Trojan.MSIL.Crypt.cajs (Kaspersky), Gen:Heur.MSIL.Krypt.6 (B) (Emsisoft), Gen:Heur.MSIL.Krypt.6 (AdAware), HackTool.Win32.PassView.FD, GenericAutorunWorm.YR, HackToolPassView.YR (Lavasoft MAS)Behaviour: Trojan, Worm, HackTool, WormAutorun
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Summary
MD5: 43e24fc7ce91562150a6d3bd0953e8be
SHA1: bcb032744a58b65628d8548d41e6f2d4a7ef30df
SHA256: b675ebe20fbab23b035e09f1f6c13b96dd9f3a3475b7e0e2f752d825c9626a6f
SSDeep: 12288:pe4vlWtIDRoqxZJ1VfbJQ0HysqGEgZmgpG7lcABNffmEftXPaZKnnEx ikgSFZfz:ppH6wcLHZqmLO56ZLlV2dWb5T
Size: 1436160 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: NETexecutable, UPolyXv05_v6
Company: no certificate found
Created at: 2016-09-04 04:59:58
Analyzed on: WindowsXP SP3 32-bit
Summary: Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Dynamic Analysis
Payload
Behaviour | Description |
---|---|
WormAutorun | A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Trojan's file once a user opens a drive's folder in Windows Explorer. |
Process activity
The Trojan creates the following process(es):
%original file name%.exe:320
vbc.exe:2504
vbc.exe:2184
The Trojan injects its code into the following process(es):
uLlkB.exe:1308
Mutexes
The following mutexes were created/opened:No objects were found.
File activity
The process %original file name%.exe:320 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Templates\uLlkB.exe (1813 bytes)
The process uLlkB.exe:1308 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\Cab3.tmp (54 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\6525274CBC2077D43D7D17A33C868C4F (184 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab5.tmp (49 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\2BF68F4714092295550497DD56F57004 (408 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar6.tmp (2712 bytes)
%Documents and Settings%\%current user%\Application Data\pid.txt (4 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (49 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (408 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab1.tmp (54 bytes)
%Documents and Settings%\%current user%\Application Data\pidloc.txt (49 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar4.tmp (2712 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\2BF68F4714092295550497DD56F57004 (18 bytes)
%System%\wbem\Logs\wbemprox.log (150 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar2.tmp (2712 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\6525274CBC2077D43D7D17A33C868C4F (959 bytes)
%Documents and Settings%\%current user%\Application Data\WindowsUpdate.exe (3361 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\Tar2.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab5.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\holderwb.txt (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab1.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar6.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar4.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\holdermail.txt (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab3.tmp (0 bytes)
The process vbc.exe:2504 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\T1LU35NC\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\NSOSBU9O\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\desktop.ini (159 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\holderwb.txt (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\H3UDJTTT\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\5OTZ3N30\desktop.ini (67 bytes)
Registry activity
The process %original file name%.exe:320 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A4 CF 02 A0 28 3D C6 7D D6 E2 50 80 C8 FD 38 3D"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Templates" = "%Documents and Settings%\%current user%\Templates"
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
The process uLlkB.exe:1308 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy\traceIdentifier]
"Guid" = "5f31090b-d990-4e91-b16d-46121d0255aa"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil\traceIdentifier]
"Guid" = "8aefce96-4618-42ff-a057-3536aa78233e"
[HKLM\System\CurrentControlSet\Services\Eventlog\Application\ESENT]
"EventMessageFile" = "%System%\ESENT.dll"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\System\CurrentControlSet\Services\Eventlog\Application\ESENT]
"CategoryCount" = "16"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy]
"Active" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg]
"Active" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg]
"ControlFlags" = "1"
"LogSessionName" = "stdout"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil]
"Active" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"Hidden" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy]
"LogSessionName" = "stdout"
"ControlFlags" = "1"
[HKLM\SOFTWARE\Microsoft\ESENT\Process\uLlkB\DEBUG]
"Trace Level" = ""
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg\traceIdentifier]
"Guid" = "5f31090b-d990-4e91-b16d-46121d0255aa"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "76 7F 8E 9A A2 AD F2 C4 E2 CD 2D 77 90 7A 2F D6"
[HKLM\System\CurrentControlSet\Services\Eventlog\Application\ESENT]
"CategoryMessageFile" = "%System%\ESENT.dll"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil]
"LogSessionName" = "stdout"
[HKLM\System\CurrentControlSet\Services\Eventlog\Application\ESENT]
"TypesSupported" = "7"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil]
"ControlFlags" = "1"
[HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\07E032E020B72C3F192F0628A2593A19A70F069E]
"Blob" = "04 00 00 00 01 00 00 00 10 00 00 00 D5 E9 81 40"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"Windows Update" = "%Documents and Settings%\%current user%\Application Data\WindowsUpdate.exe"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates]
"07E032E020B72C3F192F0628A2593A19A70F069E"
[HKLM\SOFTWARE\Microsoft\ESENT\Process\uLlkB\DEBUG]
"Trace Level"
The process vbc.exe:2504 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "4F 6B 13 1F 11 CE 6D 00 0C 11 52 FE C4 E9 2B ED"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
The process vbc.exe:2184 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "45 95 99 84 89 C2 C4 A0 61 B4 4E D6 F3 AE 28 58"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
Dropped PE files
MD5 | File path |
---|---|
8026d19fc3989e431e61ed8fa76ebd0f | c:\Documents and Settings\"%CurrentUserName%"\Application Data\WindowsUpdate.exe |
8026d19fc3989e431e61ed8fa76ebd0f | c:\Documents and Settings\"%CurrentUserName%"\Templates\uLlkB.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Trojan's file once a user opens a drive's folder in Windows Explorer.
Removals
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:320
vbc.exe:2504
vbc.exe:2184 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings%\%current user%\Templates\uLlkB.exe (1813 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab3.tmp (54 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\6525274CBC2077D43D7D17A33C868C4F (184 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab5.tmp (49 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\2BF68F4714092295550497DD56F57004 (408 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar6.tmp (2712 bytes)
%Documents and Settings%\%current user%\Application Data\pid.txt (4 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (49 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (408 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab1.tmp (54 bytes)
%Documents and Settings%\%current user%\Application Data\pidloc.txt (49 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar4.tmp (2712 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\2BF68F4714092295550497DD56F57004 (18 bytes)
%System%\wbem\Logs\wbemprox.log (150 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar2.tmp (2712 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\6525274CBC2077D43D7D17A33C868C4F (959 bytes)
%Documents and Settings%\%current user%\Application Data\WindowsUpdate.exe (3361 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\T1LU35NC\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\NSOSBU9O\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\desktop.ini (159 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\holderwb.txt (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\H3UDJTTT\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\5OTZ3N30\desktop.ini (67 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"Windows Update" = "%Documents and Settings%\%current user%\Application Data\WindowsUpdate.exe" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Find and delete all copies of the worm's file together with "autorun.inf" scripts on removable drives.
- Reboot the computer.
Static Analysis
VersionInfo
Company Name:
Product Name:
Product Version: 0.0.0.0
Legal Copyright:
Legal Trademarks:
Original Filename: TEXT.exe
Internal Name: TEXT.exe
File Version: 0.0.0.0
File Description:
Comments:
Language: English (United States)
Company Name: Product Name: Product Version: 0.0.0.0Legal Copyright: Legal Trademarks: Original Filename: TEXT.exeInternal Name: TEXT.exeFile Version: 0.0.0.0File Description: Comments: Language: English (United States)
PE Sections
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
---|---|---|---|---|---|
.text | 8192 | 1434084 | 1434112 | 2.79032 | bb2a69969cddd08010436332bd69dde2 |
.rsrc | 1449984 | 664 | 1024 | 1.4705 | faa615451bf78d374808ce3019fe54a8 |
.reloc | 1458176 | 12 | 512 | 0.056519 | 44b85eecfa78e2b5b6834be12c01350f |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Network Activity
URLs
URL | IP |
---|---|
hxxp://whatismyipaddress.com/ | 184.30.217.129 |
hxxp://repository.certum.pl/ctnca.cer | 213.222.201.214 |
hxxp://fg.download.windowsupdate.com.c.footprint.net/msdownload/update/v3/static/trustedr/en/authrootseq.txt | |
hxxp://fg.download.windowsupdate.com.c.footprint.net/msdownload/update/v3/static/trustedr/en/authrootstl.cab | |
hxxp://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab | 8.253.81.126 |
hxxp://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt | 8.253.81.126 |
smtp.yandex.com | 87.250.250.38 |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET /ctnca.cer HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: repository.certum.pl
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: nginx
Date: Tue, 13 Sep 2016 11:14:29 GMT
Content-Type: text/plain; charset=UTF-8
Content-Length: 959
Connection: close
Last-Modified: Fri, 04 Dec 2009 10:24:27 GMT
ETag: "34223-3bf-832b4cc0"
X-Cached: HIT
Accept-Ranges: bytes
0...0...........D.0...*.H........0~1.0...U....PL1"0 ..U....Unizeto Technologies S.A.1'0%..U....Certum Certification Authority1"0 ..U....Certum Trusted Network CA0...081022120737Z..291231120737Z0~1.0...U....PL1"0 ..U....Unizeto Technologies S.A.1'0%..U....Certum Certification Authority1"0 ..U....Certum Trusted Network CA0.."0...*.H.............0..........}.r.......k.N.n@..m']..[-.Z.Q_..2.a..n...0....iW..9]jdy..Y.<1J8|...K(. _;...Ms...O.V.Z......h.#.Y'..'..nr..0r......tu..*.{.T...C9.U(........8I3.v..9E......Q.|.-..._....-....BwL%..8o.......Y>.`N..(.Iy.K.H./.r.9....4r..@.1.....-.]..P.^..i..3(.P...T.T.PE..I......B0@0...U.......0....0...U.......v....$.........7Fu.0...U...........0...*.H................"..=...b.H..^r.xD......#H..*..U.....'...c....7yA["...A\.p...w.#...lV/.i.....!.P......7.......-E...B..t./......'.G...F.w......1..(t.4.3.&...t.>..v.'..f....A[..V.sp....1A./.-.ZvoN.N..?[."...fX.J....**-...9T.H.v'..-....9......'.5).@.....U..F..4.~.9..8.Q.O,..
GET / HTTP/1.1
Host: whatismyipaddress.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 59
Date: Tue, 13 Sep 2016 11:14:27 GMT
Connection: keep-alive
Access Denied (AK1). Contact support@whatismyipaddress.comHTTP/1.1 200 OK..Content-Type: text/html..Content-Length: 59..Date: Tue, 13 Sep 2016 11:14:27 GMT..Connection: keep-alive..Access Denied (AK1). Contact support@whatismyipaddress.com..
GET /msdownload/update/v3/static/trustedr/en/authrootseq.txt HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: VVV.download.windowsupdate.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
HTTP/1.1 200 OK
Date: Tue, 13 Sep 2016 10:11:04 GMT
Content-Type: text/plain
Content-Length: 18
Connection: keep-alive
Cache-Control: max-age=604800
ETag: "8095d7df9b96d11:0"
Last-Modified: Thu, 14 Apr 2016 22:20:39 GMT
Server: Footprint Distributor V4.11
x-ccc: DE
x-cid: 3
X-Powered-By: ASP.NET,ASP.NET
Expires: Sun, 11 Sep 2016 14:10:36 GMT
MSRegion: EMEA
Age: 3806
Accept-Ranges: bytes
1401D1969BE01E11A6....
GET /msdownload/update/v3/static/trustedr/en/authrootstl.cab HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: VVV.download.windowsupdate.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
HTTP/1.1 200 OK
Date: Tue, 13 Sep 2016 10:11:07 GMT
Content-Type: application/octet-stream
Content-Length: 49640
Connection: keep-alive
Cache-Control: max-age=604800
ETag: "0c730803b97d11:0"
Last-Modified: Fri, 15 Apr 2016 17:23:18 GMT
Server: Microsoft-IIS/7.5
x-ccc: DE
x-cid: 3
X-Powered-By: ASP.NET
MSRegion: EMEA
Expires: Tue, 03 May 2016 21:45:01 GMT
Age: 3803
Accept-Ranges: bytes
MSCF............,...................I..................HaR .authroot.stl.%.u3S8..CK...<T.......4v.e.3h.......l...kICY*7-viS.ZH{i.."QY...H.T$!..L..g......k^.w.s..y?..}....4.......d.4...0....)...0..@.......D. 0Y......#p.&;..,..L....._.....ppSf^.....\x....PSSC........4..Apw..:..*....."(..6..............".3..6#.*9..yx>.w..aX....U..:.*G?..3......wY.Z=G..^...J.......Qt.U.xiD2..o....1f.a.9...&...T..\.X<u.WU/.]=./8. .sK.......(.<.A$H.............5...y......"...\...IP..A(y....]..fc`.r)Y.$..<.V.............'....f..X.Y.<......R...zq.5nfO,..NE.....*/ud.7.=.".3..........%.. ....F.......,.e.3.e..... ..T...=x.BD.........R.0..3D.....W......v<\{...Oj>.$YT)LQ..........{.......s=.vs..........dY].<.v..<..w[.{.Z..qV.............= ......5.5........tm... ...SZ.....e-1e<.rX..K3>..~]{b#..&......b.e......;...?......7...!W......e\..a>!{....t.....r...TV...h....4...........Bx...aBp...............F....kx. V.q....g.?.q\.z.?h>V..ORz.....t...%.{w...4..(.......m.|..X\,./.4w.6?M$.q;q.............x?...Auip.... 8..".4...a}E.98T..*...N...7]p<G.&I.........7....@.Q.#.%.:..TE7....d..b. .E.V...-.=1.........j.)t...Z &.e.o..m..L.s.2.\...j4.d..............4.....9...3...03...-2c)L.."..y.7.|... !O.1.....i:....J.:.P..5...6.W...XP..J..^.....u.v....|..U..-..Q..CF.r ..........`.V~.C...=.=.m...6N.,..OV.Z...d.K.-....".D.8.V,}X.P.D..X"8.....;DD."../x.(M..O........1V6R./.3|I...9,........eh..........k...W.....t.*...K..a.....x.0#.t..F.!...7Vk ........7....X......2.t!...AB..b...1.&..S.`G...1@.f.I."...vl.g.}Rs....y.z}....}.
<<< skipped >>>
Map
The Trojan connects to the servers at the folowing location(s):
Strings from Dumps
uLlkB.exe_1308:
.text
.text
`.rsrc
`.rsrc
@.reloc
@.reloc
lSystem.Resources.ResourceReader, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
lSystem.Resources.ResourceReader, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet
v2.0.50727
v2.0.50727
CMemoryExecute.dll
CMemoryExecute.dll
CMemoryExecute
CMemoryExecute
PAGE_EXECUTE_READWRITE
PAGE_EXECUTE_READWRITE
.ctor
.ctor
System.Reflection
System.Reflection
System.Runtime.InteropServices
System.Runtime.InteropServices
System.Security.Permissions
System.Security.Permissions
System.Diagnostics
System.Diagnostics
System.Runtime.CompilerServices
System.Runtime.CompilerServices
DllImportAttribute
DllImportAttribute
kernel32.dll
kernel32.dll
ntdll.dll
ntdll.dll
System.Security
System.Security
$8fcd4931-91a2-4e18-849b-70de34ab75df
$8fcd4931-91a2-4e18-849b-70de34ab75df
1.0.0.0
1.0.0.0
System.Security.Permissions.SecurityPermissionAttribute, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
System.Security.Permissions.SecurityPermissionAttribute, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdb
C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdb
mscoree.dll
mscoree.dll
`.rdata
`.rdata
@.data
@.data
.rsrc
.rsrc
D$.SPf
D$.SPf
2 34 567
2 34 567
com.apple.Safari
com.apple.Safari
com.apple.WebKit2WebProcess
com.apple.WebKit2WebProcess
SELECT origin_url, action_url, username_element, username_value, password_element, password_value, signon_realm, date_created from logins
SELECT origin_url, action_url, username_element, username_value, password_element, password_value, signon_realm, date_created from logins
"Account","Login Name","Password","Web Site","Comments"
"Account","Login Name","Password","Web Site","Comments"
3.7.5
3.7.5
SQLite format 3
SQLite format 3
CREATE TABLE sqlite_master(
CREATE TABLE sqlite_master(
sql text
sql text
REINDEXEDESCAPEACHECKEYBEFOREIGNOREGEXPLAINSTEADDATABASELECTABLEFTHENDEFERRABLELSEXCEPTRANSACTIONATURALTERAISEXCLUSIVEXISTSAVEPOINTERSECTRIGGEREFERENCESCONSTRAINTOFFSETEMPORARYUNIQUERYATTACHAVINGROUPDATEBEGINNERELEASEBETWEENOTNULLIKECASCADELETECASECOLLATECREATECURRENT_DATEDETACHIMMEDIATEJOINSERTMATCHPLANALYZEPRAGMABORTVALUESVIRTUALIMITWHENWHERENAMEAFTEREPLACEANDEFAULTAUTOINCREMENTCASTCOLUMNCOMMITCONFLICTCROSSCURRENT_TIMESTAMPRIMARYDEFERREDISTINCTDROPFAILFROMFULLGLOBYIFISNULLORDERESTRICTOUTERIGHTROLLBACKROWUNIONUSINGVACUUMVIEWINITIALLY
REINDEXEDESCAPEACHECKEYBEFOREIGNOREGEXPLAINSTEADDATABASELECTABLEFTHENDEFERRABLELSEXCEPTRANSACTIONATURALTERAISEXCLUSIVEXISTSAVEPOINTERSECTRIGGEREFERENCESCONSTRAINTOFFSETEMPORARYUNIQUERYATTACHAVINGROUPDATEBEGINNERELEASEBETWEENOTNULLIKECASCADELETECASECOLLATECREATECURRENT_DATEDETACHIMMEDIATEJOINSERTMATCHPLANALYZEPRAGMABORTVALUESVIRTUALIMITWHENWHERENAMEAFTEREPLACEANDEFAULTAUTOINCREMENTCASTCOLUMNCOMMITCONFLICTCROSSCURRENT_TIMESTAMPRIMARYDEFERREDISTINCTDROPFAILFROMFULLGLOBYIFISNULLORDERESTRICTOUTERIGHTROLLBACKROWUNIONUSINGVACUUMVIEWINITIALLY
SELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_logins
SELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_logins
PK11_GetInternalKeySlot
PK11_GetInternalKeySlot
PK11_CheckUserPassword
PK11_CheckUserPassword
large file support is disabled
large file support is disabled
unknown operation
unknown operation
SQL logic error or missing database
SQL logic error or missing database
foreign_keys
foreign_keys
sqlite_compileoption_get
sqlite_compileoption_get
sqlite_compileoption_used
sqlite_compileoption_used
sqlite_source_id
sqlite_source_id
sqlite_version
sqlite_version
sqlite_attach
sqlite_attach
sqlite_detach
sqlite_detach
sqlite_stat1
sqlite_stat1
sqlite_rename_parent
sqlite_rename_parent
sqlite_rename_trigger
sqlite_rename_trigger
sqlite_rename_table
sqlite_rename_table
%Y-%m-%d %H:%M:%S
%Y-%m-%d %H:%M:%S
%Y-%m-%d
%Y-%m-%d
%H:%M:%S
%H:%M:%S
SQLITE_
SQLITE_
failed to allocate %u bytes of memory
failed to allocate %u bytes of memory
failed memory resize %u to %u bytes
failed memory resize %u to %u bytes
922337203685477580
922337203685477580
API call with %s database connection pointer
API call with %s database connection pointer
%s-shm
%s-shm
%s\etilqs_
%s\etilqs_
OsError 0x%x (%u)
OsError 0x%x (%u)
Recovered %d frames from WAL file %s
Recovered %d frames from WAL file %s
%s-mjX
%s-mjX
foreign key constraint failed
foreign key constraint failed
unable to use function %s in the requested context
unable to use function %s in the requested context
abort at %d in [%s]: %s
abort at %d in [%s]: %s
constraint failed at %d in [%s]
constraint failed at %d in [%s]
cannot open savepoint - SQL statements in progress
cannot open savepoint - SQL statements in progress
no such savepoint: %s
no such savepoint: %s
cannot %s savepoint - SQL statements in progress
cannot %s savepoint - SQL statements in progress
cannot rollback transaction - SQL statements in progress
cannot rollback transaction - SQL statements in progress
cannot commit transaction - SQL statements in progress
cannot commit transaction - SQL statements in progress
sqlite_master
sqlite_master
SELECT name, rootpage, sql FROM '%q'.%s WHERE %s ORDER BY rowid
SELECT name, rootpage, sql FROM '%q'.%s WHERE %s ORDER BY rowid
cannot change %s wal mode from within a transaction
cannot change %s wal mode from within a transaction
statement aborts at %d: [%s] %s
statement aborts at %d: [%s] %s
misuse of aliased aggregate %s
misuse of aliased aggregate %s
%s: %s.%s.%s
%s: %s.%s.%s
%s: %s.%s
%s: %s.%s
%s: %s
%s: %s
%r %s BY term out of range - should be between 1 and %d
%r %s BY term out of range - should be between 1 and %d
too many terms in %s BY clause
too many terms in %s BY clause
Expression tree is too large (maximum depth %d)
Expression tree is too large (maximum depth %d)
variable number must be between ?1 and ?%d
variable number must be between ?1 and ?%d
too many SQL variables
too many SQL variables
too many columns in %s
too many columns in %s
oversized integer: %s%s
oversized integer: %s%s
misuse of aggregate: %s()
misuse of aggregate: %s()
%.*s"%w"%s
%.*s"%w"%s
%s%.*s"%w"
%s%.*s"%w"
%s OR name=%Q
%s OR name=%Q
type='trigger' AND (%s)
type='trigger' AND (%s)
there is already another table or index with this name: %s
there is already another table or index with this name: %s
sqlite_
sqlite_
table %s may not be altered
table %s may not be altered
view %s may not be altered
view %s may not be altered
UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d 18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d 18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
Cannot add a PRIMARY KEY column
Cannot add a PRIMARY KEY column
UPDATE "%w".%s SET sql = substr(sql,1,%d) || ', ' || %Q || substr(sql,%d) WHERE type = 'table' AND name = %Q
UPDATE "%w".%s SET sql = substr(sql,1,%d) || ', ' || %Q || substr(sql,%d) WHERE type = 'table' AND name = %Q
sqlite_altertab_%s
sqlite_altertab_%s
CREATE TABLE %Q.%s(%s)
CREATE TABLE %Q.%s(%s)
DELETE FROM %Q.%s WHERE tbl=%Q
DELETE FROM %Q.%s WHERE tbl=%Q
SELECT tbl, idx, stat FROM %Q.sqlite_stat1
SELECT tbl, idx, stat FROM %Q.sqlite_stat1
invalid name: "%s"
invalid name: "%s"
too many attached databases - max %d
too many attached databases - max %d
database %s is already in use
database %s is already in use
unable to open database: %s
unable to open database: %s
no such database: %s
no such database: %s
cannot detach database %s
cannot detach database %s
database %s is locked
database %s is locked
%s %T cannot reference objects in database %s
%s %T cannot reference objects in database %s
object name reserved for internal use: %s
object name reserved for internal use: %s
there is already an index named %s
there is already an index named %s
too many columns on %s
too many columns on %s
duplicate column name: %s
duplicate column name: %s
default value of column [%s] is not constant
default value of column [%s] is not constant
table "%s" has more than one primary key
table "%s" has more than one primary key
no such collation sequence: %s
no such collation sequence: %s
CREATE %s %.*s
CREATE %s %.*s
UPDATE %Q.%s SET type='%s', name=%Q, tbl_name=%Q, rootpage=#%d, sql=%Q WHERE rowid=#%d
UPDATE %Q.%s SET type='%s', name=%Q, tbl_name=%Q, rootpage=#%d, sql=%Q WHERE rowid=#%d
view %s is circularly defined
view %s is circularly defined
table %s may not be dropped
table %s may not be dropped
use DROP TABLE to delete table %s
use DROP TABLE to delete table %s
use DROP VIEW to delete view %s
use DROP VIEW to delete view %s
DELETE FROM %Q.%s WHERE tbl_name=%Q and type!='trigger'
DELETE FROM %Q.%s WHERE tbl_name=%Q and type!='trigger'
DELETE FROM %Q.sqlite_stat1 WHERE tbl=%Q
DELETE FROM %Q.sqlite_stat1 WHERE tbl=%Q
foreign key on %s should reference only one column of table %T
foreign key on %s should reference only one column of table %T
number of columns in foreign key does not match the number of columns in the referenced table
number of columns in foreign key does not match the number of columns in the referenced table
unknown column "%s" in foreign key definition
unknown column "%s" in foreign key definition
indexed columns are not unique
indexed columns are not unique
table %s may not be indexed
table %s may not be indexed
views may not be indexed
views may not be indexed
virtual tables may not be indexed
virtual tables may not be indexed
there is already a table named %s
there is already a table named %s
index %s already exists
index %s already exists
sqlite_autoindex_%s_%d
sqlite_autoindex_%s_%d
table %s has no column named %s
table %s has no column named %s
CREATE%s INDEX %.*s
CREATE%s INDEX %.*s
INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
no such index: %S
no such index: %S
index associated with UNIQUE or PRIMARY KEY constraint cannot be dropped
index associated with UNIQUE or PRIMARY KEY constraint cannot be dropped
DELETE FROM %Q.%s WHERE name=%Q AND type='index'
DELETE FROM %Q.%s WHERE name=%Q AND type='index'
DELETE FROM %Q.sqlite_stat1 WHERE idx=%Q
DELETE FROM %Q.sqlite_stat1 WHERE idx=%Q
a JOIN clause is required before %s
a JOIN clause is required before %s
unable to identify the object to be reindexed
unable to identify the object to be reindexed
table %s may not be modified
table %s may not be modified
cannot modify %s because it is a view
cannot modify %s because it is a view
foreign key mismatch
foreign key mismatch
table %S has %d columns but %d values were supplied
table %S has %d columns but %d values were supplied
%d values for %d columns
%d values for %d columns
table %S has no column named %s
table %S has no column named %s
%s.%s may not be NULL
%s.%s may not be NULL
PRIMARY KEY must be unique
PRIMARY KEY must be unique
automatic extension loading failed: %s
automatic extension loading failed: %s
foreign_key_list
foreign_key_list
malformed database schema (%s)
malformed database schema (%s)
%s - %s
%s - %s
unsupported file format
unsupported file format
SELECT name, rootpage, sql FROM '%q'.%s ORDER BY rowid
SELECT name, rootpage, sql FROM '%q'.%s ORDER BY rowid
unknown or unsupported join type: %T %T%s%T
unknown or unsupported join type: %T %T%s%T
RIGHT and FULL OUTER JOINs are not currently supported
RIGHT and FULL OUTER JOINs are not currently supported
a NATURAL join may not have an ON or USING clause
a NATURAL join may not have an ON or USING clause
cannot have both ON and USING clauses in the same join
cannot have both ON and USING clauses in the same join
cannot join using column %s - column not present in both tables
cannot join using column %s - column not present in both tables
%s.%s
%s.%s
%s:%d
%s:%d
no such index: %s
no such index: %s
sqlite_subquery_%p_
sqlite_subquery_%p_
no such table: %s
no such table: %s
cannot create %s trigger on view: %S
cannot create %s trigger on view: %S
cannot create INSTEAD OF trigger on table: %S
cannot create INSTEAD OF trigger on table: %S
INSERT INTO %Q.%s VALUES('trigger',%Q,%Q,0,'CREATE TRIGGER %q')
INSERT INTO %Q.%s VALUES('trigger',%Q,%Q,0,'CREATE TRIGGER %q')
no such trigger: %S
no such trigger: %S
no such column: %s
no such column: %s
cannot VACUUM - SQL statements in progress
cannot VACUUM - SQL statements in progress
PRAGMA vacuum_db.synchronous=OFF
PRAGMA vacuum_db.synchronous=OFF
SELECT 'CREATE TABLE vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE type='table' AND name!='sqlite_sequence' AND rootpage>0
SELECT 'CREATE TABLE vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE type='table' AND name!='sqlite_sequence' AND rootpage>0
SELECT 'CREATE INDEX vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE sql LIKE 'CREATE INDEX %'
SELECT 'CREATE INDEX vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE sql LIKE 'CREATE INDEX %'
SELECT 'CREATE UNIQUE INDEX vacuum_db.' || substr(sql,21) FROM sqlite_master WHERE sql LIKE 'CREATE UNIQUE INDEX %'
SELECT 'CREATE UNIQUE INDEX vacuum_db.' || substr(sql,21) FROM sqlite_master WHERE sql LIKE 'CREATE UNIQUE INDEX %'
SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
INSERT INTO vacuum_db.sqlite_master SELECT type, name, tbl_name, rootpage, sql FROM main.sqlite_master WHERE type='view' OR type='trigger' OR (type='table' AND rootpage=0)
INSERT INTO vacuum_db.sqlite_master SELECT type, name, tbl_name, rootpage, sql FROM main.sqlite_master WHERE type='view' OR type='trigger' OR (type='table' AND rootpage=0)
UPDATE %Q.%s SET type='table', name=%Q, tbl_name=%Q, rootpage=0, sql=%Q WHERE rowid=#%d
UPDATE %Q.%s SET type='table', name=%Q, tbl_name=%Q, rootpage=0, sql=%Q WHERE rowid=#%d
vtable constructor failed: %s
vtable constructor failed: %s
vtable constructor did not declare schema: %s
vtable constructor did not declare schema: %s
no such module: %s
no such module: %s
table %s: xBestIndex returned an invalid plan
table %s: xBestIndex returned an invalid plan
at most %d tables in a join
at most %d tables in a join
cannot use index: %s
cannot use index: %s
the INDEXED BY clause is not allowed on UPDATE or DELETE statements within triggers
the INDEXED BY clause is not allowed on UPDATE or DELETE statements within triggers
the NOT INDEXED clause is not allowed on UPDATE or DELETE statements within triggers
the NOT INDEXED clause is not allowed on UPDATE or DELETE statements within triggers
unable to close due to unfinished backup operation
unable to close due to unfinished backup operation
unknown database: %s
unknown database: %s
no such vfs: %s
no such vfs: %s
database corruption at line %d of [%.10s]
database corruption at line %d of [%.10s]
misuse at line %d of [%.10s]
misuse at line %d of [%.10s]
cannot open file at line %d of [%.10s]
cannot open file at line %d of [%.10s]
sqlite3_open
sqlite3_open
sqlite3_prepare
sqlite3_prepare
sqlite3_step
sqlite3_step
sqlite3_column_text
sqlite3_column_text
sqlite3_column_int
sqlite3_column_int
sqlite3_column_int64
sqlite3_column_int64
sqlite3_finalize
sqlite3_finalize
sqlite3_close
sqlite3_close
sqlite3_exec
sqlite3_exec
f:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdb
f:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdb
msvcrt.dll
msvcrt.dll
_wcmdln
_wcmdln
COMCTL32.dll
COMCTL32.dll
VERSION.dll
VERSION.dll
FindCloseUrlCache
FindCloseUrlCache
FindNextUrlCacheEntryW
FindNextUrlCacheEntryW
FindFirstUrlCacheEntryW
FindFirstUrlCacheEntryW
WININET.dll
WININET.dll
GetWindowsDirectoryW
GetWindowsDirectoryW
KERNEL32.dll
KERNEL32.dll
EnumChildWindows
EnumChildWindows
USER32.dll
USER32.dll
GDI32.dll
GDI32.dll
comdlg32.dll
comdlg32.dll
RegCloseKey
RegCloseKey
RegOpenKeyExW
RegOpenKeyExW
RegEnumKeyExW
RegEnumKeyExW
ADVAPI32.dll
ADVAPI32.dll
ShellExecuteW
ShellExecuteW
SHELL32.dll
SHELL32.dll
ole32.dll
ole32.dll
5JEw%Xg
5JEw%Xg
hXXp://VVV.usertrust.com1
hXXp://VVV.usertrust.com1
3hXXp://crl.usertrust.com/AddTrustExternalCARoot.crl05
3hXXp://crl.usertrust.com/AddTrustExternalCARoot.crl05
hXXp://ocsp.usertrust.com0
hXXp://ocsp.usertrust.com0
1hXXp://crl.usertrust.com/UTN-USERFirst-Object.crl05
1hXXp://crl.usertrust.com/UTN-USERFirst-Object.crl05
1hXXp://crl.usertrust.com/UTN-USERFirst-Object.crl0t
1hXXp://crl.usertrust.com/UTN-USERFirst-Object.crl0t
1hXXp://crt.usertrust.com/UTNAddTrustObject_CA.crt0%
1hXXp://crt.usertrust.com/UTNAddTrustObject_CA.crt0%
hXXps://secure.comodo.net/CPS0A
hXXps://secure.comodo.net/CPS0A
0hXXp://crl.comodoca.com/COMODOCodeSigningCA2.crl0r
0hXXp://crl.comodoca.com/COMODOCodeSigningCA2.crl0r
0hXXp://crt.comodoca.com/COMODOCodeSigningCA2.crt0$
0hXXp://crt.comodoca.com/COMODOCodeSigningCA2.crt0$
hXXp://ocsp.comodoca.com0
hXXp://ocsp.comodoca.com0
support@nirsoft.net0
support@nirsoft.net0
t{SSh
t{SSh
v%SSW
v%SSW
Mail PassView
Mail PassView
Mozilla\Profiles
Mozilla\Profiles
Software\Mozilla\Mozilla Thunderbird
Software\Mozilla\Mozilla Thunderbird
%s\Main
%s\Main
sqlite3.dll
sqlite3.dll
nss3.dll
nss3.dll
%programfiles%\Mozilla Thunderbird
%programfiles%\Mozilla Thunderbird
AddExportHeaderLine
AddExportHeaderLine
%s %s %s
%s %s %s
HTTPMail User Name
HTTPMail User Name
SMTP USer Name
SMTP USer Name
HTTPMail Server
HTTPMail Server
SMTP Server
SMTP Server
POP3 Password2
POP3 Password2
IMAP Password2
IMAP Password2
HTTPMail Password2
HTTPMail Password2
SMTP Password2
SMTP Password2
POP3 Port
POP3 Port
IMAP Port
IMAP Port
HTTPMail Port
HTTPMail Port
SMTP Port
SMTP Port
HTTPMail Secure Connection
HTTPMail Secure Connection
SMTP Secure Connection
SMTP Secure Connection
SMTP Display Name
SMTP Display Name
SMTP Email Address
SMTP Email Address
POP3 Password
POP3 Password
IMAP Password
IMAP Password
HTTP Password
HTTP Password
SMTP Password
SMTP Password
HTTP User
HTTP User
SMTP User
SMTP User
HTTP Server URL
HTTP Server URL
HTTP Port
HTTP Port
HTTPMail Use SSL
HTTPMail Use SSL
SMTP Use SSL
SMTP Use SSL
%s\%s
%s\%s
PopPort
PopPort
PopPassword
PopPassword
SMTPAccount
SMTPAccount
SMTPServer
SMTPServer
SMTPPort
SMTPPort
SMTPLogSecure
SMTPLogSecure
SMTPPassword
SMTPPassword
%s\Accounts
%s\Accounts
LoginName
LoginName
SavePasswordText
SavePasswordText
ESMTPUsername
ESMTPUsername
ESMTPPassword
ESMTPPassword
POP3Password
POP3Password
fb.dat
fb.dat
%s@gmail.com
%s@gmail.com
%s@yahoo.com
%s@yahoo.com
Software\Microsoft\Windows Messaging Subsystem\Profiles
Software\Microsoft\Windows Messaging Subsystem\Profiles
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
%s %s
%s %s
smtp
smtp
advapi32.dll
advapi32.dll
comctl32.dll
comctl32.dll
*.ini
*.ini
netmsg.dll
netmsg.dll
Error %d: %s
Error %d: %s
%s (%s)
%s (%s)
menu_%d
menu_%d
dialog_%d
dialog_%d
TranslatorURL
TranslatorURL
_lng.ini
_lng.ini
%-18s: %s
%-18s: %s
%%-%d.%ds
%%-%d.%ds
%s %s %s %s %s%s %s%sbgcolor="%s"
bgcolor="%s"
%s
%s
%s%s>
%s%s>
%s>
%s>
report.html
report.html
*.txt
*.txt
*.htm;*.html
*.htm;*.html
*.xml
*.xml
*.csv
*.csv
Software\NirSoft\MailPassView
Software\NirSoft\MailPassView
MailPassView
MailPassView
/skeepass
/skeepass
/deleteregkey
/deleteregkey
Failed to load the executable file !
Failed to load the executable file !
mail.account.account
mail.account.account
mail.server
mail.server
port
port
mail.identity
mail.identity
signon.signonfilename
signon.signonfilename
mailbox://%s@%s
mailbox://%s@%s
imap://%s@%s
imap://%s@%s
mailbox://%s
mailbox://%s
imap://%s
imap://%s
signons.txt
signons.txt
signons.sqlite
signons.sqlite
prefs.js
prefs.js
Password.NET Messenger Service
Password.NET Messenger Service
User.NET Messenger Service
User.NET Messenger Service
Passport.Net\*
Passport.Net\*
ps:password
ps:password
windowslive:name=
windowslive:name=
Exception %8.8X at address %8.8X in module %s
Exception %8.8X at address %8.8X in module %s
Stack Data: %s
Stack Data: %s
Code Data: %s
Code Data: %s
mozsqlite3.dll
mozsqlite3.dll
psapi.dll
psapi.dll
pstorec.dll
pstorec.dll
5e7e8100-9138-11d1-945a-00c04fc308ff
5e7e8100-9138-11d1-945a-00c04fc308ff
00000000-0000-0000-0000-000000000000
00000000-0000-0000-0000-000000000000
220D5CD0-853A-11D0-84BC-00C04FD43F8F
220D5CD0-853A-11D0-84BC-00C04FD43F8F
220D5CD1-853A-11D0-84BC-00C04FD43F8F
220D5CD1-853A-11D0-84BC-00C04FD43F8F
220D5CC1-853A-11D0-84BC-00C04FD43F8F
220D5CC1-853A-11D0-84BC-00C04FD43F8F
417E2D75-84BD-11D0-84BB-00C04FD43F8F
417E2D75-84BD-11D0-84BB-00C04FD43F8F
shell32.dll
shell32.dll
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
shlwapi.dll
shlwapi.dll
%s%s%s%s%s
%s
%s
%s
size="%d"
size="%d"
color="#%s"
color="#%s"
width="%s"
width="%s"
%s%s%s | %s%s%s SOFTWARE\Mozilla SOFTWARE\Mozilla mozilla mozilla %s\bin %s\bin PathToExe PathToExe \sqlite3.dll \sqlite3.dll \mozsqlite3.dll \mozsqlite3.dll Software\Microsoft\Windows Mail Software\Microsoft\Windows Mail Software\Microsoft\Windows Live Mail Software\Microsoft\Windows Live Mail SMTP_Server SMTP_Server SMTP_User_Name SMTP_User_Name POP3_Password2 POP3_Password2 IMAP_Password2 IMAP_Password2 NNTP_Password2 NNTP_Password2 SMTP_Password2 SMTP_Password2 SMTP_Email_Address SMTP_Email_Address SMTP_Port SMTP_Port NNTP_Port NNTP_Port IMAP_Port IMAP_Port POP3_Port POP3_Port SMTP_Secure_Connection SMTP_Secure_Connection *.oeaccount *.oeaccount \Microsoft\Windows Mail \Microsoft\Windows Mail \Microsoft\Windows Live Mail \Microsoft\Windows Live Mail f:\Projects\VS2005\mailpv\Release\mailpv.pdb f:\Projects\VS2005\mailpv\Release\mailpv.pdb _acmdln _acmdln RPCRT4.dll RPCRT4.dll GetWindowsDirectoryA GetWindowsDirectoryA RegDeleteKeyA RegDeleteKeyA RegOpenKeyExA RegOpenKeyExA RegEnumKeyA RegEnumKeyA RegEnumKeyExA RegEnumKeyExA ShellExecuteA ShellExecuteA NirSoftPADPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD NirSoftPADPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD Phulli.exe Phulli.exe Microsoft.VisualBasic Microsoft.VisualBasic System.Windows.Forms System.Windows.Forms System.Drawing System.Drawing System.Management System.Management tapi32.dll tapi32.dll rtm.dll rtm.dll user32.dll user32.dll Phulli.Resources.resources Phulli.Resources.resources Phulli.Form1.resources Phulli.Form1.resources Phulli.My Phulli.My WindowsFormsApplicationBase WindowsFormsApplicationBase Microsoft.VisualBasic.ApplicationServices Microsoft.VisualBasic.ApplicationServices System.Collections.Generic System.Collections.Generic .cctor .cctor System.Threading System.Threading System.ComponentModel System.ComponentModel System.CodeDom.Compiler System.CodeDom.Compiler Microsoft.VisualBasic.Devices Microsoft.VisualBasic.Devices m_MyWebServicesObjectProvider m_MyWebServicesObjectProvider get_WebServices get_WebServices HelpKeywordAttribute HelpKeywordAttribute System.ComponentModel.Design System.ComponentModel.Design WebServices WebServices Microsoft.VisualBasic.CompilerServices Microsoft.VisualBasic.CompilerServices System.Collections System.Collections ContainsKey ContainsKey InvalidOperationException InvalidOperationException MyWebServices MyWebServices encryptedpassstring encryptedpassstring encryptedsmtpstring encryptedsmtpstring portstring portstring encryptedftphost encryptedftphost encryptedftpuser encryptedftpuser encryptedftppass encryptedftppass useftp useftp websitevisitor websitevisitor websiteblocker websiteblocker passstring passstring smtpstring smtpstring ftphost ftphost ftpuser ftpuser ftppass ftppass WM_KEYUP WM_KEYUP WM_KEYDOWN WM_KEYDOWN WM_SYSKEYDOWN WM_SYSKEYDOWN WM_SYSKEYUP WM_SYSKEYUP KeyboardHandle KeyboardHandle KeyLog KeyLog CleanedPasswordsMAIL CleanedPasswordsMAIL CleanedPasswordsWB CleanedPasswordsWB System.IO System.IO get_ExecutablePath get_ExecutablePath WindowsIdentity WindowsIdentity System.Security.Principal System.Security.Principal set_WindowState set_WindowState FormWindowState FormWindowState UnhookWindowsHookEx UnhookWindowsHookEx SetWindowsHookEx SetWindowsHookEx SetWindowsHookExA SetWindowsHookExA GetAsyncKeyState GetAsyncKeyState vKey vKey HookKeyboard HookKeyboard UnhookKeyboard UnhookKeyboard Operators Operators get_Keyboard get_Keyboard Keyboard Keyboard get_CtrlKeyDown get_CtrlKeyDown get_AltKeyDown get_AltKeyDown KeyboardCallback KeyboardCallback set_UseShellExecute set_UseShellExecute Microsoft.VisualBasic.MyServices Microsoft.VisualBasic.MyServices System.Collections.ObjectModel System.Collections.ObjectModel MsgBox MsgBox MsgBoxResult MsgBoxResult MsgBoxStyle MsgBoxStyle ForceSteamLogin ForceSteamLogin System.Net.NetworkInformation System.Net.NetworkInformation get_OperationalStatus get_OperationalStatus OperationalStatus OperationalStatus FakemsgInstall FakemsgInstall System.Net.Mail System.Net.Mail SmtpClient SmtpClient System.Globalization System.Globalization set_Port set_Port System.Net System.Net Microsoft.Win32 Microsoft.Win32 RegistryKey RegistryKey OpenSubKey OpenSubKey System.Security.Cryptography System.Security.Cryptography System.Text System.Text set_Key set_Key stealWebroswers stealWebroswers WebClient WebClient readweb readweb System.IO.Compression System.IO.Compression SendLogsFTP SendLogsFTP FtpWebRequest FtpWebRequest WebRequest WebRequest UploadFTP UploadFTP secretKey secretKey set_KeySize set_KeySize get_KeySize get_KeySize System.Net.Sockets System.Net.Sockets virtualKey virtualKey KeyboardHookDelegate KeyboardHookDelegate get_Msg get_Msg Phulli.My.Resources Phulli.My.Resources System.Resources System.Resources get_CMemoryExecute get_CMemoryExecute get_WebBrowserPassView get_WebBrowserPassView WebBrowserPassView WebBrowserPassView System.Configuration System.Configuration 8.0.0.0 8.0.0.0 My.Computer My.Computer My.Application My.Application My.User My.User My.Forms My.Forms My.WebServices My.WebServices System.Windows.Forms.Form System.Windows.Forms.Form My.MyProject.Forms My.MyProject.Forms 4System.Web.Services.Protocols.SoapHttpClientProtocol 4System.Web.Services.Protocols.SoapHttpClientProtocol 3System.Resources.Tools.StronglyTypedResourceBuilder 3System.Resources.Tools.StronglyTypedResourceBuilder 4.0.0.0 4.0.0.0 KMicrosoft.VisualStudio.Editors.SettingsDesigner.SettingsSingleFileGenerator KMicrosoft.VisualStudio.Editors.SettingsDesigner.SettingsSingleFileGenerator 11.0.0.0 11.0.0.0 My.Settings My.Settings $1f128a07-8438-4dc0-8205-570da0ccce8d $1f128a07-8438-4dc0-8205-570da0ccce8d _CorExeMain _CorExeMain %%0.ß %%0.ß Apple Computer\Preferences\keychain.plist Apple Computer\Preferences\keychain.plist LoadPasswordsIE LoadPasswordsIE LoadPasswordsFirefox LoadPasswordsFirefox LoadPasswordsChrome LoadPasswordsChrome LoadPasswordsOpera LoadPasswordsOpera LoadPasswordsSafari LoadPasswordsSafari LoadPasswordsSeaMonkey LoadPasswordsSeaMonkey UseFirefoxProfileFolder UseFirefoxProfileFolder UseFirefoxInstallFolder UseFirefoxInstallFolder UseChromeProfileFolder UseChromeProfileFolder UseOperaPasswordFile UseOperaPasswordFile FirefoxProfileFolder FirefoxProfileFolder FirefoxInstallFolder FirefoxInstallFolder ChromeProfileFolder ChromeProfileFolder OperaPasswordFile OperaPasswordFile Aadvapi32.dll Aadvapi32.dll crypt32.dll crypt32.dll 777705555443332 777705555443332 5555443332 5555443332 5555443332 5555443332 wand.dat wand.dat @nss3.dll @nss3.dll SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe %programfiles%\Sea Monkey %programfiles%\Sea Monkey %programfiles%\Mozilla Firefox %programfiles%\Mozilla Firefox -signons.txt -signons.txt signons2.txt signons2.txt signons3.txt signons3.txt @dllhost.exe @dllhost.exe taskhost.exe taskhost.exe taskhostex.exe taskhostex.exe Microsoft\Windows\WebCache\WebCacheV01.dat Microsoft\Windows\WebCache\WebCacheV01.dat Microsoft\Windows\WebCache\WebCacheV24.dat Microsoft\Windows\WebCache\WebCacheV24.dat index.dat index.dat hXXps://VVV.google.com/accounts/servicelogin hXXps://VVV.google.com/accounts/servicelogin hXXp://VVV.facebook.com/ hXXp://VVV.facebook.com/ hXXps://login.yahoo.com/config/login hXXps://login.yahoo.com/config/login hXXp:// hXXp:// hXXps:// hXXps:// PTF:// PTF:// @history.dat @history.dat places.sqlite places.sqlite Mozilla\Firefox\Profiles Mozilla\Firefox\Profiles Mozilla\SeaMonkey\Profiles Mozilla\SeaMonkey\Profiles Mozilla\SeaMonkey Mozilla\SeaMonkey Mozilla\Firefox Mozilla\Firefox profiles.ini profiles.ini Profile%d Profile%d tntdll.dll tntdll.dll sWeb Data sWeb Data Login Data Login Data Google\Chrome\User Data Google\Chrome\User Data Google\Chrome SxS\User Data Google\Chrome SxS\User Data Opera\Opera\wand.dat Opera\Opera\wand.dat Opera\Opera7\profile\wand.dat Opera\Opera7\profile\wand.dat Opera Opera @"%s" @"%s" Ashell32.dll Ashell32.dll \nss3.dll \nss3.dll .save .save vaultcli.dll vaultcli.dll abe2869f-9b47-4cd9-a358-c22904dba7f7 abe2869f-9b47-4cd9-a358-c22904dba7f7 Copy &Password Copy &Password &HTML Report - All Items &HTML Report - All Items HTML R&eport - Selected Items HTML R&eport - Selected Items HTML Report - All Items HTML Report - All Items HTML Report - Selected Items HTML Report - Selected Items Load Passwords From... Load Passwords From... Google Chrome Google Chrome Mozilla Firefox Mozilla Firefox SeaMonkey SeaMonkey Firefox Options Firefox Options Master password: Master password: Firefox Profile: Firefox Profile: Firefox Installation: Firefox Installation: Chrome Options Chrome Options Opera Options Opera Options wand.dat file: wand.dat file: %d Passwords %d Passwords , %d Selected , %d Selected Web Browser Passwords%Choose another Firefox profile folder)Choose the installation folder of Firefox,Choose another profile of Chrome Web browser,Choose the password file of Opera (wand.dat) Web Browser Passwords%Choose another Firefox profile folder)Choose the installation folder of Firefox,Choose another profile of Chrome Web browser,Choose the password file of Opera (wand.dat) Loading... %d Loading... %d KeePass csv file KeePass csv file Opera Password File Opera Password File Firefox 1.x Firefox 1.x Firefox 2.x Firefox 2.x Firefox 3.0 Firefox 3.0 Firefox Firefox Chrome Chrome Web Browser Web Browser Password Password Password Strength Password Strength Password Field Password Field WebBrowserPassView.exe WebBrowserPassView.exe VVV.google.com/Please log in to your Gmail account VVV.google.com/Please log in to your Gmail account VVV.google.com:443/Please log in to your Gmail account VVV.google.com:443/Please log in to your Gmail account VVV.google.com/Please log in to your Google Account VVV.google.com/Please log in to your Google Account VVV.google.com:443/Please log in to your Google Account VVV.google.com:443/Please log in to your Google Account VVV.google.com VVV.google.com dWindowsLive:name=* dWindowsLive:name=* 82BD0E67-9FEA-4748-8672-D5EFE5B779B0 82BD0E67-9FEA-4748-8672-D5EFE5B779B0 Copy Password Copy Password %d items %d items Select Eudora.ini filename/Select the location of Thunderbird installation Select Eudora.ini filename/Select the location of Thunderbird installation Eudora.ini file Eudora.ini file SMTP SMTP Windows Mail Windows Mail Windows Live Mail Windows Live Mail Server Port Server Port SMTP Server Port SMTP Server Port Mail Password Recovery Mail Password Recovery mailpv.exe mailpv.exe noftp noftp Disablecmd Disablecmd \Windows Update.exe \Windows Update.exe \WindowsUpdate.exe \WindowsUpdate.exe SysInfo.txt SysInfo.txt \pid.txt \pid.txt \pidloc.txt \pidloc.txt HawkEyeKeylogger HawkEyeKeylogger \Mozilla\Firefox\Profiles \Mozilla\Firefox\Profiles 127.0.0.1 127.0.0.1 \SteamAppData.vdf \SteamAppData.vdf \ClientRegistry.blob \ClientRegistry.blob Dear HawkEye Customers! Dear HawkEye Customers! HawkEye Logger Details: HawkEye Logger Details: Keylogger Enabled: Keylogger Enabled: Operating System: Operating System: HawkEye_Keylogger_Execution_Confirmed_ HawkEye_Keylogger_Execution_Confirmed_ HawkEye Keylogger | Execution Confirmed | HawkEye Keylogger | Execution Confirmed | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced autorun.inf autorun.inf open=Sys.exe open=Sys.exe Sys.exe Sys.exe Software\Microsoft\Windows\CurrentVersion\Run Software\Microsoft\Windows\CurrentVersion\Run Windows Update Windows Update C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe \bitcoin\wallet.dat \bitcoin\wallet.dat _wallet.dat _wallet.dat wallet.dat wallet.dat Microsoft.NET\Framework\v2.0.50727\vbc.exe Microsoft.NET\Framework\v2.0.50727\vbc.exe holdermail.txt" holdermail.txt" holdermail.txt holdermail.txt Operating System Intel Recovery Operating System Intel Recovery Operating System Platform: Operating System Platform: Operating System Version: Operating System Version: WEB Browser Password Stealer WEB Browser Password Stealer Mail Messenger Password Stealer Mail Messenger Password Stealer JDownloader Password Stealer JDownloader Password Stealer HawkEye_Keylogger_Stealer_Records_ HawkEye_Keylogger_Stealer_Records_ HawkEye Keylogger | Stealer Records | HawkEye Keylogger | Stealer Records | holderwb.txt" holderwb.txt" holderwb.txt holderwb.txt C:\Users\ C:\Users\ _Pin0.jpeg _Pin0.jpeg _Pin1.jpeg _Pin1.jpeg _Pin2.jpeg _Pin2.jpeg _Pin3.jpeg _Pin3.jpeg _Pin4.jpeg _Pin4.jpeg HawkEye Keylogger | RuneScape Stealer | HawkEye Keylogger | RuneScape Stealer | HawkEye Keylogger | BitCoin Stealer | HawkEye Keylogger | BitCoin Stealer | Steals the Wallet.DAT file that holds the users bitcoin currency. Steals the Wallet.DAT file that holds the users bitcoin currency. \.minecraft\lastlogin \.minecraft\lastlogin HawkEye Keylogger | MineCraft Stealer | HawkEye Keylogger | MineCraft Stealer | As you can see, this email has the attached file, containing MineCraft Username and Password. Please download it then decrypt the login credential / information with MineCraft Decryptor. As you can see, this email has the attached file, containing MineCraft Username and Password. Please download it then decrypt the login credential / information with MineCraft Decryptor. HawkEye Keylogger | Keylog Records | HawkEye Keylogger | Keylog Records | Keylog Records Keylog Records .jpeg .jpeg HawkEye_Keylogger_Keylog_Records_ HawkEye_Keylogger_Keylog_Records_ hXXp://whatismyipaddress.com/ hXXp://whatismyipaddress.com/ Phulli.Resources Phulli.Resources :\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe :\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe uLlkB.exe_1308_rwx_00A2A000_00003000: okEy okEy uLlkB.exe_1308_rwx_675A6000_00003000: .Qg .Qg *Rg`.Rg|)RgL Rg *Rg`.Rg|)RgL Rg |
---|