Win32.Parite.C_de4e73fde7
Win32.Parite.C (BitDefender), Virus:Win32/Parite.C (Microsoft), Virus.Win32.Parite.c (Kaspersky), Win32.Parite.c (v) (VIPRE), Trojan.Siggen7.21401 (DrWeb), Win32.Parite.C (B) (Emsisoft), W32/Pate.c (McAfee), W32.Pinfi.B (Symantec), Virus.Win32.Parite (Ikarus), Win32.Parite.C (FSecure), Win32/Parite (AVG), Win32:Parite (Avast), PE_PARITE.A (TrendMicro), Win32.Parite.C (AdAware), Trojan.Win32.Bumat.FD, Virus.Win32.Parite.B.FD, VirusParite.YR (Lavasoft MAS)
Behaviour: Trojan, Virus
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: de4e73fde799dd5adabd81ba5630c530
SHA1: cb215ae18a72b1ca8aa1877dd7cfb7207b7cdc14
SHA256: ce4d2887a72ee43da403307c335c3527b213cdd913787be69c7e8a52392825e8
SSDeep: 6144:sDYPb0McYn2yy8pvoQ7BzPEZtPuxsc9np5:MMcUbpvRBzv55p5
Size: 219108 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2017-04-28 09:53:28
Analyzed on: Windows7 SP1 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
WerFault.exe:3568
wermgr.exe:160
The Trojan injects its code into the following process(es):
%original file name%.exe:3380
Explorer.EXE:1440
conhost.exe:1648
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process WerFault.exe:3568 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Windows\Temp\WER2146.tmp.WERInternalMetadata.xml (51540 bytes)
C:\Windows\Temp\WER2157.tmp.hdmp (133646 bytes)
C:\Windows\Temp\WER21D5.tmp.mdmp (117249 bytes)
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_acefd23b6d9b11f337fb2b1ec85b4b86295a42_cab_0df5222f\Report.wer (146554 bytes)
C:\Windows\Temp\WER2126.tmp.appcompat.txt (2056 bytes)
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_acefd23b6d9b11f337fb2b1ec85b4b86295a42_cab_0df5222f\WER2146.tmp.WERInternalMetadata.xml (3 bytes)
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_acefd23b6d9b11f337fb2b1ec85b4b86295a42_cab_0df5222f\WER21D5.tmp.mdmp (5873 bytes)
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_acefd23b6d9b11f337fb2b1ec85b4b86295a42_cab_0df5222f\WER2157.tmp.hdmp (7433 bytes)
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_acefd23b6d9b11f337fb2b1ec85b4b86295a42_cab_0df5222f\WER2126.tmp.appcompat.txt (3 bytes)
The Trojan deletes the following file(s):
C:\Windows\Temp\WER2126.tmp (0 bytes)
C:\Windows\Temp\WER2146.tmp (0 bytes)
C:\Windows\Temp\WER2146.tmp.WERInternalMetadata.xml (0 bytes)
C:\Windows\Temp\WER2157.tmp.hdmp (0 bytes)
C:\Windows\Temp\WER21D5.tmp (0 bytes)
C:\Windows\Temp\WER2126.tmp.appcompat.txt (0 bytes)
C:\Windows\Temp\WER21D5.tmp.mdmp (0 bytes)
C:\Windows\Temp\WER2157.tmp (0 bytes)
The process wermgr.exe:160 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_acefd23b6d9b11f337fb2b1ec85b4b86295a42_cab_0df5222f\Report.wer.tmp (151984 bytes)
The process %original file name%.exe:3380 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Windows\svchost.exe (1281 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\dca1821.tmp (11190 bytes)
Registry activity
The process WerFault.exe:3568 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[\REGISTRY\A\{686941E9-946F-11E6-8ABA-0050563CAC71}\DefaultObjectStore\LruList\000000000000056C]
"ObjectLru" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{686941E9-946F-11E6-8ABA-0050563CAC71}\DefaultObjectStore\ObjectTable\143]
"_Usn_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{686941E9-946F-11E6-8ABA-0050563CAC71}\DefaultObjectStore\LruList\000000000000056B]
"ObjectLru" = "Type: REG_QWORD, Length: 8"
[HKU\.DEFAULT\Software\Microsoft\Windows\Windows Error Reporting\Debug]
"StoreLocation" = "C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_acefd23b6d9b11f337fb2b1ec85b4b86295a42_cab_0df5222f"
[HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug]
"StoreLocation" = "C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_acefd23b6d9b11f337fb2b1ec85b4b86295a42_cab_0df5222f"
[\REGISTRY\A\{686941E9-946F-11E6-8ABA-0050563CAC71}\DefaultObjectStore\ObjectTable\143]
"_UsnJournalId_" = "Type: REG_QWORD, Length: 8"
"_ObjectId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{686941E9-946F-11E6-8ABA-0050563CAC71}\DefaultObjectStore\ObjectTable\144]
"_FileId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{686941E9-946F-11E6-8ABA-0050563CAC71}\DefaultObjectStore\ObjectTable\144\Indexes\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}]
"1000000005823" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{686941E9-946F-11E6-8ABA-0050563CAC71}\DefaultObjectStore\LruList]
"CurrentLru" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{686941E9-946F-11E6-8ABA-0050563CAC71}\DefaultObjectStore]
"_CurrentObjectId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{686941E9-946F-11E6-8ABA-0050563CAC71}\DefaultObjectStore\IndexTable\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}\1000000005823]
"144" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{686941E9-946F-11E6-8ABA-0050563CAC71}\DefaultObjectStore\ObjectTable\144]
"_ObjectLru_" = "Type: REG_QWORD, Length: 8"
"_ObjectId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{686941E9-946F-11E6-8ABA-0050563CAC71}\DefaultObjectStore\ObjectTable\143]
"_FileId_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{686941E9-946F-11E6-8ABA-0050563CAC71}\DefaultObjectStore\ObjectTable\143\Indexes\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}]
"10000000055E1" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{686941E9-946F-11E6-8ABA-0050563CAC71}\DefaultObjectStore\IndexTable\FileIdIndex-{f80abb43-5224-11e3-bc81-806e6f6e6963}\10000000055E1]
"143" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{686941E9-946F-11E6-8ABA-0050563CAC71}\DefaultObjectStore\LruList\000000000000056C]
"ObjectId" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{686941E9-946F-11E6-8ABA-0050563CAC71}\DefaultObjectStore\ObjectTable\144]
"_Usn_" = "Type: REG_QWORD, Length: 8"
[HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug]
"ExceptionRecord" = "05 00 00 C0 00 00 00 00 00 00 00 00 00 00 00 00"
[\REGISTRY\A\{686941E9-946F-11E6-8ABA-0050563CAC71}\DefaultObjectStore\LruList\000000000000056B]
"ObjectId" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{686941E9-946F-11E6-8ABA-0050563CAC71}\DefaultObjectStore\ObjectTable\143]
"_ObjectLru_" = "Type: REG_QWORD, Length: 8"
[\REGISTRY\A\{686941E9-946F-11E6-8ABA-0050563CAC71}\DefaultObjectStore\ObjectTable\144]
"_UsnJournalId_" = "Type: REG_QWORD, Length: 8"
The process wermgr.exe:160 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug]
"StoreLocation" = "C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_acefd23b6d9b11f337fb2b1ec85b4b86295a42_cab_0df5222f"
[HKCU\Software\Microsoft\Windows\Windows Error Reporting\Debug]
"StoreLocation" = "C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_acefd23b6d9b11f337fb2b1ec85b4b86295a42_cab_0df5222f"
The process %original file name%.exe:3380 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\System\CurrentControlSet\services\NetRoot]
"InstallTime" = "2017-05-10 15:54"
"Group" = "Default"
[HKLM\System\CurrentControlSet\services\NetRoot\SYSTEM\CurrentControlSet\Services]
"NetRoot" = "ÉñÆæµÄ°¢Æß"
[HKLM\System\CurrentControlSet\services\NetRoot]
"Remark" = "VIP"
Dropped PE files
| MD5 | File path |
|---|---|
| fe763c2d71419352141c77c310e600d2 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\dca1821.tmp |
| fe763c2d71419352141c77c310e600d2 | c:\Windows\Temp\aca1C08.tmp |
| fe763c2d71419352141c77c310e600d2 | c:\Windows\Temp\hca1C46.tmp |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .rdata | 4096 | 3674 | 4096 | 3.0226 | 6481f16041bc5f9083442ea75539f16f |
| .data | 8192 | 29788 | 32768 | 3.91017 | d70fbd3954c395dbb24a8fd5041dd7a0 |
| .uro | 40960 | 4096 | 4096 | 4.84191 | ced34dd936a129da7b8df4b5f731ca6e |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
No activity has been detected.
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
Web Traffic was not found.
The Trojan connects to the servers at the folowing location(s):
.rdata
.data
GetProcessHeap
KERNEL32.dll
USER32.dll
RegCloseKey
RegOpenKeyA
ADVAPI32.dll
MSVCRT.dll
_acmdln
%%SystemRoot%%\System32\svchost.exe -k "%s"
SYSTEM\CurrentControlSet\Services\%s\Parameters
SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost
userenv.dll
%s\%d.bak
SYSTEM\CurrentControlSet\Services\%s
%s\shell\open\command
%s %s
Applications\iexplore.exe\shell\open\command
210.222.25.223
%Program Files%\Internet Explorer\iexplore0.exe
%s:%d:%s
M-%.2d-%.2d %.2d:%.2d
%s Win7
Ole32.dll
Oleaut32.dll
%d*%sMHz
kernel32.dll
User32.dll
ExitWindowsEx
EnumWindows
ws2_32.dll
wininet.dll
user32.dll
InternetOpenUrlA
C:\2.txt
RegOpenKeyExA
RegEnumKeyExA
RegCreateKeyExA
RegDeleteKeyA
Kernel32.dll
Software\Microsoft\Windows\CurrentVersion\Explorer
%original file name%.exe_3380_rwx_0040A000_00001000:
Kernel32.dll
ADVAPI32.dll
RegOpenKeyExA
RegCloseKey
Software\Microsoft\Windows\CurrentVersion\Explorer
%original file name%.exe_3380_rwx_01141000_00071000:
UDPSockError
NMUDP
Errmsg
Port
TNMUDP
TNMUDPxp
RemotePort
LocalPort
ReportLevel4o
0.0.0.0
%d.%d.%d.%d
Portt:
AutoHotkeysp
AutoHotkeys
:].tJ
EInvalidGraphicOperation
KeyPreview
WindowStatep
OnKeyDown
OnKeyPressL~
OnKeyUp
ssHotTrack
TWindowState
poProportional
TWMKey
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
vcltest3.dll
TDragOperation
TKeyEvent
TKeyPressEvent
crSQLWait
%s (%s)
IMM32.DLL
EInvalidOperation
%s[%d]
%s_%d
USER32.DLL
comctl32.dll
MSWHEEL_ROLLMSG
MSH_WHEELSUPPORT_MSG
MSH_SCROLL_LINES_MSG
kernel32.dll
Portions Copyright (c) 1983,99 Borland
explorer.exe
Software\Microsoft\Windows\CurrentVersion\Explorer
*.TMP
Kernel32.dll
ADVAPI32.dll
RegOpenKeyExA
RegCloseKey
readbook.exe
rundll32.exe
wry.exe
*.exe
*.scr
UdpT
UdpOnDataReceived
xxtype.cpp
derv->tpClass.tpcFlags & CF_HAS_BASES
Inappropriate I/O control operation
Broken pipe
Operation not permitted
%H:%M:%S
%m/%d/%y
%A, %B %d, %Y
d/d/d d:d:d.d
An exception (X) occurred during DllEntryPoint or DllMain in module:
xx.cpp
varType->tpClass.tpcFlags & CF_HAS_DTOR
varType->tpClass.tpcDtorAddr
(errPtr->ERRcInitDtc >= varType->tpClass.tpcDtorCount) || flags
memType->tpClass.tpcFlags & CF_HAS_DTOR
varType->tpArr.tpaElemType->tpClass.tpcFlags & CF_HAS_DTOR
dttPtr->dttType->tpPtr.tppBaseType->tpClass.tpcFlags & CF_HAS_DTOR
IS_CLASS(dttPtr->dttType->tpMask) && (dttPtr->dttType->tpClass.tpcFlags & CF_HAS_DTOR)
elemType->tpClass.tpcFlags & CF_HAS_DTOR
hu2.iu
ReportLevel
GetCPInfo
GetProcessHeap
GetWindowsDirectoryA
RegCreateKeyExA
RegFlushKey
SetViewportOrgEx
ActivateKeyboardLayout
EnumThreadWindows
EnumWindows
GetKeyNameTextA
GetKeyState
GetKeyboardLayout
GetKeyboardLayoutList
GetKeyboardState
GetKeyboardType
LoadKeyboardLayoutA
MapVirtualKeyA
MsgWaitForMultipleObjects
SetWindowsHookExA
UnhookWindowsHookEx
€00404
8 @ @ @ @ @
.text
`.data
.idata
@.edata
@.rsrc
@.reloc
External exception %x
Interface not supported
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
Win32 Error. Code: %d.
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted%Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'
Invalid variant operation"Variant method calls not supported
I/O error %d
Integer overflow Invalid floating point operation
Invalid data type for '%s'
Failed to set data for '%s'
Failed to get data for '%s'/Menu '%s' is already being used by another form*Windows socket error: %s (%d), on API '%s'
Asynchronous socket error %d
- Dock zone has no control%List does not allow duplicates ($0%x)!'%s' is not a valid integer value
Alt Clipboard does not support Icons
!Control '%s' has no parent window
Error reading %s%s%s: %s
Ancestor for '%s' not found
Unsupported clipboard format
Class %s not found
Resource %s not found
List index out of bounds (%d) List capacity out of bounds (%d)
List count out of bounds (%d) Operation not allowed on sorted string list%String list does not allow duplicates#A component named %s already exists$''%s'' is not a valid component name
A class named %s already exists
Cannot assign a %s to a %s
Cannot create file %s
Cannot open file %s
svchost.exe_3392:
.text
`.data
.rsrc
@.reloc
msvcrt.dll
API-MS-Win-Core-ProcessThreads-L1-1-0.dll
KERNEL32.dll
NTDLL.DLL
API-MS-Win-Security-Base-L1-1-0.dll
API-MS-WIN-Service-Core-L1-1-0.dll
API-MS-WIN-Service-winsvc-L1-1-0.dll
RPCRT4.dll
ole32.dll
ntdll.dll
_amsg_exit
RegCloseKey
RegOpenKeyExW
GetProcessHeap
svchost.pdb
version="5.1.0.0"
name="Microsoft.Windows.Services.SvcHost"
<description>Host Process for Windows Services</description>
<requestedExecutionLevel
Software\Microsoft\Windows NT\CurrentVersion\Svchost
Software\Microsoft\Windows NT\CurrentVersion\MgdSvchost
\PIPE\
Host Process for Windows Services
6.1.7600.16385 (win7_rtm.090713-1255)
svchost.exe
Windows
Operating System
6.1.7600.16385
Explorer.EXE_1440_rwx_047C1000_00071000:
UDPSockError
NMUDP
Errmsg
Port
TNMUDP
TNMUDPxp|
RemotePort
LocalPort
ReportLevel4o|
0.0.0.0
%d.%d.%d.%d
Portt:
AutoHotkeysp
AutoHotkeys
:].tJ
EInvalidGraphicOperation
KeyPreview
WindowStatep
OnKeyDown
OnKeyPressL~~
OnKeyUp
ssHotTrack
TWindowState
poProportional
TWMKey
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
vcltest3.dll
Uh%u~
TDragOperation
TKeyEvent
TKeyPressEvent
crSQLWait
%s (%s)
IMM32.DLL
EInvalidOperation
%s[%d]
%s_%d
USER32.DLL
comctl32.dll
MSWHEEL_ROLLMSG
MSH_WHEELSUPPORT_MSG
MSH_SCROLL_LINES_MSG
kernel32.dll
Portions Copyright (c) 1983,99 Borland
explorer.exe
Software\Microsoft\Windows\CurrentVersion\Explorer
*.TMP
Kernel32.dll
ADVAPI32.dll
RegOpenKeyExA
RegCloseKey
readbook.exe
rundll32.exe
wry.exe
*.exe
*.scr
UdpT
UdpOnDataReceived
xxtype.cpp
derv->tpClass.tpcFlags & CF_HAS_BASES
Inappropriate I/O control operation
Broken pipe
Operation not permitted
%H:%M:%S
%m/%d/%y
%A, %B %d, %Y
d/d/d d:d:d.d
An exception (X) occurred during DllEntryPoint or DllMain in module:
xx.cpp
varType->tpClass.tpcFlags & CF_HAS_DTOR
varType->tpClass.tpcDtorAddr
(errPtr->ERRcInitDtc >= varType->tpClass.tpcDtorCount) || flags
memType->tpClass.tpcFlags & CF_HAS_DTOR
varType->tpArr.tpaElemType->tpClass.tpcFlags & CF_HAS_DTOR
dttPtr->dttType->tpPtr.tppBaseType->tpClass.tpcFlags & CF_HAS_DTOR
IS_CLASS(dttPtr->dttType->tpMask) && (dttPtr->dttType->tpClass.tpcFlags & CF_HAS_DTOR)
elemType->tpClass.tpcFlags & CF_HAS_DTOR
hu2.iu
ReportLevel
GetCPInfo
GetProcessHeap
GetWindowsDirectoryA
RegCreateKeyExA
RegFlushKey
SetViewportOrgEx
ActivateKeyboardLayout
EnumThreadWindows
EnumWindows
GetKeyNameTextA
GetKeyState
GetKeyboardLayout
GetKeyboardLayoutList
GetKeyboardState
GetKeyboardType
LoadKeyboardLayoutA
MapVirtualKeyA
MsgWaitForMultipleObjects
SetWindowsHookExA
UnhookWindowsHookEx
€00404
8 @ @ @ @ @
.text
`.data
.idata
@.edata
@.rsrc
@.reloc
External exception %x
Interface not supported
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
Win32 Error. Code: %d.
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted%Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'
Invalid variant operation"Variant method calls not supported
I/O error %d
Integer overflow Invalid floating point operation
Invalid data type for '%s'
Failed to set data for '%s'
Failed to get data for '%s'/Menu '%s' is already being used by another form*Windows socket error: %s (%d), on API '%s'
Asynchronous socket error %d
- Dock zone has no control%List does not allow duplicates ($0%x)!'%s' is not a valid integer value
Alt Clipboard does not support Icons
!Control '%s' has no parent window
Error reading %s%s%s: %s
Ancestor for '%s' not found
Unsupported clipboard format
Class %s not found
Resource %s not found
List index out of bounds (%d) List capacity out of bounds (%d)
List count out of bounds (%d) Operation not allowed on sorted string list%String list does not allow duplicates#A component named %s already exists$''%s'' is not a valid component name
A class named %s already exists
Cannot assign a %s to a %s
Cannot create file %s
Cannot open file %s
conhost.exe_1648_rwx_01211000_00071000:
UDPSockError
NMUDP
Errmsg
Port
TNMUDP
TNMUDPxp!
RemotePort
LocalPort
ReportLevel4o!
0.0.0.0
%d.%d.%d.%d
Portt:%
AutoHotkeysp
AutoHotkeys
:].tJ
EInvalidGraphicOperation
KeyPreview
WindowStatep
OnKeyDown
OnKeyPressL~#
OnKeyUp
ssHotTrack
TWindowState
poProportional
TWMKey
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
vcltest3.dll
Uh%u#
TDragOperation
TKeyEvent
TKeyPressEvent
crSQLWait
%s (%s)
IMM32.DLL
EInvalidOperation
%s[%d]
%s_%d
USER32.DLL
comctl32.dll
MSWHEEL_ROLLMSG
MSH_WHEELSUPPORT_MSG
MSH_SCROLL_LINES_MSG
kernel32.dll
Portions Copyright (c) 1983,99 Borland
explorer.exe
Software\Microsoft\Windows\CurrentVersion\Explorer
*.TMP
Kernel32.dll
ADVAPI32.dll
RegOpenKeyExA
RegCloseKey
readbook.exe
rundll32.exe
wry.exe
*.exe
*.scr
UdpT
UdpOnDataReceived
xxtype.cpp
derv->tpClass.tpcFlags & CF_HAS_BASES
Inappropriate I/O control operation
Broken pipe
Operation not permitted
%H:%M:%S
%m/%d/%y
%A, %B %d, %Y
d/d/d d:d:d.d
An exception (X) occurred during DllEntryPoint or DllMain in module:
xx.cpp
varType->tpClass.tpcFlags & CF_HAS_DTOR
varType->tpClass.tpcDtorAddr
(errPtr->ERRcInitDtc >= varType->tpClass.tpcDtorCount) || flags
memType->tpClass.tpcFlags & CF_HAS_DTOR
varType->tpArr.tpaElemType->tpClass.tpcFlags & CF_HAS_DTOR
dttPtr->dttType->tpPtr.tppBaseType->tpClass.tpcFlags & CF_HAS_DTOR
IS_CLASS(dttPtr->dttType->tpMask) && (dttPtr->dttType->tpClass.tpcFlags & CF_HAS_DTOR)
elemType->tpClass.tpcFlags & CF_HAS_DTOR
hu2.iu
ReportLevel
GetCPInfo
GetProcessHeap
GetWindowsDirectoryA
RegCreateKeyExA
RegFlushKey
SetViewportOrgEx
ActivateKeyboardLayout
EnumThreadWindows
EnumWindows
GetKeyNameTextA
GetKeyState
GetKeyboardLayout
GetKeyboardLayoutList
GetKeyboardState
GetKeyboardType
LoadKeyboardLayoutA
MapVirtualKeyA
MsgWaitForMultipleObjects
SetWindowsHookExA
UnhookWindowsHookEx
€00404
8 @ @ @ @ @
.text
`.data
.idata
@.edata
@.rsrc
@.reloc
External exception %x
Interface not supported
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
Win32 Error. Code: %d.
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted%Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'
Invalid variant operation"Variant method calls not supported
I/O error %d
Integer overflow Invalid floating point operation
Invalid data type for '%s'
Failed to set data for '%s'
Failed to get data for '%s'/Menu '%s' is already being used by another form*Windows socket error: %s (%d), on API '%s'
Asynchronous socket error %d
- Dock zone has no control%List does not allow duplicates ($0%x)!'%s' is not a valid integer value
Alt Clipboard does not support Icons
!Control '%s' has no parent window
Error reading %s%s%s: %s
Ancestor for '%s' not found
Unsupported clipboard format
Class %s not found
Resource %s not found
List index out of bounds (%d) List capacity out of bounds (%d)
List count out of bounds (%d) Operation not allowed on sorted string list%String list does not allow duplicates#A component named %s already exists$''%s'' is not a valid component name
A class named %s already exists
Cannot assign a %s to a %s
Cannot create file %s
Cannot open file %s
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
WerFault.exe:3568
wermgr.exe:160 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
C:\Windows\Temp\WER2146.tmp.WERInternalMetadata.xml (51540 bytes)
C:\Windows\Temp\WER2157.tmp.hdmp (133646 bytes)
C:\Windows\Temp\WER21D5.tmp.mdmp (117249 bytes)
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_acefd23b6d9b11f337fb2b1ec85b4b86295a42_cab_0df5222f\Report.wer (146554 bytes)
C:\Windows\Temp\WER2126.tmp.appcompat.txt (2056 bytes)
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_acefd23b6d9b11f337fb2b1ec85b4b86295a42_cab_0df5222f\WER2146.tmp.WERInternalMetadata.xml (3 bytes)
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_acefd23b6d9b11f337fb2b1ec85b4b86295a42_cab_0df5222f\WER21D5.tmp.mdmp (5873 bytes)
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_acefd23b6d9b11f337fb2b1ec85b4b86295a42_cab_0df5222f\WER2157.tmp.hdmp (7433 bytes)
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_acefd23b6d9b11f337fb2b1ec85b4b86295a42_cab_0df5222f\WER2126.tmp.appcompat.txt (3 bytes)
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_acefd23b6d9b11f337fb2b1ec85b4b86295a42_cab_0df5222f\Report.wer.tmp (151984 bytes)
C:\Windows\svchost.exe (1281 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\dca1821.tmp (11190 bytes) - Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.