Generic.Malware.SMdld.6F64FA91_7217547cf9
Trojan.Win32.Conycspa.p (Kaspersky), Generic.Malware.SMdld.6F64FA91 (B) (Emsisoft), Generic.Malware.SMdld.6F64FA91 (AdAware), GenericEmailWorm.YR (Lavasoft MAS)
Behaviour: Trojan, Worm, EmailWorm, Malware
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 7217547cf9cf208d79b79a484296c89e
SHA1: 8b16f58cb037873d5457d45c53ec5a0994d6b196
SHA256: 1e9908e14890b65f055a120d9142f2506ece97c120635284c3f29961ac73aba6
SSDeep: 768:hAx7v5CxzZhSa4s44DSIWL3k8pK4sKkf0r:2k8CbS7L3Vztks
Size: 25600 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: PackerUPXCompresorGratuitowwwupxsourceforgenet, UPolyXv05_v6
Company: no certificate found
Created at: 1992-06-20 01:22:17
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
| Behaviour | Description |
|---|---|
| EmailWorm | Worm can send e-mails. |
Process activity
The Generic creates the following process(es):
%original file name%.exe:800
The Generic injects its code into the following process(es):
mmwnd.exe:772
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process %original file name%.exe:800 makes changes in the file system.
The Generic creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Cookies\[email protected][2].txt (658 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (788 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (270 bytes)
The Generic deletes the following file(s):
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (0 bytes)
The process mmwnd.exe:772 makes changes in the file system.
The Generic creates and/or writes to the following file(s):
%WinDir%\ServicePackFiles\mm.pid (4 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (388 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (698 bytes)
The Generic deletes the following file(s):
%Documents and Settings%\%current user%\Cookies\[email protected][2].txt (0 bytes)
Registry activity
The process %original file name%.exe:800 makes changes in the system registry.
The Generic creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%WinDir%\servicepackfiles]
"mmwnd.exe" = "mmwnd"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1A 00 00 00 01 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E5 B2 CD B9 F6 92 45 10 9B 42 14 7F 27 02 B8 A5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
The Generic modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Generic modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Generic modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Generic deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process mmwnd.exe:772 makes changes in the system registry.
The Generic creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1B 00 00 00 01 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "70 4F AD B5 46 E7 C8 CA AD D3 41 94 5D DB 29 66"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
The Generic modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Generic modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
To automatically run itself each time Windows is booted, the Generic adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"xp_sys" = "%WinDir%\servicepackfiles\mmwnd.exe updated"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Generic modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
To automatically run itself each time Windows is booted, the Generic adds the following link to its file to the system registry autorun key:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"xp_sys" = "%WinDir%\servicepackfiles\mmwnd.exe updated"
The Generic deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
Dropped PE files
There are no dropped PE files.
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| UPX0 | 4096 | 278528 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| UPX1 | 282624 | 24576 | 23552 | 5.44145 | ab09c0917366742f2084f85202a289ee |
| .rsrc | 307200 | 4096 | 1024 | 1.97674 | 191661460bdbcda68bef38b8aab09895 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://www.google.com.ua/ |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET POLICY Unsupported/Fake FireFox Version 1.
Traffic
GET / HTTP/1.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; ru-RU; rv:1.7.12) Gecko/20050919 Firefox/1.0.7
Host: VVV.google.com.ua
HTTP/1.1 200 OK
Date: Sun, 12 Apr 2015 02:31:38 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=a6b9e2f6461c20ae:FF=0:TM=1428805898:LM=1428805898:S=U6cbsBDKdjFVz9ii; expires=Tue, 11-Apr-2017 02:31:38 GMT; path=/; domain=.google.com.ua
Set-Cookie: NID=67=TvIDYTbziZuFrGODWS1tj6lQEZNaxr7uYv9y_UqatpEQEWggmDIfpOPvroWVJh2qDV3r7ouGFOkXLT6D7OOPCxXlv_Fkgd8ggd0mXDuc9Rg49UKnqShjGVizCpXJ29eU; expires=Mon, 12-Oct-2015 02:31:38 GMT; path=/; domain=.google.com.ua; HttpOnly
P3P: CP="This is not a P3P policy! See hXXp://VVV.google.com/support/accounts/bin/answer.py?hl=en&answer=151657 for more info."
Server: gws
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Alternate-Protocol: 80:quic,p=0.5
Accept-Ranges: none
Vary: Accept-Encoding
Transfer-Encoding: chunked5375..<!doctype html><html itemscope="" itemtype="hXXp://sche
ma.org/WebPage" lang="uk"><head><meta content="/images/goo
gle_favicon_128.png" itemprop="image"><title>Google</title
><script>(function(){window.google={kEI:'CtkpVdjeM6a6ygOw34DQ
Bg',kEXPI:'3700062,3700267,3700362,3700366,4011559,4020347,4028717,402
8932,4029515,4029815,4031074,4031093,4031242,4031391,4031394,4031622,4
031738,4031740,4031790,4032030,4032141,4032157,4032480,4032500,4032573
,4032980,4033021,8300142,8500394,8501248,8501279,8501294,8501313,85013
51,8501393,8501411,8501425,10200083,10200095,10200793,10201001',authus
er:0,kSID:'c9c918f0_10'};google.kHL='uk';})();(function(){google.lc=[]
;google.li=0;google.getEI=function(a){for(var b;a&&(!a.getAttribute||!
(b=a.getAttribute("eid")));)a=a.parentNode;return b||google.kEI};googl
e.getLEI=function(a){for(var b=null;a&&(!a.getAttribute||!(b=a.getAttr
ibute("leid")));)a=a.parentNode;return b};google.https=function(){retu
rn"https:"==window.location.protocol};google.ml=function(){};google.ti
me=function(){return(new Date).getTime()};google.log=function(a,b,e,f,
l){var d=new Image,h=google.lc,g=google.li,c="",m=google.ls||"";d.oner
ror=d.onload=d.onabort=function(){delete h[g]};h[g]=d;if(!e&&-1==b.sea
rch("&ei=")){var k=google.getEI(f),c="&ei=" k;-1==b.search("&lei=")&&(
(f=google.getLEI(f))?c ="&lei=" f:k!=google.kEI&&(c ="&lei=" google.kE
I))}a=e||"/" (l||"gen_204") "?atyp=i&ct=" a "&cad=" b c m "&zx=" googl
e.time();/^http:/i.test(a)&&google.https()?(google.ml(Error("a"),!<<< skipped >>>
GET / HTTP/1.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; ru-RU; rv:1.7.12) Gecko/20050919 Firefox/1.0.7
Host: VVV.google.com.ua
Cookie: PREF=ID=a6b9e2f6461c20ae:FF=0:TM=1428805898:LM=1428805898:S=U6cbsBDKdjFVz9ii; NID=67=TvIDYTbziZuFrGODWS1tj6lQEZNaxr7uYv9y_UqatpEQEWggmDIfpOPvroWVJh2qDV3r7ouGFOkXLT6D7OOPCxXlv_Fkgd8ggd0mXDuc9Rg49UKnqShjGVizCpXJ29eU
HTTP/1.1 200 OK
Date: Sun, 12 Apr 2015 02:31:40 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=a6b9e2f6461c20ae:U=b32fe375b747af7c:FF=0:TM=1428805898:LM=1428805900:S=tmdBiAGSrwLl-YRh; expires=Tue, 11-Apr-2017 02:31:40 GMT; path=/; domain=.google.com.ua
Server: gws
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Alternate-Protocol: 80:quic,p=0.5
Accept-Ranges: none
Vary: Accept-Encoding
Transfer-Encoding: chunked5379..<!doctype html><html itemscope="" itemtype="hXXp://sche
ma.org/WebPage" lang="uk"><head><meta content="/images/goo
gle_favicon_128.png" itemprop="image"><title>Google</title
><script>(function(){window.google={kEI:'DNkpVdr2A6SiyAPyk4GY
BQ',kEXPI:'3700062,3700267,3700362,3700366,4011559,4020347,4028717,402
8932,4029515,4029815,4031074,4031093,4031242,4031391,4031394,4031622,4
031738,4031740,4031790,4032030,4032141,4032157,4032480,4032500,4032573
,4032980,4033021,8300142,8500394,8501248,8501279,8501294,8501313,85013
51,8501393,8501411,8501425,10200083,10200095,10200793,10201001',authus
er:0,kSID:'c9c918f0_10'};google.kHL='uk';})();(function(){google.lc=[]
;google.li=0;google.getEI=function(a){for(var b;a&&(!a.getAttribute||!
(b=a.getAttribute("eid")));)a=a.parentNode;return b||google.kEI};googl
e.getLEI=function(a){for(var b=null;a&&(!a.getAttribute||!(b=a.getAttr
ibute("leid")));)a=a.parentNode;return b};google.https=function(){retu
rn"https:"==window.location.protocol};google.ml=function(){};google.ti
me=function(){return(new Date).getTime()};google.log=function(a,b,e,f,
l){var d=new Image,h=google.lc,g=google.li,c="",m=google.ls||"";d.oner
ror=d.onload=d.onabort=function(){delete h[g]};h[g]=d;if(!e&&-1==b.sea
rch("&ei=")){var k=google.getEI(f),c="&ei=" k;-1==b.search("&lei=")&&(
(f=google.getLEI(f))?c ="&lei=" f:k!=google.kEI&&(c ="&lei=" google.kE
I))}a=e||"/" (l||"gen_204") "?atyp=i&ct=" a "&cad=" b c m "&zx=" googl
e.time();/^http:/i.test(a)&&google.https()?(google.ml(Error("a"),!<<< skipped >>>
The Generic connects to the servers at the folowing location(s):
.rsrc
Mozilla/5.0 (Windows; U; Windows NT 5.1; ru-RU; rv:1.7.12) Gecko/20050919 Firefox/1.0.7
hXXp://wm.krutahuli.info/cgi-script/receiverrr.fcgi?
/cgi-script/repeaterm3.fcgi?v5
hXXp://
jpg/jpg.exe
jpg.exe
gif/chgif.exe
chgif.exe
png/png.exe
png.exe
d.txt
a.txt
mmwnd.exe
mm.exe
00000000
spamhaus.org
8.9.3/8.9.3
8.12.11/8.12.11
8.12.3 da nor stuldap/8.12.3
8.13.1/8.13.1
) with ESMTP id
with ESMTP (
_smtp
goodbizonline.info
pernas.info
mrgoodbiz.info
egoodbiz.org
/aff-light/affcgi/install.php?userid=10000
/aff-light/affcgi/installed.fcgi?userid=10000
Software\Microsoft\Windows\CurrentVersion\Run
/a/info.txt
\mswsock.dll
\mswsockhh.dll
SOFTWARE\Microsoft\Windows\CurrentVersion\Setup
\i386\mswsock.dll
\dllcache\mswsock.dll
adsn.dll
\mswsock.bak
\archeved.exe
/archeved.exe
archeved.exe
\win.exe
/select.exe
win.exe
\socks.exe
/socks5.exe
socks.exe
/repeatermcm.fcgi?n=
/receiver.fcgi?id=
/recm.fcgi?
%FROM%
[email protected]
charset="Windows-1251";
X-Mailer: Microsoft Outlook Express 6.00.2900.3028
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028
hXXp://VVV.google.com.ua/
/reg.php?V=9&
mm.pid
KWindows
WinExec
GetWindowsDirectoryA
RegOpenKeyA
RegCreateKeyA
RegCloseKey
RegOpenKeyExA
ShellExecuteA
GetKeyboardType
InternetOpenUrlA
InternetCrackUrlA
HttpQueryInfoA
.idata
.rdata
P.reloc
P.rsrc
-1251"$#
C%soE0
O:nKey
KERNEL32.DLL
advapi32.dll
dnsapi.dll
oleaut32.dll
shell32.dll
user32.dll
wininet.dll
wsock32.dll
mmwnd.exe_772_rwx_00401000_00049000:
Mozilla/5.0 (Windows; U; Windows NT 5.1; ru-RU; rv:1.7.12) Gecko/20050919 Firefox/1.0.7
hXXp://wm.krutahuli.info/cgi-script/receiverrr.fcgi?
/cgi-script/repeaterm3.fcgi?v5
hXXp://
jpg/jpg.exe
jpg.exe
gif/chgif.exe
chgif.exe
png/png.exe
png.exe
d.txt
a.txt
mmwnd.exe
mm.exe
00000000
spamhaus.org
8.9.3/8.9.3
8.12.11/8.12.11
8.12.3 da nor stuldap/8.12.3
8.13.1/8.13.1
) with ESMTP id
with ESMTP (
_smtp
goodbizonline.info
pernas.info
mrgoodbiz.info
egoodbiz.org
/aff-light/affcgi/install.php?userid=10000
/aff-light/affcgi/installed.fcgi?userid=10000
Software\Microsoft\Windows\CurrentVersion\Run
/a/info.txt
\mswsock.dll
\mswsockhh.dll
SOFTWARE\Microsoft\Windows\CurrentVersion\Setup
\i386\mswsock.dll
\dllcache\mswsock.dll
adsn.dll
\mswsock.bak
\archeved.exe
/archeved.exe
archeved.exe
\win.exe
/select.exe
win.exe
\socks.exe
/socks5.exe
socks.exe
/repeatermcm.fcgi?n=
/receiver.fcgi?id=
/recm.fcgi?
%FROM%
[email protected]
charset="Windows-1251";
X-Mailer: Microsoft Outlook Express 6.00.2900.3028
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3028
hXXp://VVV.google.com.ua/
/reg.php?V=9&
mm.pid
KWindows
WinExec
GetWindowsDirectoryA
RegOpenKeyA
RegCreateKeyA
RegCloseKey
RegOpenKeyExA
ShellExecuteA
GetKeyboardType
InternetOpenUrlA
InternetCrackUrlA
HttpQueryInfoA
.idata
.rdata
P.reloc
P.rsrc
-1251"$#
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:800
- Delete the original Generic file.
- Delete or disinfect the following files created/modified by the Generic:
%Documents and Settings%\%current user%\Cookies\[email protected][2].txt (658 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (788 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (270 bytes)
%WinDir%\ServicePackFiles\mm.pid (4 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"xp_sys" = "%WinDir%\servicepackfiles\mmwnd.exe updated"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"xp_sys" = "%WinDir%\servicepackfiles\mmwnd.exe updated" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.