Trojan.Win32.Badur.muei (Kaspersky), Application.Downloader.RO (AdAware), Trojan.NSIS.StartPage.FD, mzpefinder_pcap_file.YR (Lavasoft MAS)Behaviour: Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Summary
MD5: 9a21d34c68fd562978c772ea802297e2
SHA1: 01cba97d31cd8aa78d731775aa92ba3b87e851aa
SHA256: f786a20d7af71b8b3c976301ab06fe659c5aa9e7438b7bb21c25121fc5c317e7
SSDeep: 393216:VKmzOpYrL9A/VB1hJwwNjZnccHkw1ovXVo:VVzOpE9Ad5JthctLX2
Size: 14455885 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: AirInstaller
Created at: 2012-06-09 16:19:49
Analyzed on: WindowsXPESX SP3 32-bit
Summary: Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Dynamic Analysis
Payload
No specific payload has been found.
Process activity
The Application creates the following process(es):
run-setup.exe:3836
%original file name%.exe:3488
The Application injects its code into the following process(es):
SevenZip-setup.exe:3904
Mutexes
The following mutexes were created/opened:No objects were found.
File activity
The process SevenZip-setup.exe:3904 makes changes in the file system.
The Application creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsdB6.tmp\modern-wizard.bmp (784 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsdB6.tmp\LangDLL.dll (5 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsyB5.tmp (3880 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsdB6.tmp\System.dll (11 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsdB6.tmp\nsDialogs.dll (9 bytes)
The Application deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nsdB6.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nstB4.tmp (0 bytes)
The process run-setup.exe:3836 makes changes in the file system.
The Application creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nskB3.tmp\NSISdl.dll (14 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ii_start.txt (65 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\SevenZip-setup.exe (84403 bytes)
The Application deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\nskB3.tmp (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsuB2.tmp (0 bytes)
The process %original file name%.exe:3488 makes changes in the file system.
The Application creates and/or writes to the following file(s):
The Application deletes the following file(s):
Registry activity
The process SevenZip-setup.exe:3904 makes changes in the system registry.
The Application creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8F 38 6D DA AE 21 BE 5B B6 79 00 0E 50 80 AD 37"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{773a730e-74fb-11e2-b597-000c293bdf2f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fdd9f6f3-7454-11e2-b4cd-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fdd9f6f5-7454-11e2-b4cd-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fdd9f6f2-7454-11e2-b4cd-806d6172696f}]
"BaseClass" = "Drive"
The process run-setup.exe:3836 makes changes in the system registry.
The Application creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B9 2F 3F B3 73 D6 F7 90 5B C2 3D 2E 1D 55 27 B1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{773a730e-74fb-11e2-b597-000c293bdf2f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fdd9f6f3-7454-11e2-b4cd-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fdd9f6f5-7454-11e2-b4cd-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fdd9f6f2-7454-11e2-b4cd-806d6172696f}]
"BaseClass" = "Drive"
The process %original file name%.exe:3488 makes changes in the system registry.
The Application creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "17 1D 05 AC ED 4E 0C 00 33 D8 AD 55 5D 0F 5D C2"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fdd9f6f3-7454-11e2-b4cd-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\D:]
"run-setup.exe" = "run-setup"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{773a730e-74fb-11e2-b597-000c293bdf2f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fdd9f6f2-7454-11e2-b4cd-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fdd9f6f5-7454-11e2-b4cd-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
"Personal" = "%Documents and Settings%\%current user%\My Documents"
The Application modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass" = "1"
The Application modifies IE settings for security zones to map all urls to the Intranet Zone:
"IntranetName" = "1"
The Application modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
Dropped PE files
MD5 | File path |
---|---|
fd6eee7e81dc931a8021aba3fbc83b13 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\SevenZip-setup.exe |
9384f4007c492d4fa040924f31c00166 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsdB6.tmp\LangDLL.dll |
c17103ae9072a06da581dec998343fc1 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsdB6.tmp\System.dll |
c10e04dd4ad4277d5adc951bb331c777 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nsdB6.tmp\nsDialogs.dll |
a5f8399a743ab7f9c88c645c35b1ebb5 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\nskB3.tmp\NSISdl.dll |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
Removals
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
run-setup.exe:3836
%original file name%.exe:3488 - Delete the original Application file.
- Delete or disinfect the following files created/modified by the Application:
%Documents and Settings%\%current user%\Local Settings\Temp\nsdB6.tmp\modern-wizard.bmp (784 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsdB6.tmp\LangDLL.dll (5 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsyB5.tmp (3880 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsdB6.tmp\System.dll (11 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nsdB6.tmp\nsDialogs.dll (9 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\nskB3.tmp\NSISdl.dll (14 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\ii_start.txt (65 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\SevenZip-setup.exe (84403 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
Static Analysis
VersionInfo
No information is available.
No information is available.
PE Sections
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
---|---|---|---|---|---|
.text | 4096 | 74526 | 74752 | 4.54396 | a8692f5ba740240ef0f9a827376f76f9 |
.rdata | 81920 | 7445 | 7680 | 3.46159 | d4f36accffde0bf520f52486679ccf0d |
.data | 90112 | 96036 | 512 | 2.46008 | b6c7edb5b7fec47a37a622cc5d71f3f4 |
.CRT | 188416 | 32 | 512 | 0.273198 | 439411041ee0b8261668525c5c132cd9 |
.rsrc | 192512 | 16656 | 16896 | 3.23905 | aa3a7d7ff24a928d00c7a73daacad998 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Total found: 392
01d8f21bdcf3f33cfd44b21cda45bbe1
36618e01443f68ba10d71159b9ba1586
174bab3f28f1e6ab9691c12205ad67ca
6421617d0cb05e70cc2479f1780e3dd1
e39891f9d5a7b024a539b62105d41d02
4cdd8f7154284c11717e6afeca98af0b
86c06e69e4483ba0a15e97f7d061418a
deea4a582742eaa9cac518df89b2f6a2
1eba8468c07781e001a1f9128b564506
b3638527e4ffe06014a54d62cda42559
bca3d3ce6156480038bad3f8c9a76d80
63e6b63d244334ab87abbb2e2bcbb98a
2ff174b885e108104bb96b1d1d235aef
bd85af46e305582c840c04c34e56e67c
1a6249b13dd127da29e4484b4d7a7f6a
6c59ecf60e13b29456453070318962df
785751e96ae27d6550c7ec600dd98da3
ec556f5eea3f037c7103a91e72461608
78bbd28713a0305647db01c48deaff2b
db37b76b3fe72377d6799d0dea487908
07b1eb7e122877c199b8467e37fa8764
067066cdccc03e89c58724be1891f4a0
2ff4d03912aca37e15ac5f0b42d033a8
775bc0ffc3701d8dbc33452c1b5bbd2a
eab59327294744775e41f2ab2dcb0504
Network Activity
URLs
URL | IP |
---|---|
hxxp://pe-mainin.com/launch.php?p=sevenzip&pid=102&tid=159282&sid=9 | 46.21.100.248 |
hxxp://pe-sixi.com/downloadS.php | 69.197.35.236 |
hxxp://d16oc15frjt76r.cloudfront.net/SevenZip-setup.exe | 216.137.41.42 |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET /downloadS.php HTTP/1.0
Host: pe-sixi.com
User-Agent: NSISDL/1.2 (Mozilla)
Accept: */*
HTTP/1.1 302 Moved Temporarily
Server: nginx/1.0.15
Date: Sun, 18 Jan 2015 09:37:35 GMT
Content-Type: text/html
Connection: close
X-Powered-By: PHP/5.3.3
Location: hXXp://d16oc15frjt76r.cloudfront.net/SevenZip-setup.exe
GET /SevenZip-setup.exe HTTP/1.0
Host: d16oc15frjt76r.cloudfront.net
User-Agent: NSISDL/1.2 (Mozilla)
Accept: */*
HTTP/1.1 200 OK
Content-Type: application/octet-stream
Content-Length: 1103464
Connection: close
Date: Mon, 12 Jan 2015 03:19:29 GMT
Last-Modified: Tue, 14 May 2013 07:27:52 GMT
ETag: "fd6eee7e81dc931a8021aba3fbc83b13"
Accept-Ranges: bytes
Server: AmazonS3
Age: 20971
X-Cache: Hit from cloudfront
Via: 1.1 37353014402e563aa01f8380e95f001e.cloudfront.net (CloudFront)
X-Amz-Cf-Id: st7E5nlEI2qaYhc-NqekZb0hxTEyelwncq2nT1mUXAbVN5ttbGTqew==
MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i...iw..iu..i...i...id..i!..i...i...it..iRichu..i........................PE..L......K.................\..........<2.......p....@..........................................................................s...........J...........................................................................p...............................text...ZZ.......\.................. ..`.rdata.......p.......`..............@..@.data................r..............@....ndata.......@...........................rsrc....J.......L...v..............@..@........................................................................................................................................................................................................................................................................................................................................................................U....\.}..t .}.F.E.u..H.....>B..H.P.u..u..u...Hr@..B...SV.5.>B..E.WP.u...Lr@..e...E..E.P.u...Pr@..}..e....Dp@........FR..VV..U... M.......M....3.....FQ.....NU..M..........VT..U.....FP..E...............E.P.M...Hp@..E...E.P.E.P.u...Tr@..u....E..9}...w....~X.te.v4..Lp@....E.tU.}.j.W.E......E.......Pp@..vXW..Tp@..u..5Xp@.W...E..E.h ...Pj.h.6B.W..Xr@..u.W...u....E.P.u...\r@._^3.[.....L$...>B...Si.....VW.T.....tO.q.3.;5.>B.sB..i......D.......t.G.....t...O..t .....u...3....3...F.....;5.>B.r._^[..
<<< skipped >>>
GET /launch.php?p=sevenzip&pid=102&tid=159282&sid=9 HTTP/1.0
Host: pe-mainin.com
User-Agent: NSISDL/1.2 (Mozilla)
Accept: */*
HTTP/1.1 200 OK
Date: Sun, 18 Jan 2015 09:37:34 GMT
Server: Apache/2.2.15 (CentOS)
X-Powered-By: PHP/5.3.3
Content-Length: 65
Connection: close
Content-Type: text/html; charset=UTF-8
files=1.u1=hXXp://pe-sixi.com/downloadS.php.n1=SevenZip-setup.exe..
Map
The Application connects to the servers at the folowing location(s):
Strings from Dumps
run-setup.exe_3836:
.text
.text
`.rdata
`.rdata
@.data
@.data
.ndata
.ndata
.rsrc
.rsrc
uDSSh
uDSSh
.DEFAULT\Control Panel\International
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
Software\Microsoft\Windows\CurrentVersion
GetWindowsDirectoryA
GetWindowsDirectoryA
KERNEL32.dll
KERNEL32.dll
ExitWindowsEx
ExitWindowsEx
USER32.dll
USER32.dll
GDI32.dll
GDI32.dll
SHFileOperationA
SHFileOperationA
ShellExecuteA
ShellExecuteA
SHELL32.dll
SHELL32.dll
RegEnumKeyA
RegEnumKeyA
RegCreateKeyExA
RegCreateKeyExA
RegCloseKey
RegCloseKey
RegDeleteKeyA
RegDeleteKeyA
RegOpenKeyExA
RegOpenKeyExA
ADVAPI32.dll
ADVAPI32.dll
COMCTL32.dll
COMCTL32.dll
ole32.dll
ole32.dll
VERSION.dll
VERSION.dll
verifying installer: %d%%
verifying installer: %d%%
hXXp://nsis.sf.net/NSIS_Error
hXXp://nsis.sf.net/NSIS_Error
... %d%%
... %d%%
~nsu.tmp
~nsu.tmp
%u.%u%s%s
%u.%u%s%s
RegDeleteKeyExA
RegDeleteKeyExA
%s=%s
%s=%s
*?|/":
*?|/":
"C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\\SevenZip-setup.exe"
"C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\\SevenZip-setup.exe"
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nskB3.tmp\NSISdl.dll
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nskB3.tmp\NSISdl.dll
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nskB3.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nskB3.tmp
.reloc
.reloc
WS2_32.dll
WS2_32.dll
NSISdl.dll
NSISdl.dll
invalid URL
invalid URL
Host: %s
Host: %s
GET %s HTTP/1.0
GET %s HTTP/1.0
User-Agent: NSISDL/1.2 (Mozilla)
User-Agent: NSISDL/1.2 (Mozilla)
http=
http=
Software\Microsoft\Windows\CurrentVersion\Internet Settings
Software\Microsoft\Windows\CurrentVersion\Internet Settings
Unable to open %s
Unable to open %s
%skB (%d%%) of %skB at %u.ukB/s
%skB (%d%%) of %skB at %u.ukB/s
(%u hours remaining)
(%u hours remaining)
(%u minutes remaining)
(%u minutes remaining)
(%u seconds remaining)
(%u seconds remaining)
Downloading %s
Downloading %s
.vN {
.vN {
({,{
({,{
nskB3.tmp
nskB3.tmp
\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\ii_start.txt
\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\ii_start.txt
1=SevenZip-setup.exe
1=SevenZip-setup.exe
downloadS.php
downloadS.php
evenZip-setup.exe
evenZip-setup.exe
"D:\run-setup.exe"
"D:\run-setup.exe"
run-setup.exe
run-setup.exe
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsuB2.tmp
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsuB2.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
D:\run-setup.exe
D:\run-setup.exe
hXXp://pe-sixi.com/downloadS.php
hXXp://pe-sixi.com/downloadS.php
SevenZip-setup.exe
SevenZip-setup.exe
Nullsoft Install System v2.46
Nullsoft Install System v2.46
SevenZip-setup.exe_3904:
.text
.text
`.rdata
`.rdata
@.data
@.data
.ndata
.ndata
.rsrc
.rsrc
uDSSh
uDSSh
.DEFAULT\Control Panel\International
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
Software\Microsoft\Windows\CurrentVersion
GetWindowsDirectoryA
GetWindowsDirectoryA
KERNEL32.dll
KERNEL32.dll
ExitWindowsEx
ExitWindowsEx
USER32.dll
USER32.dll
GDI32.dll
GDI32.dll
SHFileOperationA
SHFileOperationA
ShellExecuteA
ShellExecuteA
SHELL32.dll
SHELL32.dll
RegEnumKeyA
RegEnumKeyA
RegCreateKeyExA
RegCreateKeyExA
RegCloseKey
RegCloseKey
RegDeleteKeyA
RegDeleteKeyA
RegOpenKeyExA
RegOpenKeyExA
ADVAPI32.dll
ADVAPI32.dll
COMCTL32.dll
COMCTL32.dll
ole32.dll
ole32.dll
VERSION.dll
VERSION.dll
verifying installer: %d%%
verifying installer: %d%%
unpacking data: %d%%
unpacking data: %d%%
... %d%%
... %d%%
hXXp://nsis.sf.net/NSIS_Error
hXXp://nsis.sf.net/NSIS_Error
~nsu.tmp
~nsu.tmp
%u.%u%s%s
%u.%u%s%s
RegDeleteKeyExA
RegDeleteKeyExA
%s=%s
%s=%s
*?|/":
*?|/":
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsdB6.tmp\nsDialogs.dll
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsdB6.tmp\nsDialogs.dll
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsdB6.tmp\nsDialogs.dll
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsdB6.tmp\nsDialogs.dll
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsdB6.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nsdB6.tmp
LangDLL.dll
LangDLL.dll
.sxdata
.sxdata
@.reloc
@.reloc
t^Ht.Hu$
t^Ht.Hu$
@.dataMZ
@.dataMZ
.reloc
.reloc
System.dll
System.dll
callback%d
callback%d
.uY?y
.uY?y
:l.PL
:l.PL
nsdB6.tmp
nsdB6.tmp
37862257
37862257
1\"%CurrentUserName%"\LOCALS~1\Temp\nsdB6.tmp
1\"%CurrentUserName%"\LOCALS~1\Temp\nsdB6.tmp
"C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\\SevenZip-setup.exe"
"C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\\SevenZip-setup.exe"
%Program Files%\SevenZip
%Program Files%\SevenZip
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp
SevenZip-setup.exe
SevenZip-setup.exe
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nstB4.tmp
CUME~1\"%CurrentUserName%"\LOCALS~1\Temp\nstB4.tmp
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\SevenZip-setup.exe
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\SevenZip-setup.exe
1628046372
1628046372
1114406
1114406
1769778
1769778
1245460
1245460
1048912
1048912
637862257
637862257
-1794506108
-1794506108
newPage_en.ini
newPage_en.ini
hXXp://VVV.software-files.net/delta/eula
hXXp://VVV.software-files.net/delta/eula
hXXp://CONDRE.INFO/cond_redir.php?go=privacy
hXXp://CONDRE.INFO/cond_redir.php?go=privacy
hXXp://VVV.conduit.com/legal/contentsharingtos.aspx
hXXp://VVV.conduit.com/legal/contentsharingtos.aspx
)-.Yln
)-.Yln
Nullsoft Install System v2.46
Nullsoft Install System v2.46
SevenZip-setup.exe_3904_rwx_011C4000_00001000:
callback%d
callback%d