Worm.Win32.Dorkbot_68b7b1237e
Trojan.Win32.Inject.fxwm (Kaspersky), Gen:Variant.Kazy.187793 (AdAware), Backdoor.Win32.PcClient.FD, Worm.Win32.Dorkbot.FD, WormDorkbot.YR, GenericUDPFlooder.YR, GenericPhysicalDrive0.YR, GenericMSNWorm.YR, GenericUSBInfector.YR, GenericDNSBlocker.YR, GenericAutorunWorm.YR, GenericSYNFlooder.YR, GenericInjector.YR, GenericProxy.YR, BankerGeneric.YR (Lavasoft MAS)
Behaviour: Banker, Trojan, Backdoor, Flooder, Worm, WormAutorun, MSNWorm, DNSBlocker, UDPFlooder, SYNFlooder, Trojan-Proxy, USBInfector
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 68b7b1237e583c99f75d79f8c3d1806e
SHA1: eab961db375685c4799cf98f9e63e0a7169e60c7
SHA256: d842b342e8c0a6573e10e9d7d9d4d5e4f53db7a058b43844849972c53275d23b
SSDeep: 6144:zHIep0fx8NEUIFX9sMlSNoaGb3ED3tXiGofcul9CSz:zoeO8NvIFXEoL3e3l05hz
Size: 320048 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2013-05-12 20:04:31
Analyzed on: WindowsXP SP3 32-bit
Summary:
Worm. A program that is primarily replicating on networks or removable drives.
Payload
| Behaviour | Description |
|---|---|
| WormAutorun | A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Worm's file once a user opens a drive's folder in Windows Explorer. |
| MSNWorm | A worm can spread its copies through the MSN Messanger. |
| DNSBlocker | A program can block designated DNS servers for making it difficult for users to locate specific domains or web sites on the Internet. |
| UDPFlooder | This program can make a UDP flood. A UDP flood attack is a denial-of-service attack using the User Datagram Protocol (UDP). It can be initiated by sending a large number of UDP packets to random ports on a remote host. |
| SYNFlooder | This program can make a SYN flood. It is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic. |
| Trojan-Proxy | This program can launch a proxy server (SOCKS4) on a designated TCP port. |
| USBInfector | A program can register a device notification with the help of RegisterDeviceNotification. So it is notified when a USB device is plugged and then the worm copies itself to the USB device plugged into the affected computer. |
Process activity
The Worm creates the following process(es):
windows.exe:436
windows.exe:2008
The Worm injects its code into the following process(es):
rundll32.exe:1076
mscorsvw.exe:1912
%original file name%.exe:976
Explorer.EXE:128
csrss.exe:692
winlogon.exe:716
services.exe:760
svchost.exe:928
svchost.exe:1008
svchost.exe:1096
svchost.exe:1140
svchost.exe:1220
spoolsv.exe:1424
wmiprvse.exe:1736
jqs.exe:1960
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process %original file name%.exe:976 makes changes in the file system.
The Worm creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\RarSFX0\windows.exe (6147 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RarSFX0\photo.jpg (7 bytes)
The Worm deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\RarSFX0\__tmp_rar_sfx_access_check_2138453 (0 bytes)
Registry activity
The process rundll32.exe:1076 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "67 BD B3 90 6F 9F BA 79 62 E3 AD 68 3F 53 DC 05"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
The process windows.exe:436 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0B A6 27 AB E9 C4 5C 07 78 39 5D 43 E4 BC B4 E9"
The process windows.exe:2008 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3E 2A 37 6E 8C 91 72 29 83 58 28 83 22 6F 72 EC"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
The process %original file name%.exe:976 makes changes in the system registry.
The Worm creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "DD C0 DC 20 A2 10 1C 06 C5 68 B9 F8 41 5F 54 CD"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%System%]
"shimgvw.dll" = "Windows Picture and Fax Viewer"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\RarSFX0]
"windows.exe" = "Uninstall WinRAR"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
The Worm modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Worm modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Worm modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Dropped PE files
There are no dropped PE files.
HOSTS file anomalies
No changes have been detected.
Rootkit activity
The Worm installs the following user-mode hooks in WININET.dll:
HttpSendRequestW
InternetWriteFile
HttpSendRequestA
The Worm installs the following user-mode hooks in DNSAPI.dll:
DnsQuery_A
DnsQuery_W
The Worm installs the following user-mode hooks in WS2_32.dll:
GetAddrInfoW
The Worm installs the following user-mode hooks in kernel32.dll:
MoveFileA
CopyFileW
CopyFileA
MoveFileW
CreateFileW
CreateFileA
The Worm installs the following user-mode hooks in ntdll.dll:
LdrLoadDll
NtResumeThread
NtQueryDirectoryFile
NtEnumerateValueKey
Propagation
A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Worm's file once a user opens a drive's folder in Windows Explorer.
A program can register a device notification with the help of RegisterDeviceNotification. So it is notified when a USB device is plugged and then the worm copies itself to the USB device plugged into the affected computer.
A worm can spread its copies through the MSN Messanger.
VersionInfo
Company Name: Pics, Inc.
Product Name: Pics For Microsoft
Product Version: 5.1.2
Legal Copyright: Pics For Microsoft Windows Copyright (c) 1992-2014
Legal Trademarks:
Original Filename: Pics.exe
Internal Name: Pics
File Version: 5.1.2
File Description: Application
Comments: Pics (c) 1992-2013
Language: Russian (Russia)
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 151444 | 151552 | 4.65238 | 8aa7a9d7576338e587fb6d03eb7e4d9a |
| .rdata | 155648 | 20275 | 20480 | 3.69171 | bc0d620628b814e85cdb20a76887a6c1 |
| .data | 176128 | 136640 | 5120 | 1.75371 | 8111ac2302de0abe34041e03b28631f7 |
| .rsrc | 315392 | 16648 | 16896 | 3.6638 | a6a474e53974264e70d449798c126cf3 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Total found: 1
3e2f15f0e82a1a8f489e91efdd12eb73
URLs
No activity has been detected.
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
Web Traffic was not found.
The Worm connects to the servers at the folowing location(s):
.text
`.rdata
@.data
.rsrc
t(j.Xj\f
SSShthB
^SShq
Please contact the application's support team for more information.
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
operator
GetProcessWindowStation
USER32.DLL
d:\Projects\WinRAR\SFX\build\sfxrar32\Release\sfxrar.pdb
COMCTL32.dll
SHLWAPI.dll
GetCPInfo
KERNEL32.dll
USER32.dll
GDI32.dll
COMDLG32.dll
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
ADVAPI32.dll
SHFileOperationW
ShellExecuteExW
SHELL32.dll
ole32.dll
OLEAUT32.dll
GetConsoleOutputCP
WINRAR.SFX
c:\%original file name%.exe
%FoB_
.GcLj
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"version="6.0.0.0"publicKeyToken="6595b64144ccf1df"Maximum allowed array size (%u) is exceeded%.*ls(%u)%lsrtmp%dCrypt32.dllGETPASSWORD1%s %s%s %s %s%s%s%dSoftware\Microsoft\Windows\CurrentVersion%s.%d.tmpwinrarsfxmappingfile.tmp-el -s2 "-d%s" "-p%s" "-sp%s"__tmp_rar_sfx_access_check_%usfxcmdWaitForMultipleObjects error %d, GetLastError %dUnknown method in %sCannot open %sCannot create %sCannot create folder %sHChecksum error in the encrypted file %s. Corrupt file or wrong password.Checksum error in %s Packed data checksum error in %sWrong password for %s5Write error in the file %s. Probably the disk is fullRead error in the file %sExtracting from %sErroraErrors encountered while performing the operationPlease close all applications, reboot Windows and restart this installation\Some installation files are corrupt.Extracting files to %s folder$Extracting files to temporary folder=Total path and file name length must not exceed %d charactersUnknown encryption method in %s$The specified password is incorrect.Cannot copy %s to %s.Cannot create symbolic link %sCannot create hard link %s5.1.2Pics.exePics For Microsoft Windows Copyright (c) 1992-2014%original file name%.exe_976_rwx_00C90000_0004F000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d%s-Mutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s{%s|%s%s}%sn%s{%s|%s%s}%s%s|%s|%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Runicon=shell32.dll,7shellexecute=%windir%\system32\cmd.exe&&%%windir%%\explorer.exe %Í%%%s/c "start %Í%%RECYCLER\%s\\.\%c:%s\%s%sautorun.tmp%sautorun.inf%0x.exe*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllr.kda024.comy.kdo50g.comi.do4kf8.comaowk50.comp.aowk50.com1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}NWVY %s 0 0 :%sAUEU %sQMBO %s %sVSYW %sKNZSWQW %s :%sCUEB :%sNUEB %s[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\08f45ecec:\%original file name%.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Eukmkq.exe7 767<7~78*808;8~8\\.\pipeInternet Explorer\1explore.exeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exe1explore.exef1refox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\Desktop.iniwinlogon.exeexplorer.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\%original file name%.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\RarSFX0\windows.exerundll32.exe_1076:
.text`.data.rsrcmsvcrt.dllKERNEL32.dllNTDLL.DLLGDI32.dllUSER32.dllIMAGEHLP.dllrundll32.pdb.....eZXnnnnnnnnnnnn3....eDXnnnnnnnnnnnn3...eDXnnnnnnnnnnnn,.eDXnnnnnnnnnnnn,%Xnnnnnnnnnnnnnnn1O3$dS7"%U9.manifest5.1.2600.5512 (xpsp.080413-2105)RUNDLL.EXEWindowsOperating System5.1.2600.5512YThere is not enough memory to run the file %s.Please close other windows and try again.9The file %s or one of its components could not be opened.0The file %s or one of its components cannot run.MThe file %s or one of its components requires a different version of Windows.UThe file %s or one of its components cannot run in standard or enhanced mode Windows.3Another instance of the file %s is already running./An exception occurred while trying to run "%s"Error in %sMissing entry:%sError loading %srundll32.exe_1076_rwx_00C80000_0004F000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d%s-Mutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s{%s|%s%s}%sn%s{%s|%s%s}%s%s|%s|%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Runicon=shell32.dll,7shellexecute=%windir%\system32\cmd.exe&&%%windir%%\explorer.exe %Í%%%s/c "start %Í%%RECYCLER\%s\\.\%c:%s\%s%sautorun.tmp%sautorun.inf%0x.exe*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllr.kda024.comy.kdo50g.comi.do4kf8.comaowk50.comp.aowk50.com1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}NWVY %s 0 0 :%sAUEU %sQMBO %s %sVSYW %sKNZSWQW %s :%sCUEB :%sNUEB %s[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\08f45ece%System%\rundll32.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Eukmkq.exe7 767<7~78*808;8~8\\.\pipeInternet Explorer\1explore.exeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exe1explore.exef1refox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\Desktop.iniwinlogon.exeexplorer.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\system32\rundll32.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\RarSFX0\windows.exeExplorer.EXE_128_rwx_01F80000_0004F000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d%s-Mutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s{%s|%s%s}%sn%s{%s|%s%s}%s%s|%s|%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Runicon=shell32.dll,7shellexecute=%windir%\system32\cmd.exe&&%%windir%%\explorer.exe %Í%%%s/c "start %Í%%RECYCLER\%s\\.\%c:%s\%s%sautorun.tmp%sautorun.inf%0x.exe*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllr.kda024.comy.kdo50g.comi.do4kf8.comaowk50.comp.aowk50.com1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}NWVY %s 0 0 :%sAUEU %sQMBO %s %sVSYW %sKNZSWQW %s :%sCUEB :%sNUEB %s[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipcC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\RarSFX0\windows.exe%Documents and Settings%\%current user%\Application Data\Eukmkq.exe\\.\pipe\08f45ece%WinDir%\Explorer.EXE%WinDir%8f45ece.exe7 767<7~78*808;8~8\\.\pipeInternet Explorer\1explore.exeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exe1explore.exef1refox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\Desktop.iniwinlogon.exeexplorer.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\explorer.execsrss.exe_692_rwx_00D60000_0004F000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d%s-Mutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s{%s|%s%s}%sn%s{%s|%s%s}%s%s|%s|%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Runicon=shell32.dll,7shellexecute=%windir%\system32\cmd.exe&&%%windir%%\explorer.exe %Í%%%s/c "start %Í%%RECYCLER\%s\\.\%c:%s\%s%sautorun.tmp%sautorun.inf%0x.exe*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllr.kda024.comy.kdo50g.comi.do4kf8.comaowk50.comp.aowk50.com1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}NWVY %s 0 0 :%sAUEU %sQMBO %s %sVSYW %sKNZSWQW %s :%sCUEB :%sNUEB %s[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\08f45ece\??\%System%\csrss.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Eukmkq.exe7 767<7~78*808;8~8\\.\pipeInternet Explorer\1explore.exeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exe1explore.exef1refox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\Desktop.iniwinlogon.exeexplorer.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\system32\csrss.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\RarSFX0\windows.exewinlogon.exe_716_rwx_015F0000_0004F000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0`%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d%s-Mutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s{%s|%s%s}%sn%s{%s|%s%s}%s%s|%s|%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Runicon=shell32.dll,7shellexecute=%windir%\system32\cmd.exe&&%%windir%%\explorer.exe %Í%%%s/c "start %Í%%RECYCLER\%s\\.\%c:%s\%s%sautorun.tmp%sautorun.inf%0x.exe*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllr.kda024.comy.kdo50g.comi.do4kf8.comaowk50.comp.aowk50.com1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}NWVY %s 0 0 :%sAUEU %sQMBO %s %sVSYW %sKNZSWQW %s :%sCUEB :%sNUEB %s[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\08f45ece\??\%System%\winlogon.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Eukmkq.exe7 767<7~78*808;8~8\\.\pipeInternet Explorer\1explore.exeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exe1explore.exef1refox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\Desktop.iniwinlogon.exeexplorer.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\system32\winlogon.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\RarSFX0\windows.exeservices.exe_760_rwx_00AD0000_0004F000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d%s-Mutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s{%s|%s%s}%sn%s{%s|%s%s}%s%s|%s|%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Runicon=shell32.dll,7shellexecute=%windir%\system32\cmd.exe&&%%windir%%\explorer.exe %Í%%%s/c "start %Í%%RECYCLER\%s\\.\%c:%s\%s%sautorun.tmp%sautorun.inf%0x.exe*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllr.kda024.comy.kdo50g.comi.do4kf8.comaowk50.comp.aowk50.com1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}NWVY %s 0 0 :%sAUEU %sQMBO %s %sVSYW %sKNZSWQW %s :%sCUEB :%sNUEB %s[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\08f45ece%System%\services.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Eukmkq.exe7 767<7~78*808;8~8\\.\pipeInternet Explorer\1explore.exeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exe1explore.exef1refox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\Desktop.iniwinlogon.exeexplorer.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\system32\services.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\RarSFX0\windows.exesvchost.exe_928_rwx_00ED0000_0004F000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d%s-Mutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s{%s|%s%s}%sn%s{%s|%s%s}%s%s|%s|%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Runicon=shell32.dll,7shellexecute=%windir%\system32\cmd.exe&&%%windir%%\explorer.exe %Í%%%s/c "start %Í%%RECYCLER\%s\\.\%c:%s\%s%sautorun.tmp%sautorun.inf%0x.exe*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllr.kda024.comy.kdo50g.comi.do4kf8.comaowk50.comp.aowk50.com1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}NWVY %s 0 0 :%sAUEU %sQMBO %s %sVSYW %sKNZSWQW %s :%sCUEB :%sNUEB %s[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\08f45ece%System%\svchost.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Eukmkq.exe7 767<7~78*808;8~8\\.\pipeInternet Explorer\1explore.exeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exe1explore.exef1refox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\Desktop.iniwinlogon.exeexplorer.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\system32\svchost.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\RarSFX0\windows.exesvchost.exe_1008_rwx_00B50000_0004F000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d%s-Mutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s{%s|%s%s}%sn%s{%s|%s%s}%s%s|%s|%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Runicon=shell32.dll,7shellexecute=%windir%\system32\cmd.exe&&%%windir%%\explorer.exe %Í%%%s/c "start %Í%%RECYCLER\%s\\.\%c:%s\%s%sautorun.tmp%sautorun.inf%0x.exe*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllr.kda024.comy.kdo50g.comi.do4kf8.comaowk50.comp.aowk50.com1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}NWVY %s 0 0 :%sAUEU %sQMBO %s %sVSYW %sKNZSWQW %s :%sCUEB :%sNUEB %s[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\08f45ece%System%\svchost.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Eukmkq.exe7 767<7~78*808;8~8\\.\pipeInternet Explorer\1explore.exeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exe1explore.exef1refox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\Desktop.iniwinlogon.exeexplorer.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\system32\svchost.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\RarSFX0\windows.exesvchost.exe_1096_rwx_025F0000_0004F000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0`%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d%s-Mutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s{%s|%s%s}%sn%s{%s|%s%s}%s%s|%s|%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Runicon=shell32.dll,7shellexecute=%windir%\system32\cmd.exe&&%%windir%%\explorer.exe %Í%%%s/c "start %Í%%RECYCLER\%s\\.\%c:%s\%s%sautorun.tmp%sautorun.inf%0x.exe*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllr.kda024.comy.kdo50g.comi.do4kf8.comaowk50.comp.aowk50.com1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}NWVY %s 0 0 :%sAUEU %sQMBO %s %sVSYW %sKNZSWQW %s :%sCUEB :%sNUEB %s[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\08f45ece%WinDir%\System32\svchost.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Eukmkq.exe7 767<7~78*808;8~8\\.\pipeInternet Explorer\1explore.exeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exe1explore.exef1refox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\Desktop.iniwinlogon.exeexplorer.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\system32\svchost.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\RarSFX0\windows.exesvchost.exe_1140_rwx_00870000_0004F000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d%s-Mutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s{%s|%s%s}%sn%s{%s|%s%s}%s%s|%s|%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Runicon=shell32.dll,7shellexecute=%windir%\system32\cmd.exe&&%%windir%%\explorer.exe %Í%%%s/c "start %Í%%RECYCLER\%s\\.\%c:%s\%s%sautorun.tmp%sautorun.inf%0x.exe*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllr.kda024.comy.kdo50g.comi.do4kf8.comaowk50.comp.aowk50.com1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}NWVY %s 0 0 :%sAUEU %sQMBO %s %sVSYW %sKNZSWQW %s :%sCUEB :%sNUEB %s[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\08f45ece%System%\svchost.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Eukmkq.exe7 767<7~78*808;8~8\\.\pipeInternet Explorer\1explore.exeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exe1explore.exef1refox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\Desktop.iniwinlogon.exeexplorer.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\system32\svchost.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\RarSFX0\windows.exesvchost.exe_1220_rwx_00C30000_0004F000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d%s-Mutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s{%s|%s%s}%sn%s{%s|%s%s}%s%s|%s|%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Runicon=shell32.dll,7shellexecute=%windir%\system32\cmd.exe&&%%windir%%\explorer.exe %Í%%%s/c "start %Í%%RECYCLER\%s\\.\%c:%s\%s%sautorun.tmp%sautorun.inf%0x.exe*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllr.kda024.comy.kdo50g.comi.do4kf8.comaowk50.comp.aowk50.com1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}NWVY %s 0 0 :%sAUEU %sQMBO %s %sVSYW %sKNZSWQW %s :%sCUEB :%sNUEB %s[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\08f45ece%System%\svchost.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Eukmkq.exe7 767<7~78*808;8~8\\.\pipeInternet Explorer\1explore.exeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exe1explore.exef1refox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\Desktop.iniwinlogon.exeexplorer.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\system32\svchost.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\RarSFX0\windows.exespoolsv.exe_1424_rwx_00DD0000_0004F000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d%s-Mutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s{%s|%s%s}%sn%s{%s|%s%s}%s%s|%s|%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Runicon=shell32.dll,7shellexecute=%windir%\system32\cmd.exe&&%%windir%%\explorer.exe %Í%%%s/c "start %Í%%RECYCLER\%s\\.\%c:%s\%s%sautorun.tmp%sautorun.inf%0x.exe*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllr.kda024.comy.kdo50g.comi.do4kf8.comaowk50.comp.aowk50.com1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}NWVY %s 0 0 :%sAUEU %sQMBO %s %sVSYW %sKNZSWQW %s :%sCUEB :%sNUEB %s[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\08f45ece%System%\spoolsv.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Eukmkq.exe7 767<7~78*808;8~8\\.\pipeInternet Explorer\1explore.exeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exe1explore.exef1refox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\Desktop.iniwinlogon.exeexplorer.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\system32\spoolsv.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\RarSFX0\windows.exewmiprvse.exe_1736_rwx_00DE0000_0004F000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d%s-Mutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s{%s|%s%s}%sn%s{%s|%s%s}%s%s|%s|%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Runicon=shell32.dll,7shellexecute=%windir%\system32\cmd.exe&&%%windir%%\explorer.exe %Í%%%s/c "start %Í%%RECYCLER\%s\\.\%c:%s\%s%sautorun.tmp%sautorun.inf%0x.exe*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllr.kda024.comy.kdo50g.comi.do4kf8.comaowk50.comp.aowk50.com1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}NWVY %s 0 0 :%sAUEU %sQMBO %s %sVSYW %sKNZSWQW %s :%sCUEB :%sNUEB %s[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\08f45ece%System%\wbem\wmiprvse.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Eukmkq.exe7 767<7~78*808;8~8\\.\pipeInternet Explorer\1explore.exeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exe1explore.exef1refox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\Desktop.iniwinlogon.exeexplorer.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\system32\wbem\wmiprvse.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\RarSFX0\windows.exemscorsvw.exe_1912_rwx_008E0000_0004F000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d%s-Mutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s{%s|%s%s}%sn%s{%s|%s%s}%s%s|%s|%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Runicon=shell32.dll,7shellexecute=%windir%\system32\cmd.exe&&%%windir%%\explorer.exe %Í%%%s/c "start %Í%%RECYCLER\%s\\.\%c:%s\%s%sautorun.tmp%sautorun.inf%0x.exe*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllr.kda024.comy.kdo50g.comi.do4kf8.comaowk50.comp.aowk50.com1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}NWVY %s 0 0 :%sAUEU %sQMBO %s %sVSYW %sKNZSWQW %s :%sCUEB :%sNUEB %s[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\08f45ece%WinDir%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Eukmkq.exe7 767<7~78*808;8~8\\.\pipeInternet Explorer\1explore.exeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exe1explore.exef1refox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\Desktop.iniwinlogon.exeexplorer.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\WINDOWS\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\RarSFX0\windows.exejqs.exe_1960_rwx_010C0000_0004F000:
.text`.rdata@.data.reloc=MSG t>MSG u`=PASS8httpu18httpuMtlSSSSSSSSSShL0%s.%s%s.%S%s.Blocked "%s" from removing our bot file!%s.Blocked "%S" from removing our bot file!i.root-servers.org%s.Blocked "%s" from moving our bot file%s.Blocked "%S" from moving our bot file%s.p10-> Message hijacked!%s.p10-> Message to %s hijacked!%s.p21-> Message hijacked!msnmsgCAL %d %6sngr->blocksize: %dblock_size: %d\\.\pipe\%skernel32.dll%s_%d%s-Mutexntdll.dll%s-pid%s-commJOIN #PRIVMSG #%s.Blocked "%S" from creating "%S"%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!%s.Detected process "%S" sending an IRC packet to server %s:%d.%s.Detected process "%S" sending an IRC packet to server %s:%d (Target: %s).PRIVMSG %5sJOIN %5sPRIVMSGJOIN%s:%d%s.%s%s%S%s%s%s.%S%S%S%S%Sstate_%s%s.%s (p='%S')pop3://%s:%s@%s:%d%s:%s@%s:%dftp://%s:%s@%s:%dftpgrab%s.%s ->> %s (%s : %s)%s.%s ->> %s : %s%s-%s-%s%s.Blocked possible browser exploit pack call on URL '%s'%s.Blocked possible browser exploit pack call on URL '%S'webroot.virusbuster.nprotect.heck.tconecare.live.login[password]login[username]*members*.iknowthatgirl*/members**youporn.*/login**members.brazzers.com**bcointernacional*login**:2222/CMD_LOGIN**whcms*dologin**:2086/login**:2083/login**:2082/login**webnames.ru/*user_login*Webnames*dotster.com/*login*loginid*enom.com/login*login.Passlogin.User*login.Pass=**1and1.com/xml/config**moniker.com/*Login*LoginPasswordLoginUserName*LoginPassword=**namecheap.com/*login*loginname*godaddy.com/login*Password*Password=**alertpay.com/login**netflix.com/*ogin**thepiratebay.org/login**torrentleech.org/*login**vip-file.com/*/signin-do**sms4file.com/*/signin-do**letitbit.net**what.cd/login**oron.com/login**filesonic.com/*login**speedyshare.com/login**uploaded.to/*login**uploading.com/*login*loginUserPasswordloginUserName*loginUserPassword=**fileserv.com/login**hotfile.com/login**4shared.com/login*txtpass*txtpass=**netload.in/index**freakshare.com/login*login_pass*login_pass=**mediafire.com/*login**sendspace.com/login**megaupload.*/*login**depositfiles.*/*/login**signin.ebay*SignIn*officebanking.cl/*login.asp**secure.logmein.*/*logincheck*session[password]*password]=**twitter.com/sessionstxtPassword*&txtPassword=**.moneybookers.*/*login.pl*runescape*/*weblogin**&password=**no-ip*/login**steampowered*/login*quick_password*hackforums.*/member.php*facebook.*/login.php**login.yahoo.*/*login*passwdlogin*passwd=**login.live.*/*post.srf*TextfieldPassword*TextfieldPassword=**gmx.*/*FormLogin**Passwd=*FLN-Password*FLN-Password=**pass=**bigstring.*/*index.php**screenname.aol.*/login.psp*passwordloginId*password=**aol.*/*login.psp*Passwd*google.*/*ServiceLoginAuth*login_passwordlogin_email*login_password=**paypal.*/webscr?cmd=_login-submit*%s / ?%d HTTP/1.1Host: %sUser-Agent: %sMozilla/4.0\\.\PHYSICALDRIVE0shell32.dllhttpidnsapi.dllhttp://%s/%shttp://%s/POST /23s{%s|%s%s}%sn%s{%s|%s%s}%s%s|%s|%s[DNS]: Redirecting "%s" to "%s"%s|%s[Logins]: Cleared %d loginsFTP ->[d="%s" s="%d bytes"] Download error: MD5 mismatch (%s != %s)http://[Login]: %s[DNS]: Blocked %d domain(s) - Redirected %d domain(s)[Speed]: Estimated upload speed %d KB/sSoftware\Microsoft\Windows\CurrentVersion\Runicon=shell32.dll,7shellexecute=%windir%\system32\cmd.exe&&%%windir%%\explorer.exe %Í%%%s/c "start %Í%%RECYCLER\%s\\.\%c:%s\%s%sautorun.tmp%sautorun.inf%0x.exe*bebo.*/c/profile/comment_post.json*bebo.*/mail/MailCompose.jsp**friendster.*/sendmessage.php**friendster.*/rpc.php*vkontakte.ru/mail.php*vkontakte.ru/wall.php*vkontakte.ru/api.php*facebook.*/ajax/*MessageComposerEndpoint.php*msg_text*facebook.*/ajax/chat/send.php*-_.!~*'()%s.%s hijacked!MSG %d %s %dMSG %d %1sSDG %d %dContent-Length: %dSDG %d%s_0xXRegCreateKeyExWRegCreateKeyExAURLDownloadToFileWURLDownloadToFileAHttpSendRequestWHttpSendRequestANtEnumerateValueKeyDNSAPI.dllSecur32.dllShellExecuteASHELL32.dllHttpQueryInfoAInternetOpenUrlAHttpQueryInfoWWININET.dllSHLWAPI.dllWS2_32.dllMSVCRT.dllGetProcessHeapConnectNamedPipeCreateNamedPipeADisconnectNamedPipeGetWindowsDirectoryWGetWindowsDirectoryAKERNEL32.dllUSER32.dllRegCloseKeyRegNotifyChangeKeyValueRegOpenKeyExAADVAPI32.dllole32.dllr.kda024.comy.kdo50g.comi.do4kf8.comaowk50.comp.aowk50.com1.1.0.0msn.setmsn.inthttp.sethttp.inthttp.injloginsPASS %s[.ShellClassInfo]CLSID={645FF040-5081-101B-9F08-00AA002F954E}NWVY %s 0 0 :%sAUEU %sQMBO %s %sVSYW %sKNZSWQW %s :%sCUEB :%sNUEB %s[v="%s" c="%s" h="%s" p="%S"][d="%s" s="%d bytes"] Updated bot file "%S" - Download retries: %d[d="%s" s="%d bytes"] Executed file "%S" - Download retries: %d[Slowloris]: Starting flood on "%s" for %d minute(s)[Slowloris]: Finished flood on "%s"[UDP]: Starting flood on "%s:%d" for %d second(s)[UDP]: Finished flood on "%s:%d"[SYN]: Starting flood on "%s:%d" for %d second(s)[SYN]: Finished flood on "%s:%d"[USB]: Infected %s[MSN]: Updated MSN spread message to "%s"[MSN]: Updated MSN spread interval to "%s"[HTTP]: Updated HTTP spread message to "%s"[HTTP]: Injected value is now %s.[HTTP]: Updated HTTP spread interval to "%s"[Visit]: Visited "%s"[DNS]: Blocked "%s"[usb="%d" msn="%d" http="%d" total="%d"][ftp="%d" pop="%d" http="%d" total="%d"][RSOCK4]: Started rsock4 on "%s:%d"[d="%s" s="%d bytes"] Update error: MD5 mismatch (%s != %s)[d="%s"] Error downloading file [e="%d"][d="%s"] Error writing download to "%S" [e="%d"][d="%s" s="%d bytes"] Error creating process "%S" [e="%d"][d="%s" s="%d bytes"] File "%S" has an invalid binary type. [type="%d"][d="%s"] Error getting temporary filename. [e="%d"][d='%s"] Error getting application data path [e="%d"][Visit]: Error visitng "%s"[FTP Login]: %s[POP3 Login]: %s[FTP Infect]: %s was iframed[HTTP Login]: %s[HTTP Traffic]: %s[Ruskill]: Detected File: "%s"[Ruskill]: Detected DNS: "%s"[Ruskill]: Detected Reg: "%s"[PDef ]: %s[DNS]: Blocked DNS "%s"[MSN]: %s[HTTP]: %sftplogftpinfecthttploginhttptraffhttpspreadhttp://api.wipmania.com/\\.\pipe\x_ipc\\.\pipe\08f45ece%Program Files%\Java\jre6\bin\jqs.exe%WinDir%%Documents and Settings%\%current user%\Application Data\Eukmkq.exe7 767<7~78*808;8~8\\.\pipeInternet Explorer\1explore.exeautorun.infpidgin.exewlcomm.exemsnmsgr.exemsmsgs.exeflock.exeopera.exechrome.exeieuser.exe1explore.exef1refox.exe.ipconfig.exeverclsid.exeregedit.exerundll32.execmd.exeregsvr32.exel"%s" %Slol.exen127.0.0.1%s:Zone.Identifierwininet.dllsecur32.dllws2_32.dll:%S%S\Desktop.iniwinlogon.exeexplorer.exeAadvapi32.dllurlmon.dllnspr4.dllAkernel23.dlly%s\%s.exelsass.exeSoftware\Microsoft\Windows\CurrentVersion\Policies\System.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Device\HarddiskVolume1\Program Files\Java\jre6\bin\jqs.exeC:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\RarSFX0\windows.exe
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Scan a system with an anti-rootkit tool.
- Terminate malicious process(es) (How to End a Process With the Task Manager):
windows.exe:436
windows.exe:2008 - Delete the original Worm file.
- Delete or disinfect the following files created/modified by the Worm:
%Documents and Settings%\%current user%\Local Settings\Temp\RarSFX0\windows.exe (6147 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\RarSFX0\photo.jpg (7 bytes) - Find and delete all copies of the worm's file together with "autorun.inf" scripts on removable drives.
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.