Trojan.NSIS.StartPage_7e56511cbe
not-a-virus:HEUR:AdWare.Win32.OutBrowse.heur (Kaspersky), Trojan.NSIS.StartPage.FD, Trojan.Win32.Swrort.3.FD, mzpefinder_pcap_file.YR (Lavasoft MAS)
Behaviour: Trojan, Adware
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 7e56511cbe5681ab729321d0394a5ff6
SHA1: 9746980913fa2a74340a28bc784bc6a512338446
SHA256: 86130a0330c7628c29397e23b065e0b049a45bf523168e7e68f586260fa5e4d8
SSDeep: 12288:Zpwi0UwgxUBCRlSEZpwcXoe18yizjfh7FEBOHcdCfc8vy4hz:ZpwinXxUdEHw02zjfvQOHcdP86u
Size: 677608 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: KTPSD
Created at: 2009-12-06 00:52:12
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
wmic.exe:1408
%original file name%.exe:1956
TE5FLEpSTA==28388.exe:1040
TE5FLEpSTA==10700.exe:352
The Trojan injects its code into the following process(es):
beddbjcejb.exe:284
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process beddbjcejb.exe:284 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\81440035318\TE5FLEpSTA==28388.exe (1638 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\81440035318\TE5FLEpSTA==10700.exe (50 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OHYRGXIJ\XPVistaChecker[1].exe (6838 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\89AJKDYV\DynamicOfferScreen[1].htm (2083 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OX6J4PMZ\OperaChecker25-6[1].exe (3762 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\81440035318.txt (0 bytes)
The process wmic.exe:1408 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\81440035318.txt (238 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\81440035318.txt (0 bytes)
The process %original file name%.exe:1956 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\gbcabfjbbgg.zip (56196 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\beddbjcejb.gbcabfjbbgg (8368 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\beddbjcejb.exe (7337 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsi2.tmp\ZipDLL.dll (5500 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsi2.tmp\auoekfj.dll (4341 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsi2.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsx1.tmp (0 bytes)
The process TE5FLEpSTA==28388.exe:1040 makes changes in the file system.
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsp4.tmp (0 bytes)
The process TE5FLEpSTA==10700.exe:352 makes changes in the file system.
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsh3.tmp (0 bytes)
Registry activity
The process beddbjcejb.exe:284 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 28 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D0 CB C3 E9 C1 64 6D CD AB 8B 8D 1C 82 01 98 DF"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process wmic.exe:1408 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8E 13 D9 D9 E0 24 9D C5 5D 10 FB 29 21 02 CF 6C"
The process %original file name%.exe:1956 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "70 CE BC 34 4C D4 7E 54 A2 5E FE 3F 4E 1A B3 C5"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
The process TE5FLEpSTA==28388.exe:1040 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DA A9 DA CD A3 AC 0B 72 1F F3 21 C1 84 E9 BD C5"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\vislmtOB]
"Install" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\xplmtOB]
"Install" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
The process TE5FLEpSTA==10700.exe:352 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6E 28 BB DE 03 FE A7 E6 7F 7F 68 37 76 4F 1C FD"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\OperaOB]
"Install" = "1"
Dropped PE files
| MD5 | File path |
|---|---|
| 10ffabc748d68c40b68f883058c9b932 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\81440035318\TE5FLEpSTA==10700.exe |
| 4998857b54553e4f5ec8a67b34501de2 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\81440035318\TE5FLEpSTA==28388.exe |
| 009cdc3d7974382798b995fe83a031c2 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\beddbjcejb.exe |
| 2dc35ddcabcb2b24919b9afae4ec3091 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsi2.tmp\ZipDLL.dll |
| cc02bdebf37aadd6c0edaf138cdb246f | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsi2.tmp\auoekfj.dll |
| 4998857b54553e4f5ec8a67b34501de2 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temporary Internet Files\Content.IE5\OHYRGXIJ\XPVistaChecker[1].exe |
| 10ffabc748d68c40b68f883058c9b932 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temporary Internet Files\Content.IE5\OX6J4PMZ\OperaChecker25-6[1].exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
Company Name: KTPSD
Product Name: KTPSD
Product Version: 705.1561.916.6114
Legal Copyright: KTPSD
Legal Trademarks: KTPSD
Original Filename:
Internal Name:
File Version: 705.1561.916.6114
File Description: KTPSD
Comments: KTPSD
Language: English (United States)
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 23628 | 24064 | 4.46304 | c52a72deb0170941d392ec38c6aeafd0 |
| .rdata | 28672 | 4764 | 5120 | 3.4982 | dc77f8a1e6985a4361c55642680ddb4f |
| .data | 36864 | 298072 | 1024 | 3.32453 | 723ad80df002dc5421798f4307abe5cf |
| .ndata | 335872 | 278528 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| .rsrc | 614400 | 28664 | 28672 | 4.01748 | a299fb3f9af046731085f757b3a1cf18 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Total found: 1
c1dc2718df31c5051da04ba1e4af015a
URLs
| URL | IP |
|---|---|
| hxxp://cdn-ppdownload.outbrowse.netdna-cdn.com/Installer/OperaBrowser/OperaChecker25-6.exe | |
| hxxp://54.163.240.188/Installer/Track?pubid=13073&distid=24877&productid=3325&subpubid=0&campaignid=0&networkid=0&reqid=322770107&dfb=0&os=5.1&ospv=-1&iev=6.0&ffv=&chromev=&macaddress=00:50:56:3B:0E:71&netv=&d1=NUMBER&d2=-1&d3=-1&d4=-1&d5=-1&ds1=&hb=2&systembit=32&vm=1&machineguid=75ed9567-aa58-4c8e-a8ea-3cad7c47ab03&welcomeimgurl=&downloadip=46.161.92.3&downloadtime=6/1/2015 10:41:10 PM&clickid=7N10whCaPJ&status=2&installedid=10700&z=1&offerscreenid=234&offerorder=-1&downloadduration=-1&installduration=-1&issecond=0 | |
| hxxp://d2vubraihqcany.cloudfront.net/Installer/XpVista/XPVistaChecker.exe | |
| hxxp://54.163.240.188/Installer/Flow?pubid=13073&distid=24877&productid=3325&subpubid=0&campaignid=0&networkid=0&dfb=0&os=5.1&ospv=-1&iev=6.0&ffv=&chromev=&macaddress=00:50:56:3B:0E:71&netv=&d1=NUMBER&d2=-1&d3=-1&d4=-1&d5=-1&ds1=&hb=2&systembit=32&vm=1&machineguid=75ed9567-aa58-4c8e-a8ea-3cad7c47ab03&welcomeimgurl=&downloadip=46.161.92.3&downloadtime=6/1/2015 10:41:10 PM&clickid=7N10whCaPJ&version=6.12&nipids=-13298-28388-28693-12929-28255-27801-28657-29035&secondcall=1&reqid=322770107 | |
| hxxp://smartinstaller.elasticbeanstalk.com//offers/DynamicOfferScreen?offerid=5&distid=24877&leadp=3325&countryid=262&sysbit=32&imgurl=&dfb=0&hb=2&isagg=1&version=6.12&external=0& | |
| hxxp://srv.DESK-TOP-APP.INFO/Installer/Flow?pubid=13073&distid=24877&productid=3325&subpubid=0&campaignid=0&networkid=0&dfb=0&os=5.1&ospv=-1&iev=6.0&ffv=&chromev=&macaddress=00:50:56:3B:0E:71&netv=&d1=NUMBER&d2=-1&d3=-1&d4=-1&d5=-1&ds1=&hb=2&systembit=32&vm=1&machineguid=75ed9567-aa58-4c8e-a8ea-3cad7c47ab03&welcomeimgurl=&downloadip=46.161.92.3&downloadtime=6/1/2015 10:41:10 PM&clickid=7N10whCaPJ&version=6.12&nipids=-13298-28388-28693-12929-28255-27801-28657-29035&secondcall=1&reqid=322770107 | |
| hxxp://srv.DESK-TOP-APP.INFO/Installer/Track?pubid=13073&distid=24877&productid=3325&subpubid=0&campaignid=0&networkid=0&reqid=322770107&dfb=0&os=5.1&ospv=-1&iev=6.0&ffv=&chromev=&macaddress=00:50:56:3B:0E:71&netv=&d1=NUMBER&d2=-1&d3=-1&d4=-1&d5=-1&ds1=&hb=2&systembit=32&vm=1&machineguid=75ed9567-aa58-4c8e-a8ea-3cad7c47ab03&welcomeimgurl=&downloadip=46.161.92.3&downloadtime=6/1/2015 10:41:10 PM&clickid=7N10whCaPJ&status=2&installedid=10700&z=1&offerscreenid=234&offerorder=-1&downloadduration=-1&installduration=-1&issecond=0 | |
| hxxp://srv.dmdataserver.com//offers/DynamicOfferScreen?offerid=5&distid=24877&leadp=3325&countryid=262&sysbit=32&imgurl=&dfb=0&hb=2&isagg=1&version=6.12&external=0& | |
| hxxp://cdn.download4desktop.com/Installer/OperaBrowser/OperaChecker25-6.exe | |
| static.revenyou.com | |
| stats.g.doubleclick.net |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET POLICY Executable served from Amazon S3
Traffic
GET /Installer/XpVista/XPVistaChecker.exe HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: d2vubraihqcany.cloudfront.net
Connection: Keep-Alive
HTTP/1.1 200 OK
Content-Type: application/octet-stream
Content-Length: 50076
Connection: keep-alive
Date: Sun, 16 Aug 2015 07:57:54 GMT
Last-Modified: Wed, 08 Jul 2015 07:40:21 GMT
ETag: "4998857b54553e4f5ec8a67b34501de2"
Accept-Ranges: bytes
Server: AmazonS3
Age: 6292
X-Cache: Hit from cloudfront
Via: 1.1 02fd383853ef3b6dd024813a9b190dcb.cloudfront.net (CloudFront)
X-Amz-Cf-Id: N5Ji-fdGIyuBVnFFX9w-aI5__MYr5X-J6wv64TDyr8n-qfvV5Iim_w==MZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..i
u..i...iw..iu..i...i...id..i!..i...i...it..iRichu..i..................
......PE..L......K.................^....... ...0.......p....@.........
.................0...............................................t....
......PC..............................................................
.............p...............................text...L\.......^........
.......... ..`.rdata.......p.......b..............@[email protected].......
[email protected]....... ...........................rsrc.
..PC.......D...z..............@..@....................................
......................................................................
......................................................................
......................................................................
......................................................................
............................................U....\.}..t .}.F.E.u..H...
[email protected]@..e...E..E.P.u...Pr@
..}[email protected]... M.......M....3.....FQ.....NU..M.....
.....VT..U.....FP..E...............E.P.M...Hp@[email protected]
....E..9}[email protected].}[email protected]..
[email protected]@.W...E..E.h ...Pj.h`[email protected]...\r@._^3.
[.....L$....E...Si.. ..VW.T.....tO.q.3.;5..E.sB..i.. ...D.......t.G...
..t...O..t .....u...3....3...F.. ..;5..E.r._^[...U..QQ.U.SV..i.. .<<< skipped >>>
GET /Installer/OperaBrowser/OperaChecker25-6.exe HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: cdn.download4desktop.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Thu, 20 Aug 2015 01:48:46 GMT
Content-Type: application/octet-stream
Content-Length: 50225
Connection: keep-alive
x-amz-id-2: svYL7pEACBTuQB8AAIemUczHfRaE39w5udTIbXcMerN0lGYx6qmA8YzIAoi ubff
x-amz-request-id: 4B3CCB159563F0A2
Last-Modified: Wed, 25 Jun 2014 14:41:23 GMT
ETag: "10ffabc748d68c40b68f883058c9b932"
Server: NetDNA-cache/2.2
Content-Disposition: attachment
X-Cache: HIT
Accept-Ranges: bytesMZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..i
u..i...iw..iu..i...i...id..i!..i...i...it..iRichu..i..................
......PE..L......K.................^...........0.......p....@.........
.................................................................t....
......PC..............................................................
.............p...............................text...L\.......^........
.......... ..`.rdata.......p.......b..............@[email protected]\......
.....v..............@....ndata...................................rsrc.
..PC.......D...z..............@..@....................................
......................................................................
......................................................................
......................................................................
......................................................................
............................................U....\.}..t .}.F.E.u..H...
[email protected]@..e...E..E.P.u...Pr@
..}[email protected]... M.......M....3.....FQ.....NU..M.....
.....VT..U.....FP..E...............E.P.M...Hp@[email protected]
....E..9}[email protected].}[email protected]..
[email protected]@.W...E..E.h ...Pj.h`[email protected]...\r@._^3.
[.....L$....B...Si.....VW.T.....tO.q.3.;5..B.sB..i......D.......t.G...
..t...O..t .....u...3....3...F.....;5..B.r._^[...U..QQ.U.SV..i....<<< skipped >>>
GET //offers/DynamicOfferScreen?offerid=5&distid=24877&leadp=3325&countryid=262&sysbit=32&imgurl=&dfb=0&hb=2&isagg=1&version=6.12&external=0& HTTP/1.1
Accept: */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: srv.dmdataserver.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Date: Thu, 20 Aug 2015 01:48:48 GMT
Server: Microsoft-IIS/8.0
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Content-Length: 12046
Connection: keep-alive<html>. <head>. <title>5 - NonProduct (Drive
r Genius)</title><script type='text/javascript'>var _gaq =
_gaq || [];_gaq.push(['_setAccount', 'UA-37348037-1']);_gaq.push(['_s
etDomainName', 'ppdownload.com']);_gaq.push(['_setAllowLinker', true])
;.. _gaq.push(['_trackPagev
iew']);.. (function() {..
var ga = document.createEl
ement('script'); ga.type = 'text/javascript'; ga.async = true;..
ga.src = ('https:' == document
.location.protocol ? 'hXXps://' : 'hXXp://') 'stats.g.doubleclick.ne
t/dc.js';.. var s = docum
ent.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s
);.. })();</script>&l
t;style type='text/css'>body { width:100%; height:100
%; margin:0px; padding:0px; font-size:font-family:helvetica; font-size
:12px;} .divLeadpName { border-bottom-style:groove;bord
er-bottom-width: thin; padding-left:61px; padding-top:9px; font-size:f
ont-family:helvetica; font-style:italic; font-size:25px;
font-weight:bold; color:black; position:absolute; width: 100%; ba
ckground-color: #fff; ba} #divTop {display: none} #divMiddl
e {background-color: #efecec; height: 100%;} #middle {backgrou
nd-color: #fff;} .divOnNext { position:absolute; wid<<< skipped >>>
GET /Installer/Track?pubid=13073&distid=24877&productid=3325&subpubid=0&campaignid=0&networkid=0&reqid=322770107&dfb=0&os=5.1&ospv=-1&iev=6.0&ffv=&chromev=&macaddress=00:50:56:3B:0E:71&netv=&d1=NUMBER&d2=-1&d3=-1&d4=-1&d5=-1&ds1=&hb=2&systembit=32&vm=1&machineguid=75ed9567-aa58-4c8e-a8ea-3cad7c47ab03&welcomeimgurl=&downloadip=46.161.92.3&downloadtime=6/1/2015 10:41:10 PM&clickid=7N10whCaPJ&status=2&installedid=10700&z=1&offerscreenid=234&offerorder=-1&downloadduration=-1&installduration=-1&issecond=0 HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1) AppleWebKit/535.19 (KHTML, like Gecko) Chrome/18.0.1025.142 Safari/535.19
Host: srv.DESK-TOP-APP.INFO
Connection: Keep-Alive
HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Date: Thu, 20 Aug 2015 01:48:46 GMT
Server: Microsoft-IIS/8.0
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Content-Length: 8
Connection: keep-alive..OK..HTTP/1.1 200 OK..Cache-Control: private..Content-Type: text/html
; charset=utf-8..Date: Thu, 20 Aug 2015 01:48:46 GMT..Server: Microsof
t-IIS/8.0..X-AspNet-Version: 4.0.30319..X-AspNetMvc-Version: 4.0..X-Po
wered-By: ASP.NET..Content-Length: 8..Connection: keep-alive....OK..
font>....
GET /Installer/Flow?pubid=13073&distid=24877&productid=3325&subpubid=0&campaignid=0&networkid=0&dfb=0&os=5.1&ospv=-1&iev=6.0&ffv=&chromev=&macaddress=00:50:56:3B:0E:71&netv=&d1=NUMBER&d2=-1&d3=-1&d4=-1&d5=-1&ds1=&hb=2&systembit=32&vm=1&machineguid=75ed9567-aa58-4c8e-a8ea-3cad7c47ab03&welcomeimgurl=&downloadip=46.161.92.3&downloadtime=6/1/2015 10:41:10 PM&clickid=7N10whCaPJ&version=6.12&nipids=-13298-28388-28693-12929-28255-27801-28657-29035&secondcall=1&reqid=322770107 HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1) AppleWebKit/535.19 (KHTML, like Gecko) Chrome/18.0.1025.142 Safari/535.19
Host: srv.DESK-TOP-APP.INFO
Connection: Keep-Alive
HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Date: Thu, 20 Aug 2015 01:48:48 GMT
Server: Microsoft-IIS/8.0
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Content-Length: 29194
Connection: keep-alive..Sv.NlmsAxc.2..*.JqaEv`.5. ).Bkmnjf`grQsoa"8/$.Fmkcsez_oajgRvjdo
"8..'.PbaJay 5..% O_fGew1,.3 .&!NenjjoG_j_!6" '.
KkmaobpIB.2 % >fv]yqJ^a^p.4/("GnO\brCiqEnqoYge 7 .Ev`MME 7.!(
"Cs]PKJ/.9."*.;jfk^hcHil`.5. ).NbfcmMME 7.gptn5'*lps(cid
_oYn^ps_q*cmh'*hdc_qo/Btf\fg`IebepN[m^ck9nbfcma_63#^hotg_5--641%he
__h8,1//%_osilmrga7122$nqn[gq72.&gh_pkj: cbb; .c[;/ hoaeb5,.tblreo
l8.)*0#_wpepiYg6..&!Nar`.5&/).@`dgoajg_i>`pa 5..% >hsevg
mmn^qO_fGewn.5. ).O]ympl.3 .&!Afd`[obtb.9)1*.HmhklnhknP\l`.8* .Dg
n[m^n^hbuR_o].3 .&!Olc`h<_rblHjsr\dg.8-&!Ripom\eMc`dnCmhe\g
bIcma"8..'.A^hQqn?n;c^ah\nt"8ojp^*.LtjIl<_bkcpmhreGik
oZji_q.: .$.KskCmNeepd\kGkms]lj`j.3 .&!Lrc@p`KcpokpTcme.3 .&!L
rc@p`KcpokpV_gm`.8.. .Pmnl@qcO_rqlrO]mf 7.!("Njko>vbLdoujoN\es
b.9."*.HjlrO_fGew.*.3 .&!LoqoJ``Ibs50"8..x%y.JnotCs].3 .
&!Lrc@p`.8.. .CmhhjgcknSupc.23% JimetguYobmkNxleq.2. 3**,.0 -,( 5*
,0., M]bDcv.9."*.J``Ibs50"8..'.PbjnntL\e`.8.;UK"*.H
mhbr]sED 5)'.?iq`usMa^`k 7* .IqRYdmDllHjsr\dg.8.&!AxcPJG.8.. .
Ev`MME0.4!., >ghf_k^Kenc.2..*.IebepPJG.8.bspp8*'nkt ^l`ar\k`ktb
l-_ok*'j_dblr DwiYhbaL`earQ^j`^l<iebepd\8-1. oedq8). 75'143
63%-146-,-27-1( 55*0)261-2&06*21&bdkobb:,3475!d`Zbm72/23![jnlq
lxed;-.-.qvmaet;.*!]d_7/"h`8*!bq^af91$q]mlglh<2./-.`qrblm]l; .
'.P^nd.: ,$.:bacseol\d?Zr^.9.11-13&05-74-03.4, .,8.9 -/3)/*,72
55(*4)12. .AloaqbprmdoRcbC`rq.4!., KYthsq.9)1*.=a_c`nhre 5%,% Mlni<<< skipped >>>
The Trojan connects to the servers at the folowing location(s):
.text
`.rdata
@.data
.ndata
.rsrc
uDSSh
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
GetWindowsDirectoryA
KERNEL32.dll
ExitWindowsEx
USER32.dll
GDI32.dll
SHFileOperationA
ShellExecuteA
SHELL32.dll
RegEnumKeyA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
ADVAPI32.dll
COMCTL32.dll
ole32.dll
VERSION.dll
verifying installer: %d%%
hXXp://nsis.sf.net/NSIS_Error
... %d%%
~nsu.tmp
%u.%u%s%s
RegDeleteKeyExA
%s=%s
*?|<>/":
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\beddbjcejb.exe 6!0!6!1!8!1!8!5!1!4!0 KVBDQzUwKys2LyApU09BSEg8OC8cL0hFTlZHUUNEQzkwGi8 SEtTQT88LjQyNzEfJ0JBPzwsIClQTE48VDtPXkVENzMtMS0fJ05ETlY/UllUSks1Y3NwcDQvKXJqdSY/RE9LJ1RJTyVASEstRU5ATxouO0tBPkpFRDc3SDAodmA YExKGi8 MDVNTUhBQVIaLz4xNSwpGy5AMzctKx8nQyw4LC0gKUQvPCUwGCpPTk8 VT1TV09KRFU9Q1M9Gi5IUUc/VD9UWUVPSzk8GCpPTk8 VT1TV005SEQ5IClFUkRXVEpHPBwvP1g/XjtMPEdISkU3IClHR1JMWkFOT1FTP1E1MRgqU0RBSEtTTk1eTU1LOSApVkc8Kh8nP1ItPRovTFRGU0FIRFtXP0w9TkVEQUhAQ0VPUkY8GC5BTl5OVUhUQ0w9PGxtdGEgKVI/U01RRkRNQ19PUz9RV0M5VFI5MhovQkg8RFA4MBwvQ1NZQ1FNOUhIP18/Tj1RUU9MQEM5ZltsbWQYLjxKVkpMSUE XkFPNS81KjEwMSg4Ki0rGy5QSUdFNzAsMissODQ0MTAaLjxOT0lLS0E X05IRUQ1MS4tLywwKzQiMCg1My06KzAkT0U=
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsi2.tmp\ZipDLL.dll
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsi2.tmp
\\?\unc\
zcÁ
65708<8`9
<'</<5<;<|<
5 5$5(5,5
-*!$%d:ZU1N
GetCPInfo
ZipDLL.dll
Error: %s
Could not extract %s
Error: Could not extract %s
Extract : %s
Extracting %d files and directories
Extracting contents of %s to %s
Extracting the file %s from %s to %s
%s (%s)
Incorrect password set for the file being decrypted
1.1.4
nsi2.tmp
:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsi2.tmp
c:\%original file name%.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp
%original file name%.exe
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsx1.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
@@@`777-
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.46</description><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*" /></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="requireAdministrator" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/></application></compatibility></assembly>00000000
705.1561.916.6114
beddbjcejb.exe_284:
.text
`.rdata
@.data
.rsrc
@.reloc
SSh($J
.CGy&
<9%u3
FTPj
YPSSSh
,4,56,789
xSSSh
FTPjKS
FtPj;S
C.PjRV
RegOpenKeyTransactedW
RegCreateKeyTransactedW
RegDeleteKeyTransactedW
RegDeleteKeyExW
%d/%d/%d %d:%d:%d
X:X:X:X:X:X
large file support is disabled
unknown operation
SQL logic error or missing database
foreign_keys
sqlite_compileoption_get
sqlite_compileoption_used
sqlite_log
sqlite_source_id
sqlite_version
sqlite_attach
sqlite_detach
sqlite_stat1
sqlite_rename_parent
sqlite_rename_trigger
sqlite_rename_table
GetProcessHeap
RowKey
3.7.16.2
SQLite format 3
CREATE TABLE sqlite_master(
sql text
CREATE TEMP TABLE sqlite_temp_master(
REINDEXEDESCAPEACHECKEYBEFOREIGNOREGEXPLAINSTEADDATABASELECTABLEFTHENDEFERRABLELSEXCEPTRANSACTIONATURALTERAISEXCLUSIVEXISTSAVEPOINTERSECTRIGGEREFERENCESCONSTRAINTOFFSETEMPORARYUNIQUERYATTACHAVINGROUPDATEBEGINNERELEASEBETWEENOTNULLIKECASCADELETECASECOLLATECREATECURRENT_DATEDETACHIMMEDIATEJOINSERTMATCHPLANALYZEPRAGMABORTVALUESVIRTUALIMITWHENWHERENAMEAFTEREPLACEANDEFAULTAUTOINCREMENTCASTCOLUMNCOMMITCONFLICTCROSSCURRENT_TIMESTAMPRIMARYDEFERREDISTINCTDROPFAILFROMFULLGLOBYIFISNULLORDERESTRICTOUTERIGHTROLLBACKROWUNIONUSINGVACUUMVIEWINITIALLY
922337203685477580
SQLITE_
?API call with %s database connection pointer
OsError 0x%x (%u)
os_win.c:%d: (%d) %s(%s) - %s
delayed %dms for lock/sharing conflict
%s\etilqs_
%s\%s
cannot limit WAL size: %s
2nd reference to page %d
invalid page number %d
%s(%d)
keyinfo(%d
%r %s BY term out of range - should be between 1 and %d
Expression tree is too large (maximum depth %d)
too many SQL variables
variable number must be between ?1 and ?%d
too many columns in %s
%s OR name=%Q
type='trigger' AND (%s)
table %s may not be altered
sqlite_
SELECT tbl,idx,stat FROM %Q.sqlite_stat1
access to %s.%s.%s is prohibited
access to %s.%s is prohibited
object name reserved for internal use: %s
duplicate column name: %s
too many columns on %s
DELETE FROM %Q.%s WHERE %s=%Q
sqlite_stat%d
unknown column "%s" in foreign key definition
number of columns in foreign key does not match the number of columns in the referenced table
foreign key on %s should reference only one column of table %T
a JOIN clause is required before %s
cannot modify %s because it is a view
table %s may not be modified
Cforeign key mismatch - "%w" referencing "%w"
error during initialization: %s
no entry point [%s] in shared library [%s]
unable to open shared library [%s]
sqlite3_extension_init
unknown or unsupported join type: %T %T%s%T
RIGHT and FULL OUTER JOINs are not currently supported
USE TEMP B-TREE FOR %s
COMPOUND SUBQUERIES %d AND %d %s(%s)
%s:%d
no such index: %s
SCAN TABLE %s %s%s(~%d rows)
UPDATE %Q.%s SET type='table', name=%Q, tbl_name=%Q, rootpage=0, sql=%Q WHERE rowid=#%d
sqlite_master
sqlite_temp_master
vtable constructor did not declare schema: %s
vtable constructor failed: %s
no such module: %s
table %s: xBestIndex returned an invalid plan
%s (~%lld rows)
%s VIRTUAL TABLE INDEX %d:%s
%s (rowid<?)
%s (rowid>?)
%s (rowid>? AND rowid<?)
%s (rowid=?)
%s USING INTEGER PRIMARY KEY
%s USING %s%sINDEX%s%s%s
%s AS %s
%s TABLE %s
%s SUBQUERY %d
database corruption at line %d of [%.10s]
misuse at line %d of [%.10s]
cannot open file at line %d of [%.10s]
failed to allocate %u bytes of memory
failed memory resize %u to %u bytes
foreign key constraint failed
unable to use function %s in the requested context
zeroblob(%d)
CREATE TABLE %Q.%s(%s)
%s %T cannot reference objects in database %s
default value of column [%s] is not constant
UPDATE %Q.%s SET rootpage=%d WHERE #%d AND rootpage=#%d
no such collation sequence: %s
%s - %s
malformed database schema (%s)
cannot join using column %s - column not present in both tables
cannot have both ON and USING clauses in the same join
a NATURAL join may not have an ON or USING clause
%s.%s
%s-shm
bind on a busy prepared statement: [%s]
%s: %s
%s: %s.%s
%s: %s.%s.%s
misuse of aliased aggregate %s
not authorized to use function: %s
too many terms in %s BY clause
EXECUTE %s%s SUBQUERY %d
%.*s"%w"%s
%s%.*s"%w"
UPDATE "%w".%s SET sql = substr(sql,1,%d) || ', ' || %Q || substr(sql,%d) WHERE type = 'table' AND name = %Q
Cannot add a PRIMARY KEY column
invalid name: "%s"
automatic extension loading failed: %s
d-d-d d:d:d
d:d:d
d-d-d
M@d
SELECTs to the left and right of %s do not have the same number of result columns
LIMIT clause should come after %s not before
ORDER BY clause should come after %s not before
BmTindexed columns are not unique
Recovered %d frames from WAL file %s
Bad ptr map entry key=%d expected=(%d,%d) got=(%d,%d)
Failed to read ptrmap key=%d
failed to get page %d
%d of %d pages missing from overflow list starting at %d
freelist leaf count too big on page %d
Fragmentation of %d bytes reported as %d on page %d
Multiple uses for byte %d of page %d
Corruption detected in cell %d on page %d
On page %d at right child:
On tree page %d cell %d:
btreeInitPage() returns error code %d
unable to get the page. error code=%d
Page %d:
Outstanding page count goes from %d to %d during this analysis
Pointer map page %d is referenced
Page %d is never used
sqlite3_get_table() called with two or more incompatible queries
no such vfs: %s
%s mode not allowed: %s
no such %s mode: %s
MJ delete: %s
-mjX9X
MJ collide: %s
%s-mjXXXXXX9XXz
database %s is locked
cannot detach database %s
no such database: %s
INSERT INTO %Q.%s VALUES('trigger',%Q,%Q,0,'CREATE TRIGGER %q')unknown database: %s
unknown database %s
DELETE FROM %Q.%s WHERE tbl_name=%Q and type!='trigger'
DELETE FROM %Q.sqlite_sequence WHERE name=%Q
PRIMARY KEY must be unique
constraint %s failed
%s.%s may not be NULL
database schema is locked: %s
INSERT INTO vacuum_db.sqlite_master SELECT type, name, tbl_name, rootpage, sql FROM main.sqlite_master WHERE type='view' OR type='trigger' OR (type='table' AND rootpage=0)
SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
SELECT 'CREATE UNIQUE INDEX vacuum_db.' || substr(sql,21) FROM sqlite_master WHERE sql LIKE 'CREATE UNIQUE INDEX %'
SELECT 'CREATE INDEX vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE sql LIKE 'CREATE INDEX %'
SELECT 'CREATE TABLE vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE type='table' AND name!='sqlite_sequence' AND rootpage>0
PRAGMA vacuum_db.synchronous=OFF
cannot VACUUM - SQL statements in progress
misuse of aggregate: %s()
constraint failed at %d in [%s]
abort at %d in [%s]: %s
database table is locked: %s
cannot change %s wal mode from within a transaction
SELECT name, rootpage, sql FROM '%q'.%s WHERE %s ORDER BY rowid
cannot commit transaction - SQL statements in progress
cannot release savepoint - SQL statements in progress
no such savepoint: %s
cannot open savepoint - SQL statements in progress
statement aborts at %d: [%s] %s
cannot use index: %s
at most %d tables in a join
cannot open value of type %s
SELECT name, rootpage, sql FROM '%q'.%s ORDER BY rowid
unsupported file format
no such trigger: %S
unable to open database: %s
database %s is already in use
too many attached databases - max %d
sqlite_sequence
there is already an index named %s
DELETE FROM %Q.%s WHERE name=%Q AND type='index'
index associated with UNIQUE or PRIMARY KEY constraint cannot be dropped
no such index: %S
unable to identify the object to be reindexed
no such table: %s
%s.%s.%s
too many references to "%s": max 65535
sqlite_subquery_%p_
cannot create INSTEAD OF trigger on table: %S
cannot create %s trigger on view: %S
cannot open %s column for writing
no such column: "%s"
indexed
foreign key
cannot open view: %s
cannot open virtual table: %s
sqlite_altertab_%s
INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);CREATE%s INDEX %.*s
table %s has no column named %s
sqlite_autoindex_%s_%d
index %s already exists
there is already a table named %s
virtual tables may not be indexed
views may not be indexed
table %s may not be indexed
AUTOINCREMENT is only allowed on an INTEGER PRIMARY KEY
table "%s" has more than one primary key
CREATE TABLE %Q.sqlite_sequence(name,seq)
UPDATE %Q.%s SET type='%s', name=%Q, tbl_name=%Q, rootpage=#%d, sql=%Q WHERE rowid=#%d
CREATE %s %.*s
view %s is circularly defined
table %S has no column named %s
%d values for %d columns
table %S has %d columns but %d values were supplied
*** in database %s ***
unsupported encoding: %s
foreign_key_check
foreign_key_list
no such column: %s
there is already another table or index with this name: %s
UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
UPDATE "%w".sqlite_sequence set name = %Q WHERE name = %Q
UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d 18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
view %s may not be altered
-- TRIGGER %s
use DROP VIEW to delete view %s
use DROP TABLE to delete table %s
table %s may not be dropped
sqlite_stat
the NOT INDEXED clause is not allowed on UPDATE or DELETE statements within triggers
the INDEXED BY clause is not allowed on UPDATE or DELETE statements within triggers
Error %d has occurred.
Error %u in WinHttpReadData.
Error %u in WinHttpQueryDataAvailable.
Visual C CRT: Not enough memory to complete call to strerror.
portuguese-brazilian
Broken pipe
Inappropriate I/O control operation
Operation not permitted
operator
GetProcessWindowStation
WinHttpCloseHandle
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpWriteData
WinHttpGetProxyForUrl
WinHttpGetIEProxyConfigForCurrentUser
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpSetOption
WinHttpOpenRequest
WinHttpConnect
WinHttpCrackUrl
WinHttpSetTimeouts
WinHttpOpen
WINHTTP.dll
KERNEL32.dll
CreateDialogIndirectParamW
USER32.dll
GDI32.dll
RegOpenKeyExW
RegCreateKeyExW
RegDeleteKeyW
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExW
ADVAPI32.dll
ShellExecuteW
SHELL32.dll
ole32.dll
OLEAUT32.dll
URLDownloadToFileW
urlmon.dll
IPHLPAPI.DLL
GetCPInfo
.?AV?$CAtlExeModuleT@VCSmartInstallerModule@@@ATL@@
.?AVCWebPage@@
zcÁ
{A0386B19-B7E7-4BE7-B567-ABF77CBB6E60} = s `ATLExecServer'`ATLExecServer.EXE'
val AppID = s {BCCC2C7F-1383-417B-944F-1677DF428E44}ForceRemove {FA20B59B-21AA-44FC-8A68-450979B7CC90} = s 'CBrowserExternals Class'val ServerExecutable = s '%MODULE_RAW%'
TypeLib = s '{D14931FB-8313-4BCC-91EB-62F4EF2A8FC4}'ForceRemove {622D38AD-B4A9-4170-8192-5B865C6A5DCE} = s 'CBrowserExternalImp Class'ForceRemove {D14931FB-8313-4BCC-91EB-62F4EF2A8FC4} = s 'CBrowserExternal Class'stdole2.tlbWWW
Created by MIDL version 7.00.0555 at Mon Jun 01 13:00:06 2015
<!<%<)<-<1<5<9<=<
3 3;324 5}5
2"2&2*2.22262:2>2
4(4/484|4
4#4'4 4/4
7(9,9094989<9@9
: :$:(:,:0:4:@:
? ?$?(?,?0?4?8?<?@?
; ;$;(;,;0;
<$<,<8<\<|<
6$6,686\6|6
0 0$0@0\0|0
Advapi32.dll
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_PERFORMANCE_DATA
HKEY_DYN_DATA
HKEY_CURRENT_CONFIG
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/535.19 (KHTML, like Gecko) Chrome/18.0.1025.142 Safari/535.19
\default.html
Safari.exe
Opera.exe
firefox
chrome
http\shell\open\command
Opera.HTML
IE.AssocFile.HTM
FirefoxHTML
ChromeHTML
Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\UserChoice
Software\Mozilla\Mozilla FireFox
SOFTWARE\Mozilla\Mozilla FireFox
SOFTWARE\Google\Update\Clients\{8A69D345-D564-463c-AFF1-A69D9E530F96}opera
@@exeurl
4-4-0-5-9-2-6-1-2-7-5
AntivirusesRegKeys
RegKey64
RegKey32
PostRegKey64
PostRegKey32
PostExeResultValue
PostExeResultTerm
PreExeResultValue
PreExeResultTerm
PostExe
PreExe
ReportName
RegKey
ExeURL2
ExeURL
OfferURL
I{BCCC2C7F-1383-417B-944F-1677DF428E44}OLEAUT32.DLL
Mscoree.dll
888816666554443
6666554443
!6666554443
IWinHttpClient
downoad.exe
n2d.exe
mscoree.dll
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
KKERNEL32.DLL
WUSER32.DLL
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\beddbjcejb.exe
2015.61.210.64
20156121064.exe
{8856F961-340A-11D0-A96B-00C04FD705A2}
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
wmic.exe:1408
%original file name%.exe:1956
TE5FLEpSTA==28388.exe:1040
TE5FLEpSTA==10700.exe:352 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings%\%current user%\Local Settings\Temp\81440035318\TE5FLEpSTA==28388.exe (1638 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\81440035318\TE5FLEpSTA==10700.exe (50 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OHYRGXIJ\XPVistaChecker[1].exe (6838 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\89AJKDYV\DynamicOfferScreen[1].htm (2083 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OX6J4PMZ\OperaChecker25-6[1].exe (3762 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\81440035318.txt (238 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\gbcabfjbbgg.zip (56196 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\beddbjcejb.gbcabfjbbgg (8368 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\beddbjcejb.exe (7337 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsi2.tmp\ZipDLL.dll (5500 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsi2.tmp\auoekfj.dll (4341 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.