Trojan.Win32.FlyStudio_a83b936adf
Trojan.Siggen6.63994 (DrWeb), Artemis!A83B936ADF09 (McAfee), ML.Attribute.HighConfidence (Symantec), Win32/Heur (AVG), Win32:Malware-gen (Avast), Trojan-PSW.Win32.MSNPassword.FD, Trojan.Win32.FlyStudio.FD, GenericEmailWorm.YR, TrojanFlyStudio.YR (Lavasoft MAS)
Behaviour: Trojan-PSW, Trojan, Worm, EmailWorm, Malware
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: a83b936adf0926317eaed50bb3c54eda
SHA1: 7005e85315d65ef8607db35fb170fb28032c0cfb
SHA256: 50d255bd1c60163f6d2e70ab23951795d41c0d6690e360397a75403b6ba72596
SSDeep: 12288:gLgJDlAIji8y5cqlgT7Jr AeDXS0iImtImo6RsWcjZZ8sMoYUB:HD6o11TNIDfirtIDoszlqqD
Size: 642997 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: ASPackv212, UPolyXv05_v6
Company:
Created at: 2014-08-25 11:32:44
Analyzed on: Windows7 SP1 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
| Behaviour | Description |
|---|---|
| EmailWorm | Worm can send e-mails. |
Process activity
The Trojan creates the following process(es):
%original file name%.exe:1976
The Trojan injects its code into the following process(es):
No processes have been created.
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process %original file name%.exe:1976 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Ó¦ÓÃÅäÖÃ.ini (1273 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\3WIYROR0.txt (103 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\WZUK671P.txt (301 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\stat[1].gif (43 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\yzmrxgj2_0_new[1].htm (691 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\XJ1SY4A9.txt (94 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\core[1].js (763 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\stat[1].gif (43 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\stat[2].gif (43 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\LOTCKZQQ.txt (94 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\stat[1].js (1321 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\core[1].js (763 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\D09L9HMD.txt (379 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\V9Q5P1VU.txt (447 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\N44KR7LG.txt (92 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\IJI2X89X.txt (92 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\5E0Y784H.txt (133 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\stat[1].js (1321 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\core[1].js (762 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\5IQPOJ12.txt (94 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\IN7QKBDK.txt (115 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\TU5QSY09.txt (92 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\stat[1].js (1321 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\9FJS561V.txt (643 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\D09L9HMD.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\3WIYROR0.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\WZUK671P.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\5IQPOJ12.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\IN7QKBDK.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\N44KR7LG.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\XJ1SY4A9.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\IJI2X89X.txt (0 bytes)
Registry activity
The process %original file name%.exe:1976 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Tracing\a83b936adf0926317eaed50bb3c54eda_RASAPI32]
"MaxFileSize" = "1048576"
"ConsoleTracingMask" = "4294901760"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\a83b936adf0926317eaed50bb3c54eda_RASMANCS]
"EnableFileTracing" = "0"
"FileTracingMask" = "4294901760"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\a83b936adf0926317eaed50bb3c54eda_RASMANCS]
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Tracing\a83b936adf0926317eaed50bb3c54eda_RASAPI32]
"FileTracingMask" = "4294901760"
"EnableFileTracing" = "0"
"FileDirectory" = "%windir%\tracing"
"EnableConsoleTracing" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "46 00 00 00 3E 00 00 00 09 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Tracing\a83b936adf0926317eaed50bb3c54eda_RASMANCS]
"FileDirectory" = "%windir%\tracing"
"EnableConsoleTracing" = "0"
"ConsoleTracingMask" = "4294901760"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyServer"
"ProxyOverride"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
Dropped PE files
There are no dropped PE files.
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
Company Name: ????http://www.yzrja.com
Product Name: ???????
Product Version: 2.0.0.0
Legal Copyright: ???????(C)http://www.yzrja.com
Legal Trademarks:
Original Filename:
Internal Name:
File Version: 2.0.0.0
File Description: ??????
Comments: ???????????????????????,??????,?????!
Language: Chinese (Simplified, PRC)
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 958464 | 515072 | 5.54325 | d901e883a9fbd0a994600ed343b79b18 |
| .rdata | 962560 | 237568 | 57856 | 5.54091 | 75855344d3e9fd835aad9bf471eef667 |
| .data | 1200128 | 524288 | 40960 | 5.53602 | 7f37c83ba790175f3ea18a4b330ef22b |
| .rsrc | 1724416 | 32768 | 12800 | 4.98219 | b948c4e2129a3a35bd35b540c6e38d18 |
| .text | 1757184 | 4096 | 4096 | 1.77359 | 3fc6f3472110095a7f37022719288f9e |
| .aspack | 1761280 | 12288 | 10240 | 3.29745 | 0867fa32a5005be5504ca2e086babd7c |
| .adata | 1773568 | 4096 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://www.yzrja.com/yzsoft/statistics/yzmrxgj2_0_new.html | |
| hxxp://www.a.shifen.com/ | |
| hxxp://www.yzrja.com/yzsoft/advert/yzmrxgj/title01.txt | |
| hxxp://www.yzrja.com/yzsoft/advert/yzmrxgj/link01.txt | |
| hxxp://www.yzrja.com/yzsoft/PushAdvert/yzmrxgj/yzmrxgj2_0/2345browser.txt | |
| hxxp://www.yzrja.com/yzsoft/PushAdvert/yzmrxgj/yzmrxgj2_0/2345daohang2.txt | |
| hxxp://all.cnzz.com.danuoyi.tbcache.com/stat.php?id=1253133024 | |
| hxxp://www.yzrja.com/yzsoft/PushAdvert/yzmrxgj/yzmrxgj2_0/2345browserURL.txt | |
| hxxp://all.cnzz.com.danuoyi.tbcache.com/stat.php?id=4755173&web_id=4755173 | |
| hxxp://all.cnzz.com.danuoyi.tbcache.com/stat.php?id=4702665&web_id=4702665 | |
| hxxp://www.yzrja.com/yzsoft/PushAdvert/yzmrxgj/yzmrxgj2_0/2345browserName.txt | |
| hxxp://z.gds.cnzz.com/stat.htm?id=1253133024&r=&lg=en-us&ntime=none&cnzz_eid=113380915-1492823061-&showp=1276x846&t=ÈüþʹÓÃó¼Æ&umuuid=15b93a9b7d92ce-048aa1e7e1fbf44-44703d1f-1078c8-15b93a9b7da26c&h=1&rnd=277086771 | |
| hxxp://all.cnzz.com.danuoyi.tbcache.com/core.php?web_id=1253133024&t=z | |
| hxxp://all.cnzz.com.danuoyi.tbcache.com/core.php?web_id=4755173&t=z | |
| hxxp://all.cnzz.com.danuoyi.tbcache.com/core.php?web_id=4702665&t=z | |
| hxxp://gm.gds.mmstat.com/9.gif?abc=1&rnd=1300376752 | |
| hxxp://gm.gds.mmstat.com/9.gif?abc=1&rnd=533210884 | |
| hxxp://z.gds.cnzz.com/stat.htm?id=4702665&r=&lg=en-us&ntime=none&cnzz_eid=168756798-1492825623-&showp=1276x846&t=ÈüþʹÓÃó¼Æ&umuuid=15b93a9b7d92ce-048aa1e7e1fbf44-44703d1f-1078c8-15b93a9b7da26c&h=1&rnd=970127262 | |
| hxxp://z.gds.cnzz.com/stat.htm?id=4755173&r=&lg=en-us&ntime=none&cnzz_eid=1166190261-1492823520-&showp=1276x846&t=ÈüþʹÓÃó¼Æ&umuuid=15b93a9b7d92ce-048aa1e7e1fbf44-44703d1f-1078c8-15b93a9b7da26c&h=1&rnd=1516340663 | |
| hxxp://gm.gds.mmstat.com/9.gif?abc=1&rnd=1755385211 | |
| hxxp://pcookie.gds.taobao.com/app.gif?&cna=MKuBEcuMvlMCAcLyYNqgonMO | |
| hxxp://pcookie.gds.taobao.com/app.gif?&cna=MKuBEeIFe1MCAcLyYNqtIjRO | |
| hxxp://pcookie.gds.taobao.com/app.gif?&cna=MauBEQI1LBMCAcLyYNq7RNhO | |
| hxxp://www.baidu.com/ | |
| hxxp://pcookie.cnzz.com/app.gif?&cna=MKuBEeIFe1MCAcLyYNqtIjRO | |
| hxxp://c.cnzz.com/core.php?web_id=4702665&t=z | |
| hxxp://gzs20.cnzz.com/stat.htm?id=4702665&r=&lg=en-us&ntime=none&cnzz_eid=168756798-1492825623-&showp=1276x846&t=ÈüþʹÓÃó¼Æ&umuuid=15b93a9b7d92ce-048aa1e7e1fbf44-44703d1f-1078c8-15b93a9b7da26c&h=1&rnd=970127262 | |
| hxxp://c.cnzz.com/core.php?web_id=1253133024&t=z | |
| hxxp://cnzz.mmstat.com/9.gif?abc=1&rnd=1755385211 | |
| hxxp://pcookie.cnzz.com/app.gif?&cna=MauBEQI1LBMCAcLyYNq7RNhO | |
| hxxp://pcookie.cnzz.com/app.gif?&cna=MKuBEcuMvlMCAcLyYNqgonMO | |
| hxxp://cnzz.mmstat.com/9.gif?abc=1&rnd=533210884 | |
| hxxp://s13.cnzz.com/stat.php?id=1253133024 | |
| hxxp://s20.cnzz.com/stat.php?id=4702665&web_id=4702665 | |
| hxxp://hzs4.cnzz.com/stat.htm?id=4755173&r=&lg=en-us&ntime=none&cnzz_eid=1166190261-1492823520-&showp=1276x846&t=ÈüþʹÓÃó¼Æ&umuuid=15b93a9b7d92ce-048aa1e7e1fbf44-44703d1f-1078c8-15b93a9b7da26c&h=1&rnd=1516340663 | |
| hxxp://s95.cnzz.com/stat.php?id=4755173&web_id=4755173 | |
| hxxp://z7.cnzz.com/stat.htm?id=1253133024&r=&lg=en-us&ntime=none&cnzz_eid=113380915-1492823061-&showp=1276x846&t=ÈüþʹÓÃó¼Æ&umuuid=15b93a9b7d92ce-048aa1e7e1fbf44-44703d1f-1078c8-15b93a9b7da26c&h=1&rnd=277086771 | |
| hxxp://cnzz.mmstat.com/9.gif?abc=1&rnd=1300376752 | |
| hxxp://c.cnzz.com/core.php?web_id=4755173&t=z |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET POLICY Unsupported/Fake Windows NT Version 5.0
Traffic
GET /stat.php?id=4702665&web_id=4702665 HTTP/1.1
Accept: */*
Referer: hXXp://VVV.yzrja.com/yzsoft/statistics/yzmrxgj2_0_new.html
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0E; .NET4.0C)
Host: s20.cnzz.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: Tengine
Content-Type: application/javascript
Content-Length: 10984
Connection: keep-alive
Date: Sat, 22 Apr 2017 01:47:03 GMT
Last-Modified: Sat, 22 Apr 2017 01:47:03 GMT
Cache-Control: max-age=5400,s-maxage=5400
Via: cache17.l2et2-1[0,200-0,H], cache20.l2et2-1[0,0], kunlun5.cn74[0,200-0,H], kunlun7.cn74[0,0]
Age: 1815
X-Cache: HIT TCP_MEM_HIT dirn:10:155752407
X-Swift-SaveTime: Sat, 22 Apr 2017 01:51:08 GMT
X-Swift-CacheTime: 5155
Timing-Allow-Origin: *
EagleId: deba31a014928274385853453e(function(){function k(){this.c="4702665";this.ca="z";this.Z="";this.W
="";this.Y="";this.C="1492825623";this.aa="gzs20.cnzz.com";this.X="";t
his.G="CNZZDATA" this.c;this.F="_CNZZDbridge_" this.c;this.P="_cnzz_CV
" this.c;this.R="CZ_UUID" this.c;this.L="UM_distinctid";this.H="0";thi
s.K={};this.a={};this.Aa()}function g(a,.b){try{var c=[];c.push("sitei
d=4702665");c.push("name=" f(a.name));c.push("msg=" f(a.message));c.pu
sh("r=" f(h.referrer));c.push("page=" f(e.location.href));c.push("agen
t=" f(e.navigator.userAgent));c.push("ex=" f(b));c.push("rnd=" Math.fl
oor(2147483648*Math.random()));(new Image).src="hXXp://jserr.cnzz.com/
log.php?" c.join("&")}catch(d){}}var h=document,e=window,f=encodeURICo
mponent,m=decodeURIComponent,r=unescape;k.prototype={Aa:function(){try
{this.ja(),this.V(),this.wa(),this.T(),this.za(),.this.w(),this.ua(),t
his.ta(),this.xa(),this.o(),this.sa(),this.va(),this.ya(),this.qa(),th
is.oa(),this.ra(),this.Ea(),e[this.F]=e[this.F]||{},this.pa("_cnzz_CV"
)}catch(a){g(a,"i failed")}},Ca:function(){try{var a=this;e._czc={push
:function(){return a.M.apply(a,arguments)}}}catch(b){g(b,"oP failed")}
},oa:function(){try{var a=e._czc;if("[object Array]"==={}.toString.cal
l(a))for(var b=0;b<a.length;b ){var c=a[b];switch(c[0]){case "_set
Account":e._cz_account="[object String]"==={}.toString.call(c[1])?.c[1
]:String(c[1]);break;case "_setAutoPageview":"boolean"===typeof c[1]&&
(e._cz_autoPageview=c[1])}}}catch(d){g(d,"cS failed")}},Ea:function(){
try{if("undefined"===typeof e._cz_account||e._cz_account===this.c)<<< skipped >>>
GET /9.gif?abc=1&rnd=533210884 HTTP/1.1
Accept: */*
Referer: hXXp://VVV.yzrja.com/yzsoft/statistics/yzmrxgj2_0_new.html
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0E; .NET4.0C)
Host: cnzz.mmstat.com
Connection: Keep-Alive
HTTP/1.1 302 Found
Date: Sat, 22 Apr 2017 02:17:20 GMT
Content-Type: image/gif
Content-Length: 43
Connection: close
P3P: CP="NOI DSP COR CURa ADMa DEVa PSAa PSDa OUR IND UNI PUR NAV"
Set-Cookie: cna=MKuBEeIFe1MCAcLyYNqtIjRO; expires=Tue, 20-Apr-27 02:17:20 GMT; path=/; domain=.mmstat.com
Set-Cookie: sca=0fb3ba96; path=/; domain=.cnzz.mmstat.com
Set-Cookie: atpsida=a4140d2a50cb2e0ff3efa2c8_1492827440_1; path=/; domain=.cnzz.mmstat.com
Location: hXXp://pcookie.cnzz.com/app.gif?&cna=MKuBEeIFe1MCAcLyYNqtIjRO
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache
Pragma: no-cacheGIF89a.............!.......,...........L..;..
GET /yzsoft/PushAdvert/yzmrxgj/yzmrxgj2_0/2345browser.txt HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: VVV.yzrja.com
Cache-Control: no-cache
Cookie: safedog-flow-item=
HTTP/1.1 200 OK
Content-Length: 3
Content-Type: text/plain
Last-Modified: Sun, 26 Mar 2017 05:24:32 GMT
Accept-Ranges: bytes
ETag: "0289b3ff1a5d21:0"
Server: Microsoft-IIS/7.5
X-Powered-By: WAF/2.0
Date: Sat, 22 Apr 2017 02:17:05 GMTyesHTTP/1.1 200 OK..Content-Length: 3..Content-Type: text/plain..Last-
Modified: Sun, 26 Mar 2017 05:24:32 GMT..Accept-Ranges: bytes..ETag: "
0289b3ff1a5d21:0"..Server: Microsoft-IIS/7.5..X-Powered-By: WAF/2.0..D
ate: Sat, 22 Apr 2017 02:17:05 GMT..yes....
GET /yzsoft/PushAdvert/yzmrxgj/yzmrxgj2_0/2345browserName.txt HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: VVV.yzrja.com
Cache-Control: no-cache
Cookie: safedog-flow-item=; UM_distinctid=15b93a9b7d92ce-048aa1e7e1fbf44-44703d1f-1078c8-15b93a9b7da26c; CNZZDATA1253133024=113380915-1492823061-|1492823061
HTTP/1.1 200 OK
Content-Length: 19
Content-Type: text/plain
Last-Modified: Sun, 26 Mar 2017 05:24:47 GMT
Accept-Ranges: bytes
ETag: "80f98b48f1a5d21:0"
Server: Microsoft-IIS/7.5
X-Powered-By: WAF/2.0
Date: Sat, 22 Apr 2017 02:17:06 GMTfiledown_238858.exeHTTP/1.1 200 OK..Content-Length: 19..Content-Type:
text/plain..Last-Modified: Sun, 26 Mar 2017 05:24:47 GMT..Accept-Range
s: bytes..ETag: "80f98b48f1a5d21:0"..Server: Microsoft-IIS/7.5..X-Powe
red-By: WAF/2.0..Date: Sat, 22 Apr 2017 02:17:06 GMT..filedown_238858.
exe..
GET /yzsoft/statistics/yzmrxgj2_0_new.html HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0E; .NET4.0C)
Host: VVV.yzrja.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Content-Length: 691
Content-Type: text/html
Last-Modified: Mon, 25 Aug 2014 08:25:28 GMT
Accept-Ranges: bytes
ETag: "04c55203ec0cf1:0"
Server: Microsoft-IIS/7.5
X-Powered-By: WAF/2.0
Set-Cookie: safedog-flow-item=; expires=Sat, 22-Arp-2017 16:00:05 GMT; domain=yzrja.com; path=/
Date: Sat, 22 Apr 2017 02:17:05 GMT<head>..<title>............</title>..</head>..
<body>..<script type="text/javascript">var cnzz_protocol =
(("https:" == document.location.protocol) ? " hXXps://" : " hXXp://")
;document.write(unescape("<
/span>"));</script&g
t;..<p>..............v2.0......cnzz</p>..<script src="h
ttp://s95.cnzz.com/stat.php?id=4755173&web_id=4755173" language="JavaS
cript"></script>..<p>......................cnzz</p&g
t;..<script src="hXXp://s20.cnzz.com/stat.php?id=4702665&web_id=470
2665" language="JavaScript"></script>..<p>.............
.......cnzz</p>......
GET /yzsoft/advert/yzmrxgj/title01.txt HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: VVV.yzrja.com
Cache-Control: no-cache
Cookie: safedog-flow-item=
HTTP/1.1 200 OK
Content-Length: 44
Content-Type: text/plain
Last-Modified: Wed, 01 Mar 2017 07:10:20 GMT
Accept-Ranges: bytes
ETag: "26c580e35a92d21:0"
Server: Microsoft-IIS/7.5
X-Powered-By: WAF/2.0
Date: Sat, 22 Apr 2017 02:17:05 GMT........................................>>>>....
GET /yzsoft/advert/yzmrxgj/link01.txt HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: VVV.yzrja.com
Cache-Control: no-cache
Cookie: safedog-flow-item=
HTTP/1.1 200 OK
Content-Length: 29
Content-Type: text/plain
Last-Modified: Wed, 01 Mar 2017 07:08:41 GMT
Accept-Ranges: bytes
ETag: "5cab83a85a92d21:0"
Server: Microsoft-IIS/7.5
X-Powered-By: WAF/2.0
Date: Sat, 22 Apr 2017 02:17:05 GMThXXp://kan.2345.com/?lm002523....
GET /yzsoft/PushAdvert/yzmrxgj/yzmrxgj2_0/2345browserURL.txt HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: VVV.yzrja.com
Cache-Control: no-cache
Cookie: safedog-flow-item=
HTTP/1.1 200 OK
Content-Length: 43
Content-Type: text/plain
Last-Modified: Sun, 26 Mar 2017 05:25:00 GMT
Accept-Ranges: bytes
ETag: "09e4b50f1a5d21:0"
Server: Microsoft-IIS/7.5
X-Powered-By: WAF/2.0
Date: Sat, 22 Apr 2017 02:17:06 GMThXXp://yzrja88.5d4d.net/filedown_238858.zipHTTP/1.1 200 OK..Content-Le
ngth: 43..Content-Type: text/plain..Last-Modified: Sun, 26 Mar 2017 05
:25:00 GMT..Accept-Ranges: bytes..ETag: "09e4b50f1a5d21:0"..Server: Mi
crosoft-IIS/7.5..X-Powered-By: WAF/2.0..Date: Sat, 22 Apr 2017 02:17:0
6 GMT..hXXp://yzrja88.5d4d.net/filedown_238858.zip..
GET /app.gif?&cna=MauBEQI1LBMCAcLyYNq7RNhO HTTP/1.1
Accept: */*
Referer: hXXp://VVV.yzrja.com/yzsoft/statistics/yzmrxgj2_0_new.html
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0E; .NET4.0C)
Connection: Keep-Alive
Host: pcookie.cnzz.com
HTTP/1.1 200 OK
Date: Sat, 22 Apr 2017 02:17:22 GMT
Content-Type: image/gif
Content-Length: 43
Connection: close
P3P: CP="NOI DSP COR CURa ADMa DEVa PSAa PSDa OUR IND UNI PUR NAV"
Set-Cookie: cna=MauBEQI1LBMCAcLyYNq7RNhO; expires=Tue, 20-Apr-27 02:17:22 GMT; path=/; domain=.cnzz.com
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache
Pragma: no-cacheGIF89a.............!.......,...........L..;..
GET /core.php?web_id=1253133024&t=z HTTP/1.1
Accept: */*
Referer: hXXp://VVV.yzrja.com/yzsoft/statistics/yzmrxgj2_0_new.html
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0E; .NET4.0C)
Host: c.cnzz.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: Tengine
Content-Type: application/javascript
Content-Length: 763
Connection: keep-alive
Date: Sat, 22 Apr 2017 02:17:19 GMT
Last-Modified: Sat, 22 Apr 2017 02:17:19 GMT
Expires: Sat, 22 Apr 2017 02:32:19 GMT
Via: cache18.l2et2-1[58,200-0,M], cache15.l2et2-1[58,0], kunlun5.cn74[67,200-0,M], kunlun5.cn74[67,0]
X-Cache: MISS TCP_MISS dirn:3:442692646
X-Swift-SaveTime: Sat, 22 Apr 2017 02:17:19 GMT
X-Swift-CacheTime: 900
Timing-Allow-Origin: *
EagleId: deba319e14928274395726895e!function(){var p,q,r,a=encodeURIComponent,b="1253133024",c="",d="",e=
"online_v3.php",f="z7.cnzz.com",g="1",h="text",i="z",j="站
1;统计",k=window["_CNZZDbridge_" b]["bobject"],l="http:",m
="0",n=l "//online.cnzz.com/online/" e,o=[];o.push("id=" b),o.push("h=
" f),o.push("on=" a(d)),o.push("s=" a(c)),n ="?" o.join("&"),"0"===m&&
k["callRequest"]([l "//cnzz.mmstat.com/9.gif?abc=1"]),g&&(""!==d?k["cr
eateScriptIcon"](n,"utf-8"):(q="z"==i?"hXXp://VVV.cnzz.com/stat/websit
e.php?web_id=" b:"hXXp://quanjing.cnzz.com","pic"===h?(r=l "//icon.cnz
z.com/img/" c ".gif",p="<a href='" q "' target=_blank title='" j "'
><img border=0 hspace=0 vspace=0 src='" r "'></a>"):p="
<a href='" q "' target=_blank title='" j "'>" j "</a>",k["
createIcon"]([p])))}();....
GET /core.php?web_id=4755173&t=z HTTP/1.1
Accept: */*
Referer: hXXp://VVV.yzrja.com/yzsoft/statistics/yzmrxgj2_0_new.html
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0E; .NET4.0C)
Host: c.cnzz.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: Tengine
Content-Type: application/javascript
Content-Length: 762
Connection: keep-alive
Date: Sat, 22 Apr 2017 02:17:20 GMT
Last-Modified: Sat, 22 Apr 2017 02:17:20 GMT
Expires: Sat, 22 Apr 2017 02:32:20 GMT
Via: cache15.l2et2-1[58,200-0,M], cache9.l2et2-1[59,0], kunlun5.cn74[67,200-0,M], kunlun5.cn74[67,0]
X-Cache: MISS TCP_REFRESH_MISS dirn:-2:-2
X-Swift-SaveTime: Sat, 22 Apr 2017 02:17:20 GMT
X-Swift-CacheTime: 900
Timing-Allow-Origin: *
EagleId: deba319e14928274400148657e!function(){var p,q,r,a=encodeURIComponent,b="4755173",c="",d="",e="on
line_v3.php",f="hzs4.cnzz.com",g="1",h="text",i="z",j="站长
;统计",k=window["_CNZZDbridge_" b]["bobject"],l="http:",m=
"0",n=l "//online.cnzz.com/online/" e,o=[];o.push("id=" b),o.push("h="
f),o.push("on=" a(d)),o.push("s=" a(c)),n ="?" o.join("&"),"0"===m&&k
["callRequest"]([l "//cnzz.mmstat.com/9.gif?abc=1"]),g&&(""!==d?k["cre
ateScriptIcon"](n,"utf-8"):(q="z"==i?"hXXp://VVV.cnzz.com/stat/website
.php?web_id=" b:"hXXp://quanjing.cnzz.com","pic"===h?(r=l "//icon.cnzz
.com/img/" c ".gif",p="<a href='" q "' target=_blank title='" j "'&
gt;<img border=0 hspace=0 vspace=0 src='" r "'></a>"):p="&
lt;a href='" q "' target=_blank title='" j "'>" j "</a>",k["c
reateIcon"]([p])))}();....
GET /core.php?web_id=4702665&t=z HTTP/1.1
Accept: */*
Referer: hXXp://VVV.yzrja.com/yzsoft/statistics/yzmrxgj2_0_new.html
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0E; .NET4.0C)
Host: c.cnzz.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: Tengine
Content-Type: application/javascript
Content-Length: 763
Connection: keep-alive
Date: Sat, 22 Apr 2017 02:08:26 GMT
Last-Modified: Sat, 22 Apr 2017 02:08:26 GMT
Expires: Sat, 22 Apr 2017 02:23:26 GMT
Via: cache7.l2et2-1[77,200-0,M], cache13.l2et2-1[78,0], kunlun8.cn74[0,200-0,H], kunlun5.cn74[1,0]
Age: 534
X-Cache: HIT TCP_MEM_HIT dirn:-2:-2
X-Swift-SaveTime: Sat, 22 Apr 2017 02:08:26 GMT
X-Swift-CacheTime: 900
Timing-Allow-Origin: *
EagleId: deba319e14928274404512462e!function(){var p,q,r,a=encodeURIComponent,b="4702665",c="",d="",e="on
line_v3.php",f="gzs20.cnzz.com",g="1",h="text",i="z",j="站
1;统计",k=window["_CNZZDbridge_" b]["bobject"],l="http:",m
="0",n=l "//online.cnzz.com/online/" e,o=[];o.push("id=" b),o.push("h=
" f),o.push("on=" a(d)),o.push("s=" a(c)),n ="?" o.join("&"),"0"===m&&
k["callRequest"]([l "//cnzz.mmstat.com/9.gif?abc=1"]),g&&(""!==d?k["cr
eateScriptIcon"](n,"utf-8"):(q="z"==i?"hXXp://VVV.cnzz.com/stat/websit
e.php?web_id=" b:"hXXp://quanjing.cnzz.com","pic"===h?(r=l "//icon.cnz
z.com/img/" c ".gif",p="<a href='" q "' target=_blank title='" j "'
><img border=0 hspace=0 vspace=0 src='" r "'></a>"):p="
<a href='" q "' target=_blank title='" j "'>" j "</a>",k["
createIcon"]([p])))}();HTTP/1.1 200 OK..Server: Tengine..Content-Type:
application/javascript..Content-Length: 763..Connection: keep-alive..
Date: Sat, 22 Apr 2017 02:08:26 GMT..Last-Modified: Sat, 22 Apr 2017 0
2:08:26 GMT..Expires: Sat, 22 Apr 2017 02:23:26 GMT..Via: cache7.l2et2
-1[77,200-0,M], cache13.l2et2-1[78,0], kunlun8.cn74[0,200-0,H], kunlun
5.cn74[1,0]..Age: 534..X-Cache: HIT TCP_MEM_HIT dirn:-2:-2..X-Swift-Sa
veTime: Sat, 22 Apr 2017 02:08:26 GMT..X-Swift-CacheTime: 900..Timing-
Allow-Origin: *..EagleId: deba319e14928274404512462e..!function(){var
p,q,r,a=encodeURIComponent,b="4702665",c="",d="",e="online_v3.php",f="
gzs20.cnzz.com",g="1",h="text",i="z",j="站长统
5;",k=window["_CNZZDbridge_" b]["bobject"],l="http:",m="0",n=l "//<<< skipped >>>
GET /app.gif?&cna=MKuBEcuMvlMCAcLyYNqgonMO HTTP/1.1
Accept: */*
Referer: hXXp://VVV.yzrja.com/yzsoft/statistics/yzmrxgj2_0_new.html
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0E; .NET4.0C)
Connection: Keep-Alive
Host: pcookie.cnzz.com
HTTP/1.1 200 OK
Date: Sat, 22 Apr 2017 02:17:21 GMT
Content-Type: image/gif
Content-Length: 43
Connection: close
P3P: CP="NOI DSP COR CURa ADMa DEVa PSAa PSDa OUR IND UNI PUR NAV"
Set-Cookie: cna=MKuBEcuMvlMCAcLyYNqgonMO; expires=Tue, 20-Apr-27 02:17:21 GMT; path=/; domain=.cnzz.com
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache
Pragma: no-cacheGIF89a.............!.......,...........L..;..
GET /9.gif?abc=1&rnd=1300376752 HTTP/1.1
Accept: */*
Referer: hXXp://VVV.yzrja.com/yzsoft/statistics/yzmrxgj2_0_new.html
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0E; .NET4.0C)
Host: cnzz.mmstat.com
Connection: Keep-Alive
HTTP/1.1 302 Found
Date: Sat, 22 Apr 2017 02:17:20 GMT
Content-Type: image/gif
Content-Length: 43
Connection: close
P3P: CP="NOI DSP COR CURa ADMa DEVa PSAa PSDa OUR IND UNI PUR NAV"
Set-Cookie: cna=MKuBEcuMvlMCAcLyYNqgonMO; expires=Tue, 20-Apr-27 02:17:20 GMT; path=/; domain=.mmstat.com
Set-Cookie: sca=97efba05; path=/; domain=.cnzz.mmstat.com
Set-Cookie: atpsida=67d90d914519f6d1a6bcdcf0_1492827440_1; path=/; domain=.cnzz.mmstat.com
Location: hXXp://pcookie.cnzz.com/app.gif?&cna=MKuBEcuMvlMCAcLyYNqgonMO
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache
Pragma: no-cacheGIF89a.............!.......,...........L..;..
GET /stat.php?id=4755173&web_id=4755173 HTTP/1.1
Accept: */*
Referer: hXXp://VVV.yzrja.com/yzsoft/statistics/yzmrxgj2_0_new.html
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0E; .NET4.0C)
Host: s95.cnzz.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: Tengine
Content-Type: application/javascript
Content-Length: 10983
Connection: keep-alive
Date: Sat, 22 Apr 2017 01:12:00 GMT
Last-Modified: Sat, 22 Apr 2017 01:12:00 GMT
Cache-Control: max-age=5400,s-maxage=5400
Via: cache1.l2et15[0,200-0,H], cache20.l2et15[1,0], kunlun5.cn74[0,200-0,H], kunlun8.cn74[0,0]
Age: 3918
X-Cache: HIT TCP_MEM_HIT dirn:10:154446066
X-Swift-SaveTime: Sat, 22 Apr 2017 01:18:37 GMT
X-Swift-CacheTime: 5003
Timing-Allow-Origin: *
EagleId: deba31a114928274384401463e(function(){function k(){this.c="4755173";this.ca="z";this.Z="";this.W
="";this.Y="";this.C="1492823520";this.aa="hzs4.cnzz.com";this.X="";th
is.G="CNZZDATA" this.c;this.F="_CNZZDbridge_" this.c;this.P="_cnzz_CV"
this.c;this.R="CZ_UUID" this.c;this.L="UM_distinctid";this.H="0";this
.K={};this.a={};this.Aa()}function g(a,.b){try{var c=[];c.push("siteid
=4755173");c.push("name=" f(a.name));c.push("msg=" f(a.message));c.pus
h("r=" f(h.referrer));c.push("page=" f(e.location.href));c.push("agent
=" f(e.navigator.userAgent));c.push("ex=" f(b));c.push("rnd=" Math.flo
or(2147483648*Math.random()));(new Image).src="hXXp://jserr.cnzz.com/l
og.php?" c.join("&")}catch(d){}}var h=document,e=window,f=encodeURICom
ponent,m=decodeURIComponent,r=unescape;k.prototype={Aa:function(){try{
this.ja(),this.V(),this.wa(),this.T(),this.za(),.this.w(),this.ua(),th
is.ta(),this.xa(),this.o(),this.sa(),this.va(),this.ya(),this.qa(),thi
s.oa(),this.ra(),this.Ea(),e[this.F]=e[this.F]||{},this.pa("_cnzz_CV")
}catch(a){g(a,"i failed")}},Ca:function(){try{var a=this;e._czc={push:
function(){return a.M.apply(a,arguments)}}}catch(b){g(b,"oP failed")}}
,oa:function(){try{var a=e._czc;if("[object Array]"==={}.toString.call
(a))for(var b=0;b<a.length;b ){var c=a[b];switch(c[0]){case "_setA
ccount":e._cz_account="[object String]"==={}.toString.call(c[1])?.c[1]
:String(c[1]);break;case "_setAutoPageview":"boolean"===typeof c[1]&&(
e._cz_autoPageview=c[1])}}}catch(d){g(d,"cS failed")}},Ea:function(){t
ry{if("undefined"===typeof e._cz_account||e._cz_account===this.c){<<< skipped >>>
GET /yzsoft/PushAdvert/yzmrxgj/yzmrxgj2_0/2345daohang2.txt HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: VVV.yzrja.com
Cache-Control: no-cache
Cookie: safedog-flow-item=
HTTP/1.1 200
Cache-Control: no-store
Pragma: no-cache
Content-Length: 3368
Content-Type: text/html; Charset=gb2312
Server: Microsoft-IIS/7.5
X-Powered-By: WAF/2.0
Date: Sat, 22 Apr 2017 02:17:05 GMT<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "htt
p://VVV.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">.<html xml
ns="hXXp://VVV.w3.org/1999/xhtml">.<head>.<meta http-equiv
="Content-Type" content="text/html; charset=gbk2312" />.<title&g
t;</title>.</head>..<body style=" padding:0; margin:0
; font:14px/1.5 Microsoft Yahei, .....,sans-serif; color:#555;">..&
lt;div style="margin:0 auto;width:980px;">. <div style="bac
kground: url('hXXp://404.safedog.cn/images/safedogsite/head.png') no-r
epeat;height:300px;">. .<div style="width:300px;height:300p
x;cursor:pointer;background:#f00;filter: alpha(opacity=0); opacity: 0;
float:left;" onclick="location.href='hXXp://VVV.safedog.cn'">.
.</div>. .<div style="float:right;width:430px;height:10
0px;padding-top:90px;padding-right:90px;font-size:22px;">. ..&
lt;p id="error_code_p"><a id="eCode">404</a>....<sp
an style="font-size:16px;padding-left:15px;">(.....................
.......)</span></p>. ..<p id="eMsg"></p>.
.<a href="hXXp://bbs.safedog.cn/thread-60693-1-1.html?from=st
at" target="_blank" style="color:#139ff8; font-size:16px; text-decorat
ion:none">..........</a>.. <a href="#" onclick="redir
ectToHost();" style="color:#139ff8; font-size:16px; text-decoration:no
ne;padding-left: 20px;">..........>></a>. .</di
v>. </div>..</div>....<div style="width:100<<< skipped >>>
GET /stat.php?id=1253133024 HTTP/1.1
Accept: */*
Referer: hXXp://VVV.yzrja.com/yzsoft/statistics/yzmrxgj2_0_new.html
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0E; .NET4.0C)
Host: s13.cnzz.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: Tengine
Content-Type: application/javascript
Content-Length: 10987
Connection: keep-alive
Date: Sat, 22 Apr 2017 01:04:21 GMT
Last-Modified: Sat, 22 Apr 2017 01:04:21 GMT
Cache-Control: max-age=5400,s-maxage=5400
Via: cache6.l2et15[0,200-0,H], cache5.l2et15[12,0], kunlun10.cn74[20,200-0,M], kunlun4.cn74[22,0]
Age: 4377
X-Cache: MISS TCP_REFRESH_MISS dirn:9:581548343
X-Swift-SaveTime: Sat, 22 Apr 2017 02:17:18 GMT
X-Swift-CacheTime: 1023
Timing-Allow-Origin: *
EagleId: deba319d14928274383871055e(function(){function k(){this.c="1253133024";this.ca="z";this.Z="";thi
s.W="";this.Y="";this.C="1492823061";this.aa="z7.cnzz.com";this.X="";t
his.G="CNZZDATA" this.c;this.F="_CNZZDbridge_" this.c;this.P="_cnzz_CV
" this.c;this.R="CZ_UUID" this.c;this.L="UM_distinctid";this.H="0";thi
s.K={};this.a={};this.Aa()}function g(a,.b){try{var c=[];c.push("sitei
d=1253133024");c.push("name=" f(a.name));c.push("msg=" f(a.message));c
.push("r=" f(h.referrer));c.push("page=" f(e.location.href));c.push("a
gent=" f(e.navigator.userAgent));c.push("ex=" f(b));c.push("rnd=" Math
.floor(2147483648*Math.random()));(new Image).src="hXXp://jserr.cnzz.c
om/log.php?" c.join("&")}catch(d){}}var h=document,e=window,f=encodeUR
IComponent,m=decodeURIComponent,r=unescape;k.prototype={Aa:function(){
try{this.ja(),this.V(),this.wa(),this.T(),this.za(),.this.w(),this.ua(
),this.ta(),this.xa(),this.o(),this.sa(),this.va(),this.ya(),this.qa()
,this.oa(),this.ra(),this.Ea(),e[this.F]=e[this.F]||{},this.pa("_cnzz_
CV")}catch(a){g(a,"i failed")}},Ca:function(){try{var a=this;e._czc={p
ush:function(){return a.M.apply(a,arguments)}}}catch(b){g(b,"oP failed
")}},oa:function(){try{var a=e._czc;if("[object Array]"==={}.toString.
call(a))for(var b=0;b<a.length;b ){var c=a[b];switch(c[0]){case "_
setAccount":e._cz_account="[object String]"==={}.toString.call(c[1])?.
c[1]:String(c[1]);break;case "_setAutoPageview":"boolean"===typeof c[1
]&&(e._cz_autoPageview=c[1])}}}catch(d){g(d,"cS failed")}},Ea:function
(){try{if("undefined"===typeof e._cz_account||e._cz_account===this<<< skipped >>>
GET /stat.htm?id=4755173&r=&lg=en-us&ntime=none&cnzz_eid=1166190261-1492823520-&showp=1276x846&t=ÈüþʹÓÃó¼Æ&umuuid=15b93a9b7d92ce-048aa1e7e1fbf44-44703d1f-1078c8-15b93a9b7da26c&h=1&rnd=1516340663 HTTP/1.1
Accept: */*
Referer: hXXp://VVV.yzrja.com/yzsoft/statistics/yzmrxgj2_0_new.html
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0E; .NET4.0C)
Host: hzs4.cnzz.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: Tengine
Date: Sat, 22 Apr 2017 02:17:21 GMT
Content-Type: image/gif
Content-Length: 43
Last-Modified: Thu, 16 Apr 2015 02:22:34 GMT
Connection: close
Accept-Ranges: bytesGIF89a.............!.......,...........D..;..
GET /9.gif?abc=1&rnd=1755385211 HTTP/1.1
Accept: */*
Referer: hXXp://VVV.yzrja.com/yzsoft/statistics/yzmrxgj2_0_new.html
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0E; .NET4.0C)
Host: cnzz.mmstat.com
Connection: Keep-Alive
HTTP/1.1 302 Found
Date: Sat, 22 Apr 2017 02:17:21 GMT
Content-Type: image/gif
Content-Length: 43
Connection: close
P3P: CP="NOI DSP COR CURa ADMa DEVa PSAa PSDa OUR IND UNI PUR NAV"
Set-Cookie: cna=MauBEQI1LBMCAcLyYNq7RNhO; expires=Tue, 20-Apr-27 02:17:21 GMT; path=/; domain=.mmstat.com
Set-Cookie: sca=8b0df251; path=/; domain=.cnzz.mmstat.com
Set-Cookie: atpsida=96616f663da7163641caf31d_1492827441_1; path=/; domain=.cnzz.mmstat.com
Location: hXXp://pcookie.cnzz.com/app.gif?&cna=MauBEQI1LBMCAcLyYNq7RNhO
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache
Pragma: no-cacheGIF89a.............!.......,...........L..;..
GET /app.gif?&cna=MKuBEeIFe1MCAcLyYNqtIjRO HTTP/1.1
Accept: */*
Referer: hXXp://VVV.yzrja.com/yzsoft/statistics/yzmrxgj2_0_new.html
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0E; .NET4.0C)
Connection: Keep-Alive
Host: pcookie.cnzz.com
HTTP/1.1 200 OK
Date: Sat, 22 Apr 2017 02:17:21 GMT
Content-Type: image/gif
Content-Length: 43
Connection: close
P3P: CP="NOI DSP COR CURa ADMa DEVa PSAa PSDa OUR IND UNI PUR NAV"
Set-Cookie: cna=MKuBEeIFe1MCAcLyYNqtIjRO; expires=Tue, 20-Apr-27 02:17:21 GMT; path=/; domain=.cnzz.com
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache
Pragma: no-cacheGIF89a.............!.......,...........L..;..
GET /stat.htm?id=4702665&r=&lg=en-us&ntime=none&cnzz_eid=168756798-1492825623-&showp=1276x846&t=ÈüþʹÓÃó¼Æ&umuuid=15b93a9b7d92ce-048aa1e7e1fbf44-44703d1f-1078c8-15b93a9b7da26c&h=1&rnd=970127262 HTTP/1.1
Accept: */*
Referer: hXXp://VVV.yzrja.com/yzsoft/statistics/yzmrxgj2_0_new.html
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0E; .NET4.0C)
Host: gzs20.cnzz.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: Tengine
Date: Sat, 22 Apr 2017 02:17:20 GMT
Content-Type: image/gif
Content-Length: 43
Last-Modified: Thu, 16 Apr 2015 02:22:35 GMT
Connection: close
Accept-Ranges: bytesGIF89a.............!.......,...........D..;..
GET / HTTP/1.1
User-Agent: test
Host: VVV.baidu.com
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Sat, 22 Apr 2017 02:17:17 GMT
Content-Type: text/html
Content-Length: 14613
Last-Modified: Tue, 18 Apr 2017 01:09:00 GMT
Connection: Keep-Alive
Vary: Accept-Encoding
Set-Cookie: BAIDUID=9E9DCC87521361A460A5E39FF8E2EEF7:FG=1; expires=Thu, 31-Dec-37 23:55:55 GMT; max-age=2147483647; path=/; domain=.baidu.com
Set-Cookie: BIDUPSID=9E9DCC87521361A460A5E39FF8E2EEF7; expires=Thu, 31-Dec-37 23:55:55 GMT; max-age=2147483647; path=/; domain=.baidu.com
Set-Cookie: PSTM=1492827437; expires=Thu, 31-Dec-37 23:55:55 GMT; max-age=2147483647; path=/; domain=.baidu.com
P3P: CP=" OTI DSP COR IVA OUR IND COM "
Server: BWS/1.1
X-UA-Compatible: IE=Edge,chrome=1
Pragma: no-cache
Cache-control: no-cache
Accept-Ranges: bytes<!DOCTYPE html><!--STATUS OK-->..<html>..<head>
;...<meta http-equiv="content-type" content="text/html;charset=utf-
8">...<meta http-equiv="X-UA-Compatible" content="IE=Edge">..
.<link rel="dns-prefetch" href="//s1.bdstatic.com"/>...<link
rel="dns-prefetch" href="//t1.baidu.com"/>...<link rel="dns-pref
etch" href="//t2.baidu.com"/>...<link rel="dns-prefetch" href="/
/t3.baidu.com"/>...<link rel="dns-prefetch" href="//t10.baidu.co
m"/>...<link rel="dns-prefetch" href="//t11.baidu.com"/>...&l
t;link rel="dns-prefetch" href="//t12.baidu.com"/>...<link rel="
dns-prefetch" href="//b1.bdstatic.com"/>...<title>...........
................</title>...<link href="hXXp://s1.bdstatic.com
/r/www/cache/static/home/css/index.css" rel="stylesheet" type="text/cs
s" />...<!--[if lte IE 8]><style index="index" >#conten
t{height:480px\9}#m{top:260px\9}</style><![endif]-->...<
;!--[if IE 8]><style index="index" >#u1 a.mnav,#u1 a.mnav:vis
ited{font-family:simsun}</style><![endif]-->...<script&
gt;var hashMatch = document.location.href.match(/# (.*wd=[^&]. )/);if
(hashMatch && hashMatch[0] && hashMatch[1]) {document.location.replace
("hXXp://" location.host "/s?" hashMatch[1]);}var ns_c = function(){};
</script>...<script>function h(obj){obj.style.behavior='ur
l(#default#homepage)';var a = obj.setHomePage('//VVV.baidu.com/');}<
;/script>...<noscript><meta http-equiv="refresh" conte<<< skipped >>>
GET /stat.htm?id=1253133024&r=&lg=en-us&ntime=none&cnzz_eid=113380915-1492823061-&showp=1276x846&t=ÈüþʹÓÃó¼Æ&umuuid=15b93a9b7d92ce-048aa1e7e1fbf44-44703d1f-1078c8-15b93a9b7da26c&h=1&rnd=277086771 HTTP/1.1
Accept: */*
Referer: hXXp://VVV.yzrja.com/yzsoft/statistics/yzmrxgj2_0_new.html
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0E; .NET4.0C)
Host: z7.cnzz.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: Tengine
Date: Sat, 22 Apr 2017 02:17:19 GMT
Content-Type: image/gif
Content-Length: 43
Last-Modified: Thu, 16 Apr 2015 02:22:37 GMT
Connection: close
Accept-Ranges: bytesGIF89a.............!.......,...........D..;..
The Trojan connects to the servers at the folowing location(s):
.text
.rdata
.data
.rsrc
.aspack
.adata
t$(SSh
|$D.tm
~%UVW
u$SShe
ShellExecuteA
GetAsyncKeyState
{E5000198-4471-40e2-92BC-D0BA075BDBB2}{86AB1D8A-7995-4D86-AE5F-18710759228B}hXXp://VVV.yzrja.com/yzsoft/advert/yzmrxgj/title01.txt
hXXp://VVV.yzrja.com/yzsoft/advert/yzmrxgj/link01.txt
hXXp://VVV.yzrja.com/yzsoft/PushAdvert/yzmrxgj/yzmrxgj2_0/2345browser.txt
hXXp://VVV.yzrja.com/yzsoft/PushAdvert/yzmrxgj/yzmrxgj2_0/2345browserURL.txt
hXXp://VVV.yzrja.com/yzsoft/PushAdvert/yzmrxgj/yzmrxgj2_0/2345browserName.txt
2345Explorer_238853_silence.exe
\download\2345Explorer_silence.zip
WScript.Shell
hXXp://VVV.yzrja.com/yzsoft/PushAdvert/yzmrxgj/yzmrxgj2_0/2345daohang2.txt
hXXp://VVV.2345.com/?8721
anonymous@123.com
.exe|.rar|.zip|.gif|.jpg|.mp3|.rm
(*.txt)|*.txt
.comment {color:green}hXXp://VVV.yzrja.com/yzsoft/statistics/yzmrxgj2_0_new.htmln
hXXp://VVV.yzrja.com
hXXp://VVV.crsky.com/soft/26807.html
1.2.18
inflate 1.1.3 Copyright 1995-1998 Mark Adler
F%*.*f
CNotSupportedException
commctrl_DragListMsg
Afx:%x:%x:%x:%x:%x
Afx:%x:%x
COMCTL32.DLL
CCmdTarget
MSWHEEL_ROLLMSG
ole32.dll
__MSVCRT_HEAP_SELECT
user32.dll
iphlpapi.dll
SHLWAPI.dll
MPR.dll
WINMM.dll
WS2_32.dll
VERSION.dll
MSVFW32.dll
AVIFIL32.dll
RASAPI32.dll
GetProcessHeap
WinExec
GetWindowsDirectoryA
GetCPInfo
KERNEL32.dll
GetKeyState
RegisterHotKey
UnregisterHotKey
GetKeyboardLayout
VkKeyScanExA
keybd_event
SetWindowsHookExA
UnhookWindowsHookEx
EnumChildWindows
CreateDialogIndirectParamA
USER32.dll
GetViewportOrgEx
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
GetViewportExtEx
GDI32.dll
WINSPOOL.DRV
comdlg32.dll
RegCloseKey
RegOpenKeyExA
RegCreateKeyA
RegCreateKeyExA
ADVAPI32.dll
SHELL32.dll
OLEAUT32.dll
COMCTL32.dll
oledlg.dll
InternetOpenUrlA
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetCrackUrlA
InternetCanonicalizeUrlA
WININET.dll
WLDAP32.dll
.PAVCException@@
.PAVCNotSupportedException@@
.PAVCFileException@@
(*.prn)|*.prn|
(*.*)|*.*||
Shell32.dll
Mpr.dll
Advapi32.dll
User32.dll
Gdi32.dll
Kernel32.dll
(&07-034/)7 '
?? / %d]
%d / %d]
: %d]
(*.WAV;*.MID)|*.WAV;*.MID|WAV
(*.WAV)|*.WAV|MIDI
(*.MID)|*.MID|
(*.txt)|*.txt|
(*.JPG;*.BMP;*.GIF;*.ICO;*.CUR)|*.JPG;*.BMP;*.GIF;*.ICO;*.CUR|JPG
(*.JPG)|*.JPG|BMP
(*.BMP)|*.BMP|GIF
(*.GIF)|*.GIF|
(*.ICO)|*.ICO|
(*.CUR)|*.CUR|
%s:%d
windows
out.prn
%d.%d
%d / %d
%d/%d
Bogus message code %d
(%d-%d):
%ld%c
%d%d%d
rundll32.exe shell32.dll,
hXXp://VVV.baidu.com
(*.avi)|*.avi
RICHED32.DLL
RICHED20.DLL
WPFT532.CNV
WPFT632.CNV
EXCEL32.CNV
write32.wpc
Windows Write
mswrd632.wpc
Word for Windows 6.0
wword5.cnv
Word for Windows 5.0
mswrd832.cnv
mswrd632.cnv
Word 6.0/95 for Windows & Macintosh
html32.cnv
operator
keywords
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
HTTP/1.0
%s <%s>
Reply-To: %s
From: %s
To: %s
Subject: %s
Date: %s
Cc: %s
%a, %d %b %Y %H:%M:%S
SMTP
<tr><td bgcolor=buttonface>Y</td><td bgcolor=white>%d</td></tr>
<tr><td bgcolor=buttonface>X</td><td bgcolor=white>%d</td></tr>
<tr><td bgcolor=buttonface>Height</td><td bgcolor=white>%d</td></tr>
<tr><td bgcolor=buttonface>Width</td><td bgcolor=white>%d</td></tr>
<tr><td bgcolor=buttonface>RECT</td><td bgcolor=white>(%d, %d)-(%d, %d)</td></tr>
<tr><td bgcolor=buttonface>Styles</td><td bgcolor=white>0xX</td></tr>
<tr><td bgcolor=buttonface>Control ID</td><td bgcolor=white>%d</td></tr>
<tr><td bgcolor=buttonface>Handle</td><td bgcolor=white>0xX</td></tr>
<table><tr><td><icon handle=0x%X></td><td>%s</td></tr></table>
burlywood
\winhlp32.exe
TrayIcon event: %x
(*.htm;*.html)|*.htm;*.html
1.1.3
[%s:%d]
Range: bytes=%s-
[%s:%d]
PASS %s
PASS ******
USER %s
E:\dev\e\static_link\static_libs\source\downlib\mystrlib.cpp
SIZE %s
PORT
User-Agent: %s
Mozilla/4.0 (compatible; MSIE 5.00; Windows 98)
Referer: %s
Host: %s
GET %s HTTP/1.1
HTTP/1.1
hXXp://
Cookie: %s
%d, %s
\\192.168.0.129\TCP\1037
NSPlayer/9.0.0.2980; {%s}; Host: %srmff_fix_header: assuming data.size=%i
rmff_fix_header: assuming data.num_packets=%i
rmff_fix_header: assuming prop.num_packets=%i
rmff_fix_header: setting prop.data_offset from %i to %i
rmff_fix_header: correcting prop.num_streams from %i to %i
rmff_fix_header: correcting prop.size from %i to %i
%s %s %s
Session: %s
Cseq: %u
%*s %s
%*s %u
CSeq: %u
rtsp://%s:%i
rtsp://%s:%i/%s
ClientID: Linux_2.4_6.0.9.1235_play32_RN01_EN_586
GUID: 00000000-0000-0000-0000-000000000000
[%s:%d]
User-Agent: RealMedia Player Version 6.0.9.1235 (linux-2.0-libc6-i386-gcc2.95)
Range: npt=%s-
%s/streamid=1
%s/streamid=0
Transport: x-pn-tng/tcp;mode=play,rtp/avp/tcp;unicast;mode=play
If-Match: %s
RealChallenge2: %s, sd=%s
Title: %s
Copyright: %s
Author: %s
real: Content-length for description too big (> %uMB)!
Require: com.real.retain-entity-for-setup
SupportsMaximumASMBandwidth: 1
Bandwidth: %u
Challenge1: %s
hash output: %x %x %x %x
hash input: %x %x %x %x
stream=%u;rule=%u,
Illegal character '%c' in input.
.PAVCOleException@@
.PAVCObject@@
.PAVCSimpleException@@
.PAVCMemoryException@@
.?AVCNotSupportedException@@
.PAVCResourceException@@
.PAVCUserException@@
.?AVCCmdTarget@@
.?AVCCmdUI@@
.?AVCTestCmdUI@@
.PAVCOleDispatchException@@
.PAVCArchiveException@@
zcÁ
filedown_238858.exe.net/filedown_238858.zip>
c:\%original file name%.exe
#include "l.chs\afxres.rc" // Standard components
kernel32.dll
The procedure entry point %s could not be located in the dynamic link library %s
The ordinal %u could not be located in the dynamic link library %s
winmm.dll
ws2_32.dll
msvfw32.dll
avifil32.dll
rasapi32.dll
gdi32.dll
winspool.drv
advapi32.dll
shell32.dll
oleaut32.dll
comctl32.dll
wininet.dll
wldap32.dll
(*.*)
2.0.0.0
(C)hXXp://VVV.yzrja.com
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:1976
- Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
C:\Ó¦ÓÃÅäÖÃ.ini (1273 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\3WIYROR0.txt (103 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\WZUK671P.txt (301 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\stat[1].gif (43 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\yzmrxgj2_0_new[1].htm (691 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\XJ1SY4A9.txt (94 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\core[1].js (763 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\stat[1].gif (43 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8D93UTC3\stat[2].gif (43 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\LOTCKZQQ.txt (94 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25FDO7QC\stat[1].js (1321 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\core[1].js (763 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\D09L9HMD.txt (379 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\V9Q5P1VU.txt (447 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\N44KR7LG.txt (92 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\IJI2X89X.txt (92 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\5E0Y784H.txt (133 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JYNOWECL\stat[1].js (1321 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\core[1].js (762 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\5IQPOJ12.txt (94 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\IN7QKBDK.txt (115 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\TU5QSY09.txt (92 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4ZZNMJGQ\stat[1].js (1321 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\9FJS561V.txt (643 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.