Trojan.ScriptKD.3611_b99e789e64

by malwarelabrobot on November 5th, 2017 in Malware Descriptions.

HEUR:Trojan.Win32.Generic (Kaspersky), Trojan.ScriptKD.3611 (AdAware), Trojan-PSW.Win32.MSNPassword.FD, TrojanDropperVtimrun.YR (Lavasoft MAS)
Behaviour: Trojan-Dropper, Trojan-PSW, Trojan


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: b99e789e646b2d8a87e986842d4dc491
SHA1: 6bc342a4c1a8049d6ecb4ed0cca9c1c98c42af12
SHA256: fd4d6e51888bff2b15d21cf640ba999a30f18d54d6dc456c6c739553eeadec92
SSDeep: 98304:4SOiiD3megbx0qvOuhzumHYC0CSXjfiFfqqzjmA6 tnNG3v88K:4Nme5qvOuhD4sSXj6JquyF tg39K
Size: 4367360 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company:
Created at: 2004-08-04 09:01:37
Analyzed on: Windows7 SP1 32-bit


Summary:

Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).

Payload

No specific payload has been found.

Process activity

The Trojan creates the following process(es):

%original file name%.exe:1504

The Trojan injects its code into the following process(es):

WerFault.exe:3728
1.xyz:2028

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process 1.xyz:2028 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\CSIDL_ (673 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\CSIDL_X (673 bytes)

The process %original file name%.exe:1504 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\Users\"%CurrentUserName%"\AppData\Local\Temp\IXP000.TMP\1.xy_ (2938 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\IXP000.TMP\1.xyz (69050 bytes)

Registry activity

The process WerFault.exe:3728 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug]
"ExceptionRecord" = "05 00 00 C0 00 00 00 00 00 00 00 00 00 00 00 00"

[HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug\UIHandles]
"FirstLevelConsentDialog" = "Type: REG_QWORD, Length: 8"

[HKCU\Software\Microsoft\Windows\Windows Error Reporting\Debug\UIHandles]
"FirstLevelConsentDialog" = "Type: REG_QWORD, Length: 8"

The process %original file name%.exe:1504 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"wextract_cleanup0" = "rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 C:\Users\"%CurrentUserName%"\AppData\Local\Temp\IXP000.TMP\"

Dropped PE files

MD5 File path
f4ebabaae01c6b5a7677c9be63586813 c:\Users\"%CurrentUserName%"\AppData\Local\Temp\IXP000.TMP\1.xyz

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

VersionInfo

Company Name: Microsoft Corporation
Product Name: HD Player
Product Version: 6.00.2900.2180
Legal Copyright: (c) Microsoft Corporation. All rights reserved.
Legal Trademarks:
Original Filename: WEXTRACT.EXE
Internal Name: Wextract
File Version: 6.00.2900.2180 (xpsp_sp2_rtm.040803-2158)
File Description: Win32 Cabinet Self-Extractor
Comments:
Language: English (United States)

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 4096 39212 39424 4.55052 17a6fbe18a834b6f3462304415675d36
.data 45056 7140 1024 2.94449 99858e86526942a66950c7139f78a725
.rsrc 53248 4325768 4325888 5.54421 d0b912225bd1bcc922995e7ffe855c5b

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

No activity has been detected.

IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

Traffic

Web Traffic was not found.

The Trojan connects to the servers at the folowing location(s):

%original file name%.exe_1504:

.text
`.data
.rsrc
ADVAPI32.dll
KERNEL32.dll
NTDLL.DLL
GDI32.dll
USER32.dll
COMCTL32.dll
VERSION.dll
 ku2.iu
advapi32.dll
advpack.dll
wininit.ini
Software\Microsoft\Windows\CurrentVersion\App Paths
setupapi.dll
setupx.dll
IXPd.TMP
TMP4351$.TMP
FINISHMSG
USRQCMD
ADMQCMD
msdownld.tmp
wextract.pdb
PSSSSSSh
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegQueryInfoKeyA
GetWindowsDirectoryA
ExitWindowsEx
MsgWaitForMultipleObjects
rundll32.exe %s,InstallHinfSection %s 128 %s
SHELL32.DLL
Software\Microsoft\Windows\CurrentVersion\RunOnce
PendingFileRenameOperations
System\CurrentControlSet\Control\Session Manager\FileRenameOperations
wextract_cleanup%d
%s /D:%s
rundll32.exe %sadvpack.dll,DelNodeRunDLL32 "%s"
Command.com /c %s
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\IXP000.TMP\
33333330
3333333
33333333
1.xyz
1.xy_
A%Ft7
ÒDkOU\
UFtPiQX*vE
3.Nti
udP@,
yK.hhio
\.xJL@
-T}e>
s%x[X
REG.Gz
".oRY
(%cSNi
{.jz2
Rn%dHI
h-w9}
install.bat
install.vbs
rfusclient.exe
\={B%x
6.vCe
!ÞTBg
s.hRx
1.PVY
Vi %xaz
}-AFE}
j&NÝ@
"X-E}
).pg[
.SkyC|
`!.RO
.rI@a
(8q$.FRW
Kz%DT
P.KXps
z%1sq
H}#D
6qZ.mu
oY.Lo
x2%x)
:".Tz
3.nEmk
-e} ?>
[d.DO
_u4.mU
,3.QH
}{.DP
%s7d5
o].Ra
PYa%x
Z;%Ug
.EE:*
mM5%F
.xVsK
.byxR3
.xOj},
.am%E
t.Ww&
JWEb-Y
QcBh
=_.Ao
ed2%U
%Xwhv
%dp3Vm
.uL<CK
gn.Hd@?[
s[3.Nc
sL.kP
s`*=%S
^%d#*
A.cP~|
4OFtP
1%dX{E
.OOup2
J7$%x#
7_S%X
?h"Y*.wr
-.xMlb
/%Xe1
#.tJe
 ,hC%U
Z$l%sPS
b_-1}
".xWGX
g@{.qX
0X .%se
M1#
AsSh^
.wzFV
.h.iZ
V.kz:
Px-q}
v^K%U
4%uiM
1%UXj
3zV%X
.LmD;
%D-{q0
&f%c$
?[3#.Qr
%FR q!V~V
?uel%u
r".DADy
)(.yYF
v:.gu7
.Vk=E
.UAk%
qÿ4!w
=w.Iv
.Hv|m~^
tcP9W
(.Dae
.pptD8
.URD;
t%x;Xa Ci)t
Yo.HS
4i5%U
.Nc'6
A.xn[
uJ@.tB
AC.utY
%D%B@
)/u-A%UH2L>g
uTcPJ
U%flU
%cM{r
.GQUX
Wn%4S
.Tv2K^
`H%ss
as.sw
X.pM5i#h
u.EYh
7i)YX%C
"Y.GM
CG .Sx=k
cRtoW
d.QuJV
.afXAx
UdpW
MMz'%D
AO.YoLo
WFtp
%6U*B\vx
'%sXF
-t.Uu
0H/%U
L.MfJ
&.OeX
0Um%d
.rS|5
.xo1m
{.kmK
rutserv.exe
\ %XZq8
K.{uU%u)
.goo{D
%Xß
%DWh\
.IhN(^v
A%U@d
iH.swE~
h.TYm
h..ZU
%5uhP
_o.qL
.lC *
-Uu|
jyYY%x
<V.VTWA): F 
::S.RJn
@b%d"
ZO.jX
!.Vgy0
.qbu$
.snhh
;n.aJ
.gg'mx^#
U.ZBZ
>.hWt
w.KI]{K
,%DhL>
_ÕZ
F.bBg
a.Xyf
.mt*LUc
qrb.`:WnU0*%f
%1ua2
?'.dX
n%F}Y
.kl?6
.gJbI=
Ky.yc
.KQDa
.zY#$
m%cZ#,
.DSVp
Y1.ak
Z~%%CS
Z.YV=
OWzÃ@
%St`:]
3$1$,$0!
jJ.oI
.VP.6
xKbb\p2ó
.Rguo
WKP2|`%d
n%ssm
WWJ%D
\py3.be
(!.Iv
:ÿ`
{C.lol
1?.fp
5.l.Rn
APV%F
.uPUt
.].bC
g].Ro9
".jh{
)_P%S
.uD,O
'%Sq^
,0U~.fDB
zx.UC
27.jl
zZR:%F
ÀTc
.qti]
.Vd1)
MfTpf
%DlWW
QSKy.yI7
8[_'*`69
^ B9tY.MM0
_%Sy^
.DA%"
%4.Tq
\.DgYH
NE%sr$
BLa%ub
$z.eac#
%9xWS
2h-q}l
C@L%F
%u}q"
s.fuX
.vMzk.
JV !B.Nyq7
^.FWKy
,^%Ut@
uCRtE
22
Ym.JO
'u.BL
bB.RIqs
-.iAQ
.sWmn_w
ðn!
Lu%sko
~7.ot
WG.WK
g,X.lK
DZM%D (I
CMdZ
.En Tu
o:\'W
Ix%f!
#%St[u
=[}E%c,F
~N?gzo.ZP
E.ek6
%S,kS
-X}E3
()/.BE
$ .YG
z.sz2
.4 , %..
fTPVg|
N%xV5i.
.xsGN
\%D$O
A.BCO
qjY4%D
=9R.bq
n;.hq
h%dn3
W}.%Sa
%X&x3D
nF%U7o
S.jOb
%S'6#
AL@.bgj)`
vp8decoder.dll
~B%X>d
o{S.vE
.nWWf
Ë >
.IIVI
J.OytC
R~D%x
hR.uy|s
F;.Li
(_}Ã,
W%F;}Z5
%sM8B'4
Q%Fubq
]*.rU#
1/%Xp
.vs1z
@1Xq.otw
)-@>N.BG
3%Xc 
sh%XEG
%cl,!Y
(A%x'
]au%S-
2h@&%S'
.rd -yiI
`.nO)
.VH/gjdm
TCPH
6_.YH
&?.Xu
%cZGE
?.tN`WW
.tK#=
.OOpm
%f`h-
HB.dx
{r-B}
#'wd(%c
cB.ql
]e.hp
Ul%d<
.SP\C
f2S%F
û&fA
>\.HO
<.ZaVP]
Iy{W.fl
.RgzB
]O%c(
<.ysI
.Cy:X
.Za>z
~<;.FL
B.dVc
-AvV}
:Y.Ov
<m.Ci
.Oa0-
~t0%UC
?!.FB
_).OB
'%DR1
P(.hl
/%Uj$
G%f:~
.ZFqt
-W}6Zv
%^E%u"
-S.FP
cRT-b=
.xu-@e9
regedit.reg
k-%C#
&E.dGHs
%X.n?
Pe-t}
^%D 0
.TP\?gc
 ]".kG$}
a.Fr=B
%Y.XRuN
(".mF
.Kw_*AQm&
.fIIKS
X~4.EK
=.Gdhn
F%X
.iW$r
.qZID
i%5ubL
BCN%u
Please read the following license agreement. Press the PAGE DOWN key to see the rest of the agreement.
CFailed to get disk space information from: %s.
System Message: %s.&A required resource cannot be located. Are you sure you want to cancel?
8Unable to retrieve operating system version information.!Memory allocation request failed.
Filetable full.Ên not change to destination folder.
Setup could not find a drive with %s KB free disk space to install the program. Please free up some space first and press RETRY or press CANCEL to exit setup.KThat folder is invalid. Please make sure the folder exists and is writable.IYou must specify a folder with fully qualified pathname or choose Cancel.!Could not update folder edit box.5Could not load functions required for browser dialog.7Could not load Shell32.dll required for browser dialog.
(Error creating process <%s>. Reason: %s1The cluster size in this system is not supported.,A required resource appears to be corrupted.QWindows 95 or Windows NT 4.0 Beta 2 or greater is required for this installation.
Error loading %shGetProcAddress() failed on function '%s'. Possible reason: incorrect version of advpack.dll being used./Windows 95 or Windows NT is required to install
Could not create folder '%s'
To install this program, you need %s KB disk space on drive %s. It is recommended that you free up the required disk space before you continue.
Error retrieving Windows folder
$NT Shutdown: OpenProcessToken error.)NT Shutdown: AdjustTokenPrivileges error.!NT Shutdown: ExitWindowsEx error.}Extracting file failed. It is most likely caused by low memory (low disk space for swapping file) or corrupted Cabinet file.aThe setup program could not retrieve the volume information for drive (%s) .
System message: %s.xSetup could not find a drive with %s KB free disk space to install the program. Please free up some space and try again.eThe installation program appears to be damaged or corrupted. Contact the vendor of this application.
/C:<Cmd> -- Override Install Command defined by author.
eAnother copy of the '%s' package is already running on your system. Do you want to run another copy?
Could not find the file: %s.
:The folder '%s' does not exist. Do you want to create it?hAnother copy of the '%s' package is already running on your system. You can only run one copy at a time.OThe '%s' package is not compatible with the version of Windows you are running.SThe '%s' package is not compatible with the version of the file: %s on your system.
6.00.2900.2180 (xpsp_sp2_rtm.040803-2158)
WEXTRACT.EXE
Windows
Operating System
6.00.2900.2180

1.xyz_2028:

.text
`.rdata
@.data
.idata
.rsrc
@.reloc
u$SShe
File%d
CCmdTarget
commctrl_DragListMsg
Afx:%x:%x:%x:%x:%x
Afx:%x:%x
COMCTL32.DLL
MSWHEEL_ROLLMSG
CNotSupportedException
GDI32.DLL
ddeexec
%s\ShellNew
%s\DefaultIcon
%s\shell\printto\%s
%s\shell\print\%s
%s\shell\open\%s
{X-X-X-XX-XXXXXX}
MSH_SCROLL_LINES_MSG
%*.*f
ole32.dll
__MSVCRT_HEAP_SELECT
user32.dll
MapInfo Map Files (*.gst)|*.gst|All Files (*.*)|*.*||
*.gst
MapX.Map.5
.PAVCOleException@@
.PAVCOleDispatchException@@
.?AVCCmdTarget@@
.PAVCException@@
.?AVCCmdUI@@
.?AVCTestCmdUI@@
.PAVCUserException@@
.PAVCObject@@
.PAVCSimpleException@@
.PAVCMemoryException@@
.PAVCNotSupportedException@@
.?AVCNotSupportedException@@
.?AVCStatusCmdUI@@
.?AVCToolCmdUI@@
.PAVCResourceException@@
.PAVCFileException@@
zcÁ
windows
KERNEL32.DLL
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\IXP000.TMP\1.xyz
diu2.iuM iu
/wK(.wS
GetCPInfo
KERNEL32.dll
CreateDialogIndirectParamA
SetWindowsHookExA
GetKeyState
UnhookWindowsHookEx
USER32.dll
GetViewportOrgEx
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
GetViewportExtEx
GDI32.dll
comdlg32.dll
WINSPOOL.DRV
RegCloseKey
RegEnumKeyA
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyExA
RegCreateKeyA
ADVAPI32.dll
SHELL32.dll
COMCTL32.dll
oledlg.dll
OLEPRO32.DLL
OLEAUT32.dll
9":(:,:0:4:
0%0/0]0~0
=#='= =9=
494]5
1 1$1,101
6 6$6(6,6
1, 0, 0, 1
GeoExpert.EXE
GeoExpert.Document
(*.*)
Output.prn$
(*.prn)|*.prn|
(*.*)|*.*||

1.xyz_2028_rwx_00500000_00005000:

PSSSSSSh

1.xyz_2028_rwx_00510000_0001F000:

.text
`.rdata
@.data
@.rsrc
SSh|EA
^SShq
%.*s(%d)%s
COMCTL32.dll
SHLWAPI.dll
GetProcessHeap
GetCPInfo
KERNEL32.dll
USER32.dll
GDI32.dll
COMDLG32.dll
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
ADVAPI32.dll
SHFileOperationW
ShellExecuteExW
SHELL32.dll
ole32.dll
OLEAUT32.dll
WINRAR.SFX
d:\Projects\WinRAR\SFX\build\sfxrar32\Release\sfxrar.pdb
version="1.0.0.0"
<requestedExecutionLevel level="asInvoker"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<!--The ID below indicates application support for Windows Vista -->
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/>
<!--The ID below indicates application support for Windows 7 -->
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/>
<asmv3:windowsSettings xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">
</asmv3:windowsSettings>
.rsrc
i.iN>
%u$Vd
.htm0ep($
SER32.dll
m;%Cl&e
ChildF.me<\Prog
crtC
.ms-*nl
B%skE
# :.rd
KERNEL32.DLL
iphlpapi.dll
MFC42.DLL
MSVCRT.dll
WININET.dll
WS2_32.dll
ShellExecuteA
r%.*s(%d)%s
rtmp%d
Crypt32.dll
%s %s
%s %s %s
GETPASSWORD1
%s%s%d
Software\Microsoft\Windows\CurrentVersion
%s.%d.tmp
winrarsfxmappingfile.tmp
-el -s2 "-d%s" "-p%s" "-sp%s"
__tmp_rar_sfx_access_check_%u
sfxcmd
<head><meta http-equiv="content-type" content="text/html; charset=
Shell.Explorer
riched20.dll
riched32.dll
"%s"&
Windows

1.xyz_2028_rwx_01A60000_0047C000:

.text
`.rdata
@.data
.idata
.rsrc
@.reloc
u$SShe
File%d
CCmdTarget
commctrl_DragListMsg
Afx:%x:%x:%x:%x:%x
Afx:%x:%x
COMCTL32.DLL
MSWHEEL_ROLLMSG
CNotSupportedException
GDI32.DLL
ddeexec
%s\ShellNew
%s\DefaultIcon
%s\shell\printto\%s
%s\shell\print\%s
%s\shell\open\%s
{X-X-X-XX-XXXXXX}
MSH_SCROLL_LINES_MSG
%*.*f
ole32.dll
__MSVCRT_HEAP_SELECT
user32.dll
MapInfo Map Files (*.gst)|*.gst|All Files (*.*)|*.*||
*.gst
MapX.Map.5
.PAVCOleException@@
.PAVCOleDispatchException@@
.?AVCCmdTarget@@
.PAVCException@@
.?AVCCmdUI@@
.?AVCTestCmdUI@@
.PAVCUserException@@
.PAVCObject@@
.PAVCSimpleException@@
.PAVCMemoryException@@
.PAVCNotSupportedException@@
.?AVCNotSupportedException@@
.?AVCStatusCmdUI@@
.?AVCToolCmdUI@@
.PAVCResourceException@@
.PAVCFileException@@
zcÁ
windows
KERNEL32.DLL
GetCPInfo
KERNEL32.dll
CreateDialogIndirectParamA
SetWindowsHookExA
GetKeyState
UnhookWindowsHookEx
USER32.dll
GetViewportOrgEx
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
GetViewportExtEx
GDI32.dll
comdlg32.dll
WINSPOOL.DRV
RegCloseKey
RegEnumKeyA
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyExA
RegCreateKeyA
ADVAPI32.dll
SHELL32.dll
COMCTL32.dll
oledlg.dll
OLEPRO32.DLL
OLEAUT32.dll
9":(:,:0:4:
0%0/0]0~0
=#='= =9=
494]5
1 1$1,101
6 6$6(6,6
install.bat
install.vbs
rfusclient.exe
\={B%x
6.vCe
!ÞTBg
s.hRx
1.PVY
Vi %xaz
}-AFE}
j&NÝ@
"X-E}
).pg[
.SkyC|
`!.RO
.rI@a
(8q$.FRW
Kz%DT
P.KXps
z%1sq
H}#D
6qZ.mu
oY.Lo
x2%x)
:".Tz
3.nEmk
-e} ?>
[d.DO
_u4.mU
,3.QH
}{.DP
%s7d5
o].Ra
PYa%x
Z;%Ug
.EE:*
mM5%F
.xVsK
.byxR3
.xOj},
.am%E
t.Ww&
JWEb-Y
QcBh
=_.Ao
ed2%U
%Xwhv
%dp3Vm
.uL<CK
gn.Hd@?[
s[3.Nc
sL.kP
s`*=%S
^%d#*
A.cP~|
4OFtP
1%dX{E
.OOup2
J7$%x#
7_S%X
?h"Y*.wr
-.xMlb
/%Xe1
#.tJe
 ,hC%U
Z$l%sPS
b_-1}
".xWGX
g@{.qX
0X .%se
M1#
AsSh^
.wzFV
.h.iZ
V.kz:
Px-q}
v^K%U
4%uiM
1%UXj
3zV%X
.LmD;
%D-{q0
&f%c$
?[3#.Qr
%FR q!V~V
?uel%u
r".DADy
)(.yYF
v:.gu7
.Vk=E
.UAk%
qÿ4!w
=w.Iv
.Hv|m~^
tcP9W
(.Dae
.pptD8
.URD;
t%x;Xa Ci)t
Yo.HS
4i5%U
.Nc'6
A.xn[
uJ@.tB
AC.utY
%D%B@
)/u-A%UH2L>g
uTcPJ
U%flU
%cM{r
.GQUX
Wn%4S
.Tv2K^
`H%ss
as.sw
X.pM5i#h
u.EYh
7i)YX%C
"Y.GM
CG .Sx=k
cRtoW
d.QuJV
.afXAx
UdpW
MMz'%D
AO.YoLo
WFtp
%6U*B\vx
'%sXF
-t.Uu
0H/%U
L.MfJ
&.OeX
0Um%d
.rS|5
.xo1m
{.kmK
rutserv.exe
\ %XZq8
K.{uU%u)
.goo{D
%Xß
%DWh\
.IhN(^v
A%U@d
iH.swE~
h.TYm
h..ZU
%5uhP
_o.qL
.lC *
-Uu|
jyYY%x
<V.VTWA): F 
::S.RJn
@b%d"
ZO.jX
!.Vgy0
.qbu$
.snhh
;n.aJ
.gg'mx^#
U.ZBZ
>.hWt
w.KI]{K
,%DhL>
_ÕZ
F.bBg
a.Xyf
.mt*LUc
qrb.`:WnU0*%f
%1ua2
?'.dX
n%F}Y
.kl?6
.gJbI=
Ky.yc
.KQDa
.zY#$
m%cZ#,
.DSVp
Y1.ak
Z~%%CS
Z.YV=
OWzÃ@
%St`:]
3$1$,$0!
jJ.oI
.VP.6
xKbb\p2ó
.Rguo
WKP2|`%d
n%ssm
WWJ%D
\py3.be
(!.Iv
:ÿ`
{C.lol
1?.fp
5.l.Rn
APV%F
.uPUt
.].bC
g].Ro9
".jh{
)_P%S
.uD,O
'%Sq^
,0U~.fDB
zx.UC
27.jl
zZR:%F
ÀTc
.qti]
.Vd1)
MfTpf
%DlWW
QSKy.yI7
8[_'*`69
^ B9tY.MM0
_%Sy^
.DA%"
%4.Tq
\.DgYH
NE%sr$
BLa%ub
$z.eac#
%9xWS
2h-q}l
C@L%F
%u}q"
s.fuX
.vMzk.
JV !B.Nyq7
^.FWKy
,^%Ut@
uCRtE
22
Ym.JO
'u.BL
bB.RIqs
-.iAQ
.sWmn_w
ðn!
Lu%sko
~7.ot
WG.WK
g,X.lK
DZM%D (I
CMdZ
.En Tu
o:\'W
Ix%f!
#%St[u
=[}E%c,F
~N?gzo.ZP
E.ek6
%S,kS
-X}E3
()/.BE
$ .YG
z.sz2
.4 , %..
fTPVg|
N%xV5i.
.xsGN
\%D$O
A.BCO
qjY4%D
=9R.bq
n;.hq
h%dn3
W}.%Sa
%X&x3D
nF%U7o
S.jOb
%S'6#
AL@.bgj)`
vp8decoder.dll
~B%X>d
o{S.vE
.nWWf
Ë >
.IIVI
J.OytC
R~D%x
hR.uy|s
F;.Li
(_}Ã,
W%F;}Z5
%sM8B'4
Q%Fubq
]*.rU#
1/%Xp
^2.Qq
vp8encoder.dll
.VUIO
dþN=eF
`.nO)
.VH/gjdm
TCPH
6_.YH
&?.Xu
%cZGE
?.tN`WW
.tK#=
.OOpm
%f`h-
HB.dx
{r-B}
#'wd(%c
cB.ql
]e.hp
Ul%d<
.SP\C
f2S%F
û&fA
>\.HO
<.ZaVP]
Iy{W.fl
.RgzB
]O%c(
<.ysI
.Cy:X
.Za>z
~<;.FL
B.dVc
-AvV}
:Y.Ov
<m.Ci
.Oa0-
~t0%UC
8W@q.MI
ua%DN
f'%c'
-S.FP
cRT-b=
.xu-@e9
regedit.reg
k-%C#
&E.dGHs
%X.n?
Pe-t}
^%D 0
.TP\?gc
 ]".kG$}
a.Fr=B
%Y.XRuN
(".mF
.Kw_*AQm&
.fIIKS
X~4.EK
=.Gdhn
F%X
.iW$r
.qZID
i%5ubL
BCN%u
1, 0, 0, 1
GeoExpert.EXE
GeoExpert.Document
(*.*)
Output.prn$
(*.prn)|*.prn|
(*.*)|*.*||

1.xyz_2028_rwx_029A0000_02CCF000:

.text
`.rdata
@.data
.idata
.rsrc
@.reloc
u$SShe
File%d
CCmdTarget
commctrl_DragListMsg
Afx:%x:%x:%x:%x:%x
Afx:%x:%x
COMCTL32.DLL
MSWHEEL_ROLLMSG
CNotSupportedException
GDI32.DLL
ddeexec
%s\ShellNew
%s\DefaultIcon
%s\shell\printto\%s
%s\shell\print\%s
%s\shell\open\%s
{X-X-X-XX-XXXXXX}
MSH_SCROLL_LINES_MSG
%*.*f
ole32.dll
__MSVCRT_HEAP_SELECT
user32.dll
MapInfo Map Files (*.gst)|*.gst|All Files (*.*)|*.*||
*.gst
MapX.Map.5
.PAVCOleException@@
.PAVCOleDispatchException@@
.?AVCCmdTarget@@
.PAVCException@@
.?AVCCmdUI@@
.?AVCTestCmdUI@@
.PAVCUserException@@
.PAVCObject@@
.PAVCSimpleException@@
.PAVCMemoryException@@
.PAVCNotSupportedException@@
.?AVCNotSupportedException@@
.?AVCStatusCmdUI@@
.?AVCToolCmdUI@@
.PAVCResourceException@@
.PAVCFileException@@
zcÁ
windows
KERNEL32.DLL
GetCPInfo
KERNEL32.dll
CreateDialogIndirectParamA
SetWindowsHookExA
GetKeyState
UnhookWindowsHookEx
USER32.dll
GetViewportOrgEx
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
GetViewportExtEx
GDI32.dll
comdlg32.dll
WINSPOOL.DRV
RegCloseKey
RegEnumKeyA
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyExA
RegCreateKeyA
ADVAPI32.dll
SHELL32.dll
COMCTL32.dll
oledlg.dll
OLEPRO32.DLL
OLEAUT32.dll
9":(:,:0:4:
0%0/0]0~0
=#='= =9=
494]5
1 1$1,101
6 6$6(6,6
install.bat
install.vbs
rfusclient.exe
\={B%x
6.vCe
!ÞTBg
s.hRx
1.PVY
Vi %xaz
}-AFE}
j&NÝ@
"X-E}
).pg[
.SkyC|
`!.RO
.rI@a
(8q$.FRW
Kz%DT
P.KXps
z%1sq
H}#D
6qZ.mu
oY.Lo
x2%x)
:".Tz
3.nEmk
-e} ?>
[d.DO
_u4.mU
,3.QH
}{.DP
%s7d5
o].Ra
PYa%x
Z;%Ug
.EE:*
mM5%F
.xVsK
.byxR3
.xOj},
.am%E
t.Ww&
JWEb-Y
QcBh
=_.Ao
ed2%U
%Xwhv
%dp3Vm
.uL<CK
gn.Hd@?[
s[3.Nc
sL.kP
s`*=%S
^%d#*
A.cP~|
4OFtP
1%dX{E
.OOup2
J7$%x#
7_S%X
?h"Y*.wr
-.xMlb
/%Xe1
#.tJe
 ,hC%U
Z$l%sPS
b_-1}
".xWGX
g@{.qX
0X .%se
M1#
AsSh^
.wzFV
.h.iZ
V.kz:
Px-q}
v^K%U
4%uiM
1%UXj
3zV%X
.LmD;
%D-{q0
&f%c$
?[3#.Qr
%FR q!V~V
?uel%u
r".DADy
)(.yYF
v:.gu7
.Vk=E
.UAk%
qÿ4!w
=w.Iv
.Hv|m~^
tcP9W
(.Dae
.pptD8
.URD;
t%x;Xa Ci)t
Yo.HS
4i5%U
.Nc'6
A.xn[
uJ@.tB
AC.utY
%D%B@
)/u-A%UH2L>g
uTcPJ
U%flU
%cM{r
.GQUX
Wn%4S
.Tv2K^
`H%ss
as.sw
X.pM5i#h
u.EYh
7i)YX%C
"Y.GM
CG .Sx=k
cRtoW
d.QuJV
.afXAx
UdpW
MMz'%D
AO.YoLo
WFtp
%6U*B\vx
'%sXF
-t.Uu
0H/%U
L.MfJ
&.OeX
0Um%d
.rS|5
.xo1m
{.kmK
rutserv.exe
\ %XZq8
K.{uU%u)
.goo{D
%Xß
%DWh\
.IhN(^v
A%U@d
iH.swE~
h.TYm
h..ZU
%5uhP
_o.qL
.lC *
-Uu|
jyYY%x
<V.VTWA): F 
::S.RJn
@b%d"
ZO.jX
!.Vgy0
.qbu$
.snhh
;n.aJ
.gg'mx^#
U.ZBZ
>.hWt
w.KI]{K
,%DhL>
_ÕZ
F.bBg
a.Xyf
.mt*LUc
qrb.`:WnU0*%f
%1ua2
?'.dX
n%F}Y
.kl?6
.gJbI=
Ky.yc
.KQDa
.zY#$
m%cZ#,
.DSVp
Y1.ak
Z~%%CS
Z.YV=
OWzÃ@
%St`:]
3$1$,$0!
jJ.oI
.VP.6
xKbb\p2ó
.Rguo
WKP2|`%d
n%ssm
WWJ%D
\py3.be
(!.Iv
:ÿ`
{C.lol
1?.fp
5.l.Rn
APV%F
.uPUt
.].bC
g].Ro9
".jh{
)_P%S
.uD,O
'%Sq^
,0U~.fDB
zx.UC
27.jl
zZR:%F
ÀTc
.qti]
.Vd1)
MfTpf
%DlWW
QSKy.yI7
8[_'*`69
^ B9tY.MM0
_%Sy^
.DA%"
%4.Tq
\.DgYH
NE%sr$
BLa%ub
$z.eac#
%9xWS
2h-q}l
C@L%F
%u}q"
s.fuX
.vMzk.
JV !B.Nyq7
^.FWKy
,^%Ut@
uCRtE
22
Ym.JO
'u.BL
bB.RIqs
-.iAQ
.sWmn_w
ðn!
Lu%sko
~7.ot
WG.WK
g,X.lK
DZM%D (I
CMdZ
.En Tu
o:\'W
Ix%f!
#%St[u
=[}E%c,F
~N?gzo.ZP
E.ek6
%S,kS
-X}E3
()/.BE
$ .YG
z.sz2
.4 , %..
fTPVg|
N%xV5i.
.xsGN
\%D$O
A.BCO
qjY4%D
=9R.bq
n;.hq
h%dn3
W}.%Sa
%X&x3D
nF%U7o
S.jOb
%S'6#
AL@.bgj)`
vp8decoder.dll
~B%X>d
o{S.vE
.nWWf
Ë >
.IIVI
J.OytC
R~D%x
hR.uy|s
F;.Li
(_}Ã,
W%F;}Z5
%sM8B'4
Q%Fubq
]*.rU#
1/%Xp
^2.Qq
vp8encoder.dll
.VUIO
dþN=eF
`.nO)
.VH/gjdm
TCPH
6_.YH
&?.Xu
%cZGE
?.tN`WW
.tK#=
.OOpm
%f`h-
HB.dx
{r-B}
#'wd(%c
cB.ql
]e.hp
Ul%d<
.SP\C
f2S%F
û&fA
>\.HO
<.ZaVP]
Iy{W.fl
.RgzB
]O%c(
<.ysI
.Cy:X
.Za>z
~<;.FL
B.dVc
-AvV}
:Y.Ov
<m.Ci
.Oa0-
~t0%UC
8W@q.MI
ua%DN
f'%c'
-S.FP
cRT-b=
.xu-@e9
regedit.reg
k-%C#
&E.dGHs
%X.n?
Pe-t}
^%D 0
.TP\?gc
 ]".kG$}
a.Fr=B
%Y.XRuN
(".mF
.Kw_*AQm&
.fIIKS
X~4.EK
=.Gdhn
F%X
.iW$r
.qZID
i%5ubL
BCN%u
1, 0, 0, 1
GeoExpert.EXE
GeoExpert.Document
(*.*)
Output.prn$
(*.prn)|*.prn|
(*.*)|*.*||

svchost.exe_2448:

.text
`.data
.rsrc
@.reloc
msvcrt.dll
API-MS-Win-Core-ProcessThreads-L1-1-0.dll
KERNEL32.dll
NTDLL.DLL
API-MS-Win-Security-Base-L1-1-0.dll
API-MS-WIN-Service-Core-L1-1-0.dll
API-MS-WIN-Service-winsvc-L1-1-0.dll
RPCRT4.dll
ole32.dll
ntdll.dll
_amsg_exit
RegCloseKey
RegOpenKeyExW
GetProcessHeap
svchost.pdb
version="5.1.0.0"
name="Microsoft.Windows.Services.SvcHost"
<description>Host Process for Windows Services</description>
<requestedExecutionLevel
Software\Microsoft\Windows NT\CurrentVersion\Svchost
Software\Microsoft\Windows NT\CurrentVersion\MgdSvchost
\PIPE\
Host Process for Windows Services
6.1.7600.16385 (win7_rtm.090713-1255)
svchost.exe
Windows
Operating System
6.1.7600.16385

WerFault.exe_3728:

.text
`.data
.rsrc
@.reloc
ADVAPI32.dll
ntdll.DLL
KERNEL32.dll
USER32.dll
msvcrt.dll
ole32.dll
OLEAUT32.dll
SHLWAPI.dll
IMM32.dll
wer.dll
COMCTL32.dll
faultrep.dll
Starting kernel vertical - %S
rundll32.exe
NtQueryInformationProcess failed with status: 0x%x
Reporting never started for process id %u
StringCchPrintf failed with 0x%x
NtWow64QueryInformationProcess64 failed with 0x%x
NtWow64ReadVirtualMemory64 failed with 0x%x
NtQueryInformationProcess failed with status 0x%x
WerpNtWow64QueryInformationProcess64 failed with status 0x%x
StringCchCopy failed with 0x%x
Invalid arg in %s
wdi.dll
dbgeng.dll
dbghelp.dll
SETUPAPI.dll
SHELL32.dll
VERSION.dll
WTSAPI32.dll
WerFault.pdb
PSShD
tSSh,<
t.PSj6
t5SSh
SShx`
tsShxc
t.Ph0j
_amsg_exit
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
GetProcessHeap
GetWindowsDirectoryW
RegDeleteKeyW
ReportEventW
RegOpenKeyW
RegSetKeyValueW
GetProcessWindowStation
EnumWindows
NtAlpcSendWaitReceivePort
NtAlpcConnectPort
ShipAssert
ntdll.dll
RegisterErrorReportingDialog
WerReportSubmit
WerReportAddFile
WerReportCreate
WerReportCloseHandle
WerReportSetUIOption
WerpGetReportConsent
WerpSetIntegratorReportId
WerpReportCancel
WerpAddRegisteredDataToReport
WerReportAddDump
WerpCreateIntegratorReportId
WerpSetReportFlags
WerpGetReportFlags
WerpIsTransportAvailable
WerReportSetParameter
WerpInitiateCrashReporting
version="1.0.0.0"
name="Microsoft.Windows.Feedback.Watson"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<asmv3:windowsSettings xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">
</asmv3:windowsSettings>
<requestedExecutionLevel
ÝCD0
#$$$3355<
##$$$335566
% "#$$$3355666=
"#$$33555666
!.DQ$
.Py>o
Kÿg
.ib:?
T3%X_
a,M.cbd
KEYW8
KEYWH
? ?$?(?,?0?4?8?
1 2$2(2,20242
>,?0?4?8?<?@?
?%?5?:?|?
5'565^5{5
3#3(353_3
=#='= =/=3=7=;=?=
=#=(=>=]=
>!>&>3>}>
1!1&131[1
Microsoft\Windows\WindowsErrorReporting\WerFault
%s %s
Global\WerKernelVerticalReporting
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CrashControl
CrashDumpEnabled.Old
CrashDumpEnabled.New
%SystemRoot%\MEMORY.DMP
LiveKernelReports
Software\Microsoft\Windows\Windows Error Reporting\LiveKernelReports
LiveKernelReportsPath
BCCode=%x&BCP1=%p&BCP2=%p&BCP3=%p&BCP4=%p&OS Version=%u_%u_%u&Service Pack=%u_%u&Product=%u_%u
*WerKernelReporting
%SYSTEMROOT%\SYSTEM32\WerFault.exe -k -rq
SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
SOFTWARE\Microsoft\Windows\Windows Error Reporting\KernelFaults\Queue
sysdata.xml
%s -k -q
SOFTWARE\Microsoft\Windows NT\CurrentVersion
<OSVER>%u.%u.%u %u.%u</OSVER>
<OSLANGUAGE>%u</OSLANGUAGE>
<ARCHITECTURE>%u</ARCHITECTURE>
<PRODUCTTYPE>%u</PRODUCTTYPE>
<FILESIZE>%u</FILESIZE>
<CREATIONDATE>d-d-d d:d:d</CREATIONDATE>
<NAME>%s</NAME>
<DATA>%s</DATA>
<ERROR>Failed at Step: %s with error 0x%x</ERROR>
%sDrivers\%s.sys
</%s>
<%s>%s</%s>
%u.%u.%u.%u
*.mrk
WER-%u-%u.sysdata.xml
Software\Microsoft\Windows\CurrentVersion\CEIPRole\RolesInWER
SOFTWARE\Microsoft\Windows\CurrentVersion\Reliability\MemoryDiagnostic
Web Server
Software\Microsoft\Windows\Windows Error Reporting\Debug
%SystemRoot%\Minidump
0xx (0xx, 0xx, 0xx, 0xx)
%s\%2.2d%2.2d%2.2d-%u-%2.2d.dmp
*.dmp
Software\Microsoft\Windows\Windows Error Reporting
Software\Policies\Microsoft\Windows\Windows Error Reporting
\KernelObjects\SystemErrorPortReady
%s\%s
Microsoft.Windows.Setup
\WindowsErrorReportingServicePort
(0x%x): %s
%u %s
WindowsNTVersion
%u.%u
ErrorPort
\StringFileInfo\xx\%s
HKEY_USERS\
HKEY_CURRENT_CONFIG\
HKEY_CLASSES_ROOT\
HKEY_LOCAL_MACHINE\
HKEY_CURRENT_USER\
%s="%s"
%s.%s
%s %d
Software\Microsoft\Windows\Windows Error Reporting\Hangs
_NT_EXECUTABLE_IMAGE_PATH
wxmu.dmp
wxhu.dmp
axmu.dmp
axhu.dmp
hu.kdmp
mu.kdmp
hu.dmp
mu.dmp
Software\Microsoft\.NETFramework
NOT_TCPIP
sos.dll
version.xml
.version.xml
%s.xml
memory.hdmp
minidump.mdmp
Local\WERReportingForProcess%d
atk.kdmp
Software\Microsoft\Windows\Windows Error Reporting\Hangs\NHRTimes
%i|%d|%d
xxxxxxxxxxxxxxxx
xx
%d.%d.%d.%d
D:P(A;;GA;;;BA)(A;;GA;;;SY)(A;;GA;;;%s)
D:P(A;;GA;;;BA)(A;;GA;;;SY)(A;;GA;;;%s)S:(ML;;NR;;;HI)
dc.noreflect
dc.xpmemdump
dc.xpdata
dc.CustomDump
dc.expmodmem
dc.expmoddata
dc.OnDemandKdmp
dc.xpmodmem
dc.xpmoddata
default=%s
memory=%s
module=%s
.dbgcfg.ini
ElevatedDataCollectionStatus.txt
Open process failed unexpectedly: 0X%X
Attempting to cross-proc reporting process!
Elevation:Administrator!new:%s
Reflection attempt failed: 0X%X
Attempting to reflect reporting process!
Could not collect dump for reflection cross process: 0x%x
Could not collect xproc for reflection: 0x%x
CollectFile for reflection failed: 0x%x
Could not collect dump for cross process: 0x%x
CollectReflectionDump failed with: 0x%x
0 processes found for xproc module: %s
Could not collect cross dump from module: 0x%x
CollectCrossProcessModuleDumps failed: 0x%x
CollectCrossProcessDumps failed: 0x%x
KernelDump failed: 0x%x
ProcessHandle
%s|%s
rpcrt4
\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\AeDebugProtected\AutoExclusionList
\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\AeDebug\AutoExclusionList
\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\AeDebugProtected
\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\AeDebug
sntdll.dll
WerDiagController.dll
Software\Microsoft\Windows\Windows Error Reporting\Plugins
Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
Software\Microsoft\Windows\Windows Error Reporting\Plugins\FDR\CurrentSession
%s\%s\%u-%u.etl
%s\%s\%u-%u.etl_%d
Microsoft\Windows\FDR
%s-%d
Software\Microsoft\Windows\Windows Error Reporting\Plugins\DriverVerifier
Software\Microsoft\Windows\Windows Error Reporting\Plugins\AppRecorder
%d-AppRecorderEnabled
%s /stop
psr.exe
Software\Microsoft\Windows\Windows Error Reporting\RuntimeExceptionHelperModules
verifier.dll
nVerifier.dll
Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\%s
Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options
lsvchost.exe
"%s" "%s" "%s"
%s\system32\cofire.exe
psapi.dll
sfc_os.dll
werfault.exe
%s\%s-(PID-%u)-%u
%s\%s-(PID-%u).dmp
%s\*-(PID-*)-*
SOFTWARE\Microsoft\Windows NT\CurrentVersion\SilentProcessExit\%s
SOFTWARE\Microsoft\Windows NT\CurrentVersion\SilentProcessExit
kernel32.dll
kernelbase.dll
ReportingMode
WinShipAssert
WindowsMessageReportingB1
Windows
ws2_32.dll
Software\Microsoft\SQMClient\%s\AdaptiveSqm\ManifestInfo
%s\Sqm%d.bin
CorporateWerPortNumber
BypassDataThrottling
Software\Microsoft\Windows\Windows Error Reporting\Consent
Windows Problem Reporting
6.1.7600.16385 (win7_rtm.090713-1255)
WerFault.exe
Windows
Operating System
6.1.7600.16385
Microsoft-Windows-WER-Diag/Operational


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    %original file name%.exe:1504

  2. Delete the original Trojan file.
  3. Delete or disinfect the following files created/modified by the Trojan:

    C:\Users\"%CurrentUserName%"\AppData\Local\CSIDL_ (673 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\CSIDL_X (673 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\IXP000.TMP\1.xy_ (2938 bytes)
    C:\Users\"%CurrentUserName%"\AppData\Local\Temp\IXP000.TMP\1.xyz (69050 bytes)

  4. Delete the following value(s) in the autorun key (How to Work with System Registry):

    [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
    "wextract_cleanup0" = "rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 C:\Users\"%CurrentUserName%"\AppData\Local\Temp\IXP000.TMP\"

  5. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now