SearchProtectToolbar_pcap_b34f98860c
Trojan.NSIS.StartPage.FD, SearchProtectToolbar_pcap.YR (Lavasoft MAS)
Behaviour: Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: b34f98860cb5afa7f4976a3533350a68
SHA1: 919d338f51c834f0631524b7c5e5f35d8b69189c
SHA256: 5a7953b8ce314f4b5c4a910f96cf2f93b53bb438896bd202ea0caa9c3b18b8ce
SSDeep: 3072:bgXdZt9P6D3XJGCyy5Ky/9XO3jR0eWSzUu/0WJ:be341pUQ9OzRgW/cy
Size: 108008 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: Premium Installer
Created at: 2009-12-06 00:50:52
Analyzed on: WindowsXPESX SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
%original file name%.exe:2712
wmic.exe:2820
The Trojan injects its code into the following process(es):
DM1392851198.exe:1572
Mutexes
The following mutexes were created/opened:
ShimCacheMutex
CTF.TimListCache.FMPDefaultS-1-5-21-796845957-1563985344-1801674531-1003MUTEX.DefaultS-1-5-21-796845957-1563985344-1801674531-1003
CTF.TMD.MutexDefaultS-1-5-21-796845957-1563985344-1801674531-1003
CTF.Layouts.MutexDefaultS-1-5-21-796845957-1563985344-1801674531-1003
CTF.Asm.MutexDefaultS-1-5-21-796845957-1563985344-1801674531-1003
CTF.Compart.MutexDefaultS-1-5-21-796845957-1563985344-1801674531-1003
CTF.LBES.MutexDefaultS-1-5-21-796845957-1563985344-1801674531-1003
File activity
The process %original file name%.exe:2712 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\DM1392851198.exe (148088 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsaB3.tmp\NSISdl.dll (14 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsaB3.tmp\Convert.dll (2630 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsaB3.tmp\Banner.dll (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\instructions.dat (85511 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsvB2.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\instructions.dat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsaB3.tmp (0 bytes)
The process DM1392851198.exe:1572 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\SZIS9VJF\button_over[1].png (921 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\SZIS9VJF\dc[1].js (23072 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OVYHJBCC\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OVYHJBCC\DynamicOfferScreen[1].txt (2083 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\1GGYBZUQ\button[1].png (458 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\1GGYBZUQ\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\SZIS9VJF\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\MSHist012014122220141223\index.dat (16 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\MSHist012013041520130416\index.dat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\MSHist012013040820130415\index.dat (0 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\MSHist012013040820130415 (0 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\MSHist012013041520130416 (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\obhhelper.txt (0 bytes)
The process wmic.exe:2820 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\obhhelper.txt (238 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\obhhelper.txt (0 bytes)
Registry activity
The process %original file name%.exe:2712 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "99 22 E7 1E 4E 08 84 72 B3 C9 3F 08 AE DB 7E 4F"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{773a730e-74fb-11e2-b597-000c293bdf2f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fdd9f6f3-7454-11e2-b4cd-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fdd9f6f5-7454-11e2-b4cd-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fdd9f6f2-7454-11e2-b4cd-806d6172696f}]
"BaseClass" = "Drive"
The process DM1392851198.exe:1572 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fdd9f6f3-7454-11e2-b4cd-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012014122220141223]
"CacheRepair" = "0"
"CacheLimit" = "8192"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012014122220141223]
"CachePrefix" = ":2014122220141223:"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012014122220141223]
"CachePath" = "%USERPROFILE%\Local Settings\History\History.IE5\MSHist012014122220141223"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fdd9f6f2-7454-11e2-b4cd-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Internet Explorer\Main\WindowsSearch]
"Version" = "WS not installed"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "46 00 00 00 41 00 00 00 01 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "92 F9 E6 74 82 FB 8C 93 03 A4 B9 B1 03 8F B6 64"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{773a730e-74fb-11e2-b597-000c293bdf2f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fdd9f6f5-7454-11e2-b4cd-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Favorites" = "%Documents and Settings%\%current user%\Favorites"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012014122220141223]
"CacheOptions" = "11"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan deletes the following registry key(s):
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012013041520130416]
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012013040820130415]
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process wmic.exe:2820 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "88 A1 AD 29 A3 B3 A3 40 04 4B 4E 0A D2 9D 68 C9"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
Dropped PE files
| MD5 | File path |
|---|---|
| ef104d920cfc723962ba19892138eefb | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\DM1392851198.exe |
| 0116a50101c4107a138a588d1e46fca5 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsaB3.tmp\Banner.dll |
| 27ad43a37566f883c2a95f773dd3b6f5 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsaB3.tmp\Convert.dll |
| a5f8399a743ab7f9c88c645c35b1ebb5 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsaB3.tmp\NSISdl.dll |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
Company Name:
Product Name: itunes
Product Version: 3.0
Legal Copyright: itunes
Legal Trademarks: itunes
Original Filename:
Internal Name:
File Version:
File Description: itunes
Comments: Installer
Language: English (United States)
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 23628 | 24064 | 4.46394 | 856b32eb77dfd6fb67f21d6543272da5 |
| .rdata | 28672 | 4764 | 5120 | 3.4982 | dc77f8a1e6985a4361c55642680ddb4f |
| .data | 36864 | 154712 | 1024 | 3.3278 | 7922d4ce117d7d5b3ac2cffe4b0b5e4f |
| .ndata | 192512 | 61440 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| .rsrc | 253952 | 3168 | 3584 | 2.74744 | 7844ea949dbf1a074475c5e0ddc7fd36 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Total found: 1127
426bbdcf800942a9685c43382d43d851
02a1fb96629b8002638226fd27a309bb
2f13f367028964acff2041f1d176ef03
4ae34bf0948f7b0212a4ab5fdeef3ec9
d2e7cacd53c9d9cf20a0abec6461c36b
aad2bddebc3585228fdbd8d8de9f83c7
a62a8b093276f4d76b767a96d550b586
039cfc9b4b888589b7cd3d5eb4469753
6edf2adcd7f342758c7f83fc59cc4373
b5e558aa1469c83875dfa93d91989635
439b0fa8dbcd1871e736e637529d63e6
35eeb26f833a4f57908ffb6253772fc0
9b8456a4e2ed2b8d7381b3d5420d188c
a5974661ba65fec2abe487bcee032d52
45ffb7d65f33529770688f0e90ee0078
deb1818fec5b42b070a8d299d9b15ad6
816248387b2dc77f0953c3c4b94cd724
ba0d4f448e9872a3e09e6920ba2bdc87
27b4982c5ac27db7c36b4210e576aa42
45fef918bf66f2b7f208dd1188069bb8
fed85854daaa0d62c3ce682a95f91857
7039ca85295ff474395ccc04b7dd05e9
0a7a521bd72fffc72085947ad12400c9
82ed54cb95e07334bd8b6e5c0df1b035
1d4ebd054d03af0c5b7b3af372ce40c6
8452262a1e87b9005e1828f6402b2ca7
URLs
| URL | IP |
|---|---|
| hxxp://smartinstaller.elasticbeanstalk.com//offers/DynamicOfferScreen?offerid=223&productid=2300&distid=3073&leadp=2935&countryid=71&sysbit=32&dfb=3&hb=5&isagg=0&version=3.0&external=0& | |
| hxxp://staticrevenyou.outbrowse.netdna-cdn.com/offers/images/Theme8/topLine.jpg | |
| hxxp://staticrevenyou.outbrowse.netdna-cdn.com/offers/images/Theme8/topComp.png | |
| hxxp://stats.l.doubleclick.net/dc.js | |
| hxxp://staticrevenyou.outbrowse.netdna-cdn.com/offers/images/Theme8/bgImg.jpg | |
| hxxp://staticrevenyou.outbrowse.netdna-cdn.com/offers/images/Theme8/bottomLine.jpg | |
| hxxp://staticrevenyou.outbrowse.netdna-cdn.com/offers/images/Theme8/button_over.png | |
| hxxp://staticrevenyou.outbrowse.netdna-cdn.com/offers/images/Theme8/nextCase.jpg | |
| hxxp://serv.the-app-data.info//offers/DynamicOfferScreen?offerid=223&productid=2300&distid=3073&leadp=2935&countryid=71&sysbit=32&dfb=3&hb=5&isagg=0&version=3.0&external=0& | |
| hxxp://static.revenyou.com/offers/images/Theme8/topComp.png | |
| hxxp://stats.g.doubleclick.net/dc.js | |
| hxxp://static.revenyou.com/offers/images/Theme8/button_over.png | |
| hxxp://static.revenyou.com/offers/images/Theme8/nextCase.jpg | |
| hxxp://static.revenyou.com/offers/images/Theme8/topLine.jpg | |
| hxxp://static.revenyou.com/offers/images/Theme8/bgImg.jpg | |
| hxxp://static.revenyou.com/offers/images/Theme8/bottomLine.jpg |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET /dc.js HTTP/1.1
Accept: */*
Referer: hXXp://serv.the-app-data.info//offers/DynamicOfferScreen?offerid=223&productid=2300&distid=3073&leadp=2935&countryid=71&sysbit=32&dfb=3&hb=5&isagg=0&version=3.0&external=0&
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C; .NET4.0E)
Host: stats.g.doubleclick.net
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Mon, 22 Dec 2014 05:18:59 GMT
Expires: Mon, 22 Dec 2014 07:18:59 GMT
Last-Modified: Thu, 13 Nov 2014 21:10:00 GMT
X-Content-Type-Options: nosniff
Content-Type: text/javascript
Vary: Accept-Encoding
Content-Encoding: gzip
Server: Golfe2
Content-Length: 15853
Cache-Control: public, max-age=7200
Age: 5657
Alternate-Protocol: 80:quic,p=0.02...........={_.:...)....'.$..&.......-..Ms..e9..'...B.g.3#..........3z
?F........z....n.h..@&b.....v.W.A"...<8H.^.....A*......3....~..X?8.
...<..t..)d.......Hf.Q...._. .,`.....a....>...?...v.Aq.G........
.p.........a$y&.....sX7p........ ..M.d..l.K.....t...8..i6....C..XO....
.@....!.....RG.l .}....b$c..B|8..C}!.8..=.e.K....{..K.9..a..nx......%.
.;..F...J...v..n!.L.....g.C@...~..|...=....q.9n_...P.....Tw.o.........
..k.....^:.....O!..b......=...B..,..j8......k.b./.Y..JE...({k.........
(.L..@. ...b;...s.f...k../--..\..A.M..he.q..u.u.$..<.....$......eBf
....,...r{.[.....h....Tup..$?F?2.... .qk...x..;.......}.Y.[)jL........
.}.4.'..Z_...bms.._..I4.r=...f....U}...|......].FG..\.[9...hp......"..
L..J...a..l.=.C..c.............i..2&.......{....T*w..%#ey....A..`.T..Q
.w.....f2...,....J...y.qqA.........BTo....5.W..9]...]b$K%Z.V..b..x1t..
..]..&.P.Qo.A?..W.R..l.........'".. ..D. ..EA.......$US.t...w?.u*rn.:.
.....?...a,.(..0....`.GL....Z...j[8.[.2k8N...4(.x..4j&..V..p.N)0.;k...
....C..= .].;M.|..&..;........M'....Vy.6*..[J.7`n*...Q..O.%4T ...;....
.'J.........xKK.&..^A...;...........a<.783[X......p...c...3j$.....Z
....c.D.....BW................*.1]KQ].zb.... .?~....V>&."..Q$.....&
.sS..Kq........).....{y.V....T...L.09.-.KK:..yH.....4./..Ni.oaM..X..X.
R...l...[...n2.....6.v.Q.......v.C.0........55..z]__.a.j...fJh.....r.6
a.6v3..!.}^0...,...I.w........i.......Q..q ..c;2.p2 .%..:0..14....z...
.b.*Z..*..>...v].....H...V...kVT.]....I ...._..}.f.....^U..a.V]..wd
.N.....9....n1-0..`...B..Q.MB...7...%.!.L~.."H..xNV`?||.H.........<<< skipped >>>
GET /offers/images/Theme8/topComp.png HTTP/1.1
Accept: */*
Referer: hXXp://serv.the-app-data.info//offers/DynamicOfferScreen?offerid=223&productid=2300&distid=3073&leadp=2935&countryid=71&sysbit=32&dfb=3&hb=5&isagg=0&version=3.0&external=0&
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C; .NET4.0E)
Host: static.revenyou.com
Connection: Keep-Alive
HTTP/1.1 404 Not Found
Date: Mon, 22 Dec 2014 06:53:16 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
X-Powered-By: ASP.NET
Server: NetDNA-cache/2.2
Content-Encoding: gzip2b0.............T.n.@.}G..&Fy.^.I..Ej.(..6j..q.....uw..E......4.]$.^.9
s....g7.'...S.M.....w.'...}.M...........^.....al...'6&...l6...I.b./lkY
|.Vo]].x...q.1,.l.$..7..~._.V`...J.p.gr...E1r&23..w.....z.9.......c.4.
..........,..&..E..\...A*....H..L.X.u.yCV!)D......3.Z...\..X.h.O.Z.,..
.$......;L..%OE.....x...^..........D.L...X..<..RVB...k..l,.&....<
;.D..:._.[.;..v.'h6b.....]....P&R...lf...../..FN&.Z.o.....[.....u..T..
b.>T...L.....jl....\...9T..5s...:.......c.O*v..n.X>.>.,.5....
x[.... .Z.!.@a..(....M<.."##..U!_.s...k...1[...].6# [...Z..m'..D.".
.)k....?~DU...RR......N..f..PR...4i.x!.COY,.......*xo<...j.V!.N.. .
D._..4D.R.....@X f.Ne.Q..".FC.S.....)E....\*.hb`...../..y.{. v.}t...;.
...../.Ef.......0......
GET /offers/images/Theme8/bgImg.jpg HTTP/1.1
Accept: */*
Referer: hXXp://serv.the-app-data.info//offers/DynamicOfferScreen?offerid=223&productid=2300&distid=3073&leadp=2935&countryid=71&sysbit=32&dfb=3&hb=5&isagg=0&version=3.0&external=0&
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C; .NET4.0E)
Host: static.revenyou.com
Connection: Keep-Alive
HTTP/1.1 404 Not Found
Date: Mon, 22 Dec 2014 06:53:16 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
X-Powered-By: ASP.NET
Server: NetDNA-cache/2.2
Content-Encoding: gzip2b0.............T.n.@.}G..&Fy.^.I..Ej.(..6j..q.....uw..E......4.]$.^.9
s....g7.'...S.M.....w.'...}.M...........^.....al...'6&...l6...I.b./lkY
|.Vo]].x...q.1,.l.$..7..~._.V`...J.p.gr...E1r&23..w.....z.9.......c.4.
..........,..&..E..\...A*....H..L.X.u.yCV!)D......3.Z...\..X.h.O.Z.,..
.$......;L..%OE.....x...^..........D.L...X..<..RVB...k..l,.&....<
;.D..:._.[.;..v.'h6b.....]....P&R...lf...../..FN&.Z.o.....[.....u..T..
b.>T...L.....jl....\...9T..5s...:.......c.O*v..n.X>.>.,.5....
x[.... .Z.!.@a..(....M<.."##..U!_.s...k...1[...].6# [...Z..m'..D.".
.)k....?~DU...RR......N..f..PR...4i.x!.COY,.......*xo<...j.V!.N.. .
D._..4D.R.....@X f.Ne.Q..".FC.S.....)E....\*.hb`...../..y.{. v.}t...;.
...../.Ef.......0......
GET /offers/images/Theme8/button_over.png HTTP/1.1
Accept: */*
Referer: hXXp://serv.the-app-data.info//offers/DynamicOfferScreen?offerid=223&productid=2300&distid=3073&leadp=2935&countryid=71&sysbit=32&dfb=3&hb=5&isagg=0&version=3.0&external=0&
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C; .NET4.0E)
Host: static.revenyou.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Mon, 22 Dec 2014 06:53:16 GMT
Content-Type: image/png
Content-Length: 921
Connection: keep-alive
Cache-Control: max-age=604800
Last-Modified: Mon, 05 Aug 2013 17:21:05 GMT
ETag: "f072da2a092ce1:0"
X-Powered-By: ASP.NET
Server: NetDNA-cache/2.2
Expires: Mon, 29 Dec 2014 06:53:16 GMT
X-Cache: HIT
Accept-Ranges: bytes.PNG........IHDR...Y............m....tEXtSoftware.Adobe ImageReadyq.e&
lt;...;IDATx..Z;o.1..Y.D...W."$=D..*[email protected].
...........;..N.h..=.|..x6..f..pf...n...yX...>z......`87.3...t.e:.s
h..e..z.A....G.p..IZ.z...?Ra8........Y......O.......[[email protected].
...y..-.....Lc.0......O..|z.O/...k.....e...n..!......G.p...9....3. .'?
7 ..GD@..{.<....C$....N.........Q...<.,@...].;Q.'<.(.X.r.,.6.
......QrB..h..d&r....6....G..Shr.... .....4r..= ..f.....B.qP..l.K.....
...YB.Z....H....../:.l.(.S.D...nM7..P.%R........&_uR.H6A..(raP.H9...[\
D. .(....d...`.8.A......r5Q..........:v.e....u.....-&.1.....&.........
Z.|....).L...$....)K%a-....b..a*{<(W..P<..w7_Z.....h.%6.N.......
.*\FB...A...#..f.N...C..(.p...........K.|..5d..3u-........(.k. 7..6..t
svP!.U0.q.......9z.e [email protected]............. .>=...{WVim...
.f.c6.:...|.....0X.yk...../z..!.SHW.d......o.s........a..8..g.|zvg...o
[email protected].^......IEND.B`...
GET /offers/images/Theme8/topLine.jpg HTTP/1.1
Accept: */*
Referer: hXXp://serv.the-app-data.info//offers/DynamicOfferScreen?offerid=223&productid=2300&distid=3073&leadp=2935&countryid=71&sysbit=32&dfb=3&hb=5&isagg=0&version=3.0&external=0&
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C; .NET4.0E)
Host: static.revenyou.com
Connection: Keep-Alive
HTTP/1.1 404 Not Found
Date: Mon, 22 Dec 2014 06:53:16 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
X-Powered-By: ASP.NET
Server: NetDNA-cache/2.2
Content-Encoding: gzip2b0.............T.n.@.}G..&Fy.^.I..Ej.(..6j..q.....uw..E......4.]$.^.9
s....g7.'...S.M.....w.'...}.M...........^.....al...'6&...l6...I.b./lkY
|.Vo]].x...q.1,.l.$..7..~._.V`...J.p.gr...E1r&23..w.....z.9.......c.4.
..........,..&..E..\...A*....H..L.X.u.yCV!)D......3.Z...\..X.h.O.Z.,..
.$......;L..%OE.....x...^..........D.L...X..<..RVB...k..l,.&....<
;.D..:._.[.;..v.'h6b.....]....P&R...lf...../..FN&.Z.o.....[.....u..T..
b.>T...L.....jl....\...9T..5s...:.......c.O*v..n.X>.>.,.5....
x[.... .Z.!.@a..(....M<.."##..U!_.s...k...1[...].6# [...Z..m'..D.".
.)k....?~DU...RR......N..f..PR...4i.x!.COY,.......*xo<...j.V!.N.. .
D._..4D.R.....@X f.Ne.Q..".FC.S.....)E....\*.hb`...../..y.{. v.}t...;.
...../.Ef.......0......
GET /offers/images/Theme8/bottomLine.jpg HTTP/1.1
Accept: */*
Referer: hXXp://serv.the-app-data.info//offers/DynamicOfferScreen?offerid=223&productid=2300&distid=3073&leadp=2935&countryid=71&sysbit=32&dfb=3&hb=5&isagg=0&version=3.0&external=0&
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C; .NET4.0E)
Host: static.revenyou.com
Connection: Keep-Alive
HTTP/1.1 404 Not Found
Date: Mon, 22 Dec 2014 06:53:16 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
X-Powered-By: ASP.NET
Server: NetDNA-cache/2.2
Content-Encoding: gzip2b0.............T.n.@.}G..&Fy.^.I..Ej.(..6j..q.....uw..E......4.]$.^.9
s....g7.'...S.M.....w.'...}.M...........^.....al...'6&...l6...I.b./lkY
|.Vo]].x...q.1,.l.$..7..~._.V`...J.p.gr...E1r&23..w.....z.9.......c.4.
..........,..&..E..\...A*....H..L.X.u.yCV!)D......3.Z...\..X.h.O.Z.,..
.$......;L..%OE.....x...^..........D.L...X..<..RVB...k..l,.&....<
;.D..:._.[.;..v.'h6b.....]....P&R...lf...../..FN&.Z.o.....[.....u..T..
b.>T...L.....jl....\...9T..5s...:.......c.O*v..n.X>.>.,.5....
x[.... .Z.!.@a..(....M<.."##..U!_.s...k...1[...].6# [...Z..m'..D.".
.)k....?~DU...RR......N..f..PR...4i.x!.COY,.......*xo<...j.V!.N.. .
D._..4D.R.....@X f.Ne.Q..".FC.S.....)E....\*.hb`...../..y.{. v.}t...;.
...../.Ef.......0......
GET /offers/images/Theme8/nextCase.jpg HTTP/1.1
Accept: */*
Referer: hXXp://serv.the-app-data.info//offers/DynamicOfferScreen?offerid=223&productid=2300&distid=3073&leadp=2935&countryid=71&sysbit=32&dfb=3&hb=5&isagg=0&version=3.0&external=0&
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C; .NET4.0E)
Host: static.revenyou.com
Connection: Keep-Alive
HTTP/1.1 404 Not Found
Date: Mon, 22 Dec 2014 06:53:16 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
X-Powered-By: ASP.NET
Server: NetDNA-cache/2.2
Content-Encoding: gzip2b0.............T.n.@.}G..&Fy.^.I..Ej.(..6j..q.....uw..E......4.]$.^.9
s....g7.'...S.M.....w.'...}.M...........^.....al...'6&...l6...I.b./lkY
|.Vo]].x...q.1,.l.$..7..~._.V`...J.p.gr...E1r&23..w.....z.9.......c.4.
..........,..&..E..\...A*....H..L.X.u.yCV!)D......3.Z...\..X.h.O.Z.,..
.$......;L..%OE.....x...^..........D.L...X..<..RVB...k..l,.&....<
;.D..:._.[.;..v.'h6b.....]....P&R...lf...../..FN&.Z.o.....[.....u..T..
b.>T...L.....jl....\...9T..5s...:.......c.O*v..n.X>.>.,.5....
x[.... .Z.!.@a..(....M<.."##..U!_.s...k...1[...].6# [...Z..m'..D.".
.)k....?~DU...RR......N..f..PR...4i.x!.COY,.......*xo<...j.V!.N.. .
D._..4D.R.....@X f.Ne.Q..".FC.S.....)E....\*.hb`...../..y.{. v.}t...;.
...../.Ef.......0..
GET //offers/DynamicOfferScreen?offerid=223&productid=2300&distid=3073&leadp=2935&countryid=71&sysbit=32&dfb=3&hb=5&isagg=0&version=3.0&external=0& HTTP/1.1
Accept: */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C; .NET4.0E)
Host: serv.the-app-data.info
Connection: Keep-Alive
HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Date: Mon, 22 Dec 2014 06:53:16 GMT
Server: Microsoft-IIS/8.0
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Content-Length: 12226
Connection: keep-alive<html>. <head>. <title>223 - SearchProtect
INT (iTunes)</title><script type='text/javascript'>var _ga
q = _gaq || [];_gaq.push(['_setAccount', 'UA-37348037-1']);_gaq.push([
'_setDomainName', 'ppdownload.com']);_gaq.push(['_setAllowLinker', tru
e]);.. _gaq.push(['_trackPa
geview']);.. (function() {.
. var ga = document.creat
eElement('script'); ga.type = 'text/javascript'; ga.async = true;..
ga.src = ('https:' == docum
ent.location.protocol ? 'hXXps://' : 'hXXp://') 'stats.g.doubleclick
.net/dc.js';.. var s = do
cument.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga
, s);.. })();</script>
;<style type='text/css'>body { width:100%; height:
100%; margin:0px; padding:0px; font-size:font-family:helvetica; font-s
ize:12px;} .divLeadpName { border-bottom-style:groove;b
order-bottom-width: thin; padding-left:61px; padding-top:9px; font-siz
e:font-family:helvetica; font-style:italic; font-size:25px;
font-weight:bold; color:black; position:absolute; width: 100%;
background-color: #fff; ba} #divTop {display: none} #divMi
ddle {background-color: #efecec; height: 100%;} #middle {backg
round-color: #fff;} .divOnNext { position:absolute;<<< skipped >>>
The Trojan connects to the servers at the folowing location(s):
.text
`.rdata
@.data
.ndata
.rsrc
uDSSh
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
GetWindowsDirectoryA
KERNEL32.dll
ExitWindowsEx
USER32.dll
GDI32.dll
SHFileOperationA
ShellExecuteA
SHELL32.dll
RegEnumKeyA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
ADVAPI32.dll
COMCTL32.dll
ole32.dll
VERSION.dll
verifying installer: %d%%
hXXp://nsis.sf.net/NSIS_Error
... %d%%
~nsu.tmp
%u.%u%s%s
RegDeleteKeyExA
%s=%s
*?|<>/":
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\DM1392851198.exe /PID=1955 /SUBPID=-1 /DISTID=3073 /NETWORKID=1 /CID=0 /PRODUCT_ID=2935 /SERVER_URL=hXXp://installer.apps-track.com /CLICKID=-1 /D1=23 /D2=1 /D3=1 /D4=4 /D5=000009139 /PRODUCT_NAME= /PRODUCT_EULA= /PRODUCT_PRIVACY= /EXE_URL= /EXE_CMDLINE= /HOST_BROWSER=5 /IS_RUNTIME=true /THANKYOU_URL= /RETURNING_USER_DAYS=2
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsaB3.tmp\Banner.dll
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsaB3.tmp
GetCPInfo
GetProcessHeap
Convert.dll
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
3 3$3(3,3
portuguese-brazilian
operator
GetProcessWindowStation
Visual C CRT: Not enough memory to complete call to strerror.
Broken pipe
Inappropriate I/O control operation
Operation not permitted
C?%c,
%d>-@Vk
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\instructions.dat
instructions.dat
INSTRU~1.DAT
:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsaB3.tmp
c:\%original file name%.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp
%original file name%.exe
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsvB2.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
hXXp://installer.apps-track.com
000009139
/PID=1955 /SUBPID=-1 /DISTID=3073 /NETWORKID=1 /CID=0 /PRODUCT_ID=2935 /SERVER_URL=hXXp://installer.apps-track.com /CLICKID=-1 /D1=23 /D2=1 /D3=1 /D4=4 /D5=000009139 /PRODUCT_NAME= /PRODUCT_EULA= /PRODUCT_PRIVACY= /EXE_URL= /EXE_CMDLINE= /HOST_BROWSER=5 /IS_RUNTIME=true /THANKYOU_URL= /RETURNING_USER_DAYS=2
hXXp://installer.apps
-track.com
hXXp://get.getfiles
resources.com/dmresources/
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.46</description><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="requireAdministrator" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/></application></compatibility></assembly>- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
WUSER32.DLL
DM1392851198.exe_1572:
.text
`.rdata
@.data
.rsrc
@.reloc
spKey
szKey
keyCur
hKey
cSubKeys
cmdline
urlStr
wurl
bstrLicKey
cchLicKey
nMsg
vurl
bstrURLOut
rtExecmd
rtExeurl
reportURL
zErrMsg
compiledSql
sqliteCookieFiles
htmlDecodedUrlValue
endParamKeys
dynamicProductKeys
wUrlQS
wUrl
sqliteHistoryFiles
readDownloadUrl
searchUrl
finishUrlForOuterInstaller
reportUrl
httpResponse
fullCmd
subkey
hostBrwCmd
tyUrl
baseKeys
cmdLineW
cmdW
exeUrlW
urlW
cmdLine
exeUrl
offersMainUrl
antivirusesRegKeys64Arr
antivirusesRegKeys32Arr
reg64Key
postExe
preExe
regKey
offerUrl
regKey64
cbSubKeys
zMsg
nCellKey
nMaxKey
nMinKey
nKey
zErrmsg
PhD%S
~)hd%S
keyInfo
errMsg
t.hx#S
osCmd
finalExePath
urlComp
szURLPath
xSSSh
FTPjKS
FtPj;S
C.PjRV
RegDeleteKeyExW
RegDeleteKeyTransactedW
RegCreateKeyTransactedW
RegOpenKeyTransactedW
.vector<T> too long
X:X:X:X:X:X
\Google\Chrome\Application\chrome.exe
%d/%d/%d %d:%d:%d
3.7.16.2
SQLite format 3
CREATE TABLE sqlite_master(
sql text
CREATE TEMP TABLE sqlite_temp_master(
REINDEXEDESCAPEACHECKEYBEFOREIGNOREGEXPLAINSTEADDATABASELECTABLEFTHENDEFERRABLELSEXCEPTRANSACTIONATURALTERAISEXCLUSIVEXISTSAVEPOINTERSECTRIGGEREFERENCESCONSTRAINTOFFSETEMPORARYUNIQUERYATTACHAVINGROUPDATEBEGINNERELEASEBETWEENOTNULLIKECASCADELETECASECOLLATECREATECURRENT_DATEDETACHIMMEDIATEJOINSERTMATCHPLANALYZEPRAGMABORTVALUESVIRTUALIMITWHENWHERENAMEAFTEREPLACEANDEFAULTAUTOINCREMENTCASTCOLUMNCOMMITCONFLICTCROSSCURRENT_TIMESTAMPRIMARYDEFERREDISTINCTDROPFAILFROMFULLGLOBYIFISNULLORDERESTRICTOUTERIGHTROLLBACKROWUNIONUSINGVACUUMVIEWINITIALLY
\obhhelper.txt
Error %u in WinHttpQueryDataAvailable.
Error %u in WinHttpReadData.
Error %d has occurred.
F%D,3
Run-Time Check Failure #%d - %s
%s%s%s%s
%s%s%p%s%ld%s%d%s
Visual C CRT: Not enough memory to complete call to strerror.
RegCloseKey
RegOpenKeyExW
Broken pipe
Inappropriate I/O control operation
Operation not permitted
portuguese-brazilian
operator
GetProcessWindowStation
WinHttpCloseHandle
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpOpenRequest
WinHttpConnect
WinHttpCrackUrl
WinHttpSetTimeouts
WinHttpOpen
WinHttpQueryHeaders
WINHTTP.dll
PSAPI.DLL
GetProcessHeap
KERNEL32.dll
EnumChildWindows
CreateDialogIndirectParamW
USER32.dll
GDI32.dll
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
ADVAPI32.dll
ShellExecuteW
SHELL32.dll
ole32.dll
OLEAUT32.dll
URLDownloadToFileW
urlmon.dll
IPHLPAPI.DLL
GetCPInfo
.?AV?$CAtlExeModuleT@VCSmartInstallerModule@@@ATL@@
SQLITE_
d-d-d d:d:d
d:d:d
d-d-d
failed to allocate %u bytes of memory
failed memory resize %u to %u bytes
922337203685477580
API call with %s database connection pointer
RowKey
OsError 0x%x (%u)
os_win.c:%d: (%d) %s(%s) - %s
delayed %dms for lock/sharing conflict
%s-shm
%s\etilqs_
%s\%s
Recovered %d frames from WAL file %s
cannot limit WAL size: %s
invalid page number %d
2nd reference to page %d
Failed to read ptrmap key=%d
Bad ptr map entry key=%d expected=(%d,%d) got=(%d,%d)
%d of %d pages missing from overflow list starting at %d
failed to get page %d
freelist leaf count too big on page %d
Page %d:
unable to get the page. error code=%d
btreeInitPage() returns error code %d
On tree page %d cell %d:
On page %d at right child:
Corruption detected in cell %d on page %d
Multiple uses for byte %d of page %d
Fragmentation of %d bytes reported as %d on page %d
Page %d is never used
Pointer map page %d is referenced
Outstanding page count goes from %d to %d during this analysis
unknown database %s
keyinfo(%d
%s(%d)
%s-mjXXXXXX9XXz
MJ delete: %s
MJ collide: %s
-mjX9X
foreign key constraint failed
unable to use function %s in the requested context
bind on a busy prepared statement: [%s]
zeroblob(%d)
abort at %d in [%s]: %s
constraint failed at %d in [%s]
cannot open savepoint - SQL statements in progress
no such savepoint: %s
cannot release savepoint - SQL statements in progress
cannot commit transaction - SQL statements in progress
sqlite_temp_master
sqlite_master
SELECT name, rootpage, sql FROM '%q'.%s WHERE %s ORDER BY rowid
cannot change %s wal mode from within a transaction
database table is locked: %s
statement aborts at %d: [%s] %s
cannot open value of type %s
cannot open virtual table: %s
cannot open view: %s
no such column: "%s"
foreign key
indexed
cannot open %s column for writing
misuse of aliased aggregate %s
%s: %s.%s.%s
%s: %s.%s
%s: %s
not authorized to use function: %s
%r %s BY term out of range - should be between 1 and %d
too many terms in %s BY clause
Expression tree is too large (maximum depth %d)
variable number must be between ?1 and ?%d
too many SQL variables
too many columns in %s
EXECUTE %s%s SUBQUERY %d
misuse of aggregate: %s()
%.*s"%w"%s
%s%.*s"%w"
sqlite_rename_table
sqlite_rename_trigger
sqlite_rename_parent
%s OR name=%Q
type='trigger' AND (%s)
sqlite_
table %s may not be altered
there is already another table or index with this name: %s
view %s may not be altered
UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
sqlite_sequence
UPDATE "%w".sqlite_sequence set name = %Q WHERE name = %Q
UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d 18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
Cannot add a PRIMARY KEY column
UPDATE "%w".%s SET sql = substr(sql,1,%d) || ', ' || %Q || substr(sql,%d) WHERE type = 'table' AND name = %Q
sqlite_altertab_%s
sqlite_stat1
CREATE TABLE %Q.%s(%s)
DELETE FROM %Q.%s WHERE %s=%Q
SELECT tbl,idx,stat FROM %Q.sqlite_stat1
invalid name: "%s"
too many attached databases - max %d
database %s is already in use
unable to open database: %s
no such database: %s
cannot detach database %s
database %s is locked
sqlite_detach
sqlite_attach
%s %T cannot reference objects in database %s
access to %s.%s.%s is prohibited
access to %s.%s is prohibited
object name reserved for internal use: %s
there is already an index named %s
too many columns on %s
duplicate column name: %s
default value of column [%s] is not constant
table "%s" has more than one primary key
AUTOINCREMENT is only allowed on an INTEGER PRIMARY KEY
CREATE %s %.*s
UPDATE %Q.%s SET type='%s', name=%Q, tbl_name=%Q, rootpage=#%d, sql=%Q WHERE rowid=#%d
CREATE TABLE %Q.sqlite_sequence(name,seq)
view %s is circularly defined
UPDATE %Q.%s SET rootpage=%d WHERE #%d AND rootpage=#%d
sqlite_stat%d
DELETE FROM %Q.sqlite_sequence WHERE name=%Q
DELETE FROM %Q.%s WHERE tbl_name=%Q and type!='trigger'
sqlite_stat
table %s may not be dropped
use DROP TABLE to delete table %s
use DROP VIEW to delete view %s
foreign key on %s should reference only one column of table %T
number of columns in foreign key does not match the number of columns in the referenced table
unknown column "%s" in foreign key definition
indexed columns are not unique
table %s may not be indexed
views may not be indexed
virtual tables may not be indexed
there is already a table named %s
index %s already exists
sqlite_autoindex_%s_%d
table %s has no column named %s
CREATE%s INDEX %.*s
INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);no such index: %S
index associated with UNIQUE or PRIMARY KEY constraint cannot be dropped
DELETE FROM %Q.%s WHERE name=%Q AND type='index'
a JOIN clause is required before %s
unable to identify the object to be reindexed
no such collation sequence: %s
table %s may not be modified
cannot modify %s because it is a view
sqlite_version
sqlite_source_id
sqlite_log
sqlite_compileoption_used
sqlite_compileoption_get
foreign key mismatch - "%w" referencing "%w"
table %S has %d columns but %d values were supplied
%d values for %d columns
table %S has no column named %s
%s.%s may not be NULL
constraint %s failed
PRIMARY KEY must be unique
sqlite3_extension_init
unable to open shared library [%s]
no entry point [%s] in shared library [%s]
error during initialization: %s
automatic extension loading failed: %s
foreign_keys
foreign_key_list
foreign_key_check
*** in database %s ***
unsupported encoding: %s
malformed database schema (%s)
%s - %s
unsupported file format
SELECT name, rootpage, sql FROM '%q'.%s ORDER BY rowid
database schema is locked: %s
unknown or unsupported join type: %T %T%s%T
RIGHT and FULL OUTER JOINs are not currently supported
a NATURAL join may not have an ON or USING clause
cannot have both ON and USING clauses in the same join
cannot join using column %s - column not present in both tables
USE TEMP B-TREE FOR %s
COMPOUND SUBQUERIES %d AND %d %s(%s)
%s.%s
%s:%d
ORDER BY clause should come after %s not before
LIMIT clause should come after %s not before
SELECTs to the left and right of %s do not have the same number of result columns
no such index: %s
sqlite_subquery_%p_
too many references to "%s": max 65535
%s.%s.%s
no such table: %s
SCAN TABLE %s %s%s(~%d rows)
sqlite3_get_table() called with two or more incompatible queries
cannot create %s trigger on view: %S
cannot create INSTEAD OF trigger on table: %S
INSERT INTO %Q.%s VALUES('trigger',%Q,%Q,0,'CREATE TRIGGER %q')no such trigger: %S
-- TRIGGER %s
no such column: %s
cannot VACUUM - SQL statements in progress
PRAGMA vacuum_db.synchronous=OFF
SELECT 'CREATE TABLE vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE type='table' AND name!='sqlite_sequence' AND rootpage>0
SELECT 'CREATE INDEX vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE sql LIKE 'CREATE INDEX %'
SELECT 'CREATE UNIQUE INDEX vacuum_db.' || substr(sql,21) FROM sqlite_master WHERE sql LIKE 'CREATE UNIQUE INDEX %'
SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
INSERT INTO vacuum_db.sqlite_master SELECT type, name, tbl_name, rootpage, sql FROM main.sqlite_master WHERE type='view' OR type='trigger' OR (type='table' AND rootpage=0)
UPDATE %Q.%s SET type='table', name=%Q, tbl_name=%Q, rootpage=0, sql=%Q WHERE rowid=#%d
vtable constructor failed: %s
vtable constructor did not declare schema: %s
no such module: %s
table %s: xBestIndex returned an invalid plan
%s SUBQUERY %d
%s TABLE %s
%s AS %s
%s USING %s%sINDEX%s%s%s
%s USING INTEGER PRIMARY KEY
%s (rowid=?)
%s (rowid>? AND rowid<?)
%s (rowid>?)
%s (rowid<?)
%s VIRTUAL TABLE INDEX %d:%s
%s (~%lld rows)
at most %d tables in a join
cannot use index: %s
the INDEXED BY clause is not allowed on UPDATE or DELETE statements within triggers
the NOT INDEXED clause is not allowed on UPDATE or DELETE statements within triggers
SQL logic error or missing database
unknown operation
large file support is disabled
unknown database: %s
no such %s mode: %s
%s mode not allowed: %s
no such vfs: %s
database corruption at line %d of [%.10s]
misuse at line %d of [%.10s]
cannot open file at line %d of [%.10s]
.?AVCWebPage@@
zcÁ
{A0386B19-B7E7-4BE7-B567-ABF77CBB6E60} = s `ATLExeServer'`ATLExeServer.EXE'
val AppID = s {A0386B19-B7E7-4BE7-B567-ABF77CBB6E60}ForceRemove {FA20B59B-21AA-44FC-8A68-450979B7CC90} = s 'CBrowserExternals Class'val ServerExecutable = s '%MODULE_RAW%'
TypeLib = s '{03771AEF-400D-4A13-B712-25878EC4A3F5}'ForceRemove {622D38AD-B4A9-4170-8192-5B865C6A5DCE} = s 'CBrowserExternalImp Class'ForceRemove {6D4506CE-F855-4657-AA38-DB6B1F733982} = s 'CBrowserExternal Class'stdole2.tlbWWW
~cmdWd
OpenUrlW
urlWd
method OpenUrl
Created by MIDL version 7.00.0555 at Thu Mar 13 16:11:05 2014
<BUTTON onclick='window.external.OnClick(theBody, "red");'>Red</BUTTON>
<BUTTON onclick='window.external.OnClick(theBody, "green");'>Green</BUTTON>
<BUTTON onclick='window.external.OnClick(theBody, "blue");'>Blue</BUTTON>
<requestedExecutionLevel level="requireAdministrator" uiAccess="false"></requestedExecutionLevel>
6v7D7
4%4U4j4q4
3(343$6 6$7(7,7074787<7
1 1$1(1,1014181<1
6$6(6,6064686<6@6
7(7/74787<7]7
7&8,8084888
0 0$0(0,0
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_PERFORMANCE_DATA
HKEY_DYN_DATA
HKEY_CURRENT_CONFIG
WAdvapi32.dll
SERVER_URL
EXE_URL
EXE_CMDLINE
THANKYOU_URL
exeurl
execmdline
Exception opening/reading chrome cookies
Exception opening/reading opera cookies
a\Microsoft\Windows\Cookies
a\Mozilla\Firefox\Profiles
\Mozilla\Firefox\Profiles
sqlite
cookies.sqlite
Chrome_WidgetWin_1
a\Opera\Opera\
\..\Local\Google\Chrome\User Data\Default\
\..\Local Settings\Application Data\Google\Chrome\User Data\Default\
cookies4.dat
SELECT value,last_access_utc FROM cookies WHERE host_key LIKE '%
Found cookie in Chrome!
\..\..\Local Settings\Application Data\Opera\Opera\
Found cookie in Opera!
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/535.19 (KHTML, like Gecko) Chrome/18.0.1025.142 Safari/535.19
OLEACC.DLL
places.sqlite
SELECT url FROM moz_places WHERE url LIKE '%
Found history in Chrome!
SELECT urls.url FROM urls WHERE urls.url LIKE '%
\PreExe_ID_
\default.html
CHROMEVERSION
&chromev=
SOFTWARE\Microsoft\.NETFramework\policy
firefox
chrome
opera
FirefoxHTML
IE.AssocFile.HTM
Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\UserChoice
ChromeHTML
Opera.HTML
http\shell\open\command
Opera.exe
Safari.exe
\PostCheck.exe
SOFTWARE\Mozilla\Mozilla FireFox
Software\Mozilla\Mozilla FireFox
SOFTWARE\Google\Update\Clients\{8A69D345-D564-463c-AFF1-A69D9E530F96}Software\Mozilla\Mozilla Firefox
*.txt
@@exeurl
OfferURL
ExeURL
RegKey
ReportName
PreExe
PostExe
RegKey64
AntivirusesRegKeys
RegKey32
Mscoree.dll
OLEAUT32.DLL
{A33DE4AA-9646-4E33-9E44-E472C6312E2F}888816666554443
6666554443
!6666554443
VirtualOfferCmd:
VirtualOfferCmd
/REPORTURL=
\obhhelper.txt
user32.dll
mscoree.dll
SKERNEL32.DLL
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
MSPDB100.DLL
ADVAPI32.DLL
WUSER32.DLL
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\DM1392851198.exe
{8856F961-340A-11D0-A96B-00C04FD705A2}2.0.0.1
setup.exe
dm.exe
2.0.1.1
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:2712
wmic.exe:2820 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings%\%current user%\Local Settings\Temp\DM1392851198.exe (148088 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsaB3.tmp\NSISdl.dll (14 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsaB3.tmp\Convert.dll (2630 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsaB3.tmp\Banner.dll (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\instructions.dat (85511 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\SZIS9VJF\button_over[1].png (921 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\SZIS9VJF\dc[1].js (23072 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OVYHJBCC\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OVYHJBCC\DynamicOfferScreen[1].txt (2083 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\1GGYBZUQ\button[1].png (458 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\1GGYBZUQ\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\SZIS9VJF\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\MSHist012014122220141223\index.dat (16 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\obhhelper.txt (238 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.