplicates ($0%x)#A component named %s already exists%String list does not allow duplicates
Cannot create file "%s". %s
Object lock not owned(Monitor support function not initialized
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
Invalid variant operation
Invalid NULL variant operation%Invalid variant operation (%s%.8x)
%s5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
Operation not supported
External exception %x
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted(Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'"Variant method calls not supported
I/O error %d
Integer overflow Invalid floating point operation
n%USERPROFILE%
r%SYSTEMROOT%
5.50.4807.2300
Microsoft(R) Windows (R) 2000 Operating System
Datos de programa%Configuraci
51.1052.0.0

225a9744de3e6129b6ab58a5e579bd54.tmp_3504_rwx_04430000_00001000:

Interface not supported
External exception %x
Variant method calls not supported
Invalid variant operation
Access violation at address %p. %s of address %p
Invalid floating point operation
Invalid pointer operation

json_parser.exe_3724:

.text
`.rdata
@.data
.rsrc
@.reloc
%s %s
xxxx-xx-xx-xx-xxxxxx
%s %d
Visual C   CRT: Not enough memory to complete call to strerror.
Broken pipe
Inappropriate I/O control operation
Operation not permitted
GetProcessWindowStation
operator
ole32.dll
GetProcessHeap
GetWindowsDirectoryW
KERNEL32.dll
WinHttpOpenRequest
WinHttpCloseHandle
WinHttpConnect
WinHttpOpen
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpReadData
WinHttpQueryDataAvailable
WINHTTP.dll
ShellExecuteW
SHELL32.dll
USER32.dll
OLEAUT32.dll
IPHLPAPI.DLL
RegCloseKey
RegOpenKeyExA
ADVAPI32.dll
GetCPInfo
%s near '%s'
%s near end of file
unable to decode byte 0x%x
control character 0x%x
invalid Unicode '\uX\uX'
invalid Unicode '\uX'
duplicate object key
unable to open %s: %s
zcÁ
status=IS&uuid=44add590-e741-f447-b13e-dd9039a59e82&user_os=Win7 32&user_hash=439017b4c02a36f55f36241e9068f2dcd43f7b70&v=15.38&nuuid=11b152f39435d677c83fadb989059307&user_agent=IE&trsrc=9
user_agent=IE&uuid=44add590-e741-f447-b13e-dd9039a59e82&user_os=Win7 32&proc=System,smss.exe,csrss.exe,wininit.exe,csrss.exe,winlogon.exe,services.exe,lsass.exe,lsm.exe,svchost.exe,svchost.exe,svchost.exe,svchost.exe,svchost.exe,svchost.exe,svchost.exe,spoolsv.exe,svchost.exe,vmtoolsd.exe,TPAutoConnSvc.exe,taskhost.exe,explorer.exe,svchost.exe,TPAutoConnect.exe,conhost.exe,vmtoolsd.exe,dllhost.exe,SearchIndexer.exe,msdtc.exe,svchost.exe,WmiPrvSE.exe,taskhost.exe,sandbox_svc.exe,conhost.exe,cmd.exe,conhost.exe,tshark.exe,cmd.exe,conhost.exe,Procmon.exe,%original file name%.exe,225a9744de3e6129b6ab58a5e579bd54.tmp&main=1&v=15.38&nuuid=11b152f39435d677c83fadb989059307&user_hash=439017b4c02a36f55f36241e9068f2dcd43f7b70&trsrc=9 &aff=mediashkr&enc=acetstar
C:\Users\"%CurrentUserName%"\AppData\Local\Temp
44add590-e741-f447-b13e-dd9039a59e82
status=%s&uuid=%s&user_os=%s&user_hash=%s&v=%s&nuuid=%s&user_agent=%s&trsrc=%s
user_agent=%s&uuid=%s&user_os=%s&proc=%ws&main=%s&v=%s&nuuid=%s&user_hash=%s&trsrc=%s&aff=%s&enc=%s
kernel32.dll
updater_url
%s.exe
updater_cmd
admWIN-UK0FFOO83I6Windows_NT1x86 Family 6 Model 15 Stepping 2, GenuineIntel
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-NC661.tmp\json_parser.exe
<assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="*" publicKeyToken="6595b64144ccf1df" language="*"></assemblyIdentity>
<requestedExecutionLevel level="requireAdministrator" uiAccess="false"></requestedExecutionLevel>
<windowsSettings xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">
</windowsSettings>
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"></supportedOS>
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"></supportedOS>
<supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"></supportedOS>
<supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"></supportedOS>
<supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"></supportedOS>
0 0,020]0
6#6/656`6_7
223=344?4
2Y3-5}5
<"<.<4<_<
8"8.848_8
1!1%1)151;1
: :$:(:4:::
?#?'? ?/?:?@?
9#9'959^9
2$3-3}3O4
8 8$8(8,8084888<8@8
83<3`3|3 5(5
mscoree.dll
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
KERNEL32.DLL
WUSER32.DLL
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-NC661.tmp\tmp.exe
Content-Type: application/x-www-form-urlencoded
https
zinkdata.info
6.2.9.2
aut.webm

mshta.exe_3128:

.text
`.data
.rsrc
@.reloc
clsid\{25336920-03f9-11cf-8fd0-00aa00686f13}\InProcServer32
msvcrt.dll
KERNEL32.dll
ADVAPI32.dll
RegCloseKey
RegOpenKeyExA
_amsg_exit
_acmdln
mshta.pdb
name="Microsoft.Windows.InetCore.mshta"
version="5.1.0.0"
<asmv3:windowsSettings xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">
</asmv3:windowsSettings>
Kernel32.dll
2kernel32.dll
9.00.8112.16421 (WIN7_IE9_RTM.110308-0330)
MSHTA.EXE
Windows
9.00.8112.16421


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    %original file name%.exe:3900
    json_parser.exe:3724
    3ED4.tmp.exe:2840

  2. Delete the original Trojan file.
  3. Delete or disinfect the following files created/modified by the Trojan:

    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\images\main_icon.png (4 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\i18n\pt.json (6 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\scripts\uninstall.js (1 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\scripts\common.js (350 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\images\main_utorrent.ico (107 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\scripts\es5-shim.js (11 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\install.1481592506.zip (283430 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\scripts\install.js (15 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\i18n\de.json (6 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\images\yandex_horz_ru.png (7 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\index.hta.log (26 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\i18n\es.json (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\i18n\ru.json (9 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\index.hta (739 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\3rdparty\FS.ocx (998 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Roaming\uTorrent\settings.dat.new (73 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-732923889-1296844034-1208581001-1000\1f91d2d17ea675d4c2c3192e241743f9_88dcd395-b062-45b3-a6cd-79f37c0eba08 (105 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\i18n\it.json (6 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\shell_scripts\shell_install_offer.js (7 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\shell_scripts\check_if_cscript_is_working.js (18 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\styles\common.css (102 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\images\bt_icon_48px.png (3 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\shell_scripts\shell_ping_after_close.js (312 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\i18n\fr.json (6 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\utt74C2.tmp (0 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\uninstall.hta (575 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\scripts\initialize.js (1 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\i18n\en.json (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\images\logo_Yandex_RU_UA_vertical.png (6 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\images\loading.gif (5 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\KZOAZ8RX.txt (89 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\images\main_bittorrent.ico (103 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\images\search_protect.png (3 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\styles\installer.css (587 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\3rdparty\FS.dll (933 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\images\yandex_browser_setup.bmp (204 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\i18n\br.json (6 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD77B0.tmp.1481592506\HTA\images\yandex_horz.png (8 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\FQ2SF55J.txt (88 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-SGS15.tmp\225a9744de3e6129b6ab58a5e579bd54.tmp (50 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\3ED4.tmp.exe (9610 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\5735.tmp.exe (196683 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Roaming\Admin Cleaner\Admin Cleaner.exe (601 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-NC661.tmp\myimge2-inner.bmp (2321 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-NC661.tmp\Button.png (1 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-NC661.tmp\InnoCallback.dll (130 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-NC661.tmp\myimge2-top.bmp (7547 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-NC661.tmp\json_parser.exe (8384 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-NC661.tmp\_isetup\_shfoldr.dll (47 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-NC661.tmp\myimge2-bottom.bmp (1281 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-NC661.tmp\botva2.dll (71 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GPS1JHSL\json[1].js (321 bytes)

  4. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  5. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now