Gen.Variant.Symmi.4413_2a70ad395a
Gen:Variant.Symmi.4413 (B) (Emsisoft), Gen:Variant.Symmi.4413 (AdAware), Trojan.Win32.FlyStudio.FD, GenericEmailWorm.YR, GenericPhysicalDrive0.YR (Lavasoft MAS)
Behaviour: Trojan, Worm, EmailWorm
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 2a70ad395a99a28706307fdfa4fef24b
SHA1: 52687deef4acf82b98985a80a3bd67be1c8a3d74
SHA256: bc880cd7a4e58e69f9c7eb08b953cae5ad9b42cb1a749e2dc95b174385878c37
SSDeep: 98304:gdQIGbI0bfZlibAwLDL8FEw4G4ktrXbEtbF5/15x:g6bLzgDLsEwZNLEtbx5x
Size: 3767247 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6, MicrosoftVisualC, MicrosoftVisualCv50v60MFC, MicrosoftVisualC50, Armadillov171
Company: no certificate found
Created at: 1972-12-25 08:33:23
Analyzed on: Windows7 SP1 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
| Behaviour | Description |
|---|---|
| EmailWorm | Worm can send e-mails. |
Process activity
The Trojan creates the following process(es):
No processes have been created.
The Trojan injects its code into the following process(es):
%original file name%.exe:2748
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process %original file name%.exe:2748 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\i_phone_blue[1].png (579 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\chat-popup[1].png (7436 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Tar3CA7.tmp (2712 bytes)
C:\dat (885 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\warning[1] (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8059E9A0D314877E40FE93D8CCFB3C69_4514C5DDAF11F496BDCCD6622E9EF365 (660 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\EHSAQ1GI.txt (305 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\2H12DV8R.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\VJR9040K.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\v3[1].css (9411 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\Q0RAIKHH.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\6H5NYYFT.txt (519 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Tar26B3.tmp (2712 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\678B9F95B126F50368710CA85CB2F3DA_AB8D94F29896452B4806732E3EB7F2B7 (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\b_buyNow_187[1].png (10372 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\U4T2EBWJ.txt (519 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\common[1].js (4656 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\reallydopost[1].js (859 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\LK7UQ8A6.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (1720 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Cab3CA6.tmp (52 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\E_N4\krnln.fnr (422 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (52 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\common_v3[1].js (1081 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\styles-new[1].css (11743 bytes)
C:\update.edb (14 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\828298824EA5549947C17DDABF6871F5_0206EFBC540300C3BF0163CDBC3D7D56 (1424 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\23B523C9E7746F715D33C6527C18EB9D (325 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\2AREPTB0.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\X1WMZ7GH.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\counter[1].js (17760 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\JJOYYN7Y.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\828298824EA5549947C17DDABF6871F5_0206EFBC540300C3BF0163CDBC3D7D56 (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\EHRJ80N2.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\KL5ZUWDU.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\E_N4\xplib.fne (47 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\E_N4\eAPI.fne (335 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\CIPSUJIG.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\UWZKZMN3.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8A574ED5927B3CEC9626151D220C7448 (248 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\stars_5[1].png (570 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\QMY6R97N.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771 (1688 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\hr_882x7[1].png (1152 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\O1JL2O23.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\2U031IEQ.txt (329 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\CH8OFS0H.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\domain_profile[1].htm (1192 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Internet Explorer\DOMStore\WMZUWJRG\www.hugedomains[1].xml (13 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_C7B398B93BFA7397A840C520A0E096A2 (1454 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\23B523C9E7746F715D33C6527C18EB9D (876 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\dots_8x1[1].gif (44 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\E_N4\HtmlView.fne (434 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\error[1] (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\bg[1].gif (670 bytes)
C:\update.exe (797 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\common[1].css (20667 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5457A8CE4B2A7499F8299A013B6E1C7C_CE50F893881D43DC0C815E4D80FAF2B4 (2674 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\jquery-1.5.1.min[1].js (60926 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\youtubeLocationMatters[1].jpg (12254 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5457A8CE4B2A7499F8299A013B6E1C7C_CE50F893881D43DC0C815E4D80FAF2B4 (942 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\footer_logo_cc[1].png (832 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D (1720 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\A0SXX9WM.txt (519 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\WDX9E0U1.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\footer_logo_escrow[1].png (832 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8059E9A0D314877E40FE93D8CCFB3C69_4514C5DDAF11F496BDCCD6622E9EF365 (463 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\CJU696IX.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\3A0GLDOA.txt (81 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\53HPTWYG.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\E_N4\internet.fne (86 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\bg2[1].jpg (17097 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Cab26B2.tmp (51 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\N85GLBE4.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\crown[1].jpg (2191 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\2KHMA776.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\chat-popup-close[1].png (858 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\E_N4\iext2.fne (942 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\pages_v3b[1].css (11735 bytes)
C:\csyt2.exe (899 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Cab26E2.tmp (51 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771 (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\chat-popup-start[1].png (2191 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\footer_logo_guaranteed[1].png (732 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\921FA3X0.txt (841 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\edition121114[1].css (3378 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\i_i_blue[1].png (457 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\error[1] (3 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_C7B398B93BFA7397A840C520A0E096A2 (2702 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\HLS3GAQ8.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\VZY7D90T.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\logo_top[1].png (5518 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\B3HCHRUN.txt (519 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\styles_hd[1].css (15415 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\t[1].gif (49 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8A574ED5927B3CEC9626151D220C7448 (665 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\678B9F95B126F50368710CA85CB2F3DA_AB8D94F29896452B4806732E3EB7F2B7 (1448 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\9KD81I68.txt (519 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Tar26E3.tmp (2712 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\b_x[1].png (755 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\footer_logo_GT[1].png (2139 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\9LANWZCJ.txt (123 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\profileVideo[1].gif (43 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\2KHMA776.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\KL5ZUWDU.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Tar3CA7.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\6H5NYYFT.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\CIPSUJIG.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\QMY6R97N.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\UWZKZMN3.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\VJR9040K.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\Q0RAIKHH.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\U4T2EBWJ.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\EHSAQ1GI.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Tar26B3.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Cab3CA6.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\A0SXX9WM.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\WDX9E0U1.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\CH8OFS0H.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\CJU696IX.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\O1JL2O23.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\LK7UQ8A6.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\3A0GLDOA.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\53HPTWYG.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\VZY7D90T.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\2H12DV8R.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\B3HCHRUN.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Cab26B2.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\2AREPTB0.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\X1WMZ7GH.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Cab26E2.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\JJOYYN7Y.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\N85GLBE4.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\9KD81I68.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Tar26E3.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\EHRJ80N2.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\9LANWZCJ.txt (0 bytes)
Registry activity
The process %original file name%.exe:2748 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\2a70ad395a99a28706307fdfa4fef24b_RASAPI32]
"MaxFileSize" = "1048576"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\2a70ad395a99a28706307fdfa4fef24b_RASAPI32]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication]
"ID" = "94109603"
[HKLM\SOFTWARE\Microsoft\Tracing\2a70ad395a99a28706307fdfa4fef24b_RASMANCS]
"MaxFileSize" = "1048576"
"ConsoleTracingMask" = "4294901760"
"EnableConsoleTracing" = "0"
[HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\323C118E1BF7B8B65254E2E2100DD6029037F096]
"Blob" = "0F 00 00 00 01 00 00 00 14 00 00 00 6C 04 85 E5"
[HKLM\SOFTWARE\Microsoft\Tracing\2a70ad395a99a28706307fdfa4fef24b_RASAPI32]
"EnableConsoleTracing" = "0"
[HKCU\Software\Classes\Local Settings\MuiCache\2D\52C64B7E]
"LanguageList" = "en-US, en"
[HKLM\SOFTWARE\Microsoft\Tracing\2a70ad395a99a28706307fdfa4fef24b_RASMANCS]
"FileTracingMask" = "4294901760"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "46 00 00 00 3C 00 00 00 09 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD]
"Blob" = "0F 00 00 00 01 00 00 00 20 00 00 00 52 29 BA 15"
[HKLM\SOFTWARE\Microsoft\Tracing\2a70ad395a99a28706307fdfa4fef24b_RASAPI32]
"FileDirectory" = "%windir%\tracing"
[HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4]
"Blob" = "0F 00 00 00 01 00 00 00 14 00 00 00 5D 82 AD B9"
[HKLM\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication]
"Name" = "%original file name%.exe"
[HKLM\SOFTWARE\Microsoft\Tracing\2a70ad395a99a28706307fdfa4fef24b_RASMANCS]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\2a70ad395a99a28706307fdfa4fef24b_RASAPI32]
"ConsoleTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\2a70ad395a99a28706307fdfa4fef24b_RASMANCS]
"FileDirectory" = "%windir%\tracing"
[HKLM\SOFTWARE\Microsoft\Tracing\2a70ad395a99a28706307fdfa4fef24b_RASAPI32]
"FileTracingMask" = "4294901760"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyServer"
"ProxyOverride"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
"ProxyBypass"
[HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates]
"D69B561148F01C77C54578C10926DF5B856976AD"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
[HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates]
"323C118E1BF7B8B65254E2E2100DD6029037F096"
"2796BAE63F1801E277261BA0D77770028F20EEE4"
Dropped PE files
| MD5 | File path |
|---|---|
| 4c9e8f81bf741a61915d0d4fc49d595e | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\E_N4\HtmlView.fne |
| cbd788f4c71b9776660d6e8473ae0e09 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\E_N4\eAPI.fne |
| 6eb20bb6cafd6d31e871ed3abd65a59c | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\E_N4\iext2.fne |
| 5f7615924643b28efe76f73c525c8d85 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\E_N4\internet.fne |
| a9113c8263834546df16fd690483b291 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\E_N4\krnln.fnr |
| 091be7e5cd318ec2a43148046307fe95 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\E_N4\xplib.fne |
| c650212049eecc55c0597e24ef8d2597 | c:\csyt2.exe |
| 629779caa5ff62675f44edad69914088 | c:\update.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
Company Name: ??
Product Name: ????
Product Version: 1.0.0.0
Legal Copyright: ?? ????
Legal Trademarks:
Original Filename:
Internal Name:
File Version: 1.0.0.0
File Description: ?????????!
Comments: ?????????!
Language: English (United States)
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 19916 | 20480 | 4.52066 | 2e50996cc73c4c2fb7ea8f79cf982b26 |
| .rdata | 24576 | 2634 | 4096 | 2.46749 | e5615fe4c75b4f7ba6eaedb684bf431c |
| .data | 28672 | 8024 | 8192 | 1.98389 | 65f79c130923371bceab73bb68dbb967 |
| .data | 36864 | 2715648 | 2715648 | 5.51814 | 1ab6ab7f2609efd1668adce658b075b6 |
| .rsrc | 2752512 | 8296 | 12288 | 2.91404 | 4fb8b459a604e4667e0f6dd62fb5795f |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://HDRedirect-LB3-890977680.us-east-1.elb.amazonaws.com/new.htm | |
| hxxp://a767.dspw65.akamai.net/msdownload/update/v3/static/trustedr/en/authrootstl.cab | |
| hxxp://e8218.dscb1.akamaiedge.net/MFEwTzBNMEswSTAJBgUrDgMCGgUABBR6EHhJ4XUaQA4N26wwyKpLEnXRrAQULNVQQZcVi/CPNmFbSvtr2ZnJM5ICEG6KkOvP8ESKcg0IBdCCpUQ= | |
| hxxp://HDRedirect-LB3-890977680.us-east-1.elb.amazonaws.com/update.edb | |
| hxxp://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBR8sWZUnKvbRO5iJhat9GV793rVlAQUrb2YejS0Jvf6xCZU7wO94CTLVBoCECdm7lbrSfOOq9dwovyE3iI= | |
| hxxp://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBReAhtobFzTvhaRmVeJ38QUchY9AwQUu69+Aj36pvE8hI6t7jiY7NkyMtQCEAui0B3Ly3d26KxlCXrBJUE= | |
| hxxp://e6845.dscb1.akamaiedge.net/crls/secureca.crl | |
| hxxp://ocsp.godaddy.com.akadns.net//MEQwQjBAMD4wPDAJBgUrDgMCGgUABBTkIInKBAzXkF0Qh0pel3lfHJ9GPAQU0sSw0pHUTBFxs2HLPaH+3ahq1OMCAxvnFQ== | |
| hxxp://ocsp.godaddy.com.akadns.net//MEIwQDA+MDwwOjAJBgUrDgMCGgUABBQdI2+OBkuXH93foRUj4a7lAr4rGwQUOpqFBxBnKLbv9r0FQW4gwZTaD94CAQc= | |
| hxxp://e8218.dscb1.akamaiedge.net/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSxtDkXkBa3l3lQEfFgudSiPNvt7gQUAPkqw0GRtsnCuD5V8sCXEROgByACEAEAISWIsPpZp3fvBXtmJ98= | |
| hxxp://a1363.dscg.akamai.net/pki/crl/products/MicCodSigPCA_08-31-2010.crl | |
| hxxp://clients.l.google.com/ocsp/MEkwRzBFMEMwQTAJBgUrDgMCGgUABBTy4Gr5hYodjXCbSRkjeqm1Gih+ZAQUSt0GFhu89mi1dvWBtrtiGrpagS8CCDTS8DvN7pMs | |
| hxxp://a1158.b.akamai.net/MFUwUzBRME8wTTAJBgUrDgMCGgUABBTkLVLomfJQOu5CFIgPOR73ljBRHAQU+L36r3N3xscb+UtNEafRM6+vchECFEOZrYpYgDwxeWGj/HetMtWiXvU/ | |
| hxxp://clients.l.google.com/GIAG2.crl | |
| hxxp://clients.l.google.com/ocsp/MEkwRzBFMEMwQTAJBgUrDgMCGgUABBTy4Gr5hYodjXCbSRkjeqm1Gih+ZAQUSt0GFhu89mi1dvWBtrtiGrpagS8CCGZimYWX7CS+ | |
| hxxp://crl.geotrust.com/crls/secureca.crl | |
| hxxp://ocsp.godaddy.com//MEQwQjBAMD4wPDAJBgUrDgMCGgUABBTkIInKBAzXkF0Qh0pel3lfHJ9GPAQU0sSw0pHUTBFxs2HLPaH+3ahq1OMCAxvnFQ== | |
| hxxp://www.csyt2.com/update.edb | |
| hxxp://ocsp.godaddy.com//MEIwQDA+MDwwOjAJBgUrDgMCGgUABBQdI2+OBkuXH93foRUj4a7lAr4rGwQUOpqFBxBnKLbv9r0FQW4gwZTaD94CAQc= | |
| hxxp://clients1.google.com/ocsp/MEkwRzBFMEMwQTAJBgUrDgMCGgUABBTy4Gr5hYodjXCbSRkjeqm1Gih+ZAQUSt0GFhu89mi1dvWBtrtiGrpagS8CCGZimYWX7CS+ | |
| hxxp://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab | |
| hxxp://crl.microsoft.com/pki/crl/products/MicCodSigPCA_08-31-2010.crl | |
| hxxp://g.symcd.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSxtDkXkBa3l3lQEfFgudSiPNvt7gQUAPkqw0GRtsnCuD5V8sCXEROgByACEAEAISWIsPpZp3fvBXtmJ98= | |
| hxxp://clients1.google.com/ocsp/MEkwRzBFMEMwQTAJBgUrDgMCGgUABBTy4Gr5hYodjXCbSRkjeqm1Gih+ZAQUSt0GFhu89mi1dvWBtrtiGrpagS8CCDTS8DvN7pMs | |
| hxxp://g2.symcb.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBR6EHhJ4XUaQA4N26wwyKpLEnXRrAQULNVQQZcVi/CPNmFbSvtr2ZnJM5ICEG6KkOvP8ESKcg0IBdCCpUQ= | |
| hxxp://ocsp.comodoca4.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBReAhtobFzTvhaRmVeJ38QUchY9AwQUu69+Aj36pvE8hI6t7jiY7NkyMtQCEAui0B3Ly3d26KxlCXrBJUE= | |
| hxxp://vassg142.ocsp.omniroot.com/MFUwUzBRME8wTTAJBgUrDgMCGgUABBTkLVLomfJQOu5CFIgPOR73ljBRHAQU+L36r3N3xscb+UtNEafRM6+vchECFEOZrYpYgDwxeWGj/HetMtWiXvU/ | |
| hxxp://www.csyt2.com/new.htm | |
| hxxp://pki.google.com/GIAG2.crl | |
| www.hugedomains.com | |
| secure.statcounter.com | |
| ssl.google-analytics.com | |
| static.hugedomains.com | |
| c.statcounter.com |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET POLICY Unsupported/Fake Windows NT Version 5.0
Traffic
GET /new.htm HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0E; .NET4.0C)
Host: VVV.csyt2.com
Connection: Keep-Alive
HTTP/1.1 302 Found
Cache-Control: private
Content-Type: text/html; charset=utf-8
Date: Sun, 02 Jul 2017 13:08:42 GMT
Location: hXXps://VVV.hugedomains.com/domain_profile.cfm?d=csyt2&e=com
Server: Microsoft-IIS/8.5
X-Powered-By: ASP.NET
Content-Length: 181
Connection: keep-alive<html><head><title>Object moved</title></he
ad><body>..<h2>Object moved to <a href="hXXps://VVV.
hugedomains.com/domain_profile.cfm?d=csyt2&e=com">here</a>
;.</h2>..</body></html>..HTTP/1.1 302 Found..Cache-C
ontrol: private..Content-Type: text/html; charset=utf-8..Date: Sun, 02
Jul 2017 13:08:42 GMT..Location: hXXps://VVV.hugedomains.com/domain_p
rofile.cfm?d=csyt2&e=com..Server: Microsoft-IIS/8.5..X-Powered-By: ASP
.NET..Content-Length: 181..Connection: keep-alive..<html><hea
d><title>Object moved</title></head><body>.
.<h2>Object moved to <a href="hXXps://VVV.hugedomains.com/dom
ain_profile.cfm?d=csyt2&e=com">here</a>.</h2>..<
/body></html>......
GET /update.edb HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: VVV.csyt2.com
Cache-Control: no-cache
HTTP/1.1 302 Found
Cache-Control: private
Content-Type: text/html; charset=utf-8
Date: Sun, 02 Jul 2017 13:09:03 GMT
Location: hXXps://VVV.hugedomains.com/domain_profile.cfm?d=csyt2&e=com
Server: Microsoft-IIS/8.5
X-Powered-By: ASP.NET
Content-Length: 181
Connection: keep-alive<html><head><title>Object moved</title></he
ad><body>..<h2>Object moved to <a href="hXXps://VVV.
hugedomains.com/domain_profile.cfm?d=csyt2&e=com">here</a>
;.</h2>..</body></html>..HTTP/1.1 302 Found..Cache-C
ontrol: private..Content-Type: text/html; charset=utf-8..Date: Sun, 02
Jul 2017 13:09:03 GMT..Location: hXXps://VVV.hugedomains.com/domain_p
rofile.cfm?d=csyt2&e=com..Server: Microsoft-IIS/8.5..X-Powered-By: ASP
.NET..Content-Length: 181..Connection: keep-alive..<html><hea
d><title>Object moved</title></head><body>.
.<h2>Object moved to <a href="hXXps://VVV.hugedomains.com/dom
ain_profile.cfm?d=csyt2&e=com">here</a>.</h2>..<
/body></html>....
GET /ocsp/MEkwRzBFMEMwQTAJBgUrDgMCGgUABBTy4Gr5hYodjXCbSRkjeqm1Gih+ZAQUSt0GFhu89mi1dvWBtrtiGrpagS8CCGZimYWX7CS+ HTTP/1.1
Cache-Control: max-age = 345600
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: clients1.google.com
HTTP/1.1 200 OK
Content-Type: application/ocsp-response
Date: Thu, 29 Jun 2017 18:23:28 GMT
Expires: Mon, 03 Jul 2017 18:23:28 GMT
Server: ocsp_responder
Content-Length: 463
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Cache-Control: public, max-age=345600
Age: 2404080..........0..... .....0......0...0......J......h.v....b..Z./..2017062
9130744Z0k0i0A0... ..........j.....p.I.#z...(~d..J......h.v....b..Z./.
.fb....$.....20170629130744Z....20170706130744Z0...*.H..............&l
t;I.......j..9E.-Z]-8..^.....cmi...}i_..N9-`......N........D...MDf....
.."..\..Y.F]N^.[. }..Q8_.:. <..}.I....... ..MX.@d.?K\"XmU...7M`....
.q.%.O....k...GU..q.#..5a.D.../e...(J..,!.M.....".......t...!.....w...
.O.z..hz=..{M.LOx..,..| ..Oog~..CO....<.Vn..h.F.zHTTP/1.1 200 OK..C
ontent-Type: application/ocsp-response..Date: Thu, 29 Jun 2017 18:23:2
8 GMT..Expires: Mon, 03 Jul 2017 18:23:28 GMT..Server: ocsp_responder.
.Content-Length: 463..X-XSS-Protection: 1; mode=block..X-Frame-Options
: SAMEORIGIN..Cache-Control: public, max-age=345600..Age: 240408..0...
.......0..... .....0......0...0......J......h.v....b..Z./..20170629130
744Z0k0i0A0... ..........j.....p.I.#z...(~d..J......h.v....b..Z./..fb.
...$.....20170629130744Z....20170706130744Z0...*.H..............<I.
......j..9E.-Z]-8..^.....cmi...}i_..N9-`......N........D...MDf......".
.\..Y.F]N^.[. }..Q8_.:. <..}.I....... ..MX.@d.?K\"XmU...7M`.....q.%
.O....k...GU..q.#..5a.D.../e...(J..,!.M.....".......t...!.....w....O.z
..hz=..{M.LOx..,..| ..Oog~..CO....<.Vn..h.F.z..
GET /msdownload/update/v3/static/trustedr/en/authrootstl.cab HTTP/1.1
Cache-Control: max-age = 86392
Connection: Keep-Alive
Accept: */*
If-Modified-Since: Fri, 16 Sep 2016 21:16:59 GMT
If-None-Match: "8017f9a85f10d21:0"
User-Agent: Microsoft-CryptoAPI/6.1
Host: VVV.download.windowsupdate.com
HTTP/1.1 200 OK
Cache-Control: max-age=604800
Content-Type: application/vnd.ms-cab-compressed
Last-Modified: Tue, 13 Jun 2017 19:04:53 GMT
Accept-Ranges: bytes
ETag: "80f83df077e4d21:0"
Server: Microsoft-IIS/8.5
X-Powered-By: ASP.NET
Content-Length: 52967
Date: Sun, 02 Jul 2017 13:09:24 GMT
Connection: keep-alive
X-CCC: UA
X-CID: 2MSCF............,...................I..................J.` .authroot.s
tl.^R.Y.6..CK...8...........].y.Q..!Jv..%k.....!..DH...B.KBWE.(.f.RQ*.
..f...}'.....x.:.{f...|.s.q..CF.......0....{%i......P.F.yNz:A..L..1..3
...........IG.....4=....~."|..s.|.xuT..._.*.....e.h,....ozs..*.!TmS..A
q... |,.....V..xV....^....FE(.x...N..h...b....y...j.!....7..h. ..@.(V.
.....8..`-..#=.jq'.e...|..X...@...{..rj.d.....?n3.L.......S.......:.O.
.."k.!o......`.l.B 1.....#].....k6.........B.......!P$.A..<..?zk...
.~..P)A0tu....x..-X..E..,a.7,xN..eed.3..L..XT......IG.w_.Y....E....~k.
.X...T.V.g7d.....#.&~.f.O....Dh...x0..J...0..u.dF..P.!..d...%x<!...
....@,...0..3..-.....q.....X.e....A...z.'..2.<.m.f...I.9.z..a.6vo..
...P..U7...-.0.Q..<zd!V....=.'.....2H;..5.7.%5PsD.#.....ht%......f
..s.Dp..Lklx%[.!c...I.<...f.<..e.k`......^.......X..?Z...?......
?..I}..5V.v .q.c.9j..Y..J..0U.t./%..Jd @.W.u......U.".)C(........T.4.y
..J.57*^HlY....O|..~\.J]..]e...?..x2c..6.....i.=?x.....N..-X..f"^@'...
.-v..v...7j.Y1.5._v.....*S9.."........%E<E...;p.}........0..P....g.
.@.]E.3........K....K.4V..Q.-,.../.........:.A....Ng,.........BFef.[..
. ..."*...^...L._#:,7..6:.z..!a............E.r>......A....#..c.....
rS.......7.D..JdR.`6.|...>.0....Wf..n..^..8x.4..........-.3y,3.C.(.
...9f...iNK....q....sUq....c...c.....*K.8"..D...<..0............*x,
$x....a....]..p..t.M....6F..u.....p.r.kf...Z......h~.B3...[.....Hc...K
.....I.....%F..:.....N....U..eU........ e. k....3(S..h....1..r..Z.Y...
.....A.i..Z....[%J.....=2"v].....L.P..!........PC*.........j 8.~.)<<< skipped >>>
GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBSxtDkXkBa3l3lQEfFgudSiPNvt7gQUAPkqw0GRtsnCuD5V8sCXEROgByACEAEAISWIsPpZp3fvBXtmJ98= HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: g.symcd.com
HTTP/1.1 200 OK
Server: nginx/1.10.2
Content-Type: application/ocsp-response
Content-Length: 1390
content-transfer-encoding: binary
Cache-Control: max-age=421494, public, no-transform, must-revalidate
Last-Modified: Fri, 30 Jun 2017 10:12:57 GMT
Expires: Fri, 7 Jul 2017 10:12:57 GMT
Date: Sun, 02 Jul 2017 13:10:04 GMT
Connection: keep-alive0..j......c0.._.. .....0.....P0..L0......V.T'S...q..."...zr.*..2017063
0101257Z0s0q0I0... ..........9.....yP..`...<.......*.A.....>U...
.... ....!%...Y.w..{f'.....20170630101257Z....20170707101257Z0...*.H..
...............-.SZ-u.k..aukm..\..].%Z..<.}........$C....T...8YT.`&
lt;.`...#..#,1f....G...$^=.......p;MmlW|........2......B.U.~.%.wK.....
.~...1v..x..ui..r.X...~...,..C..N....z*..h.. =.EJ....a4P......ft.hIb..
P.;.Az..!.C.<hZ.....[4C......l2.p...e..T>....k......'.mk.ir..b..
...0...0...0..s............ ...y..^..g0...*.H........0B1.0...U....US1.
0...U....GeoTrust Inc.1.0...U....GeoTrust Global CA0...161208112535Z..
171214112535Z02100...U...'GeoTrust Global CA TGV OCSP Responder 50.."0
...*.H.............0...............S....!....,.t.?....d...M@.._.=.S..,
."......Gdv._c..D1..N'E.:.....a2.......{/rD. .c.2..P...!.....Xn..}....
{{.zI9.Y....../.....;.......fu..,...B._o..B..g....o........?Y\.?...y.H
*..]yi.....3.......F.6.....Q.........{B..19..Kz...\z...P..._...-!.....
'.Ym........0..0...U.#..0....z.h.....d..}.}e...N0... .....0......0...U
.%..0... .......0...U...........0...U.......0.0"..U....0...0.1.0...U..
..TGV-OFF-570...*.H..............md.....yV{......y:5..@l#..5.......o..
X....,r}......i..3..o.e...e5..@..H/Q..;.vd..?.j.m....../hv..A.......g.
......a.....G..\.'*.b..>.....L.Y.To<.@>...&1..9.w.....N*Au.e.
....b..K...PO47.J.....{.C\....G..0/.a.Eo.`z.<;IA... #.''.CG..K@7z.
.7.\_..'.]q.f._.WN....<<< skipped >>>
GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBReAhtobFzTvhaRmVeJ38QUchY9AwQUu69+Aj36pvE8hI6t7jiY7NkyMtQCEAui0B3Ly3d26KxlCXrBJUE= HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ocsp.comodoca4.com
HTTP/1.1 200 OK
Date: Sun, 02 Jul 2017 13:09:50 GMT
Server: Apache
Last-Modified: Sun, 02 Jul 2017 03:09:48 GMT
Expires: Sun, 09 Jul 2017 03:09:48 GMT
ETag: 1705D63FE529D656F5F8656F9DD9B4401C33112F
Cache-Control: max-age=568197,public,no-transform,must-revalidate
X-OCSP-Reponder-ID: rmdccaocsp22
Content-Length: 727
Connection: close
Content-Type: application/ocsp-response0..........0..... .....0......0...0........~.=...<....8...22...2017
0702030948Z0s0q0I0... ........^..hl\.....W....r.=.....~.=...<....8.
..22.........wv..e.z.%A....20170702030948Z....20170709030948Z0...*.H..
............E.e....Z......{..{:N....2.yJ..7M......^...h..p.S...I.....R
~...o..@............|2c...?.......X./.i.....2........0.L}W...m....q..}
.........S.em..&......?y..-...T?U.... .I.3?....6...7.x(..4..L..[H.d.;d
[;..z.~..4/i...2g.5..n..o........A..t-.^.E'VR...A!..u.D....~.....m!O..
.EJ}.ax...i..{.{.m.VD.R#..A3J......H..E%O...`.(.l,EFQ..hI.pc.s....9?..
..%....../!j:.......8.%.^...c[.k|......0.".4.T..../[.-.F.$..S.._p..w"&
....*...4.U)Tdr.R.h_<@ .......@v...b...n.&.....i...<Qb)c5c.h.8"O
...E":Z...G)1LL....n.]U.......9...y/?m...
GET /GIAG2.crl HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: pki.google.com
HTTP/1.1 200 OK
Accept-Ranges: none
Vary: Accept-Encoding
Content-Type: application/pkix-crl
Date: Sun, 02 Jul 2017 12:20:49 GMT
Expires: Sun, 02 Jul 2017 13:20:49 GMT
Last-Modified: Sun, 02 Jul 2017 02:15:00 GMT
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block
Cache-Control: public, max-age=3600
Age: 2964
Transfer-Encoding: chunked299..0...0..}...0...*.H........0I1.0...U....US1.0...U....Google Inc1%0
#..U....Google Internet Authority G2..170702010003Z..170712010003Z0..0
'..vK....Q...170113141858Z0.0...U.......0'..Am..&.....170701001054Z0.0
...U.......0'..;w._......170510105507Z0.0...U.......0'...T...y.K..1704
12085317Z0.0...U.......0'..1.3..*....160915202213Z0.0...U........00.0.
..U.#..0...J......h.v....b..Z./0...U.......(0...*.H...................
. 6....L..."..k..0.>8..r.m....j..DI2.......u.g;J G..h%..n2.n...E3..
.v I.....,..2Ju.......x3..6j.C}%.i.!.../..#?..J.*V...f...T....<XCn.
.Av.-R..f.`K.q..\w;..p.J.O..OW........H...vm%....E......nT....s.......
L.v,1.8....E?..A.4B...W......n.5.p.......Gpo<..0..HTTP/1.1 200 OK.
.Accept-Ranges: none..Vary: Accept-Encoding..Content-Type: application
/pkix-crl..Date: Sun, 02 Jul 2017 12:20:49 GMT..Expires: Sun, 02 Jul 2
017 13:20:49 GMT..Last-Modified: Sun, 02 Jul 2017 02:15:00 GMT..X-Cont
ent-Type-Options: nosniff..Server: sffe..X-XSS-Protection: 1; mode=blo
ck..Cache-Control: public, max-age=3600..Age: 2964..Transfer-Encoding:
chunked..299..0...0..}...0...*.H........0I1.0...U....US1.0...U....Goo
gle Inc1%0#..U....Google Internet Authority G2..170702010003Z..1707120
10003Z0..0'..vK....Q...170113141858Z0.0...U.......0'..Am..&.....170701
001054Z0.0...U.......0'..;w._......170510105507Z0.0...U.......0'...T..
.y.K..170412085317Z0.0...U.......0'..1.3..*....160915202213Z0.0...U...
.....00.0...U.#..0...J......h.v....b..Z./0...U.......(0...*.H.........
........... 6....L..."..k..0.>8..r.m....j..DI2.......u.g;J G..h<<< skipped >>>
GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBR8sWZUnKvbRO5iJhat9GV793rVlAQUrb2YejS0Jvf6xCZU7wO94CTLVBoCECdm7lbrSfOOq9dwovyE3iI= HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ocsp.usertrust.com
HTTP/1.1 200 OK
Date: Sun, 02 Jul 2017 13:09:45 GMT
Server: Apache
Last-Modified: Sun, 02 Jul 2017 03:09:48 GMT
Expires: Sun, 09 Jul 2017 03:09:48 GMT
ETag: CDDC764C534B754D5798ED69990AE74C5C0C4C02
Cache-Control: max-age=568202,public,no-transform,must-revalidate
X-OCSP-Reponder-ID: rmdccaocsp22
Content-Length: 471
Connection: close
Content-Type: application/ocsp-response0..........0..... .....0......0...0.........z4.&...&T....$.T...2017070
2030948Z0s0q0I0... ........|.fT...D.b&...e{.z.......z4.&...&T....$.T..
.'f.V.I....p...."....20170702030948Z....20170709030948Z0...*.H........
......!/....#...?......(.i..i.[._h.ei.xK.L...._..ja1..w.M9......[.....
!.8.2. "`....m..3,...W..D..]..:..;g...U..w.......D. .&......{.?..|.vm.
..}.....P..;..$.n..."W.......*.,...i..I'.(.RR..R..n...'.....2.\.......
>..5...g......S;.R.b;i..2../.....z..}....{..2.....k..
GET /MFUwUzBRME8wTTAJBgUrDgMCGgUABBTkLVLomfJQOu5CFIgPOR73ljBRHAQU+L36r3N3xscb+UtNEafRM6+vchECFEOZrYpYgDwxeWGj/HetMtWiXvU/ HTTP/1.1
Cache-Control: max-age = 339923
Connection: Keep-Alive
Accept: */*
If-Modified-Since: Thu, 13 Oct 2016 09:41:21 GMT
If-None-Match: "c06e9a4e33eec9dd813b8faff15397229f914d2a"
User-Agent: Microsoft-CryptoAPI/6.1
Host: vassg142.ocsp.omniroot.com
HTTP/1.1 200 OK
Server: nginx
Content-Type: application/ocsp-response
Content-Length: 1746
Last-Modified: Sat, 01 Jul 2017 18:54:32 GMT
ETag: "de69e4ddf81f9ae319e0bb9809ee3f24a425ae5d"
Cache-Control: public, no-transform, must-revalidate, max-age=274802
Expires: Wed, 05 Jul 2017 17:30:12 GMT
Date: Sun, 02 Jul 2017 13:10:10 GMT
Connection: keep-alive0..........0..... .....0......0...0.......d._t.a...(..fx..r....2017070
1185432Z0w0u0M0... .........-R...P:.B...9...0Q.......sw....KM...3..r..
.C...X.<1ya..w.2..^.?....20170701185432Z....20170705185432Z0...*.H.
.............<.8.%...f#`.L<K..!..Yz......j.4......I.1.Z.Eia8.R..
.Z.J^.. ....{.....r.Ib....1.1..KC l.....'.WnL....{?.u..h/../}.3'|.}]..
.....)}..].@.]N.H*4....y....o...A$.....X.......L...V'.....w.Og.].e...8
....%3\...@n....I;~.!......I@%7......S.....U*....9$...v.5...<."....
.0...0...0..........&.L..J..T...vP..yV..0...*.H........0..1.0...U....N
L1.0...U....Amsterdam1%0#..U....Verizon Enterprise Solutions1.0...U...
.Cybertrust1.0,..U...%Verizon Akamai SureServer CA G14-SHA20...1703102
13626Z..180309213625Z0..1.0...U....NL1.0...U....Amsterdam1%0#..U....Ve
rizon Enterprise Solutions1.0...U....Cybertrust1%0#..U....vassg142 OCS
P Responder 20170.."0...*.H.............0..........\..K.......:..K&!..
.!`D#'2~mL...<..E`.:Y.I..w.....P..)..o..><^-7.h.zL......3..".
...T...-s.g........zUY5q....u...D........(....C.XmF=.r...8h....I.....[
...P. ...;..c...0.'x..F..h...&<Q.vO.b2.pm.y..J.P"...H....A....T....
..._.dc.F-..W....Z...).=.Y..n2...N..E........H0..D0... .....0......0L.
.U. .E0C0A.. .....>..0402.. ........&hXXps://secure.omniroot.com/re
pository0~.. ........r0p06.. .....0..*hXXps://cacert.a.omniroot.com/va
ssg142.crt06.. .....0..*hXXps://cacert.a.omniroot.com/vassg142.der0...
U...........0...U.%..0... .......0...U.#..0.......sw....KM...3..r.0...
U.......d._t.a...(..fx..r..0...*.H..................6..dez....$...<<< skipped >>>
GET //MEIwQDA+MDwwOjAJBgUrDgMCGgUABBQdI2+OBkuXH93foRUj4a7lAr4rGwQUOpqFBxBnKLbv9r0FQW4gwZTaD94CAQc= HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ocsp.godaddy.com
HTTP/1.1 200 OK
Date: Sun, 02 Jul 2017 13:11:02 GMT
Server: Apache
Content-Transfer-Encoding: Binary
Cache-Control: max-age=120498, public, no-transform, must-revalidate
Last-Modified: Sun, 02 Jul 2017 12:25:02 GMT
Expires: Tue, 04 Jul 2017 00:25:02 GMT
ETag: "79e06e91bb616ecca6f327d7d88b40fc72515a29"
P3P: CP="IDC DSP COR LAW CUR ADM DEV TAI PSA PSD IVA IVD HIS OUR SAM PUB LEG UNI COM NAV STA"
Content-Length: 1730
Connection: close
Content-Type: application/ocsp-response0..........0..... .....0......0...0.....0..1.0...U....US1.0...U....Ari
zona1.0...U....Scottsdale1.0...U....GoDaddy.com, Inc.100...U...'Go Dad
dy Root Validation Authority - G2..20170702122502Z0d0b0:0... .........
#o..K......#..... ...:....g(.....An ............20170702122502Z....201
70704002502Z0...*.H.............1F.0O.=........q..b..@....jB.....Mt:.2
.Z..Q.T4#.".E ...'%..W....]...I.e...;..z...N..6..]....[V..............
.... ..Iq"..zM........$.^.....C..R.u5c...../.....D..X......:Zw...l....
.H.c.m....e...R.|..A.'K...uV.:......_-.R.......}..4....N)....w...Ne...
.Y.....g....0...0..~0..f........T|....70...*.H........0..1.0...U....US
1.0...U....Arizona1.0...U....Scottsdale1.0...U....GoDaddy.com, Inc.110
/..U...(Go Daddy Root Certificate Authority - G20...161213070000Z..171
213070000Z0..1.0...U....US1.0...U....Arizona1.0...U....Scottsdale1.0..
.U....GoDaddy.com, Inc.100...U...'Go Daddy Root Validation Authority -
G20.."0...*.H.............0.............}...@.H..........j.b.2.c....'
eSA.....6""2.hf.m.m9........_N."gV..{.J"{..0f.W$.Xr....|U.F.!.K.0 .(p.
.....9.I......c.c\.9.xt.v.UN...%....,R....ZJ......rz.Z..p...ru.6.....0
..t....*...T.W.....?...X...( ..z.[. .A... z.[>-.y>...nvU...g.wU.
....... Fh.6F...}.........0..0...U.......0.0...U...........0...U.%..0.
.. .......0...U........J!~...}....^].....0... .....0......0@..U...9070
5.3.1./hXXp://crl.godaddy.com/repository/gdroot-g2.crl0J..U. .C0A0?..`
.H...m....000... ........"hXXp://crl.godaddy.com/repository/0...*.H...
..........=......|Q.y.kI$...T@.ff.m...1......\...10..T....e...F...<<< skipped >>>
GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBR8sWZUnKvbRO5iJhat9GV793rVlAQUrb2YejS0Jvf6xCZU7wO94CTLVBoCECdm7lbrSfOOq9dwovyE3iI= HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ocsp.usertrust.com
HTTP/1.1 200 OK
Date: Sun, 02 Jul 2017 13:09:45 GMT
Server: Apache
Last-Modified: Sun, 02 Jul 2017 03:09:48 GMT
Expires: Sun, 09 Jul 2017 03:09:48 GMT
ETag: CDDC764C534B754D5798ED69990AE74C5C0C4C02
Cache-Control: max-age=568202,public,no-transform,must-revalidate
X-OCSP-Reponder-ID: rmdccaocsp22
Content-Length: 471
Connection: close
Content-Type: application/ocsp-response0..........0..... .....0......0...0.........z4.&...&T....$.T...2017070
2030948Z0s0q0I0... ........|.fT...D.b&...e{.z.......z4.&...&T....$.T..
.'f.V.I....p...."....20170702030948Z....20170709030948Z0...*.H........
......!/....#...?......(.i..i.[._h.ei.xK.L...._..ja1..w.M9......[.....
!.8.2. "`....m..3,...W..D..]..:..;g...U..w.......D. .&......{.?..|.vm.
..}.....P..;..$.n..."W.......*.,...i..I'.(.RR..R..n...'.....2.\.......
>..5...g......S;.R.b;i..2../.....z..}....{..2.....k..
GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBReAhtobFzTvhaRmVeJ38QUchY9AwQUu69+Aj36pvE8hI6t7jiY7NkyMtQCEAui0B3Ly3d26KxlCXrBJUE= HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ocsp.comodoca4.com
HTTP/1.1 200 OK
Date: Sun, 02 Jul 2017 13:09:50 GMT
Server: Apache
Last-Modified: Sun, 02 Jul 2017 03:09:48 GMT
Expires: Sun, 09 Jul 2017 03:09:48 GMT
ETag: 1705D63FE529D656F5F8656F9DD9B4401C33112F
Cache-Control: max-age=568197,public,no-transform,must-revalidate
X-OCSP-Reponder-ID: rmdccaocsp22
Content-Length: 727
Connection: close
Content-Type: application/ocsp-response0..........0..... .....0......0...0........~.=...<....8...22...2017
0702030948Z0s0q0I0... ........^..hl\.....W....r.=.....~.=...<....8.
..22.........wv..e.z.%A....20170702030948Z....20170709030948Z0...*.H..
............E.e....Z......{..{:N....2.yJ..7M......^...h..p.S...I.....R
~...o..@............|2c...?.......X./.i.....2........0.L}W...m....q..}
.........S.em..&......?y..-...T?U.... .I.3?....6...7.x(..4..L..[H.d.;d
[;..z.~..4/i...2g.5..n..o........A..t-.^.E'VR...A!..u.D....~.....m!O..
.EJ}.ax...i..{.{.m.VD.R#..A3J......H..E%O...`.(.l,EFQ..hI.pc.s....9?..
..%....../!j:.......8.%.^...c[.k|......0.".4.T..../[.-.F.$..S.._p..w"&
....*...4.U)Tdr.R.h_<@ .......@v...b...n.&.....i...<Qb)c5c.h.8"O
...E":Z...G)1LL....n.]U.......9...y/?m...
GET /ocsp/MEkwRzBFMEMwQTAJBgUrDgMCGgUABBTy4Gr5hYodjXCbSRkjeqm1Gih+ZAQUSt0GFhu89mi1dvWBtrtiGrpagS8CCDTS8DvN7pMs HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: clients1.google.com
HTTP/1.1 200 OK
Content-Type: application/ocsp-response
Date: Fri, 30 Jun 2017 22:40:45 GMT
Expires: Tue, 04 Jul 2017 22:40:45 GMT
Server: ocsp_responder
Content-Length: 463
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Cache-Control: public, max-age=345600
Age: 1385640..........0..... .....0......0...0......J......h.v....b..Z./..2017063
0132843Z0k0i0A0... ..........j.....p.I.#z...(~d..J......h.v....b..Z./.
.4..;...,....20170630132843Z....20170707132843Z0...*.H..............L.
{...b.^8l ..k4......r/..8...l.....vD...T....|?4@ v.=.\[...z...I..pc.?&
lt;......|....(.]&..B.....b..\ .U).)..h.jMx._...n\z..Y....9..'Y....D,.
#..].....P.&..C...y_.q].... .. a..........R......9|...P....C.S....x^L
.Q.XY........o.8....52...._.zA:ak..;..H......KHTTP/1.1 200 OK..Content
-Type: application/ocsp-response..Date: Fri, 30 Jun 2017 22:40:45 GMT.
.Expires: Tue, 04 Jul 2017 22:40:45 GMT..Server: ocsp_responder..Conte
nt-Length: 463..X-XSS-Protection: 1; mode=block..X-Frame-Options: SAME
ORIGIN..Cache-Control: public, max-age=345600..Age: 138564..0.........
.0..... .....0......0...0......J......h.v....b..Z./..20170630132843Z0k
0i0A0... ..........j.....p.I.#z...(~d..J......h.v....b..Z./..4..;...,.
...20170630132843Z....20170707132843Z0...*.H..............L.{...b.^8l
..k4......r/..8...l.....vD...T....|?4@ v.=.\[...z...I..pc.?<......|
....(.]&..B.....b..\ .U).)..h.jMx._...n\z..Y....9..'Y....D,.#..].....P
.&..C...y_.q].... .. a..........R......9|...P....C.S....x^L .Q.XY.....
...o.8....52...._.zA:ak..;..H......K..
GET //MEQwQjBAMD4wPDAJBgUrDgMCGgUABBTkIInKBAzXkF0Qh0pel3lfHJ9GPAQU0sSw0pHUTBFxs2HLPaH+3ahq1OMCAxvnFQ== HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: ocsp.godaddy.com
HTTP/1.1 200 OK
Date: Sun, 02 Jul 2017 13:09:47 GMT
Server: Apache
Content-Transfer-Encoding: Binary
Cache-Control: max-age=121443, public, no-transform, must-revalidate
Last-Modified: Sun, 02 Jul 2017 12:40:22 GMT
Expires: Tue, 04 Jul 2017 00:40:22 GMT
ETag: "84b033ad3c6b0e6279edd47f4ee10c1f1c8c5b57"
P3P: CP="IDC DSP COR LAW CUR ADM DEV TAI PSA PSD IVA IVD HIS OUR SAM PUB LEG UNI COM NAV STA"
Content-Length: 1697
Connection: close
Content-Type: application/ocsp-response0..........0..... .....0......0...0......0..1.0...U....US1.0...U....Ar
izona1.0...U....Scottsdale1.0...U....GoDaddy.com, Inc.100...U...'Go Da
ddy Root Validation Authority - G1..20170702124022Z0f0d0<0... .....
.... ......]..J^.y_..F<........L.q.a.=....j...........2017070212402
2Z....20170704004022Z0...*.H...............u.1d..&.1.j.v.....g.X@d8...
h: ..!.~y..../2..<...2:...C.).,5>.........7..&...'Ue6.'....Q...d
..7;.....U.1N`>oF`.....-.....}........8$j...(..=Zy.u.......Y..@....
...Y.=....{. ....1.U..${B9....y.).,.o.....8N4..z ..m.....m..P*y..../.:
........JV.*l.L.. ...].R4....b0..^0..Z0..B.......1g....r.0...*.H......
..0c1.0...U....US1!0...U....The Go Daddy Group, Inc.110/..U...(Go Dadd
y Class 2 Certification Authority0...161213070000Z..211213070000Z0..1.
0...U....US1.0...U....Arizona1.0...U....Scottsdale1.0...U....GoDaddy.c
om, Inc.100...U...'Go Daddy Root Validation Authority - G10.."0...*.H.
............0.............}...@.H..........j.b.2.c....'eSA.....6""2.hf
.m.m9........_N."gV..{.J"{..0f.W$.Xr....|U.F.!.K.0 .(p......9.I......c
.c\.9.xt.v.UN...%....,R....ZJ......rz.Z..p...ru.6.....0..t....*...T.W.
....?...X...( ..z.[. .A... z.[>-.y>...nvU...g.wU........ Fh.6F..
.}.........0..0...U.......0.0...U...........0...U.%..0... .......0...U
........J!~...}....^].....0... .....0......0=..U...60402.0...,hXXp://c
rl.godaddy.com/repository/gdroot.crl0J..U. .C0A0?..`.H...m....000... .
......."hXXp://crl.godaddy.com/repository/0...*.H...............f...gb
.dI..F.72.$.......?/.....5.9-F.=...c....c..Wg.U......j0....A..[O.A<<< skipped >>>
GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBR6EHhJ4XUaQA4N26wwyKpLEnXRrAQULNVQQZcVi/CPNmFbSvtr2ZnJM5ICEG6KkOvP8ESKcg0IBdCCpUQ= HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: g2.symcb.com
HTTP/1.1 200 OK
Server: nginx/1.10.2
Content-Type: application/ocsp-response
Content-Length: 1427
content-transfer-encoding: binary
Cache-Control: max-age=507241, public, no-transform, must-revalidate
Last-Modified: Sat, 1 Jul 2017 10:02:23 GMT
Expires: Sat, 8 Jul 2017 10:02:23 GMT
Date: Sun, 02 Jul 2017 13:09:29 GMT
Connection: keep-alive0..........0..... .....0.....u0..q0.........-b.Ce.....>...Q....2017
0701100223Z0s0q0I0... ........z.xI.u.@....0..K.u....,.PA.....6a[J.k...
3...n.....D.r......D....20170701100223Z....20170708100223Z0...*.H.....
........).....=| @....o3....q..jd4...K.:v..h.|.I...&.. . ......FK. ...
q[n&I..r...%...b.. r/..m......1..#.......2v)u........O...*.......h2...
...j}..N...RR.Q.JKY...V.&...h.M......SRt.0...B`X........NE.sA. .x.*h;.
.....6..../....f...i3.s...(,..E..%...[.U._.....Ze.Q8.2....0...0...0...
.......pP.3....I....m..0...*.H........0X1.0...U....US1.0...U....GeoTru
st Inc.110/..U...(GeoTrust Primary Certification Authority0...16112200
0000Z..171214235959Z0d1.0...U....US1.0...U....GeoTrust Inc.1=0;..U...4
GeoTrust Primary CA OCSP-TGV Responder Certificate 50.."0...*.H.......
......0.........9....o%uu!p26[......~..$.I...p....#.k..?.I_.-"...~ROB.
MFG......B...^.^ ...D......".d.U.......{#..K'..&..u.&...q..Y.(..%s..R.
.o..M../.exn.....V...?..>$........~<X.i\...,........6i.......l.E
..e...\....tW..;.`.o.. ...I..}......`...........x..3.,..S..fY.....o...
...j0h0...U.%..0... .......0... .....0......0...U.......0.0...U.......
....0"..U....0...0.1.0...U....TGV-OFF-520...*.H..............>H....
....1.N......#...E.......:..- ......o..l._aa...K`7.<YXi..'......y..
.O..{.....z.......L..ee...........W.a.;.2.de.....A.....S..LAzB.H...I..
.*.7...t..CQ.._ ....Y.F^a4..n.*...w...y..d04.DpQ.........E..k.2.I.[...
..D.G....[D.{c.....Rw.. ..... W.........-...<<< skipped >>>
GET /pki/crl/products/MicCodSigPCA_08-31-2010.crl HTTP/1.1
Cache-Control: max-age = 900
Connection: Keep-Alive
Accept: */*
If-Modified-Since: Tue, 29 Oct 2013 05:02:50 GMT
If-None-Match: "b8b5df1d64d4ce1:0"
User-Agent: Microsoft-CryptoAPI/6.1
Host: crl.microsoft.com
HTTP/1.1 200 OK
Content-Length: 554
Content-Type: application/pkix-crl
Last-Modified: Thu, 15 Jun 2017 00:43:48 GMT
ETag: 0x8D4B38795FC4CDC
Server: Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
x-ms-request-id: 9576bca8-0001-0047-2479-e5981b000000
x-ms-version: 2009-09-19
x-ms-lease-status: unlocked
x-ms-blob-type: BlockBlob
Date: Sun, 02 Jul 2017 13:10:05 GMT
Connection: keep-alive0..&0......0...*.H........0y1.0...U....US1.0...U....Washington1.0...U.
...Redmond1.0...U....Microsoft Corporation1#0!..U....Microsoft Code Si
gning PCA..170512163339Z..170811045339Z.a0_0...U.#..0..........X..7.3.
..L...0... .....7.........0...U......d0... .....7......170810164339Z0.
..*.H................."*....N...........D...........A..v.@?.H5...O{D".
-.B.......gO.{..O}.._.....M....A.mI.u.;sPS.....?jj.=.~]z.A.fJ...M*|..!
<......>....|.&...j.Z.T[/s...K0<.;...".2.)..X9.....$..O...Ot:
V.:..9.W...|...C.A.....,dy..].bg.&I.../U..B........rr.....*......P.t.^
..FHTTP/1.1 200 OK..Content-Length: 554..Content-Type: application/pki
x-crl..Last-Modified: Thu, 15 Jun 2017 00:43:48 GMT..ETag: 0x8D4B38795
FC4CDC..Server: Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0..x-ms-req
uest-id: 9576bca8-0001-0047-2479-e5981b000000..x-ms-version: 2009-09-1
9..x-ms-lease-status: unlocked..x-ms-blob-type: BlockBlob..Date: Sun,
02 Jul 2017 13:10:05 GMT..Connection: keep-alive..0..&0......0...*.H..
......0y1.0...U....US1.0...U....Washington1.0...U....Redmond1.0...U...
.Microsoft Corporation1#0!..U....Microsoft Code Signing PCA..170512163
339Z..170811045339Z.a0_0...U.#..0..........X..7.3...L...0... .....7...
......0...U......d0... .....7......170810164339Z0...*.H...............
.."*....N...........D...........A..v.@?.H5...O{D".-.B.......gO.{..O}..
_.....M....A.mI.u.;sPS.....?jj.=.~]z.A.fJ...M*|..!<......>....|.
&...j.Z.T[/s...K0<.;...".2.)..X9.....$..O...Ot:V.:..9.W...|...C.A..
...,dy..].bg.&I.../U..B........rr.....*......P.t.^..F..<<< skipped >>>
GET /crls/secureca.crl HTTP/1.1
Connection: Keep-Alive
Accept: */*
If-Modified-Since: Thu, 13 Oct 2016 09:30:22 GMT
If-None-Match: "b6a46da3cf1aa70c10b101b12c9733f4:1476351022"
User-Agent: Microsoft-CryptoAPI/6.1
Host: crl.geotrust.com
HTTP/1.1 200 OK
Server: Apache
ETag: "e9fd373f14dd566d6f5940966dc33e99:1499000421"
Last-Modified: Sun, 02 Jul 2017 13:00:21 GMT
Date: Sun, 02 Jul 2017 13:09:58 GMT
Content-Length: 325
Connection: keep-alive
Content-Type: application/pkix-crl0..A0..0...*.H........0N1.0...U....US1.0...U....Equifax1-0 ..U...$Equi
fax Secure Certificate Authority..170702124300Z..170712124300Z0,0....%
...020514181157Z0.....3..020515130611Z0...*.H.............P|.i........
......\..i...........`.......W....k.l.........f.t....V......If......X=
..c...M.....u....>..!.C.....4B........?^.....HTTP/1.1 200 OK..Serve
r: Apache..ETag: "e9fd373f14dd566d6f5940966dc33e99:1499000421"..Last-M
odified: Sun, 02 Jul 2017 13:00:21 GMT..Date: Sun, 02 Jul 2017 13:09:5
8 GMT..Content-Length: 325..Connection: keep-alive..Content-Type: appl
ication/pkix-crl..0..A0..0...*.H........0N1.0...U....US1.0...U....Equi
fax1-0 ..U...$Equifax Secure Certificate Authority..170702124300Z..170
712124300Z0,0....%...020514181157Z0.....3..020515130611Z0...*.H.......
......P|.i..............\..i...........`.......W....k.l.........f.t...
.V......If......X=..c...M.....u....>..!.C.....4B........?^.......
The Trojan connects to the servers at the folowing location(s):
.text
`.rdata
@.data
.data
.rsrc
user32.dll
KERNEL32.dll
USER32.dll
GetCPInfo
krnln.fne
krnln.fnr
E_N%X
1.1.3
c:\%original file name%.exe
explorer hXXp://VVV.csyt2.com/changepsd.php
Config.exe
221.209.17.148
\update.exe
hXXp://VVV.csyt2.com/update.edb
\update.edb
)-.aaa
?.jsp
5 43"--
!!
!
.iaCZw
m%cNX
b.rj_O
\%u=e
cp%F;
.jO!H
k.zt(
o5Z.Gu
|:.ed
.ba*o
PURl
\mF^w%f<4X_
hx5(k.nC
\Xqi%xY
l=.Ne$
5e.hH
%X,Rd
t.nYlj
LpM.Ry
7"%c@
;T(%X
%C{%8]c;.ZT
U.EX`9g
P.pQ5
x%s i
!H.Dit<s
RfTPS
&%f^|}h
qJ%fT}
B .jA
=.qb]
wmi.cy
L%F(;?"
.UW#YB.S2_
UEfMY.XA
Bbv%f&p
%UrlS
=%d%'
q9%0uN
(h)sJq%s{4.wTic
p%S~'
m.sR$mZf
ÀX[
`@m%f
}|=
.kRFcd
OÞe5
we%x^D
.FC b@
r.JT3
.jI#rG
`t.WQ
T6.wT
4S%Fr U:^
Í%o{7t.Io
.pL:(
INb@%dm
.GX#H*
%Xp[!
.PFuJ
FtPd
]wEbF
p%-ovM}^~
a<ø
.ed0(
update.exe
G.gz3
KEy-$F
45.sY
}Vv.vf
M/.GaR*
.zfjS
b".Lc
.qV|-,
ny.ka
%u#Zu
.XO_Z
97*$%D
2pD[z.Tt
I%Fg{k%1sf%
]u\.dIN
q.omR
0Ai%F
@^2.RY
.we<W
.ucWJ
.uWJeB
9T.ol
F8`j%U
T1.AO
d}.KI`
.sI5\
(1%c@
nZ.bGY
D.%s`
.wrQ.i
.yhN*@
y.zDD
%Sn{1`3T.eW
D$Q0%u
R;.xk(
3.flY
26.kG
ts%c;
0;%s<
qvP%s&
vz.ze
'U.QR
Q.eq<
%7U\h
48.cR=
yS%0s
%cJwvk(M
.fpMxf
z15B.WS
.BaT&
.eBk_
v.fQ,1
PT.PL/
%x]Nec
EU\.JvGX
M[L%U
|J=%x
-.a%x2
{!.gz.bxcw
x^4%DSF
lUƒc
.XR<p
pi*%f
.om 37t
6 ?n.WTk
s5|%f
:/%SN
u1.HZ.O
.OQyu"
.mXfP:
z.FUw"
bm.Nd
}[%Cm
w9.So
.CmWe
.EXG=q
.Vfkr"
Cc.yK
oK]%dH
Jfj.rU
.cP)NN
Y .Az
.dQkg
`,XA%f
"M.LT
}`-qq%X
O;%f[
[#jE-Jy}
\csyt2.exe
0?'..KQ
.iBQ8f
7oF%D
<Í7
(%XZ5h]
.sM:I
$%C;5K
AW.dv
.pd_~JW/L
7iRDB%f
.lF1|
85.Zg
N7.yT
zsÏ^
uT5DnP.Tc
4G)MË
Nu.byC
ro.wT
q.jCa
v%^%SAC
.id9J
n.Ft5
/.xm_X
.CJdkCg
|n.GnSm
DEj.jh
;VÞ
7%X"Ad
@%cLar|
YNR%u
8 .Wn
1p.PW
tyLh%d
b1.dk*
-O}@^F
%S<&0
T9xc%d
LP%s7V
[%s3 &
'*.qW
~".HR
]).ZK
0Z!.cA
!.rE&
l%xgxBG
.nfNb
<.vwl#
6%Xe,
.yUm]
]4.xA
_Zf.TzM
.MCz&J
#.Dr\/l
Y.kw C4%
.es:j
:m$^.eP
0.UsHFy
P'#-.Bxn
KERNEL32.DLL
advapi32.dll
d3d8.dll
devil.dll
dinput8.dll
gdi32.dll
granny2.dll
imagehlp.dll
imm32.dll
mss32.dll
ole32.dll
oleaut32.dll
python22.dll
shell32.dll
speedtreert.dll
version.dll
winmm.dll
ws2_32.dll
RegOpenKeyA
.rdata
20050518
>.KKC
`c;Þ
kernel32.dll
Y%xTA
csyt2.exe
update.edb
MLSJ.exe
HookSrv.exe
GearNT.exe
Gear9x.exe
XP.exe
explorer hXXp://VVV.csyt2.com
explorer hXXp://VVV.csyt2.com/register.php
csyt2.exe 1 3
csyt2.exe 0 3
SetWindowsHookExA
UnhookWindowsHookEx
Adobe Photoshop CS4 Windows
2010:01:05 23:37:41
uL.qcI$
urlTEXT
MsgeTEXT
ZhXXp://ns.adobe.com/xap/1.0/
" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 4.2.2-c063 53.352624, 2008/07/30-18:12:18 "> <rdf:RDF xmlns:rdf="hXXp://VVV.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="hXXp://ns.adobe.com/xap/1.0/" xmlns:dc="hXXp://purl.org/dc/elements/1.1/" xmlns:photoshop="hXXp://ns.adobe.com/photoshop/1.0/" xmlns:xmpMM="hXXp://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="hXXp://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:tiff="hXXp://ns.adobe.com/tiff/1.0/" xmlns:exif="hXXp://ns.adobe.com/exif/1.0/" xmp:CreatorTool="Adobe Photoshop CS4 Windows" xmp:CreateDate="2010-01-05T22:59:03 08:00" xmp:ModifyDate="2010-01-05T23:37:41 08:00" xmp:MetadataDate="2010-01-05T23:37:41 08:00" dc:format="image/jpeg" photoshop:ColorMode="3" xmpMM:InstanceID="xmp.iid:5BFF472410FADE11B2F4DAB3213FF165" xmpMM:DocumentID="xmp.did:5AFF472410FADE11B2F4DAB3213FF165" xmpMM:OriginalDocumentID="xmp.did:5AFF472410FADE11B2F4DAB3213FF165" tiff:Orientation="1" tiff:XResolution="720000/10000" tiff:YResolution="720000/10000" tiff:ResolutionUnit="2" tiff:NativeDigest="256,257,258,259,262,274,277,284,530,531,282,283,296,301,318,319,529,532,306,270,271,272,305,315,33432;F87FC3708FB9314AC468B0F4AAACC645" exif:PixelXDimension="122" exif:PixelYDimension="34" exif:ColorSpace="65535" exif:NativeDigest="36864,40960,40961,37121,37122,40962,40963,37510,40964,36867,36868,33434,33437,34850,34852,34855,34856,37377,37378,37379,37380,37381,37382,37383,37384,37385,37386,37396,41483,41484,41486,41487,41488,41492,41493,41495,41728,41729,41730,41985,41986,41987,41988,41989,41990,41991,41992,41993,41994,41995,41996,42016,0,2,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,20,22,23,24,25,26,27,28,30;02F6AFAB3E360ED061206666B6940851"> <xmpMM:History> <rdf:Seq> <rdf:li stEvt:action="created" stEvt:instanceID="xmp.iid:5AFF472410FADE11B2F4DAB3213FF165" stEvt:when="2010-01-05T23:37:41 08:00" stEvt:softwareAgent="Adobe Photoshop CS4 Windows"/> <rdf:li stEvt:action="converted" stEvt:parameters="from image/bmp to image/jpeg"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:5BFF472410FADE11B2F4DAB3213FF165" stEvt:when="2010-01-05T23:37:41 08:00" stEvt:softwareAgent="Adobe Photoshop CS4 Windows" stEvt:changed="/"/> </rdf:Seq> </xmpMM:History> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="w"?>
hXXp://VVV.csyt2.com/new.htm
2010:01:05 23:37:26
" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 4.2.2-c063 53.352624, 2008/07/30-18:12:18 "> <rdf:RDF xmlns:rdf="hXXp://VVV.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="hXXp://ns.adobe.com/xap/1.0/" xmlns:dc="hXXp://purl.org/dc/elements/1.1/" xmlns:photoshop="hXXp://ns.adobe.com/photoshop/1.0/" xmlns:xmpMM="hXXp://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="hXXp://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:tiff="hXXp://ns.adobe.com/tiff/1.0/" xmlns:exif="hXXp://ns.adobe.com/exif/1.0/" xmp:CreatorTool="Adobe Photoshop CS4 Windows" xmp:CreateDate="2010-01-05T22:59:03 08:00" xmp:ModifyDate="2010-01-05T23:37:26 08:00" xmp:MetadataDate="2010-01-05T23:37:26 08:00" dc:format="image/jpeg" photoshop:ColorMode="3" xmpMM:InstanceID="xmp.iid:59FF472410FADE11B2F4DAB3213FF165" xmpMM:DocumentID="xmp.did:58FF472410FADE11B2F4DAB3213FF165" xmpMM:OriginalDocumentID="xmp.did:58FF472410FADE11B2F4DAB3213FF165" tiff:Orientation="1" tiff:XResolution="720000/10000" tiff:YResolution="720000/10000" tiff:ResolutionUnit="2" tiff:NativeDigest="256,257,258,259,262,274,277,284,530,531,282,283,296,301,318,319,529,532,306,270,271,272,305,315,33432;5791939AA48C2FB21232AB3DB7EC5313" exif:PixelXDimension="122" exif:PixelYDimension="34" exif:ColorSpace="65535" exif:NativeDigest="36864,40960,40961,37121,37122,40962,40963,37510,40964,36867,36868,33434,33437,34850,34852,34855,34856,37377,37378,37379,37380,37381,37382,37383,37384,37385,37386,37396,41483,41484,41486,41487,41488,41492,41493,41495,41728,41729,41730,41985,41986,41987,41988,41989,41990,41991,41992,41993,41994,41995,41996,42016,0,2,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,20,22,23,24,25,26,27,28,30;02F6AFAB3E360ED061206666B6940851"> <xmpMM:History> <rdf:Seq> <rdf:li stEvt:action="created" stEvt:instanceID="xmp.iid:58FF472410FADE11B2F4DAB3213FF165" stEvt:when="2010-01-05T23:37:26 08:00" stEvt:softwareAgent="Adobe Photoshop CS4 Windows"/> <rdf:li stEvt:action="converted" stEvt:parameters="from image/bmp to image/jpeg"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:59FF472410FADE11B2F4DAB3213FF165" stEvt:when="2010-01-05T23:37:26 08:00" stEvt:softwareAgent="Adobe Photoshop CS4 Windows" stEvt:changed="/"/> </rdf:Seq> </xmpMM:History> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="w"?>
2010:01:05 23:37:08
" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 4.2.2-c063 53.352624, 2008/07/30-18:12:18 "> <rdf:RDF xmlns:rdf="hXXp://VVV.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="hXXp://ns.adobe.com/xap/1.0/" xmlns:dc="hXXp://purl.org/dc/elements/1.1/" xmlns:photoshop="hXXp://ns.adobe.com/photoshop/1.0/" xmlns:xmpMM="hXXp://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="hXXp://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:tiff="hXXp://ns.adobe.com/tiff/1.0/" xmlns:exif="hXXp://ns.adobe.com/exif/1.0/" xmp:CreatorTool="Adobe Photoshop CS4 Windows" xmp:CreateDate="2010-01-05T22:59:03 08:00" xmp:ModifyDate="2010-01-05T23:37:08 08:00" xmp:MetadataDate="2010-01-05T23:37:08 08:00" dc:format="image/jpeg" photoshop:ColorMode="3" xmpMM:InstanceID="xmp.iid:57FF472410FADE11B2F4DAB3213FF165" xmpMM:DocumentID="xmp.did:56FF472410FADE11B2F4DAB3213FF165" xmpMM:OriginalDocumentID="xmp.did:56FF472410FADE11B2F4DAB3213FF165" tiff:Orientation="1" tiff:XResolution="720000/10000" tiff:YResolution="720000/10000" tiff:ResolutionUnit="2" tiff:NativeDigest="256,257,258,259,262,274,277,284,530,531,282,283,296,301,318,319,529,532,306,270,271,272,305,315,33432;1168ED794542D48A293565F921111FF0" exif:PixelXDimension="122" exif:PixelYDimension="34" exif:ColorSpace="65535" exif:NativeDigest="36864,40960,40961,37121,37122,40962,40963,37510,40964,36867,36868,33434,33437,34850,34852,34855,34856,37377,37378,37379,37380,37381,37382,37383,37384,37385,37386,37396,41483,41484,41486,41487,41488,41492,41493,41495,41728,41729,41730,41985,41986,41987,41988,41989,41990,41991,41992,41993,41994,41995,41996,42016,0,2,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,20,22,23,24,25,26,27,28,30;02F6AFAB3E360ED061206666B6940851"> <xmpMM:History> <rdf:Seq> <rdf:li stEvt:action="created" stEvt:instanceID="xmp.iid:56FF472410FADE11B2F4DAB3213FF165" stEvt:when="2010-01-05T23:37:08 08:00" stEvt:softwareAgent="Adobe Photoshop CS4 Windows"/> <rdf:li stEvt:action="converted" stEvt:parameters="from image/bmp to image/jpeg"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:57FF472410FADE11B2F4DAB3213FF165" stEvt:when="2010-01-05T23:37:08 08:00" stEvt:softwareAgent="Adobe Photoshop CS4 Windows" stEvt:changed="/"/> </rdf:Seq> </xmpMM:History> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="w"?>
2010:01:05 23:36:50
" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 4.2.2-c063 53.352624, 2008/07/30-18:12:18 "> <rdf:RDF xmlns:rdf="hXXp://VVV.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="hXXp://ns.adobe.com/xap/1.0/" xmlns:dc="hXXp://purl.org/dc/elements/1.1/" xmlns:photoshop="hXXp://ns.adobe.com/photoshop/1.0/" xmlns:xmpMM="hXXp://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="hXXp://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:tiff="hXXp://ns.adobe.com/tiff/1.0/" xmlns:exif="hXXp://ns.adobe.com/exif/1.0/" xmp:CreatorTool="Adobe Photoshop CS4 Windows" xmp:CreateDate="2010-01-05T22:59:03 08:00" xmp:ModifyDate="2010-01-05T23:36:50 08:00" xmp:MetadataDate="2010-01-05T23:36:50 08:00" dc:format="image/jpeg" photoshop:ColorMode="3" xmpMM:InstanceID="xmp.iid:55FF472410FADE11B2F4DAB3213FF165" xmpMM:DocumentID="xmp.did:54FF472410FADE11B2F4DAB3213FF165" xmpMM:OriginalDocumentID="xmp.did:54FF472410FADE11B2F4DAB3213FF165" tiff:Orientation="1" tiff:XResolution="720000/10000" tiff:YResolution="720000/10000" tiff:ResolutionUnit="2" tiff:NativeDigest="256,257,258,259,262,274,277,284,530,531,282,283,296,301,318,319,529,532,306,270,271,272,305,315,33432;73440005550D287D1CB0EA1D97F4E664" exif:PixelXDimension="122" exif:PixelYDimension="34" exif:ColorSpace="65535" exif:NativeDigest="36864,40960,40961,37121,37122,40962,40963,37510,40964,36867,36868,33434,33437,34850,34852,34855,34856,37377,37378,37379,37380,37381,37382,37383,37384,37385,37386,37396,41483,41484,41486,41487,41488,41492,41493,41495,41728,41729,41730,41985,41986,41987,41988,41989,41990,41991,41992,41993,41994,41995,41996,42016,0,2,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,20,22,23,24,25,26,27,28,30;02F6AFAB3E360ED061206666B6940851"> <xmpMM:History> <rdf:Seq> <rdf:li stEvt:action="created" stEvt:instanceID="xmp.iid:54FF472410FADE11B2F4DAB3213FF165" stEvt:when="2010-01-05T23:36:50 08:00" stEvt:softwareAgent="Adobe Photoshop CS4 Windows"/> <rdf:li stEvt:action="converted" stEvt:parameters="from image/bmp to image/jpeg"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:55FF472410FADE11B2F4DAB3213FF165" stEvt:when="2010-01-05T23:36:50 08:00" stEvt:softwareAgent="Adobe Photoshop CS4 Windows" stEvt:changed="/"/> </rdf:Seq> </xmpMM:History> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="w"?>
2010:01:05 23:36:31
-GcuW}fv
" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 4.2.2-c063 53.352624, 2008/07/30-18:12:18 "> <rdf:RDF xmlns:rdf="hXXp://VVV.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="hXXp://ns.adobe.com/xap/1.0/" xmlns:dc="hXXp://purl.org/dc/elements/1.1/" xmlns:photoshop="hXXp://ns.adobe.com/photoshop/1.0/" xmlns:xmpMM="hXXp://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="hXXp://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:tiff="hXXp://ns.adobe.com/tiff/1.0/" xmlns:exif="hXXp://ns.adobe.com/exif/1.0/" xmp:CreatorTool="Adobe Photoshop CS4 Windows" xmp:CreateDate="2010-01-05T22:59:03 08:00" xmp:ModifyDate="2010-01-05T23:36:31 08:00" xmp:MetadataDate="2010-01-05T23:36:31 08:00" dc:format="image/jpeg" photoshop:ColorMode="3" xmpMM:InstanceID="xmp.iid:AA1A87650FFADE11B2F4DAB3213FF165" xmpMM:DocumentID="xmp.did:A91A87650FFADE11B2F4DAB3213FF165" xmpMM:OriginalDocumentID="xmp.did:A91A87650FFADE11B2F4DAB3213FF165" tiff:Orientation="1" tiff:XResolution="720000/10000" tiff:YResolution="720000/10000" tiff:ResolutionUnit="2" tiff:NativeDigest="256,257,258,259,262,274,277,284,530,531,282,283,296,301,318,319,529,532,306,270,271,272,305,315,33432;1616C2D5F16C7B0D4D729E784612A4BF" exif:PixelXDimension="122" exif:PixelYDimension="34" exif:ColorSpace="65535" exif:NativeDigest="36864,40960,40961,37121,37122,40962,40963,37510,40964,36867,36868,33434,33437,34850,34852,34855,34856,37377,37378,37379,37380,37381,37382,37383,37384,37385,37386,37396,41483,41484,41486,41487,41488,41492,41493,41495,41728,41729,41730,41985,41986,41987,41988,41989,41990,41991,41992,41993,41994,41995,41996,42016,0,2,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,20,22,23,24,25,26,27,28,30;02F6AFAB3E360ED061206666B6940851"> <xmpMM:History> <rdf:Seq> <rdf:li stEvt:action="created" stEvt:instanceID="xmp.iid:A91A87650FFADE11B2F4DAB3213FF165" stEvt:when="2010-01-05T23:36:31 08:00" stEvt:softwareAgent="Adobe Photoshop CS4 Windows"/> <rdf:li stEvt:action="converted" stEvt:parameters="from image/bmp to image/jpeg"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:AA1A87650FFADE11B2F4DAB3213FF165" stEvt:when="2010-01-05T23:36:31 08:00" stEvt:softwareAgent="Adobe Photoshop CS4 Windows" stEvt:changed="/"/> </rdf:Seq> </xmpMM:History> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="w"?>
2010:01:05 23:54:28
YhXXp://ns.adobe.com/xap/1.0/
" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 4.2.2-c063 53.352624, 2008/07/30-18:12:18 "> <rdf:RDF xmlns:rdf="hXXp://VVV.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="hXXp://ns.adobe.com/xap/1.0/" xmlns:dc="hXXp://purl.org/dc/elements/1.1/" xmlns:photoshop="hXXp://ns.adobe.com/photoshop/1.0/" xmlns:xmpMM="hXXp://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="hXXp://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:tiff="hXXp://ns.adobe.com/tiff/1.0/" xmlns:exif="hXXp://ns.adobe.com/exif/1.0/" xmp:CreatorTool="Adobe Photoshop CS4 Windows" xmp:CreateDate="2010-01-05T22:59:03 08:00" xmp:ModifyDate="2010-01-05T23:54:28 08:00" xmp:MetadataDate="2010-01-05T23:54:28 08:00" dc:format="image/jpeg" photoshop:ColorMode="3" xmpMM:InstanceID="xmp.iid:DE4BD59A12FADE11B2F4DAB3213FF165" xmpMM:DocumentID="xmp.did:5EFF472410FADE11B2F4DAB3213FF165" xmpMM:OriginalDocumentID="xmp.did:5EFF472410FADE11B2F4DAB3213FF165" tiff:Orientation="1" tiff:XResolution="720000/10000" tiff:YResolution="720000/10000" tiff:ResolutionUnit="2" tiff:NativeDigest="256,257,258,259,262,274,277,284,530,531,282,283,296,301,318,319,529,532,306,270,271,272,305,315,33432;B3F3040730C153FE7068D67BF335790F" exif:PixelXDimension="43" exif:PixelYDimension="24" exif:ColorSpace="65535" exif:NativeDigest="36864,40960,40961,37121,37122,40962,40963,37510,40964,36867,36868,33434,33437,34850,34852,34855,34856,37377,37378,37379,37380,37381,37382,37383,37384,37385,37386,37396,41483,41484,41486,41487,41488,41492,41493,41495,41728,41729,41730,41985,41986,41987,41988,41989,41990,41991,41992,41993,41994,41995,41996,42016,0,2,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,20,22,23,24,25,26,27,28,30;8EE81005013BB2DFD8C1E49EEEEF38C5"> <xmpMM:History> <rdf:Seq> <rdf:li stEvt:action="created" stEvt:instanceID="xmp.iid:5EFF472410FADE11B2F4DAB3213FF165" stEvt:when="2010-01-05T23:54:28 08:00" stEvt:softwareAgent="Adobe Photoshop CS4 Windows"/> <rdf:li stEvt:action="converted" stEvt:parameters="from image/bmp to image/jpeg"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:DE4BD59A12FADE11B2F4DAB3213FF165" stEvt:when="2010-01-05T23:54:28 08:00" stEvt:softwareAgent="Adobe Photoshop CS4 Windows" stEvt:changed="/"/> </rdf:Seq> </xmpMM:History> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="w"?>
2010:01:05 22:44:14
T%xPcb
BhXXp://ns.adobe.com/xap/1.0/
" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 4.2.2-c063 53.352624, 2008/07/30-18:12:18 "> <rdf:RDF xmlns:rdf="hXXp://VVV.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="hXXp://ns.adobe.com/xap/1.0/" xmlns:dc="hXXp://purl.org/dc/elements/1.1/" xmlns:photoshop="hXXp://ns.adobe.com/photoshop/1.0/" xmlns:xmpMM="hXXp://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="hXXp://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:tiff="hXXp://ns.adobe.com/tiff/1.0/" xmlns:exif="hXXp://ns.adobe.com/exif/1.0/" xmp:CreatorTool="Adobe Photoshop CS4 Windows" xmp:CreateDate="2010-01-05T22:41:19 08:00" xmp:ModifyDate="2010-01-05T22:44:14 08:00" xmp:MetadataDate="2010-01-05T22:44:14 08:00" dc:format="image/jpeg" photoshop:ColorMode="3" xmpMM:InstanceID="xmp.iid:73228FCB08FADE11B2F4DAB3213FF165" xmpMM:DocumentID="xmp.did:73228FCB08FADE11B2F4DAB3213FF165" xmpMM:OriginalDocumentID="xmp.did:73228FCB08FADE11B2F4DAB3213FF165" tiff:Orientation="1" tiff:XResolution="720000/10000" tiff:YResolution="720000/10000" tiff:ResolutionUnit="2" tiff:NativeDigest="256,257,258,259,262,274,277,284,530,531,282,283,296,301,318,319,529,532,306,270,271,272,305,315,33432;C16CDA97C3C9BCD4682D18DD2A471371" exif:PixelXDimension="580" exif:PixelYDimension="400" exif:ColorSpace="65535" exif:NativeDigest="36864,40960,40961,37121,37122,40962,40963,37510,40964,36867,36868,33434,33437,34850,34852,34855,34856,37377,37378,37379,37380,37381,37382,37383,37384,37385,37386,37396,41483,41484,41486,41487,41488,41492,41493,41495,41728,41729,41730,41985,41986,41987,41988,41989,41990,41991,41992,41993,41994,41995,41996,42016,0,2,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,20,22,23,24,25,26,27,28,30;B47E975F83B6511393C618EE80EFE0B2"> <xmpMM:History> <rdf:Seq> <rdf:li stEvt:action="created" stEvt:instanceID="xmp.iid:73228FCB08FADE11B2F4DAB3213FF165" stEvt:when="2010-01-05T22:44:14 08:00" stEvt:softwareAgent="Adobe Photoshop CS4 Windows"/> </rdf:Seq> </xmpMM:History> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="w"?>
LGÞ
~2Tß
1.0.0.0
%original file name%.exe_2748_rwx_02221000_0000E000:
user32.dll
msctls_hotkey32
hXXp://dywt.com.cn
service@dywt.com.cn
86(0411)88995834
86(0411)88995831
Windows 95
This is a runtime library file for EPL applications. The EPL is a software development environment. For details please visit VVV.dywt.com.cn/info
c:\%original file name%.exe
GetCPInfo
GetProcessHeap
EnumChildWindows
EnumThreadWindows
UnhookWindowsHookEx
SetWindowsHookExA
.text
`.rdata
@.data
.reloc
%original file name%.exe_2748_rwx_02F71000_00042000:
hu2.iu3;kuM iu
%*.*f
CNotSupportedException
CCmdTarget
commctrl_DragListMsg
COMCTL32.DLL
__MSVCRT_HEAP_SELECT
user32.dll
SHELL32.dll
le32.dll
OLEAUT32.dll
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
%s@%s:%d
.PAVCException@@
HTTP/1.0
0000HTTP
hXXp://dywt.com.cn
service@dywt.com.cn
86(0411)88995834
86(0411)88995831
SMTP
This is a runtime library file for EPL applications. The EPL is a software development environment. For details please visit VVV.dywt.com.cn/info
Windows
ListFtpDir
GetCurrentFtpDir
SetCurrentFtpDir
RemoveFtpDir
CreateFtpDir
RenameFtpFile
DeleteFtpFile
PutFtpFile
GetFtpFile
DisconnectFTPServer
ConnectFTPServer
GetHttpFile
DisconnectSmtpServer
ConnectSmtpServer
sale@dywt.com.cn
service@dywt.com.cn;sale@dywt.com.cn
%s <%s>
Reply-To: %s
From: %s
To: %s
Subject: %s
Date: %s
Cc: %s
%a, %d %b %Y %H:%M:%S
HELO %s
AUTH LOGIN
LOGIN
AUTH=LOGIN
EHLO %s
Content-Type: application/octet-stream; name=%s
Content-Disposition: attachment; filename=%s
MAIL FROM:<%s>
RCPT TO:<%s>
.PAVCObject@@
.PAVCSimpleException@@
.PAVCMemoryException@@
.?AVCNotSupportedException@@
.?AVCCmdTarget@@
.?AVCCmdUI@@
.PAVCArchiveException@@
.?AVCTestCmdUI@@
.PAVCFileException@@
zcÁ
c:\%original file name%.exe
GetCPInfo
GetProcessHeap
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
UnhookWindowsHookEx
GetKeyState
SetWindowsHookExA
InternetCanonicalizeUrlA
InternetCrackUrlA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
FtpFindFirstFileA
FtpGetFileA
FtpPutFileA
FtpGetCurrentDirectoryA
FtpSetCurrentDirectoryA
FtpRemoveDirectoryA
FtpCreateDirectoryA
FtpRenameFileA
FtpDeleteFileA
8B/..LLLXLV
.text
`.rdata
@.data
.rsrc
@.reloc
.Va[H
#v`.rtK
%original file name%.exe_2748_rwx_10001000_00125000:
|$D.tm
~%UVW
L$$SSh
t%SVh
t$(SSh
u$SShe
diu2.iu
1wK(.wE
CNotSupportedException
commctrl_DragListMsg
Afx:%x:%x:%x:%x:%x
Afx:%x:%x
COMCTL32.DLL
CCmdTarget
user32.dll
.PAVCException@@
.PAVCFileException@@
.PAVCNotSupportedException@@
\\.\Scsi0:
\\.\PhysicalDrive0
?? / %d]
%d / %d]
1 - %d
: %d]
(*.*)|*.*||
(*.WAV;*.MID)|*.WAV;*.MID|WAV
(*.WAV)|*.WAV|MIDI
(*.MID)|*.MID|
(*.txt)|*.txt|
%s.%s
(%d-%d):
Bogus message code %d
%ld%c
Shell32.dll
Mpr.dll
Advapi32.dll
User32.dll
Gdi32.dll
Kernel32.dll
This is a runtime library file for EPL applications. The EPL is a software development environment. For details please visit VVV.dywt.com.cn/info
ExecuteSql
SerialPort
Windows
%s.fnr
%s.fne
hXXp://dywt.com.cn
%d.%d
ocx.run
com.run
kernel32.dll
%x.tmp
Output.prn
(*.prn)|*.prn|
;Driver={Microsoft Access Driver (*.mdb)};FIL=MS Access~sqlsrv.dsn
;DRIVER=SQL Server;SERVER=
DRIVER=SQL Server
windows
1234567
BDGetColSQLType
%Y-%m-%d %H:%M:%S
(*.JPG;*.BMP;*.GIF;*.ICO;*.CUR)|*.JPG;*.BMP;*.GIF;*.ICO;*.CUR|JPG
(*.JPG)|*.JPG|BMP
(*.BMP)|*.BMP|GIF
(*.GIF)|*.GIF|
(*.ICO)|*.ICO|
(*.CUR)|*.CUR|
%d / %d
out.prn
%d.%d
%d/%d
(&07-034/)7 '
\\.\COM%d
%s:%d
icmp.dll
.PAVCObject@@
.PAVCSimpleException@@
.PAVCMemoryException@@
.?AVCNotSupportedException@@
.?AVCCmdTarget@@
.?AVCCmdUI@@
.?AVCTestCmdUI@@
.PAVCUserException@@
.PAVCResourceException@@
.PAVCOleException@@
.PAVCArchiveException@@
zcÁ
c:\%original file name%.exe
GetCPInfo
WinExec
GetProcessHeap
RegOpenKeyExA
RegCreateKeyA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
GetViewportExtEx
GetViewportOrgEx
ShellExecuteA
CreateDialogIndirectParamA
SetWindowsHookExA
UnhookWindowsHookEx
GetKeyState
#%H%X
< 3)20,6
..../..LLLXLLV
08(( ((0
.text
`.rdata
@.data
.rsrc
@.reloc
(*.*)
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):No processes have been created.
- Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\i_phone_blue[1].png (579 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\chat-popup[1].png (7436 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Tar3CA7.tmp (2712 bytes)
C:\dat (885 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\warning[1] (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8059E9A0D314877E40FE93D8CCFB3C69_4514C5DDAF11F496BDCCD6622E9EF365 (660 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\EHSAQ1GI.txt (305 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\2H12DV8R.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\VJR9040K.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\v3[1].css (9411 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\Q0RAIKHH.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\6H5NYYFT.txt (519 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Tar26B3.tmp (2712 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\678B9F95B126F50368710CA85CB2F3DA_AB8D94F29896452B4806732E3EB7F2B7 (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\b_buyNow_187[1].png (10372 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\U4T2EBWJ.txt (519 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\common[1].js (4656 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\reallydopost[1].js (859 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\LK7UQ8A6.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (1720 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Cab3CA6.tmp (52 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\E_N4\krnln.fnr (422 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (52 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\common_v3[1].js (1081 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\styles-new[1].css (11743 bytes)
C:\update.edb (14 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\828298824EA5549947C17DDABF6871F5_0206EFBC540300C3BF0163CDBC3D7D56 (1424 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\23B523C9E7746F715D33C6527C18EB9D (325 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\2AREPTB0.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\X1WMZ7GH.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\counter[1].js (17760 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\JJOYYN7Y.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\828298824EA5549947C17DDABF6871F5_0206EFBC540300C3BF0163CDBC3D7D56 (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\EHRJ80N2.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\KL5ZUWDU.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\E_N4\xplib.fne (47 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\E_N4\eAPI.fne (335 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\CIPSUJIG.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\UWZKZMN3.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8A574ED5927B3CEC9626151D220C7448 (248 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\stars_5[1].png (570 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\QMY6R97N.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771 (1688 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\hr_882x7[1].png (1152 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\O1JL2O23.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\2U031IEQ.txt (329 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\CH8OFS0H.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\domain_profile[1].htm (1192 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Internet Explorer\DOMStore\WMZUWJRG\www.hugedomains[1].xml (13 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_C7B398B93BFA7397A840C520A0E096A2 (1454 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\23B523C9E7746F715D33C6527C18EB9D (876 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\dots_8x1[1].gif (44 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\E_N4\HtmlView.fne (434 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\error[1] (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\bg[1].gif (670 bytes)
C:\update.exe (797 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\common[1].css (20667 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5457A8CE4B2A7499F8299A013B6E1C7C_CE50F893881D43DC0C815E4D80FAF2B4 (2674 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\jquery-1.5.1.min[1].js (60926 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\youtubeLocationMatters[1].jpg (12254 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5457A8CE4B2A7499F8299A013B6E1C7C_CE50F893881D43DC0C815E4D80FAF2B4 (942 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\footer_logo_cc[1].png (832 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D (1720 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\A0SXX9WM.txt (519 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\WDX9E0U1.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\footer_logo_escrow[1].png (832 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8059E9A0D314877E40FE93D8CCFB3C69_4514C5DDAF11F496BDCCD6622E9EF365 (463 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\CJU696IX.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\3A0GLDOA.txt (81 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\53HPTWYG.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\E_N4\internet.fne (86 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\bg2[1].jpg (17097 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Cab26B2.tmp (51 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\N85GLBE4.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\crown[1].jpg (2191 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\2KHMA776.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\chat-popup-close[1].png (858 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\E_N4\iext2.fne (942 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\pages_v3b[1].css (11735 bytes)
C:\csyt2.exe (899 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Cab26E2.tmp (51 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771 (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\chat-popup-start[1].png (2191 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\footer_logo_guaranteed[1].png (732 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\921FA3X0.txt (841 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\edition121114[1].css (3378 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\i_i_blue[1].png (457 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\error[1] (3 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_C7B398B93BFA7397A840C520A0E096A2 (2702 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\HLS3GAQ8.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\VZY7D90T.txt (117 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\logo_top[1].png (5518 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\B3HCHRUN.txt (519 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\styles_hd[1].css (15415 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\t[1].gif (49 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8A574ED5927B3CEC9626151D220C7448 (665 bytes)
C:\Users\"%CurrentUserName%"\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\678B9F95B126F50368710CA85CB2F3DA_AB8D94F29896452B4806732E3EB7F2B7 (1448 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\9KD81I68.txt (519 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\Tar26E3.tmp (2712 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\b_x[1].png (755 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\footer_logo_GT[1].png (2139 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\9LANWZCJ.txt (123 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\profileVideo[1].gif (43 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.