Adware.Eorezo.BZ_ccc45d7ac9

by malwarelabrobot on March 31st, 2018 in Malware Descriptions.

Adware.Eorezo.BZ (BitDefender), Adware:Win32/Eorezo (Microsoft), not-a-virus:AdWare.Win32.Eorezo.abyb (Kaspersky), Tuto4PC (fs) (VIPRE), Adware.Downware.11824 (DrWeb), Application.EoRezo (A) (Emsisoft), Artemis!CCC45D7AC954 (McAfee), Adware.Eorezo.BZ (FSecure), Win32:Adware-ASG [PUP] (AVG), Win32:Adware-ASG [PUP] (Avast), TROJ_GEN.R039C0DKP17 (TrendMicro), Adware.Eorezo.BZ (AdAware), Installer.Win32.InnoSetup.FD, Installer.Win32.InnoSetup.2.FD, InstallerInnoSetup.YR (Lavasoft MAS)
Behaviour: Installer, PUP, Adware


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: ccc45d7ac954f43773b1c2b3b64fced5
SHA1: 28d7755b0c639fd27cbd227aa94bd002db3ae17b
SHA256: c5d49b15450f08cf8ad98a9c55c1f07b2d624214e6443bad3a8f412fcfc45419
SSDeep: 12288:BQiGJ0xP82FEILzzV86qHM MBTlPadSfXioRcpMXVJo:BQiMgfKUu9MBTlP0QjcpMXVJo
Size: 476920 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: BorlandDelphi30, UPolyXv05_v6
Company: no certificate found
Created at: 1992-06-20 01:22:17
Analyzed on: Windows7 SP1 32-bit


Summary:

Adware. Delivers advertising content in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions. Users may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program or are frustrated by its effects on system performance.

Payload

No specific payload has been found.

Process activity

The Adware creates the following process(es):

%original file name%.exe:2940
powershell.exe:3712

The Adware injects its code into the following process(es):

ccc45d7ac954f43773b1c2b3b64fced5.tmp:3320

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process ccc45d7ac954f43773b1c2b3b64fced5.tmp:3320 makes changes in the file system.
The Adware creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-E89LH.tmp\itdownload.dll (1489 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-E89LH.tmp\_isetup\_shfoldr.dll (47 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-E89LH.tmp\ex.bat (784 bytes)

The Adware deletes the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-E89LH.tmp\av.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-E89LH.tmp\ex.bat (0 bytes)

The process %original file name%.exe:2940 makes changes in the file system.
The Adware creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-3DDIP.tmp\ccc45d7ac954f43773b1c2b3b64fced5.tmp (1416 bytes)

The process powershell.exe:3712 makes changes in the file system.
The Adware creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-E89LH.tmp\av.txt (25 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VGKKALSO1U8BZKBGSZKO.temp (196 bytes)

Registry activity

The process ccc45d7ac954f43773b1c2b3b64fced5.tmp:3320 makes changes in the system registry.
The Adware creates and/or sets the following values in system registry:

[HKCU\Software\Microsoft\RestartManager\Session0000]
"Sequence" = "1"
"Owner" = "F8 0C 00 00 4F FC 62 08 E1 C7 D3 01"
"SessionHash" = "7B E0 14 F9 FD BD ED BF 61 12 08 CA 07 73 3E 65"

The process powershell.exe:3712 makes changes in the system registry.
The Adware creates and/or sets the following values in system registry:

[HKCU\Software\Classes\Local Settings\MuiCache\63\52C64B7E]
"LanguageList" = "en-US, en"

Dropped PE files

MD5 File path
9303156631ee2436db23827e27337be4 c:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-3DDIP.tmp\ccc45d7ac954f43773b1c2b3b64fced5.tmp
92dc6ef532fbb4a5c3201469a5b5eb63 c:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-E89LH.tmp\_isetup\_shfoldr.dll
d82a429efd885ca0f324dd92afb6b7b8 c:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-E89LH.tmp\itdownload.dll

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

VersionInfo

Company Name: Software
Product Name: stormpverti
Product Version:
Legal Copyright:
Legal Trademarks:
Original Filename:
Internal Name:
File Version:
File Description: stormpverti Setup
Comments: This installation was built with Inno Setup.
Language: Language Neutral

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
CODE 4096 40240 40448 4.59679 c3bd95c4b1a8e5199981e0d9b45fd18c
DATA 45056 592 1024 1.90742 1ee71d84f1c77af85f1f5c278f880572
BSS 49152 3724 0 0 d41d8cd98f00b204e9800998ecf8427e
.idata 53248 2384 2560 3.07115 bb5485bf968b970e5ea81292af2acdba
.tls 57344 8 0 0 d41d8cd98f00b204e9800998ecf8427e
.rdata 61440 24 512 0.14174 9ba824905bf9c7922b6fc87a38b74366
.reloc 65536 2244 0 0 d41d8cd98f00b204e9800998ecf8427e
.rsrc 69632 11264 11264 3.14311 182ff0ee12ca1366581e2c749e900830

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

Total found: 1570
c2670e74ae5e6c7358b72672e696ba74
1aec6551308f8ad3555cf004f62e26ae
58e83676dcc9d43b66f31a45d797e863
46801ab32f366a308168df1bdc88094f
3678999bcce68b2cba554e8cb3d9ec56
e61900c08b3008044f935dde2de8a195
df07cdda0102dd5fd81eadfdd7b76ce4
2d19a4edf8b235ec974d06509c5fe1d2
0cc84a0d8169c47a221eec3431943de5
e674da27b732b5a098d53b197958d896
a51a3bd415ff938a6c7ce5b8d064cc15
2c75aadc27eb3ed7ab8c79c287d5c781
9e952eada97936f6946b4114a6296921
055afb7f7280e79d5e6a088cc7e3d1f9
030da8f487227c1d02e06299c5a99763
741cd0d6a6a77dd9bf9dc2283317610b
6fb4b23627a854df952b05f8b3123531
e57cfaa5070f6f795102defc3bc5375f
6ad349c25f3042bc270763daee689c1a
6c104b2917a053dbc9796320e4afe513
7a0308d652b0c9241db7cc84a0bf9048
35519b182d61601b421bd62f6d1263d2
13284b27d322b50c756b4f2f59bb22e3
f4190fd3d9d2bffbee619464eae8278f
0f93e8c2447dc19fb112a2463cd42b4c
c71b4a81192d6faf4f617fd27292a67e

URLs

URL IP
hxxp://ads.cloud4ads.com/cgi-bin/advert/settags?x_mode=args&x_format=javascript&x_dp_id=1203&x_pub_id=10839&tag=_PSTORMIN__SETUP_INI 204.11.56.48
hxxp://ads.cloud4ads.com/cgi-bin/advert/settags?x_mode=args&x_format=javascript&x_dp_id=1203&x_pub_id=10839&tag=_PSTORM2IN__SETUP_INI&channel=2 204.11.56.48
hxxp://ads.cloud4ads.com/cgi-bin/advert/settags?x_mode=args&x_format=javascript&x_dp_id=1020&x_pub_id=20&tag=_PSTORMIN_AV01 204.11.56.48
hxxp://ads.cloud4ads.com/cgi-bin/advert/settags?x_mode=args&x_format=javascript&x_dp_id=1021&x_pub_id=163&tag=060100WindowsDefender 204.11.56.48


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

Traffic

GET /cgi-bin/advert/settags?x_mode=args&x_format=javascript&x_dp_id=1203&x_pub_id=10839&tag=_PSTORMIN__SETUP_INI HTTP/1.1
Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
Host: ads.cloud4ads.com


HTTP/1.1 200 OK
Date: Fri, 30 Mar 2018 04:38:56 GMT
Server: Apache
Set-Cookie: vsid=915vr2699303362137061; expires=Wed, 29-Mar-2023 04:38:56 GMT; Max-Age=157680000; path=/; domain=ads.cloud4ads.com; HttpOnly
X-Adblock-Key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAKX74ixpzVyXbJprcLfbH4psP4 L2entqri0lzh6pkAaXLPIcclv6DQBeJJjGFWrBIF6QMyFwXT5CCRyjS2penECAwEAAQ==_iU0baNRK4tVpkhQT97gVyV01eor CHWWFjFVrlcHof9LBZv8I394zgkBoPYMY4VLQx0 FE9ttQz8qAa71tmlsw==
Keep-Alive: timeout=5, max=47
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8
5178..<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "hXXp://www
.w3.org/TR/html4/strict.dtd">..<html xmlns="hXXp://VVV.w3.org/19
99/xhtml" data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAKX74ixpzVy
XbJprcLfbH4psP4 L2entqri0lzh6pkAaXLPIcclv6DQBeJJjGFWrBIF6QMyFwXT5CCRyj
S2penECAwEAAQ==_iU0baNRK4tVpkhQT97gVyV01eor CHWWFjFVrlcHof9LBZv8I394zg
kBoPYMY4VLQx0 FE9ttQz8qAa71tmlsw==">..<head><script type="
text/javascript">var abp;</script><script type="text/javas
cript" src="hXXp://ads.cloud4ads.com/px.js?ch=1"></script><
;script type="text/javascript" src="hXXp://ads.cloud4ads.com/px.js?ch=
2"></script><script type="text/javascript">function han
dleABPDetect(){try{var imglog = document.createElement("img");imglog.s
rc="hXXp://ads.cloud4ads.com/sk-logabpstatus.php?a=YnE2eXczOFhUWUdkaTd
PNXNaQkhESjVPV0V3UXJCVTZ3Mmc2OTB4ZllKL2hHQXp0ZUZqVW1rcE5VZ2Z1S3hkQUUza
1lmTGpLdHp1cjIxTVdYbmFGcDd0MFllME44RmpxcWhKSXNRZzJtNlk9&b=" abp;docume
nt.body.appendChild(imglog);}catch(err){}}try{window.onload=handleABPD
etect();}catch(err){}</script><meta name="tids" content="a='8
243' b='10726' c='cloud4ads.com' d='taxo_cat'" /><title>Cloud
4ads.com</title>..<meta http-equiv="Content-Type" content="te
xt/html; charset=UTF-8">..<meta name="viewport" content="width=d
evice-width, initial-scale=1, maximum-scale=1, user-scalable = no">
..<style type="text/css">..*{margin:0; padding:0}..a{text-decora
tion:none; outline:none}..a:hover{text-indent:0; cursor:pointer; o

<<< skipped >>>

GET /cgi-bin/advert/settags?x_mode=args&x_format=javascript&x_dp_id=1203&x_pub_id=10839&tag=_PSTORM2IN__SETUP_INI&channel=2 HTTP/1.1

Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
Host: ads.cloud4ads.com


HTTP/1.1 200 OK
Date: Fri, 30 Mar 2018 04:38:56 GMT
Server: Apache
Set-Cookie: vsid=930vr2699303369822641; expires=Wed, 29-Mar-2023 04:38:56 GMT; Max-Age=157680000; path=/; domain=ads.cloud4ads.com; HttpOnly
X-Adblock-Key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAKX74ixpzVyXbJprcLfbH4psP4 L2entqri0lzh6pkAaXLPIcclv6DQBeJJjGFWrBIF6QMyFwXT5CCRyjS2penECAwEAAQ==_HJv5O9eZwYVPSgJrgdqUCvuVZvM2cb0wjpnnySRqWJ5gRs4ZA2ia3AD5IP1dHnnnsjtatvfkfGxr/ycjWOOHHw==
Keep-Alive: timeout=5, max=122
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8
508f..<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "hXXp://www
.w3.org/TR/html4/strict.dtd">..<html xmlns="hXXp://VVV.w3.org/19
99/xhtml" data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAKX74ixpzVy
XbJprcLfbH4psP4 L2entqri0lzh6pkAaXLPIcclv6DQBeJJjGFWrBIF6QMyFwXT5CCRyj
S2penECAwEAAQ==_HJv5O9eZwYVPSgJrgdqUCvuVZvM2cb0wjpnnySRqWJ5gRs4ZA2ia3A
D5IP1dHnnnsjtatvfkfGxr/ycjWOOHHw==">..<head><script type="
text/javascript">var abp;</script><script type="text/javas
cript" src="hXXp://ads.cloud4ads.com/px.js?ch=1"></script><
;script type="text/javascript" src="hXXp://ads.cloud4ads.com/px.js?ch=
2"></script><script type="text/javascript">function han
dleABPDetect(){try{var imglog = document.createElement("img");imglog.s
rc="hXXp://ads.cloud4ads.com/sk-logabpstatus.php?a=MXNSQ3FNbU1aWXc5dWx
PdXpMM2pNTGhFeVV5a0lOWUhGMHhLTVphd3c3L1dlOG1WaCtTUlJaejkxZnBSbXRndTE4b
TJjdURORythY0MyZGNUR250N3VJUUo0QnZodDl6UWhIS3ZJUXhTVXc9&b=" abp;docume
nt.body.appendChild(imglog);}catch(err){}}try{window.onload=handleABPD
etect();}catch(err){}</script><meta name="tids" content="a='8
243' b='10726' c='cloud4ads.com' d='taxo_cat'" /><title>Cloud
4ads.com</title>..<meta http-equiv="Content-Type" content="te
xt/html; charset=UTF-8">..<meta name="viewport" content="width=d
evice-width, initial-scale=1, maximum-scale=1, user-scalable = no">
..<style type="text/css">..*{margin:0; padding:0}..a{text-decora
tion:none; outline:none}..a:hover{text-indent:0; cursor:pointer; o

<<< skipped >>>

GET /cgi-bin/advert/settags?x_mode=args&x_format=javascript&x_dp_id=1020&x_pub_id=20&tag=_PSTORMIN_AV01 HTTP/1.1

Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
Host: ads.cloud4ads.com


HTTP/1.1 200 OK
Date: Fri, 30 Mar 2018 04:38:57 GMT
Server: Apache
Set-Cookie: vsid=918vr2699303375511969; expires=Wed, 29-Mar-2023 04:38:57 GMT; Max-Age=157680000; path=/; domain=ads.cloud4ads.com; HttpOnly
X-Adblock-Key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAKX74ixpzVyXbJprcLfbH4psP4 L2entqri0lzh6pkAaXLPIcclv6DQBeJJjGFWrBIF6QMyFwXT5CCRyjS2penECAwEAAQ==_Zai7QBYl2a K gch32AwJkWJnXsRmmDNMBTtELQS7l SbotEoXgDRyG42LMPb0Tc27H41vqtg1ipdtcmJX9SAw==
Keep-Alive: timeout=5, max=121
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8
5053..<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "hXXp://www
.w3.org/TR/html4/strict.dtd">..<html xmlns="hXXp://VVV.w3.org/19
99/xhtml" data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAKX74ixpzVy
XbJprcLfbH4psP4 L2entqri0lzh6pkAaXLPIcclv6DQBeJJjGFWrBIF6QMyFwXT5CCRyj
S2penECAwEAAQ==_Zai7QBYl2a K gch32AwJkWJnXsRmmDNMBTtELQS7l SbotEoXgDRy
G42LMPb0Tc27H41vqtg1ipdtcmJX9SAw==">..<head><script type="
text/javascript">var abp;</script><script type="text/javas
cript" src="hXXp://ads.cloud4ads.com/px.js?ch=1"></script><
;script type="text/javascript" src="hXXp://ads.cloud4ads.com/px.js?ch=
2"></script><script type="text/javascript">function han
dleABPDetect(){try{var imglog = document.createElement("img");imglog.s
rc="hXXp://ads.cloud4ads.com/sk-logabpstatus.php?a=WHJwZTVtdSs3TXppTk1
IMlNOZkV3d3pRLzcrNElhS241SXVaV0dHR3haakQ3NjhIdVJLMm4xZE8yUFJRaHFuOG9oY
XNiOExoNlRWbnpkallDQ2RYZmNOeWdFVy9FZHdveWdVR3hKZWtrWW89&b=" abp;docume
nt.body.appendChild(imglog);}catch(err){}}try{window.onload=handleABPD
etect();}catch(err){}</script><meta name="tids" content="a='8
243' b='10726' c='cloud4ads.com' d='taxo_cat'" /><title>Cloud
4ads.com</title>..<meta http-equiv="Content-Type" content="te
xt/html; charset=UTF-8">..<meta name="viewport" content="width=d
evice-width, initial-scale=1, maximum-scale=1, user-scalable = no">
..<style type="text/css">..*{margin:0; padding:0}..a{text-decora
tion:none; outline:none}..a:hover{text-indent:0; cursor:pointer; o

<<< skipped >>>

GET /cgi-bin/advert/settags?x_mode=args&x_format=javascript&x_dp_id=1021&x_pub_id=163&tag=060100WindowsDefender HTTP/1.1

Connection: Keep-Alive
Content-Type: application/x-www-form-urlencoded
Accept: */*
User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
Host: ads.cloud4ads.com


HTTP/1.1 200 OK
Date: Fri, 30 Mar 2018 04:38:59 GMT
Server: Apache
Set-Cookie: vsid=931vr2699303390608514; expires=Wed, 29-Mar-2023 04:38:59 GMT; Max-Age=157680000; path=/; domain=ads.cloud4ads.com; HttpOnly
X-Adblock-Key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAKX74ixpzVyXbJprcLfbH4psP4 L2entqri0lzh6pkAaXLPIcclv6DQBeJJjGFWrBIF6QMyFwXT5CCRyjS2penECAwEAAQ==_LLmT/pCO9oMbmlfsV1xUZ1Dn6ahqLa3t CRIylgrYqUdYI6Sl2B8N4kPezzcLMiarTueb8zZvR 1D2wriVHdHw==
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8
505b..<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "hXXp://www
.w3.org/TR/html4/strict.dtd">..<html xmlns="hXXp://VVV.w3.org/19
99/xhtml" data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAKX74ixpzVy
XbJprcLfbH4psP4 L2entqri0lzh6pkAaXLPIcclv6DQBeJJjGFWrBIF6QMyFwXT5CCRyj
S2penECAwEAAQ==_LLmT/pCO9oMbmlfsV1xUZ1Dn6ahqLa3t CRIylgrYqUdYI6Sl2B8N4
kPezzcLMiarTueb8zZvR 1D2wriVHdHw==">..<head><script type="
text/javascript">var abp;</script><script type="text/javas
cript" src="hXXp://ads.cloud4ads.com/px.js?ch=1"></script><
;script type="text/javascript" src="hXXp://ads.cloud4ads.com/px.js?ch=
2"></script><script type="text/javascript">function han
dleABPDetect(){try{var imglog = document.createElement("img");imglog.s
rc="hXXp://ads.cloud4ads.com/sk-logabpstatus.php?a=RDNWbmt4anJCVmxpdVZ
mc2JidCtiWjFhZWNYSkVIbUFaVWRWczFuQkM5N2dVbmk5NjZqdW1pNWpFRHZMUzU5bEl4O
GVla0svRURidXVrRkhQWEYrTVowZW9Od2JBOWE4RXJ1a3RjTEt0Ymc9&b=" abp;docume
nt.body.appendChild(imglog);}catch(err){}}try{window.onload=handleABPD
etect();}catch(err){}</script><meta name="tids" content="a='8
243' b='10726' c='cloud4ads.com' d='taxo_cat'" /><title>Cloud
4ads.com</title>..<meta http-equiv="Content-Type" content="te
xt/html; charset=UTF-8">..<meta name="viewport" content="width=d
evice-width, initial-scale=1, maximum-scale=1, user-scalable = no">
..<style type="text/css">..*{margin:0; padding:0}..a{text-decora
tion:none; outline:none}..a:hover{text-indent:0; cursor:pointer; o

<<< skipped >>>

The Adware connects to the servers at the folowing location(s):

%original file name%.exe_2940:

.idata
.rdata
P.reloc
P.rsrc
kernel32.dll
.DEFAULT\Control Panel\International
File I/O error %d
lzmadecompsmall: Compressed data is corrupted (%d)
lzmadecompsmall: %s
LzmaDecode failed (%d)
shell32.dll
/SUPPRESSMSGBOXES
/PASSWORD=password
Specifies the password to use.
For more detailed information, please visit hXXp://VVV.jrsoftware.org/ishelp/index.php?topic=setupcmdline
/SL5="$%x,%d,%d,
Inno Setup Setup Data (5.5.0)
Inno Setup Messages (5.5.3)
mu2.iu
user32.dll
oleaut32.dll
advapi32.dll
RegOpenKeyExA
RegCloseKey
GetWindowsDirectoryA
MsgWaitForMultipleObjects
ExitWindowsEx
comctl32.dll
name="JR.Inno.Setup"
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
<windowsSettings>
<dpiAware xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
</windowsSettings>
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/>
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/>
<supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/>
<supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/>
!'%s' is not a valid integer value('%s' is not a valid floating point value
'%s' is not a valid date
'%s' is not a valid time!'%s' is not a valid date and time
I/O error %d
Integer overflow Invalid floating point operation
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted%Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'
Invalid variant operation"Variant method calls not supported
External exception %x

ccc45d7ac954f43773b1c2b3b64fced5.tmp_3320:

.idata
.rdata
P.reloc
P.rsrc
kernel32.dll
%s_%d
EInvalidOperation
TKeyEvent
TKeyPressEvent
crSQLWait
t.HtR
EInvalidGraphicOperation
TWindowState
poProportional
KeyPreview
WindowState
OnKeyDown
OnKeyPress
OnKeyUp
CTL3D32.DLL
PasswordChar
ssHorizontal
OnKeyUpXeB
RegDeleteKeyExA
advapi32.dll
.DEFAULT\Control Panel\International
user32.dll
shlwapi.dll
TPSExec
TPSRuntimeClassImporter
TPSExportedVar
Cannot Import
Interface not supported
TPSCustomDebugExec
TPSDebugExec
uxtheme.dll
oleacc.dll
RICHED20.DLL
RICHED32.DLL
Rstrtmgr.dll
File I/O error %d
Messages file "%s" is missing. Please correct the problem or obtain a new copy of the program.
shell32.dll
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_PERFORMANCE_DATA
HKEY_CURRENT_CONFIG
HKEY_DYN_DATA
WININIT.INI
t.Htb
Software\Microsoft\Windows\CurrentVersion\SharedDLLs
RegCreateKeyEx
RegOpenKeyEx
sfc.dll
cmd.exe" /C "
COMMAND.COM" /C
heXE
PendingFileRenameOperations
PendingFileRenameOperations2
Software\Microsoft\Windows\CurrentVersion\Fonts
Software\Microsoft\Windows NT\CurrentVersion\Fonts
IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)
IPropertyStore::SetValue(PKEY_AppUserModel_ID)
IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)
IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption)
OLEAUT32.DLL
Log opened. (Time zone: UTC%s%.2u:%.2u)
%s Log %s #%.3u.txt
MsgWaitForMultipleObjects
regsvr32.exe"
Cannot register 64-bit DLLs on this version of Windows
HELPER_EXE_AMD64
Cannot utilize 64-bit features on this version of Windows
64-bit helper EXE wasn't extracted
\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x
CreateNamedPipe
SetNamedPipeHandleState
helper %d 0x%x
Helper process PID: %u
Stopping 64-bit helper process. (PID: %u)
Helper process exited with failure code: 0x%x
TransactNamedPipe
TransactNamedPipe/GetOverlappedResult
Helper: Command did not execute
SOFTWARE\Microsoft\.NETFramework
.NET Framework not found
SOFTWARE\Microsoft\.NETFramework\Policy\v4.0
v4.0.30319
SOFTWARE\Microsoft\.NETFramework\Policy\v2.0
v2.0.50727
SOFTWARE\Microsoft\.NETFramework\Policy\v1.1
v1.1.4322
.NET Framework version %s not found
Fusion.dll
Failed to load .NET Framework DLL "%s"
Failed to get address of .NET Framework CreateAssemblyCache function
.NET Framework CreateAssemblyCache function failed
MoveFileEx failed (%d).
Deleting directory: %s
Failed to delete directory (%d). Will retry later.
Failed to delete directory (%d). Will delete on restart (if empty).
Failed to delete directory (%d).
Deleting file: %s
Failed to delete the file; it may be in use (%d).
ExtractRecData: Unicode data unsupported by this build
The file appears to be in use (%d). Will delete on restart.
Decrementing shared count (%d-bit): %s
Unregistering 64-bit DLL/OCX: %s
Unregistering 32-bit DLL/OCX: %s
Not unregistering DLL/OCX again: %s
Unregistering 64-bit type library: %s
Unregistering 32-bit type library: %s
Uninstalling from GAC: %s
Running Exec filename:
Running Exec parameters:
CreateProcess failed (%d).
Process exit code: %u
Running ShellExec filename:
Running ShellExec parameters:
ShellExecuteEx failed (%d).
Skipping RunOnceId "%s" filename: %s
Unregistering font: %s
zlib: Internal error. Code %d
1.2.1
bzlib: Internal error. Code %d
lzmadecomp: %s
lzmadecomp: Compressed data is corrupted (%d)
DecodeToBuf failed (%d)
TPasswordEdit
PasswordEdit(
Password
TStartMenuFolderTreeViewL%F
c:\directory
Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
PasswordPage
PasswordLabel
PasswordEdit
PasswordEditLabel$
Could not find page with ID %d
Software\Microsoft\Windows\CurrentVersion\Uninstall
%s\%s_is1
RestartManager found an application using one of our files: %s
Can use RestartManager to avoid reboot? %s (%d)
CheckPassword
PrepareToInstall failed: %s
Need to restart Windows? %s
/:*?"<>|
\/:*?"<>|
%s-%d.bin
%s-%d%s.bin
..\DISK%d\
Asking user for new disk containing "%s".
Cannot read an encrypted file before the key has been set
LoggedMsgBox returned an unexpected value. Assuming Abort.
Software\Microsoft\Windows\CurrentVersion\Uninstall\
5.5.5 (a)
URLInfoAbout
URLUpdateInfo
Creating directory: %s
Setting permissions on directory: %s
Failed to set permissions on directory (%d).
Setting NTFS compression on directory: %s
Unsetting NTFS compression on directory: %s
Failed to set NTFS compression state (%d).
IMsg
Failed to set value in Fonts registry key.
Failed to open Fonts registry key.
Setting permissions on file: %s
Failed to set permissions on file (%d).
Setting NTFS compression on file: %s
Unsetting NTFS compression on file: %s
Dest filename: %s
Dest file is protected by Windows File Protection.
Time stamp of our file: %s
Time stamp of existing file: %s
Version of our file: %u.%u.%u.%u
Version of existing file: %u.%u.%u.%u
Existing file is protected by Windows File Protection. Skipping.
Uninstaller requires administrator: %s
The existing file appears to be in use (%d). Will replace on restart.
The existing file appears to be in use (%d). Retrying.
Registering file as a font ("%s")
Cannot install files to 64-bit locations on this version of Windows
desktop.ini
.ShellClassInfo
{0AFACED1-E828-11D1-9187-B532F1E9575D}
target.lnk
Desktop.ini
Software\Microsoft\Windows\CurrentVersion\App Paths\
Section: %s
Entry: %s
Value: %s
Updating the .INI file.
Successfully updated the .INI file.
Skipping updating the .INI file, only updating uninstall log.
Setting permissions on registry key: %s\%s
Could not set permissions on the registry key because it currently does not exist.
Failed to set permissions on registry key (%d).
Cannot access 64-bit registry keys on this version of Windows
Registration executable created: %s
Software\Microsoft\Windows\CurrentVersion\RunOnce
Registering 64-bit DLL/OCX: %s
Registering 32-bit DLL/OCX: %s
Registering 64-bit type library: %s
Registering 32-bit type library: %s
Directory for uninstall files: %s
Will append to existing uninstall log: %s
Will overwrite existing uninstall log: %s
Creating new uninstall log: %s
LoggedMsgBox returned an unexpected value. Assuming Cancel.
RmShutdown returned an error: %d
Fatal exception during installation process (%s):
ExtractTemporaryFile: The file "%s" was not found
ExtractTemporaryFiles: No files matching "%s" found
Invalid symbol '%s' found
Invalid token '%s' found
QuerySpawnServer: Unexpected response: $%x
CallSpawnServer: Unexpected response: $%x
CallSpawnServer: Unexpected status: %d
ShellExecuteEx
ShellExecuteEx returned hProcess=0
Wnd=$%x
FormKeyDown
PasswordCheckHash
Expression error '%s'
SuppressMsgBoxes
Cannot evaluate "%s" constant during Uninstall
Cannot access a 64-bit key in a "reg" constant on this version of Windows
Unknown custom message name "%s" in "cm" constant
srcexe
Cannot expand "pf64" constant on this version of Windows
Cannot expand "cf64" constant on this version of Windows
uninstallexe
Cannot expand "dotnet2064" constant on this version of Windows
Cannot expand "dotnet4064" constant on this version of Windows
Failed to expand shell folder constant "%s"
Unknown constant "%s"
Software\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows NT\CurrentVersion
cmd.exe
COMMAND.COM
\_setup64.tmp
_isetup\_shfoldr.dll
Failed to get version numbers of _shfoldr.dll
shfolder.dll
Failed to load DLL "%s"
Found pending rename or delete that matches one of our files: %s
Windows version: %u.%u.%u%s (NT platform: %s)
64-bit Windows: %s
Processor architecture: %s
Defaulting to %s for suppressed message box (%s):
Message box (%s):
User chose %s.
MsgBox failed.
/SPAWNWND=$%x /NOTIFYWND=$%x
64-bit install mode: %s
Windows
_isetup\_isdecmp.dll
_isetup\_iscrypt.dll
/Password=
/SuppressMsgBoxes
/DETACHEDMSG
-0.bin
Setup version: Inno Setup version 5.5.5 (a)
Original Setup EXE:
Not restarting Windows because Setup is being run from the debugger.
Restarting Windows.
Inno Setup version 5.5.5 (a)
Portions Copyright (C) 2000-2014 Martijn Laan
hXXp://VVV.innosetup.com/
hXXp://VVV.remobjects.com/ps
Cannot run files in 64-bit locations on this version of Windows
Type: Exec
Type: ShellExec
RmRestart returned an error: %d
Need to restart Windows, not attempting to restart applications
Will not restart Windows automatically.
System\CurrentControlSet\Control\Windows
TOutputMsgWizardPage
TOutputMsgMemoWizardPage
TOutputMsgMemoWizardPagetHH
PasswordEdit
PasswordEditLabel
MsgLabel
Msg1Label
Msg2Label
function CreateOutputMsgPage(const AfterID: Integer; const ACaption, ADescription, AMsg: String): TOutputMsgWizardPage;
function CreateOutputMsgMemoPage(const AfterID: Integer; const ACaption, ADescription, ASubCaption: String; const AMsg: AnsiString): TOutputMsgMemoWizardPage;
function MsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons: Integer): Integer;
function GetIniString(const Section, Key, Default, Filename: String): String;
function GetIniInt(const Section, Key: String; const Default, Min, Max: Longint; const Filename: String): Longint;
function GetIniBool(const Section, Key: String; const Default: Boolean; const Filename: String): Boolean;
function IniKeyExists(const Section, Key, Filename: String): Boolean;
function SetIniString(const Section, Key, Value, Filename: String): Boolean;
function SetIniInt(const Section, Key: String; const Value: Longint; const Filename: String): Boolean;
function SetIniBool(const Section, Key: String; const Value: Boolean; const Filename: String): Boolean;
procedure DeleteIniEntry(const Section, Key, Filename: String);
function GetCmdTail: String;
function StringChangeEx(var S: String; const FromStr, ToStr: String; const SupportDBCS: Boolean): Integer;
function RegValueExists(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;
function RegQueryStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;
function RegQueryMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;
function RegDeleteKeyIncludingSubkeys(const RootKey: Integer; const SubkeyName: String): Boolean;
function RegDeleteKeyIfEmpty(const RootKey: Integer; const SubkeyName: String): Boolean;
function RegKeyExists(const RootKey: Integer; const SubKeyName: String): Boolean;
function RegDeleteValue(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;
function RegGetSubkeyNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;
function RegGetValueNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;
function RegQueryDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultDWord: Cardinal): Boolean;
function RegQueryBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: AnsiString): Boolean;
function RegWriteStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteExpandStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: Cardinal): Boolean;
function RegWriteBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: AnsiString): Boolean;
function CheckForMutexes(Mutexes: String): Boolean;
function Exec(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;
function ExecAsOriginalUser(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;
function ShellExec(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;
function ShellExecAsOriginalUser(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;
function MakePendingFileRenameOperationsChecksum: String;
function CreateShellLink(const Filename, Description, ShortcutTo, Parameters, WorkingDir, IconFilename: String; const IconIndex, ShowCmd: Integer): String;
function ExitSetupMsgBox: Boolean;
function GetWindowsVersion: Cardinal;
procedure GetWindowsVersionEx(var Version: TWindowsVersion);
function GetWindowsVersionString: String;
function SuppressibleMsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons, Default: Integer): Integer;
function CustomMessage(const MsgName: String): String;
function SendMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Longint;
function PostMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;
function SendNotifyMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;
function SendBroadcastMessage(const Msg, WParam, LParam: Longint): Longint;
function PostBroadcastMessage(const Msg, WParam, LParam: Longint): Boolean;
function SendBroadcastNotifyMessage(const Msg, WParam, LParam: Longint): Boolean;
procedure RaiseException(const Msg: String);
function SetPreviousData(const PreviousDataKey: Integer; const ValueName, ValueData: String): Boolean;
Cannot call "%s" function during Setup
Cannot call "%s" function during Uninstall
Cannot call "%s" function during non Unicode Setup or Uninstall
CREATEOUTPUTMSGPAGE
CREATEOUTPUTMSGMEMOPAGE
MSGBOX
Invalid RootKey value
INIKEYEXISTS
GETCMDTAIL
REGKEYEXISTS
REGDELETEKEYINCLUDINGSUBKEYS
REGDELETEKEYIFEMPTY
REGGETSUBKEYNAMES
CHECKFORMUTEXES
SHELLEXEC
SHELLEXECASORIGINALUSER
MAKEPENDINGFILERENAMEOPERATIONSCHECKSUM
Unknown custom message name "%s"
EXITSETUPMSGBOX
GETWINDOWSVERSION
GETWINDOWSVERSIONSTRING
%u.%.2u.%u
SUPPRESSIBLEMSGBOX
%u.%u.%u.%u
Cannot disable FS redirection on this version of Windows
GetWindowsVersionEx
Runtime Error (at %d:%d):
Exception "%s" at address %p
TScriptRunner.SetPSExecParameters: Invalid type
TScriptRunner.LoadScript failed
Remove shared file %s? User chose %s%s
/INITPROCWND=$%x
/SECONDPHASE="%s" /FIRSTPHASEWND=$%x
Original Uninstall EXE:
Install was done in 64-bit mode but not running 64-bit Windows now
Removed all? %s
Not restarting Windows because Uninstall is being run from the debugger.
IMsgt
isRS-???.tmp
isRS-%.3u.tmp
DisableProcessWindowsGhosting
FTPF0P
0123456789abcdefInno Setup Setup Data (5.5.0)
Inno Setup Messages (5.5.3)
0ku2.iu
oleaut32.dll
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
GetWindowsDirectoryA
CreateNamedPipeA
mpr.dll
version.dll
gdi32.dll
SetViewportOrgEx
UnhookWindowsHookEx
SetWindowsHookExA
MapVirtualKeyA
GetKeyState
GetKeyNameTextA
ExitWindowsEx
EnumWindows
EnumThreadWindows
comctl32.dll
ole32.dll
ShellExecuteExA
ShellExecuteA
comdlg32.dll
.text
`.rdata
@.data
.pdata
@.rsrc
COMCTL32.dll
SHLWAPI.dll
SetProcessShutdownParameters
KERNEL32.dll
ADVAPI32.dll
SHELL32.dll
OLEAUT32.dll
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/>
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/>
<supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/>
<supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/>
`.data
.rsrc
@.reloc
Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
SOFTWARE\Microsoft\Windows\CurrentVersion
Software\Microsoft\Windows\CurrentVersion\ProfileReconciliation
RegKey
GetWindowsDirectoryW
RegOpenKeyA
SHFOLDER.dll
dll\shfolder.dbg
Font.Color
Font.Height
Font.Name
Font.Style
Lines.Strings
name="JR.Inno.Setup"
version="1.0.0.0"
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
<windowsSettings>
<dpiAware xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
</windowsSettings>
Cannot assign a %s to a %s
Cannot create file %s
Cannot open file %s
Stream write error Out of memory while expanding memory stream*Can't write to a read-only resource stream.WriteObject called twice for the same instance
Class %s not found
Resource %s not found!Resource %s is of incorrect class
List index out of bounds Operation not allowed on sorted string list%String list does not allow duplicates
Tab index out of bounds#A component named %s already exists$''%s'' is not a valid component name
A class named %s already exists#''%s'' is not a valid integer value
Error reading %s.%s: %s
Ancestor for '%s' not found
Bitmap is empty!Cannot change the size of an icon$Unknown picture file extension (.%s)
Unsupported clipboard format
Error creating window Cannot focus a disabled or invisible window!Control '%s' has no parent window
%s property out of range
%s on %s@GroupIndex cannot be less than a previous menu item's GroupIndex2Cannot have more than one MDI form per application
Could not load CARDS.DLL
Duplicate CardId found"An error returned from DDE ($0%x)/DDE Error - conversation not established ($0%x)0Error occurred when DDE ran out of memory ($0%x)"Unable to connect DDE conversation
Grid too large for operation Too many rows or columns deleted
%s on line %d
''%s'' expected
%s expected
Invalid input value7Invalid input value. Use escape key to abandon changes
Value must be between %d and %d<Cannot create a default method name for an unnamed component
''%s'' is not a valid date
''%s'' is not a valid time#''%s'' is not a valid date and time
Invalid file name - %s
All files (*.*)|*.*
&Files: (*.*)
Invalid clipboard format Clipboard does not support Icons
Custom Colors Operation not supported on selected printer.There is no default printer currently selected
Unable to write to %s
Invalid data type for '%s'
Failed to create key %s
Failed to set data for '%s'
Failed to get data for '%s'9Synchronize called when main VCL thread in a WaitFor call0Unknown RichEdit conversion file extension (.%s)
/Menu '%s' is already being used by another form
Failed to Save Stream)StatusBar cannot have more than 64 panels!Error assigning Hot-Key to %s. %s
Hot-Key is invalid#Window is invalid or a child window%Hot-Key is assigned to another window %s is already associated with %s!'%s' is not a valid integer value('%s' is not a valid floating point value
'%s' is not a valid date
'%s' is not a valid time!'%s' is not a valid date and time
I/O error %d
Integer overflow Invalid floating point operation
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted%Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'
Invalid variant operation"Variant method calls not supported
External exception %x
n%USERPROFILE%
r%SYSTEMROOT%
5.50.4807.2300
Microsoft(R) Windows (R) 2000 Operating System
Datos de programa%Configuraci
51.52.0.0


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    %original file name%.exe:2940
    powershell.exe:3712

  2. Delete the original Adware file.
  3. Delete or disinfect the following files created/modified by the Adware:

    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-E89LH.tmp\itdownload.dll (1489 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-E89LH.tmp\_isetup\_shfoldr.dll (47 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-E89LH.tmp\ex.bat (784 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-3DDIP.tmp\ccc45d7ac954f43773b1c2b3b64fced5.tmp (1416 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-E89LH.tmp\av.txt (25 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VGKKALSO1U8BZKBGSZKO.temp (196 bytes)

  4. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  5. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now