Worm.Win32.Ainslot_VariantOfZeus_e0e6b320de

by malwarelabrobot on March 31st, 2016 in Malware Descriptions.

HEUR:Trojan.Script.Generic (Kaspersky), Trojan.MSIL.Bladabindi.2.FD, Worm.Win32.Ainslot.VB.FD, GenericAutorunWorm.YR, WormAinslot_VariantOfZeus.YR (Lavasoft MAS)
Behaviour: Trojan, Worm, WormAutorun


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: e0e6b320deaa759efd59f4d30bc93e74
SHA1: 3982e035f351ddcf6e8596a482d5766446f6a89e
SHA256: 8a6236122bf14b249a6188e36f047fd2c0fe61540c57cb67ba2a756b83d42f43
SSDeep: 49152:vJZoQrbTFZY1waLQAC4vTH9K/GgmdoWCcUjbh1gBSdY9yF/39A Mtr:vtrbTA1i8
Size: 3100672 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2012-01-29 23:32:28
Analyzed on: WindowsXP SP3 32-bit


Summary:

Worm. A program that is primarily replicating on networks or removable drives.

Payload

Behaviour Description
WormAutorun A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Worm's file once a user opens a drive's folder in Windows Explorer.


Process activity

The Worm creates the following process(es):

musicload.exe:1688
%original file name%.exe:1328
WScript.exe:828

The Worm injects its code into the following process(es):

MSBuild.exe:2024

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process musicload.exe:1688 makes changes in the file system.
The Worm creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\ofasr.vbs (575 bytes)

The process %original file name%.exe:1328 makes changes in the file system.
The Worm creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Application Data\MusicService\musicload.exe (22430 bytes)

The process MSBuild.exe:2024 makes changes in the file system.
The Worm creates and/or writes to the following file(s):

%Documents and Settings%\%current user%\Application Data\mediam.exe (113 bytes)
%Documents and Settings%\%current user%\Application Data\2016_01_09_MP3 (33 bytes)

Registry activity

The process musicload.exe:1688 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "03 1C 83 DA 48 01 D2 CB 8A C8 6F EC E2 F5 59 33"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%System%]
"wscript.exe" = "Microsoft (R) Windows Based Script Host"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"

The Worm modifies IE settings for security zones to map all urls to the Intranet Zone:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"

The Worm modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:

"UNCAsIntranet" = "1"

The Worm modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:

"ProxyBypass" = "1"

The process %original file name%.exe:1328 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "56 BE BD 3D 72 F1 C3 71 9A 26 23 27 55 8E 95 23"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
"AppData" = "%Documents and Settings%\%current user%\Application Data"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%Documents and Settings%\%current user%\Application Data\MusicService]
"musicload.exe" = "musicload"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"

The Worm adds the reference to itself to be executed when a user logs on:

[HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Shell" = "%Documents and Settings%\%current user%\Application Data\MusicService\musicload.exe,explorer.exe"

The Worm modifies IE settings for security zones to map all urls to the Intranet Zone:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"

The Worm modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:

"UNCAsIntranet" = "1"

The Worm modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:

"ProxyBypass" = "1"

The process MSBuild.exe:2024 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D2 34 87 A8 F0 08 5B 5C 8D 09 8B 75 05 10 FE 8F"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"

[HKCU\Software\VB and VBA Program Settings\INSTALL\DATE]
"WFXI8QJAC8" = "March 30, 2016"

[HKCU\Software\VB and VBA Program Settings\SrvID\ID]
"WFXI8QJAC8" = "2016_01_09_MP3"

The process WScript.exe:828 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A9 AD E5 71 C7 F2 C2 17 62 7B 83 F1 61 28 87 F4"

Dropped PE files

MD5 File path
23c76ea46e425d20c1d08c67f0c4633f c:\Documents and Settings\"%CurrentUserName%"\Application Data\mediam.exe

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation

A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Worm's file once a user opens a drive's folder in Windows Explorer.

VersionInfo

Company Name:
Product Name:
Product Version:
Legal Copyright:
Legal Trademarks:
Original Filename:
Internal Name:
File Version: 3, 3, 8, 1
File Description:
Comments:
Language: English (United States)

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.text 4096 525852 526336 4.63347 61ffce4768976fa0dd2a8f6a97b1417a
.rdata 532480 57280 57344 3.32708 4e47bffc8d5af881602212d9cac52377
.data 589824 108376 26624 1.49076 96c4584c5863bf67d8129bdbf1dc4d4e
.rsrc 700416 2489140 2489344 4.27361 29b2f64811cfe7191bc81c9f6f9ff9b5

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

No activity has been detected.

IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

Traffic

Web Traffic was not found.

The Worm connects to the servers at the folowing location(s):

WScript.exe_828:

.text
`.data
.rsrc
@.reloc
ADVAPI32.dll
KERNEL32.dll
NTDLL.DLL
USER32.dll
msvcrt.dll
OLEAUT32.dll
ole32.dll
VERSION.dll
wscript.exe
advapi32.dll
kernel32.dll
%s%s.DLL
wintrust.dll
%d.%d
Invalid parameter passed to C runtime function.
SOFTWARE\Classes\%s\%s
0x%8X
CreateURLMonikerEx
urlmon.dll
@@8X%u
RegCreateKeyA
RegCloseKey
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyExW
RegCreateKeyExA
RegOpenKeyExW
ReportEventW
RegEnumKeyExA
RegOpenKeyExA
GetProcessHeap
GetCPInfo
MsgWaitForMultipleObjects
EnumThreadWindows
wscript.pdb
stdole2.tlbWWW
.ObjectWW
KeyW
WindowsFolderWWW4
%CopyFolderWWL
Windows Script Host (Ver 5.6)W)
Windows Script Host Application InterfaceW%
Windows Script Host Object
ebstrCmdLineW
78t8x8
5Q5F5
Software\Microsoft\Windows Script Host\Settings
Windows Script Host
WScript.CreateObject
WSHRemote.Execute
Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11CF-8B85-00AA005B4383}
.\%s.mui
.\%s\%s.mui
%s\%s.mui
%s\%s\%s.mui
%s\%s
Microsoft (R) Windows Based Script Host
5.7.0.16599
Microsoft (R) Windows Script Host
(Windows Script Host (debugging disabled)
Windows Script Host Error
Windows Script Host Input Error
This Unicode version of Windows Script Host will only execute under Windows NT.
Please use the ANSI version of Windows Script Host."
WScript execution time was exceeded on script "%1!ls!".
Script execution was terminated.1Could not locate automation class named "%1!ls!".
Could not connect object.'Could not create object named "%1!ls!".1Initialization of the Windows Script Host failed.6Can't find script engine "%2!ls!" for script "%1!ls!".!Can't change default script host.=An attempt at saving your settings via the //S option failed.(Loading script "%1!ls!" failed (%2!ls!).
Loading your settings failed.,Execution of the Windows Script Host failed.,Unexpected error of the Windows Script Host._Windows Script Host access is disabled on this machine. Contact your administrator for details.<Attempt to execute Windows Script Host while it is disabled.SAttempt to execute Windows Script Host remotely while remote execution is disabled.
Missing job name.*Unicode is not supported on this platform.
<The Windows Script Host settings have been reset to default.
Command line options are saved.4The default script host is now set to "wscript.exe".4The default script host is now set to "cscript.exe".,Successful execution of Windows Script Host.3Successful remote execution of Windows Script Host.
Win32 Error 0x%X
Windows Script Host(Windows Script Host (debugging disabled)
Usage: WScript scriptname.extension [option...] [arguments...]
Use engine for executing script
Changes the default script host to CScript.exe
Changes the default script host to WScript.exe (default)
Prevent logo display: No banner will be shown at execution time
#WScript Error - Windows Script Host!Input Error - Windows Script HostlThis Unicode version of WScript will only execute under Windows NT.
%6!ls! WScript - Script Execution Error!Windows Script Host Remote Script/Remote script object can only be executed once. Unable to execute remote script.

MSBuild.exe_2024:

.text
`.data
.rsrc
MSVBVM60.DLL
bss_server.usrReverseRelay
tmrWebHide
bss_server.Socket
bss_server.usrRelay
mswinsck.ocx
MSWinsockLib.Winsock
ieframe.dll
SHDocVwCtl.WebBrowser
WebBrowser
modLaunchWeb
%Program Files% (x86)\Microsoft Visual Studio\VB98\VB6.OLB
C:\Windows\SysWOW64\ieframe.dll
winmm.dll
user32.dll
advapi32.dll
shell32.dll
kernel32.dll
avicap32.dll
advpack.dll
GetAsyncKeyState
SetWindowsHookExA
UnhookWindowsHookEx
GetKeyboardLayout
GetKeyboardState
GetKeyState
PSAPI.DLL
SHFileOperationA
CreatePipe
CHAT_ADDMSG
GetTcpTable
ExitWindowsEx
EnumWindows
WinInet.dll
DeleteUrlCacheEntryA
urlmon
URLDownloadToFileA
ShellExecuteA
keybd_event
VBA6.DLL
C:\Windows\SysWow64\msvbvm60.dll\3
ws2_32.dll
AddMsg
GdiplusShutdown
RemotePort
LocalPort
WSOCK32.DLL
RegCloseKey
RegOpenKeyExA
ntdll.dll
C:\Windows\SysWOW64\ieframe.oca
ole32.dll
vUDPSocket
%Program Files% (x86)\Microsoft Visual Studio\VB98\mswinsck.oca
tmrTCP
tmrUDP
UDPFlood
crypt32.dll
oleaut32.dll
RegOpenKeyA
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
imgLoginPressed
imgLogin
txtPassword
RegCreateKeyA
RegDeleteKeyA
RegEnumKeyExA
gdi32.dll
olepro32.dll
InternetOpenUrlA
FtpGetFileA
FtpPutFileA
FtpSetCurrentDirectoryA
FtpGetCurrentDirectoryA
FtpOpenFileA
FtpGetFileSize
FtpDeleteFileA
FtpCreateDirectoryA
FtpRemoveDirectoryA
FtpRenameFileA
FtpDownload
FtpUpload
FtpGetDirectory
Http_DownloadFile
cmdShowfiles
msvbvm60.dll
UDPSocket
?8??8??8??8??8?
[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`
568568568568\]_
\]_568568568
:- :- :- ;. ;. ;. <.!</!</!=/!=0!=0">0">0">1"?1"?1#?1#@2#@2#@2#A2#A3$A3$B3$B3$B4$C4ÄÄÕÕÕå&E6&E6&F6&F7&F7'G7'G7'G8'H8'H8'H8(I9(I9(I9(J9(J:)J:)K:)K:)K;)L;)L;*L;*M<*M<*M<*N< N= N= O= O> O> P>,P>,P?,Q?,Q?,Q?-R@-R@-R@[email protected]/UB/VC/VC/VC/WC0WD0WD0XD0XE0XE0YE1YE1YF1ZF1ZF1ZF2[G2[G2[G2\G2\H2\H3]H3]H3]I3^I3^I4^I4_J4_J4_J4`K4`K5`K5aK5aL5aL5bL6bL6bM6cM6cM6cM6dN7dN7dN7eN7eO7eO8fO8fO8fP8gP8gP9gP9hQ9hQ9hQ9iR9iR:iR:jR:jS:jS:kS;kS;kT;lT;lT;lT;mU<mU<mU<nU<nV<nV=oV=oV=oW=pW=pW=pW>qX>qX>qX>rY>rY?rY?sY?sZ?sZ?tZ?tZ@t[@u[@u[@u[@v\Av\Av\Aw\Aw]Aw]Ax]Bx]Bx^By^By^By^Cz_Cz_Cz_C{`C{`D{`D|`D|aD|aD}aD}aE}bE~bE~bE~bE
568568568568
568568568568568
5Vm568568568568568568568568568568568impORTORTORTORTORT
568568568
5Vm568568568568568568568568568568impORTORTORTORTORT
568568568568568568568568568568568impORTORTORTORTORT
568568568568|
y56Pi_P\ly|voL_o568|voL_o568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568HKM568568568568568568568568568568impORTORTORTORTORT
568568568\68
56`568568568
5_|568568
5_|\68\{|568568
5_|568\68
79;5685685685685689;>
79<568568568568568
;<@568568568447
;=?;=?;=@78<56856856856856868:
457568568568569
:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=
:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>
;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>
;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?
<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@
=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@
5_|568568568568568
568568\68
56`568568
5_|568568\68
568568568568\68
uMsg
strMsg
MsgNum
AllMsgs
lngPort
URL_TARGET
Port
Password
WebURL
Returns/Sets the port to be connected to on the remote computer
Returns/Sets the port used on the local computer
Binds socket to specific port and adapter
Occurs after a send operation has completed
*\AD:\Blackshades Project\Blackshades NET\server\server.vbp
2c49f800-c2dd-11cf-9ad6-0080c7e7b78d
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1) Gecko/20090612 Firefox/3.5
{00020404-0000-0000-C000-000000000046}
Keylog
\nir_cmd.bss speak text
\nir_cmd.bss setsysvolume 65535
\nir_cmd.bss mutesysvolume 1
\nir_cmd.bss mutesysvolume 0
\nir_cmd.bss screensaver
\nir_cmd.bss monitor off
\nir_cmd.bss monitor on
PORT
TRANSFERPORT
SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\
Wscript.Shell
HKEY_CLASSES_ROOT\HTTP\shell\open\command\
\winlogon.exe
iexplore.exe
hXXp://VVV.facebook.com/?ref=home
hXXp://VVV.facebook.com
ADVAPI32.dll
Windows Firewall/Internet Connection Sharing (ICS)
WebCamCapture
\Vuze\Azureus.exe
\LimeWire\LimeWire.exe
\uTorrent\uTorrent.exe
\uTorrent\uTorrent.exe /HIDE
\BitTorrent\bittorrent.exe
\MSWINSCK.OCX
\cmd.exe
\data.dat
\steam\steam.exe
nkey
dkey
regsvr32.exe
\pws_mail.bss
\pws_mess.bss
\pws_cdk.bss
\pws_ff.bss
\pws_chro.bss
\nir_cmd.bss
cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "
:*:Enabled:Windows Messanger" /f
winmgmts:{impersonationLevel=Impersonate}!\\.\root\cimv2
00000000
winmgmts:\\.\root\cimv2
api.ipinfodb.com
Select * from Win32_Keyboard
GET /v2/ip_query.php?key=
&timezone=off HTTP/1.1
Host: api.ipinfodb.com
GET /v2/ip_query_country.php?key=
Portable
winmgmts:\\.\root\SecurityCenter
\wallpaper.bmp
\wallpaper.jpg
WScript.Shell
WinServer 2003, Web Edition
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProductName
__oxFrame.class__
Scripting.FileSystemObject
Autorun.ini
{557CF401-1A04-11D3-9A73-0000F81EF32E}
{1D5BE4B5-FA4A-452D-9CDD-5DB35105E7EB}
Address family not supported by protocol family.
Operation already in progress.
Operation now in progress.
Socket operation on nonsocket.
Operation not supported.
Protocol family not supported.
Protocol not supported.
Socket type not supported.
Winsock.dll version out of range.
CSocketMaster.SocketExists
CSocketMaster.PostSocket
CSocketMaster.ConnectToIP
CSocketMaster.ResolveIfHostname
CSocketMaster.SendBufferedDataUDP
CSocketMaster.SendBufferedData
abe2869f-9b47-4cd9-a358-c22904dba7f7
/stext mess.dat
\mess.dat
/stext mail.dat
\mail.dat
/stext ffpw.dat
\ffpw.dat
Web Site
Password
/stext chro.dat
\chro.dat
Action URL
SOFTWARE\MICROSOFT\Windows NT\CurrentVersion
Windows
SOFTWARE\Classes\Applications\iexplore.exe\shell\open\command
http\shell\open\command
127.0.0.1
\dump.txt
\uTorrent\uTorrent.exe /DIRECTORY
255.255.255.255
finalizarprocessoportas
CONNECT %s:%i HTTP/1.0
SOFTWARE\Classes\http\shell\open\command
Software\Classes\http\shell\open\command
Software\Microsoft\Windows NT\CurrentVersion\SystemRestore
code.is.a.winner
Software\Microsoft\Windows\CurrentVersion\Uninstall\eMule
SOFTWARE\MICROSOFT\Windows NT\CurrentVersion\DigitalProductId
bps1.exe
bhookpl.dll
bnfa.exe
drvloadn.dll
drvloadx.dll
VNCHooks.dll
xr4tdwa.exe
shutdown.exe
TCnRawKeyBoard
HuntHTTPDownload
autorun.inf
hXXps://onlineeast#.bankofamerica.com
winlogon.exe
moz_logins
WEBCAMLIVE
explorer.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run
SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
\system32\userinit.exe,
notepad.exe
\system32\userinit.exe
steam.exe
hl.exe
@*\AD:\Blackshades Project\Blackshades NET\server\server.vbp
stub.bin

MSBuild.exe_2024_rwx_00400000_001A9000:

.text
`.data
.rsrc
MSVBVM60.DLL
bss_server.usrReverseRelay
tmrWebHide
bss_server.Socket
bss_server.usrRelay
mswinsck.ocx
MSWinsockLib.Winsock
ieframe.dll
SHDocVwCtl.WebBrowser
WebBrowser
modLaunchWeb
%Program Files% (x86)\Microsoft Visual Studio\VB98\VB6.OLB
C:\Windows\SysWOW64\ieframe.dll
winmm.dll
user32.dll
advapi32.dll
shell32.dll
kernel32.dll
avicap32.dll
advpack.dll
GetAsyncKeyState
SetWindowsHookExA
UnhookWindowsHookEx
GetKeyboardLayout
GetKeyboardState
GetKeyState
PSAPI.DLL
SHFileOperationA
CreatePipe
CHAT_ADDMSG
GetTcpTable
ExitWindowsEx
EnumWindows
WinInet.dll
DeleteUrlCacheEntryA
urlmon
URLDownloadToFileA
ShellExecuteA
keybd_event
VBA6.DLL
C:\Windows\SysWow64\msvbvm60.dll\3
ws2_32.dll
AddMsg
GdiplusShutdown
RemotePort
LocalPort
WSOCK32.DLL
RegCloseKey
RegOpenKeyExA
ntdll.dll
C:\Windows\SysWOW64\ieframe.oca
ole32.dll
vUDPSocket
%Program Files% (x86)\Microsoft Visual Studio\VB98\mswinsck.oca
tmrTCP
tmrUDP
UDPFlood
crypt32.dll
oleaut32.dll
RegOpenKeyA
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
imgLoginPressed
imgLogin
txtPassword
RegCreateKeyA
RegDeleteKeyA
RegEnumKeyExA
gdi32.dll
olepro32.dll
InternetOpenUrlA
FtpGetFileA
FtpPutFileA
FtpSetCurrentDirectoryA
FtpGetCurrentDirectoryA
FtpOpenFileA
FtpGetFileSize
FtpDeleteFileA
FtpCreateDirectoryA
FtpRemoveDirectoryA
FtpRenameFileA
FtpDownload
FtpUpload
FtpGetDirectory
Http_DownloadFile
cmdShowfiles
msvbvm60.dll
UDPSocket
?8??8??8??8??8?
[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`[]`
568568568568\]_
\]_568568568
:- :- :- ;. ;. ;. <.!</!</!=/!=0!=0">0">0">1"?1"?1#?1#@2#@2#@2#A2#A3$A3$B3$B3$B4$C4ÄÄÕÕÕå&E6&E6&F6&F7&F7'G7'G7'G8'H8'H8'H8(I9(I9(I9(J9(J:)J:)K:)K:)K;)L;)L;*L;*M<*M<*M<*N< N= N= O= O> O> P>,P>,P?,Q?,Q?,Q?-R@-R@-R@[email protected]/UB/VC/VC/VC/WC0WD0WD0XD0XE0XE0YE1YE1YF1ZF1ZF1ZF2[G2[G2[G2\G2\H2\H3]H3]H3]I3^I3^I4^I4_J4_J4_J4`K4`K5`K5aK5aL5aL5bL6bL6bM6cM6cM6cM6dN7dN7dN7eN7eO7eO8fO8fO8fP8gP8gP9gP9hQ9hQ9hQ9iR9iR:iR:jR:jS:jS:kS;kS;kT;lT;lT;lT;mU<mU<mU<nU<nV<nV=oV=oV=oW=pW=pW=pW>qX>qX>qX>rY>rY?rY?sY?sZ?sZ?tZ?tZ@t[@u[@u[@u[@v\Av\Av\Aw\Aw]Aw]Ax]Bx]Bx^By^By^By^Cz_Cz_Cz_C{`C{`D{`D|`D|aD|aD}aD}aE}bE~bE~bE~bE
568568568568
568568568568568
5Vm568568568568568568568568568568568impORTORTORTORTORT
568568568
5Vm568568568568568568568568568568impORTORTORTORTORT
568568568568568568568568568568568impORTORTORTORTORT
568568568568|
y56Pi_P\ly|voL_o568|voL_o568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568568HKM568568568568568568568568568568impORTORTORTORTORT
568568568\68
56`568568568
5_|568568
5_|\68\{|568568
5_|568\68
79;5685685685685689;>
79<568568568568568
;<@568568568447
;=?;=?;=@78<56856856856856868:
457568568568569
:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=:;=
:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>:;>
;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>;<>
;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?;=?
<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@<=@
=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@=>@
5_|568568568568568
568568\68
56`568568
5_|568568\68
568568568568\68
uMsg
strMsg
MsgNum
AllMsgs
lngPort
URL_TARGET
Port
Password
WebURL
Returns/Sets the port to be connected to on the remote computer
Returns/Sets the port used on the local computer
Binds socket to specific port and adapter
Occurs after a send operation has completed
*\AD:\Blackshades Project\Blackshades NET\server\server.vbp
2c49f800-c2dd-11cf-9ad6-0080c7e7b78d
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1) Gecko/20090612 Firefox/3.5
{00020404-0000-0000-C000-000000000046}
Keylog
\nir_cmd.bss speak text
\nir_cmd.bss setsysvolume 65535
\nir_cmd.bss mutesysvolume 1
\nir_cmd.bss mutesysvolume 0
\nir_cmd.bss screensaver
\nir_cmd.bss monitor off
\nir_cmd.bss monitor on
PORT
TRANSFERPORT
SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\
Wscript.Shell
HKEY_CLASSES_ROOT\HTTP\shell\open\command\
\winlogon.exe
iexplore.exe
hXXp://VVV.facebook.com/?ref=home
hXXp://VVV.facebook.com
ADVAPI32.dll
Windows Firewall/Internet Connection Sharing (ICS)
WebCamCapture
\Vuze\Azureus.exe
\LimeWire\LimeWire.exe
\uTorrent\uTorrent.exe
\uTorrent\uTorrent.exe /HIDE
\BitTorrent\bittorrent.exe
\MSWINSCK.OCX
\cmd.exe
\data.dat
\steam\steam.exe
nkey
dkey
regsvr32.exe
\pws_mail.bss
\pws_mess.bss
\pws_cdk.bss
\pws_ff.bss
\pws_chro.bss
\nir_cmd.bss
cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "
:*:Enabled:Windows Messanger" /f
winmgmts:{impersonationLevel=Impersonate}!\\.\root\cimv2
00000000
winmgmts:\\.\root\cimv2
api.ipinfodb.com
Select * from Win32_Keyboard
GET /v2/ip_query.php?key=
&timezone=off HTTP/1.1
Host: api.ipinfodb.com
GET /v2/ip_query_country.php?key=
Portable
winmgmts:\\.\root\SecurityCenter
\wallpaper.bmp
\wallpaper.jpg
WScript.Shell
WinServer 2003, Web Edition
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProductName
__oxFrame.class__
Scripting.FileSystemObject
Autorun.ini
{557CF401-1A04-11D3-9A73-0000F81EF32E}
{1D5BE4B5-FA4A-452D-9CDD-5DB35105E7EB}
Address family not supported by protocol family.
Operation already in progress.
Operation now in progress.
Socket operation on nonsocket.
Operation not supported.
Protocol family not supported.
Protocol not supported.
Socket type not supported.
Winsock.dll version out of range.
CSocketMaster.SocketExists
CSocketMaster.PostSocket
CSocketMaster.ConnectToIP
CSocketMaster.ResolveIfHostname
CSocketMaster.SendBufferedDataUDP
CSocketMaster.SendBufferedData
abe2869f-9b47-4cd9-a358-c22904dba7f7
/stext mess.dat
\mess.dat
/stext mail.dat
\mail.dat
/stext ffpw.dat
\ffpw.dat
Web Site
Password
/stext chro.dat
\chro.dat
Action URL
SOFTWARE\MICROSOFT\Windows NT\CurrentVersion
Windows
SOFTWARE\Classes\Applications\iexplore.exe\shell\open\command
http\shell\open\command
127.0.0.1
\dump.txt
\uTorrent\uTorrent.exe /DIRECTORY
255.255.255.255
finalizarprocessoportas
CONNECT %s:%i HTTP/1.0
SOFTWARE\Classes\http\shell\open\command
Software\Classes\http\shell\open\command
Software\Microsoft\Windows NT\CurrentVersion\SystemRestore
code.is.a.winner
Software\Microsoft\Windows\CurrentVersion\Uninstall\eMule
SOFTWARE\MICROSOFT\Windows NT\CurrentVersion\DigitalProductId
bps1.exe
bhookpl.dll
bnfa.exe
drvloadn.dll
drvloadx.dll
VNCHooks.dll
xr4tdwa.exe
shutdown.exe
TCnRawKeyBoard
HuntHTTPDownload
autorun.inf
hXXps://onlineeast#.bankofamerica.com
winlogon.exe
moz_logins
WEBCAMLIVE
explorer.exe
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run
SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
\system32\userinit.exe,
notepad.exe
\system32\userinit.exe
steam.exe
hl.exe
@*\AD:\Blackshades Project\Blackshades NET\server\server.vbp
stub.bin


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    musicload.exe:1688
    %original file name%.exe:1328
    WScript.exe:828

  2. Delete the original Worm file.
  3. Delete or disinfect the following files created/modified by the Worm:

    %Documents and Settings%\%current user%\Local Settings\Temp\ofasr.vbs (575 bytes)
    %Documents and Settings%\%current user%\Application Data\MusicService\musicload.exe (22430 bytes)
    %Documents and Settings%\%current user%\Application Data\mediam.exe (113 bytes)
    %Documents and Settings%\%current user%\Application Data\2016_01_09_MP3 (33 bytes)

  4. Remove the references to the Worm by modifying the following registry value(s) (How to Work with System Registry):

    [HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
    "Shell" = "%Documents and Settings%\%current user%\Application Data\MusicService\musicload.exe,explorer.exe"

  5. Find and delete all copies of the worm's file together with "autorun.inf" scripts on removable drives.
  6. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now