Trojan.Generic.6791728_dae78aa27f

by malwarelabrobot on November 15th, 2014 in Malware Descriptions.

HEUR:Trojan.Win32.Generic (Kaspersky), Trojan.Generic.6791728 (B) (Emsisoft), Trojan.Generic.6791728 (AdAware), Trojan.Win32.EyeStye.FD, TrojanEyeStye.YR (Lavasoft MAS)
Behaviour: Trojan


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: dae78aa27f69c52a1ebfae9887ca836b
SHA1: 22f870c7d8192df4397bc79b1672bac5395200af
SHA256: 0af53cb8efa9ca1db2c5ac8ca764ac8a4d6fb217304be036aac77340f641b18c
SSDeep: 3072:l1fCCc96M8yts7I17Y4huX5SOrGN0x2hImqembxBxjmlIo2NhFqRa:89L8yG4hO 0ASigJNhc
Size: 233472 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: MicrosoftVisualCv71EXE, MicrosoftVisualCv70, UPolyXv05_v6
Company: no certificate found
Created at: 2011-10-27 16:51:31
Analyzed on: WindowsXPESX SP3 32-bit


Summary:

Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).

Payload

No specific payload has been found.

Process activity

The Trojan creates the following process(es):

BB0B163CC56.exe:348

The Trojan injects its code into the following process(es):

mscorsvw.exe:1924
winlogon.exe:720
lsass.exe:776
Explorer.EXE:840
svchost.exe:932
svchost.exe:1012
svchost.exe:1100
svchost.exe:1148
svchost.exe:1200
spoolsv.exe:1436
wmiprvse.exe:1868
jqs.exe:1964

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process BB0B163CC56.exe:348 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\winmode.Bin\3A5109739258962 (29 bytes)

Registry activity

The process BB0B163CC56.exe:348 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "01 65 3F 59 E5 58 1D 38 31 16 F0 9B A7 2B 3A 6F"

Dropped PE files

There are no dropped PE files.

HOSTS file anomalies

No changes have been detected.

Rootkit activity

The Trojan installs the following user-mode hooks in WININET.dll:

HttpSendRequestW
InternetReadFileExA
InternetWriteFile
InternetQueryDataAvailable
InternetReadFile
HttpQueryInfoA
HttpSendRequestA
InternetCloseHandle
HttpAddRequestHeadersA
HttpOpenRequestA
InternetQueryOptionA

The Trojan installs the following user-mode hooks in USER32.dll:

TranslateMessage

The Trojan installs the following user-mode hooks in CRYPT32.dll:

PFXImportCertStore

The Trojan installs the following user-mode hooks in ADVAPI32.dll:

CryptEncrypt

The Trojan installs the following user-mode hooks in WS2_32.dll:

send

The Trojan installs the following user-mode hooks in ntdll.dll:

NtVdmControl
ZwSetInformationFile
NtResumeThread
NtQueryDirectoryFile
NtEnumerateValueKey

Propagation

VersionInfo

No information is available.

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 4096 54150 57344 4.89132 ae0f13059df676774821b0ddb6e6f5c2
.rdata 61440 103220 106496 4.79138 bd2399335bcbeaab11058c757e8e1c38
.data 167936 601272 4096 2.60996 d87fdcb16d3e057b1a3275b265367409
.rsrc 770048 57576 61440 4.75267 0b03859825b2454eb1b43ca088ddf9bf

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

URL IP
hxxp://e10088.dscb.akamaiedge.net/
hxxp://www.microsoft.com/ 184.86.40.154


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

ET POLICY Microsoft user-agent automated process response to automated request

Traffic

GET / HTTP/1.1
Host: VVV.microsoft.com
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Cache-Control: no-cache


HTTP/1.1 200 OK
Cache-Control: no-cache
Content-Type: text/html
Last-Modified: Mon, 16 Mar 2009 20:35:26 GMT
Accept-Ranges: bytes
ETag: "67991fbd76a6c91:0"
Server: Microsoft-IIS/8.0
X-Powered-By: ASP.NET
Content-Length: 1020
Date: Fri, 14 Nov 2014 16:01:05 GMT
Connection: keep-alive
X-CCC: US
X-CID: 2
<html><head><title>Microsoft Corporation</title&g
t;<meta http-equiv="X-UA-Compatible" content="IE=EmulateIE7"><
;/meta><meta http-equiv="Content-Type" content="text/html; chars
et=utf-8"></meta><meta name="SearchTitle" content="Microso
ft.com" scheme=""></meta><meta name="Description" content=
"Get product information, support, and news from Microsoft." scheme=""
></meta><meta name="Title" content="Microsoft.com Home Pag
e" scheme=""></meta><meta name="Keywords" content="Microso
ft, product, support, help, training, Office, Windows, software, downl
oad, trial, preview, demo, business, security, update, free, computer
, PC, server, search, download, install, news" scheme=""></meta&
gt;<meta name="SearchDescription" content="Microsoft.com Homepage"
scheme=""></meta></head><body><p>Your curre
nt User-Agent string appears to be from an automated process, if this
is incorrect, please click this link:<a href="hXXp://VVV.microsoft.
com/en/us/default.aspx?redir=true">United States English Microsoft
Homepage</a></p></body></html>....


The Trojan connects to the servers at the folowing location(s):

winlogon.exe_720_rwx_0BAD0000_0004E000:

.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
X X
nspr4.dll
seieapiXX
set_url
Host: %s
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
%d.%d.%d
keys
http:
urlmask
cert
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
%System%\WININET.dll
C:\winmode.Bin\3A5109739258962
%System%\ntdll.dll
%System%\USER32.dll
%System%\CRYPT32.dll
C:\winmode.Bin\BB0B163CC56.exe
C:\winmode.Bin\
BB0B163CC56.exe
w3ukI7Sc3OM.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP6!A8A67A25
config.bin
winmode.Bin
Microsoft Windows
%System%\ADVAPI32.dll
%System%\WS2_32.dll
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
3$3*303\3
6%6U6t6
>)?0?9?[?|?
6)6:6?6\6
>'>.>5>{>
4-444C4T4Y4p4y4}4
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
(GMT %su:u) %s
RapportTanzan36.
RapportKoan.

lsass.exe_776_rwx_0BAD0000_0004E000:

.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
X X
nspr4.dll
seieapiXX
set_url
Host: %s
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
%d.%d.%d
keys
http:
urlmask
cert
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
%System%\WININET.dll
C:\winmode.Bin\3A5109739258962
%System%\ntdll.dll
%System%\USER32.dll
%System%\CRYPT32.dll
C:\winmode.Bin\BB0B163CC56.exe
C:\winmode.Bin\
BB0B163CC56.exe
w3ukI7Sc3OM.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP6!A8A67A25
config.bin
winmode.Bin
Microsoft Windows
%System%\ADVAPI32.dll
%System%\WS2_32.dll
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
3$3*303\3
6%6U6t6
>)?0?9?[?|?
6)6:6?6\6
>'>.>5>{>
4-444C4T4Y4p4y4}4
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
(GMT %su:u) %s
RapportTanzan36.
RapportKoan.

Explorer.EXE_840_rwx_01450000_00002000:

!EYEc:\%original file name%.exe
C:\winmode.Bin\
BB0B163CC56.exe
KY1u78.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP6!A8A67A25
config.bin
winmode.Bin
Microsoft Windows

Explorer.EXE_840_rwx_01E60000_00006000:

.text
`.rdata
@.data
.reloc
PSSSSSSh
Advapi32.dll
guid=%s&ver=%u&ie=%s&os=%u.%u.%u&ut=%s&ccrc=X&md5=%s&plg=%s&plgstat=%s&wake=%u
%s&stat=online
hXXp://VVV.microsoft.com
%s&%s
ntdll.dll
SHLWAPI.dll
GetProcessHeap
KERNEL32.dll
ADVAPI32.dll
customconnector.dll
TakeBotExeMd5Callback
TakeStartExe
TakeUpdateBotExe
Content-Type: application/x-www-form-urlencoded
5.1.2600!XP6!A8A67A25
hXXp://vanilaprojectlive.com/shouter/jsti.php

Explorer.EXE_840_rwx_0BAD0000_0004E000:

.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
X X
nspr4.dll
seieapiXX
set_url
Host: %s
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
%d.%d.%d
keys
http:
urlmask
cert
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
C:\winmode.Bin\3A5109739258962
%System%\ntdll.dll
C:\winmode.Bin\BB0B163CC56.exe
C:\winmode.Bin\
BB0B163CC56.exe
w3ukI7Sc3OM.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP6!A8A67A25
config.bin
winmode.Bin
Microsoft Windows
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
3$3*303\3
6%6U6t6
>)?0?9?[?|?
6)6:6?6\6
>'>.>5>{>
4-444C4T4Y4p4y4}4
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
(GMT %su:u) %s
RapportTanzan36.
RapportKoan.

Explorer.EXE_840_rwx_0BB60000_0005A000:

.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
X X
nspr4.dll
seieapiXX
set_url
Host: %s
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
%d.%d.%d
keys
http:
urlmask
cert
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
%System%\WININET.dll
C:\winmode.Bin\3A5109739258962
%System%\ntdll.dll
%System%\USER32.dll
%System%\CRYPT32.dll
C:\winmode.Bin\BB0B163CC56.exe
C:\winmode.Bin\
BB0B163CC56.exe
w3ukI7Sc3OM.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP6!A8A67A25
config.bin
winmode.Bin
Microsoft Windows
%System%\ADVAPI32.dll
%System%\WS2_32.dll
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
3$3*303\3
6%6U6t6
>)?0?9?[?|?
6)6:6?6\6
>'>.>5>{>
4-444C4T4Y4p4y4}4
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
(GMT %su:u) %s
RapportTanzan36.
RapportKoan.

svchost.exe_932_rwx_0BAD0000_0004E000:

.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
X X
nspr4.dll
seieapiXX
set_url
Host: %s
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
%d.%d.%d
keys
http:
urlmask
cert
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
C:\winmode.Bin\3A5109739258962
%System%\ntdll.dll
C:\winmode.Bin\BB0B163CC56.exe
C:\winmode.Bin\
BB0B163CC56.exe
w3ukI7Sc3OM.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP6!A8A67A25
config.bin
winmode.Bin
Microsoft Windows
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
3$3*303\3
6%6U6t6
>)?0?9?[?|?
6)6:6?6\6
>'>.>5>{>
4-444C4T4Y4p4y4}4
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
(GMT %su:u) %s
RapportTanzan36.
RapportKoan.

svchost.exe_1012_rwx_0BAD0000_0004E000:

.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
X X
nspr4.dll
seieapiXX
set_url
Host: %s
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
%d.%d.%d
keys
http:
urlmask
cert
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
%System%\WININET.dll
C:\winmode.Bin\3A5109739258962
%System%\ntdll.dll
%System%\USER32.dll
%System%\CRYPT32.dll
C:\winmode.Bin\BB0B163CC56.exe
C:\winmode.Bin\
BB0B163CC56.exe
w3ukI7Sc3OM.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP6!A8A67A25
config.bin
winmode.Bin
Microsoft Windows
%System%\ADVAPI32.dll
c:\windows\system32\WS2_32.dll
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
3$3*303\3
6%6U6t6
>)?0?9?[?|?
6)6:6?6\6
>'>.>5>{>
4-444C4T4Y4p4y4}4
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
(GMT %su:u) %s
RapportTanzan36.
RapportKoan.

svchost.exe_1100_rwx_0BAD0000_0004E000:

.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
X X
nspr4.dll
seieapiXX
set_url
Host: %s
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
%d.%d.%d
keys
http:
urlmask
cert
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
%System%\WININET.dll
C:\winmode.Bin\3A5109739258962
%System%\ntdll.dll
%System%\USER32.dll
%System%\CRYPT32.dll
C:\winmode.Bin\BB0B163CC56.exe
C:\winmode.Bin\
BB0B163CC56.exe
w3ukI7Sc3OM.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP6!A8A67A25
config.bin
winmode.Bin
Microsoft Windows
%System%\ADVAPI32.dll
c:\windows\system32\WS2_32.dll
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
3$3*303\3
6%6U6t6
>)?0?9?[?|?
6)6:6?6\6
>'>.>5>{>
4-444C4T4Y4p4y4}4
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
(GMT %su:u) %s
RapportTanzan36.
RapportKoan.

svchost.exe_1148_rwx_0BAD0000_0004E000:

.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
X X
nspr4.dll
seieapiXX
set_url
Host: %s
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
%d.%d.%d
keys
http:
urlmask
cert
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
%System%\WININET.dll
C:\winmode.Bin\3A5109739258962
%System%\ntdll.dll
%System%\USER32.dll
%System%\CRYPT32.dll
C:\winmode.Bin\BB0B163CC56.exe
C:\winmode.Bin\
BB0B163CC56.exe
w3ukI7Sc3OM.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP6!A8A67A25
config.bin
winmode.Bin
Microsoft Windows
%System%\ADVAPI32.dll
c:\windows\system32\WS2_32.dll
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
3$3*303\3
6%6U6t6
>)?0?9?[?|?
6)6:6?6\6
>'>.>5>{>
4-444C4T4Y4p4y4}4
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
(GMT %su:u) %s
RapportTanzan36.
RapportKoan.

svchost.exe_1200_rwx_0BAD0000_0004E000:

.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
X X
nspr4.dll
seieapiXX
set_url
Host: %s
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
%d.%d.%d
keys
http:
urlmask
cert
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
C:\winmode.Bin\3A5109739258962
%System%\ntdll.dll
C:\winmode.Bin\BB0B163CC56.exe
C:\winmode.Bin\
BB0B163CC56.exe
w3ukI7Sc3OM.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP6!A8A67A25
config.bin
winmode.Bin
Microsoft Windows
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
3$3*303\3
6%6U6t6
>)?0?9?[?|?
6)6:6?6\6
>'>.>5>{>
4-444C4T4Y4p4y4}4
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
(GMT %su:u) %s
RapportTanzan36.
RapportKoan.

spoolsv.exe_1436_rwx_0BAD0000_0004E000:

.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
X X
nspr4.dll
seieapiXX
set_url
Host: %s
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
%d.%d.%d
keys
http:
urlmask
cert
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
%System%\WININET.dll
C:\winmode.Bin\3A5109739258962
%System%\ntdll.dll
%System%\USER32.dll
%System%\CRYPT32.dll
C:\winmode.Bin\BB0B163CC56.exe
C:\winmode.Bin\
BB0B163CC56.exe
w3ukI7Sc3OM.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP6!A8A67A25
config.bin
winmode.Bin
Microsoft Windows
%System%\ADVAPI32.dll
%System%\WS2_32.dll
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
3$3*303\3
6%6U6t6
>)?0?9?[?|?
6)6:6?6\6
>'>.>5>{>
4-444C4T4Y4p4y4}4
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
(GMT %su:u) %s
RapportTanzan36.
RapportKoan.

wmiprvse.exe_1868_rwx_0BAD0000_0004E000:

.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
X X
nspr4.dll
seieapiXX
set_url
Host: %s
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
%d.%d.%d
keys
http:
urlmask
cert
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
%System%\WININET.dll
C:\winmode.Bin\3A5109739258962
%System%\ntdll.dll
%System%\USER32.dll
%System%\CRYPT32.dll
C:\winmode.Bin\BB0B163CC56.exe
C:\winmode.Bin\
BB0B163CC56.exe
w3ukI7Sc3OM.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP6!A8A67A25
config.bin
winmode.Bin
Microsoft Windows
%System%\ADVAPI32.dll
%System%\WS2_32.dll
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
3$3*303\3
6%6U6t6
>)?0?9?[?|?
6)6:6?6\6
>'>.>5>{>
4-444C4T4Y4p4y4}4
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
(GMT %su:u) %s
RapportTanzan36.
RapportKoan.

mscorsvw.exe_1924_rwx_0BAD0000_0004E000:

.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
X X
nspr4.dll
seieapiXX
set_url
Host: %s
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
%d.%d.%d
keys
http:
urlmask
cert
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
%System%\WININET.dll
C:\winmode.Bin\3A5109739258962
%System%\ntdll.dll
%System%\USER32.dll
%System%\CRYPT32.dll
C:\winmode.Bin\BB0B163CC56.exe
C:\winmode.Bin\
BB0B163CC56.exe
w3ukI7Sc3OM.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP6!A8A67A25
config.bin
winmode.Bin
Microsoft Windows
%System%\ADVAPI32.dll
%System%\WS2_32.dll
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
3$3*303\3
6%6U6t6
>)?0?9?[?|?
6)6:6?6\6
>'>.>5>{>
4-444C4T4Y4p4y4}4
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
(GMT %su:u) %s
RapportTanzan36.
RapportKoan.

jqs.exe_1964_rwx_0BAD0000_0004E000:

.text
.reloc
`.data
.rsrc
KERNEL32.dll
USER32.dll
SHELL32.dll
systray.pdb
explorer.exe
threadmetadata!nfo%d
\\.\pipe\globpluginsuninstallpipe
XX
SOFTWARE\Microsoft Windows
u.u.u u:u:u.u
Content-Length: %u
HTTP/
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
cookies-nontor.xml
cookies.txt
sessionstore.js
sessionstore.bak
cookies.sqlite-journal
cookies.sqlite
GdiplusShutdown
\\.\pipe\processingpipe_
\\.\pipe\globpluginspipe
Global\%s
\\.\pipe\globgatepipe
user_pref("browser.safebrowsing.enabled", false);
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("security.warn_entering_weak", false);
user_pref("security.warn_entering_weak.show_once", false);
user_pref("security.warn_viewing_mixed", false);
user_pref("security.warn_viewing_mixed.show_once", false);
user_pref("privacy.clearOnShutdown.cookies", false);
user_pref("privacy.clearOnShutdown.sessions", false);
X X
nspr4.dll
seieapiXX
set_url
Host: %s
/Mozilla/Firefox/profiles.ini
/Mozilla/Firefox/
%d.%d.%d
keys
http:
urlmask
cert
rapport
%s\Content.IE5\0
%s\Content.IE5\%s
\Content.IE5\*.*
[ERROR] : Cannot dump file (%u bytes) { %s }
r = %s
%s%s&rep=%s
tid=%u&stat=
[ERROR] : dwErr == %u ( Config is damaged )
[ERROR] : dwErr == %u ( Could be invalid encryption key )
[ERROR] : dwErr == %u
%d-%d-%d
Global\X
%s%s%s
opera
wlcomm.exe
msmsgs.exe
msnmsgr.exe
HttpSendRequestA
HttpSendRequestW
hXXp://
hXXps://
Content-Type: application/x-www-form-urlencoded
HTTP/1.
.mpeg
.jpeg
chrome
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\%d
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\%d
ProxyHttp1.1
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
EnableHttp1_1
1.2.4
w SSh
t.VPW
FVSSh
.exeW
FTPQ
%System%\WININET.dll
C:\winmode.Bin\3A5109739258962
%System%\ntdll.dll
%System%\USER32.dll
%System%\CRYPT32.dll
C:\winmode.Bin\BB0B163CC56.exe
C:\winmode.Bin\
BB0B163CC56.exe
w3ukI7Sc3OM.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
5.1.2600!XP6!A8A67A25
config.bin
winmode.Bin
Microsoft Windows
%System%\ADVAPI32.dll
%System%\WS2_32.dll
PFXExportCertStoreEx
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
CertGetCertificateContextProperty
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertNameToStrA
CertEnumCertificatesInStore
CertOpenSystemStoreA
CRYPT32.dll
ntdll.dll
WS2_32.dll
FindCloseUrlCache
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
HttpAddRequestHeadersA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
WININET.dll
SHLWAPI.dll
MSIMG32.dll
urlmon.dll
GetProcessHeap
WaitNamedPipeA
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
GetWindowsDirectoryA
GetKeyboardState
MsgWaitForMultipleObjects
EnumWindows
GetKeyState
GDI32.dll
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
CryptDestroyKey
CryptGetKeyParam
CryptGetUserKey
ADVAPI32.dll
ole32.dll
3$3*303\3
6%6U6t6
>)?0?9?[?|?
6)6:6?6\6
>'>.>5>{>
4-444C4T4Y4p4y4}4
Systray .exe stub
5.2.3790.1830 (srv03_sp1_rtm.050324-1447)
systray.exe
Windows
Operating System
5.2.3790.1830
\prefs.js
(GMT %su:u) %s
RapportTanzan36.
RapportKoan.


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Scan a system with an anti-rootkit tool.
  2. Terminate malicious process(es) (How to End a Process With the Task Manager):

    BB0B163CC56.exe:348

  3. Delete the original Trojan file.
  4. Delete or disinfect the following files created/modified by the Trojan:

    C:\winmode.Bin\3A5109739258962 (29 bytes)

  5. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  6. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now