Trojan.Generic.11869740_cb83ea90ac

by malwarelabrobot on November 27th, 2014 in Malware Descriptions.

Trojan.Generic.11869740 (AdAware), Installer.Win32.InnoSetup.FD, Installer.Win32.InnoSetup.2.FD, Trojan.Win32.Delphi.FD, Trojan.Win32.Iconomon.FD, Trojan.Win32.Sasfis.FD, VirTool.Win32.DelfInject.FD, InstallerInnoSetup.YR (Lavasoft MAS)
Behaviour: Trojan, Installer, VirTool


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: cb83ea90ac0ee41c0c704d741c7b6e65
SHA1: f43e23d1010edf92447e3d0ca138f3aa6d2ec23f
SHA256: 6f06f43dda402ae3dfff1650699be5201dc2c2377b230e8b89428190e4de6d82
SSDeep: 49152:RVpmA8YsEBYfutbS9NeGusAlWlZJya K708cLk5Fye9mkKfMebA5rOYiZnJ:RVkAzd29wGusEWT0K70Jk5oWKfMebSiX
Size: 2961584 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: BorlandDelphi30, UPolyXv05_v6
Company: Xacti, LLC
Created at: 1992-06-20 01:22:17
Analyzed on: WindowsXPESX SP3 32-bit


Summary:

Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).

Payload

No specific payload has been found.

Process activity

The Trojan creates the following process(es):

%original file name%.exe:1696

The Trojan injects its code into the following process(es):

cb83ea90ac0ee41c0c704d741c7b6e65.tmp:1936

Mutexes

The following mutexes were created/opened:

ShimCacheMutex
DBWinMutex

File activity

The process cb83ea90ac0ee41c0c704d741c7b6e65.tmp:1936 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\tbr_dots.bmp (656 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\24x7_Bundle.bmp (60 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\PCPSTerms.en.rtf (59 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\24x7_EULA.en.rtf (36 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\PCPSBundle.bmp (27 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\AppGraffitiBundle.bmp (601 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\omega.en.rtf (36 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\Inbox.ini (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\OVTerms_en.rtf (60 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\IBX_Plus.bmp (318 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\_isetup\_shfoldr.dll (23 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\PCPSLogo.bmp (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\ct2012.bmp (26 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\DownLib.dll (673 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\setupcfg.ini (62 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\OVBundle.bmp (27 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\_isetup\_RegDLL.tmp (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\AppGraffIcon.bmp (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\24x7_Icon.bmp (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\OVLogo.bmp (4 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\tbr_dots.bmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\Inbox.ini (0 bytes)

The process %original file name%.exe:1696 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\is-HQ0VH.tmp\cb83ea90ac0ee41c0c704d741c7b6e65.tmp (7386 bytes)

Registry activity

The process cb83ea90ac0ee41c0c704d741c7b6e65.tmp:1936 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2A EE 03 81 28 7B 6B CE 4E 86 67 4E D3 DF CE A6"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Programs" = "%Documents and Settings%\%current user%\Start Menu\Programs"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"

The process %original file name%.exe:1696 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E1 DC A3 1A D8 5F 8A AE 4A 6C B9 8B 27 72 D7 C5"

Dropped PE files

MD5 File path
db25dfdd4c1f2b65c68a230881072695 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\is-DUEQK.tmp\DownLib.dll
0ee914c6f0bb93996c75941e1ad629c6 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\is-DUEQK.tmp\_isetup\_RegDLL.tmp
92dc6ef532fbb4a5c3201469a5b5eb63 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\is-DUEQK.tmp\_isetup\_shfoldr.dll
e7106fbf42fbc6d5b08a18ada4f781b4 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\is-HQ0VH.tmp\cb83ea90ac0ee41c0c704d741c7b6e65.tmp

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

VersionInfo

Company Name: Xacti, LLC
Product Name: Toolbar Powered by Inbox
Product Version: 2.0.1.106
Legal Copyright: copyright (c) Inbox.com
Legal Trademarks:
Original Filename:
Internal Name:
File Version: 2.0.1.106
File Description: Toolbar Powered by Inbox Setup
Comments: This installation was built with Inno Setup.
Language: English (United States)

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
CODE 4096 47336 47616 4.4742 85f494242454a2629159fe1001fc130c
DATA 53248 1292 1536 2.51115 4d6b19d4b969623f3898a576acbd987d
BSS 57344 4337 0 0 d41d8cd98f00b204e9800998ecf8427e
.idata 65536 2880 3072 3.22342 cac96a33d8d1fc3904d53c82fae87d4d
.tls 69632 8 0 0 d41d8cd98f00b204e9800998ecf8427e
.rdata 73728 24 512 0.142404 0257486909b054dd295a25ee0db8a5f1
.reloc 77824 4292 4608 4.46464 0ea34a4a19040a8814629749b6cf6cad
.rsrc 86016 11776 11776 3.11019 ac0f88bb94e78cc9fbfee839135bba25

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

Total found: 60
d13bca9edc41f3a89622febf3a340d7c
22278d0065cac7395b4b8e17c9c05150
bf0388679685d73231234a54fa9f2a66
e15dfec7defb99f6ad56e6768de6c1af
4fc779245c889549789e6b7494ad035e
17c4cc0bb992b69e42865a1d8b89b588
d87b5ddb4a85a11d503b394841aa89d0
306124925ae0e2fc488cc5bf206107bc
b45f129b6ad1b71c3ac2702159b276ab
fb1f59c9e1853a36cd6bd549ad911434
2dfc2cd6f7e45d3564b9b945e1ad4f1e
4cc2245d5a99f849833d77267ef5dbdd
91817030f43b5b4472cd701231b5f8ae
6bd6873dfc13a10719fe87edfe71f486
39fe1e6f67701328899b70e89b27e50c
8e2d25a77436e4d0fa462c251699bc7e
e4e70334053ac9e9bcf8fe927dd0664d
9c59d4c5411addb2d91abdd84d9dc92d
7d3d7490fab927b20392bb94c2f823f0
66bcca8d1a8048bf33c69e7f34aacbb4
5117f5ccf1df928a72ab3d464b6b6331
acd5743b0366b1aadca82a5ddcc0f2ff
80c48c84472ad58825fa480dbd816b77
490ee1323baf27d6554d31b28876b446
d9bc4bada7ac7e7107ef9cfd727db937

URLs

No activity has been detected.

IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

Traffic

Web Traffic was not found.

The Trojan connects to the servers at the folowing location(s):

%original file name%.exe_1696:

.idata
.rdata
P.reloc
P.rsrc
kernel32.dll
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
.DEFAULT\Control Panel\International
File I/O error %d
lzma: Compressed data is corrupted (%d)
LzmaDecode failed (%d)
shell32.dll
/SL5="$%x,%d,%d,
Inno Setup Setup Data (5.3.8)
Inno Setup Messages (5.1.11)
user32.dll
GetKeyboardType
advapi32.dll
RegOpenKeyExA
RegCloseKey
oleaut32.dll
GetWindowsDirectoryA
GetCPInfo
MsgWaitForMultipleObjects
ExitWindowsEx
comctl32.dll
KWindows
UrlMon
6MsgIDs
Msgs
name="JR.Inno.Setup"
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
<windowsSettings>
<dpiAware xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
</windowsSettings>
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/>
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/>
Invalid variant operation
External exception %x
Interface not supported
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted(Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'"Variant method calls not supported
I/O error %d
Integer overflow Invalid floating point operation
2.0.1.106
Inbox.com

cb83ea90ac0ee41c0c704d741c7b6e65.tmp_1936:

.text
`.itext
`.data
.idata
.rdata
@.reloc
B.rsrc
kernel32.dll
Windows
MSWHEEL_ROLLMSG
MSH_WHEELSUPPORT_MSG
MSH_SCROLL_LINES_MSG
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
oleaut32.dll
EVariantBadIndexError
ssShift
htKeyword
EInvalidOperation
%s_%d
USER32.DLL
EInvalidGraphicOperation
SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes
uxtheme.dll
DWMAPI.DLL
PasswordChar
OnKeyDown
OnKeyPress
OnKeyUp
ssHorizontal
OnKeyUp$
Uhü
clWebSnow
clWebFloralWhite
clWebLavenderBlush
clWebOldLace
clWebIvory
clWebCornSilk
clWebBeige
clWebAntiqueWhite
clWebWheat
clWebAliceBlue
clWebGhostWhite
clWebLavender
clWebSeashell
clWebLightYellow
clWebPapayaWhip
clWebNavajoWhite
clWebMoccasin
clWebBurlywood
clWebAzure
clWebMintcream
clWebHoneydew
clWebLinen
clWebLemonChiffon
clWebBlanchedAlmond
clWebBisque
clWebPeachPuff
clWebTan
clWebYellow
clWebDarkOrange
clWebRed
clWebDarkRed
clWebMaroon
clWebIndianRed
clWebSalmon
clWebCoral
clWebGold
clWebTomato
clWebCrimson
clWebBrown
clWebChocolate
clWebSandyBrown
clWebLightSalmon
clWebLightCoral
clWebOrange
clWebOrangeRed
clWebFirebrick
clWebSaddleBrown
clWebSienna
clWebPeru
clWebDarkSalmon
clWebRosyBrown
clWebPaleGoldenrod
clWebLightGoldenrodYellow
clWebOlive
clWebForestGreen
clWebGreenYellow
clWebChartreuse
clWebLightGreen
clWebAquamarine
clWebSeaGreen
clWebGoldenRod
clWebKhaki
clWebOliveDrab
clWebGreen
clWebYellowGreen
clWebLawnGreen
clWebPaleGreen
clWebMediumAquamarine
clWebMediumSeaGreen
clWebDarkGoldenRod
clWebDarkKhaki
clWebDarkOliveGreen
clWebDarkgreen
clWebLimeGreen
clWebLime
clWebSpringGreen
clWebMediumSpringGreen
clWebDarkSeaGreen
clWebLightSeaGreen
clWebPaleTurquoise
clWebLightCyan
clWebLightBlue
clWebLightSkyBlue
clWebCornFlowerBlue
clWebDarkBlue
clWebIndigo
clWebMediumTurquoise
clWebTurquoise
clWebCyan
clWebPowderBlue
clWebSkyBlue
clWebRoyalBlue
clWebMediumBlue
clWebMidnightBlue
clWebDarkTurquoise
clWebCadetBlue
clWebDarkCyan
clWebTeal
clWebDeepskyBlue
clWebDodgerBlue
clWebBlue
clWebNavy
clWebDarkViolet
clWebDarkOrchid
clWebMagenta
clWebDarkMagenta
clWebMediumVioletRed
clWebPaleVioletRed
clWebBlueViolet
clWebMediumOrchid
clWebMediumPurple
clWebPurple
clWebDeepPink
clWebLightPink
clWebViolet
clWebOrchid
clWebPlum
clWebThistle
clWebHotPink
clWebPink
clWebLightSteelBlue
clWebMediumSlateBlue
clWebLightSlateGray
clWebWhite
clWebLightgrey
clWebGray
clWebSteelBlue
clWebSlateBlue
clWebSlateGray
clWebWhiteSmoke
clWebSilver
clWebDimGray
clWebMistyRose
clWebDarkSlateBlue
clWebDarkSlategray
clWebGainsboro
clWebDarkGray
clWebBlack
comctl32.dll
AutoHotkeys
AutoHotkeys,
Uh~%D
Sh4%D
\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\
TKeyEvent
TKeyPressEvent
HelpKeywordt
crSQLWait
%s (%s)
imm32.dll
ssHotTrack
TWindowState
poProportional
TWMKey
KeyPreviewd
WindowState
GlassFrame.Bottom
GlassFrame.Enabled
GlassFrame.Left
GlassFrame.Right
GlassFrame.SheetOfGlass
GlassFrame.Top
Uh.oF
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
User32.dll
RegDeleteKeyExA
advapi32.dll
.DEFAULT\Control Panel\International
user32.dll
%s, ClassID: %s
%s, ProgID: "%s"
ole32.dll
parent process exe :
CertPos :
CertSize :
LastSection.PointerToRawData   LastSection.SizeOfRawData :
CertSize Mem:
EXPORT
TPSExec
TPSRuntimeClassImporter
TPSExportedVar
TPSCustomDebugExec
TPSDebugExec
TDIKeyHandler
TDIKeyHandler@5I
TTextHandler.EmptyBuffer: Unsupported TParentTextElement descendant encountered
TWordEnumerator.GetNext: No more words to return
oleacc.dll
MAPI32.DLL
RICHED20.DLL
RICHED32.DLL
File I/O error %d
Messages file "%s" is missing. Please correct the problem or obtain a new copy of the program.
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_PERFORMANCE_DATA
HKEY_CURRENT_CONFIG
HKEY_DYN_DATA
WININIT.INI
t.Htb
Software\Microsoft\Windows\CurrentVersion\SharedDLLs
RegCreateKeyEx
RegOpenKeyEx
sfc.dll
cmd.exe" /C "
COMMAND.COM" /C
PendingFileRenameOperations
PendingFileRenameOperations2
Software\Microsoft\Windows\CurrentVersion\Fonts
Software\Microsoft\Windows NT\CurrentVersion\Fonts
OLEAUT32.DLL
Log opened. (Time zone: UTC%s%.2u:%.2u)
%s Log %s #%.3u.txt
MsgWaitForMultipleObjects
regsvr32.exe"
Spawning _RegDLL.tmp
_isetup\_RegDLL.tmp
_RegDLL.tmp %u %u
REGDLL failed with exit code 0x%x
REGDLL mutex wait failed (%d, %d)
REGDLL returned unknown result code %d
Cannot register 64-bit DLLs on this version of Windows
HELPER_EXE_AMD64
HELPER_EXE_IA64
Cannot utilize 64-bit features on this version of Windows
64-bit helper EXE wasn't extracted
\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x
CreateNamedPipe
SetNamedPipeHandleState
helper %d 0x%x
Helper process PID: %u
Stopping 64-bit helper process. (PID: %u)
Helper process exited with failure code: 0x%x
TransactNamedPipe
TransactNamedPipe/GetOverlappedResult
Helper: Command did not execute
SOFTWARE\Microsoft\.NETFramework
.NET Framework not found
SOFTWARE\Microsoft\.NETFramework\Policy\v2.0
v2.0.50727
SOFTWARE\Microsoft\.NETFramework\Policy\v1.1
v1.1.4322
.NET Framework version %s not found
Fusion.dll
Failed to load .NET Framework DLL "%s"
Failed to get address of .NET Framework CreateAssemblyCache function
.NET Framework CreateAssemblyCache function failed
MoveFileEx failed (%d).
Deleting directory: %s
Failed to delete directory (%d). Will retry later.
Failed to delete directory (%d). Will delete on restart (if empty).
Failed to delete directory (%d).
Deleting file: %s
Failed to delete the file; it may be in use (%d).
ExtractRecData: Unicode data unsupported by this build
The file appears to be in use (%d). Will delete on restart.
Decrementing shared count (%d-bit): %s
Unregistering 64-bit DLL/OCX: %s
Unregistering 32-bit DLL/OCX: %s
Not unregistering DLL/OCX again: %s
Unregistering 64-bit type library: %s
Unregistering 32-bit type library: %s
Uninstalling from GAC: %s
Running Exec filename:
Running Exec parameters:
CreateProcess failed (%d).
Process exit code: %u
Running ShellExec filename:
Running ShellExec parameters:
ShellExecuteEx failed (%d).
Skipping RunOnceId "%s" filename: %s
Unregistering font: %s
zlib: Internal error. Code %d
1.2.1
bzlib: Internal error. Code %d
lzma: Compressed data is corrupted (%d)
LzmaDecode failed (%d)
TPasswordEdit
TPasswordEdit|
PasswordEdit(
Password
c:\directory
Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
PasswordPage
PasswordLabel
PasswordEdit
PasswordEditLabel
Could not find page with ID %d
Software\Microsoft\Windows\CurrentVersion\Uninstall
%s\%s_is1
CheckPassword
PrepareToInstall failed: %s
Need to restart Windows? %s
/:*?"<>|
\/:*?"<>|
%s-%d.bin
%s-%d%s.bin
..\DISK%d\
Asking user for new disk containing "%s".
Cannot read an encrypted file before the key has been set
<requestedExecutionLevel level="
LoggedMsgBox returned an unexpected value. Assuming Abort.
Software\Microsoft\Windows\CurrentVersion\Uninstall\
5.3.8 (a)
URLInfoAbout
URLUpdateInfo
Creating directory: %s
Setting permissions on directory: %s
Failed to set permissions on directory (%d).
Setting NTFS compression on directory: %s
Unsetting NTFS compression on directory: %s
Failed to set NTFS compression state (%d).
IMsg
Failed to set value in Fonts registry key.
Failed to open Fonts registry key.
Setting permissions on file: %s
Failed to set permissions on file (%d).
Setting NTFS compression on file: %s
Unsetting NTFS compression on file: %s
Dest filename: %s
Dest file is protected by Windows File Protection.
Time stamp of our file: %s
Time stamp of existing file: %s
Version of our file: %u.%u.%u.%u
Version of existing file: %u.%u.%u.%u
Existing file is protected by Windows File Protection. Skipping.
Uninstaller requires administrator: %s
The existing file appears to be in use (%d). Will replace on restart.
The existing file appears to be in use (%d). Retrying.
Registering file as a font ("%s")
Cannot install files to 64-bit locations on this version of Windows
Filename: %s
target.lnk
Desktop.ini
Software\Microsoft\Windows\CurrentVersion\App Paths\
Setting permissions on registry key: %s\%s
Could not set permissions on the registry key because it currently does not exist.
Failed to set permissions on registry key (%d).
Cannot access 64-bit registry keys on this version of Windows
Registration executable created: %s
Software\Microsoft\Windows\CurrentVersion\RunOnce
Registering 64-bit DLL/OCX: %s
Registering 32-bit DLL/OCX: %s
Registering 64-bit type library: %s
Registering 32-bit type library: %s
Directory for uninstall files: %s
Will append to existing uninstall log: %s
Will overwrite existing uninstall log: %s
Creating new uninstall log: %s
LoggedMsgBox returned an unexpected value. Assuming Cancel.
Fatal exception during installation process (%s):
ExtractTemporaryFile: The file "%s" was not found
Invalid symbol '%s' found
Invalid token '%s' found
QuerySpawnServer: Unexpected response: $%x
CallSpawnServer: Unexpected response: $%x
CallSpawnServer: Unexpected status: %d
ShellExecuteEx
ShellExecuteEx returned hProcess=0
Wnd=$%x
TCryptURLU
Uh%xM
CertificatePayload
StoreCertificatePayload parent ID:
ReadCertificatePayload:
RCP CertPos :
RCP CertSize :
ReadCertificatePayload error :
FormKeyDown
PasswordCheckHash
Expression error '%s'
Cannot evaluate "%s" constant during Uninstall
TKeyNameConst
Cannot access a 64-bit key in a "reg" constant on this version of Windows
Unknown custom message name "%s" in "cm" constant
srcexe
Cannot expand "pf64" constant on this version of Windows
Cannot expand "cf64" constant on this version of Windows
uninstallexe
Cannot expand "dotnet2064" constant on this version of Windows
Failed to expand shell folder constant "%s"
Unknown constant "%s"
Software\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows NT\CurrentVersion
cmd.exe
COMMAND.COM
\_RegDLL.tmp
REGDLL_EXE
\_setup64.tmp
_isetup\_shfoldr.dll
Failed to get version numbers of _shfoldr.dll
shfolder.dll
shell32.dll
Failed to load DLL "%s"
Found pending rename or delete that matches one of our files: %s
Windows version: %u.%u.%u%s (NT platform: %s)
64-bit Windows: %s
Processor architecture: %s
Defaulting to %s for suppressed message box (%s):
Message box (%s):
User chose %s.
MsgBox failed.
/SPAWNWND=$%x /NOTIFYWND=$%x
64-bit install mode: %s
%d.%d
_isetup\_isdecmp.dll
_isetup\_iscrypt.dll
/Password=
/SuppressMsgBoxes
/DETACHEDMSG
-0.bin
Setup version: Inno Setup version 5.3.8 (a)
Original Setup EXE:
Windows NT
setupcfg.ini
Not restarting Windows because Setup is being run from the debugger.
Restarting Windows.
Inno Setup version 5.3.8 (a)
Portions Copyright (C) 2000-2010 Martijn Laan
hXXp://VVV.innosetup.com/
hXXp://VVV.remobjects.com/ps
Cannot run files in 64-bit locations on this version of Windows
Type: Exec
Type: ShellExec
Will not restart Windows automatically.
System\CurrentControlSet\Control\Windows
TOutputMsgWizardPage
TOutputMsgMemoWizardPage
TOutputMsgMemoWizardPage|;N
MsgLabel
Msg1Label
Msg2Label
function CreateOutputMsgPage(const AfterID: Integer; const ACaption, ADescription, AMsg: String): TOutputMsgWizardPage;
function CreateOutputMsgMemoPage(const AfterID: Integer; const ACaption, ADescription, ASubCaption: String; const AMsg: AnsiString): TOutputMsgMemoWizardPage;
function MsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons: Integer): Integer;
function GetIniString(const Section, Key, Default, Filename: String): String;
function GetIniInt(const Section, Key: String; const Default, Min, Max: Longint; const Filename: String): Longint;
function GetIniBool(const Section, Key: String; const Default: Boolean; const Filename: String): Boolean;
function IniKeyExists(const Section, Key, Filename: String): Boolean;
function SetIniString(const Section, Key, Value, Filename: String): Boolean;
function SetIniInt(const Section, Key: String; const Value: Longint; const Filename: String): Boolean;
function SetIniBool(const Section, Key: String; const Value: Boolean; const Filename: String): Boolean;
procedure DeleteIniEntry(const Section, Key, Filename: String);
function GetCmdTail: String;
function StringChangeEx(var S: String; const FromStr, ToStr: String; const SupportDBCS: Boolean): Integer;
function RegValueExists(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;
function RegQueryStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;
function RegQueryMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;
function RegDeleteKeyIncludingSubkeys(const RootKey: Integer; const SubkeyName: String): Boolean;
function RegDeleteKeyIfEmpty(const RootKey: Integer; const SubkeyName: String): Boolean;
function RegKeyExists(const RootKey: Integer; const SubKeyName: String): Boolean;
function RegDeleteValue(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;
function RegGetSubkeyNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;
function RegGetValueNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;
function RegQueryDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultDWord: Cardinal): Boolean;
function RegQueryBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: AnsiString): Boolean;
function RegWriteStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteExpandStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: Cardinal): Boolean;
function RegWriteBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: AnsiString): Boolean;
function CheckForMutexes(Mutexes: String): Boolean;
function Exec(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;
function ExecAsOriginalUser(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;
function ShellExec(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;
function ShellExecAsOriginalUser(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;
function MakePendingFileRenameOperationsChecksum: String;
function CreateShellLink(const Filename, Description, ShortcutTo, Parameters, WorkingDir, IconFilename: String; const IconIndex, ShowCmd: Integer): String;
function ExitSetupMsgBox: Boolean;
function GetWindowsVersion: Cardinal;
procedure GetWindowsVersionEx(var Version: TWindowsVersion);
function GetWindowsVersionString: String;
function SuppressibleMsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons, Default: Integer): Integer;
function CustomMessage(const MsgName: String): String;
function SendMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Longint;
function PostMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;
function SendNotifyMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;
function SendBroadcastMessage(const Msg, WParam, LParam: Longint): Longint;
function PostBroadcastMessage(const Msg, WParam, LParam: Longint): Boolean;
function SendBroadcastNotifyMessage(const Msg, WParam, LParam: Longint): Boolean;
procedure RaiseException(const Msg: String);
function SetPreviousData(const PreviousDataKey: Integer; const ValueName, ValueData: String): Boolean;
Cannot call "%s" function during Setup
Cannot call "%s" function during Uninstall
Cannot call "%s" function during non Unicode Setup or Uninstall
CREATEOUTPUTMSGPAGE
CREATEOUTPUTMSGMEMOPAGE
MSGBOX
Invalid RootKey value
INIKEYEXISTS
GETCMDTAIL
REGKEYEXISTS
REGDELETEKEYINCLUDINGSUBKEYS
REGDELETEKEYIFEMPTY
REGGETSUBKEYNAMES
CHECKFORMUTEXES
SHELLEXEC
SHELLEXECASORIGINALUSER
MAKEPENDINGFILERENAMEOPERATIONSCHECKSUM
Unknown custom message name "%s"
EXITSETUPMSGBOX
GETWINDOWSVERSION
GETWINDOWSVERSIONSTRING
%u.%.2u.%u
SUPPRESSIBLEMSGBOX
%u.%u.%u.%u
Cannot disable FS redirection on this version of Windows
GetWindowsVersionEx
Runtime Error (at %d:%d):
Exception "%s" at address %p
TScriptRunner.SetPSExecParameters: Invalid type
TScriptRunner.LoadScript failed
Remove shared file %s? User chose %s%s
/INITPROCWND=$%x
/SECONDPHASE="%s" /FIRSTPHASEWND=$%x
Original Uninstall EXE:
Install was done in 64-bit mode but not running 64-bit Windows now
Removed all? %s
Not restarting Windows because Uninstall is being run from the debugger.
IMsgt
isRS-???.tmp
isRS-%.3u.tmp
DisableProcessWindowsGhosting
0123456789abcdefInno Setup Setup Data (5.3.8)
Inno Setup Messages (5.1.11)
! !!!"!#!$!%!
?456789:;<=
!"#$%&'()* ,-./0123
RegOpenKeyExA
RegCloseKey
GetKeyboardType
UnhookWindowsHookEx
SetWindowsHookExA
MapVirtualKeyA
LoadKeyboardLayoutA
GetKeyboardState
GetKeyboardLayoutNameA
GetKeyboardLayoutList
GetKeyboardLayout
GetKeyState
GetKeyNameTextA
ExitWindowsEx
EnumWindows
EnumThreadWindows
EnumChildWindows
ActivateKeyboardLayout
gdi32.dll
SetViewportOrgEx
version.dll
mpr.dll
GetWindowsDirectoryA
GetCPInfo
CreateNamedPipeA
RegQueryInfoKeyA
RegFlushKey
RegEnumKeyExA
RegDeleteKeyA
RegCreateKeyExA
ShellExecuteExA
ShellExecuteA
comdlg32.dll
=!=$=)=-=1=
;(<-<;<_<
0m0
9 9$9(9,9094989<9@9\9|9
?"?&?*?.?
3 3$3(3,3034383<3
0,1014181<1@1
9$929@9\:
= =$=(=,=0=
3#3(32383@3
; ;$;(;,;0;4;
?"?&?*?.?2?
0#0'0 0/03070
1 1$1(1,10141
? ?$?(?,?0?4?8?<?
0$00050:0
5'545$7=7
00C0R0a0p0
6/73777<7
3#3.373~3
6#6'6 6/63676;6
88a8{8
333333333333333333
33333833
3333339
3333333333333338
:*"*"$3338
3333333
33333333
33333333333
3333333333338
33338?383
333333333333
:*3:"$3338
333333333333333
`.rdata
@.data
.pdata
@.rsrc
COMCTL32.dll
SHLWAPI.dll
SetProcessShutdownParameters
KERNEL32.dll
ADVAPI32.dll
SHELL32.dll
OLEAUT32.dll
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/>
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/>
@.pdata
@.srdata
@.sdata
.data
.rsrc
KWindows
UrlMon
6MsgIDs
Msgs
DDIWideStringCIKeyHandler
DIWideStringCSKeyHandler
DICardinalKeyHandler
Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
shlwapi.dll
SOFTWARE\Microsoft\Windows\CurrentVersion
Software\Microsoft\Windows\CurrentVersion\ProfileReconciliation
RegKey
GetWindowsDirectoryW
RegOpenKeyA
SHFOLDER.dll
dll\shfolder.dbg
Font.Charset
Font.Color
Font.Height
Font.Name
Font.Style
name="JR.Inno.Setup"
version="1.0.0.0"
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
<windowsSettings>
<dpiAware xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
</windowsSettings>
accesskey
http-equiv
onkeydown
onkeypress
onkeyup
burlywood
Invalid ItemSize (%d)
Interface not supported
Cannot cast an interface7Dispatch methods do not support more than 64 parameters
Exception: %s
Cannot Import %s
OLE error %.8x.Method '%s' not supported by automation object/Variant does not reference an automation object
Text exceeds memo capacity/Menu '%s' is already being used by another form
- Dock zone has no controlLError loading dock zone from the stream. Expecting version %d, but found %d.
Error setting %s.Count8Listbox (%s) style must be virtual in order to set Count
Unable to insert a line Clipboard does not support Icons
Error creating window class Cannot focus a disabled or invisible window!Control '%s' has no parent window$Parent given is not a parent of '%s'
$%s not in a class registration group
Property %s does not exist
No help found for %s#No context-sensitive help installed
Unsupported clipboard format
Invalid stream format$''%s'' is not a valid component name
Invalid data type for '%s' List capacity out of bounds (%d)
List count out of bounds (%d)
List index out of bounds (%d) Out of memory while expanding memory stream
Error reading %s%s%s: %s
Failed to get data for '%s'
Resource %s not found
%s.Seek not implemented$Operation not allowed on sorted list
Ancestor for '%s' not found
Cannot assign a %s to a %s
Bits index out of range*Can't write to a read-only resource streamECheckSynchronize called from thread $%x, which is NOT the main thread
Class %s not found
A class named %s already exists%List does not allow duplicates ($0%x)#A component named %s already exists%String list does not allow duplicates
Cannot create file "%s". %s
Cannot open file "%s". %s
Unable to write to %s
Operation not supported
External exception %x
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'"Variant method calls not supported
Invalid variant operation
Invalid NULL variant operation%Invalid variant operation (%s%.8x)
%s5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
Integer overflow Invalid floating point operation
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted(Exception %s in module %s at %p.
!'%s' is not a valid integer value('%s' is not a valid floating point value
'%s' is not a valid date
'%s' is not a valid time!'%s' is not a valid date and time
I/O error %d
n%USERPROFILE%
r%SYSTEMROOT%
5.50.4807.2300
Microsoft(R) Windows (R) 2000 Operating System
Datos de programa%Configuraci
51.51.0.0


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    %original file name%.exe:1696

  2. Delete the original Trojan file.
  3. Delete or disinfect the following files created/modified by the Trojan:

    %Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\tbr_dots.bmp (656 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\24x7_Bundle.bmp (60 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\PCPSTerms.en.rtf (59 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\24x7_EULA.en.rtf (36 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\PCPSBundle.bmp (27 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\AppGraffitiBundle.bmp (601 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\omega.en.rtf (36 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\Inbox.ini (2 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\OVTerms_en.rtf (60 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\IBX_Plus.bmp (318 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\_isetup\_shfoldr.dll (23 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\PCPSLogo.bmp (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\ct2012.bmp (26 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\DownLib.dll (673 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\setupcfg.ini (62 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\OVBundle.bmp (27 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\_isetup\_RegDLL.tmp (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\AppGraffIcon.bmp (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\24x7_Icon.bmp (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\is-DUEQK.tmp\OVLogo.bmp (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\is-HQ0VH.tmp\cb83ea90ac0ee41c0c704d741c7b6e65.tmp (7386 bytes)

  4. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now