Trojan.NSIS.StartPage_9225a7d045
Trojan.Win32.Generic!BT (VIPRE), RDN/Generic Downloader.x (McAfee), Trojan.Gen.2 (Symantec), SCGeneric_c.CBQQ (AVG), Win32:Malware-gen (Avast), TROJ_GEN.R02KC0EDU17 (TrendMicro), Trojan.NSIS.StartPage.FD, Trojan.Win32.Swrort.3.FD, mzpefinder_pcap_file.YR (Lavasoft MAS)
Behaviour: Trojan, Malware
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 9225a7d04595bbe9c85b66ef51077b3c
SHA1: 1208798d352faf9eaaf35f8ec2a8eb5a7e9b73bf
SHA256: a3e2ddd72846d55a5f62789ed239e9aff080532d968da4a47a8ac55c32530f05
SSDeep: 3072:LLuXzXwYyr6DoocW2Wvgx9FumylP1QRbVeaEXWh7tu:Lp6POum SboaEyRu
Size: 134141 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: MPEG STD Created
Created at: 2016-12-11 23:50:52
Analyzed on: Windows7 SP1 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
%original file name%.exe:600
BlueLinkLauncherSetup.exe:3776
The Trojan injects its code into the following process(es):
BL_Launcher.exe:2716
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process %original file name%.exe:600 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp\BDSRemoter.bmp (8 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp\Dialer.dll (7 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp\INetC.dll (46 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\CurrentVersion[1].txt (49 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp\System.dll (23 bytes)
%Program Files%\BlueLink Diagnostic Solution\Prerequisites\CurrentVersion.txt (49 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp\Client.bmp (8 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp\AdminTools.bmp (4 bytes)
%Program Files%\BlueLink Diagnostic Solution\Prerequisites\BlueLinkLauncherSetup.exe (15344 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp\HelpCenter.bmp (4 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\BlueLinkLauncherSetup[1].exe (13584 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp (4 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp\Mongoose.bmp (8 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp\BDSRemoter.bmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp\Dialer.dll (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp\INetC.dll (0 bytes)
%Program Files%\BlueLink Diagnostic Solution\Prerequisites\URL Parts Error (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp\System.dll (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp\Mongoose.bmp (0 bytes)
%Program Files%\BlueLink Diagnostic Solution\Prerequisites\0 (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp\Client.bmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp\AdminTools.bmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp\HelpCenter.bmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F8.tmp (0 bytes)
The process BL_Launcher.exe:2716 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\CurrentVersion[1].txt (49 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\INetC.dll (46 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\HelpCenter.bmp (4 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\nsDialogs.dll (21 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\Client.bmp (8 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\Dialer.dll (7 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\BDSRemoter.bmp (8 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\modern-header.bmp (20 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\Mongoose.bmp (8 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\AdminTools.bmp (4 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\Processes.dll (1801 bytes)
%Program Files%\BlueLink Diagnostic Solution\Prerequisites\CurrentVersion.txt (49 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\System.dll (23 bytes)
The Trojan deletes the following file(s):
%Program Files%\BlueLink Diagnostic Solution\Prerequisites\0 (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\CurrentVersion[1].txt (0 bytes)
%Program Files%\BlueLink Diagnostic Solution\Prerequisites\CurrentVersion.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C6.tmp (0 bytes)
The process BlueLinkLauncherSetup.exe:3776 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\Public\Desktop\BlueLink Launcher.lnk (1 bytes)
%Program Files%\BlueLink Diagnostic Solution\Prerequisites\BlueLinkLauncherSetup_Uninstall.exe (1867 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsd81C.tmp\System.dll (23 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsd81C.tmp\UserInfo.dll (8 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsd81C.tmp\Processes.dll (1801 bytes)
%Program Files%\BlueLink Diagnostic Solution\Prerequisites\BL_Launcher.exe (3355 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsd81C.tmp\Processes.dll (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsd81C.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsd81C.tmp\UserInfo.dll (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsd81C.tmp\System.dll (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsn80B.tmp (0 bytes)
Registry activity
The process %original file name%.exe:600 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Tracing\9225a7d04595bbe9c85b66ef51077b3c_RASMANCS]
"FileDirectory" = "%windir%\tracing"
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\9225a7d04595bbe9c85b66ef51077b3c_RASAPI32]
"ConsoleTracingMask" = "4294901760"
"EnableConsoleTracing" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\9225a7d04595bbe9c85b66ef51077b3c_RASMANCS]
"MaxFileSize" = "1048576"
"EnableConsoleTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\9225a7d04595bbe9c85b66ef51077b3c_RASAPI32]
"FileDirectory" = "%windir%\tracing"
[HKLM\SOFTWARE\Microsoft\Tracing\9225a7d04595bbe9c85b66ef51077b3c_RASMANCS]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\9225a7d04595bbe9c85b66ef51077b3c_RASAPI32]
"EnableFileTracing" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "46 00 00 00 3E 00 00 00 09 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Tracing\9225a7d04595bbe9c85b66ef51077b3c_RASMANCS]
"ConsoleTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\9225a7d04595bbe9c85b66ef51077b3c_RASAPI32]
"FileTracingMask" = "4294901760"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\9225a7d04595bbe9c85b66ef51077b3c_RASAPI32]
"MaxFileSize" = "1048576"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyOverride"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyServer"
"AutoConfigURL"
The process BL_Launcher.exe:2716 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Tracing\BL_Launcher_RASMANCS]
"EnableConsoleTracing" = "0"
"FileDirectory" = "%windir%\tracing"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\BL_Launcher_RASAPI32]
"FileTracingMask" = "4294901760"
"ConsoleTracingMask" = "4294901760"
"FileDirectory" = "%windir%\tracing"
[HKLM\SOFTWARE\Microsoft\Tracing\BL_Launcher_RASMANCS]
"ConsoleTracingMask" = "4294901760"
"EnableFileTracing" = "0"
"FileTracingMask" = "4294901760"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "46 00 00 00 3F 00 00 00 09 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Tracing\BL_Launcher_RASAPI32]
"EnableConsoleTracing" = "0"
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\BL_Launcher_RASMANCS]
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Tracing\BL_Launcher_RASAPI32]
"MaxFileSize" = "1048576"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyOverride"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyServer"
"AutoConfigURL"
The process BlueLinkLauncherSetup.exe:3776 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Launcher]
"NoModify" = "1"
[HKCU\Software\BlueLinkDiagnosticSolution\Launcher]
"Mode" = "BLUELINK"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Launcher]
"UninstallString" = "%Program Files%\BlueLink Diagnostic Solution\Prerequisites\BlueLinkLauncherSetup_Uninstall.exe"
"InstallLocation" = "%Program Files%\BlueLink Diagnostic Solution\Prerequisites"
[HKCU\Software\BlueLinkDiagnosticSolution\Launcher]
"(Default)" = "%Program Files%\BlueLink Diagnostic Solution\Prerequisites"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Launcher]
"NoRepair" = "1"
"HelpLink" = "http://www.bluelinkdiag.com"
"HelpTelephone" = "(919) 226-1377"
"Publisher" = "BlueLink Diagnostic Solutions, Inc."
"DisplayName" = "BlueLink Diagnostic Solutions - Launcher"
[HKCU\Software\BlueLinkDiagnosticSolution\Launcher]
"Version" = "1.63"
Dropped PE files
| MD5 | File path |
|---|---|
| 90b1555161911884fd2b152cda86d2cd | c:\Program Files\BlueLink Diagnostic Solution\Prerequisites\BL_Launcher.exe |
| f2e63cb3f823184c13b871061e4f5bc4 | c:\Program Files\BlueLink Diagnostic Solution\Prerequisites\BlueLinkLauncherSetup.exe |
| e169611af892b0a39c30f23bd5d3f217 | c:\Program Files\BlueLink Diagnostic Solution\Prerequisites\BlueLinkLauncherSetup_Uninstall.exe |
| f2e63cb3f823184c13b871061e4f5bc4 | c:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\BlueLinkLauncherSetup[1].exe |
| 524704d4b1aa595eb3533bb372ffad94 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\Dialer.dll |
| 92ec4dd8c0ddd8c4305ae1684ab65fb0 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\INetC.dll |
| 138869ba3c86d7546f8c24e424dcd114 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\Processes.dll |
| 3f176d1ee13b0d7d6bd92e1c7a0b9bae | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\System.dll |
| b3070cf20db659fdfb3cb2ed38130e8d | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\nsDialogs.dll |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 24689 | 25088 | 4.45995 | 86ec2a2da0012903b23e33f511180572 |
| .rdata | 32768 | 4946 | 5120 | 3.63022 | cd090b7c5bd9ae3da2a43d4f02ef98b7 |
| .data | 40960 | 152824 | 1536 | 2.79841 | e98382d1559cdefaafaf45200fe1faf0 |
| .ndata | 196608 | 106496 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| .rsrc | 303104 | 25544 | 25600 | 3.12273 | 3c9e332ab4ebb5760cc447d5a4278693 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://diaghelp.com/currentversion.aspx?EMAIL= | |
| hxxp://www.bluelinkdiag.com/downloads/BlueLinkLauncherSetup.exe | |
| hxxp://www.diaghelp.com/currentversion.aspx?EMAIL= |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET POLICY User-Agent (NSIS_Inetc (Mozilla)) - Sometimes used by hostile installers
ET POLICY PE EXE or DLL Windows file download HTTP
Traffic
GET /currentversion.aspx?EMAIL= HTTP/1.1
User-Agent: NSIS_Inetc (Mozilla)
Host: VVV.diaghelp.com
Connection: Keep-Alive
Cache-Control: no-cache
HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 49
Content-Type: text/plain
Server: Microsoft-IIS/7.5
Content-Disposition: attachment; filename=CurrentVersion.txt
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
X-Powered-By: ASP.NETARR001
Date: Sun, 18 Jun 2017 10:38:58 GMT...1.63 1.27 2.88 1.70 1.13 1.05 30992 000HTTP/1.1 200 OK..Cach
e-Control: private..Content-Length: 49..Content-Type: text/plain..Serv
er: Microsoft-IIS/7.5..Content-Disposition: attachment; filename=Curre
ntVersion.txt..X-AspNet-Version: 4.0.30319..X-Powered-By: ASP.NET..X-P
owered-By: ASP.NETARR001..Date: Sun, 18 Jun 2017 10:38:58 GMT.....1.63
1.27 2.88 1.70 1.13 1.05 30992 000..
GET /downloads/BlueLinkLauncherSetup.exe HTTP/1.1
User-Agent: NSIS_Inetc (Mozilla)
Host: VVV.bluelinkdiag.com
Connection: Keep-Alive
Cache-Control: no-cache
HTTP/1.1 200 OK
Content-Type: application/octet-stream
Last-Modified: Thu, 08 Jun 2017 16:34:58 GMT
Accept-Ranges: bytes
ETag: "ea6d272b75e0d21:0"
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Sun, 18 Jun 2017 10:39:00 GMT
Content-Length: 223917MZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$.........(...F...F.
..F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F...................
......PE..L...<.MX.................b...|.......1............@......
.................................@.................................4..
.........`i...........................................................
................................................text...q`.......b.....
............. ..`.rdata..R............f..............@..@.data....T...
........z..............@....ndata...................................rs
rc...`i.......j..................@..@.................................
......................................................................
......................................................................
......................................................................
......................................................................
...............................................U....\.}..t .}.F.E.u..H
......B..H.P.u..u..u.....@..B...SV.5..B..E.WP.u.....@..e...E..E.P.u...
..@..}..e....\.@........FR..VV..U... M.......M....3.....FQ.....NU..M..
........VT..U.....FP..E...............E.P.M...d.@..E...E.P.E.P.u.....@
..u....E..9}...w....~X.te.v4..T.@....E.tU.}.j.W.E......E.......P.@..vX
W..X.@..u..5L.@.W...E..E.h ...Pj.h..B.W....@..u.W...u....E.P.u...l.@._
^3.[.....L$..(.B...Si.....VW.T.....tO.q.3.;5,.B.sB..i......D.......t.G
.....t...O..t .....u...3....3...F.....;5,.B.r._^[...U..QQ.U.SV..i.<<< skipped >>>
The Trojan connects to the servers at the folowing location(s):
.text
`.rdata
@.data
.ndata
.rsrc
Vj%SSS
uDSSh
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
GetWindowsDirectoryA
KERNEL32.dll
ExitWindowsEx
USER32.dll
GDI32.dll
SHFileOperationA
ShellExecuteA
SHELL32.dll
RegEnumKeyA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
ADVAPI32.dll
COMCTL32.dll
ole32.dll
verifying installer: %d%%
hXXp://nsis.sf.net/NSIS_Error
... %d%%
%u.%u%s%s
RegDeleteKeyExA
%s=%s
*?|<>/":
%s%s.dll
ers\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\nsDialogs.dll
urrentVersion.txt
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\nsDialogs.dll
es\CurrentVersion.txt
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp
e Names\SQL
GetProcessWindowStation
PSAPI.DLL
GetCPInfo
Processes.dll
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
ft.XG/
i.Vr:
%Program Files%\BlueLink Diagnostic Solution\Prerequisites\CurrentVersion.txt
CurrentVersion.txt
CURREN~1.TXT
equisites\CurrentVersion.txt
"%Program Files%\BlueLink Diagnostic Solution\Prerequisites\BL_Launcher.exe"
%Program Files%\BlueLink Diagnostic Solution\Prerequisites
BL_Launcher.exe
ers\"%CurrentUserName%"\AppData\Local\Temp\nss8C6.tmp
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\
%Program Files%\BlueLink Diagnostic Solution\Prerequisites\BL_Launcher.exe
1460274665
1048712
1245574
1311204
1180186
1114658
-33224496
2228830
1311316
1311288
.Cdononnnoooooooooooooooooooooonnnnnnnn&
.dnnnoooooooooonnnnnnonU
.coZ'%&&&%%%%% oooooo
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="*" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v3.01</description><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="*" publicKeyToken="6595b64144ccf1df" language="*" /></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="requireAdministrator" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"/><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/></application></compatibility></assembly>- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
WUSER32.DLL
NSIS Plug-in for Windows process management. Only WinNT, Win2K, WinXP and Win2003 Server supported.
Windows Processes Management
1, 0, 0, 1
KERNEL32.DLL
mscoree.dll
BL_Launcher.exe_2716_rwx_10004000_00001000:
callback%d
SearchProtocolHost.exe_2764:
.text
`.data
.rsrc
@.reloc
ADVAPI32.dll
ntdll.DLL
KERNEL32.dll
msvcrt.dll
USER32.dll
ole32.dll
OLEAUT32.dll
TQUERY.DLL
MSSHooks.dll
IMM32.dll
SHLWAPI.dll
SrchCollatorCatalogInfo
SrchDSSLogin
SrchDSSPortManager
SrchPHHttp
SrchIndexerQuery
SrchIndexerProperties
SrchIndexerPlugin
SrchIndexerClient
SrchIndexerSchema
Msidle.dll
Failed to get REGKEY_FLTRDMN_MS_TO_IDLE, using default
pfps->psProperty.ulKind is LPWSTR but psProperty.lpwstr is NULL or empty
d:\win7sp1_gdr\enduser\mssearch2\common\utils\crchash.cxx
d:\win7sp1_gdr\enduser\mssearch2\search\search\gather\fltrdmn\fltrdaemon.cxx
d:\win7sp1_gdr\enduser\mssearch2\search\common\include\secutil.hxx
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\tracerhelpers.h
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\mutex.cpp
d:\win7sp1_gdr\enduser\mssearch2\common\include\srchxcpt.hxx
RegDeleteKeyW
RegDeleteKeyExW
8%uiP
Invalid parameter passed to C runtime function.
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\tracersecutil.h
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\tracmain.cpp
-d-d-d-d-d-d-d-%d
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\tracmain.h
</MSG></TRC>
<MSG>
<ERR> 0xx=
<LOC> %s(%d) </LOC>
tid="0x%x"
pid="0x%x"
tagname="%s"
tagid="0x%x"
el="0x%x"
time="d/d/d d:d:d.d"
logname="%s"
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\sysimprs.cxx
SHELL32.dll
PROPSYS.dll
ntdll.dll
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegEnumKeyExW
ReportEventW
_amsg_exit
MsgWaitForMultipleObjects
SearchProtocolHost.pdb
2 2(20282|2
4%5S5
Software\Microsoft\Windows Search
https
kernel32.dll
msTracer.dll
msfte.dll
lX-X-X-XX-XXXXXX
SOFTWARE\Microsoft\Windows Search
tquery.dll
%s\%s
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_PERFORMANCE_DATA
HKEY_DYN_DATA
HKEY_CURRENT_CONFIG
Windows Search Service
<Exception><HR>0xx</HR><eip>%p</eip><module>%S</module><line>%d</line></Exception>
advapi32.dll
WAPI-MS-Win-Core-LocalRegistry-L1-1-0.dll
winhttp.dll
Software\Microsoft\Windows Search\Tracing
Software\Microsoft\Windows Search\Tracing\EventThrottleLastReported
Software\Microsoft\Windows Search\Tracing\EventThrottleState
<MSG>
<LOC> %S(%d) </LOC>
tagname="%S"
logname="%S"
Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11CF-8B85-00AA005B4383}.\%s.mui
.\%s\%s.mui
%s\%s.mui
%s\%s\%s.mui
Microsoft Windows Search Protocol Host
7.00.7601.17610 (win7sp1_gdr.110503-1502)
SearchProtocolHost.exe
Windows
7.00.7601.17610
SearchFilterHost.exe_2496:
.text
`.data
.rsrc
@.reloc
ADVAPI32.dll
ntdll.DLL
KERNEL32.dll
msvcrt.dll
USER32.dll
ole32.dll
OLEAUT32.dll
TQUERY.DLL
IMM32.dll
MSSHooks.dll
mscoree.dll
SHLWAPI.dll
d:\win7sp1_gdr\enduser\mssearch2\search\search\gather\fltrhost\bufstm.cxx
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\mutex.cpp
RegDeleteKeyW
RegDeleteKeyExW
8%uiP
d:\win7sp1_gdr\enduser\mssearch2\common\include\srchxcpt.hxx
Invalid parameter passed to C runtime function.
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\tracersecutil.h
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\tracmain.cpp
-d-d-d-d-d-d-d-%d
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\tracmain.h
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\sysimprs.cxx
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegEnumKeyExW
ReportEventW
_amsg_exit
SearchFilterHost.pdb
version="5.1.0.0"
name="Microsoft.Windows.Search.MSSFH"
<requestedExecutionLevel
3 3(30383|3
kernel32.dll
Software\Microsoft\Windows Search
SOFTWARE\Microsoft\Windows Search
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_PERFORMANCE_DATA
HKEY_DYN_DATA
HKEY_CURRENT_CONFIG
Windows Search Service
tquery.dll
advapi32.dll
API-MS-Win-Core-LocalRegistry-L1-1-0.dll
<Exception><HR>0xx</HR><eip>%p</eip><module>%S</module><line>%d</line></Exception>
Software\Microsoft\Windows Search\Tracing
Software\Microsoft\Windows Search\Tracing\EventThrottleLastReported
Software\Microsoft\Windows Search\Tracing\EventThrottleState
<MSG>
<ERR> 0xx=
<LOC> %S(%d) </LOC>
tid="0x%x"
pid="0x%x"
tagname="%S"
tagid="0x%x"
el="0x%x"
time="d/d/d d:d:d.d"
logname="%S"
</MSG></TRC>
Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11CF-8B85-00AA005B4383}.\%s.mui
.\%s\%s.mui
%s\%s.mui
%s\%s\%s.mui
%s\%s
winhttp.dll
Microsoft Windows Search Filter Host
7.00.7601.17610 (win7sp1_gdr.110503-1502)
SearchFilterHost.exe
Windows
7.00.7601.17610
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:600
BlueLinkLauncherSetup.exe:3776 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp\BDSRemoter.bmp (8 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp\Dialer.dll (7 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp\INetC.dll (46 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\CurrentVersion[1].txt (49 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp\System.dll (23 bytes)
%Program Files%\BlueLink Diagnostic Solution\Prerequisites\CurrentVersion.txt (49 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp\Client.bmp (8 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp\AdminTools.bmp (4 bytes)
%Program Files%\BlueLink Diagnostic Solution\Prerequisites\BlueLinkLauncherSetup.exe (15344 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp\HelpCenter.bmp (4 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\BlueLinkLauncherSetup[1].exe (13584 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nssF4F9.tmp\Mongoose.bmp (8 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\CurrentVersion[1].txt (49 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\INetC.dll (46 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\HelpCenter.bmp (4 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\nsDialogs.dll (21 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\Client.bmp (8 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\Dialer.dll (7 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\BDSRemoter.bmp (8 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\modern-header.bmp (20 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\Mongoose.bmp (8 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\AdminTools.bmp (4 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\Processes.dll (1801 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss8C7.tmp\System.dll (23 bytes)
C:\Users\Public\Desktop\BlueLink Launcher.lnk (1 bytes)
%Program Files%\BlueLink Diagnostic Solution\Prerequisites\BlueLinkLauncherSetup_Uninstall.exe (1867 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsd81C.tmp\System.dll (23 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsd81C.tmp\UserInfo.dll (8 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsd81C.tmp\Processes.dll (1801 bytes)
%Program Files%\BlueLink Diagnostic Solution\Prerequisites\BL_Launcher.exe (3355 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.