Trojan.Win32.FlyStudio_bc07f7302c

by malwarelabrobot on April 24th, 2016 in Malware Descriptions.

HEUR:Trojan.Win32.Generic (Kaspersky), Trojan.Win32.Delphi.FD, Trojan.Win32.FlyStudio.FD, Trojan.Win32.IEDummy.FD, Trojan.Win32.Sasfis.FD, VirTool.Win32.DelfInject.FD, TrojanFlyStudio.YR (Lavasoft MAS)
Behaviour: Trojan, VirTool


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: bc07f7302c768a875ca19d56bd384d0f
SHA1: 81b210c9b82a842de7050d131053fdf09881533d
SHA256: a8e96949caded6a1de513e02867cb9c7f5171ab3c114c2562769b991b367f69f
SSDeep: 49152:TzTt1xcITmM3ZuETn5/mUZpGacnBST1WD:vp1xcIiA5/mmgOWD
Size: 2637824 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: UPolyXv05_v6, MicrosoftVisualC, MicrosoftVisualCv50v60MFC, MicrosoftVisualC50, Armadillov171
Company: no certificate found
Created at: 2016-04-08 17:25:49
Analyzed on: WindowsXP SP3 32-bit


Summary:

Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).

Payload

No specific payload has been found.

Process activity

The Trojan creates the following process(es):

twunk_32.exe:768
%original file name%.exe:1216
net.exe:1868
DesktopLayer.exe:256
1Srv.exe:1576

The Trojan injects its code into the following process(es):

1.exe:1208
iexplore.exe:2020

Mutexes

The following mutexes were created/opened:

ESPI_GMEM_MUTEX 1.0
ZonesLockedCacheCounterMutex
ZonesCounterMutex
ZonesCacheCounterMutex
WininetProxyRegistryMutex
WininetConnectionMutex
WininetStartupMutex
c:!documents and settings!adm!local settings!history!history.ie5!
c:!documents and settings!adm!cookies!
_!MSFTHISTORY!_
c:!documents and settings!adm!local settings!temporary internet files!content.ie5!
__DDrawCheckExclMode__
DDrawWindowListMutex
__DDrawExclMode__
RasPbFile
ShimCacheMutex

File activity

The process twunk_32.exe:768 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Program Files%\Common Files\Microsoft Shared\MSInfo\svchost.exe (7385 bytes)
%Program Files%\Common Files\Microsoft Shared\MSInfo\svchost.bat (80 bytes)

The process %original file name%.exe:1216 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%System%\δ֪.dll (122 bytes)
%System%\ESPI11.dll (601 bytes)
C:\1.exe (267 bytes)
C:\twunk_32.exe (6436 bytes)

The process 1.exe:1208 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\1Srv.exe (400 bytes)
%WinDir%\XXXXXX33E92BD7\JH.BAT (2678 bytes)
%System%\33E92BD7 (7 bytes)

The process net.exe:1868 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%System%\net1.exe (2700 bytes)

The process DesktopLayer.exe:256 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Program Files%\Internet Explorer\IEXPLORE.EXE (332 bytes)

The process 1Srv.exe:1576 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Program Files%\Microsoft\DesktopLayer.exe (601 bytes)

The Trojan deletes the following file(s):

%Program Files%\Microsoft\px1.tmp (0 bytes)

Registry activity

The process twunk_32.exe:768 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A8 18 A2 65 B2 2D DA 1C 58 AD 35 08 0F 6C 98 56"

The process %original file name%.exe:1216 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"

[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"

[HKCU\Software\Microsoft\Direct3D\MostRecentApplication]
"Name" = "%original file name%.exe"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1E 00 00 00 01 00 00 00 00 00 00 00"

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "30 A2 50 32 08 E3 DF 65 D9 C1 7F AA F7 BD BD A0"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"

The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"

The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:

"ProxyBypass" = "1"

Proxy settings are disabled:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"

The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"

The Trojan deletes the following value(s) in system registry:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"

Dropped PE files

MD5 File path
9138272e0a420c62ccb967fde627b234 c:\1Srv.exe
037356955530f01591cbf09296cf3117 c:\Program Files\Common Files\Microsoft Shared\MSInfo\svchost.exe
40ea82c6b73caeb342839fa09dd30369 c:\WINDOWS\XXXXXX33E92BD7\svchsot.exe
c3adbb35a05b44bc877a895d273aa270 c:\WINDOWS\system32\ESPI11.dll
c3adbb35a05b44bc877a895d273aa270 c:\WINDOWS\system32\δ֪.dll
037356955530f01591cbf09296cf3117 c:\twunk_32.exe

HOSTS file anomalies

The Trojan modifies "%System%\drivers\etc\hosts" file which is used to translate DNS entries to IP addresses.
The modified file is 734 bytes in size. The following strings are added to the hosts file listed below:

127.0.0.1 ZieF.pl


Rootkit activity

The Trojan installs the following user-mode hooks in ntdll.dll:

NtQueryInformationProcess
ZwOpenFile
NtCreateProcessEx
NtCreateProcess
NtCreateFile

Propagation

VersionInfo

Company Name:
Product Name: ?????
Product Version: 1.0.0.0
Legal Copyright: ?????? ????????
Legal Trademarks:
Original Filename:
Internal Name:
File Version: 1.0.0.0
File Description: ?????
Comments: ??????????(http://www.eyuyan.com)
Language: English (United States)

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 4096 782122 782336 4.57612 ea06c19d5e4aa6f028e65ed5159a9fc1
.rdata 786432 1490816 1490944 4.25479 05afe6bed3dc20c23019a53d872cfdde
.data 2277376 611018 335872 4.83922 3a8c4b6ca2320f47a1b91ccc873af0c0
.rsrc 2891776 22336 24576 3.31272 bf21af48760849c5504e44c0f54d4ea1

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

URL IP
google.com 216.58.209.206
irc.zief.pl 148.81.111.121
260192.dowei8.com 119.90.136.25


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

ET TROJAN Backdoor family PCRat/Gh0st CnC traffic

Traffic

The Trojan connects to the servers at the folowing location(s):

%original file name%.exe_1216:

.text
`.rdata
@.data
.rsrc
t$(SSh
u.hTvc
~%UVW
u$SShe
kernel32.dll
ntdll.dll
IPHLPAPI.DLL
iphlpapi.dll
ws2_32.dll
EnumWindows
GetAsyncKeyState
SetTcpEntry
GetExtendedTcpTable
UnloadKeyboardLayout
GetKeyboardLayoutList
GetKeyboardLayout
ActivateKeyboardLayout
GetKeyboardLayoutNameA
RegOpenKeyA
RegDeleteKeyA
RegCloseKey
RegCreateKeyA
RegFlushKey
LoadKeyboardLayoutA
{A068799B-7551-46b9-8CA8-EEF8357AFEA4}
crossfire.exe
00260000
00790000
00190000
000000001
0000260000
0000330000
0100260000
0100340000
02002600000
0300260000
0400260000
0500260000
0600260000
0700260000
0800260000
03000000001
0000040000
00000000001
0000340000
02267964
shlwapi.dll
183.61.39.218
60.174.156.33
687474703A2F2F67616D65736166652E71712E636F6D*hXXp://gamesafe.qq.com
rez@qq.com:9921817579981
(%d, %d, %d)
(hXXp://gamesafe.qq.com)
2573A3AC2573A3AC2573A3A120202020BBF2D6D8D7B0D3CECFB7BFCDBBA7B6CB20202020C7EBBBF1C8A1D5FDC8B7CEC4BCFEBDF8D0D0CCE6BBBB*%s
Tenslx.dat
0@hXXp://58.221.64.142:14676/1.exe
C:\1.exe
\twunk_32.exe
.idata
.rdata
P.reloc
P.rsrc
Windows
MSWHEEL_ROLLMSG
MSH_WHEELSUPPORT_MSG
MSH_SCROLL_LINES_MSG
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
oleaut32.dll
EVariantBadIndexError
ssShift
htKeyword
EInvalidOperation
u%CNu
%s[%d]
%s_%d
EInvalidGraphicOperation
USER32.DLL
comctl32.dll
uxtheme.dll
%s%s%s%s%s%s%s%s%s%s
Proportional
MAPI32.DLL
OnKeyDown
OnKeyPress
OnKeyUp
THintActionD%C
IE(AL("%s",4),"AL(\"%0:s\",3)","JK(\"%1:s\",\"%0:s\")")
JumpID("","%s")
TKeyEvent
TKeyPressEvent
HelpKeyword
crSQLWait
%s (%s)
imm32.dll
AutoHotkeys
ssHotTrack
TWindowState
poProportional
TWMKey
KeyPreview
WindowState
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
vcltest3.dll
User32.dll
Password
OnExecute
svchost.exe
260192.dowei8.com
127.0.0.1
2015-08-11 13:34:54
%Program Files%\ie8\
iexplore.exe
ole32.dll
SourcePort
DestPort
UnitTCPIP
TCPIPORT
TCPIPORT4
1.2.3
<?xml version="1.0" encoding="UNICODE"?><tree2xml app="SVCHOST.exe">
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_CURRENT_CONFIG
(The key is too long to be read.)
HKEY_DYN_DATA
Microsoft\Network\Connections\pbk\rasphone.pbk
rasapi32.dll
rnaph.dll
cmd /c "
%dMB,
" WindowsPath="
" ExeShortName="
" ExeFileName="
\Software\Microsoft\Windows\CurrentVersion\uninstall
\software\microsoft\windows\currentversion\uninstall\
TRemoteShellCmdU
TtcpDDOSThread
TwebDDOSThread
HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 5.01; Windows NT 5.0; MyIE 3.01)
hXXp://
advapi32.dll
cmd /c shutdown -s -f -t 0
cmd /c shutdown -r -f -t 0
Down.exe
Set objws=WScript.CreateObject("wscript.shell")
objws.Run kavpath,,true
ctfmon.exe
Move.exe
Port
UDPSockError
TMYNMUDP
MYNMUDP
RemotePort<
LocalPort<
ReportLevelL
0.0.0.0
%d.%d.%d.%d
FilterGraph %p pid %x
D:\dat_aq\DSPACK234\src\DSPack\DSUtil.pas
($%x).
vpDoNotRenderColorKeyAndBorder
Operation
TOnDVDCMD
CmdID
OnDVDCMDStartx0I
OnDVDCMDEndL[A
OnDVDWarningFormatNotSupportedL[A
D:\dat_aq\DSPACK234\src\DSPack\DSPack.pas
FormKeyDown
Msxml2.XMLHTTP
\Program Files\Internet Explorer\iexplore.exe
Kernel32.dll
deflate 1.2.3 Copyright 1995-2005 Jean-loup Gailly
user32.dll
GetKeyboardType
RegOpenKeyExA
ReportEventA
RegQueryInfoKeyA
RegEnumKeyExA
RegCreateKeyExA
WinExec
GetWindowsDirectoryA
GetCPInfo
CreatePipe
mpr.dll
version.dll
gdi32.dll
SetViewportOrgEx
keybd_event
UnhookWindowsHookEx
SetWindowsHookExA
SetProcessWindowStation
OpenWindowStationA
MsgWaitForMultipleObjects
MapVirtualKeyA
GetProcessWindowStation
GetKeyboardState
GetKeyState
GetKeyNameTextA
EnumThreadWindows
CloseWindowStation
shell32.dll
ShellExecuteExA
ShellExecuteA
SHFileOperationA
wininet.dll
InternetOpenUrlA
URLMON.DLL
URLDownloadToFileA
wsock32.dll
avicap32.dll
imagehlp.dll
winmm.dll
ADVAPI32.DLL
DeleteUrlCacheEntry
quartz.dll
333333333333333333
33333833
3333339
3333333333333338
:*"*"$3338
3333333
33333333
33333333333
3333333333338
33338?383
333333333333
:*3:"$3338
333333333333333
KWindows
UrlMon
.ScktComp
IMYNMUDP
CMDUnit
Font.Charset
Font.Color
Font.Height
Font.Name
Font.Style
VMROptions.Mode
MediaType.data
BaseFilter.data
<requestedExecutionLevel level="requireAdministrator"/>
.inidata
@.reloc
CNotSupportedException
CCmdTarget
commctrl_DragListMsg
COMCTL32.DLL
__MSVCRT_HEAP_SELECT
KERNEL32.dll
USER32.dll
ADVAPI32.dll
WS2_32.dll
COMCTL32.dll
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
GDI32.dll
WINSPOOL.DRV
comdlg32.dll
SHELL32.dll
SWNPM.dll
.PAVCException@@
.PAVCArchiveException@@
.PAVCObject@@
.PAVCSimpleException@@
.PAVCMemoryException@@
.?AVCNotSupportedException@@
.?AVCCmdTarget@@
.?AVCCmdUI@@
.?AVCTestCmdUI@@
4"5(5,50545
8!8/878=8
3"32383|3"4
2 3=3Q3^3h3r3z3
4 41484[4}4
9$9(9,90989
<0=4=8=<=
CShell.dll
10139320
10031830
00000000
31 57 29 9
84 22 14 70 6
84 22 14 70 4
31 69 62 88 98
35 38 72 78 43
33 72 07 08 45
33 00 83 60 77
d3dx9_29.dll
BugTrap.dll
BugTrace.dll
TenSafe.exe_1
TenSafe.exe_2
TenSafe.exe_1.exe
TP3Helper.exe
Tencentdl.exe
TenSafe.exe
TASLogin.exe
TenioDL.exe
TenSafe_1.exe
TPHelper.exe
TXPlatform.exe
CrossProxy.exe
TP3Helperexe
WINMM.dll
GetProcessHeap
MSVCRT.dll
OLEAUT32.dll
cshell.dll
TenRpcs.dll
user32.DLL
d3dx9_43.dll
program internal error number is %d.
:"%s"
:"%s".
1%1-11171
\SouGoo.ime
^}•D
IMM32.dll
imehost.dll
ImeProcessKey
:):3:9:|:
= =$=(=,=0=4=8=
? ?$?(?,?
\Sougoo.ime
Super-EChXXp://ec.360bc.cnhXXp://VVV.eyybc.com/forumdisplay.php?fid=17/memcp.php/ip.asp/time.asp/gonggao.txt/ec-user6.php/ec-bd.php/ec-jh.php
hXXp://VVV.super-ec.cn
<input type="text" name="field_2new" size="25" value="" disabled class="txt" />" class="txt" />Function Getcpuid()
Set cpuSet = GetObject("winmgmts:{impersonationLevel=impersonate}").InstancesOf("Win32_Processor")
getcpuid=cpu.ProcessorId
Keyboard Layout
Keyboard Layout\Preload
keye
pz?F%F
%d&&'
123456789
00003333
deflate 1.1.3 Copyright 1995-1998 Jean-loup Gailly
inflate 1.1.3 Copyright 1995-1998 Mark Adler
vs.3.sw
vs.2.sw
ps.3.sw
ps.2.sw
Corrupt JPEG data: found marker 0xx instead of RST%d
Warning: unknown JFIF revision number %d.d
Corrupt JPEG data: %u extraneous bytes before marker 0xx
Inconsistent progression sequence for component %d coefficient %d
Unknown Adobe color transform code %d
Obtained XMS handle %u
Freed XMS handle %u
Unrecognized component IDs %d %d %d, assuming YCbCr
JFIF extension marker: RGB thumbnail image, length %u
JFIF extension marker: palette thumbnail image, length %u
JFIF extension marker: JPEG-compressed thumbnail image, length %u
Opened temporary file %s
Closed temporary file %s
Ss=%d, Se=%d, Ah=%d, Al=%d
Component %d: dc=%d ac=%d
Start Of Scan: %d components
Component %d: %dhx%dv q=%d
Start Of Frame 0xx: width=%u, height=%u, components=%d
Smoothing not supported with nonstandard sampling ratios
RST%d
At marker 0xx, recovery action %d
Selected %d colors for quantization
Quantizing to %d colors
Quantizing to %d = %d*%d*%d colors
%4u %4u %4u %4u %4u %4u %4u %4u
Unexpected marker 0xx
Miscellaneous marker 0xx, length %u
with %d x %d thumbnail image
JFIF extension marker: type 0xx, length %u
Warning: thumbnail image size does not match data length %u
JFIF APP0 marker: version %d.d, density %dx%d %d
= = = = = = = =
Obtained EMS handle %u
Freed EMS handle %u
Define Restart Interval %u
Define Quantization Table %d precision %d
Define Huffman Table 0xx
Define Arithmetic Table 0xx: 0xx
Unknown APP14 marker (not Adobe), length %u
Unknown APP0 marker (not JFIF), length %u
Adobe APP14 marker: version %d, flags 0xx 0xx, transform %d
Unsupported marker type 0xx
Failed to create temporary file %s
Unsupported JPEG process: SOF type 0xx
Cannot quantize to more than %d colors
Cannot quantize to fewer than %d colors
Cannot quantize more than %d color components
Insufficient memory (case %d)
Not a JPEG file: starts with 0xx 0xx
Quantization table 0xx was not defined
Huffman table 0xx was not defined
Backing store not supported
Cannot transcode due to multiple use of quantization table %d
Maximum supported image dimension is %u pixels
Empty JPEG image (DNL not supported)
Bogus DQT index %d
Bogus DHT index %d
Bogus DAC value 0x%x
Bogus DAC index %d
Unsupported color conversion request
Too many color components: %d, max %d
Buffer passed to JPEG library is too small
JPEG parameter struct mismatch: library thinks size is %u, caller expects %u
Improper call to JPEG library in state %d
Invalid scan script at entry %d
Invalid progressive parameters at scan script entry %d
Invalid progressive parameters Ss=%d Se=%d Ah=%d Al=%d
Unsupported JPEG data precision %d
Invalid memory pool code %d
Wrong JPEG library version: library is %d, caller expects %d
IDCT output block size %d not supported
Invalid component ID %d in SOS
Bogus message code %d
0123456789ABCDEF1.0.5
inflate 1.1.4 Copyright 1995-2002 Mark Adler
F%*.*f
Afx:%x:%x:%x:%x:%x
Afx:%x:%x
Broken pipe
Inappropriate I/O control operation
Operation not permitted
SHLWAPI.dll
MPR.dll
VERSION.dll
RASAPI32.dll
RegisterHotKey
UnregisterHotKey
GetViewportOrgEx
RegEnumKeyA
WSOCK32.dll
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetCrackUrlA
InternetCanonicalizeUrlA
WININET.dll
CreateDialogIndirectParamA
GetViewportExtEx
Shell32.dll
Mpr.dll
Advapi32.dll
Gdi32.dll
(&07-034/)7 '
?? / %d]
%d / %d]
.PAVCFileException@@
: %d]
(*.*)|*.*||
(*.WAV;*.MID)|*.WAV;*.MID|WAV
(*.WAV)|*.WAV|MIDI
(*.MID)|*.MID|
(*.txt)|*.txt|
(*.JPG;*.PNG;*.BMP;*.GIF;*.ICO;*.CUR)|*.JPG;*.PNG;*.BMP;*.GIF;*.ICO;*.CUR|JPG
(*.JPG)|*.JPG|PNG
(*.PNG)|*.PNG|BMP
(*.BMP)|*.BMP|GIF
(*.GIF)|*.GIF|
(*.ICO)|*.ICO|
(*.CUR)|*.CUR|
%s:%d
windows
.PAVCNotSupportedException@@
out.prn
(*.prn)|*.prn|
%d.%d
%d/%d
1.6.9
unsupported zlib version
png_read_image: unsupported transformation
%d / %d
libpng error: %s
libpng warning: %s
1.1.3
bad keyword
libpng does not support gamma background rgb_to_gray
Palette is NULL in indexed image
(%d-%d):
%ld%c
%s\ESPI%d.dll
hXXp://dywt.com.cn
service@dywt.com.cn
 86(0411)88995834
 86(0411)88995831
(ESPINN.dll(NN
This is a runtime library file for EPL applications. The EPL is a software development environment. For details please visit VVV.dywt.com.cn/info
CallerInfoCopyCmd
SetIPPort
GetIPPort
"C:\Windows\System32\ESPI11.dll"
ProviderInstallCopyCmd
SockDataCopyCmd
SockAddrCopyCmd
enetintercept_fnSockAddrSetIPPort
enetintercept_fnSockAddrGetIPPort
enetintercept_fnInstallCopyCmd
enetintercept_fnSockDataCopyCmd
enetintercept_fnSockAddrCopyCmd
enetintercept_fnCallerInfoCopyCmd
;3 #>6.&
'2, / 0&7!4-)1#
%d%d%d
rundll32.exe shell32.dll,
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
HTTP/1.0
%s <%s>
Reply-To: %s
From: %s
To: %s
Subject: %s
Date: %s
Cc: %s
%a, %d %b %Y %H:%M:%S
SMTP
\d3d9.dll
IndexedColor
nFaceIndexes
faceIndexes
FloatKeys
TimedFloatKeys
tfkeys
AnimationKey
keyType
nKeys
keys
nUrls
urls
?.vW@
.PAVCResourceException@@
.PAVCUserException@@
zcÁ
c:\%original file name%.exe
#include "l.chs\afxres.rc" // Standard components
7Dispatch methods do not support more than 64 parameters&Cannot change the size of a JPEG image
JPEG error #%d
No help keyword specified.
OLE error %.8x.Method '%s' not supported by automation object/Variant does not reference an automation object
(Service failed in custom message(%d): %s
Service installed successfully/Service "%s" failed to install with error: "%s" Service uninstalled successfully1Service "%s" failed to uninstall with error: "%s"
No help found for %s#No context-sensitive help installed$No topic-based help system installed
Alt  Clipboard does not support Icons
Cannot open clipboard/Menu '%s' is already being used by another form
Service failed on %s: %s
Error creating window class Cannot focus a disabled or invisible window!Control '%s' has no parent window
Thread creation error: %s
Thread Error: %s (%d)*Windows socket error: %s (%d), on API '%s'
Asynchronous socket error %d
Unsupported clipboard format
List capacity out of bounds (%d)
List count out of bounds (%d)
List index out of bounds (%d) Out of memory while expanding memory stream
Error reading %s%s%s: %s
Failed to create key %s
Failed to get data for '%s'
Failed to set data for '%s'
Resource %s not found
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
Property %s does not exist
Bits index out of range*Can't write to a read-only resource streamECheckSynchronize called from thread $%x, which is NOT the main thread
Class %s not found
A class named %s already exists%List does not allow duplicates ($0%x)#A component named %s already exists%String list does not allow duplicates
Cannot create file "%s". %s
Cannot open file "%s". %s
Invalid stream format$''%s'' is not a valid component name
Invalid data type for '%s'
Ancestor for '%s' not found
Cannot assign a %s to a %s
Interface not supported
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
Invalid variant operation%Invalid variant operation (%s%.8x)
%s5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
Operation not supported
External exception %x
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted(Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'"Variant method calls not supported
!'%s' is not a valid integer value
I/O error %d
Integer overflow Invalid floating point operation
1, 1, 0, 0
ESPI11.dll
1.0.0.0
(hXXp://VVV.dywt.com.cn)
1, 0, 0, 1
imedllhost09.ime
oU@03.BZq
! !(!!"#")""
>?:)<:>?:)<
>?:)<)>?:<<;>?:
123456789:;
0123456
!! ##%%&&$$''  (**),,,//
(){()))?,
?;<=;,;<]
(/) )-),
]:;<)>?,
(*.*)
(hXXp://VVV.eyuyan.com)

svchost.exe_596:

.idata
.rdata
P.reloc
P.rsrc
kernel32.dll
Windows
MSWHEEL_ROLLMSG
MSH_WHEELSUPPORT_MSG
MSH_SCROLL_LINES_MSG
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
oleaut32.dll
EVariantBadIndexError
ssShift
htKeyword
EInvalidOperation
u%CNu
%s[%d]
%s_%d
EInvalidGraphicOperation
USER32.DLL
comctl32.dll
uxtheme.dll
%s%s%s%s%s%s%s%s%s%s
Proportional
MAPI32.DLL
OnKeyDown
OnKeyPress
OnKeyUp
THintActionD%C
IE(AL("%s",4),"AL(\"%0:s\",3)","JK(\"%1:s\",\"%0:s\")")
JumpID("","%s")
TKeyEvent
TKeyPressEvent
HelpKeyword
crSQLWait
%s (%s)
imm32.dll
AutoHotkeys
ssHotTrack
TWindowState
poProportional
TWMKey
KeyPreview
WindowState
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
vcltest3.dll
User32.dll
Password
OnExecute
svchost.exe
260192.dowei8.com
127.0.0.1
2015-08-11 13:34:54
%Program Files%\ie8\
iexplore.exe
ole32.dll
SourcePort
DestPort
UnitTCPIP
TCPIPORT
TCPIPORT4
ws2_32.dll
iphlpapi.dll
1.2.3
<?xml version="1.0" encoding="UNICODE"?><tree2xml app="SVCHOST.exe">
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_CURRENT_CONFIG
(The key is too long to be read.)
HKEY_DYN_DATA
Microsoft\Network\Connections\pbk\rasphone.pbk
rasapi32.dll
rnaph.dll
cmd /c "
%dMB,
" WindowsPath="
" ExeShortName="
" ExeFileName="
\Software\Microsoft\Windows\CurrentVersion\uninstall
\software\microsoft\windows\currentversion\uninstall\
TRemoteShellCmdU
TtcpDDOSThread
TwebDDOSThread
HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 5.01; Windows NT 5.0; MyIE 3.01)
hXXp://
advapi32.dll
cmd /c shutdown -s -f -t 0
cmd /c shutdown -r -f -t 0
Down.exe
Set objws=WScript.CreateObject("wscript.shell")
objws.Run kavpath,,true
ctfmon.exe
Move.exe
Port
UDPSockError
TMYNMUDP
MYNMUDP
RemotePort<
LocalPort<
ReportLevelL
0.0.0.0
%d.%d.%d.%d
FilterGraph %p pid %x
D:\dat_aq\DSPACK234\src\DSPack\DSUtil.pas
($%x).
vpDoNotRenderColorKeyAndBorder
Operation
TOnDVDCMD
CmdID
OnDVDCMDStartx0I
OnDVDCMDEndL[A
OnDVDWarningFormatNotSupportedL[A
D:\dat_aq\DSPACK234\src\DSPack\DSPack.pas
FormKeyDown
Msxml2.XMLHTTP
\Program Files\Internet Explorer\iexplore.exe
ntdll.dll
Kernel32.dll
deflate 1.2.3 Copyright 1995-2005 Jean-loup Gailly
192.168.220.134
user32.dll
GetKeyboardType
RegOpenKeyExA
RegCloseKey
ReportEventA
RegQueryInfoKeyA
RegFlushKey
RegEnumKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegCreateKeyA
WinExec
GetWindowsDirectoryA
GetCPInfo
CreatePipe
mpr.dll
version.dll
gdi32.dll
SetViewportOrgEx
keybd_event
UnhookWindowsHookEx
SetWindowsHookExA
SetProcessWindowStation
OpenWindowStationA
MsgWaitForMultipleObjects
MapVirtualKeyA
LoadKeyboardLayoutA
GetProcessWindowStation
GetKeyboardState
GetKeyboardLayoutList
GetKeyboardLayout
GetKeyState
GetKeyNameTextA
GetAsyncKeyState
EnumWindows
EnumThreadWindows
CloseWindowStation
ActivateKeyboardLayout
shell32.dll
ShellExecuteExA
ShellExecuteA
SHFileOperationA
wininet.dll
InternetOpenUrlA
URLMON.DLL
URLDownloadToFileA
wsock32.dll
avicap32.dll
imagehlp.dll
winmm.dll
ADVAPI32.DLL
DeleteUrlCacheEntry
quartz.dll
333333333333333333
33333833
3333339
3333333333333338
:*"*"$3338
3333333
33333333
33333333333
3333333333338
33338?383
333333333333
:*3:"$3338
333333333333333
KWindows
UrlMon
.ScktComp
IMYNMUDP
CMDUnit
Font.Charset
Font.Color
Font.Height
Font.Name
Font.Style
VMROptions.Mode
MediaType.data
BaseFilter.data
<requestedExecutionLevel level="requireAdministrator"/>
7Dispatch methods do not support more than 64 parameters&Cannot change the size of a JPEG image
JPEG error #%d
No help keyword specified.
OLE error %.8x.Method '%s' not supported by automation object/Variant does not reference an automation object
(Service failed in custom message(%d): %s
Service installed successfully/Service "%s" failed to install with error: "%s" Service uninstalled successfully1Service "%s" failed to uninstall with error: "%s"
No help found for %s#No context-sensitive help installed$No topic-based help system installed
Alt  Clipboard does not support Icons
Cannot open clipboard/Menu '%s' is already being used by another form
Service failed on %s: %s
Error creating window class Cannot focus a disabled or invisible window!Control '%s' has no parent window
Thread creation error: %s
Thread Error: %s (%d)*Windows socket error: %s (%d), on API '%s'
Asynchronous socket error %d
Unsupported clipboard format
List capacity out of bounds (%d)
List count out of bounds (%d)
List index out of bounds (%d) Out of memory while expanding memory stream
Error reading %s%s%s: %s
Failed to create key %s
Failed to get data for '%s'
Failed to set data for '%s'
Resource %s not found
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
Property %s does not exist
Bits index out of range*Can't write to a read-only resource streamECheckSynchronize called from thread $%x, which is NOT the main thread
Class %s not found
A class named %s already exists%List does not allow duplicates ($0%x)#A component named %s already exists%String list does not allow duplicates
Cannot create file "%s". %s
Cannot open file "%s". %s
Invalid stream format$''%s'' is not a valid component name
Invalid data type for '%s'
Ancestor for '%s' not found
Cannot assign a %s to a %s
Interface not supported
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
Invalid variant operation%Invalid variant operation (%s%.8x)
%s5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
Operation not supported
External exception %x
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted(Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'"Variant method calls not supported
!'%s' is not a valid integer value
I/O error %d
Integer overflow Invalid floating point operation

1.exe_1208:

.text
`.rdata
@.data
.rsrc
@.rmnet
__MSVCRT_HEAP_SELECT
user32.dll
GetProcessHeap
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
GetCPInfo
.nsp0
.nsp1
.nsp2
KERNEL32.DLL
USER32.DLL
GDI32.DLL
ADVAPI32.DLL
SHELL32.DLL
OLE32.DLL
SHLWAPI.DLL
WININET.DLL
AVICAP32.DLL
MSVCRT.DLL
NETAPI32.DLL
URLMON.DLL
PSAPI.DLL
WINMM.DLL
WS2_32.DLL
MSVCP60.DLL
WTSAPI32.DLL
OLEAUT32.DLL
RegOpenKeyA
URLDownloadToFileA
flyboy.dll
RqFAFtpnj
&EI.cN
.QIJ{
%S#"2
G.bp`Z
=.lp`:>
g.sqv
%5us:
.sTPlYOT6;
9O.Nz
%s\SysTEM32\sysedit.exe
C:\1.exe
Srv.exe
C:\1Srv.exe
kernel32.dll
O.Cp}l
OO.sJD
AM6d%X
4ml%F
.pkrd
.DBxA
Xvi%2x
8KeysX
<requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"/></requestedPrivileges>
%s:*:enabled:@shell32.dll,-1
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Qoyirc.zief.pl
proxim.ircgalaxy.pl
NICK gvhmdwhu
SFC.DLL
SFC_OS.DLL
WSOCK32.DLL
%.6x . . :%c%.8x%x %s
JOIN
127.0.0.1 ZieF.pl
#<iframe src="hXXp://ZieF.pl/rc/" width=1 height=1 style="border:0"></iframe>
1, 0, 0, 1
106.42.73.61
2528-6142
nedwp.exe

1.exe_1208_rwx_00431000_00014000:

Srv.exe
C:\1Srv.exe
kernel32.dll
.rsrc
O.Cp}l
OO.sJD
AM6d%X
4ml%F
.pkrd
.DBxA
Xvi%2x
8KeysX
<requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"/></requestedPrivileges>
KERNEL32.DLL
SHELL32.DLL
USER32.DLL
ADVAPI32.DLL
%s:*:enabled:@shell32.dll,-1
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Qoyirc.zief.pl
proxim.ircgalaxy.pl
NICK gvhmdwhu
SFC.DLL
SFC_OS.DLL
SHLWAPI.DLL
WSOCK32.DLL
WININET.DLL
%.6x . . :%c%.8x%x %s
JOIN
127.0.0.1 ZieF.pl
#<iframe src="hXXp://ZieF.pl/rc/" width=1 height=1 style="border:0"></iframe>
106.42.73.61
2528-6142
nedwp.exe

1.exe_1208_rwx_100FA000_00026000:

KERNEL32.DLL
USER32.DLL
GDI32.DLL
ADVAPI32.DLL
SHELL32.DLL
OLE32.DLL
SHLWAPI.DLL
WININET.DLL
AVICAP32.DLL
MSVCRT.DLL
NETAPI32.DLL
URLMON.DLL
PSAPI.DLL
WINMM.DLL
WS2_32.DLL
MSVCP60.DLL
WTSAPI32.DLL
OLEAUT32.DLL
RegOpenKeyA
URLDownloadToFileA
flyboy.dll
RqFAFtpnj
&EI.cN
.QIJ{
%S#"2
G.bp`Z
=.lp`:>
g.sqv
%5us:
.sTPlYOT6;
9O.Nz
1, 0, 0, 1

iexplore.exe_2020:

%?9-*09,*19}*09
.text
.data
.rsrc
msvcrt.dll
KERNEL32.dll
NTDLL.DLL
USER32.dll
SHLWAPI.dll
SHDOCVW.dll
Software\Microsoft\Windows\CurrentVersion\Explorer\BrowseNewProcess
IE-X-X
rsabase.dll
System\CurrentControlSet\Control\Windows
dw15 -x -s %u
watson.microsoft.com
IEWatsonURL
%s -h %u
iedw.exe
Iexplore.XPExceptionFilter
jscript.DLL
mshtml.dll
mlang.dll
urlmon.dll
wininet.dll
shdocvw.DLL
browseui.DLL
comctl32.DLL
IEXPLORE.EXE
iexplore.pdb
ADVAPI32.dll
MsgWaitForMultipleObjects
IExplorer.EXE
IIIIIB(II<.Fg
7?_____ZZSSH%
)z.UUUUUUUU
,....Qym
````2```
{.QLQIIIKGKGKGKGKGKG
;33;33;0
8888880
8887080
9#4%Dpj
browseui.dll
shdocvw.dll
6.00.2900.5512 (xpsp.080413-2105)
Windows
Operating System
6.00.2900.5512

iexplore.exe_2020_rwx_00040000_00001000:

|%Program Files%\Microsoft\DesktopLayer.exe

iexplore.exe_2020_rwx_00401000_00002000:

Software\Microsoft\Windows\CurrentVersion\Explorer\BrowseNewProcess
IE-X-X
rsabase.dll
System\CurrentControlSet\Control\Windows
dw15 -x -s %u
watson.microsoft.com
IEWatsonURL
%s -h %u
iedw.exe
Iexplore.XPExceptionFilter
jscript.DLL
mshtml.dll
mlang.dll
urlmon.dll
wininet.dll
shdocvw.DLL
browseui.DLL
comctl32.DLL
IEXPLORE.EXE
iexplore.pdb
msvcrt.dll
ADVAPI32.dll
KERNEL32.dll
MsgWaitForMultipleObjects
USER32.dll
SHLWAPI.dll
SHDOCVW.dll
IExplorer.EXE
browseui.dll
shdocvw.dll

iexplore.exe_2020_rwx_20010000_00009000:

.text
.rdata
@.data
.reloc
Srv.exe
kernel32.dll


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Scan a system with an anti-rootkit tool.
  2. Terminate malicious process(es) (How to End a Process With the Task Manager):

    twunk_32.exe:768
    %original file name%.exe:1216
    net.exe:1868
    DesktopLayer.exe:256
    1Srv.exe:1576

  3. Delete the original Trojan file.
  4. Delete or disinfect the following files created/modified by the Trojan:

    %Program Files%\Common Files\Microsoft Shared\MSInfo\svchost.exe (7385 bytes)
    %Program Files%\Common Files\Microsoft Shared\MSInfo\svchost.bat (80 bytes)
    %System%\δ֪.dll (122 bytes)
    %System%\ESPI11.dll (601 bytes)
    C:\1.exe (267 bytes)
    C:\twunk_32.exe (6436 bytes)
    C:\1Srv.exe (400 bytes)
    %WinDir%\XXXXXX33E92BD7\JH.BAT (2678 bytes)
    %System%\33E92BD7 (7 bytes)
    %System%\net1.exe (2700 bytes)
    %Program Files%\Internet Explorer\IEXPLORE.EXE (332 bytes)
    %Program Files%\Microsoft\DesktopLayer.exe (601 bytes)

  5. Restore the original content of the HOSTS file (%System%\drivers\etc\hosts):
    127.0.0.1 localhost
  6. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  7. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now