Win32.Expiro.Gen.4_2828f32fc2
Trojan.Win32.Vilsel.cysh (Kaspersky), Win32.Expiro.Gen.4 (B) (Emsisoft), Win32.Expiro.Gen.4 (AdAware), mzpefinder_pcap_file.YR, VirusExpiro.YR (Lavasoft MAS)
Behaviour: Trojan, Virus
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 2828f32fc2536f67a6fea9bde01871f1
SHA1: 7584900b0cf2e9cefc1881463bbbd6fc64230993
SHA256: c5534fd606bdb99dbd1b6a09d62793f4a029448102b787b8be3014cdbc49e6f9
SSDeep: 12288:Rq7b1Etk1Hc0yjBvFNJ00kbmoEBTeo60ui z4jYE:M7b1Etk187Klbm3BT9zS4j
Size: 480768 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: StdLib
Created at: 2016-01-04 06:09:53
Analyzed on: Windows7 SP1 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
WerFault.exe:3096
FlashPlayerUpdateService.exe:1924
FlashPlayerUpdateService.exe:1996
wermgr.exe:3164
msdtc.exe:2180
FlashPlayerInstaller.exe:3992
The Trojan injects its code into the following process(es):
dllhost.exe:1956
%original file name%.exe:3684
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process WerFault.exe:3096 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_infocard.exe_8962182c5b835ed2d312d75a1aa433a1c364fa4_cab_0c0da8ad\WERA814.tmp.mdmp (15278 bytes)
C:\Windows\Temp\WERA814.tmp.mdmp (271144 bytes)
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_infocard.exe_8962182c5b835ed2d312d75a1aa433a1c364fa4_cab_0c0da8ad\WER9F79.tmp.appcompat.txt (31 bytes)
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_infocard.exe_8962182c5b835ed2d312d75a1aa433a1c364fa4_cab_0c0da8ad\WER9FB9.tmp.WERInternalMetadata.xml (3 bytes)
C:\Windows\Temp\WER9F79.tmp.appcompat.txt (16006 bytes)
C:\Windows\Temp\WERA037.tmp.hdmp (583266 bytes)
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_infocard.exe_8962182c5b835ed2d312d75a1aa433a1c364fa4_cab_0c0da8ad\WERA037.tmp.hdmp (168482 bytes)
C:\Windows\Temp\WER9FB9.tmp.WERInternalMetadata.xml (53648 bytes)
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_infocard.exe_8962182c5b835ed2d312d75a1aa433a1c364fa4_cab_0c0da8ad\Report.wer (171900 bytes)
The Trojan deletes the following file(s):
C:\Windows\Temp\WERA814.tmp.mdmp (0 bytes)
C:\Windows\Temp\WERA814.tmp (0 bytes)
C:\Windows\Temp\WERA037.tmp (0 bytes)
C:\Windows\Temp\WER9F79.tmp.appcompat.txt (0 bytes)
C:\Windows\Temp\WERA037.tmp.hdmp (0 bytes)
C:\Windows\Temp\WER9F79.tmp (0 bytes)
C:\Windows\Temp\WER9FB9.tmp (0 bytes)
C:\Windows\Temp\WER9FB9.tmp.WERInternalMetadata.xml (0 bytes)
The process FlashPlayerUpdateService.exe:1924 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Windows\System32\Macromed\Flash\FlashInstall32.log (84 bytes)
The process FlashPlayerUpdateService.exe:1996 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Windows\Temp\{431306BD-DDEE-47BD-9145-B849BF9F0248}\fpi.tmp (3791632 bytes)
C:\Windows\System32\FlashPlayerInstaller.exe (12387 bytes)
The Trojan deletes the following file(s):
C:\Windows\Temp\{431306BD-DDEE-47BD-9145-B849BF9F0248}\fpi.tmp (0 bytes)
C:\Windows\Temp\{431306BD-DDEE-47BD-9145-B849BF9F0248} (0 bytes)
The process dllhost.exe:1956 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Windows\System32\Macromed\Flash\gllpflgc.tmp (508 bytes)
C:\Windows\System32\Macromed\Flash\FlashPlayerUpdateService.exe (3073 bytes)
C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{AB1C8188-0F4C-4E74-A362-88B4B1478BF5}.crmlog (1600 bytes)
%Program Files%\WinPcap\gpqfnmbf.tmp (352 bytes)
C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{64D68604-B96B-4F93-8E98-6E5C7ECA5AB9}.crmlog (623 bytes)
%Program Files%\WinPcap\rpcapd.exe (2105 bytes)
The Trojan deletes the following file(s):
%Program Files%\WinPcap\gpqfnmbf.tmp (0 bytes)
C:\Windows\System32\Macromed\Flash\gllpflgc.tmp (0 bytes)
C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{64D68604-B96B-4F93-8E98-6E5C7ECA5AB9}.crmlog (0 bytes)
The process wermgr.exe:3164 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_infocard.exe_8962182c5b835ed2d312d75a1aa433a1c364fa4_cab_0c0da8ad\Report.wer.tmp (175218 bytes)
The process msdtc.exe:2180 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Windows\System32\config\SOFTWARE (58470 bytes)
C:\$Directory (1536 bytes)
C:\Windows\System32\config\SOFTWARE.LOG1 (60670 bytes)
C:\Windows\System32\Msdtc\MSDTC.LOG (2772 bytes)
C:\Windows\System32\Msdtc\Trace\dtctrace.log (16 bytes)
C:\Windows\System32 (192 bytes)
The process FlashPlayerInstaller.exe:3992 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Windows\System32\Macromed\Flash\FlashPlayerUpdateService.exe (546 bytes)
C:\Windows\System32\FlashPlayerApp.exe (803 bytes)
C:\Windows\System32\Macromed\Flash\Flash32_26_0_0_151.ocx (12387 bytes)
C:\Windows\System32\Macromed\Flash\FlashUtil32_26_0_0_151_ActiveX.dll (545 bytes)
C:\Windows\System32\Macromed\Flash\FlashInstall32.log (9 bytes)
C:\Windows\System32\Macromed\Flash\activex.vch (449 bytes)
C:\Windows\System32\Macromed\Flash\FlashUtil32_26_0_0_151_ActiveX.exe (50 bytes)
C:\Windows\System32\Macromed\Temp\{C5D3312D-21BC-4439-8FCF-5B8C291A00D5}\fpb.tmp (50 bytes)
C:\Windows\System32\Macromed\Temp\{385A1608-B96E-4F3C-B894-EC96A74D288A}\fpb.tmp (1093 bytes)
C:\Windows\System32\FlashPlayerCPLApp.cpl (144 bytes)
The Trojan deletes the following file(s):
C:\Windows\System32\Macromed\Temp (0 bytes)
C:\Windows\System32\Macromed\Flash\FlashInstall.log (0 bytes)
C:\Windows\System32\Macromed\Temp\{385A1608-B96E-4F3C-B894-EC96A74D288A} (0 bytes)
C:\Windows\System32\Macromed\Temp\{C5D3312D-21BC-4439-8FCF-5B8C291A00D5} (0 bytes)
C:\Windows\System32\Macromed\Flash\FlashUtil32_23_0_0_185_ActiveX.exe (0 bytes)
C:\Windows\System32\Macromed\Flash\FlashUtil32_23_0_0_185_ActiveX.dll (0 bytes)
C:\Windows\System32\Macromed\Flash\activex.vch (0 bytes)
C:\Windows\System32\Macromed\Temp\{C5D3312D-21BC-4439-8FCF-5B8C291A00D5}\fpb.tmp (0 bytes)
C:\Windows\System32\Macromed\Temp\{385A1608-B96E-4F3C-B894-EC96A74D288A}\fpb.tmp (0 bytes)
C:\Windows\System32\Macromed\Flash\Flash32_23_0_0_185.ocx (0 bytes)
The process %original file name%.exe:3684 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Windows\System32\Macromed\Flash\ikbbfgpa.tmp (507 bytes)
%Program Files%\Google\Update\GoogleUpdate.exe (2105 bytes)
C:\Windows\System32\dllhost.exe (1281 bytes)
C:\Windows\ehome\ehrecvr.exe (5873 bytes)
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aeoedpji.tmp (333 bytes)
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe (2105 bytes)
C:\Windows\ehome\iodlfdan.tmp (336 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\hefcgmqa.tmp (304 bytes)
C:\Windows\ehome\ehsched.exe (2105 bytes)
C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\infocard.exe (7433 bytes)
C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\gfafhlpc.tmp (1 bytes)
C:\Windows\ehome\mojbjjee.tmp (800 bytes)
C:\Windows\System32\abddhdmk.tmp (315 bytes)
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_state.exe (1425 bytes)
C:\Windows\System32\msiexec.exe (1425 bytes)
%Program Files%\Google\Update\gmfhpmpj.tmp (384 bytes)
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cpdiekip.tmp (274 bytes)
C:\Windows\System32\FXSSVC.exe (5441 bytes)
C:\Windows\System32\Macromed\Flash\FlashPlayerUpdateService.exe (3073 bytes)
C:\Windows\System32\hakjliho.tmp (301 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe (1425 bytes)
C:\Windows\System32\alg.exe (1425 bytes)
C:\Windows\System32\hejdoghn.tmp (766 bytes)
C:\Windows\System32\bhcmmkom.tmp (252 bytes)
The Trojan deletes the following file(s):
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aeoedpji.tmp (0 bytes)
C:\Windows\System32\bhcmmkom.tmp (0 bytes)
C:\Windows\ehome\mojbjjee.tmp (0 bytes)
C:\Windows\System32\Macromed\Flash\ikbbfgpa.tmp (0 bytes)
C:\Windows\ehome\iodlfdan.tmp (0 bytes)
C:\Windows\System32\abddhdmk.tmp (0 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\hefcgmqa.tmp (0 bytes)
C:\Windows\System32\hakjliho.tmp (0 bytes)
%Program Files%\Google\Update\gmfhpmpj.tmp (0 bytes)
C:\Windows\System32\hejdoghn.tmp (0 bytes)
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cpdiekip.tmp (0 bytes)
C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\gfafhlpc.tmp (0 bytes)
Registry activity
The process WerFault.exe:3096 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\153]
"_FileId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\000000000000058C]
"ObjectLru" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14C]
"_Usn_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\148]
"_ObjectLru_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14A]
"_ObjectLru_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\149]
"_ObjectLru_" = "Type: REG_QWORD, Length: 8"
[HKU\.DEFAULT\Software\Microsoft\Windows\Windows Error Reporting\Debug]
"StoreLocation" = "C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_infocard.exe_8962182c5b835ed2d312d75a1aa433a1c364fa4_cab_0c0da8ad"
[HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug]
"StoreLocation" = "C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_infocard.exe_8962182c5b835ed2d312d75a1aa433a1c364fa4_cab_0c0da8ad"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\153]
"_UsnJournalId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\146]
"_ObjectLru_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14C]
"_UsnJournalId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14B]
"_Usn_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\0000000000000587]
"ObjectId" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\0000000000000582]
"ObjectId" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14D]
"_ObjectId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14A]
"_ObjectId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore]
"_CurrentObjectId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\151]
"_ObjectId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\IndexTable\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}\10000000030F3]
"153" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\151]
"_ObjectLru_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\155]
"_ObjectId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\149\Indexes\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}]
"10000000044D3" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\000000000000058B]
"ObjectLru" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14D]
"_Usn_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\0000000000000583]
"ObjectLru" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\IndexTable\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}\10000000044D4]
"14A" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\0000000000000588]
"ObjectLru" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14A]
"_Usn_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14C\Indexes\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}]
"10000000044D6" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\155]
"_ObjectLru_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\151\Indexes\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}]
"1000000002B11" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\0000000000000589]
"ObjectLru" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\0000000000000584]
"ObjectLru" = "Type: REG_QWORD, Length: 8"
"ObjectId" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14E]
"_FileId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\156]
"_Usn_" = "Type: REG_QWORD, Length: 8"
"_FileId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\IndexTable\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}\100000000305C]
"146" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\144]
"_UsnJournalId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\IndexTable\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}\10000000044D7]
"14D" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\144]
"_Usn_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\IndexTable\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}\10000000030F2]
"152" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\0000000000000589]
"ObjectId" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14A\Indexes\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}]
"10000000044D4" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14F]
"_UsnJournalId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\152]
"_FileId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14E]
"_ObjectId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\000000000000057E]
"ObjectId" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\0000000000000585]
"ObjectLru" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14F]
"_FileId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\155]
"_FileId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\148]
"_ObjectId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14E\Indexes\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}]
"10000000030DB" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\000000000000058A]
"ObjectId" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\147]
"_FileId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\156]
"_ObjectId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\155\Indexes\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}]
"10000000055E3" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\000000000000058C]
"ObjectId" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\150]
"_ObjectId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14F\Indexes\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}]
"10000000030DC" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\IndexTable\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}\10000000030B1]
"147" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14E]
"_ObjectLru_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\000000000000058A]
"ObjectLru" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\IndexTable\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}\10000000030DC]
"14F" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList]
"CurrentLru" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\146]
"_ObjectId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\147\Indexes\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}]
"10000000030B1" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\IndexTable\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}\10000000044D6]
"14C" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\149]
"_Usn_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\IndexTable\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}\10000000055E3]
"155" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\152]
"_UsnJournalId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14B]
"_ObjectId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14D]
"_ObjectLru_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14D\Indexes\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}]
"10000000044D7" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14C]
"_ObjectLru_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\000000000000058B]
"ObjectId" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\0000000000000587]
"ObjectLru" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\156\Indexes\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}]
"10000000055E1" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\148\Indexes\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}]
"100000000302F" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\156]
"_UsnJournalId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\000000000000058D]
"ObjectId" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\0000000000000580]
"ObjectLru" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14A]
"_FileId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14F]
"_Usn_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\IndexTable\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}\10000000030FC]
"154" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\153]
"_ObjectLru_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\150]
"_FileId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\0000000000000586]
"ObjectLru" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\0000000000000582]
"ObjectLru" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\150]
"_UsnJournalId_" = "Type: REG_QWORD, Length: 8"
"_ObjectLru_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\154]
"_Usn_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\150\Indexes\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}]
"1000000002B0E" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\0000000000000581]
"ObjectId" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\156]
"_ObjectLru_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\146]
"_FileId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\0000000000000580]
"ObjectId" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\151]
"_UsnJournalId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\148]
"_Usn_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\147]
"_UsnJournalId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\154]
"_FileId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14B]
"_UsnJournalId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\152]
"_Usn_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\153]
"_Usn_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\155]
"_Usn_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\0000000000000581]
"ObjectLru" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14E]
"_Usn_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\150]
"_Usn_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\0000000000000586]
"ObjectId" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14C]
"_ObjectId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\IndexTable\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}\10000000030DB]
"14E" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\IndexTable\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}\1000000002B11]
"151" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\152\Indexes\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}]
"10000000030F2" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\154\Indexes\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}]
"10000000030FC" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\155]
"_UsnJournalId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14C]
"_FileId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14B\Indexes\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}]
"10000000044D5" = "Type: REG_QWORD, Length: 8"
[HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug]
"ExceptionRecord" = "4D 4F 43 E0 01 00 00 00 00 00 00 00 6F D3 99 75"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\IndexTable\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}\10000000055E1]
"156" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\154]
"_UsnJournalId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\0000000000000585]
"ObjectId" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14D]
"_UsnJournalId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14E]
"_UsnJournalId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\148]
"_UsnJournalId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\147]
"_ObjectId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\149]
"_FileId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\000000000000058E]
"ObjectId" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\149]
"_UsnJournalId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\151]
"_Usn_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\146\Indexes\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}]
"100000000305C" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14F]
"_ObjectLru_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\147]
"_ObjectLru_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\151]
"_FileId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\153\Indexes\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}]
"10000000030F3" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\0000000000000583]
"ObjectId" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\148]
"_FileId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\152]
"_ObjectLru_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\153]
"_ObjectId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\IndexTable\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}\100000000302F]
"148" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\000000000000057F]
"ObjectLru" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\154]
"_ObjectId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\149]
"_ObjectId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14B]
"_ObjectLru_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\0000000000000588]
"ObjectId" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\146]
"_Usn_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\000000000000058E]
"ObjectLru" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\000000000000058D]
"ObjectLru" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\000000000000057F]
"ObjectId" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14D]
"_FileId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\147]
"_Usn_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\152]
"_ObjectId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14F]
"_ObjectId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14B]
"_FileId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\146]
"_UsnJournalId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\14A]
"_UsnJournalId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\154]
"_ObjectLru_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\IndexTable\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}\1000000002B0E]
"150" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\IndexTable\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}\10000000044D5]
"14B" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\LruList\000000000000057E]
"ObjectLru" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\IndexTable\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}\10000000044D3]
"149" = "Type: REG_QWORD, Length: 8"
The Trojan deletes the following value(s) in system registry:
[\REGISTRY\A\{DF823AE1-9139-11E6-A7F6-0050563BAEAC}\DefaultObjectStore\ObjectTable\144]
"AeFileID"
"AeProgramID"
The process FlashPlayerUpdateService.exe:1924 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Macromedia\FlashPlayerSAU]
"LastUpdateCheck" = "Type: REG_QWORD, Length: 8"
"UpdateAttempts" = "0"
"CheckFrequency" = "1"
The process FlashPlayerUpdateService.exe:1996 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Macromedia\FlashPlayerSAU]
"UpdateAttempts" = "1"
[HKU\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E]
"LanguageList" = "en-US, en"
The process dllhost.exe:1956 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Policies\Microsoft\Windows\System]
"EnableSmartScreen" = "0"
[HKLM\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-732923889-1296844034-1208581001-1000]
"EnableNotifications" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer]
"HideSCAHealth" = "1"
The process wermgr.exe:3164 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug]
"StoreLocation" = "C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_infocard.exe_8962182c5b835ed2d312d75a1aa433a1c364fa4_cab_0c0da8ad"
[HKCU\Software\Microsoft\Windows\Windows Error Reporting\Debug]
"StoreLocation" = "C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_infocard.exe_8962182c5b835ed2d312d75a1aa433a1c364fa4_cab_0c0da8ad"
The process FlashPlayerInstaller.exe:3992 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCR\ShockwaveFlash.ShockwaveFlash.22]
"(Default)" = "Shockwave Flash Object"
[HKCR\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}\1.0]
"(Default)" = "FlashBroker"
[HKCR\ShockwaveFlash.ShockwaveFlash.24]
"(Default)" = "Shockwave Flash Object"
[HKCR\MIME\Database\Content Type\application/x-shockwave-flash]
"CLSID" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKCR\Interface\{86230738-D762-4C50-A2DE-A753E5B1686F}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\MacromediaFlashPaper.MacromediaFlashPaper\DefaultIcon]
"(Default)" = "%Program Files%\Internet Explorer\iexplore.exe,-17"
[HKCR\MIME\Database\Content Type\application/futuresplash]
"Extension" = ".spl"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Adobe Flash Player ActiveX]
"DisplayName" = "Adobe Flash Player 26 ActiveX"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FlashPlayerUpdateService.exe]
"DisableExceptionChainValidation" = "0"
[HKCR\MacromediaFlashPaper.MacromediaFlashPaper]
"(Default)" = "Macromedia Flash Paper"
[HKCR\ShockwaveFlash.ShockwaveFlash]
"(Default)" = "Shockwave Flash Object"
[HKLM\SOFTWARE\Macromedia\FlashPlayerActiveX]
"isMSI" = "0"
[HKCR\ShockwaveFlash.ShockwaveFlash.25\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKCR\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}]
"LocalizedString" = "@C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_151_ActiveX.exe,-101"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Adobe Flash Player ActiveX]
"HelpLink" = "http://www.adobe.com/go/flashplayer_support/"
[HKLM\SOFTWARE\Macromedia\FlashPlayer\SafeVersions]
"18.0" = "4294967295"
[HKCR\Interface\{D27CDB6C-AE6D-11CF-96B8-444553540000}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
"(Default)" = "Macromedia Flash Factory Object"
[HKCR\ShockwaveFlash.ShockwaveFlash\CurVer]
"(Default)" = "ShockwaveFlash.ShockwaveFlash.26"
[HKLM\SOFTWARE\Macromedia\FlashPlayer\SafeVersions]
"25.0" = "4294967295"
[HKCR\Interface\{D27CDB6C-AE6D-11CF-96B8-444553540000}]
"(Default)" = "IShockwaveFlash"
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
"(Default)" = "1.0"
[HKLM\SOFTWARE\Macromedia\FlashPlayer\SafeVersions]
"16.0" = "4294967295"
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
"(Default)" = "ShockwaveFlash.ShockwaveFlash.26"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Adobe Flash Player ActiveX]
"URLUpdateInfo" = "http://www.adobe.com/go/getflashplayer/"
[HKCR\ShockwaveFlash.ShockwaveFlash.19]
"(Default)" = "Shockwave Flash Object"
[HKCR\ShockwaveFlash.ShockwaveFlash.1]
"(Default)" = "Shockwave Flash Object"
[HKCR\ShockwaveFlash.ShockwaveFlash.26]
"(Default)" = "Shockwave Flash Object"
[HKCR\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}\TypeLib]
"(Default)" = "{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
[HKLM\SOFTWARE\Macromedia\FlashPlayerActiveX]
"isScriptDebugger" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Adobe Flash Player ActiveX]
"Publisher" = "Adobe Systems Incorporated"
[HKLM\SOFTWARE\Macromedia\FlashPlayer\SafeVersions]
"6.0" = "4294967295"
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
"(Default)" = "0"
[HKCR\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
"(Default)" = "FlashFactory.FlashFactory"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Adobe Flash Player ActiveX]
"NoRepair" = "1"
"NoModify" = "1"
"EstimatedSize" = "19647"
[HKCR\ShockwaveFlash.ShockwaveFlash.21\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus\1]
"(Default)" = "131473"
[HKCR\Interface\{299817DA-1FAC-4CE2-8F48-A108237013BD}]
"(Default)" = "IFlashBroker6"
[HKCR\ShockwaveFlash.ShockwaveFlash.19\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKCR\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\ProxyStubClsid32]
"(Default)" = "{00020420-0000-0000-C000-000000000046}"
[HKCR\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0\HELPDIR]
"(Default)" = "C:\Windows\system32\Macromed\Flash"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Control Panel\Extended Properties\System.ControlPanel.Category\C:\Windows\system32]
"FlashPlayerCPLApp.cpl" = "10"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Adobe Flash Player ActiveX]
"VersionMajor" = "26"
[HKCR\MacromediaFlashPaper.MacromediaFlashPaper\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FlashPlayerApp.exe]
"DisableExceptionChainValidation" = "0"
[HKLM\SOFTWARE\Macromedia\FlashPlayerActiveX]
"PlayerPath" = "C:\Windows\system32\Macromed\Flash\Flash32_26_0_0_151.ocx"
[HKLM\SOFTWARE\Macromedia\FlashPlayer\SafeVersions]
"7.0" = "4294967295"
[HKCR\Interface\{D27CDB6C-AE6D-11CF-96B8-444553540000}\TypeLib]
"Version" = "1.0"
[HKCR\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0\FLAGS]
"(Default)" = "0"
[HKCR\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
"(Default)" = "C:\Windows\system32\Macromed\Flash\Flash32_26_0_0_151.ocx"
[HKCR\ShockwaveFlash.ShockwaveFlash.22\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FlashUtil32_26_0_0_151_ActiveX.exe]
"DisableExceptionChainValidation" = "0"
[HKCR\ShockwaveFlash.ShockwaveFlash.17\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKCR\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}]
"(Default)" = ""
[HKCR\FlashFactory.FlashFactory.1]
"(Default)" = "Macromedia Flash Factory Object"
[HKLM\SOFTWARE\Macromedia\FlashPlayer\SafeVersions]
"15.0" = "4294967295"
[HKCR\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
"(Default)" = "FlashFactory.FlashFactory.1"
[HKCR\ShockwaveFlash.ShockwaveFlash.8]
"(Default)" = "Shockwave Flash Object"
[HKCR\Interface\{86230738-D762-4C50-A2DE-A753E5B1686F}]
"(Default)" = "IFlashObject"
[HKLM\SOFTWARE\Macromedia\FlashPlayer\SafeVersions]
"22.0" = "4294967295"
[HKCR\Interface\{86230738-D762-4C50-A2DE-A753E5B1686F}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\FlashFactory.FlashFactory\CurVer]
"(Default)" = "FlashFactory.FlashFactory.1"
[HKLM\SOFTWARE\Macromedia\FlashPlayer\SafeVersions]
"8.0" = "4294967295"
[HKLM\SOFTWARE\Macromedia\FlashPlayerActiveXReleaseType]
"Release" = "1"
[HKLM\SOFTWARE\Macromedia\FlashPlayer]
"currentVersion" = "26,0,0,151"
[HKLM\SOFTWARE\Macromedia\FlashPlayer\SafeVersions]
"20.0" = "4294967295"
[HKCR\Interface\{86230738-D762-4C50-A2DE-A753E5B1686F}\TypeLib]
"Version" = "1.0"
[HKCR\ShockwaveFlash.ShockwaveFlash.10\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKCR\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}\1.0\HELPDIR]
"(Default)" = "C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_151_ActiveX.exe"
[HKCR\Interface\{D27CDB6C-AE6D-11CF-96B8-444553540000}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "46 00 00 00 03 00 00 00 09 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Macromedia\FlashPlayer\SafeVersions]
"13.0" = "4294967295"
[HKCR\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}\1.0\FLAGS]
"(Default)" = "0"
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKLM\SOFTWARE\Macromedia\FlashPlayer\SafeVersions]
"11.0" = "4294967295"
[HKCR\ShockwaveFlash.ShockwaveFlash.6]
"(Default)" = "Shockwave Flash Object"
[HKCR\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}\1.0\0\win32]
"(Default)" = "C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_151_ActiveX.exe"
[HKCR\.mfp]
"(Default)" = "MacromediaFlashPaper.MacromediaFlashPaper"
[HKLM\SOFTWARE\Macromedia\FlashPlayerActiveX]
"Version" = "26.0.0.151"
[HKCR\ShockwaveFlash.ShockwaveFlash.21]
"(Default)" = "Shockwave Flash Object"
[HKCR\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
"ThreadingModel" = "Apartment"
[HKCR\ShockwaveFlash.ShockwaveFlash.14]
"(Default)" = "Shockwave Flash Object"
[HKCR\.swf]
"Content Type" = "application/x-shockwave-flash"
[HKCR\ShockwaveFlash.ShockwaveFlash.13\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKCR\ShockwaveFlash.ShockwaveFlash.18]
"(Default)" = "Shockwave Flash Object"
[HKCR\ShockwaveFlash.ShockwaveFlash.12\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKCR\ShockwaveFlash.ShockwaveFlash.15]
"(Default)" = "Shockwave Flash Object"
[HKCR\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}\LocalServer32]
"(Default)" = "C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_151_ActiveX.exe"
[HKCR\MacromediaFlashPaper.MacromediaFlashPaper\shell\open\command]
"(Default)" = "%Program Files%\Internet Explorer\iexplore.exe -nohome %1"
[HKCR\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0]
"(Default)" = "Shockwave Flash"
[HKCR\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\ProxyStubClsid]
"(Default)" = "{00020420-0000-0000-C000-000000000046}"
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
"(Default)" = "Shockwave Flash Object"
[HKCR\ShockwaveFlash.ShockwaveFlash.25]
"(Default)" = "Shockwave Flash Object"
[HKCR\.spl]
"Content Type" = "application/futuresplash"
[HKCR\ShockwaveFlash.ShockwaveFlash.14\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKLM\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB70-AE6D-11cf-96B8-444553540000}]
"Compatibility Flags" = "65536"
[HKCR\ShockwaveFlash.ShockwaveFlash.11\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKCR\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0\0\win32]
"(Default)" = "C:\Windows\system32\Macromed\Flash\Flash32_26_0_0_151.ocx"
[HKCR\ShockwaveFlash.ShockwaveFlash.23\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FAF199D2-BFA7-4394-A4DE-044A08E59B32}]
"Policy" = "3"
[HKCR\FlashFactory.FlashFactory.1\CLSID]
"(Default)" = "{D27CDB70-AE6D-11cf-96B8-444553540000}"
[HKLM\SOFTWARE\Macromedia\FlashPlayer\SafeVersions]
"9.0" = "4294967295"
[HKCR\ShockwaveFlash.ShockwaveFlash.8\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKCR\MIME\Database\Content Type\application/futuresplash]
"CLSID" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKLM\SOFTWARE\Macromedia\FlashPlayer\SafeVersions]
"14.0" = "4294967295"
[HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FAF199D2-BFA7-4394-A4DE-044A08E59B32}]
"AppPath" = "C:\Windows\system32\Macromed\Flash"
[HKLM\SOFTWARE\Macromedia\FlashPlayer\SafeVersions]
"21.0" = "4294967295"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Adobe Flash Player ActiveX]
"VersionMinor" = "0"
[HKLM\SOFTWARE\Microsoft\Internet Explorer\NavigatorPluginsList\Shockwave Flash]
"application/futuresplash" = ""
[HKCR\ShockwaveFlash.ShockwaveFlash.3]
"(Default)" = "Shockwave Flash Object"
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
"ThreadingModel" = "Apartment"
[HKLM\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB6E-AE6D-11CF-96B8-444553540000}]
"Compatibility Flags" = "0"
[HKCR\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}]
"(Default)" = "_IShockwaveFlashEvents"
[HKCR\ShockwaveFlash.ShockwaveFlash.7]
"(Default)" = "Shockwave Flash Object"
[HKLM\SOFTWARE\Macromedia\FlashPlayer\SafeVersions]
"10.0" = "4294967295"
[HKCR\ShockwaveFlash.ShockwaveFlash.11]
"(Default)" = "Shockwave Flash Object"
[HKCR\ShockwaveFlash.ShockwaveFlash.23]
"(Default)" = "Shockwave Flash Object"
[HKCR\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\TypeLib]
"Version" = "1.0"
[HKCR\Interface\{86230738-D762-4C50-A2DE-A753E5B1686F}\TypeLib]
"(Default)" = "{D27CDB6B-AE6D-11CF-96B8-444553540000}"
[HKCR\ShockwaveFlash.ShockwaveFlash.18\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKCR\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}\Elevation]
"Enabled" = "1"
[HKCR\Interface\{299817DA-1FAC-4CE2-8F48-A108237013BD}\TypeLib]
"(Default)" = "{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
[HKCR\ShockwaveFlash.ShockwaveFlash.15\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Adobe Flash Player ActiveX]
"UninstallString" = "C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_151_ActiveX.exe -maintain activex"
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"DefaultConnectionSettings" = "46 00 00 00 03 00 00 00 09 00 00 00 00 00 00 00"
[HKCR\FlashFactory.FlashFactory]
"(Default)" = "Macromedia Flash Factory Object"
[HKCR\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
"(Default)" = "1.0"
[HKCR\ShockwaveFlash.ShockwaveFlash.5]
"(Default)" = "Shockwave Flash Object"
[HKCR\ShockwaveFlash.ShockwaveFlash.7\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKCR\ShockwaveFlash.ShockwaveFlash.20]
"(Default)" = "Shockwave Flash Object"
[HKCR\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
"(Default)" = "C:\Windows\system32\Macromed\Flash\Flash32_26_0_0_151.ocx, 1"
[HKCR\ShockwaveFlash.ShockwaveFlash.9]
"(Default)" = "Shockwave Flash Object"
[HKCR\Interface\{299817DA-1FAC-4CE2-8F48-A108237013BD}\TypeLib]
"Version" = "1.0"
[HKCR\ShockwaveFlash.ShockwaveFlash.4\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKLM\SOFTWARE\Macromedia\FlashPlayer\SafeVersions]
"12.0" = "4294967295"
[HKCR\ShockwaveFlash.ShockwaveFlash\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKCR\.sol]
"Content Type" = "text/plain"
[HKCR\ShockwaveFlash.ShockwaveFlash.16]
"(Default)" = "Shockwave Flash Object"
[HKCR\MIME\Database\Content Type\application/x-shockwave-flash]
"Extension" = ".swf"
[HKCR\ShockwaveFlash.ShockwaveFlash.13]
"(Default)" = "Shockwave Flash Object"
[HKCR\Interface\{299817DA-1FAC-4CE2-8F48-A108237013BD}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Adobe Flash Player ActiveX]
"DisplayVersion" = "26.0.0.151"
[HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FAF199D2-BFA7-4394-A4DE-044A08E59B32}]
"AppName" = "FlashUtil32_26_0_0_151_ActiveX.exe"
[HKCR\ShockwaveFlash.ShockwaveFlash.3\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKLM\SOFTWARE\Macromedia\FlashPlayer\SafeVersions]
"26.0" = "151"
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
"(Default)" = "C:\Windows\system32\Macromed\Flash\Flash32_26_0_0_151.ocx, 1"
[HKCR\.sor]
"Content Type" = "text/plain"
[HKLM\SOFTWARE\Microsoft\Internet Explorer\NavigatorPluginsList\Shockwave Flash]
"application/x-shockwave-flash" = ""
[HKLM\SOFTWARE\Macromedia\FlashPlayer\SafeVersions]
"19.0" = "4294967295"
[HKLM\SOFTWARE\Macromedia\FlashPlayerActiveX]
"UninstallerPath" = "C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_151_ActiveX.exe"
[HKLM\SOFTWARE\Macromedia\FlashPlayer\SafeVersions]
"24.0" = "4294967295"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Adobe Flash Player ActiveX]
"URLInfoAbout" = "http://www.adobe.com"
[HKCR\.swf]
"(Default)" = "ShockwaveFlash.ShockwaveFlash"
[HKCR\.spl]
"(Default)" = "ShockwaveFlash.ShockwaveFlash"
[HKCR\Interface\{D27CDB6C-AE6D-11CF-96B8-444553540000}\TypeLib]
"(Default)" = "{D27CDB6B-AE6D-11CF-96B8-444553540000}"
[HKLM\SOFTWARE\Macromedia\FlashPlayer\SafeVersions]
"17.0" = "4294967295"
"23.0" = "4294967295"
[HKCR\ShockwaveFlash.ShockwaveFlash.6\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKCR\ShockwaveFlash.ShockwaveFlash.4]
"(Default)" = "Shockwave Flash Object"
[HKCR\ShockwaveFlash.ShockwaveFlash.20\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKCR\.mfp]
"Content Type" = "application/x-shockwave-flash"
[HKCR\ShockwaveFlash.ShockwaveFlash.24\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Adobe Flash Player ActiveX]
"DisplayIcon" = "C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_151_ActiveX.exe"
[HKCR\ShockwaveFlash.ShockwaveFlash.5\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Adobe Flash Player ActiveX]
"RequiresIESysFile" = "4.70.0.1155"
[HKCR\ShockwaveFlash.ShockwaveFlash.1\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
"(Default)" = "ShockwaveFlash.ShockwaveFlash"
[HKLM\SOFTWARE\Macromedia\FlashPlayerActiveX]
"isESR" = "0"
[HKCR\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\TypeLib]
"(Default)" = "{D27CDB6B-AE6D-11CF-96B8-444553540000}"
[HKCR\ShockwaveFlash.ShockwaveFlash.10]
"(Default)" = "Shockwave Flash Object"
[HKCR\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}]
"(Default)" = "FlashBroker"
[HKCR\ShockwaveFlash.ShockwaveFlash.17]
"(Default)" = "Shockwave Flash Object"
[HKCR\FlashFactory.FlashFactory\CLSID]
"(Default)" = "{D27CDB70-AE6D-11cf-96B8-444553540000}"
[HKCR\ShockwaveFlash.ShockwaveFlash.12]
"(Default)" = "Shockwave Flash Object"
[HKCR\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
"(Default)" = "{D27CDB6B-AE6D-11cf-96B8-444553540000}"
[HKCR\ShockwaveFlash.ShockwaveFlash.16\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
"(Default)" = "{D27CDB6B-AE6D-11cf-96B8-444553540000}"
[HKCR\ShockwaveFlash.ShockwaveFlash.9\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKCR\ShockwaveFlash.ShockwaveFlash.26\CLSID]
"(Default)" = "{D27CDB6E-AE6D-11cf-96B8-444553540000}"
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
"(Default)" = "C:\Windows\system32\Macromed\Flash\Flash32_26_0_0_151.ocx"
Proxy settings are disabled:
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan deletes the following registry key(s):
[HKCR\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\ProxyStubClsid32]
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FlashUtil32_23_0_0_185_ActiveX.exe]
[HKCR\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}\1.0\0\win32]
[HKCR\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0]
[HKCR\ShockwaveFlash.ShockwaveFlash.6\CLSID]
[HKCR\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}]
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
[HKCR\ShockwaveFlash.ShockwaveFlash.21\CLSID]
[HKCR\ShockwaveFlash.ShockwaveFlash.11\CLSID]
[HKLM\SOFTWARE\Microsoft\Internet Explorer\NavigatorPluginsList\Shockwave Flash]
[HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FAF199D2-BFA7-4394-A4DE-044A08E59B32}]
[HKCR\ShockwaveFlash.ShockwaveFlash.19\CLSID]
[HKCR\Interface\{86230738-D762-4C50-A2DE-A753E5B1686F}\ProxyStubClsid]
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Adobe Flash Player ActiveX]
[HKCR\MacromediaFlashPaper.MacromediaFlashPaper\CLSID]
[HKCR\ShockwaveFlash.ShockwaveFlash.22\CLSID]
[HKCR\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
[HKLM\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB70-AE6D-11cf-96B8-444553540000}]
[HKCR\Interface\{299817DA-1FAC-4CE2-8F48-A108237013BD}\TypeLib]
[HKCR\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}]
[HKCR\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}]
[HKCR\ShockwaveFlash.ShockwaveFlash.9\CLSID]
[HKCR\ShockwaveFlash.ShockwaveFlash\CLSID]
[HKCR\ShockwaveFlash.ShockwaveFlash.4]
[HKCR\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
[HKCR\Interface\{86230738-D762-4C50-A2DE-A753E5B1686F}]
[HKCR\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Control]
[HKCR\ShockwaveFlash.ShockwaveFlash.7\CLSID]
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Programmable]
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
[HKCR\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0\HELPDIR]
[HKCR\ShockwaveFlash.ShockwaveFlash.13\CLSID]
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
[HKCR\MacromediaFlashPaper.MacromediaFlashPaper]
[HKCR\FlashFactory.FlashFactory.1]
[HKCR\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}\1.0\0]
[HKCR\ShockwaveFlash.ShockwaveFlash.16\CLSID]
[HKCR\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}\TypeLib]
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Control]
[HKCR\Interface\{86230738-D762-4C50-A2DE-A753E5B1686F}\TypeLib]
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\EnableFullPage]
[HKCR\ShockwaveFlash.ShockwaveFlash\CurVer]
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\EnableFullPage\.swf]
[HKCR\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Implemented Categories\{31CAF6E4-D6AA-4090-A050-A5AC8972E9EF}]
[HKCR\ShockwaveFlash.ShockwaveFlash.23\CLSID]
[HKCR\ShockwaveFlash.ShockwaveFlash.10\CLSID]
[HKCR\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Programmable]
[HKCR\ShockwaveFlash.ShockwaveFlash.21]
[HKCR\ShockwaveFlash.ShockwaveFlash.20]
[HKCR\ShockwaveFlash.ShockwaveFlash.23]
[HKCR\ShockwaveFlash.ShockwaveFlash.22]
[HKCR\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}\LocalServer32]
[HKCR\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
[HKCR\FlashFactory.FlashFactory\CurVer]
[HKCR\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\TypeLib]
[HKCR\.mfp]
[HKCR\ShockwaveFlash.ShockwaveFlash.5\CLSID]
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus\1]
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}]
[HKCR\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}\Elevation]
[HKCR\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\ProxyStubClsid]
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\EnableFullPage\.spl]
[HKCR\FlashFactory.FlashFactory]
[HKCR\ShockwaveFlash.ShockwaveFlash.18\CLSID]
[HKCR\ShockwaveFlash.ShockwaveFlash.8\CLSID]
[HKCR\MacromediaFlashPaper.MacromediaFlashPaper\DefaultIcon]
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}]
[HKCR\Interface\{299817DA-1FAC-4CE2-8F48-A108237013BD}]
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\EnableFullPage\.mfp]
[HKCR\Interface\{D27CDB6C-AE6D-11CF-96B8-444553540000}]
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Implemented Categories]
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640}]
[HKCR\ShockwaveFlash.ShockwaveFlash.12\CLSID]
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
[HKCR\MacromediaFlashPaper.MacromediaFlashPaper\shell\open]
[HKCR\ShockwaveFlash.ShockwaveFlash.4\CLSID]
[HKCR\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}]
[HKCR\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
[HKCR\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}\1.0\HELPDIR]
[HKCR\ShockwaveFlash.ShockwaveFlash.3]
[HKCR\ShockwaveFlash.ShockwaveFlash.1]
[HKCR\ShockwaveFlash.ShockwaveFlash.6]
[HKCR\ShockwaveFlash.ShockwaveFlash.7]
[HKCR\MacromediaFlashPaper.MacromediaFlashPaper\shell\open\command]
[HKCR\ShockwaveFlash.ShockwaveFlash.5]
[HKCR\ShockwaveFlash.ShockwaveFlash.8]
[HKCR\ShockwaveFlash.ShockwaveFlash.9]
[HKCR\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0\0\win32]
[HKCR\ShockwaveFlash.ShockwaveFlash.10]
[HKCR\ShockwaveFlash.ShockwaveFlash.11]
[HKCR\ShockwaveFlash.ShockwaveFlash.12]
[HKCR\ShockwaveFlash.ShockwaveFlash.13]
[HKCR\ShockwaveFlash.ShockwaveFlash.14]
[HKCR\ShockwaveFlash.ShockwaveFlash.15]
[HKCR\ShockwaveFlash.ShockwaveFlash.16]
[HKCR\ShockwaveFlash.ShockwaveFlash.17]
[HKCR\ShockwaveFlash.ShockwaveFlash.18]
[HKCR\ShockwaveFlash.ShockwaveFlash.19]
[HKCR\Interface\{D27CDB6C-AE6D-11CF-96B8-444553540000}\ProxyStubClsid]
[HKCR\.spl]
[HKCR\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0\FLAGS]
[HKCR\ShockwaveFlash.ShockwaveFlash.1\CLSID]
[HKCR\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
[HKCR\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}\1.0]
[HKCR\ShockwaveFlash.ShockwaveFlash.3\CLSID]
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
[HKCR\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}\1.0\FLAGS]
[HKCR\ShockwaveFlash.ShockwaveFlash.15\CLSID]
[HKCR\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0\0]
[HKCR\ShockwaveFlash.ShockwaveFlash.20\CLSID]
[HKCR\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
[HKCR\MacromediaFlashPaper.MacromediaFlashPaper\shell]
[HKCR\Interface\{86230738-D762-4C50-A2DE-A753E5B1686F}\ProxyStubClsid32]
[HKCR\FlashFactory.FlashFactory\CLSID]
[HKCR\Interface\{299817DA-1FAC-4CE2-8F48-A108237013BD}\ProxyStubClsid32]
[HKCR\ShockwaveFlash.ShockwaveFlash.14\CLSID]
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
[HKCR\Interface\{D27CDB6C-AE6D-11CF-96B8-444553540000}\TypeLib]
[HKCR\FlashFactory.FlashFactory.1\CLSID]
[HKCR\Interface\{D27CDB6C-AE6D-11CF-96B8-444553540000}\ProxyStubClsid32]
[HKCR\ShockwaveFlash.ShockwaveFlash.17\CLSID]
[HKCR\ShockwaveFlash.ShockwaveFlash]
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Macromedia\FlashPlayer]
"CurrentVersion"
[HKLM\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB70-AE6D-11cf-96B8-444553540000}]
"Compatibility Flags"
[HKCR\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
"ThreadingModel"
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCR\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
"ThreadingModel"
[HKCR\MIME\Database\Content Type\application/x-shockwave-flash]
"CLSID"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Internet Explorer\NavigatorPluginsList\Shockwave Flash]
"application/x-shockwave-flash"
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
[HKLM\SOFTWARE\Microsoft\Internet Explorer\NavigatorPluginsList\Shockwave Flash]
"application/futuresplash"
[HKCR\.sol]
"Content Type"
[HKCR\MIME\Database\Content Type\application/futuresplash]
"CLSID"
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyOverride"
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKCR\.sor]
"Content Type"
Dropped PE files
| MD5 | File path |
|---|---|
| 30b1d0d476739845864b31db3d678476 | c:\Windows\System32\Macromed\Flash\Flash32_26_0_0_151.ocx |
| 43a19b2d132d0eff5b29ecd57ba0d17c | c:\Windows\System32\Macromed\Flash\FlashUtil32_26_0_0_151_ActiveX.dll |
| d3e6add1b26bc1a450fc4fccba5814c7 | c:\Windows\System32\Macromed\Flash\FlashUtil32_26_0_0_151_ActiveX.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
Company Name: Cisco WebEx LLC
Product Name: WebEx Application Sharing
Product Version: 1030,1503,1000,2900
Legal Copyright: (c) 1997-2015 Cisco and/or its affiliates. All rights reserved.
Legal Trademarks:
Original Filename: atsckernel.exe
Internal Name: atsckernel.exe
File Version: 1030,1503,1000,2900
File Description: WebEx Application Sharing Host launcher
Comments: 10/29/2015 T30(Unicode)
Language: Spanish (Spain, International Sort)
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 136757 | 137216 | 4.59287 | 9c1802a7ff7c02c129ea6e2b625104ee |
| .rdata | 143360 | 55402 | 55808 | 3.23387 | 5e558daf3a5c0ea8e7f59d13fb5b90de |
| .data | 200704 | 18048 | 8192 | 2.74186 | 448686f70ab878b4d6001d75a816ad17 |
| .rsrc | 221184 | 24372 | 24576 | 4.18528 | 23e40eaa851fe723aed865a93d4af2e1 |
| .reloc | 245760 | 659456 | 253952 | 5.46635 | 223aa0135d9b28ae74f2e3b029e7aad8 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://a1293.d.akamai.net/pub/flashplayer/update/current/sau/26/install/install_all_win_ax_sgn.z | |
| hxxp://fpdownload2.macromedia.com/pub/flashplayer/update/current/sau/26/install/install_all_win_ax_sgn.z | |
| fpdownload.macromedia.com |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET /pub/flashplayer/update/current/sau/26/install/install_all_win_ax_sgn.z HTTP/1.1
Connection: Keep-Alive
User-Agent: Download Flash Player Installer/1.0
Host: fpdownload2.macromedia.com
HTTP/1.1 200 OK
Server: Apache
Last-Modified: Tue, 08 Aug 2017 08:29:19 GMT
ETag: "13306de-55639c27fd232"
Accept-Ranges: bytes
Content-Length: 20121310
Content-Encoding: x-compress
Date: Mon, 28 Aug 2017 21:17:24 GMT
Connection: keep-alive0..3....*.H.........3..0..3.....1.0... ......0..2....*.H.........2....
.2..MZ......................@.........................................
......!..L.!This program cannot be run in DOS mode....$........M..],..
],..],..C~P.Y,...cB.X,..TTA.E,..z...Y,..z...R,..],...,..TTP..,..TTW..,
..C~@.\,..],C.\,..TTE.\,..Rich],..................PE..L...:.vY........
.........@..../.....|C.......P....@..........................03.....m.
2...@..........................................p...q............2.....
..2.L$...S..................................@............P..x.........
...................text....?.......@.................. ..`.rdata......
.P.......D..............@..@.data....4...0......................@....r
src....q...p...r...6..............@..@.reloc..R5....2..6....2.........
....@..B..............................................................
......................................................................
......................................................................
......................................................................
.....................................................V.t$..D6.......P.
"...Y.p..@...@.......^.... ..`......L$......I..H.....t..........t..@.
A..3......t..I..DH..3..VW.|$...................;.~.2.. .B........LA..G
....DB...NHHf..IIf;.u...u..._^...V.t$...W............w...;.~.2..0.j...
.J. ........LA..F..DB...O@@f..AAf;.u...u..._^......L$.V..........%...;
.^u..t$..8.....t.3.@..3....SV....W..t..@...3. F.@..W..........F.Y...TB
.......ABBOu._^.....[.....u...P..I.SVW3..tH.2.....vI...f..0s.f..9v<<< skipped >>>
The Trojan connects to the servers at the folowing location(s):
.text
`.rdata
@.data
.rsrc
@.reloc
YY=ATASt%SW
Iumj.Xjn
SShh<
WmsgSendMessage
AppsIsShared
RegOpenKeyTransactedW
RegCreateKeyTransactedW
RegDeleteKeyTransactedW
GetProcessWindowStation
operator
function not supported
operation canceled
address_family_not_supported
operation_in_progress
operation_not_supported
protocol_not_supported
operation_would_block
address family not supported
broken pipe
inappropriate io control operation
not supported
operation in progress
operation not permitted
operation not supported
operation would block
protocol not supported
D:\ec\ws\official_Train_T30L10NSP6_client_682736_201602280128\020p\maps\Release\atsckernel.pdb
SHLWAPI.dll
RPCRT4.dll
KERNEL32.dll
ExitWindowsEx
GetKeyState
keybd_event
MapVirtualKeyW
EnumDesktopWindows
USER32.dll
GDI32.dll
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegCreateKeyW
ADVAPI32.dll
ole32.dll
OLEAUT32.dll
GetProcessHeap
GetCPInfo
zcÁ
<requestedExecutionLevel level="asInvoker" uiAccess="true"></requestedExecutionLevel>
;";.;?;?>
9%9U9
0&0,090@0\0}0
5C6k6y6Œ8\8c8k8p8t8x8
9 9%9*939
; <@<\<|<
.data
.idata
.reloc
.edata
nn.lrF
.Os{Z i/mbLtd0d{FC)Bm8Tv(-prFY9WgbF}o? {PwzZtd6jt\Y'U`8Qp(%dsJS#F{bJubhgqIayN&r.jnFQ#Qk;@j%/k;F]5L{`Sl&<lz\]bIl5K``/a[X(E,u@&j*jbJE.YiyUcd7|k
ub.mwBT-
V]v}L.gLpVM
<%C!O[
CRTDLL.DLL
4(5-5@5{51$1*1/1{15 :$:(:,:
kkqvx_.dll
.rdata
.pdata
@.idata
T.PM9
$o.UC
qHG;rXqEuN_nOv* Jq.UO5{{H3.rs
%s{<?{kkqvx_64.dll
sfc_os.dll
oleaut32.dll
09WinExec
47PeekNamedPipe
48CreatePipe
Zole32.dll
%s_mtx1
crtdll.dll
shell32.dll
*shell32.dll
%s_mtx%u
25RegEnumKeyExA
26RegSetKeySecurity
00RegOpenKeyExA
04RegCloseKey
02RegCreateKeyExA
advapi32.dll
asfc.dll
sfc.dll
22EnumDesktopWindows
user32.dll
3.tmp
rsvp.exe
rundll32.exe
chrome.exe
consent.exe
Rpc kernel call back error: %x
CASCtrlAgent::Run:%x,%d
Mouse pos: %d, %d, %x
Get HitTest code(%d, %d): %d, %d, %x
CASCtrlAgent::OnShadowVirtualKeyEvent get WinKey/MenuKey up
CASCtrlAgent::OnShadowVirtualKeyEvent skipped, because %x is not shared
CASCtrlAgent::OnShadowVirtualKeyEvent skipped, because %x is with AS_NOREMOTECONTROLWINDOW_PROP
SetClipboardViewer err[%d]
PostThreadMessage CTRL_ALT_DEL_COMMAND %d ret=%d err=%d
CTRL_ALT_DEL_COMMAND %d %d
wmsgapi.dll
Wmsg Send Message in WTS dialog: %d,%d,%d,%d
CASCtrlAgent::Simulate Win D Key
Fail to translate vkey: %x, %x
WM_AS_VIRTUALKEY *
WM_AS_MOUSEEVENTF_LEFTDOWN %d %d
Get Pointer: %d, %d
WM_AS_MOUSEEVENTF_LEFTUP %d %d
LoadLibrary %s fail...
call AsKeAsStart %x, %x, %x
NTGdiHookAsEnd(%x,%x)
Set resource dll: %s
atres.dll
BringSharedAppToFront:BringWindowToTop(%x) fail(freezen).
call AppsInit %d
\pipe\atsckernel
\pipe\atscctrlrpc
rpcrt4.dll
LoadASKernel fail %s
CreateEvent ATASKERNEL_EVENT failed %d
kernel_path %s
RunRPCSrv fail %s
Run RPC server at %s,%s
The RPC server is not compatible to the calling client.WebEx application sharing will switch to in-context mode.
Error Code: %d
WebEx Application Sharing
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_PERFORMANCE_DATA
HKEY_DYN_DATA
HKEY_CURRENT_CONFIG
Check UAC desktop[%d]
GetSecurityInfo Error %u
AllocateAndInitializeSid Error %u
SetEntriesInAcl Error %u
SetSercurityInfo Error %u
lpstrCmdLine %s ...
_tWinMain %s getcmdline=%s
_tWinMain empty cmdline, exit. %s
AsKeGetMonitorNum %d
call APPS_ESC_DISABLEINPUT %d, %d
call ChangeDisplaySettingsEx %d %d %s
dwmapi.dll
\dwmapi.dll
CBlankScreenAgentImpl::BlankScreen %d
CBlankScreenAgentImpl::DoBlankScreen, MonitorCount=%d
CBlankScreenAgentImpl::DoBlankScreen, MonitorCount=%d is shared
CBlankScreenAgentImpl::DoBlankScreen, MonitorCount=%d is not attached
CBlankScreenAgentImpl::DoBlankScreen Index=%d, Result=%d
CBlankScreenAgentImpl::SetupOverlayRegistery, ConsoleSession=%d
CBlankScreenAgentImpl::SetupOverlayRegistery,get sid %d
CBlankScreenAgentImpl::SetupOverlayRegistery,get session user token success,sid= %s
CBlankScreenAgentImpl::SetupOverlayRegistery,get session user token failed %d
CBlankScreenWnd::Init DPI Scale in Windows 8: %f
CBlankScreenWnd::Init failed to create mask winodw %d,%d,%d,%d
CBlankScreenWnd::Init after high DPI Scale in Windows 8: %ld,%ld,%ld,%ld
CBlankScreenWnd::BlankOn after high DPI Scale in Windows 8: %ld,%ld,%ld,%ld
CBlankScreenWnd::OnClose received!!!, hWnd=0x%x
End Session: %x
psapi.dll
wbxtra_huhuhu_huhuhu.wbt
wbxtra_*.wbt
WaitForSingleObject Failed, ret = %u, err = %u
WBXTRA_{608462E6-C570-4d01-B29A-63DDB7D9914C}delete dumpfile [%s], ret = %d, err = %d
SOFTWARE\WebEx\wbxtrace
mscoree.dll
- floating point support not loaded
- CRT not initialized
- Attempt to initialize the CRT more than once.
kernel32.dll
PSAPI.dll
USER32.DLL
SysShadow
SHCore.dll
Wtsapi32.dll
Advapi32.dll
c:\%original file name%.exe
Cisco WebEx LLC
WebEx Application Sharing Host launcher
1030,1503,1000,2900
atsckernel.exe
%original file name%.exe_3684_rwx_00CAE000_0003C000:
; <@<\<|<
.text
.data
.idata
.reloc
.edata
nn.lrF
.Os{Z i/mbLtd0d{FC)Bm8Tv(-prFY9WgbF}o? {PwzZtd6jt\Y'U`8Qp(%dsJS#F{bJubhgqIayN&r.jnFQ#Qk;@j%/k;F]5L{`Sl&<lz\]bIl5K``/a[X(E,u@&j*jbJE.YiyUcd7|k
ub.mwBT-
V]v}L.gLpVM
<%C!O[
KERNEL32.dll
CRTDLL.DLL
4(5-5@5{51$1*1/1{15 :$:(:,:
kkqvx_.dll
.rdata
@.data
.pdata
@.idata
T.PM9
$o.UC
qHG;rXqEuN_nOv* Jq.UO5{{H3.rs
%s{<?{kkqvx_64.dll
dllhost.exe_1956:
.text
`.data
.rsrc
@.reloc
KERNEL32.dll
msvcrt.dll
ole32.dll
ntdll.dll
dllhost.pdb
_wcmdln
_amsg_exit
(8((<)((
.data
.idata
.reloc
.edata
nn.lrF
.Os{Z i/mbLtd0d{FC)Bm8Tv(-prFY9WgbF}o? {PwzZtd6jt\Y'U`8Qp(%dsJS#F{bJubhgqIayN&r.jnFQ#Qk;@j%/k;F]5L{`Sl&<lz\]bIl5K``/a[X(E,u@&j*jbJE.YiyUcd7|k
ub.mwBT-
V]v}L.gLpVM
<%C!O[
CRTDLL.DLL
4(5-5@5{51$1*1/1{15 :$:(:,:
kkqvx_.dll
.rdata
@.data
.pdata
@.idata
T.PM9
$o.UC
qHG;rXqEuN_nOv* Jq.UO5{{H3.rs
%s{<?{kkqvx_64.dll
K.$%D,3
sfc_os.dll
oleaut32.dll
09WinExec
47PeekNamedPipe
48CreatePipe
T%s_37
Zole32.dll
k%c:\
crtdll.dll
@%X%X
shell32.dll
*shell32.dll
(%u.%u.%u
%s%s\
\%c:\
SetupWeb_
_sfx.exe
||MSASCui.exe|msseces.exe|mseinstall.exe|Tcpview.exe|cav_installer.exe|cfw_installer.exe|cispremium_installer.exe|PandaCloudAntivirus.exe|60Second.exe|Antivirus_Free_Edition.exe|OnlineArmorSetup.exe|McAfeeSetup.exe|Vba32.NT.T.exe|Vba32.P.exe|Vba32.S.exe|Vba32.Vista.exe|Vba32.W.exe|Vba32Check.exe|Vba32RCSInstallTuner.exe|avgmfapx.exe|avg_remover_expiro.exe|
Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
25RegEnumKeyExA
26RegSetKeySecurity
00RegOpenKeyExA
04RegCloseKey
02RegCreateKeyExA
advapi32.dll
$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
Software\Policies\Microsoft\Windows\System
asfc.dll
sfc.dll
22EnumDesktopWindows
user32.dll
%s\%s
3.tmp
rsvp.exe
rundll32.exe
chrome.exe
consent.exe
6.1.7600.16385 (win7_rtm.090713-1255)
dllhost.exe
Windows
Operating System
6.1.7600.16385
%original file name%.exe_3684_rwx_00CEB000_00062000:
sfc_os.dll
nn.lrF
.Os{Z i/mbLtd0d{FC)Bm8Tv(-prFY9WgbF}o? {PwzZtd6jt\Y'U`8Qp(%dsJS#F{bJubhgqIayN&r.jnFQ#Qk;@j%/k;F]5L{`Sl&<lz\]bIl5K``/a[X(E,u@&j*jbJE.YiyUcd7|k
ub.mwBT-
oleaut32.dll
09WinExec
47PeekNamedPipe
48CreatePipe
Zole32.dll
%s_mtx1
crtdll.dll
shell32.dll
*shell32.dll
%s_mtx%u
25RegEnumKeyExA
26RegSetKeySecurity
00RegOpenKeyExA
04RegCloseKey
02RegCreateKeyExA
advapi32.dll
asfc.dll
sfc.dll
22EnumDesktopWindows
user32.dll
<%C!O[
3.tmp
rsvp.exe
rundll32.exe
chrome.exe
consent.exe
dllhost.exe_1956_rwx_01001000_00001000:
dllhost.pdb
KERNEL32.dll
_wcmdln
_amsg_exit
msvcrt.dll
ole32.dll
ntdll.dll
msdtc.exe_2180:
.text
`.data
.rsrc
@.reloc
KERNEL32.dll
NTDLL.DLL
ole32.dll
msvcrt.dll
MSDTCTM.dll
VERSION.dll
USER32.dll
ADVAPI32.dll
d:\w7rtm\com\complus\dtc\inc\tracedstrsafe.h
DBGHELP.DLL
\DtcInstall.log
ld-ld-ld ld:ld : DTC Install error = %d, %s, %s (%d)
msdtcexe.pdb
_wcmdln
_amsg_exit
RtlReportException
ntdll.dll
SetProcessWindowStation
OpenWindowStationW
GetProcessWindowStation
CloseWindowStation
GetSystemWindowsDirectoryA
RegCloseKey
RegOpenKeyExW
RegOpenKeyExA
ReportEventW
version="5.1.0.0"
name="Microsoft.Windows.DTC.MSDTC"
<requestedExecutionLevel
9.UF2
%sZp3
s.kw:R
W.ZBh{T>7677.hN
:87/-)(/
yxC5%CrJ
0 1-121V1b1g1}1
1-13181>1
d:\w7rtm\com\complus\src\inc\utsem.h
d:\w7rtm\com\complus\dtc\shared\util\dtcini.cpp
%s\%s
LoadLibrary(DbgHelp.dll) failed.
%s\%s.dmp
%s_ldldld_ldldld
d:\w7rtm\com\complus\src\shared\util\utsem.cpp
comres.dll
*** Error Code = 0xx : %s
File: %s, Line: %d
%u.%u.%u.%u
comsvcs.dll
Comsvcs.dll file version info: %s %s %s
%s\%s*.dmp
%s %d %s full
RunDll32 comsvcs.dll,MiniDump
%s\%s_d_d_d_d_d_d.dmp
d:\w7rtm\com\complus\src\shared\util\svcerr.cpp
0xX (%u)
Process.Thread=<%d.%d>
File: %s:%d
hr=0xx
*** Error in %s(%d), %s: %s
0xx [S] [lS] %s (%s@d): %s
ld-ld-ld ld:ld:ld:ld : [%4x.%4x]
%s\MSDTC-%d.log
UnregisterWait returned the 0x%x error code.
d:\w7rtm\com\complus\dtc\shared\trace\src\traceoutputsettings.cpp
Unable to open output key
Debug out enabled is now %d
Memory buffer size is now %d
Using new trace file path: %s
Unable to open sources key
Unable to read level for source %S
Now tracing %S at level %d
Unable to open MSDTC\Tracing settings key
2001.12.8530.16385 (win7_rtm.090713-1255)
MSDTC.EXE
Windows
Operating System
6.1.7600.16385
dllhost.exe_1956_rwx_01004000_0009F000:
(8((<)((
.text
.data
.idata
.reloc
.edata
nn.lrF
.Os{Z i/mbLtd0d{FC)Bm8Tv(-prFY9WgbF}o? {PwzZtd6jt\Y'U`8Qp(%dsJS#F{bJubhgqIayN&r.jnFQ#Qk;@j%/k;F]5L{`Sl&<lz\]bIl5K``/a[X(E,u@&j*jbJE.YiyUcd7|k
ub.mwBT-
V]v}L.gLpVM
<%C!O[
KERNEL32.dll
CRTDLL.DLL
4(5-5@5{51$1*1/1{15 :$:(:,:
kkqvx_.dll
.rdata
@.data
.pdata
@.idata
T.PM9
$o.UC
qHG;rXqEuN_nOv* Jq.UO5{{H3.rs
%s{<?{kkqvx_64.dll
K.$%D,3
sfc_os.dll
oleaut32.dll
09WinExec
47PeekNamedPipe
48CreatePipe
T%s_37
Zole32.dll
k%c:\
crtdll.dll
@%X%X
shell32.dll
*shell32.dll
(%u.%u.%u
%s%s\
\%c:\
SetupWeb_
_sfx.exe
||MSASCui.exe|msseces.exe|mseinstall.exe|Tcpview.exe|cav_installer.exe|cfw_installer.exe|cispremium_installer.exe|PandaCloudAntivirus.exe|60Second.exe|Antivirus_Free_Edition.exe|OnlineArmorSetup.exe|McAfeeSetup.exe|Vba32.NT.T.exe|Vba32.P.exe|Vba32.S.exe|Vba32.Vista.exe|Vba32.W.exe|Vba32Check.exe|Vba32RCSInstallTuner.exe|avgmfapx.exe|avg_remover_expiro.exe|
Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
25RegEnumKeyExA
26RegSetKeySecurity
00RegOpenKeyExA
04RegCloseKey
02RegCreateKeyExA
advapi32.dll
$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
Software\Policies\Microsoft\Windows\System
asfc.dll
sfc.dll
22EnumDesktopWindows
user32.dll
%s\%s
3.tmp
rsvp.exe
rundll32.exe
chrome.exe
consent.exe
svchost.exe_1020:
.text
`.data
.rsrc
@.reloc
msvcrt.dll
API-MS-Win-Core-ProcessThreads-L1-1-0.dll
KERNEL32.dll
NTDLL.DLL
API-MS-Win-Security-Base-L1-1-0.dll
API-MS-WIN-Service-Core-L1-1-0.dll
API-MS-WIN-Service-winsvc-L1-1-0.dll
RPCRT4.dll
ole32.dll
ntdll.dll
_amsg_exit
RegCloseKey
RegOpenKeyExW
GetProcessHeap
svchost.pdb
version="5.1.0.0"
name="Microsoft.Windows.Services.SvcHost"
<description>Host Process for Windows Services</description>
<requestedExecutionLevel
Software\Microsoft\Windows NT\CurrentVersion\Svchost
Software\Microsoft\Windows NT\CurrentVersion\MgdSvchost
\PIPE\
Host Process for Windows Services
6.1.7600.16385 (win7_rtm.090713-1255)
svchost.exe
Windows
Operating System
6.1.7600.16385
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
WerFault.exe:3096
FlashPlayerUpdateService.exe:1924
FlashPlayerUpdateService.exe:1996
wermgr.exe:3164
msdtc.exe:2180
FlashPlayerInstaller.exe:3992 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_infocard.exe_8962182c5b835ed2d312d75a1aa433a1c364fa4_cab_0c0da8ad\WERA814.tmp.mdmp (15278 bytes)
C:\Windows\Temp\WERA814.tmp.mdmp (271144 bytes)
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_infocard.exe_8962182c5b835ed2d312d75a1aa433a1c364fa4_cab_0c0da8ad\WER9F79.tmp.appcompat.txt (31 bytes)
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_infocard.exe_8962182c5b835ed2d312d75a1aa433a1c364fa4_cab_0c0da8ad\WER9FB9.tmp.WERInternalMetadata.xml (3 bytes)
C:\Windows\Temp\WER9F79.tmp.appcompat.txt (16006 bytes)
C:\Windows\Temp\WERA037.tmp.hdmp (583266 bytes)
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_infocard.exe_8962182c5b835ed2d312d75a1aa433a1c364fa4_cab_0c0da8ad\WERA037.tmp.hdmp (168482 bytes)
C:\Windows\Temp\WER9FB9.tmp.WERInternalMetadata.xml (53648 bytes)
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_infocard.exe_8962182c5b835ed2d312d75a1aa433a1c364fa4_cab_0c0da8ad\Report.wer (171900 bytes)
C:\Windows\System32\Macromed\Flash\FlashInstall32.log (84 bytes)
C:\Windows\Temp\{431306BD-DDEE-47BD-9145-B849BF9F0248}\fpi.tmp (3791632 bytes)
C:\Windows\System32\FlashPlayerInstaller.exe (12387 bytes)
C:\Windows\System32\Macromed\Flash\gllpflgc.tmp (508 bytes)
C:\Windows\System32\Macromed\Flash\FlashPlayerUpdateService.exe (3073 bytes)
C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{AB1C8188-0F4C-4E74-A362-88B4B1478BF5}.crmlog (1600 bytes)
%Program Files%\WinPcap\gpqfnmbf.tmp (352 bytes)
C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{64D68604-B96B-4F93-8E98-6E5C7ECA5AB9}.crmlog (623 bytes)
%Program Files%\WinPcap\rpcapd.exe (2105 bytes)
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_infocard.exe_8962182c5b835ed2d312d75a1aa433a1c364fa4_cab_0c0da8ad\Report.wer.tmp (175218 bytes)
C:\Windows\System32\config\SOFTWARE (58470 bytes)
C:\$Directory (1536 bytes)
C:\Windows\System32\config\SOFTWARE.LOG1 (60670 bytes)
C:\Windows\System32\Msdtc\MSDTC.LOG (2772 bytes)
C:\Windows\System32\Msdtc\Trace\dtctrace.log (16 bytes)
C:\Windows\System32\FlashPlayerApp.exe (803 bytes)
C:\Windows\System32\Macromed\Flash\Flash32_26_0_0_151.ocx (12387 bytes)
C:\Windows\System32\Macromed\Flash\FlashUtil32_26_0_0_151_ActiveX.dll (545 bytes)
C:\Windows\System32\Macromed\Flash\activex.vch (449 bytes)
C:\Windows\System32\Macromed\Flash\FlashUtil32_26_0_0_151_ActiveX.exe (50 bytes)
C:\Windows\System32\Macromed\Temp\{C5D3312D-21BC-4439-8FCF-5B8C291A00D5}\fpb.tmp (50 bytes)
C:\Windows\System32\Macromed\Temp\{385A1608-B96E-4F3C-B894-EC96A74D288A}\fpb.tmp (1093 bytes)
C:\Windows\System32\FlashPlayerCPLApp.cpl (144 bytes)
C:\Windows\System32\Macromed\Flash\ikbbfgpa.tmp (507 bytes)
%Program Files%\Google\Update\GoogleUpdate.exe (2105 bytes)
C:\Windows\System32\dllhost.exe (1281 bytes)
C:\Windows\ehome\ehrecvr.exe (5873 bytes)
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aeoedpji.tmp (333 bytes)
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe (2105 bytes)
C:\Windows\ehome\iodlfdan.tmp (336 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\hefcgmqa.tmp (304 bytes)
C:\Windows\ehome\ehsched.exe (2105 bytes)
C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\infocard.exe (7433 bytes)
C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\gfafhlpc.tmp (1 bytes)
C:\Windows\ehome\mojbjjee.tmp (800 bytes)
C:\Windows\System32\abddhdmk.tmp (315 bytes)
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_state.exe (1425 bytes)
C:\Windows\System32\msiexec.exe (1425 bytes)
%Program Files%\Google\Update\gmfhpmpj.tmp (384 bytes)
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cpdiekip.tmp (274 bytes)
C:\Windows\System32\FXSSVC.exe (5441 bytes)
C:\Windows\System32\hakjliho.tmp (301 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe (1425 bytes)
C:\Windows\System32\alg.exe (1425 bytes)
C:\Windows\System32\hejdoghn.tmp (766 bytes)
C:\Windows\System32\bhcmmkom.tmp (252 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.