Win32.Madangel.DIA_3618e0e786
Trojan-Dropper.Win32.Injector.pbuu (Kaspersky), Win32.Madangel.DIA (B) (Emsisoft), Win32.Madangel.DIA (AdAware), Trojan.Win32.IEDummy.FD, GenericInjector.YR (Lavasoft MAS)
Behaviour: Trojan-Dropper, Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 3618e0e786d697dfb092edf82fd5e278
SHA1: 5b33fb886186a3e436d5174f14cfb19914973776
SHA256: 39df421489ec3bdb3eaadc407950d4680e72351916c5e240b5fe598a7a48498a
SSDeep: 196608:EwYvfXDBYhBpeLHe3 EPegZT3VCz0TByC Py7FU LCZAsdX3LBO:vibBYDey3PFCuByPyhRwxBB
Size: 9659089 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2012-12-31 02:38:38
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan-Dropper. Trojan program, intended for stealth installation of other malware into user's system.
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
No processes have been created.
The Trojan injects its code into the following process(es):
%original file name%.exe:928
%original file name%.exe:484
%original file name%.exe:1504
iexplore.exe:1252
Explorer.EXE:1140
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process %original file name%.exe:928 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Program Files%\Internet Explorer\IEXPLORE.EXE (332 bytes)
%System%\Serverx.exe (1504347 bytes)
The process %original file name%.exe:1504 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\amd64\winusbcoinstaller2.dll (10100 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\adb\AdbWinApi.dll (1862 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\adb\adb.exe (9241 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\amd64\WdfCoInstaller01009.dll (12517 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\i386\winusbcoinstaller2.dll (8723 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\androidwinusb86.cat (11 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\DPInst_x86.exe (7803 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\amd64\NOTICE.txt (236 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\i386\WdfCoInstaller01009.dll (12376 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\DPInst_x64.exe (9828 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\amd64\WUDFUpdate_01009.dll (18515 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\android_winusb.inf (5 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\adb\AdbWinUsbApi.dll (392 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\androidwinusba64.cat (11 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\i386\NOTICE.txt (236 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\install.bat (5 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\xp\SETX.exe (11 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\adb\fastboot.exe (5044 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\i386\WUDFUpdate_01009.dll (15584 bytes)
Registry activity
The process %original file name%.exe:928 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "35 E9 06 11 44 AD 03 63 7D 65 49 E7 B5 3A 75 CE"
The process %original file name%.exe:1504 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "67 EE 5F AE E0 40 BE F4 D2 9A BD 28 DE A1 C4 32"
Dropped PE files
| MD5 | File path |
|---|---|
| 47a6ee3f186b2c2f5057028906bac0c6 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\7ZipSfx.000\adb\AdbWinApi.dll |
| 5f23f2f936bdfac90bb0a4970ad365cf | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\7ZipSfx.000\adb\AdbWinUsbApi.dll |
| 9e5dad83671d0d441be8347be4c246be | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\7ZipSfx.000\adb\adb.exe |
| c3b07cfe26d2b91a2bcb20a8d535a365 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\7ZipSfx.000\adb\fastboot.exe |
| 0df1cb11aea7a66124fd18b4b15990a5 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\7ZipSfx.000\driver\DPInst_x64.exe |
| 6cb18e67db5c9f7da56d126f4b9d45a4 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\7ZipSfx.000\driver\DPInst_x86.exe |
| ebf9ee8a7671f3b260ed9b08fcee0cc5 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\7ZipSfx.000\driver\amd64\WUDFUpdate_01009.dll |
| 4da5da193e0e4f86f6f8fd43ef25329a | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\7ZipSfx.000\driver\amd64\WdfCoInstaller01009.dll |
| 246900ce6474718730ecd4f873234cf5 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\7ZipSfx.000\driver\amd64\winusbcoinstaller2.dll |
| e1bbe9e3568cf54598e9a8d23697b67e | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\7ZipSfx.000\driver\i386\WUDFUpdate_01009.dll |
| a9970042be512c7981b36e689c5f3f9f | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\7ZipSfx.000\driver\i386\WdfCoInstaller01009.dll |
| 8e7b9f81e8823fee2d82f7de3a44300b | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\7ZipSfx.000\driver\i386\winusbcoinstaller2.dll |
| aa1de4f07624771108a0a2b43e3bdc6d | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\7ZipSfx.000\xp\SETX.exe |
HOSTS file anomalies
The Trojan modifies "%System%\drivers\etc\hosts" file which is used to translate DNS entries to IP addresses.
The modified file is 734 bytes in size. The following strings are added to the hosts file listed below:
| 127.0.0.1 | ZieF.pl |
Rootkit activity
The Trojan installs the following user-mode hooks in ntdll.dll:
NtQueryInformationProcess
ZwOpenFile
NtCreateProcessEx
NtCreateProcess
NtCreateFile
Propagation
VersionInfo
Company Name: Snoop0
Product Name: 15 seconds ADB Installer
Product Version: 1.4.
Legal Copyright:
Legal Trademarks:
Original Filename: adb-installer-1.4.3.ex
Internal Name: adb-installe
File Version: 1.4.
File Description: 15 seconds ADB Installer
Comments:
Language: English (United States)
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| UPX0 | 4096 | 389120 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| UPX1 | 393216 | 57344 | 55296 | 5.5262 | 18aa317adce1d31150ddba79a7e3d9c4 |
| .rsrc | 450560 | 9603281 | 9603281 | 5.52583 | 8c9b2be20e3037633fb98baad338566c |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| irc.zief.pl |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET TROJAN IRC Nick change on non-standard port
Traffic
NICK ccqzsjif.USER j020501 . . :#a8a67a25e Service Pack 3.JOIN #.364.
:irc 001 ccqzsjif :Hi virtu.:irc 376 ccqzsjif :End of /MOTD command.:i
rc 001 ccqzsjif :Hi virtu.:irc 376 ccqzsjif :End of /MOTD command..:cc
qzsjif JOIN #.364..:ccqzsjif JOIN #.364.
The Trojan connects to the servers at the folowing location(s):
!Require Windows
.rsrc
:=i|%dH
%X]-$pp
*{k%u''yL
.NNNNNNNNNNNNNNNN
.NNNNNNNNNNNNNNN
<assemblyIdentity version="1.6.0.2712" name="7-Zip.SfxMod" type="win32"></assemblyIdentity>
<assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df"></assemblyIdentity>
<requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel></requestedPrivileges>
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"></supportedOS>KERNEL32.DLL
ADVAPI32.dll
COMCTL32.dll
GDI32.dll
MSVCRT.dll
ole32.dll
OLEAUT32.dll
SHELL32.dll
USER32.dll
RunProgram="waitall:install.bat"
'K.Jj
M.oU)
.pefl
.Bo%R
.CwbR
p;g%C
h.fE$=]
rH.rW
.aw$T
-t.jq
b %CtK
oM.zS
c 9%D*J=
.zw-9K)
{].zmN087.Fb
K-tR}
%Ure.
(..HH
S%8Si
%fJrw
mw8.KZ2
/C0%U@
.GnH0WoK*VXvrQ
.Hl>md
.zhPi
\%uFF
Ftp0r?(
HK.lY
!.HR<
.DTf(
Ihpw.NP
'>7$%d
,e.MFM3
d.Dw i
y7.SE-
|0.NGZ
ca%sW
9H.wl
UG4%f
z.Ssu'
s-n%u
8v.BC4E
2.SUO
-5TQs}
zN.Zz
E[%c_
W9-xK.YT
TM4%D
(E%F#
P.ol\ko
=:g*(
HA;%cw
^.wOW
Q8A~X .Dir
_&.lb
.nFnA
O%3Un
.aQnX
pPSkJþ
2zycMd
!;-c}-M
v.oJ8
y.Wr,
P.NWf
A%svd^
[]v%x
c[.XN
>%uZO
.Fy%H
{k%C(h.`.wrM
'!.Ap
/ .xy:1>u
nn`Ú?
=.cxFkm
NL%FI
G%U} R
.dSOq
hsN-F%U{X.HIU
$.Ut\
Ok%d $*
.py/(=
|q%Se
l.jDn
nuDP!
~<$.bG
H.iV*i0'?
%XSZu*W4
RrI.fW
0%ud0
Zy%UF
y.rug
.kK%l
ez8%3u=g
jM5`.xl
.kKW8%b
\.tPI
$|%SU
d4%f>
SBEW.cY
b`FLF.Ec_
.cNI3
.AI%cl
.LK9^
l=.RK
T6 .IQ
:%c.T'
f%up,
tQOw.cg
%un?2
b.kKv
F:\#F
z2.uvIE
SE.GK8
CS.JW
& .PQk
:.vNu
#y.nKO
<.MVI;c`
#w<#%u
\.eAd
]7.Uq2b
D1%FG
.mT j
%U^4p
..iR1
nQX-O4}&
I.dIJ
BT`%Cg
9Îz
.tH55
_Dj.vY Q
(.XCw
e%ui} t
*<Uurl
<.ZB|
.HDn{9%D;aF,
jN.prVq
3;J_Wx%ut
(%x.
n;X%dWp
D%F.B
%d%f(
W]EXey
z!%uf
<<z.Bc^
.CVB%
l _%S@
dSshx
H.GL0
)(pöH
E:\QQ
@-.Pn
%FN0$
ye.vN
.CBE)K
ZV6%Dk
pF.yu
%fR)$
%x6YI
kEyp
&TM%s
Tg.GD
R#kEY
cmdv
Q.XDu
hp.zk/
/yGk.Wn
-btB}
>%VC%fsK
.ah~e=`}O
C&.VU
a.Ja`
<9'%uM
vsY.un
r?As.Yx
9.UbU
pl%U?
J.lAW
.VK_V
.MpBkX
9.Owdy
5b=y%u
cO.sggi
#NUDpj
.eg\~,
$%c&F;E
%h%ug
:!-}[t.EU=
.mbgy~
.Dv/y6
.LoEFu
%cZvb
=.aG"
%F$Gz
}x%.Gd
R.VS> "
ko^L%xW
Û;h
a2.tk
tA.PE-
n (.mzW$
5O.drp
s6b%Sc
f-O}2e>
\W\<.Tq
\m%.DN;G
eq(%F
%D!`K
%xX,,
?}d.gwu
PH.DY
Q%D&x
%C UvT
IÚ>
.pCkxk
%X!yL
"5>\%fi
1K/L%Sc
@j.cT^o
3.MjOB
}Mg%4%D
.QJ31
y!ga.vJZ
.rX_E
O%u:>1D
W.qO;
*.*[$
%XyIR1
'q.Ha@
]E.NE
%Uz=%
>E!:.lL-
YW.QM
.Bxx^G>
]B.aZ
x.Nq
[tj%Xa
Y(.WJ
(.rBE
U%x]|X|XZ
%C#"KN
.DzNhf6
&.BzZ
m.lP/
Z/*.dD4p
i.Chp
vWjp%SA
7.RK5
r%s?z
Ssh6d
^.mcV
P2.kGy
JY.HnN
ue.Se
.Is~W
yË|oh
y{.Ihe.Nde
.jq/r
.uVwv
1.oFb
I!\6w2.BW
hf.NA
*".gf$
.lZB=
..rP~
'15%F>
W%.KP
;.Ryn/
h.bBCZ9
k%%D)w
.XhZzS(
8.ZQ'
.frQmq
=.Eka%
.VsF
9fs%F
.xGuY
.hfVZam
1o% ]%X
G.lM5z
Q$%FG
|%f=p
e[*%D
U,4>%d
$c..Lq
-f$hO%S
E[>{Z%F%X9e\
:.jG.
1Ul%x
/f.cHy
g%u[Q&
9;.aU
;m'%F
L&
NG5%x;
Wa.Di
.Bw8r
.Ec f
^_.Df
i%CHJ
9.fft
2z.lU=
~M%xe
D.aF8s
.mZmW~
b4OU%D
$-xX}
{[;%Fkic%X
zu.cb
@G.lh
gk%s
7.GAk
K=.RD
n2^o
xN[.vu
{n5,%dS.azC4
bl.jVI
fZ.FM
.knt(
.uzn|08
.qC2
C%dlh
gc%uz-
Ix&Z%uHD
.CWr^w
3.bpd
L.ak^
.k%Fg
K$.bw
.Sld&J
n.vUg
a.mS_
)[2.TxP
.%S'p$F
V73.Sk
-bNU}
u %c%M
..Rz%
gzl%xO
i`.QC
F/.bb
%U>v%
k%uGV
%u!w>i
|Uw^.fT
!%S4s
MUj.AF
{$ÝpAr%d-
.KmVX{#(.lV
{.Nc3KO.We
:-QEX.BU
l5:
Ôb~
.PEJl
olB<NNll6.NMl
[email protected]
|k-Q}
d%d!m
F%uo<r
#.ibEd
3%Xv0s
[4 ?.YW
FtPa
<m3
s.sd~
.rPV6k$
.GLxQg
.Sfb>
%URC=
d%.KS-
,%U c
0p.Aq
l>.Rl
1ki.Mg
.NB%*
;S%x%T
F\.ue
.aO^.s>
.Xf s|;
.VdP=
S.zy;
e}%s#;
m.RT
ðIm
..RTH
.pKpaX
U-.sr
T2%UN
&a.Os
.jgZok
{n%fPym/Cj~.YD
!E.ky
.vQ[M
Hua~%S r
~ .cw
.vIXff
!z6'.LD
_.xQ'
V.rX{)xPp%D
1.hIe
N..JF"b^wN#
.OL<GD'pO#Bjw1
ûp U
cq.OT
.LjVZ
.jN_Q
LYs8.pr
<#.gajY
.Tkwt7z
PfTp0
8E.CI
.hL\39
5Y7%F
C%8UF
gV%xMLc
i^.AAE
Vc.en
_V2.oPC&
^]-Y}
r.fo7=}m
.ldEJ
S{Eu%Dn.yoM
%D!Dl
k%X&a
$%X0B
g3}
%F\
%x1'"
zFTP
US.pGc
.vJMI
T2.el
$%.zf
5\5?5.5:50
uvŒB
%\V<.Tf
.act_
%C;R@
P&4K%S
0S.cy?)G
#.$;';)@
.Xf]U
tQ>%x
0u.oAP
.wz{h_Vc.Mb[|
2Yg/D%S
-1pd}
#HF%xX.
"#.md
%UZ5=
O%d,w
@@@@.As
k.aIh
~S3%c
w.apsQ_
,p%F/zE
%U/&!ru
P.MF
_7%cg?
\*%UG
$Y%x$
w.II"!,
.Qtd@
=A1%sgu
.zNKZ
(%XZG$
%x<s%
\.OyX
.xGDB{[.fod
u-o}k
!| Ev@l%x
.AVW,
\.RbC
-n.mb
op}{%c7&.gr_
e/x.uu?
G%u9/e
\@W.cC
"Q.Qq
/.Hk*
Di.kLJ
N.LK*
.MN:un
.JS_J
-v.AB@
LK.ay
2=.nU
}õ;#
.wwwwwwww`w
;:f%c
C!.iT
MO..ZH<
.EA0p
vg%uFGd
&I.UR
;.ce-
AHm%D
Mg%u>
M%0s<;
.xFyZ
D|%x$K
Ec.yj
S.Lk!u"~
[R.aC
AZ#5.ZN
-q}:"
Ln%Sw
iW%dM
:.qhlVfi
| %SZQ0
ac%U T
7S.tJM
6K.tm
.pLjxO
8]R.vd
"j.hu
}1kÝ
X.ZP_G
6 \r<`(-.kY?
%x~{d&kj%sO)
.WS1s
.Dwi^
^.jY.zr
s.CELM<W
nE.GD
jyy.Er7{#].nv
z .eJ
.DBd1[
9.Fl#}
V#.mp
%C@K'
.kJ*A
{1.cu.ByYk
UA.jZ
.cr`5]
1^Tzo
xq.Iuj
299.Ai
T)%u=Q
E.jKk
>O~
.jvoB
8.zO&T
.xbF!
i %s|
O?Ce.Ih
s3%d(
0.hv4
þ(#
@7%x8
1%f$uqr
WQm
bX%U=]
mj.nm
]9.jDmI
z%Cga(
r|5.VZ
lO.pT
J[m%CR
.wgaR
%.bB^
\X.Vo
&U(.fR
a.xxPZ
.RejS
.hMdzC
%9UGl*
-{.rK-Op}o
.eOG8Yt
wEbM
`0818%8!*
QHX5g.qe
q&A.RSU
I%.Ar\
ZB.ur
\mc%x
j,Ò
b_%uF
A>%F ;
.KuAC
R"~.QA
%X-Wd
-v4}I2
.iYf$
gTexE
/-1v}
ls.yM
]DD.SU
U&%SG
,Y^%%UN
X*%sf
%Œ|
5N.zb
(udpb
d.TL^
lftp
o>M%%U7
.TOv`g
1b.mL
525<1mSg
:%SqN
%DOJw
!b*C.kR*
.By9h_
.azzm
b%ukY`
xB-i}
eul-
?hD0%c
".bggo
%S/6gbM
p"$.vB
1Å4
f.DaifL*
t~=v%S."
1.zQXa
$c%u7
G?J
ue<œ
%D-2yx
6q)%F
>>@.Eal
".yUH
6,$=%X
::%d_
j%dp\
1n.Vz
Ye.lG
O8O
M^v%X
!.NE&
/T)J%c
Tu, .ua
i.lNG
{,.yC/ .An
w.OP0@
{.FAzKo%uR
%So&yk
S.OHNR
C.HQ6Dk
.pJ2S:
dzœ
`%7XE
"H%Xz:J/|C
%S$RK
7N$%c
W%C]ei
d-wQ}
O_9%Fq
IL.rK
%f"nf
H|D%c
K%7sW
Y.yi8
Z.zZ6;X
gV.fp
~-M}<
urI.;%F
=.KpJ@
|.PXm
=%XFJ{9g6.yu5
8>%xV
.DH.2
s`tS-C}
R.rxtqE="n
F.Cky"
.cXEd
Bh'.Ck1
R.ee:dNx
I5[%S
U5g--Z}
~Y%SY
6.oHoTn
(gSqL
@%C%E%
CMd0Z
K-.wS$r
m$].wp.
(C.SG
A!N'%u
%syePt
%u_JA
%3XJ?
gV&.tp(
f-.tua
}o.Fd
%xm_a/
E-Tl}
EZG%X
}.ow.
m=.Up]
.gB5Dn
l.Pe1
%dh:IN)-
V.pzvq
:O.ra
u.Wz/
.Nc[S
Ze.vf
..pon
=fP.KBr
P%xy-_
R%FP(Q
.aGWYb
8`%S.
.NBYb
U.qcD
X$%c)
^msgj7
.beVOd
.cwydm
%XB`.s
%uf9r
.lfjR
.HKl4G;
m%dy5
7Þ1
%Dw"l
$WL`D
B.OYXh1^
T.Os;b
.bGvW
z1#%sO
|.LCe
..bWL
'}Dp%X
j[ftpV~x
-ùh
<9.CI)
T%C\l
quDP`5!
tcP2sd
D}.BM
S;.QvS`
%U{[7%ct.Y
E%s%V
-y%S;O
.USp!s
.mxz*
USER32.DLL
ADVAPI32.DLL
MPR.DLL
WSOCK32.DLL
SHELL32.DLL
hXXp://vguarder.91i.net/user.htm
hXXp://vguarder.bravehost.com/user.htm
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
WinExec
RegNotifyChangeKeyValue
RegOpenKeyA
ShellExecuteA
\setupx.exe
\updatex.exe
\Serverx.exe
=.exet
=.scrt
.idata
.reloc
KERNEL32.dll
A.HK30
1.4.3
adb-installer-1.4.3.exe
%original file name%.exe_928_rwx_004B8000_00001000:
<assemblyIdentity version="1.6.0.2712" name="7-Zip.SfxMod" type="win32"></assemblyIdentity>
<assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df"></assemblyIdentity>
<requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel></requestedPrivileges>
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"></supportedOS>KERNEL32.DLL
ADVAPI32.dll
COMCTL32.dll
GDI32.dll
MSVCRT.dll
ole32.dll
OLEAUT32.dll
SHELL32.dll
USER32.dll
1.4.3
adb-installer-1.4.3.exe
%original file name%.exe_928_rwx_00D95000_00002000:
\updatex.exe
\Serverx.exe
=.exet
=.scrt
.idata
.reloc
KERNEL32.dll
USER32.DLL
ADVAPI32.DLL
MPR.DLL
WSOCK32.DLL
SHELL32.DLL
hXXp://vguarder.91i.net/user.htm
hXXp://vguarder.bravehost.com/user.htm
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
WinExec
RegNotifyChangeKeyValue
RegOpenKeyA
ShellExecuteA
\setupx.exe
%original file name%.exe_1504:
!Require Windows
`.rsrc
PSSSSSSh
<x%u<
ttNt_Nt.Nt
:Language:%u
Enter password:
0xx
"%s".
Could not overwrite file "%s".
Could not create file "%s".
0xX.
7-Zip: Internal error, code 0xX.
7-Zip: Internal error, code %u.
The archive is corrupted, or invalid password was entered.
7-Zip: Unsupported method.
Error during execution "%s".
"setup.exe"
Could not find "setup.exe".
Could not find command for "%s".
Could not delete file or folder "%s".
Could not create folder "%s".
Error in line %d of configuration data:
Could not open archive file "%s".
1.6.0 develop [x86]
2712 (30
1.6.0 develop [x86] build 2712 (December 30, 2012)
Supported methods and filters, build options:
Sorry, this program requires Microsoft Windows 2000 or later.
CreateIoCompletionPort
_acmdln
ShellExecuteW
ShellExecuteExW
UnhookWindowsHookEx
SetWindowsHookExW
GetKeyState
.text
`.rdata
@.data
.rsrc
.NNNNNNNNNNNNNNNN
.NNNNNNNNNNNNNNN
<assemblyIdentity version="1.6.0.2712" name="7-Zip.SfxMod" type="win32"></assemblyIdentity>
<assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df"></assemblyIdentity>
<requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel></requestedPrivileges>
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"></supportedOS>KERNEL32.DLL
ADVAPI32.dll
COMCTL32.dll
GDI32.dll
MSVCRT.dll
ole32.dll
OLEAUT32.dll
SHELL32.dll
USER32.dll
RunProgram="waitall:install.bat"
'K.Jj
M.oU)
.pefl
.Bo%R
.CwbR
p;g%C
h.fE$=]
rH.rW
.aw$T
-t.jq
b %CtK
oM.zS
c 9%D*J=
.zw-9K)
{].zmN087.Fb
K-tR}
%Ure.
(..HH
S%8Si
%fJrw
mw8.KZ2
/C0%U@
.GnH0WoK*VXvrQ
.Hl>md
.zhPi
\%uFF
Ftp0r?(
HK.lY
!.HR<
.DTf(
Ihpw.NP
'>7$%d
,e.MFM3
d.Dw i
y7.SE-
|0.NGZ
ca%sW
9H.wl
UG4%f
z.Ssu'
s-n%u
8v.BC4E
2.SUO
-5TQs}
zN.Zz
E[%c_
W9-xK.YT
TM4%D
(E%F#
P.ol\ko
=:g*(
HA;%cw
^.wOW
Q8A~X .Dir
_&.lb
.nFnA
O%3Un
.aQnX
pPSkJþ
2zycMd
!;-c}-M
v.oJ8
y.Wr,
P.NWf
A%svd^
[]v%x
c[.XN
>%uZO
.Fy%H
{k%C(h.`.wrM
'!.Ap
/ .xy:1>u
nn`Ú?
=.cxFkm
NL%FI
G%U} R
.dSOq
hsN-F%U{X.HIU
$.Ut\
Ok%d $*
.py/(=
|q%Se
l.jDn
nuDP!
~<$.bG
H.iV*i0'?
%XSZu*W4
RrI.fW
0%ud0
Zy%UF
y.rug
.kK%l
ez8%3u=g
jM5`.xl
.kKW8%b
\.tPI
$|%SU
d4%f>
SBEW.cY
b`FLF.Ec_
.cNI3
.AI%cl
.LK9^
l=.RK
T6 .IQ
:%c.T'
f%up,
tQOw.cg
%un?2
b.kKv
F:\#F
z2.uvIE
SE.GK8
CS.JW
& .PQk
:.vNu
#y.nKO
<.MVI;c`
#w<#%u
\.eAd
]7.Uq2b
D1%FG
.mT j
%U^4p
..iR1
nQX-O4}&
I.dIJ
BT`%Cg
9Îz
.tH55
_Dj.vY Q
(.XCw
e%ui} t
*<Uurl
<.ZB|
.HDn{9%D;aF,
jN.prVq
3;J_Wx%ut
(%x.
n;X%dWp
D%F.B
%d%f(
W]EXey
z!%uf
<<z.Bc^
.CVB%
l _%S@
dSshx
H.GL0
)(pöH
E:\QQ
@-.Pn
%FN0$
ye.vN
.CBE)K
ZV6%Dk
pF.yu
%fR)$
%x6YI
kEyp
&TM%s
Tg.GD
R#kEY
cmdv
Q.XDu
hp.zk/
/yGk.Wn
-btB}
>%VC%fsK
.ah~e=`}O
C&.VU
a.Ja`
<9'%uM
vsY.un
r?As.Yx
9.UbU
pl%U?
J.lAW
.VK_V
.MpBkX
9.Owdy
5b=y%u
cO.sggi
#NUDpj
.eg\~,
$%c&F;E
%h%ug
:!-}[t.EU=
.mbgy~
.Dv/y6
.LoEFu
%cZvb
=.aG"
%F$Gz
}x%.Gd
R.VS> "
ko^L%xW
Û;h
a2.tk
tA.PE-
n (.mzW$
5O.drp
s6b%Sc
f-O}2e>
\W\<.Tq
\m%.DN;G
eq(%F
%D!`K
%xX,,
?}d.gwu
PH.DY
Q%D&x
%C UvT
IÚ>
.pCkxk
%X!yL
"5>\%fi
1K/L%Sc
@j.cT^o
3.MjOB
}Mg%4%D
.QJ31
y!ga.vJZ
.rX_E
O%u:>1D
W.qO;
*.*[$
%XyIR1
'q.Ha@
]E.NE
%Uz=%
>E!:.lL-
YW.QM
.Bxx^G>
]B.aZ
x.Nq
[tj%Xa
Y(.WJ
(.rBE
U%x]|X|XZ
%C#"KN
.DzNhf6
&.BzZ
m.lP/
Z/*.dD4p
i.Chp
vWjp%SA
7.RK5
r%s?z
Ssh6d
^.mcV
P2.kGy
JY.HnN
ue.Se
.Is~W
yË|oh
y{.Ihe.Nde
.jq/r
.uVwv
1.oFb
I!\6w2.BW
hf.NA
*".gf$
.lZB=
..rP~
'15%F>
W%.KP
;.Ryn/
h.bBCZ9
k%%D)w
.XhZzS(
8.ZQ'
.frQmq
=.Eka%
.VsF
9fs%F
.xGuY
.hfVZam
1o% ]%X
G.lM5z
Q$%FG
|%f=p
e[*%D
U,4>%d
$c..Lq
-f$hO%S
E[>{Z%F%X9e\
:.jG.
1Ul%x
/f.cHy
g%u[Q&
9;.aU
;m'%F
L&
NG5%x;
Wa.Di
.Bw8r
.Ec f
^_.Df
i%CHJ
9.fft
2z.lU=
~M%xe
D.aF8s
.mZmW~
b4OU%D
$-xX}
{[;%Fkic%X
zu.cb
@G.lh
gk%s
7.GAk
K=.RD
n2^o
xN[.vu
{n5,%dS.azC4
bl.jVI
fZ.FM
.knt(
.uzn|08
.qC2
C%dlh
gc%uz-
Ix&Z%uHD
.CWr^w
3.bpd
L.ak^
.k%Fg
K$.bw
.Sld&J
n.vUg
a.mS_
)[2.TxP
.%S'p$F
V73.Sk
-bNU}
u %c%M
..Rz%
gzl%xO
i`.QC
F/.bb
%U>v%
k%uGV
%u!w>i
|Uw^.fT
!%S4s
MUj.AF
{$ÝpAr%d-
.KmVX{#(.lV
{.Nc3KO.We
:-QEX.BU
l5:
Ôb~
.PEJl
olB<NNll6.NMl
[email protected]
|k-Q}
d%d!m
F%uo<r
#.ibEd
3%Xv0s
[4 ?.YW
FtPa
<m3
s.sd~
.rPV6k$
.GLxQg
.Sfb>
%URC=
d%.KS-
,%U c
0p.Aq
l>.Rl
1ki.Mg
.NB%*
;S%x%T
F\.ue
.aO^.s>
.Xf s|;
.VdP=
S.zy;
e}%s#;
m.RT
ðIm
..RTH
.pKpaX
U-.sr
T2%UN
&a.Os
.jgZok
{n%fPym/Cj~.YD
!E.ky
.vQ[M
Hua~%S r
~ .cw
.vIXff
!z6'.LD
_.xQ'
V.rX{)xPp%D
1.hIe
N..JF"b^wN#
.OL<GD'pO#Bjw1
ûp U
cq.OT
.LjVZ
.jN_Q
LYs8.pr
<#.gajY
.Tkwt7z
PfTp0
8E.CI
.hL\39
5Y7%F
C%8UF
gV%xMLc
i^.AAE
Vc.en
_V2.oPC&
^]-Y}
r.fo7=}m
.ldEJ
S{Eu%Dn.yoM
%D!Dl
k%X&a
$%X0B
g3}
%F\
%x1'"
zFTP
US.pGc
.vJMI
T2.el
$%.zf
5\5?5.5:50
uvŒB
%\V<.Tf
.act_
%C;R@
P&4K%S
0S.cy?)G
#.$;';)@
.Xf]U
tQ>%x
0u.oAP
.wz{h_Vc.Mb[|
2Yg/D%S
-1pd}
#HF%xX.
"#.md
%UZ5=
O%d,w
@@@@.As
k.aIh
~S3%c
w.apsQ_
,p%F/zE
%U/&!ru
P.MF
_7%cg?
\*%UG
$Y%x$
w.II"!,
.Qtd@
=A1%sgu
.zNKZ
(%XZG$
%x<s%
\.OyX
.xGDB{[.fod
u-o}k
!| Ev@l%x
.AVW,
\.RbC
-n.mb
op}{%c7&.gr_
e/x.uu?
G%u9/e
\@W.cC
"Q.Qq
/.Hk*
Di.kLJ
N.LK*
.MN:un
.JS_J
-v.AB@
LK.ay
2=.nU
}õ;#
.wwwwwwww`w
;:f%c
C!.iT
MO..ZH<
.EA0p
vg%uFGd
&I.UR
;.ce-
AHm%D
Mg%u>
M%0s<;
.xFyZ
D|%x$K
Ec.yj
S.Lk!u"~
[R.aC
AZ#5.ZN
-q}:"
Ln%Sw
iW%dM
:.qhlVfi
| %SZQ0
ac%U T
7S.tJM
6K.tm
.pLjxO
8]R.vd
"j.hu
}1kÝ
X.ZP_G
6 \r<`(-.kY?
%x~{d&kj%sO)
.WS1s
.Dwi^
^.jY.zr
s.CELM<W
nE.GD
jyy.Er7{#].nv
z .eJ
.DBd1[
9.Fl#}
V#.mp
%C@K'
.kJ*A
{1.cu.ByYk
UA.jZ
.cr`5]
1^Tzo
xq.Iuj
299.Ai
T)%u=Q
E.jKk
>O~
.jvoB
8.zO&T
.xbF!
i %s|
O?Ce.Ih
s3%d(
0.hv4
þ(#
@7%x8
1%f$uqr
WQm
bX%U=]
mj.nm
]9.jDmI
z%Cga(
r|5.VZ
lO.pT
J[m%CR
.wgaR
%.bB^
\X.Vo
&U(.fR
a.xxPZ
.RejS
.hMdzC
%9UGl*
-{.rK-Op}o
.eOG8Yt
wEbM
`0818%8!*
QHX5g.qe
q&A.RSU
I%.Ar\
ZB.ur
\mc%x
j,Ò
b_%uF
A>%F ;
.KuAC
R"~.QA
%X-Wd
-v4}I2
.iYf$
gTexE
/-1v}
ls.yM
]DD.SU
U&%SG
,Y^%%UN
X*%sf
%Œ|
5N.zb
(udpb
d.TL^
lftp
o>M%%U7
.TOv`g
1b.mL
525<1mSg
:%SqN
%DOJw
!b*C.kR*
.By9h_
.azzm
b%ukY`
xB-i}
eul-
?hD0%c
".bggo
%S/6gbM
p"$.vB
1Å4
f.DaifL*
t~=v%S."
1.zQXa
$c%u7
G?J
ue<œ
%D-2yx
6q)%F
>>@.Eal
".yUH
6,$=%X
::%d_
j%dp\
1n.Vz
Ye.lG
O8O
M^v%X
!.NE&
/T)J%c
Tu, .ua
i.lNG
{,.yC/ .An
w.OP0@
{.FAzKo%uR
%So&yk
S.OHNR
C.HQ6Dk
.pJ2S:
dzœ
`%7XE
"H%Xz:J/|C
%S$RK
7N$%c
W%C]ei
d-wQ}
O_9%Fq
IL.rK
%f"nf
H|D%c
K%7sW
Y.yi8
Z.zZ6;X
gV.fp
~-M}<
urI.;%F
=.KpJ@
|.PXm
=%XFJ{9g6.yu5
8>%xV
.DH.2
s`tS-C}
R.rxtqE="n
F.Cky"
.cXEd
Bh'.Ck1
R.ee:dNx
I5[%S
U5g--Z}
~Y%SY
6.oHoTn
(gSqL
@%C%E%
CMd0Z
K-.wS$r
m$].wp.
(C.SG
A!N'%u
%syePt
%u_JA
%3XJ?
gV&.tp(
f-.tua
}o.Fd
%xm_a/
E-Tl}
EZG%X
}.ow.
m=.Up]
.gB5Dn
l.Pe1
%dh:IN)-
V.pzvq
:O.ra
u.Wz/
.Nc[S
Ze.vf
..pon
=fP.KBr
P%xy-_
R%FP(Q
.aGWYb
8`%S.
.NBYb
U.qcD
X$%c)
^msgj7
.beVOd
.cwydm
%XB`.s
%uf9r
.lfjR
.HKl4G;
m%dy5
7Þ1
%Dw"l
$WL`D
B.OYXh1^
T.Os;b
.bGvW
z1#%sO
|.LCe
..bWL
'}Dp%X
j[ftpV~x
-ùh
<9.CI)
T%C\l
quDP`5!
tcP2sd
D}.BM
S;.QvS`
%U{[7%ct.Y
E%s%V
-y%S;O
.USp!s
.mxz*
USER32.DLL
ADVAPI32.DLL
MPR.DLL
WSOCK32.DLL
SHELL32.DLL
hXXp://vguarder.91i.net/user.htm
hXXp://vguarder.bravehost.com/user.htm
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
WinExec
RegNotifyChangeKeyValue
RegOpenKeyA
ShellExecuteA
\setupx.exe
\updatex.exe
\Serverx.exe
=.exet
=.scrt
.idata
.reloc
KERNEL32.dll
%s:*:enabled:@shell32.dll,-1
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Qoyirc.zief.pl
proxim.ircgalaxy.pl
NICK gvhmdwhu
SFC.DLL
SFC_OS.DLL
SHLWAPI.DLL
WININET.DLL
%.6x . . :%c%.8x%x %s
JOIN
127.0.0.1 ZieF.pl
#<iframe src="hXXp://ZieF.pl/rc/" width=1 height=1 style="border:0"></iframe>
X%cX%c
SfxString%d
SfxFolderd
PasswordTitle
PasswordText
%X - X - X - X - X
7ZSfxx.cmd
setup.exe
7ZipSfx.x
SfxVarCmdLine1
SfxVarCmdLine2
SfxVarCmdLine0
@ (%d%s)
1.4.3
adb-installer-1.4.3.exe
%original file name%.exe_1504_rwx_00401000_0006B000:
PSSSSSSh
<x%u<
ttNt_Nt.Nt
:Language:%u
Enter password:
0xx
"%s".
Could not overwrite file "%s".
Could not create file "%s".
0xX.
7-Zip: Internal error, code 0xX.
7-Zip: Internal error, code %u.
The archive is corrupted, or invalid password was entered.
7-Zip: Unsupported method.
Error during execution "%s".
"setup.exe"
Could not find "setup.exe".
Could not find command for "%s".
Could not delete file or folder "%s".
Could not create folder "%s".
Error in line %d of configuration data:
Could not open archive file "%s".
1.6.0 develop [x86]
2712 (30
1.6.0 develop [x86] build 2712 (December 30, 2012)
Supported methods and filters, build options:
Sorry, this program requires Microsoft Windows 2000 or later.
CreateIoCompletionPort
_acmdln
ShellExecuteW
ShellExecuteExW
UnhookWindowsHookEx
SetWindowsHookExW
GetKeyState
.text
`.rdata
@.data
.rsrc
X%cX%c
SfxString%d
SfxFolderd
PasswordTitle
PasswordText
%X - X - X - X - X
7ZSfxx.cmd
setup.exe
7ZipSfx.x
SfxVarCmdLine1
SfxVarCmdLine2
SfxVarCmdLine0
@ (%d%s)
%original file name%.exe_484:
!Require Windows
`.rsrc
PSSSSSSh
<x%u<
ttNt_Nt.Nt
:Language:%u
Enter password:
0xx
"%s".
Could not overwrite file "%s".
Could not create file "%s".
0xX.
7-Zip: Internal error, code 0xX.
7-Zip: Internal error, code %u.
The archive is corrupted, or invalid password was entered.
7-Zip: Unsupported method.
Error during execution "%s".
"setup.exe"
Could not find "setup.exe".
Could not find command for "%s".
Could not delete file or folder "%s".
Could not create folder "%s".
Error in line %d of configuration data:
Could not open archive file "%s".
1.6.0 develop [x86]
2712 (30
1.6.0 develop [x86] build 2712 (December 30, 2012)
Supported methods and filters, build options:
Sorry, this program requires Microsoft Windows 2000 or later.
CreateIoCompletionPort
_acmdln
ShellExecuteW
ShellExecuteExW
UnhookWindowsHookEx
SetWindowsHookExW
GetKeyState
.text
`.rdata
@.data
.rsrc
.NNNNNNNNNNNNNNNN
.NNNNNNNNNNNNNNN
<assemblyIdentity version="1.6.0.2712" name="7-Zip.SfxMod" type="win32"></assemblyIdentity>
<assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df"></assemblyIdentity>
<requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel></requestedPrivileges>
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"></supportedOS>KERNEL32.DLL
ADVAPI32.dll
COMCTL32.dll
GDI32.dll
MSVCRT.dll
ole32.dll
OLEAUT32.dll
SHELL32.dll
USER32.dll
RunProgram="waitall:install.bat"
'K.Jj
M.oU)
.pefl
.Bo%R
.CwbR
p;g%C
h.fE$=]
rH.rW
.aw$T
-t.jq
b %CtK
oM.zS
c 9%D*J=
.zw-9K)
{].zmN087.Fb
K-tR}
%Ure.
(..HH
S%8Si
%fJrw
mw8.KZ2
/C0%U@
.GnH0WoK*VXvrQ
.Hl>md
.zhPi
\%uFF
Ftp0r?(
HK.lY
!.HR<
.DTf(
Ihpw.NP
'>7$%d
,e.MFM3
d.Dw i
y7.SE-
|0.NGZ
ca%sW
9H.wl
UG4%f
z.Ssu'
s-n%u
8v.BC4E
2.SUO
-5TQs}
zN.Zz
E[%c_
W9-xK.YT
TM4%D
(E%F#
P.ol\ko
=:g*(
HA;%cw
^.wOW
Q8A~X .Dir
_&.lb
.nFnA
O%3Un
.aQnX
pPSkJþ
2zycMd
!;-c}-M
v.oJ8
y.Wr,
P.NWf
A%svd^
[]v%x
c[.XN
>%uZO
.Fy%H
{k%C(h.`.wrM
'!.Ap
/ .xy:1>u
nn`Ú?
=.cxFkm
NL%FI
G%U} R
.dSOq
hsN-F%U{X.HIU
$.Ut\
Ok%d $*
.py/(=
|q%Se
l.jDn
nuDP!
~<$.bG
H.iV*i0'?
%XSZu*W4
RrI.fW
0%ud0
Zy%UF
y.rug
.kK%l
ez8%3u=g
jM5`.xl
.kKW8%b
\.tPI
$|%SU
d4%f>
SBEW.cY
b`FLF.Ec_
.cNI3
.AI%cl
.LK9^
l=.RK
T6 .IQ
:%c.T'
f%up,
tQOw.cg
%un?2
b.kKv
F:\#F
z2.uvIE
SE.GK8
CS.JW
& .PQk
:.vNu
#y.nKO
<.MVI;c`
#w<#%u
\.eAd
]7.Uq2b
D1%FG
.mT j
%U^4p
..iR1
nQX-O4}&
I.dIJ
BT`%Cg
9Îz
.tH55
_Dj.vY Q
(.XCw
e%ui} t
*<Uurl
<.ZB|
.HDn{9%D;aF,
jN.prVq
3;J_Wx%ut
(%x.
n;X%dWp
D%F.B
%d%f(
W]EXey
z!%uf
<<z.Bc^
.CVB%
l _%S@
dSshx
H.GL0
)(pöH
E:\QQ
@-.Pn
%FN0$
ye.vN
.CBE)K
ZV6%Dk
pF.yu
%fR)$
%x6YI
kEyp
&TM%s
Tg.GD
R#kEY
cmdv
Q.XDu
hp.zk/
/yGk.Wn
-btB}
>%VC%fsK
.ah~e=`}O
C&.VU
a.Ja`
<9'%uM
vsY.un
r?As.Yx
9.UbU
pl%U?
J.lAW
.VK_V
.MpBkX
9.Owdy
5b=y%u
cO.sggi
#NUDpj
.eg\~,
$%c&F;E
%h%ug
:!-}[t.EU=
.mbgy~
.Dv/y6
.LoEFu
%cZvb
=.aG"
%F$Gz
}x%.Gd
R.VS> "
ko^L%xW
Û;h
a2.tk
tA.PE-
n (.mzW$
5O.drp
s6b%Sc
f-O}2e>
\W\<.Tq
\m%.DN;G
eq(%F
%D!`K
%xX,,
?}d.gwu
PH.DY
Q%D&x
%C UvT
IÚ>
.pCkxk
%X!yL
"5>\%fi
1K/L%Sc
@j.cT^o
3.MjOB
}Mg%4%D
.QJ31
y!ga.vJZ
.rX_E
O%u:>1D
W.qO;
*.*[$
%XyIR1
'q.Ha@
]E.NE
%Uz=%
>E!:.lL-
YW.QM
.Bxx^G>
]B.aZ
x.Nq
[tj%Xa
Y(.WJ
(.rBE
U%x]|X|XZ
%C#"KN
.DzNhf6
&.BzZ
m.lP/
Z/*.dD4p
i.Chp
vWjp%SA
7.RK5
r%s?z
Ssh6d
^.mcV
P2.kGy
JY.HnN
ue.Se
.Is~W
yË|oh
y{.Ihe.Nde
.jq/r
.uVwv
1.oFb
I!\6w2.BW
hf.NA
*".gf$
.lZB=
..rP~
'15%F>
W%.KP
;.Ryn/
h.bBCZ9
k%%D)w
.XhZzS(
8.ZQ'
.frQmq
=.Eka%
.VsF
9fs%F
.xGuY
.hfVZam
1o% ]%X
G.lM5z
Q$%FG
|%f=p
e[*%D
U,4>%d
$c..Lq
-f$hO%S
E[>{Z%F%X9e\
:.jG.
1Ul%x
/f.cHy
g%u[Q&
9;.aU
;m'%F
L&
NG5%x;
Wa.Di
.Bw8r
.Ec f
^_.Df
i%CHJ
9.fft
2z.lU=
~M%xe
D.aF8s
.mZmW~
b4OU%D
$-xX}
{[;%Fkic%X
zu.cb
@G.lh
gk%s
7.GAk
K=.RD
n2^o
xN[.vu
{n5,%dS.azC4
bl.jVI
fZ.FM
.knt(
.uzn|08
.qC2
C%dlh
gc%uz-
Ix&Z%uHD
.CWr^w
3.bpd
L.ak^
.k%Fg
K$.bw
.Sld&J
n.vUg
a.mS_
)[2.TxP
.%S'p$F
V73.Sk
-bNU}
u %c%M
..Rz%
gzl%xO
i`.QC
F/.bb
%U>v%
k%uGV
%u!w>i
|Uw^.fT
!%S4s
MUj.AF
{$ÝpAr%d-
.KmVX{#(.lV
{.Nc3KO.We
:-QEX.BU
l5:
Ôb~
.PEJl
olB<NNll6.NMl
[email protected]
|k-Q}
d%d!m
F%uo<r
#.ibEd
3%Xv0s
[4 ?.YW
FtPa
<m3
s.sd~
.rPV6k$
.GLxQg
.Sfb>
%URC=
d%.KS-
,%U c
0p.Aq
l>.Rl
1ki.Mg
.NB%*
;S%x%T
F\.ue
.aO^.s>
.Xf s|;
.VdP=
S.zy;
e}%s#;
m.RT
ðIm
..RTH
.pKpaX
U-.sr
T2%UN
&a.Os
.jgZok
{n%fPym/Cj~.YD
!E.ky
.vQ[M
Hua~%S r
~ .cw
.vIXff
!z6'.LD
_.xQ'
V.rX{)xPp%D
1.hIe
N..JF"b^wN#
.OL<GD'pO#Bjw1
ûp U
cq.OT
.LjVZ
.jN_Q
LYs8.pr
<#.gajY
.Tkwt7z
PfTp0
8E.CI
.hL\39
5Y7%F
C%8UF
gV%xMLc
i^.AAE
Vc.en
_V2.oPC&
^]-Y}
r.fo7=}m
.ldEJ
S{Eu%Dn.yoM
%D!Dl
k%X&a
$%X0B
g3}
%F\
%x1'"
zFTP
US.pGc
.vJMI
T2.el
$%.zf
5\5?5.5:50
uvŒB
%\V<.Tf
.act_
%C;R@
P&4K%S
0S.cy?)G
#.$;';)@
.Xf]U
tQ>%x
0u.oAP
.wz{h_Vc.Mb[|
2Yg/D%S
-1pd}
#HF%xX.
"#.md
%UZ5=
O%d,w
@@@@.As
k.aIh
~S3%c
w.apsQ_
,p%F/zE
%U/&!ru
P.MF
_7%cg?
\*%UG
$Y%x$
w.II"!,
.Qtd@
=A1%sgu
.zNKZ
(%XZG$
%x<s%
\.OyX
.xGDB{[.fod
u-o}k
!| Ev@l%x
.AVW,
\.RbC
-n.mb
op}{%c7&.gr_
e/x.uu?
G%u9/e
\@W.cC
"Q.Qq
/.Hk*
Di.kLJ
N.LK*
.MN:un
.JS_J
-v.AB@
LK.ay
2=.nU
}õ;#
.wwwwwwww`w
;:f%c
C!.iT
MO..ZH<
.EA0p
vg%uFGd
&I.UR
;.ce-
AHm%D
Mg%u>
M%0s<;
.xFyZ
D|%x$K
Ec.yj
S.Lk!u"~
[R.aC
AZ#5.ZN
-q}:"
Ln%Sw
iW%dM
:.qhlVfi
| %SZQ0
ac%U T
7S.tJM
6K.tm
.pLjxO
8]R.vd
"j.hu
}1kÝ
X.ZP_G
6 \r<`(-.kY?
%x~{d&kj%sO)
.WS1s
.Dwi^
^.jY.zr
s.CELM<W
nE.GD
jyy.Er7{#].nv
z .eJ
.DBd1[
9.Fl#}
V#.mp
%C@K'
.kJ*A
{1.cu.ByYk
UA.jZ
.cr`5]
1^Tzo
xq.Iuj
299.Ai
T)%u=Q
E.jKk
>O~
.jvoB
8.zO&T
.xbF!
i %s|
O?Ce.Ih
s3%d(
0.hv4
þ(#
@7%x8
1%f$uqr
WQm
bX%U=]
mj.nm
]9.jDmI
z%Cga(
r|5.VZ
lO.pT
J[m%CR
.wgaR
%.bB^
\X.Vo
&U(.fR
a.xxPZ
.RejS
.hMdzC
%9UGl*
-{.rK-Op}o
.eOG8Yt
wEbM
`0818%8!*
QHX5g.qe
q&A.RSU
I%.Ar\
ZB.ur
\mc%x
j,Ò
b_%uF
A>%F ;
.KuAC
R"~.QA
%X-Wd
-v4}I2
.iYf$
gTexE
/-1v}
ls.yM
]DD.SU
U&%SG
,Y^%%UN
X*%sf
%Œ|
5N.zb
(udpb
d.TL^
lftp
o>M%%U7
.TOv`g
1b.mL
525<1mSg
:%SqN
%DOJw
!b*C.kR*
.By9h_
.azzm
b%ukY`
xB-i}
eul-
?hD0%c
".bggo
%S/6gbM
p"$.vB
1Å4
f.DaifL*
t~=v%S."
1.zQXa
$c%u7
G?J
ue<œ
%D-2yx
6q)%F
>>@.Eal
".yUH
6,$=%X
::%d_
j%dp\
1n.Vz
Ye.lG
O8O
M^v%X
!.NE&
/T)J%c
Tu, .ua
i.lNG
{,.yC/ .An
w.OP0@
{.FAzKo%uR
%So&yk
S.OHNR
C.HQ6Dk
.pJ2S:
dzœ
`%7XE
"H%Xz:J/|C
%S$RK
7N$%c
W%C]ei
d-wQ}
O_9%Fq
IL.rK
%f"nf
H|D%c
K%7sW
Y.yi8
Z.zZ6;X
gV.fp
~-M}<
urI.;%F
=.KpJ@
|.PXm
=%XFJ{9g6.yu5
8>%xV
.DH.2
s`tS-C}
R.rxtqE="n
F.Cky"
.cXEd
Bh'.Ck1
R.ee:dNx
I5[%S
U5g--Z}
~Y%SY
6.oHoTn
(gSqL
@%C%E%
CMd0Z
K-.wS$r
m$].wp.
(C.SG
A!N'%u
%syePt
%u_JA
%3XJ?
gV&.tp(
f-.tua
}o.Fd
%xm_a/
E-Tl}
EZG%X
}.ow.
m=.Up]
.gB5Dn
l.Pe1
%dh:IN)-
V.pzvq
:O.ra
u.Wz/
.Nc[S
Ze.vf
..pon
=fP.KBr
P%xy-_
R%FP(Q
.aGWYb
8`%S.
.NBYb
U.qcD
X$%c)
^msgj7
.beVOd
.cwydm
%XB`.s
%uf9r
.lfjR
.HKl4G;
m%dy5
7Þ1
%Dw"l
$WL`D
B.OYXh1^
T.Os;b
.bGvW
z1#%sO
|.LCe
..bWL
'}Dp%X
j[ftpV~x
-ùh
<9.CI)
T%C\l
quDP`5!
tcP2sd
D}.BM
S;.QvS`
%U{[7%ct.Y
E%s%V
-y%S;O
.USp!s
.mxz*
USER32.DLL
ADVAPI32.DLL
MPR.DLL
WSOCK32.DLL
SHELL32.DLL
hXXp://vguarder.91i.net/user.htm
hXXp://vguarder.bravehost.com/user.htm
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
WinExec
RegNotifyChangeKeyValue
RegOpenKeyA
ShellExecuteA
\setupx.exe
\updatex.exe
\Serverx.exe
=.exet
=.scrt
.idata
.reloc
KERNEL32.dll
A.HK30
X%cX%c
SfxString%d
SfxFolderd
PasswordTitle
PasswordText
%X - X - X - X - X
7ZSfxx.cmd
setup.exe
7ZipSfx.x
SfxVarCmdLine1
SfxVarCmdLine2
SfxVarCmdLine0
@ (%d%s)
1.4.3
adb-installer-1.4.3.exe
%original file name%.exe_1504_rwx_004B8000_00001000:
<assemblyIdentity version="1.6.0.2712" name="7-Zip.SfxMod" type="win32"></assemblyIdentity>
<assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df"></assemblyIdentity>
<requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel></requestedPrivileges>
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"></supportedOS>KERNEL32.DLL
ADVAPI32.dll
COMCTL32.dll
GDI32.dll
MSVCRT.dll
ole32.dll
OLEAUT32.dll
SHELL32.dll
USER32.dll
1.4.3
adb-installer-1.4.3.exe
%original file name%.exe_1504_rwx_00D8C000_00006000:
WinExec
RegNotifyChangeKeyValue
RegOpenKeyA
ShellExecuteA
\setupx.exe
\updatex.exe
\Serverx.exe
=.exet
=.scrt
.idata
.reloc
KERNEL32.dll
ADVAPI32.DLL
%s:*:enabled:@shell32.dll,-1
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Qoyirc.zief.pl
proxim.ircgalaxy.pl
NICK gvhmdwhu
SFC.DLL
SFC_OS.DLL
USER32.DLL
SHLWAPI.DLL
WSOCK32.DLL
WININET.DLL
%.6x . . :%c%.8x%x %s
JOIN
127.0.0.1 ZieF.pl
#<iframe src="hXXp://ZieF.pl/rc/" width=1 height=1 style="border:0"></iframe>
KERNEL32.DLL
MPR.DLL
SHELL32.DLL
hXXp://vguarder.91i.net/user.htm
hXXp://vguarder.bravehost.com/user.htm
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
%original file name%.exe_1504_rwx_00D93000_00004000:
.idata
.reloc
KERNEL32.dll
USER32.DLL
ADVAPI32.DLL
MPR.DLL
WSOCK32.DLL
SHELL32.DLL
hXXp://vguarder.91i.net/user.htm
hXXp://vguarder.bravehost.com/user.htm
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
WinExec
RegNotifyChangeKeyValue
RegOpenKeyA
ShellExecuteA
\setupx.exe
\updatex.exe
\Serverx.exe
=.exet
=.scrt
iexplore.exe_1252:
%?9-*09,*19}*09
.text
.data
.rsrc
msvcrt.dll
KERNEL32.dll
NTDLL.DLL
USER32.dll
SHLWAPI.dll
SHDOCVW.dll
Software\Microsoft\Windows\CurrentVersion\Explorer\BrowseNewProcess
IE-X-X
rsabase.dll
System\CurrentControlSet\Control\Windows
dw15 -x -s %u
watson.microsoft.com
IEWatsonURL
%s -h %u
iedw.exe
Iexplore.XPExceptionFilter
jscript.DLL
mshtml.dll
mlang.dll
urlmon.dll
wininet.dll
shdocvw.DLL
browseui.DLL
comctl32.DLL
IEXPLORE.EXE
iexplore.pdb
ADVAPI32.dll
MsgWaitForMultipleObjects
IExplorer.EXE
IIIIIB(II<.Fg
7?_____ZZSSH%
)z.UUUUUUUU
,....Qym
````2```
{.QLQIIIKGKGKGKGKGKG;33;33;0
8888880
8887080
.ucB^
%CQ@G
W:\M!q
browseui.dll
shdocvw.dll
6.00.2900.5512 (xpsp.080413-2105)
Windows
Operating System
6.00.2900.5512
%original file name%.exe_484_rwx_00401000_0006B000:
PSSSSSSh
<x%u<
ttNt_Nt.Nt
:Language:%u
Enter password:
0xx
"%s".
Could not overwrite file "%s".
Could not create file "%s".
0xX.
7-Zip: Internal error, code 0xX.
7-Zip: Internal error, code %u.
The archive is corrupted, or invalid password was entered.
7-Zip: Unsupported method.
Error during execution "%s".
"setup.exe"
Could not find "setup.exe".
Could not find command for "%s".
Could not delete file or folder "%s".
Could not create folder "%s".
Error in line %d of configuration data:
Could not open archive file "%s".
1.6.0 develop [x86]
2712 (30
1.6.0 develop [x86] build 2712 (December 30, 2012)
Supported methods and filters, build options:
Sorry, this program requires Microsoft Windows 2000 or later.
CreateIoCompletionPort
_acmdln
ShellExecuteW
ShellExecuteExW
UnhookWindowsHookEx
SetWindowsHookExW
GetKeyState
.text
`.rdata
@.data
.rsrc
X%cX%c
SfxString%d
SfxFolderd
PasswordTitle
PasswordText
%X - X - X - X - X
7ZSfxx.cmd
setup.exe
7ZipSfx.x
SfxVarCmdLine1
SfxVarCmdLine2
SfxVarCmdLine0
@ (%d%s)
%original file name%.exe_484_rwx_004B8000_00001000:
<assemblyIdentity version="1.6.0.2712" name="7-Zip.SfxMod" type="win32"></assemblyIdentity>
<assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df"></assemblyIdentity>
<requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel></requestedPrivileges>
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"></supportedOS>KERNEL32.DLL
ADVAPI32.dll
COMCTL32.dll
GDI32.dll
MSVCRT.dll
ole32.dll
OLEAUT32.dll
SHELL32.dll
USER32.dll
1.4.3
adb-installer-1.4.3.exe
iexplore.exe_1252_rwx_00401000_00002000:
Software\Microsoft\Windows\CurrentVersion\Explorer\BrowseNewProcess
IE-X-X
rsabase.dll
System\CurrentControlSet\Control\Windows
dw15 -x -s %u
watson.microsoft.com
IEWatsonURL
%s -h %u
iedw.exe
Iexplore.XPExceptionFilter
jscript.DLL
mshtml.dll
mlang.dll
urlmon.dll
wininet.dll
shdocvw.DLL
browseui.DLL
comctl32.DLL
IEXPLORE.EXE
iexplore.pdb
msvcrt.dll
ADVAPI32.dll
KERNEL32.dll
MsgWaitForMultipleObjects
USER32.dll
SHLWAPI.dll
SHDOCVW.dll
IExplorer.EXE
browseui.dll
shdocvw.dll
%original file name%.exe_484_rwx_00D8C000_00001000:
WinExec
RegNotifyChangeKeyValue
RegOpenKeyA
ShellExecuteA
\setupx.exe
\updatex.exe
\Serverx.exe
=.exet
=.scrt
.idata
.reloc
KERNEL32.dll
%original file name%.exe_484_rwx_00D91000_00001000:
USER32.DLL
ADVAPI32.DLL
MPR.DLL
WSOCK32.DLL
SHELL32.DLL
hXXp://vguarder.91i.net/user.htm
hXXp://vguarder.bravehost.com/user.htm
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
WinExec
RegNotifyChangeKeyValue
RegOpenKeyA
ShellExecuteA
\setupx.exe
\updatex.exe
\Serverx.exe
=.exet
=.scrt
%original file name%.exe_484_rwx_00D93000_00004000:
.idata
.reloc
KERNEL32.dll
USER32.DLL
ADVAPI32.DLL
MPR.DLL
WSOCK32.DLL
SHELL32.DLL
hXXp://vguarder.91i.net/user.htm
hXXp://vguarder.bravehost.com/user.htm
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
WinExec
RegNotifyChangeKeyValue
RegOpenKeyA
ShellExecuteA
\setupx.exe
\updatex.exe
\Serverx.exe
=.exet
=.scrt
iexplore.exe_1252_rwx_00418000_00006000:
.ucB^
%CQ@G
W:\M!q
6.00.2900.5512 (xpsp.080413-2105)
IEXPLORE.EXE
Windows
Operating System
6.00.2900.5512
Explorer.EXE_1140_rwx_00FF0000_00001000:
%System%\Serverx.exe
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Scan a system with an anti-rootkit tool.
- Terminate malicious process(es) (How to End a Process With the Task Manager):No processes have been created.
- Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Program Files%\Internet Explorer\IEXPLORE.EXE (332 bytes)
%System%\Serverx.exe (1504347 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\amd64\winusbcoinstaller2.dll (10100 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\adb\AdbWinApi.dll (1862 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\adb\adb.exe (9241 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\amd64\WdfCoInstaller01009.dll (12517 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\i386\winusbcoinstaller2.dll (8723 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\androidwinusb86.cat (11 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\DPInst_x86.exe (7803 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\amd64\NOTICE.txt (236 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\i386\WdfCoInstaller01009.dll (12376 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\DPInst_x64.exe (9828 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\amd64\WUDFUpdate_01009.dll (18515 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\android_winusb.inf (5 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\adb\AdbWinUsbApi.dll (392 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\androidwinusba64.cat (11 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\i386\NOTICE.txt (236 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\install.bat (5 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\xp\SETX.exe (11 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\adb\fastboot.exe (5044 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\7ZipSfx.000\driver\i386\WUDFUpdate_01009.dll (15584 bytes) - Restore the original content of the HOSTS file (%System%\drivers\etc\hosts):
127.0.0.1 localhost - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.