Trojan.Generic.19290791_12e4023491

HEUR:Trojan.Win32.Generic (Kaspersky), Trojan.Generic.19290791 (B) (Emsisoft), Trojan.Generic.19290791 (AdAware), Trojan.Win32.Swrort.3.FD, mzpefinder_pcap_file.YR, GenericEmailWorm.YR (Lavasoft MAS) ...
Blog rating:2 out of5 with1 ratings

Trojan.Generic.19290791_12e4023491

by malwarelabrobot on October 29th, 2016 in Malware Descriptions.

HEUR:Trojan.Win32.Generic (Kaspersky), Trojan.Generic.19290791 (B) (Emsisoft), Trojan.Generic.19290791 (AdAware), Trojan.Win32.Swrort.3.FD, mzpefinder_pcap_file.YR, GenericEmailWorm.YR (Lavasoft MAS)
Behaviour: Trojan, Worm, EmailWorm


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: 12e4023491001cc40a48838e974e5a75
SHA1: 4f973d51d7bcba9e7b3e9f827c05b9ebae9a9864
SHA256: 454a539933e0b46c098f36c98d6166a44c8704fdf6b2fa7c0c0a3c08df1e9d6a
SSDeep: 196608:7TsqXUc185OiGtjT9erfsa5tcuFNWfPil:fsqEcaOztn/otcuFYn0
Size: 6418432 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2016-10-12 17:13:25
Analyzed on: Windows7 SP1 32-bit


Summary:

Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).

Payload

Behaviour Description
EmailWorm Worm can send e-mails.


Process activity

The Trojan creates the following process(es):

GoogleUpdate.exe:2880
GoogleUpdate.exe:3900
%original file name%.exe:2268
54.0.2840.71_54.0.2840.59_chrome_updater.exe:268
setup.exe:2620
setup.exe:1276
setup.exe:1904
regsvr32.exe:2332
regsvr32.exe:2472
regsvr32.exe:2336
regsvr32.exe:2456
regsvr32.exe:2424
regsvr32.exe:2304
regsvr32.exe:2436
regsvr32.exe:2412
regsvr32.exe:2400
regsvr32.exe:2416
regsvr32.exe:2372

The Trojan injects its code into the following process(es):
No processes have been created.

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process GoogleUpdate.exe:3900 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Program Files%\Google\Update\Download\{4DC8B4CA-1BDA-483E-B5FA-D3C12E15B62D}\54.0.2840.71\54.0.2840.71_54.0.2840.59_chrome_updater.exe (16158 bytes)
%Program Files%\Google\Update\Install\{4BE97E2F-B4A3-41A5-8B1D-EB58A7D5FCB4}\54.0.2840.71_54.0.2840.59_chrome_updater.exe (16304 bytes)

The Trojan deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\{7450580E-9D4A-43A0-ACBD-336C9A6D6735}-54.0.2840.71_54.0.2840.59_chrome_updater.exe (0 bytes)

The process %original file name%.exe:2268 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Data\dm.dll (9053 bytes)

The process 54.0.2840.71_54.0.2840.59_chrome_updater.exe:268 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Windows\Temp\CR_869F3.tmp\setup.exe (49 bytes)
C:\Windows\Temp\CR_869F3.tmp\SETUP_PATCH.PACKED.7Z (3 bytes)
C:\Windows\Temp\CR_869F3.tmp\CHROME_PATCH.PACKED.7Z (2 bytes)

The Trojan deletes the following file(s):

C:\Windows\Temp\CR_869F3.tmp\setup.exe (0 bytes)
C:\Windows\Temp\CR_869F3.tmp (0 bytes)
C:\Windows\Temp\CR_869F3.tmp\CHROME_PATCH.PACKED.7Z (0 bytes)

The process setup.exe:2620 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Windows\Temp\Crashpad\settings.dat (84 bytes)

The process setup.exe:1276 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\chrome_100_percent.pak (1160 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\hr.pak (618 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\ta.pak (1539 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\VisualElements\smalllogocanary.png (15 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\th.pak (1294 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\chrome.VisualElementsManifest.xml (411 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\default_apps\gmail.crx (48 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\default_apps\youtube.crx (47 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\el.pak (1169 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\es-419.pak (651 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\tr.pak (645 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\hi.pak (1333 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\ru.pak (1029 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\da.pak (596 bytes)
C:\Windows\Temp\Crashpad\settings.dat (80 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\cs.pak (662 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\chrome.exe (1846 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\ko.pak (659 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\de.pak (570 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\id.pak (586 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\pl.pak (652 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\chrome.dll (41963 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\54.0.2840.71.manifest (254 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\sv.pak (597 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\WidevineCdm\manifest.json (954 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\chrome.7z (279369 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\es.pak (660 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\ms.pak (504 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\wow_helper.exe (160 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\nb.pak (588 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576 (4 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\en-GB.pak (539 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\chrome_child.dll (53736 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\ro.pak (666 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\it.pak (636 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\hu.pak (692 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\pt-PT.pak (645 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\nl.pak (629 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\vi.pak (741 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\natives_blob.bin (702 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\WidevineCdm\_platform_specific\win_x86\widevinecdm.dll (54 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\fil.pak (667 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\uk.pak (1023 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\sr.pak (995 bytes)
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Google Chrome.lnk (6 bytes)
%Program Files%\Google\Chrome\Application\54.0.2840.71\Installer\chrmstp.exe (24778 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\te.pak (1438 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\pt-BR.pak (636 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\icudtl.dat (59 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\chrome_patch.diff (52 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin (4 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\fake-bidi.pak (808 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\ar.pak (891 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\lt.pak (661 bytes)
%Program Files%\Google\Chrome\Application\SetupMetrics\8DCD.tmp (14 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\d3dcompiler_47.dll (52 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\ml.pak (1669 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\ca.pak (653 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\bg.pak (1077 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\gu.pak (1294 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\ja.pak (777 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\sl.pak (613 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\kn.pak (1488 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\zh-TW.pak (538 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\nacl64.exe (54 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\libegl.dll (187 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\fi.pak (612 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\resources.pak (2572 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\sk.pak (684 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\chrome_200_percent.pak (1742 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\bn.pak (1383 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\fr.pak (700 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\mr.pak (1317 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\fa.pak (930 bytes)
%Program Files%\Google\Chrome\Application\54.0.2840.71\Installer\setup.exe (24778 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\am.pak (905 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\VisualElements\smalllogo.png (15 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\WidevineCdm\_platform_specific\win_x86\widevinecdmadapter.dll (441 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\default_apps\docs.crx (12 bytes)
C:\Users\Public\Desktop\Google Chrome.lnk (6 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\sw.pak (555 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\VisualElements\logo.png (37 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\snapshot_blob.bin (1375 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\chrome_watcher.dll (963 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\default_apps\external_extensions.json (5 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\et.pak (576 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\VisualElements\logocanary.png (46 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\zh-CN.pak (537 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\libglesv2.dll (50 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\chrome_elf.dll (758 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Extensions\external_extensions.json (103 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\he.pak (760 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\nacl_irt_x86_32.nexe (52 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\default_apps\drive.crx (53 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\en-US.pak (539 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\lv.pak (667 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\nacl_irt_x86_64.nexe (53 bytes)
%Program Files%\Google\Chrome\Temp (4 bytes)
%Program Files%\Google\Chrome\Application\chrome.exe (21970 bytes)

The Trojan deletes the following file(s):

%Program Files%\Google\Chrome\Application\54.0.2840.59\Installer\chrome.7z (0 bytes)
%Program Files%\Google\Chrome\Temp\scoped_dir_1276_16561 (0 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576 (0 bytes)
%Program Files%\Google\Chrome\Temp\scoped_dir_1276_11993\chrome.exe (0 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\chrome_patch.diff (0 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin (0 bytes)
%Program Files%\Google\Chrome\Temp (0 bytes)
%Program Files%\Google\Chrome\Temp\scoped_dir_1276_16561\chrome.VisualElementsManifest.xml (0 bytes)
%Program Files%\Google\Chrome\Temp\scoped_dir_1276_11993 (0 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\chrome.exe (0 bytes)
%Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\wow_helper.exe (0 bytes)

The process setup.exe:1904 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Windows\Temp\CR_869F3.tmp\setup.exe (1 bytes)
C:\Windows\Temp\Crashpad\settings.dat (80 bytes)
C:\Windows\Temp\scoped_dir1904_31361\setup_patch.diff (6 bytes)

The Trojan deletes the following file(s):

C:\Windows\Temp\scoped_dir1904_31361\setup_patch.diff (0 bytes)
C:\Windows\Temp\scoped_dir1904_31361 (0 bytes)

The process regsvr32.exe:2332 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Data\dm.dll (823 bytes)

The process regsvr32.exe:2336 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Data\dm.dll (823 bytes)

The process regsvr32.exe:2456 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Data\dm.dll (823 bytes)

The process regsvr32.exe:2424 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Data\dm.dll (823 bytes)

The process regsvr32.exe:2304 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Data\dm.dll (823 bytes)

The process regsvr32.exe:2436 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Data\dm.dll (823 bytes)

The process regsvr32.exe:2412 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Data\dm.dll (823 bytes)

The process regsvr32.exe:2400 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Data\dm.dll (823 bytes)

The process regsvr32.exe:2416 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Data\dm.dll (823 bytes)

The process regsvr32.exe:2372 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Data\dm.dll (823 bytes)

Registry activity

The process GoogleUpdate.exe:2880 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCU\Software\Classes\Local Settings\MuiCache\30\52C64B7E\@%SystemRoot%\system32]
"dnsapi.dll,-103" = "Domain Name System (DNS) Server Trust"

[HKCU\Software\Classes\Local Settings\MuiCache\30\52C64B7E]
"LanguageList" = "en-US, en"

[HKCU\Software\Google\Update\proxy]
"source" = "IEWPAD"

[HKCU\Software\Classes\Local Settings\MuiCache\30\52C64B7E\@%SystemRoot%\system32]
"qagentrt.dll,-10" = "System Health Authentication"
"p2pcollab.dll,-8042" = "Peer to Peer Trust"
"fveui.dll,-844" = "BitLocker Data Recovery Agent"
"fveui.dll,-843" = "BitLocker Drive Encryption"

The Trojan deletes the following value(s) in system registry:

[HKLM\SOFTWARE\Google\Update]
"uid"
"old-uid"

The process GoogleUpdate.exe:3900 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Google\Update\ClientState\{4DC8B4CA-1BDA-483e-B5FA-D3C12E15B62D}\CurrentState]
"StateValue" = "7"
"InstallProgressPercent" = "4294967295"

[HKLM\SOFTWARE\Google\Update\PersistedPings\{790CEE4C-A10D-431B-B8F9-9BE1B3FF9E95}]
"PersistedPingTime" = "131221104743348753"

[HKLM\SOFTWARE\Google\Update\ClientState\{4DC8B4CA-1BDA-483e-B5FA-D3C12E15B62D}\CurrentState]
"DownloadTimeRemainingMs" = "4294967295"

[HKLM\SOFTWARE\Google\Update\ClientState\{4DC8B4CA-1BDA-483e-B5FA-D3C12E15B62D}]
"pv" = "54.0.2840.71"
"LastInstallerSuccessLaunchCmdLine" = "%Program Files%\Google\Chrome\Application\chrome.exe"

[HKLM\SOFTWARE\Google\Update\ClientState\{430FD4D0-B729-4F61-AA34-91526481799D}\CurrentState]
"StateValue" = "16"

[HKLM\SOFTWARE\Google\Update\ClientState\{4DC8B4CA-1BDA-483e-B5FA-D3C12E15B62D}]
"UpdateTime" = "1477636900"

[HKLM\SOFTWARE\Google\Update\ClientState\{4DC8B4CA-1BDA-483e-B5FA-D3C12E15B62D}\CurrentState]
"InstallTimeRemainingMs" = "4294967295"

[HKLM\SOFTWARE\Google\Update\ClientState\{8A69D345-D564-463C-AFF1-A69D9E530F96}\CurrentState]
"StateValue" = "16"

[HKLM\SOFTWARE\Google\Update\PersistedPings\{790CEE4C-A10D-431B-B8F9-9BE1B3FF9E95}]
"PersistedPingString" = "
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"

[HKCU\Software\Google\Update\proxy]
"source" = "IEWPAD"

[HKLM\SOFTWARE\Google\Update]
"LastInstallerSuccessLaunchCmdLine" = "%Program Files%\Google\Chrome\Application\chrome.exe"

[HKLM\SOFTWARE\Google\Update\ClientState\{4DC8B4CA-1BDA-483e-B5FA-D3C12E15B62D}]
"LastCheckSuccess" = "1477636900"
"LastInstallerError" = "0"

[HKLM\SOFTWARE\Google\Update]
"LastInstallerResult" = "0"

[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"

[HKLM\SOFTWARE\Google\Update\ClientState\{4DC8B4CA-1BDA-483e-B5FA-D3C12E15B62D}\CurrentState]
"DownloadProgressPercent" = "0"

[HKLM\SOFTWARE\Google\Update]
"LastInstallerError" = "0"

[HKLM\SOFTWARE\Google\Update\ClientState\{4DC8B4CA-1BDA-483e-B5FA-D3C12E15B62D}]
"LastInstallerResult" = "0"

The Trojan deletes the following registry key(s):

[HKLM\SOFTWARE\Google\Update\PersistedPings\{790CEE4C-A10D-431B-B8F9-9BE1B3FF9E95}]

The Trojan deletes the following value(s) in system registry:

[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"

[HKLM\SOFTWARE\Google\Update\ClientState\{4DC8B4CA-1BDA-483e-B5FA-D3C12E15B62D}]
"LastInstallerResultUIString"
"UpdateAvailableCount"

[HKLM\SOFTWARE\Google\Update]
"old-uid"

[HKLM\SOFTWARE\Google\Update\ClientState\{4DC8B4CA-1BDA-483e-B5FA-D3C12E15B62D}]
"UpdateAvailableSince"

[HKLM\SOFTWARE\Google\Update]
"LastInstallerResultUIString"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"

[HKLM\SOFTWARE\Google\Update\ClientState\{4DC8B4CA-1BDA-483e-B5FA-D3C12E15B62D}]
"LastInstallerResult"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"

[HKLM\SOFTWARE\Google\Update\ClientState\{4DC8B4CA-1BDA-483e-B5FA-D3C12E15B62D}]
"LastInstallerExtraCode1"
"InstallerError"

[HKLM\SOFTWARE\Google\Update]
"LastInstallerError"
"uid"

[HKLM\SOFTWARE\Google\Update\ClientState\{4DC8B4CA-1BDA-483e-B5FA-D3C12E15B62D}]
"InstallerSuccessLaunchCmdLine"
"LastInstallerSuccessLaunchCmdLine"
"InstallerResult"

[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"

[HKLM\SOFTWARE\Google\Update\ClientState\{4DC8B4CA-1BDA-483e-B5FA-D3C12E15B62D}]
"LastInstallerError"
"iid"

[HKLM\SOFTWARE\Google\Update]
"LastInstallerSuccessLaunchCmdLine"
"LastInstallerExtraCode1"
"LastInstallerResult"

The process 54.0.2840.71_54.0.2840.59_chrome_updater.exe:268 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Google\Update\ClientState\{4DC8B4CA-1BDA-483e-B5FA-D3C12E15B62D}]
"ap" = "-statsdef_1-multi-chrome-full"

The process setup.exe:1276 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome]
"Publisher" = "Google Inc."

[HKLM\SOFTWARE\Google\Update\ClientState\{8A69D345-D564-463C-AFF1-A69D9E530F96}]
"InstallerError" = "2"

[HKLM\SOFTWARE\Google\Update\Clients\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
"Name" = "Google Chrome"

[HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
"IsInstalled" = "1"
"Localized Name" = "Google Chrome"
"Version" = "43,0,0,0"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome]
"NoModify" = "1"

[HKLM\SOFTWARE\Google\Update\ClientState\{8A69D345-D564-463C-AFF1-A69D9E530F96}]
"InstallerResult" = "0"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome]
"DisplayIcon" = "%Program Files%\Google\Chrome\Application\chrome.exe,0"

[HKLM\SOFTWARE\Google\Update\ClientState\{8A69D345-D564-463C-AFF1-A69D9E530F96}]
"ap" = "-statsdef_1-multi-chrome-full"

[HKLM\SOFTWARE\Google\Update\ClientState\{4DC8B4CA-1BDA-483e-B5FA-D3C12E15B62D}]
"UninstallString" = "%Program Files%\Google\Chrome\Application\54.0.2840.71\Installer\setup.exe"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome]
"InstallLocation" = "%Program Files%\Google\Chrome\Application"
"VersionMinor" = "71"
"VersionMajor" = "2840"

[HKLM\SOFTWARE\Google\Update\ClientState\{4DC8B4CA-1BDA-483e-B5FA-D3C12E15B62D}]
"UninstallArguments" = " --uninstall --multi-install --system-level"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome]
"Version" = "54.0.2840.71"

[HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
"(Default)" = "Google Chrome"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome]
"UninstallString" = "%Program Files%\Google\Chrome\Application\54.0.2840.71\Installer\setup.exe --uninstall --multi-install --chrome --system-level"

[HKLM\SOFTWARE\Google\Update\Clients\{4DC8B4CA-1BDA-483e-B5FA-D3C12E15B62D}]
"Name" = "Google Chrome binaries"

[HKLM\SOFTWARE\Google\Update\ClientState\{4DC8B4CA-1BDA-483e-B5FA-D3C12E15B62D}]
"InstallerError" = "2"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome]
"NoRepair" = "1"

[HKLM\SOFTWARE\Google\Update\Clients\{8A69D345-D564-463c-AFF1-A69D9E530F96}\Commands\on-os-upgrade]
"CommandLine" = "%Program Files%\Google\Chrome\Application\54.0.2840.71\Installer\setup.exe --on-os-upgrade --multi-install --chrome --system-level --verbose-logging"

[HKLM\SOFTWARE\Google\Update\ClientState\{4DC8B4CA-1BDA-483e-B5FA-D3C12E15B62D}]
"InstallerResult" = "0"

[HKLM\SOFTWARE\Google\Update\Clients\{8A69D345-D564-463c-AFF1-A69D9E530F96}\Commands\on-os-upgrade]
"AutoRunOnOSUpgrade" = "1"

[HKLM\SOFTWARE\Google\Update\ClientState\{4DC8B4CA-1BDA-483e-B5FA-D3C12E15B62D}]
"InstallerProgress" = "21"

[HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
"StubPath" = "%Program Files%\Google\Chrome\Application\54.0.2840.71\Installer\chrmstp.exe --configure-user-settings --verbose-logging --system-level --multi-install --chrome"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome]
"DisplayName" = "Google Chrome"

[HKLM\SOFTWARE\Google\Update\Clients\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
"pv" = "54.0.2840.71"

[HKLM\SOFTWARE\Google\Update\ClientState\{4DC8B4CA-1BDA-483e-B5FA-D3C12E15B62D}]
"ap" = "-statsdef_1-multi-chrome"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome]
"DisplayVersion" = "54.0.2840.71"

[HKLM\SOFTWARE\Google\Update\ClientState\{8A69D345-D564-463C-AFF1-A69D9E530F96}]
"UninstallArguments" = " --uninstall --multi-install --chrome --system-level"
"UninstallString" = "%Program Files%\Google\Chrome\Application\54.0.2840.71\Installer\setup.exe"

[HKLM\SOFTWARE\Google\Update\Clients\{4DC8B4CA-1BDA-483e-B5FA-D3C12E15B62D}]
"pv" = "54.0.2840.71"

The process setup.exe:1904 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Google\Update\ClientState\{4DC8B4CA-1BDA-483e-B5FA-D3C12E15B62D}]
"InstallerProgress" = "10"

The process regsvr32.exe:2332 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCR\dm.dmsoft\CLSID]
"(Default)" = "{26037A0E-7CBD-4FFF-9C63-56F2D0770214}"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
"ThreadingModel" = "Apartment"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}]
"(Default)" = "dm.dmsoft"

[HKCR\dm.dmsoft]
"(Default)" = "dm.dmsoft"

[HKCR\dm.dmsoft\CurVer]
"(Default)" = "dm.dmsoft"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
"(Default)" = "c:\Data\dm.dll"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID]
"(Default)" = "dm.dmsoft"

The Trojan deletes the following registry key(s):

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}]
[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID]

The process regsvr32.exe:2472 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCR\dm.dmsoft\CLSID]
"(Default)" = "{26037A0E-7CBD-4FFF-9C63-56F2D0770214}"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
"ThreadingModel" = "Apartment"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}]
"(Default)" = "dm.dmsoft"

[HKCR\dm.dmsoft]
"(Default)" = "dm.dmsoft"

[HKCR\dm.dmsoft\CurVer]
"(Default)" = "dm.dmsoft"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
"(Default)" = "c:\Data\dm.dll"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID]
"(Default)" = "dm.dmsoft"

The Trojan deletes the following registry key(s):

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}]
[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID]

The process regsvr32.exe:2336 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCR\dm.dmsoft\CLSID]
"(Default)" = "{26037A0E-7CBD-4FFF-9C63-56F2D0770214}"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
"ThreadingModel" = "Apartment"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}]
"(Default)" = "dm.dmsoft"

[HKCR\dm.dmsoft]
"(Default)" = "dm.dmsoft"

[HKCR\dm.dmsoft\CurVer]
"(Default)" = "dm.dmsoft"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
"(Default)" = "c:\Data\dm.dll"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID]
"(Default)" = "dm.dmsoft"

The Trojan deletes the following registry key(s):

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}]
[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID]

The process regsvr32.exe:2456 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCR\dm.dmsoft\CLSID]
"(Default)" = "{26037A0E-7CBD-4FFF-9C63-56F2D0770214}"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
"ThreadingModel" = "Apartment"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}]
"(Default)" = "dm.dmsoft"

[HKCR\dm.dmsoft]
"(Default)" = "dm.dmsoft"

[HKCR\dm.dmsoft\CurVer]
"(Default)" = "dm.dmsoft"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
"(Default)" = "c:\Data\dm.dll"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID]
"(Default)" = "dm.dmsoft"

The Trojan deletes the following registry key(s):

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}]
[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID]

The process regsvr32.exe:2424 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCR\dm.dmsoft\CLSID]
"(Default)" = "{26037A0E-7CBD-4FFF-9C63-56F2D0770214}"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
"ThreadingModel" = "Apartment"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}]
"(Default)" = "dm.dmsoft"

[HKCR\dm.dmsoft]
"(Default)" = "dm.dmsoft"

[HKCR\dm.dmsoft\CurVer]
"(Default)" = "dm.dmsoft"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
"(Default)" = "c:\Data\dm.dll"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID]
"(Default)" = "dm.dmsoft"

The Trojan deletes the following registry key(s):

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}]
[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID]

The process regsvr32.exe:2304 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCR\dm.dmsoft\CLSID]
"(Default)" = "{26037A0E-7CBD-4FFF-9C63-56F2D0770214}"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
"ThreadingModel" = "Apartment"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}]
"(Default)" = "dm.dmsoft"

[HKCR\dm.dmsoft]
"(Default)" = "dm.dmsoft"

[HKCR\dm.dmsoft\CurVer]
"(Default)" = "dm.dmsoft"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
"(Default)" = "c:\Data\dm.dll"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID]
"(Default)" = "dm.dmsoft"

The Trojan deletes the following registry key(s):

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}]
[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID]

The process regsvr32.exe:2436 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCR\dm.dmsoft\CLSID]
"(Default)" = "{26037A0E-7CBD-4FFF-9C63-56F2D0770214}"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
"ThreadingModel" = "Apartment"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}]
"(Default)" = "dm.dmsoft"

[HKCR\dm.dmsoft]
"(Default)" = "dm.dmsoft"

[HKCR\dm.dmsoft\CurVer]
"(Default)" = "dm.dmsoft"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
"(Default)" = "c:\Data\dm.dll"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID]
"(Default)" = "dm.dmsoft"

The Trojan deletes the following registry key(s):

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}]
[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID]

The process regsvr32.exe:2412 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCR\dm.dmsoft\CLSID]
"(Default)" = "{26037A0E-7CBD-4FFF-9C63-56F2D0770214}"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
"ThreadingModel" = "Apartment"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}]
"(Default)" = "dm.dmsoft"

[HKCR\dm.dmsoft]
"(Default)" = "dm.dmsoft"

[HKCR\dm.dmsoft\CurVer]
"(Default)" = "dm.dmsoft"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
"(Default)" = "c:\Data\dm.dll"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID]
"(Default)" = "dm.dmsoft"

The Trojan deletes the following registry key(s):

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}]
[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID]

The process regsvr32.exe:2400 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCR\dm.dmsoft\CLSID]
"(Default)" = "{26037A0E-7CBD-4FFF-9C63-56F2D0770214}"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
"ThreadingModel" = "Apartment"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}]
"(Default)" = "dm.dmsoft"

[HKCR\dm.dmsoft]
"(Default)" = "dm.dmsoft"

[HKCR\dm.dmsoft\CurVer]
"(Default)" = "dm.dmsoft"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
"(Default)" = "c:\Data\dm.dll"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID]
"(Default)" = "dm.dmsoft"

The Trojan deletes the following registry key(s):

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}]
[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID]

The process regsvr32.exe:2416 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCR\dm.dmsoft\CLSID]
"(Default)" = "{26037A0E-7CBD-4FFF-9C63-56F2D0770214}"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
"ThreadingModel" = "Apartment"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}]
"(Default)" = "dm.dmsoft"

[HKCR\dm.dmsoft]
"(Default)" = "dm.dmsoft"

[HKCR\dm.dmsoft\CurVer]
"(Default)" = "dm.dmsoft"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
"(Default)" = "c:\Data\dm.dll"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID]
"(Default)" = "dm.dmsoft"

The Trojan deletes the following registry key(s):

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}]
[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID]

The process regsvr32.exe:2372 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCR\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\TypeLib]
"(Default)" = "{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}"

[HKCR\dm.dmsoft\CLSID]
"(Default)" = "{26037A0E-7CBD-4FFF-9C63-56F2D0770214}"

[HKCR\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\HELPDIR]
"(Default)" = "c:\Data\"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
"ThreadingModel" = "Apartment"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}]
"(Default)" = "dm.dmsoft"

[HKCR\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\FLAGS]
"(Default)" = "0"

[HKCR\dm.dmsoft]
"(Default)" = "dm.dmsoft"

[HKCR\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}]
"(Default)" = "Idmsoft"

[HKCR\dm.dmsoft\CurVer]
"(Default)" = "dm.dmsoft"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32]
"(Default)" = "c:\Data\dm.dll"

[HKCR\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"

[HKCR\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"

[HKCR\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\0\win32]
"(Default)" = "c:\Data\dm.dll"

[HKCR\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0]
"(Default)" = "Dm"

[HKCR\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID]
"(Default)" = "dm.dmsoft"

[HKCR\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\TypeLib]
"Version" = "1.0"

Dropped PE files

MD5 File path
c578b6820bda5689940560147c6e5ffc c:\Data\dm.dll
503a8048c5558c4bedb95f5d408280e7 c:\Program Files\Google\Chrome\Application\54.0.2840.71\Installer\chrmstp.exe
503a8048c5558c4bedb95f5d408280e7 c:\Program Files\Google\Chrome\Application\54.0.2840.71\Installer\setup.exe
6f4c70c96fedc4e0a79c49d75fb31819 c:\Program Files\Google\Chrome\Application\54.0.2840.71\WidevineCdm\_platform_specific\win_x86\widevinecdm.dll
01d6c4d58f79447c38992c6615548cff c:\Program Files\Google\Chrome\Application\54.0.2840.71\WidevineCdm\_platform_specific\win_x86\widevinecdmadapter.dll
00c36ae47c7e16937834705dda03ef7e c:\Program Files\Google\Chrome\Application\54.0.2840.71\chrome.dll
6848d69d5550119ed5e5df9b334b6537 c:\Program Files\Google\Chrome\Application\54.0.2840.71\chrome_child.dll
c4b3022907fb6c0748df860dde1e9ee9 c:\Program Files\Google\Chrome\Application\54.0.2840.71\chrome_elf.dll
3d341f7ee28b0bdf8b8cdca3b0ed97c0 c:\Program Files\Google\Chrome\Application\54.0.2840.71\chrome_watcher.dll
02e034cd47aa9a633f6aaef348dbbba0 c:\Program Files\Google\Chrome\Application\54.0.2840.71\d3dcompiler_47.dll
98a53cfa1945b99656db4332d89c9328 c:\Program Files\Google\Chrome\Application\54.0.2840.71\libegl.dll
d1df316e69e13e0911ed19c80e8500c8 c:\Program Files\Google\Chrome\Application\54.0.2840.71\libglesv2.dll
a99fb676e5eb1393bb241fde05843127 c:\Program Files\Google\Chrome\Application\54.0.2840.71\nacl64.exe
ab3d3d17ad0174384c0088d397388558 c:\Program Files\Google\Update\Download\{4DC8B4CA-1BDA-483E-B5FA-D3C12E15B62D}\54.0.2840.71\54.0.2840.71_54.0.2840.59_chrome_updater.exe
ab3d3d17ad0174384c0088d397388558 c:\Program Files\Google\Update\Install\{4BE97E2F-B4A3-41A5-8B1D-EB58A7D5FCB4}\54.0.2840.71_54.0.2840.59_chrome_updater.exe
503a8048c5558c4bedb95f5d408280e7 c:\Windows\Temp\CR_869F3.tmp\setup.exe

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

VersionInfo

No information is available.

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 4096 1089674 0 0 d41d8cd98f00b204e9800998ecf8427e
.rdata 1097728 5081452 0 0 d41d8cd98f00b204e9800998ecf8427e
.data 6180864 464330 0 0 d41d8cd98f00b204e9800998ecf8427e
.vmp0 6647808 2231493 0 0 d41d8cd98f00b204e9800998ecf8427e
.vmp1 8880128 6405936 6406144 5.54417 d62ea37305934ff2d63a28fd97608e15
.rsrc 15286272 5744 8192 2.96243 f49c050333f381c65fff839236013a8f

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

URL IP
hxxp://redirector.gvt1.com/edgedl/release2/9liqmqrgqfa7ez02glv729167mt3kbx8m7ksxfuuazw7up69ddgu8ol2axd13ipv75z76n27nysxd400sfjvpanesqdmeqaa7ho/54.0.2840.71_54.0.2840.59_chrome_updater.exe
hxxp://r2.sn-2puapox-ig3l.gvt1.com/edgedl/release2/9liqmqrgqfa7ez02glv729167mt3kbx8m7ksxfuuazw7up69ddgu8ol2axd13ipv75z76n27nysxd400sfjvpanesqdmeqaa7ho/54.0.2840.71_54.0.2840.59_chrome_updater.exe?cms_redirect=yes&expire=1477651236&ip=194.242.96.218&ipbits=0&mm=28&mn=sn-2puapox-ig3l&ms=nvh&mt=1477636818&mv=m&pl=23&shardbypass=yes&sparams=expire,ip,ipbits,mm,mn,ms,mv,pl,shardbypass&signature=092925340ED87695D41054DED9F890C1204DB90A.7D8A8B629F13F3050C3324F862564D62A4FAFD59&key=cms1
hxxp://r2---sn-2puapox-ig3l.gvt1.com/edgedl/release2/9liqmqrgqfa7ez02glv729167mt3kbx8m7ksxfuuazw7up69ddgu8ol2axd13ipv75z76n27nysxd400sfjvpanesqdmeqaa7ho/54.0.2840.71_54.0.2840.59_chrome_updater.exe?cms_redirect=yes&expire=1477651236&ip=194.242.96.218&ipbits=0&mm=28&mn=sn-2puapox-ig3l&ms=nvh&mt=1477636818&mv=m&pl=23&shardbypass=yes&sparams=expire,ip,ipbits,mm,mn,ms,mv,pl,shardbypass&signature=092925340ED87695D41054DED9F890C1204DB90A.7D8A8B629F13F3050C3324F862564D62A4FAFD59&key=cms1
comroute.baibaoyun.com 120.27.136.132


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

ET POLICY PE EXE or DLL Windows file download HTTP

Traffic

HEAD /edgedl/release2/9liqmqrgqfa7ez02glv729167mt3kbx8m7ksxfuuazw7up69ddgu8ol2axd13ipv75z76n27nysxd400sfjvpanesqdmeqaa7ho/54.0.2840.71_54.0.2840.59_chrome_updater.exe?cms_redirect=yes&expire=1477651236&ip=194.242.96.218&ipbits=0&mm=28&mn=sn-2puapox-ig3l&ms=nvh&mt=1477636818&mv=m&pl=23&shardbypass=yes&sparams=expire,ip,ipbits,mm,mn,ms,mv,pl,shardbypass&signature=092925340ED87695D41054DED9F890C1204DB90A.7D8A8B629F13F3050C3324F862564D62A4FAFD59&key=cms1 HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
X-GoogleUpdate-Interactivity: bg
Host: r2---sn-2puapox-ig3l.gvt1.com


HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Length: 2377080
Content-Type: application/octet-stream
Etag: "1013e5"
Server: downloads
Vary: *
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1; mode=block
Date: Thu, 27 Oct 2016 07:27:47 GMT
Alt-Svc: quic=":443"; ma=2592000; v="36,35,34"
Last-Modified: Thu, 20 Oct 2016 09:56:47 GMT
Connection: keep-alive
HTTP/1.1 200 OK..Accept-Ranges: bytes..Content-Length: 2377080..Conten
t-Type: application/octet-stream..Etag: "1013e5"..Server: downloads..V
ary: *..X-Content-Type-Options: nosniff..X-Frame-Options: SAMEORIGIN..
X-Xss-Protection: 1; mode=block..Date: Thu, 27 Oct 2016 07:27:47 GMT..
Alt-Svc: quic=":443"; ma=2592000; v="36,35,34"..Last-Modified: Thu, 20
Oct 2016 09:56:47 GMT..Connection: keep-alive..
....



GET /edgedl/release2/9liqmqrgqfa7ez02glv729167mt3kbx8m7ksxfuuazw7up69ddgu8ol2axd13ipv75z76n27nysxd400sfjvpanesqdmeqaa7ho/54.0.2840.71_54.0.2840.59_chrome_updater.exe?cms_redirect=yes&expire=1477651236&ip=194.242.96.218&ipbits=0&mm=28&mn=sn-2puapox-ig3l&ms=nvh&mt=1477636818&mv=m&pl=23&shardbypass=yes&sparams=expire,ip,ipbits,mm,mn,ms,mv,pl,shardbypass&signature=092925340ED87695D41054DED9F890C1204DB90A.7D8A8B629F13F3050C3324F862564D62A4FAFD59&key=cms1 HTTP/1.1

Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
If-Unmodified-Since: Thu, 20 Oct 2016 09:56:47 GMT
Range: bytes=0-8695
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
X-GoogleUpdate-Interactivity: bg
Host: r2---sn-2puapox-ig3l.gvt1.com


HTTP/1.1 206 Partial Content
Accept-Ranges: bytes
Content-Length: 8696
Content-Type: application/octet-stream
Etag: "1013e5"
Server: downloads
Vary: *
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1; mode=block
Date: Thu, 27 Oct 2016 07:27:47 GMT
Alt-Svc: quic=":443"; ma=2592000; v="36,35,34"
Last-Modified: Thu, 20 Oct 2016 09:56:47 GMT
Content-Range: bytes 0-8695/2377080
Connection: keep-alive
MZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$............v...v..
.v....}..v...v...v... ...v... ...v... m..v...v...v... ...v..Rich.v....
......PE..L......X.........."......(....#.....X .......@....@.........
.................0$.......$...@..................................P..P.
...`..@.#...........#.xS... $.........8...............................
.............P...............................text....'.......(........
.......... ..`.data........@......................@....idata..t....P..
.....,..............@..@.rsrc...@.#..`....#..4..............@..@.reloc
....... $.......#.............@..B....................................
......................................................................
......................................................................
......................................................................
......................................................................
................................................ ... .-.-...=.".....".
.-.-....."...D.:.P.A.I.(.A.;.;.F.A.;.;.;.B.A.).(.A.;.O.I.I.O.C.I.;.G.
A.;.;.;.B.A.).(.A.;.;.F.A.;.;.;.S.Y.).(.A.;.O.I.I.O.C.I.;.G.A.;.;.;.S.
Y.).(.A.;.O.I.I.O.C.I.;.G.A.;.;.;.C.O.).(.A.;.;.F.A.;.;.;.....).....t.
m.p.....\...\.*...*.....*...*.....@...@.c.h.r.o.m.e._.......{.8.B.A.9.
8.6.D.A.-.5.1.0.0.-.4.0.5.E.-.A.A.3.5.-.8.6.F.3.4.A.0.2.A.C.B.F.}.....
{.8.A.6.9.D.3.4.5.-.D.5.6.4.-.4.6.3.c.-.A.F.F.1.-.A.6.9.D.9.E.5.3.0.F.
9.6.}.....{.4.e.a.1.6.a.c.7.-.f.d.5.a.-.4.7.c.3.-.8.7.5.b.-.d.b.f.

<<< skipped >>>

GET /edgedl/release2/9liqmqrgqfa7ez02glv729167mt3kbx8m7ksxfuuazw7up69ddgu8ol2axd13ipv75z76n27nysxd400sfjvpanesqdmeqaa7ho/54.0.2840.71_54.0.2840.59_chrome_updater.exe?cms_redirect=yes&expire=1477651236&ip=194.242.96.218&ipbits=0&mm=28&mn=sn-2puapox-ig3l&ms=nvh&mt=1477636818&mv=m&pl=23&shardbypass=yes&sparams=expire,ip,ipbits,mm,mn,ms,mv,pl,shardbypass&signature=092925340ED87695D41054DED9F890C1204DB90A.7D8A8B629F13F3050C3324F862564D62A4FAFD59&key=cms1 HTTP/1.1

Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
If-Unmodified-Since: Thu, 20 Oct 2016 09:56:47 GMT
Range: bytes=8696-23281
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
X-GoogleUpdate-Interactivity: bg
Host: r2---sn-2puapox-ig3l.gvt1.com


HTTP/1.1 206 Partial Content
Accept-Ranges: bytes
Content-Length: 14586
Content-Type: application/octet-stream
Etag: "1013e5"
Server: downloads
Vary: *
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1; mode=block
Date: Thu, 27 Oct 2016 07:27:47 GMT
Alt-Svc: quic=":443"; ma=2592000; v="36,35,34"
Last-Modified: Thu, 20 Oct 2016 09:56:47 GMT
Content-Range: bytes 8696-23281/2377080
Connection: keep-alive
j..u..}...XP@...u'.E.P.u...dP@...t..u...PP@..E..M....x.....TP@..M...k.
...A..._..].U....,...SVW.u.3.f.E.f.........P@..}....$.@............~OS
VP.o........t,.u.......VP..........t.S......VP..........u7.E..`....i..
._^[..].VP.E.WP......M......t..E....M..H...h..@.......VP.0........t.h.
.@.......VP..........t.h..@.......VP............z....u.......VP.......
....._...S......VP............F..... .......h..@.......VP.............
...hp.@.......VP................h..@.......VP.i...............w ......
VP.N..............S......VP.5....................PW.Z.........Pj..u..k
....E.........U.........e..3.f.E.f.......E.P.u......YY..tuSW..........
.SP...@..M.W.......t....uM...u.3.f......V.4.@.......VP.....YY..u%V....
..SP.z........t.......PW.M..o...^_[.M........].U....\...SV.u.3..u.....
...Y..u.........E..].P.0...Y..t}W3..,...h(.@.f.E.f............WP......
....tE.u.......WP..........t.h..@.......WP..........t.SVj.......P.....
......u...xP@..._^[..].U..Q3.j..E..E.Ph..@.h..@.h..............t.f.}.0
u.2.......].U....P...SV.u.3.WVf.E......f............SP............3...
h..@.......SP.................}..E....P@.Ph{ @.h..@..u..u..u..}..u....
.u...TP@..M...p....A........h....W.P...YY..u..E...p........h....3.V.}.
.,...YY........3.f......f......f......f............h....P.u..E.P......
.....@..E.....<.........P......h....P.)..............h..@.......h..
..P................h<.@.......h....P................h..@.......h...
.P................V......h....P................h..@.......h....P......
....tvh`.@.......h....P.k........tYh..@.......h....P.N........t<

<<< skipped >>>

GET /edgedl/release2/9liqmqrgqfa7ez02glv729167mt3kbx8m7ksxfuuazw7up69ddgu8ol2axd13ipv75z76n27nysxd400sfjvpanesqdmeqaa7ho/54.0.2840.71_54.0.2840.59_chrome_updater.exe?cms_redirect=yes&expire=1477651236&ip=194.242.96.218&ipbits=0&mm=28&mn=sn-2puapox-ig3l&ms=nvh&mt=1477636818&mv=m&pl=23&shardbypass=yes&sparams=expire,ip,ipbits,mm,mn,ms,mv,pl,shardbypass&signature=092925340ED87695D41054DED9F890C1204DB90A.7D8A8B629F13F3050C3324F862564D62A4FAFD59&key=cms1 HTTP/1.1

Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
If-Unmodified-Since: Thu, 20 Oct 2016 09:56:47 GMT
Range: bytes=23282-38116
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
X-GoogleUpdate-Interactivity: bg
Host: r2---sn-2puapox-ig3l.gvt1.com


HTTP/1.1 206 Partial Content
Accept-Ranges: bytes
Content-Length: 14835
Content-Type: application/octet-stream
Etag: "1013e5"
Server: downloads
Vary: *
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1; mode=block
Date: Thu, 27 Oct 2016 07:27:47 GMT
Alt-Svc: quic=":443"; ma=2592000; v="36,35,34"
Last-Modified: Thu, 20 Oct 2016 09:56:47 GMT
Content-Range: bytes 23282-38116/2377080
Connection: keep-alive
.........d6..T..b..Irmi...{.....3...Rr).%..6^@..PW.c..-":(...sF...:.y[
...B.....g...~a.W.t...?2......C.....:..d..7...qV^._..r-M....b..Y......
W...m...r?..k[nw.S.....L.....#R..._.t....?....Vj..f.......o].&=U...\s.
T5|.y..<...!..E/,.r2.?.w.u.[..'........K3.R......Sp...A.I.r..i.....
..12.$....>..dA.|`...7...;||.V.knAOk'f&..... .W..V..7...`1fFS9~<
......Q>]8Wy.*..)...p/>:.X.G.].J........~..nUE=..uwI}..\.......D
tG.<..#8.5M.O.$.1.N.....}..U...]...4.u.y..O0..L...nD...#. .8..Y..&m
x.'..U..L..d..$$h..V.r.p..4.GZ......^..[.vF....^[B..Q2.8V...h...K...w.
.......v5..Q=R..J....Y.g..jE|........d..-8........J.d.AN.\r...'..y$.Yf
.H&.....=..afy^eC..t.1.Q.S._."Q10.w.$_.l..%O..m..... .t.Oc"W.W...~}...
j ...R.2..]Jm....fa.f...F/..vP.......-Y..E09.5.i."..v?9....V5..3...7.w
.K_....4..PG.......l..U..9..JM. .n.....L..KY..H.?.&....S....<H.aD..
5...l....r.Dj.....g.......=..c.d.b..dO.$vO*Q'"..>.R...nO.>/Wx.!.
....TJ_.yk...x&I....... kd......0.xi...>9........\UN.{.Q..Hh......f
.E..|....e......v...2@.....T.k.1R..{.l^...W...6...B8....MR..S.(..H|...
.. ej.S3....).\...M..."$..y^.........I.r... D..2.....R..Va.G{p..)..u#7
d$..(8.....Z..4.lJ.3k>..k.nz.|..Y..N........HjYq.A.'{....S>.-.p.
.\?...*."..x....U..h..%..?...tE7...}#./ .P..Ik......w.^.z7.o..`.F..g.U
\..b.p......p..H..9.Qu....MH....K/~O..a".-..q..mXOi..$.m.......9..(I..
..@x3....wl.....L.j.Mx...Wq.OA.../..K......8..j..-.B.=.I.o.G.%z%.....f
.6..(...w...gA...E.............X6....>....W..kx.].A.8......a..3.j./
@[.Up$p..S..{U...-q9.;z9.O..-..Z.?.k..0...A. )t....s..G&..Em.^/.k.

<<< skipped >>>

GET /edgedl/release2/9liqmqrgqfa7ez02glv729167mt3kbx8m7ksxfuuazw7up69ddgu8ol2axd13ipv75z76n27nysxd400sfjvpanesqdmeqaa7ho/54.0.2840.71_54.0.2840.59_chrome_updater.exe?cms_redirect=yes&expire=1477651236&ip=194.242.96.218&ipbits=0&mm=28&mn=sn-2puapox-ig3l&ms=nvh&mt=1477636818&mv=m&pl=23&shardbypass=yes&sparams=expire,ip,ipbits,mm,mn,ms,mv,pl,shardbypass&signature=092925340ED87695D41054DED9F890C1204DB90A.7D8A8B629F13F3050C3324F862564D62A4FAFD59&key=cms1 HTTP/1.1

Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
If-Unmodified-Since: Thu, 20 Oct 2016 09:56:47 GMT
Range: bytes=38117-58971
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
X-GoogleUpdate-Interactivity: bg
Host: r2---sn-2puapox-ig3l.gvt1.com


HTTP/1.1 206 Partial Content
Accept-Ranges: bytes
Content-Length: 20855
Content-Type: application/octet-stream
Etag: "1013e5"
Server: downloads
Vary: *
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1; mode=block
Date: Thu, 27 Oct 2016 07:27:47 GMT
Alt-Svc: quic=":443"; ma=2592000; v="36,35,34"
Last-Modified: Thu, 20 Oct 2016 09:56:47 GMT
Content-Range: bytes 38117-58971/2377080
Connection: keep-alive
.#o&._.x.....L.X.........O.!...K...MlF...[L.T..NQW...b.1..~.........^n
.13... .9....&v..o..S..k._(.............i,.......o@....,?.D..K.......:
..$.d...&.oi.....I>..C2.J......[T:(...q..U.....B....f*..q.`.......!
...&8K.a;......#..........u.2#..=.JD.e.E@h8.A.7..`s...mP~.....w....5n.
r ^e...a.J..y..........hQt8.....B...wt..}|T...#.|.wL*y.,.Ur1...p..)...
.......=*i.w.XW..m....=\..Z.|"b.S.z.:.k..Q&...&"(^....mg.....A....\.[.
@.G...........S..VI...w...H ..J3..C......Z.N.f.=b..pwvGy......0.v.....
..(%E.... .....^p..G..;.s.`...I.8..!P|.7g.......}1.....X.:-..gt...f...
..yP.[t.\..S4.n.....G..5..j...J...S.q....zA.b.~M.d..).c.^..pn`..3*....
7#sw.......'...k.(..X.5.*...8Sx.'V..O.r...15VF..-.s..B.....2...O..3..9
7~@{...\...).......>...`.o .Q....B..Y..K.....7..D.h..u...a6o.!.*...
......f2%B....%#LqKy.RH}.#Vb...:.._[}....@......N.<|[>s...q(z...
....^.......t..{..q...D...t.T....._..q.'.t...4b.y...u........@...u)WX.
7....?I.............cV..Dzu#.J.1.....$S..@];......*8..."._..D.t.?%i..'
3..$.$......6.}.............JE....!..7"{0@...\.......=.{.....s..>1.
?.e@........B.....?...B..."....<.L...(.._....?...y.F...6....q.9..|)
....i.Pl.znd~q.4..NX8.....1`.g.?....dh..Q....I4T?.....{.qm....K.."v.S.
qk...z...e...........H......\u.(.2y..d6.....k.t.Y}.Bl..np.f.."qL../#.|
.0..*h.w......SP.d6..B.......A........j..ug\.QQ_..(.v{ggD#.I]...>tN
.....2.7...B...7`.d..#..............a.kx.c.P8......<...B1V....2]NSi
....?u.4%b.q(./.VU.bf.h}h|...D.CI.... ..f.E8...bT....k@n_.vVn..2...-..
...).F...P...[..0.9..j.I~s_...i..m.F5..........a.m..}H....B...A...

<<< skipped >>>

GET /edgedl/release2/9liqmqrgqfa7ez02glv729167mt3kbx8m7ksxfuuazw7up69ddgu8ol2axd13ipv75z76n27nysxd400sfjvpanesqdmeqaa7ho/54.0.2840.71_54.0.2840.59_chrome_updater.exe?cms_redirect=yes&expire=1477651236&ip=194.242.96.218&ipbits=0&mm=28&mn=sn-2puapox-ig3l&ms=nvh&mt=1477636818&mv=m&pl=23&shardbypass=yes&sparams=expire,ip,ipbits,mm,mn,ms,mv,pl,shardbypass&signature=092925340ED87695D41054DED9F890C1204DB90A.7D8A8B629F13F3050C3324F862564D62A4FAFD59&key=cms1 HTTP/1.1

Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
If-Unmodified-Since: Thu, 20 Oct 2016 09:56:47 GMT
Range: bytes=58972-79579
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
X-GoogleUpdate-Interactivity: bg
Host: r2---sn-2puapox-ig3l.gvt1.com


HTTP/1.1 206 Partial Content
Accept-Ranges: bytes
Content-Length: 20608
Content-Type: application/octet-stream
Etag: "1013e5"
Server: downloads
Vary: *
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1; mode=block
Date: Thu, 27 Oct 2016 07:27:47 GMT
Alt-Svc: quic=":443"; ma=2592000; v="36,35,34"
Last-Modified: Thu, 20 Oct 2016 09:56:47 GMT
Content-Range: bytes 58972-79579/2377080
Connection: keep-alive
Ss^.$.5)p..DQ.a!6..g...E:VF.mM?dd@......]...i},........./h.1u.....>
d..._.....I~...}x.(.R.[....M:.fR/z..C......D..uLd_.a...G.jt......;....
'...zV.n.,..-......c.K..t..Xz......~.SI"."...n.2C.....Q....iD........m
H.2........n.i|...7.lQN...j....3=...3i.}5gD@;<.....* ..nw..'.H.9...
..}k........:.K..x......`~.~........e...|....K..o.25a.......m5.Q.v...\
..x. .....4...^....Y^..2..J./...N.R7....AB} o.o'..x..l... K...o.gFn...
G..:.......S.BN~E>.u.P.hm..k.:~f...3.l...J..Ff.\.Ik{)GA....-...9.H.
.T.R9J.w..cCy.b..G........'IbC...g.X.-...b.{....[...r.B.|..$..........
?..q..n..q..!~.].Ea...._.5)...rS.EyX16..............lJ2....)..........
X...WQ.../...Br"0..0...1>L....\\...E\...0.Jm...,^......k.V...~...`.
^p.Ru.."68...1.u}Y...m....ID.>.!..w...T.|....9.F.`......O....[.N...
.)zG.`-#.......H8....hi....mYU..-.,.3*...x..!5.1..........vn.z..h]^...
..q..._.....v^538.w...Yg....2.!<......M`.z.*...r.k..H.8RGt.:..S...!
.@...b.a...........Pi .\.....!k..h..E.d..._&./..d....... .....v.~Wb...
.|O...T..^{ .U....N2......_.u..V......zX.5..j..J.........N......X...qo
..~o.;....-T.a..s."......d...%...&).4....b...r.|Q.b..`...).`..>...!
..o`......`...H.^.....L.,..9......Y......b...y=.....1......J.@..m.s...
...a...'m....KM.v..h....f.....Gq...:.. ......J...y.....-....>.a9.JQ
:.........}U.h........1A.....C...s..\....4.E...5.)...us&}.....h..R.}9.
..!.....4I.n.3...I..~........Q..m....8q.....,UsGRk..%...*..r].B..>.
r.B.bEb6.[&.F.b...r..l.=.B.BM[....pP. ..u.G..nBo...Fwc./@z...K..n.E.bz
..q..d%t)..u.n....]I.o.(....,...HU..Ad..t?.DI7......3.\;9....>1

<<< skipped >>>

GET /edgedl/release2/9liqmqrgqfa7ez02glv729167mt3kbx8m7ksxfuuazw7up69ddgu8ol2axd13ipv75z76n27nysxd400sfjvpanesqdmeqaa7ho/54.0.2840.71_54.0.2840.59_chrome_updater.exe?cms_redirect=yes&expire=1477651236&ip=194.242.96.218&ipbits=0&mm=28&mn=sn-2puapox-ig3l&ms=nvh&mt=1477636818&mv=m&pl=23&shardbypass=yes&sparams=expire,ip,ipbits,mm,mn,ms,mv,pl,shardbypass&signature=092925340ED87695D41054DED9F890C1204DB90A.7D8A8B629F13F3050C3324F862564D62A4FAFD59&key=cms1 HTTP/1.1

Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
If-Unmodified-Since: Thu, 20 Oct 2016 09:56:47 GMT
Range: bytes=79580-123287
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
X-GoogleUpdate-Interactivity: bg
Host: r2---sn-2puapox-ig3l.gvt1.com


HTTP/1.1 206 Partial Content
Accept-Ranges: bytes
Content-Length: 43708
Content-Type: application/octet-stream
Etag: "1013e5"
Server: downloads
Vary: *
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1; mode=block
Date: Thu, 27 Oct 2016 07:27:47 GMT
Alt-Svc: quic=":443"; ma=2592000; v="36,35,34"
Last-Modified: Thu, 20 Oct 2016 09:56:47 GMT
Content-Range: bytes 79580-123287/2377080
Connection: keep-alive
/n.......8...G..v..0.U.i..~Q...P........o...u.....&...!.|M.......f..Dl
.a..6.T...s h....X.......b.h.&a?....xpI.........Pxw[.I.....lZ..w...`nr
.%X.....m........~....O..^...k.y2...v.Iz.H?Or..O.....Q.._.jXg\.....a.I
BO..l..o....E.>_.98...7...}Dx).{.....#*..>je....h...}..Nl..}..g.
f..M.'*....5.w[........aH......r.\o2.........1....{...-Lm....-..QA`q..
.....2.i.....Z ....0.5.e...F...h.C>......@m....l.r6...Yt..H5..R!..R
./...xW..E.l.m.,.(...r::*..X...7..{..t......'.hS..._&e...Ia!.z.a)..a.N
.mJrm.p,)...._...s..'...M............0&..J.Da.7Z..o&.].|S.WLC....M.\x!
n.-#.]7.5...o....*...../=..0.YJ8....2.6T...n........Si..8W.U..}.....N.
...$...?. .Q4...23c\.G..j.^e.WS..D?rT..z.....4.......1j.C..$a.5..<.
`...P..z.....d......&.m...]...|w$Y............?pR^........O._...I..1t.
.k....u....a..........T...ms.j1......#.3>?.GS.e...Gq..Qo.....P..M.~
...o..?...$upy.......$......yf......B...H.8......9...j..JX.......S.8.*
f.t..E.Er=.:;..y..ICz.U.......my..C.8.e.VhN=.B...N..j. .. 8.RJ....Y,.z
_.w....<\..!......B.Be...H....z..r.u....%......Iec..7.'..{......^..
.A..(..o.'Ix.|....A.....$b5...3..f%`7.<g..g.<..[a.?8Ag.5.:...z.6
'.....u...7..}R_......h:.o.....9....c.....q:.......4..................
X.z..>a...2XN...,..Z.>..R....=La....{..Xt>>.o[e..V...U...E
..N...&....Q\ Q.5K:.E.n.[./(..WG.C.Q<.%u,..s..k8.2..#...!YX.m(...kH
2."..:.x.....3(....&&i.H7qepw:...E..#t..,6M........n....v&`.....BJ..r^
....#0...A..z..e&7<B...u.._....WB..6...u..xP6eN...%...3..ebm#..e9.b
TCN:..=.]?...N.....NO.j..p..Z.z.........N......_.2.yZ.....*..t....

<<< skipped >>>

GET /edgedl/release2/9liqmqrgqfa7ez02glv729167mt3kbx8m7ksxfuuazw7up69ddgu8ol2axd13ipv75z76n27nysxd400sfjvpanesqdmeqaa7ho/54.0.2840.71_54.0.2840.59_chrome_updater.exe?cms_redirect=yes&expire=1477651236&ip=194.242.96.218&ipbits=0&mm=28&mn=sn-2puapox-ig3l&ms=nvh&mt=1477636818&mv=m&pl=23&shardbypass=yes&sparams=expire,ip,ipbits,mm,mn,ms,mv,pl,shardbypass&signature=092925340ED87695D41054DED9F890C1204DB90A.7D8A8B629F13F3050C3324F862564D62A4FAFD59&key=cms1 HTTP/1.1

Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
If-Unmodified-Since: Thu, 20 Oct 2016 09:56:47 GMT
Range: bytes=123288-213184
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
X-GoogleUpdate-Interactivity: bg
Host: r2---sn-2puapox-ig3l.gvt1.com


HTTP/1.1 206 Partial Content
Accept-Ranges: bytes
Content-Length: 89897
Content-Type: application/octet-stream
Etag: "1013e5"
Server: downloads
Vary: *
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1; mode=block
Date: Thu, 27 Oct 2016 07:27:47 GMT
Alt-Svc: quic=":443"; ma=2592000; v="36,35,34"
Last-Modified: Thu, 20 Oct 2016 09:56:47 GMT
Content-Range: bytes 123288-213184/2377080
Connection: keep-alive
......r..#..?Zn..q...8.G).H..._.|..R.-8..k..Pf.G...K}!.4..(.D.U?.^.i.e
..=7.......[G.pPOX.......G...0.Z.B.........oX.0......w.f...#.....f...@
h3.~..H..^.&.......s.$.....q....o...|.......c...(.~..&.!...r...zhf.b..
..Q.....a&.\`...O.2....Ju.&}..E.9x.J.'....X._x..R..R-......p.~~.w.$.?L
.i.:.]..@w..@...a..y;..I....*...GaB...d8oO.Lo.3....L..-.r...2W.....t.a
z...S.....P....x....X....u.M.....x.iX.L..$}..~9.o}.w.E`.y.-g....i/...&
lt;.q.h.d8..n..4...... .......B8....U..G.......E1k}.\o..?.mc.VuL~j,...
_V....R.9.....O.,..K}....A>...C.@......h'....WE.z....}...A2......7.
.gj.{..._$.y#)E....xqJQ&..=....#..........s.z..#v... .....H:>..U.H.
...'......::.IW....f...@.|..u"-...:..4....{..3.)x..<....,H...j..c..
...J.bk.0-s..|?'L$...;r..#..%..I.4<.....n...9S}C.z.#Z..<.5..=..?
...0#f...'L_.R..,....5Mqk.`..!d...1..dmW...P....:.FNn..~i....r.>...
.....;......2%.Y......)y.{.;\f.l.|.?...l...f....... ..G[...Fs.......5.
.C..........#..y..~......J.^.....j..k(.....%x0..Y..! .{....YY.*...W.dH
*..H.&......#.5..XR..........-...$P...U(...q7..K8.....K.7...N.,..7....
.JF..1i......Q. .*Zx........X..SGt@..j..y..zX.CX.OX.M/-.......0..2g.B.
k....h..O.l.#.rd(..C..s...i.|.g...E3RB/..L]....;.9~..[!.p.g.Mu.....W..
....hb....!M..mk'.-V.yv.ph'...?.vD3E.|.J.L'.0~.).m..u.*......{.._.*.N
.....e....Xg<..6...0.".^.y.\..0Is..6|..V...R.........PN4..3....j./.
.=...$.5...B.Wt..M0NN\.Hk....*.V.W.e`b...e....;..V.v......-...."...}[.
...P...r...b.E...A..F6..:...@R..2.bL.....%M.;&..... .w...:....S......&
lt;d...H..md...^........lD'.w...&......,=Q.IzJ.o..)o...O......a. .

<<< skipped >>>

GET /edgedl/release2/9liqmqrgqfa7ez02glv729167mt3kbx8m7ksxfuuazw7up69ddgu8ol2axd13ipv75z76n27nysxd400sfjvpanesqdmeqaa7ho/54.0.2840.71_54.0.2840.59_chrome_updater.exe?cms_redirect=yes&expire=1477651236&ip=194.242.96.218&ipbits=0&mm=28&mn=sn-2puapox-ig3l&ms=nvh&mt=1477636818&mv=m&pl=23&shardbypass=yes&sparams=expire,ip,ipbits,mm,mn,ms,mv,pl,shardbypass&signature=092925340ED87695D41054DED9F890C1204DB90A.7D8A8B629F13F3050C3324F862564D62A4FAFD59&key=cms1 HTTP/1.1

Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
If-Unmodified-Since: Thu, 20 Oct 2016 09:56:47 GMT
Range: bytes=213185-395299
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
X-GoogleUpdate-Interactivity: bg
Host: r2---sn-2puapox-ig3l.gvt1.com


HTTP/1.1 206 Partial Content
Accept-Ranges: bytes
Content-Length: 182115
Content-Type: application/octet-stream
Etag: "1013e5"
Server: downloads
Vary: *
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1; mode=block
Date: Thu, 27 Oct 2016 07:27:47 GMT
Alt-Svc: quic=":443"; ma=2592000; v="36,35,34"
Last-Modified: Thu, 20 Oct 2016 09:56:47 GMT
Content-Range: bytes 213185-395299/2377080
Connection: keep-alive
...Q..4..At>.lT5../..v..vN~q@..h..5...c`D..J\.V.7..I..ZT.h.F..Vm.C.
...L...m..$s.....:..T........i....."....c.'.".r.u_...*...4...E,.j...N.
...0$...........;d.$..o.j"....._->~v.$...........!......O.p....<
2...w.m.$..W.,Cp;h...h.. ...X0.#...YA.T.V0W.:F....T...j... ..<..[k.
o.fI....=?.%..H.D..d.!9......g0...:.b.*.....BN..7}j.=(:..pU^?.O.psyD..
..o.`=A.>...}.@.....rkLI...vj.k.-..d....a..wC.l@$"4..V..'=E....Z..j
...I ...PW.I.R7t..<K5..L...FvtJ.c.au.4.,.....x.1Z5..0.J.,..*....2.n
j...H..;b. .o#.)5......S.V..;.}YB"..F........(.$..x...^u..S.7..o......
..^.r ^.....\.Q[(...Z.,.3....79...z^j..`u1...P."..av.B.....A.=.!...e.C
QaN}...y.;OX.q..T......"..h.....1.aHi...m.n.;-0....E.D.rs.....e..._\l.
i.E]:..{......8...W.x.. ....L..._}q.&....f{...T...........9.....C4...Y
k......rEE.W....U._'...k<g.n.e!e./E{:3Ee...r..j.Bv0Rr.A`....2..e...
6..C.=...<?p>...wW...)......N.]k*y..7.O....q..g..........#......
.....K..R.v..*..9.B....F..uy."{r.....,..R..n9....6.P.........l.ls..Cw.
.....3F..F..S.tR'?...6......H.'..q.W...{....."...n..g}.}.:..z..IB.....
,Y&L..6: I.y{.........~86..F.X...V...b7.%x.5._.T....@.....f).=.Re3(...
.......P.g'....a.LY..3....L.`.i.,..26......8.5......0w0w....|y....'../
.P ....sOl...^.....C..O.....;.....$a.=a.k..M..7o3..Y.=.h..O.V.5.....I.
B..........'?.I..b.V=5.s..cF.1^.. q..l..R#5...-.G...M.....b~....].FgP.
Ifq&.....l....D ....x...@.4.m....{.|......s.H8%N.?....'.T...u.l0.4...M
V....h..s.>...]..o.p6..C.bI.....N.......'0.66!........*.U.;a#..e';.
../n.......-C.9......M4k!.PZ..sH..yF....V..a`....<..].D.....|.I

<<< skipped >>>

GET /edgedl/release2/9liqmqrgqfa7ez02glv729167mt3kbx8m7ksxfuuazw7up69ddgu8ol2axd13ipv75z76n27nysxd400sfjvpanesqdmeqaa7ho/54.0.2840.71_54.0.2840.59_chrome_updater.exe?cms_redirect=yes&expire=1477651236&ip=194.242.96.218&ipbits=0&mm=28&mn=sn-2puapox-ig3l&ms=nvh&mt=1477636818&mv=m&pl=23&shardbypass=yes&sparams=expire,ip,ipbits,mm,mn,ms,mv,pl,shardbypass&signature=092925340ED87695D41054DED9F890C1204DB90A.7D8A8B629F13F3050C3324F862564D62A4FAFD59&key=cms1 HTTP/1.1

Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
If-Unmodified-Since: Thu, 20 Oct 2016 09:56:47 GMT
Range: bytes=395300-761360
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
X-GoogleUpdate-Interactivity: bg
Host: r2---sn-2puapox-ig3l.gvt1.com


HTTP/1.1 206 Partial Content
Accept-Ranges: bytes
Content-Length: 366061
Content-Type: application/octet-stream
Etag: "1013e5"
Server: downloads
Vary: *
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1; mode=block
Date: Thu, 27 Oct 2016 07:27:47 GMT
Alt-Svc: quic=":443"; ma=2592000; v="36,35,34"
Last-Modified: Thu, 20 Oct 2016 09:56:47 GMT
Content-Range: bytes 395300-761360/2377080
Connection: keep-alive
:...t.P...|.........JeN.`#...G.p.3...o..s\.J...YG.G)L..V.~.W\\.K....w.
......p<..x*4....].......;em..o..P&.....#!....E..<.a...Q2.H.J...
..jP.8.z....z...xz....YS....~........OR}.m...<.4.n>.IE....Xx....
...q....p........e..G..(W$3. ....Th.g..{....e...&.5..h.~..j.:....X...v
.hH....&=e...7F..-Dbl>)#.d.bx.x.L_|.._S.4,...C..y..*...5T.....v....
......uK.q..............[..q....M..n.o.....x.........riv..t.e;.^=Vu...
..c..23"....44...&8....Ps..........D..U...5.C;<[I.).L.Z5..._n.,.(bd
.]."..U..*}....>@.. .>/....,"!.m|}...'t. 3.^t....Et..O.J...h....
..,.6....`.>h........(q:.`P.....y.p.fuf..W|.....YR..,V.....xQ......
../...tC.ug....~j.&sC=............F....'...~D............F.^.m.nL..-..
G.[.I[..s.Eex)..`{.....v...7.../.>.-...U.o.m`...*..d_H...t."Vz(O...
...gR.!..o....t.......-.....w........F.(...Q...P.P.....z...X6-/..;...x
..Q........i.l"p0.sP.._.Y.y....dh..R..o....!&..."u...kD...V..l..h.....
.(CS.9(....O....Ed.N..f.... %./.r)......XI..(..b.j`!Xu...........V....
..F(.\..!_O...|.wz...7..i.>......V..O.. ....Z....e:(._K.X..#.l...W.
=.....x.....M3..7.;/j.o.....@Rh..x..f.R.'as)rX...V.>..E..{........2
.Sd..Z1m.>`"z~....Y 8..5.....qX4.?.d.........LHU.4.W.~h.>.......
[.o.J...4.i.$W.J...gm.r.5...R$..#..-7...3.\m,..O..W}.|..c!..xn.Ld.3...
$`.._B.Z.....;.,.r..._..E.]....n....K..5.n.'.</....Y...H~r...R...hO
Cn.....hM.SX...J{|dt.-..(1.....wuk.B...H..i..$ .D..U...g.....d..2.....
|wCo...n..EO..\.\.:........9.A.....h.)..r...p.p.q...u.O{....*.xW...n..
5..~.4?.......k....P$.F.j...F.K..../.....*.....4..:....G{......]..

<<< skipped >>>

GET /edgedl/release2/9liqmqrgqfa7ez02glv729167mt3kbx8m7ksxfuuazw7up69ddgu8ol2axd13ipv75z76n27nysxd400sfjvpanesqdmeqaa7ho/54.0.2840.71_54.0.2840.59_chrome_updater.exe?cms_redirect=yes&expire=1477651236&ip=194.242.96.218&ipbits=0&mm=28&mn=sn-2puapox-ig3l&ms=nvh&mt=1477636818&mv=m&pl=23&shardbypass=yes&sparams=expire,ip,ipbits,mm,mn,ms,mv,pl,shardbypass&signature=092925340ED87695D41054DED9F890C1204DB90A.7D8A8B629F13F3050C3324F862564D62A4FAFD59&key=cms1 HTTP/1.1

Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
If-Unmodified-Since: Thu, 20 Oct 2016 09:56:47 GMT
Range: bytes=761361-1493569
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
X-GoogleUpdate-Interactivity: bg
Host: r2---sn-2puapox-ig3l.gvt1.com


HTTP/1.1 206 Partial Content
Accept-Ranges: bytes
Content-Length: 732209
Content-Type: application/octet-stream
Etag: "1013e5"
Server: downloads
Vary: *
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1; mode=block
Date: Thu, 27 Oct 2016 07:27:47 GMT
Alt-Svc: quic=":443"; ma=2592000; v="36,35,34"
Last-Modified: Thu, 20 Oct 2016 09:56:47 GMT
Content-Range: bytes 761361-1493569/2377080
Connection: keep-alive
Xm..Dy.8.T....21..&...M....m.....I,....._......19.4.[\...B...;.e....d.
.d...& ..2.i@....I6..7.x..e|............[J.M.Z....b....O..b.h=4B...S.&
...q....... ...4g.........L]..m...B.;..b.....!.l..L..Eo..B.r..k0..f.T.
E.qo.uv.\.d.q".TV7...Z.z!.y/1....i..A......*...rr{G...Y.ybw.P...H...._
..^W.x.~LC..!....d..'...I.....T...#.MG.n..........v......0...7.f.j8.Xm
t.......d.....?...{.r#E.%`"....~.!..$%..:Lb..2.y.@..>.,.>Ue...WW
.....Zt.^4.......iLb*...i$._`...j#....e...~......2...UI....H..a...28..
...dako...'.[.W(M.Y.o.y....j..r-..N6..f..F..T...d....rz...fn.).ur..|..
!r.U2?.G..*.}...k1t..Z^..a.g>.......w{..........?.(z.3,....m....%..
.9.....lxU.B|..........M.-.....:...".sz....6....9G.........=6..o..G.t.
..v.....M..\...K.Zl.T..l.I]..e1M.n.r.,...u.....A...6(]......z ....f..3
.zi.Eq.\.3....^|.^...w.^..FD..P.L....'..G........N.......<....c4.f.
.......R.....?a.aR....s.....kb.NH.f.>.8.. z.m.,..../..I..F..H....l.
t...f... TY.:&..u.....}.R.....c.._4.O...f.U..Q.4.."x...T...$.<*FtL.
L.....a.2x.....7.`m.b...f..Us....mU.u.A...K......Np0....q'.cE...8.b...
im:.I'.\.u.`K..6...c....3Q.r....~..Oj^....Co-....;...R...0.....G.,..`T
......=tjY.F.M......r?.....J.....:...&.P..."...`P..E..B.....5u.o......
.Sh.>.@...-...v..!.O..#p8%...."...........[....&...H\. ..."..0..q.
R..RZA..N.=nz....?..Ph.....)..cU..a..}...1..n5.h...... ..vv..Z.z....Y.
.6....0NAu:"{n.Gl....y..$.T.."...s......G...&J...s....k.9...$.4..W....
..'M5(......&.w.8j.!....[5.J...9.m..(..=.4....0....L...:J..\...s....Tv
s..F.E1...?1>4q.T.!...EV....H...*cV.7.2...{.....H9.z....<.'$

<<< skipped >>>

GET /edgedl/release2/9liqmqrgqfa7ez02glv729167mt3kbx8m7ksxfuuazw7up69ddgu8ol2axd13ipv75z76n27nysxd400sfjvpanesqdmeqaa7ho/54.0.2840.71_54.0.2840.59_chrome_updater.exe?cms_redirect=yes&expire=1477651236&ip=194.242.96.218&ipbits=0&mm=28&mn=sn-2puapox-ig3l&ms=nvh&mt=1477636818&mv=m&pl=23&shardbypass=yes&sparams=expire,ip,ipbits,mm,mn,ms,mv,pl,shardbypass&signature=092925340ED87695D41054DED9F890C1204DB90A.7D8A8B629F13F3050C3324F862564D62A4FAFD59&key=cms1 HTTP/1.1

Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
If-Unmodified-Since: Thu, 20 Oct 2016 09:56:47 GMT
Range: bytes=1493570-2377079
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
X-GoogleUpdate-Interactivity: bg
Host: r2---sn-2puapox-ig3l.gvt1.com


HTTP/1.1 206 Partial Content
Accept-Ranges: bytes
Content-Length: 883510
Content-Type: application/octet-stream
Etag: "1013e5"
Server: downloads
Vary: *
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1; mode=block
Date: Thu, 27 Oct 2016 07:27:47 GMT
Alt-Svc: quic=":443"; ma=2592000; v="36,35,34"
Last-Modified: Thu, 20 Oct 2016 09:56:47 GMT
Content-Range: bytes 1493570-2377079/2377080
Connection: keep-alive
8....Y.....!......}I.r..4e.o....%x.'..}.`w.p...os...R..x..[....%@.xj%D
..T.4W4C.a&.].q=...<s...K.R.....q........Yn........9......A.......d
..O.#....m.../.........2Ox_..*;...%L...q...zFb......f]fOC.R.?.ex.3J.3B
..e....=.u........aha.c..B..r...E.... 0G..E...=..v.3.n....t.zF8......X
..).Fm[q..8......q..).K....~...W..s.cA..$K*.....#..*..n...a'....Z..(w'
...!t........x0<.....2.. ....3...:.S.is.. .!u..H.L.....I..A^...H..8
..?..A.sl.u.o....0.".............pC...;.Nk.>...3.Q.....*?...z)wlW..
e.............$.....f.......R..g...O&..zU..9%U1..`.51.W.K%U....k.q?.L.
....b........vkM/do0.%K.D..8..v#t.s........(.L.Q...4.....?......f...6.
.Kq.O...;<`e......a.....e%....|&.@.M.He.c......#)....T.F=]. |......
{r.$p..~...B...#......^..........G...@....>.M......j......9'.t....g
.e..S.....2XC.V.:N<=...4.cK..u.An.;.....8...oE... .eVK..9o$D.0..1wY
.f.........5....Vj....n..<5y.}.M(.....o.?..RN.O.GZM....o._v.gA.L..u
=I.E..2....`V..3k.._.......0H..s.btb..^6q..?<.~r....V.@o....=8MCE.N
.......F{......d..Zz!;Wg-.Y....j...B.l.)?.J..|..{3...........F..!.P..P
..K...B..r...%.j#,&.. ..!O.;{...Hux^...{Z9`......V.YWp.qG......L..={i.
..l......d.M.tl....v.k.....X....x..d.i..P.~72.B(..%J.....Wk.........l.
".;.O5`{..-..H[J.sf.?..-.H{.....$y.....5.z]..{....4...I...|.k...?e...*
.z.r....2j...4R'..;....|.%.`......{.V...1.TV-....l..n1...3..h....../..
1[W....h.d,..3.5`. ..x.!.PJ...m.2.......:.5].......t".....9M.Q.:..?...
.u..?3.Q..yMt.Q......E.........4F ........IAdb.r/.!|....A..d/32w)...C.
...p........&%../.....c..>......j0.Q*1..]|....v..i....T%..T..,.

<<< skipped >>>

HEAD /edgedl/release2/9liqmqrgqfa7ez02glv729167mt3kbx8m7ksxfuuazw7up69ddgu8ol2axd13ipv75z76n27nysxd400sfjvpanesqdmeqaa7ho/54.0.2840.71_54.0.2840.59_chrome_updater.exe HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
X-GoogleUpdate-Interactivity: bg
Host: redirector.gvt1.com


HTTP/1.1 302 Found
Date: Fri, 28 Oct 2016 06:40:36 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Location: hXXp://r2---sn-2puapox-ig3l.gvt1.com/edgedl/release2/9liqmqrgqfa7ez02glv729167mt3kbx8m7ksxfuuazw7up69ddgu8ol2axd13ipv75z76n27nysxd400sfjvpanesqdmeqaa7ho/54.0.2840.71_54.0.2840.59_chrome_updater.exe?cms_redirect=yes&expire=1477651236&ip=194.242.96.218&ipbits=0&mm=28&mn=sn-2puapox-ig3l&ms=nvh&mt=1477636818&mv=m&pl=23&shardbypass=yes&sparams=expire,ip,ipbits,mm,mn,ms,mv,pl,shardbypass&signature=092925340ED87695D41054DED9F890C1204DB90A.7D8A8B629F13F3050C3324F862564D62A4FAFD59&key=cms1
Content-Type: text/html; charset=UTF-8
Server: ClientMapServer
Content-Length: 734
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
HTTP/1.1 302 Found..Date: Fri, 28 Oct 2016 06:40:36 GMT..Pragma: no-ca
che..Expires: Fri, 01 Jan 1990 00:00:00 GMT..Cache-Control: no-cache,
must-revalidate..Location: hXXp://r2---sn-2puapox-ig3l.gvt1.com/edgedl
/release2/9liqmqrgqfa7ez02glv729167mt3kbx8m7ksxfuuazw7up69ddgu8ol2axd1
3ipv75z76n27nysxd400sfjvpanesqdmeqaa7ho/54.0.2840.71_54.0.2840.59_chro
me_updater.exe?cms_redirect=yes&expire=1477651236&ip=194.242.96.218&ip
bits=0&mm=28&mn=sn-2puapox-ig3l&ms=nvh&mt=1477636818&mv=m&pl=23&shardb
ypass=yes&sparams=expire,ip,ipbits,mm,mn,ms,mv,pl,shardbypass&signatur
e=092925340ED87695D41054DED9F890C1204DB90A.7D8A8B629F13F3050C3324F8625
64D62A4FAFD59&key=cms1..Content-Type: text/html; charset=UTF-8..Server
: ClientMapServer..Content-Length: 734..X-XSS-Protection: 1; mode=bloc
k..X-Frame-Options: SAMEORIGIN..

<<< skipped >>>

The Trojan connects to the servers at the folowing location(s):

%original file name%.exe_2268:

.text
`.rdata
@.data
.vmp0
`.vmp1
`.rsrc
t$(SSh
~%UVW
u$SShe
Bv=kAv.SCv
wininet.dll
ole32.dll
oleaut32.dll
kernel32.dll
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
{E5000198-4471-40e2-92BC-D0BA075BDBB2}
\Data\ .exe
.rsrc
^.WUh
P.Rl.
%4HS2%S\p
\\%SH
*dY%F
5@\UWSSHh
VE;.WoXI
^x`>x.ht
@.Be$>;
%C:O@V
QE;%x
,>.Ptm|t6
.bKQ~
WudP
DQW%uX
]P.jV
burU.qj1[
.QJY|
7q.vD[NqS
.IY\p,A
UDpH
#W"%c
.zor!
.tb;M0^
4%d,k
?.wk)
z0%cx=n
]/m%C
Q6.ZgT
=%X(>I'(
>_.gsJ
 $.CNH
C.kwFt
T.Aga
tW#EBk%X
.Xb?n
<.HVdr
p.Hx9
%FrG.2?
W?2,%D!s0o
G`.gr
.BMGU
.pV^uI
%d&&'
''&%$$#""!!
N^NO.Os%
_%*.*f I64
SupportedException
tMsg|
MLZ.DLL7(
?CmdT
/'.IN
.MSVCRTg
.PAVMqL
(&07-034/)7
f.DbIn
s:%dW
Eh.dE
keyw
2(%d-
0xX
.Nb~X
gz0\.Kk
zcÁ
ub%Dl*\
KERNEL32.DLL
ADVAPI32.dll
COMCTL32.dll
comdlg32.dll
GDI32.dll
OLEAUT32.dll
oledlg.dll
SHELL32.dll
USER32.dll
WINMM.dll
WINSPOOL.DRV
WS2_32.dll
RegCloseKey
ShellExecuteA
J.jS]3
n};%s
)q4(.id
y.Yc~
vv.Xu
>.iEBq
.Ux2L
u9.ND
;5sD%S
V.Ev~
Z.Ko@*
1%u4=T
3Z?xCdsQL
fH%xJ"
U.Pds,
%.X.<
Y.Yfg
#h7Y.JL|
d:W.iL)
ÅQ!?
O%U3@*
5FJ.FU(
N,Vj.Sa
4.idg8c
bbF%U
uI.mY
.lDMF
A5.La
P.rYe/G
&%sFn
.Ecg[
rV%DS
AE.Nz
X}%UNV
k7.zUU
|k.YHu
[O.zqbgd
g5Ni%C
01%Sd
(Pk.yf
0NE.Jz
>P;.JP
^"U%S
.TS.>
0`%u.
&.pB=
xh.YR
U.Sl)}
me*%F
D.wOz
%SW&H!Z>
.dYF]
ý'W<
-pRl}
 .bt>
ke%D_
0.OW8
.SsYS
;%S:a
Uc%s 
n%fO4
%x$qeJH
B\.zS
GC.Ub5
@3^.%c
<%8u;
.utV.
w$%s8
.bXeZ
(%Xv=z
7#.ce
<w.bm
&A.VMwx
%C}QN*po
.VBpooNr
C0[%d*SK
{#.LJ~M9jG=
:.Rk?i
MsW"-x}
#.Nu([
f>'.nNj
:k.MP
.zPTC<
.GR# ^
) ]R%FM
.WvftOO
w%S\s
5!.JV
U2_.tb>
N.UKbJr%'
hXXp://cgi.im.qq.com/cgi-bin/cgi_svrtime
https
Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)
http=
HTTP/1.1
Content-Type: application/x-www-form-urlencoded
hXXps://
hXXp://
hXXp://wpa.qq.com/msgrd?v=3&uin=346350253&site=qq&menu=yes
windows
dx.mouse.state.api|dx.mouse.position.lock.api
\Data\dm.dll
!!"#$%&'())?
%C%]uSj
Ha.QE
xCmD$L
s.Nd)
A_%.ID,
n.Nn0 b
.hh=@-
T8.Sz
.dTR0
.PWh=j
nL.nP?
webH
NQt%F
.XV LV#
PGPus(.Gz
.ROH=
]v%UO
uù u
0k00[ `.kh#
.scwX
?456789:;<=
!"#$%&'()* ,-./0123
CxImage 6.0.0
deflate 1.2.3 Copyright 1995-200d
a .WO<t
e processors when executed
>support g
X:
UxTheme.dll
;9HttpCli
7.PAVCExcep=^
.1.2600.441~
PSAPI.DLLU%f
%u%x-
88.185.3
20 4.49.
0.4.10n
129.6.15.29
202.120.
\.\%c
g%s#$A
"LuCBy%d
./*.bmp
log.tx
cpublic.inject.type.54
LL keypadput
k.ap*
.=.minmax
x.cfake`?
defense.szX
.sel/O
on.Leve
mp7%ss
tCPo
wKeyboardD
Scsi%d:
H%d_%
1.2.24
%ct t
: %s=
= (%d/10
gx=%f, gy
%ld, pass
xkey
'%ds=
3%u B
orm.de6
`O%dhx%dv qV
FD=%u, "
'z %4u
iY;kUnkeY
%ld%c$
-t.SSSj
MSVCRT
ntoskrnl.exQ
8)939@9|9
#&$&@'!?
9}%U}
3(Ýd
6,?-.7?`
SAPI.DLLK04e
506:6?6[
8(83888?
>,?0?4?8?<?
.net4x7
.Crz03
hÕ@e
:;.ofSb
R.of'z
B{.zS,y
6o.ob#
Ftpf
PIpE
.Sj_^
.vCb'PK
WlCmd
l%u$}0
Jy%s2;J
x-d}X
_~.SO
'.Sj?
.Increm
WinExe&Copy
.DIBi
uDPtoLPNq`n
fo@@UAE@XZ.on
ad.boa
.DD-?J8
1,//2/,/
7G#V%F
(.text
@.tp0
{43C6DBBB-BEAD-4DFB-B6D2-52C5CDB5B70A} = s 'Dm'
'Dm.EXE'
val AppID = s {43C6DBBB-BEAD-4DFB-B6D2-52C5CDB5B70A}
dm.dmsoft = s 'dm.dmsoft'
CLSID = s '{26037A0E-7CBD-4FFF-9C63-56F2D0770214}'
CurVer = s 'dm.dmsoft'
ForceRemove {26037A0E-7CBD-4FFF-9C63-56F2D0770214} = s 'dm.dmsoft'
ProgID = s 'dm.dmsoft'
stdole2.tlbWWW
~cmdWd
KeyPress
.aKeyDownWd
MKeyUpWWWd
ShowScrMsgWW
msgWd
SetShowErrorMsgW
>SGetWindowStateWW
U@SetWindowSizeWWWd
SetWindowStateWWd
iRSetKeypadDelayWWd
BkeypadWW
SetExportDictWWWd
keyWd
FindWindowSuperW
qHKeyDownCharW
pOkey_strWd
KeyUpCharWWWd
KeyPressChard
KeyPressStrWd
EnableKeypadPatchWWWd
=PEnableKeypadSyncd
EnableRealKeypadd
GetKeyStateWd
[.ReadFiled
WaitKeyW
!key_coded
joEnumWindowSuperW
urlW
=EnableKeypadMsgWd
EnableMouseMsgWWd
method KeyPressWWW
method KeyDown
method KeyUpWW
method ShowScrMsgW
method SetShowErrorMsg
method GetWindowStateW
method SetWindowSizeWW
method SetWindowStateW
method SetKeypadDelayW
method SetExportDictWW
method FindWindowSuper
method KeyDownChar
method KeyUpCharWW
method KeyPressCharWWW
method KeyPressStr
method EnableKeypadPatchWW
method EnableKeypadSyncWWW
method EnableRealKeypadWWW
method GetKeyState
method WaitKey
method EnumWindowSuper
method EnableKeypadMsg
method EnableMouseMsgW
IMM32.dll
MFC42.DLL
MSVCRT.dll
VERSION.dll
dm.dll
"\Data\dm.dll /s
hXXp://VVV.game2.cn/playGame/code/dtx
&password=
op=login&usercode=
hXXp://VVV.game2.cn/websiteAjax/
&src=pcw_wan&from=pcw_wan&charset=utf-8&requestScema=https&o=sso&m=getToken&userName=
hXXps://login.360.cn/?func=jQuery11210259506186048403_
&proxy=http://wan.360.cn/psp_jump.html&callback=QiUserJsonp615662574&func=QiUserJsonp615662574
src=pcw_wan&from=pcw_wan&charset=utf-8&requestScema=https&o=sso&m=login&lm=0&captFlag=1&rtype=data&validatelm=0&isKeepAlive=1&captchaApp=i360&userName=
hXXps://login.360.cn/
hXXp://dtx.wan.360.cn/game_login.php?channel=521260009&src=newwan-syzt1-dtx&advid=521254815__dtx__S112&server_id=S
hXXp://s1.dtx.g.1360.com/indexLogin.php?
1970-01-01 08:00:00
hXXp://passport.51wan.com/login_index_theLogin_0.html
hXXp://my.51wan.com/gamelogin_wd_serverList_dtx-2.html
-0-.html
hXXp://my.51wan.com/game_toolbar_0_dtx-
hXXp://res.dtx.game2.com.cn/index/index51wan.html?
UserLogin
hXXp://VVV.game2.cn/verifyCode.php
hXXp://passport.360.cn/captcha.php?m=create&app=i360&scene=login&userip=+7+d1+hWWDPiXFBqruKw1g==&level=default&sign=706d82&r=1472615666&_=
hXXp://passport.51wan.com/verify.php?for=login
hXXp://VVV.game2.cn/member/
&src=pcw_wan&from=pcw_wan&charset=utf-8&requestScema=http&o=sso&m=checkNeedCaptcha&account=
hXXp://login.360.cn/?callback=jQuery1121004880054023122077_
hXXp://passport.51wan.com/login_index_needToValidate_0.html?jsoncallback=jQuery182016474190838213354_
hXXp://member.8090yxs.com/login.php?action=checkuser&username=
hXXp://member.8090yxs.com/game/game.php?game=dtx&full=play_gamecode&client=pc&server=s
return Math.floor((1   Math.random()) * 65536).toString(16).substring(1)
&captcha=&autoLogin=1&client_id=1100&xd=http://wan.sogou.com/static/jump.html&token=
hXXps://account.sogou.com/web/login
hXXp://wan.sogou.com/play.do?gid=653&sid=
hXXp://wan.sogou.com/clientplay.do?sid=
hXXp://VVV.dahei.com/websiteAjax/op/login/
hXXp://VVV.dahei.com/joinGame/code/dtx
hXXp://VVV.ao7.ufojoy.com/game/dtx.phtml
form_submit_key_time
form_submit_key_v1
form_submit_key_v2
&url=/game/dtx.phtml
&form_submit_key_v2=
&form_submit_key_v1=
&act=submit&form_submit_key_time=
hXXp://VVV.ao7.ufojoy.com/user/login.phtml
VVV.ao7.ufojoy.com
hXXp://VVV.ao7.ufojoy.com/game/dtx/servers.phtml
.phtml
hXXp://VVV.ao7.ufojoy.com/server/login/
http://res.dtx.game2.com.cn/index/indexufojoy.html?
@.reloc
RSSh C
T$<RSSh C
D$<PSSh
~$)~()|$
3|$83|$0
3|$@3|$4
|$43|$(#
.QZ^&
xSSSh
FTPjKS
FtPj;S
C.PjRV
Visual C   CRT: Not enough memory to complete call to strerror.
Broken pipe
Inappropriate I/O control operation
Operation not permitted
portuguese-brazilian
operator
GetProcessWindowStation
CryptoMaterial: this object does not support precomputation
GeneratableCryptoMaterial: this object does not support key/parameter generation
: this object doesn't support resynchronization
StreamTransformation: this object doesn't support random access
<4,$?7/'
(3-!0,1'8"5.*2$
120.26.81.103
//./%s
XXXXXX
%s|%s
Empty key
[32m>>Connect select ret %d
..\t_baibaoyun\protocol\network\TSocket.cpp
[34m[%s %s %d]
[32m>>Connect field errno :%d err: %s
[32m>>ret:%d,error:%d,len:%d,err:%s
num_key
hXXp://apicom.baibaoyun.com/cloudapi/GeneralExec?arg=
[32m>>close g_sockClient %d
..\t_baibaoyun\protocol\TLogin.cpp
TLogin::clearInfo
ProcessPushMsg ret : %d
[32m>>ProcessPushMsg is in
TLogin::ProcessPushMsg
TLogin::SimpleLogin
%s TSocket::Connect err %d
TLogin::SimpleLogOut
TLogin::PushConnect
%d.%d.%d.%d
KeySize
: this object does't support a special last block
NullRNG: NullRNG should only be passed to functions that don't need to generate random bytes
: this object doesn't support multiple channels
is not a valid key length
InvertibleRSAFunction: computational error during private key operation
for this key
: this key is too short to encrypt any messages
for this public key
EffectiveKeyLength
RC2: effective key length parameter exceeds maximum
?#%X.y
E:\4.0\bbyPlugin\Release\t_baibaoyun_win32.pdb
KERNEL32.dll
IPHLPAPI.DLL
InternetOpenUrlA
WININET.dll
GetCPInfo
GetProcessHeap
t_baibaoyun_win32.dll
generatersakey
generatersakeyW
login
loginW
msgcallback_login
msgcallback_loginW
msgcallback_loginex
msgcallback_loginexW
msgcallback_push
msgcallback_pushW
.?AVPublicKeyAlgorithm@CryptoPP@@
.?AVPrivateKeyAlgorithm@CryptoPP@@
.?AVPrivateKey@CryptoPP@@
.?AV?$ASN1CryptoMaterial@VPrivateKey@CryptoPP@@@CryptoPP@@
.?AVPKCS8PrivateKey@CryptoPP@@
.?AVPublicKey@CryptoPP@@
.?AV?$ASN1CryptoMaterial@VPublicKey@CryptoPP@@@CryptoPP@@
.?AVX509PublicKey@CryptoPP@@
.?AVHexEncoder@CryptoPP@@
.PAV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@
.?AV?$SimpleKeyingInterfaceImpl@V?$TwoBases@VBlockCipher@CryptoPP@@URC6_Info@2@@CryptoPP@@V12@@CryptoPP@@
.?AV?$AlgorithmImpl@V?$SimpleKeyingInterfaceImpl@V?$TwoBases@VBlockCipher@CryptoPP@@URC6_Info@2@@CryptoPP@@V12@@CryptoPP@@V12@@CryptoPP@@
.?AV?$VariableKeyLength@$0BA@$0A@$0PP@$00$03$0A@@CryptoPP@@
.?AV?$SimpleKeyingInterfaceImpl@V?$TwoBases@VBlockCipher@CryptoPP@@URC5_Info@2@@CryptoPP@@V12@@CryptoPP@@
.?AV?$AlgorithmImpl@V?$SimpleKeyingInterfaceImpl@V?$TwoBases@VBlockCipher@CryptoPP@@URC5_Info@2@@CryptoPP@@V12@@CryptoPP@@V12@@CryptoPP@@
.?AV?$VariableKeyLength@$0BA@$00$0IA@$00$03$0A@@CryptoPP@@
.?AV?$SimpleKeyingInterfaceImpl@V?$TwoBases@VBlockCipher@CryptoPP@@URC2_Info@2@@CryptoPP@@V12@@CryptoPP@@
.?AV?$AlgorithmImpl@V?$SimpleKeyingInterfaceImpl@V?$TwoBases@VBlockCipher@CryptoPP@@URC2_Info@2@@CryptoPP@@V12@@CryptoPP@@V12@@CryptoPP@@
.?AV?$FixedKeyLength@$0BI@$03$0A@@CryptoPP@@
.?AV?$SimpleKeyingInterfaceImpl@V?$TwoBases@VBlockCipher@CryptoPP@@UDES_EDE3_Info@2@@CryptoPP@@V12@@CryptoPP@@
.?AV?$AlgorithmImpl@V?$SimpleKeyingInterfaceImpl@V?$TwoBases@VBlockCipher@CryptoPP@@UDES_EDE3_Info@2@@CryptoPP@@V12@@CryptoPP@@V12@@CryptoPP@@
.?AV?$VariableKeyLength@$0BA@$03$0DI@$00$03$0A@@CryptoPP@@
.?AV?$SimpleKeyingInterfaceImpl@V?$TwoBases@VBlockCipher@CryptoPP@@UBlowfish_Info@2@@CryptoPP@@V12@@CryptoPP@@
.?AV?$AlgorithmImpl@V?$SimpleKeyingInterfaceImpl@V?$TwoBases@VBlockCipher@CryptoPP@@UBlowfish_Info@2@@CryptoPP@@V12@@CryptoPP@@V12@@CryptoPP@@
.?AV?$VariableKeyLength@$0BA@$0BA@$0CA@$07$03$0A@@CryptoPP@@
.?AV?$SimpleKeyingInterfaceImpl@V?$TwoBases@VBlockCipher@CryptoPP@@URijndael_Info@2@@CryptoPP@@V12@@CryptoPP@@
.?AV?$AlgorithmImpl@V?$SimpleKeyingInterfaceImpl@V?$TwoBases@VBlockCipher@CryptoPP@@URijndael_Info@2@@CryptoPP@@V12@@CryptoPP@@V12@@CryptoPP@@
.?AV?$FixedKeyLength@$0BA@$03$0A@@CryptoPP@@
.?AV?$SimpleKeyingInterfaceImpl@V?$TwoBases@VBlockCipher@CryptoPP@@UTEA_Info@2@@CryptoPP@@V12@@CryptoPP@@
.?AV?$AlgorithmImpl@V?$SimpleKeyingInterfaceImpl@V?$TwoBases@VBlockCipher@CryptoPP@@UTEA_Info@2@@CryptoPP@@V12@@CryptoPP@@V12@@CryptoPP@@
.?AVSimpleKeyingInterface@CryptoPP@@
comroute.baibaoyun.com
.?AUNoChannelSupport@BufferedTransformation@CryptoPP@@
.?AVInvalidKeyLength@CryptoPP@@
.PAVRSAFunction@CryptoPP@@
.PAVInvertibleRSAFunction@CryptoPP@@
.PBVPrimeSelector@CryptoPP@@
.PB_W
.PAV?$basic_istream@DU?$char_traits@D@std@@@std@@
.PAV?$basic_ostream@DU?$char_traits@D@std@@@std@@
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
45
00x0
9&939&:6:
2%2*2/242>2
5_5K5X5a5
88K8X8a8
6$6)6.646;6
6o7U7y7
0!1)11282
6$71757?7
6$6(6.6:6
= =$=(=,=
5$5*505?5
6!6(6-6;6
<!<(<5<><\<
2 2$2(2,20242
1.0.0.0
CCmdTarget
CNotSupportedException
commctrl_DragListMsg
COMCTL32.DLL
__MSVCRT_HEAP_SELECT
user32.dll
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
RegCreateKeyExA
RegOpenKeyExA
SetWindowsHookExA
GetKeyState
UnhookWindowsHookEx
!Win32 .DLL.
.MPRESS1
.MPRESS2>
>%Crc{
f7.ST
Ah&`%xw
-Qwg}W
.Rg^5
ra(%X
-RL}tAWq
3r.DU
!A
#.jK$
.If//
i5v.dU`
wfd%C
.seH9
H7\Ûy
%dWA4
.WmO.
Q.HX)
<ij.AQ
ÜU2
.ubwO%
?.MK9
d.DHb
.jtv,
Jnx&%D
%d{u2
msgcallback_autologinW
msgcallback_autologin
shell32.dll
program internal error number is %d.
:"%s"
:"%s".
.?AVCCmdTarget@@
.PAVCException@@
.?AVCCmdUI@@
.PAVCObject@@
.PAVCSimpleException@@
.PAVCMemoryException@@
.?AVCNotSupportedException@@
.?AVCTestCmdUI@@
.exe "
repass
UserChangePass
dm.dmsoft
SetKeypadDelay
SetShowErrorMsg
SetWindowState
,(!73!73!73!73!73!73!73!73!73 @;
.comment {color:green}
.jS.T
SiX^@=65.eB
;.APi
A%x*>l
@%S&)
;%DuH
LSc
A$(d%cn
8.jPs
.jJX[
*e.NaJ
pY-|þ
.YrVUp\
diTXtXML:com.adobe.xmp
" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="hXXp://VVV.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="hXXp://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="hXXp://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="hXXp://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:9E0C3F8A626BE211ABD1D5C56F68DC7C" xmpMM:DocumentID="xmp.did:BA32D29D96DD11E28E5CF121068396E5" xmpMM:InstanceID="xmp.iid:BA32D29C96DD11E28E5CF121068396E5" xmp:CreatorTool="Adobe Photoshop CS5 Windows"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:19648B32A596E2119A57D512E7129882" stRef:documentID="xmp.did:9E0C3F8A626BE211ABD1D5C56F68DC7C"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>
~.agAV
.nn-!*
.tkyt
G:\^(
.RhcD
o.vH|
?h(%do
=7%f__
SOCrt
htu%d
=VR^.uzL
%fPa4<O
" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="hXXp://VVV.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="hXXp://ns.adobe.com/xap/1.0/" xmlns:xmpMM="hXXp://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="hXXp://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS6 (Windows)" xmpMM:InstanceID="xmp.iid:07A07843552A11E5B02FFBCBFB9DF547" xmpMM:DocumentID="xmp.did:07A07844552A11E5B02FFBCBFB9DF547"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:07A07841552A11E5B02FFBCBFB9DF547" stRef:documentID="xmp.did:07A07842552A11E5B02FFBCBFB9DF547"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>
!.RNi
%x_Xj
GO#.Dx
<CrT$I
Z>%0S_
Mm.gS
(j.AKt
`8.zNx:
%cK8R
@9u[%ul
.hr''y
_h@A%s
.yqh(t
E%X[-
\`!%C[8
!%D&&
TW%U8
.mN`SH
.VX1P5
i4
X(U%Ui
.xQCO
usSh:Zq
D-o.OF
eN%6u
.LI[P
123456789
00003333
deflate 1.1.3 Copyright 1995-1998 Jean-loup Gailly
inflate 1.1.3 Copyright 1995-1998 Mark Adler
1.2.18
F%*.*f
Afx:%x:%x:%x:%x:%x
Afx:%x:%x
MSWHEEL_ROLLMSG
_Wb.eM3
iphlpapi.dll
SHLWAPI.dll
MPR.dll
WSOCK32.dll
.PAVCNotSupportedException@@
.PAVCFileException@@
(*.prn)|*.prn|
(*.*)|*.*||
Shell32.dll
Mpr.dll
Advapi32.dll
User32.dll
Gdi32.dll
Kernel32.dll
(&07-034/)7 '
?? / %d]
%d / %d]
: %d]
(*.WAV;*.MID)|*.WAV;*.MID|WAV
(*.WAV)|*.WAV|MIDI
(*.MID)|*.MID|
(*.txt)|*.txt|
(*.JPG;*.PNG;*.BMP;*.GIF;*.ICO;*.CUR)|*.JPG;*.PNG;*.BMP;*.GIF;*.ICO;*.CUR|JPG
(*.JPG)|*.JPG|PNG
(*.PNG)|*.PNG|BMP
(*.BMP)|*.BMP|GIF
(*.GIF)|*.GIF|
(*.ICO)|*.ICO|
(*.CUR)|*.CUR|
%s:%d
1.6.9
unsupported zlib version
png_read_image: unsupported transformation
out.prn
%d.%d
%d / %d
%d/%d
Bogus message code %d
libpng error: %s
libpng warning: %s
1.1.3
bad keyword
libpng does not support gamma background rgb_to_gray
Palette is NULL in indexed image
(%d-%d):
%ld%c
msscript.ocx
<tr><td bgcolor=buttonface>Y</td><td bgcolor=white>%d</td></tr>
<tr><td bgcolor=buttonface>X</td><td bgcolor=white>%d</td></tr>
<tr><td bgcolor=buttonface>Height</td><td bgcolor=white>%d</td></tr>
<tr><td bgcolor=buttonface>Width</td><td bgcolor=white>%d</td></tr>
<tr><td bgcolor=buttonface>RECT</td><td bgcolor=white>(%d, %d)-(%d, %d)</td></tr>
<tr><td bgcolor=buttonface>Styles</td><td bgcolor=white>0xX</td></tr>
<tr><td bgcolor=buttonface>Control ID</td><td bgcolor=white>%d</td></tr>
<tr><td bgcolor=buttonface>Handle</td><td bgcolor=white>0xX</td></tr>
<table><tr><td><icon handle=0x%X></td><td>%s</td></tr></table>
burlywood
\winhlp32.exe
VVV.dywt.com.cn
index.dat
desktop.ini
\StringFileInfo\%s\Comments
\StringFileInfo\%s\ProductVersion
\StringFileInfo\%s\ProductName
\StringFileInfo\%s\OriginalFilename
\StringFileInfo\%s\LegalTrademarks
\StringFileInfo\%s\LegalCopyright
\StringFileInfo\%s\InternalName
\StringFileInfo\%s\FileDescription
\StringFileInfo\%s\CompanyName
\StringFileInfo\%s\FileVersion
000%x
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
HTTP/1.0
%s <%s>
Reply-To: %s
From: %s
To: %s
Subject: %s
Date: %s
Cc: %s
%a, %d %b %Y %H:%M:%S
SMTP
;3 #>6.&
'2, / 0&7!4-)1#
(*.avi)|*.avi
WPFT532.CNV
WPFT632.CNV
EXCEL32.CNV
write32.wpc
Windows Write
mswrd632.wpc
Word for Windows 6.0
wword5.cnv
Word for Windows 5.0
mswrd832.cnv
mswrd632.cnv
Word 6.0/95 for Windows & Macintosh
html32.cnv
.PAVCResourceException@@
.PAVCUserException@@
.PAVCArchiveException@@
c:\%original file name%.exe
.gWSdtb
w=kAv.SCvs
Please contact the application's support team for more information.
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
USER32.DLL
sice.sys
siwvid.sys
ntice.sys
iceext.sys
syser.sys
sbiedll.dll
3%d-%d-%d
winhttp.dll
activation.php?code=
deactivation.php?hash=
xaK%f.
0r\%u
y}8Url
1.Xr}0
.YS:`
.sM )
K.HrW
/("T.di8T
.Npnr
*.xgd-
=f%SKf
.Ta/.\
o{%CUi
.cF2sQ2
WÄe
.bo%q
_.hL*)
.ySfN
%Xcj|
)\.YH
}.zsj
bA.vuW)RZ
eb.ge
F.VmH
Gc.RKJ
.ocx?=!
.Yu_9
k#%Dw
.vzFb
Ïfu
.oqs$
/.tFt
.KL }
.hT!~
/R.QQ
T"r"sQLC
.Iq%?
%6scA
!M%CV
5%oZ%D"85
P%SDQ
e.QM`P
.WJr}G
yZA1:&%f
MExE
a%xbO
1"g%u1
Su\B2e.Mz
 }s[#.zm
4TÛe
àUe.ed
ZExEY
.Xk1{
q.WH#4s
f%C]f
}.yht
UDpI
[.rX*$57`
%Xh*bZ
t'MZ5.MY
$.cf;
V.hY|
%F T 
uTU%X
fR%C-
Fq.rI
%1xHv}
l.zFJ
K.iHAL
=.Kw<T
[.Ip6
.wa4s
e%D%p
.mg2j
%S6r]Z
w@u%d
R.ZQ#
aH.mbR
f#.fa
Sshn@y
u%Sye
4.Fyo
f%f f
0s.Ds8
*.odB
.ao !
0O1S%
K4UDp
\pVv%D
l:\gB
vq6Q%x'5Qi
%snWY
8.Ð
7.Je2
gZf%xN
vJh<"
.EOz/6
.Ns};6
.fy_#
b?.Xf;
e.HA6
0|pT%s)R
Pk.tTP
%f*1YCT
W.kiG 
.eQO|
[7X:5%X
c:\Zj
%XRmkDC
OG>.vG
Pj{<%u
=;.qA
%U4zs
Z<w%fu
t&.zd
%fs13
fMPM.Og@
]-nC}
SHfTP
.eX.V
%\%Dt
.iFOm
.wGerW#
y}%uLr
v?F%X
)*.*!
;.9 l/Jg%F
%cz`7
U<13.Xa
.HT0U;
m%dkE
%Sph']
.PY.V
'muc.Wu
.fC*S!J
w;q.nY
 V.oS4
.YzZRm
oQ{%C
-.rcR
$0@.FP
k.fx(x
}.jN~
45%fo#r
=e>%F
%sS}ZW#d
.fc>-
%U@k]
<udP%&
B.xPtU
d[.fO
d.DE.|
%US:O
IS2%FQC
.pk]FF
I%UB0,_r
0#.aaw5
.db.~
%sSN"g
=.LyJ
HO.aP
_.fW{
%U(x;
u 9.VN
%u8Nr
%XoLH
A{%Dy
;%f~.bc
W.xN_
2;q%C
Z.ag(
,H.bD
Y.cWXM&A!3
jk.eI
V.UzK
o%sA4
0}#:su.tG1
4VE%CK
w;)vË
CrtJ^
~.NiU
\s.Oz
.CVo(
.bG77
g^4.oz
%U[=o
46f
. Fl%C
*Rs%S
~.drL`FGJ
i.Zp:
1s.%f%
Oyy.sHv<
wHh&).Pcm
X}B%F
5.Klf
58%xK
b.GTVE^\
GvW0%7s
3.Lz*
r/.LM
DTw:%S
.SJQi
.eVvc
.Fg.y
HrM.Jx
T..Hv
.yz]S
hhK%x
=5'.gn
.GHg|B
=UuRl;B
&%Dv`
,V%x`
;z`%U
.Qz. nn
Zz%F\j
X.HPk)
iQ.fS
Z%C\@-
u7<.vB
RQ%fJU
6.lT,R2
;.nnD
^T.us
H-M
Bdy%f%
%F `[
f.Scm
1O$#.FJ(
.qGUV
GmHOy.ui
[Hm%sc
;.ci,
.qid`'
1.WKJL
ZI#.enB*
t=%fN
Z9{I%F
.vry=!\B
.vr@:
wEBT9oO
.xkH_/
l^.Ba
urLb?
L6.inXh
kUdp
Ufr].sW
%fyEmfb^
@sp~%c
%cw# 
@H,.Ki
v4,H.nsT=
YN.wc
key4,
]2ÿ4
MSg."
%X~$_C
rmSG*9
N/G^w%Cn
N.eq=
<l;B%s
S%xmT@
(|y.JRqMS
.nW:CI
.Hl[}
'.Oz3
L%x(H
}`xG".sE
.xWH&r
D%D:u
w).OD
n)f%D
N\.Nz
STr%US]X&
h%uIEO
Vn.cMro"
Meb
PLme.fD
{r.aPo
U-%dTT
.vh|R8
.FV!]
Mo .Wk
"lH@.aX
c<\wEB
b.LAs
r#.eO0d
òf/w
9.Qw_1
x%S?n
Oy.kOb
9.Bq[
w .aj
.LNewz5R
dfTpH
.yNct
?0SQl
^%dH]
.AJgM
{QU&%C
P.pL.A
HLb.BR
G.
.pPVL
0n%sFx3N0
R<I]
4.FW|
%S5H2
TJ.Cn@
0_%Um&
Ru.vF
,g%u |aY
E3BSqLW
%xsJ9w
.REuN
AVIFIL32.dll
=~9M%S
p.Tc~
AiU5%uR
%s~dU
v.Wr?tR<
OM%U@l7
hmÖ
;5%sFSZ
.Ju2$uL
.MDQL
LC.AS
vA.fa9~ge
bkEY@
ZMn%U
.JG;C
b.xON
FiÌ
I%.Hc
pv%7ucC[IV
.ûZ
u.vs'
.WMHk
@%UeB
.DvOt';mA[
c%f~y
C.wfA5
 XJS9{.mC=
ZCü
6%Xi6
urly
.SYh`p
%dMQR/s
.WfG`
x.rTO
.yIOo
y#.eR
xi.iE
%6s6"M
-7}?^
""%s 
.Iep0
 ?.Lj
i.QlL
%A-9g}
Fa-L}
tqp.yze
%FnyK_&2
z#%DR
.sI|u
.kse/
!Q.jG
R.WYc
pB.nCf5
kT8,`ps%f
..wYv
o#.%f
Ekv-T
h2EW%Dm
SC.NJ
,}.lM
z.Yrn
8].yR
6.jZ{
qkP*-b}
=%U%3w
E.YB~|
Q.eW4
|.HJ,H4
OkD%s
KG%s3
 m.QZ
u99.wF
.BS'A
%C'0'n
%sBqW
%fgG'
CØa
:.vN8
/L.cY)
`.kaZ
p\6%U_
.loMX
C_].HzX
J.JB=?KC
w<.qzN
.OJNNG
33}
_o,.gQ_w!
.TkX2
'*[.aQ
,h]q%c
z3%Xt
|:&%d
EG.vzf
-fd}/
,/%fyf
DAÜ<
v).zY#
8U.uy
id%s{=
d}%F>c&
&f.pA
n%st|
~.bgQ
rO.Naz
%u?XF"
X`.zP
5Y2.wD
=.Qfo
9-.AoD7\
]%.SR
z;S:.sR*
(E.Qi&sBqF
.aAeB
d..sp
"|.wh
.Wehe
W.gp_
~.SO#gLZyz
'A.qO
.tQJ:
Qcc0.Ds?
%xOtw
ÒBC
.Co7\
Z.Vl>e
-8}[*
B2%xE:
5%u!Ob<
v %fk
@%xTo7IM 
.BVy}
.WZhM
tx9.txM
L.ol4
4Jb.wI
Pm.wE
Q^Js%C
o.hsMah`
JF*6.qo
cP`Ù
Keyv
m.ufw<
.kA"e
.egj2
.QkQ y6
cFTP
Z:\6!
cS.jE
.iFi]
%u<1A=
)#%U=
!G.etF
wcrT
n.fWF
.iie=
0il&?.nW
.dl-O
J.GI$
.Iv*4
9S<\oKO
.-rmXw}d
%uX~#p{h
.pJdl_
Ê?"y
&.rZD
.sk~e
~X.XO
.mtu"
a&i%cy
*L%SD
j/{.JcV
uDP\>
dD|.dpQ
.Zc{~
Bq%X{4
yP.lxzA
Jw.mD
kf)%s
%fLuF
{-Û
m0.vBO
7V.Sf,-
zexe
.md@8ae
.Gw )
.cc/O
!>] ]\]:
\}%xb
9p%ulh
%DGBWF
^WO%X
.hA[N
[%XKj
{%S|I
.TG0n
jmsg
'2.yu<
.Lz7hP
-%f{L
.EB'T]
p.OEN
%SL/qc)te
d0%X1
5xK%c
!.bt6M$
0 %uP
%d:I2q
o'%Se
.uf\m
.YBL8
-N}#_
Niru.fVL6
.qoKXXLa R>
C%fSo
_G.my
q!`W]niq}-f}/
S.fG<
NT.WO
|Rag
%@/)}]25
8%x)>
:.yi:
4b.Uy
m.PHg=
%uUQis
gOT.gx
/.mdeOB$6
w@n@/.cG2
}O.tg
.lB(o|
N.aI4'
%Dp 9
1CRt3\
A|4URl
HTUDP
W.iiJ
.NXoj
>9I%X
Lss.gh
dß|
%s4xe
.pnP4 
iDq1b.jM
).GRBsQJ .
4.Cj==
%XPof
`T.cl
.mGsn
Z.lrC*86W
p`.TB
{.McZ3
EX.oC
C^.QN
.VkKJ[=?
il.Dr
N.cOE
L4ZS%F
-L.dUeb
9.Ww0
k.Uf-S<Fb
&X.jj
FQ.PJ'>l
.gGK~
%FY3$
9d%4uW
Z>a.bgL
.FKG0
Zc.CK
.UJ%k
K\.QP`
.Hp~e
[%.jE
L.Zo`K
.vXbR}k
 %sOT8]
=.ejg
C3x(%Dg
%XKSc
$GL.Tw4
G.rY4d
uRLoW
Fzlgo%U
.WIfX
c]B%C
h(.EI
m>.WDU
h.did|
On%1X
.pqvU
2y.Am
.z.FY
z_.SaS
t].eX}
.qT},i
}BL.Ebu
v*;.LS
V$<p.yH
SsHK@
Kr\.RW
%S^I&
A7_T.nf
sV<.eX
.^.Mm
S.Ua'm'
U.It 
InternetCanonicalizeUrlA
o .yR
LhXXp://pki-crl.symauth.com/ca_219679623e6b4fa507d638cbeba72ecb/LatestCRL.crl07
hXXp://pki-ocsp.symauth.com0
ehXXp://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.crl0
h.lUh
RWTSAPI32.dll
5%FR*
.ZTD@w1
MSVFW32.dll
Udpo
xH`
7.bD $l
.LwvE=
qzq%u
RKERNEL32.dll
RGDI32.dll
RASAPI32.dll
3.uQ)m
n.tFtX
Dh==e.Ht
3, 1233, 0, 0
mscoree.dll
nKERNEL32.DLL
WUSER32.DLL
%s_tmp
errcode : %d,
1.0.0.2
Error at hooking API "%S"
Dumping first %d bytes:
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Cannot %s server %s
Error: 0x%X
The procedure entry point %s could not be located in the module %s
Cannot load file %s
Error: %d

WMIADAP.EXE_1812:

.text
`.data
.rsrc
@.reloc
ADVAPI32.dll
ntdll.DLL
KERNEL32.dll
USER32.dll
msvcrt.dll
wbemcomn.dll
OLEAUT32.dll
ole32.dll
loadperf.dll
FEw.AEw]FEw
`.bik
PSSSSSSh
WMIADAP.exe
?CloseSubKey@CRegistry@@AAEXXZ
?CreateOpen@CRegistry@@QAEJPAUHKEY__@@PBGPAGKKPAU_SECURITY_ATTRIBUTES@@PAK@Z
?DeleteCurrentKeyValue@CRegistry@@QAEKPAUHKEY__@@PBG@Z
?DeleteCurrentKeyValue@CRegistry@@QAEKPBG@Z
?DeleteKey@CRegistry@@QAEJPAVCHString@@@Z
?GetCurrentBinaryKeyValue@CRegistry@@QAEKPAUHKEY__@@PBGPAEPAK@Z
?GetCurrentBinaryKeyValue@CRegistry@@QAEKPBGAAVCHString@@@Z
?GetCurrentBinaryKeyValue@CRegistry@@QAEKPBGPAEPAK@Z
?GetCurrentKeyValue@CRegistry@@QAEKPAUHKEY__@@PBGAAK@Z
?GetCurrentKeyValue@CRegistry@@QAEKPAUHKEY__@@PBGAAVCHString@@@Z
?GetCurrentKeyValue@CRegistry@@QAEKPAUHKEY__@@PBGAAVCHStringArray@@@Z
?GetCurrentKeyValue@CRegistry@@QAEKPBGAAK@Z
?GetCurrentKeyValue@CRegistry@@QAEKPBGAAVCHString@@@Z
?GetCurrentKeyValue@CRegistry@@QAEKPBGAAVCHStringArray@@@Z
?GetCurrentRawKeyValue@CRegistry@@AAEKPAUHKEY__@@PBGPAXPAK3@Z
?GetCurrentRawSubKeyValue@CRegistry@@AAEKPBGPAXPAK2@Z
?GetCurrentSubKeyCount@CRegistry@@QAEKXZ
?GetCurrentSubKeyName@CRegistry@@QAEKAAVCHString@@@Z
?GetCurrentSubKeyPath@CRegistry@@QAEKAAVCHString@@@Z
?GetCurrentSubKeyValue@CRegistry@@QAEKPBGAAK@Z
?GetCurrentSubKeyValue@CRegistry@@QAEKPBGAAVCHString@@@Z
?GetCurrentSubKeyValue@CRegistry@@QAEKPBGPAXPAK@Z
?GetLongestSubKeySize@CRegistry@@QAEKXZ
?GethKey@CRegistry@@QAEPAUHKEY__@@XZ
?LocateKeyByNameOrValueName@CRegistrySearch@@QAEHPAUHKEY__@@PBG1PAPBGKAAVCHString@@3@Z
?NextSubKey@CRegistry@@QAEKXZ
?Open@CRegistry@@QAEJPAUHKEY__@@PBGK@Z
?OpenAndEnumerateSubKeys@CRegistry@@QAEJPAUHKEY__@@PBGK@Z
?OpenLocalMachineKeyAndReadValue@CRegistry@@QAEJPBG0AAVCHString@@@Z
?OpenSubKey@CRegistry@@AAEKXZ
?RewindSubKeys@CRegistry@@QAEXXZ
?SearchAndBuildList@CRegistrySearch@@QAEHVCHString@@AAVCHPtrArray@@00HPAUHKEY__@@@Z
?SetCurrentKeyValue@CRegistry@@QAEKPAUHKEY__@@PBGAAK@Z
?SetCurrentKeyValue@CRegistry@@QAEKPAUHKEY__@@PBGAAVCHString@@@Z
?SetCurrentKeyValue@CRegistry@@QAEKPAUHKEY__@@PBGAAVCHStringArray@@@Z
?SetCurrentKeyValue@CRegistry@@QAEKPBGAAK@Z
?SetCurrentKeyValue@CRegistry@@QAEKPBGAAVCHString@@@Z
?SetCurrentKeyValue@CRegistry@@QAEKPBGAAVCHStringArray@@@Z
?SetCurrentKeyValueExpand@CRegistry@@QAEKPAUHKEY__@@PBGAAVCHString@@@Z
?myRegCreateKeyEx@CRegistry@@AAEJPAUHKEY__@@PBGKPAGKKQAU_SECURITY_ATTRIBUTES@@PAPAU2@PAK@Z
?myRegDeleteKey@CRegistry@@AAEJPAUHKEY__@@PBG@Z
?myRegDeleteValue@CRegistry@@AAEJPAUHKEY__@@PBG@Z
?myRegEnumKey@CRegistry@@AAEJPAUHKEY__@@KPAGK@Z
?myRegEnumValue@CRegistry@@AAEJPAUHKEY__@@KPAGPAK22PAE2@Z
?myRegOpenKeyEx@CRegistry@@AAEJPAUHKEY__@@PBGKKPAPAU2@@Z
?myRegQueryInfoKey@CRegistry@@AAEJPAUHKEY__@@PAGPAK22222222PAU_FILETIME@@@Z
?myRegQueryValueEx@CRegistry@@AAEJPAUHKEY__@@PBGPAK2PAE2@Z
?myRegSetValueEx@CRegistry@@AAEJPAUHKEY__@@PBGKKPBEK@Z
QSSh0
Invalid parameter passed to C runtime function.
ntdll.dll
RegCloseKey
RegOpenKeyExW
RegCreateKeyExW
RegEnumKeyW
RegDeleteKeyW
RegQueryInfoKeyW
_amsg_exit
_acmdln
?Report@CEventLog@@QAEHGKVCInsertionString@@000000000@Z
WMIADAP.pdb
<assemblyIdentity version="1.0.0.0"
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
5m6z6
%s_x
%s_x_
Global\WMI_SysEvent_Semaphore_%d
WinMSGWMIADAP
\\.\root\cimv2
WMIADAP Msg window
\\.\root\wmi
PSAPI.DLL
x=%s
Describes all the counters supported via WMI Hi-Performance providers
_new.ini
xx %s%s.ini
xx %s
\\.\ROOT\cimv2:__ClassProviderRegistration.provider="\\\\.\\root\\cimv2:__Win32Provider.Name=\"WmiPerfClass\""
WmiApRes.dll
%s\%s
6.1.7600.16385 (win7_rtm.090713-1255)
wmicookr.dll
Windows
Operating System
6.1.7600.16385

SearchProtocolHost.exe_2528:

.text
`.data
.rsrc
@.reloc
ADVAPI32.dll
ntdll.DLL
KERNEL32.dll
msvcrt.dll
USER32.dll
ole32.dll
OLEAUT32.dll
TQUERY.DLL
MSSHooks.dll
IMM32.dll
SHLWAPI.dll
SrchCollatorCatalogInfo
SrchDSSLogin
SrchDSSPortManager
SrchPHHttp
SrchIndexerQuery
SrchIndexerProperties
SrchIndexerPlugin
SrchIndexerClient
SrchIndexerSchema
Msidle.dll
Failed to get REGKEY_FLTRDMN_MS_TO_IDLE, using default
pfps->psProperty.ulKind is LPWSTR but psProperty.lpwstr is NULL or empty
d:\win7sp1_gdr\enduser\mssearch2\common\utils\crchash.cxx
d:\win7sp1_gdr\enduser\mssearch2\search\search\gather\fltrdmn\fltrdaemon.cxx
d:\win7sp1_gdr\enduser\mssearch2\search\common\include\secutil.hxx
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\tracerhelpers.h
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\mutex.cpp
d:\win7sp1_gdr\enduser\mssearch2\common\include\srchxcpt.hxx
RegDeleteKeyW
RegDeleteKeyExW
8%uiP
Invalid parameter passed to C runtime function.
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\tracersecutil.h
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\tracmain.cpp
-d-d-d-d-d-d-d-%d
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\tracmain.h
</MSG></TRC>
<MSG>
<ERR> 0xx=
<LOC> %s(%d) </LOC>
tid="0x%x"
pid="0x%x"
tagname="%s"
tagid="0x%x"
el="0x%x"
time="d/d/d d:d:d.d"
logname="%s"
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\sysimprs.cxx
SHELL32.dll
PROPSYS.dll
ntdll.dll
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegEnumKeyExW
ReportEventW
_amsg_exit
MsgWaitForMultipleObjects
SearchProtocolHost.pdb
2 2(20282|2
4%5S5
Software\Microsoft\Windows Search
https
kernel32.dll
msTracer.dll
msfte.dll
lX-X-X-XX-XXXXXX
SOFTWARE\Microsoft\Windows Search
tquery.dll
%s\%s
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_PERFORMANCE_DATA
HKEY_DYN_DATA
HKEY_CURRENT_CONFIG
Windows Search Service
<Exception><HR>0xx</HR><eip>%p</eip><module>%S</module><line>%d</line></Exception>
advapi32.dll
WAPI-MS-Win-Core-LocalRegistry-L1-1-0.dll
winhttp.dll
Software\Microsoft\Windows Search\Tracing
Software\Microsoft\Windows Search\Tracing\EventThrottleLastReported
Software\Microsoft\Windows Search\Tracing\EventThrottleState
<MSG>
<LOC> %S(%d) </LOC>
tagname="%S"
logname="%S"
Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11CF-8B85-00AA005B4383}
.\%s.mui
.\%s\%s.mui
%s\%s.mui
%s\%s\%s.mui
Microsoft Windows Search Protocol Host
7.00.7601.17610 (win7sp1_gdr.110503-1502)
SearchProtocolHost.exe
Windows
7.00.7601.17610

SearchFilterHost.exe_2176:

.text
`.data
.rsrc
@.reloc
ADVAPI32.dll
ntdll.DLL
KERNEL32.dll
msvcrt.dll
USER32.dll
ole32.dll
OLEAUT32.dll
TQUERY.DLL
IMM32.dll
MSSHooks.dll
mscoree.dll
SHLWAPI.dll
d:\win7sp1_gdr\enduser\mssearch2\search\search\gather\fltrhost\bufstm.cxx
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\mutex.cpp
RegDeleteKeyW
RegDeleteKeyExW
8%uiP
d:\win7sp1_gdr\enduser\mssearch2\common\include\srchxcpt.hxx
Invalid parameter passed to C runtime function.
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\tracersecutil.h
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\tracmain.cpp
-d-d-d-d-d-d-d-%d
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\tracmain.h
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\sysimprs.cxx
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegEnumKeyExW
ReportEventW
_amsg_exit
SearchFilterHost.pdb
version="5.1.0.0"
name="Microsoft.Windows.Search.MSSFH"
<requestedExecutionLevel
3 3(30383|3
kernel32.dll
Software\Microsoft\Windows Search
SOFTWARE\Microsoft\Windows Search
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_PERFORMANCE_DATA
HKEY_DYN_DATA
HKEY_CURRENT_CONFIG
Windows Search Service
tquery.dll
advapi32.dll
API-MS-Win-Core-LocalRegistry-L1-1-0.dll
<Exception><HR>0xx</HR><eip>%p</eip><module>%S</module><line>%d</line></Exception>
Software\Microsoft\Windows Search\Tracing
Software\Microsoft\Windows Search\Tracing\EventThrottleLastReported
Software\Microsoft\Windows Search\Tracing\EventThrottleState
<MSG>
<ERR> 0xx=
<LOC> %S(%d) </LOC>
tid="0x%x"
pid="0x%x"
tagname="%S"
tagid="0x%x"
el="0x%x"
time="d/d/d d:d:d.d"
logname="%S"
</MSG></TRC>
Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11CF-8B85-00AA005B4383}
.\%s.mui
.\%s\%s.mui
%s\%s.mui
%s\%s\%s.mui
%s\%s
winhttp.dll
Microsoft Windows Search Filter Host
7.00.7601.17610 (win7sp1_gdr.110503-1502)
SearchFilterHost.exe
Windows
7.00.7601.17610


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    GoogleUpdate.exe:2880
    GoogleUpdate.exe:3900
    %original file name%.exe:2268
    54.0.2840.71_54.0.2840.59_chrome_updater.exe:268
    setup.exe:2620
    setup.exe:1276
    setup.exe:1904
    regsvr32.exe:2332
    regsvr32.exe:2472
    regsvr32.exe:2336
    regsvr32.exe:2456
    regsvr32.exe:2424
    regsvr32.exe:2304
    regsvr32.exe:2436
    regsvr32.exe:2412
    regsvr32.exe:2400
    regsvr32.exe:2416
    regsvr32.exe:2372

  2. Delete the original Trojan file.
  3. Delete or disinfect the following files created/modified by the Trojan:

    %Program Files%\Google\Update\Download\{4DC8B4CA-1BDA-483E-B5FA-D3C12E15B62D}\54.0.2840.71\54.0.2840.71_54.0.2840.59_chrome_updater.exe (16158 bytes)
    %Program Files%\Google\Update\Install\{4BE97E2F-B4A3-41A5-8B1D-EB58A7D5FCB4}\54.0.2840.71_54.0.2840.59_chrome_updater.exe (16304 bytes)
    C:\Data\dm.dll (9053 bytes)
    C:\Windows\Temp\CR_869F3.tmp\setup.exe (49 bytes)
    C:\Windows\Temp\CR_869F3.tmp\SETUP_PATCH.PACKED.7Z (3 bytes)
    C:\Windows\Temp\CR_869F3.tmp\CHROME_PATCH.PACKED.7Z (2 bytes)
    C:\Windows\Temp\Crashpad\settings.dat (84 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\chrome_100_percent.pak (1160 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\hr.pak (618 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\ta.pak (1539 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\VisualElements\smalllogocanary.png (15 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\th.pak (1294 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\chrome.VisualElementsManifest.xml (411 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\default_apps\gmail.crx (48 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\default_apps\youtube.crx (47 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\el.pak (1169 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\es-419.pak (651 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\tr.pak (645 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\hi.pak (1333 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\ru.pak (1029 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\da.pak (596 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\cs.pak (662 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\chrome.exe (1846 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\ko.pak (659 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\de.pak (570 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\id.pak (586 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\pl.pak (652 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\chrome.dll (41963 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\54.0.2840.71.manifest (254 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\sv.pak (597 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\WidevineCdm\manifest.json (954 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\chrome.7z (279369 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\es.pak (660 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\ms.pak (504 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\wow_helper.exe (160 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\nb.pak (588 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\en-GB.pak (539 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\chrome_child.dll (53736 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\ro.pak (666 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\it.pak (636 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\hu.pak (692 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\pt-PT.pak (645 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\nl.pak (629 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\vi.pak (741 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\natives_blob.bin (702 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\WidevineCdm\_platform_specific\win_x86\widevinecdm.dll (54 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\fil.pak (667 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\uk.pak (1023 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\sr.pak (995 bytes)
    C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Google Chrome.lnk (6 bytes)
    %Program Files%\Google\Chrome\Application\54.0.2840.71\Installer\chrmstp.exe (24778 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\te.pak (1438 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\pt-BR.pak (636 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\icudtl.dat (59 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\chrome_patch.diff (52 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\fake-bidi.pak (808 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\ar.pak (891 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\lt.pak (661 bytes)
    %Program Files%\Google\Chrome\Application\SetupMetrics\8DCD.tmp (14 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\d3dcompiler_47.dll (52 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\ml.pak (1669 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\ca.pak (653 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\bg.pak (1077 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\gu.pak (1294 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\ja.pak (777 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\sl.pak (613 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\kn.pak (1488 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\zh-TW.pak (538 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\nacl64.exe (54 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\libegl.dll (187 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\fi.pak (612 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\resources.pak (2572 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\sk.pak (684 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\chrome_200_percent.pak (1742 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\bn.pak (1383 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\fr.pak (700 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\mr.pak (1317 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\fa.pak (930 bytes)
    %Program Files%\Google\Chrome\Application\54.0.2840.71\Installer\setup.exe (24778 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\am.pak (905 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\VisualElements\smalllogo.png (15 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\WidevineCdm\_platform_specific\win_x86\widevinecdmadapter.dll (441 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\default_apps\docs.crx (12 bytes)
    C:\Users\Public\Desktop\Google Chrome.lnk (6 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\sw.pak (555 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\VisualElements\logo.png (37 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\snapshot_blob.bin (1375 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\chrome_watcher.dll (963 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\default_apps\external_extensions.json (5 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\et.pak (576 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\VisualElements\logocanary.png (46 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\zh-CN.pak (537 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\libglesv2.dll (50 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\chrome_elf.dll (758 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Extensions\external_extensions.json (103 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\he.pak (760 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\nacl_irt_x86_32.nexe (52 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\default_apps\drive.crx (53 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\en-US.pak (539 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\Locales\lv.pak (667 bytes)
    %Program Files%\Google\Chrome\Temp\source1276_23576\Chrome-bin\54.0.2840.71\nacl_irt_x86_64.nexe (53 bytes)
    %Program Files%\Google\Chrome\Application\chrome.exe (21970 bytes)
    C:\Windows\Temp\scoped_dir1904_31361\setup_patch.diff (6 bytes)

  4. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  5. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

Average: 2 (1 vote)

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now