AIT.Trojan.Autoit.CJS_0b75e43c8f

by malwarelabrobot on May 22nd, 2016 in Malware Descriptions.

HEUR:Trojan.Script.Generic (Kaspersky), AIT:Trojan.Autoit.CJS (AdAware), Worm.Win32.AutoIt.FD, WormAutoItGen.YR (Lavasoft MAS)
Behaviour: Trojan, Worm


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: 0b75e43c8fea6f6ca8110e307486ecf6
SHA1: 3c576584aebbfdf78ec1559c826f728b6d991433
SHA256: 8d23b7b2f0bac1036bcfa70664bea73eaabbaf3d1a6e950b0e0a5bce7c99a65d
SSDeep: 12288:jLkcoxg7v3qnC11ErwIhh0F4qwUgUnyI801BSC:3fmMv6Ckr7MnyI8IBl
Size: 667689 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: UPolyXv05_v6
Company: Dwndr GmbH
Created at: 2010-03-07 18:08:39
Analyzed on: WindowsXP SP3 32-bit


Summary:

Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).

Payload

No specific payload has been found.

Process activity

The AIT creates the following process(es):

cliconf.chm:1176
cliconf.chm:1500
cliconf.chm:1216
cliconf.chm:1512
net1.exe:1836
net1.exe:356
net1.exe:1976
net1.exe:1568
net1.exe:244
net1.exe:284
svchost.com:388
svchost.com:580
net.exe:1608
net.exe:1052
net.exe:776
net.exe:1220
net.exe:900
net.exe:1408
%original file name%.exe:1968
cftmon.exe:484
cftmon.exe:1808

The AIT injects its code into the following process(es):
No processes have been created.

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process svchost.com:388 makes changes in the file system.
The AIT creates and/or writes to the following file(s):

%Program Files%\Common Files\System\cftmon.exe (4545 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\temp.db (2 bytes)
C:\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\desktop.ini (193 bytes)
%Documents and Settings%\%current user%\Templates\cache\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\desktop.ini (193 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\cartman[1].htm (73 bytes)
C:\autorun.inf (303 bytes)
%System%\fdisk.com (4545 bytes)
%Documents and Settings%\%current user%\Templates\cache\desktop.ini (193 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\crump.dat (4545 bytes)
%Documents and Settings%\%current user%\Start Menu\Programs\Startup\sndvol32.exe (4545 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Templates\cache\SFCsrvc.pif (4545 bytes)
%WinDir%\Help\cliconf.chm (4545 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\scr\data.scr (1281 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\tmp.db (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\scr\logon.exe (4545 bytes)
%Documents and Settings%\All Users\Start Menu\Programs\Startup\sndvol32.exe (4545 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\desktop.ini (67 bytes)
C:\Thumbs.db (4545 bytes)

The AIT deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\cartman[1].htm (0 bytes)

The process svchost.com:580 makes changes in the file system.
The AIT creates and/or writes to the following file(s):

C:\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\temp.db (2 bytes)
%Documents and Settings%\%current user%\Templates\cache\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\temp.db (2 bytes)
%Documents and Settings%\%current user%\Templates\cache\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\tmp.db (2 bytes)
C:\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\tmp.db (2 bytes)
C:\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\crump.dat (4545 bytes)
%Documents and Settings%\%current user%\Templates\cache\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\crump.dat (4545 bytes)

The process %original file name%.exe:1968 makes changes in the file system.
The AIT creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\desktop.ini (193 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\svchost.com (4545 bytes)

Registry activity

The process cliconf.chm:1176 makes changes in the system registry.
The AIT creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6A AA 68 7D E4 52 A1 AD B5 8C 31 8C 5F FB 21 0D"

The process cliconf.chm:1500 makes changes in the system registry.
The AIT creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "93 6C 11 89 73 E3 C3 DD F7 E1 65 A4 5A 3B 4B 43"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

The process cliconf.chm:1216 makes changes in the system registry.
The AIT creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E5 73 98 12 81 89 FB D3 08 68 62 2F 47 E6 4E 7C"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

The process cliconf.chm:1512 makes changes in the system registry.
The AIT creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "57 77 2E 3D 24 8E 5D C6 B8 0B C3 74 B2 33 BD 9F"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

The process net1.exe:1836 makes changes in the system registry.
The AIT creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EA 73 4D 4D D7 AD 6F 45 AE C8 A9 4F 02 88 80 18"

The process net1.exe:356 makes changes in the system registry.
The AIT creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9C FB 17 E0 3A 7A D8 D1 40 F8 E5 BE 13 FF FC DA"

The process net1.exe:1976 makes changes in the system registry.
The AIT creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F9 51 D0 77 A2 09 60 37 B2 A5 E9 67 75 09 38 87"

The process net1.exe:1568 makes changes in the system registry.
The AIT creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "43 A1 A4 42 56 03 0A 0F 06 84 3E AE 25 B6 CA 26"

The process net1.exe:244 makes changes in the system registry.
The AIT creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "31 09 1C 91 0A 64 72 5A D9 9C F1 CD 01 DB EF 23"

The process net1.exe:284 makes changes in the system registry.
The AIT creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F1 49 38 E1 FA 54 9F 44 B1 8A 32 28 BD 62 A5 33"

The process svchost.com:388 makes changes in the system registry.
The AIT creates and/or sets the following values in system registry:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1D 00 00 00 01 00 00 00 00 00 00 00"

[HKLM\System\CurrentControlSet\Control\Lsa]
"forceguest" = "0"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system]
"NoAdminPage" = "1"

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\@%SystemRoot%\system32]
"shell32.dll,-22557" = "Begins a game of Minesweeper."

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Startup" = "%Documents and Settings%\%current user%\Start Menu\Programs\Startup"

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\@%SystemRoot%\system32]
"shell32.dll,-22552" = "View and modify local security policy, such as user rights and audit policies."

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashdisp.exe]
"debugger" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com Kll_dis"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"

[HKLM\System\CurrentControlSet\Control\Terminal Server]
"AllowTSConnections" = "1"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"Hidden" = "2"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPTRAY.EXE]
"debugger" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com Kll_dis"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Network]
"NoFileSharingControl" = "1"

[HKCR\Network\SharingHandler]
"(Default)" = ""

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Network]
"NoFileSharing" = "0"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"ShowSuperHidden" = "0"

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\@%Program Files%\MSN Gaming Zone\Windows]
"chkrres.dll,-1213" = "Play the board game Checkers with another person over the Internet."

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\@%SystemRoot%\system32]
"shell32.dll,-22542" = "Begins the Freecell card game."
"shell32.dll,-22541" = "Displays monitoring and troubleshooting messages from Windows and other programs."

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Programs" = "%Documents and Settings%\%current user%\Start Menu\Programs"

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\@%SystemRoot%\system32]
"shell32.dll,-22572" = "Begins the Solitaire card game."

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\@%Program Files%\MSN Gaming Zone\Windows]
"hrtzres.dll,-1213" = "Play the card game Hearts with other people from around the world."

[HKLM\System\CurrentControlSet\Control\Terminal Server]
"fDenyTSConnections" = "0"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp]
"Application" = "xmspaint.exe"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt]
"Application" = "xnotepad.exe"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Network]
"NoFileSharing" = "0"

[HKLM\System\CurrentControlSet\Control\Remote Assistance]
"fAllowFullControl" = "1"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"GlobalUserOffline" = "0"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\@%Program Files%\Movie Maker]
"wmm2res.dll,-63096" = "Capture and edit digital media on your computer and then share your saved movies by e-mail, the Internet, recordable CD, or on a DV video tape."

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\@%Program Files%\MSN Gaming Zone\Windows]
"bckgres.dll,-1213" = "Play the board game Backgammon with another person over the Internet."

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\@%SystemRoot%\inf]
"unregmp2.exe,-155" = "Plays your digital media including music, videos, CDs, DVDs, and Internet Radio."

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe]
"debugger" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com Kll_dis"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
"Common Startup" = "%Documents and Settings%\All Users\Start Menu\Programs\Startup"

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\@%SystemRoot%\system32]
"shell32.dll,-22571" = "Starts and stop services."

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe]
"debugger" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com Kll_dis"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"

[HKLM\System\CurrentControlSet\Control\Terminal Server]
"fAllowToGetHelp" = "1"

[HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows]
"load" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com"

[HKCU\Control Panel\Desktop]
"SCRNSAVE.EXE" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\scr\logon.exe"

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DE 6C 26 E7 01 1A 74 BF 74 98 4B 04 6C 8A 25 8A"

[HKLM\System\CurrentControlSet\Control\Remote Assistance]
"CreateEncryptedOnlyTickets" = "1"

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\@%SystemRoot%\system32]
"shell32.dll,-22567" = "Displays graphs of system performance and configures data logs and alerts."
"shell32.dll,-22569" = "Begins a game of 3-D Pinball."

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg]
"Application" = "xmspaint.exe"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg]
"Application" = "xmspaint.exe"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Network]
"NoPrintSharing" = "0"

[HKCU\Software\vlad]
"iminf" = "2.0.11.1"

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\@%Program Files%\MSN Gaming Zone\Windows]
"shvlres.dll,-1213" = "Play the card game Spades with other people from around the world."

[HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows]
"run" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\@%SystemRoot%\system32]
"spider.exe,-57" = "Begins the Spider Solitaire card game."

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"

[HKLM\System\CurrentControlSet\Control\Remote Assistance]
"MaxTicketExpiry" = "99"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsgui.exe]
"debugger" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com Kll_dis"

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%System%]
"net.exe" = "Net Command"

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\@%SystemRoot%\system32]
"rcbdyctl.dll,-151" = "Lets you invite a friend to connect to your computer and help you with problems."

[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe]
"debugger" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com Kll_dis"

[HKLM\System\CurrentControlSet\Control\Remote Assistance]
"MaxTicketExpiryUnits" = "1"

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\@%Program Files%\MSN Gaming Zone\Windows]
"rvseres.dll,-1213" = "Play the board game Reversi with another person over the Internet."

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\resmon.exe]
"debugger" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com Kll_dis"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe]
"debugger" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com Kll_dis"

[HKLM\System\CurrentControlSet\Control\Remote Assistance]
"fAllowToGetHelp" = "1"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctstray.exe]
"debugger" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com Kll_dis"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.EXE]
"debugger" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com Kll_dis"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\@%System%]
"comres.dll,-662" = "Configures and manages COM applications"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Network]
"NoPrintSharing" = "0"

[HKCU\Software\Microsoft\Command Processor]
"AutoRun" = "%WinDir%\Help\cliconf.chm"

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache]
"@xpsp1res.dll,-11005" = "Sends and receives e-mail and newsgroup messages."
"@xpsp1res.dll,-11002" = "Finds and displays information and Web sites on the Internet."

[HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Network]
"NoFileSharingControl" = "1"

[HKCR\LibraryFolder\shellex\SharingHandler]
"(Default)" = ""

[HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System]
"DisableRegistryTools" = "1"

[HKCU\Software\Classes\Applications\xnotepad.exe\shell\open\command]
"(Default)" = "%Program Files%\Common Files\System\cftmon.exe %1"

[HKCU\Software\Classes\Applications\xmspaint.exe\shell\open\command]
"(Default)" = "%Program Files%\Common Files\System\cftmon.exe %1"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGNT.EXE]
"debugger" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com Kll_dis"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System]
"NoAdminPage" = "1"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"HideFileExt" = "2"

[HKLM\SOFTWARE\Policies\Microsoft\Windows\System]
"DisableGPO" = "1"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList]
"Network_Service" = "0"

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\@%SystemRoot%\system32]
"shell32.dll,-22537" = "Adds, removes, and configures Open Database Connectivity (ODBC) data sources and drivers."
"shell32.dll,-22535" = "Manages disks and provides access to other tools to manage local and remote computers."

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf]
"Application" = "xnotepad.exe"

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\c:\program files\common files\system]
"cftmon.exe" = "Generic Host Process for Win32 Services"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\USBGUARD.EXE]
"debugger" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com Kll_dis"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoFolderOptions" = "1"

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\@%SystemRoot%\system32]
"mshearts.exe,-414" = "Begins the Hearts card game."

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Programs" = "%Documents and Settings%\All Users\Start Menu\Programs"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"keeprasconnections" = "1"

The AIT modifies IE settings for security zones to map all urls to the Intranet Zone:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"

The AIT adds the reference to itself to be executed when a user logs on:

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Shell" = "explorer.exe %System%\fdisk.com"

To automatically run itself each time Windows is booted, the AIT adds the following link to its file to the system registry autorun key:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"User Agent" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com"

"HotKey" = "%Documents and Settings%\%current user%\Templates\cache\SFCsrvc.pif"

Proxy settings are disabled:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"

The AIT adds the reference to itself to be executed when a user logs on:

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"UserInit" = "%System%\userinit.exe,%System%\fdisk.com"

Task Manager is disabled:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System]
"DisableTaskMgr" = "1"

To automatically run itself each time Windows is booted, the AIT adds the following link to its file to the system registry autorun key:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"HotKey" = "%Documents and Settings%\%current user%\Templates\cache\SFCsrvc.pif"

The AIT modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"

To automatically run itself each time Windows is booted, the AIT adds the following link to its file to the system registry autorun key:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"User Agent" = "%System%\fdisk.com"

The AIT modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass" = "1"

The AIT deletes the following value(s) in system registry:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyOverride"
"ProxyServer"

"AutoConfigURL"

The AIT disables automatic startup of the application by deleting the following autorun value:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RemoteInfectionBU"

"RemoteInfection"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"RemoteInfection"

"RemoteInfectionBU"

The process svchost.com:580 makes changes in the system registry.
The AIT creates and/or sets the following values in system registry:

[HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows]
"run" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System]
"DisableRegistryTools" = "1"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGNT.EXE]
"debugger" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com Kll_dis"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"HideFileExt" = "2"

[HKLM\SOFTWARE\Policies\Microsoft\Windows\System]
"DisableGPO" = "1"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctsgui.exe]
"debugger" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com Kll_dis"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe]
"debugger" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com Kll_dis"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashdisp.exe]
"debugger" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com Kll_dis"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"ShowSuperHidden" = "0"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\USBGUARD.EXE]
"debugger" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com Kll_dis"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe]
"debugger" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com Kll_dis"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe]
"debugger" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com Kll_dis"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"Hidden" = "2"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPTRAY.EXE]
"debugger" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com Kll_dis"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\resmon.exe]
"debugger" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com Kll_dis"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoFolderOptions" = "1"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe]
"debugger" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com Kll_dis"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Startup" = "%Documents and Settings%\%current user%\Start Menu\Programs\Startup"

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8E 35 1E 54 E6 F7 F3 DF FA BB E0 07 C4 4C F4 A3"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pctstray.exe]
"debugger" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com Kll_dis"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.EXE]
"debugger" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com Kll_dis"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Command Processor]
"AutoRun" = "%WinDir%\Help\cliconf.chm"

[HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows]
"load" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com"

To automatically run itself each time Windows is booted, the AIT adds the following link to its file to the system registry autorun key:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"HotKey" = "%Documents and Settings%\%current user%\Templates\cache\SFCsrvc.pif"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"HotKey" = "%Documents and Settings%\%current user%\Templates\cache\SFCsrvc.pif"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"User Agent" = "%System%\fdisk.com"

The AIT adds the reference to itself to be executed when a user logs on:

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"UserInit" = "%System%\userinit.exe,%System%\fdisk.com"

"Shell" = "explorer.exe %System%\fdisk.com"

To automatically run itself each time Windows is booted, the AIT adds the following link to its file to the system registry autorun key:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"User Agent" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com"

Task Manager is disabled:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System]
"DisableTaskMgr" = "1"

The process net.exe:1608 makes changes in the system registry.
The AIT creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "16 15 26 E5 F7 D9 40 DF 65 F0 30 0C 5D BA B1 FF"

The process net.exe:1052 makes changes in the system registry.
The AIT creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6A 1D 81 4B 05 85 22 6B BD 89 6C 11 72 0F 5C B1"

The process net.exe:776 makes changes in the system registry.
The AIT creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AD EB 7B A3 BF 8E DC 1A AE D7 A3 93 C6 44 E8 1F"

The process net.exe:1220 makes changes in the system registry.
The AIT creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "61 E2 94 9C 5A 38 1C 15 B8 6A 49 FD 23 54 FA 3D"

The process net.exe:900 makes changes in the system registry.
The AIT creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9B D1 EB EB 13 17 20 87 E7 9D AE 5D D4 22 AB 57"

The process net.exe:1408 makes changes in the system registry.
The AIT creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "67 C6 F9 63 B8 83 9B F5 EA 28 1C D8 10 3E FA 01"

The process %original file name%.exe:1968 makes changes in the system registry.
The AIT creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0D EF F1 F5 CD FC 27 DF 31 E8 96 95 EE BB 43 AF"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp]
"svchost.com" = "Generic Host Process for Win32 Services"

The AIT modifies IE settings for security zones to map all urls to the Intranet Zone:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"

The AIT modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:

"UNCAsIntranet" = "1"

The AIT modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:

"ProxyBypass" = "1"

The process cftmon.exe:484 makes changes in the system registry.
The AIT creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AD B3 9F 79 B1 87 4D 81 2B 68 02 FF E0 5E 5C 1E"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

The process cftmon.exe:1808 makes changes in the system registry.
The AIT creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2B 50 63 7C 53 3D 0B 93 85 77 BE A3 65 86 76 FC"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"

The AIT modifies IE settings for security zones to map all urls to the Intranet Zone:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"

The AIT modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:

"UNCAsIntranet" = "1"

The AIT modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:

"ProxyBypass" = "1"

Dropped PE files

MD5 File path
9fad7dff67555ff1e06bc4a3893024a7 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\scr\data.scr

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

VersionInfo

Company Name:
Product Name:
Product Version:
Legal Copyright: (c) Microsoft Corporation. All rights reserved.
Legal Trademarks:
Original Filename:
Internal Name:
File Version: 2.0.11.1
File Description: Generic Host Process for Win32 Services
Comments:
Language: English (United States)

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 4096 524311 524800 4.59881 6c20c6bf686768b6f134f5bd508171bc
.rdata 532480 55644 55808 3.15551 321c940899050104ced482b1e5bf7a0e
.data 589824 107800 26624 1.52615 e5d77411f751d28c6eee48a743606795
.rsrc 700416 35896 36352 3.9819 c4ba2da00dc827ee856e5efa199076a8

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

URL IP
hxxp://ne1.wac.v4cdn.net/got07s.jpg
hxxp://tinypic.com/images/404.gif 209.17.68.209
hxxp://11776.BODIS.com/cartman.php
hxxp://frankie_2kx.0fees.net/cartman.php 199.59.243.120
hxxp://i43.tinypic.com/got07s.jpg 68.232.35.169
neothedm.isa-geek.org 184.169.144.229


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile

Traffic

GET /cartman.php HTTP/1.1
User-Agent: AutoIt
Host: frankie_2kx.0fees.net
Cache-Control: no-cache


HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Wed, 18 May 2016 01:57:34 GMT
Accept-Ranges: bytes
ETag: "0bb4a5a8b0d11:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sat, 21 May 2016 13:43:56 GMT
Content-Length: 2324
<!DOCTYPE html><!--[if lt IE 7 ]><html class="ie6">&
lt;![endif]--><!--[if IE 7 ]><html class="ie7"><![en
dif]--><!--[if IE 8 ]><html class="ie8"><![endif]--&
gt;<!--[if IE 9 ]><html class="ie9"><![endif]--><
!--[if (gt IE 9)|!(IE)]>--><html><head><meta http
-equiv="Content-Type" content="text/html; charset=utf-8"><title&
gt;</title><meta name="viewport" content="width=device-width,
initial-scale=1"><noscript><meta HTTP-EQUIV="REFRESH" con
tent="0; url=/legacy"></noscript></head><body><
;script type="text/javascript">g_oV=(function(){var.Dv=document,ayG
=location,C_=Dv.createElement('script'),azL=false,LE;C_.defer=true;C_.
async=true;C_.src="//VVV.google.com/adsense/domains/caf.js";C_.onerror
=function(){ayG.href='/legacy';};C_.onload=C_.onreadystatechange=funct
ion(){if(!azL&&LE){if(!window['googleNDT_']){ayG.replace('/legacy');}.
LE(google.ads.domains.Caf);}.azL=true;};Dv.body.appendChild(C_);return
{ayv:function(oo){if(azL).oo(google.ads.domains.Caf);else.LE=oo;},bq:f
unction(){if(!azL){Dv.body.removeChild(C_);}}};})();g_oX=(function(){v
ar.ayG=window.location,nQ={},bH,ayF=ayG.search.substring(1),azD,azF;if
(!ayF).return nQ;azD=ayF.split("&");for(bH=0;bH<azD.length;bH ){az
F=azD[bH].split('=');nQ[azF[0]]=azF[1]?azF[1]:"";}.return nQ;})();(fun
ction(){var azx=screen,QW=window,ayG=QW.location,azK=top.location,Dv=d
ocument,RH=Dv.body||Dv.getElementsByTagName('body')[0],azH=0,azG=0

<<< skipped >>>

GET /cartman.php HTTP/1.1
User-Agent: AutoIt
Host: frankie_2kx.0fees.net


HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Wed, 18 May 2016 01:57:34 GMT
Accept-Ranges: bytes
ETag: "0bb4a5a8b0d11:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sat, 21 May 2016 13:43:55 GMT
Content-Length: 2324
<!DOCTYPE html><!--[if lt IE 7 ]><html class="ie6">&
lt;![endif]--><!--[if IE 7 ]><html class="ie7"><![en
dif]--><!--[if IE 8 ]><html class="ie8"><![endif]--&
gt;<!--[if IE 9 ]><html class="ie9"><![endif]--><
!--[if (gt IE 9)|!(IE)]>--><html><head><meta http
-equiv="Content-Type" content="text/html; charset=utf-8"><title&
gt;</title><meta name="viewport" content="width=device-width,
initial-scale=1"><noscript><meta HTTP-EQUIV="REFRESH" con
tent="0; url=/legacy"></noscript></head><body><
;script type="text/javascript">g_oV=(function(){var.Dv=document,ayG
=location,C_=Dv.createElement('script'),azL=false,LE;C_.defer=true;C_.
async=true;C_.src="//VVV.google.com/adsense/domains/caf.js";C_.onerror
=function(){ayG.href='/legacy';};C_.onload=C_.onreadystatechange=funct
ion(){if(!azL&&LE){if(!window['googleNDT_']){ayG.replace('/legacy');}.
LE(google.ads.domains.Caf);}.azL=true;};Dv.body.appendChild(C_);return
{ayv:function(oo){if(azL).oo(google.ads.domains.Caf);else.LE=oo;},bq:f
unction(){if(!azL){Dv.body.removeChild(C_);}}};})();g_oX=(function(){v
ar.ayG=window.location,nQ={},bH,ayF=ayG.search.substring(1),azD,azF;if
(!ayF).return nQ;azD=ayF.split("&");for(bH=0;bH<azD.length;bH ){az
F=azD[bH].split('=');nQ[azF[0]]=azF[1]?azF[1]:"";}.return nQ;})();(fun
ction(){var azx=screen,QW=window,ayG=QW.location,azK=top.location,Dv=d
ocument,RH=Dv.body||Dv.getElementsByTagName('body')[0],azH=0,azG=0

<<< skipped >>>

GET /images/404.gif HTTP/1.1
User-Agent: AutoIt
Connection: Keep-Alive
Cache-Control: no-cache
Host: tinypic.com


HTTP/1.1 200 OK
Server: Apache
Last-Modified: Tue, 08 Oct 2013 16:51:10 GMT
ETag: "10ec-4e83d935f7b80"
Cache-Control: max-age=21600
Expires: Sat, 21 May 2016 16:08:29 GMT
Content-Type: image/gif
Content-Length: 4332
Accept-Ranges: bytes
Date: Sat, 21 May 2016 13:43:35 GMT
X-Varnish: 2184503180 2182235286
Age: 12906
Via: 1.1 varnish
Connection: keep-alive
X-Varnish-Server: den2tpv66
X-Cache: HIT
GIF89a..x.....K..<}I...j:...#U.7e..5...T..0Oy._..h..M.....k.f...0..
g..Qlo `......A.....*...N.........Y$.....0...*s.C..K....[.[....{YaS...
l...J.....97..@@K.kM..;........B..-....YM.....$.......W2...[........!.
.XMP DataXMP<?xpacket begin="..." id="W5M0MpCehiHzreSzNTczkc9d"?>
; <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c
060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf=
"hXXp://VVV.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description
rdf:about="" xmlns:xmp="hXXp://ns.adobe.com/xap/1.0/" xmlns:xmpMM="htt
p://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="hXXp://ns.adobe.com/xap/1.0
/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS5 Macintosh" x
mpMM:InstanceID="xmp.iid:0B44EA691D4D11E3BC95821A7FCB56DD" xmpMM:Docum
entID="xmp.did:0B44EA6A1D4D11E3BC95821A7FCB56DD"> <xmpMM:Derived
From stRef:instanceID="xmp.iid:0B44EA671D4D11E3BC95821A7FCB56DD" stRef
:documentID="xmp.did:0B44EA681D4D11E3BC95821A7FCB56DD"/> </rdf:D
escription> </rdf:RDF> </x:xmpmeta> <?xpacket end="r
"?>................................................................
..................................................................~}|{
zyxwvutsrqponmlkjihgfedcba`_^]\[ZYXWVUTSRQPONMLKJIHGFEDCBA@?>=<;
:9876543210/.-, *)('&%$#"! .................................!.......,.
.....x......pH,....r.l:...tJ.Z...v..z....G.....z.n.....)....|......m|.
...r.........}....o....e... .. ....5....G.99.g......F.......d...<5.
..E.&....e.......5....?..?&....q.....?...$$....1..? ...........@..

<<< skipped >>>

GET /got07s.jpg HTTP/1.1
User-Agent: AutoIt
Host: i43.tinypic.com
Cache-Control: no-cache


HTTP/1.1 302 Found
Accept-Ranges: bytes
Age: 97
Cache-Control: max-age=300
Content-Type: text/html; charset=iso-8859-1
Date: Sat, 21 May 2016 13:43:35 GMT
Expires: Sat, 21 May 2016 13:46:58 GMT
Location: hXXp://tinypic.com/images/404.gif
Server: Apache
Via: 1.1 varnish
X-Cache: HIT
X-Varnish: 81594298 81573766
X-Varnish-Server: den2tpv69
Content-Length: 217
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html>&
lt;head>.<title>302 Found</title>.</head><body
>.<h1>Found</h1>.<p>The document has moved <a
href="hXXp://tinypic.com/images/404.gif">here</a>.</p>.
</body></html>.HTTP/1.1 302 Found..Accept-Ranges: bytes..A
ge: 97..Cache-Control: max-age=300..Content-Type: text/html; charset=i
so-8859-1..Date: Sat, 21 May 2016 13:43:35 GMT..Expires: Sat, 21 May 2
016 13:46:58 GMT..Location: hXXp://tinypic.com/images/404.gif..Server:
Apache..Via: 1.1 varnish..X-Cache: HIT..X-Varnish: 81594298 81573766.
.X-Varnish-Server: den2tpv69..Content-Length: 217..<!DOCTYPE HTML P
UBLIC "-//IETF//DTD HTML 2.0//EN">.<html><head>.<tit
le>302 Found</title>.</head><body>.<h1>Foun
d</h1>.<p>The document has moved <a href="hXXp://tinypi
c.com/images/404.gif">here</a>.</p>.</body></h
tml>...


The AIT connects to the servers at the folowing location(s):

svchost.com_388:

.text
`.rdata
@.data
.rsrc
s%j.Zf
tGHt.Ht&
tCPh
SSSSh
\$%u#Sj
Please contact the application's support team for more information.
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
GetProcessWindowStation
USER32.DLL
operator
This is a compiled AutoIt script. AV researchers please email [email protected] for support.
uxtheme.dll
kernel32.dll
operand of unlimited repeat could match the empty string
POSIX named classes are supported only within a class
erroffset passed as NULL
POSIX collating elements are not supported
this version of PCRE is not compiled with PCRE_UTF8 support
PCRE does not support \L, \l, \N, \U, or \u
support for \P, \p, and \X has not been compiled
(*VERB) with an argument is not supported
ICMP.DLL
advapi32.dll
RegDeleteKeyExW
KERNEL32.DLL
ADVAPI32.dll
COMCTL32.dll
COMDLG32.dll
GDI32.dll
MPR.dll
ole32.dll
OLEAUT32.dll
PSAPI.DLL
SHELL32.dll
USER32.dll
USERENV.dll
VERSION.dll
WININET.dll
WINMM.dll
WSOCK32.dll
GetProcessHeap
CreatePipe
GetWindowsDirectoryW
GetCPInfo
GetConsoleOutputCP
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegCloseKey
RegOpenKeyExW
SetViewportOrgEx
ShellExecuteExW
SHFileOperationW
ShellExecuteW
RegisterHotKey
GetKeyboardLayoutNameW
ExitWindowsEx
EnumThreadWindows
GetAsyncKeyState
SetKeyboardState
GetKeyboardState
GetKeyState
VkKeyScanW
EnumWindows
EnumChildWindows
MapVirtualKeyW
CloseWindowStation
SetProcessWindowStation
OpenWindowStationW
UnregisterHotKey
keybd_event
InternetCrackUrlW
HttpQueryInfoW
HttpOpenRequestW
HttpSendRequestW
FtpOpenFileW
FtpGetFileSize
InternetOpenUrlW
zcÁ
) .3@ .3@11
33.8 [email protected] .A
1. @132)
 @[email protected] 3
[.33@31))
J.ABBBFFCB@-S
 **"  ) 
**)))*   )
) ,,  (?
 ..,.,*, *)
::9:=:;;<<:9;;
/E.CQH
%%Ö66DZZZ
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
<assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" language="*" processorArchitecture="*" publicKeyToken="6595b64144ccf1df"></assemblyIdentity>
mscoree.dll
>>>AUTOIT NO CMDEXECUTE<<<
CMDLINERAW
CMDLINE
/AutoIt3ExecuteLine
/AutoIt3ExecuteScript
%s (%d) : ==> %s.:
Line %d:
Line %d (File "%s"):
%s (%d) : ==> %s:
AutoIt script files (*.au3, *.a3x)
*.au3;*.a3x
All files (*.*)
#NoAutoIt3Execute
APPSKEY
04090000
%u.%u.%u.%u
0.0.0.0
Mddddd
%s (%d) : ==> %s:
UDPSTARTUP
UDPSHUTDOWN
UDPSEND
UDPRECV
UDPOPEN
UDPCLOSESOCKET
UDPBIND
TRAYGETMSG
TCPSTARTUP
TCPSHUTDOWN
TCPSEND
TCPRECV
TCPNAMETOIP
TCPLISTEN
TCPCONNECT
TCPCLOSESOCKET
TCPACCEPT
SHELLEXECUTEWAIT
SHELLEXECUTE
REGENUMKEY
MSGBOX
ISKEYWORD
HTTPSETUSERAGENT
HTTPSETPROXY
HOTKEYSET
GUIREGISTERMSG
GUIGETMSG
GUICTRLSENDMSG
GUICTRLRECVMSG
FTPSETPROXY
\??\%s
GUI_RUNDEFMSG
SendKeyDelay
SendKeyDownDelay
TCPTimeout
AUTOITCALLVARIABLE%d
255.255.255.255
Keyword
AutoIt.Error
Null Object assignment in FOR..IN loop
Incorrect Object type in FOR..IN loop
HOTKEYPRESSED
AUTOITEXE
WINDOWSDIR
3, 3, 6, 0
HKEY_LOCAL_MACHINE
HKEY_CLASSES_ROOT
HKEY_CURRENT_CONFIG
HKEY_CURRENT_USER
HKEY_USERS
%d/d/d
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com
:%Documents and Settings%\%current user%\Local Settings\Temp\svchost.com
AutoIt supports the __stdcall (WINAPI) and __cdecl calling conventions. The __stdcall (WINAPI) convention is used by default but __cdecl can be used instead. See the DllCall() documentation for details on changing the calling convention.
Missing operator in expression."Unbalanced brackets in expression.
Error parsing function call.0Incorrect number of parameters in function call.'"ReDim" used without an array variable.>Illegal text at the end of statement (one statement per line).1"If" statement has no matching "EndIf" statement.1"Else" statement with no matching "If" statement.2"EndIf" statement with no matching "If" statement.7Too many "Else" statements for matching "If" statement.3"While" statement has no matching "Wend" statement.4"Wend" statement with no matching "While" statement.%Variable used without being declared.XArray variable has incorrect number of subscripts or subscript dimension range exceeded.)Array variable subscript badly formatted.'Subscript used with non-Array variable.&Too many subscripts used for an array.0Missing subscript dimensions in "Dim" statement.NNo variable given for "Dim", "Local", "Global", "Struct" or "Const" statement.0Expected a "=" operator in assignment statement.*Invalid keyword at the start of this line.
Invalid element in a DllStruct.*Unknown option or bad parameter specified.&Unable to load the internet libraries./"Struct" statement has no matching "EndStruct".HUnable to open file, the maximum number of open files has been exceeded.
Invalid file filter given.*Expected a variable in user function call.1"Do" statement has no matching "Until" statement.2"Until" statement with no matching "Do" statement.#"For" statement is badly formatted.2"Next" statement with no matching "For" statement.N"ExitLoop/ContinueLoop" statements only valid from inside a For/Do/While loop.1"For" statement has no matching "Next" statement.@"Case" statement with no matching "Select"or "Switch" statement.:"EndSelect" statement with no matching "Select" statement.ORecursion level has been exceeded - AutoIt will quit to prevent stack overflow.&Cannot make existing variables static.4Cannot make static variables into regular variables.
3This keyword cannot be used after a "Then" keyword.>"Select" statement is missing "EndSelect" or "Case" statement. "If" statements must have a "Then" keyword. Badly formated Struct statement."Cannot assign values to constants..Cannot make existing variables into constants.9Only Object-type variables allowed in a "With" statement.v"long_ptr", "int_ptr" and "short_ptr" DllCall() types have been deprecated. Use "long*", "int*" and "short*" instead.-Object referenced outside a "With" statement.)Nested "With" statements are not allowed."Variable must be of type "Object".1The requested action with this object has failed.8Variable appears more than once in function declaration.2ReDim array can not be initialized in this manner.1An array variable can not be used in this manner.
Can not redeclare a constant.5Can not redeclare a parameter inside a user function.HCan pass constants by reference only to parameters with "Const" keyword.*Can not initialize a variable with itself.$Incorrect way to use this parameter.:"EndSwitch" statement with no matching "Switch" statement.>"Switch" statement is missing "EndSwitch" or "Case" statement.H"ContinueCase" statement with no matching "Select"or "Switch" statement.
String missing closing quote.!Badly formated variable or macro.*Missing separator character after keyword.
2.0.11.1

cftmon.exe_484:

.text
`.rdata
@.data
.rsrc
s%j.Zf
tGHt.Ht&
tCPh
SSSSh
\$%u#Sj
Please contact the application's support team for more information.
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
GetProcessWindowStation
USER32.DLL
operator
This is a compiled AutoIt script. AV researchers please email [email protected] for support.
uxtheme.dll
kernel32.dll
operand of unlimited repeat could match the empty string
POSIX named classes are supported only within a class
erroffset passed as NULL
POSIX collating elements are not supported
this version of PCRE is not compiled with PCRE_UTF8 support
PCRE does not support \L, \l, \N, \U, or \u
support for \P, \p, and \X has not been compiled
(*VERB) with an argument is not supported
ICMP.DLL
advapi32.dll
RegDeleteKeyExW
KERNEL32.DLL
ADVAPI32.dll
COMCTL32.dll
COMDLG32.dll
GDI32.dll
MPR.dll
ole32.dll
OLEAUT32.dll
PSAPI.DLL
SHELL32.dll
USER32.dll
USERENV.dll
VERSION.dll
WININET.dll
WINMM.dll
WSOCK32.dll
GetProcessHeap
CreatePipe
GetWindowsDirectoryW
GetCPInfo
GetConsoleOutputCP
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegCloseKey
RegOpenKeyExW
SetViewportOrgEx
ShellExecuteExW
SHFileOperationW
ShellExecuteW
RegisterHotKey
GetKeyboardLayoutNameW
ExitWindowsEx
EnumThreadWindows
GetAsyncKeyState
SetKeyboardState
GetKeyboardState
GetKeyState
VkKeyScanW
EnumWindows
EnumChildWindows
MapVirtualKeyW
CloseWindowStation
SetProcessWindowStation
OpenWindowStationW
UnregisterHotKey
keybd_event
InternetCrackUrlW
HttpQueryInfoW
HttpOpenRequestW
HttpSendRequestW
FtpOpenFileW
FtpGetFileSize
InternetOpenUrlW
zcÁ
) .3@ .3@11
33.8 [email protected] .A
1. @132)
 @[email protected] 3
[.33@31))
J.ABBBFFCB@-S
 **"  ) 
**)))*   )
) ,,  (?
 ..,.,*, *)
::9:=:;;<<:9;;
/E.CQH
%%Ö66DZZZ
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
<assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" language="*" processorArchitecture="*" publicKeyToken="6595b64144ccf1df"></assemblyIdentity>
mscoree.dll
>>>AUTOIT NO CMDEXECUTE<<<
CMDLINERAW
CMDLINE
/AutoIt3ExecuteLine
/AutoIt3ExecuteScript
%s (%d) : ==> %s.:
Line %d:
Line %d (File "%s"):
%s (%d) : ==> %s:
AutoIt script files (*.au3, *.a3x)
*.au3;*.a3x
All files (*.*)
#NoAutoIt3Execute
APPSKEY
04090000
%u.%u.%u.%u
0.0.0.0
Mddddd
%s (%d) : ==> %s:
UDPSTARTUP
UDPSHUTDOWN
UDPSEND
UDPRECV
UDPOPEN
UDPCLOSESOCKET
UDPBIND
TRAYGETMSG
TCPSTARTUP
TCPSHUTDOWN
TCPSEND
TCPRECV
TCPNAMETOIP
TCPLISTEN
TCPCONNECT
TCPCLOSESOCKET
TCPACCEPT
SHELLEXECUTEWAIT
SHELLEXECUTE
REGENUMKEY
MSGBOX
ISKEYWORD
HTTPSETUSERAGENT
HTTPSETPROXY
HOTKEYSET
GUIREGISTERMSG
GUIGETMSG
GUICTRLSENDMSG
GUICTRLRECVMSG
FTPSETPROXY
\??\%s
GUI_RUNDEFMSG
SendKeyDelay
SendKeyDownDelay
TCPTimeout
AUTOITCALLVARIABLE%d
255.255.255.255
Keyword
AutoIt.Error
Null Object assignment in FOR..IN loop
Incorrect Object type in FOR..IN loop
HOTKEYPRESSED
AUTOITEXE
WINDOWSDIR
3, 3, 6, 0
HKEY_LOCAL_MACHINE
HKEY_CLASSES_ROOT
HKEY_CURRENT_CONFIG
HKEY_CURRENT_USER
HKEY_USERS
%d/d/d
%Program Files%\Common Files\System\cftmon.exe
:%Program Files%\Common Files\System\cftmon.exe
AutoIt supports the __stdcall (WINAPI) and __cdecl calling conventions. The __stdcall (WINAPI) convention is used by default but __cdecl can be used instead. See the DllCall() documentation for details on changing the calling convention.
Missing operator in expression."Unbalanced brackets in expression.
Error parsing function call.0Incorrect number of parameters in function call.'"ReDim" used without an array variable.>Illegal text at the end of statement (one statement per line).1"If" statement has no matching "EndIf" statement.1"Else" statement with no matching "If" statement.2"EndIf" statement with no matching "If" statement.7Too many "Else" statements for matching "If" statement.3"While" statement has no matching "Wend" statement.4"Wend" statement with no matching "While" statement.%Variable used without being declared.XArray variable has incorrect number of subscripts or subscript dimension range exceeded.)Array variable subscript badly formatted.'Subscript used with non-Array variable.&Too many subscripts used for an array.0Missing subscript dimensions in "Dim" statement.NNo variable given for "Dim", "Local", "Global", "Struct" or "Const" statement.0Expected a "=" operator in assignment statement.*Invalid keyword at the start of this line.
Invalid element in a DllStruct.*Unknown option or bad parameter specified.&Unable to load the internet libraries./"Struct" statement has no matching "EndStruct".HUnable to open file, the maximum number of open files has been exceeded.
Invalid file filter given.*Expected a variable in user function call.1"Do" statement has no matching "Until" statement.2"Until" statement with no matching "Do" statement.#"For" statement is badly formatted.2"Next" statement with no matching "For" statement.N"ExitLoop/ContinueLoop" statements only valid from inside a For/Do/While loop.1"For" statement has no matching "Next" statement.@"Case" statement with no matching "Select"or "Switch" statement.:"EndSelect" statement with no matching "Select" statement.ORecursion level has been exceeded - AutoIt will quit to prevent stack overflow.&Cannot make existing variables static.4Cannot make static variables into regular variables.
3This keyword cannot be used after a "Then" keyword.>"Select" statement is missing "EndSelect" or "Case" statement. "If" statements must have a "Then" keyword. Badly formated Struct statement."Cannot assign values to constants..Cannot make existing variables into constants.9Only Object-type variables allowed in a "With" statement.v"long_ptr", "int_ptr" and "short_ptr" DllCall() types have been deprecated. Use "long*", "int*" and "short*" instead.-Object referenced outside a "With" statement.)Nested "With" statements are not allowed."Variable must be of type "Object".1The requested action with this object has failed.8Variable appears more than once in function declaration.2ReDim array can not be initialized in this manner.1An array variable can not be used in this manner.
Can not redeclare a constant.5Can not redeclare a parameter inside a user function.HCan pass constants by reference only to parameters with "Const" keyword.*Can not initialize a variable with itself.$Incorrect way to use this parameter.:"EndSwitch" statement with no matching "Switch" statement.>"Switch" statement is missing "EndSwitch" or "Case" statement.H"ContinueCase" statement with no matching "Select"or "Switch" statement.
String missing closing quote.!Badly formated variable or macro.*Missing separator character after keyword.
2.0.11.1


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    cliconf.chm:1176
    cliconf.chm:1500
    cliconf.chm:1216
    cliconf.chm:1512
    net1.exe:1836
    net1.exe:356
    net1.exe:1976
    net1.exe:1568
    net1.exe:244
    net1.exe:284
    svchost.com:388
    svchost.com:580
    net.exe:1608
    net.exe:1052
    net.exe:776
    net.exe:1220
    net.exe:900
    net.exe:1408
    %original file name%.exe:1968
    cftmon.exe:484
    cftmon.exe:1808

  2. Delete the original AIT file.
  3. Delete or disinfect the following files created/modified by the AIT:

    %Program Files%\Common Files\System\cftmon.exe (4545 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\temp.db (2 bytes)
    C:\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\desktop.ini (193 bytes)
    %Documents and Settings%\%current user%\Templates\cache\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\desktop.ini (193 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\cartman[1].htm (73 bytes)
    C:\autorun.inf (303 bytes)
    %System%\fdisk.com (4545 bytes)
    %Documents and Settings%\%current user%\Templates\cache\desktop.ini (193 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\crump.dat (4545 bytes)
    %Documents and Settings%\%current user%\Start Menu\Programs\Startup\sndvol32.exe (4545 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\desktop.ini (67 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\desktop.ini (67 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
    %Documents and Settings%\%current user%\Templates\cache\SFCsrvc.pif (4545 bytes)
    %WinDir%\Help\cliconf.chm (4545 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\scr\data.scr (1281 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\tmp.db (2 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\scr\logon.exe (4545 bytes)
    %Documents and Settings%\All Users\Start Menu\Programs\Startup\sndvol32.exe (4545 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\desktop.ini (67 bytes)
    C:\Thumbs.db (4545 bytes)
    C:\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\temp.db (2 bytes)
    %Documents and Settings%\%current user%\Templates\cache\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\temp.db (2 bytes)
    %Documents and Settings%\%current user%\Templates\cache\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\tmp.db (2 bytes)
    C:\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\tmp.db (2 bytes)
    C:\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\crump.dat (4545 bytes)
    %Documents and Settings%\%current user%\Templates\cache\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\crump.dat (4545 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\$RECYCLE.BIN\{5F229C11-5039-40E4-8537-6950BB1C9ECC}\desktop.ini (193 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\svchost.com (4545 bytes)

  4. Delete the following value(s) in the autorun key (How to Work with System Registry):

    [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
    "User Agent" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.com"

    [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
    "HotKey" = "%Documents and Settings%\%current user%\Templates\cache\SFCsrvc.pif"

    [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "HotKey" = "%Documents and Settings%\%current user%\Templates\cache\SFCsrvc.pif"

    [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "User Agent" = "%System%\fdisk.com"

  5. Remove the references to the AIT by modifying the following registry value(s) (How to Work with System Registry):

    [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "Shell" = "explorer.exe %System%\fdisk.com"

    [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "UserInit" = "%System%\userinit.exe,%System%\fdisk.com"

  6. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now