• Home
  • Blog
  • Online Scan
  • Update History
  • Online Scan: Analyze install.exe file and fix runtime errors, Fix System Error
    Welcome to my blog. I found a malicious code that was added into the install.exe file. Due to infection by malicious code, the file contents changed. The MD5 value of the infected file is: 06cdae16edb6f405b72846e44e7bacdf, and the file size is: 124 K ( 127,996 bytes )
    Risk level of malicious code
     
     
     
     
     
    ( 3 stars by 138 users )
    Behavior of malicious code ( 238 votes ) If you know more this malicious code, please vote. We sincerely hope you may share your information with other computer users and help them.
    1. Infect file
    13.87% (33)
    2. Intentionally destroy data
    13.45% (32)
    3. Steal personal privacy
    11.76% (28)
    4. Infect other computers through the Internet
    10.5% (25)
    5. Install the backdoor program so that the computer is controlled remotely
    13.45% (32)
    6. Cheat or threaten users to buy something
    12.18% (29)
    7. Download and install other programs without permission in the background
    10.5% (25)
    8. Pop up various advertisements and induce users to click
    14.29% (34)
    Binary Code Analysis:
    When the program runs, the PE loader will try to load the file to 0x00400000 in the virtual address space, Address Of Entry Point: 0x00026A00. This file has 8 SECTION.
    DOS Header
    DOS Stub
    ...
     
    NT File Signature
    NT HEADER
    FILE HEADER
     
    OPTIONAL HEADER
    Data Directory
    .text SECTION #1
    .data SECTION #2
    .tls SECTION #3
    .rdata SECTION #4
    .idata SECTION #5
    .edata SECTION #6
    .rsrc SECTION #7
    .reloc SECTION #8
    About this malicious code
    This malicious code is a 32-bit program that infects an EXE file. When the file is run or the file is loaded, the malicious code in the file is run first. Later, this malicious code also infects the following files:

    • install.exe
    • install.png

    Tip: There is something I must emphasize. The file names listed above are infected by malicious code. It does not mean that all files named by these names are malicious files. It is inaccurate to determine whether a file is a malicious program based on its file name.

    The malicious code also infects files on the following path:

    • c:\program files\common files\siemens\automation\simatic oam\drivers\
    • c:\program files (x86)\anvsoft\syncios\
    • c:\couchdb\
    • c:\drivers\wireless wifi link driver (atheros, broadcom)\
    • c:\program files (x86)\common files\microsoft shared\vsto\9.0\visual studio tools for the office system 3.0 runtime\
    • c:\hp universal print driver\pcl6-x32-6.6.0.23029\
    • c:\windows\microsoft.net\framework\v2.0.50727\microsoft visual j# 2.0 redistributable package\
    • c:\hp universal print driver\ps-x64-6.1.0.20062\
    • c:\hp universal print driver\pcl6-x32-6.2.0.20412\
    • c:\swsetup\sp79095\
    • c:\jww\
    • c:\swsetup\sp50046\
    • c:\hp universal print driver\pcl6-x64-6.5.0.22695\
    • c:\pfx engagement\wm\
    • c:\windows\microsoft.net\framework\v3.0\windows communication foundation\
    • c:\program files (x86)\sangfor\ssl\tcpdriver2\
    • c:\temp\
    • c:\program files\microsoft help viewer\v1.0\microsoft help viewer 1.0\
    • c:\hp universal print driver\pcl6-x64-6.3.0.21178\
    • c:\program files (x86)\sangfor\ssl\sddriver\
    • c:\windows\resources\themes\re-digitized\cursors\re-digitized\
    • c:\swsetup\sp75238\
    • c:\hp universal print driver\pcl6-x64-5.6.5.15717\
    • c:\backup order 3\d order it 3 con software nuovo\di\print-it\
    • c:\hp universal print driver\pcl6-x32-6.6.5.23510\
    • c:\hp universal print driver\pcl5 v5.2.6.9321\win_xp_vista\
    • c:\windows\downloaded program files\
    • c:\hp universal print driver\pcl6-x64-5.8.0.17508\
    • c:\uninstall\
    • c:\etiquetas\cybersineslda\software\arduino-0021\arduino-0021\hardware\tools\avr\utils\bin\
    • c:\installcd\trend10\
    • c:\hp universal print driver\pcl6-x64-6.2.1.20636\
    • c:\ljp1100_p1560_p1600_full_solution\dotnet64\
    • c:\swsetup\sp75236\
    • c:\hp universal print driver\ps-x32-6.2.1.20636\
    • c:\program files (x86)\bignox\bignoxvm\vcredist\
    • c:\burndisk\concept_26xl_en\
    • c:\esupport\edriver\software\mcafee\mcafee\win81_32_win81_64_12.8.856\
    • c:\hp universal print driver\ps-x32-6.0.0.18849\
    • e:\windows\usb vibration\7906\
    • c:\pc\appdata\local\temp\rarsfx3\
    • c:\minibloq.v0.83\lang\winavr\v20090313\utils\bin\
    • c:\windows\microsoft.net\framework\
    • c:\vclskinbcb2\
    • c:\windows\microsoft.net\framework\v2.0.50727\microsoft report viewer redistributable 2008 (kb971118)\
    • c:\powerdvd17\kernel\dms\
    • c:\documents and settings\xr pappas\temp\teamviewer\version4\
    • c:\optiplaning\optiplan\install\
    • c:\hp_lj1020_full_solution\
    • c:\136bc78b893d1c4e471c3d4e\
    • c:\swsetup\sp72932\
    • c:\hp universal print driver\pcl6-x64-6.4.1.22169\
    • c:\swsetup\app\applications\hpinc\hpphonewi_patch\x.x.xxxx\src\
    • c:\hp universal print driver\pcl6-x64-6.6.5.23510\
    • c:\swsetup\drv\network\realtek\realtekrt_qqgyb2\1.0.0.90\src\
    • c:\tizen-sdk\tools\mingw\msys\1.0\bin\
    • c:\hp universal print driver\pcl6-x64-6.0.0.18849\
    • c:\program files\common files\microsoft shared\vsto\10.0\microsoft visual studio 2010 tools for office runtime (x64)\
    • c:\swsetup\sp82801\
    • c:\android_usb_drivers\install_adb_rndis\
    • c:\util\driver\amgen_updatedelldriversfor5289part4_1.0_01\
    • c:\dell\drivers\r283176\
    • c:\python27\lib\git\usr\bin\
    • c:\prokas2\win32\bin\pmdeploy\tmp\
    • c:\swsetup\sp79350\
    • c:\idautomationcode39\
    • c:\hp universal print driver\pcl6-x32-6.4.1.22169\
    • c:\vclskin2\
    • c:\cygwin\bin\
    • c:\swsetup\sp77538\
    • c:\dell\drivers\9rrx6\
    • c:\windows\microsoft.net\framework\v2.0.50727\microsoft report viewer redistributable 2008 sp1 language pack - rus\
    • c:\octave\octave-4.2.1\bin\
    • c:\564bd1b6a81d8a7cf0143c413c839d\426bb2df50b84b65ec0e31\
    • c:\msi\liveupdate\dl_file\realtek_hd_audio_drivers_6.0.1.8105\asio\asio\
    • c:\buffalo\airnavilite-1330\driver\ucgnm2\winxp\
    • c:\hp universal print driver\ps-x64-6.4.1.22169\
    • c:\windows\microsoft.net\framework\v2.0.50727\microsoft visual j# 2.0 redistributable package - se\
    • c:\backup order 3\d order it 3 con software nuovo\it-upgrade6\backup5x\print-it\
    • c:\swsetup\sp84852\
    • c:\winavr-20100110\utils\bin\
    • c:\program files (x86)\jewelcad 5.1 priyo\lock\
    • c:\downloads\solid works2\solidworks 2017 sp0 premium windows x64\prereqs\remotedebugger\
    • c:\shree60\
    • c:\octave\octave-4.2.2\bin\
    • c:\swsetup\sp78310\
    • c:\hp universal print driver\ps-usb-setup-x64-6.6.5.23510\installer\driverpackage\64bit\
    • c:\hp universal print driver\pcl5-x32-5.9.0.18326\
    • c:\program files (x86)\sangfor\ssl\tcpdriver1\
    • c:\hp universal print driver\ps-x64-5.7.0.16448\
    • c:\swsetup\sp66924\
    • c:\dp_sound_b_wnt5_x86-32_1111\d\s\s13\
    • c:\avantage\essai\progression\
    • c:\hp universal print driver\pcl5-x64-6.1.0.20062\
    • c:\esupport\edriver\
    • c:\resolver\
    • c:\acer\preload\autorun\drv\finger\
    • c:\dell\drivers\r253974\packages\apps\vc8rtx64\vcredist_x64\
    • c:\hashicorp\vagrant\embedded\usr\bin\
    • c:\program files (x86)\hewlett-packard\pc coe 3\ov cms\lib\cache\hpq_updriver05x64_en\upd_pcl6x64v5.2.6\
    • c:\program files\common files\microsoft shared\vsto\10.0\microsoft visual studio 2010 tools for office runtime (x86)\
    • c:\cdk\printerdrivers\hp\x32\
    • c:\windows.old\program files\smartfren connex ce682 ui\
    • c:\util\driver\amgen_updatedelldriversfor5289part2_1.0_01\scripts\
    • c:\windows\nldrv\006\
    • c:\hp universal print driver postscript v5.0.1\
    • c:\c_dd_forhtos\hp\drivers\printers\deskjet\
    • c:\windows\usb vibration\dr100&110\
    • c:\epson\
    • c:\windows.old\program files\common files\microsoft shared\vsto\10.0\microsoft visual studio 2010 tools for office runtime (x86)\
    • c:\preboot\utils\petools\amd64\
    • c:\burndisk\concept_26_sr7_en\
    • c:\ljm1005_mfp_full_solution\
    • c:\windows\microsoft.net\framework64\v2.0.50727\microsoft visual j# 2.0 redistributable package - se (x64)\
    • c:\windows\microsoft.net\framework\v2.0.50727\microsoft report viewer redistributable 2005\
    • c:\9419d99911d4d83a1987fde9d8\
    • c:\hp universal print driver\pcl6-x32-6.5.0.22695\installer\driverpackage\32bit\
    • c:\program files (x86)\cyberlink\powerdvd12\kernel\dms\
    • c:\dell\drivers\r253974\packages\apps\vc8rtx86\vcredist_x86\
    • c:\bharati\
    • c:\gerdootemp\sqlserver2014\x64\redist\visualstudioshell\help\x64\
    • c:\swsetup\sp88577\
    • c:\program files\acerdriverv4\
    • c:\hp universal print driver\ps-x64-6.2.0.20412\
    • c:\windows\system32\drvsrc\
    • c:\util\driver\amgen_updatedelldriversfor5289part1_1.0_01\scripts\
    • c:\mentorgraphics\install\
    • c:\suipacktrial\
    • c:\software\tarjeta protectora\
    • c:\microgaming\casino\jackpotcity\
    • c:\windows\syswow64\drvsrc\
    • c:\opscode\chefdk\embedded\git\usr\bin\
    • c:\swsetup\sp81348\
    • c:\hp universal print driver\pcl6\
    • c:\util\driver\amgen_updatedelldriversfor5289part3_1.0_01\scripts\
    • c:\program files (x86)\sangfor\ssl\dnsdriver\
    • c:\swsetup\alldotnet\dotnet\us\
    • c:\sicherungen von alten rechnern\sicherung boot alter rechner\eigene dateien\musiktools\jx220\
    • c:\appcaixa\rda7\ibmrda\software\install\im13\installation_manager\
    • c:\hp universal print driver\pcl5-x32-5.6.5.15717\
    • c:\
    • c:\esupport\edriver\software\audio\asio\
    • c:\root\setup\rsrc\
    • c:\documents and settings\ovidijus\desktop\dietrich's 10.02\autorun\
    • c:\hp universal print driver\pcl5-x64-5.9.0.18326\
    • c:\windows\nldrv\031\dmi\winexe\
    • c:\gpsgateinstall\
    • c:\util\driver\amgen_updatedelldriversfor5289part4_1.0_01\scripts\
    • c:\cermepos\unikey\network.server.ia32\
    • c:\drivers\mcafee virus scan plus\
    • c:\hp universal print driver\pcl6-x64-6.2.0.20412\
    • c:\program files\common files\microsoft shared\vsto\8.0\microsoft visual studio 2005 tools for office runtime\
    • c:\aa6ccdad3160bb7de5868f\
    • c:\make_install\
    • c:\bi-plug\pdfconverter25\
    • c:\hp universal print driver\ps-x32-6.6.5.23510\
    • c:\download\download\download\
    • c:\util\driver\amgen_updatedelldriversfor5289part2_1.0_01\
    • c:\swsetup\sp78623\
    • c:\windows\asusinstall\
    • c:\hp universal print driver\pcl5-x32-6.1.0.20062\
    • c:\swsetup\mmflash\
    • c:\hasp\
    • c:\swsetup\sp65168\
    • c:\swsetup\sp82221\
    • c:\hp universal print driver\ps-x64-6.5.0.22695\
    • c:\temp\ass\
    • c:\swsetup\sp62277\
    • c:\esupport\edriver\software\mcafee\mcafee\win81_32_win81_64_12.8.934\
    • c:\hp universal print driver\ps-x32-6.6.0.23029\
    • c:\strudwin\
    • c:\windows\usb vibration\7906\
    • c:\dicatec 2015\dicatec 2015\
    • c:\swsetup\sp54549\
    • c:\swsetup\drivers\rtbt\
    • c:\swsetup\sp73250\
    • e:\program files\handset manager\
    • c:\mittemp\
    • c:\swsetup\sp61518\
    • c:\drivers\bluetooth driver (cybertan, liteon)\
    • c:\swsetup\sp53753\
    • c:\windows\microsoft.net\framework\v2.0.50727\microsoft report viewer redistributable 2008 (kb971119)\
    • c:\dell\drivers\r291999 st microelectronics free fall sensor driver (no funciona en win 10)\
    • c:\cermepos\unikey\
    • c:\acer\acerreg\assist\
    • c:\hp universal print driver v5.1 pcl5 32-bit driver\
    • c:\octave\3.2.4_gcc-4.4.0\msys\bin\
    • c:\util\driver\amgen_updatedelldriversfor5289part1_1.0_01\
    • c:\hp universal print driver\pcl5-x32-5.3.1.10527\
    • c:\gerdootemp\sqlserver2014\x64\redist\visualstudioshell\help\x86\
    • c:\backup order 3\d order it 3 con software nuovo\it-update\support\release\
    • c:\windows\microsoft.net\framework\v2.0.50727\microsoft visual basic power packs 3.0 redistributable\
    • c:\swsetup\sp74139\
    • c:\hp universal print driver\pcl6-x32-6.2.1.20636\
    • c:\8c9907d2736b1c2ed509ca0785\
    • c:\windows\setup\scripts\
    • c:\util\driver\amgen_updatedelldriversfor5289part3_1.0_01\
    • c:\cygwin_wm\bin\
    • c:\program files\git\usr\bin\
    • c:\swtools\apps\mcafee\
    • c:\program files\freetime\formatfactory\plugin\bavscan\
    • c:\cygwin64\bin\
    Tip: The code of most malicious files is fixed, rarely changed, which means, this type of malicious files regardless of which computer they are in, will copy themselves into the pre-set path, so we can go to the path listed above to find this file, and there is a great chance to find it.
    Are all the files with the same file name listed above and with the same path malicious files?
    Of course not. The file name is just the identification of the file. Strictly speaking, the file is modified by malicious code.

    The following are methods commonly used by malicious code in order to confuse users:

    • Deliberately modify their own file name to some system file name, or some well-known software name.
    • Generate malicious files in the system folder or in the installation folder of some well-known software, and even name their own folder with an antivirus software name (actually the user did not install this antivirus software). In fact, these malicious files are not system files, nor part of the famous software.

    For example, one of the most common system file names is: explorer.exe, and under normal circumstances, the system only has an explorer.exe process. When you open the Task Manager and find that there are two or more explorer.exe processes, it is likely the camouflage of some malicious viruses. As shown in the following figure, there are two explorer.exe processes in Task Manager.

    When I find the path where the file is located, it will be clear that the real explorer.exe system file is located under "C:\ Windows\", and the malicious file that pretends to be system process is under the other path.

    The running status of the install.exe file that is infected with malicious code:
    install.exe running statusTake up memory 159K
    Occupy CPU resources between 40% - 56%
    Run the program with the SYSTEM permissions.
    At runtime, 4 Windows system files, 0 external files (not owned by the Windows system), are called
    Windows system files
  • File name
  • Number of calling functions
  • ADVAPI32.DLL
  • 4
  • KERNEL32.DLL
  • 85
  • USER32.DLL
  • 7
  • OLEAUT32.DLL
  • 1
  • Not owned by the windows system
  • File name
  • Number of calling functions
  • In general, the most accurate way to determine if a file is a malicious file is to analyze its code and see what happens when these functions are called while the program is running. Does it have malicious behavior (destroying data or stealing data)? I have listed the functions called by this file and some internal data, but there is too much data, I can't show them all here. →Click here← to see the full binary code analysis page.
    Export function:
    The following function is a function provided by this file. The export function is useful for analyzing the specific behavior of a runtime file, starting from the function entry address, and debugging the code line by line. You can get a lot of data generated by this file.
    Export File - HP_Install.exe
  • Ordinals
  • Function Name
  • Entry Address
  • 0x00000003
  • @@Getwinver@Finalize
  • 0x00003A5C
  • 0x00000002
  • @@Getwinver@Initialize
  • 0x00003A4C
  • 0x00000001
  • __GetExceptDLLinfo
  • 0x0000078D
  • 0x00000004
  • ___CPPdebugHook
  • 0x00015698
  • install.exe runtime behavior analysis
    The ADVAPI32.DLL dynamic link library is loaded and the functions in the file are called: ( Advapi32.dll is part of a high-level API application interface service library that contains functions related to object security, registry manipulation, and event logging. It is generally located in the system directory: \WINDOWS\system32\ )
  • GetUserNameA: Retrieves the name of the user associated with the current thread.
  • RegOpenKeyExA: Opens the specified registry key. Note that key names are not case sensitive.
  • RegQueryValueExA: Retrieves the data associated with the default or unnamed value of a specified registry key.
  • The KERNEL32.DLL dynamic link library is loaded and the functions in the file are called: ( Kernel32.dll is a very important 32-bit dynamic link library file in the Windows operating system. It is a kernel-level file. It controls the system's memory management, data input and output operations and interrupt handling. When the Windows operating system starts, kernel32.dll resides in a specific write-protected area of memory, so that other programs cannot occupy this memory area. )
  • CreateToolhelp32Snapshot: Takes a snapshot of the specified processes, as well as the heaps, modules, and threads used by these processes.
  • ExitProcess: Ends the calling process and all its threads.
  • GetCurrentThreadId: Retrieves the thread identifier of the calling thread.
  • GetLastError: Retrieves the calling thread's last-error code value.
  • GetModuleFileNameA: Retrieves the fully qualified path for the file that contains the specified module.
  • GetModuleHandleA: Retrieves a module handle for the specified module. The module must have been loaded by the calling process.
  • GetProcAddress: Retrieves the address of an exported function or variable from the specified dynamic-link library (DLL).
  • GetStartupInfoA: Retrieves the contents of the STARTUPINFO structure that was specified when the calling process was created.
  • GetStdHandle: Retrieves a handle to the specified standard device (standard input, standard output, or standard error).
  • LoadLibraryA: Loads the specified module into the address space of the calling process. The specified module may cause other modules to be loaded.
  • Process32First: Retrieves information about the first process encountered in a system snapshot.
  • Process32Next: Retrieves information about the next process recorded in a system snapshot.
  • RtlUnwind: Initiates an unwind of procedure call frames.
  • SetConsoleCtrlHandler: Adds or removes an application-defined HandlerRoutine function from the list of handler functions for the calling process.
  • SetCurrentDirectoryA: Changes the current directory for the current process.
  • TlsAlloc: Allocates a thread local storage (TLS) index. Any thread of the process can subsequently use this index to store and retrieve values that are local to the thread, because each thread receives its own slot for the index.
  • TlsGetValue: Retrieves the value in the calling thread's thread local storage (TLS) slot for the specified TLS index. Each thread of a process has its own slot for each TLS index.
  • TlsSetValue: Stores a value in the calling thread's thread local storage (TLS) slot for the specified TLS index. Each thread of a process has its own slot for each TLS index.
  • UnhandledExceptionFilter: An application-defined function that passes unhandled exceptions to the debugger, if the process is being debugged.
  • WinExec: Runs the specified application.
  • The following files have been identified as malicious files. Some files are variants of install.exe; some files are another type of malicious file, but use the same file name as install.exe.

    It is a simple and effective way to determine whether a file is a malicious file by a hash value, which has lower false detection rate than the "static signature" method. So, if the MD5 value of a file on the computer is the same as the MD5 value listed below, then it is sure that the file is a malicious file.

    This is my analysis results to the code of each malicious below, mainly provided to industry professionals who engage in the maintenance of computer security. If you are interested, you can also have a view, but it may require certain computer knowledge.
    • File Md5
    • File Size
    • File Bit
    • File Type
    • Binary Code Analysis

    How to repair or remove install.exe

    Method 1: Manual Removal

    • Reboot the system and then enter safe mode (Click here to see how each Windows version (XP/Vista/7/8/10) goes into safe mode)

    • Open Task Manager and if install.exe is running, end this program.
    install.exe running status

    • Show all hidden files.
    Step: "My Computer" -> "Floder Options" ->"View" -> "Show hidden files, folders, and drives"

    • Malicious code used to generate or infect files on the following paths, so you need to one by one go into the following path, and delete all files [  install.exe, install.png  ]

    • c:\program files\common files\siemens\automation\simatic oam\drivers\
    • c:\program files (x86)\anvsoft\syncios\
    • c:\couchdb\
    • c:\drivers\wireless wifi link driver (atheros, broadcom)\
    • c:\program files (x86)\common files\microsoft shared\vsto\9.0\visual studio tools for the office system 3.0 runtime\
    • c:\hp universal print driver\pcl6-x32-6.6.0.23029\

    • Finally, restart your computer.

    Method 2: Automatic Removal Using Tools (Recommended)

    1. Download Removal Tool

    2. Save it into your computer and install it step by step.

    3. During the installation process, the user interface is available in multiple languages and is easy to use.

    4. The installation process is an online installation, so after the installation is complete, the software version and virus database are up-to-date.

    5. After the installation is complete, run the antivirus software and click the "Scan Computer Now!" button to scan the whole system.

    6. Tick "Select all" and then Remove to delete all threats. Reboot your computer.

    When you find your operating system is abnormal, and the file name listed above appears in the Task Manager, or there are several processes in running with the same name as the core file name, it is best to download the anti-virus software to check your system.

    Online detection of install.exe

    If you don't know if install.exe is infected with malicious code on your computer, you may also use online scan tool.

    • Use the following online detection function to check the file.
  • • Enter the file name, or file MD5, for the query.
  • • You can also scan a file online. Click the "Upload File" button, and then click the "submit" button, to immediately detect whether the file is a virus. (Tip: The maximum size of the file uploaded cannot exceed 8MB)
  • How do I use the T21 engine for online scanning?

    T21 can detect unknown files online, mainly using "behavior-based" judgment mechanism. It is very simple to use T21.

    1. Click the "Upload File" button, select the file you want to detect, and then click "Submit".
    2. The next step is to wait for the system to check, which may take a little time, so please be patient.
    3. When the T21 scan engine finishes detection, the test results are immediately fed back, as shown below:

    • If you suspect that there are malicious files on your computer, but you cannot find where they are, or if you want to make a thorough check on your computer, you can download the automatic scanning tool.

    If you want to know what kind of T21 system is, you can click here to view the introduction of T21. You can also go to the home page to read the original intention and philosophy of my development of T21 system.

    Other captured malicious files:
    attrib.exe file analysis
    util3d.dll file analysis
    devsetup.exe file analysis
    aeadisrv.exe file analysis
    smax4pnp.exe file analysis
    ws2help.dll file analysis
    dopdf.exe file analysis
    intel_opencl_icd32.dll file analysis
    ocl_cpu_intelopencl32.dll file analysis
    Copyright statement: The above data is obtained by my analysis, and without authorization, you may not copy or reprint it.
    Leave a Reply

    Your email address will not be published. Required fields are marked *
    If you need help, please leave a message, try to match the picture, and I will reply as soon as possible to each question.

    Name *

    Email

      Comment
      ToolBar:
    Preview, Read Only, Click here Edit Post.

    Copyright © 2016-2019 mygoodtools.com All rights reserved.