Gen.Heur.FKP.1_8911d934d6
HEUR:Trojan.Win32.Generic (Kaspersky), Gen:Heur.FKP.1 (B) (Emsisoft), Gen:Heur.FKP.1 (AdAware), Backdoor.Win32.Shiz.FD, Shiz.YR, GenericInjector.YR, BackdoorCaphaw_QKKBAL.YR, BankerGeneric.YR (Lavasoft MAS)
Behaviour: Banker, Trojan, Backdoor
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 8911d934d6ca504d3190ced1e6cef620
SHA1: 0d231a66d3a2c7a0d52e600212da69b4c66ef978
SHA256: 2e1af36b1e793331e01f44f1f4cd31403c78da692bbbb6e3a477a983318c1cda
SSDeep: 6144:jvZR8D2L mqP/lH8nNnlfttDkJsZLX0tTMPd:jvZiqL mUwXTIoLX0tgPd
Size: 242176 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: BorlandDelphi30, UPolyXv05_v6
Company: no certificate found
Created at: 1990-09-29 10:35:11
Analyzed on: WindowsXP SP3 32-bit
Summary:
Banker. Steals data relating to online banking systems, e-payment systems and credit card systems.
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
%original file name%.exe:1860
The Trojan injects its code into the following process(es):
winlogon.exe:716
svchost.exe:932
svchost.exe:1012
svchost.exe:1100
svchost.exe:1144
svchost.exe:1184
Explorer.EXE:1988
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process %original file name%.exe:1860 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%WinDir%\AppPatch\fciniiq.exe (1765 bytes)
%System%\config\software (2440 bytes)
%System%\config\SOFTWARE.LOG (5347 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\B2.tmp (0 bytes)
Registry activity
The process %original file name%.exe:1860 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B0 89 EE A3 31 62 09 5B 40 B0 C1 8E 6F A7 13 3F"
[HKLM\System\CurrentControlSet\Control\Session Manager]
"PendingFileRenameOperations" = "\??\%WinDir%\apppatch\fciniiq.exe_, \??\%WinDir%\apppatch\fciniiq.exe"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"a8a67a25" = "pEìX£bÀ¸¬qÄHF‡KöDúz=º«H$YÉ<»¹œ³ŒQ\´òd¼Œ¤Kô1,Ã…Â $ë›ÛÌ«â€Â¹l}Ë {Å“zΙC%é[qñl4ì;û´[Ã’#»Û:ÑU„„Ãâ€Ã‚Â\±ª²DÆ’uœ¡Ü¼);¼\Æ’tµ2â€ÂkDùâ€Âaâ€Â*›cü$}Sô|ë$¤ô{¬q³#sÃ…Ã¥\yuJÛËu©|ù¢rKã!$’‹‹b±ÃÄ£ã“ÉUcdÃÂÄZ¡r»ôâ€Â)Û©Š]“QlYÛl]$$D´ƒÌ£Q$aŒ‚*™ü›ÙóÃÂÃÂ=éÃâ€Ãƒâ€˜Ãƒâ€˜Ã¢â‚¬Â°Ã‚¬q9|áÃÂù’‘ÃÂéšÄRa8a67a25"
Dropped PE files
| MD5 | File path |
|---|---|
| 0f5123686dfac9f721db41b5ea118008 | c:\WINDOWS\AppPatch\fciniiq.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
The Trojan installs the following user-mode hooks in USER32.dll:
GetClipboardData
SetThreadDesktop
GetMessageA
GetMessageW
TranslateMessage
The Trojan installs the following user-mode hooks in ntdll.dll:
RtlGetNativeSystemInformation
Propagation
VersionInfo
Company Name: COMODO
Product Name: nonchampion
Product Version: 9.8.4.6
Legal Copyright: Humbuggery
Legal Trademarks:
Original Filename:
Internal Name:
File Version: 5.4.7.4
File Description: pedantesque
Comments:
Language: Language Neutral
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .U | 4096 | 6947 | 7168 | 3.99356 | e93a8ae2034243c9b8422ebbfd309300 |
| .jC | 12288 | 166942 | 4608 | 4.85153 | 54713715ccbe98ff54ecfa15c0cbc6d4 |
| .LRK | 180224 | 90088 | 1536 | 4.69441 | cdeca549491caaeba98cab10357d3f04 |
| .g | 270336 | 498303 | 3584 | 4.67826 | acb72dd387a3fc5961614ae228b5463e |
| .ucKPZR | 770048 | 94461 | 94720 | 5.53794 | fd9be9e20d98a7490f7ca99ad0b13844 |
| .pWz | 868352 | 12800 | 12800 | 4.21382 | 546c3e68f9c154010a3551ceb16e948a |
| .o | 884736 | 3927 | 3584 | 3.48286 | 5f4083c2c44a4a3a9232a0d028ebc49e |
| .sjcOq | 888832 | 90165 | 90624 | 5.54027 | a9238e0770dc210b24a92bb9621b1385 |
| .an | 983040 | 386780 | 12800 | 4.76446 | 01e3c775db3a528650d2a0521dca22e0 |
| .l | 1372160 | 49335 | 2048 | 2.88781 | 44aebcaa03a0f19eaacca1d88d5e3336 |
| .rsrc | 1425408 | 6412 | 6656 | 3.1793 | 71ac31230fcc31b9d8fba73ee7d38a52 |
| .reloc | 1433600 | 1024 | 1024 | 4.59015 | 8951cd57234c578ab632d8739a0d65b4 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Total found: 1
0c1094311291df761804f2297274e1ed
URLs
| URL | IP |
|---|---|
| hxxp://vocyzit.com/login.php | |
| hxxp://vojyqem.com/login.php | |
| hxxp://qetyfuv.com/login.php | |
| hxxp://gatyfus.com/login.php | |
| hxxp://vowydef.com/login.php | |
| hxxp://qekyqop.com/login.php | |
| hxxp://lymysan.com/login.php | |
| hxxp://qetyvep.com/login.php | |
| hxxp://purycap.com/login.php | |
| vonyzuf.com | |
| pumyxiv.com | |
| puzywel.com | |
| vofygum.com | |
| gadyniw.com | |
| lysynur.com | |
| qegyhig.com | |
| gadyfuh.com | |
| puvyxil.com | |
| pumypog.com | |
| galyqaz.com | |
| qeqysag.com | |
| puvytuq.com | |
| vocyruk.com | |
| puzylyp.com | |
| lygygin.com | |
| volykyc.com | |
| www.bing.com | |
| lysyfyj.com | |
| pufygug.com |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET TROJAN Win32.Shiz.fxm/Agent-TBT Checkin
ET POLICY Unsupported/Fake Windows NT Version 5.0
ET POLICY Unsupported/Fake Internet Explorer Version MSIE 2.
ET TROJAN Known Sinkhole Response Header
Traffic
POST /login.php HTTP/1.0
Content-Type: application/x-www-form-urlencoded
Referer: hXXp://VVV.google.com
User-Agent: Mozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)
Host: qekyqop.com
Content-Length: 9
Pragma: no-cache
....~7.~'
HTTP/1.1 200 OK
Date: Fri, 15 Aug 2014 19:28:06 GMT
Connection: close
Cache-Control: private, no-cache, no-store, max-age=0
Expires: Mon, 01 Jan 1990 0:00:00 GMT
X-Frame-Options: DENY
<!DOCTYPE html><html><head>.<meta charset="utf-8"
><style type="text/css"><!--.html, body, #partner, iframe
{height:100%; width:100%; margin:0; padding:0; border:0; outline:0; fo
nt-size:100%; vertical-align:baseline; background:transparent;}body {o
verflow:hidden;}--></style>.<meta name="expires" content="
NOW"><meta name="GOOGLEBOT" content="index, follow, all"><
meta name="robots" content="index, follow, all"><meta name="view
port" content="width=device-width; initial-scale=1.0; maximum-scale=1.
0; user-scalable=0;"></head>.<body><div id="partner"
><style type="text/css">a.mp {float: left; margin: 3x 5px 1px
5px;padding: 4px; border-top: 1px solid #cec5a0; border-bottom: 2px s
olid #ea0; border-left: 1px solid #cec5a0; border-right: 2px solid #ea
0; background: #f8f3d4; text-align: center; text-decoration: none; fon
t: normal 14px Arial; color: #04336d;} a.mp:hover { text-decoration:
underline;}</style><div style="font-family: Arial; text-align
:center"><table width="790" cellspacing="0" cellpadding="5" styl
e="margin: 0 auto 0 auto; text-align:left;">.<tr>.<td vali
gn="middle">This domain has expired. Please <a href="hXXp://VVV.
dynadot.com/community/help/question/renew-domain">renew</a> i
t at <a href="hXXp://VVV.dynadot.com" target="_blank">Dynadot.co
m</a>
<small>$9.99 domains, $2.00 privacy, $1.00
hosting, $15.99 ssl certs</small></td>.POST /login.php HTTP/1.0 Content-Type: application/x-www-form-urlencodedReferer: hXXp://VVV.google.comUser-Agent: Mozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)Host: gatyfus.comContent-Length: 9Pragma: no-cache....~7.~'
HTTP/1.1 200 OKServer: nginx/1.6.0Date: Fri, 15 Aug 2014 22:27:47 GMTContent-Type: text/html; charset=utf-8Content-Length: 4Connection: close'OK'..
POST /login.php HTTP/1.0Content-Type: application/x-www-form-urlencodedReferer: hXXp://VVV.google.comUser-Agent: Mozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)Host: vowydef.comContent-Length: 9Pragma: no-cache....~7.~'
HTTP/1.1 200 OKDate: Fri, 15 Aug 2014 19:28:11 GMTServer: Apache/2.2.20 (Ubuntu)X-Sinkhole: malware-sinkholeVary: Accept-EncodingContent-Length: 0Connection: closeContent-Type: text/html
POST /login.php HTTP/1.0Content-Type: application/x-www-form-urlencodedReferer: hXXp://VVV.google.comUser-Agent: Mozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)Host: vocyzit.comContent-Length: 9Pragma: no-cache....~7.~'
HTTP/1.1 200 OKServer: nginx/1.6.0Date: Fri, 15 Aug 2014 19:28:09 GMTContent-Type: text/plain; charset=utf-8Content-Length: 0Connection: close
POST /login.php HTTP/1.0Content-Type: application/x-www-form-urlencodedReferer: hXXp://VVV.google.comUser-Agent: Mozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)Host: lymysan.comContent-Length: 9Pragma: no-cache....~7.~'
HTTP/1.1 200 OKServer: nginx/1.2.1Date: Fri, 15 Aug 2014 19:28:11 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.4.15-1~dotdeb.2
The Trojan connects to the servers at the folowing location(s):
winlogon.exe_716_rwx_01940000_000B4000:
.text`.data.reloc`.rdata@.data<>httpPSShLSSShptUSSShSSShp;SSSh0SSShpkSSShpFt9SSShu1SSShPname.key\secrets.keysign.keykernel32.dll\explorer.exeuser32.dllmulti_pot.exeHookExplorer.exeproc_analyzer.exesckTool.exesniff_hit.exesysAnalyzer.exeidag.exeollydbg.exedumpcap.exewireshark.exeC:\iDEFENSE\\.\NPF_NdisWanIpavp.exeSoftware\Microsoft\Windows NT\CurrentVersion%s!%s!Xsoftware\microsoft\windows nt\currentversion\winlogonsoftware\microsoft\windows\currentversion\run\winlogon.exesysinfo.logscr.bmpminidump.bin%d.%d.%d.%dÝ %dh %dm%s:%dSoftware\Microsoft\Internet Explorer\TypedURLsurl%i4.4.10%dx%d@%d%c%d:d{Windows directory:links.log\History.IE5\index.dat\Opera\Opera\typed_history.xmlavast.com93.191.13.100drwebeset.comz-oleg.comkltest.org.ru.comodo.comgoogle.comDnsapi.dllws2_32.dllMozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)Mozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)/login.phpntdll.dllGlobal\{EAF799BF-8249-4fe1-9A0D-92CD3CC22014}Global\{EAF799BF-8449-4fe1-9A0D-95CD39DC2014}Global\HighMemoryEvent_xexplorer.exe1.2.5- zip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllunzip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllWinmm.dllKernel32.dllGdi32.dllhXXp://hXXps://HTTP/1.nspr4.dllPR_OpenTCPSocket[[[URL: %sProcess: %sUser-agent: %s]]]{{{%sCrypt32.dllCertVerifyCertificateChainPolicyWininet.dllHttpSendRequestAHttpSendRequestWHttpSendRequestExAHttpSendRequestExWset_urlmicrosoft.public.win32.programmer.kernel\iexplore.exekeygrabu.bmp\\.\PhysicalDrive%u/topic.phpkeylog.txtpasswords.txt%s%u.zipContent-Disposition: form-data; name="file"; filename="report"HTTP/1.0Content-Type: application/x-www-form-urlencodedReferer: hXXp://VVV.google.comContent-Type: multipart/form-data; boundary=---------------------------%sVVV.bing.comVVV.microsoft.comfrd.execommand=config&update_url=/search.php&port=command=load&url=SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0001SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0002SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0003hid=%s&username=SYSTEM&compname=%s&bot_version=4.4.10&uptime=%u&os=u&local_time=%s%d&token=%d&socks_port=%u&hardware[display]=%s&hardware[driver_av]=%s\chrome.exe\svchost.exe\java.exe\javaw.exe\javaws.exe\opera.exe\firefox.exe\maxthon.exe\avant.exe\mnp.exe\safari.exe\netscape.exe\tbb-firefox.exe\frd.exe\isclient.exe\ipc_full.exe\intpro.exe\cbsmain.dll\clmain.exe\core.exe\rundll32.exe\notepad.exe\cbank.exeiexplore.exe|opera.exe|java.exe|javaw.exe|explorer.exe|isclient.exe|intpro.exe|ipc_full.exe|mnp.exe|cbsmain.dll|firefox.exe|clmain.exe|core.exe|maxthon.exe|avant.exe|safari.exe|svchost.exe|chrome.exe|notepad.exe|rundll32.exe|netscape.exe|tbb-firefox.exe|frd.exe|cbank.exe|%s.dbf%s.DBFj_password=pass.logcommand=auth_loginByPassword&back_command=&back_custom1=&edClientLogin=edUserLogin=edPassword=&LOGIN_AUTHORIZATION_CODE=login=password=pass_advapi32.dllpath.txtkeys.zipLocal\{BE3C9D87-B91F-4e47-8B00-69798A04C732}%s\d.bmpLocal\{AA53E2BF-8989-4fe1-9A0D-95CD39DC0A14}Local\{EAF799BF-8989-4fe1-9A0D-95CD39D44014}keysprivate.txtpublic.txt\*.key\self.cerself.cerself.pubLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC2014}ctunnel.exectunnel.zippath_ctunnel.txtheader.keykeys99\header.keymasks2.key\masks2.keymasks.key\masks.key\name.keyprimary2.key\primary2.keyprimary.key\primary.keykeys99.zippath99.txtbsi.dll&domain=letitbit.net&cc.txtLocal\{EAF799BF-8989-4fa1-9A0D-95CD39DC0214}prv_key.pfxkeys\sign.cerLocal\{AAFEE2BF-8989-4fe1-9A0D-95CD39DC0A14}sks2xyz.dllvb_pfx_importLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC0214}secret.keypubkeys.keyLocal\{AAF799BF-8989-4fe1-9A0D-95CD39DC0A14}path1.txtinter.zipinterpro.iniLocal\{EAF329BF-8989-4fe1-9A0D-95CD39DC0214}Local\{AAF733BF-8989-4fe1-9A0D-95CD39DC0A14}cbsmain.dllLocal\{BE3C9D87-B777-4e47-8B10-69798A04C732}pass.txtLocal\{EAF799BF-8989-4fe1-9A0D-95CD777C0214}FilialRCon.dllISClient.cfgLocal\{EAF777BF-8989-4fe1-9A0D-95CD777C0214}rfk.zipclient.zippath_client.txtpath_keys.txtLocal\{EAF777FF-8989-4fe1-9A0D-95CD777C0214}Local\{EAF777FF-8989-4fe1-977D-95CD777C0214}Agava_Client.exeKeysDiskPathAgava_Client.iniAgava_keyskeys_path.txtmespro.dllAddPSEPrivateKeyExcore.exedata\id.dbf\data\id.dbfkeys%i.zippath%i.txtLocal\{EAF7722F-8989-4fe1-977D-95CD777C0214}Software\Microsoft\Windows NT\CurrentVersion\Winlogonwinmm.dll%s\%sLibVNCServer 0.9.7%s (%s)d/d/d d:dpassword check failed!WinSCard.dllSensApi.dllGetTcpTableIPHLPAPI.DLLdbghelp.dllMSVCRT.dllPSAPI.DLLNETAPI32.dllDNSAPI.dllHttpQueryInfoAHttpAddRequestHeadersWHttpAddRequestHeadersAHttpOpenRequestAWININET.dllWS2_32.dllShellExecuteASHFileOperationASHELL32.dllSHLWAPI.dllGetSystemWindowsDirectoryAGetProcessHeapWinExecKERNEL32.dllMapVirtualKeyWSetKeyboardStateEnumChildWindowsGetKeyboardStateMsgWaitForMultipleObjectsUSER32.dllSetViewportOrgExGetViewportOrgExGDI32.dllRegOpenKeyExARegCloseKeyRegFlushKeyRegEnumKeyExARegNotifyChangeKeyValueRegDeleteKeyAADVAPI32.dll?456789:;<=!"#$%&'()* ,-./0123;3 #>6.&'2, / 0&7!4-)1#MSCTF.Shared.MAPPING.%xDesk_%u%xMSCTF.Shared.MUTEX.%x.Prev.current1-191j1w1}1?"?(?-?~?;-;5;=;^;|;7"7)7\7~76 6$6(6,6064686mavast.comya.ruserverkey.dat\windows\winlogon.exe_716_rwx_01C70000_000C3000:
.text`.rdata@.data.reloc<>httpPSShLSSShptUSSShSSShp;SSSh0SSShpkSSShpFt9SSShu1SSShPname.key\secrets.keysign.keykernel32.dll\explorer.exeuser32.dllmulti_pot.exeHookExplorer.exeproc_analyzer.exesckTool.exesniff_hit.exesysAnalyzer.exeidag.exeollydbg.exedumpcap.exewireshark.exeC:\iDEFENSE\\.\NPF_NdisWanIpavp.exeSoftware\Microsoft\Windows NT\CurrentVersion%s!%s!Xsoftware\microsoft\windows nt\currentversion\winlogonsoftware\microsoft\windows\currentversion\run\winlogon.exesysinfo.logscr.bmpminidump.bin%d.%d.%d.%dÝ %dh %dm%s:%dSoftware\Microsoft\Internet Explorer\TypedURLsurl%i4.4.10%dx%d@%d%c%d:d{Windows directory:links.log\History.IE5\index.dat\Opera\Opera\typed_history.xmlavast.com93.191.13.100drwebeset.comz-oleg.comkltest.org.ru.comodo.comgoogle.comDnsapi.dllws2_32.dllMozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)Mozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)/login.phpntdll.dllGlobal\{EAF799BF-8249-4fe1-9A0D-92CD3CC22014}Global\{EAF799BF-8449-4fe1-9A0D-95CD39DC2014}Global\HighMemoryEvent_xexplorer.exe1.2.5- zip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllunzip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllWinmm.dllKernel32.dllGdi32.dllhXXp://hXXps://HTTP/1.nspr4.dllPR_OpenTCPSocket[[[URL: %sProcess: %sUser-agent: %s]]]{{{%sCrypt32.dllCertVerifyCertificateChainPolicyWininet.dllHttpSendRequestAHttpSendRequestWHttpSendRequestExAHttpSendRequestExWset_urlmicrosoft.public.win32.programmer.kernel\iexplore.exekeygrabu.bmp\\.\PhysicalDrive%u/topic.phpkeylog.txtpasswords.txt%s%u.zipContent-Disposition: form-data; name="file"; filename="report"HTTP/1.0Content-Type: application/x-www-form-urlencodedReferer: hXXp://VVV.google.comContent-Type: multipart/form-data; boundary=---------------------------%sVVV.bing.comVVV.microsoft.comfrd.execommand=config&update_url=/search.php&port=command=load&url=SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0001SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0002SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0003hid=%s&username=SYSTEM&compname=%s&bot_version=4.4.10&uptime=%u&os=u&local_time=%s%d&token=%d&socks_port=%u&hardware[display]=%s&hardware[driver_av]=%s\chrome.exe\svchost.exe\java.exe\javaw.exe\javaws.exe\opera.exe\firefox.exe\maxthon.exe\avant.exe\mnp.exe\safari.exe\netscape.exe\tbb-firefox.exe\frd.exe\isclient.exe\ipc_full.exe\intpro.exe\cbsmain.dll\clmain.exe\core.exe\rundll32.exe\notepad.exe\cbank.exeiexplore.exe|opera.exe|java.exe|javaw.exe|explorer.exe|isclient.exe|intpro.exe|ipc_full.exe|mnp.exe|cbsmain.dll|firefox.exe|clmain.exe|core.exe|maxthon.exe|avant.exe|safari.exe|svchost.exe|chrome.exe|notepad.exe|rundll32.exe|netscape.exe|tbb-firefox.exe|frd.exe|cbank.exe|%s.dbf%s.DBFj_password=pass.logcommand=auth_loginByPassword&back_command=&back_custom1=&edClientLogin=edUserLogin=edPassword=&LOGIN_AUTHORIZATION_CODE=login=password=pass_advapi32.dllpath.txtkeys.zipLocal\{BE3C9D87-B91F-4e47-8B00-69798A04C732}%s\d.bmpLocal\{AA53E2BF-8989-4fe1-9A0D-95CD39DC0A14}Local\{EAF799BF-8989-4fe1-9A0D-95CD39D44014}keysprivate.txtpublic.txt\*.key\self.cerself.cerself.pubLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC2014}ctunnel.exectunnel.zippath_ctunnel.txtheader.keykeys99\header.keymasks2.key\masks2.keymasks.key\masks.key\name.keyprimary2.key\primary2.keyprimary.key\primary.keykeys99.zippath99.txtbsi.dll&domain=letitbit.net&cc.txtLocal\{EAF799BF-8989-4fa1-9A0D-95CD39DC0214}prv_key.pfxkeys\sign.cerLocal\{AAFEE2BF-8989-4fe1-9A0D-95CD39DC0A14}sks2xyz.dllvb_pfx_importLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC0214}secret.keypubkeys.keyLocal\{AAF799BF-8989-4fe1-9A0D-95CD39DC0A14}path1.txtinter.zipinterpro.iniLocal\{EAF329BF-8989-4fe1-9A0D-95CD39DC0214}Local\{AAF733BF-8989-4fe1-9A0D-95CD39DC0A14}cbsmain.dllLocal\{BE3C9D87-B777-4e47-8B10-69798A04C732}pass.txtLocal\{EAF799BF-8989-4fe1-9A0D-95CD777C0214}FilialRCon.dllISClient.cfgLocal\{EAF777BF-8989-4fe1-9A0D-95CD777C0214}rfk.zipclient.zippath_client.txtpath_keys.txtLocal\{EAF777FF-8989-4fe1-9A0D-95CD777C0214}Local\{EAF777FF-8989-4fe1-977D-95CD777C0214}Agava_Client.exeKeysDiskPathAgava_Client.iniAgava_keyskeys_path.txtmespro.dllAddPSEPrivateKeyExcore.exedata\id.dbf\data\id.dbfkeys%i.zippath%i.txtLocal\{EAF7722F-8989-4fe1-977D-95CD777C0214}Software\Microsoft\Windows NT\CurrentVersion\Winlogonwinmm.dll%s\%sLibVNCServer 0.9.7%s (%s)d/d/d d:dpassword check failed!WinSCard.dllSensApi.dllGetTcpTableIPHLPAPI.DLLdbghelp.dllMSVCRT.dllPSAPI.DLLNETAPI32.dllDNSAPI.dllHttpQueryInfoAHttpAddRequestHeadersWHttpAddRequestHeadersAHttpOpenRequestAWININET.dllWS2_32.dllShellExecuteASHFileOperationASHELL32.dllSHLWAPI.dllGetSystemWindowsDirectoryAGetProcessHeapWinExecKERNEL32.dllMapVirtualKeyWSetKeyboardStateEnumChildWindowsGetKeyboardStateMsgWaitForMultipleObjectsUSER32.dllSetViewportOrgExGetViewportOrgExGDI32.dllRegOpenKeyExARegCloseKeyRegFlushKeyRegEnumKeyExARegNotifyChangeKeyValueRegDeleteKeyAADVAPI32.dll?456789:;<=!"#$%&'()* ,-./0123;3 #>6.&'2, / 0&7!4-)1#MSCTF.Shared.MAPPING.%xDesk_%u%xMSCTF.Shared.MUTEX.%x.Prev.currentSYSTEM!XP1!F9BE9A8A%Documents and Settings%\%current user%\Application Data\1-191j1w1}1?"?(?-?~?;-;5;=;^;|;7"7)7\7~76 6$6(6,6064686`.datamavast.comya.ruserverkey.dat\windows\svchost.exe_932_rwx_00ED0000_0005B000:
.text`.data.reloc`.rdata@.data<>httpPSShLSSShptUSSShSSShp;SSSh0SSShpkSSShpFt9SSShu1SSShPname.key\secrets.keysign.keykernel32.dll\explorer.exeuser32.dllmulti_pot.exeHookExplorer.exeproc_analyzer.exesckTool.exesniff_hit.exesysAnalyzer.exeidag.exeollydbg.exedumpcap.exewireshark.exeC:\iDEFENSE\\.\NPF_NdisWanIpavp.exeSoftware\Microsoft\Windows NT\CurrentVersion%s!%s!Xsoftware\microsoft\windows nt\currentversion\winlogonsoftware\microsoft\windows\currentversion\run\winlogon.exesysinfo.logscr.bmpminidump.bin%d.%d.%d.%dÝ %dh %dm%s:%dSoftware\Microsoft\Internet Explorer\TypedURLsurl%i4.4.10%dx%d@%d%c%d:d{Windows directory:links.log\History.IE5\index.dat\Opera\Opera\typed_history.xmlavast.com93.191.13.100drwebeset.comz-oleg.comkltest.org.ru.comodo.comgoogle.comDnsapi.dllws2_32.dllMozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)Mozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)/login.phpntdll.dllGlobal\{EAF799BF-8249-4fe1-9A0D-92CD3CC22014}Global\{EAF799BF-8449-4fe1-9A0D-95CD39DC2014}Global\HighMemoryEvent_xexplorer.exe1.2.5- zip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllunzip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllWinmm.dllKernel32.dllGdi32.dllhXXp://hXXps://HTTP/1.nspr4.dllPR_OpenTCPSocket[[[URL: %sProcess: %sUser-agent: %s]]]{{{%sCrypt32.dllCertVerifyCertificateChainPolicyWininet.dllHttpSendRequestAHttpSendRequestWHttpSendRequestExAHttpSendRequestExWset_urlmicrosoft.public.win32.programmer.kernel\iexplore.exekeygrabu.bmp\\.\PhysicalDrive%u/topic.phpkeylog.txtpasswords.txt%s%u.zipContent-Disposition: form-data; name="file"; filename="report"HTTP/1.0Content-Type: application/x-www-form-urlencodedReferer: hXXp://VVV.google.comContent-Type: multipart/form-data; boundary=---------------------------%sVVV.bing.comVVV.microsoft.comfrd.execommand=config&update_url=/search.php&port=command=load&url=SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0001SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0002SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0003hid=%s&username=SYSTEM&compname=%s&bot_version=4.4.10&uptime=%u&os=u&local_time=%s%d&token=%d&socks_port=%u&hardware[display]=%s&hardware[driver_av]=%s\chrome.exe\svchost.exe\java.exe\javaw.exe\javaws.exe\opera.exe\firefox.exe\maxthon.exe\avant.exe\mnp.exe\safari.exe\netscape.exe\tbb-firefox.exe\frd.exe\isclient.exe\ipc_full.exe\intpro.exe\cbsmain.dll\clmain.exe\core.exe\rundll32.exe\notepad.exe\cbank.exeiexplore.exe|opera.exe|java.exe|javaw.exe|explorer.exe|isclient.exe|intpro.exe|ipc_full.exe|mnp.exe|cbsmain.dll|firefox.exe|clmain.exe|core.exe|maxthon.exe|avant.exe|safari.exe|svchost.exe|chrome.exe|notepad.exe|rundll32.exe|netscape.exe|tbb-firefox.exe|frd.exe|cbank.exe|%s.dbf%s.DBFj_password=pass.logcommand=auth_loginByPassword&back_command=&back_custom1=&edClientLogin=edUserLogin=edPassword=&LOGIN_AUTHORIZATION_CODE=login=password=pass_advapi32.dllpath.txtkeys.zipLocal\{BE3C9D87-B91F-4e47-8B00-69798A04C732}%s\d.bmpLocal\{AA53E2BF-8989-4fe1-9A0D-95CD39DC0A14}Local\{EAF799BF-8989-4fe1-9A0D-95CD39D44014}keysprivate.txtpublic.txt\*.key\self.cerself.cerself.pubLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC2014}ctunnel.exectunnel.zippath_ctunnel.txtheader.keykeys99\header.keymasks2.key\masks2.keymasks.key\masks.key\name.keyprimary2.key\primary2.keyprimary.key\primary.keykeys99.zippath99.txtbsi.dll&domain=letitbit.net&cc.txtLocal\{EAF799BF-8989-4fa1-9A0D-95CD39DC0214}prv_key.pfxkeys\sign.cerLocal\{AAFEE2BF-8989-4fe1-9A0D-95CD39DC0A14}sks2xyz.dllvb_pfx_importLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC0214}secret.keypubkeys.keyLocal\{AAF799BF-8989-4fe1-9A0D-95CD39DC0A14}path1.txtinter.zipinterpro.iniLocal\{EAF329BF-8989-4fe1-9A0D-95CD39DC0214}Local\{AAF733BF-8989-4fe1-9A0D-95CD39DC0A14}cbsmain.dllLocal\{BE3C9D87-B777-4e47-8B10-69798A04C732}pass.txtLocal\{EAF799BF-8989-4fe1-9A0D-95CD777C0214}FilialRCon.dllISClient.cfgLocal\{EAF777BF-8989-4fe1-9A0D-95CD777C0214}rfk.zipclient.zippath_client.txtpath_keys.txtLocal\{EAF777FF-8989-4fe1-9A0D-95CD777C0214}Local\{EAF777FF-8989-4fe1-977D-95CD777C0214}Agava_Client.exeKeysDiskPathAgava_Client.iniAgava_keyskeys_path.txtmespro.dllAddPSEPrivateKeyExcore.exedata\id.dbf\data\id.dbfkeys%i.zippath%i.txtLocal\{EAF7722F-8989-4fe1-977D-95CD777C0214}Software\Microsoft\Windows NT\CurrentVersion\Winlogonwinmm.dll%s\%sLibVNCServer 0.9.7%s (%s)d/d/d d:dpassword check failed!WinSCard.dllSensApi.dllGetTcpTableIPHLPAPI.DLLdbghelp.dllMSVCRT.dllPSAPI.DLLNETAPI32.dllDNSAPI.dllHttpQueryInfoAHttpAddRequestHeadersWHttpAddRequestHeadersAHttpOpenRequestAWININET.dllWS2_32.dllShellExecuteASHFileOperationASHELL32.dllSHLWAPI.dllGetSystemWindowsDirectoryAGetProcessHeapWinExecKERNEL32.dllMapVirtualKeyWSetKeyboardStateEnumChildWindowsGetKeyboardStateMsgWaitForMultipleObjectsUSER32.dllSetViewportOrgExGetViewportOrgExGDI32.dllRegOpenKeyExARegCloseKeyRegFlushKeyRegEnumKeyExARegNotifyChangeKeyValueRegDeleteKeyAADVAPI32.dll?456789:;<=!"#$%&'()* ,-./0123;3 #>6.&'2, / 0&7!4-)1#MSCTF.Shared.MAPPING.%xDesk_%u%xMSCTF.Shared.MUTEX.%x.Prev.current1-191j1w1}1?"?(?-?~?;-;5;=;^;|;7"7)7\7~76 6$6(6,6064686mavast.comya.ruserverkey.dat\windows\svchost.exe_932_rwx_00F30000_0006A000:
.text`.rdata@.data.reloc<>httpPSShLSSShptUSSShSSShp;SSSh0SSShpkSSShpFt9SSShu1SSShPname.key\secrets.keysign.keykernel32.dll\explorer.exeuser32.dllmulti_pot.exeHookExplorer.exeproc_analyzer.exesckTool.exesniff_hit.exesysAnalyzer.exeidag.exeollydbg.exedumpcap.exewireshark.exeC:\iDEFENSE\\.\NPF_NdisWanIpavp.exeSoftware\Microsoft\Windows NT\CurrentVersion%s!%s!Xsoftware\microsoft\windows nt\currentversion\winlogonsoftware\microsoft\windows\currentversion\run\winlogon.exesysinfo.logscr.bmpminidump.bin%d.%d.%d.%dÝ %dh %dm%s:%dSoftware\Microsoft\Internet Explorer\TypedURLsurl%i4.4.10%dx%d@%d%c%d:d{Windows directory:links.log\History.IE5\index.dat\Opera\Opera\typed_history.xmlavast.com93.191.13.100drwebeset.comz-oleg.comkltest.org.ru.comodo.comgoogle.comDnsapi.dllws2_32.dllMozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)Mozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)/login.phpntdll.dllGlobal\{EAF799BF-8249-4fe1-9A0D-92CD3CC22014}Global\{EAF799BF-8449-4fe1-9A0D-95CD39DC2014}Global\HighMemoryEvent_xexplorer.exe1.2.5- zip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllunzip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllWinmm.dllKernel32.dllGdi32.dllhXXp://hXXps://HTTP/1.nspr4.dllPR_OpenTCPSocket[[[URL: %sProcess: %sUser-agent: %s]]]{{{%sCrypt32.dllCertVerifyCertificateChainPolicyWininet.dllHttpSendRequestAHttpSendRequestWHttpSendRequestExAHttpSendRequestExWset_urlmicrosoft.public.win32.programmer.kernel\iexplore.exekeygrabu.bmp\\.\PhysicalDrive%u/topic.phpkeylog.txtpasswords.txt%s%u.zipContent-Disposition: form-data; name="file"; filename="report"HTTP/1.0Content-Type: application/x-www-form-urlencodedReferer: hXXp://VVV.google.comContent-Type: multipart/form-data; boundary=---------------------------%sVVV.bing.comVVV.microsoft.comfrd.execommand=config&update_url=/search.php&port=command=load&url=SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0001SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0002SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0003hid=%s&username=SYSTEM&compname=%s&bot_version=4.4.10&uptime=%u&os=u&local_time=%s%d&token=%d&socks_port=%u&hardware[display]=%s&hardware[driver_av]=%s\chrome.exe\svchost.exe\java.exe\javaw.exe\javaws.exe\opera.exe\firefox.exe\maxthon.exe\avant.exe\mnp.exe\safari.exe\netscape.exe\tbb-firefox.exe\frd.exe\isclient.exe\ipc_full.exe\intpro.exe\cbsmain.dll\clmain.exe\core.exe\rundll32.exe\notepad.exe\cbank.exeiexplore.exe|opera.exe|java.exe|javaw.exe|explorer.exe|isclient.exe|intpro.exe|ipc_full.exe|mnp.exe|cbsmain.dll|firefox.exe|clmain.exe|core.exe|maxthon.exe|avant.exe|safari.exe|svchost.exe|chrome.exe|notepad.exe|rundll32.exe|netscape.exe|tbb-firefox.exe|frd.exe|cbank.exe|%s.dbf%s.DBFj_password=pass.logcommand=auth_loginByPassword&back_command=&back_custom1=&edClientLogin=edUserLogin=edPassword=&LOGIN_AUTHORIZATION_CODE=login=password=pass_advapi32.dllpath.txtkeys.zipLocal\{BE3C9D87-B91F-4e47-8B00-69798A04C732}%s\d.bmpLocal\{AA53E2BF-8989-4fe1-9A0D-95CD39DC0A14}Local\{EAF799BF-8989-4fe1-9A0D-95CD39D44014}keysprivate.txtpublic.txt\*.key\self.cerself.cerself.pubLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC2014}ctunnel.exectunnel.zippath_ctunnel.txtheader.keykeys99\header.keymasks2.key\masks2.keymasks.key\masks.key\name.keyprimary2.key\primary2.keyprimary.key\primary.keykeys99.zippath99.txtbsi.dll&domain=letitbit.net&cc.txtLocal\{EAF799BF-8989-4fa1-9A0D-95CD39DC0214}prv_key.pfxkeys\sign.cerLocal\{AAFEE2BF-8989-4fe1-9A0D-95CD39DC0A14}sks2xyz.dllvb_pfx_importLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC0214}secret.keypubkeys.keyLocal\{AAF799BF-8989-4fe1-9A0D-95CD39DC0A14}path1.txtinter.zipinterpro.iniLocal\{EAF329BF-8989-4fe1-9A0D-95CD39DC0214}Local\{AAF733BF-8989-4fe1-9A0D-95CD39DC0A14}cbsmain.dllLocal\{BE3C9D87-B777-4e47-8B10-69798A04C732}pass.txtLocal\{EAF799BF-8989-4fe1-9A0D-95CD777C0214}FilialRCon.dllISClient.cfgLocal\{EAF777BF-8989-4fe1-9A0D-95CD777C0214}rfk.zipclient.zippath_client.txtpath_keys.txtLocal\{EAF777FF-8989-4fe1-9A0D-95CD777C0214}Local\{EAF777FF-8989-4fe1-977D-95CD777C0214}Agava_Client.exeKeysDiskPathAgava_Client.iniAgava_keyskeys_path.txtmespro.dllAddPSEPrivateKeyExcore.exedata\id.dbf\data\id.dbfkeys%i.zippath%i.txtLocal\{EAF7722F-8989-4fe1-977D-95CD777C0214}Software\Microsoft\Windows NT\CurrentVersion\Winlogonwinmm.dll%s\%sLibVNCServer 0.9.7%s (%s)d/d/d d:dpassword check failed!WinSCard.dllSensApi.dllGetTcpTableIPHLPAPI.DLLdbghelp.dllMSVCRT.dllPSAPI.DLLNETAPI32.dllDNSAPI.dllHttpQueryInfoAHttpAddRequestHeadersWHttpAddRequestHeadersAHttpOpenRequestAWININET.dllWS2_32.dllShellExecuteASHFileOperationASHELL32.dllSHLWAPI.dllGetSystemWindowsDirectoryAGetProcessHeapWinExecKERNEL32.dllMapVirtualKeyWSetKeyboardStateEnumChildWindowsGetKeyboardStateMsgWaitForMultipleObjectsUSER32.dllSetViewportOrgExGetViewportOrgExGDI32.dllRegOpenKeyExARegCloseKeyRegFlushKeyRegEnumKeyExARegNotifyChangeKeyValueRegDeleteKeyAADVAPI32.dll?456789:;<=!"#$%&'()* ,-./0123;3 #>6.&'2, / 0&7!4-)1#MSCTF.Shared.MAPPING.%xDesk_%u%xMSCTF.Shared.MUTEX.%x.Prev.currentSYSTEM!XP1!F9BE9A8AMSCTF.Shared.MAPPING.fffffe00MSCTF.Shared.MAPPING.ffffff00MSCTF.Shared.MAPPING.fffffd00MSCTF.Shared.MUTEX.fffffe00MSCTF.Shared.MUTEX.ffffff00%System%\config\systemprofile\Application Data\1-191j1w1}1?"?(?-?~?;-;5;=;^;|;7"7)7\7~76 6$6(6,6064686mavast.comya.ruserverkey.dat\windows\svchost.exe_1012_rwx_00B00000_0005B000:
.text`.data.reloc`.rdata@.data<>httpPSShLSSShptUSSShSSShp;SSSh0SSShpkSSShpFt9SSShu1SSShPname.key\secrets.keysign.keykernel32.dll\explorer.exeuser32.dllmulti_pot.exeHookExplorer.exeproc_analyzer.exesckTool.exesniff_hit.exesysAnalyzer.exeidag.exeollydbg.exedumpcap.exewireshark.exeC:\iDEFENSE\\.\NPF_NdisWanIpavp.exeSoftware\Microsoft\Windows NT\CurrentVersion%s!%s!Xsoftware\microsoft\windows nt\currentversion\winlogonsoftware\microsoft\windows\currentversion\run\winlogon.exesysinfo.logscr.bmpminidump.bin%d.%d.%d.%dÝ %dh %dm%s:%dSoftware\Microsoft\Internet Explorer\TypedURLsurl%i4.4.10%dx%d@%d%c%d:d{Windows directory:links.log\History.IE5\index.dat\Opera\Opera\typed_history.xmlavast.com93.191.13.100drwebeset.comz-oleg.comkltest.org.ru.comodo.comgoogle.comDnsapi.dllws2_32.dllMozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)Mozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)/login.phpntdll.dllGlobal\{EAF799BF-8249-4fe1-9A0D-92CD3CC22014}Global\{EAF799BF-8449-4fe1-9A0D-95CD39DC2014}Global\HighMemoryEvent_xexplorer.exe1.2.5- zip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllunzip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllWinmm.dllKernel32.dllGdi32.dllhXXp://hXXps://HTTP/1.nspr4.dllPR_OpenTCPSocket[[[URL: %sProcess: %sUser-agent: %s]]]{{{%sCrypt32.dllCertVerifyCertificateChainPolicyWininet.dllHttpSendRequestAHttpSendRequestWHttpSendRequestExAHttpSendRequestExWset_urlmicrosoft.public.win32.programmer.kernel\iexplore.exekeygrabu.bmp\\.\PhysicalDrive%u/topic.phpkeylog.txtpasswords.txt%s%u.zipContent-Disposition: form-data; name="file"; filename="report"HTTP/1.0Content-Type: application/x-www-form-urlencodedReferer: hXXp://VVV.google.comContent-Type: multipart/form-data; boundary=---------------------------%sVVV.bing.comVVV.microsoft.comfrd.execommand=config&update_url=/search.php&port=command=load&url=SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0001SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0002SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0003hid=%s&username=SYSTEM&compname=%s&bot_version=4.4.10&uptime=%u&os=u&local_time=%s%d&token=%d&socks_port=%u&hardware[display]=%s&hardware[driver_av]=%s\chrome.exe\svchost.exe\java.exe\javaw.exe\javaws.exe\opera.exe\firefox.exe\maxthon.exe\avant.exe\mnp.exe\safari.exe\netscape.exe\tbb-firefox.exe\frd.exe\isclient.exe\ipc_full.exe\intpro.exe\cbsmain.dll\clmain.exe\core.exe\rundll32.exe\notepad.exe\cbank.exeiexplore.exe|opera.exe|java.exe|javaw.exe|explorer.exe|isclient.exe|intpro.exe|ipc_full.exe|mnp.exe|cbsmain.dll|firefox.exe|clmain.exe|core.exe|maxthon.exe|avant.exe|safari.exe|svchost.exe|chrome.exe|notepad.exe|rundll32.exe|netscape.exe|tbb-firefox.exe|frd.exe|cbank.exe|%s.dbf%s.DBFj_password=pass.logcommand=auth_loginByPassword&back_command=&back_custom1=&edClientLogin=edUserLogin=edPassword=&LOGIN_AUTHORIZATION_CODE=login=password=pass_advapi32.dllpath.txtkeys.zipLocal\{BE3C9D87-B91F-4e47-8B00-69798A04C732}%s\d.bmpLocal\{AA53E2BF-8989-4fe1-9A0D-95CD39DC0A14}Local\{EAF799BF-8989-4fe1-9A0D-95CD39D44014}keysprivate.txtpublic.txt\*.key\self.cerself.cerself.pubLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC2014}ctunnel.exectunnel.zippath_ctunnel.txtheader.keykeys99\header.keymasks2.key\masks2.keymasks.key\masks.key\name.keyprimary2.key\primary2.keyprimary.key\primary.keykeys99.zippath99.txtbsi.dll&domain=letitbit.net&cc.txtLocal\{EAF799BF-8989-4fa1-9A0D-95CD39DC0214}prv_key.pfxkeys\sign.cerLocal\{AAFEE2BF-8989-4fe1-9A0D-95CD39DC0A14}sks2xyz.dllvb_pfx_importLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC0214}secret.keypubkeys.keyLocal\{AAF799BF-8989-4fe1-9A0D-95CD39DC0A14}path1.txtinter.zipinterpro.iniLocal\{EAF329BF-8989-4fe1-9A0D-95CD39DC0214}Local\{AAF733BF-8989-4fe1-9A0D-95CD39DC0A14}cbsmain.dllLocal\{BE3C9D87-B777-4e47-8B10-69798A04C732}pass.txtLocal\{EAF799BF-8989-4fe1-9A0D-95CD777C0214}FilialRCon.dllISClient.cfgLocal\{EAF777BF-8989-4fe1-9A0D-95CD777C0214}rfk.zipclient.zippath_client.txtpath_keys.txtLocal\{EAF777FF-8989-4fe1-9A0D-95CD777C0214}Local\{EAF777FF-8989-4fe1-977D-95CD777C0214}Agava_Client.exeKeysDiskPathAgava_Client.iniAgava_keyskeys_path.txtmespro.dllAddPSEPrivateKeyExcore.exedata\id.dbf\data\id.dbfkeys%i.zippath%i.txtLocal\{EAF7722F-8989-4fe1-977D-95CD777C0214}Software\Microsoft\Windows NT\CurrentVersion\Winlogonwinmm.dll%s\%sLibVNCServer 0.9.7%s (%s)d/d/d d:dpassword check failed!WinSCard.dllSensApi.dllGetTcpTableIPHLPAPI.DLLdbghelp.dllMSVCRT.dllPSAPI.DLLNETAPI32.dllDNSAPI.dllHttpQueryInfoAHttpAddRequestHeadersWHttpAddRequestHeadersAHttpOpenRequestAWININET.dllWS2_32.dllShellExecuteASHFileOperationASHELL32.dllSHLWAPI.dllGetSystemWindowsDirectoryAGetProcessHeapWinExecKERNEL32.dllMapVirtualKeyWSetKeyboardStateEnumChildWindowsGetKeyboardStateMsgWaitForMultipleObjectsUSER32.dllSetViewportOrgExGetViewportOrgExGDI32.dllRegOpenKeyExARegCloseKeyRegFlushKeyRegEnumKeyExARegNotifyChangeKeyValueRegDeleteKeyAADVAPI32.dll?456789:;<=!"#$%&'()* ,-./0123;3 #>6.&'2, / 0&7!4-)1#MSCTF.Shared.MAPPING.%xDesk_%u%xMSCTF.Shared.MUTEX.%x.Prev.current1-191j1w1}1?"?(?-?~?;-;5;=;^;|;7"7)7\7~76 6$6(6,6064686mavast.comya.ruserverkey.dat\windows\svchost.exe_1012_rwx_00BA0000_0006A000:
.text`.rdata@.data.reloc<>httpPSShLSSShptUSSShSSShp;SSSh0SSShpkSSShpFt9SSShu1SSShPname.key\secrets.keysign.keykernel32.dll\explorer.exeuser32.dllmulti_pot.exeHookExplorer.exeproc_analyzer.exesckTool.exesniff_hit.exesysAnalyzer.exeidag.exeollydbg.exedumpcap.exewireshark.exeC:\iDEFENSE\\.\NPF_NdisWanIpavp.exeSoftware\Microsoft\Windows NT\CurrentVersion%s!%s!Xsoftware\microsoft\windows nt\currentversion\winlogonsoftware\microsoft\windows\currentversion\run\winlogon.exesysinfo.logscr.bmpminidump.bin%d.%d.%d.%dÝ %dh %dm%s:%dSoftware\Microsoft\Internet Explorer\TypedURLsurl%i4.4.10%dx%d@%d%c%d:d{Windows directory:links.log\History.IE5\index.dat\Opera\Opera\typed_history.xmlavast.com93.191.13.100drwebeset.comz-oleg.comkltest.org.ru.comodo.comgoogle.comDnsapi.dllws2_32.dllMozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)Mozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)/login.phpntdll.dllGlobal\{EAF799BF-8249-4fe1-9A0D-92CD3CC22014}Global\{EAF799BF-8449-4fe1-9A0D-95CD39DC2014}Global\HighMemoryEvent_xexplorer.exe1.2.5- zip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllunzip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllWinmm.dllKernel32.dllGdi32.dllhXXp://hXXps://HTTP/1.nspr4.dllPR_OpenTCPSocket[[[URL: %sProcess: %sUser-agent: %s]]]{{{%sCrypt32.dllCertVerifyCertificateChainPolicyWininet.dllHttpSendRequestAHttpSendRequestWHttpSendRequestExAHttpSendRequestExWset_urlmicrosoft.public.win32.programmer.kernel\iexplore.exekeygrabu.bmp\\.\PhysicalDrive%u/topic.phpkeylog.txtpasswords.txt%s%u.zipContent-Disposition: form-data; name="file"; filename="report"HTTP/1.0Content-Type: application/x-www-form-urlencodedReferer: hXXp://VVV.google.comContent-Type: multipart/form-data; boundary=---------------------------%sVVV.bing.comVVV.microsoft.comfrd.execommand=config&update_url=/search.php&port=command=load&url=SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0001SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0002SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0003hid=%s&username=SYSTEM&compname=%s&bot_version=4.4.10&uptime=%u&os=u&local_time=%s%d&token=%d&socks_port=%u&hardware[display]=%s&hardware[driver_av]=%s\chrome.exe\svchost.exe\java.exe\javaw.exe\javaws.exe\opera.exe\firefox.exe\maxthon.exe\avant.exe\mnp.exe\safari.exe\netscape.exe\tbb-firefox.exe\frd.exe\isclient.exe\ipc_full.exe\intpro.exe\cbsmain.dll\clmain.exe\core.exe\rundll32.exe\notepad.exe\cbank.exeiexplore.exe|opera.exe|java.exe|javaw.exe|explorer.exe|isclient.exe|intpro.exe|ipc_full.exe|mnp.exe|cbsmain.dll|firefox.exe|clmain.exe|core.exe|maxthon.exe|avant.exe|safari.exe|svchost.exe|chrome.exe|notepad.exe|rundll32.exe|netscape.exe|tbb-firefox.exe|frd.exe|cbank.exe|%s.dbf%s.DBFj_password=pass.logcommand=auth_loginByPassword&back_command=&back_custom1=&edClientLogin=edUserLogin=edPassword=&LOGIN_AUTHORIZATION_CODE=login=password=pass_advapi32.dllpath.txtkeys.zipLocal\{BE3C9D87-B91F-4e47-8B00-69798A04C732}%s\d.bmpLocal\{AA53E2BF-8989-4fe1-9A0D-95CD39DC0A14}Local\{EAF799BF-8989-4fe1-9A0D-95CD39D44014}keysprivate.txtpublic.txt\*.key\self.cerself.cerself.pubLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC2014}ctunnel.exectunnel.zippath_ctunnel.txtheader.keykeys99\header.keymasks2.key\masks2.keymasks.key\masks.key\name.keyprimary2.key\primary2.keyprimary.key\primary.keykeys99.zippath99.txtbsi.dll&domain=letitbit.net&cc.txtLocal\{EAF799BF-8989-4fa1-9A0D-95CD39DC0214}prv_key.pfxkeys\sign.cerLocal\{AAFEE2BF-8989-4fe1-9A0D-95CD39DC0A14}sks2xyz.dllvb_pfx_importLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC0214}secret.keypubkeys.keyLocal\{AAF799BF-8989-4fe1-9A0D-95CD39DC0A14}path1.txtinter.zipinterpro.iniLocal\{EAF329BF-8989-4fe1-9A0D-95CD39DC0214}Local\{AAF733BF-8989-4fe1-9A0D-95CD39DC0A14}cbsmain.dllLocal\{BE3C9D87-B777-4e47-8B10-69798A04C732}pass.txtLocal\{EAF799BF-8989-4fe1-9A0D-95CD777C0214}FilialRCon.dllISClient.cfgLocal\{EAF777BF-8989-4fe1-9A0D-95CD777C0214}rfk.zipclient.zippath_client.txtpath_keys.txtLocal\{EAF777FF-8989-4fe1-9A0D-95CD777C0214}Local\{EAF777FF-8989-4fe1-977D-95CD777C0214}Agava_Client.exeKeysDiskPathAgava_Client.iniAgava_keyskeys_path.txtmespro.dllAddPSEPrivateKeyExcore.exedata\id.dbf\data\id.dbfkeys%i.zippath%i.txtLocal\{EAF7722F-8989-4fe1-977D-95CD777C0214}Software\Microsoft\Windows NT\CurrentVersion\Winlogonwinmm.dll%s\%sLibVNCServer 0.9.7%s (%s)d/d/d d:dpassword check failed!WinSCard.dllSensApi.dllGetTcpTableIPHLPAPI.DLLdbghelp.dllMSVCRT.dllPSAPI.DLLNETAPI32.dllDNSAPI.dllHttpQueryInfoAHttpAddRequestHeadersWHttpAddRequestHeadersAHttpOpenRequestAWININET.dllWS2_32.dllShellExecuteASHFileOperationASHELL32.dllSHLWAPI.dllGetSystemWindowsDirectoryAGetProcessHeapWinExecKERNEL32.dllMapVirtualKeyWSetKeyboardStateEnumChildWindowsGetKeyboardStateMsgWaitForMultipleObjectsUSER32.dllSetViewportOrgExGetViewportOrgExGDI32.dllRegOpenKeyExARegCloseKeyRegFlushKeyRegEnumKeyExARegNotifyChangeKeyValueRegDeleteKeyAADVAPI32.dll?456789:;<=!"#$%&'()* ,-./0123;3 #>6.&'2, / 0&7!4-)1#MSCTF.Shared.MAPPING.%xDesk_%u%xMSCTF.Shared.MUTEX.%x.Prev.currentNETWORKSERVICE!XP1!F9BE9A8AMSCTF.Shared.MAPPING.fffffe00MSCTF.Shared.MAPPING.ffffff00MSCTF.Shared.MAPPING.fffffd00MSCTF.Shared.MUTEX.fffffe00MSCTF.Shared.MUTEX.ffffff00%Documents and Settings%\NetworkService\Application Data\1-191j1w1}1?"?(?-?~?;-;5;=;^;|;7"7)7\7~76 6$6(6,6064686mavast.comya.ruserverkey.dat\windows\svchost.exe_1100_rwx_02FE0000_0005B000:
.text`.data.reloc`.rdata@.data<>httpPSShLSSShptUSSShSSShp;SSSh0SSShpkSSShpFt9SSShu1SSShPname.key\secrets.keysign.keykernel32.dll\explorer.exeuser32.dllmulti_pot.exeHookExplorer.exeproc_analyzer.exesckTool.exesniff_hit.exesysAnalyzer.exeidag.exeollydbg.exedumpcap.exewireshark.exeC:\iDEFENSE\\.\NPF_NdisWanIpavp.exeSoftware\Microsoft\Windows NT\CurrentVersion%s!%s!Xsoftware\microsoft\windows nt\currentversion\winlogonsoftware\microsoft\windows\currentversion\run\winlogon.exesysinfo.logscr.bmpminidump.bin%d.%d.%d.%dÝ %dh %dm%s:%dSoftware\Microsoft\Internet Explorer\TypedURLsurl%i4.4.10%dx%d@%d%c%d:d{Windows directory:links.log\History.IE5\index.dat\Opera\Opera\typed_history.xmlavast.com93.191.13.100drwebeset.comz-oleg.comkltest.org.ru.comodo.comgoogle.comDnsapi.dllws2_32.dllMozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)Mozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)/login.phpntdll.dllGlobal\{EAF799BF-8249-4fe1-9A0D-92CD3CC22014}Global\{EAF799BF-8449-4fe1-9A0D-95CD39DC2014}Global\HighMemoryEvent_xexplorer.exe1.2.5- zip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllunzip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllWinmm.dllKernel32.dllGdi32.dllhXXp://hXXps://HTTP/1.nspr4.dllPR_OpenTCPSocket[[[URL: %sProcess: %sUser-agent: %s]]]{{{%sCrypt32.dllCertVerifyCertificateChainPolicyWininet.dllHttpSendRequestAHttpSendRequestWHttpSendRequestExAHttpSendRequestExWset_urlmicrosoft.public.win32.programmer.kernel\iexplore.exekeygrabu.bmp\\.\PhysicalDrive%u/topic.phpkeylog.txtpasswords.txt%s%u.zipContent-Disposition: form-data; name="file"; filename="report"HTTP/1.0Content-Type: application/x-www-form-urlencodedReferer: hXXp://VVV.google.comContent-Type: multipart/form-data; boundary=---------------------------%sVVV.bing.comVVV.microsoft.comfrd.execommand=config&update_url=/search.php&port=command=load&url=SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0001SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0002SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0003hid=%s&username=SYSTEM&compname=%s&bot_version=4.4.10&uptime=%u&os=u&local_time=%s%d&token=%d&socks_port=%u&hardware[display]=%s&hardware[driver_av]=%s\chrome.exe\svchost.exe\java.exe\javaw.exe\javaws.exe\opera.exe\firefox.exe\maxthon.exe\avant.exe\mnp.exe\safari.exe\netscape.exe\tbb-firefox.exe\frd.exe\isclient.exe\ipc_full.exe\intpro.exe\cbsmain.dll\clmain.exe\core.exe\rundll32.exe\notepad.exe\cbank.exeiexplore.exe|opera.exe|java.exe|javaw.exe|explorer.exe|isclient.exe|intpro.exe|ipc_full.exe|mnp.exe|cbsmain.dll|firefox.exe|clmain.exe|core.exe|maxthon.exe|avant.exe|safari.exe|svchost.exe|chrome.exe|notepad.exe|rundll32.exe|netscape.exe|tbb-firefox.exe|frd.exe|cbank.exe|%s.dbf%s.DBFj_password=pass.logcommand=auth_loginByPassword&back_command=&back_custom1=&edClientLogin=edUserLogin=edPassword=&LOGIN_AUTHORIZATION_CODE=login=password=pass_advapi32.dllpath.txtkeys.zipLocal\{BE3C9D87-B91F-4e47-8B00-69798A04C732}%s\d.bmpLocal\{AA53E2BF-8989-4fe1-9A0D-95CD39DC0A14}Local\{EAF799BF-8989-4fe1-9A0D-95CD39D44014}keysprivate.txtpublic.txt\*.key\self.cerself.cerself.pubLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC2014}ctunnel.exectunnel.zippath_ctunnel.txtheader.keykeys99\header.keymasks2.key\masks2.keymasks.key\masks.key\name.keyprimary2.key\primary2.keyprimary.key\primary.keykeys99.zippath99.txtbsi.dll&domain=letitbit.net&cc.txtLocal\{EAF799BF-8989-4fa1-9A0D-95CD39DC0214}prv_key.pfxkeys\sign.cerLocal\{AAFEE2BF-8989-4fe1-9A0D-95CD39DC0A14}sks2xyz.dllvb_pfx_importLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC0214}secret.keypubkeys.keyLocal\{AAF799BF-8989-4fe1-9A0D-95CD39DC0A14}path1.txtinter.zipinterpro.iniLocal\{EAF329BF-8989-4fe1-9A0D-95CD39DC0214}Local\{AAF733BF-8989-4fe1-9A0D-95CD39DC0A14}cbsmain.dllLocal\{BE3C9D87-B777-4e47-8B10-69798A04C732}pass.txtLocal\{EAF799BF-8989-4fe1-9A0D-95CD777C0214}FilialRCon.dllISClient.cfgLocal\{EAF777BF-8989-4fe1-9A0D-95CD777C0214}rfk.zipclient.zippath_client.txtpath_keys.txtLocal\{EAF777FF-8989-4fe1-9A0D-95CD777C0214}Local\{EAF777FF-8989-4fe1-977D-95CD777C0214}Agava_Client.exeKeysDiskPathAgava_Client.iniAgava_keyskeys_path.txtmespro.dllAddPSEPrivateKeyExcore.exedata\id.dbf\data\id.dbfkeys%i.zippath%i.txtLocal\{EAF7722F-8989-4fe1-977D-95CD777C0214}Software\Microsoft\Windows NT\CurrentVersion\Winlogonwinmm.dll%s\%sLibVNCServer 0.9.7%s (%s)d/d/d d:dpassword check failed!WinSCard.dllSensApi.dllGetTcpTableIPHLPAPI.DLLdbghelp.dllMSVCRT.dllPSAPI.DLLNETAPI32.dllDNSAPI.dllHttpQueryInfoAHttpAddRequestHeadersWHttpAddRequestHeadersAHttpOpenRequestAWININET.dllWS2_32.dllShellExecuteASHFileOperationASHELL32.dllSHLWAPI.dllGetSystemWindowsDirectoryAGetProcessHeapWinExecKERNEL32.dllMapVirtualKeyWSetKeyboardStateEnumChildWindowsGetKeyboardStateMsgWaitForMultipleObjectsUSER32.dllSetViewportOrgExGetViewportOrgExGDI32.dllRegOpenKeyExARegCloseKeyRegFlushKeyRegEnumKeyExARegNotifyChangeKeyValueRegDeleteKeyAADVAPI32.dll?456789:;<=!"#$%&'()* ,-./0123;3 #>6.&'2, / 0&7!4-)1#MSCTF.Shared.MAPPING.%xDesk_%u%xMSCTF.Shared.MUTEX.%x.Prev.current1-191j1w1}1?"?(?-?~?;-;5;=;^;|;7"7)7\7~76 6$6(6,6064686mavast.comya.ruserverkey.dat\windows\svchost.exe_1100_rwx_032C0000_0006A000:
.text`.rdata@.data.reloc<>httpPSShLSSShptUSSShSSShp;.SSSh0 .SSShpk.SSShpF.t9SSShu1SSShPname.key\secrets.keysign.keykernel32.dll\explorer.exeuser32.dllmulti_pot.exeHookExplorer.exeproc_analyzer.exesckTool.exesniff_hit.exesysAnalyzer.exeidag.exeollydbg.exedumpcap.exewireshark.exeC:\iDEFENSE\\.\NPF_NdisWanIpavp.exeSoftware\Microsoft\Windows NT\CurrentVersion%s!%s!Xsoftware\microsoft\windows nt\currentversion\winlogonsoftware\microsoft\windows\currentversion\run\winlogon.exesysinfo.logscr.bmpminidump.bin%d.%d.%d.%dÝ %dh %dm%s:%dSoftware\Microsoft\Internet Explorer\TypedURLsurl%i4.4.10%dx%d@%d%c%d:d{Windows directory:links.log\History.IE5\index.dat\Opera\Opera\typed_history.xmlavast.com93.191.13.100drwebeset.comz-oleg.comkltest.org.ru.comodo.comgoogle.comDnsapi.dllws2_32.dllMozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)Mozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)/login.phpntdll.dllGlobal\{EAF799BF-8249-4fe1-9A0D-92CD3CC22014}Global\{EAF799BF-8449-4fe1-9A0D-95CD39DC2014}Global\HighMemoryEvent_xexplorer.exe1.2.5- zip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllunzip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllWinmm.dllKernel32.dllGdi32.dllhXXp://hXXps://HTTP/1.nspr4.dllPR_OpenTCPSocket[[[URL: %sProcess: %sUser-agent: %s]]]{{{%sCrypt32.dllCertVerifyCertificateChainPolicyWininet.dllHttpSendRequestAHttpSendRequestWHttpSendRequestExAHttpSendRequestExWset_urlmicrosoft.public.win32.programmer.kernel\iexplore.exekeygrabu.bmp\\.\PhysicalDrive%u/topic.phpkeylog.txtpasswords.txt%s%u.zipContent-Disposition: form-data; name="file"; filename="report"HTTP/1.0Content-Type: application/x-www-form-urlencodedReferer: hXXp://VVV.google.comContent-Type: multipart/form-data; boundary=---------------------------%sVVV.bing.comVVV.microsoft.comfrd.execommand=config&update_url=/search.php&port=command=load&url=SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0001SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0002SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0003hid=%s&username=SYSTEM&compname=%s&bot_version=4.4.10&uptime=%u&os=u&local_time=%s%d&token=%d&socks_port=%u&hardware[display]=%s&hardware[driver_av]=%s\chrome.exe\svchost.exe\java.exe\javaw.exe\javaws.exe\opera.exe\firefox.exe\maxthon.exe\avant.exe\mnp.exe\safari.exe\netscape.exe\tbb-firefox.exe\frd.exe\isclient.exe\ipc_full.exe\intpro.exe\cbsmain.dll\clmain.exe\core.exe\rundll32.exe\notepad.exe\cbank.exeiexplore.exe|opera.exe|java.exe|javaw.exe|explorer.exe|isclient.exe|intpro.exe|ipc_full.exe|mnp.exe|cbsmain.dll|firefox.exe|clmain.exe|core.exe|maxthon.exe|avant.exe|safari.exe|svchost.exe|chrome.exe|notepad.exe|rundll32.exe|netscape.exe|tbb-firefox.exe|frd.exe|cbank.exe|%s.dbf%s.DBFj_password=pass.logcommand=auth_loginByPassword&back_command=&back_custom1=&edClientLogin=edUserLogin=edPassword=&LOGIN_AUTHORIZATION_CODE=login=password=pass_advapi32.dllpath.txtkeys.zipLocal\{BE3C9D87-B91F-4e47-8B00-69798A04C732}%s\d.bmpLocal\{AA53E2BF-8989-4fe1-9A0D-95CD39DC0A14}Local\{EAF799BF-8989-4fe1-9A0D-95CD39D44014}keysprivate.txtpublic.txt\*.key\self.cerself.cerself.pubLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC2014}ctunnel.exectunnel.zippath_ctunnel.txtheader.keykeys99\header.keymasks2.key\masks2.keymasks.key\masks.key\name.keyprimary2.key\primary2.keyprimary.key\primary.keykeys99.zippath99.txtbsi.dll&domain=letitbit.net&cc.txtLocal\{EAF799BF-8989-4fa1-9A0D-95CD39DC0214}prv_key.pfxkeys\sign.cerLocal\{AAFEE2BF-8989-4fe1-9A0D-95CD39DC0A14}sks2xyz.dllvb_pfx_importLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC0214}secret.keypubkeys.keyLocal\{AAF799BF-8989-4fe1-9A0D-95CD39DC0A14}path1.txtinter.zipinterpro.iniLocal\{EAF329BF-8989-4fe1-9A0D-95CD39DC0214}Local\{AAF733BF-8989-4fe1-9A0D-95CD39DC0A14}cbsmain.dllLocal\{BE3C9D87-B777-4e47-8B10-69798A04C732}pass.txtLocal\{EAF799BF-8989-4fe1-9A0D-95CD777C0214}FilialRCon.dllISClient.cfgLocal\{EAF777BF-8989-4fe1-9A0D-95CD777C0214}rfk.zipclient.zippath_client.txtpath_keys.txtLocal\{EAF777FF-8989-4fe1-9A0D-95CD777C0214}Local\{EAF777FF-8989-4fe1-977D-95CD777C0214}Agava_Client.exeKeysDiskPathAgava_Client.iniAgava_keyskeys_path.txtmespro.dllAddPSEPrivateKeyExcore.exedata\id.dbf\data\id.dbfkeys%i.zippath%i.txtLocal\{EAF7722F-8989-4fe1-977D-95CD777C0214}Software\Microsoft\Windows NT\CurrentVersion\Winlogonwinmm.dll%s\%sLibVNCServer 0.9.7%s (%s)d/d/d d:dpassword check failed!WinSCard.dllSensApi.dllGetTcpTableIPHLPAPI.DLLdbghelp.dllMSVCRT.dllPSAPI.DLLNETAPI32.dllDNSAPI.dllHttpQueryInfoAHttpAddRequestHeadersWHttpAddRequestHeadersAHttpOpenRequestAWININET.dllWS2_32.dllShellExecuteASHFileOperationASHELL32.dllSHLWAPI.dllGetSystemWindowsDirectoryAGetProcessHeapWinExecKERNEL32.dllMapVirtualKeyWSetKeyboardStateEnumChildWindowsGetKeyboardStateMsgWaitForMultipleObjectsUSER32.dllSetViewportOrgExGetViewportOrgExGDI32.dllRegOpenKeyExARegCloseKeyRegFlushKeyRegEnumKeyExARegNotifyChangeKeyValueRegDeleteKeyAADVAPI32.dll?456789:;<=!"#$%&'()* ,-./0123;3 #>6.&'2, / 0&7!4-)1#MSCTF.Shared.MAPPING.%xDesk_%u%xMSCTF.Shared.MUTEX.%x.Prev.currentSYSTEM!XP1!F9BE9A8AMSCTF.Shared.MAPPING.fffffe00MSCTF.Shared.MAPPING.ffffff00MSCTF.Shared.MAPPING.fffffd00MSCTF.Shared.MUTEX.fffffe00MSCTF.Shared.MUTEX.ffffff00%Documents and Settings%\NetworkService\Application Data\1-191j1w1}1?"?(?-?~?;-;5;=;^;|;7"7)7\7~76 6$6(6,6064686mavast.comya.ruserverkey.dat\windows\svchost.exe_1144_rwx_00820000_0005B000:
.text`.data.reloc`.rdata@.data<>httpPSShLSSShptUSSShSSShp;SSSh0SSShpkSSShpFt9SSShu1SSShPname.key\secrets.keysign.keykernel32.dll\explorer.exeuser32.dllmulti_pot.exeHookExplorer.exeproc_analyzer.exesckTool.exesniff_hit.exesysAnalyzer.exeidag.exeollydbg.exedumpcap.exewireshark.exeC:\iDEFENSE\\.\NPF_NdisWanIpavp.exeSoftware\Microsoft\Windows NT\CurrentVersion%s!%s!Xsoftware\microsoft\windows nt\currentversion\winlogonsoftware\microsoft\windows\currentversion\run\winlogon.exesysinfo.logscr.bmpminidump.bin%d.%d.%d.%dÝ %dh %dm%s:%dSoftware\Microsoft\Internet Explorer\TypedURLsurl%i4.4.10%dx%d@%d%c%d:d{Windows directory:links.log\History.IE5\index.dat\Opera\Opera\typed_history.xmlavast.com93.191.13.100drwebeset.comz-oleg.comkltest.org.ru.comodo.comgoogle.comDnsapi.dllws2_32.dllMozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)Mozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)/login.phpntdll.dllGlobal\{EAF799BF-8249-4fe1-9A0D-92CD3CC22014}Global\{EAF799BF-8449-4fe1-9A0D-95CD39DC2014}Global\HighMemoryEvent_xexplorer.exe1.2.5- zip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllunzip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllWinmm.dllKernel32.dllGdi32.dllhXXp://hXXps://HTTP/1.nspr4.dllPR_OpenTCPSocket[[[URL: %sProcess: %sUser-agent: %s]]]{{{%sCrypt32.dllCertVerifyCertificateChainPolicyWininet.dllHttpSendRequestAHttpSendRequestWHttpSendRequestExAHttpSendRequestExWset_urlmicrosoft.public.win32.programmer.kernel\iexplore.exekeygrabu.bmp\\.\PhysicalDrive%u/topic.phpkeylog.txtpasswords.txt%s%u.zipContent-Disposition: form-data; name="file"; filename="report"HTTP/1.0Content-Type: application/x-www-form-urlencodedReferer: hXXp://VVV.google.comContent-Type: multipart/form-data; boundary=---------------------------%sVVV.bing.comVVV.microsoft.comfrd.execommand=config&update_url=/search.php&port=command=load&url=SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0001SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0002SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0003hid=%s&username=SYSTEM&compname=%s&bot_version=4.4.10&uptime=%u&os=u&local_time=%s%d&token=%d&socks_port=%u&hardware[display]=%s&hardware[driver_av]=%s\chrome.exe\svchost.exe\java.exe\javaw.exe\javaws.exe\opera.exe\firefox.exe\maxthon.exe\avant.exe\mnp.exe\safari.exe\netscape.exe\tbb-firefox.exe\frd.exe\isclient.exe\ipc_full.exe\intpro.exe\cbsmain.dll\clmain.exe\core.exe\rundll32.exe\notepad.exe\cbank.exeiexplore.exe|opera.exe|java.exe|javaw.exe|explorer.exe|isclient.exe|intpro.exe|ipc_full.exe|mnp.exe|cbsmain.dll|firefox.exe|clmain.exe|core.exe|maxthon.exe|avant.exe|safari.exe|svchost.exe|chrome.exe|notepad.exe|rundll32.exe|netscape.exe|tbb-firefox.exe|frd.exe|cbank.exe|%s.dbf%s.DBFj_password=pass.logcommand=auth_loginByPassword&back_command=&back_custom1=&edClientLogin=edUserLogin=edPassword=&LOGIN_AUTHORIZATION_CODE=login=password=pass_advapi32.dllpath.txtkeys.zipLocal\{BE3C9D87-B91F-4e47-8B00-69798A04C732}%s\d.bmpLocal\{AA53E2BF-8989-4fe1-9A0D-95CD39DC0A14}Local\{EAF799BF-8989-4fe1-9A0D-95CD39D44014}keysprivate.txtpublic.txt\*.key\self.cerself.cerself.pubLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC2014}ctunnel.exectunnel.zippath_ctunnel.txtheader.keykeys99\header.keymasks2.key\masks2.keymasks.key\masks.key\name.keyprimary2.key\primary2.keyprimary.key\primary.keykeys99.zippath99.txtbsi.dll&domain=letitbit.net&cc.txtLocal\{EAF799BF-8989-4fa1-9A0D-95CD39DC0214}prv_key.pfxkeys\sign.cerLocal\{AAFEE2BF-8989-4fe1-9A0D-95CD39DC0A14}sks2xyz.dllvb_pfx_importLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC0214}secret.keypubkeys.keyLocal\{AAF799BF-8989-4fe1-9A0D-95CD39DC0A14}path1.txtinter.zipinterpro.iniLocal\{EAF329BF-8989-4fe1-9A0D-95CD39DC0214}Local\{AAF733BF-8989-4fe1-9A0D-95CD39DC0A14}cbsmain.dllLocal\{BE3C9D87-B777-4e47-8B10-69798A04C732}pass.txtLocal\{EAF799BF-8989-4fe1-9A0D-95CD777C0214}FilialRCon.dllISClient.cfgLocal\{EAF777BF-8989-4fe1-9A0D-95CD777C0214}rfk.zipclient.zippath_client.txtpath_keys.txtLocal\{EAF777FF-8989-4fe1-9A0D-95CD777C0214}Local\{EAF777FF-8989-4fe1-977D-95CD777C0214}Agava_Client.exeKeysDiskPathAgava_Client.iniAgava_keyskeys_path.txtmespro.dllAddPSEPrivateKeyExcore.exedata\id.dbf\data\id.dbfkeys%i.zippath%i.txtLocal\{EAF7722F-8989-4fe1-977D-95CD777C0214}Software\Microsoft\Windows NT\CurrentVersion\Winlogonwinmm.dll%s\%sLibVNCServer 0.9.7%s (%s)d/d/d d:dpassword check failed!WinSCard.dllSensApi.dllGetTcpTableIPHLPAPI.DLLdbghelp.dllMSVCRT.dllPSAPI.DLLNETAPI32.dllDNSAPI.dllHttpQueryInfoAHttpAddRequestHeadersWHttpAddRequestHeadersAHttpOpenRequestAWININET.dllWS2_32.dllShellExecuteASHFileOperationASHELL32.dllSHLWAPI.dllGetSystemWindowsDirectoryAGetProcessHeapWinExecKERNEL32.dllMapVirtualKeyWSetKeyboardStateEnumChildWindowsGetKeyboardStateMsgWaitForMultipleObjectsUSER32.dllSetViewportOrgExGetViewportOrgExGDI32.dllRegOpenKeyExARegCloseKeyRegFlushKeyRegEnumKeyExARegNotifyChangeKeyValueRegDeleteKeyAADVAPI32.dll?456789:;<=!"#$%&'()* ,-./0123;3 #>6.&'2, / 0&7!4-)1#MSCTF.Shared.MAPPING.%xDesk_%u%xMSCTF.Shared.MUTEX.%x.Prev.current1-191j1w1}1?"?(?-?~?;-;5;=;^;|;7"7)7\7~76 6$6(6,6064686mavast.comya.ruserverkey.dat\windows\svchost.exe_1144_rwx_008C0000_0006A000:
.text`.rdata@.data.reloc<>httpPSShLSSShptUSSShSSShp;SSSh0SSShpkSSShpFt9SSShu1SSShPname.key\secrets.keysign.keykernel32.dll\explorer.exeuser32.dllmulti_pot.exeHookExplorer.exeproc_analyzer.exesckTool.exesniff_hit.exesysAnalyzer.exeidag.exeollydbg.exedumpcap.exewireshark.exeC:\iDEFENSE\\.\NPF_NdisWanIpavp.exeSoftware\Microsoft\Windows NT\CurrentVersion%s!%s!Xsoftware\microsoft\windows nt\currentversion\winlogonsoftware\microsoft\windows\currentversion\run\winlogon.exesysinfo.logscr.bmpminidump.bin%d.%d.%d.%dÝ %dh %dm%s:%dSoftware\Microsoft\Internet Explorer\TypedURLsurl%i4.4.10%dx%d@%d%c%d:d{Windows directory:links.log\History.IE5\index.dat\Opera\Opera\typed_history.xmlavast.com93.191.13.100drwebeset.comz-oleg.comkltest.org.ru.comodo.comgoogle.comDnsapi.dllws2_32.dllMozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)Mozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)/login.phpntdll.dllGlobal\{EAF799BF-8249-4fe1-9A0D-92CD3CC22014}Global\{EAF799BF-8449-4fe1-9A0D-95CD39DC2014}Global\HighMemoryEvent_xexplorer.exe1.2.5- zip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllunzip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllWinmm.dllKernel32.dllGdi32.dllhXXp://hXXps://HTTP/1.nspr4.dllPR_OpenTCPSocket[[[URL: %sProcess: %sUser-agent: %s]]]{{{%sCrypt32.dllCertVerifyCertificateChainPolicyWininet.dllHttpSendRequestAHttpSendRequestWHttpSendRequestExAHttpSendRequestExWset_urlmicrosoft.public.win32.programmer.kernel\iexplore.exekeygrabu.bmp\\.\PhysicalDrive%u/topic.phpkeylog.txtpasswords.txt%s%u.zipContent-Disposition: form-data; name="file"; filename="report"HTTP/1.0Content-Type: application/x-www-form-urlencodedReferer: hXXp://VVV.google.comContent-Type: multipart/form-data; boundary=---------------------------%sVVV.bing.comVVV.microsoft.comfrd.execommand=config&update_url=/search.php&port=command=load&url=SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0001SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0002SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0003hid=%s&username=SYSTEM&compname=%s&bot_version=4.4.10&uptime=%u&os=u&local_time=%s%d&token=%d&socks_port=%u&hardware[display]=%s&hardware[driver_av]=%s\chrome.exe\svchost.exe\java.exe\javaw.exe\javaws.exe\opera.exe\firefox.exe\maxthon.exe\avant.exe\mnp.exe\safari.exe\netscape.exe\tbb-firefox.exe\frd.exe\isclient.exe\ipc_full.exe\intpro.exe\cbsmain.dll\clmain.exe\core.exe\rundll32.exe\notepad.exe\cbank.exeiexplore.exe|opera.exe|java.exe|javaw.exe|explorer.exe|isclient.exe|intpro.exe|ipc_full.exe|mnp.exe|cbsmain.dll|firefox.exe|clmain.exe|core.exe|maxthon.exe|avant.exe|safari.exe|svchost.exe|chrome.exe|notepad.exe|rundll32.exe|netscape.exe|tbb-firefox.exe|frd.exe|cbank.exe|%s.dbf%s.DBFj_password=pass.logcommand=auth_loginByPassword&back_command=&back_custom1=&edClientLogin=edUserLogin=edPassword=&LOGIN_AUTHORIZATION_CODE=login=password=pass_advapi32.dllpath.txtkeys.zipLocal\{BE3C9D87-B91F-4e47-8B00-69798A04C732}%s\d.bmpLocal\{AA53E2BF-8989-4fe1-9A0D-95CD39DC0A14}Local\{EAF799BF-8989-4fe1-9A0D-95CD39D44014}keysprivate.txtpublic.txt\*.key\self.cerself.cerself.pubLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC2014}ctunnel.exectunnel.zippath_ctunnel.txtheader.keykeys99\header.keymasks2.key\masks2.keymasks.key\masks.key\name.keyprimary2.key\primary2.keyprimary.key\primary.keykeys99.zippath99.txtbsi.dll&domain=letitbit.net&cc.txtLocal\{EAF799BF-8989-4fa1-9A0D-95CD39DC0214}prv_key.pfxkeys\sign.cerLocal\{AAFEE2BF-8989-4fe1-9A0D-95CD39DC0A14}sks2xyz.dllvb_pfx_importLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC0214}secret.keypubkeys.keyLocal\{AAF799BF-8989-4fe1-9A0D-95CD39DC0A14}path1.txtinter.zipinterpro.iniLocal\{EAF329BF-8989-4fe1-9A0D-95CD39DC0214}Local\{AAF733BF-8989-4fe1-9A0D-95CD39DC0A14}cbsmain.dllLocal\{BE3C9D87-B777-4e47-8B10-69798A04C732}pass.txtLocal\{EAF799BF-8989-4fe1-9A0D-95CD777C0214}FilialRCon.dllISClient.cfgLocal\{EAF777BF-8989-4fe1-9A0D-95CD777C0214}rfk.zipclient.zippath_client.txtpath_keys.txtLocal\{EAF777FF-8989-4fe1-9A0D-95CD777C0214}Local\{EAF777FF-8989-4fe1-977D-95CD777C0214}Agava_Client.exeKeysDiskPathAgava_Client.iniAgava_keyskeys_path.txtmespro.dllAddPSEPrivateKeyExcore.exedata\id.dbf\data\id.dbfkeys%i.zippath%i.txtLocal\{EAF7722F-8989-4fe1-977D-95CD777C0214}Software\Microsoft\Windows NT\CurrentVersion\Winlogonwinmm.dll%s\%sLibVNCServer 0.9.7%s (%s)d/d/d d:dpassword check failed!WinSCard.dllSensApi.dllGetTcpTableIPHLPAPI.DLLdbghelp.dllMSVCRT.dllPSAPI.DLLNETAPI32.dllDNSAPI.dllHttpQueryInfoAHttpAddRequestHeadersWHttpAddRequestHeadersAHttpOpenRequestAWININET.dllWS2_32.dllShellExecuteASHFileOperationASHELL32.dllSHLWAPI.dllGetSystemWindowsDirectoryAGetProcessHeapWinExecKERNEL32.dllMapVirtualKeyWSetKeyboardStateEnumChildWindowsGetKeyboardStateMsgWaitForMultipleObjectsUSER32.dllSetViewportOrgExGetViewportOrgExGDI32.dllRegOpenKeyExARegCloseKeyRegFlushKeyRegEnumKeyExARegNotifyChangeKeyValueRegDeleteKeyAADVAPI32.dll?456789:;<=!"#$%&'()* ,-./0123;3 #>6.&'2, / 0&7!4-)1#MSCTF.Shared.MAPPING.%xDesk_%u%xMSCTF.Shared.MUTEX.%x.Prev.currentNETWORKSERVICE!XP1!F9BE9A8AMSCTF.Shared.MAPPING.fffffe00MSCTF.Shared.MAPPING.ffffff00MSCTF.Shared.MAPPING.fffffd00MSCTF.Shared.MUTEX.fffffe00MSCTF.Shared.MUTEX.ffffff00%Documents and Settings%\NetworkService\Application Data\1-191j1w1}1?"?(?-?~?;-;5;=;^;|;7"7)7\7~76 6$6(6,6064686mavast.comya.ruserverkey.dat\windows\svchost.exe_1184_rwx_00C30000_0005B000:
.text`.data.reloc`.rdata@.data<>httpPSShLSSShptUSSShSSShp;SSSh0SSShpkSSShpFt9SSShu1SSShPname.key\secrets.keysign.keykernel32.dll\explorer.exeuser32.dllmulti_pot.exeHookExplorer.exeproc_analyzer.exesckTool.exesniff_hit.exesysAnalyzer.exeidag.exeollydbg.exedumpcap.exewireshark.exeC:\iDEFENSE\\.\NPF_NdisWanIpavp.exeSoftware\Microsoft\Windows NT\CurrentVersion%s!%s!Xsoftware\microsoft\windows nt\currentversion\winlogonsoftware\microsoft\windows\currentversion\run\winlogon.exesysinfo.logscr.bmpminidump.bin%d.%d.%d.%dÝ %dh %dm%s:%dSoftware\Microsoft\Internet Explorer\TypedURLsurl%i4.4.10%dx%d@%d%c%d:d{Windows directory:links.log\History.IE5\index.dat\Opera\Opera\typed_history.xmlavast.com93.191.13.100drwebeset.comz-oleg.comkltest.org.ru.comodo.comgoogle.comDnsapi.dllws2_32.dllMozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)Mozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)/login.phpntdll.dllGlobal\{EAF799BF-8249-4fe1-9A0D-92CD3CC22014}Global\{EAF799BF-8449-4fe1-9A0D-95CD39DC2014}Global\HighMemoryEvent_xexplorer.exe1.2.5- zip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllunzip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllWinmm.dllKernel32.dllGdi32.dllhXXp://hXXps://HTTP/1.nspr4.dllPR_OpenTCPSocket[[[URL: %sProcess: %sUser-agent: %s]]]{{{%sCrypt32.dllCertVerifyCertificateChainPolicyWininet.dllHttpSendRequestAHttpSendRequestWHttpSendRequestExAHttpSendRequestExWset_urlmicrosoft.public.win32.programmer.kernel\iexplore.exekeygrabu.bmp\\.\PhysicalDrive%u/topic.phpkeylog.txtpasswords.txt%s%u.zipContent-Disposition: form-data; name="file"; filename="report"HTTP/1.0Content-Type: application/x-www-form-urlencodedReferer: hXXp://VVV.google.comContent-Type: multipart/form-data; boundary=---------------------------%sVVV.bing.comVVV.microsoft.comfrd.execommand=config&update_url=/search.php&port=command=load&url=SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0001SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0002SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0003hid=%s&username=SYSTEM&compname=%s&bot_version=4.4.10&uptime=%u&os=u&local_time=%s%d&token=%d&socks_port=%u&hardware[display]=%s&hardware[driver_av]=%s\chrome.exe\svchost.exe\java.exe\javaw.exe\javaws.exe\opera.exe\firefox.exe\maxthon.exe\avant.exe\mnp.exe\safari.exe\netscape.exe\tbb-firefox.exe\frd.exe\isclient.exe\ipc_full.exe\intpro.exe\cbsmain.dll\clmain.exe\core.exe\rundll32.exe\notepad.exe\cbank.exeiexplore.exe|opera.exe|java.exe|javaw.exe|explorer.exe|isclient.exe|intpro.exe|ipc_full.exe|mnp.exe|cbsmain.dll|firefox.exe|clmain.exe|core.exe|maxthon.exe|avant.exe|safari.exe|svchost.exe|chrome.exe|notepad.exe|rundll32.exe|netscape.exe|tbb-firefox.exe|frd.exe|cbank.exe|%s.dbf%s.DBFj_password=pass.logcommand=auth_loginByPassword&back_command=&back_custom1=&edClientLogin=edUserLogin=edPassword=&LOGIN_AUTHORIZATION_CODE=login=password=pass_advapi32.dllpath.txtkeys.zipLocal\{BE3C9D87-B91F-4e47-8B00-69798A04C732}%s\d.bmpLocal\{AA53E2BF-8989-4fe1-9A0D-95CD39DC0A14}Local\{EAF799BF-8989-4fe1-9A0D-95CD39D44014}keysprivate.txtpublic.txt\*.key\self.cerself.cerself.pubLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC2014}ctunnel.exectunnel.zippath_ctunnel.txtheader.keykeys99\header.keymasks2.key\masks2.keymasks.key\masks.key\name.keyprimary2.key\primary2.keyprimary.key\primary.keykeys99.zippath99.txtbsi.dll&domain=letitbit.net&cc.txtLocal\{EAF799BF-8989-4fa1-9A0D-95CD39DC0214}prv_key.pfxkeys\sign.cerLocal\{AAFEE2BF-8989-4fe1-9A0D-95CD39DC0A14}sks2xyz.dllvb_pfx_importLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC0214}secret.keypubkeys.keyLocal\{AAF799BF-8989-4fe1-9A0D-95CD39DC0A14}path1.txtinter.zipinterpro.iniLocal\{EAF329BF-8989-4fe1-9A0D-95CD39DC0214}Local\{AAF733BF-8989-4fe1-9A0D-95CD39DC0A14}cbsmain.dllLocal\{BE3C9D87-B777-4e47-8B10-69798A04C732}pass.txtLocal\{EAF799BF-8989-4fe1-9A0D-95CD777C0214}FilialRCon.dllISClient.cfgLocal\{EAF777BF-8989-4fe1-9A0D-95CD777C0214}rfk.zipclient.zippath_client.txtpath_keys.txtLocal\{EAF777FF-8989-4fe1-9A0D-95CD777C0214}Local\{EAF777FF-8989-4fe1-977D-95CD777C0214}Agava_Client.exeKeysDiskPathAgava_Client.iniAgava_keyskeys_path.txtmespro.dllAddPSEPrivateKeyExcore.exedata\id.dbf\data\id.dbfkeys%i.zippath%i.txtLocal\{EAF7722F-8989-4fe1-977D-95CD777C0214}Software\Microsoft\Windows NT\CurrentVersion\Winlogonwinmm.dll%s\%sLibVNCServer 0.9.7%s (%s)d/d/d d:dpassword check failed!WinSCard.dllSensApi.dllGetTcpTableIPHLPAPI.DLLdbghelp.dllMSVCRT.dllPSAPI.DLLNETAPI32.dllDNSAPI.dllHttpQueryInfoAHttpAddRequestHeadersWHttpAddRequestHeadersAHttpOpenRequestAWININET.dllWS2_32.dllShellExecuteASHFileOperationASHELL32.dllSHLWAPI.dllGetSystemWindowsDirectoryAGetProcessHeapWinExecKERNEL32.dllMapVirtualKeyWSetKeyboardStateEnumChildWindowsGetKeyboardStateMsgWaitForMultipleObjectsUSER32.dllSetViewportOrgExGetViewportOrgExGDI32.dllRegOpenKeyExARegCloseKeyRegFlushKeyRegEnumKeyExARegNotifyChangeKeyValueRegDeleteKeyAADVAPI32.dll?456789:;<=!"#$%&'()* ,-./0123;3 #>6.&'2, / 0&7!4-)1#MSCTF.Shared.MAPPING.%xDesk_%u%xMSCTF.Shared.MUTEX.%x.Prev.current1-191j1w1}1?"?(?-?~?;-;5;=;^;|;7"7)7\7~76 6$6(6,6064686mavast.comya.ruserverkey.dat\windows\svchost.exe_1184_rwx_00C90000_0006A000:
.text`.rdata@.data.reloc<>httpPSShLSSShptUSSShSSShp;SSSh0SSShpkSSShpFt9SSShu1SSShPname.key\secrets.keysign.keykernel32.dll\explorer.exeuser32.dllmulti_pot.exeHookExplorer.exeproc_analyzer.exesckTool.exesniff_hit.exesysAnalyzer.exeidag.exeollydbg.exedumpcap.exewireshark.exeC:\iDEFENSE\\.\NPF_NdisWanIpavp.exeSoftware\Microsoft\Windows NT\CurrentVersion%s!%s!Xsoftware\microsoft\windows nt\currentversion\winlogonsoftware\microsoft\windows\currentversion\run\winlogon.exesysinfo.logscr.bmpminidump.bin%d.%d.%d.%dÝ %dh %dm%s:%dSoftware\Microsoft\Internet Explorer\TypedURLsurl%i4.4.10%dx%d@%d%c%d:d{Windows directory:links.log\History.IE5\index.dat\Opera\Opera\typed_history.xmlavast.com93.191.13.100drwebeset.comz-oleg.comkltest.org.ru.comodo.comgoogle.comDnsapi.dllws2_32.dllMozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)Mozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)/login.phpntdll.dllGlobal\{EAF799BF-8249-4fe1-9A0D-92CD3CC22014}Global\{EAF799BF-8449-4fe1-9A0D-95CD39DC2014}Global\HighMemoryEvent_xexplorer.exe1.2.5- zip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllunzip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllWinmm.dllKernel32.dllGdi32.dllhXXp://hXXps://HTTP/1.nspr4.dllPR_OpenTCPSocket[[[URL: %sProcess: %sUser-agent: %s]]]{{{%sCrypt32.dllCertVerifyCertificateChainPolicyWininet.dllHttpSendRequestAHttpSendRequestWHttpSendRequestExAHttpSendRequestExWset_urlmicrosoft.public.win32.programmer.kernel\iexplore.exekeygrabu.bmp\\.\PhysicalDrive%u/topic.phpkeylog.txtpasswords.txt%s%u.zipContent-Disposition: form-data; name="file"; filename="report"HTTP/1.0Content-Type: application/x-www-form-urlencodedReferer: hXXp://VVV.google.comContent-Type: multipart/form-data; boundary=---------------------------%sVVV.bing.comVVV.microsoft.comfrd.execommand=config&update_url=/search.php&port=command=load&url=SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0001SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0002SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0003hid=%s&username=SYSTEM&compname=%s&bot_version=4.4.10&uptime=%u&os=u&local_time=%s%d&token=%d&socks_port=%u&hardware[display]=%s&hardware[driver_av]=%s\chrome.exe\svchost.exe\java.exe\javaw.exe\javaws.exe\opera.exe\firefox.exe\maxthon.exe\avant.exe\mnp.exe\safari.exe\netscape.exe\tbb-firefox.exe\frd.exe\isclient.exe\ipc_full.exe\intpro.exe\cbsmain.dll\clmain.exe\core.exe\rundll32.exe\notepad.exe\cbank.exeiexplore.exe|opera.exe|java.exe|javaw.exe|explorer.exe|isclient.exe|intpro.exe|ipc_full.exe|mnp.exe|cbsmain.dll|firefox.exe|clmain.exe|core.exe|maxthon.exe|avant.exe|safari.exe|svchost.exe|chrome.exe|notepad.exe|rundll32.exe|netscape.exe|tbb-firefox.exe|frd.exe|cbank.exe|%s.dbf%s.DBFj_password=pass.logcommand=auth_loginByPassword&back_command=&back_custom1=&edClientLogin=edUserLogin=edPassword=&LOGIN_AUTHORIZATION_CODE=login=password=pass_advapi32.dllpath.txtkeys.zipLocal\{BE3C9D87-B91F-4e47-8B00-69798A04C732}%s\d.bmpLocal\{AA53E2BF-8989-4fe1-9A0D-95CD39DC0A14}Local\{EAF799BF-8989-4fe1-9A0D-95CD39D44014}keysprivate.txtpublic.txt\*.key\self.cerself.cerself.pubLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC2014}ctunnel.exectunnel.zippath_ctunnel.txtheader.keykeys99\header.keymasks2.key\masks2.keymasks.key\masks.key\name.keyprimary2.key\primary2.keyprimary.key\primary.keykeys99.zippath99.txtbsi.dll&domain=letitbit.net&cc.txtLocal\{EAF799BF-8989-4fa1-9A0D-95CD39DC0214}prv_key.pfxkeys\sign.cerLocal\{AAFEE2BF-8989-4fe1-9A0D-95CD39DC0A14}sks2xyz.dllvb_pfx_importLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC0214}secret.keypubkeys.keyLocal\{AAF799BF-8989-4fe1-9A0D-95CD39DC0A14}path1.txtinter.zipinterpro.iniLocal\{EAF329BF-8989-4fe1-9A0D-95CD39DC0214}Local\{AAF733BF-8989-4fe1-9A0D-95CD39DC0A14}cbsmain.dllLocal\{BE3C9D87-B777-4e47-8B10-69798A04C732}pass.txtLocal\{EAF799BF-8989-4fe1-9A0D-95CD777C0214}FilialRCon.dllISClient.cfgLocal\{EAF777BF-8989-4fe1-9A0D-95CD777C0214}rfk.zipclient.zippath_client.txtpath_keys.txtLocal\{EAF777FF-8989-4fe1-9A0D-95CD777C0214}Local\{EAF777FF-8989-4fe1-977D-95CD777C0214}Agava_Client.exeKeysDiskPathAgava_Client.iniAgava_keyskeys_path.txtmespro.dllAddPSEPrivateKeyExcore.exedata\id.dbf\data\id.dbfkeys%i.zippath%i.txtLocal\{EAF7722F-8989-4fe1-977D-95CD777C0214}Software\Microsoft\Windows NT\CurrentVersion\Winlogonwinmm.dll%s\%sLibVNCServer 0.9.7%s (%s)d/d/d d:dpassword check failed!WinSCard.dllSensApi.dllGetTcpTableIPHLPAPI.DLLdbghelp.dllMSVCRT.dllPSAPI.DLLNETAPI32.dllDNSAPI.dllHttpQueryInfoAHttpAddRequestHeadersWHttpAddRequestHeadersAHttpOpenRequestAWININET.dllWS2_32.dllShellExecuteASHFileOperationASHELL32.dllSHLWAPI.dllGetSystemWindowsDirectoryAGetProcessHeapWinExecKERNEL32.dllMapVirtualKeyWSetKeyboardStateEnumChildWindowsGetKeyboardStateMsgWaitForMultipleObjectsUSER32.dllSetViewportOrgExGetViewportOrgExGDI32.dllRegOpenKeyExARegCloseKeyRegFlushKeyRegEnumKeyExARegNotifyChangeKeyValueRegDeleteKeyAADVAPI32.dll?456789:;<=!"#$%&'()* ,-./0123;3 #>6.&'2, / 0&7!4-)1#MSCTF.Shared.MAPPING.%xDesk_%u%xMSCTF.Shared.MUTEX.%x.Prev.currentLOCALSERVICE!XP1!F9BE9A8AMSCTF.Shared.MAPPING.fffffe00MSCTF.Shared.MAPPING.ffffff00MSCTF.Shared.MAPPING.fffffd00MSCTF.Shared.MUTEX.fffffe00MSCTF.Shared.MUTEX.ffffff00%Documents and Settings%\LocalService\Application Data\1-191j1w1}1?"?(?-?~?;-;5;=;^;|;7"7)7\7~76 6$6(6,6064686mavast.comya.ruserverkey.dat\windows\Explorer.EXE_1988_rwx_01E00000_0005B000:
.text`.data.reloc`.rdata@.data<>httpPSShLSSShptUSSShSSShp;SSSh0SSShpkSSShpFt9SSShu1SSShPname.key\secrets.keysign.keykernel32.dll\explorer.exeuser32.dllmulti_pot.exeHookExplorer.exeproc_analyzer.exesckTool.exesniff_hit.exesysAnalyzer.exeidag.exeollydbg.exedumpcap.exewireshark.exeC:\iDEFENSE\\.\NPF_NdisWanIpavp.exeSoftware\Microsoft\Windows NT\CurrentVersion%s!%s!Xsoftware\microsoft\windows nt\currentversion\winlogonsoftware\microsoft\windows\currentversion\run\winlogon.exesysinfo.logscr.bmpminidump.bin%d.%d.%d.%dÝ %dh %dm%s:%dSoftware\Microsoft\Internet Explorer\TypedURLsurl%i4.4.10%dx%d@%d%c%d:d{Windows directory:links.log\History.IE5\index.dat\Opera\Opera\typed_history.xmlavast.com93.191.13.100drwebeset.comz-oleg.comkltest.org.ru.comodo.comgoogle.comDnsapi.dllws2_32.dllMozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)Mozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)/login.phpntdll.dllGlobal\{EAF799BF-8249-4fe1-9A0D-92CD3CC22014}Global\{EAF799BF-8449-4fe1-9A0D-95CD39DC2014}Global\HighMemoryEvent_xexplorer.exe1.2.5- zip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllunzip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllWinmm.dllKernel32.dllGdi32.dllhXXp://hXXps://HTTP/1.nspr4.dllPR_OpenTCPSocket[[[URL: %sProcess: %sUser-agent: %s]]]{{{%sCrypt32.dllCertVerifyCertificateChainPolicyWininet.dllHttpSendRequestAHttpSendRequestWHttpSendRequestExAHttpSendRequestExWset_urlmicrosoft.public.win32.programmer.kernel\iexplore.exekeygrabu.bmp\\.\PhysicalDrive%u/topic.phpkeylog.txtpasswords.txt%s%u.zipContent-Disposition: form-data; name="file"; filename="report"HTTP/1.0Content-Type: application/x-www-form-urlencodedReferer: hXXp://VVV.google.comContent-Type: multipart/form-data; boundary=---------------------------%sVVV.bing.comVVV.microsoft.comfrd.execommand=config&update_url=/search.php&port=command=load&url=SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0001SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0002SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0003hid=%s&username=SYSTEM&compname=%s&bot_version=4.4.10&uptime=%u&os=u&local_time=%s%d&token=%d&socks_port=%u&hardware[display]=%s&hardware[driver_av]=%s\chrome.exe\svchost.exe\java.exe\javaw.exe\javaws.exe\opera.exe\firefox.exe\maxthon.exe\avant.exe\mnp.exe\safari.exe\netscape.exe\tbb-firefox.exe\frd.exe\isclient.exe\ipc_full.exe\intpro.exe\cbsmain.dll\clmain.exe\core.exe\rundll32.exe\notepad.exe\cbank.exeiexplore.exe|opera.exe|java.exe|javaw.exe|explorer.exe|isclient.exe|intpro.exe|ipc_full.exe|mnp.exe|cbsmain.dll|firefox.exe|clmain.exe|core.exe|maxthon.exe|avant.exe|safari.exe|svchost.exe|chrome.exe|notepad.exe|rundll32.exe|netscape.exe|tbb-firefox.exe|frd.exe|cbank.exe|%s.dbf%s.DBFj_password=pass.logcommand=auth_loginByPassword&back_command=&back_custom1=&edClientLogin=edUserLogin=edPassword=&LOGIN_AUTHORIZATION_CODE=login=password=pass_advapi32.dllpath.txtkeys.zipLocal\{BE3C9D87-B91F-4e47-8B00-69798A04C732}%s\d.bmpLocal\{AA53E2BF-8989-4fe1-9A0D-95CD39DC0A14}Local\{EAF799BF-8989-4fe1-9A0D-95CD39D44014}keysprivate.txtpublic.txt\*.key\self.cerself.cerself.pubLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC2014}ctunnel.exectunnel.zippath_ctunnel.txtheader.keykeys99\header.keymasks2.key\masks2.keymasks.key\masks.key\name.keyprimary2.key\primary2.keyprimary.key\primary.keykeys99.zippath99.txtbsi.dll&domain=letitbit.net&cc.txtLocal\{EAF799BF-8989-4fa1-9A0D-95CD39DC0214}prv_key.pfxkeys\sign.cerLocal\{AAFEE2BF-8989-4fe1-9A0D-95CD39DC0A14}sks2xyz.dllvb_pfx_importLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC0214}secret.keypubkeys.keyLocal\{AAF799BF-8989-4fe1-9A0D-95CD39DC0A14}path1.txtinter.zipinterpro.iniLocal\{EAF329BF-8989-4fe1-9A0D-95CD39DC0214}Local\{AAF733BF-8989-4fe1-9A0D-95CD39DC0A14}cbsmain.dllLocal\{BE3C9D87-B777-4e47-8B10-69798A04C732}pass.txtLocal\{EAF799BF-8989-4fe1-9A0D-95CD777C0214}FilialRCon.dllISClient.cfgLocal\{EAF777BF-8989-4fe1-9A0D-95CD777C0214}rfk.zipclient.zippath_client.txtpath_keys.txtLocal\{EAF777FF-8989-4fe1-9A0D-95CD777C0214}Local\{EAF777FF-8989-4fe1-977D-95CD777C0214}Agava_Client.exeKeysDiskPathAgava_Client.iniAgava_keyskeys_path.txtmespro.dllAddPSEPrivateKeyExcore.exedata\id.dbf\data\id.dbfkeys%i.zippath%i.txtLocal\{EAF7722F-8989-4fe1-977D-95CD777C0214}Software\Microsoft\Windows NT\CurrentVersion\Winlogonwinmm.dll%s\%sLibVNCServer 0.9.7%s (%s)d/d/d d:dpassword check failed!WinSCard.dllSensApi.dllGetTcpTableIPHLPAPI.DLLdbghelp.dllMSVCRT.dllPSAPI.DLLNETAPI32.dllDNSAPI.dllHttpQueryInfoAHttpAddRequestHeadersWHttpAddRequestHeadersAHttpOpenRequestAWININET.dllWS2_32.dllShellExecuteASHFileOperationASHELL32.dllSHLWAPI.dllGetSystemWindowsDirectoryAGetProcessHeapWinExecKERNEL32.dllMapVirtualKeyWSetKeyboardStateEnumChildWindowsGetKeyboardStateMsgWaitForMultipleObjectsUSER32.dllSetViewportOrgExGetViewportOrgExGDI32.dllRegOpenKeyExARegCloseKeyRegFlushKeyRegEnumKeyExARegNotifyChangeKeyValueRegDeleteKeyAADVAPI32.dll?456789:;<=!"#$%&'()* ,-./0123;3 #>6.&'2, / 0&7!4-)1#MSCTF.Shared.MAPPING.%xDesk_%u%xMSCTF.Shared.MUTEX.%x.Prev.current1-191j1w1}1?"?(?-?~?;-;5;=;^;|;7"7)7\7~76 6$6(6,6064686mavast.comya.ruserverkey.dat\windows\Explorer.EXE_1988_rwx_01E60000_0006A000:
.text`.rdata@.data.reloc<>httpPSShLSSShptUSSShSSShp;SSSh0SSShpkSSShpFt9SSShu1SSShPname.key\secrets.keysign.keykernel32.dll\explorer.exeuser32.dllmulti_pot.exeHookExplorer.exeproc_analyzer.exesckTool.exesniff_hit.exesysAnalyzer.exeidag.exeollydbg.exedumpcap.exewireshark.exeC:\iDEFENSE\\.\NPF_NdisWanIpavp.exeSoftware\Microsoft\Windows NT\CurrentVersion%s!%s!Xsoftware\microsoft\windows nt\currentversion\winlogonsoftware\microsoft\windows\currentversion\run\winlogon.exesysinfo.logscr.bmpminidump.bin%d.%d.%d.%dÝ %dh %dm%s:%dSoftware\Microsoft\Internet Explorer\TypedURLsurl%i4.4.10%dx%d@%d%c%d:d{Windows directory:links.log\History.IE5\index.dat\Opera\Opera\typed_history.xmlavast.com93.191.13.100drwebeset.comz-oleg.comkltest.org.ru.comodo.comgoogle.comDnsapi.dllws2_32.dllMozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)Mozilla/4.0 (compatible; MSIE 2.0; Windows NT 5.0; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)/login.phpntdll.dllGlobal\{EAF799BF-8249-4fe1-9A0D-92CD3CC22014}Global\{EAF799BF-8449-4fe1-9A0D-95CD39DC2014}Global\HighMemoryEvent_xexplorer.exe1.2.5- zip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllunzip 1.01 Copyright 1998-2004 Gilles Vollant - hXXp://VVV.winimage.com/zLibDllWinmm.dllKernel32.dllGdi32.dllhXXp://hXXps://HTTP/1.nspr4.dllPR_OpenTCPSocket[[[URL: %sProcess: %sUser-agent: %s]]]{{{%sCrypt32.dllCertVerifyCertificateChainPolicyWininet.dllHttpSendRequestAHttpSendRequestWHttpSendRequestExAHttpSendRequestExWset_urlmicrosoft.public.win32.programmer.kernel\iexplore.exekeygrabu.bmp\\.\PhysicalDrive%u/topic.phpkeylog.txtpasswords.txt%s%u.zipContent-Disposition: form-data; name="file"; filename="report"HTTP/1.0Content-Type: application/x-www-form-urlencodedReferer: hXXp://VVV.google.comContent-Type: multipart/form-data; boundary=---------------------------%sVVV.bing.comVVV.microsoft.comfrd.execommand=config&update_url=/search.php&port=command=load&url=SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0001SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0002SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0003hid=%s&username=SYSTEM&compname=%s&bot_version=4.4.10&uptime=%u&os=u&local_time=%s%d&token=%d&socks_port=%u&hardware[display]=%s&hardware[driver_av]=%s\chrome.exe\svchost.exe\java.exe\javaw.exe\javaws.exe\opera.exe\firefox.exe\maxthon.exe\avant.exe\mnp.exe\safari.exe\netscape.exe\tbb-firefox.exe\frd.exe\isclient.exe\ipc_full.exe\intpro.exe\cbsmain.dll\clmain.exe\core.exe\rundll32.exe\notepad.exe\cbank.exeiexplore.exe|opera.exe|java.exe|javaw.exe|explorer.exe|isclient.exe|intpro.exe|ipc_full.exe|mnp.exe|cbsmain.dll|firefox.exe|clmain.exe|core.exe|maxthon.exe|avant.exe|safari.exe|svchost.exe|chrome.exe|notepad.exe|rundll32.exe|netscape.exe|tbb-firefox.exe|frd.exe|cbank.exe|%s.dbf%s.DBFj_password=pass.logcommand=auth_loginByPassword&back_command=&back_custom1=&edClientLogin=edUserLogin=edPassword=&LOGIN_AUTHORIZATION_CODE=login=password=pass_advapi32.dllpath.txtkeys.zipLocal\{BE3C9D87-B91F-4e47-8B00-69798A04C732}%s\d.bmpLocal\{AA53E2BF-8989-4fe1-9A0D-95CD39DC0A14}Local\{EAF799BF-8989-4fe1-9A0D-95CD39D44014}keysprivate.txtpublic.txt\*.key\self.cerself.cerself.pubLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC2014}ctunnel.exectunnel.zippath_ctunnel.txtheader.keykeys99\header.keymasks2.key\masks2.keymasks.key\masks.key\name.keyprimary2.key\primary2.keyprimary.key\primary.keykeys99.zippath99.txtbsi.dll&domain=letitbit.net&cc.txtLocal\{EAF799BF-8989-4fa1-9A0D-95CD39DC0214}prv_key.pfxkeys\sign.cerLocal\{AAFEE2BF-8989-4fe1-9A0D-95CD39DC0A14}sks2xyz.dllvb_pfx_importLocal\{EAF799BF-8989-4fe1-9A0D-95CD39DC0214}secret.keypubkeys.keyLocal\{AAF799BF-8989-4fe1-9A0D-95CD39DC0A14}path1.txtinter.zipinterpro.iniLocal\{EAF329BF-8989-4fe1-9A0D-95CD39DC0214}Local\{AAF733BF-8989-4fe1-9A0D-95CD39DC0A14}cbsmain.dllLocal\{BE3C9D87-B777-4e47-8B10-69798A04C732}pass.txtLocal\{EAF799BF-8989-4fe1-9A0D-95CD777C0214}FilialRCon.dllISClient.cfgLocal\{EAF777BF-8989-4fe1-9A0D-95CD777C0214}rfk.zipclient.zippath_client.txtpath_keys.txtLocal\{EAF777FF-8989-4fe1-9A0D-95CD777C0214}Local\{EAF777FF-8989-4fe1-977D-95CD777C0214}Agava_Client.exeKeysDiskPathAgava_Client.iniAgava_keyskeys_path.txtmespro.dllAddPSEPrivateKeyExcore.exedata\id.dbf\data\id.dbfkeys%i.zippath%i.txtLocal\{EAF7722F-8989-4fe1-977D-95CD777C0214}Software\Microsoft\Windows NT\CurrentVersion\Winlogonwinmm.dll%s\%sLibVNCServer 0.9.7%s (%s)d/d/d d:dpassword check failed!WinSCard.dllSensApi.dllGetTcpTableIPHLPAPI.DLLdbghelp.dllMSVCRT.dllPSAPI.DLLNETAPI32.dllDNSAPI.dllHttpQueryInfoAHttpAddRequestHeadersWHttpAddRequestHeadersAHttpOpenRequestAWININET.dllWS2_32.dllShellExecuteASHFileOperationASHELL32.dllSHLWAPI.dllGetSystemWindowsDirectoryAGetProcessHeapWinExecKERNEL32.dllMapVirtualKeyWSetKeyboardStateEnumChildWindowsGetKeyboardStateMsgWaitForMultipleObjectsUSER32.dllSetViewportOrgExGetViewportOrgExGDI32.dllRegOpenKeyExARegCloseKeyRegFlushKeyRegEnumKeyExARegNotifyChangeKeyValueRegDeleteKeyAADVAPI32.dll?456789:;<=!"#$%&'()* ,-./0123;3 #>6.&'2, / 0&7!4-)1#MSCTF.Shared.MAPPING.%xDesk_%u%xMSCTF.Shared.MUTEX.%x.Prev.currentADM!XP1!F9BE9A8AMSCTF.Shared.MAPPING.fffffe00MSCTF.Shared.MAPPING.ffffff00MSCTF.Shared.MAPPING.fffffd00MSCTF.Shared.MUTEX.fffffe00MSCTF.Shared.MUTEX.ffffff00%Documents and Settings%\%current user%\Application Data\1-191j1w1}1?"?(?-?~?;-;5;=;^;|;7"7)7\7~76 6$6(6,6064686mavast.comya.ruserverkey.dat\windows\
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Scan a system with an anti-rootkit tool.
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:1860
- Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%WinDir%\AppPatch\fciniiq.exe (1765 bytes)
%System%\config\software (2440 bytes)
%System%\config\SOFTWARE.LOG (5347 bytes)- Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.
xOur best antivirus yet!
Fresh new look. Faster scanning. Better protection.
No thanks, continue to lavasoft.comEnjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!
For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!
Download adaware antivirus 12