Trojan.NSIS.StartPage_5dacb36aaa
Trojan.Win32.Vobfus.aswk (Kaspersky), Artemis!6FF386BD2408 (McAfee), Trojan.Win32.Vobfus (Ikarus), Trojan.NSIS.StartPage.FD, Trojan.Win32.Swrort.3.FD, GenericInjector.YR (Lavasoft MAS)
Behaviour: Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 5dacb36aaaf6f99154625853a9381a64
SHA1: 4438f2d2859acc45041544329a463078cefcd113
SHA256: cd3bb7913c2f57f0f332e7dc9f7f2edbefe8688b3b2d11823f6ab9a85f6651fe
SSDeep: 49152:46S835UrdMFUNxPMkUKqVZN50HEFh6ZJ 0JHSgYGYGz4oz676Ur6:Fr dMFUNx9s9/UlfYGYG1uvr6
Size: 2829514 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: Uniblue Systems Limited
Created at: 2007-05-05 15:23:36
Analyzed on: Windows7 SP1 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
%original file name%.exe:2444
The Trojan injects its code into the following process(es):
s2exe.exe:3768
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process %original file name%.exe:2444 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsi3E87.tmp (96116 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\scratch\s2exe.exe (31373 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ÂìÒõ¼º½.sb (784 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\scratch\open.fnr (71670 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsd3E67.tmp (0 bytes)
The process s2exe.exe:3768 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6 (1302 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\30EV4AVE\crossdomain[1].htm (178 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Tar817F.tmp (2712 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6 (471 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Cab816F.tmp (51 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GPS1JHSL\lang_list[1].txt (1977 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Tar817F.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Cab816F.tmp (0 bytes)
Registry activity
The process s2exe.exe:3768 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Tracing\s2exe_RASAPI32]
"EnableFileTracing" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\00-50-56-e1-da-d8]
"WpadDecision" = "3"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
"UNCAsIntranet" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad]
"WpadLastNetwork" = "{24C5EDBC-2851-452A-B521-5DA992F6C1B5}"
[HKLM\SOFTWARE\Microsoft\Tracing\s2exe_RASAPI32]
"FileDirectory" = "%windir%\tracing"
[HKCU\Software\Classes\Local Settings\MuiCache\2F\52C64B7E]
"LanguageList" = "en-US, en"
[HKLM\SOFTWARE\Microsoft\Tracing\s2exe_RASMANCS]
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Tracing\s2exe_RASAPI32]
"EnableConsoleTracing" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{24C5EDBC-2851-452A-B521-5DA992F6C1B5}]
"WpadDecision" = "3"
"WpadDecisionTime" = "A0 2E B5 8F 68 B4 D2 01"
[HKLM\SOFTWARE\Microsoft\Tracing\s2exe_RASMANCS]
"EnableConsoleTracing" = "0"
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\s2exe_RASAPI32]
"ConsoleTracingMask" = "4294901760"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\00-50-56-e1-da-d8]
"WpadDecisionReason" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\s2exe_RASMANCS]
"ConsoleTracingMask" = "4294901760"
"FileDirectory" = "%windir%\tracing"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "46 00 00 00 36 00 00 00 09 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Tracing\s2exe_RASAPI32]
"MaxFileSize" = "1048576"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{24C5EDBC-2851-452A-B521-5DA992F6C1B5}]
"WpadNetworkName" = "Network 2"
"WpadDecisionReason" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"DefaultConnectionSettings" = "46 00 00 00 09 00 00 00 09 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Tracing\s2exe_RASAPI32]
"FileTracingMask" = "4294901760"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\00-50-56-e1-da-d8]
"WpadDecisionTime" = "A0 2E B5 8F 68 B4 D2 01"
[HKLM\SOFTWARE\Microsoft\Tracing\s2exe_RASMANCS]
"FileTracingMask" = "4294901760"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyServer"
"ProxyOverride"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
Dropped PE files
| MD5 | File path |
|---|---|
| 6ff386bd2408b55841b9a6508a5f283c | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\scratch\s2exe.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 22948 | 23040 | 4.47592 | 27548a140ee5871e901b5081d2ea223c |
| .rdata | 28672 | 4474 | 4608 | 3.58713 | 69c5211e1a88679cc11fd273667a51c9 |
| .data | 36864 | 110552 | 1024 | 3.45044 | 7e7f788f7322d235e21ca51dab874511 |
| .ndata | 147456 | 32768 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| .rsrc | 180224 | 11200 | 11264 | 1.97377 | 499ab3e3464bd66af2c29340e31b6499 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://b.sni.global.fastly.net/scratchr2/static/locale/lang_list.txt | |
| hxxp://cs9.wac.phicdn.net/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh/sBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o+tuynXIiEOLckvPvJE= | |
| app.getsentry.com | |
| cdn.scratch.mit.edu | |
| dns.msftncsi.com | |
| sentry.io | |
| ocsp.digicert.com | |
| teredo.ipv6.microsoft.com |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET /scratchr2/static/locale/lang_list.txt HTTP/1.1
Accept: */*
Accept-Language: en-US
x-flash-version: 23,0,0,185
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0E; .NET4.0C)
Host: cdn.scratch.mit.edu
Connection: Keep-Alive
HTTP/1.1 200 OK
Content-Type: text/plain
Last-Modified: Tue, 20 Dec 2016 17:18:05 GMT
ETag: W/"585967cd-47f"
Expires: Thu, 31 Dec 2037 23:55:55 GMT
Cache-Control: max-age=315360000
Access-Control-Allow-Origin: *
Content-Encoding: gzip
Server: Scratch Web Server
Via: 1.1 varnish-v4
Via: 1.1 varnish
Fastly-Debug-Digest: 07587f68aefde9c4233441a5eb99ee5b23053d49c5198952df3e2f150fa7959b
Content-Length: 919
Accept-Ranges: bytes
Date: Thu, 13 Apr 2017 15:13:52 GMT
Via: 1.1 varnish
Age: 2031676
Connection: keep-alive
X-Served-By: cache-iad2150-IAD, cache-hhn1525-HHN
X-Cache: MISS, HIT, HIT
X-Cache-Hits: 0, 1, 1
X-Timer: S1492096433.955468,VS0,VE0
Vary: Accept-Encoding..........MSQO.G.~._..0....4".U...ok.r...=.{kd..$M...F!.H(.b.B...4..x8
x..une0..ZD.....=.J.J3.|....7Kr.|..Z........Db...a......?..."..$n(....
.....dDh`....(..%.PP....?.....!G1y..&...-u.t...E.A..|....W....<..$"
<^....Y.."..x..HB]p.. B.0IF.....C.....{P...9,.i&..$...p......y.i...
s.iu.;.@....3e..8...$"...4 .N..j...'...x^....4~..I......a.&....D.K.&..
..\.o....8s...........K..n....^.{..Jo.W=-......x.z.<{zZ;[.~.l.<.
..2.#SY7.9S..TK.I.T.H.|.3..b_in.Q..)N.....o..Z.lc...e.....4...z.:S.3..
i.AN.8.E"..p.x..KZ...|..Z:.6p..I...^HQ.....<...F..N....,%5 .n.L....
...;...!.h...Y7..L..4..y...... .....R3.CSYN..'6I.i.DZ....s..3.o.sI..".
J....Ai~P.......W... 8NP.."9..&x.P.\..s...F.,/.o......... r8.J.gFC?...
....E.z.3../........C.zh....*Lq.<..,S.E2...7..Fr..DfT..8e2....a....
. 5&..o.8...*.Y"....f.{l...Y...8.K.P|.......J.....?.0....*`..q9"..V1;.
L.nv...`-.........\............#.$...I?^......}...]Hu.....f....?.K....
...|.8..i..z.................<<< skipped >>>
GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh/sBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o+tuynXIiEOLckvPvJE= HTTP/1.1
Cache-Control: max-age = 518191
Connection: Keep-Alive
Accept: */*
If-Modified-Since: Thu, 13 Oct 2016 06:43:19 GMT
If-None-Match: "57ff2d07-1d7"
User-Agent: Microsoft-CryptoAPI/6.1
Host: ocsp.digicert.com
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: public, max-age=172800
Content-Type: application/ocsp-response
Date: Thu, 13 Apr 2017 15:13:53 GMT
Etag: "58ef6e45-1d7"
Expires: Thu, 20 Apr 2017 03:13:53 GMT
Last-Modified: Thu, 13 Apr 2017 12:25:41 GMT
Server: ECS (fcn/4196)
X-Cache: HIT
Content-Length: 4710..........0..... .....0......0...0........P5V.L.f........=.U..2017041
2220000Z0s0q0I0... .........Q..2...}Q......b.U.....P5V.L.f........=.U.
.....n.u..C.rK.......20170412220000Z....20170419220000Z0...*.H........
......2F...C$f.c.I..n........;{.h....Yk...2.....\v...}...]q~~.....k...
M.....L...e%......8.e9.......... .a..@.....o....^.y_Y...#u.f..Q<...
.c....#.1.>8.q.mXf.`.ZC..jXv..:........6-.8.6...; ..H..FF.z.A.V.k3C
..u.<r7..y.o_d.X..<14!...w..^$.^.< ...<.....in.Y.....r:q6H
TTP/1.1 200 OK..Accept-Ranges: bytes..Cache-Control: public, max-age=1
72800..Content-Type: application/ocsp-response..Date: Thu, 13 Apr 2017
15:13:53 GMT..Etag: "58ef6e45-1d7"..Expires: Thu, 20 Apr 2017 03:13:5
3 GMT..Last-Modified: Thu, 13 Apr 2017 12:25:41 GMT..Server: ECS (fcn/
4196)..X-Cache: HIT..Content-Length: 471..0..........0..... .....0....
..0...0........P5V.L.f........=.U..20170412220000Z0s0q0I0... .........
Q..2...}Q......b.U.....P5V.L.f........=.U......n.u..C.rK.......2017041
2220000Z....20170419220000Z0...*.H..............2F...C$f.c.I..n.......
.;{.h....Yk...2.....\v...}...]q~~.....k...M.....L...e%......8.e9......
.... .a..@.....o....^.y_Y...#u.f..Q<....c....#.1.>8.q.mXf.`.ZC..
jXv..:........6-.8.6...; ..H..FF.z.A.V.k3C..u.<r7..y.o_d.X..<14!
...w..^$.^.< ...<.....in.Y.....r:q6..<<< skipped >>>
The Trojan connects to the servers at the folowing location(s):
.text
`.rdata
@.data
.ndata
.rsrc
t%SPV
tDSSh
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
GetWindowsDirectoryA
KERNEL32.dll
ExitWindowsEx
USER32.dll
GDI32.dll
SHFileOperationA
ShellExecuteA
SHELL32.dll
RegEnumKeyA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
ADVAPI32.dll
COMCTL32.dll
ole32.dll
VERSION.dll
%s %s
... %d%%
verifying installer: %d%%
unpacking data: %d%%
~nsu.tmp
%u.%u%s%s
RegDeleteKeyExA
%s=%s
*?|<>/":
"C:\Users\"%CurrentUserName%"\AppData\Local\Temp\scratch\s2exe.exe" C:\Users\"%CurrentUserName%"\AppData\Local\Temp\
C:\Users\"%CurrentUserName%"\AppData\Local\Temp
s2exe.exe
cmdid
enumWindows
@default.main.aau
import
win.ui
win.subclass
com.flash
_CMDLINE
msgbox
scratch\open.fnr
by hXXp://hi.baidu.com/scratch
why error?please go hXXp://hi.baidu.com/scratch
@res\main.aau
open.fnr
?http
version="5.1.0.0"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<!--The ID below indicates application support for Windows Vista -->
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/><!--The ID below indicates application support for Windows 7 -->
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><!--The ID below indicates application support for Windows 8 -->
<supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/>\AAuto\lib\winex\_.aau
EnumWindows
EnumChildWindows
-"C:\Users\"%CurrentUserName%"\AppData\Local\Temp\scratch\s2exe.exe" C:\Users\"%CurrentUserName%"\AppData\Local\Temp\
c:\%original file name%.exe
%original file name%.exe
ers\"%CurrentUserName%"\AppData\Local\Temp\nsd3E67.tmp
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.27</description><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"/></requestedPrivileges></security></trustInfo></assembly>
yz.lhuo@gmail.com
0.0.0.5
.........................exe>
scratch2exe.exe
s2exe
s2exe.exe_3768:
.text
`.rdata
@.data
.rsrc
u.ht:H
?%uYG
xSSSh
FTPjKS
FtPj;S
C.PjRV
cmd.exe
Visual C CRT: Not enough memory to complete call to strerror.
portuguese-brazilian
Broken pipe
Inappropriate I/O control operation
Operation not permitted
GetProcessWindowStation
operator
_CMDLINE
import preload;
com.each = function(obj) begin
if(type(obj)==type.function)obj=obj();
if(!com.IsObject(obj))error('try{enumerator = com.GetEnumerator(obj);}catch(e){err=e}if(err)error(err,2);var function iterator( index ) {var value = owner.Next();return ( value ? index 1 : null ) , value ;}return iterator, enumerator, 0;endThere was not enough memory to complete the operation
Windows error
Unsupported feature required
%d.%d
com.dll
Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352}Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352}Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502}Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502}Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}com.getIUnknow() QueryInterface Failed!
-mapid %d
hh.exe
ID:0x%X: %s
pointer/*com.VARIANT*/
$Spp: AAuto v6.0 Copyright (C) ecranesoft.com $
$URL: VVV.ecranesoft.com $
File %s, Line %d
ExportConstants
ExportEnumerations
ole.host
expected: ::MSG struct
com.CreateEmbed
Invalid form.hwnd!
Union type not supported!
Record type not supported!
TKIND_MODULE and TKIND_MAX not supported!
Exception (%s)
IDispatch.Pointer
invalid object(com.IDispatch)
Property putref not supported.
Property puts with more than two parameters aren't supported.
showMsg
error: error during error handler execution.
load resource(%s/%s) failed!
bad argument:@%d '%s'
calling:'%s'
bad argument:@%d
expected:%s
got:%s
file:%s
line:#%d
invalid option:'%s'
%s.%s
attempt to use a closed object: %s:#%d ( type:'%s.%s')
stack overflow (%s)
name conflict for namespace '%s'
failed:%s
error:%s
field:'%s'
thread id:%d
thread error:%s
return %s
callback : _struct error '...%s'
Cannot load library '%s'.
%s._struct not found!
Invalid _struct{%s...},Expected a field name! [in]field:%s
field:%s.%s
Invalid _struct: {...%s},Data Type Error(%c...key:%s) [out]{ %s }Invalid _struct{%s...},Expected a field name! [out]Failed to get the size of the dynamic array!field(%s)
Cannot load remote library '%s'.
Cannot find remote function '%s' in the dll.
Cannot find function '%s' in the dll.
Declare Api:'%s'
Data type error: '...%s'
Struct size has more than %d
%s %s[%d]
invalid key to 'next'
Cann't modify a %s : '%s'
attempt to:%s
kind:%s
name:'%s'
type:%s
attempt to:compare two %s values
attempt to:compare %s with %s
file:%s:
join
^$* ?.:([\-{<%invalid replacement value (a %s)
no function environment for tail call at level %d
in function '%s'
in function <%s:%d>
import-namespace conflict for global.%s
import
import ide;
importFile
import %s failed ! file not found
import %s failed !syntax error:
import %s failed :
import-namespace conflict for self.%s
%s: %p
io.FILE*
Invalid time:Invalid dayofweek(%d) outside valid range(0~6)
Invalid time:Invalid month(%d) outside valid range(1~12)
Invalid time:Invalid day(%d) outside valid range(1~31)
Invalid time:hour(%d) outside valid range(0~23)
Invalid time:minute (%d) outside valid range(0~59)
Invalid time:second(%d) outside valid range(0~59)
Invalid time:year(%d) outside valid range(1900~9999)
Invalid format directive(...%s)
thread.call() error
[%d]=
['%s']=
["%s"]=
%s'%s'
%s"%s"
%snull
%stopointer(0x%p)
io.file(closed)
io.file(%p)
standard %s file is closed
cdata( by raw.malloc() )
%s\%s
_exepath
_exedir
_exefile
char(%d)
near:...'%s'
byte:%s
$"%s"
%s: %s in precompiled chunk
expected:'%s'
main function has more than %d %s
function at line %d has more than %d %s
match for:'%s'
match line:%d
expected:keyword
%H:%M:%S
%m/%d/%y %H:%M:%S
%m/%d/%y
?#%X.y
%S#[k
KERNEL32.dll
USER32.dll
ole32.dll
SHDeleteKeyA
SHLWAPI.dll
GetProcessHeap
GetCPInfo
CreatePipe
SetViewportExtEx
SetViewportOrgEx
GDI32.dll
RegEnumKeyExA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
ADVAPI32.dll
OLEAUT32.dll
zcÁ
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\scratch\s2exe.exe
\AAuto\lib\com\flash\_.aau
fsys.localfile
util.metaProperty
com.flash.xml
ShockwaveFlash.ShockwaveFlash
\AAuto\lib\com\flash\xml.aau
string.xml
\AAuto\lib\com\picture.aau
com.picture
win.guid
win.ole
@lib\config.aau
fsys.config
\AAuto\lib\fsys\_.aau
fsys.path
SHFileOperation
SHFileOperationA
operation
fsys.shortpath()
joinpath
int hwnd;INT wFunc;string pFrom;string pTo;WORD fFlags;int fAnyOperationsAborted;pointer hNameMappings;string lpszProgressTitle
\AAuto\lib\fsys\config.aau
fsys.table
.table
\AAuto\lib\fsys\localfile.aau
\AAuto\lib\fsys\path.aau
Shlwapi.dll
[\/\:\*\?\"\<\>]
\AAuto\lib\fsys\table.aau
\AAuto\lib\gdi\_.aau
.LOGFONT
Gdi32.dll
int(ptr hdcDest,int xoriginDest,int yoriginDest,int wDest,int hDest,pointer hdcSrc,int xoriginSrc,int yoriginSrc,int wSrc,int hSrc,INT crTransparent)
ptr hdcSrc, struct ptSrc, INT crKey,struct blend, INT flags)
#X
#X
crKey
\AAuto\lib\preload\_.aau
User32.dll
Kernel32.dll
MsgWaitForMultipleObjects
EXCEPTION_FLT_DENORMAL_OPERAND
EXCEPTION_FLT_INVALID_OPERATIO
0xX
\.*(. )(%\[\])$
\.*(. )\.([^.] )$
keys
hasMsg
msgWaitForMultipleObjects
\AAuto\lib\string\xml.aau
<%s%s?>%s
<%s%s>%s</%s>%s
<%s%s/>
(.*?)<@]]>@>
^\<\!\-\-.*?\-\-\>
\AAuto\lib\util\metaProperty.aau
\AAuto\lib\win\_.aau
int(addr hwnd,INT msg,ADDR wParam,addr lParam)
int(ptr lpPrevWndFunc,addr hwnd,INT Msg,ADDR wParam,addr lParam)
addr(addr hwnd,INT msg,ADDR wParam,addr lParam)
addr(int idThread,INT msg,ADDR wParam,addr lParam)
addr(addr hwnd,INT msg,ptr wParam,ptr lParam)
addr(addr hwnd,INT msg,int &wParam,int &lParam)
addr(addr hwnd,INT msg,ptr wParam,ptr lParam,INT flags,INT timeout,int & resultult)
GetAsyncKeyState
word(int vKey)
GetKeyState
word( int vKey)
int( addr hwnd,INT uCmd)
bool(addr hwnd,int cmd)
msgbox
msgboxTest
msgboxErr
msgboxTimeout
win.invoke()
INT(int hDlg,struct IpMsgc)
UxTheme.dll
%s[TID:%d]
msg_observer
\AAuto\lib\win\guid.aau
Rpcrt4
Rpcrt4.dll
Ole32.dll
\AAuto\lib\win\ole\_.aau
Oleaut32.dll
\AAuto\lib\win\subclass.aau
int(int hwnd, int msg, int wParam, int lParam)
\AAuto\lib\win\ui\_.aau
win.ui.background
RegisterHotKey
UnregisterHotKey
int(int hwnd,int crKey,BYTE bAlpha,INT dwFlags)
.win.ui.ctrl
reghotkey
unreghotkey
cmdTranslate
_hotkeys
\AAuto\lib\win\ui\background.aau
win.ui
@Publish\release.win.ui.ctrl.aau
win.ui.ctrl.common
win.ui.ctrl.metaProperty
win.ui.ctrl.button
win.ui.ctrl
win.ui.ctrl.custom
\AAuto\lib\win\ui\ctrl\button.aau
\AAuto\lib\win\ui\ctrl\common.aau
Comctl32.dll
\AAuto\lib\win\ui\ctrl\custom.aau
\AAuto\lib\win\ui\ctrl\metaProperty.aau
\AAuto\lib\winex\_.aau
EnumWindows
EnumChildWindows
enumWindows
cmdid
@default.main.aau
win.subclass
com.flash
scratch\open.fnr
by hXXp://hi.baidu.com/scratch
why error?please go hXXp://hi.baidu.com/scratch
@res\main.aau
open.fnr
?http
version="5.1.0.0"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<!--The ID below indicates application support for Windows Vista -->
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/><!--The ID below indicates application support for Windows 7 -->
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><!--The ID below indicates application support for Windows 8 -->
<supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/>mscoree.dll
nKERNEL32.DLL
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
WUSER32.DLL
Interface: %s
COM.FLASH
COM.FLASH.XML
COM.PICTURE
FSYS.CONFIG
FSYS.LOCALFILE
FSYS.PATH
FSYS.TABLE
STRING.XML
UTIL.METAPROPERTY
WIN.GUID
WIN.OLE
WIN.SUBCLASS
WIN.UI
WIN.UI.BACKGROUND
WIN.UI.CTRL
WIN.UI.CTRL.BUTTON
WIN.UI.CTRL.COMMON
WIN.UI.CTRL.CUSTOM
WIN.UI.CTRL.METAPROPERTY
/RES/MAIN.AAU
yz.lhuo@gmail.com
0.0.0.5
.........................exe>
scratch2exe.exe
s2exe
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:2444
- Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsi3E87.tmp (96116 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\scratch\s2exe.exe (31373 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ÂìÒõ¼º½.sb (784 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\scratch\open.fnr (71670 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6 (1302 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\30EV4AVE\crossdomain[1].htm (178 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Tar817F.tmp (2712 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6 (471 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Cab816F.tmp (51 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GPS1JHSL\lang_list[1].txt (1977 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.