Trojan.GenericKDZ.14183_dc8f4e8b3a

by malwarelabrobot on August 10th, 2014 in Malware Descriptions.

Trojan.MSIL.Disfa.boi (Kaspersky), Trojan.GenericKDZ.14183 (AdAware), Backdoor.Win32.PcClient.FD, Installer.Win32.InnoSetup.FD, Installer.Win32.InnoSetup.2.FD, InstallerInnoSetup.YR (Lavasoft MAS)
Behaviour: Trojan, Backdoor, Installer


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: dc8f4e8b3af57876ff85e0564517ec1c
SHA1: 55a28907eff979f2c0ad473e374ad64eeecb2067
SHA256: 98878c911bc1f7f40851c0a6bc3a02473a9e65e6bfffb884771e49288da181c9
SSDeep: 196608:a5UvLud3B0NShtFhhXMGpyRvTheFh5l0XzAvOS/nLoB3 huzKym:aELudx6SjFhhXMayBNejwSz6uuX
Size: 9938432 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: Popeler
Created at: 2014-08-03 19:30:33
Analyzed on: WindowsXP SP3 32-bit


Summary:

Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).

Payload

No specific payload has been found.

Process activity

The Trojan creates the following process(es):

CheatEngine64.exe:680
netsh.exe:1516
%original file name%.exe:1784

The Trojan injects its code into the following process(es):

RunDll32.exe:1356
CheatEngine64.tmp:524
avast.exe:1676

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process CheatEngine64.exe:680 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\is-HRLDQ.tmp\CheatEngine64.tmp (3782 bytes)

The process RunDll32.exe:1356 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%System%\wbem\Logs\wbemprox.log (1405 bytes)

The process CheatEngine64.tmp:524 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\is-KGQEJ.tmp\_isetup\_RegDLL.tmp (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-KGQEJ.tmp\_isetup\_shfoldr.dll (23 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\is-KGQEJ.tmp\OCSetupHlp.dll (5873 bytes)

The process avast.exe:1676 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Start Menu\Programs\Startup\af029b7100cbb27d8c0472b97315e8d5.exe (672 bytes)

The process %original file name%.exe:1784 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\avast.exe (157 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\CheatEngine64.exe (69015 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\autB3.tmp (72241 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\autB2.tmp (980 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\autB3.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\autB2.tmp (0 bytes)

Registry activity

The process CheatEngine64.exe:680 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2E 76 A7 79 53 4A CA F1 87 22 95 45 82 50 58 6E"

The process netsh.exe:1516 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy\traceIdentifier]
"Guid" = "5f31090b-d990-4e91-b16d-46121d0255aa"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent]
"Active" = "1"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil\traceIdentifier]
"Guid" = "8aefce96-4618-42ff-a057-3536aa78233e"

[HKLM\SOFTWARE\Microsoft\Tracing\FWCFG]
"MaxFileSize" = "1048576"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh]
"ControlFlags" = "1"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent]
"ControlFlags" = "1"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh]
"Active" = "1"

[HKLM\SOFTWARE\Microsoft\Tracing\FWCFG]
"ConsoleTracingMask" = "4294901760"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\Napmontr]
"BitNames" = " NAP_TRACE_BASE NAP_TRACE_NETSH"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy]
"Active" = "1"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg]
"Active" = "1"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg]
"ControlFlags" = "1"

[HKLM\SOFTWARE\Microsoft\Tracing\FWCFG]
"EnableFileTracing" = "0"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg]
"LogSessionName" = "stdout"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\Napmontr]
"Guid" = "710adbf0-ce88-40b4-a50d-231ada6593f0"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil]
"Active" = "1"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy]
"LogSessionName" = "stdout"
"ControlFlags" = "1"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent\traceIdentifier]
"Guid" = "b0278a28-76f1-4e15-b1df-14b209a12613"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg\traceIdentifier]
"Guid" = "5f31090b-d990-4e91-b16d-46121d0255aa"

[HKLM\SOFTWARE\Microsoft\Tracing\FWCFG]
"EnableConsoleTracing" = "0"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "03 38 44 80 E9 76 76 71 22 4D 66 05 8B C8 F9 0E"

[HKLM\SOFTWARE\Microsoft\Tracing\FWCFG]
"FileDirectory" = "%windir%\tracing"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil]
"LogSessionName" = "stdout"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent]
"LogSessionName" = "stdout"

[HKLM\SOFTWARE\Microsoft\Tracing\FWCFG]
"FileTracingMask" = "4294901760"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh]
"LogSessionName" = "stdout"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil]
"ControlFlags" = "1"

Adds a rule to the firewall Windows which allows any network activity:

[HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\%Documents and Settings%\%current user%\Local Settings\Temp]
"Avast.exe" = "%Documents and Settings%\%current user%\Local Settings\Temp\avast.exe:*:Enabled:avast.exe"

The process RunDll32.exe:1356 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F8 B0 08 59 7D 30 41 94 06 AA D4 2F E7 BB 66 58"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"

[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 16 00 00 00 01 00 00 00 00 00 00 00"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"

Proxy settings are disabled:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"

The Trojan deletes the following value(s) in system registry:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"

The process CheatEngine64.tmp:524 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "79 3E 06 8C 61 2C 8A 73 00 B0 CF 96 5E 18 41 72"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Programs" = "%Documents and Settings%\%current user%\Start Menu\Programs"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

The process avast.exe:1676 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "7D 47 D0 10 1C 94 09 92 CE 7D FB E4 3D CF 0C 87"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Startup" = "%Documents and Settings%\%current user%\Start Menu\Programs\Startup"

"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"

To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"af029b7100cbb27d8c0472b97315e8d5" = "%Documents and Settings%\%current user%\Local Settings\Temp\avast.exe .."

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"af029b7100cbb27d8c0472b97315e8d5" = "%Documents and Settings%\%current user%\Local Settings\Temp\avast.exe .."

The process %original file name%.exe:1784 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EE 6E D4 AE F3 B5 78 49 F6 BA 47 B1 56 53 BF BB"

Dropped PE files

MD5 File path
58e286356ed95579127915341d05544a c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\CheatEngine64.exe
e748ac33aaf4d5bcb2df7d35698c1308 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\avast.exe
8d88c3e4029d2413fc1566fd149209e5 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\is-HRLDQ.tmp\CheatEngine64.tmp
dd30ea676e597d0e76503634c6d72e0b c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\is-KGQEJ.tmp\OCSetupHlp.dll
0ee914c6f0bb93996c75941e1ad629c6 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\is-KGQEJ.tmp\_isetup\_RegDLL.tmp
92dc6ef532fbb4a5c3201469a5b5eb63 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\is-KGQEJ.tmp\_isetup\_shfoldr.dll
e748ac33aaf4d5bcb2df7d35698c1308 c:\Documents and Settings\"%CurrentUserName%"\Start Menu\Programs\Startup\af029b7100cbb27d8c0472b97315e8d5.exe

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

VersionInfo

Company Name:
Product Name:
Product Version:
Legal Copyright:
Legal Trademarks:
Original Filename:
Internal Name:
File Version:
File Description:
Comments:
Language: Language Neutral

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 4096 570703 570880 4.63051 f437a6545e938612764dbb0a314376fc
.rdata 577536 183362 183808 3.99959 827ffd24759e8e420890ecf164be989e
.data 761856 40276 25088 1.38816 e0a519f8e3a35fae0d9c2cfd5a4bacfc
.rsrc 802816 9114868 9115136 5.54484 b4dec318e4133947b7abea6560183ef6
.reloc 9920512 42100 42496 3.63585 0bc98f8631ef0bde830a7f83bb06ff08

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

URL IP
hxxp://api.opencandy.com/?bn=3&bv=6.00.2900.5512&clientv=101&cltzone=180&csk=10635001756779498204-09355024612820087077&language=en,en&method=get_offers&mstime=0.625&num_offers=2&os=WIN5.1SP3&product_key=77b4f7b47c1bad6ecdbc504a5e1dccbd&tm=2014-08-09 06:29:27.275&v=1.0&signature=61dccb74eba4cd3e22681aa2c4170cd9 204.232.180.209
hxxp://s3-1-w.amazonaws.com/templates/3212/0/57518.png
hxxp://s3-1-w.amazonaws.com/templates/7624/0/53944.png
hxxp://media.opencandy.com/templates/3212/0/57518.png 54.231.10.201
hxxp://media.opencandy.com/templates/7624/0/53944.png 54.231.10.201
dragon-black.ddns.net 37.236.160.51


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

ET MALWARE W32/OpenCandy Adware Checkin

Traffic

<font color="red">GET /templates/7624/0/53944.png HTTP/1.1<br>
Accept: */*<br>
Host: media.opencandy.com<br>
Connection: Keep-Alive<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
x-amz-id-2: 5Q9LoZrMkLuRF7kYErwhyYFLhwd2Vmc0VEAGBy3XwYOBJyWE6S3x4KRNCrFNj3qG gqnJcmV4dg=<br>
x-amz-request-id: 501E0EED45B0F769<br>
Date: Sat, 09 Aug 2014 11:28:11 GMT<br>
Cache-Control: max-age=300<br>
Last-Modified: Wed, 06 Aug 2014 00:24:04 GMT<br>
ETag: "7b08d16f1b20748f9a5b26c7a442fe05"<br>
Accept-Ranges: bytes<br>
Content-Type: image/png<br>
Content-Length: 24627<br>
Server: AmazonS3<br><pre>.PNG........IHDR.......S.....k.F... .IDATx...y\.e........DgN.&*".2"2..<br>R.h~\*..Q.%g..k.M........C.S.d|\BCcpK.....qA.....="..r~..;.s8..Y.f....<br>..C........./......`0..B.!.f\.:.!...a#...B..1Y\..B....*..Bh..^\..<.<br>......u.J...o.QQQ.......:._._..r..:...........pj?......Y..^.z.....tt..<br>..K.RVV..sAA.^^^....ns..a......?...DEE1{.lm...).......:u...?.V{..F.v..<br>.?q......K~~~..[.|y.q...";;..1..{}[.W.W.>}j9..3....9...p|}}...f...\<br>.r.....b...dee...EHHH.b.r.B.s.........7..........s.=.w.}W...Z.`....j..<br>u.........9q..>>>....u...W.)S...?...-Z.............9s.t.R....<br>.e....8p.m..q...F..Abb..E...={...l._.....IOO...T..u......E........I...<br>.o..7..t...........`0`0...wo].....<z..IAA..7n$??..;v...M..=8|..S.Y.<br>............'O:...sP.\k. ..._..W..m...'...o0...Y...CS...o.v.Z~...p..E.<br>....._~......Q..8...........i..1.W..u..xzz2y.d......_.M.....t.n...S.r.<br>.][email protected]!K..o....t.....p.6m..i..>}..v.......~~~.........K..{...<br>...........cdgg3x.`.z=z....h.....w..o..6.........ew`......7._~..j.....<br>...___..m....)  S.......L1..q..]..q..^^^..9S5&[.g.i.N.:U.KgsU......U..<br>...g..qxyy1t.P.>..C......aaaL.:.???...T....\m....c....?..a....o_.t.<br>.#.<.....0`.o..6/......N.n..1..1;;....S.N...V;WG..j..`..........;w.<br>b..}...7n.q..|........U 6o.....y;.k..........1c.~~~DEEq..i.......G..].<br>...l_g.5j....X.].d....L.>...{..i4.......ol....s...../....?....o.i&l<br>t;{...06i.Dq.....1.F...K.......w......../.......7......c.....M...w.6.i<br>.Z.z..Q.F.G.}.x..A...../...q...F........9c.......c...b5.....=k4...A...<br>.....g.~W.\itss3>....K....y..#`.=z.......o.U.a..=6....K.x...133</pre><<< skipped >>></font><br><br
<font color="red">GET /?bn=3&bv=6.00.2900.5512&clientv=101&cltzone=180&csk=10635001756779498204-09355024612820087077&language=en,en&method=get_offers&mstime=0.625&num_offers=2&os=WIN5.1SP3&product_key=77b4f7b47c1bad6ecdbc504a5e1dccbd&tm=2014-08-09 06:29:27.275&v=1.0&signature=61dccb74eba4cd3e22681aa2c4170cd9 HTTP/1.1<br>
Accept: */*<br>
Cache-Control: no-cache<br>
Pragma: no-cache<br>
Accept-Encoding: gzip<br>
Host: api.opencandy.com<br>
Connection: Keep-Alive<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
Date: Sat, 09 Aug 2014 11:28:08 GMT<br>
Server: Apache<br>
X-Robots-Tag: noindex<br>
Last-Modified: Sat, 09 Aug 2014 11:28:08 GMT<br>
Cache-Control: no-store, no-cache, must-revalidate<br>
Cache-Control: post-check=0, pre-check=0<br>
Pragma: no-cache<br>
Connection: close<br>
Transfer-Encoding: chunked<br>
Content-Type: text/xml<br><pre>2000..<?xml version="1.0"?>.<get_offers>.    <installer<br>_md5s>.        <md5>0</md5>.    </installer_md5s><br>.    <session_key>22e316b3346893e60f2ce1bc391b907b</session_k<br>ey><session_key>2d87c460c54937ffc1370aeedd81e785</session_<br>key>.    <product_name><![CDATA[Cheat Engine]]></pro<br>duct_name>.    <data encoding="gzip"><![CDATA[H4sIAAAAAAAA<br>A 19eXPiSNL33 OI Q5aR8wzER3m0IEQs7Y7MOBuYsCwgLun3/WGQ0gFaCwkrSR87MZ 9z<br>erdB AOOw prQ7bhCqqsyqrDwqf1U6N2czZDOaenEqVavSKaMZjisbCrrHt2pig4N7umzM<br>V/IcXZwi45SR1Udku5qDbPIMy/LC6SVzwvjXuSEv0eX53/7ZajcnzX/2NONhZb8wY3mGrj<br>VDhcYmpqlPZftf/7o8r5CHo7KOYtroUirzZ/DfecX7Gv2MnhV95Wim4TCuPHcuThXZvXeQ<br>bCuLM/xxYS6RBYSeMpVYqZmmu8h2GNmydA1BqVPmAb2Qf OPWbLyAGXvV7Z uXBd67dKRV<br>GNsmkhQ5EN9aWsmMuKVWGrfKNCeknXodaKqi/L6BmdV Lls7Uu1dqlOq3XpqpaE UZJwqC<br>JNWrAqfWVbmO2OlUUqI68NPZOoAR5Gj/QZd8VeAbXPR4 EO2jAudfQ8DhnvtMiqRuH1y7r<br>gvUMPlubbEPzrmylYQg8fm4lRbzh1bOQ26ZIlUTU51iouWli67yKlgGapUK0RuypYxP6/E<br>a4T2/YYiOqeyYYAkuZqrx6Sm6/Uvs0V6EoUzdarIUWzNcgnnQc0jBBQvEVSlMtMXprVAss<br>t0jLlmoHiV8bIn52SSgKC5rmbMHcaSHQe 6UhxEcwA116BxCmm4Umjdxs WLItu6Z9cfr3<br>Uya8bdlopj1fnFYGrdbHTuv3MXy8hNEykH7508lP PJGwe/ pazBnCN3vE4MR4TBI35xKt<br>TZM46rnjKW6WiY3ovT6hl8NUx7Keuk4Mw2l97dyiXz04lf/6Y6ee65nqiSlc7Yal6tvAit<br>i6eMa2vzOcjTxSnpLGdhPhm/ycbLb/jTmcf byC3ye8s99tCU6H3HjVHm rQ9EzWHXR6ef<br>ITs/nyJeuyIDe1BDdANMtKa7gRviY3sfHfOObVZ7aWHHK2kcdQ9YxrNDbwg mN OFS/LEH<br>85PHS8DFc5yBsxzi43THiAApJvPk5Nybyu7lqNnuDq5uJ5PBzZhp3rSZycdRp8OQCXY1 K<br>MzPq8Ej54wqcube8QC8kTCPa3nKaBTZvJiwdeRrGrmKaOimbzSXfwkC8TJU8c1rblt</pre><<< skipped >>></font><br><br
<font color="red">GET /templates/3212/0/57518.png HTTP/1.1<br>
Accept: */*<br>
Host: media.opencandy.com<br>
Connection: Keep-Alive<br>
<br>
</font><br><font color="blue">HTTP/1.1 200 OK<br>
x-amz-id-2: pkqwg6J6MexGTIOpEsPObhjq5FTqSxvweHu0eljv/2rqc9FQrwvpRoy4sp9Gr9uQ/p897MJGRE0=<br>
x-amz-request-id: F1E3D2216EB6F6EE<br>
Date: Sat, 09 Aug 2014 11:28:11 GMT<br>
Cache-Control: max-age=300<br>
Last-Modified: Tue, 05 Aug 2014 22:21:03 GMT<br>
ETag: "6b7a4d11b634b6499835270e53e223a2"<br>
Accept-Ranges: bytes<br>
Content-Type: image/png<br>
Content-Length: 18330<br>
Server: AmazonS3<br><pre>.PNG........IHDR.......;........8.. .IDATx...{\T......Hxa.h..(..."AH..<br>(.!.^.F /......G...%.L...DM.`&D...".q.!.""..J4)...:...2...0.V.~...O.g.<br>.....yf..x.JKK.....$c........0....I.....HbL.DDD.cr%""... .....\...$..J<br>DD$1&W""".1....I.o.\........a<T.....kW...;v.....v..C.....M..z....d.<br>:.|||..^2111....;vls.."yxx`........;.".............Rv)...(...5w.-.....<br>....."(..........o...5..&L......G..............\... ..."--....@xx8z...<br>.X.r%...acc....h4...."((.r.....HMM..V_VV......K..0x<.X.l.....P(...7<br>o.:u..N.:a....>}}}1t.P..r,\.........<==Q\\lP..X........J..\...PT<br>UU....\.;;;(.Jdddh.-6'........DRR.Dg........._..s[x..yX.h.N.8.........<br>.%K..cG..q....GAA.,[email protected]^^....p..y...!!!....pvvFaa!"<br>##q..%.m..?...z......bcc.k..........6l..m............8x. bcc..j.....GV<br>V..._..F..........o7..X,5.FDD ??.........s.N$%%..............#.....;rs<br>s.<=...6..m....#44....Bhh([email protected]..???(.J........$....;v.<br>.........,]..VVV.....|.Ml..]g[}...h..}.m........p...i..<x..G....5..<br>[email protected]*.........<x0.....gO..j....dgg......'''xzz..\]].V.q..i.<br>.3F{......9...aaa..7n..!..5L..*........u.......h.....{..!**J..G.>.,<br>.........0..1Cp[m.....0..{...add.....;..5...vkm....?7.F,....:...U ....<br>wajjj.........~.....""2.C..........v..._..U{.u..u......k.........}....<br>...#//......c.....j.*..u...MCXX.rss.....[7.:uJ4V......i.&\.|Y.._.~..e.<br>.j5....u.V...J.b.c.......8...#77.g.....X..'O..R..l>DD.'.^..|.Z.g..p<br>wwGPP.<<<.v.Z......?Faa!z......#,,....8|.p..T*.........W.....<br>..........q..e...../[email protected]....?k..d.x.........7*  1d..DGG..</pre><<< skipped >>></font><br><br

The Trojan connects to the servers at the folowing location(s):

CheatEngine64.exe_680:

.idata
.rdata
P.reloc
P.rsrc
kernel32.dll
.DEFAULT\Control Panel\International
File I/O error %d
lzmadecompsmall: Compressed data is corrupted (%d)
lzmadecompsmall: %s
LzmaDecode failed (%d)
shell32.dll
/SL5="$%x,%d,%d,
Inno Setup Setup Data (5.3.10)
Inno Setup Messages (5.1.11)
user32.dll
oleaut32.dll
advapi32.dll
RegOpenKeyExA
RegCloseKey
GetWindowsDirectoryA
MsgWaitForMultipleObjects
ExitWindowsEx
comctl32.dll
name="JR.Inno.Setup"
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
<windowsSettings>
<dpiAware xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
</windowsSettings>
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/>
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/>
!'%s' is not a valid integer value('%s' is not a valid floating point value
'%s' is not a valid date
'%s' is not a valid time!'%s' is not a valid date and time
I/O error %d
Integer overflow Invalid floating point operation
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted%Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'
Invalid variant operation"Variant method calls not supported
External exception %x
6.4.0.5

CheatEngine64.tmp_524:

.idata
.rdata
P.reloc
P.rsrc
kernel32.dll
%s_%d
EInvalidOperation
TKeyEvent
TKeyPressEvent
crSQLWait
t.HtR
EInvalidGraphicOperation
TWindowState
poProportional
KeyPreview
WindowState
OnKeyDown
OnKeyPress
OnKeyUp
CTL3D32.DLL
PasswordChar
ssHorizontal
OnKeyUpheB
RegDeleteKeyExA
advapi32.dll
.DEFAULT\Control Panel\International
user32.dll
shlwapi.dll
TPSExec
TPSRuntimeClassImporter
TPSExportedVar
Cannot Import
Interface not supported
Uh.oD
TPSCustomDebugExec
TPSDebugExec
uxtheme.dll
oleacc.dll
RICHED20.DLL
RICHED32.DLL
File I/O error %d
Messages file "%s" is missing. Please correct the problem or obtain a new copy of the program.
shell32.dll
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_PERFORMANCE_DATA
HKEY_CURRENT_CONFIG
HKEY_DYN_DATA
WININIT.INI
t.Htb
Software\Microsoft\Windows\CurrentVersion\SharedDLLs
RegCreateKeyEx
RegOpenKeyEx
sfc.dll
cmd.exe" /C "
COMMAND.COM" /C
PendingFileRenameOperations
PendingFileRenameOperations2
Software\Microsoft\Windows\CurrentVersion\Fonts
Software\Microsoft\Windows NT\CurrentVersion\Fonts
OLEAUT32.DLL
Uh.jE
Log opened. (Time zone: UTC%s%.2u:%.2u)
%s Log %s #%.3u.txt
MsgWaitForMultipleObjects
regsvr32.exe"
Spawning _RegDLL.tmp
_isetup\_RegDLL.tmp
_RegDLL.tmp %u %u
REGDLL failed with exit code 0x%x
REGDLL mutex wait failed (%d, %d)
REGDLL returned unknown result code %d
Cannot register 64-bit DLLs on this version of Windows
HELPER_EXE_AMD64
Cannot utilize 64-bit features on this version of Windows
64-bit helper EXE wasn't extracted
\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x
CreateNamedPipe
SetNamedPipeHandleState
helper %d 0x%x
Helper process PID: %u
Stopping 64-bit helper process. (PID: %u)
Helper process exited with failure code: 0x%x
TransactNamedPipe
TransactNamedPipe/GetOverlappedResult
Helper: Command did not execute
SOFTWARE\Microsoft\.NETFramework
.NET Framework not found
SOFTWARE\Microsoft\.NETFramework\Policy\v4.0
v4.0.30319
SOFTWARE\Microsoft\.NETFramework\Policy\v2.0
v2.0.50727
SOFTWARE\Microsoft\.NETFramework\Policy\v1.1
v1.1.4322
.NET Framework version %s not found
Fusion.dll
Failed to load .NET Framework DLL "%s"
Failed to get address of .NET Framework CreateAssemblyCache function
.NET Framework CreateAssemblyCache function failed
MoveFileEx failed (%d).
Deleting directory: %s
Failed to delete directory (%d). Will retry later.
Failed to delete directory (%d). Will delete on restart (if empty).
Failed to delete directory (%d).
Deleting file: %s
Failed to delete the file; it may be in use (%d).
ExtractRecData: Unicode data unsupported by this build
The file appears to be in use (%d). Will delete on restart.
Decrementing shared count (%d-bit): %s
Unregistering 64-bit DLL/OCX: %s
Unregistering 32-bit DLL/OCX: %s
Not unregistering DLL/OCX again: %s
Unregistering 64-bit type library: %s
Unregistering 32-bit type library: %s
Uninstalling from GAC: %s
Running Exec filename:
Running Exec parameters:
CreateProcess failed (%d).
Process exit code: %u
Running ShellExec filename:
Running ShellExec parameters:
ShellExecuteEx failed (%d).
Skipping RunOnceId "%s" filename: %s
Unregistering font: %s
zlib: Internal error. Code %d
1.2.1
bzlib: Internal error. Code %d
lzmadecomp: %s
lzmadecomp: Compressed data is corrupted (%d)
DecodeToBuf failed (%d)
TPasswordEdit
TPasswordEdit
PasswordEdit(
Password
c:\directory
Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
PasswordPage
PasswordLabel
PasswordEdit
PasswordEditLabel$
Could not find page with ID %d
Software\Microsoft\Windows\CurrentVersion\Uninstall
%s\%s_is1
CheckPassword
PrepareToInstall failed: %s
Need to restart Windows? %s
/:*?"<>|
\/:*?"<>|
%s-%d.bin
%s-%d%s.bin
..\DISK%d\
Asking user for new disk containing "%s".
Cannot read an encrypted file before the key has been set
LoggedMsgBox returned an unexpected value. Assuming Abort.
Software\Microsoft\Windows\CurrentVersion\Uninstall\
5.4.0 (a)
URLInfoAbout
URLUpdateInfo
Creating directory: %s
Setting permissions on directory: %s
Failed to set permissions on directory (%d).
Setting NTFS compression on directory: %s
Unsetting NTFS compression on directory: %s
Failed to set NTFS compression state (%d).
IMsg
Failed to set value in Fonts registry key.
Failed to open Fonts registry key.
Setting permissions on file: %s
Failed to set permissions on file (%d).
Setting NTFS compression on file: %s
Unsetting NTFS compression on file: %s
Dest filename: %s
Dest file is protected by Windows File Protection.
Time stamp of our file: %s
Time stamp of existing file: %s
Version of our file: %u.%u.%u.%u
Version of existing file: %u.%u.%u.%u
Existing file is protected by Windows File Protection. Skipping.
Uninstaller requires administrator: %s
The existing file appears to be in use (%d). Will replace on restart.
The existing file appears to be in use (%d). Retrying.
Registering file as a font ("%s")
Cannot install files to 64-bit locations on this version of Windows
desktop.ini
.ShellClassInfo
{0AFACED1-E828-11D1-9187-B532F1E9575D}
target.lnk
Filename: %s
Desktop.ini
Software\Microsoft\Windows\CurrentVersion\App Paths\
Setting permissions on registry key: %s\%s
Could not set permissions on the registry key because it currently does not exist.
Failed to set permissions on registry key (%d).
Cannot access 64-bit registry keys on this version of Windows
Registration executable created: %s
Software\Microsoft\Windows\CurrentVersion\RunOnce
Registering 64-bit DLL/OCX: %s
Registering 32-bit DLL/OCX: %s
Registering 64-bit type library: %s
Registering 32-bit type library: %s
Directory for uninstall files: %s
Will append to existing uninstall log: %s
Will overwrite existing uninstall log: %s
Creating new uninstall log: %s
LoggedMsgBox returned an unexpected value. Assuming Cancel.
Fatal exception during installation process (%s):
ExtractTemporaryFile: The file "%s" was not found
Invalid symbol '%s' found
Invalid token '%s' found
QuerySpawnServer: Unexpected response: $%x
CallSpawnServer: Unexpected response: $%x
CallSpawnServer: Unexpected status: %d
ShellExecuteEx
ShellExecuteEx returned hProcess=0
Wnd=$%x
FormKeyDown
PasswordCheckHash
Expression error '%s'
Cannot evaluate "%s" constant during Uninstall
Cannot access a 64-bit key in a "reg" constant on this version of Windows
Unknown custom message name "%s" in "cm" constant
srcexe
Cannot expand "pf64" constant on this version of Windows
Cannot expand "cf64" constant on this version of Windows
uninstallexe
Cannot expand "dotnet2064" constant on this version of Windows
Cannot expand "dotnet4064" constant on this version of Windows
Failed to expand shell folder constant "%s"
Unknown constant "%s"
Software\Microsoft\Windows\CurrentVersion
SOFTWARE\Microsoft\Windows NT\CurrentVersion
cmd.exe
COMMAND.COM
\_RegDLL.tmp
REGDLL_EXE
\_setup64.tmp
_isetup\_shfoldr.dll
Failed to get version numbers of _shfoldr.dll
shfolder.dll
Failed to load DLL "%s"
Found pending rename or delete that matches one of our files: %s
Windows version: %u.%u.%u%s (NT platform: %s)
64-bit Windows: %s
Processor architecture: %s
Defaulting to %s for suppressed message box (%s):
Message box (%s):
User chose %s.
MsgBox failed.
/SPAWNWND=$%x /NOTIFYWND=$%x
64-bit install mode: %s
%d.%d
_isetup\_isdecmp.dll
_isetup\_iscrypt.dll
/Password=
/SuppressMsgBoxes
/DETACHEDMSG
-0.bin
Setup version: Inno Setup version 5.4.0 (a)
Original Setup EXE:
Windows NT
Windows
Not restarting Windows because Setup is being run from the debugger.
Restarting Windows.
Inno Setup version 5.4.0 (a)
Portions Copyright (C) 2000-2010 Martijn Laan
hXXp://VVV.innosetup.com/
hXXp://VVV.remobjects.com/ps
Cannot run files in 64-bit locations on this version of Windows
Type: Exec
Type: ShellExec
Will not restart Windows automatically.
System\CurrentControlSet\Control\Windows
TOutputMsgWizardPage
TOutputMsgMemoWizardPage
PasswordEdit
PasswordEditLabel
MsgLabel
Msg1Label
Msg2Label
function CreateOutputMsgPage(const AfterID: Integer; const ACaption, ADescription, AMsg: String): TOutputMsgWizardPage;
function CreateOutputMsgMemoPage(const AfterID: Integer; const ACaption, ADescription, ASubCaption: String; const AMsg: AnsiString): TOutputMsgMemoWizardPage;
function MsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons: Integer): Integer;
function GetIniString(const Section, Key, Default, Filename: String): String;
function GetIniInt(const Section, Key: String; const Default, Min, Max: Longint; const Filename: String): Longint;
function GetIniBool(const Section, Key: String; const Default: Boolean; const Filename: String): Boolean;
function IniKeyExists(const Section, Key, Filename: String): Boolean;
function SetIniString(const Section, Key, Value, Filename: String): Boolean;
function SetIniInt(const Section, Key: String; const Value: Longint; const Filename: String): Boolean;
function SetIniBool(const Section, Key: String; const Value: Boolean; const Filename: String): Boolean;
procedure DeleteIniEntry(const Section, Key, Filename: String);
function GetCmdTail: String;
function StringChangeEx(var S: String; const FromStr, ToStr: String; const SupportDBCS: Boolean): Integer;
function RegValueExists(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;
function RegQueryStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;
function RegQueryMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: String): Boolean;
function RegDeleteKeyIncludingSubkeys(const RootKey: Integer; const SubkeyName: String): Boolean;
function RegDeleteKeyIfEmpty(const RootKey: Integer; const SubkeyName: String): Boolean;
function RegKeyExists(const RootKey: Integer; const SubKeyName: String): Boolean;
function RegDeleteValue(const RootKey: Integer; const SubKeyName, ValueName: String): Boolean;
function RegGetSubkeyNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;
function RegGetValueNames(const RootKey: Integer; const SubKeyName: String; var Names: TArrayOfString): Boolean;
function RegQueryDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultDWord: Cardinal): Boolean;
function RegQueryBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; var ResultStr: AnsiString): Boolean;
function RegWriteStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteExpandStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteMultiStringValue(const RootKey: Integer; const SubKeyName, ValueName, Data: String): Boolean;
function RegWriteDWordValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: Cardinal): Boolean;
function RegWriteBinaryValue(const RootKey: Integer; const SubKeyName, ValueName: String; const Data: AnsiString): Boolean;
function CheckForMutexes(Mutexes: String): Boolean;
function Exec(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;
function ExecAsOriginalUser(const Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ResultCode: Integer): Boolean;
function ShellExec(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;
function ShellExecAsOriginalUser(const Verb, Filename, Params, WorkingDir: String; const ShowCmd: Integer; const Wait: TExecWait; var ErrorCode: Integer): Boolean;
function MakePendingFileRenameOperationsChecksum: String;
function CreateShellLink(const Filename, Description, ShortcutTo, Parameters, WorkingDir, IconFilename: String; const IconIndex, ShowCmd: Integer): String;
function ExitSetupMsgBox: Boolean;
function GetWindowsVersion: Cardinal;
procedure GetWindowsVersionEx(var Version: TWindowsVersion);
function GetWindowsVersionString: String;
function SuppressibleMsgBox(const Text: String; const Typ: TMsgBoxType; const Buttons, Default: Integer): Integer;
function CustomMessage(const MsgName: String): String;
function SendMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Longint;
function PostMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;
function SendNotifyMessage(const Wnd: HWND; const Msg, WParam, LParam: Longint): Boolean;
function SendBroadcastMessage(const Msg, WParam, LParam: Longint): Longint;
function PostBroadcastMessage(const Msg, WParam, LParam: Longint): Boolean;
function SendBroadcastNotifyMessage(const Msg, WParam, LParam: Longint): Boolean;
procedure RaiseException(const Msg: String);
function SetPreviousData(const PreviousDataKey: Integer; const ValueName, ValueData: String): Boolean;
Cannot call "%s" function during Setup
Cannot call "%s" function during Uninstall
Cannot call "%s" function during non Unicode Setup or Uninstall
CREATEOUTPUTMSGPAGE
CREATEOUTPUTMSGMEMOPAGE
MSGBOX
Invalid RootKey value
INIKEYEXISTS
GETCMDTAIL
REGKEYEXISTS
REGDELETEKEYINCLUDINGSUBKEYS
REGDELETEKEYIFEMPTY
REGGETSUBKEYNAMES
CHECKFORMUTEXES
SHELLEXEC
SHELLEXECASORIGINALUSER
MAKEPENDINGFILERENAMEOPERATIONSCHECKSUM
Unknown custom message name "%s"
EXITSETUPMSGBOX
GETWINDOWSVERSION
GETWINDOWSVERSIONSTRING
%u.%.2u.%u
SUPPRESSIBLEMSGBOX
%u.%u.%u.%u
Cannot disable FS redirection on this version of Windows
GetWindowsVersionEx
Runtime Error (at %d:%d):
Exception "%s" at address %p
TScriptRunner.SetPSExecParameters: Invalid type
TScriptRunner.LoadScript failed
Remove shared file %s? User chose %s%s
/INITPROCWND=$%x
/SECONDPHASE="%s" /FIRSTPHASEWND=$%x
Original Uninstall EXE:
Install was done in 64-bit mode but not running 64-bit Windows now
Removed all? %s
Not restarting Windows because Uninstall is being run from the debugger.
IMsgt
isRS-???.tmp
isRS-%.3u.tmp
DisableProcessWindowsGhosting
FTPF0P
0123456789abcdefInno Setup Setup Data (5.3.10)
Inno Setup Messages (5.1.11)
oleaut32.dll
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
GetWindowsDirectoryA
CreateNamedPipeA
mpr.dll
version.dll
gdi32.dll
SetViewportOrgEx
UnhookWindowsHookEx
SetWindowsHookExA
MapVirtualKeyA
GetKeyState
GetKeyNameTextA
ExitWindowsEx
EnumWindows
EnumThreadWindows
comctl32.dll
ole32.dll
ShellExecuteExA
ShellExecuteA
comdlg32.dll
.text
`.rdata
@.data
.pdata
@.rsrc
COMCTL32.dll
SHLWAPI.dll
SetProcessShutdownParameters
KERNEL32.dll
ADVAPI32.dll
SHELL32.dll
OLEAUT32.dll
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/>
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/>
`.data
.rsrc
@.reloc
Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
SOFTWARE\Microsoft\Windows\CurrentVersion
Software\Microsoft\Windows\CurrentVersion\ProfileReconciliation
RegKey
GetWindowsDirectoryW
RegOpenKeyA
SHFOLDER.dll
dll\shfolder.dbg
Font.Color
Font.Height
Font.Name
Font.Style
name="JR.Inno.Setup"
version="1.0.0.0"
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
<windowsSettings>
<dpiAware xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
</windowsSettings>
Cannot assign a %s to a %s
Cannot create file %s
Cannot open file %s
Stream write error Out of memory while expanding memory stream*Can't write to a read-only resource stream.WriteObject called twice for the same instance
Class %s not found
Resource %s not found!Resource %s is of incorrect class
List index out of bounds Operation not allowed on sorted string list%String list does not allow duplicates
Tab index out of bounds#A component named %s already exists$''%s'' is not a valid component name
A class named %s already exists#''%s'' is not a valid integer value
Error reading %s.%s: %s
Ancestor for '%s' not found
Bitmap is empty!Cannot change the size of an icon$Unknown picture file extension (.%s)
Unsupported clipboard format
Error creating window Cannot focus a disabled or invisible window!Control '%s' has no parent window
%s property out of range
%s on %s@GroupIndex cannot be less than a previous menu item's GroupIndex2Cannot have more than one MDI form per application
Could not load CARDS.DLL
Duplicate CardId found"An error returned from DDE ($0%x)/DDE Error - conversation not established ($0%x)0Error occurred when DDE ran out of memory ($0%x)"Unable to connect DDE conversation
Grid too large for operation Too many rows or columns deleted
%s on line %d
''%s'' expected
%s expected
Invalid input value7Invalid input value. Use escape key to abandon changes
Value must be between %d and %d<Cannot create a default method name for an unnamed component
''%s'' is not a valid date
''%s'' is not a valid time#''%s'' is not a valid date and time
Invalid file name - %s
All files (*.*)|*.*
&Files: (*.*)
Invalid clipboard format Clipboard does not support Icons
Custom Colors Operation not supported on selected printer.There is no default printer currently selected
Unable to write to %s
Invalid data type for '%s'
Failed to create key %s
Failed to set data for '%s'
Failed to get data for '%s'9Synchronize called when main VCL thread in a WaitFor call0Unknown RichEdit conversion file extension (.%s)
/Menu '%s' is already being used by another form
Failed to Save Stream)StatusBar cannot have more than 64 panels!Error assigning Hot-Key to %s. %s
Hot-Key is invalid#Window is invalid or a child window%Hot-Key is assigned to another window %s is already associated with %s!'%s' is not a valid integer value('%s' is not a valid floating point value
'%s' is not a valid date
'%s' is not a valid time!'%s' is not a valid date and time
I/O error %d
Integer overflow Invalid floating point operation
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Operation aborted%Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'
Invalid variant operation"Variant method calls not supported
External exception %x
n%USERPROFILE%
r%SYSTEMROOT%
5.50.4807.2300
Microsoft(R) Windows (R) 2000 Operating System
Datos de programa%Configuraci
51.52.0.0

RunDll32.exe_1356:

.text
`.data
.rsrc
msvcrt.dll
KERNEL32.dll
NTDLL.DLL
GDI32.dll
USER32.dll
IMAGEHLP.dll
rundll32.pdb
.....eZXnnnnnnnnnnnn3
....eDXnnnnnnnnnnnn3
...eDXnnnnnnnnnnnn,
.eDXnnnnnnnnnnnn,
%Xnnnnnnnnnnnnnnn1
O3$dS7"%U9
.manifest
5.1.2600.5512 (xpsp.080413-2105)
RUNDLL.EXE
Windows
Operating System
5.1.2600.5512
YThere is not enough memory to run the file %s.
Please close other windows and try again.
9The file %s or one of its components could not be opened.
0The file %s or one of its components cannot run.
MThe file %s or one of its components requires a different version of Windows.
UThe file %s or one of its components cannot run in standard or enhanced mode Windows.3Another instance of the file %s is already running./An exception occurred while trying to run "%s"
Error in %s
Missing entry:%s
Error loading %s


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    CheatEngine64.exe:680
    netsh.exe:1516
    %original file name%.exe:1784

  2. Delete the original Trojan file.
  3. Delete or disinfect the following files created/modified by the Trojan:

    %Documents and Settings%\%current user%\Local Settings\Temp\is-HRLDQ.tmp\CheatEngine64.tmp (3782 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
    %System%\wbem\Logs\wbemprox.log (1405 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\is-KGQEJ.tmp\_isetup\_RegDLL.tmp (4 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\is-KGQEJ.tmp\_isetup\_shfoldr.dll (23 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\is-KGQEJ.tmp\OCSetupHlp.dll (5873 bytes)
    %Documents and Settings%\%current user%\Start Menu\Programs\Startup\af029b7100cbb27d8c0472b97315e8d5.exe (672 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\avast.exe (157 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\CheatEngine64.exe (69015 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\autB3.tmp (72241 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\autB2.tmp (980 bytes)

  4. Delete the following value(s) in the autorun key (How to Work with System Registry):

    [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
    "af029b7100cbb27d8c0472b97315e8d5" = "%Documents and Settings%\%current user%\Local Settings\Temp\avast.exe .."

    [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "af029b7100cbb27d8c0472b97315e8d5" = "%Documents and Settings%\%current user%\Local Settings\Temp\avast.exe .."

  5. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  6. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now