Susp_Dropper (Kaspersky), Zum.Ciusky.3 (AdAware), Worm.Win32.Ainslot.VB.FD, Worm.Win32.AutoIt.FD, WormAutoItGen.YR, WormAinslot_VariantOfZeus.YR, GenericAutorunWorm.YR (Lavasoft MAS)Behaviour: Worm, WormAutorun
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Summary
MD5: 193d470bfabbe930d96bf2d0da49a632
SHA1: 66e3cbb52292fc92c5e464b1605154c80e50cd4d
SHA256: cc5d4d702c5306d4030a09ada4602deada24d54229dd39e544b5561a009e3db1
SSDeep: 24576:G2O/GlVo29U94tcDxvIy0NLeFUSC7g6zwm4m53Sb2X:X9s8cDh0NgUSC5kFm53SyX
Size: 1000105 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2012-06-09 16:19:49
Analyzed on: WindowsXP SP3 32-bit
Summary: Worm. A program that is primarily replicating on networks or removable drives.
Dynamic Analysis
Payload
Behaviour | Description |
---|---|
WormAutorun | A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Zum's file once a user opens a drive's folder in Windows Explorer. |
Process activity
The Zum creates the following process(es):
WScript.exe:1948
KS132676434.com:1116
%original file name%.exe:772
The Zum injects its code into the following process(es):
RegSvcs.exe:292
Mutexes
The following mutexes were created/opened:No objects were found.
File activity
The process WScript.exe:1948 makes changes in the file system.
The Zum creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\Tar2.tmp (2712 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab5.tmp (49 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\2BF68F4714092295550497DD56F57004 (408 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\DC2135CED98D8A4D7C0CEE202BB0B810 (649 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (49 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (408 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab1.tmp (54 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar6.tmp (2712 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\5C8DDA36D60247082B142836039F4636 (16 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar4.tmp (2712 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\2BF68F4714092295550497DD56F57004 (18 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\DC2135CED98D8A4D7C0CEE202BB0B810 (172 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\F5A17C00E427F919C4A49EEF5AD0EE53 (196 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\F5A17C00E427F919C4A49EEF5AD0EE53 (522 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab3.tmp (54 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\5C8DDA36D60247082B142836039F4636 (196 bytes)
The Zum deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\Tar2.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab5.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab1.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar6.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar4.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab3.tmp (0 bytes)
The process KS132676434.com:1116 makes changes in the file system.
The Zum creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\lmggv\start.vbs (189 bytes)
%Documents and Settings%\%current user%\lmggv\start.cmd (71 bytes)
%Documents and Settings%\%current user%\Start Menu\Programs\Startup\start.lnk (1104 bytes)
The Zum deletes the following file(s):
%Documents and Settings%\%current user%\Start Menu\Programs\Startup\start.lnk (0 bytes)
The process %original file name%.exe:772 makes changes in the file system.
The Zum creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\lmggv\8543611.vbe (63 bytes)
%Documents and Settings%\%current user%\lmggv\3841358.AZQ (51608 bytes)
%Documents and Settings%\%current user%\lmggv\23203.NSN (3073 bytes)
%Documents and Settings%\%current user%\lmggv\13189.GXX (110 bytes)
%Documents and Settings%\%current user%\lmggv\KS132676434.com (15361 bytes)
The Zum deletes the following file(s):
%Documents and Settings%\%current user%\lmggv\__tmp_rar_sfx_access_check_1187937 (0 bytes)
Registry activity
The process RegSvcs.exe:292 makes changes in the system registry.
The Zum creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CC 2C ED 16 DC C1 A3 31 6D FB 89 56 6F 40 17 5C"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\VB and VBA Program Settings\SrvID\ID]
"ZAJTQ1F4C9" = "DataS 18/11"
[HKCU\Software\VB and VBA Program Settings\INSTALL\DATE]
"ZAJTQ1F4C9" = "November 28, 2015"
The process WScript.exe:1948 makes changes in the system registry.
The Zum creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9E 78 E8 3E 50 17 64 2A 0D F7 10 DE E1 68 8D 6E"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\E5215D3460C2C20BBE2D9FE5FB665DAA2C0E225C]
"Blob" = "04 00 00 00 01 00 00 00 10 00 00 00 6F 7E 74 A3"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C]
"Blob" = "19 00 00 00 01 00 00 00 10 00 00 00 A8 23 B4 A2"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%Documents and Settings%\%current user%\lmggv]
"KS132676434.com" = "AutoIt v3 Script"
The Zum modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass" = "1"
The Zum modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Zum modifies IE settings for security zones to map all urls to the Intranet Zone:
"IntranetName" = "1"
The Zum deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates]
"E5215D3460C2C20BBE2D9FE5FB665DAA2C0E225C"
[HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates]
"B1BC968BD4F49D622AA89A81F2150152A41D829C"
The process KS132676434.com:1116 makes changes in the system registry.
The Zum creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BC 23 15 6D 26 F7 57 CD 63 31 AD 4B FE 72 31 38"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Startup" = "%Documents and Settings%\%current user%\Start Menu\Programs\Startup"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonVideo" = "%Documents and Settings%\All Users\Documents\My Videos"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
"My Pictures" = "%Documents and Settings%\%current user%\My Documents\My Pictures"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoFolderOptions" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonMusic" = "%Documents and Settings%\All Users\Documents\My Music"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Start Menu" = "%Documents and Settings%\All Users\Start Menu"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Start Menu" = "%Documents and Settings%\%current user%\Start Menu"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonPictures" = "%Documents and Settings%\All Users\Documents\My Pictures"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"ShowSuperHidden" = "0"
To automatically run itself each time Windows is booted, the Zum adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"lmggv" = "C:\DOCUME~1\"%CurrentUserName%"\lmggv\start.vbs"
The process %original file name%.exe:772 makes changes in the system registry.
The Zum creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C4 EE 07 A4 3A 66 82 35 D4 DC FD 41 FD EB 0D 3F"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%System%]
"wscript.exe" = "Microsoft (R) Windows Based Script Host"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
The Zum modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Zum modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Zum modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Dropped PE files
MD5 | File path |
---|---|
71d8f6d5dc35517275bc38ebcc815f9f | c:\Documents and Settings\"%CurrentUserName%"\lmggv\KS132676434.com |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Zum's file once a user opens a drive's folder in Windows Explorer.
Removals
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
WScript.exe:1948
KS132676434.com:1116
%original file name%.exe:772 - Delete the original Zum file.
- Delete or disinfect the following files created/modified by the Zum:
%Documents and Settings%\%current user%\Local Settings\Temp\Tar2.tmp (2712 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab5.tmp (49 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\2BF68F4714092295550497DD56F57004 (408 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\DC2135CED98D8A4D7C0CEE202BB0B810 (649 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (49 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (408 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab1.tmp (54 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar6.tmp (2712 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\5C8DDA36D60247082B142836039F4636 (16 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Tar4.tmp (2712 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\2BF68F4714092295550497DD56F57004 (18 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\DC2135CED98D8A4D7C0CEE202BB0B810 (172 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\F5A17C00E427F919C4A49EEF5AD0EE53 (196 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\Content\F5A17C00E427F919C4A49EEF5AD0EE53 (522 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Cab3.tmp (54 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\CryptnetUrlCache\MetaData\5C8DDA36D60247082B142836039F4636 (196 bytes)
%Documents and Settings%\%current user%\lmggv\start.vbs (189 bytes)
%Documents and Settings%\%current user%\lmggv\start.cmd (71 bytes)
%Documents and Settings%\%current user%\Start Menu\Programs\Startup\start.lnk (1104 bytes)
%Documents and Settings%\%current user%\lmggv\8543611.vbe (63 bytes)
%Documents and Settings%\%current user%\lmggv\3841358.AZQ (51608 bytes)
%Documents and Settings%\%current user%\lmggv\23203.NSN (3073 bytes)
%Documents and Settings%\%current user%\lmggv\13189.GXX (110 bytes)
%Documents and Settings%\%current user%\lmggv\KS132676434.com (15361 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce]
"lmggv" = "C:\DOCUME~1\"%CurrentUserName%"\lmggv\start.vbs" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Find and delete all copies of the worm's file together with "autorun.inf" scripts on removable drives.
- Reboot the computer.
Static Analysis
VersionInfo
Company Name:
Product Name:
Product Version:
Legal Copyright:
Legal Trademarks:
Original Filename:
Internal Name:
File Version:
File Description:
Comments:
Language: English (United States)
Company Name: Product Name: Product Version: Legal Copyright: Legal Trademarks: Original Filename: Internal Name: File Version: File Description: Comments: Language: English (United States)
PE Sections
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
---|---|---|---|---|---|
.text | 4096 | 74526 | 74752 | 4.54396 | a8692f5ba740240ef0f9a827376f76f9 |
.rdata | 81920 | 7445 | 7680 | 3.46159 | d4f36accffde0bf520f52486679ccf0d |
.data | 90112 | 96036 | 512 | 2.46008 | b6c7edb5b7fec47a37a622cc5d71f3f4 |
.CRT | 188416 | 32 | 512 | 0.273198 | 439411041ee0b8261668525c5c132cd9 |
.rsrc | 192512 | 59556 | 59904 | 4.2302 | 6ab244a85706ffcae3c4a81b64debf42 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Total found: 2
75b0b4288dd1e82729f3b0f79df64a25
1b925ad0ae55e9c9fa8107526e8ea524
Network Activity
URLs
URL | IP |
---|---|
hxxp://a767.dspw65.akamai.net/msdownload/update/v3/static/trustedr/en/authrootseq.txt | |
hxxp://a767.dspw65.akamai.net/msdownload/update/v3/static/trustedr/en/authrootstl.cab | |
hxxp://crl.globalsign.net/Root.crl | 108.162.232.197 |
hxxp://crl.globalsign.net/primobject.crl | 108.162.232.197 |
hxxp://crl.globalsign.net/ObjectSign.crl | 108.162.232.197 |
hxxp://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab | 87.245.221.107 |
hxxp://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootseq.txt | 87.245.221.107 |
dkn.dyndns.info | 184.169.145.165 |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET /Root.crl HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: crl.globalsign.net
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
HTTP/1.1 200 OK
Date: Sat, 28 Nov 2015 08:07:01 GMT
Content-Type: application/pkix-crl
Content-Length: 649
Connection: keep-alive
Set-Cookie: __cfduid=d65e01e2650248440dc15e119f04bbbf41448698021; expires=Sun, 27-Nov-16 08:07:01 GMT; path=/; domain=.globalsign.net; HttpOnly
Last-Modified: Wed, 07 Oct 2015 00:00:00 GMT
ETag: "56146080-289"
CF-Cache-Status: HIT
Expires: Wed, 02 Dec 2015 08:07:01 GMT
Cache-Control: public, max-age=345600
Accept-Ranges: bytes
Server: cloudflare-nginx
CF-RAY: 24c493a7b3b42afd-WAW
0...0..m...0...*.H........0W1.0...U....BE1.0...U....GlobalSign nv-sa1.0...U....Root CA1.0...U....GlobalSign Root CA..151007000000Z..160115000000Z0..0*.........D.....141125000000Z0.0...U.......0*........)E.....141125000000Z0.0...U.......0*........ ...h..141125000000Z0.0...U.......0*........,^.....141125000000Z0.0...U......../0-0...U......20...U.#..0...`{f.E....P/}..4....K0...*.H.............<.............&..,t...[..:.A..*.H..w........=.E.{(-ekb..?.....y....k..e..59B>Z....O`.].`!......7....I.^..T..e.[..K.....V.4B.U.B.!........R....... ..07b...j..c."..%[..o..i..I..A^......O$..R.2.....v"....*...9...ueET....xz..R.Gm....-...r.[..s......;,..`.W...8HTTP/1.1 200 OK..Date: Sat, 28 Nov 2015 08:07:01 GMT..Content-Type: application/pkix-crl..Content-Length: 649..Connection: keep-alive..Set-Cookie: __cfduid=d65e01e2650248440dc15e119f04bbbf41448698021; expires=Sun, 27-Nov-16 08:07:01 GMT; path=/; domain=.globalsign.net; HttpOnly..Last-Modified: Wed, 07 Oct 2015 00:00:00 GMT..ETag: "56146080-289"..CF-Cache-Status: HIT..Expires: Wed, 02 Dec 2015 08:07:01 GMT..Cache-Control: public, max-age=345600..Accept-Ranges: bytes..Server: cloudflare-nginx..CF-RAY: 24c493a7b3b42afd-WAW..0...0..m...0...*.H........0W1.0...U....BE1.0...U....GlobalSign nv-sa1.0...U....Root CA1.0...U....GlobalSign Root CA..151007000000Z..160115000000Z0..0*.........D.....141125000000Z0.0...U.......0*........)E.....141125000000Z0.0...U.......0*........ ...h..141125000000Z0.0...U.......0*........,^.....141125000000Z0.0...U......../0-0...U......20...U.#..0...`
<<< skipped >>>
GET /primobject.crl HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: crl.globalsign.net
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
HTTP/1.1 200 OK
Date: Sat, 28 Nov 2015 08:07:01 GMT
Content-Type: application/pkix-crl
Content-Length: 522
Connection: keep-alive
Set-Cookie: __cfduid=d65e01e2650248440dc15e119f04bbbf41448698021; expires=Sun, 27-Nov-16 08:07:01 GMT; path=/; domain=.globalsign.net; HttpOnly
Last-Modified: Tue, 26 Aug 2014 06:00:00 GMT
ETag: "53fc2260-20a"
CF-Cache-Status: HIT
Expires: Wed, 02 Dec 2015 08:07:01 GMT
Cache-Control: public, max-age=345600
Accept-Ranges: bytes
Server: cloudflare-nginx
CF-RAY: 24c493a893eb2afd-WAW
0...0..0...*.H........0..1.0...U....BE1.0...U....GlobalSign nv-sa1%0#..U....Primary Object Publishing CA100...U...'GlobalSign Primary Object Publishing CA..140826060000Z..340826060000Z0<0..........D.....140826060000Z0.........#...$..140826060000Z0...*.H.............U/......w..J'S..V...4.......l.v.z,.8...rP..K.;U'....'.5Y.I-.4.xt{..P...3..h....^.(...!.(.]I...{K...I.I|<-..X>.......h....S&..].....e...\..q>./'......&.Dl...g<P.n.NB.m....L......y..c....Z.*_J..e.j .{.......HP.9.......m.bYR.*y.=.^..._@C5....Ax...v....w..L.l.HTTP/1.1 200 OK..Date: Sat, 28 Nov 2015 08:07:01 GMT..Content-Type: application/pkix-crl..Content-Length: 522..Connection: keep-alive..Set-Cookie: __cfduid=d65e01e2650248440dc15e119f04bbbf41448698021; expires=Sun, 27-Nov-16 08:07:01 GMT; path=/; domain=.globalsign.net; HttpOnly..Last-Modified: Tue, 26 Aug 2014 06:00:00 GMT..ETag: "53fc2260-20a"..CF-Cache-Status: HIT..Expires: Wed, 02 Dec 2015 08:07:01 GMT..Cache-Control: public, max-age=345600..Accept-Ranges: bytes..Server: cloudflare-nginx..CF-RAY: 24c493a893eb2afd-WAW..0...0..0...*.H........0..1.0...U....BE1.0...U....GlobalSign nv-sa1%0#..U....Primary Object Publishing CA100...U...'GlobalSign Primary Object Publishing CA..140826060000Z..340826060000Z0<0..........D.....140826060000Z0.........#...$..140826060000Z0...*.H.............U/......w..J'S..V...4.......l.v.z,.8...rP..K.;U'....'.5Y.I-.4.xt{..P...3..h....^.(...!.(.]I...{K...I.I|<-..X>.......h....S&..].....e...\..q>./'......&.Dl...g<P.n.NB.m....L......y..c....Z.*_J.
<<< skipped >>>
GET /ObjectSign.crl HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: crl.globalsign.net
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
HTTP/1.1 200 OK
Date: Sat, 28 Nov 2015 08:07:01 GMT
Content-Type: application/pkix-crl
Content-Length: 16373
Connection: keep-alive
Set-Cookie: __cfduid=d65e01e2650248440dc15e119f04bbbf41448698021; expires=Sun, 27-Nov-16 08:07:01 GMT; path=/; domain=.globalsign.net; HttpOnly
Expires: Sun, 27 Nov 2016 08:07:01 GMT
Last-Modified: Thu, 30 Oct 2014 06:06:00 GMT
Cache-Control: public, max-age=31536000
CF-Cache-Status: HIT
Accept-Ranges: bytes
Server: cloudflare-nginx
CF-RAY: 24c493a984292afd-WAW
0.?.0.>....0...*.H........0c1.0...U....BE1.0...U....GlobalSign nv-sa1.0...U....ObjectSign CA1!0...U....GlobalSign ObjectSign CA..141030060600Z..141129060600Z0.>.0..........^.j...040129001213Z0..........f.. ..040202091917Z0..........vH....040305110232Z0............J...040210151616Z0............&...040602085222Z0............ ...040226145836Z0...........Z....040304093239Z0.............1..040730121905Z0...........tX...040302112147Z0..........4].o..040415082543Z0..........?..S..040325074453Z0..........N.....040319124009Z0..........z.....040324015008Z0............2...040423113142Z0............d...040407165443Z0...........U....040408151325Z0............n...040513080428Z0...........W.w..040420082751Z0................040709140744Z0.......... [...040517130701Z0..........n.e...040511112838Z0..........."e...040618111142Z0................040618132437Z0..........-,....040726125011Z0..........P.....040713133516Z0...........$np..040713081606Z0...........-.`..040712154511Z0...........GhP..040803152358Z0................041104122706Z0...........w....040729111337Z0...........w....040802140837Z0............6_..040802135538Z0.......... ..X..040811132723Z0..........4.....040811133024Z0..........S..b..040827125951Z0..........WT....040827105840Z0..........v.$...050530083427Z0................040826104859Z0................040907113309Z0..........."....041011111814Z0............y...041025113522Z0............^...040929131800Z0...........". ..040915112117Z0...........&....040928082222Z0.............?..040924130237Z0............7...04
<<< skipped >>>
GET /msdownload/update/v3/static/trustedr/en/authrootseq.txt HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: VVV.download.windowsupdate.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
HTTP/1.1 200 OK
Cache-Control: max-age=604800
Content-Type: text/plain
Last-Modified: Thu, 19 Nov 2015 23:18:43 GMT
Accept-Ranges: bytes
ETag: "808bbea12023d11:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Content-Length: 18
Date: Sat, 28 Nov 2015 08:06:59 GMT
Connection: keep-alive
X-CCC: UA
X-CID: 2
1401D12320A2285D79HTTP/1.1 200 OK..Cache-Control: max-age=604800..Content-Type: text/plain..Last-Modified: Thu, 19 Nov 2015 23:18:43 GMT..Accept-Ranges: bytes..ETag: "808bbea12023d11:0"..Server: Microsoft-IIS/7.5..X-Powered-By: ASP.NET..Content-Length: 18..Date: Sat, 28 Nov 2015 08:06:59 GMT..Connection: keep-alive..X-CCC: UA..X-CID: 2..1401D12320A2285D79....
GET /msdownload/update/v3/static/trustedr/en/authrootstl.cab HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/5.131.2600.5512
Host: VVV.download.windowsupdate.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
HTTP/1.1 200 OK
Cache-Control: max-age=604800
Content-Type: application/octet-stream
Last-Modified: Fri, 20 Nov 2015 00:02:21 GMT
Accept-Ranges: bytes
ETag: "80a431ba2623d11:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Content-Length: 49695
Date: Sat, 28 Nov 2015 08:07:00 GMT
Connection: keep-alive
X-CCC: UA
X-CID: 2
MSCF............,...................I.......l.........sGe. .authroot.stl.|.V.C9..CK...<T.......%....^..!OD.....N.l.Gy4*.GI.H%.$.........DH.$%[.gF.t..{..._....9..;3.....r..n.oy.q*....y`vB.8_E..&.0..r..*...DX!.y...S..F.8....y4.....`...f.$p.....y.N.a.l..a.U.0Mu..?}.....!.{...t..bu.7)....M.............?.;.g...P.)..a..._..O....k...-.G.Q.)w.1!..[...k'..!;kT...&..=.E....I!..N. .yu......4.Z5.$Wx.[.t...i~..Ht..Opc ..3....B. (..k.0H.... zK......=k..........A....... ..A(u.!...1Z.I`.s,\./..<..sY....;.w91^d.....zXY.Y8.<,........xU..:/.;..N.....jB..j...i.tE.....1*k...V.mP..Z......C.....Kc.....j.......-..l.....[mA .n.......AO .J..7iy.z.`.5...:..S...J....Y..Z..je...5..8.~.2...n.&\...Z>.....WJ........q.[.n...3J...fy.......T...I.olj.A.1....N....<..A....i...?.6s.1.Q.C....X........n?.e...7>..T......v.;.....<.NKql...].....qhN.~.i....FS..-4.e.$o))...Z"..z2.n...[~ ..B(...N..!.....5<-WB.L..Q.5.U.0j?...9.5.b.7_o.|.|...o|S.g.1......cW..../...7>h<..::c&<..!..ad...v.-.D..E......*.3. R`,.....-.DF./......"[`z8.F.$.@.A...e..&\Ea.."BD6..e..8X.I.^v6.^].j.b...H!E...8^..SB!......`..|Q.=..N...[3..>,7D..F:..a6.o..2....d'...............!k...%.y..:.?.4#./..4....*....|...G..2....z.Y.&..0*...p..f!@..-...5..z...' ..{Of.c.....Q....7f...XI.|.......xXX9E...M....h.a..b.}j..@.. ....#bYW...sl...;~R1'K..Wr.:}.......P#.......@h~..<....[......|.~.<=.O.....%.)*t*B.q.Q...^.........Da.^Ie......)..{W.....R._................g.2..B....1..IK..=1sn...n....'..8.8.L.c..........%..dP....tI3....Pz[..K.#..~..;..n....1L"L/$.yj..k..O.
<<< skipped >>>
Map
The Zum connects to the servers at the folowing location(s):
Strings from Dumps
KS132676434.com_1116:
.text
.text
`.rdata
`.rdata
@.data
@.data
.rsrc
.rsrc
@.reloc
@.reloc
s%j.Zf
s%j.Zf
8crtsu
8crtsu
:crts
:crts
crts
crts
GetProcessWindowStation
GetProcessWindowStation
operator
operator
uxtheme.dll
uxtheme.dll
kernel32.dll
kernel32.dll
operand of unlimited repeat could match the empty string
operand of unlimited repeat could match the empty string
POSIX named classes are supported only within a class
POSIX named classes are supported only within a class
erroffset passed as NULL
erroffset passed as NULL
POSIX collating elements are not supported
POSIX collating elements are not supported
this version of PCRE is not compiled with PCRE_UTF8 support
this version of PCRE is not compiled with PCRE_UTF8 support
PCRE does not support \L, \l, \N{name}, \U, or \u
PCRE does not support \L, \l, \N{name}, \U, or \u
support for \P, \p, and \X has not been compiled
support for \P, \p, and \X has not been compiled
this version of PCRE is not compiled with PCRE_UCP support
this version of PCRE is not compiled with PCRE_UCP support
ICMP.DLL
ICMP.DLL
advapi32.dll
advapi32.dll
RegDeleteKeyExW
RegDeleteKeyExW
Error text not found (please report)
Error text not found (please report)
WSOCK32.dll
WSOCK32.dll
VERSION.dll
VERSION.dll
WINMM.dll
WINMM.dll
COMCTL32.dll
COMCTL32.dll
MPR.dll
MPR.dll
InternetCrackUrlW
InternetCrackUrlW
HttpQueryInfoW
HttpQueryInfoW
HttpOpenRequestW
HttpOpenRequestW
HttpSendRequestW
HttpSendRequestW
FtpOpenFileW
FtpOpenFileW
FtpGetFileSize
FtpGetFileSize
InternetOpenUrlW
InternetOpenUrlW
WININET.dll
WININET.dll
PSAPI.DLL
PSAPI.DLL
USERENV.dll
USERENV.dll
GetProcessHeap
GetProcessHeap
CreatePipe
CreatePipe
GetWindowsDirectoryW
GetWindowsDirectoryW
KERNEL32.dll
KERNEL32.dll
OpenWindowStationW
OpenWindowStationW
SetProcessWindowStation
SetProcessWindowStation
CloseWindowStation
CloseWindowStation
MapVirtualKeyW
MapVirtualKeyW
EnumChildWindows
EnumChildWindows
EnumWindows
EnumWindows
VkKeyScanW
VkKeyScanW
GetKeyState
GetKeyState
GetKeyboardState
GetKeyboardState
SetKeyboardState
SetKeyboardState
GetAsyncKeyState
GetAsyncKeyState
keybd_event
keybd_event
EnumThreadWindows
EnumThreadWindows
ExitWindowsEx
ExitWindowsEx
UnregisterHotKey
UnregisterHotKey
RegisterHotKey
RegisterHotKey
GetKeyboardLayoutNameW
GetKeyboardLayoutNameW
USER32.dll
USER32.dll
SetViewportOrgEx
SetViewportOrgEx
GDI32.dll
GDI32.dll
COMDLG32.dll
COMDLG32.dll
RegOpenKeyExW
RegOpenKeyExW
RegCloseKey
RegCloseKey
RegCreateKeyExW
RegCreateKeyExW
RegEnumKeyExW
RegEnumKeyExW
RegDeleteKeyW
RegDeleteKeyW
ADVAPI32.dll
ADVAPI32.dll
ShellExecuteW
ShellExecuteW
SHFileOperationW
SHFileOperationW
ShellExecuteExW
ShellExecuteExW
SHELL32.dll
SHELL32.dll
ole32.dll
ole32.dll
OLEAUT32.dll
OLEAUT32.dll
GetCPInfo
GetCPInfo
zcÃ
zcÃ
L.aVFY)
L.aVFY)
.ijjrc
.ijjrc
g%D`-
g%D`-
sssh6
sssh6
uW.MW
uW.MW
3.3/464(5,5054585
3.3/464(5,5054585
8 8$8(8,808
8 8$8(8,808
= =$=(=,=0=4=8=
= =$=(=,=0=4=8=
0 0$0(0,0004080
0 0$0(0,0004080
:*;3;?;|;
:*;3;?;|;
11
11
2 323[3.5
2 323[3.5
? ?@?`?
? ?@?`?
= =$=(=,=0=4=
= =$=(=,=0=4=
5 5$5(5,5054585
5 5$5(5,5054585
CADjD%D
CADjD%D
mscoree.dll
mscoree.dll
nKERNEL32.DLL
nKERNEL32.DLL
- Attempt to initialize the CRT more than once.
- Attempt to initialize the CRT more than once.
- CRT not initialized
- CRT not initialized
- floating point support not loaded
- floating point support not loaded
WUSER32.DLL
WUSER32.DLL
CMDLINERAW
CMDLINERAW
CMDLINE
CMDLINE
/AutoIt3ExecuteLine
/AutoIt3ExecuteLine
/AutoIt3ExecuteScript
/AutoIt3ExecuteScript
%s (%d) : ==> %s.:
%s (%d) : ==> %s.:
Line %d:
Line %d:
Line %d (File "%s"):
Line %d (File "%s"):
%s (%d) : ==> %s:
%s (%d) : ==> %s:
AutoIt script files (*.au3, *.a3x)
AutoIt script files (*.au3, *.a3x)
*.au3;*.a3x
*.au3;*.a3x
All files (*.*)
All files (*.*)
#NoAutoIt3Execute
#NoAutoIt3Execute
APPSKEY
APPSKEY
Line %d:
Line %d:
04090000
04090000
%u.%u.%u.%u
%u.%u.%u.%u
0.0.0.0
0.0.0.0
Mddddd
Mddddd
%s (%d) : ==> %s:
%s (%d) : ==> %s:
UDPSTARTUP
UDPSTARTUP
UDPSHUTDOWN
UDPSHUTDOWN
UDPSEND
UDPSEND
UDPRECV
UDPRECV
UDPOPEN
UDPOPEN
UDPCLOSESOCKET
UDPCLOSESOCKET
UDPBIND
UDPBIND
TRAYGETMSG
TRAYGETMSG
TCPSTARTUP
TCPSTARTUP
TCPSHUTDOWN
TCPSHUTDOWN
TCPSEND
TCPSEND
TCPRECV
TCPRECV
TCPNAMETOIP
TCPNAMETOIP
TCPLISTEN
TCPLISTEN
TCPCONNECT
TCPCONNECT
TCPCLOSESOCKET
TCPCLOSESOCKET
TCPACCEPT
TCPACCEPT
SHELLEXECUTEWAIT
SHELLEXECUTEWAIT
SHELLEXECUTE
SHELLEXECUTE
REGENUMKEY
REGENUMKEY
MSGBOX
MSGBOX
ISKEYWORD
ISKEYWORD
HTTPSETUSERAGENT
HTTPSETUSERAGENT
HTTPSETPROXY
HTTPSETPROXY
HOTKEYSET
HOTKEYSET
GUIREGISTERMSG
GUIREGISTERMSG
GUIGETMSG
GUIGETMSG
GUICTRLSENDMSG
GUICTRLSENDMSG
GUICTRLRECVMSG
GUICTRLRECVMSG
FTPSETPROXY
FTPSETPROXY
\??\%s
\??\%s
GUI_RUNDEFMSG
GUI_RUNDEFMSG
SendKeyDelay
SendKeyDelay
SendKeyDownDelay
SendKeyDownDelay
TCPTimeout
TCPTimeout
AUTOITCALLVARIABLE%d
AUTOITCALLVARIABLE%d
255.255.255.255
255.255.255.255
Keyword
Keyword
AutoIt.Error
AutoIt.Error
Null Object assignment in FOR..IN loop
Null Object assignment in FOR..IN loop
Incorrect Object type in FOR..IN loop
Incorrect Object type in FOR..IN loop
HOTKEYPRESSED
HOTKEYPRESSED
AUTOITEXE
AUTOITEXE
WINDOWSDIR
WINDOWSDIR
3, 3, 8, 1
3, 3, 8, 1
HKEY_LOCAL_MACHINE
HKEY_LOCAL_MACHINE
HKEY_CLASSES_ROOT
HKEY_CLASSES_ROOT
HKEY_CURRENT_CONFIG
HKEY_CURRENT_CONFIG
HKEY_CURRENT_USER
HKEY_CURRENT_USER
HKEY_USERS
HKEY_USERS
%d/d/d
%d/d/d
%Documents and Settings%\%current user%\lmggv\KS132676434.com
%Documents and Settings%\%current user%\lmggv\KS132676434.com
:%Documents and Settings%\%current user%\lmggv\3841358.AZQ
:%Documents and Settings%\%current user%\lmggv\3841358.AZQ
AutoIt supports the __stdcall (WINAPI) and __cdecl calling conventions. The __stdcall (WINAPI) convention is used by default but __cdecl can be used instead. See the DllCall() documentation for details on changing the calling convention.
AutoIt supports the __stdcall (WINAPI) and __cdecl calling conventions. The __stdcall (WINAPI) convention is used by default but __cdecl can be used instead. See the DllCall() documentation for details on changing the calling convention.
Missing operator in expression."Unbalanced brackets in expression.
Missing operator in expression."Unbalanced brackets in expression.
Error parsing function call.0Incorrect number of parameters in function call.'"ReDim" used without an array variable.>Illegal text at the end of statement (one statement per line).1"If" statement has no matching "EndIf" statement.1"Else" statement with no matching "If" statement.2"EndIf" statement with no matching "If" statement.7Too many "Else" statements for matching "If" statement.3"While" statement has no matching "Wend" statement.4"Wend" statement with no matching "While" statement.%Variable used without being declared.XArray variable has incorrect number of subscripts or subscript dimension range exceeded.)Array variable subscript badly formatted.'Subscript used with non-Array variable.&Too many subscripts used for an array.0Missing subscript dimensions in "Dim" statement.NNo variable given for "Dim", "Local", "Global", "Struct" or "Const" statement.0Expected a "=" operator in assignment statement.*Invalid keyword at the start of this line.
Error parsing function call.0Incorrect number of parameters in function call.'"ReDim" used without an array variable.>Illegal text at the end of statement (one statement per line).1"If" statement has no matching "EndIf" statement.1"Else" statement with no matching "If" statement.2"EndIf" statement with no matching "If" statement.7Too many "Else" statements for matching "If" statement.3"While" statement has no matching "Wend" statement.4"Wend" statement with no matching "While" statement.%Variable used without being declared.XArray variable has incorrect number of subscripts or subscript dimension range exceeded.)Array variable subscript badly formatted.'Subscript used with non-Array variable.&Too many subscripts used for an array.0Missing subscript dimensions in "Dim" statement.NNo variable given for "Dim", "Local", "Global", "Struct" or "Const" statement.0Expected a "=" operator in assignment statement.*Invalid keyword at the start of this line.
Invalid element in a DllStruct.*Unknown option or bad parameter specified.&Unable to load the internet libraries./"Struct" statement has no matching "EndStruct".HUnable to open file, the maximum number of open files has been exceeded.K"ContinueLoop" statement with no matching "While", "Do" or "For" statement.
Invalid element in a DllStruct.*Unknown option or bad parameter specified.&Unable to load the internet libraries./"Struct" statement has no matching "EndStruct".HUnable to open file, the maximum number of open files has been exceeded.K"ContinueLoop" statement with no matching "While", "Do" or "For" statement.
Invalid file filter given.*Expected a variable in user function call.1"Do" statement has no matching "Until" statement.2"Until" statement with no matching "Do" statement.#"For" statement is badly formatted.2"Next" statement with no matching "For" statement.N"ExitLoop/ContinueLoop" statements only valid from inside a For/Do/While loop.1"For" statement has no matching "Next" statement.@"Case" statement with no matching "Select"or "Switch" statement.:"EndSelect" statement with no matching "Select" statement.ORecursion level has been exceeded - AutoIt will quit to prevent stack overflow.&Cannot make existing variables static.4Cannot make static variables into regular variables.
Invalid file filter given.*Expected a variable in user function call.1"Do" statement has no matching "Until" statement.2"Until" statement with no matching "Do" statement.#"For" statement is badly formatted.2"Next" statement with no matching "For" statement.N"ExitLoop/ContinueLoop" statements only valid from inside a For/Do/While loop.1"For" statement has no matching "Next" statement.@"Case" statement with no matching "Select"or "Switch" statement.:"EndSelect" statement with no matching "Select" statement.ORecursion level has been exceeded - AutoIt will quit to prevent stack overflow.&Cannot make existing variables static.4Cannot make static variables into regular variables.
3This keyword cannot be used after a "Then" keyword.>"Select" statement is missing "EndSelect" or "Case" statement. "If" statements must have a "Then" keyword. Badly formated Struct statement."Cannot assign values to constants..Cannot make existing variables into constants.9Only Object-type variables allowed in a "With" statement.v"long_ptr", "int_ptr" and "short_ptr" DllCall() types have been deprecated. Use "long*", "int*" and "short*" instead.-Object referenced outside a "With" statement.)Nested "With" statements are not allowed."Variable must be of type "Object".1The requested action with this object has failed.8Variable appears more than once in function declaration.2ReDim array can not be initialized in this manner.1An array variable can not be used in this manner.
3This keyword cannot be used after a "Then" keyword.>"Select" statement is missing "EndSelect" or "Case" statement. "If" statements must have a "Then" keyword. Badly formated Struct statement."Cannot assign values to constants..Cannot make existing variables into constants.9Only Object-type variables allowed in a "With" statement.v"long_ptr", "int_ptr" and "short_ptr" DllCall() types have been deprecated. Use "long*", "int*" and "short*" instead.-Object referenced outside a "With" statement.)Nested "With" statements are not allowed."Variable must be of type "Object".1The requested action with this object has failed.8Variable appears more than once in function declaration.2ReDim array can not be initialized in this manner.1An array variable can not be used in this manner.
Can not redeclare a constant.5Can not redeclare a parameter inside a user function.HCan pass constants by reference only to parameters with "Const" keyword.*Can not initialize a variable with itself.$Incorrect way to use this parameter.:"EndSwitch" statement with no matching "Switch" statement.>"Switch" statement is missing "EndSwitch" or "Case" statement.H"ContinueCase" statement with no matching "Select"or "Switch" statement.
Can not redeclare a constant.5Can not redeclare a parameter inside a user function.HCan pass constants by reference only to parameters with "Const" keyword.*Can not initialize a variable with itself.$Incorrect way to use this parameter.:"EndSwitch" statement with no matching "Switch" statement.>"Switch" statement is missing "EndSwitch" or "Case" statement.H"ContinueCase" statement with no matching "Select"or "Switch" statement.
String missing closing quote.!Badly formated variable or macro.*Missing separator character after keyword.
String missing closing quote.!Badly formated variable or macro.*Missing separator character after keyword.
hXXp://VVV.autoitscript.com/autoit3/
hXXp://VVV.autoitscript.com/autoit3/
AutoIt3.exe
AutoIt3.exe
RegSvcs.exe_292:
.text
.text
`.data
`.data
.rsrc
.rsrc
MSVBVM60.DLL
MSVBVM60.DLL
bss_server.usrReverseRelay
bss_server.usrReverseRelay
tmrWebHide
tmrWebHide
bss_server.Socket
bss_server.Socket
bss_server.usrRelay
bss_server.usrRelay
ieframe.dll
ieframe.dll
SHDocVwCtl.WebBrowser
SHDocVwCtl.WebBrowser
WebBrowser
WebBrowser
mswinsck.ocx
mswinsck.ocx
MSWinsockLib.Winsock
MSWinsockLib.Winsock
modLaunchWeb
modLaunchWeb
%Program Files% (x86)\Microsoft Visual Studio\VB98\VB6.OLB
%Program Files% (x86)\Microsoft Visual Studio\VB98\VB6.OLB
C:\Windows\SysWOW64\ieframe.dll
C:\Windows\SysWOW64\ieframe.dll
winmm.dll
winmm.dll
user32.dll
user32.dll
advapi32.dll
advapi32.dll
shell32.dll
shell32.dll
kernel32.dll
kernel32.dll
avicap32.dll
avicap32.dll
advpack.dll
advpack.dll
GetAsyncKeyState
GetAsyncKeyState
SetWindowsHookExA
SetWindowsHookExA
UnhookWindowsHookEx
UnhookWindowsHookEx
GetKeyboardLayout
GetKeyboardLayout
GetKeyboardState
GetKeyboardState
GetKeyState
GetKeyState
SHFileOperationA
SHFileOperationA
CreatePipe
CreatePipe
PSAPI.DLL
PSAPI.DLL
GetTcpTable
GetTcpTable
ExitWindowsEx
ExitWindowsEx
EnumWindows
EnumWindows
WinInet.dll
WinInet.dll
DeleteUrlCacheEntryA
DeleteUrlCacheEntryA
urlmon
urlmon
URLDownloadToFileA
URLDownloadToFileA
ShellExecuteA
ShellExecuteA
keybd_event
keybd_event
CHAT_ADDMSG
CHAT_ADDMSG
VBA6.DLL
VBA6.DLL
ws2_32.dll
ws2_32.dll
D:\Blackshades Project\bs_net\loginserver\msvbvm60.dll\3
D:\Blackshades Project\bs_net\loginserver\msvbvm60.dll\3
AddMsg
AddMsg
olepro32.dll
olepro32.dll
GdiplusShutdown
GdiplusShutdown
RemotePort
RemotePort
LocalPort
LocalPort
WSOCK32.DLL
WSOCK32.DLL
RegCloseKey
RegCloseKey
RegOpenKeyExA
RegOpenKeyExA
ntdll.dll
ntdll.dll
C:\Windows\SysWOW64\ieframe.oca
C:\Windows\SysWOW64\ieframe.oca
%Program Files% (x86)\Microsoft Visual Studio\VB98\mswinsck.oca
%Program Files% (x86)\Microsoft Visual Studio\VB98\mswinsck.oca
tmrTCP
tmrTCP
tmrUDP
tmrUDP
UDPSocket
UDPSocket
UDPFlood
UDPFlood
ole32.dll
ole32.dll
crypt32.dll
crypt32.dll
oleaut32.dll
oleaut32.dll
RegOpenKeyA
RegOpenKeyA
FindFirstUrlCacheEntryA
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
FindNextUrlCacheEntryA
`txtPassword
`txtPassword
imgLoginPressed
imgLoginPressed
imgLogin
imgLogin
RegCreateKeyA
RegCreateKeyA
RegDeleteKeyA
RegDeleteKeyA
RegEnumKeyExA
RegEnumKeyExA
gdi32.dll
gdi32.dll
InternetOpenUrlA
InternetOpenUrlA
FtpGetFileA
FtpGetFileA
FtpPutFileA
FtpPutFileA
FtpSetCurrentDirectoryA
FtpSetCurrentDirectoryA
FtpGetCurrentDirectoryA
FtpGetCurrentDirectoryA
FtpOpenFileA
FtpOpenFileA
FtpGetFileSize
FtpGetFileSize
FtpDeleteFileA
FtpDeleteFileA
FtpCreateDirectoryA
FtpCreateDirectoryA
FtpRemoveDirectoryA
FtpRemoveDirectoryA
FtpRenameFileA
FtpRenameFileA
FtpDownload
FtpDownload
FtpUpload
FtpUpload
FtpGetDirectory
FtpGetDirectory
Http_DownloadFile
Http_DownloadFile
cmdShowfiles
cmdShowfiles
msvbvm60.dll
msvbvm60.dll
?8??8??8??8??8?
?8??8??8??8??8?
txtPassword
txtPassword
2>e%Xdq
2>e%Xdq
uMsg
uMsg
strMsg
strMsg
MsgNum
MsgNum
AllMsgs
AllMsgs
lngPort
lngPort
URL_TARGET
URL_TARGET
Port
Port
Password
Password
WebURL
WebURL
Returns/Sets the port to be connected to on the remote computer
Returns/Sets the port to be connected to on the remote computer
Returns/Sets the port used on the local computer
Returns/Sets the port used on the local computer
Binds socket to specific port and adapter
Binds socket to specific port and adapter
Occurs after a send operation has completed
Occurs after a send operation has completed
*\AD:\Blackshades Project\bs_net\server\server.vbp
*\AD:\Blackshades Project\bs_net\server\server.vbp
2c49f800-c2dd-11cf-9ad6-0080c7e7b78d
2c49f800-c2dd-11cf-9ad6-0080c7e7b78d
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1) Gecko/20090612 Firefox/3.5
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1) Gecko/20090612 Firefox/3.5
{00020404-0000-0000-C000-000000000046}
{00020404-0000-0000-C000-000000000046}
5.5.1
5.5.1
\nir_cmd.bss speak text
\nir_cmd.bss speak text
\nir_cmd.bss setsysvolume 65535
\nir_cmd.bss setsysvolume 65535
\nir_cmd.bss mutesysvolume 1
\nir_cmd.bss mutesysvolume 1
\nir_cmd.bss mutesysvolume 0
\nir_cmd.bss mutesysvolume 0
\nir_cmd.bss screensaver
\nir_cmd.bss screensaver
\nir_cmd.bss monitor off
\nir_cmd.bss monitor off
\nir_cmd.bss monitor on
\nir_cmd.bss monitor on
PORT
PORT
TRANSFERPORT
TRANSFERPORT
\rsout.tmp
\rsout.tmp
SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\
SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\
Keylog
Keylog
Wscript.Shell
Wscript.Shell
HKEY_CLASSES_ROOT\HTTP\shell\open\command\
HKEY_CLASSES_ROOT\HTTP\shell\open\command\
\winlogon.exe
\winlogon.exe
iexplore.exe
iexplore.exe
hXXp://VVV.facebook.com/?ref=home
hXXp://VVV.facebook.com/?ref=home
hXXp://VVV.facebook.com
hXXp://VVV.facebook.com
ADVAPI32.dll
ADVAPI32.dll
Windows Firewall/Internet Connection Sharing (ICS)
Windows Firewall/Internet Connection Sharing (ICS)
WebCamCapture
WebCamCapture
\Vuze\Azureus.exe
\Vuze\Azureus.exe
\LimeWire\LimeWire.exe
\LimeWire\LimeWire.exe
\uTorrent\uTorrent.exe
\uTorrent\uTorrent.exe
\uTorrent\uTorrent.exe /HIDE
\uTorrent\uTorrent.exe /HIDE
\BitTorrent\bittorrent.exe
\BitTorrent\bittorrent.exe
\MSWINSCK.OCX
\MSWINSCK.OCX
hXXp://
hXXp://
HTTP/1.1
HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1
\cmd.exe
\cmd.exe
\data.dat
\data.dat
\steam\steam.exe
\steam\steam.exe
nkey
nkey
dkey
dkey
regsvr32.exe
regsvr32.exe
\pws_mail.bss
\pws_mail.bss
\pws_mess.bss
\pws_mess.bss
\pws_cdk.bss
\pws_cdk.bss
\pws_ff.bss
\pws_ff.bss
\pws_chro.bss
\pws_chro.bss
\nir_cmd.bss
\nir_cmd.bss
cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "
cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "
:*:Enabled:Windows Messanger" /f
:*:Enabled:Windows Messanger" /f
winmgmts:{impersonationLevel=Impersonate}!\\.\root\cimv2
winmgmts:{impersonationLevel=Impersonate}!\\.\root\cimv2
00000000
00000000
winmgmts:\\.\root\cimv2
winmgmts:\\.\root\cimv2
api.ipinfodb.com
api.ipinfodb.com
Select * from Win32_Keyboard
Select * from Win32_Keyboard
GET /v2/ip_query.php?key=
GET /v2/ip_query.php?key=
&timezone=off HTTP/1.1
&timezone=off HTTP/1.1
Host: api.ipinfodb.com
Host: api.ipinfodb.com
GET /v2/ip_query_country.php?key=
GET /v2/ip_query_country.php?key=
Portable
Portable
winmgmts:\\.\root\SecurityCenter
winmgmts:\\.\root\SecurityCenter
\wallpaper.bmp
\wallpaper.bmp
\wallpaper.jpg
\wallpaper.jpg
WScript.Shell
WScript.Shell
WinServer 2003, Web Edition
WinServer 2003, Web Edition
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProductName
__oxFrame.class__
__oxFrame.class__
Scripting.FileSystemObject
Scripting.FileSystemObject
Autorun.ini
Autorun.ini
{557CF401-1A04-11D3-9A73-0000F81EF32E}
{557CF401-1A04-11D3-9A73-0000F81EF32E}
{1D5BE4B5-FA4A-452D-9CDD-5DB35105E7EB}
{1D5BE4B5-FA4A-452D-9CDD-5DB35105E7EB}
Address family not supported by protocol family.
Address family not supported by protocol family.
Operation already in progress.
Operation already in progress.
Operation now in progress.
Operation now in progress.
Socket operation on nonsocket.
Socket operation on nonsocket.
Operation not supported.
Operation not supported.
Protocol family not supported.
Protocol family not supported.
Protocol not supported.
Protocol not supported.
Socket type not supported.
Socket type not supported.
Winsock.dll version out of range.
Winsock.dll version out of range.
CSocketMaster.SocketExists
CSocketMaster.SocketExists
CSocketMaster.PostSocket
CSocketMaster.PostSocket
CSocketMaster.ConnectToIP
CSocketMaster.ConnectToIP
CSocketMaster.ResolveIfHostname
CSocketMaster.ResolveIfHostname
CSocketMaster.SendBufferedDataUDP
CSocketMaster.SendBufferedDataUDP
CSocketMaster.SendBufferedData
CSocketMaster.SendBufferedData
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1
$('#jschl_answer').val(
$('#jschl_answer').val(
application/x-www-form-urlencoded
application/x-www-form-urlencoded
abe2869f-9b47-4cd9-a358-c22904dba7f7
abe2869f-9b47-4cd9-a358-c22904dba7f7
/stext mess.dat
/stext mess.dat
\mess.dat
\mess.dat
/stext mail.dat
/stext mail.dat
\mail.dat
\mail.dat
/stext ffpw.dat
/stext ffpw.dat
\ffpw.dat
\ffpw.dat
Web Site
Web Site
Password
Password
/stext chro.dat
/stext chro.dat
\chro.dat
\chro.dat
Action URL
Action URL
SOFTWARE\MICROSOFT\Windows NT\CurrentVersion
SOFTWARE\MICROSOFT\Windows NT\CurrentVersion
Windows
Windows
SOFTWARE\Classes\Applications\iexplore.exe\shell\open\command
SOFTWARE\Classes\Applications\iexplore.exe\shell\open\command
http\shell\open\command
http\shell\open\command
127.0.0.1
127.0.0.1
\dump.txt
\dump.txt
\uTorrent\uTorrent.exe /DIRECTORY
\uTorrent\uTorrent.exe /DIRECTORY
255.255.255.255
255.255.255.255
finalizarprocessoportas
finalizarprocessoportas
CONNECT %s:%i HTTP/1.0
CONNECT %s:%i HTTP/1.0
SOFTWARE\Classes\http\shell\open\command
SOFTWARE\Classes\http\shell\open\command
Software\Classes\http\shell\open\command
Software\Classes\http\shell\open\command
Software\Microsoft\Windows NT\CurrentVersion\SystemRestore
Software\Microsoft\Windows NT\CurrentVersion\SystemRestore
code.is.a.winner
code.is.a.winner
Software\Microsoft\Windows\CurrentVersion\Uninstall\eMule
Software\Microsoft\Windows\CurrentVersion\Uninstall\eMule
SOFTWARE\MICROSOFT\Windows NT\CurrentVersion\DigitalProductId
SOFTWARE\MICROSOFT\Windows NT\CurrentVersion\DigitalProductId
bps1.exe
bps1.exe
bhookpl.dll
bhookpl.dll
bnfa.exe
bnfa.exe
drvloadn.dll
drvloadn.dll
drvloadx.dll
drvloadx.dll
VNCHooks.dll
VNCHooks.dll
xr4tdwa.exe
xr4tdwa.exe
\rspad.dat
\rspad.dat
shutdown.exe
shutdown.exe
TCnRawKeyBoard
TCnRawKeyBoard
HuntHTTPDownload
HuntHTTPDownload
autorun.inf
autorun.inf
explorer.exe
explorer.exe
hXXps://onlineeast#.bankofamerica.com
hXXps://onlineeast#.bankofamerica.com
winlogon.exe
winlogon.exe
moz_logins
moz_logins
WEBCAMLIVE
WEBCAMLIVE
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run
Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run
SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
\system32\userinit.exe,
\system32\userinit.exe,
notepad.exe
notepad.exe
\system32\userinit.exe
\system32\userinit.exe
steam.exe
steam.exe
hl.exe
hl.exe
@*\AD:\Blackshades Project\bs_net\server\server.vbp
@*\AD:\Blackshades Project\bs_net\server\server.vbp
RegSvcs.exe_292_rwx_00400000_0007A000:
.text
.text
`.data
`.data
.rsrc
.rsrc
MSVBVM60.DLL
MSVBVM60.DLL
bss_server.usrReverseRelay
bss_server.usrReverseRelay
tmrWebHide
tmrWebHide
bss_server.Socket
bss_server.Socket
bss_server.usrRelay
bss_server.usrRelay
ieframe.dll
ieframe.dll
SHDocVwCtl.WebBrowser
SHDocVwCtl.WebBrowser
WebBrowser
WebBrowser
mswinsck.ocx
mswinsck.ocx
MSWinsockLib.Winsock
MSWinsockLib.Winsock
modLaunchWeb
modLaunchWeb
%Program Files% (x86)\Microsoft Visual Studio\VB98\VB6.OLB
%Program Files% (x86)\Microsoft Visual Studio\VB98\VB6.OLB
C:\Windows\SysWOW64\ieframe.dll
C:\Windows\SysWOW64\ieframe.dll
winmm.dll
winmm.dll
user32.dll
user32.dll
advapi32.dll
advapi32.dll
shell32.dll
shell32.dll
kernel32.dll
kernel32.dll
avicap32.dll
avicap32.dll
advpack.dll
advpack.dll
GetAsyncKeyState
GetAsyncKeyState
SetWindowsHookExA
SetWindowsHookExA
UnhookWindowsHookEx
UnhookWindowsHookEx
GetKeyboardLayout
GetKeyboardLayout
GetKeyboardState
GetKeyboardState
GetKeyState
GetKeyState
SHFileOperationA
SHFileOperationA
CreatePipe
CreatePipe
PSAPI.DLL
PSAPI.DLL
GetTcpTable
GetTcpTable
ExitWindowsEx
ExitWindowsEx
EnumWindows
EnumWindows
WinInet.dll
WinInet.dll
DeleteUrlCacheEntryA
DeleteUrlCacheEntryA
urlmon
urlmon
URLDownloadToFileA
URLDownloadToFileA
ShellExecuteA
ShellExecuteA
keybd_event
keybd_event
CHAT_ADDMSG
CHAT_ADDMSG
VBA6.DLL
VBA6.DLL
ws2_32.dll
ws2_32.dll
D:\Blackshades Project\bs_net\loginserver\msvbvm60.dll\3
D:\Blackshades Project\bs_net\loginserver\msvbvm60.dll\3
AddMsg
AddMsg
olepro32.dll
olepro32.dll
GdiplusShutdown
GdiplusShutdown
RemotePort
RemotePort
LocalPort
LocalPort
WSOCK32.DLL
WSOCK32.DLL
RegCloseKey
RegCloseKey
RegOpenKeyExA
RegOpenKeyExA
ntdll.dll
ntdll.dll
C:\Windows\SysWOW64\ieframe.oca
C:\Windows\SysWOW64\ieframe.oca
%Program Files% (x86)\Microsoft Visual Studio\VB98\mswinsck.oca
%Program Files% (x86)\Microsoft Visual Studio\VB98\mswinsck.oca
tmrTCP
tmrTCP
tmrUDP
tmrUDP
UDPSocket
UDPSocket
UDPFlood
UDPFlood
ole32.dll
ole32.dll
crypt32.dll
crypt32.dll
oleaut32.dll
oleaut32.dll
RegOpenKeyA
RegOpenKeyA
FindFirstUrlCacheEntryA
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
FindNextUrlCacheEntryA
`txtPassword
`txtPassword
imgLoginPressed
imgLoginPressed
imgLogin
imgLogin
RegCreateKeyA
RegCreateKeyA
RegDeleteKeyA
RegDeleteKeyA
RegEnumKeyExA
RegEnumKeyExA
gdi32.dll
gdi32.dll
InternetOpenUrlA
InternetOpenUrlA
FtpGetFileA
FtpGetFileA
FtpPutFileA
FtpPutFileA
FtpSetCurrentDirectoryA
FtpSetCurrentDirectoryA
FtpGetCurrentDirectoryA
FtpGetCurrentDirectoryA
FtpOpenFileA
FtpOpenFileA
FtpGetFileSize
FtpGetFileSize
FtpDeleteFileA
FtpDeleteFileA
FtpCreateDirectoryA
FtpCreateDirectoryA
FtpRemoveDirectoryA
FtpRemoveDirectoryA
FtpRenameFileA
FtpRenameFileA
FtpDownload
FtpDownload
FtpUpload
FtpUpload
FtpGetDirectory
FtpGetDirectory
Http_DownloadFile
Http_DownloadFile
cmdShowfiles
cmdShowfiles
msvbvm60.dll
msvbvm60.dll
?8??8??8??8??8?
?8??8??8??8??8?
txtPassword
txtPassword
2>e%Xdq
2>e%Xdq
uMsg
uMsg
strMsg
strMsg
MsgNum
MsgNum
AllMsgs
AllMsgs
lngPort
lngPort
URL_TARGET
URL_TARGET
Port
Port
Password
Password
WebURL
WebURL
Returns/Sets the port to be connected to on the remote computer
Returns/Sets the port to be connected to on the remote computer
Returns/Sets the port used on the local computer
Returns/Sets the port used on the local computer
Binds socket to specific port and adapter
Binds socket to specific port and adapter
Occurs after a send operation has completed
Occurs after a send operation has completed
*\AD:\Blackshades Project\bs_net\server\server.vbp
*\AD:\Blackshades Project\bs_net\server\server.vbp
2c49f800-c2dd-11cf-9ad6-0080c7e7b78d
2c49f800-c2dd-11cf-9ad6-0080c7e7b78d
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1) Gecko/20090612 Firefox/3.5
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1) Gecko/20090612 Firefox/3.5
{00020404-0000-0000-C000-000000000046}
{00020404-0000-0000-C000-000000000046}
5.5.1
5.5.1
\nir_cmd.bss speak text
\nir_cmd.bss speak text
\nir_cmd.bss setsysvolume 65535
\nir_cmd.bss setsysvolume 65535
\nir_cmd.bss mutesysvolume 1
\nir_cmd.bss mutesysvolume 1
\nir_cmd.bss mutesysvolume 0
\nir_cmd.bss mutesysvolume 0
\nir_cmd.bss screensaver
\nir_cmd.bss screensaver
\nir_cmd.bss monitor off
\nir_cmd.bss monitor off
\nir_cmd.bss monitor on
\nir_cmd.bss monitor on
PORT
PORT
TRANSFERPORT
TRANSFERPORT
\rsout.tmp
\rsout.tmp
SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\
SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\
Keylog
Keylog
Wscript.Shell
Wscript.Shell
HKEY_CLASSES_ROOT\HTTP\shell\open\command\
HKEY_CLASSES_ROOT\HTTP\shell\open\command\
\winlogon.exe
\winlogon.exe
iexplore.exe
iexplore.exe
hXXp://VVV.facebook.com/?ref=home
hXXp://VVV.facebook.com/?ref=home
hXXp://VVV.facebook.com
hXXp://VVV.facebook.com
ADVAPI32.dll
ADVAPI32.dll
Windows Firewall/Internet Connection Sharing (ICS)
Windows Firewall/Internet Connection Sharing (ICS)
WebCamCapture
WebCamCapture
\Vuze\Azureus.exe
\Vuze\Azureus.exe
\LimeWire\LimeWire.exe
\LimeWire\LimeWire.exe
\uTorrent\uTorrent.exe
\uTorrent\uTorrent.exe
\uTorrent\uTorrent.exe /HIDE
\uTorrent\uTorrent.exe /HIDE
\BitTorrent\bittorrent.exe
\BitTorrent\bittorrent.exe
\MSWINSCK.OCX
\MSWINSCK.OCX
hXXp://
hXXp://
HTTP/1.1
HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1
\cmd.exe
\cmd.exe
\data.dat
\data.dat
\steam\steam.exe
\steam\steam.exe
nkey
nkey
dkey
dkey
regsvr32.exe
regsvr32.exe
\pws_mail.bss
\pws_mail.bss
\pws_mess.bss
\pws_mess.bss
\pws_cdk.bss
\pws_cdk.bss
\pws_ff.bss
\pws_ff.bss
\pws_chro.bss
\pws_chro.bss
\nir_cmd.bss
\nir_cmd.bss
cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "
cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "
:*:Enabled:Windows Messanger" /f
:*:Enabled:Windows Messanger" /f
winmgmts:{impersonationLevel=Impersonate}!\\.\root\cimv2
winmgmts:{impersonationLevel=Impersonate}!\\.\root\cimv2
00000000
00000000
winmgmts:\\.\root\cimv2
winmgmts:\\.\root\cimv2
api.ipinfodb.com
api.ipinfodb.com
Select * from Win32_Keyboard
Select * from Win32_Keyboard
GET /v2/ip_query.php?key=
GET /v2/ip_query.php?key=
&timezone=off HTTP/1.1
&timezone=off HTTP/1.1
Host: api.ipinfodb.com
Host: api.ipinfodb.com
GET /v2/ip_query_country.php?key=
GET /v2/ip_query_country.php?key=
Portable
Portable
winmgmts:\\.\root\SecurityCenter
winmgmts:\\.\root\SecurityCenter
\wallpaper.bmp
\wallpaper.bmp
\wallpaper.jpg
\wallpaper.jpg
WScript.Shell
WScript.Shell
WinServer 2003, Web Edition
WinServer 2003, Web Edition
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProductName
__oxFrame.class__
__oxFrame.class__
Scripting.FileSystemObject
Scripting.FileSystemObject
Autorun.ini
Autorun.ini
{557CF401-1A04-11D3-9A73-0000F81EF32E}
{557CF401-1A04-11D3-9A73-0000F81EF32E}
{1D5BE4B5-FA4A-452D-9CDD-5DB35105E7EB}
{1D5BE4B5-FA4A-452D-9CDD-5DB35105E7EB}
Address family not supported by protocol family.
Address family not supported by protocol family.
Operation already in progress.
Operation already in progress.
Operation now in progress.
Operation now in progress.
Socket operation on nonsocket.
Socket operation on nonsocket.
Operation not supported.
Operation not supported.
Protocol family not supported.
Protocol family not supported.
Protocol not supported.
Protocol not supported.
Socket type not supported.
Socket type not supported.
Winsock.dll version out of range.
Winsock.dll version out of range.
CSocketMaster.SocketExists
CSocketMaster.SocketExists
CSocketMaster.PostSocket
CSocketMaster.PostSocket
CSocketMaster.ConnectToIP
CSocketMaster.ConnectToIP
CSocketMaster.ResolveIfHostname
CSocketMaster.ResolveIfHostname
CSocketMaster.SendBufferedDataUDP
CSocketMaster.SendBufferedDataUDP
CSocketMaster.SendBufferedData
CSocketMaster.SendBufferedData
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/21.0.1180.89 Safari/537.1
$('#jschl_answer').val(
$('#jschl_answer').val(
application/x-www-form-urlencoded
application/x-www-form-urlencoded
abe2869f-9b47-4cd9-a358-c22904dba7f7
abe2869f-9b47-4cd9-a358-c22904dba7f7
/stext mess.dat
/stext mess.dat
\mess.dat
\mess.dat
/stext mail.dat
/stext mail.dat
\mail.dat
\mail.dat
/stext ffpw.dat
/stext ffpw.dat
\ffpw.dat
\ffpw.dat
Web Site
Web Site
Password
Password
/stext chro.dat
/stext chro.dat
\chro.dat
\chro.dat
Action URL
Action URL
SOFTWARE\MICROSOFT\Windows NT\CurrentVersion
SOFTWARE\MICROSOFT\Windows NT\CurrentVersion
Windows
Windows
SOFTWARE\Classes\Applications\iexplore.exe\shell\open\command
SOFTWARE\Classes\Applications\iexplore.exe\shell\open\command
http\shell\open\command
http\shell\open\command
127.0.0.1
127.0.0.1
\dump.txt
\dump.txt
\uTorrent\uTorrent.exe /DIRECTORY
\uTorrent\uTorrent.exe /DIRECTORY
255.255.255.255
255.255.255.255
finalizarprocessoportas
finalizarprocessoportas
CONNECT %s:%i HTTP/1.0
CONNECT %s:%i HTTP/1.0
SOFTWARE\Classes\http\shell\open\command
SOFTWARE\Classes\http\shell\open\command
Software\Classes\http\shell\open\command
Software\Classes\http\shell\open\command
Software\Microsoft\Windows NT\CurrentVersion\SystemRestore
Software\Microsoft\Windows NT\CurrentVersion\SystemRestore
code.is.a.winner
code.is.a.winner
Software\Microsoft\Windows\CurrentVersion\Uninstall\eMule
Software\Microsoft\Windows\CurrentVersion\Uninstall\eMule
SOFTWARE\MICROSOFT\Windows NT\CurrentVersion\DigitalProductId
SOFTWARE\MICROSOFT\Windows NT\CurrentVersion\DigitalProductId
bps1.exe
bps1.exe
bhookpl.dll
bhookpl.dll
bnfa.exe
bnfa.exe
drvloadn.dll
drvloadn.dll
drvloadx.dll
drvloadx.dll
VNCHooks.dll
VNCHooks.dll
xr4tdwa.exe
xr4tdwa.exe
\rspad.dat
\rspad.dat
shutdown.exe
shutdown.exe
TCnRawKeyBoard
TCnRawKeyBoard
HuntHTTPDownload
HuntHTTPDownload
autorun.inf
autorun.inf
explorer.exe
explorer.exe
hXXps://onlineeast#.bankofamerica.com
hXXps://onlineeast#.bankofamerica.com
winlogon.exe
winlogon.exe
moz_logins
moz_logins
WEBCAMLIVE
WEBCAMLIVE
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run
Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run
SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
\system32\userinit.exe,
\system32\userinit.exe,
notepad.exe
notepad.exe
\system32\userinit.exe
\system32\userinit.exe
steam.exe
steam.exe
hl.exe
hl.exe
@*\AD:\Blackshades Project\bs_net\server\server.vbp
@*\AD:\Blackshades Project\bs_net\server\server.vbp