Gen.Variant.Graftor.37429_5193a201b7
HEUR:Trojan.Win32.Generic (Kaspersky), Gen:Variant.Graftor.37429 (AdAware), Trojan-PSW.Win32.MSNPassword.FD, Trojan.Win32.FlyStudio.FD, TrojanFlyStudio.YR (Lavasoft MAS)
Behaviour: Trojan-PSW, Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 5193a201b7355f6ac00af96184d29d5d
SHA1: d66f981e23494860656b31e27e5dd4fcf8d91b46
SHA256: 4aa669e7382244709987ac4d6e52f0c966f373c65353d9d6778e6d5bd92fae51
SSDeep: 98304:GQHA/3XxoSj3XsbIABdUf0uXFvWomZHF7b MxntyV n:GQHAfxdjH4I8qVJGHF/txt n
Size: 5135223 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2016-08-14 22:15:49
Analyzed on: Windows7 SP1 32-bit
Summary:
Trojan-PSW. Trojan program intended for stealing users passwords.
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
svchostlsp.exe:3736
%original file name%.exe:452
117my.exe:2736
117my.exe:944
The Trojan injects its code into the following process(es):
svchosl.exe:3732
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process svchostlsp.exe:3736 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Windows\twain_32\config\ESPI11.dll (244 bytes)
C:\Windows\System32\addressoftext.inscan (1 bytes)
C:\Windows\System32\ESPI11.dll (723 bytes)
The process %original file name%.exe:452 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Windows\svchost.exe (12649 bytes)
C:\Windows\117my.exe (7296 bytes)
C:\Windows\117my.com.bat (258 bytes)
C:\Windows\Game.ico:Zone.Identifier (26 bytes)
C:\Windows\svchosl.exe (8713 bytes)
C:\Windows\Game.ico (1978 bytes)
C:\Windows\117my.skn (2160 bytes)
C:\Users\"%CurrentUserName%"\Desktop\117éÂâ€Ã¥Å¸Å¸7.1.lnk (1 bytes)
The Trojan deletes the following file(s):
C:\Windows\__tmp_rar_sfx_access_check_1308957 (0 bytes)
The process svchosl.exe:3732 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\YBU4WGCW.txt (103 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\host[1].htm (775 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\CCQ2R3OL.txt (0 bytes)
The process 117my.exe:2736 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Temp\117my.exe (294 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Temp\svchostlsp.exe (1948 bytes)
The process 117my.exe:944 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Temp\Data\JpHrc.txt (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Temp\Data\Mag.dat (101 bytes)
C:\Windows\System32\drivers\etc\hosts (39 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Temp\Data\Repairdata.txt (3 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Temp\117my.skn (62 bytes)
C:\Windows\117my.skn (65 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Temp\Data\117my.ini (28 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Temp\Data\iat.dll (89 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\svg[1].svg (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\OF9L3DR3.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\fc72ORSzwyUu08nYIdyG-ygy8w8[1].svg (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\OLCWAOT0.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\_yaru.ru[1].js (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\YJCP8HIK.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\jquery.min[1].js (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\fc07[1].swf (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\eS-nxtWWJ1LfBWLfd096swuFjH4[1].svg (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\f[1].txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\svg[1].svg (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\9fkhsVhseQ-JJcxiLZwCHjhHY[1].svg (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\00CZ9B9Z.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\BPMHTAIlmc5kh6Tymb1I2mmfSAc[1].svg (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\ZZxR-E_UBI8_1IS7VtDkH_bgw[1].css (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\59FYE1S2.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Temp\Data\JpHrc.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\QVWF9XLH.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\K3H6JGON.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\SHMEGTHE.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\379IMDJA.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\VqEnvKPzCrM8a4pakUu0bzh7d9o[1].svg (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\G6NPTRAV.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\watch[1].js (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\HGQPYGV7.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\YBU4WGCW.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\4CWVLDFS.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Temp\Data\Repairdata.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\A5VV6NGJ.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\search[1].htm (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\O761920L.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\FBUBDDF0.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\983WD333.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\spacer[1].gif (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\ya_favicon_ru[1].ico (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\PMGXNABP.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\AJQLWW1A.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\LXL295FY.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\AllServices[1].xml (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\fc07_2[1].htm (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\CZKDRHGB.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\P2Z07O4S.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\VPSNR0J4.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\nearest[1].js (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\Tsv1TyvAx4g5KyOkiAdSP1Stniw[1].svg (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\SN1VAMHK.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\SK6RC4AQ.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\8WNTYFZE.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\otvet.mail[1].png (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\KK0IK9EV.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\_search.uk[1].js (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\KCULDY7L.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\MG_en-us[1].xml (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\GetMDRCDPOSTURL[1].aspx (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\7ZFPBM01.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\ETGRPT21.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\KJGZP41Y.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\8Q2KNK5G.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\NWCBOWT9.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\1I56O6EZ.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\Yd__VnAFnBZBQiIS0sHoF6FGRC8[1].svg (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\PFR2GFQJ.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\GB74HSLE.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\KUZ61ORW.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\KE9BMB37.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\9UFT3VMU.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\svg[1].svg (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\K4EMAOY7.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\GF0JZXVN.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\XJJJSX58.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\FDGZES7U.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\03Z3OHNC.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\IAU75TW2.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\AW5IGQT7.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\f[1].txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\0VR58838.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\Z40SB5AS.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\jquery.min[1].js (0 bytes)
Registry activity
The process svchostlsp.exe:3736 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Tracing\svchostlsp_RASAPI32]
"EnableConsoleTracing" = "0"
[HKLM\System\CurrentControlSet\Services\WinSock2\ESPI11]
"FileName" = "C:\Windows\system32\ESPI11.dll"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\svchostlsp_RASMANCS]
"EnableConsoleTracing" = "0"
[HKLM\System\CurrentControlSet\Services\WinSock2\ESPI11]
"1014" = "25 53 79 73 74 65 6D 52 6F 6F 74 25 5C 73 79 73"
"1012" = "25 53 79 73 74 65 6D 52 6F 6F 74 25 5C 73 79 73"
[HKLM\SOFTWARE\Microsoft\Tracing\svchostlsp_RASMANCS]
"EnableFileTracing" = "0"
"ConsoleTracingMask" = "4294901760"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\svchostlsp_RASMANCS]
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Tracing\svchostlsp_RASAPI32]
"MaxFileSize" = "1048576"
[HKLM\System\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000010]
"PackedCatalogItem" = "43 3A 5C 57 69 6E 64 6F 77 73 5C 73 79 73 74 65"
[HKLM\SOFTWARE\Microsoft\Tracing\svchostlsp_RASAPI32]
"FileDirectory" = "%windir%\tracing"
[HKLM\System\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000001]
"PackedCatalogItem" = "43 3A 5C 57 69 6E 64 6F 77 73 5C 73 79 73 74 65"
[HKLM\System\CurrentControlSet\Services\WinSock2\ESPI11]
"1002" = "25 53 79 73 74 65 6D 52 6F 6F 74 25 5C 73 79 73"
"1003" = "25 53 79 73 74 65 6D 52 6F 6F 74 25 5C 73 79 73"
"1001" = "25 53 79 73 74 65 6D 52 6F 6F 74 25 5C 73 79 73"
[HKLM\System\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000002]
"PackedCatalogItem" = "43 3A 5C 57 69 6E 64 6F 77 73 5C 73 79 73 74 65"
[HKLM\System\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000008]
"PackedCatalogItem" = "43 3A 5C 57 69 6E 64 6F 77 73 5C 73 79 73 74 65"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "46 00 00 00 40 00 00 00 09 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Tracing\svchostlsp_RASAPI32]
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\svchostlsp_RASMANCS]
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\svchostlsp_RASAPI32]
"EnableFileTracing" = "0"
[HKLM\System\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000003]
"PackedCatalogItem" = "43 3A 5C 57 69 6E 64 6F 77 73 5C 73 79 73 74 65"
[HKLM\SOFTWARE\Microsoft\Tracing\svchostlsp_RASAPI32]
"ConsoleTracingMask" = "4294901760"
[HKCU]
"wodezhucbxm_1" = "393972"
[HKLM\SOFTWARE\Microsoft\Tracing\svchostlsp_RASMANCS]
"FileDirectory" = "%windir%\tracing"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyOverride"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyServer"
"AutoConfigURL"
The process %original file name%.exe:452 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
"UNCAsIntranet" = "0"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
The process svchosl.exe:3732 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU]
"wodezpoiuy_5" = "328482"
[HKLM\SOFTWARE\Microsoft\Tracing\svchosl_RASAPI32]
"EnableConsoleTracing" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\svchosl_RASAPI32]
"MaxFileSize" = "1048576"
"ConsoleTracingMask" = "4294901760"
"FileDirectory" = "%windir%\tracing"
[HKLM\SOFTWARE\Microsoft\Tracing\svchosl_RASMANCS]
"EnableConsoleTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\svchosl_RASAPI32]
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\svchosl_RASMANCS]
"MaxFileSize" = "1048576"
"ConsoleTracingMask" = "4294901760"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "46 00 00 00 3F 00 00 00 09 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Tracing\svchosl_RASMANCS]
"FileDirectory" = "%windir%\tracing"
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\svchosl_RASAPI32]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\svchosl_RASMANCS]
"EnableFileTracing" = "0"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"xf1" = "C:\Windows\svchosl.exe /start"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyOverride"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyServer"
"AutoConfigURL"
The process 117my.exe:2736 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
"UNCAsIntranet" = "0"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
The process 117my.exe:944 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Tracing\117my_RASAPI32]
"ConsoleTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\117my_RASMANCS]
"FileDirectory" = "%windir%\tracing"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\DDECache\IExplore\WWW_OpenURL]
"WindowClassName" = "DDEMLMom"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\117my_RASMANCS]
"EnableFileTracing" = "0"
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\117my_RASAPI32]
"MaxFileSize" = "1048576"
"FileTracingMask" = "4294901760"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\DDECache\IExplore\WWW_OpenURL]
"processname" = "iexplore.exe"
[HKLM\SOFTWARE\Microsoft\Tracing\117my_RASMANCS]
"ConsoleTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\117my_RASAPI32]
"FileDirectory" = "%windir%\tracing"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "46 00 00 00 41 00 00 00 09 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Tracing\117my_RASAPI32]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\117my_RASMANCS]
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Tracing\117my_RASAPI32]
"EnableConsoleTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\117my_RASMANCS]
"EnableConsoleTracing" = "0"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyServer"
"ProxyOverride"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
Dropped PE files
| MD5 | File path |
|---|---|
| 0392346d2aa6c76da5ca7dda28564b41 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\Temp\117my.exe |
| 4a9e26121421e5b6c47f50309cb63266 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\Temp\117my.skn |
| 671575e2cc623b3d093538f1e658ad93 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\Temp\Data\iat.dll |
| 23d8fd353597d2edda54bdbad280749f | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\Temp\svchostlsp.exe |
| 6a455c4a2c7fe46c633fd085c0204696 | c:\Windows\117my.exe |
| 4a9e26121421e5b6c47f50309cb63266 | c:\Windows\117my.skn |
| 6ded751b628ddb2a1c0c05f18858437c | c:\Windows\System32\ESPI11.dll |
| ee6c854fa4e81138fcfcfbda7418ec6b | c:\Windows\svchosl.exe |
| 57b609130b60649f4a2729b164b7527b | c:\Windows\svchost.exe |
| 6ded751b628ddb2a1c0c05f18858437c | c:\Windows\twain_32\config\ESPI11.dll |
HOSTS file anomalies
The Trojan modifies "%System%\drivers\etc\hosts" file which is used to translate DNS entries to IP addresses.
The modified file is 5537 bytes in size. The following strings are added to the hosts file listed below:
| 170.178.171.31 | www.176cc.cc |
| 170.178.171.31 | www.52my.com |
| 170.178.171.31 | www.crsky.com |
| 170.178.171.31 | crsky.com |
| 170.178.171.31 | www.901my.com |
| 170.178.171.31 | 901my.com |
| 170.178.171.31 | moyu.so |
| 170.178.171.31 | kkk.dstfkj.com.cn |
| 170.178.171.31 | dstfkj.com.cn |
| 170.178.171.31 | www.214my.com |
| 170.178.171.31 | www.h360k.com |
| 170.178.171.31 | h360k.com |
| 170.178.171.31 | rsivy.pw |
| 170.178.171.31 | 214my.com |
| 170.178.171.31 | www.270my.com |
| 170.178.171.31 | 360.chihuo0517.com |
| 170.178.171.31 | chihuo0517.com |
| 170.178.171.31 | 270my.com |
| 170.178.171.31 | www.moyu.so |
| 170.178.171.31 | www.hwkam.com |
| 170.178.171.31 | 178stu.com |
| 170.178.171.31 | www.178stu.com |
| 170.178.171.31 | hwkam.com |
| 170.178.171.31 | www.5917wan.com |
| 170.178.171.31 | www.delifs.com |
| 170.178.171.31 | delifs.com |
| 170.178.171.31 | www.11moyu.com |
| 170.178.171.31 | t2.web.tonnn.com |
| 170.178.171.31 | www.2828my.com |
| 170.178.171.31 | 2828my.com |
| 170.178.171.31 | tonnn.com |
| 170.178.171.31 | www.11my.net |
| 170.178.171.31 | www.91my.com |
| 170.178.171.31 | 91my.com |
| 170.178.171.31 | wg.91my.com |
| 170.178.171.31 | my.178stu.com |
| 170.178.171.31 | 134my.com |
| 170.178.171.31 | www.134my.com |
| 170.178.171.31 | 001my.com |
| 170.178.171.31 | www.910my.com |
| 170.178.171.31 | 910my.com |
| 170.178.171.31 | www.901my.com |
| 170.178.171.31 | 901my.com |
| 170.178.171.31 | www.6moyu.com |
| 170.178.171.31 | 110moyu.com |
| 170.178.171.31 | www.110moyu.com |
| 170.178.171.31 | dl.pconline.com.cn |
| 170.178.171.31 | www.moyushou.com |
| 170.178.171.31 | pconline.com.cn |
| 170.178.171.31 | www.52z.com |
| 170.178.171.31 | wanba.baidu.com |
| 170.178.171.31 | www.99sfmy.com |
| 170.178.171.31 | www.mycom114.com |
| 170.178.171.31 | www.xpy7.com |
| 170.178.171.31 | xpy7.com |
| 170.178.171.31 | www.tztw88.net |
| 170.178.171.31 | www.cncrk.com |
| 170.178.171.31 | www.laomy.net |
| 170.178.171.31 | www.kk8181.com |
| 170.178.171.31 | pk255.com |
| 170.178.171.31 | www.pk255.com |
| 170.178.171.31 | www.99hjmy.com |
| 170.178.171.31 | www.550my.com |
| 170.178.171.31 | 99moyu.net |
| 170.178.171.31 | www.n13.cc |
| 170.178.171.31 | www.18ytl.com |
| 170.178.171.31 | www.x99my.cc |
| 170.178.171.31 | tg.weegame.com |
| 170.178.171.31 | weegame.com |
| 170.178.171.31 | t.cnsaier.com |
| 170.178.171.31 | cnsaier.com |
| 170.178.171.31 | laas.zafu.edu.cn |
| 170.178.171.31 | www.tianya.cn |
| 170.178.171.31 | www.9000my.com |
| 170.178.171.31 | 139my.3313sf.cn |
| 170.178.171.31 | www.qweqt.org.cn |
| 170.178.171.31 | moyu.spxwj.com |
| 170.178.171.31 | www.ahwfauto.com |
| 170.178.171.31 | www.ttms168.com |
| 170.178.171.31 | www.x99moyu.net |
| 170.178.171.31 | t.kmly988.com |
| 170.178.171.31 | t.ahtaoy.com |
| 170.178.171.31 | t.cnsaier.com |
| 170.178.171.31 | www.55moyu.com |
| 170.178.171.31 | www.xsf7.com |
| 170.178.171.31 | 99moyu.com |
| 170.178.171.31 | www.99moyu.com |
| 170.178.171.31 | sogou.1118st.com |
| 170.178.171.31 | 1118st.com |
| 170.178.171.31 | www.173185.net |
| 170.178.171.31 | www.518ak.com |
| 170.178.171.31 | lpput.com |
| 170.178.171.31 | hjmyh.com |
| 170.178.171.31 | www.5555my.com |
| 170.178.171.31 | aaa.5555my.com |
| 170.178.171.31 | www.hjmyh.com |
| 170.178.171.31 | www.195my.com |
| 170.178.171.31 | 195my.com |
| 170.178.171.31 | www.195sy.com |
| 170.178.171.31 | 195sy.com |
| 170.178.171.31 | spxwj.com |
| 170.178.171.31 | 817zs.cn |
| 170.178.171.31 | mmmmm.cnm78.com |
| 170.178.171.31 | www.139sfmy.com |
| 170.178.171.31 | www.gaoji.co |
| 170.178.171.31 | kkk.5917my.com |
| 170.178.171.31 | 5917my.com |
| 170.178.171.31 | cnm78.com |
| 170.178.171.31 | www.87tf.com |
| 170.178.171.31 | www.wxycw.com |
| 170.178.171.31 | zzxyyyz.com |
| 170.178.171.31 | www.zzxyyyz.com |
| 170.178.171.31 | www.150my.com |
| 170.178.171.31 | www.seefp.com |
| 170.178.171.31 | www.sz-jhled.com |
| 170.178.171.31 | www.9my.net |
| 170.178.171.31 | www.92mysf.com |
| 170.178.171.31 | sogu.173185.net |
| 170.178.171.31 | 173185.net |
| 170.178.171.31 | jxkb56.com |
| 170.178.171.31 | yon.jxkb56.com |
| 170.178.171.31 | sogou13.170shouyou.com |
| 170.178.171.31 | www.915my.com |
| 170.178.171.31 | 915my.com |
| 170.178.171.31 | www.hao2288.cn |
| 170.178.171.31 | ddddddd.xckdee.com |
| 170.178.171.31 | www.173ka.net |
| 170.178.171.31 | duge.xunleimy.com |
| 170.178.171.31 | mmmmm.cnm78.com |
| 170.178.171.31 | kkk.51173wan.com |
| 170.178.171.31 | www.hao2288.cn |
| 170.178.171.31 | ddddddd.xckdee.com |
| 170.178.171.31 | www.173ka.net |
| 170.178.171.31 | duge.xunleimy.com |
| 170.178.171.31 | mmmmm.cnm78.com |
| 170.178.171.31 | kkk.51173wan.com |
| 170.178.171.31 | 170shouyou.com |
| 170.178.171.31 | www.173ka.net |
| 170.178.171.31 | www.58wg.co |
| 170.178.171.31 | www.58wgw.com |
| 170.178.171.31 | www.my158.com |
| 170.178.171.31 | www.huaimy.com |
| 170.178.171.31 | huaimy.com |
| 170.178.171.31 | www.dudumy.cn |
| 170.178.171.31 | www.nmoyu.com |
| 170.178.171.31 | www.357my.com |
| 170.178.171.31 | www.139my.com |
| 170.178.171.31 | www.001my.com |
| 170.178.171.31 | www.xunleimy.com |
| 170.178.171.34 | www.117my.com |
| 170.178.171.31 | www.181my.com |
| 170.178.171.31 | kkk.51173wan.com |
| 170.178.171.31 | www.ucbug.com/moyu |
| 170.178.171.31 | www.zhujiangroad.com |
| 170.178.171.31 | sss.u8nz.com |
| 170.178.171.31 | www.xixiwg.com |
| 170.178.171.31 | www.vdisk.cn |
| 170.178.171.31 | www.592my.net |
| 170.178.171.31 | www.581my.com |
| 170.178.171.31 | www.592wg.cc |
| 170.178.171.31 | www.moyusifu.com |
| 170.178.171.31 | www.139myw.com |
| 170.178.171.31 | www.rmoyu.com |
| 170.178.171.31 | www.001my.com.co |
| 170.178.171.31 | www.001my.com.cn |
| 170.178.171.31 | mmm.139sfmy.com |
| 170.178.171.31 | my.99.com |
| 170.178.171.31 | 99.com |
| 170.178.171.31 | www.tjggg.com |
| 170.178.171.31 | www.gmoyu.com |
| 170.178.171.31 | 139sfmy.com |
| 170.178.171.31 | 770my.com |
| 170.178.171.31 | www.770my.com |
| 170.178.171.31 | www.660my.com |
| 170.178.171.31 | 660my.com |
| 170.178.171.31 | www.2525my.cn |
| 170.178.171.31 | tjggg.com |
| 170.178.171.31 | www.99my.com.co |
| 170.178.171.31 | www.520jzw.com |
| 170.178.171.31 | www.70my.com |
| 170.178.171.31 | www.13moyu.com |
| 170.178.171.31 | laomy.net |
| 170.178.171.31 | www1.dlbyhw.com |
| 170.178.171.31 | dlbyhw.com |
| 170.178.171.31 | www.clzs888.com |
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 188392 | 188416 | 4.65119 | 2ae181684b1677561119f5765623448e |
| .rdata | 192512 | 39376 | 39424 | 3.57169 | 0e0f6a60d8fa917a060c8ef7becc0888 |
| .data | 233472 | 129208 | 3072 | 2.28424 | 4e4aa728d9cced1622c2be27733e3fc5 |
| .gfids | 364544 | 240 | 512 | 1.47202 | c923099e27bf0e45a5c402d935d0620b |
| .rsrc | 368640 | 19884 | 19968 | 4.01107 | 5c996f60fd4566aa444b73d2a69de10c |
| .reloc | 389120 | 8076 | 8192 | 4.59547 | d13d3f8a8adfe6861c49a01d81cf73ed |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://passport.n.shifen.com/?business&un=5182235367&from=prin | |
| hxxp://www.gxnkw.com/jc/bjcguanjianzi.txt?WebShieldDRSessionVerify=YizhEArCBnQ1QwpILGI0 | |
| hxxp://www.gxnkw.com/jc/tongji.txt | |
| hxxp://www.gxnkw.com/jc/bjcguanjianzi.txt | |
| hxxp://www.gxnkw.com/jc/jcd.txt | |
| hxxp://www.92117my.com/host.html | |
| hxxp://18201869647.oicp.net/ | |
| hxxp://18201869647.oicp.net/favicon.ico | |
| hxxp://www.gxnkw.com/jc/hostjc.txt | |
| hxxp://www.92117my.com/index1.htm | |
| hxxp://www.92117my.com/logo.jpg | |
| hxxp://www.92117my.com/game.html | |
| hxxp://www.92117my.com/images/new.js | |
| hxxp://www.92117my.com/images/xx.css | |
| hxxp://www.92117my.com/images/bg.jpg | |
| hxxp://www.92117my.com/images/Index_c1_r5.jpg | |
| hxxp://www.92117my.com/Images/Index_bottom.jpg | |
| hxxp://cdn.globalsigncdn.com/rootr1/MEwwSjBIMEYwRDAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6+MgGqMQQUYHtmGkUNl8qJUC99BM00qP/8/UsCCwQAAAAAAURO8EJH | |
| hxxp://cdn.globalsigncdn.com/gsorganizationvalsha2g2/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBQMnk2cPe3vhNiR6XLHz4QGvBl7BwQUlt5h8b0cFilTHMDMfTuDAEDmGnwCDBisczuS0Hu180XFAA== | |
| hxxp://www.92117my.com/favicon.ico | |
| hxxp://cdn.globalsigncdn.com/gsorganizationvalsha2g2/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBQMnk2cPe3vhNiR6XLHz4QGvBl7BwQUlt5h8b0cFilTHMDMfTuDAEDmGnwCDGlwEnDh1Wq84Ev4Sw== | |
| hxxp://www.taobao.com.danuoyi.tbcache.com/ | |
| hxxp://cdn.globalsigncdn.com/gsorganizationvalsha2g2/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBQMnk2cPe3vhNiR6XLHz4QGvBl7BwQUlt5h8b0cFilTHMDMfTuDAEDmGnwCDEVLD4SzDqtMG/eBnw== | |
| hxxp://www.gxnkw.com/jc/hostjc.txt?WebShieldDRSessionVerify=EMGc17Wrs9kjNC7K8XBq | |
| hxxp://gpla1.wac.v2cdn.net/CRL/Omniroot2025.crl | |
| hxxp://www.taobao.com/ | |
| hxxp://passport.baidu.com/?business&un=5182235367&from=prin | |
| hxxp://ocsp.globalsign.com/rootr1/MEwwSjBIMEYwRDAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6+MgGqMQQUYHtmGkUNl8qJUC99BM00qP/8/UsCCwQAAAAAAURO8EJH | |
| hxxp://ocsp2.globalsign.com/gsorganizationvalsha2g2/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBQMnk2cPe3vhNiR6XLHz4QGvBl7BwQUlt5h8b0cFilTHMDMfTuDAEDmGnwCDGlwEnDh1Wq84Ev4Sw== | |
| hxxp://www.117my.cc/ | |
| hxxp://ocsp2.globalsign.com/gsorganizationvalsha2g2/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBQMnk2cPe3vhNiR6XLHz4QGvBl7BwQUlt5h8b0cFilTHMDMfTuDAEDmGnwCDBisczuS0Hu180XFAA== | |
| hxxp://cdp1.public-trust.com/CRL/Omniroot2025.crl | |
| hxxp://www.117my.cc/favicon.ico | |
| hxxp://ocsp2.globalsign.com/gsorganizationvalsha2g2/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBQMnk2cPe3vhNiR6XLHz4QGvBl7BwQUlt5h8b0cFilTHMDMfTuDAEDmGnwCDEVLD4SzDqtMG/eBnw== | |
| wg.200my.com | |
| s95.cnzz.com | |
| z4.cnzz.com | |
| world.taobao.com | |
| c.cnzz.com | |
| cnzz.mmstat.com |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET POLICY Unsupported/Fake Windows NT Version 5.0
ET POLICY HTTP Request on Unusual Port Possibly Hostile
Traffic
GET /jc/hostjc.txt HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: VVV.gxnkw.com
Cache-Control: no-cache
HTTP/1.1 302 Found
Server: Safedog/4.0.0
Location: /jc/hostjc.txt?WebShieldDRSessionVerify=EMGc17Wrs9kjNC7K8XBq
Content-Length: 0
Connection: Close
Content-Type: text/html
GET /jc/bjcguanjianzi.txt HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: VVV.gxnkw.com
Cache-Control: no-cache
Connection: Keep-Alive
HTTP/1.1 200 OK
Content-Length: 200
Content-Type: text/plain
Last-Modified: Sun, 08 Jan 2017 11:29:25 GMT
Accept-Ranges: bytes
ETag: "583b2977a269d21:22a0"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 19 Jan 2017 00:36:41 GMT....sf......................001my..139my..70..........................
................................................001......139..........
....178................520........................chihuo0517...
.
GET /jc/jcd.txt HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: VVV.gxnkw.com
Cache-Control: no-cache
HTTP/1.1 200 OK
Content-Length: 32
Content-Type: text/plain
Last-Modified: Thu, 12 Jan 2017 10:59:28 GMT
Accept-Ranges: bytes
ETag: "ca42d5f1c26cd21:22a0"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 19 Jan 2017 00:36:41 GMThXXp://VVV.92117my.com/host.html....
GET /jc/tongji.txt HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: VVV.gxnkw.com
Cache-Control: no-cache
HTTP/1.1 200 OK
Content-Length: 0
Content-Type: text/plain
Last-Modified: Mon, 17 Aug 2015 16:25:45 GMT
Accept-Ranges: bytes
ETag: "4c1ca75e9d9d01:22a0"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 19 Jan 2017 00:36:42 GMTHTTP/1.1 200 OK..Content-Length: 0..Content-Type: text/plain..Last-Mod
ified: Mon, 17 Aug 2015 16:25:45 GMT..Accept-Ranges: bytes..ETag: "4c1
ca75e9d9d01:22a0"..Server: Microsoft-IIS/6.0..X-Powered-By: ASP.NET..D
ate: Thu, 19 Jan 2017 00:36:42 GMT..
GET /gsorganizationvalsha2g2/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBQMnk2cPe3vhNiR6XLHz4QGvBl7BwQUlt5h8b0cFilTHMDMfTuDAEDmGnwCDGlwEnDh1Wq84Ev4Sw== HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ocsp2.globalsign.com
HTTP/1.1 200 OK
Date: Thu, 19 Jan 2017 00:40:40 GMT
Content-Type: application/ocsp-response
Content-Length: 1570
Connection: keep-alive
Set-Cookie: __cfduid=d9bd14783e463ca82c5866086ae2f56f41484786440; expires=Fri, 19-Jan-18 00:40:40 GMT; path=/; domain=.globalsign.com; HttpOnly
Last-Modified: Wed, 18 Jan 2017 23:26:57 GMT
Expires: Sun, 22 Jan 2017 23:26:57 GMT
ETag: "ce2c9bab38408c822469b28825da8da8a11ff254"
Cache-Control: public, no-transform, must-revalidate
CF-Cache-Status: HIT
Server: cloudflare-nginx
CF-RAY: 32363c92e3e24038-SOF0..........0..... .....0......0...0.......M........u....%...G..2017011
8232657Z0o0m0E0... ..........M.=......r......{.....a....)S...};..@..|.
.ip.p..j..K.K....20170118232657Z....20170122232657Z0...*.H............
.uO.5......./w;3.....3.J.n...E.....j.i..'...?.n>..J..l.sa......./..
..@.z..Qh.cc..l[...q.W ...g%.....o...f..."....9..;v_.n..m..!...f@.M...
!.Yu.L3'C.6'......saI.G.d'B..b.u.H......_....m.f.Z.....g...DHY.z.O[.|U
[o..#.O....0<....h....>...}..m..s....O..........8t...K0..G0..C0.
. .......q..}.dc.j..(0...*.H........0f1.0...U....BE1.0...U....GlobalSi
gn nv-sa1<0:..U...3GlobalSign Organization Validation CA - SHA256 -
G20...161124031843Z..170224031843Z0..1.0...U....BE1.0...U....GlobalSi
gn nv-sa1.0...U....2016112411281M0K..U...DGlobalSign Organization Vali
dation CA - SHA256 - G2 - OCSP Responder0.."0...*.H.............0.....
....C..0j..R........0.".e.&.6'.d..._.....8...Y..../..z..-hi.k.......D.
........u..>h....T2..~..*;...v.^.!d.......8.p.e..me...>..V...l..
.P.6.V..G..;X.......12U.)D.E(ldQ...67..@......l...A.>l......m..e;..
...n.~..Wb.?..gE.......a.KM.F...}.qo;S...`/..s....6....G.a........0..0
...U.......M........u....%...G0...U.#..0.....a....)S...};..@..|0... ..
...0......0L..U. .E0C0A.. .....2._0402.. ........&hXXps://VVV.globalsi
gn.com/repository/0...U...........0...U.%..0... .......0...*.H........
......H.....C.Ie....;.yN.'..../?.T..-T.a..4...n..OW/l....[|..-.i../.'.
.1."......3[...J.....\@.S.=-p..p......d...>~J.|E0y......!.;.c.,...|
|.V....K..L...dX...a....6'..U..G....A;..........4K...........k.B].<<< skipped >>>
GET /?business&un=5182235367&from=prin HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: passport.baidu.com
Cache-Control: no-cache
HTTP/1.1 200 OK
Connection: keep-alive
Content-Type: text/html
Date: Thu, 19 Jan 2017 00:40:03 GMT
P3p: CP=" OTI DSP COR IVA OUR IND COM "
Server: Apache
Set-Cookie: BAIDUID=9D02E474B4BC9B1BC9F49E269184DEEF:FG=1; expires=Fri, 19-Jan-18 00:40:02 GMT; max-age=31536000; path=/; domain=.baidu.com; version=1
Tracecode: 24029977590332382986011908
Tracecode: 24029977590286507274011908
Vary: Accept-Encoding
Vary: Accept-Encoding
Transfer-Encoding: chunked3d0..<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"hXXp://VVV.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">.<htm
l xmlns="hXXp://VVV.w3.org/1999/xhtml">.<head>.<meta http-
equiv="Content-Type" content="text/html; charset=utf-8" />.<titl
e>........................_5182235367</title>.<link rel="s
tylesheet" href="/style/v2/info.css?t=20100901" type="text/css" media=
"all" />.<script type="text/javascript" src="/js/center_accountb
ind.js?t=20100901"></script>.<script type="text/javascript
" src="/js/business.js?t=20100901"></script>.<script langu
age="javascript">. document.domain = "baidu.com";. window
.hasSpace = '';. var tabinfo = initTabInfo('5182235367');. v
ar ab=gethash(1);. if(ab>0 && ab<tabinfo.length). {.
if(tabinfo[ab][2]=="_blank"). {. window.loca
tion=tabinfo[ab][0];. }. }. function fixImgSize(img)
{... var width = img.offsetWidth;... var height = img.offsetHeight;.
.. if( w..1a65..idth>78 ){... width>height?( img.style.wid
th='78px' ):( img.style.height='78px' );... }else if( height>78 ){
... img.style.height='78px';... }.. }. </script>.</
head>.<body onLoad="javascript:chgdeftab(0);">.
<div class="wrapper">.<noscript>
.<p class="nojs">...............................................
.....................................</p>.</noscript>.<<< skipped >>>
GET /jc/tongji.txt HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: VVV.gxnkw.com
Cache-Control: no-cache
HTTP/1.1 200 OK
Content-Length: 0
Content-Type: text/plain
Last-Modified: Mon, 17 Aug 2015 16:25:45 GMT
Accept-Ranges: bytes
ETag: "4c1ca75e9d9d01:22a0"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 19 Jan 2017 00:36:41 GMTHTTP/1.1 200 OK..Content-Length: 0..Content-Type: text/plain..Last-Mod
ified: Mon, 17 Aug 2015 16:25:45 GMT..Accept-Ranges: bytes..ETag: "4c1
ca75e9d9d01:22a0"..Server: Microsoft-IIS/6.0..X-Powered-By: ASP.NET..D
ate: Thu, 19 Jan 2017 00:36:41 GMT......
GET /jc/tongji.txt HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: VVV.gxnkw.com
Cache-Control: no-cache
HTTP/1.1 200 OK
Content-Length: 0
Content-Type: text/plain
Last-Modified: Mon, 17 Aug 2015 16:25:45 GMT
Accept-Ranges: bytes
ETag: "4c1ca75e9d9d01:22a0"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 19 Jan 2017 00:36:49 GMTHTTP/1.1 200 OK..Content-Length: 0..Content-Type: text/plain..Last-Mod
ified: Mon, 17 Aug 2015 16:25:45 GMT..Accept-Ranges: bytes..ETag: "4c1
ca75e9d9d01:22a0"..Server: Microsoft-IIS/6.0..X-Powered-By: ASP.NET..D
ate: Thu, 19 Jan 2017 00:36:49 GMT......
GET /jc/tongji.txt HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: VVV.gxnkw.com
Cache-Control: no-cache
HTTP/1.1 200 OK
Content-Length: 0
Content-Type: text/plain
Last-Modified: Mon, 17 Aug 2015 16:25:45 GMT
Accept-Ranges: bytes
ETag: "4c1ca75e9d9d01:22a0"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 19 Jan 2017 00:36:58 GMTHTTP/1.1 200 OK..Content-Length: 0..Content-Type: text/plain..Last-Mod
ified: Mon, 17 Aug 2015 16:25:45 GMT..Accept-Ranges: bytes..ETag: "4c1
ca75e9d9d01:22a0"..Server: Microsoft-IIS/6.0..X-Powered-By: ASP.NET..D
ate: Thu, 19 Jan 2017 00:36:58 GMT......
GET /CRL/Omniroot2025.crl HTTP/1.1
Connection: Keep-Alive
Accept: */*
If-Modified-Since: Sat, 16 Nov 2013 06:15:02 GMT
If-None-Match: "200da-5b6-4eb453c33260e"
User-Agent: Microsoft-CryptoAPI/6.1
Host: cdp1.public-trust.com
HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Type: application/x-pkcs7-crl
Date: Thu, 19 Jan 2017 00:40:59 GMT
Etag: "200c0-cba-54651a19dc944"
Last-Modified: Tue, 17 Jan 2017 22:15:01 GMT
Server: ECS (arn/45CB)
X-Cache: HIT
Content-Length: 32580...0......0...*.H........0Z1.0...U....IE1.0...U....Baltimore1.0...U..
..CyberTrust1"0 ..U....Baltimore CyberTrust Root..170117212826Z..17041
4212826Z0...0....'k...120111220757Z0....'k...120111220847Z0....'.C..13
0130174530Z0....'....130807173059Z0....'....140122185220Z0....'....140
212185542Z0....'yr..150701184507Z0....'#...100303201301Z0....''q..1004
14175202Z0....'L...110224181251Z0....'Pn..110309142119Z0....'....10021
6203312Z0....'#...100303201213Z0....'3#..100908172555Z0....''n..101208
175627Z0....''m..101208175749Z0....''p..101208175916Z0....'H...1101141
62156Z0#...'X>..110815145134Z0.0...U.......0#...'Z2..110818184101Z0
.0...U.......0....'g...120111164333Z0....'g...120111164409Z0....'g...1
20111164519Z0....'....100216213519Z0....''s..100414175225Z0....''k..10
0414181839Z0....'3"..100908172705Z0....'3$..100908172728Z0....''o..101
208175645Z0....''l..101208175727Z0....'H...110119195142Z0....'Nz..1103
02154045Z0....'c...111207220933Z0....'g...120111164445Z0....''r..10041
4175143Z0....'8...101012182723Z0....'e...120111163041Z0....'VJ..110714
160903Z0....'s...130123162633Z0....'....130904190524Z0....'....1310242
14319Z0....'....140129172435Z0....'....140129172453Z0....'....13102421
4310Z0....'....131101204601Z0....'....140219171632Z0....'.^..140409155
638Z0....'i...140709171930Z0....'/:..141119193302Z0....'J...1506031846
05Z0....'k...150603185020Z0....'k...150603185058Z0....'k...15060318513
1Z0....'k...120111220827Z0....'8...140716191203Z0....'....131219195909
Z0....'....140219171545Z0....'k...151105070000Z0....'q...160126173<<< skipped >>>
GET /jc/bjcguanjianzi.txt?WebShieldDRSessionVerify=YizhEArCBnQ1QwpILGI0 HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: VVV.gxnkw.com
Cache-Control: no-cache
Connection: Keep-Alive
HTTP/1.1 302 Found
Server: Safedog/4.0.0
Location: /jc/bjcguanjianzi.txt
Content-Length: 0
Connection: Close
Content-Type: text/html
GET /jc/tongji.txt HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: VVV.gxnkw.com
Cache-Control: no-cache
HTTP/1.1 200 OK
Content-Length: 0
Content-Type: text/plain
Last-Modified: Mon, 17 Aug 2015 16:25:45 GMT
Accept-Ranges: bytes
ETag: "4c1ca75e9d9d01:22a0"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 19 Jan 2017 00:37:39 GMTHTTP/1.1 200 OK..Content-Length: 0..Content-Type: text/plain..Last-Mod
ified: Mon, 17 Aug 2015 16:25:45 GMT..Accept-Ranges: bytes..ETag: "4c1
ca75e9d9d01:22a0"..Server: Microsoft-IIS/6.0..X-Powered-By: ASP.NET..D
ate: Thu, 19 Jan 2017 00:37:39 GMT..
GET / HTTP/1.1
Accept: text/html, application/xhtml xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: VVV.117my.cc
Connection: Keep-Alive
HTTP/1.1 200 OK
Content-Length: 228
Content-Type: text/html
Content-Location: hXXp://VVV.117my.cc/index.html
Last-Modified: Mon, 15 Aug 2016 05:17:18 GMT
Accept-Ranges: bytes
ETag: "c85d104bb4f6d11:a7a"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 19 Jan 2017 00:39:59 GMT..<html>..........117...................2............<script
language="javascript"> .. <!-- .. setTimeout("goto()","1000");..
function goto(){.. window.location.href = "hXXp://VVV.92117my.com/inde
x1.htm";..}.. -->.. </script>HTTP/1.1 200 OK..Content-Length:
228..Content-Type: text/html..Content-Location: hXXp://VVV.117my.cc/i
ndex.html..Last-Modified: Mon, 15 Aug 2016 05:17:18 GMT..Accept-Ranges
: bytes..ETag: "c85d104bb4f6d11:a7a"..Server: Microsoft-IIS/6.0..X-Pow
ered-By: ASP.NET..Date: Thu, 19 Jan 2017 00:39:59 GMT....<html>.
.........117...................2............<script language="javas
cript"> .. <!-- .. setTimeout("goto()","1000");..function goto()
{.. window.location.href = "hXXp://VVV.92117my.com/index1.htm";..}.. -
->.. </script>..
GET /index1.htm HTTP/1.1
Accept: text/html, application/xhtml xml, */*
Referer: hXXp://VVV.117my.cc/
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: VVV.92117my.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Content-Length: 5219
Content-Type: text/html
Last-Modified: Thu, 12 Jan 2017 13:56:43 GMT
Accept-Ranges: bytes
ETag: "c8d99b5db6cd21:3fe"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 19 Jan 2017 00:39:37 GMT...<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "
hXXp://VVV.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">..<html
xmlns="hXXp://VVV.w3.org/1999/xhtml">..<head>..<meta http
-equiv="Content-Type" content="text/html; charset=utf-8" />..<ti
tle>......117................................................</t
itle>..<meta name="keywords" content="......sf,.................
.,117......" />..<meta name="description" content="117......sf..
......................................................................
......................................................................
....." />..<style type="text/css">..body{color:#175095;paddin
g:8px 0;background:#333;}..a{color:#175095;text-decoration:none;}..a:l
ink{color:#175095;text-decoration:none;}..a:hover{color:#e00;text-deco
ration:none;}..*{padding:0;margin:0;font-size:14px;font-family:'Micros
oft Yahei','Lucida Grande',Helvetica,Arial,sans-serif;}..#w{width:1002
px;margin:0 auto;padding:8px;background:#fff;-moz-border-radius:3px;-w
ebkit-border-radius:3px;border-radius:3px;-webkit-box-shadow:0 0 8px #
000000;-moz-box-shadow:0 0 8px #000000;box-shadow:0 0 8px #000000;}..#
logo{height:91px;background:url(logo.jpg) no-repeat;}..#d{margin-top:8
px;}..#d table{border-spacing:1px;width:100%;background:#e3f3fe;border
:1px solid #95bcd6;}..#d table tr:hover{background:#fff;}..#d td{paddi
ng:10px;line-height:15px;text-align:center;border:1px solid #95bcd6;ov
erflow:hidden;white-space:nowrap;}..#k{margin-top:8px;border-top:1<<< skipped >>>
GET /game.html HTTP/1.1
Accept: text/html, application/xhtml xml, */*
Referer: hXXp://VVV.92117my.com/index1.htm
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: VVV.92117my.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Content-Length: 17051
Content-Type: text/html
Last-Modified: Mon, 16 Jan 2017 11:52:03 GMT
Accept-Ranges: bytes
ETag: "cfaef4ee6fd21:3fe"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 19 Jan 2017 00:39:38 GMT<html>..<HEAD>..<title>117................</title
>..<meta http-equiv="Content-Type" content="text/html; charset=g
b2312">..<META NAME="keywords" CONTENT="117................">
..<META NAME="description" CONTENT="117................">..<M
ETA NAME="robots" CONTENT="all">..<script type='text/javascript'
>window.mod_pagespeed_start = Number(new Date());</script>..&
lt;link rel='stylesheet' href='images/xx.css' type='text/css'>..<
;script language=javascript src="images/new.js"></script>..&l
t;BODY leftMargin=0 topMargin=0>..<TABLE align='center' cellSpac
ing=0 cellPadding=0 width='100%' border=0>..<TR>..<TD>.
.<style type="text/css"> ..<!--..body{background:#2B0045 url(
images/bg.jpg) no-repeat center 0;font-size:12px;}...about {...height:
38px;width: 310px;font-size: 14px;line-height: normal;font-weight: bo
lder;font-family: "....";position: absolute;.left: auto;top: 96px;text
-align: left;}...logo{width:980px;height:120px;position:absolute;left:
261px;top:23px;}...logo a{width:980px;height:120px;display:block;posit
ion:inherit;text-indent:-9999px;}.....-->...aboutqq {...height: 28p
x;width: 310px;font-size: 14px;line-height: normal;font-weight: bolder
;font-family: "....";position: absolute;.left: auto;top: 76px;text-ali
gn: left;}...logo{width:980px;height:130px;position:absolute;left:201p
x;top:13px;}...logo a{width:980px;height:130px;display:block;position:
inherit;text-indent:-9999px;}.. .. ...banner{width:984px;margin:0<<< skipped >>>
GET /images/bg.jpg HTTP/1.1
Accept: image/png, image/svg xml, image/*;q=0.8, */*;q=0.5
Referer: hXXp://VVV.92117my.com/game.html
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: VVV.92117my.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Content-Length: 47783
Content-Type: image/jpeg
Last-Modified: Wed, 01 Jul 2015 07:57:44 GMT
Accept-Ranges: bytes
ETag: "08c919cd3b3d01:3fe"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 19 Jan 2017 00:39:39 GMT......Exif..II*.................Ducky.......F.....rhXXp://ns.adobe.com
/xap/1.0/.<?xpacket begin="..." id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.5-c01
4 79.151481, 2013/03/13-12:09:15 "> <rdf:RDF xmlns:rdf="h
ttp://VVV.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rd
f:about="" xmlns:xmpMM="hXXp://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="
hXXp://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="hXXp://ns.a
dobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:1AB21EE2D186E011A
F1EE9B4DAE6B957" xmpMM:DocumentID="xmp.did:8075A7ADFD1411E288C0AA50F7B
C029F" xmpMM:InstanceID="xmp.iid:8075A7ACFD1411E288C0AA50F7BC029F" xmp
:CreatorTool="Adobe Photoshop CC (Windows)"> <xmpMM:DerivedFrom
stRef:instanceID="xmp.iid:f3ed0250-4dae-e34c-bf8c-3468d4276f83" stRef:
documentID="xmp.did:1AB21EE2D186E011AF1EE9B4DAE6B957"/> </rdf:De
scription> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"
?>....Adobe.d......................................................
......................................................................
.....................................Z................................
................................1aQ!A...............................?.
.Cj. @..... @..... 4...7...... .6.H.@....H. 7.)....V..H. .....U).).).)
....R.B..@).)..P....E.AJ@)..P..JA.@).J@)....U[ ..S..<..?.....Jy..A.
.H.<.....@..).B.A......E).F..<.g..A...y..A..7..A..7...7.o .Eo ..
o*7.o ...... ...s.*..*7.\... ....Ar..\....\....s.".. .A.....3.e../<<< skipped >>>
GET /jc/tongji.txt HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: VVV.gxnkw.com
Cache-Control: no-cache
HTTP/1.1 200 OK
Content-Length: 0
Content-Type: text/plain
Last-Modified: Mon, 17 Aug 2015 16:25:45 GMT
Accept-Ranges: bytes
ETag: "4c1ca75e9d9d01:22a0"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 19 Jan 2017 00:36:41 GMTHTTP/1.1 200 OK..Content-Length: 0..Content-Type: text/plain..Last-Mod
ified: Mon, 17 Aug 2015 16:25:45 GMT..Accept-Ranges: bytes..ETag: "4c1
ca75e9d9d01:22a0"..Server: Microsoft-IIS/6.0..X-Powered-By: ASP.NET..D
ate: Thu, 19 Jan 2017 00:36:41 GMT......
GET /jc/hostjc.txt HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: VVV.gxnkw.com
Cache-Control: no-cache
HTTP/1.1 200 OK
Content-Length: 5537
Content-Type: text/plain
Last-Modified: Thu, 05 Jan 2017 14:07:24 GMT
Accept-Ranges: bytes
ETag: "b05a1ba5d67d21:22a0"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 19 Jan 2017 00:36:46 GMT170.178.171.31 VVV.176cc.cc..170.178.171.31 VVV.52my.com..170.178.171.
31 VVV.crsky.com..170.178.171.31 crsky.com..170.178.171.31 VVV.901my.c
om..170.178.171.31 901my.com..170.178.171.31 moyu.so..170.178.171.31 k
kk.dstfkj.com.cn..170.178.171.31 dstfkj.com.cn..170.178.171.31 VVV.214
my.com..170.178.171.31 VVV.h360k.com..170.178.171.31 h360k.com..170.17
8.171.31 rsivy.pw..170.178.171.31 214my.com..170.178.171.31 VVV.270my.
com..170.178.171.31 360.chihuo0517.com..170.178.171.31 chihuo0517.com.
.170.178.171.31 270my.com..170.178.171.31 VVV.moyu.so..170.178.171.31
VVV.hwkam.com..170.178.171.31 178stu.com..170.178.171.31 VVV.178stu.co
m..170.178.171.31 hwkam.com..170.178.171.31 VVV.5917wan.com..170.178.1
71.31 VVV.delifs.com..170.178.171.31 delifs.com..170.178.171.31 VVV.11
moyu.com..170.178.171.31 t2.web.tonnn.com..170.178.171.31 VVV.2828my.c
om..170.178.171.31 2828my.com..170.178.171.31 tonnn.com..170.178.171.3
1 VVV.11my.net..170.178.171.31 VVV.91my.com..170.178.171.31 91my.com..
170.178.171.31 wg.91my.com..170.178.171.31 my.178stu.com..170.178.171.
31 134my.com..170.178.171.31 VVV.134my.com..170.178.171.31 001my.com..
170.178.171.31 VVV.910my.com..170.178.171.31 910my.com..170.178.171.31
VVV.901my.com..170.178.171.31 901my.com..170.178.171.31 VVV.6moyu.com
..170.178.171.31 110moyu.com..170.178.171.31 VVV.110moyu.com..170.178.
171.31 dl.pconline.com.cn..170.178.171.31 VVV.moyushou.com..170.178.17
1.31 pconline.com.cn..170.178.171.31 VVV.52z.com..170.178.171.31 wanba
.baidu.com..170.178.171.31 VVV.99sfmy.com..170.178.171.31 VVV.myco<<< skipped >>>
GET /jc/hostjc.txt HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: VVV.gxnkw.com
Cache-Control: no-cache
HTTP/1.1 200 OK
Content-Length: 5537
Content-Type: text/plain
Last-Modified: Thu, 05 Jan 2017 14:07:24 GMT
Accept-Ranges: bytes
ETag: "b05a1ba5d67d21:22a0"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 19 Jan 2017 00:36:58 GMT170.178.171.31 VVV.176cc.cc..170.178.171.31 VVV.52my.com..170.178.171.
31 VVV.crsky.com..170.178.171.31 crsky.com..170.178.171.31 VVV.901my.c
om..170.178.171.31 901my.com..170.178.171.31 moyu.so..170.178.171.31 k
kk.dstfkj.com.cn..170.178.171.31 dstfkj.com.cn..170.178.171.31 VVV.214
my.com..170.178.171.31 VVV.h360k.com..170.178.171.31 h360k.com..170.17
8.171.31 rsivy.pw..170.178.171.31 214my.com..170.178.171.31 VVV.270my.
com..170.178.171.31 360.chihuo0517.com..170.178.171.31 chihuo0517.com.
.170.178.171.31 270my.com..170.178.171.31 VVV.moyu.so..170.178.171.31
VVV.hwkam.com..170.178.171.31 178stu.com..170.178.171.31 VVV.178stu.co
m..170.178.171.31 hwkam.com..170.178.171.31 VVV.5917wan.com..170.178.1
71.31 VVV.delifs.com..170.178.171.31 delifs.com..170.178.171.31 VVV.11
moyu.com..170.178.171.31 t2.web.tonnn.com..170.178.171.31 VVV.2828my.c
om..170.178.171.31 2828my.com..170.178.171.31 tonnn.com..170.178.171.3
1 VVV.11my.net..170.178.171.31 VVV.91my.com..170.178.171.31 91my.com..
170.178.171.31 wg.91my.com..170.178.171.31 my.178stu.com..170.178.171.
31 134my.com..170.178.171.31 VVV.134my.com..170.178.171.31 001my.com..
170.178.171.31 VVV.910my.com..170.178.171.31 910my.com..170.178.171.31
VVV.901my.com..170VVV.518ak.com..170.178.171.31 lpput.com..170.178.17
1.31 hjmyh.com..170.178.171.31 VVV.5555my.com..170.178.171.31 aaa.5555
my.com..170.178.171.31 VVV.hjmyh.com..170.178.171.31 VVV.195my.com..17
0.178.171.31 195my.com..170.178.171.31 VVV.195sy.com..170.178.171.31 1
95sy.com..170.178.171.31 spxwj.com..170.178.171.31 817zs.cn..170.1<<< skipped >>>
GET /jc/hostjc.txt HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: VVV.gxnkw.com
Cache-Control: no-cache
HTTP/1.1 200 OK
Content-Length: 5537
Content-Type: text/plain
Last-Modified: Thu, 05 Jan 2017 14:07:24 GMT
Accept-Ranges: bytes
ETag: "b05a1ba5d67d21:22a0"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 19 Jan 2017 00:36:58 GMT170.178.171.31 VVV.176cc.cc..170.178.171.31 VVV.52my.com..170.178.171.
31 VVV.crsky.com..170.178.171.31 crsky.com..170.178.171.31 VVV.901my.c
om..170.178.171.31 901my.com..170.178.171.31 moyu.so..170.178.171.31 k
kk.dstfkj.com.cn..170.178.171.31 dstfkj.com.cn..170.178.171.31 VVV.214
my.com..170.178.171.31 VVV.h360k.com..170.178.171.31 h360k.com..170.17
8.171.31 rsivy.pw..170.178.171.31 214my.com..170.178.171.31 VVV.270my.
com..170.178.171.31 360.chihuo0517.com..170.178.171.31 chihuo0517.com.
.170.178.171.31 270my.com..170.178.171.31 VVV.moyu.so..170.178.171.31
VVV.hwkam.com..170.178.171.31 178stu.com..170.178.171.31 VVV.178stu.co
m..170.178.171.31 hwkam.com..170.178.171.31 VVV.5917wan.com..170.178.1
71.31 VVV.delifs.com..170.178.171.31 delifs.com..170.178.171.31 VVV.11
moyu.com..170.178.171.31 t2.web.tonnn.com..170.178.171.31 VVV.2828my.c
om..170.178.171.31 2828my.com..170.178.171.31 tonnn.com..170.178.171.3
1 VVV.11my.net..170.178.171.31 VVV.91my.com..170.178.171.31 91my.com..
170.178.171.31 wg.91my.com..170.178.171.31 my.178stu.com..170.178.171.
31 134my.com..170.178.171.31 VVV.134my.com..170.178.171.31 001my.com..
170.178.171.31 VVV.910my.com..170.178.171.31 910my.com..170.178.171.31
VVV.901my.com..170.178.171.31 901my.com..170.178.171.31 VVV.6moyu.com
..170.178.171.31 110moyu.com..170.178.171.31 VVV.110moyu.com..170.178.
171.31 dl.pconline.com.cn..170.178.171.31 VVV.moyushou.com..170.178.17
1.31 pconline.com.cn..170.178.171.31 VVV.52z.com..170.178.171.31 wanba
.baidu.com..170.178.171.31 VVV.99sfmy.com..170.178.171.31 VVV.myco<<< skipped >>>
GET /favicon.ico HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
Host: VVV.117my.cc
Connection: Keep-Alive
HTTP/1.1 404 Not Found
Content-Length: 1308
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 19 Jan 2017 00:39:59 GMT<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "hXXp://VVV.w3.or
g/TR/html4/strict.dtd">..<HTML><HEAD><TITLE>.....
.......</TITLE>..<META HTTP-EQUIV="Content-Type" Content="tex
t/html; charset=GB2312">..<STYLE type="text/css">.. BODY { f
ont: 9pt/12pt .... }.. H1 { font: 12pt/15pt .... }.. H2 { font: 9pt/
12pt .... }.. A:link { color: red }.. A:visited { color: maroon }..&
lt;/STYLE>..</HEAD><BODY><TABLE width=500 border=0 c
ellspacing=10><TR><TD>..<h1>............</h1&g
t;....................................................<hr>..<
p>................</p>..<ul>..<li>...............
.........................................</li>..<li>......
......................................................................
......</li>..<li>....<a href="javascript:history.back(1
)">....</a>....................</li>..</ul>..<
h2>HTTP .... 404 - ..................<br>Internet ........ (I
IS)</h2>..<hr>..<p>..............................<
;/p>..<ul>..<li>.... <a href="hXXp://go.microsoft.co
m/fwlink/?linkid=8180">Microsoft ............</a>..........&l
dquo;HTTP”..“404”........</li>..<li>....
“IIS ....”...... IIS ...... (inetmgr) ....................
....“........”..“............”..“.......
...........”........</li>..</ul>..</TD><<<< skipped >>>
GET /jc/hostjc.txt HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: VVV.gxnkw.com
Cache-Control: no-cache
Connection: Keep-Alive
HTTP/1.1 200 OK
Content-Length: 5537
Content-Type: text/plain
Last-Modified: Thu, 05 Jan 2017 14:07:24 GMT
Accept-Ranges: bytes
ETag: "b05a1ba5d67d21:22a0"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 19 Jan 2017 00:37:32 GMT170.178.171.31 VVV.176cc.cc..170.178.171.31 VVV.52my.com..170.178.171.
31 VVV.crsky.com..170.178.171.31 crsky.com..170.178.171.31 VVV.901my.c
om..170.178.171.31 901my.com..170.178.171.31 moyu.so..170.178.171.31 k
kk.dstfkj.com.cn..170.178.171.31 dstfkj.com.cn..170.178.171.31 VVV.214
my.com..170.178.171.31 VVV.h360k.com..170.178.171.31 h360k.com..170.17
8.171.31 rsivy.pw..170.178.171.31 214my.com..170.178.171.31 VVV.270my.
com..170.178.171.31 360.chihuo0517.com..170.178.171.31 chihuo0517.com.
.170.178.171.31 270my.com..170.178.171.31 VVV.moyu.so..170.178.171.31
VVV.hwkam.com..170.178.171.31 178stu.com..170.178.171.31 VVV.178stu.co
m..170.178.171.31 hwkam.com..170.178.171.31 VVV.5917wan.com..170.178.1
71.31 VVV.delifs.com..170.178.171.31 delifs.com..170.178.171.31 VVV.11
moyu.com..170.178.171.31 t2.web.tonnn.com..170.178.171.31 VVV.2828my.c
om..170.178.171.31 2828my.com..170.178.171.31 tonnn.com..170.178.171.3
1 VVV.11my.net..170.178.171.31 VVV.91my.com..170.178.171.31 91my.com..
170.178.171.31 wg.91my.com..170.178.171.31 my.178stu.com..170.178.171.
31 134my.com..170.178.171.31 VVV.134my.com..170.178.171.31 001my.com..
170.178.171.31 VVV.910my.com..170.178.171.31 910my.com..170.178.171.31
VVV.901my.com..170.178.171.31 901my.com..170.178.171.31 VVV.6moyu.com
..170.178.171.31 110moyu.com..170.178.171.31 VVV.110moyu.com..170.178.
171.31 dl.pconline.com.cn..170.178.171.31 VVV.moyushou.com..170.178.17
1.31 pconline.com.cn..170.178.171.31 VVV.52z.com..170.178.171.31 wanba
.baidu.com..170.178.171.31 VVV.99sfmy.com..170.178.171.31 VVV.myco<<< skipped >>>
GET /jc/hostjc.txt HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: VVV.gxnkw.com
Cache-Control: no-cache
HTTP/1.1 200 OK
Content-Length: 5537
Content-Type: text/plain
Last-Modified: Thu, 05 Jan 2017 14:07:24 GMT
Accept-Ranges: bytes
ETag: "b05a1ba5d67d21:22a0"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 19 Jan 2017 00:37:33 GMT170.178.171.31 VVV.176cc.cc..170.178.171.31 VVV.52my.com..170.178.171.
31 VVV.crsky.com..170.178.171.31 crsky.com..170.178.171.31 VVV.901my.c
om..170.178.171.31 901my.com..170.178.171.31 moyu.so..170.178.171.31 k
kk.dstfkj.com.cn..170.178.171.31 dstfkj.com.cn..170.178.171.31 VVV.214
my.com..170.178.171.31 VVV.h360k.com..170.178.171.31 h360k.com..170.17
8.171.31 rsivy.pw..170.178.171.31 214my.com..170.178.171.31 VVV.270my.
com..170.178.171.31 360.chihuo0517.com..170.178.171.31 chihuo0517.com.
.170.178.171.31 270my.com..170.178.171.31 VVV.moyu.so..170.178.171.31
VVV.hwkam.com..170.178.171.31 178stu.com..170.178.171.31 VVV.178stu.co
m..170.178.171.31 hwkam.com..170.178.171.31 VVV.5917wan.com..170.178.1
71.31 VVV.delifs.com..170.178.171.31 delifs.com..170.178.171.31 VVV.11
moyu.com..170.178.171.31 t2.web.tonnn.com..170.178.171.31 VVV.2828my.c
om..170.178.171.31 2828my.com..170.178.171.31 tonnn.com..170.178.171.3
1 VVV.11my.net..170.178.171.31 VVV.91my.com..170.178.171.31 91my.com..
170.178.171.31 wg.91my.com..170.178.171.31 my.178stu.com..170.178.171.
31 134my.com..170.178.171.31 VVV.134my.com..170.178.171.31 001my.com..
170.178.171.31 VVV.910my.com..170.178.171.31 910my.com..170.178.171.31
VVV.901my.com..170.178.171.31 901my.com..170.178.171.31 VVV.6moyu.com
..170.178.171.31 110moyu.com..170.178.171.31 VVV.110moyu.com..170.178.
171.31 dl.pconline.com.cn..170.178.171.31 VVV.moyushou.com..170.178.17
1.31 pconline.com.cn..170.178.171.31 VVV.52z.com..170.178.171.31 wanba
.baidu.com..170.178.171.31 VVV.99sfmy.com..170.178.171.31 VVV.myco<<< skipped >>>
GET /jc/hostjc.txt HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: VVV.gxnkw.com
Cache-Control: no-cache
HTTP/1.1 200 OK
Content-Length: 5537
Content-Type: text/plain
Last-Modified: Thu, 05 Jan 2017 14:07:24 GMT
Accept-Ranges: bytes
ETag: "b05a1ba5d67d21:22a0"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 19 Jan 2017 00:37:37 GMT170.178.171.31 VVV.176cc.cc..170.178.171.31 VVV.52my.com..170.178.171.
31 VVV.crsky.com..170.178.171.31 crsky.com..170.178.171.31 VVV.901my.c
om..170.178.171.31 901my.com..170.178.171.31 moyu.so..170.178.171.31 k
kk.dstfkj.com.cn..170.178.171.31 dstfkj.com.cn..170.178.171.31 VVV.214
my.com..170.178.171.31 VVV.h360k.com..170.178.171.31 h360k.com..170.17
8.171.31 rsivy.pw..170.178.171.31 214my.com..170.178.171.31 VVV.270my.
com..170.178.171.31 360.chihuo0517.com..170.178.171.31 chihuo0517.com.
.170.178.171.31 270my.com..170.178.171.31 VVV.moyu.so..170.178.171.31
VVV.hwkam.com..170.178.171.31 178stu.com..170.178.171.31 VVV.178stu.co
m..170.178.171.31 hwkam.com..170.178.171.31 VVV.5917wan.com..170.178.1
71.31 VVV.delifs.com..170.178.171.31 delifs.com..170.178.171.31 VVV.11
moyu.com..170.178.171.31 t2.web.tonnn.com..170.178.171.31 VVV.2828my.c
om..170.178.171.31 2828my.com..170.178.171.31 tonnn.com..170.178.171.3
1 VVV.11my.net..170.178.171.31 VVV.91my.com..170.178.171.31 91my.com..
170.178.171.31 wg.91my.com..170.178.171.31 my.178stu.com..170.178.171.
31 134my.com..170.178.171.31 VVV.134my.com..170.178.171.31 001my.com..
170.178.171.31 VVV.910my.com..170.178.171.31 910my.com..170.178.171.31
VVV.901my.com..170.178.171.31 901my.com..170.178.171.31 VVV.6moyu.com
..170.178.171.31 110moyu.com..170.178.171.31 VVV.110moyu.com..170.178.
171.31 dl.pconline.com.cn..170.178.171.31 VVV.moyushou.com..170.178.17
1.31 pconline.com.cn..170.178.171.31 VVV.52z.com..170.178.171.31 wanba
.baidu.com..170.178.171.31 VVV.99sfmy.com..170.178.171.31 VVV.myco<<< skipped >>>
GET /gsorganizationvalsha2g2/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBQMnk2cPe3vhNiR6XLHz4QGvBl7BwQUlt5h8b0cFilTHMDMfTuDAEDmGnwCDBisczuS0Hu180XFAA== HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ocsp2.globalsign.com
HTTP/1.1 200 OK
Date: Thu, 19 Jan 2017 00:40:23 GMT
Content-Type: application/ocsp-response
Content-Length: 1570
Connection: keep-alive
Set-Cookie: __cfduid=d2049b01a660478030f630d1690d5c2f91484786423; expires=Fri, 19-Jan-18 00:40:23 GMT; path=/; domain=.globalsign.com; HttpOnly
Last-Modified: Wed, 18 Jan 2017 21:33:38 GMT
Expires: Sun, 22 Jan 2017 21:33:38 GMT
ETag: "3b988710a19508382f2e4d9507fbb592efa91e39"
Cache-Control: public, no-transform, must-revalidate
CF-Cache-Status: HIT
Server: cloudflare-nginx
CF-RAY: 32363c2d86d8405c-SOF0..........0..... .....0......0...0.......M........u....%...G..2017011
8213338Z0o0m0E0... ..........M.=......r......{.....a....)S...};..@..|.
...s;..{..E......20170118213338Z....20170122213338Z0...*.H............
.JA....vU.........q.:Z.......Oj..6T..mZ3...k%..S7`\.. ..i(.|.[.}... }i
.....N.......0D.*bO.UY..`...!0... .0y.s.........~.aR...3....0k?g......
....C.....U...r..:C?.N'F~..l.....MW.Iw.?.?..k3.4.~V.... b=x/&.u.7.....
....a...8.....\5..>..q..1.....AtLO/..m....B.hI....K0..G0..C0.. ....
...q..}.dc.j..(0...*.H........0f1.0...U....BE1.0...U....GlobalSign nv-
sa1<0:..U...3GlobalSign Organization Validation CA - SHA256 - G20..
.161124031843Z..170224031843Z0..1.0...U....BE1.0...U....GlobalSign nv-
sa1.0...U....2016112411281M0K..U...DGlobalSign Organization Validation
CA - SHA256 - G2 - OCSP Responder0.."0...*.H.............0.........C.
.0j..R........0.".e.&.6'.d..._.....8...Y..../..z..-hi.k.......D.......
..u..>h....T2..~..*;...v.^.!d.......8.p.e..me...>..V...l...P.6.V
..G..;X.......12U.)D.E(ldQ...67..@......l...A.>l......m..e;.....n.~
..Wb.?..gE.......a.KM.F...}.qo;S...`/..s....6....G.a........0..0...U..
.....M........u....%...G0...U.#..0.....a....)S...};..@..|0... .....0..
....0L..U. .E0C0A.. .....2._0402.. ........&hXXps://VVV.globalsign.com
/repository/0...U...........0...U.%..0... .......0...*.H..............
H.....C.Ie....;.yN.'..../?.T..-T.a..4...n..OW/l....[|..-.i../.'..1."..
....3[...J.....\@.S.=-p..p......d...>~J.|E0y......!.;.c.,...||.V...
.K..L...dX...a....6'..U..G....A;..........4K...........k.B].s.3...<<< skipped >>>
GET /gsorganizationvalsha2g2/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBQMnk2cPe3vhNiR6XLHz4QGvBl7BwQUlt5h8b0cFilTHMDMfTuDAEDmGnwCDBisczuS0Hu180XFAA== HTTP/1.1
Connection: Keep-Alive
Accept: */*
If-Modified-Since: Wed, 18 Jan 2017 21:33:38 GMT
If-None-Match: "3b988710a19508382f2e4d9507fbb592efa91e39"
User-Agent: Microsoft-CryptoAPI/6.1
Host: ocsp2.globalsign.com
HTTP/1.1 304 Not Modified
Date: Thu, 19 Jan 2017 00:40:27 GMT
Connection: keep-alive
Set-Cookie: __cfduid=dd9e2eab346214fdd619c23747ca55b821484786427; expires=Fri, 19-Jan-18 00:40:27 GMT; path=/; domain=.globalsign.com; HttpOnly
Last-Modified: Wed, 18 Jan 2017 21:33:38 GMT
Expires: Sun, 22 Jan 2017 21:33:38 GMT
ETag: "3b988710a19508382f2e4d9507fbb592efa91e39"
Cache-Control: public, no-transform, must-revalidate
CF-Cache-Status: HIT
Server: cloudflare-nginx
CF-RAY: 32363c44618a405c-SOFHTTP/1.1 304 Not Modified..Date: Thu, 19 Jan 2017 00:40:27 GMT..Connec
tion: keep-alive..Set-Cookie: __cfduid=dd9e2eab346214fdd619c23747ca55b
821484786427; expires=Fri, 19-Jan-18 00:40:27 GMT; path=/; domain=.glo
balsign.com; HttpOnly..Last-Modified: Wed, 18 Jan 2017 21:33:38 GMT..E
xpires: Sun, 22 Jan 2017 21:33:38 GMT..ETag: "3b988710a19508382f2e4d95
07fbb592efa91e39"..Cache-Control: public, no-transform, must-revalidat
e..CF-Cache-Status: HIT..Server: cloudflare-nginx..CF-RAY: 32363c44618
a405c-SOF......
GET /gsorganizationvalsha2g2/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBQMnk2cPe3vhNiR6XLHz4QGvBl7BwQUlt5h8b0cFilTHMDMfTuDAEDmGnwCDGlwEnDh1Wq84Ev4Sw== HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ocsp2.globalsign.com
HTTP/1.1 200 OK
Date: Thu, 19 Jan 2017 00:40:40 GMT
Content-Type: application/ocsp-response
Content-Length: 1570
Connection: keep-alive
Set-Cookie: __cfduid=d995cc79ed802be9825730749a8dec62d1484786440; expires=Fri, 19-Jan-18 00:40:40 GMT; path=/; domain=.globalsign.com; HttpOnly
Last-Modified: Wed, 18 Jan 2017 23:26:57 GMT
Expires: Sun, 22 Jan 2017 23:26:57 GMT
ETag: "ce2c9bab38408c822469b28825da8da8a11ff254"
Cache-Control: public, no-transform, must-revalidate
CF-Cache-Status: HIT
Server: cloudflare-nginx
CF-RAY: 32363c9250bb405c-SOF0..........0..... .....0......0...0.......M........u....%...G..2017011
8232657Z0o0m0E0... ..........M.=......r......{.....a....)S...};..@..|.
.ip.p..j..K.K....20170118232657Z....20170122232657Z0...*.H............
.uO.5......./w;3.....3.J.n...E.....j.i..'...?.n>..J..l.sa......./..
..@.z..Qh.cc..l[...q.W ...g%.....o...f..."....9..;v_.n..m..!...f@.M...
!.Yu.L3'C.6'......saI.G.d'B..b.u.H......_....m.f.Z.....g...DHY.z.O[.|U
[o..#.O....0<....h....>...}..m..s....O..........8t...K0..G0..C0.
. .......q..}.dc.j..(0...*.H........0f1.0...U....BE1.0...U....GlobalSi
gn nv-sa1<0:..U...3GlobalSign Organization Validation CA - SHA256 -
G20...161124031843Z..170224031843Z0..1.0...U....BE1.0...U....GlobalSi
gn nv-sa1.0...U....2016112411281M0K..U...DGlobalSign Organization Vali
dation CA - SHA256 - G2 - OCSP Responder0.."0...*.H.............0.....
....C..0j..R........0.".e.&.6'.d..._.....8...Y..../..z..-hi.k.......D.
........u..>h....T2..~..*;...v.^.!d.......8.p.e..me...>..V...l..
.P.6.V..G..;X.......12U.)D.E(ldQ...67..@......l...A.>l......m..e;..
...n.~..Wb.?..gE.......a.KM.F...}.qo;S...`/..s....6....G.a........0..0
...U.......M........u....%...G0...U.#..0.....a....)S...};..@..|0... ..
...0......0L..U. .E0C0A.. .....2._0402.. ........&hXXps://VVV.globalsi
gn.com/repository/0...U...........0...U.%..0... .......0...*.H........
......H.....C.Ie....;.yN.'..../?.T..-T.a..4...n..OW/l....[|..-.i../.'.
.1."......3[...J.....\@.S.=-p..p......d...>~J.|E0y......!.;.c.,...|
|.V....K..L...dX...a....6'..U..G....A;..........4K...........k.B].<<< skipped >>>
GET /gsorganizationvalsha2g2/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBQMnk2cPe3vhNiR6XLHz4QGvBl7BwQUlt5h8b0cFilTHMDMfTuDAEDmGnwCDEVLD4SzDqtMG/eBnw== HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ocsp2.globalsign.com
HTTP/1.1 200 OK
Date: Thu, 19 Jan 2017 00:40:51 GMT
Content-Type: application/ocsp-response
Content-Length: 1570
Connection: keep-alive
Set-Cookie: __cfduid=d56bb1059e2865a2d42351fb11199ebd51484786451; expires=Fri, 19-Jan-18 00:40:51 GMT; path=/; domain=.globalsign.com; HttpOnly
Last-Modified: Wed, 18 Jan 2017 23:28:53 GMT
Expires: Sun, 22 Jan 2017 23:28:53 GMT
ETag: "0db1f4e8f454c9f557e61810f001e1875842e319"
Cache-Control: public, no-transform, must-revalidate
CF-Cache-Status: HIT
Server: cloudflare-nginx
CF-RAY: 32363cdcc475405c-SOF0..........0..... .....0......0...0.......M........u....%...G..2017011
8232853Z0o0m0E0... ..........M.=......r......{.....a....)S...};..@..|.
.EK.....L........20170118232853Z....20170122232853Z0...*.H............
...g..N.MF......T..e.2..[1...=i.. .. 9O....v:{.$....1......g......K.F.
..!6.~....j#u....*P..U.....$.?. .b.w..m..E.k..X..o7...#.GC...l.;j%...K
....v.=.3A...~1.j..f9s.9......b...1.x.x..3...N'......AQF...b.Z.P...v/.
........[.'....3.[h~..l/5.X...3......9.....gX.....K0..G0..C0.. .......
q..}.dc.j..(0...*.H........0f1.0...U....BE1.0...U....GlobalSign nv-sa1
<0:..U...3GlobalSign Organization Validation CA - SHA256 - G20...16
1124031843Z..170224031843Z0..1.0...U....BE1.0...U....GlobalSign nv-sa1
.0...U....2016112411281M0K..U...DGlobalSign Organization Validation CA
- SHA256 - G2 - OCSP Responder0.."0...*.H.............0.........C..0j
..R........0.".e.&.6'.d..._.....8...Y..../..z..-hi.k.......D.........u
..>h....T2..~..*;...v.^.!d.......8.p.e..me...>..V...l...P.6.V..G
..;X.......12U.)D.E(ldQ...67..@......l...A.>l......m..e;.....n.~..W
b.?..gE.......a.KM.F...}.qo;S...`/..s....6....G.a........0..0...U.....
..M........u....%...G0...U.#..0.....a....)S...};..@..|0... .....0.....
.0L..U. .E0C0A.. .....2._0402.. ........&hXXps://VVV.globalsign.com/re
pository/0...U...........0...U.%..0... .......0...*.H..............H..
...C.Ie....;.yN.'..../?.T..-T.a..4...n..OW/l....[|..-.i../.'..1.".....
.3[...J.....\@.S.=-p..p......d...>~J.|E0y......!.;.c.,...||.V....K.
.L...dX...a....6'..U..G....A;..........4K...........k.B].s.3...$..<<< skipped >>>
GET / HTTP/1.1
Accept: image/png, image/svg xml, image/*;q=0.8, */*;q=0.5
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
Accept-Encoding: gzip, deflate
Connection: Keep-Alive
Host: VVV.taobao.com
HTTP/1.1 302 Found
Server: Tengine
Date: Thu, 19 Jan 2017 00:40:40 GMT
Content-Type: text/html
Content-Length: 258
Connection: keep-alive
Location: hXXps://VVV.taobao.com/
Set-Cookie: thw=ua; Path=/; Domain=.taobao.com; Expires=Fri, 19-Jan-18 00:40:40 GMT;
Strict-Transport-Security: max-age=31536000<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">..<html>
..<head><title>302 Found</title></head>..<b
ody bgcolor="white">..<h1>302 Found</h1>..<p>The
requested resource resides temporarily under a different URI.</p>
;..<hr/>Powered by Tengine</body>..</html>..HTTP/1.1
302 Found..Server: Tengine..Date: Thu, 19 Jan 2017 00:40:40 GMT..Cont
ent-Type: text/html..Content-Length: 258..Connection: keep-alive..Loca
tion: hXXps://VVV.taobao.com/..Set-Cookie: thw=ua; Path=/; Domain=.tao
bao.com; Expires=Fri, 19-Jan-18 00:40:40 GMT;..Strict-Transport-Securi
ty: max-age=31536000..<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0/
/EN">..<html>..<head><title>302 Found</title&g
t;</head>..<body bgcolor="white">..<h1>302 Found<
/h1>..<p>The requested resource resides temporarily under a d
ifferent URI.</p>..<hr/>Powered by Tengine</body>..&
lt;/html>....
GET /rootr1/MEwwSjBIMEYwRDAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6+MgGqMQQUYHtmGkUNl8qJUC99BM00qP/8/UsCCwQAAAAAAURO8EJH HTTP/1.1
Cache-Control: max-age = 10800
Connection: Keep-Alive
Accept: */*
If-Modified-Since: Thu, 13 Oct 2016 07:50:34 GMT
If-None-Match: "6b9ba9eca642c891cc02365fc6161341647bd9fc"
User-Agent: Microsoft-CryptoAPI/6.1
Host: ocsp.globalsign.com
HTTP/1.1 200 OK
Date: Thu, 19 Jan 2017 00:40:18 GMT
Content-Type: application/ocsp-response
Content-Length: 1518
Connection: keep-alive
Set-Cookie: __cfduid=dd5230a5dbbbba995e31d3feeb730dd801484786418; expires=Fri, 19-Jan-18 00:40:18 GMT; path=/; domain=.globalsign.com; HttpOnly
Last-Modified: Wed, 18 Jan 2017 22:23:23 GMT
Expires: Sun, 22 Jan 2017 22:23:23 GMT
ETag: "2e9ad832313d6be8aa684e9216f27afcf7f1b502"
Cache-Control: max-age=10800,public,no-transform,must-revalidate
CF-Cache-Status: HIT
Server: cloudflare-nginx
CF-RAY: 32363c0ba4004056-SOF0..........0..... .....0......0...0...........%r2.]&.iO.).*V...2017011
8222323Z0n0l0D0... .........W......#....*..2..1..`{f.E....P/}..4....K.
.......DN.BG....20170118222323Z....20170122222323Z0...*.H.............
.f.......XA..... ..e..p:....:..........h.L.!...c.....[.@.mF.....L....v
c.....=.....&...G....w..~J..........NGk...pl...8.6.&4-...Gy.......$..0
....De../...u@..y.p}Kw.G.$.P...a....9..PD.4Gx[a}...%7...`...o..^g.Y.&l
t;.w=..:..../...G').o4.F;_~..;v{..cA...tzU.q....x....0...0...0........
..H....9...S....0...*.H........0W1.0...U....BE1.0...U....GlobalSign nv
-sa1.0...U....Root CA1.0...U....GlobalSign Root CA0...161208000000Z..1
70415000000Z0[1.0...U....BE1.0...U....GlobalSign nv-sa110/..U...(Globa
lSign OCSP for Root R1 - Signer 1.10.."0...*.H.............0..........
b.Q........@....2Y_y%..0..I.S.....-.$=DZ.xx>..4...d.i&....:eh.....,
.M.......R..... .P..L.].J.....\oe.G...=....>.e.>.....!.......;.J
....,..............U.S..2.r..G.w..0~...F....P.n..#...i...?J.Bd(6.&3.C.
.%.]... ...f...q..0.f.........S....2H`.b..T`.O.....l.........0..0...U.
..........0...U.%..0... .......0...U.......0.0...U...........%r2.]&.iO
.).*V.0...U.#..0...`{f.E....P/}..4....K0... .....0......0L..U. .E0C0A.
. .....2._0402.. ........&hXXps://VVV.globalsign.com/repository/0...*.
H..............~.s..uk..\....)K.8p\..,.......d..V\..n.. ....u...m..:.c
b-.'....."......K2.Z.....7./y.[_.........x.(_Zf<.....9.@...s..KjP..
.U0.S..8eU.K..N.M......;...P..u...m.f..~.U.....5.? ...!z...\..B..y-t..
.%...{C.5.".zO.......C...S.d...g....N..I..i[.y..PfAr.t..W.$#..u<<< skipped >>>
GET /rootr1/MEwwSjBIMEYwRDAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6+MgGqMQQUYHtmGkUNl8qJUC99BM00qP/8/UsCCwQAAAAAAURO8EJH HTTP/1.1Cache-Control: max-age = 10800Connection: Keep-AliveAccept: */*If-Modified-Since: Wed, 18 Jan 2017 22:23:23 GMTIf-None-Match: "2e9ad832313d6be8aa684e9216f27afcf7f1b502"User-Agent: Microsoft-CryptoAPI/6.1Host: ocsp.globalsign.com
HTTP/1.1 304 Not ModifiedDate: Thu, 19 Jan 2017 00:40:22 GMTConnection: keep-aliveSet-Cookie: __cfduid=d2e82d71249719d20589d01ed4e4b9b3c1484786422; expires=Fri, 19-Jan-18 00:40:22 GMT; path=/; domain=.globalsign.com; HttpOnlyLast-Modified: Wed, 18 Jan 2017 22:23:23 GMTExpires: Sun, 22 Jan 2017 22:23:23 GMTETag: "2e9ad832313d6be8aa684e9216f27afcf7f1b502"Cache-Control: max-age=10800,public,no-transform,must-revalidateCF-Cache-Status: HITServer: cloudflare-nginxCF-RAY: 32363c2325894056-SOFHTTP/1.1 304 Not Modified..Date: Thu, 19 Jan 2017 00:40:22 GMT..Connec
tion: keep-alive..Set-Cookie: __cfduid=d2e82d71249719d20589d01ed4e4b9b
3c1484786422; expires=Fri, 19-Jan-18 00:40:22 GMT; path=/; domain=.glo
balsign.com; HttpOnly..Last-Modified: Wed, 18 Jan 2017 22:23:23 GMT..E
xpires: Sun, 22 Jan 2017 22:23:23 GMT..ETag: "2e9ad832313d6be8aa684e92
16f27afcf7f1b502"..Cache-Control: max-age=10800,public,no-transform,mu
st-revalidate..CF-Cache-Status: HIT..Server: cloudflare-nginx..CF-RAY:
32363c2325894056-SOF..
GET /images/new.js HTTP/1.1Accept: application/javascript, */*;q=0.8Referer: hXXp://VVV.92117my.com/game.htmlAccept-Language: en-USUser-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)Accept-Encoding: gzip, deflateHost: VVV.92117my.comConnection: Keep-Alive
HTTP/1.1 200 OKContent-Length: 3803Content-Type: application/x-javascriptLast-Modified: Tue, 28 Jul 2015 08:19:44 GMTAccept-Ranges: bytesETag: "0d08028ec9d01:3fe"Server: Microsoft-IIS/6.0X-Powered-By: ASP.NETDate: Thu, 19 Jan 2017 00:39:38 GMTfunction getDate2(){ ...var d = new Date(); ...var year = d.getYear();
...var month = d.getMonth() 1; ...var date = d.getDate(); ...return m
onth "../" date "../"; ..}..var hourX;..var openTime = getDate2();..no
w = new Date()..hour = now.getHours()..hourX=now.getHours()..mi = now.
getMinutes()..hour =hour "." mi..if (hourX==0&mi<30) {..openTime =
("00..00......")..}else if (hour < 0.9&&hourX==0){..openTime = ("
00..30......")..} else if (hourX <= 1&&hour < 2&&mi<=30){..op
enTime = ("01..00......")..} else if (hour > 1.3&&hour < 2&&mi&
gt;=30){..openTime = ("01..30......")..} else if (hour >= 2&&hour
< 3&&mi<=30){..openTime = ("02..00......")..} else if (hour >
; 2.3&&hour < 3&&mi>=30){..openTime = ("02..30......")..} else
if (hour >= 3&&hour < 4&&mi<=30){..openTime = ("03..00......
")..} else if (hour > 3.3&&hour < 4&&mi>=30){..openTime = ("
03..30......")..} else if (hour >= 4&&hour < 5&&mi<=30){..ope
nTime = ("04..00......")..} else if (hour > 4.3&&hour < 5&&mi&g
t;=30){..openTime = ("04..30......")..} else if (hour >= 5&&hour &
lt; 6&&mi<=30){..openTime = ("05..00......")..} else if (hour >
5.3&&hour < 6&&mi>=30){..openTime = ("05..30......")..} else i
f (hour >= 6&&hour < 7&&mi<=30){..openTime = ("06..00......"
)..} else if (hour > 6.3&&hour < 7&&mi>=30){..openTime = ("0
6..30......")..} else if (hour >= 7&&hour < 8&&mi<=30){..open
Time = ("07..00......")..} else if (hour > 7.3&&hour < 8&&m<<< skipped >>>
GET /images/Index_c1_r5.jpg HTTP/1.1Accept: image/png, image/svg xml, image/*;q=0.8, */*;q=0.5Referer: hXXp://VVV.92117my.com/game.htmlAccept-Language: en-USUser-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)Accept-Encoding: gzip, deflateHost: VVV.92117my.comConnection: Keep-Alive
HTTP/1.1 200 OKContent-Length: 1166Content-Type: image/jpegLast-Modified: Wed, 01 Jul 2015 07:57:44 GMTAccept-Ranges: bytesETag: "08c919cd3b3d01:3fe"Server: Microsoft-IIS/6.0X-Powered-By: ASP.NETDate: Thu, 19 Jan 2017 00:39:39 GMT......Exif..II*.................Ducky.......F.....*hXXp://ns.adobe.com
/xap/1.0/.<?xpacket begin="..." id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.5-c01
4 79.151481, 2013/03/13-12:09:15 "> <rdf:RDF xmlns:rdf="h
ttp://VVV.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rd
f:about="" xmlns:xmp="hXXp://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http:
//ns.adobe.com/xap/1.0/mm/" xmlns:stRef="hXXp://ns.adobe.com/xap/1.0/s
Type/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CC (Windows)" xmpM
M:InstanceID="xmp.iid:5CF6ADCEFD1411E2AEB7ECB561BB81DC" xmpMM:Document
ID="xmp.did:5CF6ADCFFD1411E2AEB7ECB561BB81DC"> <xmpMM:DerivedFro
m stRef:instanceID="xmp.iid:5CF6ADCCFD1411E2AEB7ECB561BB81DC" stRef:do
cumentID="xmp.did:5CF6ADCDFD1411E2AEB7ECB561BB81DC"/> </rdf:Desc
ription> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?&
gt;....Adobe.d........................................................
......................................................................
...................................W..................................
............................Qa.................................?..j,..
..5.(...B....Ru.5....F..M..?..HTTP/1.1 200 OK..Content-Length: 1166..C
ontent-Type: image/jpeg..Last-Modified: Wed, 01 Jul 2015 07:57:44 GMT.
.Accept-Ranges: bytes..ETag: "08c919cd3b3d01:3fe"..Server: Microsoft-I
IS/6.0..X-Powered-By: ASP.NET..Date: Thu, 19 Jan 2017 00:39:39 GMT....
....Exif..II*.................Ducky.......F.....*hXXp://ns.adobe.c<<< skipped >>>
GET /logo.jpg HTTP/1.1Accept: image/png, image/svg xml, image/*;q=0.8, */*;q=0.5Referer: hXXp://VVV.92117my.com/index1.htmAccept-Language: en-USUser-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)Accept-Encoding: gzip, deflateHost: VVV.92117my.comConnection: Keep-Alive
HTTP/1.1 200 OKContent-Length: 30031Content-Type: image/jpegLast-Modified: Fri, 06 Jan 2017 05:34:02 GMTAccept-Ranges: bytesETag: "fefcb7cde67d21:3fe"Server: Microsoft-IIS/6.0X-Powered-By: ASP.NETDate: Thu, 19 Jan 2017 00:39:37 GMT......JFIF.....H.H.....mExif..II*...........................b.........
..j...(...........1.......r...2...........i....................'......
.'..Adobe Photoshop CS3 Windows.2013:12:19 19:12:33.............0220..
..............................[...............................*.......
....2...(...................:........... .......H.......H.............
JFIF.....H.H......Adobe_CM......Adobe.d...............................
......................................................................
................................................."................?...
......................................................................
.3......!.1.AQa."q.2.....B#$.R.b34r..C.%.S...cs5....&D.TdE..t6..U.e...
..u..F'...............Vfv........7GWgw........................5.....!1
..AQaq"..2.....B#.R..3$b.r..CS.cs4.%......&5..D.T..dEU6te......u..F...
............Vfv........'7GWgw.................?.......0..Le....6..[...
o,g..Sw..z.M...g../.V,x.|V.G.x.e..>.a....4.Yo.Ag.....u.............
...V...F.h|Xct\#...Y.&.Z.Z .s?F.m5_U..s...o~.?.......&.../..a.n.......
{..S*.%...6...#......I.o..HX...a.UV3..kc,>...e.....-..m........o...
j...6..k...|;..}Ce..o.k...........'.....,.$....>^........O.....W...
..2..Z.S=..e.m....]Tz.v.V.5=..,......{.......g.o........~......o^.y...
.n....,....<>)k..UnE....5......S..gIt.S.....1.........o....""8.K
..Z....rp.....^..].<.G.......Qaa{'l.G..w...}...6f>P...FM..T.f...
....E.....Y...3....5..!.<D..x:.A...=....Kt..5..e.....F.xD...Ci|....
.2A.s.E..{..h;.h$.........?.Z.......q.@=....LR.........P..Z.eo..D.<<< skipped >>>
GET /favicon.ico HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)Host: VVV.92117my.comConnection: Keep-AliveCookie: CNZZDATA1255675994=993092947-1484785024-null|1484785024
HTTP/1.1 404 Not FoundContent-Length: 1308Content-Type: text/htmlServer: Microsoft-IIS/6.0X-Powered-By: ASP.NETDate: Thu, 19 Jan 2017 00:40:00 GMT<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "hXXp://VVV.w3.or
g/TR/html4/strict.dtd">..<HTML><HEAD><TITLE>.....
.......</TITLE>..<META HTTP-EQUIV="Content-Type" Content="tex
t/html; charset=GB2312">..<STYLE type="text/css">.. BODY { f
ont: 9pt/12pt .... }.. H1 { font: 12pt/15pt .... }.. H2 { font: 9pt/
12pt .... }.. A:link { color: red }.. A:visited { color: maroon }..&
lt;/STYLE>..</HEAD><BODY><TABLE width=500 border=0 c
ellspacing=10><TR><TD>..<h1>............</h1&g
t;....................................................<hr>..<
p>................</p>..<ul>..<li>...............
.........................................</li>..<li>......
......................................................................
......</li>..<li>....<a href="javascript:history.back(1
)">....</a>....................</li>..</ul>..<
h2>HTTP .... 404 - ..................<br>Internet ........ (I
IS)</h2>..<hr>..<p>..............................<
;/p>..<ul>..<li>.... <a href="hXXp://go.microsoft.co
m/fwlink/?linkid=8180">Microsoft ............</a>..........&l
dquo;HTTP”..“404”........</li>..<li>....
“IIS ....”...... IIS ...... (inetmgr) ....................
....“........”..“............”..“.......
...........”........</li>..</ul>..</TD><<<< skipped >>>
GET /host.html HTTP/1.1Accept: */*Accept-Language: en-USAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0E; .NET4.0C)Host: VVV.92117my.comConnection: Keep-Alive
HTTP/1.1 200 OKContent-Length: 5219Content-Type: text/htmlLast-Modified: Fri, 13 Jan 2017 12:48:11 GMTAccept-Ranges: bytesETag: "9ebc6c4c9b6dd21:3fe"Server: Microsoft-IIS/6.0X-Powered-By: ASP.NETDate: Thu, 19 Jan 2017 00:39:33 GMT...<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "
hXXp://VVV.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">..<html
xmlns="hXXp://VVV.w3.org/1999/xhtml">..<head>..<meta http
-equiv="Content-Type" content="text/html; charset=utf-8" />..<ti
tle>......117................................................</t
itle>..<meta name="keywords" content="......sf,.................
.,117......" />..<meta name="description" content="117......sf..
......................................................................
......................................................................
....." />..<style type="text/css">..body{color:#175095;paddin
g:8px 0;background:#333;}..a{color:#175095;text-decoration:none;}..a:l
ink{color:#175095;text-decoration:none;}..a:hover{color:#e00;text-deco
ration:none;}..*{padding:0;margin:0;font-size:14px;font-family:'Micros
oft Yahei','Lucida Grande',Helvetica,Arial,sans-serif;}..#w{width:1002
px;margin:0 auto;padding:8px;background:#fff;-moz-border-radius:3px;-w
ebkit-border-radius:3px;border-radius:3px;-webkit-box-shadow:0 0 8px #
000000;-moz-box-shadow:0 0 8px #000000;box-shadow:0 0 8px #000000;}..#
logo{height:91px;background:url(logo.jpg) no-repeat;}..#d{margin-top:8
px;}..#d table{border-spacing:1px;width:100%;background:#e3f3fe;border
:1px solid #95bcd6;}..#d table tr:hover{background:#fff;}..#d td{paddi
ng:10px;line-height:15px;text-align:center;border:1px solid #95bcd6;ov
erflow:hidden;white-space:nowrap;}..#k{margin-top:8px;border-top:1<<< skipped >>>
GET /?business&un=5182235367&from=prin HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)Accept: */*Host: passport.baidu.comCache-Control: no-cache
HTTP/1.1 200 OKConnection: keep-aliveContent-Type: text/htmlDate: Thu, 19 Jan 2017 00:40:02 GMTP3p: CP=" OTI DSP COR IVA OUR IND COM "Server: ApacheSet-Cookie: BAIDUID=BB091D280D8BB9A4DA1BF274DD690B70:FG=1; expires=Fri, 19-Jan-18 00:40:02 GMT; max-age=31536000; path=/; domain=.baidu.com; version=1Tracecode: 24029743220283886346011908Tracecode: 24029743220703316746011908Vary: Accept-EncodingVary: Accept-EncodingTransfer-Encoding: chunked978..<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"hXXp://VVV.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">.<htm
l xmlns="hXXp://VVV.w3.org/1999/xhtml">.<head>.<meta http-
equiv="Content-Type" content="text/html; charset=utf-8" />.<titl
e>........................_5182235367</title>.<link rel="s
tylesheet" href="/style/v2/info.css?t=20100901" type="text/css" media=
"all" />.<script type="text/javascript" src="/js/center_accountb
ind.js?t=20100901"></script>.<script type="text/javascript
" src="/js/business.js?t=20100901"></script>.<script langu
age="javascript">. document.domain = "baidu.com";. window
.hasSpace = '';. var tabinfo = initTabInfo('5182235367');. v
ar ab=gethash(1);. if(ab>0 && ab<tabinfo.length). {.
if(tabinfo[ab][2]=="_blank"). {. window.loca
tion=tabinfo[ab][0];. }. }. function fixImgSize(img)
{... var width = img.offsetWidth;... var height = img.offsetHeight;.
.. if( width>78 ){... width>height?( img.style.width='78px
' ):( img.style.height='78px' );... }else if( height>78 ){...
img.style.height='78px';... }.. }. </script>.</head>
.<body onLoad="javascript:chgdeftab(0);">.
<div class="wrapper">.<noscript>.<p c
lass="nojs">.......................................................
.............................</p>.</noscript>.<div<<< skipped >>>
GET /images/xx.css HTTP/1.1Accept: text/cssReferer: hXXp://VVV.92117my.com/game.htmlAccept-Language: en-USUser-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)Accept-Encoding: gzip, deflateHost: VVV.92117my.comConnection: Keep-Alive
HTTP/1.1 200 OKContent-Length: 3604Content-Type: text/cssLast-Modified: Wed, 01 Jul 2015 07:57:44 GMTAccept-Ranges: bytesETag: "08c919cd3b3d01:3fe"Server: Microsoft-IIS/6.0X-Powered-By: ASP.NETDate: Thu, 19 Jan 2017 00:39:38 GMT..BODY {...FONT-SIZE: 9pt; COLOR: #222; FONT-FAMILY: "....", Arial, He
lvetica, sans-serif..}..TD {...FONT-SIZE: 9pt; COLOR: #222; FONT-FAMIL
Y: "....", Arial, Helvetica, sans-serif..}..TH {...FONT-SIZE: 9pt; COL
OR: #222; FONT-FAMILY: "....", Arial, Helvetica, sans-serif..}..BODY {
...MARGIN: 0px; BACKGROUND-COLOR: #EDECF5..}..A:link {...FONT-SIZE: 9p
t; COLOR: #222; FONT-FAMILY: "....", Arial, Helvetica, sans-serif; TEX
T-DECORATION: none..}..A:visited {...FONT-SIZE: 9pt; COLOR: #222; FONT
-FAMILY: "....", Arial, Helvetica, sans-serif; TEXT-DECORATION: none..
}..A:active {...FONT-SIZE: 9pt; COLOR: #222; FONT-FAMILY: "....", Aria
l, Helvetica, sans-serif; TEXT-DECORATION: none..}..A:hover {...FONT-S
IZE: 9pt; COLOR: #cc0000; FONT-FAMILY: "...."; TEXT-DECORATION: underl
ine..}..A.NavT:link {...FONT-SIZE: 9pt; COLOR: #ffffff; FONT-FAMILY: "
...."; TEXT-DECORATION: none..}..A.NavT:visited {...FONT-SIZE: 9pt; CO
LOR: #ffffff; FONT-FAMILY: "...."; TEXT-DECORATION: none..}..A.NavT:ac
tive {...FONT-SIZE: 9pt; COLOR: #ffffff; FONT-FAMILY: "...."; TEXT-DEC
ORATION: none..}..A.NavT:hover {...FONT-SIZE: 9pt; COLOR: #ffff00; FON
T-FAMILY: "...."; TEXT-DECORATION: underline..}...tb_border {...BORDER
-RIGHT: #009acb 1px solid; BORDER-TOP: #009acb 1px solid; BORDER-LEFT:
#009acb 1px solid; BORDER-BOTTOM: #009acb 1px solid..}...T_t_b {...BO
RDER-RIGHT: 1px solid #990000; BORDER-LEFT: 1px solid #990000}...Top_g
uanggao {...BORDER-TOP: 1px solid #990000; BORDER-LEFT: 1px solid #990
000}...Top_guanggao_td {...BORDER-RIGHT: 1px solid #990000; BORDER<<< skipped >>>
GET /Images/Index_bottom.jpg HTTP/1.1Accept: image/png, image/svg xml, image/*;q=0.8, */*;q=0.5Referer: hXXp://VVV.92117my.com/game.htmlAccept-Language: en-USUser-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)Accept-Encoding: gzip, deflateHost: VVV.92117my.comConnection: Keep-Alive
HTTP/1.1 200 OKContent-Length: 17599Content-Type: image/jpegLast-Modified: Wed, 01 Jul 2015 07:57:44 GMTAccept-Ranges: bytesETag: "08c919cd3b3d01:3fe"Server: Microsoft-IIS/6.0X-Powered-By: ASP.NETDate: Thu, 19 Jan 2017 00:39:39 GMT......Exif..II*.................Ducky.......F.....*hXXp://ns.adobe.com
/xap/1.0/.<?xpacket begin="..." id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.5-c01
4 79.151481, 2013/03/13-12:09:15 "> <rdf:RDF xmlns:rdf="h
ttp://VVV.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rd
f:about="" xmlns:xmp="hXXp://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http:
//ns.adobe.com/xap/1.0/mm/" xmlns:stRef="hXXp://ns.adobe.com/xap/1.0/s
Type/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CC (Windows)" xmpM
M:InstanceID="xmp.iid:77946C53FD1411E2A6E0C1445DB6A2D7" xmpMM:Document
ID="xmp.did:77946C54FD1411E2A6E0C1445DB6A2D7"> <xmpMM:DerivedFro
m stRef:instanceID="xmp.iid:77946C51FD1411E2A6E0C1445DB6A2D7" stRef:do
cumentID="xmp.did:77946C52FD1411E2A6E0C1445DB6A2D7"/> </rdf:Desc
ription> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?&
gt;....Adobe.d........................................................
......................................................................
...................Z..................................................
.......................................!Qa....1A.."2R..S..q....Bb#347.
.r.G.......Cc.6.D5..$TF........................!a1A...Q."23q....B.C...
....br............?...[dI..R......1..........U.../y..D....."DP^eC."(/2
......P.H....r$E..T9."..*...Ay..D....."DP^eC."(/2......P.H....r$E..T9.
"..*...Ay..D....."DP^eC."(/2......P.H....r$E..T9."..*...Ay..D....."DP^
eC."(/2......P.H....r$E..T9."..*...Ay..D....."DP^eC."(/2......P.H.<<< skipped >>>
GET /jc/hostjc.txt?WebShieldDRSessionVerify=EMGc17Wrs9kjNC7K8XBq HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)Accept: */*Host: VVV.gxnkw.comCache-Control: no-cacheConnection: Keep-Alive
HTTP/1.1 302 FoundServer: Safedog/4.0.0Location: /jc/hostjc.txtContent-Length: 0Connection: CloseContent-Type: text/html
The Trojan connects to the servers at the folowing location(s):
.text
`.rdata
@.data
.rsrc
t$(SSh
~%UVW
u$SShe
kernel32.dll
user32.dll
Kernel32.dll
ws2_32.dll
SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xfjct
hXXp://ip.qq.com/
@Windows 2000
@Windows Server 2003
@Windows Vista
@Windows 7
@Windows 8
00-00-00-00-00-00
%System%\host.txt
%System%\drivers\etc\hosts
hXXp://passport.baidu.com/?business&un=5182235367&from=prin#0
340046815
hXXp://VVV.gxnkw.com/jc/tongji.txt
%d&&'
123456789
00003333
deflate 1.1.3 Copyright 1995-1998 Jean-loup Gailly
inflate 1.1.3 Copyright 1995-1998 Mark Adler
F%*.*f
CNotSupportedException
commctrl_DragListMsg
Afx:%x:%x:%x:%x:%x
Afx:%x:%x
COMCTL32.DLL
CCmdTarget
__MSVCRT_HEAP_SELECT
Broken pipe
Inappropriate I/O control operation
Operation not permitted
RASAPI32.dll
iphlpapi.dll
SHLWAPI.dll
MPR.dll
WINMM.dll
WS2_32.dll
VERSION.dll
GetProcessHeap
WinExec
KERNEL32.dll
GetKeyState
USER32.dll
GetViewportOrgEx
GDI32.dll
WINSPOOL.DRV
RegCloseKey
RegOpenKeyExA
RegCreateKeyA
RegCreateKeyExA
ADVAPI32.dll
ShellExecuteA
SHELL32.dll
ole32.dll
OLEAUT32.dll
COMCTL32.dll
WSOCK32.dll
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetCrackUrlA
InternetCanonicalizeUrlA
WININET.dll
GetCPInfo
CreateDialogIndirectParamA
UnhookWindowsHookEx
SetWindowsHookExA
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
GetViewportExtEx
comdlg32.dll
.PAVCException@@
Shell32.dll
Mpr.dll
Advapi32.dll
User32.dll
Gdi32.dll
(&07-034/)7 '
?? / %d]
%d / %d]
.PAVCFileException@@
: %d]
(*.*)|*.*||
(*.WAV;*.MID)|*.WAV;*.MID|WAV
(*.WAV)|*.WAV|MIDI
(*.MID)|*.MID|
(*.txt)|*.txt|
(*.JPG;*.PNG;*.BMP;*.GIF;*.ICO;*.CUR)|*.JPG;*.PNG;*.BMP;*.GIF;*.ICO;*.CUR|JPG
(*.JPG)|*.JPG|PNG
(*.PNG)|*.PNG|BMP
(*.BMP)|*.BMP|GIF
(*.GIF)|*.GIF|
(*.ICO)|*.ICO|
(*.CUR)|*.CUR|
%s:%d
icmp.dll
windows
.PAVCNotSupportedException@@
out.prn
(*.prn)|*.prn|
%d.%d
%d/%d
1.6.9
unsupported zlib version
png_read_image: unsupported transformation
%d / %d
Bogus message code %d
libpng error: %s
libpng warning: %s
1.1.3
bad keyword
libpng does not support gamma background rgb_to_gray
Palette is NULL in indexed image
(%d-%d):
%ld%c
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
HTTP/1.0
%s <%s>
Reply-To: %s
From: %s
To: %s
Subject: %s
Date: %s
Cc: %s
%a, %d %b %Y %H:%M:%S
SMTP
X-X-X-X-X-X
;3 #>6.&
'2, / 0&7!4-)1#
.PAVCObject@@
.PAVCSimpleException@@
.PAVCMemoryException@@
.?AVCNotSupportedException@@
.PAVCResourceException@@
.PAVCUserException@@
.?AVCCmdTarget@@
.?AVCCmdUI@@
.?AVCTestCmdUI@@
.PAVCArchiveException@@
zcÁ
right-curly-bracket
left-curly-bracket
0123456789
C:\Windows\svchost.exe
#include "l.chs\afxres.rc" // Standard components
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity name="E.App" processorArchitecture="x86" version="5.2.0.0" type="win32"/><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="x86" publicKeyToken="6595b64144ccf1df" language="*" /></dependentAssembly></dependency></assembly>PADPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDING
A.AQAtA
(*.*)
1.0.0.0
svchosl.exe_3732:
.text
`.rdata
@.data
.rsrc
t$(SSh
~%UVW
u$SShe
kernel32.dll
user32.dll
OLEACC.DLL
Kernel32.dll
ws2_32.dll
EnumChildWindows
EnumWindows
WebBrowser
%System%\gjzbjclb.txt
%System%\gjzjclb.txt
SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xff
hXXp://
hXXp://passport.baidu.com/?business&un=5182235367&from=prin#0
340046815
SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xf1
hXXp://ip.qq.com/
@Windows 2000
@Windows Server 2003
@Windows Vista
@Windows 7
@Windows 8
00-00-00-00-00-00
Chrome_WidgetWin_100
liebao.exe
maxthon.exe
360se.exe
2345Explorer.exe
MozillaWindowClass
firefox.exe
hao123Juzi.exe
SogouExplorer.exe
QQBrowser.exe
Chrome_WidgetWin_1
opera.exe
TaoBrowser.exe
TangoWeb.exe
TheWorld.exe
UCBrowser.exe
{7597C4B1-F62C-4e83-A35F-8B69C8779DC1}baidubrowser.exe
360chrome.exe
TTraveler.exe
chrome.exe
vary.exe
Chrome_OmniboxView
f1browser.exe
went.exe
miniie.exe
Windows Internet Explorer_Frame
cpopmus32ex.exe
crowd.exe
slowt32ex.exe
Maxthon3Cls_MainFrmMsg
SmartUI.Win32.Edit
TT_WebCtrl
wscript.shell
SendKeys
hXXp://VVV.gxnkw.com/jc/tongji.txt
%d&&'
123456789
00003333
deflate 1.1.3 Copyright 1995-1998 Jean-loup Gailly
inflate 1.1.3 Copyright 1995-1998 Mark Adler
F%*.*f
CNotSupportedException
commctrl_DragListMsg
Afx:%x:%x:%x:%x:%x
Afx:%x:%x
COMCTL32.DLL
CCmdTarget
MSH_SCROLL_LINES_MSG
MSWHEEL_ROLLMSG
ole32.dll
__MSVCRT_HEAP_SELECT
Broken pipe
Inappropriate I/O control operation
Operation not permitted
RASAPI32.dll
iphlpapi.dll
SHLWAPI.dll
MPR.dll
WINMM.dll
WS2_32.dll
VERSION.dll
GetProcessHeap
WinExec
KERNEL32.dll
GetKeyState
GetKeyboardLayout
VkKeyScanExA
keybd_event
USER32.dll
GetViewportOrgEx
GDI32.dll
WINSPOOL.DRV
RegCloseKey
RegOpenKeyExA
RegCreateKeyA
RegCreateKeyExA
ADVAPI32.dll
ShellExecuteA
SHELL32.dll
OLEAUT32.dll
COMCTL32.dll
oledlg.dll
WSOCK32.dll
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetCrackUrlA
InternetCanonicalizeUrlA
WININET.dll
GetCPInfo
CreateDialogIndirectParamA
UnhookWindowsHookEx
SetWindowsHookExA
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
GetViewportExtEx
comdlg32.dll
.PAVCException@@
.PAVCNotSupportedException@@
.PAVCFileException@@
(*.prn)|*.prn|
(*.*)|*.*||
Shell32.dll
Mpr.dll
Advapi32.dll
User32.dll
Gdi32.dll
(&07-034/)7 '
?? / %d]
%d / %d]
: %d]
(*.WAV;*.MID)|*.WAV;*.MID|WAV
(*.WAV)|*.WAV|MIDI
(*.MID)|*.MID|
(*.txt)|*.txt|
(*.JPG;*.PNG;*.BMP;*.GIF;*.ICO;*.CUR)|*.JPG;*.PNG;*.BMP;*.GIF;*.ICO;*.CUR|JPG
(*.JPG)|*.JPG|PNG
(*.PNG)|*.PNG|BMP
(*.BMP)|*.BMP|GIF
(*.GIF)|*.GIF|
(*.ICO)|*.ICO|
(*.CUR)|*.CUR|
%s:%d
windows
1.6.9
unsupported zlib version
png_read_image: unsupported transformation
out.prn
%d.%d
%d / %d
%d/%d
Bogus message code %d
libpng error: %s
libpng warning: %s
1.1.3
bad keyword
libpng does not support gamma background rgb_to_gray
Palette is NULL in indexed image
(%d-%d):
%ld%c
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
HTTP/1.0
%s <%s>
Reply-To: %s
From: %s
To: %s
Subject: %s
Date: %s
Cc: %s
%a, %d %b %Y %H:%M:%S
SMTP
X-X-X-X-X-X
;3 #>6.&
'2, / 0&7!4-)1#
.PAVCOleException@@
.PAVCObject@@
.PAVCSimpleException@@
.PAVCMemoryException@@
.?AVCNotSupportedException@@
.PAVCResourceException@@
.PAVCUserException@@
.?AVCCmdTarget@@
.?AVCCmdUI@@
.?AVCTestCmdUI@@
.PAVCOleDispatchException@@
.PAVCArchiveException@@
zcÁ
right-curly-bracket
left-curly-bracket
0123456789
hXXp://VVV.92117my.com/host.htmly
C:\Windows\svchosl.exe
#include "l.chs\afxres.rc" // Standard components
..a.OO
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity name="E.App" processorArchitecture="x86" version="5.2.0.0" type="win32"/><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="x86" publicKeyToken="6595b64144ccf1df" language="*" /></dependentAssembly></dependency></assembly>PADPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD
(*.*)
1.0.0.0
svchostlsp.exe_3736:
.text
`.rdata
@.data
.rsrc
t$(SSh
~%UVW
^}•0DN
u$SShe
kernel32.dll
user32.dll
SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xff
C:\Windows\twain_32\config\ESPI11.dll
C:\Windows\twain_32\config
.inidata
@.reloc
CNotSupportedException
CCmdTarget
commctrl_DragListMsg
COMCTL32.DLL
__MSVCRT_HEAP_SELECT
KERNEL32.dll
USER32.dll
RegCloseKey
RegOpenKeyExA
ADVAPI32.dll
WS2_32.dll
COMCTL32.dll
GetCPInfo
UnhookWindowsHookEx
SetWindowsHookExA
GetKeyState
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
GDI32.dll
WINSPOOL.DRV
comdlg32.dll
SHELL32.dll
SWNPM.dll
.PAVCException@@
.PAVCArchiveException@@
.PAVCObject@@
.PAVCSimpleException@@
.PAVCMemoryException@@
.?AVCNotSupportedException@@
.?AVCCmdTarget@@
.?AVCCmdUI@@
.?AVCTestCmdUI@@
>$>(>,>0>4>8><>@>
0F0g0m0
<"<=<^<~<
9$9(9,90989
<0=4=8=<=
%System%\addressoftext.inscan
hXXp://20140507.ip138.com/ic.asp
z>Windows 2000
@Windows XP
@Windows Server 2003
@Windows Vista
@Windows 7
@Windows 8
@127.0.0.1
hXXp://VVV.gxnkw.com/jc/tongji.txt
%d&&'
123456789
00003333
deflate 1.1.3 Copyright 1995-1998 Jean-loup Gailly
inflate 1.1.3 Copyright 1995-1998 Mark Adler
%*.*f
Afx:%x:%x:%x:%x:%x
Afx:%x:%x
Broken pipe
Inappropriate I/O control operation
Operation not permitted
RASAPI32.dll
GetProcessHeap
WinExec
GetViewportOrgEx
WINMM.dll
RegCreateKeyA
RegDeleteKeyA
RegCreateKeyExA
RegEnumKeyA
RegOpenKeyA
ShellExecuteA
ole32.dll
OLEAUT32.dll
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetCrackUrlA
InternetCanonicalizeUrlA
WININET.dll
CreateDialogIndirectParamA
GetViewportExtEx
Shell32.dll
Mpr.dll
Advapi32.dll
User32.dll
Gdi32.dll
Kernel32.dll
(&07-034/)7 '
?? / %d]
%d / %d]
.PAVCFileException@@
: %d]
(*.*)|*.*||
(*.WAV;*.MID)|*.WAV;*.MID|WAV
(*.WAV)|*.WAV|MIDI
(*.MID)|*.MID|
(*.txt)|*.txt|
(*.JPG;*.PNG;*.BMP;*.GIF;*.ICO;*.CUR)|*.JPG;*.PNG;*.BMP;*.GIF;*.ICO;*.CUR|JPG
(*.JPG)|*.JPG|PNG
(*.PNG)|*.PNG|BMP
(*.BMP)|*.BMP|GIF
(*.GIF)|*.GIF|
(*.ICO)|*.ICO|
(*.CUR)|*.CUR|
%s:%d
windows
.PAVCNotSupportedException@@
out.prn
(*.prn)|*.prn|
%d.%d
%d/%d
1.6.9
unsupported zlib version
png_read_image: unsupported transformation
%d / %d
Bogus message code %d
libpng error: %s
libpng warning: %s
1.1.3
bad keyword
libpng does not support gamma background rgb_to_gray
Palette is NULL in indexed image
(%d-%d):
%ld%c
%s\ESPI%d.dll
hXXp://dywt.com.cn
service@dywt.com.cn
86(0411)88995834
86(0411)88995831
Windows
(ESPINN.dll(NN
This is a runtime library file for EPL applications. The EPL is a software development environment. For details please visit VVV.dywt.com.cn/info
CallerInfoCopyCmd
SetIPPort
GetIPPort
"C:\Windows\System32\ESPI11.dll"
ProviderInstallCopyCmd
SockDataCopyCmd
SockAddrCopyCmd
enetintercept_fnSockAddrSetIPPort
enetintercept_fnSockAddrGetIPPort
enetintercept_fnInstallCopyCmd
enetintercept_fnSockDataCopyCmd
enetintercept_fnSockAddrCopyCmd
enetintercept_fnCallerInfoCopyCmd
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
HTTP/1.0
%s <%s>
Reply-To: %s
From: %s
To: %s
Subject: %s
Date: %s
Cc: %s
%a, %d %b %Y %H:%M:%S
SMTP
.PAVCResourceException@@
.PAVCUserException@@
zcÁ
18201869647.com:88
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Temp\svchostlsp.exe
#include "l.chs\afxres.rc" // Standard components
555455###
1, 1, 0, 0
ESPI11.dll
(*.*)
1.0.0.0
iexplore.exe_1924:
.text
`.data
.rsrc
@.reloc
>.uzf
.us;}
IEFRAME.dll
MLANG.dll
iertutil.dll
urlmon.dll
ole32.dll
SHELL32.dll
SHLWAPI.dll
msvcrt.dll
USER32.dll
KERNEL32.dll
ADVAPI32.dll
RegOpenKeyExW
RegCloseKey
GetWindowsDirectoryW
_amsg_exit
_wcmdln
UrlApplySchemeW
PathIsURLW
UrlCanonicalizeW
UrlCreateFromPathW
iexplore.pdb
KEYW
KEYWh
KEYWD
.ENNNG.
a.ry.v
l.igM4
?1%SGf
xh.JW^
.97777"7" " " !
3.... ))
8888888888888
8888888888
.lPV)
úW1
.ApX/
H.ZAf
ð[U
%s!FK
1YYYY1YY9GEAA=77YRNNNW:.VT1
888777777
Y.hilkRROMLK=C,
..(((($$
3...((((%
3....(.''$
3.2...((((%
33.2....(,'
55323222...
(%&'00443445?
00.,,,4(
000.,,9(
0020..9(
003200;(
(#'( (''''!'!Microsoft.InternetExplorer.Default
6user32.dll
Kernel32.DLL
6xfire.exe
wlmail.exe
winamp.exe
waol.exe
sidebar.exe
psocdesigner.exe
np.exe
netscape.exe
netcaptor.exe
neoplanet.exe
msn.exe
mshtmpad.exe
mshta.exe
loader42.exe
infopath.exe
iexplore.exe
iepreview.exe
groove.exe
explorer.exe
dreamweaver.exe
contribute.exe
aol.exe
{28fb17e0-d393-439d-9a21-9474a070473a}Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings
DShell32.dll
Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe
Software\Microsoft\Active Setup\Installed Components\>{26923b43-4d38-484f-9b9e-de460746276c}"%s" %s
Kernel32.dll
\AppPatch\sysmain.sdb
-extoff go.microsoft.com/fwlink/?LinkId=106323
-extoff go.microsoft.com/fwlink/?LinkId=106322
-extoff go.microsoft.com/fwlink/?LinkId=106320
kernel32.dll
{00000000-0000-0000-0000-000000000000}\\?\Volume
shell:%s
Imaging_CreateWebPagePreview_Perftrack
Browseui_Tabs_Tearoff_BetweenWindows
Frame_URLEntered
Imaging_CreateWebPagePreview
WS_ExecuteQuery
Shdocvw_BaseBrowser_FireEvent_WindowStateChanged
IdleTask_Execution_Time
9.00.8112.16421 (WIN7_IE9_RTM.110308-0330)
IEXPLORE.EXE
Windows
9.00.8112.16421
iexplore.exe_1548:
.text
`.data
.rsrc
@.reloc
>.uzf
.us;}
IEFRAME.dll
MLANG.dll
iertutil.dll
urlmon.dll
ole32.dll
SHELL32.dll
SHLWAPI.dll
msvcrt.dll
USER32.dll
KERNEL32.dll
ADVAPI32.dll
RegOpenKeyExW
RegCloseKey
GetWindowsDirectoryW
_amsg_exit
_wcmdln
UrlApplySchemeW
PathIsURLW
UrlCanonicalizeW
UrlCreateFromPathW
iexplore.pdb
KEYW
KEYWh
KEYWD
.ENNNG.
a.ry.v
l.igM4
?1%SGf
xh.JW^
.97777"7" " " !
3.... ))
8888888888888
8888888888
.lPV)
úW1
.ApX/
H.ZAf
ð[U
%s!FK
1YYYY1YY9GEAA=77YRNNNW:.VT1
888777777
Y.hilkRROMLK=C,
..(((($$
3...((((%
3....(.''$
3.2...((((%
33.2....(,'
55323222...
(%&'00443445?
00.,,,4(
000.,,9(
0020..9(
003200;(
(#'( (''''!'!Microsoft.InternetExplorer.Default
6user32.dll
Kernel32.DLL
6xfire.exe
wlmail.exe
winamp.exe
waol.exe
sidebar.exe
psocdesigner.exe
np.exe
netscape.exe
netcaptor.exe
neoplanet.exe
msn.exe
mshtmpad.exe
mshta.exe
loader42.exe
infopath.exe
iexplore.exe
iepreview.exe
groove.exe
explorer.exe
dreamweaver.exe
contribute.exe
aol.exe
{28fb17e0-d393-439d-9a21-9474a070473a}Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings
DShell32.dll
Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe
Software\Microsoft\Active Setup\Installed Components\>{26923b43-4d38-484f-9b9e-de460746276c}"%s" %s
Kernel32.dll
\AppPatch\sysmain.sdb
-extoff go.microsoft.com/fwlink/?LinkId=106323
-extoff go.microsoft.com/fwlink/?LinkId=106322
-extoff go.microsoft.com/fwlink/?LinkId=106320
kernel32.dll
{00000000-0000-0000-0000-000000000000}\\?\Volume
shell:%s
Imaging_CreateWebPagePreview_Perftrack
Browseui_Tabs_Tearoff_BetweenWindows
Frame_URLEntered
Imaging_CreateWebPagePreview
WS_ExecuteQuery
Shdocvw_BaseBrowser_FireEvent_WindowStateChanged
IdleTask_Execution_Time
9.00.8112.16421 (WIN7_IE9_RTM.110308-0330)
IEXPLORE.EXE
Windows
9.00.8112.16421
SearchFilterHost.exe_3408:
.text
`.data
.rsrc
@.reloc
ADVAPI32.dll
ntdll.DLL
KERNEL32.dll
msvcrt.dll
USER32.dll
ole32.dll
OLEAUT32.dll
TQUERY.DLL
IMM32.dll
MSSHooks.dll
mscoree.dll
SHLWAPI.dll
d:\win7sp1_gdr\enduser\mssearch2\search\search\gather\fltrhost\bufstm.cxx
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\mutex.cpp
RegDeleteKeyW
RegDeleteKeyExW
8%uiP
d:\win7sp1_gdr\enduser\mssearch2\common\include\srchxcpt.hxx
Invalid parameter passed to C runtime function.
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\tracersecutil.h
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\tracmain.cpp
-d-d-d-d-d-d-d-%d
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\tracmain.h
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\sysimprs.cxx
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegEnumKeyExW
ReportEventW
_amsg_exit
SearchFilterHost.pdb
version="5.1.0.0"
name="Microsoft.Windows.Search.MSSFH"
<requestedExecutionLevel
3 3(30383|3
kernel32.dll
Software\Microsoft\Windows Search
SOFTWARE\Microsoft\Windows Search
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_PERFORMANCE_DATA
HKEY_DYN_DATA
HKEY_CURRENT_CONFIG
Windows Search Service
tquery.dll
advapi32.dll
API-MS-Win-Core-LocalRegistry-L1-1-0.dll
<Exception><HR>0xx</HR><eip>%p</eip><module>%S</module><line>%d</line></Exception>
Software\Microsoft\Windows Search\Tracing
Software\Microsoft\Windows Search\Tracing\EventThrottleLastReported
Software\Microsoft\Windows Search\Tracing\EventThrottleState
<MSG>
<ERR> 0xx=
<LOC> %S(%d) </LOC>
tid="0x%x"
pid="0x%x"
tagname="%S"
tagid="0x%x"
el="0x%x"
time="d/d/d d:d:d.d"
logname="%S"
</MSG></TRC>
Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11CF-8B85-00AA005B4383}.\%s.mui
.\%s\%s.mui
%s\%s.mui
%s\%s\%s.mui
%s\%s
winhttp.dll
Microsoft Windows Search Filter Host
7.00.7601.17610 (win7sp1_gdr.110503-1502)
SearchFilterHost.exe
Windows
7.00.7601.17610
SearchProtocolHost.exe_1908:
.text
`.data
.rsrc
@.reloc
ADVAPI32.dll
ntdll.DLL
KERNEL32.dll
msvcrt.dll
USER32.dll
ole32.dll
OLEAUT32.dll
TQUERY.DLL
MSSHooks.dll
IMM32.dll
SHLWAPI.dll
SrchCollatorCatalogInfo
SrchDSSLogin
SrchDSSPortManager
SrchPHHttp
SrchIndexerQuery
SrchIndexerProperties
SrchIndexerPlugin
SrchIndexerClient
SrchIndexerSchema
Msidle.dll
Failed to get REGKEY_FLTRDMN_MS_TO_IDLE, using default
pfps->psProperty.ulKind is LPWSTR but psProperty.lpwstr is NULL or empty
d:\win7sp1_gdr\enduser\mssearch2\common\utils\crchash.cxx
d:\win7sp1_gdr\enduser\mssearch2\search\search\gather\fltrdmn\fltrdaemon.cxx
d:\win7sp1_gdr\enduser\mssearch2\search\common\include\secutil.hxx
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\tracerhelpers.h
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\mutex.cpp
d:\win7sp1_gdr\enduser\mssearch2\common\include\srchxcpt.hxx
RegDeleteKeyW
RegDeleteKeyExW
8%uiP
Invalid parameter passed to C runtime function.
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\tracersecutil.h
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\tracmain.cpp
-d-d-d-d-d-d-d-%d
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\tracmain.h
</MSG></TRC>
<MSG>
<ERR> 0xx=
<LOC> %s(%d) </LOC>
tid="0x%x"
pid="0x%x"
tagname="%s"
tagid="0x%x"
el="0x%x"
time="d/d/d d:d:d.d"
logname="%s"
d:\win7sp1_gdr\enduser\mssearch2\common\tracer\sysimprs.cxx
SHELL32.dll
PROPSYS.dll
ntdll.dll
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegEnumKeyExW
ReportEventW
_amsg_exit
MsgWaitForMultipleObjects
SearchProtocolHost.pdb
2 2(20282|2
4%5S5
Software\Microsoft\Windows Search
https
kernel32.dll
msTracer.dll
msfte.dll
lX-X-X-XX-XXXXXX
SOFTWARE\Microsoft\Windows Search
tquery.dll
%s\%s
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_PERFORMANCE_DATA
HKEY_DYN_DATA
HKEY_CURRENT_CONFIG
Windows Search Service
<Exception><HR>0xx</HR><eip>%p</eip><module>%S</module><line>%d</line></Exception>
advapi32.dll
WAPI-MS-Win-Core-LocalRegistry-L1-1-0.dll
winhttp.dll
Software\Microsoft\Windows Search\Tracing
Software\Microsoft\Windows Search\Tracing\EventThrottleLastReported
Software\Microsoft\Windows Search\Tracing\EventThrottleState
<MSG>
<LOC> %S(%d) </LOC>
tagname="%S"
logname="%S"
Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11CF-8B85-00AA005B4383}.\%s.mui
.\%s\%s.mui
%s\%s.mui
%s\%s\%s.mui
Microsoft Windows Search Protocol Host
7.00.7601.17610 (win7sp1_gdr.110503-1502)
SearchProtocolHost.exe
Windows
7.00.7601.17610
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
svchostlsp.exe:3736
%original file name%.exe:452
117my.exe:2736
117my.exe:944 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
C:\Windows\twain_32\config\ESPI11.dll (244 bytes)
C:\Windows\System32\addressoftext.inscan (1 bytes)
C:\Windows\System32\ESPI11.dll (723 bytes)
C:\Windows\svchost.exe (12649 bytes)
C:\Windows\117my.exe (7296 bytes)
C:\Windows\117my.com.bat (258 bytes)
C:\Windows\Game.ico:Zone.Identifier (26 bytes)
C:\Windows\svchosl.exe (8713 bytes)
C:\Windows\117my.skn (2160 bytes)
C:\Users\"%CurrentUserName%"\Desktop\117éÂâ€Ã¥Å¸Å¸7.1.lnk (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\YBU4WGCW.txt (103 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\host[1].htm (775 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Temp\117my.exe (294 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Temp\svchostlsp.exe (1948 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Temp\Data\JpHrc.txt (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Temp\Data\Mag.dat (101 bytes)
C:\Windows\System32\drivers\etc\hosts (39 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Temp\Data\Repairdata.txt (3 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Temp\117my.skn (62 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Temp\Data\117my.ini (28 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Temp\Data\iat.dll (89 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"xf1" = "C:\Windows\svchosl.exe /start" - Restore the original content of the HOSTS file (%System%\drivers\etc\hosts):
127.0.0.1 localhost - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.