Backdoor.Bot.145152_ac880ae269
Trojan:Win32/EyeStye.N (Microsoft), Trojan-Spy.Win32.SpyEyes.ooi (Kaspersky), Trojan-Spy.Win32.Zbot.cgcy (v) (VIPRE), Trojan.PWS.SpySweep.52 (DrWeb), PWS-Zbot.gen.js (McAfee), Trojan-Spy.Win32.Zbot (Ikarus), Backdoor.Bot.145152 (FSecure), PSW.Generic9.XIQ (AVG), Win32:Nedsym-KI [Trj] (Avast), TROJ_GEN.RC1C8IN (TrendMicro), Backdoor.Bot.145152 (AdAware), Trojan.Win32.EyeStye.FD, TrojanEyeStye.YR (Lavasoft MAS)
Behaviour: Trojan-Spy, Trojan, Backdoor
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Requires JavaScript enabled! |
---|
MD5: ac880ae269835e168588273c20ef4c6b
SHA1: f105677b0a419883cefdd73ad8374faae03b3fb2
SHA256: ffa7fac44815655506d93bc5b2cb29844ccc2c1fc829039128a43a67da585cc2
SSDeep: 3072:6vtuLrEJVGhiHXiYWP7KDRK2xdamxKMsNCXaB:YM4JVGaSzP7SprxvsYqB
Size: 130048 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6, MicrosoftVisualC, MicrosoftVisualCv50v60MFC, MicrosoftVisualC50, Armadillov171
Company: VideoPerformer
Created at: 2011-09-18 10:03:49
Analyzed on: WindowsXPESX SP3 32-bit
Summary:
Backdoor. Malware that enables a remote control of victim's machine.
Payload
No specific payload has been found.
Process activity
The Backdoor creates the following process(es):
D0097DA1456.exe:1052
%original file name%.exe:608
The Backdoor injects its code into the following process(es):
mscorsvw.exe:1924
winlogon.exe:720
lsass.exe:776
svchost.exe:932
svchost.exe:1000
svchost.exe:1092
svchost.exe:1132
svchost.exe:1180
Explorer.EXE:1284
spoolsv.exe:1424
wmiprvse.exe:1792
jqs.exe:1972
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process D0097DA1456.exe:1052 makes changes in the file system.
The Backdoor creates and/or writes to the following file(s):
C:\siehu73.bin\8F1BBD4F1258962 (5 bytes)
Registry activity
The process D0097DA1456.exe:1052 makes changes in the system registry.
The Backdoor creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "47 02 A7 37 A6 56 BE 77 5A 91 5E 7D 85 D3 00 B9"
The process %original file name%.exe:608 makes changes in the system registry.
The Backdoor creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D8 F5 CC 91 09 AA 1E 7E 8D DD D4 90 CE 1B 3B 76"
Dropped PE files
There are no dropped PE files.
HOSTS file anomalies
No changes have been detected.
Rootkit activity
The Backdoor installs the following user-mode hooks in WININET.dll:
HttpSendRequestW
InternetReadFileExA
InternetWriteFile
InternetQueryDataAvailable
InternetReadFile
HttpQueryInfoA
HttpSendRequestA
InternetCloseHandle
HttpAddRequestHeadersA
HttpOpenRequestA
InternetQueryOptionA
The Backdoor installs the following user-mode hooks in USER32.dll:
TranslateMessage
The Backdoor installs the following user-mode hooks in CRYPT32.dll:
PFXImportCertStore
The Backdoor installs the following user-mode hooks in ADVAPI32.dll:
CryptEncrypt
The Backdoor installs the following user-mode hooks in WS2_32.dll:
send
The Backdoor installs the following user-mode hooks in ntdll.dll:
NtVdmControl
ZwSetInformationFile
NtResumeThread
NtQueryDirectoryFile
NtEnumerateValueKey
Propagation
VersionInfo
No information is available.
PE Sections
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
---|---|---|---|---|---|
.text | 4096 | 1932 | 2048 | 4.25878 | 072948f135a09049b41323d2b4fd1603 |
.rdata | 8192 | 1180 | 1536 | 3.04948 | 13876e6549eb030c59d5394a1a4a9316 |
.data | 12288 | 250532 | 512 | 0.014135 | 598e1aae6ecbd8237c4383f4be94b9f1 |
.rsrc | 266240 | 124824 | 124928 | 5.36903 | 0a16248c3c6f0cc3cc0a5cfe9d5b0d93 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
URL | IP |
---|---|
hxxp://e10088.dscb.akamaiedge.net/ | ![]() |
hxxp://www.microsoft.com/ | ![]() |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET / HTTP/1.1
Host: VVV.microsoft.com
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Cache-Control: no-cache
HTTP/1.1 200 OK
Cache-Control: no-cache
Content-Type: text/html
Last-Modified: Mon, 16 Mar 2009 20:35:26 GMT
Accept-Ranges: bytes
ETag: "67991fbd76a6c91:0"
Server: Microsoft-IIS/8.5
X-Powered-By: ASP.NET
Content-Length: 1020
Date: Sun, 04 Jan 2015 10:47:58 GMT
Connection: keep-alive
X-CCC: CA
X-CID: 2<html><head><title>Microsoft Corporation</title&g
t;<meta http-equiv="X-UA-Compatible" content="IE=EmulateIE7"><
;/meta><meta http-equiv="Content-Type" content="text/html; chars
et=utf-8"></meta><meta name="SearchTitle" content="Microso
ft.com" scheme=""></meta><meta name="Description" content=
"Get product information, support, and news from Microsoft." scheme=""
></meta><meta name="Title" content="Microsoft.com Home Pag
e" scheme=""></meta><meta name="Keywords" content="Microso
ft, product, support, help, training, Office, Windows, software, downl
oad, trial, preview, demo, business, security, update, free, computer
, PC, server, search, download, install, news" scheme=""></meta&
gt;<meta name="SearchDescription" content="Microsoft.com Homepage"
scheme=""></meta></head><body><p>Your curre
nt User-Agent string appears to be from an automated process, if this
is incorrect, please click this link:<a href="hXXp://VVV.microsoft.
com/en/us/default.aspx?redir=true">United States English Microsoft
Homepage</a></p></body></html>..HTTP/1.1 200 O
K..Cache-Control: no-cache..Content-Type: text/html..Last-Modified: Mo
n, 16 Mar 2009 20:35:26 GMT..Accept-Ranges: bytes..ETag: "67991fbd76a6
c91:0"..Server: Microsoft-IIS/8.5..X-Powered-By: ASP.NET..Content-Leng
th: 1020..Date: Sun, 04 Jan 2015 10:47:58 GMT..Connection: keep-alive.
.X-CCC: CA..X-CID: 2..<html><head><title>Microso<<< skipped >>>
The Backdoor connects to the servers at the folowing location(s):
.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
nspr4.dll
set_url
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
X X
%d.%d.%d
keys
http:
urlmask
cert
seieapiXX
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
Host: %s
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
%System%\WININET.dll
C:\siehu73.bin\8F1BBD4F1258962
%System%\ntdll.dll
%System%\USER32.dll
%System%\CRYPT32.dll
C:\siehu73.bin\D0097DA1456.exe
C:\siehu73.bin\
D0097DA1456.exe
IS9QVCA.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP3!A8A67A25
siehu73.bin
Microsoft Windows
%System%\ADVAPI32.dll
%System%\WS2_32.dll
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
$0)0.252
2%2X2u2
>*>4>:>~>
6#6*61686{6
4^4*696\6
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
c(GMT %su:u) %s
RapportTanzan36.
RapportKoan.
lsass.exe_776_rwx_0BAD0000_0004E000:
.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
nspr4.dll
set_url
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
X X
%d.%d.%d
keys
http:
urlmask
cert
seieapiXX
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
Host: %s
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
%System%\WININET.dll
C:\siehu73.bin\8F1BBD4F1258962
%System%\ntdll.dll
%System%\USER32.dll
%System%\CRYPT32.dll
C:\siehu73.bin\D0097DA1456.exe
C:\siehu73.bin\
D0097DA1456.exe
IS9QVCA.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP3!A8A67A25
siehu73.bin
Microsoft Windows
%System%\ADVAPI32.dll
%System%\WS2_32.dll
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
$0)0.252
2%2X2u2
>*>4>:>~>
6#6*61686{6
4^4*696\6
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
c(GMT %su:u) %s
RapportTanzan36.
RapportKoan.
svchost.exe_932_rwx_0BAD0000_0004E000:
.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
nspr4.dll
set_url
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
X X
%d.%d.%d
keys
http:
urlmask
cert
seieapiXX
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
Host: %s
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
C:\siehu73.bin\8F1BBD4F1258962
%System%\ntdll.dll
C:\siehu73.bin\D0097DA1456.exe
C:\siehu73.bin\
D0097DA1456.exe
IS9QVCA.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP3!A8A67A25
siehu73.bin
Microsoft Windows
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
$0)0.252
2%2X2u2
>*>4>:>~>
6#6*61686{6
4^4*696\6
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
c(GMT %su:u) %s
RapportTanzan36.
RapportKoan.
svchost.exe_1000_rwx_0BAD0000_0004E000:
.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
nspr4.dll
set_url
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
X X
%d.%d.%d
keys
http:
urlmask
cert
seieapiXX
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
Host: %s
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
%System%\WININET.dll
C:\siehu73.bin\8F1BBD4F1258962
%System%\ntdll.dll
%System%\USER32.dll
%System%\CRYPT32.dll
C:\siehu73.bin\D0097DA1456.exe
C:\siehu73.bin\
D0097DA1456.exe
IS9QVCA.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP3!A8A67A25
siehu73.bin
Microsoft Windows
%System%\ADVAPI32.dll
c:\windows\system32\WS2_32.dll
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
$0)0.252
2%2X2u2
>*>4>:>~>
6#6*61686{6
4^4*696\6
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
c(GMT %su:u) %s
RapportTanzan36.
RapportKoan.
svchost.exe_1092_rwx_0BAD0000_0004E000:
.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
nspr4.dll
set_url
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
X X
%d.%d.%d
keys
http:
urlmask
cert
seieapiXX
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
Host: %s
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
%System%\WININET.dll
C:\siehu73.bin\8F1BBD4F1258962
%System%\ntdll.dll
%System%\USER32.dll
%System%\CRYPT32.dll
C:\siehu73.bin\D0097DA1456.exe
C:\siehu73.bin\
D0097DA1456.exe
IS9QVCA.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP3!A8A67A25
siehu73.bin
Microsoft Windows
%System%\ADVAPI32.dll
c:\windows\system32\WS2_32.dll
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
$0)0.252
2%2X2u2
>*>4>:>~>
6#6*61686{6
4^4*696\6
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
c(GMT %su:u) %s
RapportTanzan36.
RapportKoan.
svchost.exe_1132_rwx_0BAD0000_0004E000:
.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
nspr4.dll
set_url
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
X X
%d.%d.%d
keys
http:
urlmask
cert
seieapiXX
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
Host: %s
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
%System%\WININET.dll
C:\siehu73.bin\8F1BBD4F1258962
%System%\ntdll.dll
%System%\USER32.dll
%System%\CRYPT32.dll
C:\siehu73.bin\D0097DA1456.exe
C:\siehu73.bin\
D0097DA1456.exe
IS9QVCA.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP3!A8A67A25
siehu73.bin
Microsoft Windows
%System%\ADVAPI32.dll
c:\windows\system32\WS2_32.dll
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
$0)0.252
2%2X2u2
>*>4>:>~>
6#6*61686{6
4^4*696\6
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
c(GMT %su:u) %s
RapportTanzan36.
RapportKoan.
svchost.exe_1180_rwx_0BAD0000_0004E000:
.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
nspr4.dll
set_url
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
X X
%d.%d.%d
keys
http:
urlmask
cert
seieapiXX
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
Host: %s
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
C:\siehu73.bin\8F1BBD4F1258962
%System%\ntdll.dll
C:\siehu73.bin\D0097DA1456.exe
C:\siehu73.bin\
D0097DA1456.exe
IS9QVCA.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP3!A8A67A25
siehu73.bin
Microsoft Windows
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
$0)0.252
2%2X2u2
>*>4>:>~>
6#6*61686{6
4^4*696\6
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
c(GMT %su:u) %s
RapportTanzan36.
RapportKoan.
Explorer.EXE_1284_rwx_013D0000_00002000:
!EYEc:\%original file name%.exe
C:\siehu73.bin\
D0097DA1456.exe
3I5uDO1CyWX.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP3!A8A67A25
siehu73.bin
Microsoft Windows
Explorer.EXE_1284_rwx_01C30000_00006000:
.text
`.rdata
@.data
.reloc
PSSSSSSh
Advapi32.dll
guid=%s&ver=%u&ie=%s&os=%u.%u.%u&ut=%s&ccrc=X&md5=%s&plg=%s&plgstat=%s&wake=%u
%s&stat=online
hXXp://VVV.microsoft.com
%s&%s
ntdll.dll
SHLWAPI.dll
GetProcessHeap
KERNEL32.dll
ADVAPI32.dll
customconnector.dll
TakeBotExeMd5Callback
TakeStartExe
TakeUpdateBotExe
Content-Type: application/x-www-form-urlencoded
5.1.2600!XP3!A8A67A25
hXXp://safeinetscripts.net:8080/ll382hfs.php
Explorer.EXE_1284_rwx_0BAD0000_0004E000:
.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
nspr4.dll
set_url
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
X X
%d.%d.%d
keys
http:
urlmask
cert
seieapiXX
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
Host: %s
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
C:\siehu73.bin\8F1BBD4F1258962
%System%\ntdll.dll
C:\siehu73.bin\D0097DA1456.exe
C:\siehu73.bin\
D0097DA1456.exe
IS9QVCA.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP3!A8A67A25
siehu73.bin
Microsoft Windows
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
$0)0.252
2%2X2u2
>*>4>:>~>
6#6*61686{6
4^4*696\6
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
c(GMT %su:u) %s
RapportTanzan36.
RapportKoan.
Explorer.EXE_1284_rwx_0BB60000_0005A000:
.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
nspr4.dll
set_url
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
X X
%d.%d.%d
keys
http:
urlmask
cert
seieapiXX
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
Host: %s
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
%System%\WININET.dll
C:\siehu73.bin\8F1BBD4F1258962
%System%\ntdll.dll
%System%\USER32.dll
%System%\CRYPT32.dll
C:\siehu73.bin\D0097DA1456.exe
C:\siehu73.bin\
D0097DA1456.exe
IS9QVCA.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP3!A8A67A25
siehu73.bin
Microsoft Windows
%System%\ADVAPI32.dll
%System%\WS2_32.dll
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
$0)0.252
2%2X2u2
>*>4>:>~>
6#6*61686{6
4^4*696\6
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
c(GMT %su:u) %s
RapportTanzan36.
RapportKoan.
spoolsv.exe_1424_rwx_0BAD0000_0004E000:
.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
nspr4.dll
set_url
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
X X
%d.%d.%d
keys
http:
urlmask
cert
seieapiXX
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
Host: %s
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
C:\siehu73.bin\8F1BBD4F1258962
%System%\ntdll.dll
C:\siehu73.bin\D0097DA1456.exe
C:\siehu73.bin\
D0097DA1456.exe
IS9QVCA.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP3!A8A67A25
siehu73.bin
Microsoft Windows
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
$0)0.252
2%2X2u2
>*>4>:>~>
6#6*61686{6
4^4*696\6
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
c(GMT %su:u) %s
RapportTanzan36.
RapportKoan.
wmiprvse.exe_1792_rwx_0BAD0000_0004E000:
.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
nspr4.dll
set_url
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
X X
%d.%d.%d
keys
http:
urlmask
cert
seieapiXX
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
Host: %s
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
%System%\WININET.dll
C:\siehu73.bin\8F1BBD4F1258962
%System%\ntdll.dll
%System%\USER32.dll
%System%\CRYPT32.dll
C:\siehu73.bin\D0097DA1456.exe
C:\siehu73.bin\
D0097DA1456.exe
IS9QVCA.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP3!A8A67A25
siehu73.bin
Microsoft Windows
%System%\ADVAPI32.dll
%System%\WS2_32.dll
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
$0)0.252
2%2X2u2
>*>4>:>~>
6#6*61686{6
4^4*696\6
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
c(GMT %su:u) %s
RapportTanzan36.
RapportKoan.
mscorsvw.exe_1924_rwx_0BAD0000_0004E000:
.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
nspr4.dll
set_url
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
X X
%d.%d.%d
keys
http:
urlmask
cert
seieapiXX
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
Host: %s
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
%System%\WININET.dll
C:\siehu73.bin\8F1BBD4F1258962
%System%\ntdll.dll
%System%\USER32.dll
%System%\CRYPT32.dll
C:\siehu73.bin\D0097DA1456.exe
C:\siehu73.bin\
D0097DA1456.exe
IS9QVCA.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP3!A8A67A25
siehu73.bin
Microsoft Windows
%System%\ADVAPI32.dll
%System%\WS2_32.dll
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
$0)0.252
2%2X2u2
>*>4>:>~>
6#6*61686{6
4^4*696\6
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
c(GMT %su:u) %s
RapportTanzan36.
RapportKoan.
jqs.exe_1972_rwx_0BAD0000_0004E000:
.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
nspr4.dll
set_url
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
X X
%d.%d.%d
keys
http:
urlmask
cert
seieapiXX
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
Host: %s
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
%System%\WININET.dll
C:\siehu73.bin\8F1BBD4F1258962
%System%\ntdll.dll
%System%\USER32.dll
%System%\CRYPT32.dll
C:\siehu73.bin\D0097DA1456.exe
C:\siehu73.bin\
D0097DA1456.exe
IS9QVCA.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP3!A8A67A25
siehu73.bin
Microsoft Windows
%System%\ADVAPI32.dll
%System%\WS2_32.dll
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
$0)0.252
2%2X2u2
>*>4>:>~>
6#6*61686{6
4^4*696\6
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
c(GMT %su:u) %s
RapportTanzan36.
RapportKoan.
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Scan a system with an anti-rootkit tool.
- Terminate malicious process(es) (How to End a Process With the Task Manager):
D0097DA1456.exe:1052
%original file name%.exe:608 - Delete the original Backdoor file.
- Delete or disinfect the following files created/modified by the Backdoor:
C:\siehu73.bin\8F1BBD4F1258962 (5 bytes)
- Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.