Gen.Heur.ManBat.1_7dc69e8369
Gen:Heur.ManBat.1 (BitDefender), Worm:Win32/Dorkbot (Microsoft), Trojan.Win32.VBKrypt.dclm (Kaspersky), Virtool.Win32.Vbinject.Gen.2 (v) (VIPRE), Trojan.DownLoader5.7415 (DrWeb), Gen:Heur.ManBat.1 (B) (Emsisoft), Trojan.Win32.VBKrypt (Ikarus), Gen:Heur.ManBat.1 (FSecure), Win32/Virut (AVG), Win32:Sality (Avast), HT_DORKBOT_0000030.TOMA (TrendMicro), Gen:Heur.ManBat.1 (AdAware), GenericUSBInfector.YR, GenericAutorunWorm.YR, GenericUDPFlooder.YR, GenericIRCBot.YR, GenericInjector.YR (Lavasoft MAS)
Behaviour: Trojan, Flooder, Worm, WormAutorun, IRCBot, UDPFlooder, USBInfector
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 7dc69e83698c314e5501903d4ef458a8
SHA1: 623e55e13d4b375103e385b508e7ddcb670301e7
SHA256: 9d32206cfd28b014c6746fa163e7d4979c74f0d0ad496656b4023b800e43df63
SSDeep: 6144:tt5WwCxyQNplDgZDofgCCWdm14Sy1zTM/xPZuooSxhv77777757R:tt5Oppn5dmmSyqPZDoSxhv77777757R
Size: 358400 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2003-03-30 23:36:26
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
| Behaviour | Description |
|---|---|
| WormAutorun | A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Trojan's file once a user opens a drive's folder in Windows Explorer. |
| IRCBot | A bot can communicate with command and control servers via IRC channel. |
| UDPFlooder | This program can make a UDP flood. A UDP flood attack is a denial-of-service attack using the User Datagram Protocol (UDP). It can be initiated by sending a large number of UDP packets to random ports on a remote host. |
| USBInfector | A program can register a device notification with the help of RegisterDeviceNotification. So it is notified when a USB device is plugged and then the worm copies itself to the USB device plugged into the affected computer. |
Process activity
The Trojan creates the following process(es):
Lskmkx.exe:1120
Lskmkx.exe:476
%original file name%.exe:1608
%original file name%.exe:1044
The Trojan injects its code into the following process(es):
spoolsv.exe:1432
mscorsvw.exe:172
jqs.exe:288
csrss.exe:696
winlogon.exe:720
services.exe:764
lsass.exe:776
svchost.exe:932
svchost.exe:1000
wmiprvse.exe:1060
svchost.exe:1088
svchost.exe:1132
svchost.exe:1184
Explorer.EXE:2032
File activity
The process %original file name%.exe:1608 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe (2105 bytes)
Registry activity
The process Lskmkx.exe:1120 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BE 1D FD 4F 2F 49 3E A3 71 AA DB 9B A9 16 5D 58"
The process Lskmkx.exe:476 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "00 8A CF 74 F2 3A 63 88 54 F2 8B 07 12 58 BB A7"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
The process %original file name%.exe:1608 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "28 5C 8F B3 17 65 51 A6 18 CA AE A4 9C 1D F6 2E"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system]
"Shell" = "explorer.exe,%Documents and Settings%\%current user%\Application Data\Lskmkx.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System]
"Shell" = "explorer.exe,%Documents and Settings%\%current user%\Application Data\Lskmkx.exe"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"Lskmkx" = "%Documents and Settings%\%current user%\Application Data\Lskmkx.exe"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Lskmkx" = "%Documents and Settings%\%current user%\Application Data\Lskmkx.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"Lskmkx" = "%Documents and Settings%\%current user%\Application Data\Lskmkx.exe"
The process %original file name%.exe:1044 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FE 3C EC 99 68 46 67 ED 4D 9F 82 D9 38 90 53 73"
Dropped PE files
There are no dropped PE files.
HOSTS file anomalies
No changes have been detected.
Rootkit activity
The Trojan installs the following user-mode hooks in WININET.dll:
HttpSendRequestW
InternetWriteFile
HttpSendRequestA
The Trojan installs the following user-mode hooks in WS2_32.dll:
send
The Trojan installs the following user-mode hooks in kernel32.dll:
MoveFileA
CopyFileW
CopyFileA
MoveFileW
CreateFileW
CreateFileA
The Trojan installs the following user-mode hooks in ntdll.dll:
LdrLoadDll
NtResumeThread
NtQueryDirectoryFile
NtEnumerateValueKey
Propagation
A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Trojan's file once a user opens a drive's folder in Windows Explorer.
A program can register a device notification with the help of RegisterDeviceNotification. So it is notified when a USB device is plugged and then the worm copies itself to the USB device plugged into the affected computer.
VersionInfo
Company Name: q
Product Name: ap
Product Version: 4.07.0018
Legal Copyright:
Legal Trademarks:
Original Filename: ialez.exe
Internal Name: ialez
File Version: 4.07.0018
File Description: qtmdhjvqoz
Comments: ogtwxhz
Language: Language Neutral
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| xqkh | 4096 | 1351680 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| fait | 1355776 | 245760 | 244736 | 5.54396 | 63c68abdc86f1ed3fe759a04fed46050 |
| .rsrc | 1601536 | 114688 | 112640 | 1.90909 | 2d6c366305e3204cb157cbded53a58ed |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
No activity has been detected.
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET TROJAN IRC Nick change on non-standard port
Traffic
Web Traffic was not found.
The Trojan connects to the servers at the folowing location(s):
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.ftp://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
http://www.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
http://api.wipmania.com/
\\.\pipe\%s_ipc
print '%s
';
%s
%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
http://%s/%s
http://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
%WinDir%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\WINDOWS\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
jqs.exe_288_rwx_010C0000_00024000:
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.ftp://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
http://www.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
http://api.wipmania.com/
\\.\pipe\%s_ipc
print '%s
';
%s
%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
http://%s/%s
http://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
%Program Files%\Java\jre6\bin\jqs.exe
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\Program Files\Java\jre6\bin\jqs.exe
csrss.exe_696_rwx_00AC0000_00024000:
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.ftp://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
http://www.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
http://api.wipmania.com/
\\.\pipe\%s_ipc
print '%s
';
%s
%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
http://%s/%s
http://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
\??\%System%\csrss.exe
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\WINDOWS\system32\csrss.exe
winlogon.exe_720_rwx_00AD0000_00024000:
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.ftp://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
http://www.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
http://api.wipmania.com/
\\.\pipe\%s_ipc
print '%s
';
%s
%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
http://%s/%s
http://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
\??\%System%\winlogon.exe
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\WINDOWS\system32\winlogon.exe
services.exe_764_rwx_00050000_00024000:
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.ftp://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
http://www.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
http://api.wipmania.com/
\\.\pipe\%s_ipc
print '%s
';
%s
%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
http://%s/%s
http://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
%System%\services.exe
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\WINDOWS\system32\services.exe
lsass.exe_776_rwx_00A90000_00024000:
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.ftp://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
http://www.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
http://api.wipmania.com/
\\.\pipe\%s_ipc
print '%s
';
%s
%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
http://%s/%s
http://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
%System%\lsass.exe
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\WINDOWS\system32\lsass.exe
svchost.exe_932_rwx_00940000_00024000:
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.ftp://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
http://www.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
http://api.wipmania.com/
\\.\pipe\%s_ipc
print '%s
';
%s
%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
http://%s/%s
http://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
%System%\svchost.exe
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\WINDOWS\system32\svchost.exe
svchost.exe_1000_rwx_00B10000_00024000:
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.ftp://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
http://www.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
http://api.wipmania.com/
\\.\pipe\%s_ipc
print '%s
';
%s
%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
http://%s/%s
http://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
%System%\svchost.exe
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\WINDOWS\system32\svchost.exe
wmiprvse.exe_1060_rwx_00FA0000_00024000:
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.ftp://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
http://www.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
http://api.wipmania.com/
\\.\pipe\%s_ipc
print '%s
';
%s
%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
http://%s/%s
http://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
%System%\wbem\wmiprvse.exe
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\WINDOWS\system32\wbem\wmiprvse.exe
svchost.exe_1088_rwx_00E40000_00024000:
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.ftp://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
http://www.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
http://api.wipmania.com/
\\.\pipe\%s_ipc
print '%s
';
%s
%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
http://%s/%s
http://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
%WinDir%\System32\svchost.exe
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\WINDOWS\system32\svchost.exe
svchost.exe_1132_rwx_006E0000_00024000:
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.ftp://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
http://www.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
http://api.wipmania.com/
\\.\pipe\%s_ipc
print '%s
';
%s
%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
http://%s/%s
http://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
%System%\svchost.exe
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
o\Device\HarddiskVolume1\WINDOWS\system32\svchost.exe
svchost.exe_1184_rwx_00B80000_00024000:
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.ftp://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
http://www.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
http://api.wipmania.com/
\\.\pipe\%s_ipc
print '%s
';
%s
%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
http://%s/%s
http://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
%System%\svchost.exe
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\WINDOWS\system32\svchost.exe
spoolsv.exe_1432_rwx_009F0000_00024000:
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.ftp://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
http://www.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
http://api.wipmania.com/
\\.\pipe\%s_ipc
print '%s
';
%s
%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
http://%s/%s
http://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
%System%\spoolsv.exe
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\WINDOWS\system32\spoolsv.exe
Explorer.EXE_2032_rwx_01E80000_00024000:
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.ftp://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
http://www.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
http://api.wipmania.com/
\\.\pipe\%s_ipc
print '%s
';
%s
%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
http://%s/%s
http://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
%WinDir%\Explorer.EXE
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
Lskmkx.exe
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\WINDOWS\explorer.exe
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Scan a system with an anti-rootkit tool.
- Terminate malicious process(es) (How to End a Process With the Task Manager):
Lskmkx.exe:1120
Lskmkx.exe:476
%original file name%.exe:1608
%original file name%.exe:1044 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe (2105 bytes)
- Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"Lskmkx" = "%Documents and Settings%\%current user%\Application Data\Lskmkx.exe"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Lskmkx" = "%Documents and Settings%\%current user%\Application Data\Lskmkx.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"Lskmkx" = "%Documents and Settings%\%current user%\Application Data\Lskmkx.exe" - Find and delete all copies of the worm's file together with "autorun.inf" scripts on removable drives.
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.