Trojan-Dropper.Win32.Vtimrun_84c35e628e

by malwarelabrobot on March 16th, 2016 in Malware Descriptions.

Trojan-PSW.Win32.MSNPassword.FD, TrojanDropperVtimrun.YR (Lavasoft MAS)
Behaviour: Trojan-Dropper, Trojan-PSW, Trojan


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: 84c35e628e053945431b83f5fe992124
SHA1: 8670517073607565b9008e394956d7da8757908a
SHA256: 2756dfc7e7066fbc9af125f8cfa61bcf5442b1783ebdf09e416a7faacf6e1c15
SSDeep: 12288:oubtP/am7FwnDxZjSWxYSJgEJ83NuxIUr s9FT1xQinF ShBItHTezHvOBSvh:og3mDvjBxYg63ifFhnIShBIkzH20
Size: 680960 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2004-08-04 09:01:37
Analyzed on: WindowsXP SP3 32-bit


Summary:

Trojan-Dropper. Trojan program, intended for stealth installation of other malware into user's system.

Payload

No specific payload has been found.

Process activity

The Trojan-Dropper creates the following process(es):

dwwin.exe:772
%original file name%.exe:1380

The Trojan-Dropper injects its code into the following process(es):

M.exe:1744

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process dwwin.exe:772 makes changes in the file system.
The Trojan-Dropper creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\123EE6.dmp (68836 bytes)

The process %original file name%.exe:1380 makes changes in the file system.
The Trojan-Dropper creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\M.ex_ (7168 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\M.exe (13968 bytes)

The process M.exe:1744 makes changes in the file system.
The Trojan-Dropper creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Application Data\CSIDL_X (2105 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\3c51_appcompat.txt (1763 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\CSIDL_ (2105 bytes)

Registry activity

The process dwwin.exe:772 makes changes in the system registry.
The Trojan-Dropper creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B4 E2 74 96 B7 34 25 28 32 0A CA BA DA 03 F2 CA"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"

[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 28 00 00 00 01 00 00 00 00 00 00 00"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"

Proxy settings are disabled:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"

The Trojan-Dropper deletes the following value(s) in system registry:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"

The process %original file name%.exe:1380 makes changes in the system registry.
The Trojan-Dropper creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6C 3D A5 9F FB 13 3B F3 1B B5 07 37 44 07 4F 67"

To automatically run itself each time Windows is booted, the Trojan-Dropper adds the following link to its file to the system registry autorun key:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"wextract_cleanup0" = "rundll32.exe %System%\advpack.dll,DelNodeRunDLL32 C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\IXP000.TMP\"

The process M.exe:1744 makes changes in the system registry.
The Trojan-Dropper creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EB 37 70 4C 4F DD E3 F0 0E 67 5B CF 9B 40 D2 86"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Startup" = "%Documents and Settings%\%current user%\Start Menu\Programs\Startup"
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"

The Trojan-Dropper deletes the following registry key(s):

[HKLM\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW]

The Trojan-Dropper deletes the following value(s) in system registry:

[HKLM\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW]
"DWFileTreeRoot"

Dropped PE files

MD5 File path
ef45336ee2e49349b706d339777f2372 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\M.exe

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

VersionInfo

Company Name: Microsoft Corporation
Product Name: HD Player
Product Version: 6.00.2900.2180
Legal Copyright: (c) Microsoft Corporation. All rights reserved.
Legal Trademarks:
Original Filename: WEXTRACT.EXE
Internal Name: Wextract
File Version: 6.00.2900.2180 (xpsp_sp2_rtm.040803-2158)
File Description: Win32 Cabinet Self-Extractor
Comments:
Language: English (United States)

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 4096 39212 39424 4.55052 17a6fbe18a834b6f3462304415675d36
.data 45056 7140 1024 2.94449 99858e86526942a66950c7139f78a725
.rsrc 53248 643072 639488 5.52263 89dc08aedb61e3c976b94f465e799ca7

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

No activity has been detected.

IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

Traffic

Web Traffic was not found.

The Trojan-Dropper connects to the servers at the folowing location(s):

%original file name%.exe_1380:

.text
`.data
.rsrc
ADVAPI32.dll
KERNEL32.dll
NTDLL.DLL
GDI32.dll
USER32.dll
COMCTL32.dll
VERSION.dll
advapi32.dll
advpack.dll
wininit.ini
Software\Microsoft\Windows\CurrentVersion\App Paths
setupapi.dll
setupx.dll
IXPd.TMP
TMP4351$.TMP
FINISHMSG
USRQCMD
ADMQCMD
msdownld.tmp
wextract.pdb
PSSSSSSh
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegQueryInfoKeyA
GetWindowsDirectoryA
ExitWindowsEx
MsgWaitForMultipleObjects
rundll32.exe %s,InstallHinfSection %s 128 %s
SHELL32.DLL
Software\Microsoft\Windows\CurrentVersion\RunOnce
PendingFileRenameOperations
System\CurrentControlSet\Control\Session Manager\FileRenameOperations
wextract_cleanup%d
%s /D:%s
rundll32.exe %sadvpack.dll,DelNodeRunDLL32 "%s"
Command.com /c %s
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\IXP000.TMP\
33333330
3333333
33333333
M.exe
M.ex_
eJ.Ir"
y\%c.od|
.ezFHc
%x;:u
t%soe
.Vt2D
:;L44V$.cw
"QaB2%sq
.Xn\T_8
hú)
7wy%Uu
&*&*&*&*&*
$'R%f
.ojkw
ox.Lt
.cJ\2
-cR.kT
YiS.kI4s
18.sC
$7.ja
B:\3WJ
)L5%d
.nN:G
K]{.pG
, .BM
M_Y%fZ{
M%X< 
ZR]%c
OrPZ.Xy
g.Xos
-HQ}u
7i%2u
}.DIj
nD>9.yj
,$%FM
<Rt.Ox
.Dlz(
.bG`?
b88g%S
uw.vvT 
Ua%d%(
JsQl
I.tiRG
Please read the following license agreement. Press the PAGE DOWN key to see the rest of the agreement.
CFailed to get disk space information from: %s.
System Message: %s.&A required resource cannot be located. Are you sure you want to cancel?
8Unable to retrieve operating system version information.!Memory allocation request failed.
Filetable full.Ên not change to destination folder.
Setup could not find a drive with %s KB free disk space to install the program. Please free up some space first and press RETRY or press CANCEL to exit setup.KThat folder is invalid. Please make sure the folder exists and is writable.IYou must specify a folder with fully qualified pathname or choose Cancel.!Could not update folder edit box.5Could not load functions required for browser dialog.7Could not load Shell32.dll required for browser dialog.
(Error creating process <%s>. Reason: %s1The cluster size in this system is not supported.,A required resource appears to be corrupted.QWindows 95 or Windows NT 4.0 Beta 2 or greater is required for this installation.
Error loading %shGetProcAddress() failed on function '%s'. Possible reason: incorrect version of advpack.dll being used./Windows 95 or Windows NT is required to install
Could not create folder '%s'
To install this program, you need %s KB disk space on drive %s. It is recommended that you free up the required disk space before you continue.
Error retrieving Windows folder
$NT Shutdown: OpenProcessToken error.)NT Shutdown: AdjustTokenPrivileges error.!NT Shutdown: ExitWindowsEx error.}Extracting file failed. It is most likely caused by low memory (low disk space for swapping file) or corrupted Cabinet file.aThe setup program could not retrieve the volume information for drive (%s) .
System message: %s.xSetup could not find a drive with %s KB free disk space to install the program. Please free up some space and try again.eThe installation program appears to be damaged or corrupted. Contact the vendor of this application.
/C:<Cmd> -- Override Install Command defined by author.
eAnother copy of the '%s' package is already running on your system. Do you want to run another copy?
Could not find the file: %s.
:The folder '%s' does not exist. Do you want to create it?hAnother copy of the '%s' package is already running on your system. You can only run one copy at a time.OThe '%s' package is not compatible with the version of Windows you are running.SThe '%s' package is not compatible with the version of the file: %s on your system.
6.00.2900.2180 (xpsp_sp2_rtm.040803-2158)
WEXTRACT.EXE
Windows
Operating System
6.00.2900.2180

M.exe_1744:

.text
`.rdata
@.data
.idata
.rsrc
@.reloc
>%uQf
.tTPV
FTPjK
FtPj;
F.PjRWj
u.WWj
u.VVj
u$SShe
?%uMf
@u.Wj
ODBC32.DLL
COMCTL32.DLL
CCmdTarget
CHotKeyCtrl
CNotSupportedException
GDI32.DLL
CTL3D32.DLL
__MSVCRT_HEAP_SELECT
user32.dll
portuguese-brazilian
.PAVCObject@@
.PAVCException@@
.PAVCDBException@@
.?AVCCmdTarget@@
.?AVCCmdUI@@
.?AVCTestCmdUI@@
.PAVCUserException@@
.?AVCHotKeyCtrl@@
.PAVCOleDispatchException@@
.PAVCSimpleException@@
.PAVCMemoryException@@
.PAVCNotSupportedException@@
.?AVCNotSupportedException@@
.PAVCResourceException@@
.PAVCOleException@@
.PAVCFileException@@
.PAVCArchiveException@@
zcÁ
windows
KERNEL32.DLL
GetCPInfo
KERNEL32.dll
CreateDialogIndirectParamW
UnhookWindowsHookEx
SetWindowsHookExW
GetKeyState
USER32.dll
GetViewportOrgEx
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
GetViewportExtEx
GDI32.dll
comdlg32.dll
WINSPOOL.DRV
RegCloseKey
RegEnumKeyW
RegOpenKeyW
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyExW
RegCreateKeyW
ADVAPI32.dll
SHELL32.dll
COMCTL32.dll
oledlg.dll
ole32.dll
OLEPRO32.DLL
OLEAUT32.dll
ODBC32.dll
SetWindowsHookExA
>*?1?7?@?
7#73797}7#8
0)03090|0
4%4/4]4~4
=$>6>\>{>
3(383`3|3
5-5A5U5i5}5
7 7$7(7,7074787<7@7
>$>,>4><>`>|>
JOIN
commctrl_DragListMsg
DAfx:%x:%x:%x:%x:%x
Afx:%x:%x
Dmsctls_hotkey32
MSWHEEL_ROLLMSG
File%d
D%*.*f
Dd
ddeexec
%s\ShellNew
%s\DefaultIcon
%s\shell\printto\%s
%s\shell\print\%s
%s\shell\open\%s
{X-X-X-XX-XXXXXX}
MSH_SCROLL_LINES_MSG
[user_password]
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\IXP000.TMP\M.exe
{43478D73-78E0-11CF-8E78-00A0D100038E}
{00028C00-0000-0000-0000-000000000046}
43478d75-78e0-11cf-8e78-00a0d100038e
select view1.student_no as
where view1.student_no=student.student_no order by
select course.course_name as
where course.course_no=score.course_no
GROUP BY course.course_name
(*.*)
Output.prn$
(*.prn)|*.prn|
(*.*)|*.*||
ODBC32.DLL
(API_CONFORMANCE >= SQL_OAC_LEVEL1
(API_CONFORMANCE >= SQL_OAC_MINIMUM

M.exe_1744_rwx_00C40000_00EB6000:

.text
`.rdata
@.data
.idata
.rsrc
@.reloc
>%uQf
.tTPV
FTPjK
FtPj;
F.PjRWj
u.WWj
u.VVj
u$SShe
?%uMf
@u.Wj
ODBC32.DLL
COMCTL32.DLL
CCmdTarget
CHotKeyCtrl
CNotSupportedException
GDI32.DLL
CTL3D32.DLL
__MSVCRT_HEAP_SELECT
user32.dll
portuguese-brazilian
.PAVCObject@@
.PAVCException@@
.PAVCDBException@@
.?AVCCmdTarget@@
.?AVCCmdUI@@
.?AVCTestCmdUI@@
.PAVCUserException@@
.?AVCHotKeyCtrl@@
.PAVCOleDispatchException@@
.PAVCSimpleException@@
.PAVCMemoryException@@
.PAVCNotSupportedException@@
.?AVCNotSupportedException@@
.PAVCResourceException@@
.PAVCOleException@@
.PAVCFileException@@
.PAVCArchiveException@@
zcÁ
windows
KERNEL32.DLL
GetCPInfo
KERNEL32.dll
CreateDialogIndirectParamW
UnhookWindowsHookEx
SetWindowsHookExW
GetKeyState
USER32.dll
GetViewportOrgEx
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
GetViewportExtEx
GDI32.dll
comdlg32.dll
WINSPOOL.DRV
RegCloseKey
RegEnumKeyW
RegOpenKeyW
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyExW
RegCreateKeyW
ADVAPI32.dll
SHELL32.dll
COMCTL32.dll
oledlg.dll
ole32.dll
OLEPRO32.DLL
OLEAUT32.dll
ODBC32.dll
SetWindowsHookExA
>*?1?7?@?
7#73797}7#8
0)03090|0
4%4/4]4~4
=$>6>\>{>
3(383`3|3
5-5A5U5i5}5
7 7$7(7,7074787<7@7
>$>,>4><>`>|>
NM{>tCp0l
Vk.jQ
e.Ds7Z
.dHaXB
jQr'%U=N
.XWL%
y'.Fxm
, .BM
M_Y%fZ{
M%X< 
ZR]%c
OrPZ.Xy
g.Xos
-HQ}u
7i%2u
}.DIj
nD>9.yj
,$%FM
<Rt.Ox
.Dlz(
.bG`?
b88g%S
uw.vvT 
Ua%d%(
JsQl
I.tiRG
JOIN
commctrl_DragListMsg
DAfx:%x:%x:%x:%x:%x
Afx:%x:%x
Dmsctls_hotkey32
MSWHEEL_ROLLMSG
File%d
D%*.*f
Dd
ddeexec
%s\ShellNew
%s\DefaultIcon
%s\shell\printto\%s
%s\shell\print\%s
%s\shell\open\%s
{X-X-X-XX-XXXXXX}
MSH_SCROLL_LINES_MSG
[user_password]
{43478D73-78E0-11CF-8E78-00A0D100038E}
{00028C00-0000-0000-0000-000000000046}
43478d75-78e0-11cf-8e78-00a0d100038e
select view1.student_no as
where view1.student_no=student.student_no order by
select course.course_name as
where course.course_no=score.course_no
GROUP BY course.course_name
(*.*)
Output.prn$
(*.prn)|*.prn|
(*.*)|*.*||
ODBC32.DLL
(API_CONFORMANCE >= SQL_OAC_LEVEL1
(API_CONFORMANCE >= SQL_OAC_MINIMUM

M.exe_1744_rwx_01B00000_00005000:

PSSSSSSh

M.exe_1744_rwx_01B10000_00179000:

.text
`.rdata
@.data
.idata
.rsrc
@.reloc
>%uQf
.tTPV
FTPjK
FtPj;
F.PjRWj
u.WWj
u.VVj
u$SShe
?%uMf
@u.Wj
ODBC32.DLL
COMCTL32.DLL
CCmdTarget
CHotKeyCtrl
CNotSupportedException
GDI32.DLL
CTL3D32.DLL
__MSVCRT_HEAP_SELECT
user32.dll
portuguese-brazilian
.PAVCObject@@
.PAVCException@@
.PAVCDBException@@
.?AVCCmdTarget@@
.?AVCCmdUI@@
.?AVCTestCmdUI@@
.PAVCUserException@@
.?AVCHotKeyCtrl@@
.PAVCOleDispatchException@@
.PAVCSimpleException@@
.PAVCMemoryException@@
.PAVCNotSupportedException@@
.?AVCNotSupportedException@@
.PAVCResourceException@@
.PAVCOleException@@
.PAVCFileException@@
.PAVCArchiveException@@
zcÁ
windows
KERNEL32.DLL
GetCPInfo
KERNEL32.dll
CreateDialogIndirectParamW
UnhookWindowsHookEx
SetWindowsHookExW
GetKeyState
USER32.dll
GetViewportOrgEx
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
GetViewportExtEx
GDI32.dll
comdlg32.dll
WINSPOOL.DRV
RegCloseKey
RegEnumKeyW
RegOpenKeyW
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyExW
RegCreateKeyW
ADVAPI32.dll
SHELL32.dll
COMCTL32.dll
oledlg.dll
ole32.dll
OLEPRO32.DLL
OLEAUT32.dll
ODBC32.dll
SetWindowsHookExA
>*?1?7?@?
7#73797}7#8
0)03090|0
4%4/4]4~4
=$>6>\>{>
3(383`3|3
5-5A5U5i5}5
7 7$7(7,7074787<7@7
>$>,>4><>`>|>
NM{>tCp0l
Vk.jQ
e.Ds7Z
.dHaXB
jQr'%U=N
.XWL%
y'.Fxm
, .BM
M_Y%fZ{
M%X< 
ZR]%c
OrPZ.Xy
g.Xos
-HQ}u
7i%2u
}.DIj
nD>9.yj
,$%FM
<Rt.Ox
.Dlz(
.bG`?
b88g%S
uw.vvT 
Ua%d%(
JsQl
I.tiRG
JOIN
commctrl_DragListMsg
DAfx:%x:%x:%x:%x:%x
Afx:%x:%x
Dmsctls_hotkey32
MSWHEEL_ROLLMSG
File%d
D%*.*f
Dd
ddeexec
%s\ShellNew
%s\DefaultIcon
%s\shell\printto\%s
%s\shell\print\%s
%s\shell\open\%s
{X-X-X-XX-XXXXXX}
MSH_SCROLL_LINES_MSG
[user_password]
{43478D73-78E0-11CF-8E78-00A0D100038E}
{00028C00-0000-0000-0000-000000000046}
43478d75-78e0-11cf-8e78-00a0d100038e
select view1.student_no as
where view1.student_no=student.student_no order by
select course.course_name as
where course.course_no=score.course_no
GROUP BY course.course_name
(*.*)
Output.prn$
(*.prn)|*.prn|
(*.*)|*.*||
ODBC32.DLL
(API_CONFORMANCE >= SQL_OAC_LEVEL1
(API_CONFORMANCE >= SQL_OAC_MINIMUM

M.exe_1744_rwx_01C90000_00057000:

.rsrc
l. -C};P
He.uH@
\.pL.
s{kernel32.dll
Windows
H_#SUPPORT_(_.SC3*
b-.tP-
Keyw
pNb%Uv
R6!.fU
%s_%d
u.tq'F
.FDiag
ok].Susc
NnBuff.Pa
GWebSn
keysK<
KeywnLF
&G.uuD
Ut%X~
(qj%d
C4.oK
yK.ODH
QP.JC
-}?.KS
o#KCMDDC51#-
cmd.expfH&
?i.yKtb
UJ.ok
p-.te
.JhPCA
oURL
? tUrl_/)
T<-/HTTP://
.?http
7WEBdL
2.php/1.0
..WMlF
V.CUC
\.QQ2
)<.la
@.Gpto
B.VCXB.
h ..ik
CS-%u->x!
'@#32770
H.hp.
UrlM
KERNEL32.DLL
advapi32.dll
AVICAP32.DLL
comctl32.dll
gdi32.dll
gdiplus.dll
msacm32.dll
netapi32.dll
ntdll.dll
ole32.dll
oleaut32.dll
shell32.dll
SHFolder.dll
URLMON.DLL
user32.dll
version.dll
wininet.dll
winmm.dll
WS2_32.DLL
wsock32.dll
ShellExecuteA
URLDownloadToFileA
FtpPutFileA
;L.ll8
KEYKYY
!"#$%&'()* ,-./
GUfx.DL1
-B`.rd
SHELL32.dll
USER32.dll
.htm0
CUSER32.dll
@y/web
.ms-*nl
URLD
iphlpapi.dll
MFC42.DLL
MSVCRT.dll
OLEAUT32.dll
WININET.dll
WS2_32.dll
1, 0, 0, 1
MSRSAAP.EXE
4, 0, 0, 0


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    dwwin.exe:772
    %original file name%.exe:1380

  2. Delete the original Trojan-Dropper file.
  3. Delete or disinfect the following files created/modified by the Trojan-Dropper:

    %Documents and Settings%\%current user%\Local Settings\Temp\123EE6.dmp (68836 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\M.ex_ (7168 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\M.exe (13968 bytes)
    %Documents and Settings%\%current user%\Local Settings\Application Data\CSIDL_X (2105 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\3c51_appcompat.txt (1763 bytes)

  4. Delete the following value(s) in the autorun key (How to Work with System Registry):

    [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
    "wextract_cleanup0" = "rundll32.exe %System%\advpack.dll,DelNodeRunDLL32 C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\IXP000.TMP\"

  5. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now