not-a-virus:HEUR:AdWare.Win32.SoftPulse.heur (Kaspersky), mzpefinder_pcap_file.YR (Lavasoft MAS)Behaviour: Adware
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Summary
MD5: a9efdadb9fbf39736f9dcdfb7e8c308b
SHA1: 73056b5f477df5bf70c99a912c64064788c72653
SHA256: 5e65f3f21ea7b15f8af25dcbb89b0826cb5feca03c48ed3e8ba2e7b45c472dee
SSDeep: 12288:qs9eJNhvHIzi0SRHxmVUOXem8MXv4LnroIEf/bWjD5bCETr CAImjCcj04PY91:qs9eJTyil8UOX9xXv4von/KhbjTzAY
Size: 689808 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2015-12-30 11:08:49
Analyzed on: WindowsXP SP3 32-bit
Summary: Adware. Delivers advertising content in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions. Users may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program or are frustrated by its effects on system performance.
Dynamic Analysis
Payload
No specific payload has been found.
Process activity
The PUP creates the following process(es):No processes have been created.The PUP injects its code into the following process(es):
%original file name%.exe:668
Mutexes
The following mutexes were created/opened:
CTF.TMD.MutexDefaultS-1-5-21-1844237615-1960408961-1801674531-1003CTF.Layouts.MutexDefaultS-1-5-21-1844237615-1960408961-1801674531-1003CTF.Asm.MutexDefaultS-1-5-21-1844237615-1960408961-1801674531-1003CTF.Compart.MutexDefaultS-1-5-21-1844237615-1960408961-1801674531-1003CTF.LBES.MutexDefaultS-1-5-21-1844237615-1960408961-1801674531-1003ShimCacheMutexc:!documents and settings!adm!local settings!temporary internet files!content.ie5!RasPbFile_!MSFTHISTORY!_DBWinMutexc:!documents and settings!adm!cookies!WininetStartupMutexc:!documents and settings!adm!local settings!history!history.ie5!WininetProxyRegistryMutexWininetConnectionMutexZonesLockedCacheCounterMutexZonesCacheCounterMutexZonesCounterMutexoleacc-msaa-loaded
File activity
The process %original file name%.exe:668 makes changes in the file system.
The PUP creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\LNRE65BT\bullet-short[1].gif (54 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\U10HIX8X\arrow[1].png (229 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\LNRE65BT\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\EHOMVFJL\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OHARKTYF\i-flashplayer[1].png (2923 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\U10HIX8X\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\EHOMVFJL\style[1].css (5083 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\EHOMVFJL\bullet-short[1].gif (108 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OHARKTYF\msjava[1].dll (465777 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\LNRE65BT\bg[1].jpg (4176 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OHARKTYF\desktop.ini (67 bytes)
%System%\wbem\Logs\wbemprox.log (225 bytes)
The PUP deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\EHOMVFJL\5d1be2cb13613456d35e4ad4150bf96c5aceb2f70d89933206c6d863e99190288e54d9319a29309a0f8072e568046fc4373427b389e29da2[1].txt (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\EHOMVFJL\bullet-short[1].gif (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\LNRE65BT\bullet-short[1].gif (0 bytes)
Registry activity
The process %original file name%.exe:668 makes changes in the system registry.
The PUP creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache]
"@xpsp3res.dll,-20001" = "Diagnose Connection Problems..."
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1A 00 00 00 01 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3D 81 1D D1 1F 43 7E 68 08 32 00 98 13 7F 7A 57"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
The PUP modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The PUP modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The PUP modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The PUP deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
Dropped PE files
MD5 | File path |
---|---|
67986ec074b86590e110a76480f7da99 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temporary Internet Files\Content.IE5\OHARKTYF\msjava[1].dll |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
Removals
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):No processes have been created.
- Delete the original PUP file.
- Delete or disinfect the following files created/modified by the PUP:
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\LNRE65BT\bullet-short[1].gif (54 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\U10HIX8X\arrow[1].png (229 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\LNRE65BT\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\EHOMVFJL\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OHARKTYF\i-flashplayer[1].png (2923 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\U10HIX8X\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\EHOMVFJL\style[1].css (5083 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\EHOMVFJL\bullet-short[1].gif (108 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OHARKTYF\msjava[1].dll (465777 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\LNRE65BT\bg[1].jpg (4176 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OHARKTYF\desktop.ini (67 bytes)
%System%\wbem\Logs\wbemprox.log (225 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
Static Analysis
VersionInfo
No information is available.
No information is available.
PE Sections
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
---|---|---|---|---|---|
UPX0 | 4096 | 1077248 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
UPX1 | 1081344 | 651264 | 647680 | 5.48292 | 965601d460f04e6bb187e41bb33a764d |
.rsrc | 1732608 | 40960 | 37376 | 4.15399 | b029648113a76b9b9074c82964026a14 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Total found: 295
2ebc77007317b3984401b2395ce3b045
69bbf6ba378cad4cf4cf094f5af6b122
202a147c91949bbbf55288beaae2ac36
223898169676d4f4e70d01ead1124683
f06e17e72aef96178cda1ccc7deed644
42a68511943dc378c005ca54bf06723b
b9db4f80a07c2269856225636c125d5d
d7b0f0f6e90269b731a0fe94145a8537
9da2cc631ee3e7d03f32b47310427634
87003c9a7bf843eafc36dac02daf376c
69d6b5ab710559371cbc48cdcbbc255f
bff89fe3a5cc571efbe296e60ebc4d0b
f914908774a7ececa6cec2c5e7bed74c
fa8076ba093eb87c310b5a4f732a1043
d08e34d9c9f8215195b49bc102e80511
a2019832037d56b4b06537532f96b68c
fd90aed79221c2df74aa1fd18b7ff801
8deb6be1ae61cce0f6250280e3f273ad
8bb75a0398b4d098221f2713f85fdbde
41e105e5d45e7ae62ced20e5f575934d
caeeb1aeb8294f1907c90033467e5f73
7a48b7344157d0c443722ac8478c8ff9
bb4f17cbdf697dc9ad1bfa3798ec0a91
94fa777dfc88672815b1462451c10640
730645be6ffce7d48401752e3e14efaa
77f890ff333f7363dd48e7e0c2f7ff3e
Network Activity
URLs
URL | IP |
---|---|
hxxp://api.magno11.com/ | 52.33.198.242 |
hxxp://static.magno11.com/d5/msjava.dll | 52.89.116.157 |
hxxp://api.magno11.com/3a178ef5eb9aa00b2d50bc325f6717229f59153735ca7bfe19e77123dc4b15f9b3b87099379a1f59989e368d87742302d00c5f6cbf52f1b3aa174cd481708b3fdea201812d4157a26d7a470f0f2ee023b73fc35415ab9d023be0fff693538a74c7cda69faf7e6a9a31b197554b59c01863cb3593922a6dea | 52.33.198.242 |
hxxp://api.magno11.com/5d1be2cb13613456d35e4ad4150bf96c5aceb2f70d89933206c6d863e99190288e54d9319a29309a0f8072e568046fc4373427b389e29da2 | 52.33.198.242 |
hxxp://api.magno11.com/maxpower-static/templates/2015/07/580c3e6e-1fed-11e5-9771-06a3579b0dab/win_compliance_link_flashplayer/css/style.css | 52.33.198.242 |
hxxp://api.magno11.com/__maxpower__/render_template/2015/07/580c3e6e-1fed-11e5-9771-06a3579b0dab/template_variation=win_compliance_link_flashplayer?language_code=en | 52.33.198.242 |
hxxp://api.magno11.com/maxpower-static/templates/2015/07/580c3e6e-1fed-11e5-9771-06a3579b0dab/win_compliance_link_flashplayer/css/images/bg.jpg | 52.33.198.242 |
hxxp://api.magno11.com/maxpower-static/templates/2015/07/580c3e6e-1fed-11e5-9771-06a3579b0dab/win_compliance_link_flashplayer/css/images/arrow.png | 52.33.198.242 |
hxxp://api.magno11.com/__maxpower__/render_screen/2015/03/f7832784-c802-11e4-a454-06a3579b0dab/screen_variation=w_comp_link | 52.33.198.242 |
hxxp://api.magno11.com/maxpower-static/templates/2015/07/580c3e6e-1fed-11e5-9771-06a3579b0dab/win_compliance_link_flashplayer/css/images/i-flashplayer.png | 52.33.198.242 |
hxxp://api.magno11.com/maxpower-static/templates/2015/07/580c3e6e-1fed-11e5-9771-06a3579b0dab/win_compliance_link_flashplayer/css/images/bullet-short.gif | 52.33.198.242 |
ssl.google-analytics.com | 216.58.214.200 |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET /maxpower-static/templates/2015/07/580c3e6e-1fed-11e5-9771-06a3579b0dab/win_compliance_link_flashplayer/css/images/arrow.png HTTP/1.1
Accept: */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: api.magno11.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: image/png
Date: Sat, 05 Mar 2016 08:38:29 GMT
ETag: "5593da1e-768"
Last-Modified: Wed, 01 Jul 2015 12:16:30 GMT
Server: nginx
Content-Length: 1896
Connection: keep-alive
.PNG........IHDR...8...!......_hM....tEXtSoftware.Adobe ImageReadyq.e<...$iTXtXML:com.adobe.xmp.....<?xpacket begin="..." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="hXXp://VVV.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="hXXp://ns.adobe.com/xap/1.0/" xmlns:xmpMM="hXXp://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS6 (Macintosh)" xmpMM:InstanceID="xmp.iid:B3C3A97DD9DA11E4A6C08BEFFF7F6B62" xmpMM:DocumentID="xmp.did:B3C3A97ED9DA11E4A6C08BEFFF7F6B62"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:B3C3A97BD9DA11E4A6C08BEFFF7F6B62" stRef:documentID="xmp.did:B3C3A97CD9DA11E4A6C08BEFFF7F6B62"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.. e....IDATx..Y[HTQ..wf....K..(.... .AFZ..SZ.9X`.L.D j.Q.i.?........2zYX&..WH.....1_...\..m_......X....].u.9{.}...(.n....._.e...q..........2:..{.=.7.'..=..1...^..@.c\=.1 ..^.x....3...........y.\.B....~@-...dp.....yp....f... .p...zz.%.).1q.r@..;_.[-0..a......cr....j.).1.t.%.....K(04.g.....&O.....1..s.{....M./.@\.Ctv..\M....... )..1.c.........n.J.kJ$.h......x.*..t.8q.vI<.7hG..7..b.a..I............n.t..ypk.A;>.v...a.D...1.....#....{.@_....hKq.u...W..I...`;....._...J@...rhaTN.0..m.,.-...U......0f..5.&\.....!...k...*E.n.E..Z...y......8dX......8@%..X.&K.erG...._.qW..B..rn4..).1...p7EV.....
<<< skipped >>>
GET / HTTP/1.1
Accept: */*
Proxy-Authorization: Basic
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36
Host: api.magno11.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: text/html
Date: Sat, 05 Mar 2016 08:38:21 GMT
ETag: "54521356-38"
Last-Modified: Thu, 30 Oct 2014 10:30:46 GMT
Server: nginx
Content-Length: 56
Connection: keep-alive
<html><head><title>ok</title></head><body></body></html>HTTP/1.1 200 OK..Accept-Ranges: bytes..Content-Type: text/html..Date: Sat, 05 Mar 2016 08:38:21 GMT..ETag: "54521356-38"..Last-Modified: Thu, 30 Oct 2014 10:30:46 GMT..Server: nginx..Content-Length: 56..Connection: keep-alive..<html><head><title>ok</title></head><body></body></html>....
GET /3a178ef5eb9aa00b2d50bc325f6717229f59153735ca7bfe19e77123dc4b15f9b3b87099379a1f59989e368d87742302d00c5f6cbf52f1b3aa174cd481708b3fdea201812d4157a26d7a470f0f2ee023b73fc35415ab9d023be0fff693538a74c7cda69faf7e6a9a31b197554b59c01863cb3593922a6dea HTTP/1.1
Accept: */*
Proxy-Authorization: Basic
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36
Host: api.magno11.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Content-Type: text/html
Date: Sat, 05 Mar 2016 08:38:26 GMT
Server: nginx
transfer-encoding: chunked
Connection: keep-alive
224c..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
<<< skipped >>>
POST /5d1be2cb13613456d35e4ad4150bf96c5aceb2f70d89933206c6d863e99190288e54d9319a29309a0f8072e568046fc4373427b389e29da2 HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36 1 R:-842150450
Host: api.magno11.com
Content-Length: 2886
Cache-Control: no-cache
cdata=86394263D6DED7AD3ED013DFEF7E64F6810202E9866DC605C250CECCD7CB22F9686417E27FE9F67D358BFE17ACB1D241180ECC39589A1933488922E01AA18B5990C77361D300FD3F93ED09E2CB744C97B804FC5436AE22A9F5722F00091BD76000B9B8EAF5890BC34CC270795D90185A0E59CBC1D6A7E94CECB6C8B8591A04A05F8F9660395B0639CAD53D12F593F7EF0DB72B06712819EBE2C248403EA284E546E859FDBAB841D8E04E5E5732A046278BFB5B7A71B883CC9EA6B48A7B077B32644B3EA325F4623D0D948DD67DDFAAC03A2BD84EB8698B5006736E06FB5BC53DC7ADAE826F877F7BF46BADF799E6DA2C1AF17472F3264DBE4B4D3F2BA393B7E13A24D7EE5CF2049289CD9F27F0D32B22C6FC3650EC1E010EB37693F99C9C2CF0E7CF88AF6A640278C0670F7512C7020A84D72416415443D54B9E8FDF5015EB6F8141783DA2F840DE78F736BA1E07351B79D6D811497D854BBCF79AA01F51596B01DF524C313DF507A76C6A6C754CF51620C7360C356B692CD7FDC5587D54EA81CE862C9A081303B4CD873A0723197108DFB3686220DCB73D11C733B3E2B1CB446822B88A0D2CE33B1F56548A4B589C1B940760283CEDC8BBBD4BABD0B2534B609D369279B51907BE19ABCAF335C65C2FB101F3ED4FFA1E82B5EB77E8E9D76A9B5A0A4E33DAD73F4DD8CDA1F8FE729CAC760DB8F79943BADE40B2D9EDA33AAC647CE4D0661749C204D71632EC36D8369E4B10D747AA81DA51D881A524F2CAD21DD829CA09A050610973747C2F4FC943DA44C4D90F8CBEF7409A76C782F57A1707C4FEB42CA031F7D9AFEB19659E22C5B16E35521
HTTP/1.1 200 OK
Content-Type: text/plain
Date: Sat, 05 Mar 2016 08:38:29 GMT
Server: nginx
Content-Length: 7
Connection: keep-alive
MAXTHX.....
GET /__maxpower__/render_template/2015/07/580c3e6e-1fed-11e5-9771-06a3579b0dab/template_variation=win_compliance_link_flashplayer?language_code=en HTTP/1.1
Accept: */*
Proxy-Authorization: Basic
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36
Host: api.magno11.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Language: en
Content-Type: text/html; charset=utf-8
Date: Sat, 05 Mar 2016 08:38:29 GMT
Server: nginx
Vary: Accept-Language
Content-Length: 2205
Connection: keep-alive
..<!-- Template Win_Compliance_Link_flashplayer-->.<div class="link-v2">. <div class="container">. <div class="head">. <div class="imageslug">. </div>. <div class="minimize">. <ul>. <li><span id="_Bminimize" onclick="minimizeWindow();" class="button-min">-</span></li>. <li><span id="_Bexit" onclick="onExit()" class="button-min">x</span></li>. </ul>. </div>.. <div class="title">. . <h1>%mapp% Installer</h1>. </div>. </div>.. <div id="_frameContainer" class="content">.. .. </div>... . .. <!-- buttons -->. <div class="buttons">.. <!--botones derecha -->. . <input id="_Bnext" class="_Bnext arrow right" buttonText="Next" tabindex="0" type="submit" value="Next" onclick='onAccept();'>. .. <!--botones izquierda -->.. . <input id="_Bdecline" class="_Bdecline defaultadw left" tabindex="1" type="submit" name="nombre" value="Decline" onclick='onDecline();'>. .. <div class="clear"></div>. </div>.. .. <div class="contact">. <div class="contact-in" style="height: 20px;">.. <ul>. <li><a target='_blank' class="first _TitPrivacy">Privacy Policy</a></li>. <li><a target='_blank' class="_TitSetup">Setup info</a></li>. <li><a target='_blank' class="_TitF
<<< skipped >>>
GET /maxpower-static/templates/2015/07/580c3e6e-1fed-11e5-9771-06a3579b0dab/win_compliance_link_flashplayer/css/images/bg.jpg HTTP/1.1
Accept: */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: api.magno11.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: image/jpeg
Date: Sat, 05 Mar 2016 08:38:29 GMT
ETag: "5593da21-4afb"
Last-Modified: Wed, 01 Jul 2015 12:16:33 GMT
Server: nginx
Content-Length: 19195
Connection: keep-alive
......Exif..II*.................Ducky.......<.....qhXXp://ns.adobe.com/xap/1.0/.<?xpacket begin="..." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="hXXp://VVV.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="hXXp://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="hXXp://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="hXXp://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:66C817CA37206811822A9B2F05ADFEF4" xmpMM:DocumentID="xmp.did:F6068DE9E04811E486B2C28A0F090B85" xmpMM:InstanceID="xmp.iid:F6068DE8E04811E486B2C28A0F090B85" xmp:CreatorTool="Adobe Photoshop CS6 (Macintosh)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:B8161106DFDF11E486B2C28A0F090B85" stRef:documentID="xmp.did:B8161107DFDF11E486B2C28A0F090B85"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>....Adobe.d...................................................................................................................................................6...................................................................................!..1A.Qa".q..2..U.f.....BR.........#S..br.3T...C.$4DV..5..cs....æeF....................Q..b.c....a...R..S..............?.........................................................................................................................................................................................
<<< skipped >>>
GET /__maxpower__/render_screen/2015/03/f7832784-c802-11e4-a454-06a3579b0dab/screen_variation=w_comp_link HTTP/1.1
Accept: */*
Proxy-Authorization: Basic
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36
Host: api.magno11.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Language: en
Content-Type: text/html; charset=utf-8
Date: Sat, 05 Mar 2016 08:38:29 GMT
Server: nginx
Vary: Accept-Language
Content-Length: 1485
Connection: keep-alive
...<!-- screen - welcome -->...<div class="welcome">....<h1>....Setup Wizard...</h1>...<h2>......Follow the on-screen instructions outlined in this wizard to install the new version of %mapp% and benefit from all the latest features and updates %mapp% has to offer......</h2>.....<div class="tablewhite">..<div class="whitespace">...<h3>Quick Spec</h3>...<div class="wlist first">....<li>Software Name:</li>....<span>%mapp%.exe</span>....</div>...<div class="clear"></div>...<div class="wlist">....<li >Version:</li>....<span>15.1</span>....<li>Size:</li>....<span>24.7 MB</span>...</div>..</div>..</div>....<p>........</p>...<p>........</p>...<p>........</p>...<p>........</p>....<ul class="list list-comp">........</ul>.......<div class="clear"></div>...........<ul class="li-legal">........</ul>...<div class="legal">...<div class="legal-in">.....<p style="font-size:10px; margin-bottom: 0; padding-bottom: 0;">%mapp% is free and ad-supported by a popup advertisment.</p>.<p style="font-size:10px; line-height: 12px; margin: 0;">The %mapp% is compatible with all Windows operating systems and can be uninstalled at any time.</p>.<p style="font-size:10px; line-height: 12px; margin: 0;">.By clicking %buttonText% you agree to in
<<< skipped >>>
GET /maxpower-static/templates/2015/07/580c3e6e-1fed-11e5-9771-06a3579b0dab/win_compliance_link_flashplayer/css/images/bullet-short.gif HTTP/1.1
Accept: */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: api.magno11.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: image/gif
Date: Sat, 05 Mar 2016 08:38:30 GMT
ETag: "5593da27-36"
Last-Modified: Wed, 01 Jul 2015 12:16:39 GMT
Server: nginx
Content-Length: 54
Connection: keep-alive
GIF89a.............!.......,...................P..U..;....
GET /maxpower-static/templates/2015/07/580c3e6e-1fed-11e5-9771-06a3579b0dab/win_compliance_link_flashplayer/css/images/i-flashplayer.png HTTP/1.1
Accept: */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: api.magno11.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: image/png
Date: Sat, 05 Mar 2016 08:38:30 GMT
ETag: "5593dd83-2cc1"
Last-Modified: Wed, 01 Jul 2015 12:30:59 GMT
Server: nginx
Content-Length: 11457
Connection: keep-alive
.PNG........IHDR..............>a.....tEXtSoftware.Adobe ImageReadyq.e<...$iTXtXML:com.adobe.xmp.....<?xpacket begin="..." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="hXXp://VVV.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="hXXp://ns.adobe.com/xap/1.0/" xmlns:xmpMM="hXXp://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS6 (Macintosh)" xmpMM:InstanceID="xmp.iid:4FEF6E3B181111E580E1927216170519" xmpMM:DocumentID="xmp.did:4FEF6E3C181111E580E1927216170519"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:4FEF6E39181111E580E1927216170519" stRef:documentID="xmp.did:4FEF6E3A181111E580E1927216170519"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>......)3IDATx..}k.eWu.Z..~.L.C3..5....p@.(.#l..U.#..0.8.q..\.R).e'U..C(W...v.&...T%Uy...2&<c....H!....H..x..fF=.==......^.}zz....?............^.o}km$".....0L. ..5..p..0\.... ..5..p..0\.... ..5..p..0\.... ..5..p..0\.... ..5..p..0\.... ..5..p.i......l.....!.v.J.@.W........m..v..v... .9{6l.a7..T5...~...cwS.n$.w..._.u....",...8.>....B...T...n-_V....L........lL.8. ..L..M....oO#....Pz..{..T$..gv...).......E....C....4..s...',...F..|...y..h9...$.B$^.....MZ0..KK....m.a...R.....#GP...wM.-zH..K...wZ.tO..V..B.......q.0..{.Q.Y..o.. ..E..K!.B.q...x.d.......E X,..$qk!...%A.........KI...c..a....v.
<<< skipped >>>
GET /d5/msjava.dll HTTP/1.1
Accept: */*
Proxy-Authorization: Basic
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36
Host: static.magno11.com
Connection: Keep-Alive
Cache-Control: no-cache
HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: application/octet-stream
Date: Sat, 05 Mar 2016 08:38:21 GMT
ETag: "54ef0d1b-e5910"
Last-Modified: Thu, 26 Feb 2015 12:10:03 GMT
Server: nginx
Content-Length: 940304
Connection: keep-alive
MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....C8...........#...............................k................................m...............................`#..te...........................................................................................................................text............................... ..`.data...d"......."..................@....rsrc...............................@..@.reloc..............................@..B4.D8@...0[.8M..... 8W...4.D8a...4.D8l...6.D8y...5.D8............KERNEL32.dll.NTDLL.DLL.GDI32.dll.USER32.dll.ADVAPI32.dll.OLEAUT32.dll.ole32.dll......................................................................................................................................................................................................................................................................................................................................................... ...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
<<< skipped >>>
GET /maxpower-static/templates/2015/07/580c3e6e-1fed-11e5-9771-06a3579b0dab/win_compliance_link_flashplayer/css/style.css HTTP/1.1
Accept: */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: api.magno11.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: text/css
Date: Sat, 05 Mar 2016 08:38:29 GMT
ETag: "5593dddd-494f"
Last-Modified: Wed, 01 Jul 2015 12:32:29 GMT
Server: nginx
Content-Length: 18767
Connection: keep-alive
/* Template Win_Compliance_Link_flashplayer */...article,aside,details,figcaption,figure,.footer,header,hgroup,menu,nav,section {..display:block;.}.p, h5, h4, h3, h2, h1, span, ul, li, form, input, textarea {..margin:0;..padding:0;.}.body {..margin:0 auto;..background-color:#f6f6f6;..width: 566px;..height: 516px;..color:#444;..font-family:Arial, Helvetica, sans-serif;..}.a {..color:#0066cc;.}..clear {..clear:both;..height:0px;..overflow:inherit;..display: none;.}...li {..list-style: none;.}./*********************//*********************//*********************//*********************//********./* estilo para poner los botones del box.html todos en display none */.._Bnext, .._Bexit, .._Bdecline, .._Bomit {../*display:none;*/.}./**************************************************/..container {../*float: left;*/..width: 566px;..height: 516px;..background: url("images/bg.jpg") 0 0 no-repeat;..margin: 0 auto;.}.../*****************Template Win_Link*****************/...head {..height: 50px;..width: 100%;..display: block;..overflow: hidden;..clear: both;.}...head .imageslug {..background: url(images/i-flashplayer.png) -12px -41px;..width: 109px;..height: 44px;..float: left;..overflow: hidden;.}..head .imageslug img {.}...head .title {..float: right;..display: block;..margin-right: 5px;..font-style: normal;..margin-top: 14px;.}...head .title h1 {..font-size: 13px;..color: #707070;..letter-spacing: 3px;..text-transform: uppercase;..text-align: right;..font-weight: lighter;..margin-right: 10px;..}..minimize {..float: right;
<<< skipped >>>
Map
The PUP connects to the servers at the folowing location(s):
Strings from Dumps
%original file name%.exe_668:
`.rsrc
`.rsrc
u%Shh
u%Shh
@t-9}
@t-9}
NSSh:
NSSh:
FV<.tn>
FV<.tn>
F$.xE
F$.xE
J!"#$J%J&'()*J ,JJJJJJJJ-J.JJ/0J1JJJJJJJJJJJJJJJJJJ23JJ4567JJ8JJJJJ9:;JJJJJ?JJJJJJJJ@JJJJJJAJJJJJBJJCJJJJJJJJJJJDEJJJJJJJFJGJJJJJJJJJJJJHJI
J!"#$J%J&'()*J ,JJJJJJJJ-J.JJ/0J1JJJJJJJJJJJJJJJJJJ23JJ4567JJ8JJJJJ9:;JJJJJ?JJJJJJJJ@JJJJJJAJJJJJBJJCJJJJJJJJJJJDEJJJJJJJFJGJJJJJJJJJJJJHJI
j-hd}T
j-hd}T
j.hd}T
j.hd}T
%Program Files% (x86)\Microsoft Visual Studio 9.0\VC\atlmfc\include\atlexcept.h
%Program Files% (x86)\Microsoft Visual Studio 9.0\VC\atlmfc\include\atlexcept.h
HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0
HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0
kernel32.dll
kernel32.dll
%System%\drivers\vmmouse.sys
%System%\drivers\vmmouse.sys
%System%\drivers\vmhgfs.sys
%System%\drivers\vmhgfs.sys
%System%\drivers\VBoxMouse.sys
%System%\drivers\VBoxMouse.sys
sbiedll.dll
sbiedll.dll
%Program Files% (x86)\Microsoft Visual Studio 9.0\VC\include\xdebug
%Program Files% (x86)\Microsoft Visual Studio 9.0\VC\include\xdebug
%Program Files% (x86)\Microsoft Visual Studio 9.0\VC\include\streambuf
%Program Files% (x86)\Microsoft Visual Studio 9.0\VC\include\streambuf
SELECT * FROM Win32_BIOS WHERE Manufacturer LIKE '%XEN%')
SELECT * FROM Win32_BIOS WHERE Manufacturer LIKE '%XEN%')
%Program Files% (x86)\Microsoft Visual Studio 9.0\VC\atlmfc\include\cstringt.h
%Program Files% (x86)\Microsoft Visual Studio 9.0\VC\atlmfc\include\cstringt.h
%Program Files% (x86)\Microsoft Visual Studio 9.0\VC\include\xlocale
%Program Files% (x86)\Microsoft Visual Studio 9.0\VC\include\xlocale
%Program Files% (x86)\Microsoft Visual Studio 9.0\VC\include\xiosbase
%Program Files% (x86)\Microsoft Visual Studio 9.0\VC\include\xiosbase
Software\Microsoft\Windows\CurrentVersion\Uninstall
Software\Microsoft\Windows\CurrentVersion\Uninstall
Software\Classes\ProcMon.Logfile.1\shell\open\command
Software\Classes\ProcMon.Logfile.1\shell\open\command
IsWindowsServer
IsWindowsServer
hXXps://ssl.google-analytics.com/collect?
hXXps://ssl.google-analytics.com/collect?
IWX^^^^^gkmv"-88BDRXcgiu}$/:HOY]fsz 4IKTU_lo}&27>EMVefox#/6:?LV\]jp|"/35@@KSXgr "#2:=BOX_gly
IWX^^^^^gkmv"-88BDRXcgiu}$/:HOY]fsz 4IKTU_lo}&27>EMVefox#/6:?LV\]jp|"/35@@KSXgr "#2:=BOX_gly
%Program Files% (x86)\Microsoft Visual Studio 9.0\VC\include\xlocnum
%Program Files% (x86)\Microsoft Visual Studio 9.0\VC\include\xlocnum
JUUXXXXXZdqss},09DP
JUUXXXXXZdqss},09DP
CDGIIIIIQ[bbdpux!)7>AJO^eggoqvww| .
CDGIIIIIQ[bbdpux!)7>AJO^eggoqvww| .
LSXbbbbbfrxx&(7IQ`crt}-0:HNW
LSXbbbbbfrxx&(7IQ`crt}-0:HNW
APRRRRRRWdr (58>DQUUW]hkz#4CLV]ap}&/2>JT]`hjjptx$&0>CKKX`dlx{(7FHRZ\_h
APRRRRRRWdr (58>DQUUW]hkz#4CLV]ap}&/2>JT]`hjjptx$&0>CKKX`dlx{(7FHRZ\_h
BHKXXXXXddgpq"1@LX[iosu}*-8DLPWelwx})3;GIQ^dn}%(2>AIMOZ]bnp}!&.8BDIPVWdq
BHKXXXXXddgpq"1@LX[iosu}*-8DLPWelwx})3;GIQ^dn}%(2>AIMOZ]bnp}!&.8BDIPVWdq
NVW\\\\\fgu"&()6BFGPWZ`fjmx"",.4;EHWenqy*,6=GM\gnou&.;@HLTcrt}) :BCHSXbb
NVW\\\\\fgu"&()6BFGPWZ`fjmx"",.4;EHWenqy*,6=GM\gnou&.;@HLTcrt}) :BCHSXbb
CPSYYYYY_l{,:DKMR_fsv!""*79?JV^_kpu$