Trojan-PSW.Win32.Fareit_98844d0d8b
Gen:Variant.Graftor.125024 (BitDefender), Trojan.Win32.Cutwail.cfo (Kaspersky), BackDoor.Bulknet.1299 (DrWeb), Gen:Variant.Graftor.125024 (B) (Emsisoft), PWSZbot-FOF!98844D0D8B28 (McAfee), WS.Reputation.1 (Symantec), Trojan-Downloader.Win32.Cutwail (Ikarus), Gen:Variant.Graftor.125024 (FSecure), Trojan-PSW.Win32.Fareit.FD, TrojanPSWFareit.YR, GenericInjector.YR (Lavasoft MAS)
Behaviour: Trojan-Downloader, Trojan-PSW, Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
MD5: 98844d0d8b28ef5bd97bd82b0eaf5b82
SHA1: f3e3dd628670a808e1383e819f907c7844ce7aa4
SHA256: 059dd442f33feba010ea994a5418b61430c85cf7f7fa39f9e5c71c3888b81be1
SSDeep: 1536:iPMZBEr5QREE7lzaOtId9PHs65Jp Pst7J:i0ZBsih7gbd9PVJoEx
Size: 85504 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: Armadillov171, MicrosoftVisualC, MicrosoftVisualCv50v60MFC, MicrosoftVisualC50, UPolyXv05_v6
Company: no certificate found
Created at: 2011-04-28 15:44:57
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan-PSW. Trojan program intended for stealing users passwords.
Payload
No specific payload has been found.
Process activity
The Trojan-PSW creates the following process(es):
No processes have been created.
The Trojan-PSW injects its code into the following process(es):
%original file name%.exe:1548
File activity
The process %original file name%.exe:1548 makes changes in the file system.
The Trojan-PSW creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (251 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@bigtopmultimedia[1].txt (239 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\churchclothes[1].htm (20 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\timeturkey[1].htm (32 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\rovoneli[1].htm (261 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (273 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@atr-technologies[1].txt (239 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\fraser-high.school[1].htm (759 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (235 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (239 bytes)
%Documents and Settings%\%current user%\vinukykeapud.exe (601 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\bocr[1].htm (15 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (241 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@bigtopmultimedia[2].txt (239 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@screaminpeach[1].txt (233 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\mojacar-vacaciones[1].htm (876 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\safetyconnection[1].htm (13 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\empordalia[1].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\home[1].htm (13 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\redconeretreat[1].htm (13 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\lockerlookz[1].htm (28 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\sarpy[1].htm (20 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@goodvaluecenter[1].txt (237 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\cath4choice[1].htm (33 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\kamaruka.vic.edu[1].htm (30 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@plus[1].txt (214 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\eleterno[1].htm (17 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (235 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@paintball[2].txt (297 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\Crypto\RSA\S-1-5-21-1844237615-1960408961-1801674531-1003\c5b88721db08c824db69d0bbc702beb8_75ed9567-aa58-4c8e-a8ea-3cad7c47ab03 (881 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@bigjohnsbeefjerky[1].txt (241 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\enzoyrodrigo.com[2].htm (586 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\suspendedpage[1].htm (999 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\teasing-video[1].htm (1542 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\slcago[1].htm (400 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@pcpeds[1].txt (219 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@geothermusa[1].txt (160 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@paintball[1].txt (152 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@traderush[1].txt (268 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@agence-des-druides[1].txt (175 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\shs-sales.co[1].htm (20 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\enzoyrodrigo.com[1].htm (586 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\hostphd.com[1].htm (24 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@ulcndsu[1].txt (221 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (22552 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\sortedorganizing[1].htm (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\shs-sales.co[2].htm (20 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\momonophoto[1].htm (19 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@sarahdavid[1].txt (227 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@agence-des-druides[2].txt (358 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\urantiaproject[1].htm (756 bytes)
The Trojan-PSW deletes the following file(s):
%Documents and Settings%\%current user%\Cookies\Current_User@bigtopmultimedia[1].txt (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\churchclothes[1].htm (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\timeturkey[1].htm (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\rovoneli[1].htm (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\bocr[1].htm (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\safetyconnection[1].htm (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\empordalia[1].htm (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\home[1].htm (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\redconeretreat[1].htm (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\lockerlookz[1].htm (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\shs-sales.co[1].htm (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\kamaruka.vic.edu[1].htm (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\eleterno[1].htm (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\enzoyrodrigo.com[2].htm (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\slcago[1].htm (0 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@paintball[1].txt (0 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@agence-des-druides[1].txt (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\sarpy[1].htm (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\enzoyrodrigo.com[1].htm (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\hostphd.com[1].htm (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\cath4choice[1].htm (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\shs-sales.co[2].htm (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\momonophoto[1].htm (0 bytes)
Registry activity
The process %original file name%.exe:1548 makes changes in the system registry.
The Trojan-PSW creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion]
"vinukykeapudzap" = "7B 53 2B 03 DA B2 8A 62 3A 12 E9 C1 99 71 49 94"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 17 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion]
"2312304364" = "DD 07 0C 00 01 00 17 00 03 00 35 00 28 00 92 02"
"AppManagement" = "A7 7F 57 2F 07 DE B6 8E 66 3E 16 ED C5 11 E8 C0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F2 4D 85 99 91 E7 C6 77 40 8F D8 54 EA 33 18 BD"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
To automatically run itself each time Windows is booted, the Trojan-PSW adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"vinukykeapud" = "%Documents and Settings%\%current user%\vinukykeapud.exe"
The Trojan-PSW modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan-PSW modifies IE settings for security zones to map all web-nodes that bypassing proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan-PSW modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan-PSW deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
Network activity (URLs)
| URL | IP |
|---|---|
| hxxp://bocr.cz/ | |
| hxxp://sigmametalsinc.com/ | |
| hxxp://timeturkey.com/ | |
| hxxp://rovoneli.com/ | |
| hxxp://hostphd.com.br/ | |
| hxxp://eyggroup.com/ | |
| hxxp://wlf.louisiana.gov/ | |
| hxxp://bocr.cz/bocr | |
| hxxp://urantiaproject.com/ | |
| hxxp://cath4choice.org/ | |
| hxxp://eygwindows.co.uk/ | |
| hxxp://sullyfrance.com/ | |
| hxxp://www.sigmaaero.com/ | |
| hxxp://bocr.cz/bocr/ | |
| hxxp://d4drmedia.com/ | |
| hxxp://mail57.us2.mcsv.net/ | |
| hxxp://141.101.116.118/ | |
| hxxp://fraser-high.school.nz/ | |
| hxxp://mojacar-vacaciones.com/ | |
| hxxp://re-wakefield.co.uk/ | |
| hxxp://mailchimp.com/about/mcsv/ | |
| hxxp://safetyconnection.ca/ | |
| hxxp://79.98.23.30/ | |
| hxxp://miltinio-teatras.lt/ | |
| hxxp://padstow.com/ | |
| hxxp://bethisraelcenter.org/ | |
| hxxp://geodecisions.com/ | |
| hxxp://iaiglobal.or.id/ | |
| hxxp://capitalcitytuxedo.com/ | |
| hxxp://redconeretreat.com/ | |
| hxxp://csmbc.org/ | |
| hxxp://slcago.org/ | |
| hxxp://kafrit.com/ | |
| hxxp://coopsupermarkt.nl/ | |
| hxxp://momonophoto.com/ | |
| hxxp://199.83.132.93/ | |
| hxxp://guberman.com.br/ | |
| hxxp://bigjohnsbeefjerky.com/ | |
| hxxp://totalearthcare.com.au/ | |
| hxxp://e-kagami.com/ | |
| hxxp://buzzkillmedia.com/ | |
| hxxp://christybarry.com/ | |
| hxxp://christybarry.com/cgi-sys/suspendedpage.cgi | |
| hxxp://50.97.221.19/ | |
| hxxp://gablemarine.com/ | |
| hxxp://brookfarm.com.au/ | |
| hxxp://188.93.212.32/ | |
| hxxp://goodvaluecenter.com/ | |
| hxxp://sztartufi.com/ | |
| hxxp://leadershipforum.us/ | |
| hxxp://95.110.200.253/ | |
| hxxp://rodeoshow.com.au/ | |
| hxxp://t7k6a.x.incapdns.net/ | |
| hxxp://chscreative.com/ | |
| hxxp://racknstackwarehouse.com.au/ | |
| hxxp://boundbydesign.com/ | |
| hxxp://perc.ca/ | |
| hxxp://nanfangcw.com/ | |
| hxxp://upsilon89.com/ | |
| hxxp://fabianonline.de/ | |
| hxxp://iaiglobal.or.id/v02 | |
| hxxp://schiedel.it/ | |
| hxxp://lindsaymuskies.com/ | |
| hxxp://areafor.com/ | |
| hxxp://goodtimestove.com/ | |
| hxxp://ziuabarbatului.ro/ | |
| hxxp://trilatino.org/ | |
| hxxp://automa.it/ | |
| hxxp://newstarit.com/ | |
| hxxp://kamaruka.vic.edu.au/ | |
| hxxp://alain-cristina.fr/ | |
| hxxp://astechindo.com/ | |
| hxxp://sarpy.com/ | |
| hxxp://gemeauxrecords.com/ | |
| hxxp://beautifulworksforyou.com/ | |
| hxxp://geothermusa.com/ | |
| hxxp://mirasmart.com/ | |
| hxxp://nc-engineering.com/ | |
| hxxp://eleterno.com/ | |
| hxxp://sicklescorp.com/ | |
| hxxp://movielodge.com/ | |
| hxxp://nuritech.com/ | |
| hxxp://cen-wealth.com/ | |
| hxxp://zdnic.com/ | |
| hxxp://churchsupplies.net/ | |
| hxxp://digitalshell.net/ | |
| hxxp://cieam.com.br/ | |
| hxxp://sortedorganizing.com/ | |
| hxxp://simmons-huynh.org/ | |
| hxxp://iaiglobal.or.id/v02/ | |
| hxxp://alemnet.org/ | |
| hxxp://dogchat.co.uk/ | |
| hxxp://yniteh.ru/ | |
| hxxp://q-productions.com/ | |
| hxxp://autoakcesoria.com.pl/ | |
| hxxp://clarendonmarketing.com/ | |
| hxxp://wykrywacze.com.pl/ | |
| hxxp://gameznstuff.com/ | |
| hxxp://huyserasphalt.com/ | |
| hxxp://eaam.org/ | |
| hxxp://bghydro.com/ | |
| hxxp://consolerepairguy.com/ | |
| hxxp://gruponexus.com.ar/ | |
| hxxp://typowerspring.com/ | |
| hxxp://courthousetravelclinic.com/ | |
| hxxp://korea-engine.com/ | |
| hxxp://realtors.co.il/ | |
| hxxp://cidvale.com.br/ | |
| hxxp://amcenter.ru/ | |
| hxxp://gesyuku.net/ | |
| hxxp://rdiamondgroup.com/ | |
| hxxp://tubaloo.net/ | |
| hxxp://pengadindy.com/ | |
| hxxp://unityfdn.org/ | |
| hxxp://kationo.com/ | |
| hxxp://sepalumic.com/ | |
| hxxp://fas-assur.com/ | |
| hxxp://accountancywales.com/ | |
| hxxp://tenak.org/ | |
| hxxp://tomballbible.org/ | |
| hxxp://marbet.com/ | |
| hxxp://centinelafeed.com/ | |
| hxxp://fano.net/ | |
| hxxp://activeday.com/ | |
| hxxp://soilsystem.com/ | |
| hxxp://eastwesteye.com/ | |
| hxxp://forodeopinion.org/ | |
| hxxp://autoesteller.com/ | |
| hxxp://hotelportonmedellin.com/ | |
| hxxp://ogunquitbeach.com/ | |
| hxxp://digitalsmarthomes.com/ | |
| hxxp://kendo24.com/ | |
| hxxp://lisavillar.com/ | |
| hxxp://manuelandsonscarpetcleaning.net/ | |
| hxxp://fabrizio.net/ | |
| hxxp://ontimegamefeeders.com/ | |
| hxxp://accommodationinvenice.com/ | |
| hxxp://connection507.com/ | |
| hxxp://fondoarco.it/ | |
| hxxp://simdog.net/ | |
| hxxp://webvenues.com/ | |
| hxxp://dynatec-vp.com/ | |
| hxxp://turbo-separator.ch/ | |
| hxxp://fotofilmes.com.br/ | |
| hxxp://ercotravels.com/ | |
| hxxp://jjrjr.com/ | |
| hxxp://ertebatsanat.com/ | |
| hxxp://styloshoes.com/ | |
| hxxp://cobrasystems.com/ | |
| hxxp://hugheschem.com/ | |
| hxxp://thelogoloft.com/ | |
| hxxp://clarkebasementsystems.com/ | |
| hxxp://fuentenebro.com.es/ | |
| hxxp://colourtex.co.in/ | |
| hxxp://netalive.org/ | |
| hxxp://stimpson.com/ | |
| hxxp://zocher.us/ | |
| hxxp://iftcargas.com.br/ | |
| hxxp://nsjnail.com/ | |
| hxxp://mundysflorist.com/ | |
| hxxp://chapsrus.com/ | |
| hxxp://thecamelnet.com/ | |
| hxxp://rmmfg.com/ | |
| hxxp://myjeweller.com.au/ | |
| hxxp://coopcoach.ch/ | |
| hxxp://stomaster.com/ | |
| hxxp://tokushukai.com/ | |
| hxxp://leesos.com/ | |
| hxxp://nbgeneralsoft.ro/ | |
| hxxp://chakuonya.com/ | |
| hxxp://jps-salledebain.net/ | |
| hxxp://sadotrans.com/ | |
| hxxp://klasiquegoldens.com/ | |
| hxxp://recoding.net/ | |
| hxxp://absolutaire.com/ | |
| hxxp://oasis-land.com/ | |
| hxxp://kselsig.com/ | |
| hxxp://3dwebstudio.com.br/ | |
| hxxp://oprs.org/ | |
| hxxp://gruponunez.com/ | |
| hxxp://palomoyporras.com/ | |
| hxxp://igpromocions.com/ | |
| hxxp://temple-sinai.net/ | |
| hxxp://ccvaughan.com/ | |
| hxxp://jackshainman.com/ | |
| hxxp://j-english.net/ | |
| hxxp://ultrapowder.com/ | |
| hxxp://pedrottivini.com/ | |
| hxxp://lockportpark.org/ | |
| hxxp://indygojunction.com/ | |
| hxxp://ndi.net.pl/ | |
| hxxp://zappa.com.mx/ | |
| hxxp://metaxasarch.com/ | |
| hxxp://icomco.com/ | |
| hxxp://deryaltd.com.tr/ | |
| hxxp://blossomvalleybiblechurch.com/ | |
| hxxp://irvink.com/ | |
| hxxp://azcec.org/ | |
| hxxp://brahouse.ro/ | |
| hxxp://futureligonier.org/ | |
| hxxp://customsignstore.com/ | |
| hxxp://m-sj.or.jp/ | |
| hxxp://gerryraymonda.com/ | |
| hxxp://ntfire.net/ | |
| hxxp://mcloone.com/ | |
| hxxp://oaklandholidayparade.com/ | |
| hxxp://aestheticsoft.com/ | |
| hxxp://airfloatsys.com/ | |
| hxxp://badwinkel.be/ | |
| hxxp://wisperisp.com/ | |
| hxxp://hosttayim.com/ | |
| hxxp://premierhotels.co.za/ | |
| hxxp://auxsoinsdespetits.com/ | |
| hxxp://photographe-31.com/ | |
| hxxp://flower-gekijo.com/ | |
| hxxp://opportunity-inc.com/ | |
| hxxp://cabcollege.org/ | |
| hxxp://mojaxxllinia.com/ | |
| hxxp://nutri-tech.com.au/ | |
| hxxp://opale-net.net/ | |
| hxxp://niigata-koi.com/ | |
| hxxp://standrewspres.com/ | |
| hxxp://tornayabogados.com/ | |
| hxxp://internetway.net/ | |
| hxxp://mprojp.com/ | |
| hxxp://autoglass-takatsuki.com/ | |
| hxxp://mickeyshorr.com/ | |
| hxxp://southlinksgolf.com/ | |
| hxxp://koka-kanko.org/ | |
| hxxp://power-oldie.com/ | |
| hxxp://cdpublications.com/ | |
| hxxp://lordhaldonhotel.co.uk/ | |
| hxxp://nagoya67.com/ | |
| hxxp://garyfoundation.com/ | |
| realtechre.com | |
| ebda.org.pl | |
| xmassalt.com | |
| daytonaffair.org | |
| fatvirgin.com | |
| gracechicago.com | |
| sasquatch.com | |
| in1.smtp.messagingengine.com | |
| umutgumrukleme.com | |
| galloplast.com | |
| callaisofs.com | |
| greencroft.org | |
| cadeclinic.com | |
| k-ryokuen.com | |
| vitalur.by | |
| www.rodeoshow.com.au | |
| mxs.mail.ru | |
| tenpole.com | |
| konishi-hp.com | |
| www.momonophoto.com | |
| eomc.net | |
| blumencorso.com | |
| timbertrading.it | |
| gmail-smtp-in.l.google.com | |
| milnsbridge.com.au | |
| hayan-design.com | |
| biotek.com | |
| alt4.gmail-smtp-in.l.google.com | |
| elvial.gr | |
| aethora.com | |
| madih.info | |
| adult-vids.com | |
| redeinformatica.net | |
| nataliecurtiss.com | |
| xing-group.com | |
| tollefsondesign.com | |
| foamearphonecover.com | |
| chunkymuscle.com | |
| nasuken.com | |
| www.bigjohnsbeefjerky.com | |
| goldhostusa.com | |
| welcomingcenter.org | |
| saber-scorpion.com | |
| concls.com | |
| genmar.gen.tr | |
| www.iaiglobal.or.id | |
| cambridgeny.net | |
| marineware.com | |
| accel.lt | |
| qualitypunch.com | |
| rmpdesign.com | |
| mail7.digitalwaves.co.nz | |
| reflite.com | |
| alcapelhost.com | |
| accu-swift.com | |
| goodhill.com.kh | |
| www.eygwindows.co.uk | |
| yourorlandogetaway.com | |
| manuyantralaya.com | |
| hifuken.com |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):No processes have been created.
- Delete the original Trojan-PSW file.
- Delete or disinfect the following files created/modified by the Trojan-PSW:
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (251 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@bigtopmultimedia[1].txt (239 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\churchclothes[1].htm (20 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\timeturkey[1].htm (32 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\rovoneli[1].htm (261 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (273 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@atr-technologies[1].txt (239 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\fraser-high.school[1].htm (759 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (235 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (239 bytes)
%Documents and Settings%\%current user%\vinukykeapud.exe (601 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\bocr[1].htm (15 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (241 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@bigtopmultimedia[2].txt (239 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@screaminpeach[1].txt (233 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\mojacar-vacaciones[1].htm (876 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\safetyconnection[1].htm (13 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\empordalia[1].htm (10 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\home[1].htm (13 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\redconeretreat[1].htm (13 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\lockerlookz[1].htm (28 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\sarpy[1].htm (20 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@goodvaluecenter[1].txt (237 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\cath4choice[1].htm (33 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\kamaruka.vic.edu[1].htm (30 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@plus[1].txt (214 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\eleterno[1].htm (17 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (235 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@paintball[2].txt (297 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\Crypto\RSA\S-1-5-21-1844237615-1960408961-1801674531-1003\c5b88721db08c824db69d0bbc702beb8_75ed9567-aa58-4c8e-a8ea-3cad7c47ab03 (881 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@bigjohnsbeefjerky[1].txt (241 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\enzoyrodrigo.com[2].htm (586 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\suspendedpage[1].htm (999 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\teasing-video[1].htm (1542 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\slcago[1].htm (400 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@pcpeds[1].txt (219 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@geothermusa[1].txt (160 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@paintball[1].txt (152 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@traderush[1].txt (268 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@agence-des-druides[1].txt (175 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\shs-sales.co[1].htm (20 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\enzoyrodrigo.com[1].htm (586 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\hostphd.com[1].htm (24 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@ulcndsu[1].txt (221 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (22552 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\sortedorganizing[1].htm (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\shs-sales.co[2].htm (20 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\momonophoto[1].htm (19 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@sarahdavid[1].txt (227 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@agence-des-druides[2].txt (358 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\urantiaproject[1].htm (756 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"vinukykeapud" = "%Documents and Settings%\%current user%\vinukykeapud.exe" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.