Zum.Ciusky.3_193d470bfa
Susp_Dropper (Kaspersky), Zum.Ciusky.3 (AdAware), Worm.Win32.Ainslot.VB.FD, Worm.Win32.AutoIt.FD, WormAutoItGen.YR, WormAinslot_VariantOfZeus.YR, GenericAutorunWorm.YR (Lavasoft MAS)
Behaviour: Worm, WormAutorun
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 193d470bfabbe930d96bf2d0da49a632
SHA1: 66e3cbb52292fc92c5e464b1605154c80e50cd4d
SHA256: cc5d4d702c5306d4030a09ada4602deada24d54229dd39e544b5561a009e3db1
SSDeep: 24576:G2O/GlVo29U94tcDxvIy0NLeFUSC7g6zwm4m53Sb2X:X9s8cDh0NgUSC5kFm53SyX
Size: 1000105 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2012-06-09 16:19:49
Analyzed on: WindowsXP SP3 32-bit
Summary:
Worm. A program that is primarily replicating on networks or removable drives.
Payload
| Behaviour | Description |
|---|---|
| WormAutorun | A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Zum's file once a user opens a drive's folder in Windows Explorer. |
Process activity
The Zum creates the following process(es):
WScript.exe:1948
KS132676434.com:1116
%original file name%.exe:772
The Zum injects its code into the following process(es):
RegSvcs.exe:292
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process WScript.exe:1948 makes changes in the file system.
The Zum creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\Tar2.tmp (2712 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab5.tmp (49 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\2BF68F4714092295550497DD56F57004 (408 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\DC2135CED98D8A4D7C0CEE202BB0B810 (649 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (49 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (408 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab1.tmp (54 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar6.tmp (2712 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\5C8DDA36D60247082B142836039F4636 (16 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar4.tmp (2712 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\2BF68F4714092295550497DD56F57004 (18 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\DC2135CED98D8A4D7C0CEE202BB0B810 (172 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\F5A17C00E427F919C4A49EEF5AD0EE53 (196 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\F5A17C00E427F919C4A49EEF5AD0EE53 (522 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab3.tmp (54 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\5C8DDA36D60247082B142836039F4636 (196 bytes)
The Zum deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\Tar2.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab5.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab1.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar6.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar4.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab3.tmp (0 bytes)
The process KS132676434.com:1116 makes changes in the file system.
The Zum creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\lmggv\start.vbs (189 bytes)
%Documents and Settings%\%current user%\lmggv\start.cmd (71 bytes)
%Documents and Settings%\%current user%\Start Menu\Programs\Startup\start.lnk (1104 bytes)
The Zum deletes the following file(s):
%Documents and Settings%\%current user%\Start Menu\Programs\Startup\start.lnk (0 bytes)
The process %original file name%.exe:772 makes changes in the file system.
The Zum creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\lmggv\8543611.vbe (63 bytes)
%Documents and Settings%\%current user%\lmggv\3841358.AZQ (51608 bytes)
%Documents and Settings%\%current user%\lmggv\23203.NSN (3073 bytes)
%Documents and Settings%\%current user%\lmggv\13189.GXX (110 bytes)
%Documents and Settings%\%current user%\lmggv\KS132676434.com (15361 bytes)
The Zum deletes the following file(s):
%Documents and Settings%\%current user%\lmggv\__tmp_rar_sfx_access_check_1187937 (0 bytes)
Registry activity
The process RegSvcs.exe:292 makes changes in the system registry.
The Zum creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CC 2C ED 16 DC C1 A3 31 6D FB 89 56 6F 40 17 5C"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\VB and VBA Program Settings\SrvID\ID]
"ZAJTQ1F4C9" = "DataS 18/11"
[HKCU\Software\VB and VBA Program Settings\INSTALL\DATE]
"ZAJTQ1F4C9" = "November 28, 2015"
The process WScript.exe:1948 makes changes in the system registry.
The Zum creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9E 78 E8 3E 50 17 64 2A 0D F7 10 DE E1 68 8D 6E"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\E5215D3460C2C20BBE2D9FE5FB665DAA2C0E225C]
"Blob" = "04 00 00 00 01 00 00 00 10 00 00 00 6F 7E 74 A3"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C]
"Blob" = "19 00 00 00 01 00 00 00 10 00 00 00 A8 23 B4 A2"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%Documents and Settings%\%current user%\lmggv]
"KS132676434.com" = "AutoIt v3 Script"
The Zum modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass" = "1"
The Zum modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Zum modifies IE settings for security zones to map all urls to the Intranet Zone:
"IntranetName" = "1"
The Zum deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates]
"E5215D3460C2C20BBE2D9FE5FB665DAA2C0E225C"
[HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates]
"B1BC968BD4F49D622AA89A81F2150152A41D829C"
The process KS132676434.com:1116 makes changes in the system registry.
The Zum creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BC 23 15 6D 26 F7 57 CD 63 31 AD 4B FE 72 31 38"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Startup" = "%Documents and Settings%\%current user%\Start Menu\Programs\Startup"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonVideo" = "%Documents and Settings%\All Users\Documents\My Videos"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
"My Pictures" = "%Documents and Settings%\%current user%\My Documents\My Pictures"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoFolderOptions" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonMusic" = "%Documents and Settings%\All Users\Documents\My Music"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Start Menu" = "%Documents and Settings%\All Users\Start Menu"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Start Menu" = "%Documents and Settings%\%current user%\Start Menu"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonPictures" = "%Documents and Settings%\All Users\Documents\My Pictures"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"ShowSuperHidden" = "0"
To automatically run itself each time Windows is booted, the Zum adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"lmggv" = "C:\DOCUME~1\"%CurrentUserName%"\lmggv\start.vbs"
The process %original file name%.exe:772 makes changes in the system registry.
The Zum creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C4 EE 07 A4 3A 66 82 35 D4 DC FD 41 FD EB 0D 3F"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%System%]
"wscript.exe" = "Microsoft (R) Windows Based Script Host"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
The Zum modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Zum modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Zum modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Dropped PE files
| MD5 | File path |
|---|---|
| 71d8f6d5dc35517275bc38ebcc815f9f | c:\Documents and Settings\"%CurrentUserName%"\lmggv\KS132676434.com |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Zum's file once a user opens a drive's folder in Windows Explorer.
VersionInfo
Company Name:
Product Name:
Product Version:
Legal Copyright:
Legal Trademarks:
Original Filename:
Internal Name:
File Version:
File Description:
Comments:
Language: English (United States)
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 74526 | 74752 | 4.54396 | a8692f5ba740240ef0f9a827376f76f9 |
| .rdata | 81920 | 7445 | 7680 | 3.46159 | d4f36accffde0bf520f52486679ccf0d |
| .data | 90112 | 96036 | 512 | 2.46008 | b6c7edb5b7fec47a37a622cc5d71f3f4 |
| .CRT | 188416 | 32 | 512 | 0.273198 | 439411041ee0b8261668525c5c132cd9 |
| .rsrc | 192512 | 59556 | 59904 | 4.2302 | 6ab244a85706ffcae3c4a81b64debf42 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Total found: 2
75b0b4288dd1e82729f3b0f79df64a25
1b925ad0ae55e9c9fa8107526e8ea524
URLs
| URL | IP |
|---|---|
| hxxp://a767.dspw65.akamai.net/msdownload/update/v3/static/trustedr/en/authrootseq.txt | |
| hxxp://a767.dspw65.akamai.net/msdownload/update/v3/static/trustedr/en/authrootstl.cab | |
| hxxp://crl.globalsign.net/Root.crl | |
| hxxp://crl.globalsign.net/primobject.crl | |
| hxxp://crl.globalsign.net/ObjectSign.crl | |
| hxxp://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab | |
| hxxp://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt | |
| dkn.dyndns.info |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET /Root.crl HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: crl.globalsign.net
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
HTTP/1.1 200 OK
Date: Sat, 28 Nov 2015 08:07:01 GMT
Content-Type: application/pkix-crl
Content-Length: 649
Connection: keep-alive
Set-Cookie: __cfduid=d65e01e2650248440dc15e119f04bbbf41448698021; expires=Sun, 27-Nov-16 08:07:01 GMT; path=/; domain=.globalsign.net; HttpOnly
Last-Modified: Wed, 07 Oct 2015 00:00:00 GMT
ETag: "56146080-289"
CF-Cache-Status: HIT
Expires: Wed, 02 Dec 2015 08:07:01 GMT
Cache-Control: public, max-age=345600
Accept-Ranges: bytes
Server: cloudflare-nginx
CF-RAY: 24c493a7b3b42afd-WAW0...0..m...0...*.H........0W1.0...U....BE1.0...U....GlobalSign nv-sa1.
0...U....Root CA1.0...U....GlobalSign Root CA..151007000000Z..16011500
0000Z0..0*.........D.....141125000000Z0.0...U.......0*........)E.....1
41125000000Z0.0...U.......0*........ ...h..141125000000Z0.0...U.......
0*........,^.....141125000000Z0.0...U......../0-0...U......20...U.#..0
...`{f.E....P/}..4....K0...*.H.............<.............&..,t...[.
.:.A..*.H..w........=.E.{(-ekb..?.....y....k..e..59B>Z....O`.].`!..
....7....I.^..T..e.[..K.....V.4B.U.B.!........R....... ..07b...j..c.".
.%[..o..i..I..A^......O$..R.2.....v"....*...9...ueET....xz..R.Gm....-.
..r.[..s......;,..`.W...8HTTP/1.1 200 OK..Date: Sat, 28 Nov 2015 08:07
:01 GMT..Content-Type: application/pkix-crl..Content-Length: 649..Conn
ection: keep-alive..Set-Cookie: __cfduid=d65e01e2650248440dc15e119f04b
bbf41448698021; expires=Sun, 27-Nov-16 08:07:01 GMT; path=/; domain=.g
lobalsign.net; HttpOnly..Last-Modified: Wed, 07 Oct 2015 00:00:00 GMT.
.ETag: "56146080-289"..CF-Cache-Status: HIT..Expires: Wed, 02 Dec 2015
08:07:01 GMT..Cache-Control: public, max-age=345600..Accept-Ranges: b
ytes..Server: cloudflare-nginx..CF-RAY: 24c493a7b3b42afd-WAW..0...0..m
...0...*.H........0W1.0...U....BE1.0...U....GlobalSign nv-sa1.0...U...
.Root CA1.0...U....GlobalSign Root CA..151007000000Z..160115000000Z0..
0*.........D.....141125000000Z0.0...U.......0*........)E.....141125000
000Z0.0...U.......0*........ ...h..141125000000Z0.0...U.......0*......
..,^.....141125000000Z0.0...U......../0-0...U......20...U.#..0...`<<< skipped >>>
GET /primobject.crl HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: crl.globalsign.net
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
HTTP/1.1 200 OK
Date: Sat, 28 Nov 2015 08:07:01 GMT
Content-Type: application/pkix-crl
Content-Length: 522
Connection: keep-alive
Set-Cookie: __cfduid=d65e01e2650248440dc15e119f04bbbf41448698021; expires=Sun, 27-Nov-16 08:07:01 GMT; path=/; domain=.globalsign.net; HttpOnly
Last-Modified: Tue, 26 Aug 2014 06:00:00 GMT
ETag: "53fc2260-20a"
CF-Cache-Status: HIT
Expires: Wed, 02 Dec 2015 08:07:01 GMT
Cache-Control: public, max-age=345600
Accept-Ranges: bytes
Server: cloudflare-nginx
CF-RAY: 24c493a893eb2afd-WAW0...0..0...*.H........0..1.0...U....BE1.0...U....GlobalSign nv-sa1%0#.
.U....Primary Object Publishing CA100...U...'GlobalSign Primary Object
Publishing CA..140826060000Z..340826060000Z0<0..........D.....1408
26060000Z0.........#...$..140826060000Z0...*.H.............U/......w..
J'S..V...4.......l.v.z,.8...rP..K.;U'....'.5Y.I-.4.xt{..P...3..h....^.
(...!.(.]I...{K...I.I|<-..X>.......h....S&..].....e...\..q>./
'......&.Dl...g<P.n.NB.m....L......y..c....Z.*_J..e.j .{.......HP.9
.......m.bYR.*y.=.^[email protected]/1.1 200 OK..Date:
Sat, 28 Nov 2015 08:07:01 GMT..Content-Type: application/pkix-crl..Con
tent-Length: 522..Connection: keep-alive..Set-Cookie: __cfduid=d65e01e
2650248440dc15e119f04bbbf41448698021; expires=Sun, 27-Nov-16 08:07:01
GMT; path=/; domain=.globalsign.net; HttpOnly..Last-Modified: Tue, 26
Aug 2014 06:00:00 GMT..ETag: "53fc2260-20a"..CF-Cache-Status: HIT..Exp
ires: Wed, 02 Dec 2015 08:07:01 GMT..Cache-Control: public, max-age=34
5600..Accept-Ranges: bytes..Server: cloudflare-nginx..CF-RAY: 24c493a8
93eb2afd-WAW..0...0..0...*.H........0..1.0...U....BE1.0...U....GlobalS
ign nv-sa1%0#..U....Primary Object Publishing CA100...U...'GlobalSign
Primary Object Publishing CA..140826060000Z..340826060000Z0<0......
....D.....140826060000Z0.........#...$..140826060000Z0...*.H..........
...U/......w..J'S..V...4.......l.v.z,.8...rP..K.;U'....'.5Y.I-.4.xt{..
P...3..h....^.(...!.(.]I...{K...I.I|<-..X>.......h....S&..].....
e...\..q>./'......&.Dl...g<P.n.NB.m....L......y..c....Z.*_J.<<< skipped >>>
GET /ObjectSign.crl HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: crl.globalsign.net
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
HTTP/1.1 200 OK
Date: Sat, 28 Nov 2015 08:07:01 GMT
Content-Type: application/pkix-crl
Content-Length: 16373
Connection: keep-alive
Set-Cookie: __cfduid=d65e01e2650248440dc15e119f04bbbf41448698021; expires=Sun, 27-Nov-16 08:07:01 GMT; path=/; domain=.globalsign.net; HttpOnly
Expires: Sun, 27 Nov 2016 08:07:01 GMT
Last-Modified: Thu, 30 Oct 2014 06:06:00 GMT
Cache-Control: public, max-age=31536000
CF-Cache-Status: HIT
Accept-Ranges: bytes
Server: cloudflare-nginx
CF-RAY: 24c493a984292afd-WAW0.?.0.>....0...*.H........0c1.0...U....BE1.0...U....GlobalSign nv-s
a1.0...U....ObjectSign CA1!0...U....GlobalSign ObjectSign CA..14103006
0600Z..141129060600Z0.>.0..........^.j...040129001213Z0..........f.
. ..040202091917Z0..........vH....040305110232Z0............J...040210
151616Z0............&...040602085222Z0............ ...040226145836Z0..
.........Z....040304093239Z0.............1..040730121905Z0...........t
X...040302112147Z0..........4].o..040415082543Z0..........?..S..040325
074453Z0..........N.....040319124009Z0..........z.....040324015008Z0..
..........2...040423113142Z0............d...040407165443Z0...........U
....040408151325Z0............n...040513080428Z0...........W.w..040420
082751Z0................040709140744Z0.......... [...040517130701Z0..
........n.e...040511112838Z0..........."e...040618111142Z0............
....040618132437Z0..........-,....040726125011Z0..........P.....040713
133516Z0...........$np..040713081606Z0...........-.`..040712154511Z0..
.........GhP..040803152358Z0................041104122706Z0...........w
....040729111337Z0...........w....040802140837Z0............6_..040802
135538Z0.......... ..X..040811132723Z0..........4.....040811133024Z0..
........S..b..040827125951Z0..........WT....040827105840Z0..........v.
$...050530083427Z0................040826104859Z0................040907
113309Z0..........."....041011111814Z0............y...041025113522Z0..
..........^...040929131800Z0...........". ..040915112117Z0...........&
....040928082222Z0.............?..040924130237Z0............7...04<<< skipped >>>
GET /msdownload/update/v3/static/trustedr/en/authrootseq.txt HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: VVV.download.windowsupdate.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
HTTP/1.1 200 OK
Cache-Control: max-age=604800
Content-Type: text/plain
Last-Modified: Thu, 19 Nov 2015 23:18:43 GMT
Accept-Ranges: bytes
ETag: "808bbea12023d11:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Content-Length: 18
Date: Sat, 28 Nov 2015 08:06:59 GMT
Connection: keep-alive
X-CCC: UA
X-CID: 21401D12320A2285D79HTTP/1.1 200 OK..Cache-Control: max-age=604800..Cont
ent-Type: text/plain..Last-Modified: Thu, 19 Nov 2015 23:18:43 GMT..Ac
cept-Ranges: bytes..ETag: "808bbea12023d11:0"..Server: Microsoft-IIS/7
.5..X-Powered-By: ASP.NET..Content-Length: 18..Date: Sat, 28 Nov 2015
08:06:59 GMT..Connection: keep-alive..X-CCC: UA..X-CID: 2..1401D12320A
2285D79....
GET /msdownload/update/v3/static/trustedr/en/authrootstl.cab HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: VVV.download.windowsupdate.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
HTTP/1.1 200 OK
Cache-Control: max-age=604800
Content-Type: application/octet-stream
Last-Modified: Fri, 20 Nov 2015 00:02:21 GMT
Accept-Ranges: bytes
ETag: "80a431ba2623d11:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Content-Length: 49695
Date: Sat, 28 Nov 2015 08:07:00 GMT
Connection: keep-alive
X-CCC: UA
X-CID: 2MSCF............,...................I.......l.........sGe. .authroot.s
tl.|.V.C9..CK...<T.......%....^..!OD.....N.l.Gy4*.GI.H%.$.........D
H.$%[.gF.t..{..._....9..;3.....r..n.oy.q*....y`vB.8_E..&.0..r..*...DX!
.y...S..F.8....y4.....`...f.$p.....y.N.a.l..a.U.0Mu..?}.....!.{...t..b
u.7)....M.............?.;.g...P.)..a..._..O....k...-.G.Q.)w.1!..[...k'
..!;kT...&..=.E....I!..N. .yu......4.Z5.$Wx.[.t...i~..Ht..Opc ..3....B
. (..k.0H.... zK......=k..........A....... ..A(u.!...1Z.I`.s,\./..<
..sY....;.w91^d.....zXY.Y8.<,........xU..:/.;..N.....jB..j...i.tE..
...1*k...V.mP..Z......C.....Kc.....j.......-..l.....[mA .n.......AO .J
..7iy.z.`.5...:..S...J....Y..Z..je...5..8.~.2...n.&\...Z>.....WJ...
.....q.[.n...3J...fy.......T...I.olj.A.1....N....<..A....i...?.6s.1
.Q.C....X........n?.e...7>..T......v.;.....<.NKql...].....qhN.~.
i....FS..-4.e.$o))...Z"..z2.n...[~ ..B(...N..!.....5<-WB.L..Q.5.U.0
j?...9.5.b.7_o.|.|...o|S.g.1......cW..../...7>h<..::c&<..!..a
d...v.-.D..E......*.3. R`,.....-.DF./......"[`[email protected]..&\Ea.."B
D6..e..8X.I.^v6.^].j.b...H!E...8^..SB!......`..|Q.=..N...[3..>,7D..
F:..a6.o..2....d'...............!k...%.y..:.?.4#./..4....*....|...G..2
....z.Y.&..0*[email protected]...' ..{Of.c.....Q....7f...XI.|.......
xXX9E...M....h.a..b.}j..@.. ....#bYW...sl...;~R1'K..Wr.:}.......P#....
...@h~..<....[......|.~.<=.O.....%.)*t*B.q.Q...^.........Da.^Ie.
.....)..{W.....R._................g.2..B....1..IK..=1sn...n....'..8.8.
L.c..........%..dP....tI3....Pz[..K.#..~..;..n....1L"L/$.yj..k..O.<<< skipped >>>
The Zum connects to the servers at the folowing location(s):
.text
`.rdata
@.data
.rsrc
@.reloc
s%j.Zf
8crtsu
:crts
crts
GetProcessWindowStation
operator
uxtheme.dll
kernel32.dll
operand of unlimited repeat could match the empty string
POSIX named classes are supported only within a class
erroffset passed as NULL
POSIX collating elements are not supported
this version of PCRE is not compiled with PCRE_UTF8 support
PCRE does not support \L, \l, \N{name}, \U, or \usupport for \P, \p, and \X has not been compiled
this version of PCRE is not compiled with PCRE_UCP support
ICMP.DLL
advapi32.dll
RegDeleteKeyExW
Error text not found (please report)
WSOCK32.dll
VERSION.dll
WINMM.dll
COMCTL32.dll
MPR.dll
InternetCrackUrlW
HttpQueryInfoW
HttpOpenRequestW
HttpSendRequestW
FtpOpenFileW
FtpGetFileSize
InternetOpenUrlW
WININET.dll
PSAPI.DLL
USERENV.dll
GetProcessHeap
CreatePipe
GetWindowsDirectoryW
KERNEL32.dll
OpenWindowStationW
SetProcessWindowStation
CloseWindowStation
MapVirtualKeyW
EnumChildWindows
EnumWindows
VkKeyScanW
GetKeyState
GetKeyboardState
SetKeyboardState
GetAsyncKeyState
keybd_event
EnumThreadWindows
ExitWindowsEx
UnregisterHotKey
RegisterHotKey
GetKeyboardLayoutNameW
USER32.dll
SetViewportOrgEx
GDI32.dll
COMDLG32.dll
RegOpenKeyExW
RegCloseKey
RegCreateKeyExW
RegEnumKeyExW
RegDeleteKeyW
ADVAPI32.dll
ShellExecuteW
SHFileOperationW
ShellExecuteExW
SHELL32.dll
ole32.dll
OLEAUT32.dll
GetCPInfo
zcÁ
L.aVFY)
.ijjrc
g%D`-
sssh6
uW.MW
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
<assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" language="*" processorArchitecture="*" publicKeyToken="6595b64144ccf1df"></assemblyIdentity>
3.3/464(5,5054585
8 8$8(8,808
= =$=(=,=0=4=8=<=@=
0 0$0(0,0004080<0
:*;3;?;|;
11
2 323[3.5
? ?<?@?`?
= =$=(=,=0=4=
5 5$5(5,5054585
CADjD%D<D
mscoree.dll
nKERNEL32.DLL
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
WUSER32.DLL
CMDLINERAW
CMDLINE
/AutoIt3ExecuteLine
/AutoIt3ExecuteScript
%s (%d) : ==> %s.:
Line %d:
Line %d (File "%s"):
%s (%d) : ==> %s:
AutoIt script files (*.au3, *.a3x)
*.au3;*.a3x
All files (*.*)
#NoAutoIt3Execute
APPSKEY
Line %d:
04090000
%u.%u.%u.%u
0.0.0.0
Mddddd
%s (%d) : ==> %s:
UDPSTARTUP
UDPSHUTDOWN
UDPSEND
UDPRECV
UDPOPEN
UDPCLOSESOCKET
UDPBIND
TRAYGETMSG
TCPSTARTUP
TCPSHUTDOWN
TCPSEND
TCPRECV
TCPNAMETOIP
TCPLISTEN
TCPCONNECT
TCPCLOSESOCKET
TCPACCEPT
SHELLEXECUTEWAIT
SHELLEXECUTE
REGENUMKEY
MSGBOX
ISKEYWORD
HTTPSETUSERAGENT
HTTPSETPROXY
HOTKEYSET
GUIREGISTERMSG
GUIGETMSG
GUICTRLSENDMSG
GUICTRLRECVMSG
FTPSETPROXY
\??\%s
GUI_RUNDEFMSG
SendKeyDelay
SendKeyDownDelay
TCPTimeout
AUTOITCALLVARIABLE%d
255.255.255.255
Keyword
AutoIt.Error
Null Object assignment in FOR..IN loop
Incorrect Object type in FOR..IN loop
HOTKEYPRESSED
AUTOITEXE
WINDOWSDIR
3, 3, 8, 1
HKEY_LOCAL_MACHINE
HKEY_CLASSES_ROOT
HKEY_CURRENT_CONFIG
HKEY_CURRENT_USER
HKEY_USERS
%d/d/d
%Documents and Settings%\%current user%\lmggv\KS132676434.com
:%Documents and Settings%\%current user%\lmggv\3841358.AZQ
AutoIt supports the __stdcall (WINAPI) and __cdecl calling conventions. The __stdcall (WINAPI) convention is used by default but __cdecl can be used instead. See the DllCall() documentation for details on changing the calling convention.
Missing operator in expression."Unbalanced brackets in expression.
Error parsing function call.0Incorrect number of parameters in function call.'"ReDim" used without an array variable.>Illegal text at the end of statement (one statement per line).1"If" statement has no matching "EndIf" statement.1"Else" statement with no matching "If" statement.2"EndIf" statement with no matching "If" statement.7Too many "Else" statements for matching "If" statement.3"While" statement has no matching "Wend" statement.4"Wend" statement with no matching "While" statement.%Variable used without being declared.XArray variable has incorrect number of subscripts or subscript dimension range exceeded.)Array variable subscript badly formatted.'Subscript used with non-Array variable.&Too many subscripts used for an array.0Missing subscript dimensions in "Dim" statement.NNo variable given for "Dim", "Local", "Global", "Struct" or "Const" statement.0Expected a "=" operator in assignment statement.*Invalid keyword at the start of this line.
Invalid element in a DllStruct.*Unknown option or bad parameter specified.&Unable to load the internet libraries./"Struct" statement has no matching "EndStruct".HUnable to open file, the maximum number of open files has been exceeded.K"ContinueLoop" statement with no matching "While", "Do" or "For" statement.
Invalid file filter given.*Expected a variable in user function call.1"Do" statement has no matching "Until" statement.2"Until" statement with no matching "Do" statement.#"For" statement is badly formatted.2"Next" statement with no matching "For" statement.N"ExitLoop/ContinueLoop" statements only valid from inside a For/Do/While loop.1"For" statement has no matching "Next" statement.@"Case" statement with no matching "Select"or "Switch" statement.:"EndSelect" statement with no matching "Select" statement.ORecursion level has been exceeded - AutoIt will quit to prevent stack overflow.&Cannot make existing variables static.4Cannot make static variables into regular variables.
3This keyword cannot be used after a "Then" keyword.>"Select" statement is missing "EndSelect" or "Case" statement. "If" statements must have a "Then" keyword. Badly formated Struct statement."Cannot assign values to constants..Cannot make existing variables into constants.9Only Object-type variables allowed in a "With" statement.v"long_ptr", "int_ptr" and "short_ptr" DllCall() types have been deprecated. Use "long*", "int*" and "short*" instead.-Object referenced outside a "With" statement.)Nested "With" statements are not allowed."Variable must be of type "Object".1The requested action with this object has failed.8Variable appears more than once in function declaration.2ReDim array can not be initialized in this manner.1An array variable can not be used in this manner.
Can not redeclare a constant.5Can not redeclare a parameter inside a user function.HCan pass constants by reference only to parameters with "Const" keyword.*Can not initialize a variable with itself.$Incorrect way to use this parameter.:"EndSwitch" statement with no matching "Switch" statement.>"Switch" statement is missing "EndSwitch" or "Case" statement.H"ContinueCase" statement with no matching "Select"or "Switch" statement.
String missing closing quote.!Badly formated variable or macro.*Missing separator character after keyword.
hXXp://VVV.autoitscript.com/autoit3/
AutoIt3.exe
RegSvcs.exe_292:
.text
`.data
.rsrc
MSVBVM60.DLL
bss_server.usrReverseRelay
tmrWebHide
bss_server.Socket
bss_server.usrRelay
ieframe.dll
SHDocVwCtl.WebBrowser
WebBrowser
mswinsck.ocx
MSWinsockLib.Winsock
modLaunchWeb
%Program Files% (x86)\Microsoft Visual Studio\VB98\VB6.OLB
C:\Windows\SysWOW64\ieframe.dll
winmm.dll
user32.dll
advapi32.dll
shell32.dll
kernel32.dll
avicap32.dll
advpack.dll
GetAsyncKeyState
SetWindowsHookExA
UnhookWindowsHookEx
GetKeyboardLayout
GetKeyboardState
GetKeyState
SHFileOperationA
CreatePipe
PSAPI.DLL
GetTcpTable
ExitWindowsEx
EnumWindows
WinInet.dll
DeleteUrlCacheEntryA
urlmon
URLDownloadToFileA
ShellExecuteA
keybd_event
CHAT_ADDMSG
VBA6.DLL
ws2_32.dll
D:\Blackshades Project\bs_net\loginserver\msvbvm60.dll\3
AddMsg
olepro32.dll
GdiplusShutdown
RemotePort
LocalPort
WSOCK32.DLL
RegCloseKey
RegOpenKeyExA
ntdll.dll
C:\Windows\SysWOW64\ieframe.oca
%Program Files% (x86)\Microsoft Visual Studio\VB98\mswinsck.oca
tmrTCP
tmrUDP
UDPSocket
UDPFlood
ole32.dll
crypt32.dll
oleaut32.dll
RegOpenKeyA
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
`txtPassword
imgLoginPressed
imgLogin
RegCreateKeyA
RegDeleteKeyA
RegEnumKeyExA
gdi32.dll
InternetOpenUrlA
FtpGetFileA
FtpPutFileA
FtpSetCurrentDirectoryA
FtpGetCurrentDirectoryA
FtpOpenFileA
FtpGetFileSize
FtpDeleteFileA
FtpCreateDirectoryA
FtpRemoveDirectoryA
FtpRenameFileA
FtpDownload
FtpUpload
FtpGetDirectory
Http_DownloadFile
cmdShowfiles
msvbvm60.dll
?8??8??8??8??8?
txtPassword
2>e%Xdq
uMsg
strMsg
MsgNum
AllMsgs
lngPort
URL_TARGET
Port
Password
WebURL
Returns/Sets the port to be connected to on the remote computer
Returns/Sets the port used on the local computer
Binds socket to specific port and adapter
Occurs after a send operation has completed
*\AD:\Blackshades Project\bs_net\server\server.vbp
2c49f800-c2dd-11cf-9ad6-0080c7e7b78d
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1) Gecko/20090612 Firefox/3.5
{00020404-0000-0000-C000-000000000046}5.5.1
\nir_cmd.bss speak text
\nir_cmd.bss setsysvolume 65535
\nir_cmd.bss mutesysvolume 1
\nir_cmd.bss mutesysvolume 0
\nir_cmd.bss screensaver
\nir_cmd.bss monitor off
\nir_cmd.bss monitor on
PORT
TRANSFERPORT
\rsout.tmp
SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\
Keylog
Wscript.Shell
HKEY_CLASSES_ROOT\HTTP\shell\open\command\
\winlogon.exe
iexplore.exe
hXXp://VVV.facebook.com/?ref=home
hXXp://VVV.facebook.com
ADVAPI32.dll
Windows Firewall/Internet Connection Sharing (ICS)
WebCamCapture
\Vuze\Azureus.exe
\LimeWire\LimeWire.exe
\uTorrent\uTorrent.exe
\uTorrent\uTorrent.exe /HIDE
\BitTorrent\bittorrent.exe
\MSWINSCK.OCX
hXXp://
HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1
\cmd.exe
\data.dat
\steam\steam.exe
nkey
dkey
regsvr32.exe
\pws_mail.bss
\pws_mess.bss
\pws_cdk.bss
\pws_ff.bss
\pws_chro.bss
\nir_cmd.bss
cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "
:*:Enabled:Windows Messanger" /f
winmgmts:{impersonationLevel=Impersonate}!\\.\root\cimv200000000
winmgmts:\\.\root\cimv2
api.ipinfodb.com
Select * from Win32_Keyboard
GET /v2/ip_query.php?key=
&timezone=off HTTP/1.1
Host: api.ipinfodb.com
GET /v2/ip_query_country.php?key=
Portable
winmgmts:\\.\root\SecurityCenter
\wallpaper.bmp
\wallpaper.jpg
WScript.Shell
WinServer 2003, Web Edition
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProductName
__oxFrame.class__
Scripting.FileSystemObject
Autorun.ini
{557CF401-1A04-11D3-9A73-0000F81EF32E}{1D5BE4B5-FA4A-452D-9CDD-5DB35105E7EB}Address family not supported by protocol family.
Operation already in progress.
Operation now in progress.
Socket operation on nonsocket.
Operation not supported.
Protocol family not supported.
Protocol not supported.
Socket type not supported.
Winsock.dll version out of range.
CSocketMaster.SocketExists
CSocketMaster.PostSocket
CSocketMaster.ConnectToIP
CSocketMaster.ResolveIfHostname
CSocketMaster.SendBufferedDataUDP
CSocketMaster.SendBufferedData
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1
$('#jschl_answer').val(application/x-www-form-urlencoded
abe2869f-9b47-4cd9-a358-c22904dba7f7
/stext mess.dat
\mess.dat
/stext mail.dat
\mail.dat
/stext ffpw.dat
\ffpw.dat
Web Site
Password
/stext chro.dat
\chro.dat
Action URL
SOFTWARE\MICROSOFT\Windows NT\CurrentVersion
Windows
SOFTWARE\Classes\Applications\iexplore.exe\shell\open\command
http\shell\open\command
127.0.0.1
\dump.txt
\uTorrent\uTorrent.exe /DIRECTORY
255.255.255.255
finalizarprocessoportas
CONNECT %s:%i HTTP/1.0
SOFTWARE\Classes\http\shell\open\command
Software\Classes\http\shell\open\command
Software\Microsoft\Windows NT\CurrentVersion\SystemRestore
code.is.a.winner
Software\Microsoft\Windows\CurrentVersion\Uninstall\eMule
SOFTWARE\MICROSOFT\Windows NT\CurrentVersion\DigitalProductId
bps1.exe
bhookpl.dll
bnfa.exe
drvloadn.dll
drvloadx.dll
VNCHooks.dll
xr4tdwa.exe
\rspad.dat
shutdown.exe
TCnRawKeyBoard
HuntHTTPDownload
autorun.inf
explorer.exe
hXXps://onlineeast#.bankofamerica.com
winlogon.exe
moz_logins
WEBCAMLIVE
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run
SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
\system32\userinit.exe,
notepad.exe
\system32\userinit.exe
steam.exe
hl.exe
@*\AD:\Blackshades Project\bs_net\server\server.vbp
RegSvcs.exe_292_rwx_00400000_0007A000:
.text
`.data
.rsrc
MSVBVM60.DLL
bss_server.usrReverseRelay
tmrWebHide
bss_server.Socket
bss_server.usrRelay
ieframe.dll
SHDocVwCtl.WebBrowser
WebBrowser
mswinsck.ocx
MSWinsockLib.Winsock
modLaunchWeb
%Program Files% (x86)\Microsoft Visual Studio\VB98\VB6.OLB
C:\Windows\SysWOW64\ieframe.dll
winmm.dll
user32.dll
advapi32.dll
shell32.dll
kernel32.dll
avicap32.dll
advpack.dll
GetAsyncKeyState
SetWindowsHookExA
UnhookWindowsHookEx
GetKeyboardLayout
GetKeyboardState
GetKeyState
SHFileOperationA
CreatePipe
PSAPI.DLL
GetTcpTable
ExitWindowsEx
EnumWindows
WinInet.dll
DeleteUrlCacheEntryA
urlmon
URLDownloadToFileA
ShellExecuteA
keybd_event
CHAT_ADDMSG
VBA6.DLL
ws2_32.dll
D:\Blackshades Project\bs_net\loginserver\msvbvm60.dll\3
AddMsg
olepro32.dll
GdiplusShutdown
RemotePort
LocalPort
WSOCK32.DLL
RegCloseKey
RegOpenKeyExA
ntdll.dll
C:\Windows\SysWOW64\ieframe.oca
%Program Files% (x86)\Microsoft Visual Studio\VB98\mswinsck.oca
tmrTCP
tmrUDP
UDPSocket
UDPFlood
ole32.dll
crypt32.dll
oleaut32.dll
RegOpenKeyA
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
`txtPassword
imgLoginPressed
imgLogin
RegCreateKeyA
RegDeleteKeyA
RegEnumKeyExA
gdi32.dll
InternetOpenUrlA
FtpGetFileA
FtpPutFileA
FtpSetCurrentDirectoryA
FtpGetCurrentDirectoryA
FtpOpenFileA
FtpGetFileSize
FtpDeleteFileA
FtpCreateDirectoryA
FtpRemoveDirectoryA
FtpRenameFileA
FtpDownload
FtpUpload
FtpGetDirectory
Http_DownloadFile
cmdShowfiles
msvbvm60.dll
?8??8??8??8??8?
txtPassword
2>e%Xdq
uMsg
strMsg
MsgNum
AllMsgs
lngPort
URL_TARGET
Port
Password
WebURL
Returns/Sets the port to be connected to on the remote computer
Returns/Sets the port used on the local computer
Binds socket to specific port and adapter
Occurs after a send operation has completed
*\AD:\Blackshades Project\bs_net\server\server.vbp
2c49f800-c2dd-11cf-9ad6-0080c7e7b78d
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1) Gecko/20090612 Firefox/3.5
{00020404-0000-0000-C000-000000000046}5.5.1
\nir_cmd.bss speak text
\nir_cmd.bss setsysvolume 65535
\nir_cmd.bss mutesysvolume 1
\nir_cmd.bss mutesysvolume 0
\nir_cmd.bss screensaver
\nir_cmd.bss monitor off
\nir_cmd.bss monitor on
PORT
TRANSFERPORT
\rsout.tmp
SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\
Keylog
Wscript.Shell
HKEY_CLASSES_ROOT\HTTP\shell\open\command\
\winlogon.exe
iexplore.exe
hXXp://VVV.facebook.com/?ref=home
hXXp://VVV.facebook.com
ADVAPI32.dll
Windows Firewall/Internet Connection Sharing (ICS)
WebCamCapture
\Vuze\Azureus.exe
\LimeWire\LimeWire.exe
\uTorrent\uTorrent.exe
\uTorrent\uTorrent.exe /HIDE
\BitTorrent\bittorrent.exe
\MSWINSCK.OCX
hXXp://
HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1
\cmd.exe
\data.dat
\steam\steam.exe
nkey
dkey
regsvr32.exe
\pws_mail.bss
\pws_mess.bss
\pws_cdk.bss
\pws_ff.bss
\pws_chro.bss
\nir_cmd.bss
cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "
:*:Enabled:Windows Messanger" /f
winmgmts:{impersonationLevel=Impersonate}!\\.\root\cimv200000000
winmgmts:\\.\root\cimv2
api.ipinfodb.com
Select * from Win32_Keyboard
GET /v2/ip_query.php?key=
&timezone=off HTTP/1.1
Host: api.ipinfodb.com
GET /v2/ip_query_country.php?key=
Portable
winmgmts:\\.\root\SecurityCenter
\wallpaper.bmp
\wallpaper.jpg
WScript.Shell
WinServer 2003, Web Edition
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProductName
__oxFrame.class__
Scripting.FileSystemObject
Autorun.ini
{557CF401-1A04-11D3-9A73-0000F81EF32E}{1D5BE4B5-FA4A-452D-9CDD-5DB35105E7EB}Address family not supported by protocol family.
Operation already in progress.
Operation now in progress.
Socket operation on nonsocket.
Operation not supported.
Protocol family not supported.
Protocol not supported.
Socket type not supported.
Winsock.dll version out of range.
CSocketMaster.SocketExists
CSocketMaster.PostSocket
CSocketMaster.ConnectToIP
CSocketMaster.ResolveIfHostname
CSocketMaster.SendBufferedDataUDP
CSocketMaster.SendBufferedData
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1
$('#jschl_answer').val(application/x-www-form-urlencoded
abe2869f-9b47-4cd9-a358-c22904dba7f7
/stext mess.dat
\mess.dat
/stext mail.dat
\mail.dat
/stext ffpw.dat
\ffpw.dat
Web Site
Password
/stext chro.dat
\chro.dat
Action URL
SOFTWARE\MICROSOFT\Windows NT\CurrentVersion
Windows
SOFTWARE\Classes\Applications\iexplore.exe\shell\open\command
http\shell\open\command
127.0.0.1
\dump.txt
\uTorrent\uTorrent.exe /DIRECTORY
255.255.255.255
finalizarprocessoportas
CONNECT %s:%i HTTP/1.0
SOFTWARE\Classes\http\shell\open\command
Software\Classes\http\shell\open\command
Software\Microsoft\Windows NT\CurrentVersion\SystemRestore
code.is.a.winner
Software\Microsoft\Windows\CurrentVersion\Uninstall\eMule
SOFTWARE\MICROSOFT\Windows NT\CurrentVersion\DigitalProductId
bps1.exe
bhookpl.dll
bnfa.exe
drvloadn.dll
drvloadx.dll
VNCHooks.dll
xr4tdwa.exe
\rspad.dat
shutdown.exe
TCnRawKeyBoard
HuntHTTPDownload
autorun.inf
explorer.exe
hXXps://onlineeast#.bankofamerica.com
winlogon.exe
moz_logins
WEBCAMLIVE
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run
SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
\system32\userinit.exe,
notepad.exe
\system32\userinit.exe
steam.exe
hl.exe
@*\AD:\Blackshades Project\bs_net\server\server.vbp
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
WScript.exe:1948
KS132676434.com:1116
%original file name%.exe:772 - Delete the original Zum file.
- Delete or disinfect the following files created/modified by the Zum:
%Documents and Settings%\%current user%\Local Settings\Temp\Tar2.tmp (2712 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab5.tmp (49 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\2BF68F4714092295550497DD56F57004 (408 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\DC2135CED98D8A4D7C0CEE202BB0B810 (649 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (49 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (408 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab1.tmp (54 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar6.tmp (2712 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\5C8DDA36D60247082B142836039F4636 (16 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar4.tmp (2712 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\2BF68F4714092295550497DD56F57004 (18 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\DC2135CED98D8A4D7C0CEE202BB0B810 (172 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\F5A17C00E427F919C4A49EEF5AD0EE53 (196 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\F5A17C00E427F919C4A49EEF5AD0EE53 (522 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab3.tmp (54 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\5C8DDA36D60247082B142836039F4636 (196 bytes)
%Documents and Settings%\%current user%\lmggv\start.vbs (189 bytes)
%Documents and Settings%\%current user%\lmggv\start.cmd (71 bytes)
%Documents and Settings%\%current user%\Start Menu\Programs\Startup\start.lnk (1104 bytes)
%Documents and Settings%\%current user%\lmggv\8543611.vbe (63 bytes)
%Documents and Settings%\%current user%\lmggv\3841358.AZQ (51608 bytes)
%Documents and Settings%\%current user%\lmggv\23203.NSN (3073 bytes)
%Documents and Settings%\%current user%\lmggv\13189.GXX (110 bytes)
%Documents and Settings%\%current user%\lmggv\KS132676434.com (15361 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"lmggv" = "C:\DOCUME~1\"%CurrentUserName%"\lmggv\start.vbs" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Find and delete all copies of the worm's file together with "autorun.inf" scripts on removable drives.
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.