HEUR:Trojan.Win32.Generic (Kaspersky), Gen:Variant.Zusy.107066 (B) (Emsisoft), Gen:Variant.Zusy.107066 (AdAware), Trojan-PSW.Win32.Zbot.6.FD, GenericInjector.YR, BackdoorCaphaw_QKKBAL.YR, TrojanPSWZbot.YR (Lavasoft MAS)Behaviour: Trojan-PSW, Trojan, Backdoor
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Summary
MD5: 647051fb684825194ba8435dd02b52a5
SHA1: 43f200da697f4459bc9f5d075757d00a249f03a5
SHA256: 0b2153670e710a1f9a6892493d55f495c6197b98e48826b8d7af7021a7a30894
SSDeep: 6144:pKSU5EyclVSzSgspPmVI8bSWt8L3GIjvtMjxhyqWHEr:pcfclXgslmqM8L2kvtP
Size: 343040 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: MicrosoftVisualC, NETexecutable, UPolyXv05_v6
Company: no certificate found
Created at: 2014-08-23 12:56:45
Analyzed on: Windows7 SP1 32-bit
Summary: Trojan-PSW. Trojan program intended for stealing users passwords.
Dynamic Analysis
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
WinMail.exe:1720
%original file name%.exe:2920
bamyg.exe:600
The Trojan injects its code into the following process(es):
taskhost.exe:1940
Dwm.exe:2008
Explorer.EXE:2024
conhost.exe:3352
Mutexes
The following mutexes were created/opened:No objects were found.
File activity
The process WinMail.exe:1720 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\WindowsMail.MSMessageStore (46008 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\TarD079.tmp (2712 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Drafts\winmail.fol (560 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\7FA01E3F-00000001.eml (1924 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Backup\temp\WindowsMail.pat (16 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ppcrlui_1720_2 (1281 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Junk E-mail\winmail.fol (592 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Backup\temp\edb00002.log (2 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Sent Items\winmail.fol (592 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\CabD078.tmp (51 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Deleted Items\winmail.fol (608 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\7FA01E3F-00000001.eml:OECustomProperty (260 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Outbox\winmail.fol (560 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\winmail.fol (544 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\tmp.edb (1728 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\edb.log (27096 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\edb.chk (300 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E6024EAC88E6B6165D49FE3C95ADD735 (558 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Backup\temp\WindowsMail.MSMessageStore (99 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E6024EAC88E6B6165D49FE3C95ADD735 (968 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\WindowsMail.pat (400 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\edbtmp.log (3466 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Backup\old\WindowsMail.pat (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\TarD079.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\edb00001.log (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\CabD078.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Backup\old\WindowsMail.MSMessageStore (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\edbtmp.log (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ppcrlui_1720_2.ui (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ppcrlui_1720_2 (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Backup\old\edb00001.log (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Backup\old (0 bytes)
The process %original file name%.exe:2920 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\tmp13faec87.bat (179 bytes)
C:\debug.txt (6090 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Amhe\bamyg.exe (687 bytes)
The process bamyg.exe:600 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\debug.txt (25704 bytes)
Registry activity
The process WinMail.exe:1720 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\IdentityCRL\Dynamic Salt]
"Size" = "330"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKCU\Software\Microsoft\Windows Mail]
"Compact Check Count" = "2"
"Settings Upgraded" = "10"
[HKCU\Software\Classes\Local Settings\MuiCache\30\52C64B7E]
"LanguageList" = "en-US, en"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKCU\Software\Microsoft\Windows Mail\Junk Mail\Block Senders List]
"Version" = "327680"
[HKCU\Identities\{C692FCB0-9162-422E-94A4-4CD072B19CA9}]
"Identity Ordinal" = "1"
[HKCU\Software\Microsoft\Windows Mail]
"LastBackup" = "E1 07 02 00 03 00 16 00 17 00 23 00 17 00 D1 01"
"Running" = "1"
"V7StoreMigDone" = "01 00 00 00"
"StoreMigratedV5" = "1"
[HKCU\Software\Microsoft\Windows Mail\Junk Mail\Safe Senders List]
"Version" = "327680"
[HKCU\Software\Microsoft\Windows Mail\Mail]
"Welcome Message" = "0"
[HKCU\Software\Microsoft\Windows Mail]
"SpoolerDlgPos" = "2C 00 00 00 00 00 00 00 01 00 00 00 FF FF FF FF"
[HKCU\Software\Microsoft\IdentityCRL\Dynamic Salt]
"Value" = "01 00 00 00 D0 8C 9D DF 01 15 D1 11 8C 7A 00 C0"
[HKCU\Identities]
"Identity Ordinal" = "2"
[HKCU\Software\Microsoft\Windows Mail\Mail]
"Secure Safe Attachments" = "1"
"Default_CodePage" = "28591"
[HKCU\Software\Microsoft\WAB]
"NamedPropCount" = "1"
[HKCU\Software\Microsoft\IAM\Accounts]
"ConnectionSettingsMigrated" = "1"
[HKCU\Software\Microsoft\Windows Mail]
"SpoolerTack" = "0"
[HKCU\Software\Microsoft\IAM]
"Default News Account" = "account{CE54EE8F-8454-4E11-A69C-0E6F9BED6C0A}.oeaccount"
"Default LDAP Account" = "account{5F33D8D7-3326-4E0C-969F-F201824EF068}.oeaccount"
[HKCU\Software\Microsoft\Windows Mail]
"lastrun" = "3E 68 10 5A 64 8D D2 01"
[HKCU\Software\Microsoft\Windows Mail\Mail]
"Safe Attachments" = "1"
[HKCU\Software\Microsoft\IAM]
"Server ID" = "2"
[HKCU\Software\Microsoft\WAB]
"NamedProps" = "04 20 06 00 00 00 00 00 C0 00 00 00 00 00 00 46"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\WAB]
"NamedPropCount"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKCU\Identities]
"Changing"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Identities]
"IncomingID"
"OutgoingID"
[HKCU\Software\Microsoft\WAB]
"NamedProps"
Dropped PE files
MD5 | File path |
---|---|
7f8611ca23012901531cf87b536e64a7 | c:\Users\"%CurrentUserName%"\AppData\Roaming\Amhe\bamyg.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
The Trojan installs the following user-mode hooks in WININET.dll:
HttpSendRequestExA
HttpSendRequestA
HttpSendRequestW
HttpSendRequestExW
InternetReadFileExA
InternetQueryDataAvailable
InternetReadFile
HttpQueryInfoA
InternetCloseHandle
The Trojan installs the following user-mode hooks in CRYPT32.dll:
PFXImportCertStore
The Trojan installs the following user-mode hooks in USER32.dll:
SetCursorPos
ReleaseCapture
SetCapture
GetMessagePos
DefDlgProcW
CallWindowProcA
DefMDIChildProcA
DefFrameProcA
GetUpdateRgn
DefFrameProcW
DefMDIChildProcW
DefDlgProcA
GetClipboardData
GetMessageW
TranslateMessage
PeekMessageW
EndPaint
BeginPaint
GetDC
ReleaseDC
DefWindowProcW
GetWindowDC
GetDCEx
CallWindowProcW
PeekMessageA
GetMessageA
RegisterClassExW
RegisterClassW
RegisterClassA
DefWindowProcA
GetUpdateRect
GetCursorPos
GetCapture
RegisterClassExA
OpenInputDesktop
SwitchDesktop
The Trojan installs the following user-mode hooks in WS2_32.dll:
send
WSASend
closesocket
The Trojan installs the following user-mode hooks in kernel32.dll:
GetFileAttributesExW
The Trojan installs the following user-mode hooks in ntdll.dll:
LdrLoadDll
ZwCreateUserProcess
Propagation
Removals
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Scan a system with an anti-rootkit tool.
- Terminate malicious process(es) (How to End a Process With the Task Manager):
WinMail.exe:1720
%original file name%.exe:2920
bamyg.exe:600 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\WindowsMail.MSMessageStore (46008 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\TarD079.tmp (2712 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Drafts\winmail.fol (560 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\7FA01E3F-00000001.eml (1924 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Backup\temp\WindowsMail.pat (16 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ppcrlui_1720_2 (1281 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Junk E-mail\winmail.fol (592 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Backup\temp\edb00002.log (2 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Sent Items\winmail.fol (592 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\CabD078.tmp (51 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Deleted Items\winmail.fol (608 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\7FA01E3F-00000001.eml:OECustomProperty (260 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Outbox\winmail.fol (560 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\winmail.fol (544 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\tmp.edb (1728 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\edb.log (27096 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\edb.chk (300 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E6024EAC88E6B6165D49FE3C95ADD735 (558 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\Backup\temp\WindowsMail.MSMessageStore (99 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E6024EAC88E6B6165D49FE3C95ADD735 (968 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\WindowsMail.pat (400 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows Mail\edbtmp.log (3466 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\tmp13faec87.bat (179 bytes)
C:\debug.txt (6090 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Amhe\bamyg.exe (687 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
Static Analysis
VersionInfo
Company Name: VMware, Inc.
Product Name: VMware Tools
Product Version: 9.6.0 build-1294478
Legal Copyright: Copyright (c) 1998-2013 VMware, Inc.
Legal Trademarks:
Original Filename: storePwd.exe
Internal Name: storePwd
File Version: 9.6.0 build-1294478
File Description: VMware easy install utility
Comments:
Language: Chinese (Simplified, PRC)
Company Name: VMware, Inc.Product Name: VMware ToolsProduct Version: 9.6.0 build-1294478Legal Copyright: Copyright (c) 1998-2013 VMware, Inc.Legal Trademarks: Original Filename: storePwd.exeInternal Name: storePwdFile Version: 9.6.0 build-1294478File Description: VMware easy install utilityComments: Language: Chinese (Simplified, PRC)
PE Sections
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
---|---|---|---|---|---|
.text | 8192 | 185364 | 185856 | 5.41858 | 0148af41266a86a87705c1181a29d766 |
.rsrc | 196608 | 155716 | 156160 | 4.34805 | 30ef3ff02f9139aa38e93fc8792619ff |
.reloc | 360448 | 12 | 512 | 0.070639 | 35cc3f31a2ed0bee44d35e454b0b0b94 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Network Activity
URLs
URL | IP |
---|---|
hxxp://a1363.dscg.akamai.net/pki/crl/products/CodeSignPCA.crl | |
hxxp://clients.l.google.com/ocsp/MEkwRzBFMEMwQTAJBgUrDgMCGgUABBTy4Gr5hYodjXCbSRkjeqm1Gih+ZAQUSt0GFhu89mi1dvWBtrtiGrpagS8CCEAdrg7dKqon | |
hxxp://crl.microsoft.com/pki/crl/products/CodeSignPCA.crl | 212.30.134.166 |
hxxp://clients1.google.com/ocsp/MEkwRzBFMEMwQTAJBgUrDgMCGgUABBTy4Gr5hYodjXCbSRkjeqm1Gih+ZAQUSt0GFhu89mi1dvWBtrtiGrpagS8CCEAdrg7dKqon | 173.194.113.196 |
time.windows.com | 13.79.154.18 |
dns.msftncsi.com | 131.107.255.255 |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET /pki/crl/products/CodeSignPCA.crl HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: crl.microsoft.com
HTTP/1.1 200 OK
Content-Type: application/pkix-crl
Last-Modified: Mon, 16 Apr 2012 23:49:48 GMT
Accept-Ranges: bytes
ETag: "0f6669b2b1ccd1:0"
Server: Microsoft-IIS/8.5
VTag: 438195957300000000
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Content-Length: 558
Cache-Control: max-age=900
Date: Wed, 22 Feb 2017 23:35:29 GMT
Connection: keep-alive
0..*0......0...*.H........0..1.0...U....US1.0...U....Washington1.0...U....Redmond1.0...U....Microsoft Corporation1 0)..U..."Copyright (c) 2000 Microsoft Corp.1#0!..U....Microsoft Code Signing PCA..111110211944Z..420416234935Z.7050...U.#..0...%. K].rT....*.....S.0... .....7.........0...*.H...............&..%PIu@.....\0KF....0..^.h9=.1jT,5.L....Ed ..6.......i.6.xva....oX.^f'....s...!......O...h.1a..Ud);.?....J_...Fu....<v.zx..t..h.0JU%.nk;..B[4.?&Zm^..M.!.'...w.u.\T..Tr..Ch.[.z:....#...T.4Ct.......,...c..}F..U....:..7J...%.#..D6 . ....G..#....T..G;......HTTP/1.1 200 OK..Content-Type: application/pkix-crl..Last-Modified: Mon, 16 Apr 2012 23:49:48 GMT..Accept-Ranges: bytes..ETag: "0f6669b2b1ccd1:0"..Server: Microsoft-IIS/8.5..VTag: 438195957300000000..P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"..X-Powered-By: ASP.NET..Content-Length: 558..Cache-Control: max-age=900..Date: Wed, 22 Feb 2017 23:35:29 GMT..Connection: keep-alive..0..*0......0...*.H........0..1.0...U....US1.0...U....Washington1.0...U....Redmond1.0...U....Microsoft Corporation1 0)..U..."Copyright (c) 2000 Microsoft Corp.1#0!..U....Microsoft Code Signing PCA..111110211944Z..420416234935Z.7050...U.#..0...%. K].rT....*.....S.0... .....7.........0...*.H...............&..%PIu@.....\0KF....0..^.h9=.1jT,5.L....Ed ..6.......i.6.xva....oX.^f'....s...!......O...h.1a..Ud);.?....J_...Fu....<v.zx..t..h.0JU%.nk;..B[4.?&Zm^..M.!.'...w.u.\T..Tr..Ch.[.z:....#...T.4Ct.......,...c..}F..U....:..7J
<<< skipped >>>
GET /ocsp/MEkwRzBFMEMwQTAJBgUrDgMCGgUABBTy4Gr5hYodjXCbSRkjeqm1Gih+ZAQUSt0GFhu89mi1dvWBtrtiGrpagS8CCEAdrg7dKqon HTTP/1.1
Cache-Control: max-age = 345600
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: clients1.google.com
HTTP/1.1 404 Not Found
Date: Wed, 22 Feb 2017 23:36:04 GMT
Content-Type: text/html; charset=UTF-8
Server: ocsp_responder
Content-Length: 1668
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
<!DOCTYPE html>.<html lang=en>. <meta charset=utf-8>. <meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width">. <title>Error 404 (Not Found)!!1</title>. <style>. *{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px}* > body{background:url(//VVV.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//VVV.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png) no-repeat;margin-left:-5px}@media only screen and (min-resolution:192dpi){#logo{background:url(//VVV.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) no-repeat 0% 0%/100% 100%;-moz-border-image:url(//VVV.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) 0}}@media only screen and (-webkit-min-device-pixel-ratio:2){#logo{background:url(//VVV.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) no-repeat;-webkit-background-size:100% 100%}}#logo{display:inline-block;height:54px;width:150px}. </style>. <a href=//VVV.google.com/><span id=logo aria-label=Google></span></a>. <p><b>404.</b> <ins>Tha
<<< skipped >>>
Map
The Trojan connects to the servers at the folowing location(s):
Strings from Dumps
taskhost.exe_1940_rwx_00590000_0002F000:
.text
.text
`.data
`.data
.reloc
.reloc
esbhmm.dvj
esbhmm.dvj
%8;>(.)'&0
%8;>(.)'&0
49;:61Â0.
49;:61Â0.
>#):>)9/9"
>#):>)9/9"
.%3/0-;(
.%3/0-;(
/(=%?2>%!
/(=%?2>%!
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\winapitables.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\winapitables.cpp
PR_OpenTCPSocket
PR_OpenTCPSocket
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\corehook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\corehook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncpaint.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncpaint.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\dynamicconfig.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\dynamicconfig.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\remotescript.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\remotescript.cpp
userExecute
userExecute
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\report.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\report.cpp
initReportFile
initReportFile
hXXp://VVV.google.com/webhp
hXXp://VVV.google.com/webhp
Report::startServerSession
Report::startServerSession
Report::writeData
Report::writeData
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\userhook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\userhook.cpp
gdiplus.dll
gdiplus.dll
GdiplusShutdown
GdiplusShutdown
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\screenshot.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\screenshot.cpp
ole32.dll
ole32.dll
gdi32.dll
gdi32.dll
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\coreinstall.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\coreinstall.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncmouse.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncmouse.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\core.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\core.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\corecontrol.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\corecontrol.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\rfb.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\rfb.cpp
userenv.dll
userenv.dll
del "%s"
del "%s"
if exist "%s" goto d
if exist "%s" goto d
del /F "%s"
del /F "%s"
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1)
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1)
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\wininet.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\wininet.cpp
HTTP/1.1
HTTP/1.1
urlmon.dll
urlmon.dll
cabinet.dll
cabinet.dll
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\wahook.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\wahook.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\binstorage.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\binstorage.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\comlibrary.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\comlibrary.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\nspr4hook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\nspr4hook.cpp
hXXp://
hXXp://
hXXps://
hXXps://
analizeHttpResponse
analizeHttpResponse
HTTP/1.
HTTP/1.
analizeHttpResponseBody
analizeHttpResponseBody
Nspr4Hook::hookerPrOpenTcpSocket
Nspr4Hook::hookerPrOpenTcpSocket
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\backconnectbot.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\backconnectbot.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\coreinject.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\coreinject.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\certstorehook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\certstorehook.cpp
exportStore
exportStore
CertStoreHook::_hookerPfxImportCertStore
CertStoreHook::_hookerPfxImportCertStore
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\httpgrabber.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\httpgrabber.cpp
HttpGrabber::_addUrlMaskToList
HttpGrabber::_addUrlMaskToList
HttpGrabber::analizeRequestData
HttpGrabber::analizeRequestData
HttpGrabber::_executeInjects
HttpGrabber::_executeInjects
HttpGrabber::_createFakeResponse
HttpGrabber::_createFakeResponse
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\wininethook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\wininethook.cpp
onHttpSendRequest
onHttpSendRequest
WininetHook::hookerHttpQueryInfoA
WininetHook::hookerHttpQueryInfoA
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\sockethook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\sockethook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\softwaregrabber.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\softwaregrabber.cpp
enumWindowsMailMessagesAndFolders
enumWindowsMailMessagesAndFolders
SoftwareGrabber::_emailWindowsMail
SoftwareGrabber::_emailWindowsMail
SoftwareGrabber::_emailWindowsAddressBook
SoftwareGrabber::_emailWindowsAddressBook
SoftwareGrabber::_emailWindowsContacts
SoftwareGrabber::_emailWindowsContacts
ftpFlashFxp3Proc
ftpFlashFxp3Proc
ftpTotalCommanderProc
ftpTotalCommanderProc
ftpWsFtpProc
ftpWsFtpProc
ftpFileZillaProc
ftpFileZillaProc
ftpFtpCommanderProc
ftpFtpCommanderProc
ftpSmartFtpProc
ftpSmartFtpProc
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\tcpserver.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\tcpserver.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncserver.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncserver.cpp
SSShxUY
SSShxUY
\u.QPW
\u.QPW
PSSj%S
PSSj%S
GetProcessHeap
GetProcessHeap
KERNEL32.dll
KERNEL32.dll
ExitWindowsEx
ExitWindowsEx
GetKeyboardState
GetKeyboardState
MapVirtualKeyW
MapVirtualKeyW
MsgWaitForMultipleObjects
MsgWaitForMultipleObjects
SetKeyboardState
SetKeyboardState
OpenWindowStationW
OpenWindowStationW
GetProcessWindowStation
GetProcessWindowStation
CreateWindowStationW
CreateWindowStationW
CloseWindowStation
CloseWindowStation
SetProcessWindowStation
SetProcessWindowStation
USER32.dll
USER32.dll
RegCreateKeyExW
RegCreateKeyExW
RegOpenKeyExW
RegOpenKeyExW
RegCloseKey
RegCloseKey
RegEnumKeyExW
RegEnumKeyExW
ADVAPI32.dll
ADVAPI32.dll
PathIsURLW
PathIsURLW
UrlUnescapeA
UrlUnescapeA
SHDeleteKeyW
SHDeleteKeyW
SHLWAPI.dll
SHLWAPI.dll
ShellExecuteW
ShellExecuteW
SHELL32.dll
SHELL32.dll
Secur32.dll
Secur32.dll
SetViewportOrgEx
SetViewportOrgEx
GDI32.dll
GDI32.dll
WS2_32.dll
WS2_32.dll
PFXImportCertStore
PFXImportCertStore
CertDeleteCertificateFromStore
CertDeleteCertificateFromStore
CertOpenSystemStoreW
CertOpenSystemStoreW
CertCloseStore
CertCloseStore
CertEnumCertificatesInStore
CertEnumCertificatesInStore
CertDuplicateCertificateContext
CertDuplicateCertificateContext
PFXExportCertStoreEx
PFXExportCertStoreEx
CRYPT32.dll
CRYPT32.dll
HttpSendRequestExA
HttpSendRequestExA
HttpQueryInfoA
HttpQueryInfoA
HttpSendRequestExW
HttpSendRequestExW
HttpSendRequestW
HttpSendRequestW
HttpSendRequestA
HttpSendRequestA
InternetCrackUrlA
InternetCrackUrlA
HttpOpenRequestA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpAddRequestHeadersA
GetUrlCacheEntryInfoW
GetUrlCacheEntryInfoW
HttpAddRequestHeadersW
HttpAddRequestHeadersW
WININET.dll
WININET.dll
OLEAUT32.dll
OLEAUT32.dll
NETAPI32.dll
NETAPI32.dll
> ?,?2?{?
> ?,?2?{?
5!5-545\5
5!5-545\5
8`9|9>:~:
8`9|9>:~:
Failed to unhook WinApi at index %u
Failed to unhook WinApi at index %u
count != realCount, %u != %u
count != realCount, %u != %u
NULL WinApi founded at index %u
NULL WinApi founded at index %u
Failed to hook WinApi at index %u
Failed to hook WinApi at index %u
nspr4.dll
nspr4.dll
nss3.dll
nss3.dll
Process %u already infected.
Process %u already infected.
Bad context.Eip, current 0xX, needed 0xX
Bad context.Eip, current 0xX, needed 0xX
Loaded, moduleFileName=%s
Loaded, moduleFileName=%s
Hooks installed for nspr4.dll
Hooks installed for nspr4.dll
Post message failed for window class [%s]
Post message failed for window class [%s]
"%S" => "%s".
"%S" => "%s".
PID of new bot is %u.
PID of new bot is %u.
Trying download config "%S".
Trying download config "%S".
Trying download "%S".
Trying download "%S".
normalDelay=%u, errorDelay=%u
normalDelay=%u, errorDelay=%u
commandLine=[%s]
commandLine=[%s]
Executing command "%s".
Executing command "%s".
Command "%s" failed.
Command "%s" failed.
Unknown command "%s".
Unknown command "%s".
Founded script with size %u
Founded script with size %u
reportFile=[%s].
reportFile=[%s].
pSending report.
pSending report.
cFailed, %u.
cFailed, %u.
Started, %u.
Started, %u.
Removed "%s".
Removed "%s".
Founded "%s".
Founded "%s".
Failed to move file "%s" => "%s".
Failed to move file "%s" => "%s".
CFGID_URL_SERVER_0 is empty.
CFGID_URL_SERVER_0 is empty.
Stopped, %u.
Stopped, %u.
url=%S
url=%S
Writed new report: retVal=%u, type=%u, dataSize=%u
Writed new report: retVal=%u, type=%u, dataSize=%u
userInputBufferSize=%u, userInputBuffer=%s
userInputBufferSize=%u, userInputBuffer=%s
Called, format=%u
Called, format=%u
Failed to load gdiplus.dll.
Failed to load gdiplus.dll.
Failed to load ole32.dll.
Failed to load ole32.dll.
Failed to load gdi32.dll.
Failed to load gdi32.dll.
Failed to create folder: %s
Failed to create folder: %s
Failed to create file: %s
Failed to create file: %s
Basic file: %s
Basic file: %s
Creating process for session %u.
Creating process for session %u.
activeSession=%u.
activeSession=%u.
sessionsCount=%u.
sessionsCount=%u.
sessions[%u].State=%u, sessions[%u].SessionId=%u
sessions[%u].State=%u, sessions[%u].SessionId=%u
Current OS guid {X-X-X-XX}.
Current OS guid {X-X-X-XX}.
pes.userPaths.coreFile=[%S], pes.userPaths.reportFile=[%S], pes.userPaths.regKey=[%S], pes.userPaths.regDynamicConfig=[%S], pes.userPaths.regLocalConfig=[%S], pes.userPaths.regLocalSettings=[%S]
pes.userPaths.coreFile=[%S], pes.userPaths.reportFile=[%S], pes.userPaths.regKey=[%S], pes.userPaths.regDynamicConfig=[%S], pes.userPaths.regLocalConfig=[%S], pes.userPaths.regLocalSettings=[%S]
Bad paths coreData.paths.process=%s, coreData.paths.home=%s.
Bad paths coreData.paths.process=%s, coreData.paths.home=%s.
Updating existing bot %u.%u.%u.%u to current version.
Updating existing bot %u.%u.%u.%u to current version.
Updating finished with code %u.
Updating finished with code %u.
Existing bot %u.%u.%u.%u not need update.
Existing bot %u.%u.%u.%u not need update.
startupPath=[%s].
startupPath=[%s].
userenv.dll not founded.
userenv.dll not founded.
Founded user: name=[%s], profileDir=[%s].
Founded user: name=[%s], profileDir=[%s].
Copied to "%s".
Copied to "%s".
Failed to copy itself to statup folder of user "%s".
Failed to copy itself to statup folder of user "%s".
cBad windows version %u.
cBad windows version %u.
scoreData.currentUser.id="0xX", coreData.currentUser.sessionId="%u"
scoreData.currentUser.id="0xX", coreData.currentUser.sessionId="%u"
Rights detected as %s.
Rights detected as %s.
Version: %u.%u.%u.%u
Version: %u.%u.%u.%u
Integrity level: %u
Integrity level: %u
coreData.proccessFlags: 0xX
coreData.proccessFlags: 0xX
Full path: %s
Full path: %s
Command line: %s
Command line: %s
Bot home: %s
Bot home: %s
SID: %s
SID: %s
baseConfig hash=0xX
baseConfig hash=0xX
eFailed coreData.proccessFlags.
eFailed coreData.proccessFlags.
Failed coreData.modules.current.
Failed coreData.modules.current.
Failed coreData.globalHandles.stopEvent.
Failed coreData.globalHandles.stopEvent.
Failed coreData.globalHandles.stopedEvent.
Failed coreData.globalHandles.stopedEvent.
kernel32.dll
kernel32.dll
"%s" %s
"%s" %s
/c "%s"
/c "%s"
debug.txt
debug.txt
C:\debug.txt
C:\debug.txt
[u:u:u] TC=0u, PID=u(0xX), TID=u(0xX), LE=%u(0x%X), F=%S, FL=%S (%u)
[u:u:u] TC=0u, PID=u(0xX), TID=u(0xX), LE=%u(0x%X), F=%S, FL=%S (%u)
{8EEEA37C-5CEF-11DD-9810-2A4256D89593}
{8EEEA37C-5CEF-11DD-9810-2A4256D89593}
EXCEPTION: Code=0xX
EXCEPTION: Code=0xX
Flags=0xX
Flags=0xX
pstrURI=%S
pstrURI=%S
Bad opcode detected at offset %u for function 0x%p
Bad opcode detected at offset %u for function 0x%p
Very long opcode detected at offset %u for function 0x%p
Very long opcode detected at offset %u for function 0x%p
Relative JMP/CALL(X) detected.
Relative JMP/CALL(X) detected.
%sx.%s
%sx.%s
%sx
%sx
(1)Failed to read "%s", position %I64u, size %I64u
(1)Failed to read "%s", position %I64u, size %I64u
(2)Failed to read file "%s", position %I64u, size %I64u, readed=%u
(2)Failed to read file "%s", position %I64u, size %I64u, readed=%u
(2)File corrupted "%s", position %I64u, size %I64u, newOffset=%I64u
(2)File corrupted "%s", position %I64u, size %I64u, newOffset=%I64u
(2)Failed to change pointer in file "%s", position %I64u, size %I64u, sh.size=%u
(2)Failed to change pointer in file "%s", position %I64u, size %I64u, sh.size=%u
CoCreateInstance failed, result=0xX.
CoCreateInstance failed, result=0xX.
path=[%s].
path=[%s].
.Bad HTTP-version: header=%S, headerSize=%u
.Bad HTTP-version: header=%S, headerSize=%u
Bad Transfer-Encoding header: header=%S, headerSize=%u
Bad Transfer-Encoding header: header=%S, headerSize=%u
Bad Content-Length header: header=%S, headerSize=%u
Bad Content-Length header: header=%S, headerSize=%u
HRIF_DEFINED_LENGTH, curSize=%u, info->contentLength=%u.
HRIF_DEFINED_LENGTH, curSize=%u, info->contentLength=%u.
HRIF_DEFINED_CHUNKED, curSize=%u.
HRIF_DEFINED_CHUNKED, curSize=%u.
HRIF_DEFINED_CLOSE, curSize=%u.
HRIF_DEFINED_CLOSE, curSize=%u.
info->contentEndOffset=%u.
info->contentEndOffset=%u.
Connection 0x%p removed from table, current connectionsCount=%u.
Connection 0x%p removed from table, current connectionsCount=%u.
Pending data detected, nc->pendingResponse.size=%u, nc->pendingResponse.pos=%u, size=%u
Pending data detected, nc->pendingResponse.size=%u, nc->pendingResponse.pos=%u, size=%u
nc->responseSize=%u
nc->responseSize=%u
Analize successed, contentSize=%u.
Analize successed, contentSize=%u.
Injects accepted, contentSize=%u.
Injects accepted, contentSize=%u.
Response postfix detected, size=%u
Response postfix detected, size=%u
Pending data detected, nc->pendingRequest.size=%u, nc->pendingRequest.pos=%u, size=%u
Pending data detected, nc->pendingRequest.size=%u, nc->pendingRequest.pos=%u, size=%u
All pending data sended, nc->pendingRequest.realSize=%u.
All pending data sended, nc->pendingRequest.realSize=%u.
Not all pending data sended, nc->pendingRequest.pos=%u, nc->pendingRequest.realSize=%u.
Not all pending data sended, nc->pendingRequest.pos=%u, nc->pendingRequest.realSize=%u.
Bytes to skip detected, nc->writeBytesToSkip=%u.
Bytes to skip detected, nc->writeBytesToSkip=%u.
writeBytesToSkip=%u.
writeBytesToSkip=%u.
Protocol error detected, fd=0x%p, count=%i, writeBytesToSkip=%u.
Protocol error detected, fd=0x%p, count=%i, writeBytesToSkip=%u.
New request detected, fillRequestData()=%u.
New request detected, fillRequestData()=%u.
Request changed, newRequestSize=%u, nc->pendingRequest.realSize=%u.
Request changed, newRequestSize=%u, nc->pendingRequest.realSize=%u.
Failed to connect to local IPv4 port %u.
Failed to connect to local IPv4 port %u.
Global\XXX
Global\XXX
mutexName=[%s]
mutexName=[%s]
newImage=0x%p, thread=0xX
newImage=0x%p, thread=0xX
Failed to wait for thread end, newImage=0x%p, thread=0xX
Failed to wait for thread end, newImage=0x%p, thread=0xX
Failed to create remote thread in process with id=%u.
Failed to create remote thread in process with id=%u.
Failed to alloc code in process with id=%u.
Failed to alloc code in process with id=%u.
Failed to open process with id=%u.
Failed to open process with id=%u.
pe.th32ProcessID=%u
pe.th32ProcessID=%u
Exporting %s
Exporting %s
eClearing %s
eClearing %s
Called, data->cbData=%u, password=%s, flags=0xX
Called, data->cbData=%u, password=%s, flags=0xX
Inject for [%S] is blacklisted.
Inject for [%S] is blacklisted.
Inject [%s] alredy executed today.
Inject [%s] alredy executed today.
requestData->url=[%S] matched [%S].
requestData->url=[%S] matched [%S].
Unknown inject detected, curInject->flags=0xX!
Unknown inject detected, curInject->flags=0xX!
requestData->handle=[0x%p], requestData->url=[%S], requestData->referer=[%S], requestData->contentType=[%S], requestData->verb=[%u], requestData->postDataSize=[%u].
requestData->handle=[0x%p], requestData->url=[%S], requestData->referer=[%S], requestData->contentType=[%S], requestData->verb=[%u], requestData->postDataSize=[%u].
Detected blocking url [%S] for current url.
Detected blocking url [%S] for current url.
requestData->url=[%S] matched [%S] for filter type %u.
requestData->url=[%S] matched [%S] for filter type %u.
Current url blocked.
Current url blocked.
Accepted %u injects for current URL.
Accepted %u injects for current URL.
POST-data replaced [%S].
POST-data replaced [%S].
Wating for blocking url [%S].
Wating for blocking url [%S].
fakeConnect.fakeUrl=[%S].
fakeConnect.fakeUrl=[%S].
Changed local cache urlW="%s", cacheEntry->lpszLocalFileName="%s"
Changed local cache urlW="%s", cacheEntry->lpszLocalFileName="%s"
(connections[connectionIndex].injects != NULL) == true
(connections[connectionIndex].injects != NULL) == true
(connections[connectionIndex].postData != NULL) == true
(connections[connectionIndex].postData != NULL) == true
Called, infoLevel=%u (0xX)
Called, infoLevel=%u (0xX)
USER/PASS, argOffset=%u, dataSize=%u, argSize=%u
USER/PASS, argOffset=%u, dataSize=%u, argSize=%u
argument=%s
argument=%s
protocolType=%u
protocolType=%u
folderProps->szName=[%S].
folderProps->szName=[%S].
path=[%s]
path=[%s]
Failed to load [%s].
Failed to load [%s].
%s failed.
%s failed.
freeResult=0xX
freeResult=0xX
hr=0xX
hr=0xX
cinitialPort=%u.
cinitialPort=%u.
New initialPort=%u.
New initialPort=%u.
SysShadow
SysShadow
WindowStation::_SetThreadDesktopEx() failed.
WindowStation::_SetThreadDesktopEx() failed.
Root process created, pid=%u.
Root process created, pid=%u.
Global\{B33A7606-CF82-B0B7-8B9E-85EEC04AAB2B}
Global\{B33A7606-CF82-B0B7-8B9E-85EEC04AAB2B}
C:\Users\"%CurrentUserName%"\AppData\Roaming\Ihquo\yrpuu.yxx
C:\Users\"%CurrentUserName%"\AppData\Roaming\Ihquo\yrpuu.yxx
C:\Users\"%CurrentUserName%"\AppData\Roaming\Ihquo
C:\Users\"%CurrentUserName%"\AppData\Roaming\Ihquo
yrpuu.yxx
yrpuu.yxx
C:\Users\"%CurrentUserName%"\AppData\Roaming
C:\Users\"%CurrentUserName%"\AppData\Roaming
{2541C423-7DA7-26CC-8B9E-85EEC04AAB2B}
{2541C423-7DA7-26CC-8B9E-85EEC04AAB2B}
Dwm.exe_2008_rwx_004C0000_0002F000:
.text
.text
`.data
`.data
.reloc
.reloc
esbhmm.dvj
esbhmm.dvj
%8;>(.)'&0
%8;>(.)'&0
49;:61Â0.
49;:61Â0.
>#):>)9/9"
>#):>)9/9"
.%3/0-;(
.%3/0-;(
/(=%?2>%!
/(=%?2>%!
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\winapitables.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\winapitables.cpp
PR_OpenTCPSocket
PR_OpenTCPSocket
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\corehook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\corehook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncpaint.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncpaint.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\dynamicconfig.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\dynamicconfig.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\remotescript.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\remotescript.cpp
userExecute
userExecute
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\report.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\report.cpp
initReportFile
initReportFile
hXXp://VVV.google.com/webhp
hXXp://VVV.google.com/webhp
Report::startServerSession
Report::startServerSession
Report::writeData
Report::writeData
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\userhook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\userhook.cpp
gdiplus.dll
gdiplus.dll
GdiplusShutdown
GdiplusShutdown
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\screenshot.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\screenshot.cpp
ole32.dll
ole32.dll
gdi32.dll
gdi32.dll
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\coreinstall.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\coreinstall.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncmouse.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncmouse.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\core.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\core.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\corecontrol.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\corecontrol.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\rfb.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\rfb.cpp
userenv.dll
userenv.dll
del "%s"
del "%s"
if exist "%s" goto d
if exist "%s" goto d
del /F "%s"
del /F "%s"
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1)
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1)
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\wininet.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\wininet.cpp
HTTP/1.1
HTTP/1.1
urlmon.dll
urlmon.dll
cabinet.dll
cabinet.dll
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\wahook.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\wahook.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\binstorage.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\binstorage.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\comlibrary.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\comlibrary.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\nspr4hook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\nspr4hook.cpp
hXXp://
hXXp://
hXXps://
hXXps://
analizeHttpResponse
analizeHttpResponse
HTTP/1.
HTTP/1.
analizeHttpResponseBody
analizeHttpResponseBody
Nspr4Hook::hookerPrOpenTcpSocket
Nspr4Hook::hookerPrOpenTcpSocket
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\backconnectbot.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\backconnectbot.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\coreinject.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\coreinject.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\certstorehook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\certstorehook.cpp
exportStore
exportStore
CertStoreHook::_hookerPfxImportCertStore
CertStoreHook::_hookerPfxImportCertStore
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\httpgrabber.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\httpgrabber.cpp
HttpGrabber::_addUrlMaskToList
HttpGrabber::_addUrlMaskToList
HttpGrabber::analizeRequestData
HttpGrabber::analizeRequestData
HttpGrabber::_executeInjects
HttpGrabber::_executeInjects
HttpGrabber::_createFakeResponse
HttpGrabber::_createFakeResponse
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\wininethook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\wininethook.cpp
onHttpSendRequest
onHttpSendRequest
WininetHook::hookerHttpQueryInfoA
WininetHook::hookerHttpQueryInfoA
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\sockethook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\sockethook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\softwaregrabber.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\softwaregrabber.cpp
enumWindowsMailMessagesAndFolders
enumWindowsMailMessagesAndFolders
SoftwareGrabber::_emailWindowsMail
SoftwareGrabber::_emailWindowsMail
SoftwareGrabber::_emailWindowsAddressBook
SoftwareGrabber::_emailWindowsAddressBook
SoftwareGrabber::_emailWindowsContacts
SoftwareGrabber::_emailWindowsContacts
ftpFlashFxp3Proc
ftpFlashFxp3Proc
ftpTotalCommanderProc
ftpTotalCommanderProc
ftpWsFtpProc
ftpWsFtpProc
ftpFileZillaProc
ftpFileZillaProc
ftpFtpCommanderProc
ftpFtpCommanderProc
ftpSmartFtpProc
ftpSmartFtpProc
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\tcpserver.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\tcpserver.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncserver.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncserver.cpp
SSShxUL
SSShxUL
\u.QPW
\u.QPW
PSSj%S
PSSj%S
GetProcessHeap
GetProcessHeap
KERNEL32.dll
KERNEL32.dll
ExitWindowsEx
ExitWindowsEx
GetKeyboardState
GetKeyboardState
MapVirtualKeyW
MapVirtualKeyW
MsgWaitForMultipleObjects
MsgWaitForMultipleObjects
SetKeyboardState
SetKeyboardState
OpenWindowStationW
OpenWindowStationW
GetProcessWindowStation
GetProcessWindowStation
CreateWindowStationW
CreateWindowStationW
CloseWindowStation
CloseWindowStation
SetProcessWindowStation
SetProcessWindowStation
USER32.dll
USER32.dll
RegCreateKeyExW
RegCreateKeyExW
RegOpenKeyExW
RegOpenKeyExW
RegCloseKey
RegCloseKey
RegEnumKeyExW
RegEnumKeyExW
ADVAPI32.dll
ADVAPI32.dll
PathIsURLW
PathIsURLW
UrlUnescapeA
UrlUnescapeA
SHDeleteKeyW
SHDeleteKeyW
SHLWAPI.dll
SHLWAPI.dll
ShellExecuteW
ShellExecuteW
SHELL32.dll
SHELL32.dll
Secur32.dll
Secur32.dll
SetViewportOrgEx
SetViewportOrgEx
GDI32.dll
GDI32.dll
WS2_32.dll
WS2_32.dll
PFXImportCertStore
PFXImportCertStore
CertDeleteCertificateFromStore
CertDeleteCertificateFromStore
CertOpenSystemStoreW
CertOpenSystemStoreW
CertCloseStore
CertCloseStore
CertEnumCertificatesInStore
CertEnumCertificatesInStore
CertDuplicateCertificateContext
CertDuplicateCertificateContext
PFXExportCertStoreEx
PFXExportCertStoreEx
CRYPT32.dll
CRYPT32.dll
HttpSendRequestExA
HttpSendRequestExA
HttpQueryInfoA
HttpQueryInfoA
HttpSendRequestExW
HttpSendRequestExW
HttpSendRequestW
HttpSendRequestW
HttpSendRequestA
HttpSendRequestA
InternetCrackUrlA
InternetCrackUrlA
HttpOpenRequestA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpAddRequestHeadersA
GetUrlCacheEntryInfoW
GetUrlCacheEntryInfoW
HttpAddRequestHeadersW
HttpAddRequestHeadersW
WININET.dll
WININET.dll
OLEAUT32.dll
OLEAUT32.dll
NETAPI32.dll
NETAPI32.dll
> ?,?2?{?
> ?,?2?{?
5!5-545\5
5!5-545\5
8`9|9>:~:
8`9|9>:~:
Failed to unhook WinApi at index %u
Failed to unhook WinApi at index %u
count != realCount, %u != %u
count != realCount, %u != %u
NULL WinApi founded at index %u
NULL WinApi founded at index %u
Failed to hook WinApi at index %u
Failed to hook WinApi at index %u
nspr4.dll
nspr4.dll
nss3.dll
nss3.dll
Process %u already infected.
Process %u already infected.
Bad context.Eip, current 0xX, needed 0xX
Bad context.Eip, current 0xX, needed 0xX
Loaded, moduleFileName=%s
Loaded, moduleFileName=%s
Hooks installed for nspr4.dll
Hooks installed for nspr4.dll
Post message failed for window class [%s]
Post message failed for window class [%s]
"%S" => "%s".
"%S" => "%s".
PID of new bot is %u.
PID of new bot is %u.
Trying download config "%S".
Trying download config "%S".
Trying download "%S".
Trying download "%S".
normalDelay=%u, errorDelay=%u
normalDelay=%u, errorDelay=%u
commandLine=[%s]
commandLine=[%s]
Executing command "%s".
Executing command "%s".
Command "%s" failed.
Command "%s" failed.
Unknown command "%s".
Unknown command "%s".
Founded script with size %u
Founded script with size %u
reportFile=[%s].
reportFile=[%s].
pSending report.
pSending report.
cFailed, %u.
cFailed, %u.
Started, %u.
Started, %u.
Removed "%s".
Removed "%s".
Founded "%s".
Founded "%s".
Failed to move file "%s" => "%s".
Failed to move file "%s" => "%s".
CFGID_URL_SERVER_0 is empty.
CFGID_URL_SERVER_0 is empty.
Stopped, %u.
Stopped, %u.
url=%S
url=%S
Writed new report: retVal=%u, type=%u, dataSize=%u
Writed new report: retVal=%u, type=%u, dataSize=%u
userInputBufferSize=%u, userInputBuffer=%s
userInputBufferSize=%u, userInputBuffer=%s
Called, format=%u
Called, format=%u
Failed to load gdiplus.dll.
Failed to load gdiplus.dll.
Failed to load ole32.dll.
Failed to load ole32.dll.
Failed to load gdi32.dll.
Failed to load gdi32.dll.
Failed to create folder: %s
Failed to create folder: %s
Failed to create file: %s
Failed to create file: %s
Basic file: %s
Basic file: %s
Creating process for session %u.
Creating process for session %u.
activeSession=%u.
activeSession=%u.
sessionsCount=%u.
sessionsCount=%u.
sessions[%u].State=%u, sessions[%u].SessionId=%u
sessions[%u].State=%u, sessions[%u].SessionId=%u
Current OS guid {X-X-X-XX}.
Current OS guid {X-X-X-XX}.
pes.userPaths.coreFile=[%S], pes.userPaths.reportFile=[%S], pes.userPaths.regKey=[%S], pes.userPaths.regDynamicConfig=[%S], pes.userPaths.regLocalConfig=[%S], pes.userPaths.regLocalSettings=[%S]
pes.userPaths.coreFile=[%S], pes.userPaths.reportFile=[%S], pes.userPaths.regKey=[%S], pes.userPaths.regDynamicConfig=[%S], pes.userPaths.regLocalConfig=[%S], pes.userPaths.regLocalSettings=[%S]
Bad paths coreData.paths.process=%s, coreData.paths.home=%s.
Bad paths coreData.paths.process=%s, coreData.paths.home=%s.
Updating existing bot %u.%u.%u.%u to current version.
Updating existing bot %u.%u.%u.%u to current version.
Updating finished with code %u.
Updating finished with code %u.
Existing bot %u.%u.%u.%u not need update.
Existing bot %u.%u.%u.%u not need update.
startupPath=[%s].
startupPath=[%s].
userenv.dll not founded.
userenv.dll not founded.
Founded user: name=[%s], profileDir=[%s].
Founded user: name=[%s], profileDir=[%s].
Copied to "%s".
Copied to "%s".
Failed to copy itself to statup folder of user "%s".
Failed to copy itself to statup folder of user "%s".
cBad windows version %u.
cBad windows version %u.
scoreData.currentUser.id="0xX", coreData.currentUser.sessionId="%u"
scoreData.currentUser.id="0xX", coreData.currentUser.sessionId="%u"
Rights detected as %s.
Rights detected as %s.
Version: %u.%u.%u.%u
Version: %u.%u.%u.%u
Integrity level: %u
Integrity level: %u
coreData.proccessFlags: 0xX
coreData.proccessFlags: 0xX
Full path: %s
Full path: %s
Command line: %s
Command line: %s
Bot home: %s
Bot home: %s
SID: %s
SID: %s
baseConfig hash=0xX
baseConfig hash=0xX
eFailed coreData.proccessFlags.
eFailed coreData.proccessFlags.
Failed coreData.modules.current.
Failed coreData.modules.current.
Failed coreData.globalHandles.stopEvent.
Failed coreData.globalHandles.stopEvent.
Failed coreData.globalHandles.stopedEvent.
Failed coreData.globalHandles.stopedEvent.
kernel32.dll
kernel32.dll
"%s" %s
"%s" %s
/c "%s"
/c "%s"
debug.txt
debug.txt
C:\debug.txt
C:\debug.txt
[u:u:u] TC=0u, PID=u(0xX), TID=u(0xX), LE=%u(0x%X), F=%S, FL=%S (%u)
[u:u:u] TC=0u, PID=u(0xX), TID=u(0xX), LE=%u(0x%X), F=%S, FL=%S (%u)
{8EEEA37C-5CEF-11DD-9810-2A4256D89593}
{8EEEA37C-5CEF-11DD-9810-2A4256D89593}
EXCEPTION: Code=0xX
EXCEPTION: Code=0xX
Flags=0xX
Flags=0xX
pstrURI=%S
pstrURI=%S
Bad opcode detected at offset %u for function 0x%p
Bad opcode detected at offset %u for function 0x%p
Very long opcode detected at offset %u for function 0x%p
Very long opcode detected at offset %u for function 0x%p
Relative JMP/CALL(X) detected.
Relative JMP/CALL(X) detected.
%sx.%s
%sx.%s
%sx
%sx
(1)Failed to read "%s", position %I64u, size %I64u
(1)Failed to read "%s", position %I64u, size %I64u
(2)Failed to read file "%s", position %I64u, size %I64u, readed=%u
(2)Failed to read file "%s", position %I64u, size %I64u, readed=%u
(2)File corrupted "%s", position %I64u, size %I64u, newOffset=%I64u
(2)File corrupted "%s", position %I64u, size %I64u, newOffset=%I64u
(2)Failed to change pointer in file "%s", position %I64u, size %I64u, sh.size=%u
(2)Failed to change pointer in file "%s", position %I64u, size %I64u, sh.size=%u
CoCreateInstance failed, result=0xX.
CoCreateInstance failed, result=0xX.
path=[%s].
path=[%s].
.Bad HTTP-version: header=%S, headerSize=%u
.Bad HTTP-version: header=%S, headerSize=%u
Bad Transfer-Encoding header: header=%S, headerSize=%u
Bad Transfer-Encoding header: header=%S, headerSize=%u
Bad Content-Length header: header=%S, headerSize=%u
Bad Content-Length header: header=%S, headerSize=%u
HRIF_DEFINED_LENGTH, curSize=%u, info->contentLength=%u.
HRIF_DEFINED_LENGTH, curSize=%u, info->contentLength=%u.
HRIF_DEFINED_CHUNKED, curSize=%u.
HRIF_DEFINED_CHUNKED, curSize=%u.
HRIF_DEFINED_CLOSE, curSize=%u.
HRIF_DEFINED_CLOSE, curSize=%u.
info->contentEndOffset=%u.
info->contentEndOffset=%u.
Connection 0x%p removed from table, current connectionsCount=%u.
Connection 0x%p removed from table, current connectionsCount=%u.
Pending data detected, nc->pendingResponse.size=%u, nc->pendingResponse.pos=%u, size=%u
Pending data detected, nc->pendingResponse.size=%u, nc->pendingResponse.pos=%u, size=%u
nc->responseSize=%u
nc->responseSize=%u
Analize successed, contentSize=%u.
Analize successed, contentSize=%u.
Injects accepted, contentSize=%u.
Injects accepted, contentSize=%u.
Response postfix detected, size=%u
Response postfix detected, size=%u
Pending data detected, nc->pendingRequest.size=%u, nc->pendingRequest.pos=%u, size=%u
Pending data detected, nc->pendingRequest.size=%u, nc->pendingRequest.pos=%u, size=%u
All pending data sended, nc->pendingRequest.realSize=%u.
All pending data sended, nc->pendingRequest.realSize=%u.
Not all pending data sended, nc->pendingRequest.pos=%u, nc->pendingRequest.realSize=%u.
Not all pending data sended, nc->pendingRequest.pos=%u, nc->pendingRequest.realSize=%u.
Bytes to skip detected, nc->writeBytesToSkip=%u.
Bytes to skip detected, nc->writeBytesToSkip=%u.
writeBytesToSkip=%u.
writeBytesToSkip=%u.
Protocol error detected, fd=0x%p, count=%i, writeBytesToSkip=%u.
Protocol error detected, fd=0x%p, count=%i, writeBytesToSkip=%u.
New request detected, fillRequestData()=%u.
New request detected, fillRequestData()=%u.
Request changed, newRequestSize=%u, nc->pendingRequest.realSize=%u.
Request changed, newRequestSize=%u, nc->pendingRequest.realSize=%u.
Failed to connect to local IPv4 port %u.
Failed to connect to local IPv4 port %u.
Global\XXX
Global\XXX
mutexName=[%s]
mutexName=[%s]
newImage=0x%p, thread=0xX
newImage=0x%p, thread=0xX
Failed to wait for thread end, newImage=0x%p, thread=0xX
Failed to wait for thread end, newImage=0x%p, thread=0xX
Failed to create remote thread in process with id=%u.
Failed to create remote thread in process with id=%u.
Failed to alloc code in process with id=%u.
Failed to alloc code in process with id=%u.
Failed to open process with id=%u.
Failed to open process with id=%u.
pe.th32ProcessID=%u
pe.th32ProcessID=%u
Exporting %s
Exporting %s
eClearing %s
eClearing %s
Called, data->cbData=%u, password=%s, flags=0xX
Called, data->cbData=%u, password=%s, flags=0xX
Inject for [%S] is blacklisted.
Inject for [%S] is blacklisted.
Inject [%s] alredy executed today.
Inject [%s] alredy executed today.
requestData->url=[%S] matched [%S].
requestData->url=[%S] matched [%S].
Unknown inject detected, curInject->flags=0xX!
Unknown inject detected, curInject->flags=0xX!
requestData->handle=[0x%p], requestData->url=[%S], requestData->referer=[%S], requestData->contentType=[%S], requestData->verb=[%u], requestData->postDataSize=[%u].
requestData->handle=[0x%p], requestData->url=[%S], requestData->referer=[%S], requestData->contentType=[%S], requestData->verb=[%u], requestData->postDataSize=[%u].
Detected blocking url [%S] for current url.
Detected blocking url [%S] for current url.
requestData->url=[%S] matched [%S] for filter type %u.
requestData->url=[%S] matched [%S] for filter type %u.
Current url blocked.
Current url blocked.
Accepted %u injects for current URL.
Accepted %u injects for current URL.
POST-data replaced [%S].
POST-data replaced [%S].
Wating for blocking url [%S].
Wating for blocking url [%S].
fakeConnect.fakeUrl=[%S].
fakeConnect.fakeUrl=[%S].
Changed local cache urlW="%s", cacheEntry->lpszLocalFileName="%s"
Changed local cache urlW="%s", cacheEntry->lpszLocalFileName="%s"
(connections[connectionIndex].injects != NULL) == true
(connections[connectionIndex].injects != NULL) == true
(connections[connectionIndex].postData != NULL) == true
(connections[connectionIndex].postData != NULL) == true
Called, infoLevel=%u (0xX)
Called, infoLevel=%u (0xX)
USER/PASS, argOffset=%u, dataSize=%u, argSize=%u
USER/PASS, argOffset=%u, dataSize=%u, argSize=%u
argument=%s
argument=%s
protocolType=%u
protocolType=%u
folderProps->szName=[%S].
folderProps->szName=[%S].
path=[%s]
path=[%s]
Failed to load [%s].
Failed to load [%s].
%s failed.
%s failed.
freeResult=0xX
freeResult=0xX
hr=0xX
hr=0xX
cinitialPort=%u.
cinitialPort=%u.
New initialPort=%u.
New initialPort=%u.
SysShadow
SysShadow
WindowStation::_SetThreadDesktopEx() failed.
WindowStation::_SetThreadDesktopEx() failed.
Root process created, pid=%u.
Root process created, pid=%u.
Global\{B33A7606-CF82-B0B7-8B9E-85EEC04AAB2B}
Global\{B33A7606-CF82-B0B7-8B9E-85EEC04AAB2B}
:\Users\"%CurrentUserName%"\AppData\Roaming\Ihquo\yrpuu.yxx
:\Users\"%CurrentUserName%"\AppData\Roaming\Ihquo\yrpuu.yxx
C:\Users\"%CurrentUserName%"\AppData\Roaming\Ihquo
C:\Users\"%CurrentUserName%"\AppData\Roaming\Ihquo
yrpuu.yxx
yrpuu.yxx
C:\Users\"%CurrentUserName%"\AppData\Roaming
C:\Users\"%CurrentUserName%"\AppData\Roaming
{2541C423-7DA7-26CC-8B9E-85EEC04AAB2B}
{2541C423-7DA7-26CC-8B9E-85EEC04AAB2B}
Explorer.EXE_2024_rwx_02D60000_0002F000:
.text
.text
`.data
`.data
.reloc
.reloc
esbhmm.dvj
esbhmm.dvj
%8;>(.)'&0
%8;>(.)'&0
49;:61Â0.
49;:61Â0.
>#):>)9/9"
>#):>)9/9"
.%3/0-;(
.%3/0-;(
/(=%?2>%!
/(=%?2>%!
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\winapitables.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\winapitables.cpp
PR_OpenTCPSocket
PR_OpenTCPSocket
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\corehook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\corehook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncpaint.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncpaint.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\dynamicconfig.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\dynamicconfig.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\remotescript.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\remotescript.cpp
userExecute
userExecute
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\report.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\report.cpp
initReportFile
initReportFile
hXXp://VVV.google.com/webhp
hXXp://VVV.google.com/webhp
Report::startServerSession
Report::startServerSession
Report::writeData
Report::writeData
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\userhook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\userhook.cpp
gdiplus.dll
gdiplus.dll
GdiplusShutdown
GdiplusShutdown
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\screenshot.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\screenshot.cpp
ole32.dll
ole32.dll
gdi32.dll
gdi32.dll
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\coreinstall.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\coreinstall.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncmouse.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncmouse.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\core.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\core.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\corecontrol.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\corecontrol.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\rfb.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\rfb.cpp
userenv.dll
userenv.dll
del "%s"
del "%s"
if exist "%s" goto d
if exist "%s" goto d
del /F "%s"
del /F "%s"
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1)
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1)
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\wininet.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\wininet.cpp
HTTP/1.1
HTTP/1.1
urlmon.dll
urlmon.dll
cabinet.dll
cabinet.dll
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\wahook.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\wahook.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\binstorage.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\binstorage.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\comlibrary.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\comlibrary.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\nspr4hook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\nspr4hook.cpp
hXXp://
hXXp://
hXXps://
hXXps://
analizeHttpResponse
analizeHttpResponse
HTTP/1.
HTTP/1.
analizeHttpResponseBody
analizeHttpResponseBody
Nspr4Hook::hookerPrOpenTcpSocket
Nspr4Hook::hookerPrOpenTcpSocket
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\backconnectbot.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\backconnectbot.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\coreinject.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\coreinject.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\certstorehook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\certstorehook.cpp
exportStore
exportStore
CertStoreHook::_hookerPfxImportCertStore
CertStoreHook::_hookerPfxImportCertStore
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\httpgrabber.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\httpgrabber.cpp
HttpGrabber::_addUrlMaskToList
HttpGrabber::_addUrlMaskToList
HttpGrabber::analizeRequestData
HttpGrabber::analizeRequestData
HttpGrabber::_executeInjects
HttpGrabber::_executeInjects
HttpGrabber::_createFakeResponse
HttpGrabber::_createFakeResponse
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\wininethook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\wininethook.cpp
onHttpSendRequest
onHttpSendRequest
WininetHook::hookerHttpQueryInfoA
WininetHook::hookerHttpQueryInfoA
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\sockethook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\sockethook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\softwaregrabber.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\softwaregrabber.cpp
enumWindowsMailMessagesAndFolders
enumWindowsMailMessagesAndFolders
SoftwareGrabber::_emailWindowsMail
SoftwareGrabber::_emailWindowsMail
SoftwareGrabber::_emailWindowsAddressBook
SoftwareGrabber::_emailWindowsAddressBook
SoftwareGrabber::_emailWindowsContacts
SoftwareGrabber::_emailWindowsContacts
ftpFlashFxp3Proc
ftpFlashFxp3Proc
ftpTotalCommanderProc
ftpTotalCommanderProc
ftpWsFtpProc
ftpWsFtpProc
ftpFileZillaProc
ftpFileZillaProc
ftpFtpCommanderProc
ftpFtpCommanderProc
ftpSmartFtpProc
ftpSmartFtpProc
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\tcpserver.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\tcpserver.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncserver.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncserver.cpp
SSShxU
SSShxU
\u.QPW
\u.QPW
PSSj%S
PSSj%S
GetProcessHeap
GetProcessHeap
KERNEL32.dll
KERNEL32.dll
ExitWindowsEx
ExitWindowsEx
GetKeyboardState
GetKeyboardState
MapVirtualKeyW
MapVirtualKeyW
MsgWaitForMultipleObjects
MsgWaitForMultipleObjects
SetKeyboardState
SetKeyboardState
OpenWindowStationW
OpenWindowStationW
GetProcessWindowStation
GetProcessWindowStation
CreateWindowStationW
CreateWindowStationW
CloseWindowStation
CloseWindowStation
SetProcessWindowStation
SetProcessWindowStation
USER32.dll
USER32.dll
RegCreateKeyExW
RegCreateKeyExW
RegOpenKeyExW
RegOpenKeyExW
RegCloseKey
RegCloseKey
RegEnumKeyExW
RegEnumKeyExW
ADVAPI32.dll
ADVAPI32.dll
PathIsURLW
PathIsURLW
UrlUnescapeA
UrlUnescapeA
SHDeleteKeyW
SHDeleteKeyW
SHLWAPI.dll
SHLWAPI.dll
ShellExecuteW
ShellExecuteW
SHELL32.dll
SHELL32.dll
Secur32.dll
Secur32.dll
SetViewportOrgEx
SetViewportOrgEx
GDI32.dll
GDI32.dll
WS2_32.dll
WS2_32.dll
PFXImportCertStore
PFXImportCertStore
CertDeleteCertificateFromStore
CertDeleteCertificateFromStore
CertOpenSystemStoreW
CertOpenSystemStoreW
CertCloseStore
CertCloseStore
CertEnumCertificatesInStore
CertEnumCertificatesInStore
CertDuplicateCertificateContext
CertDuplicateCertificateContext
PFXExportCertStoreEx
PFXExportCertStoreEx
CRYPT32.dll
CRYPT32.dll
HttpSendRequestExA
HttpSendRequestExA
HttpQueryInfoA
HttpQueryInfoA
HttpSendRequestExW
HttpSendRequestExW
HttpSendRequestW
HttpSendRequestW
HttpSendRequestA
HttpSendRequestA
InternetCrackUrlA
InternetCrackUrlA
HttpOpenRequestA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpAddRequestHeadersA
GetUrlCacheEntryInfoW
GetUrlCacheEntryInfoW
HttpAddRequestHeadersW
HttpAddRequestHeadersW
WININET.dll
WININET.dll
OLEAUT32.dll
OLEAUT32.dll
NETAPI32.dll
NETAPI32.dll
> ?,?2?{?
> ?,?2?{?
5!5-545\5
5!5-545\5
8`9|9>:~:
8`9|9>:~:
Failed to unhook WinApi at index %u
Failed to unhook WinApi at index %u
count != realCount, %u != %u
count != realCount, %u != %u
NULL WinApi founded at index %u
NULL WinApi founded at index %u
Failed to hook WinApi at index %u
Failed to hook WinApi at index %u
nspr4.dll
nspr4.dll
nss3.dll
nss3.dll
Process %u already infected.
Process %u already infected.
Bad context.Eip, current 0xX, needed 0xX
Bad context.Eip, current 0xX, needed 0xX
Loaded, moduleFileName=%s
Loaded, moduleFileName=%s
Hooks installed for nspr4.dll
Hooks installed for nspr4.dll
Post message failed for window class [%s]
Post message failed for window class [%s]
"%S" => "%s".
"%S" => "%s".
PID of new bot is %u.
PID of new bot is %u.
Trying download config "%S".
Trying download config "%S".
Trying download "%S".
Trying download "%S".
normalDelay=%u, errorDelay=%u
normalDelay=%u, errorDelay=%u
commandLine=[%s]
commandLine=[%s]
Executing command "%s".
Executing command "%s".
Command "%s" failed.
Command "%s" failed.
Unknown command "%s".
Unknown command "%s".
Founded script with size %u
Founded script with size %u
reportFile=[%s].
reportFile=[%s].
pSending report.
pSending report.
cFailed, %u.
cFailed, %u.
Started, %u.
Started, %u.
Removed "%s".
Removed "%s".
Founded "%s".
Founded "%s".
Failed to move file "%s" => "%s".
Failed to move file "%s" => "%s".
CFGID_URL_SERVER_0 is empty.
CFGID_URL_SERVER_0 is empty.
Stopped, %u.
Stopped, %u.
url=%S
url=%S
Writed new report: retVal=%u, type=%u, dataSize=%u
Writed new report: retVal=%u, type=%u, dataSize=%u
userInputBufferSize=%u, userInputBuffer=%s
userInputBufferSize=%u, userInputBuffer=%s
Called, format=%u
Called, format=%u
Failed to load gdiplus.dll.
Failed to load gdiplus.dll.
Failed to load ole32.dll.
Failed to load ole32.dll.
Failed to load gdi32.dll.
Failed to load gdi32.dll.
Failed to create folder: %s
Failed to create folder: %s
Failed to create file: %s
Failed to create file: %s
Basic file: %s
Basic file: %s
Creating process for session %u.
Creating process for session %u.
activeSession=%u.
activeSession=%u.
sessionsCount=%u.
sessionsCount=%u.
sessions[%u].State=%u, sessions[%u].SessionId=%u
sessions[%u].State=%u, sessions[%u].SessionId=%u
Current OS guid {X-X-X-XX}.
Current OS guid {X-X-X-XX}.
pes.userPaths.coreFile=[%S], pes.userPaths.reportFile=[%S], pes.userPaths.regKey=[%S], pes.userPaths.regDynamicConfig=[%S], pes.userPaths.regLocalConfig=[%S], pes.userPaths.regLocalSettings=[%S]
pes.userPaths.coreFile=[%S], pes.userPaths.reportFile=[%S], pes.userPaths.regKey=[%S], pes.userPaths.regDynamicConfig=[%S], pes.userPaths.regLocalConfig=[%S], pes.userPaths.regLocalSettings=[%S]
Bad paths coreData.paths.process=%s, coreData.paths.home=%s.
Bad paths coreData.paths.process=%s, coreData.paths.home=%s.
Updating existing bot %u.%u.%u.%u to current version.
Updating existing bot %u.%u.%u.%u to current version.
Updating finished with code %u.
Updating finished with code %u.
Existing bot %u.%u.%u.%u not need update.
Existing bot %u.%u.%u.%u not need update.
startupPath=[%s].
startupPath=[%s].
userenv.dll not founded.
userenv.dll not founded.
Founded user: name=[%s], profileDir=[%s].
Founded user: name=[%s], profileDir=[%s].
Copied to "%s".
Copied to "%s".
Failed to copy itself to statup folder of user "%s".
Failed to copy itself to statup folder of user "%s".
cBad windows version %u.
cBad windows version %u.
scoreData.currentUser.id="0xX", coreData.currentUser.sessionId="%u"
scoreData.currentUser.id="0xX", coreData.currentUser.sessionId="%u"
Rights detected as %s.
Rights detected as %s.
Version: %u.%u.%u.%u
Version: %u.%u.%u.%u
Integrity level: %u
Integrity level: %u
coreData.proccessFlags: 0xX
coreData.proccessFlags: 0xX
Full path: %s
Full path: %s
Command line: %s
Command line: %s
Bot home: %s
Bot home: %s
SID: %s
SID: %s
baseConfig hash=0xX
baseConfig hash=0xX
eFailed coreData.proccessFlags.
eFailed coreData.proccessFlags.
Failed coreData.modules.current.
Failed coreData.modules.current.
Failed coreData.globalHandles.stopEvent.
Failed coreData.globalHandles.stopEvent.
Failed coreData.globalHandles.stopedEvent.
Failed coreData.globalHandles.stopedEvent.
kernel32.dll
kernel32.dll
"%s" %s
"%s" %s
/c "%s"
/c "%s"
debug.txt
debug.txt
C:\debug.txt
C:\debug.txt
[u:u:u] TC=0u, PID=u(0xX), TID=u(0xX), LE=%u(0x%X), F=%S, FL=%S (%u)
[u:u:u] TC=0u, PID=u(0xX), TID=u(0xX), LE=%u(0x%X), F=%S, FL=%S (%u)
{8EEEA37C-5CEF-11DD-9810-2A4256D89593}
{8EEEA37C-5CEF-11DD-9810-2A4256D89593}
EXCEPTION: Code=0xX
EXCEPTION: Code=0xX
Flags=0xX
Flags=0xX
pstrURI=%S
pstrURI=%S
Bad opcode detected at offset %u for function 0x%p
Bad opcode detected at offset %u for function 0x%p
Very long opcode detected at offset %u for function 0x%p
Very long opcode detected at offset %u for function 0x%p
Relative JMP/CALL(X) detected.
Relative JMP/CALL(X) detected.
%sx.%s
%sx.%s
%sx
%sx
(1)Failed to read "%s", position %I64u, size %I64u
(1)Failed to read "%s", position %I64u, size %I64u
(2)Failed to read file "%s", position %I64u, size %I64u, readed=%u
(2)Failed to read file "%s", position %I64u, size %I64u, readed=%u
(2)File corrupted "%s", position %I64u, size %I64u, newOffset=%I64u
(2)File corrupted "%s", position %I64u, size %I64u, newOffset=%I64u
(2)Failed to change pointer in file "%s", position %I64u, size %I64u, sh.size=%u
(2)Failed to change pointer in file "%s", position %I64u, size %I64u, sh.size=%u
CoCreateInstance failed, result=0xX.
CoCreateInstance failed, result=0xX.
path=[%s].
path=[%s].
.Bad HTTP-version: header=%S, headerSize=%u
.Bad HTTP-version: header=%S, headerSize=%u
Bad Transfer-Encoding header: header=%S, headerSize=%u
Bad Transfer-Encoding header: header=%S, headerSize=%u
Bad Content-Length header: header=%S, headerSize=%u
Bad Content-Length header: header=%S, headerSize=%u
HRIF_DEFINED_LENGTH, curSize=%u, info->contentLength=%u.
HRIF_DEFINED_LENGTH, curSize=%u, info->contentLength=%u.
HRIF_DEFINED_CHUNKED, curSize=%u.
HRIF_DEFINED_CHUNKED, curSize=%u.
HRIF_DEFINED_CLOSE, curSize=%u.
HRIF_DEFINED_CLOSE, curSize=%u.
info->contentEndOffset=%u.
info->contentEndOffset=%u.
Connection 0x%p removed from table, current connectionsCount=%u.
Connection 0x%p removed from table, current connectionsCount=%u.
Pending data detected, nc->pendingResponse.size=%u, nc->pendingResponse.pos=%u, size=%u
Pending data detected, nc->pendingResponse.size=%u, nc->pendingResponse.pos=%u, size=%u
nc->responseSize=%u
nc->responseSize=%u
Analize successed, contentSize=%u.
Analize successed, contentSize=%u.
Injects accepted, contentSize=%u.
Injects accepted, contentSize=%u.
Response postfix detected, size=%u
Response postfix detected, size=%u
Pending data detected, nc->pendingRequest.size=%u, nc->pendingRequest.pos=%u, size=%u
Pending data detected, nc->pendingRequest.size=%u, nc->pendingRequest.pos=%u, size=%u
All pending data sended, nc->pendingRequest.realSize=%u.
All pending data sended, nc->pendingRequest.realSize=%u.
Not all pending data sended, nc->pendingRequest.pos=%u, nc->pendingRequest.realSize=%u.
Not all pending data sended, nc->pendingRequest.pos=%u, nc->pendingRequest.realSize=%u.
Bytes to skip detected, nc->writeBytesToSkip=%u.
Bytes to skip detected, nc->writeBytesToSkip=%u.
writeBytesToSkip=%u.
writeBytesToSkip=%u.
Protocol error detected, fd=0x%p, count=%i, writeBytesToSkip=%u.
Protocol error detected, fd=0x%p, count=%i, writeBytesToSkip=%u.
New request detected, fillRequestData()=%u.
New request detected, fillRequestData()=%u.
Request changed, newRequestSize=%u, nc->pendingRequest.realSize=%u.
Request changed, newRequestSize=%u, nc->pendingRequest.realSize=%u.
Failed to connect to local IPv4 port %u.
Failed to connect to local IPv4 port %u.
Global\XXX
Global\XXX
mutexName=[%s]
mutexName=[%s]
newImage=0x%p, thread=0xX
newImage=0x%p, thread=0xX
Failed to wait for thread end, newImage=0x%p, thread=0xX
Failed to wait for thread end, newImage=0x%p, thread=0xX
Failed to create remote thread in process with id=%u.
Failed to create remote thread in process with id=%u.
Failed to alloc code in process with id=%u.
Failed to alloc code in process with id=%u.
Failed to open process with id=%u.
Failed to open process with id=%u.
pe.th32ProcessID=%u
pe.th32ProcessID=%u
Exporting %s
Exporting %s
eClearing %s
eClearing %s
Called, data->cbData=%u, password=%s, flags=0xX
Called, data->cbData=%u, password=%s, flags=0xX
Inject for [%S] is blacklisted.
Inject for [%S] is blacklisted.
Inject [%s] alredy executed today.
Inject [%s] alredy executed today.
requestData->url=[%S] matched [%S].
requestData->url=[%S] matched [%S].
Unknown inject detected, curInject->flags=0xX!
Unknown inject detected, curInject->flags=0xX!
requestData->handle=[0x%p], requestData->url=[%S], requestData->referer=[%S], requestData->contentType=[%S], requestData->verb=[%u], requestData->postDataSize=[%u].
requestData->handle=[0x%p], requestData->url=[%S], requestData->referer=[%S], requestData->contentType=[%S], requestData->verb=[%u], requestData->postDataSize=[%u].
Detected blocking url [%S] for current url.
Detected blocking url [%S] for current url.
requestData->url=[%S] matched [%S] for filter type %u.
requestData->url=[%S] matched [%S] for filter type %u.
Current url blocked.
Current url blocked.
Accepted %u injects for current URL.
Accepted %u injects for current URL.
POST-data replaced [%S].
POST-data replaced [%S].
Wating for blocking url [%S].
Wating for blocking url [%S].
fakeConnect.fakeUrl=[%S].
fakeConnect.fakeUrl=[%S].
Changed local cache urlW="%s", cacheEntry->lpszLocalFileName="%s"
Changed local cache urlW="%s", cacheEntry->lpszLocalFileName="%s"
(connections[connectionIndex].injects != NULL) == true
(connections[connectionIndex].injects != NULL) == true
(connections[connectionIndex].postData != NULL) == true
(connections[connectionIndex].postData != NULL) == true
Called, infoLevel=%u (0xX)
Called, infoLevel=%u (0xX)
USER/PASS, argOffset=%u, dataSize=%u, argSize=%u
USER/PASS, argOffset=%u, dataSize=%u, argSize=%u
argument=%s
argument=%s
protocolType=%u
protocolType=%u
folderProps->szName=[%S].
folderProps->szName=[%S].
path=[%s]
path=[%s]
Failed to load [%s].
Failed to load [%s].
%s failed.
%s failed.
freeResult=0xX
freeResult=0xX
hr=0xX
hr=0xX
cinitialPort=%u.
cinitialPort=%u.
New initialPort=%u.
New initialPort=%u.
SysShadow
SysShadow
WindowStation::_SetThreadDesktopEx() failed.
WindowStation::_SetThreadDesktopEx() failed.
Root process created, pid=%u.
Root process created, pid=%u.
Global\{B33A7606-CF82-B0B7-8B9E-85EEC04AAB2B}
Global\{B33A7606-CF82-B0B7-8B9E-85EEC04AAB2B}
C:\Users\"%CurrentUserName%"\AppData\Roaming
C:\Users\"%CurrentUserName%"\AppData\Roaming
{2541C423-7DA7-26CC-8B9E-85EEC04AAB2B}
{2541C423-7DA7-26CC-8B9E-85EEC04AAB2B}
conhost.exe_3352_rwx_00350000_0002F000:
.text
.text
`.data
`.data
.reloc
.reloc
esbhmm.dvj
esbhmm.dvj
%8;>(.)'&0
%8;>(.)'&0
49;:61Â0.
49;:61Â0.
>#):>)9/9"
>#):>)9/9"
.%3/0-;(
.%3/0-;(
/(=%?2>%!
/(=%?2>%!
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\winapitables.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\winapitables.cpp
PR_OpenTCPSocket
PR_OpenTCPSocket
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\corehook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\corehook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncpaint.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncpaint.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\dynamicconfig.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\dynamicconfig.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\remotescript.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\remotescript.cpp
userExecute
userExecute
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\report.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\report.cpp
initReportFile
initReportFile
hXXp://VVV.google.com/webhp
hXXp://VVV.google.com/webhp
Report::startServerSession
Report::startServerSession
Report::writeData
Report::writeData
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\userhook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\userhook.cpp
gdiplus.dll
gdiplus.dll
GdiplusShutdown
GdiplusShutdown
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\screenshot.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\screenshot.cpp
ole32.dll
ole32.dll
gdi32.dll
gdi32.dll
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\coreinstall.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\coreinstall.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncmouse.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncmouse.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\core.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\core.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\corecontrol.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\corecontrol.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\rfb.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\rfb.cpp
userenv.dll
userenv.dll
del "%s"
del "%s"
if exist "%s" goto d
if exist "%s" goto d
del /F "%s"
del /F "%s"
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1)
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1)
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\wininet.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\wininet.cpp
HTTP/1.1
HTTP/1.1
urlmon.dll
urlmon.dll
cabinet.dll
cabinet.dll
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\wahook.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\wahook.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\binstorage.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\binstorage.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\comlibrary.cpp
c:\users\admin\desktop\zeus 2.0.8.9\source\client\..\common\comlibrary.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\nspr4hook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\nspr4hook.cpp
hXXp://
hXXp://
hXXps://
hXXps://
analizeHttpResponse
analizeHttpResponse
HTTP/1.
HTTP/1.
analizeHttpResponseBody
analizeHttpResponseBody
Nspr4Hook::hookerPrOpenTcpSocket
Nspr4Hook::hookerPrOpenTcpSocket
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\backconnectbot.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\backconnectbot.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\coreinject.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\coreinject.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\certstorehook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\certstorehook.cpp
exportStore
exportStore
CertStoreHook::_hookerPfxImportCertStore
CertStoreHook::_hookerPfxImportCertStore
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\httpgrabber.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\httpgrabber.cpp
HttpGrabber::_addUrlMaskToList
HttpGrabber::_addUrlMaskToList
HttpGrabber::analizeRequestData
HttpGrabber::analizeRequestData
HttpGrabber::_executeInjects
HttpGrabber::_executeInjects
HttpGrabber::_createFakeResponse
HttpGrabber::_createFakeResponse
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\wininethook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\wininethook.cpp
onHttpSendRequest
onHttpSendRequest
WininetHook::hookerHttpQueryInfoA
WininetHook::hookerHttpQueryInfoA
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\sockethook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\sockethook.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\softwaregrabber.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\softwaregrabber.cpp
enumWindowsMailMessagesAndFolders
enumWindowsMailMessagesAndFolders
SoftwareGrabber::_emailWindowsMail
SoftwareGrabber::_emailWindowsMail
SoftwareGrabber::_emailWindowsAddressBook
SoftwareGrabber::_emailWindowsAddressBook
SoftwareGrabber::_emailWindowsContacts
SoftwareGrabber::_emailWindowsContacts
ftpFlashFxp3Proc
ftpFlashFxp3Proc
ftpTotalCommanderProc
ftpTotalCommanderProc
ftpWsFtpProc
ftpWsFtpProc
ftpFileZillaProc
ftpFileZillaProc
ftpFtpCommanderProc
ftpFtpCommanderProc
ftpSmartFtpProc
ftpSmartFtpProc
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\tcpserver.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\tcpserver.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncserver.cpp
C:\Users\Admin\Desktop\ZeuS 2.0.8.9\source\client\vnc\vncserver.cpp
SSShxU5
SSShxU5
\u.QPW
\u.QPW
PSSj%S
PSSj%S
GetProcessHeap
GetProcessHeap
KERNEL32.dll
KERNEL32.dll
ExitWindowsEx
ExitWindowsEx
GetKeyboardState
GetKeyboardState
MapVirtualKeyW
MapVirtualKeyW
MsgWaitForMultipleObjects
MsgWaitForMultipleObjects
SetKeyboardState
SetKeyboardState
OpenWindowStationW
OpenWindowStationW
GetProcessWindowStation
GetProcessWindowStation
CreateWindowStationW
CreateWindowStationW
CloseWindowStation
CloseWindowStation
SetProcessWindowStation
SetProcessWindowStation
USER32.dll
USER32.dll
RegCreateKeyExW
RegCreateKeyExW
RegOpenKeyExW
RegOpenKeyExW
RegCloseKey
RegCloseKey
RegEnumKeyExW
RegEnumKeyExW
ADVAPI32.dll
ADVAPI32.dll
PathIsURLW
PathIsURLW
UrlUnescapeA
UrlUnescapeA
SHDeleteKeyW
SHDeleteKeyW
SHLWAPI.dll
SHLWAPI.dll
ShellExecuteW
ShellExecuteW
SHELL32.dll
SHELL32.dll
Secur32.dll
Secur32.dll
SetViewportOrgEx
SetViewportOrgEx
GDI32.dll
GDI32.dll
WS2_32.dll
WS2_32.dll
PFXImportCertStore
PFXImportCertStore
CertDeleteCertificateFromStore
CertDeleteCertificateFromStore
CertOpenSystemStoreW
CertOpenSystemStoreW
CertCloseStore
CertCloseStore
CertEnumCertificatesInStore
CertEnumCertificatesInStore
CertDuplicateCertificateContext
CertDuplicateCertificateContext
PFXExportCertStoreEx
PFXExportCertStoreEx
CRYPT32.dll
CRYPT32.dll
HttpSendRequestExA
HttpSendRequestExA
HttpQueryInfoA
HttpQueryInfoA
HttpSendRequestExW
HttpSendRequestExW
HttpSendRequestW
HttpSendRequestW
HttpSendRequestA
HttpSendRequestA
InternetCrackUrlA
InternetCrackUrlA
HttpOpenRequestA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpAddRequestHeadersA
GetUrlCacheEntryInfoW
GetUrlCacheEntryInfoW
HttpAddRequestHeadersW
HttpAddRequestHeadersW
WININET.dll
WININET.dll
OLEAUT32.dll
OLEAUT32.dll
NETAPI32.dll
NETAPI32.dll
> ?,?2?{?
> ?,?2?{?
5!5-545\5
5!5-545\5
8`9|9>:~:
8`9|9>:~:
Failed to unhook WinApi at index %u
Failed to unhook WinApi at index %u
count != realCount, %u != %u
count != realCount, %u != %u
NULL WinApi founded at index %u
NULL WinApi founded at index %u
Failed to hook WinApi at index %u
Failed to hook WinApi at index %u
nspr4.dll
nspr4.dll
nss3.dll
nss3.dll
Process %u already infected.
Process %u already infected.
Bad context.Eip, current 0xX, needed 0xX
Bad context.Eip, current 0xX, needed 0xX
Loaded, moduleFileName=%s
Loaded, moduleFileName=%s
Hooks installed for nspr4.dll
Hooks installed for nspr4.dll
Post message failed for window class [%s]
Post message failed for window class [%s]
"%S" => "%s".
"%S" => "%s".
PID of new bot is %u.
PID of new bot is %u.
Trying download config "%S".
Trying download config "%S".
Trying download "%S".
Trying download "%S".
normalDelay=%u, errorDelay=%u
normalDelay=%u, errorDelay=%u
commandLine=[%s]
commandLine=[%s]
Executing command "%s".
Executing command "%s".
Command "%s" failed.
Command "%s" failed.
Unknown command "%s".
Unknown command "%s".
Founded script with size %u
Founded script with size %u
reportFile=[%s].
reportFile=[%s].
pSending report.
pSending report.
cFailed, %u.
cFailed, %u.
Started, %u.
Started, %u.
Removed "%s".
Removed "%s".
Founded "%s".
Founded "%s".
Failed to move file "%s" => "%s".
Failed to move file "%s" => "%s".
CFGID_URL_SERVER_0 is empty.
CFGID_URL_SERVER_0 is empty.
Stopped, %u.
Stopped, %u.
url=%S
url=%S
Writed new report: retVal=%u, type=%u, dataSize=%u
Writed new report: retVal=%u, type=%u, dataSize=%u
userInputBufferSize=%u, userInputBuffer=%s
userInputBufferSize=%u, userInputBuffer=%s
Called, format=%u
Called, format=%u
Failed to load gdiplus.dll.
Failed to load gdiplus.dll.
Failed to load ole32.dll.
Failed to load ole32.dll.
Failed to load gdi32.dll.
Failed to load gdi32.dll.
Failed to create folder: %s
Failed to create folder: %s
Failed to create file: %s
Failed to create file: %s
Basic file: %s
Basic file: %s
Creating process for session %u.
Creating process for session %u.
activeSession=%u.
activeSession=%u.
sessionsCount=%u.
sessionsCount=%u.
sessions[%u].State=%u, sessions[%u].SessionId=%u
sessions[%u].State=%u, sessions[%u].SessionId=%u
Current OS guid {X-X-X-XX}.
Current OS guid {X-X-X-XX}.
pes.userPaths.coreFile=[%S], pes.userPaths.reportFile=[%S], pes.userPaths.regKey=[%S], pes.userPaths.regDynamicConfig=[%S], pes.userPaths.regLocalConfig=[%S], pes.userPaths.regLocalSettings=[%S]
pes.userPaths.coreFile=[%S], pes.userPaths.reportFile=[%S], pes.userPaths.regKey=[%S], pes.userPaths.regDynamicConfig=[%S], pes.userPaths.regLocalConfig=[%S], pes.userPaths.regLocalSettings=[%S]
Bad paths coreData.paths.process=%s, coreData.paths.home=%s.
Bad paths coreData.paths.process=%s, coreData.paths.home=%s.
Updating existing bot %u.%u.%u.%u to current version.
Updating existing bot %u.%u.%u.%u to current version.
Updating finished with code %u.
Updating finished with code %u.
Existing bot %u.%u.%u.%u not need update.
Existing bot %u.%u.%u.%u not need update.
startupPath=[%s].
startupPath=[%s].
userenv.dll not founded.
userenv.dll not founded.
Founded user: name=[%s], profileDir=[%s].
Founded user: name=[%s], profileDir=[%s].
Copied to "%s".
Copied to "%s".
Failed to copy itself to statup folder of user "%s".
Failed to copy itself to statup folder of user "%s".
cBad windows version %u.
cBad windows version %u.
scoreData.currentUser.id="0xX", coreData.currentUser.sessionId="%u"
scoreData.currentUser.id="0xX", coreData.currentUser.sessionId="%u"
Rights detected as %s.
Rights detected as %s.
Version: %u.%u.%u.%u
Version: %u.%u.%u.%u
Integrity level: %u
Integrity level: %u
coreData.proccessFlags: 0xX
coreData.proccessFlags: 0xX
Full path: %s
Full path: %s
Command line: %s
Command line: %s
Bot home: %s
Bot home: %s
SID: %s
SID: %s
baseConfig hash=0xX
baseConfig hash=0xX
eFailed coreData.proccessFlags.
eFailed coreData.proccessFlags.
Failed coreData.modules.current.
Failed coreData.modules.current.
Failed coreData.globalHandles.stopEvent.
Failed coreData.globalHandles.stopEvent.
Failed coreData.globalHandles.stopedEvent.
Failed coreData.globalHandles.stopedEvent.
kernel32.dll
kernel32.dll
"%s" %s
"%s" %s
/c "%s"
/c "%s"
debug.txt
debug.txt
C:\debug.txt
C:\debug.txt
[u:u:u] TC=0u, PID=u(0xX), TID=u(0xX), LE=%u(0x%X), F=%S, FL=%S (%u)
[u:u:u] TC=0u, PID=u(0xX), TID=u(0xX), LE=%u(0x%X), F=%S, FL=%S (%u)
{8EEEA37C-5CEF-11DD-9810-2A4256D89593}
{8EEEA37C-5CEF-11DD-9810-2A4256D89593}
EXCEPTION: Code=0xX
EXCEPTION: Code=0xX
Flags=0xX
Flags=0xX
pstrURI=%S
pstrURI=%S
Bad opcode detected at offset %u for function 0x%p
Bad opcode detected at offset %u for function 0x%p
Very long opcode detected at offset %u for function 0x%p
Very long opcode detected at offset %u for function 0x%p
Relative JMP/CALL(X) detected.
Relative JMP/CALL(X) detected.
%sx.%s
%sx.%s
%sx
%sx
(1)Failed to read "%s", position %I64u, size %I64u
(1)Failed to read "%s", position %I64u, size %I64u
(2)Failed to read file "%s", position %I64u, size %I64u, readed=%u
(2)Failed to read file "%s", position %I64u, size %I64u, readed=%u
(2)File corrupted "%s", position %I64u, size %I64u, newOffset=%I64u
(2)File corrupted "%s", position %I64u, size %I64u, newOffset=%I64u
(2)Failed to change pointer in file "%s", position %I64u, size %I64u, sh.size=%u
(2)Failed to change pointer in file "%s", position %I64u, size %I64u, sh.size=%u
CoCreateInstance failed, result=0xX.
CoCreateInstance failed, result=0xX.
path=[%s].
path=[%s].
.Bad HTTP-version: header=%S, headerSize=%u
.Bad HTTP-version: header=%S, headerSize=%u
Bad Transfer-Encoding header: header=%S, headerSize=%u
Bad Transfer-Encoding header: header=%S, headerSize=%u
Bad Content-Length header: header=%S, headerSize=%u
Bad Content-Length header: header=%S, headerSize=%u
HRIF_DEFINED_LENGTH, curSize=%u, info->contentLength=%u.
HRIF_DEFINED_LENGTH, curSize=%u, info->contentLength=%u.
HRIF_DEFINED_CHUNKED, curSize=%u.
HRIF_DEFINED_CHUNKED, curSize=%u.
HRIF_DEFINED_CLOSE, curSize=%u.
HRIF_DEFINED_CLOSE, curSize=%u.
info->contentEndOffset=%u.
info->contentEndOffset=%u.
Connection 0x%p removed from table, current connectionsCount=%u.
Connection 0x%p removed from table, current connectionsCount=%u.
Pending data detected, nc->pendingResponse.size=%u, nc->pendingResponse.pos=%u, size=%u
Pending data detected, nc->pendingResponse.size=%u, nc->pendingResponse.pos=%u, size=%u
nc->responseSize=%u
nc->responseSize=%u
Analize successed, contentSize=%u.
Analize successed, contentSize=%u.
Injects accepted, contentSize=%u.
Injects accepted, contentSize=%u.
Response postfix detected, size=%u
Response postfix detected, size=%u
Pending data detected, nc->pendingRequest.size=%u, nc->pendingRequest.pos=%u, size=%u
Pending data detected, nc->pendingRequest.size=%u, nc->pendingRequest.pos=%u, size=%u
All pending data sended, nc->pendingRequest.realSize=%u.
All pending data sended, nc->pendingRequest.realSize=%u.
Not all pending data sended, nc->pendingRequest.pos=%u, nc->pendingRequest.realSize=%u.
Not all pending data sended, nc->pendingRequest.pos=%u, nc->pendingRequest.realSize=%u.
Bytes to skip detected, nc->writeBytesToSkip=%u.
Bytes to skip detected, nc->writeBytesToSkip=%u.
writeBytesToSkip=%u.
writeBytesToSkip=%u.
Protocol error detected, fd=0x%p, count=%i, writeBytesToSkip=%u.
Protocol error detected, fd=0x%p, count=%i, writeBytesToSkip=%u.
New request detected, fillRequestData()=%u.
New request detected, fillRequestData()=%u.
Request changed, newRequestSize=%u, nc->pendingRequest.realSize=%u.
Request changed, newRequestSize=%u, nc->pendingRequest.realSize=%u.
Failed to connect to local IPv4 port %u.
Failed to connect to local IPv4 port %u.
Global\XXX
Global\XXX
mutexName=[%s]
mutexName=[%s]
newImage=0x%p, thread=0xX
newImage=0x%p, thread=0xX
Failed to wait for thread end, newImage=0x%p, thread=0xX
Failed to wait for thread end, newImage=0x%p, thread=0xX
Failed to create remote thread in process with id=%u.
Failed to create remote thread in process with id=%u.
Failed to alloc code in process with id=%u.
Failed to alloc code in process with id=%u.
Failed to open process with id=%u.
Failed to open process with id=%u.
pe.th32ProcessID=%u
pe.th32ProcessID=%u
Exporting %s
Exporting %s
eClearing %s
eClearing %s
Called, data->cbData=%u, password=%s, flags=0xX
Called, data->cbData=%u, password=%s, flags=0xX
Inject for [%S] is blacklisted.
Inject for [%S] is blacklisted.
Inject [%s] alredy executed today.
Inject [%s] alredy executed today.
requestData->url=[%S] matched [%S].
requestData->url=[%S] matched [%S].
Unknown inject detected, curInject->flags=0xX!
Unknown inject detected, curInject->flags=0xX!
requestData->handle=[0x%p], requestData->url=[%S], requestData->referer=[%S], requestData->contentType=[%S], requestData->verb=[%u], requestData->postDataSize=[%u].
requestData->handle=[0x%p], requestData->url=[%S], requestData->referer=[%S], requestData->contentType=[%S], requestData->verb=[%u], requestData->postDataSize=[%u].
Detected blocking url [%S] for current url.
Detected blocking url [%S] for current url.
requestData->url=[%S] matched [%S] for filter type %u.
requestData->url=[%S] matched [%S] for filter type %u.
Current url blocked.
Current url blocked.
Accepted %u injects for current URL.
Accepted %u injects for current URL.
POST-data replaced [%S].
POST-data replaced [%S].
Wating for blocking url [%S].
Wating for blocking url [%S].
fakeConnect.fakeUrl=[%S].
fakeConnect.fakeUrl=[%S].
Changed local cache urlW="%s", cacheEntry->lpszLocalFileName="%s"
Changed local cache urlW="%s", cacheEntry->lpszLocalFileName="%s"
(connections[connectionIndex].injects != NULL) == true
(connections[connectionIndex].injects != NULL) == true
(connections[connectionIndex].postData != NULL) == true
(connections[connectionIndex].postData != NULL) == true
Called, infoLevel=%u (0xX)
Called, infoLevel=%u (0xX)
USER/PASS, argOffset=%u, dataSize=%u, argSize=%u
USER/PASS, argOffset=%u, dataSize=%u, argSize=%u
argument=%s
argument=%s
protocolType=%u
protocolType=%u
folderProps->szName=[%S].
folderProps->szName=[%S].
path=[%s]
path=[%s]
Failed to load [%s].
Failed to load [%s].
%s failed.
%s failed.
freeResult=0xX
freeResult=0xX
hr=0xX
hr=0xX
cinitialPort=%u.
cinitialPort=%u.
New initialPort=%u.
New initialPort=%u.
SysShadow
SysShadow
WindowStation::_SetThreadDesktopEx() failed.
WindowStation::_SetThreadDesktopEx() failed.
Root process created, pid=%u.
Root process created, pid=%u.
Global\{B33A7606-CF82-B0B7-8B9E-85EEC04AAB2B}
Global\{B33A7606-CF82-B0B7-8B9E-85EEC04AAB2B}
C:\Users\"%CurrentUserName%"\AppData\Roaming
C:\Users\"%CurrentUserName%"\AppData\Roaming
{2541C423-7DA7-26CC-8B9E-85EEC04AAB2B}
{2541C423-7DA7-26CC-8B9E-85EEC04AAB2B}