Trojan-Dropper.Win32.Vtimrun_8f875bcb31
HEUR:Trojan.Win32.Generic (Kaspersky), Gen:Win32.Malware.QF3@ayjtfjdi (B) (Emsisoft), Trojan.NSIS.StartPage.FD, TrojanDropperVtimrun.YR (Lavasoft MAS)
Behaviour: Trojan-Dropper, Trojan, Malware
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 8f875bcb31d5b3fc9dee70a0dfce59c3
SHA1: 235fbf14730e62155bf431f8200366da804e88a5
SHA256: 02ca480897a728aa3f638c6108211d55193a819e252e0d979a53c296c3831bdb
SSDeep: 98304:CxIfzqibuSfnNWjqWntLOO7NKiJTo71eYFvN:MIfOibuWWtLOOxTo71eYP
Size: 3843412 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2008-09-05 10:26:23
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan-Dropper. Trojan program, intended for stealth installation of other malware into user's system.
Payload
No specific payload has been found.
Process activity
The Trojan-Dropper creates the following process(es):
%original file name%.exe:188
stdrt.exe:664
FL9_patch_UNiON.exe:340
patch.exe:2008
The Trojan-Dropper injects its code into the following process(es):
No processes have been created.
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process %original file name%.exe:188 makes changes in the file system.
The Trojan-Dropper creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\svchost.exe (3624 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\FL9_patch_UNiON.exe (55374 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hosts (1 bytes)
The Trojan-Dropper deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsd1.tmp (0 bytes)
The process stdrt.exe:664 makes changes in the file system.
The Trojan-Dropper creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\desktop.ini (159 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\YBU1CZU3\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WPEJKBMN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\fl_status.dat (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\0TIVO3SB\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\YP4N652J\desktop.ini (67 bytes)
The process FL9_patch_UNiON.exe:340 makes changes in the file system.
The Trojan-Dropper creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\FLEngine.dll (84889 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\mmfs2.dll (6705 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\patch.exe (13088 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\FL.exe (15776 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\Sawer.dll (10343 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\Hardcore.dll (10786 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\FL.dll (7168 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\Toxic Biohazard.dll (12641 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\PoiZone.dll (9289 bytes)
The process patch.exe:2008 makes changes in the file system.
The Trojan-Dropper creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\KcBoxA.mfx (9476 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\stdrt.exe (46772 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\kclist.mfx (6532 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\mmfs2.dll (40388 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\kcfile.mfx (6532 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\KcActiveX.mfx (43108 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\Registry2.mfx (1924 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\kcedit.mfx (6532 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\Download.mfx (1444 bytes)
The Trojan-Dropper deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp (0 bytes)
Registry activity
The process %original file name%.exe:188 makes changes in the system registry.
The Trojan-Dropper creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "05 CE F9 F3 C6 B5 9D D4 B1 0C AD DE C7 34 BA 6A"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
The process stdrt.exe:664 makes changes in the system registry.
The Trojan-Dropper creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1B 00 00 00 01 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "4B 80 0A E7 93 CB A1 B0 CF 37 A7 8D 76 48 0F 30"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
The Trojan-Dropper modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan-Dropper modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan-Dropper modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan-Dropper deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process FL9_patch_UNiON.exe:340 makes changes in the system registry.
The Trojan-Dropper creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1C CF D8 FE 7A 84 97 00 0A 1C 88 AA 01 2F 6E 4B"
To automatically run itself each time Windows is booted, the Trojan-Dropper adds the following link to its file to the system registry autorun key:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"wextract_cleanup0" = "rundll32.exe %System%\advpack.dll,DelNodeRunDLL32 C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\IXP000.TMP\"
Dropped PE files
| MD5 | File path |
|---|---|
| d4b921e1ae3e2b285ce3a74c92fa8b24 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\FL9_patch_UNiON.exe |
| 37117836d23f388e9d8427ac5fe4986e | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\FL.dll |
| df758990ec98677e67c013b9d7890e8d | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\FL.exe |
| 8b1dc84868447b6bb781f9ee78e440f3 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\FLEngine.dll |
| 1efcf6b820711d17e82c133850e5b379 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\Hardcore.dll |
| 22eabff452a5180e5cdfa777ec612566 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\PoiZone.dll |
| 5ffb8a721b9fccb6a7ca9c65fd47e0bc | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\Sawer.dll |
| 13a931cb34aa86979a16dabe57ae1971 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\Toxic Biohazard.dll |
| 72a83e6b9b192e297b0b3fba6d29188c | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\mmfs2.dll |
| a73cb78963be77cf2ae8e33dbaba509a | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\patch.exe |
| c14492929a9a11f826d240489cba93c9 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\Download.mfx |
| 650b59991e7df2f8fa7604767feff498 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\KcActiveX.mfx |
| 86e311d5a7db11ab859d8055b241c5d8 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\KcBoxA.mfx |
| 68bfec6b83f19fc1f000b57ad889f577 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\Registry2.mfx |
| f05bd60dbbdd8f86cd37baad6f3126de | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\kcedit.mfx |
| dbf704f6879cf85a98b295ec48bbb1fc | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\kcfile.mfx |
| 676e1c9d38f6bd2c1e3e6976d6f1a78e | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\kclist.mfx |
| d2af599f8c70626210eaa49effade314 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\mmfs2.dll |
| fadd1ba3bc472fb9a81a69b4974e4bad | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\mrt4.tmp\stdrt.exe |
| 14b848866035dea39b912da628307231 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsf3.tmp\NSISArray.dll |
| a5f8399a743ab7f9c88c645c35b1ebb5 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsf3.tmp\NSISdl.dll |
| d5889a5d5c2ddc54645a2838e83f957f | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\svchost.exe |
| 9247535b33135fb573a16b17beba7282 | c:\Program Files\Common Files\Microsoft Shared\Web Components\messenger.exe |
| 9247535b33135fb573a16b17beba7282 | c:\messenger.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
Company Name: UNiON
Product Name: FL 9
Product Version:
Legal Copyright: UNiON
Legal Trademarks:
Original Filename:
Internal Name:
File Version: 6.00.2900.5512
File Description: FL 9
Comments:
Language: English (United States)
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 31140 | 31232 | 4.30089 | c875551ff6ecdc825cf7b63896acc42d |
| .data | 36864 | 140 | 512 | 0.790395 | f6c0c35db6bf3b0337064d88bbab0f08 |
| .rdata | 40960 | 3360 | 3584 | 3.63194 | 3b7f59408b0d716f6c11404fd61d0683 |
| .bss | 45056 | 154264 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| .idata | 200704 | 5088 | 5120 | 3.61674 | ad2ab3a5fdc0478cbb8c266d4b0734bb |
| .ndata | 208896 | 36864 | 1024 | 0 | 0f343b0931126a20f133d67c2b018a3b |
| .rsrc | 245760 | 16736 | 16896 | 0.903634 | 3f65269c16564ea47e77cb4e8781b63e |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://tuff-kid.com/fl_status.dat | |
| hxxp://www.tuff-kid.com/fl_status.dat |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET /fl_status.dat HTTP/1.1
User-Agent: FL Patch
Host: VVV.tuff-kid.com
HTTP/1.1 200 OK
Server: nginx/1.8.1
Date: Mon, 14 Mar 2016 00:32:41 GMT
Content-Type: application/octet-stream
Content-Length: 2
Last-Modified: Tue, 05 Jun 2012 20:37:19 GMT
Connection: keep-alive
ETag: "4fce6dff-2"
Accept-Ranges: bytesnoHTTP/1.1 200 OK..Server: nginx/1.8.1..Date: Mon, 14 Mar 2016 00:32:4
1 GMT..Content-Type: application/octet-stream..Content-Length: 2..Last
-Modified: Tue, 05 Jun 2012 20:37:19 GMT..Connection: keep-alive..ETag
: "4fce6dff-2"..Accept-Ranges: bytes..no..
The Trojan-Dropper connects to the servers at the folowing location(s):
.text
0`.data
.rdata
[email protected]
.idata
.ndata
.rsrc
tCPPj
XZSSh@
... %d%%
hXXp://nsis.sf.net/NSIS_Error
verifying installer: %d%%
~nsu.tmp
%u.%u%s%s
.DEFAULT\Control Panel\International
*?|<>/":
%s=%s
Software\Microsoft\Windows\CurrentVersion
RegDeleteKeyExA
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\FL9_patch_UNiON.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp
FL9_patch_UNiON.exe
"patch.exe"
LvC%f<
,.Wo
%FT_J
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyExA
GetWindowsDirectoryA
SHFileOperationA
ShellExecuteA
ExitWindowsEx
ADVAPI32.DLL
COMCTL32.DLL
GDI32.dll
KERNEL32.dll
OLE32.dll
SHELL32.DLL
USER32.dll
VERSION.dll
c:\%original file name%.exe
%original file name%.exe
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsd1.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
33333330
3333333
33333333
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.37-3</description><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*" /></dependentAssembly></dependency></assembly>
6.00.2900.5512 (xpsp.080413-2105)
WEXTRACT.EXE
Windows
Operating System
6.00.2900.5512
04090000
svchost.exe_644:
.text
`.rdata
@.data
.ndata
.rsrc
uDSSh
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
GetWindowsDirectoryA
KERNEL32.dll
ExitWindowsEx
USER32.dll
GDI32.dll
SHFileOperationA
ShellExecuteA
SHELL32.dll
RegEnumKeyA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
ADVAPI32.dll
COMCTL32.dll
ole32.dll
VERSION.dll
verifying installer: %d%%
hXXp://nsis.sf.net/NSIS_Error
... %d%%
~nsu.tmp
%u.%u%s%s
RegDeleteKeyExA
%s=%s
*?|<>/":
~1\"%CurrentUserName%"\LOCALS~1\Temp\nsf3.tmp\NSISdl.dll
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsf3.tmp\NSISdl.dll
ALS~1\Temp\nsf3.tmp
ared\Web Components\messenger.exe
\nsf3.tmp\NSISdl.dll
.reloc
WS2_32.dll
NSISdl.dll
invalid URL
Host: %s
GET %s HTTP/1.0
User-Agent: NSISDL/1.2 (Mozilla)
http=
Software\Microsoft\Windows\CurrentVersion\Internet Settings
Unable to open %s
%skB (%d%%) of %skB at %u.ukB/s
(%u hours remaining)
(%u minutes remaining)
(%u seconds remaining)
Downloading %s
%s: %s
NSISArray %s: %s
Join
Indexes used:
%i - %s
Array #%i: %s
NSISArray.dll
%STCD
.vN {({,{<{*;<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.46</description><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*" /></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="requireAdministrator" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/></application></compatibility></assembly>{ T4xAi%fg<%d]6
SF.ES
%fH9y
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsf3.tmp
nsf3.tmp
ESSEN~1.EXE
mponents\messenger.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\apple_setup.ini
cfg/crypt1.php?id=20081
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\svchost.exe
%Program Files%\temp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp
svchost.exe
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsk2.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
%Program Files%\Common Files\Microsoft Shared\Web Components
6.4.6
6.3.7
FL9_patch_UNiON.exe_340:
.text
`.data
.rsrc
ADVAPI32.dll
KERNEL32.dll
NTDLL.DLL
GDI32.dll
USER32.dll
COMCTL32.dll
VERSION.dll
advapi32.dll
advpack.dll
wininit.ini
Software\Microsoft\Windows\CurrentVersion\App Paths
setupapi.dll
setupx.dll
IXPd.TMP
TMP4351$.TMP
FINISHMSG
USRQCMD
ADMQCMD
msdownld.tmp
wextract.pdb
PSSSSSSh
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegQueryInfoKeyA
GetWindowsDirectoryA
ExitWindowsEx
MsgWaitForMultipleObjects
rundll32.exe %s,InstallHinfSection %s 128 %s
SHELL32.DLL
Software\Microsoft\Windows\CurrentVersion\RunOnce
PendingFileRenameOperations
System\CurrentControlSet\Control\Session Manager\FileRenameOperations
wextract_cleanup%d
%s /D:%s
rundll32.exe %sadvpack.dll,DelNodeRunDLL32 "%s"
Command.com /c %s
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\IXP000.TMP\
33333330
3333333
33333333
FL.dll
FL.exe
FLEngine.dll
Hardcore.dll
mmfs2.dll
patch.exe
PoiZone.dll
Sawer.dll
Toxic Biohazard.dll
,v.amA
jn.kS
!Nz~.Is^
|.fqh5
*.Gd'
$$%D%
VPe.VQ"/
.QM"Gn*
`F%8S
A.ptv
.gsW]q
Za.bx
OG.ID
*>%drW"
%fzSs
.AH2
N[.QO
Ivh|%UK"
.zoz9!.N
G\_%U
Fxm%c*
y:fÆ
9/u.uY'
.nDt37
11A.du
[7%x
(.jkg!
C.Em=k
.LtpJd'
s.jq~
<QiO%x
8D'%C
W.YTe
lC/.IV
PxK#3.nd
.H8%u
$}W.Ko`
t.RKQ
Z;.Jf
#%dV)
qT.im
.oS'v
k.tzuA
TK.QT
%u}-v
KcActiveX.mfx'b~&=a
p0o%s
.aA-XP
].TSskw,
.De )0
7.yEi
H.qU'
%s[\ll
Qh_ûA
V.gr^
%x( k}
&$.jP
P.}%S
%f"~'>
h`.ey
'I.hQ
.aX\N
,D.mF~s
L6.Xu
'-J=w.iS
0{.SfB$@#$= 5$%S@
PPD%F
e?Equdp>^
\.Pz(
GF`%dz
t.ysB
rgF%c
p,@%U2<DP
3[%Sm
T.CX?P
'G.JeizR
0.yiZ
.xj/B
".DqAE
Ohe%U
zxt%X0
3.tO3
nI..DIs
-5}og`)E4!|P
.sN=t
)O.EZ
jw.OD
@.VOVr
~"%c\~
d&.DX
<WÒ_y
%ssDy}xlt
5 xV.tZ
ek.POW
esEs%sJq
%SpNX.
P %UJ
.EZvw
0.PMq
q.lL*k
Q.wz(\
O%X{=hUw%s
A%x3x
urLQ
WeBv
?.ag)
)6d%f
ƒx0
().TqP :9Wq
.YQRodU#r0
.TQp*x
.zRxQ
%X;@Y
=%1Xyu
z%x?@=R
..kM64
?y>.ry
.UXue
2".IQK
fRj%SJ
Hy1%F
$)%S]
..wC0
A%f.KS
r.qJ!
%uB $
F:\ \n
.Dt49
{[I~%c[.Pyt
PM.dyj
3p]~%X
i.zOe)9n
ZR.aa
t%d^\
.hX`*e
H_%c{;%~).Cd
-XwEB
q.Dm7
pxexeV`3R
wNTD.HH
Z.Zq1
%DRw>
-Ul}*
'Z.OHiZ
pp.Lt
9?À
dU%uC
'.QJP
M.dlS(-
R&ú
`kEYC
n7M%S
p,UrLt
.eYqN
M8.qx
#Ü%%
?(?,?0?4?8?<?
2.ev2
;A.Xf
%4jc.mD
;%fx:
KmX%S,
}.If"g
LLS.LU
$"9%9s!}Tw;%W
c%u4T
J.bk"
{%u/:p"!.qzt
%frVI
i.WLW
.H.fW
q.Sz6
jeU%x
.khkB
*$%fi
t.Nbt
<cH7q.on
.vk&4u}s
Sfg%U
.Cp#_
ej.Co
|%Us2
%ukJ`~
Qk.ivOl
h:\Y>
Ioz.MGt
>%f},_
->1]|
T02-%c
fx.Im
.ij)
.BS$wh
.XI_|
iMf.Bng
V P.hg
9z.Hs
(uc%f
}8z.zo,
>L.Ky
C>!]%F
mcrt
>.Tl;
Jf^.Jr.#
H..ZOUx99
:KeY6
|4;|#[:'#
:*:*:*:*
:*:*:*;*
ie%D=
'S%uq
V`%uW
.MEsJI
.O.LD
KSfsy%3U
\S%fI
*l.EZ
A-l.ue
-%Sfj
g%X_:
.Xq$/
.nXb[]
g%sl|
\Q%XZ
%C@>C
i.DMG%
t('b%U46%ST
$q#À
t.tCyCc
cMdM
L^%FXq I
[%c"?
%xa^>_<
`.DeUR
=.qu}.
CY.Ld19
3&.PC<
m%FX0
b.KuK
kclist.mfx
w.PvSaUhS
0jhm.bm/
~MQYq.UA
f.Pf*"
p%S,L
!#j.NlN
%U@eq
%dU@%g
.mLzlW
>%UL-
;.DtC
e9.JqO
.lr!tx
%x#3%lL
.ZtHR
(8.fx
3F[inH.Bn
%ur/X
Zrx.HH
#i%dl$R
.yhIT
c=*.YM
P%UBWR
G[
7A.io
y].pW
9q~].hrl
i5.ho
.TjIg
.EX&"
Dd6ß
LvC%f<
,.Wo
%FT_J
"patch.exe"
Please read the following license agreement. Press the PAGE DOWN key to see the rest of the agreement.
CFailed to get disk space information from: %s.
System Message: %s.&A required resource cannot be located. Are you sure you want to cancel?
8Unable to retrieve operating system version information.!Memory allocation request failed.
Filetable full.Ên not change to destination folder.
Setup could not find a drive with %s KB free disk space to install the program. Please free up some space first and press RETRY or press CANCEL to exit setup.KThat folder is invalid. Please make sure the folder exists and is writable.IYou must specify a folder with fully qualified pathname or choose Cancel.!Could not update folder edit box.5Could not load functions required for browser dialog.7Could not load Shell32.dll required for browser dialog.
(Error creating process <%s>. Reason: %s1The cluster size in this system is not supported.,A required resource appears to be corrupted.QWindows 95 or Windows NT 4.0 Beta 2 or greater is required for this installation.
Error loading %shGetProcAddress() failed on function '%s'. Possible reason: incorrect version of advpack.dll being used./Windows 95 or Windows NT is required to install
Could not create folder '%s'
To install this program, you need %s KB disk space on drive %s. It is recommended that you free up the required disk space before you continue.
Error retrieving Windows folder
$NT Shutdown: OpenProcessToken error.)NT Shutdown: AdjustTokenPrivileges error.!NT Shutdown: ExitWindowsEx error.}Extracting file failed. It is most likely caused by low memory (low disk space for swapping file) or corrupted Cabinet file.aThe setup program could not retrieve the volume information for drive (%s) .
System message: %s.xSetup could not find a drive with %s KB free disk space to install the program. Please free up some space and try again.eThe installation program appears to be damaged or corrupted. Contact the vendor of this application.
/C:<Cmd> -- Override Install Command defined by author.
eAnother copy of the '%s' package is already running on your system. Do you want to run another copy?
Could not find the file: %s.
:The folder '%s' does not exist. Do you want to create it?hAnother copy of the '%s' package is already running on your system. You can only run one copy at a time.OThe '%s' package is not compatible with the version of Windows you are running.SThe '%s' package is not compatible with the version of the file: %s on your system.
6.00.2900.5512 (xpsp.080413-2105)
WEXTRACT.EXE
Windows
Operating System
6.00.2900.5512
patch.exe_2008:
.text
`.rdata
@.data
.rsrc
inflate 1.1.3 Copyright 1995-1998 Mark Adler
__MSVCRT_HEAP_SELECT
user32.dll
KERNEL32.dll
MsgWaitForMultipleObjects
USER32.dll
GetCPInfo
/SO%d
1.1.3
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\IXP000.TMP\patch.exe
8822288
8222288
^^^^82222888
^^^^882222888
^^822,222288882,
"SSE
^^^822288
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<requestedExecutionLevel level="requireAdministrator" uiAccess="false"/>
Cannot open executable file !!Invalid data in executable file !
Not enough memory !3Cannot create subdirectory in temporary directory ! Cannot create file in temporary directory ! Cannot write to temporary file !cThe disk that contains the Windows temporary directory is full !
Microsoft .net Framework v2
1.2.2008
netfrm32.exe
stdrt.exe_664:
.text
`.rdata
@.data
.rsrc
hXXp://VVV.clickteam.com
uOh.clih`
h.cli
(hXXp://VVV.clickteam.com/pub
9r(u%f
~˜u
KERNEL32.dll
MsgWaitForMultipleObjects
SetWindowsHookExA
UnhookWindowsHookEx
GetKeyboardState
GetKeyState
GetAsyncKeyState
EnumThreadWindows
MapVirtualKeyA
USER32.dll
GDI32.dll
comdlg32.dll
RegCloseKey
RegOpenKeyA
ADVAPI32.dll
ShellExecuteA
SHELL32.dll
mmfs2.dll
COMCTL32.dll
WINMM.dll
MSVCRT.dll
_acmdln
uxtheme.dll
*.mfx
%s - %s
- DLL Build #%d
Mrt*.tmp
Mid*.mid
*.mvx
*.dll
*.ift
*.sft
Mid%d.mid
D:\mmf2_hwa\Extensions\Rtf\Rtf.cpp
WindowsScreenSaverClass
%s %s
Wordpad.exe
Write.exe
Notepad.exe
Application Position|*.mfs||
%s::%i
{\rtf1\ansi\ansicpg1252\deff0\deflang1036{\fonttbl{\f0\fswiss\fcharset0 Arial;}}{\*\generator Msftedit 5.41.15.1507;}\viewkind4\uc1\pard\f0\fs20\par}CMW: GetMessage (%d)
8822288
8222288
^^^^82222888
^^^^882222888
^^822,222288882,
"SSE
^^^822288
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<requestedExecutionLevel level="requireAdministrator" uiAccess="false"/>
Keyboard setup
Press a key ... (or ESC to cancel)
Enter password
Keyboard
Cannot find %s!_There is not enough available space in the temporary drive. Free some disk space and try again.
gThis application has been built with an incompatible version of Multimedia Fusion or The Games Factory. This is not an application file!XCannot load %s. This object might need an external program or library not yet installed./Joystick not connected or driver not installed.
Frame %d
%d (Num. keypad)
,An error has occured while reading the file.1This file is not a MMF application position file.,This file was not saved by this application.@This file was saved with an incompatible version of MMF runtime.AThis file was saved by a incompatible version of the application.3The current frame is not the same as the saved one.
.net Framework v2
1.22.2008
vbrun32.exe
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:188
stdrt.exe:664
FL9_patch_UNiON.exe:340
patch.exe:2008 - Delete the original Trojan-Dropper file.
- Delete or disinfect the following files created/modified by the Trojan-Dropper:
%Documents and Settings%\%current user%\Local Settings\Temp\svchost.exe (3624 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\FL9_patch_UNiON.exe (55374 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hosts (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\desktop.ini (159 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\YBU1CZU3\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WPEJKBMN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\fl_status.dat (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\0TIVO3SB\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\YP4N652J\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\FLEngine.dll (84889 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\mmfs2.dll (6705 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\patch.exe (13088 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\FL.exe (15776 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\Sawer.dll (10343 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\Hardcore.dll (10786 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\FL.dll (7168 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\Toxic Biohazard.dll (12641 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\PoiZone.dll (9289 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\KcBoxA.mfx (9476 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\stdrt.exe (46772 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\kclist.mfx (6532 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\mmfs2.dll (40388 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\kcfile.mfx (6532 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\KcActiveX.mfx (43108 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\Registry2.mfx (1924 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\kcedit.mfx (6532 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mrt4.tmp\Download.mfx (1444 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"wextract_cleanup0" = "rundll32.exe %System%\advpack.dll,DelNodeRunDLL32 C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\IXP000.TMP\" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.