Trojan-PSW.Win32.Fareit_1f077a3cb8
HEUR:Trojan.Win32.Generic (Kaspersky), Trojan.Win32.Cutwail.a (v) (VIPRE), Trojan-Downloader.Win32.Cutwail!IK (Emsisoft), Trojan-PSW.Win32.Fareit.FD, TrojanPSWFareit.YR, GenericInjector.YR (Lavasoft MAS)
Behaviour: Trojan-Downloader, Trojan-PSW, Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
MD5: 1f077a3cb8346c7e3e68bab926090e46
SHA1: 5003b95c99eeb847d07843d6821003febe249bf0
SHA256: 310cf05052a7ae11f758cb5bd3b16ae06ffcbc989dfd870f493cd62704505112
SSDeep: 768:2voWc2LXvjkD3ioonyZSWgclyXQhW54PtRvk8ULkvKJta7s:soE7MiNnyljlDI4FREAKJX
Size: 44544 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 1998-01-01 11:56:33
Summary:
Trojan-PSW. Trojan program intended for stealing users passwords.
Payload
No specific payload has been found.
Process activity
The Trojan-PSW creates the following process(es):
ctfmon.exe:252
The Trojan-PSW injects its code into the following process(es):
1f077a3cb8346c7e3e68bab926090e46.exe:2592
File activity
The process 1f077a3cb8346c7e3e68bab926090e46.exe:2592 makes changes in a file system.
The Trojan-PSW creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\1GGYBZUQ\phototype_com[1].txt (32 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OVYHJBCC\thedonaldsongroup_com[1].htm (9 bytes)
%Documents and Settings%\%current user%\Cookies\AZCFRAJS.txt (92 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OVYHJBCC\cgc-england_com[1].htm (29 bytes)
%Documents and Settings%\%current user%\qiniqvypsydo.exe (44 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OVYHJBCC\paulrenna_com[1].txt (1919 bytes)
%Documents and Settings%\%current user%\Cookies\RWQF6Z18.txt (123 bytes)
%Documents and Settings%\%current user%\Cookies\1P05ZG3S.txt (131 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\SZIS9VJF\bocr[1].htm (14 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\3F9KLW6F\photoclubs_com[1].htm (76 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OVYHJBCC\trenpalau_com[1].htm (5 bytes)
%Documents and Settings%\%current user%\Cookies\DOHWPVS7.txt (126 bytes)
%Documents and Settings%\%current user%\Cookies\PE1NR6HV.txt (132 bytes)
%Documents and Settings%\%current user%\Cookies\KNB134XP.txt (93 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\1GGYBZUQ\m[1].htm (3 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\SZIS9VJF\manuyantralaya_com[1].htm (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\3F9KLW6F\fraser-high_school_nz[1].htm (759 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\SZIS9VJF\kurecci_or_jp[1].htm (29 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OVYHJBCC\cksglobal_net[1].htm (31 bytes)
%Documents and Settings%\%current user%\Cookies\9B62C01A.txt (121 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\3F9KLW6F\starmedia_ca[1].htm (1636 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\1GGYBZUQ\teasing-video_com[1].htm (1351 bytes)
%Documents and Settings%\%current user%\Cookies\WWL0DXXO.txt (83 bytes)
%Documents and Settings%\%current user%\Cookies\72IJH17T.txt (148 bytes)
%Documents and Settings%\%current user%\Cookies\EOA82CB4.txt (117 bytes)
%Documents and Settings%\%current user%\Cookies\QS4HN7HG.txt (126 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\SZIS9VJF\precisionsolutionsky_com[1].htm (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\T4N99EVB.txt (245 bytes)
%Documents and Settings%\%current user%\Cookies\Q6NODL5H.txt (118 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OVYHJBCC\rueggeberg_com[1].txt (810 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\1GGYBZUQ\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\GVYEZ9PX.txt (122 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\1GGYBZUQ\lockerlookz_com[1].htm (27 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OVYHJBCC\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\SZIS9VJF\mandi-man_com[1].htm (10 bytes)
%Documents and Settings%\%current user%\Cookies\JBUJ08DV.txt (124 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\3F9KLW6F\teknorhino_com[1].htm (78 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\3F9KLW6F\eygwindows_co_uk[1].htm (98 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\Crypto\RSA\S-1-5-21-796845957-1563985344-1801674531-1003\c5b88721db08c824db69d0bbc702beb8_f3a4e041-90c9-46df-a35a-850a694fae5b (441 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\1GGYBZUQ\enzoyrodrigo_com_br[1].htm (586 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\3F9KLW6F\solutioncorp_com[1].txt (1991 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\3F9KLW6F\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\DRHTA3LY.txt (124 bytes)
%Documents and Settings%\%current user%\Cookies\RRAIDHCI.txt (273 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\SZIS9VJF\automa_it[1].htm (36 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OVYHJBCC\ubsades_com[1].htm (254 bytes)
%Documents and Settings%\%current user%\Cookies\GKW74YFO.txt (272 bytes)
%Documents and Settings%\%current user%\Cookies\VHUHTU75.txt (123 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\SZIS9VJF\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\SZIS9VJF\ginalimo_com[1].htm (15 bytes)
%Documents and Settings%\%current user%\Cookies\X9QVRCGE.txt (128 bytes)
%Documents and Settings%\%current user%\Cookies\KZ6PR58X.txt (114 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\1GGYBZUQ\suspendedpage[1].htm (3 bytes)
The Trojan-PSW deletes the following file(s):
%Documents and Settings%\%current user%\Cookies\KNB134XP.txt (0 bytes)
%Documents and Settings%\%current user%\Cookies\AZCFRAJS.txt (0 bytes)
%Documents and Settings%\%current user%\Cookies\WWL0DXXO.txt (0 bytes)
Registry activity
The process 1f077a3cb8346c7e3e68bab926090e46.exe:2592 makes changes in a system registry.
The Trojan-PSW creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6B 30 53 26 BE 46 3D 04 7C 43 12 24 5E 61 A1 11"
[HKCU\Software\Microsoft\Windows\CurrentVersion]
"3092446134" = "DD 07 0A 00 03 00 02 00 05 00 12 00 13 00 51 03"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion]
"AppManagement" = "96 FA D2 AA F5 CD A5 7D 55 A0 78 DC 28 8C 64 AF"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "46 00 00 00 40 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion]
"qiniqvypsydozap" = "75 4D 25 FC D4 AC F7 CF A7 7F 57 2F 7A 52 2A 02"
The Trojan-PSW modifies IE settings for security zones to map all web-nodes that bypassing proxy to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass" = "1"
The Trojan-PSW modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
To automatically run itself each time Windows is booted, the Trojan-PSW adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"qiniqvypsydo" = "%Documents and Settings%\%current user%\qiniqvypsydo.exe"
The Trojan-PSW modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan-PSW deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyServer"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyOverride"
The process ctfmon.exe:252 makes changes in a system registry.
The Trojan-PSW deletes the following value(s) in system registry:
The Trojan-PSW disables automatic startup of the application by deleting the following autorun value:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"internat.exe"
Network activity (URLs)
| URL | IP |
|---|---|
| hxxp://thedonaldsongroup.com/ | |
| hxxp://acmepacificrepairs.com/ | |
| hxxp://buzzkillmedia.com/ | |
| hxxp://doctsf.com/ | |
| hxxp://cgc-england.com/ | |
| hxxp://christybarry.com/ | |
| hxxp://ginalimo.com/ | |
| hxxp://solutioncorp.com/ | |
| hxxp://stormwildlifeart.com/ | |
| hxxp://asj.co.jp/ | |
| hxxp://bigjohnsbeefjerky.com/ | |
| hxxp://kagu-hokuren.com/ | |
| hxxp://kurecci.or.jp/ | |
| hxxp://christybarry.com/cgi-sys/suspendedpage.cgi | |
| hxxp://neurotoxininstitute.com/ | |
| hxxp://enzoyrodrigo.com.br/ | |
| hxxp://sigmametalsinc.com/ | |
| hxxp://rewardhits.com/ | |
| hxxp://cabooseonline.com/ | |
| hxxp://perc.ca/ | |
| hxxp://gamblingonlinemagazine.com/ | |
| hxxp://alternative-aquitaine.co.uk/ | |
| hxxp://paulrenna.com/ | |
| hxxp://appelfarm.org/ | |
| hxxp://www.sigmaaero.com/ | |
| hxxp://tessera.co.jp/ | |
| hxxp://egao.net/ | |
| hxxp://brookfarm.com.au/ | |
| hxxp://merceorti.com/ | |
| hxxp://eurasia.it/ | |
| hxxp://rodeoshow.com.au/ | |
| hxxp://churchsupplies.net/ | |
| hxxp://graceweb.net/ | |
| hxxp://precisionsolutionsky.com/ | |
| hxxp://telenavis.com/ | |
| hxxp://stecom.nl/ | |
| hxxp://youjoomla.com/ | |
| hxxp://avant-ime.com/ | |
| hxxp://teasing-video.com/ | |
| hxxp://chocolatecovers.com/ | |
| hxxp://t7k6a.x.incapdns.net/ | |
| hxxp://padstow.com/ | |
| hxxp://cf-protected-www.graceweb.net.cdn.cloudflare.net/ | |
| hxxp://d4drmedia.com/ | |
| hxxp://photoclubs.com/ | |
| hxxp://phototype.com/ | |
| hxxp://rueggeberg.com/ | |
| hxxp://4pipp.com/ | |
| hxxp://nd-evenementiel.com/ | |
| hxxp://minatech.net/ | |
| hxxp://eleterno.com/ | |
| hxxp://manuyantralaya.com/ | |
| hxxp://malagacorp.com/ | |
| hxxp://fraser-high.school.nz/ | |
| hxxp://stepnet.de/ | |
| hxxp://sspackaginggroup.com/ | |
| hxxp://safetyconnection.ca/ | |
| hxxp://ubsades.com/ | |
| hxxp://bocr.cz/ | |
| hxxp://courtney.ca/ | |
| hxxp://cksglobal.net/ | |
| hxxp://bocr.cz/bocr | |
| hxxp://istanbultarim.com.tr/ | |
| hxxp://theartofhair.com/ | |
| hxxp://gcs-cpa.com/ | |
| hxxp://bocr.cz/bocr/ | |
| hxxp://cf-protected-www.theartofhair.com.cdn.cloudflare.net/index.php?q=403.shtml | |
| hxxp://totalearthcare.com.au/ | |
| hxxp://mail57.us2.mcsv.net/ | |
| hxxp://screaminpeach.com/ | |
| hxxp://altonhousehotel.com/ | |
| hxxp://mailchimp.com/about/mcsv/ | |
| hxxp://upsilon89.com/ | |
| hxxp://e-kagami.com/ | |
| hxxp://sullyfrance.com/ | |
| hxxp://racknstackwarehouse.com.au/ | |
| hxxp://mastergrp-spb.ru/ | |
| hxxp://arquiteturadigital.com/ | |
| hxxp://mandi-man.com/ | |
| hxxp://starmedia.ca/ | |
| hxxp://selldoor.pl/ | |
| hxxp://austriansurfing.at/ | |
| hxxp://selldoor.pl/m/ | |
| hxxp://ziuabarbatului.ro/ | |
| hxxp://acsmedioambiente.com/ | |
| hxxp://trenpalau.com/ | |
| hxxp://eyggroup.com/ | |
| hxxp://eygwindows.co.uk/ | |
| hxxp://adultlivechat.us/ | |
| hxxp://automa.it/ | |
| meridies.org | |
| tutuji-saitama.com | |
| www.graceweb.net | |
| gablemarine.com | |
| brandone.us | |
| xn--22c6bfh8abch1g1b0ap6a9vxa.com | |
| brownlumber.net | |
| avisay.com | |
| in1.smtp.messagingengine.com | |
| gulfcoen.net | |
| lestersupstatesports.com | |
| ecsnj.com | |
| msasys.com | |
| acerbinky.com | |
| cbsprinting.com.au | |
| ibcd.com.br | |
| ydental.com | |
| hair-hutte.com | |
| crank-scrapers.com | |
| www.rodeoshow.com.au | |
| mxs.mail.ru | |
| orion-networks.net | |
| tenpole.com | |
| www.screaminpeach.com | |
| aerotech.com.hk | |
| smtp.mail.yahoo.com | |
| belmontflora.com | |
| brookhousegas.co.uk | |
| usgwarchives.net | |
| vnhanoi.com | |
| gmail-smtp-in.l.google.com | |
| fractalcom.net | |
| alt4.gmail-smtp-in.l.google.com | |
| kellyspropertyservices.com | |
| www.phototype.com | |
| mucc.org | |
| penavision.co.in | |
| www.photoclubs.com | |
| brhd.org | |
| vpx.com | |
| nataliecurtiss.com | |
| www.avant-ime.com | |
| soapandmore.com | |
| hartleyfoundation.org | |
| adfolsa.com.ec | |
| fxd24.com | |
| kondarihotel.com.au | |
| szostka.com | |
| cassdelivers.org | |
| denville.ca | |
| www.bigjohnsbeefjerky.com | |
| tafinance.com | |
| nc-concept.com | |
| www.solutioncorp.com | |
| csmbc.org | |
| comfortinsulation.com | |
| lockerlookz.com | |
| al-mawared.com | |
| www.theartofhair.com | |
| kingscoteit.com | |
| www.teknorhino.com | |
| clovisportales.com | |
| freepatentauction.com | |
| geodecisions.com | |
| katsumata-arch.com | |
| mail7.digitalwaves.co.nz | |
| free-service.de | |
| darshanvatika.com | |
| theautospas.com | |
| www.eygwindows.co.uk | |
| naijagurus.com | |
| graintrain.coop | |
| antakyaturu.com | |
| meubles-jacquelin.com | |
| x-cellcommunications.de |
Rootkit activity
No anomalies have been detected.
Propagation
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate the original Trojan-PSW's process (How to End a Process With the Task Manager).
- Delete the original Trojan-PSW file.
- Delete or disinfect the following files created/modified by the Trojan-PSW:
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\1GGYBZUQ\phototype_com[1].txt (32 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OVYHJBCC\thedonaldsongroup_com[1].htm (9 bytes)
%Documents and Settings%\%current user%\Cookies\AZCFRAJS.txt (92 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OVYHJBCC\cgc-england_com[1].htm (29 bytes)
%Documents and Settings%\%current user%\qiniqvypsydo.exe (44 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OVYHJBCC\paulrenna_com[1].txt (1919 bytes)
%Documents and Settings%\%current user%\Cookies\RWQF6Z18.txt (123 bytes)
%Documents and Settings%\%current user%\Cookies\1P05ZG3S.txt (131 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\SZIS9VJF\bocr[1].htm (14 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\3F9KLW6F\photoclubs_com[1].htm (76 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OVYHJBCC\trenpalau_com[1].htm (5 bytes)
%Documents and Settings%\%current user%\Cookies\DOHWPVS7.txt (126 bytes)
%Documents and Settings%\%current user%\Cookies\PE1NR6HV.txt (132 bytes)
%Documents and Settings%\%current user%\Cookies\KNB134XP.txt (93 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\1GGYBZUQ\m[1].htm (3 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\SZIS9VJF\manuyantralaya_com[1].htm (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\3F9KLW6F\fraser-high_school_nz[1].htm (759 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\SZIS9VJF\kurecci_or_jp[1].htm (29 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OVYHJBCC\cksglobal_net[1].htm (31 bytes)
%Documents and Settings%\%current user%\Cookies\9B62C01A.txt (121 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\3F9KLW6F\starmedia_ca[1].htm (1636 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\1GGYBZUQ\teasing-video_com[1].htm (1351 bytes)
%Documents and Settings%\%current user%\Cookies\WWL0DXXO.txt (83 bytes)
%Documents and Settings%\%current user%\Cookies\72IJH17T.txt (148 bytes)
%Documents and Settings%\%current user%\Cookies\EOA82CB4.txt (117 bytes)
%Documents and Settings%\%current user%\Cookies\QS4HN7HG.txt (126 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\SZIS9VJF\precisionsolutionsky_com[1].htm (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\T4N99EVB.txt (245 bytes)
%Documents and Settings%\%current user%\Cookies\Q6NODL5H.txt (118 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OVYHJBCC\rueggeberg_com[1].txt (810 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\1GGYBZUQ\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\GVYEZ9PX.txt (122 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\1GGYBZUQ\lockerlookz_com[1].htm (27 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OVYHJBCC\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\SZIS9VJF\mandi-man_com[1].htm (10 bytes)
%Documents and Settings%\%current user%\Cookies\JBUJ08DV.txt (124 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\3F9KLW6F\teknorhino_com[1].htm (78 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\3F9KLW6F\eygwindows_co_uk[1].htm (98 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\Crypto\RSA\S-1-5-21-796845957-1563985344-1801674531-1003\c5b88721db08c824db69d0bbc702beb8_f3a4e041-90c9-46df-a35a-850a694fae5b (441 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\1GGYBZUQ\enzoyrodrigo_com_br[1].htm (586 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\3F9KLW6F\solutioncorp_com[1].txt (1991 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\3F9KLW6F\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\DRHTA3LY.txt (124 bytes)
%Documents and Settings%\%current user%\Cookies\RRAIDHCI.txt (273 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\SZIS9VJF\automa_it[1].htm (36 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OVYHJBCC\ubsades_com[1].htm (254 bytes)
%Documents and Settings%\%current user%\Cookies\GKW74YFO.txt (272 bytes)
%Documents and Settings%\%current user%\Cookies\VHUHTU75.txt (123 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\SZIS9VJF\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\SZIS9VJF\ginalimo_com[1].htm (15 bytes)
%Documents and Settings%\%current user%\Cookies\X9QVRCGE.txt (128 bytes)
%Documents and Settings%\%current user%\Cookies\KZ6PR58X.txt (114 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\1GGYBZUQ\suspendedpage[1].htm (3 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"qiniqvypsydo" = "%Documents and Settings%\%current user%\qiniqvypsydo.exe" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.