Trojan-Dropper.Win32.Vtimrun_8f875bcb31

by malwarelabrobot on March 15th, 2016 in Malware Descriptions.

HEUR:Trojan.Win32.Generic (Kaspersky), Gen:Win32.Malware.QF3@ayjtfjdi (B) (Emsisoft), Trojan.NSIS.StartPage.FD, TrojanDropperVtimrun.YR (Lavasoft MAS)
Behaviour: Trojan-Dropper, Trojan, Malware


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: 8f875bcb31d5b3fc9dee70a0dfce59c3
SHA1: 235fbf14730e62155bf431f8200366da804e88a5
SHA256: 02ca480897a728aa3f638c6108211d55193a819e252e0d979a53c296c3831bdb
SSDeep: 98304:CxIfzqibuSfnNWjqWntLOO7NKiJTo71eYFvN:MIfOibuWWtLOOxTo71eYP
Size: 3843412 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2008-09-05 10:26:23
Analyzed on: WindowsXP SP3 32-bit


Summary:

Trojan-Dropper. Trojan program, intended for stealth installation of other malware into user's system.

Payload

No specific payload has been found.

Process activity

The Trojan-Dropper creates the following process(es):

%original file name%.exe:188
stdrt.exe:664
FL9_patch_UNiON.exe:340
patch.exe:2008

The Trojan-Dropper injects its code into the following process(es):
No processes have been created.

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process %original file name%.exe:188 makes changes in the file system.
The Trojan-Dropper creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\svchost.exe (3624 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\FL9_patch_UNiON.exe (55374 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hosts (1 bytes)

The Trojan-Dropper deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nsd1.tmp (0 bytes)

The process stdrt.exe:664 makes changes in the file system.
The Trojan-Dropper creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\desktop.ini (159 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\YBU1CZU3\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WPEJKBMN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\fl_status.dat (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\0TIVO3SB\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\YP4N652J\desktop.ini (67 bytes)

The process FL9_patch_UNiON.exe:340 makes changes in the file system.
The Trojan-Dropper creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\FLEngine.dll (84889 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\mmfs2.dll (6705 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\patch.exe (13088 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\FL.exe (15776 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\Sawer.dll (10343 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\Hardcore.dll (10786 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\FL.dll (7168 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\Toxic Biohazard.dll (12641 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\PoiZone.dll (9289 bytes)

The process patch.exe:2008 makes changes in the file system.
The Trojan-Dropper creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\KcBoxA.mfx (9476 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\stdrt.exe (46772 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\kclist.mfx (6532 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\mmfs2.dll (40388 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\kcfile.mfx (6532 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\KcActiveX.mfx (43108 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\Registry2.mfx (1924 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\kcedit.mfx (6532 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\Download.mfx (1444 bytes)

The Trojan-Dropper deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp (0 bytes)

Registry activity

The process %original file name%.exe:188 makes changes in the system registry.
The Trojan-Dropper creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "05 CE F9 F3 C6 B5 9D D4 B1 0C AD DE C7 34 BA 6A"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

The process stdrt.exe:664 makes changes in the system registry.
The Trojan-Dropper creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"

"Cookies" = "%Documents and Settings%\%current user%\Cookies"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"

[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1B 00 00 00 01 00 00 00 00 00 00 00"

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "4B 80 0A E7 93 CB A1 B0 CF 37 A7 8D 76 48 0F 30"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"

The Trojan-Dropper modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"

The Trojan-Dropper modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:

"ProxyBypass" = "1"

Proxy settings are disabled:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"

The Trojan-Dropper modifies IE settings for security zones to map all urls to the Intranet Zone:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"

The Trojan-Dropper deletes the following value(s) in system registry:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"

The process FL9_patch_UNiON.exe:340 makes changes in the system registry.
The Trojan-Dropper creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1C CF D8 FE 7A 84 97 00 0A 1C 88 AA 01 2F 6E 4B"

To automatically run itself each time Windows is booted, the Trojan-Dropper adds the following link to its file to the system registry autorun key:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"wextract_cleanup0" = "rundll32.exe %System%\advpack.dll,DelNodeRunDLL32 C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\IXP000.TMP\"

Dropped PE files

MD5 File path
d4b921e1ae3e2b285ce3a74c92fa8b24 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\FL9_patch_UNiON.exe
37117836d23f388e9d8427ac5fe4986e c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\FL.dll
df758990ec98677e67c013b9d7890e8d c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\FL.exe
8b1dc84868447b6bb781f9ee78e440f3 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\FLEngine.dll
1efcf6b820711d17e82c133850e5b379 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\Hardcore.dll
22eabff452a5180e5cdfa777ec612566 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\PoiZone.dll
5ffb8a721b9fccb6a7ca9c65fd47e0bc c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\Sawer.dll
13a931cb34aa86979a16dabe57ae1971 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\Toxic Biohazard.dll
72a83e6b9b192e297b0b3fba6d29188c c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\mmfs2.dll
a73cb78963be77cf2ae8e33dbaba509a c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\patch.exe
c14492929a9a11f826d240489cba93c9 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\Download.mfx
650b59991e7df2f8fa7604767feff498 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\KcActiveX.mfx
86e311d5a7db11ab859d8055b241c5d8 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\KcBoxA.mfx
68bfec6b83f19fc1f000b57ad889f577 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\Registry2.mfx
f05bd60dbbdd8f86cd37baad6f3126de c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\kcedit.mfx
dbf704f6879cf85a98b295ec48bbb1fc c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\kcfile.mfx
676e1c9d38f6bd2c1e3e6976d6f1a78e c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\kclist.mfx
d2af599f8c70626210eaa49effade314 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\mmfs2.dll
fadd1ba3bc472fb9a81a69b4974e4bad c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\stdrt.exe
14b848866035dea39b912da628307231 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsf3.tmp\NSISArray.dll
a5f8399a743ab7f9c88c645c35b1ebb5 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsf3.tmp\NSISdl.dll
d5889a5d5c2ddc54645a2838e83f957f c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\svchost.exe
9247535b33135fb573a16b17beba7282 c:\Program Files\Common Files\Microsoft Shared\Web Components\messenger.exe
9247535b33135fb573a16b17beba7282 c:\messenger.exe

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

VersionInfo

Company Name: UNiON
Product Name: FL 9
Product Version:
Legal Copyright: UNiON
Legal Trademarks:
Original Filename:
Internal Name:
File Version: 6.00.2900.5512
File Description: FL 9
Comments:
Language: English (United States)

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 4096 31140 31232 4.30089 c875551ff6ecdc825cf7b63896acc42d
.data 36864 140 512 0.790395 f6c0c35db6bf3b0337064d88bbab0f08
.rdata 40960 3360 3584 3.63194 3b7f59408b0d716f6c11404fd61d0683
.bss 45056 154264 0 0 d41d8cd98f00b204e9800998ecf8427e
.idata 200704 5088 5120 3.61674 ad2ab3a5fdc0478cbb8c266d4b0734bb
.ndata 208896 36864 1024 0 0f343b0931126a20f133d67c2b018a3b
.rsrc 245760 16736 16896 0.903634 3f65269c16564ea47e77cb4e8781b63e

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

URL IP
hxxp://tuff-kid.com/fl_status.dat
hxxp://www.tuff-kid.com/fl_status.dat 162.253.226.8


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

Traffic

GET /fl_status.dat HTTP/1.1
User-Agent: FL Patch
Host: VVV.tuff-kid.com


HTTP/1.1 200 OK
Server: nginx/1.8.1
Date: Mon, 14 Mar 2016 00:32:41 GMT
Content-Type: application/octet-stream
Content-Length: 2
Last-Modified: Tue, 05 Jun 2012 20:37:19 GMT
Connection: keep-alive
ETag: "4fce6dff-2"
Accept-Ranges: bytes
noHTTP/1.1 200 OK..Server: nginx/1.8.1..Date: Mon, 14 Mar 2016 00:32:4
1 GMT..Content-Type: application/octet-stream..Content-Length: 2..Last
-Modified: Tue, 05 Jun 2012 20:37:19 GMT..Connection: keep-alive..ETag
: "4fce6dff-2"..Accept-Ranges: bytes..no..


The Trojan-Dropper connects to the servers at the folowing location(s):

%original file name%.exe_188:

.text
0`.data
.rdata
[email protected]
.idata
.ndata
.rsrc
tCPPj
XZSSh@
... %d%%
hXXp://nsis.sf.net/NSIS_Error
verifying installer: %d%%
~nsu.tmp
%u.%u%s%s
.DEFAULT\Control Panel\International
*?|<>/":
%s=%s
Software\Microsoft\Windows\CurrentVersion
RegDeleteKeyExA
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\FL9_patch_UNiON.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp
FL9_patch_UNiON.exe
"patch.exe"
LvC%f<
,.Wo 
%FT_J
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyExA
GetWindowsDirectoryA
SHFileOperationA
ShellExecuteA
ExitWindowsEx
ADVAPI32.DLL
COMCTL32.DLL
GDI32.dll
KERNEL32.dll
OLE32.dll
SHELL32.DLL
USER32.dll
VERSION.dll
c:\%original file name%.exe
%original file name%.exe
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsd1.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
33333330
3333333
33333333
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.37-3</description><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*" /></dependentAssembly></dependency></assembly>
6.00.2900.5512 (xpsp.080413-2105)
WEXTRACT.EXE
Windows
Operating System
6.00.2900.5512
04090000

svchost.exe_644:

.text
`.rdata
@.data
.ndata
.rsrc
uDSSh
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
GetWindowsDirectoryA
KERNEL32.dll
ExitWindowsEx
USER32.dll
GDI32.dll
SHFileOperationA
ShellExecuteA
SHELL32.dll
RegEnumKeyA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
ADVAPI32.dll
COMCTL32.dll
ole32.dll
VERSION.dll
verifying installer: %d%%
hXXp://nsis.sf.net/NSIS_Error
... %d%%
~nsu.tmp
%u.%u%s%s
RegDeleteKeyExA
%s=%s
*?|<>/":
~1\"%CurrentUserName%"\LOCALS~1\Temp\nsf3.tmp\NSISdl.dll
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsf3.tmp\NSISdl.dll
ALS~1\Temp\nsf3.tmp
ared\Web Components\messenger.exe
\nsf3.tmp\NSISdl.dll
.reloc
WS2_32.dll
NSISdl.dll
invalid URL
Host: %s
GET %s HTTP/1.0
User-Agent: NSISDL/1.2 (Mozilla)
http=
Software\Microsoft\Windows\CurrentVersion\Internet Settings
Unable to open %s
%skB (%d%%) of %skB at %u.ukB/s
(%u hours remaining)
(%u minutes remaining)
(%u seconds remaining)
Downloading %s
%s: %s
NSISArray %s: %s
Join
Indexes used:
%i - %s
Array #%i: %s
NSISArray.dll
%STCD
.vN {
({,{<{*;
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.46</description><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*" /></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="requireAdministrator" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/></application></compatibility></assembly>
{ T4xAi%f
g<%d]6
SF.ES
%fH9y
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsf3.tmp
nsf3.tmp
ESSEN~1.EXE
mponents\messenger.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\apple_setup.ini
cfg/crypt1.php?id=20081
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.exe
%Program Files%\temp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp
svchost.exe
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsk2.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
%Program Files%\Common Files\Microsoft Shared\Web Components
6.4.6
6.3.7

FL9_patch_UNiON.exe_340:

.text
`.data
.rsrc
ADVAPI32.dll
KERNEL32.dll
NTDLL.DLL
GDI32.dll
USER32.dll
COMCTL32.dll
VERSION.dll
advapi32.dll
advpack.dll
wininit.ini
Software\Microsoft\Windows\CurrentVersion\App Paths
setupapi.dll
setupx.dll
IXPd.TMP
TMP4351$.TMP
FINISHMSG
USRQCMD
ADMQCMD
msdownld.tmp
wextract.pdb
PSSSSSSh
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegQueryInfoKeyA
GetWindowsDirectoryA
ExitWindowsEx
MsgWaitForMultipleObjects
rundll32.exe %s,InstallHinfSection %s 128 %s
SHELL32.DLL
Software\Microsoft\Windows\CurrentVersion\RunOnce
PendingFileRenameOperations
System\CurrentControlSet\Control\Session Manager\FileRenameOperations
wextract_cleanup%d
%s /D:%s
rundll32.exe %sadvpack.dll,DelNodeRunDLL32 "%s"
Command.com /c %s
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\IXP000.TMP\
33333330
3333333
33333333
FL.dll
FL.exe
FLEngine.dll
Hardcore.dll
mmfs2.dll
patch.exe
PoiZone.dll
Sawer.dll
Toxic Biohazard.dll
,v.amA
jn.kS
!Nz~.Is^
|.fqh5
*.Gd'
$$%D%
VPe.VQ"/
.QM"Gn*
`F%8S
A.ptv
.gsW]q
Za.bx
OG.ID
*>%drW"
%fzSs
.AH2 
N[.QO
Ivh|%UK"
.zoz9!.N
G\_%U
Fxm%c*
y:fÆ
9/u.uY'
.nDt37
11A.du
[7%x 
(.jkg!
C.Em=k
.LtpJd'
s.jq~
<QiO%x
8D'%C
 W.YTe
lC/.IV
PxK#3.nd
.H8%u
$}W.Ko`
t.RKQ
Z;.Jf
#%dV)
qT.im
.oS'v
k.tzuA
TK.QT
%u}-v
KcActiveX.mfx'b~&=a
p0o%s
.aA-XP
].TSskw,
.De )0
7.yEi
H.qU'
%s[\ll
Qh_ûA
V.gr^
%x( k}
&$.jP
P.}%S
%f"~'>
h`.ey
'I.hQ
.aX\N
,D.mF~s
L6.Xu
'-J=w.iS
0{.SfB$
@#$= 5$%S@
PPD%F
e?Equdp>^
\.Pz(
GF`%dz
t.ysB
rgF%c
p,@%U2<DP
3[%Sm
T.CX?P
'G.JeizR
0.yiZ
.xj/B
".DqAE
Ohe%U
zxt%X0
3.tO3
nI..DIs
-5}og`)E4!|P
.sN=t
)O.EZ
jw.OD
@.VOVr
~"%c\~
d&.DX
<WÒ_y
%ssDy}xlt
5 xV.tZ
ek.POW
esEs%sJq
%SpNX.
P %UJ
.EZvw
0.PMq
q.lL*k
Q.wz(\
O%X{=
hUw%s
A%x3x
urLQ
WeBv
?.ag)
)6d%f
ƒx0
().TqP :9Wq
.YQRodU#r0
.TQp*x
.zRxQ
%X;@Y
=%1Xyu
z%x?@=R
..kM64
?y>.ry
.UXue
2".IQK
fRj%SJ
Hy1%F
$)%S]
..wC0
A%f.KS
r.qJ!
%uB $
F:\ \n
.Dt49
{[I~%c
[.Pyt
PM.dyj
3p]~%X
i.zOe)9n
ZR.aa
t%d^\
.hX`*e
H_%c{;
%~).Cd
-XwEB
q.Dm7
pxexeV`3R
wNTD.HH
Z.Zq1
%DRw>
-Ul}*
'Z.OHiZ
pp.Lt
9?À
dU%uC
'.QJP
 M.dlS(-
R&ú
`kEYC
n7M%S
p,UrLt
.eYqN
M8.qx
#Ü%%
?(?,?0?4?8?<?
2.ev2
;A.Xf
%4jc.mD
;%fx:
KmX%S,
}.If"g
LLS.LU
$"9%9s!}Tw;%W
c%u4T
J.bk"
{%u/:p
"!.qzt
%frVI
i.WLW
.H.fW
q.Sz6
jeU%x
.khkB
*$%fi
t.Nbt
<cH7q.on
.vk&4u}s
Sfg%U
.Cp#_
ej.Co
|%Us2
%ukJ`~
Qk.ivOl
h:\Y>
Ioz.MGt
>%f},_
->1]|
T02-%c
fx.Im
 .ij)
.BS$wh
.XI_|
iMf.Bng
V P.hg
9z.Hs
(uc%f
}8z.zo,
>L.Ky
C>!]%F
mcrt
>.Tl;
Jf^.Jr.#
H..ZOUx99
:KeY6
|4;|#[:'#
:*:*:*:*
:*:*:*;*
ie%D=
'S%uq
V`%uW
.MEsJI
.O.LD
KSfsy%3U
\S%fI
*l.EZ
A-l.ue
-%Sfj
g%X_:
.Xq$/
.nXb[]
g%sl|
\Q%XZ
%C@>C
i.DMG%
t('b%U
46%ST
$q#À
t.tCyCc
cMdM
L^%FXq I
[%c"?
%xa^>_<
`.DeUR
=.qu}.
CY.Ld19
3&.PC<
m%FX0
b.KuK
kclist.mfx
w.PvSaUhS
0jhm.bm/
~MQYq.UA
f.Pf*"
p%S,L
!#j.NlN
%U@eq
%dU@%g
.mLzlW
>%UL-
;.DtC
e9.JqO
.lr!tx
%x#3%lL
.ZtHR
(8.fx
3F[inH.Bn
%ur/X
Zrx.HH
   #i%dl$R
.yhIT
c=*.YM
P%UBWR
G[
7A.io
y].pW
9q~].hrl
i5.ho
.TjIg
.EX&"
Dd6ß
LvC%f<
,.Wo 
%FT_J
"patch.exe"
Please read the following license agreement. Press the PAGE DOWN key to see the rest of the agreement.
CFailed to get disk space information from: %s.
System Message: %s.&A required resource cannot be located. Are you sure you want to cancel?
8Unable to retrieve operating system version information.!Memory allocation request failed.
Filetable full.Ên not change to destination folder.
Setup could not find a drive with %s KB free disk space to install the program. Please free up some space first and press RETRY or press CANCEL to exit setup.KThat folder is invalid. Please make sure the folder exists and is writable.IYou must specify a folder with fully qualified pathname or choose Cancel.!Could not update folder edit box.5Could not load functions required for browser dialog.7Could not load Shell32.dll required for browser dialog.
(Error creating process <%s>. Reason: %s1The cluster size in this system is not supported.,A required resource appears to be corrupted.QWindows 95 or Windows NT 4.0 Beta 2 or greater is required for this installation.
Error loading %shGetProcAddress() failed on function '%s'. Possible reason: incorrect version of advpack.dll being used./Windows 95 or Windows NT is required to install
Could not create folder '%s'
To install this program, you need %s KB disk space on drive %s. It is recommended that you free up the required disk space before you continue.
Error retrieving Windows folder
$NT Shutdown: OpenProcessToken error.)NT Shutdown: AdjustTokenPrivileges error.!NT Shutdown: ExitWindowsEx error.}Extracting file failed. It is most likely caused by low memory (low disk space for swapping file) or corrupted Cabinet file.aThe setup program could not retrieve the volume information for drive (%s) .
System message: %s.xSetup could not find a drive with %s KB free disk space to install the program. Please free up some space and try again.eThe installation program appears to be damaged or corrupted. Contact the vendor of this application.
/C:<Cmd> -- Override Install Command defined by author.
eAnother copy of the '%s' package is already running on your system. Do you want to run another copy?
Could not find the file: %s.
:The folder '%s' does not exist. Do you want to create it?hAnother copy of the '%s' package is already running on your system. You can only run one copy at a time.OThe '%s' package is not compatible with the version of Windows you are running.SThe '%s' package is not compatible with the version of the file: %s on your system.
6.00.2900.5512 (xpsp.080413-2105)
WEXTRACT.EXE
Windows
Operating System
6.00.2900.5512

patch.exe_2008:

.text
`.rdata
@.data
.rsrc
inflate 1.1.3 Copyright 1995-1998 Mark Adler
__MSVCRT_HEAP_SELECT
user32.dll
KERNEL32.dll
MsgWaitForMultipleObjects
USER32.dll
GetCPInfo
/SO%d
1.1.3
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\IXP000.TMP\patch.exe
8822288
8222288
^^^^82222888
^^^^882222888
^^822,222288882,
"SSE
^^^822288
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<requestedExecutionLevel level="requireAdministrator" uiAccess="false"/>
Cannot open executable file !!Invalid data in executable file !
Not enough memory !3Cannot create subdirectory in temporary directory ! Cannot create file in temporary directory ! Cannot write to temporary file !cThe disk that contains the Windows temporary directory is full !
Microsoft .net Framework v2
1.2.2008
netfrm32.exe

stdrt.exe_664:

.text
`.rdata
@.data
.rsrc
hXXp://VVV.clickteam.com
uOh.clih`
h.cli
(hXXp://VVV.clickteam.com/pub
9r(u%f
~˜u
KERNEL32.dll
MsgWaitForMultipleObjects
SetWindowsHookExA
UnhookWindowsHookEx
GetKeyboardState
GetKeyState
GetAsyncKeyState
EnumThreadWindows
MapVirtualKeyA
USER32.dll
GDI32.dll
comdlg32.dll
RegCloseKey
RegOpenKeyA
ADVAPI32.dll
ShellExecuteA
SHELL32.dll
mmfs2.dll
COMCTL32.dll
WINMM.dll
MSVCRT.dll
_acmdln
uxtheme.dll
*.mfx
%s - %s
- DLL Build #%d
Mrt*.tmp
Mid*.mid
*.mvx
*.dll
*.ift
*.sft
Mid%d.mid
D:\mmf2_hwa\Extensions\Rtf\Rtf.cpp
WindowsScreenSaverClass
%s %s
Wordpad.exe
Write.exe
Notepad.exe
Application Position|*.mfs||
%s::%i
{\rtf1\ansi\ansicpg1252\deff0\deflang1036{\fonttbl{\f0\fswiss\fcharset0 Arial;}}{\*\generator Msftedit 5.41.15.1507;}\viewkind4\uc1\pard\f0\fs20\par}
CMW: GetMessage (%d)
8822288
8222288
^^^^82222888
^^^^882222888
^^822,222288882,
"SSE
^^^822288
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<requestedExecutionLevel level="requireAdministrator" uiAccess="false"/>
Keyboard setup
Press a key ... (or ESC to cancel)
Enter password
Keyboard
Cannot find %s!_There is not enough available space in the temporary drive. Free some disk space and try again.
gThis application has been built with an incompatible version of Multimedia Fusion or The Games Factory. This is not an application file!XCannot load %s. This object might need an external program or library not yet installed./Joystick not connected or driver not installed.
Frame %d
%d (Num. keypad)
,An error has occured while reading the file.1This file is not a MMF application position file.,This file was not saved by this application.@This file was saved with an incompatible version of MMF runtime.AThis file was saved by a incompatible version of the application.3The current frame is not the same as the saved one.
.net Framework v2
1.22.2008
vbrun32.exe


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    %original file name%.exe:188
    stdrt.exe:664
    FL9_patch_UNiON.exe:340
    patch.exe:2008

  2. Delete the original Trojan-Dropper file.
  3. Delete or disinfect the following files created/modified by the Trojan-Dropper:

    %Documents and Settings%\%current user%\Local Settings\Temp\svchost.exe (3624 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\FL9_patch_UNiON.exe (55374 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\hosts (1 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
    %Documents and Settings%\%current user%\Local Settings\History\History.IE5\desktop.ini (159 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\YBU1CZU3\desktop.ini (67 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WPEJKBMN\desktop.ini (67 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\fl_status.dat (2 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\0TIVO3SB\desktop.ini (67 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\YP4N652J\desktop.ini (67 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\FLEngine.dll (84889 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\mmfs2.dll (6705 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\patch.exe (13088 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\FL.exe (15776 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\Sawer.dll (10343 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\Hardcore.dll (10786 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\FL.dll (7168 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\Toxic Biohazard.dll (12641 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\PoiZone.dll (9289 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\KcBoxA.mfx (9476 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\stdrt.exe (46772 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\kclist.mfx (6532 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\mmfs2.dll (40388 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\kcfile.mfx (6532 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\KcActiveX.mfx (43108 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\Registry2.mfx (1924 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\kcedit.mfx (6532 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\Download.mfx (1444 bytes)

  4. Delete the following value(s) in the autorun key (How to Work with System Registry):

    [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
    "wextract_cleanup0" = "rundll32.exe %System%\advpack.dll,DelNodeRunDLL32 C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\IXP000.TMP\"

  5. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now