Gen.Trojan.Heur.HHWB0QZCbi_75261f6679
Trojan-Dropper.Win32.Injector.jksa (Kaspersky), Gen:Trojan.Heur.HHW@!B0QZCbi (B) (Emsisoft), Gen:Trojan.Heur.HHW@!B0QZCbi (AdAware), Trojan.Win32.IEDummy.FD, mzpefinder_pcap_file.YR (Lavasoft MAS)
Behaviour: Trojan-Dropper, Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 75261f6679a80da7d74a4c5ae7fde8f5
SHA1: 31235f6ec4a650e814ff0988c9c2710b421fc40b
SHA256: 36e61c3488453a69d502aa2925f0e6c01c8655f7ffd8d4ac714142e61fdd81de
SSDeep: 49152:oc//////ZTKJP5AyK6K392CEWWvz4umDPOMST7DZx:oc//////exAyy392/Bz4ZxST7j
Size: 1594880 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: BorlandDelphi30, BorlandDelphiv30, UPolyXv05_v6
Company: CodecPerformer
Created at: 1992-06-20 01:22:17
Analyzed on: WindowsXPESX SP3 32-bit
Summary:
Trojan-Dropper. Trojan program, intended for stealth installation of other malware into user's system.
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
%original file name%.exe:1836
verclsid.exe:1396
verclsid.exe:1048
verclsid.exe:532
verclsid.exe:668
sc.exe:1772
net1.exe:536
tj1.exe:1760
net.exe:2036
cj1.exe:824
mscorsvw.exe:1912
gamedmon.exe:580
The Trojan injects its code into the following process(es):
svohost.exe:1164
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process %original file name%.exe:1836 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\Ãâ€ÃƒÂ¬ÃƒÆ’ÎÎ÷ÓÎ3ħÉñ¸¨Öú¶þ´úV1 6.zip (7386 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\tj1.exe (193 bytes)
The process tj1.exe:1760 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Start Menu\Æô¶¯\å¸载.lnk (663 bytes)
%Program Files%\Æô¶¯\Uninstall.exe (202 bytes)
%Program Files%\Æô¶¯\Æô¶¯.exe (3 bytes)
%Documents and Settings%\%current user%\Start Menu\Æô¶¯\Æô¶¯.lnk (636 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\gamedmon.exe (176 bytes)
The process svohost.exe:1164 makes changes in the file system.
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\cj1.exe (0 bytes)
%System%\svohost.txt (0 bytes)
The process cj1.exe:824 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%System%\svohost.exe (2105 bytes)
%System%\s_svost.ini (11 bytes)
%System%\svohost.txt (38 bytes)
The process gamedmon.exe:580 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\cj1.exe (2105 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\tj1[1].jpg (296 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\updatetimezone.ini (1776 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\cj1.jpg (174475 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\cj1[1].exe (174329 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\tj1[1].jpg (592 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KB1024FB11 (68 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KB1024FB13 (80 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\cj1.jpg (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\tj1[1].jpg (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\tj1[1].jpg (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\updatetimezone.ini (0 bytes)
Registry activity
The process %original file name%.exe:1836 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "27 1E 06 10 23 A0 38 B5 C3 7B 94 C5 31 B0 FF 38"
The process verclsid.exe:1396 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "92 A4 0F C9 9B 00 6B D5 AE 02 80 E9 C2 D2 78 05"
The process verclsid.exe:1048 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C8 1C 27 51 D3 F8 43 A8 28 B7 C3 D4 FC 8E 65 44"
The process verclsid.exe:532 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "22 46 CE AB A5 58 64 CE F7 54 BE BE DE 07 7F 6A"
The process verclsid.exe:668 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "91 7D 7E FD D1 4B DA 2C 56 D2 26 BC 2C 74 6A E9"
The process sc.exe:1772 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BD 94 68 3A 11 59 AE 12 44 C1 74 BD D4 F0 92 3D"
The process net1.exe:536 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CA B1 DC 45 8A 93 5C 81 BD B6 88 5E 5A 8C D9 AB"
The process tj1.exe:1760 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Æô¶¯]
"InstallLocation" = ""
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Start Menu" = "%Documents and Settings%\All Users\Start Menu"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
"Startup" = "%Documents and Settings%\%current user%\Start Menu\Programs\Startup"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Æô¶¯]
"UninstallString" = "%Program Files%\Æô¶¯\Uninstall.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"My Pictures" = "%Documents and Settings%\%current user%\My Documents\My Pictures"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
"CommonVideo" = "%Documents and Settings%\All Users\Documents\My Videos"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Æô¶¯]
"DisplayName" = "Æô¶¯.exe"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonMusic" = "%Documents and Settings%\All Users\Documents\My Music"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Start Menu" = "%Documents and Settings%\%current user%\Start Menu"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonPictures" = "%Documents and Settings%\All Users\Documents\My Pictures"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "91 5D D6 32 28 9C F7 73 0F C0 D7 DF F3 39 BA E9"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Æô¶¯]
"DisplayIcon" = "%Program Files%\Æô¶¯\Æô¶¯.exe"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
"IntranetName" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
The process net.exe:2036 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "3C A8 9F CB 37 DF 99 7D F3 B5 54 F8 7D 6A 05 8F"
The process svohost.exe:1164 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8E B3 23 E3 61 BC 94 90 D9 13 41 15 A0 A2 AF 6F"
The process mscorsvw.exe:1912 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\.NETFramework\v2.0.50727\NGenService\State]
"AccumulatedWaitIdleTime" = "2340000"
The process gamedmon.exe:580 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 16 00 00 00 01 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "63 17 FB 66 8D 4E E4 F6 D8 72 75 D2 51 4C C6 46"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
Dropped PE files
| MD5 | File path |
|---|---|
| ceef802c5f0704313fa75ab44dfd2fdb | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\gamedmon.exe |
| 161c564e115202dd0779a6c104173b59 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\cj1[1].exe |
| 255397a0bde4c291da77d608653d111c | c:\Program Files\Æô¶¯\Uninstall.exe |
| 161c564e115202dd0779a6c104173b59 | c:\WINDOWS\system32\svohost.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| CODE | 4096 | 40132 | 40448 | 4.51834 | b90760b922c8449c49b96f855e382df6 |
| DATA | 45056 | 15632 | 15872 | 5.26127 | 1fb0fcf0a8c302fd1e7df6150f434d7e |
| BSS | 61440 | 1825 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| .idata | 65536 | 1730 | 2048 | 2.91217 | 9e9581a6aeb1c6de49e8280941f8bb34 |
| .tls | 69632 | 8 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| .rdata | 73728 | 24 | 512 | 0.142404 | 996c4942e3a4d2795a22f3ace698d094 |
| .reloc | 77824 | 1792 | 2048 | 4.24404 | d645c969d7346a611453d5e9e94c66f4 |
| .rsrc | 81920 | 1532736 | 1532928 | 5.54507 | 194558ca00adaa6af207bd623538361d |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://js.users.51.la/17119807.js | |
| web.51.la |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET POLICY HTTP Request on Unusual Port Possibly Hostile
Traffic
GET /17119807.js HTTP/1.1
Accept: */*
Referer: hXXp://162.218.30.90:801/51tj/tj1.html
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: js.users.51.la
Connection: Keep-Alive
HTTP/1.1 200 OK
Cache-Control: max-age=300
Content-Length: 1931
Content-Type: application/x-javascript
Last-Modified: Wed, 16 Jul 2014 03:30:40 GMT
Accept-Ranges: bytes
ETag: "b6206c51a6a0cf1:1818"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 25 Sep 2014 12:21:52 GMT
Connection: closedocument.write ('<a href="hXXp://VVV.51.la/?17119807" target="_blan
k" title="51.la 专业、
免费、强健的访问߭
F;计">网站统计</a>\n');..var a9
807tf="51la";var a9807pu="";var a9807pf="51la";var a9807su=window.loca
tion;var a9807sf=document.referrer;var a9807of="";var a9807op="";var a
9807ops=1;var a9807ot=1;var a9807d=new Date();var a9807color="";if (na
vigator.appName=="Netscape"){a9807color=screen.pixelDepth;} else {a980
7color=screen.colorDepth;}..try{a9807tf=top.document.referrer;}catch(e
){}..try{a9807pu =window.parent.location;}catch(e){}..try{a9807pf=wind
ow.parent.document.referrer;}catch(e){}..try{a9807ops=document.cookie.
match(new RegExp("(^| )a9807_pages=([^;]*)(;|$)"));a9807ops=(a9807ops=
=null)?1: (parseInt(unescape((a9807ops)[2])) 1);var a9807oe =new Date(
);a9807oe.setTime(a9807oe.getTime() 60*60*1000);document.cookie="a9807
_pages=" a9807ops ";path=/;expires=" a9807oe.toGMTString();a9807ot=do
cument.cookie.match(new RegExp("(^| )a9807_times=([^;]*)(;|$)"));if(a9
807ot==null){a9807ot=1;}else{a9807ot=parseInt(unescape((a9807ot)[2]));
a9807ot=(a9807ops==1)?(a9807ot 1):(a9807ot);}a9807oe.setTime(a9807oe.
getTime() 365*24*60*60*1000);document.cookie="a9807_times=" a9807ot ";
path=/;expires=" a9807oe.toGMTString();}catch(e){}..try{if(document.co
okie==""){a9807ops=-1;a9807ot=-1;}}catch(e){}..a9807of=a9807sf;if(a980
7pf!=="51la"){a9807of=a9807pf;}if(a9807tf!=="51la"){a9807of=a9807t<<< skipped >>>
The Trojan connects to the servers at the folowing location(s):
.text
`.rdata
@.data
.rsrc
@.reloc
SSSSh
.hL!B
Uxs.Ux!
RVxt.Vx
Applications\iexplore.exe\shell\open\command
kernel32.dll
HTTP ANALYZER
MALWAREDEFENDER.EXE
OD.EXE
WSEXPLORER.EXE
WIRESHARK.EXE
SNIFFER.EXE
FIDDLER.EXE
HTTPANALYZERSTDV3.EXE
Windows update
Software\Microsoft\Windows\CurrentVersion\Run
HTTP/1.0
password
Failed to set an internet option (%u)
Failed to connect to server (%s:%u)
Failed to read from network (%u bytes)
Failed to write to network (%u bytes)
updatetimezone.ini
%d.%d
nopasswd
name%d
url%d
urlbind%d
XXXXXX
System\CurrentControlSet\Control\Network\{4D36E972-E325-11CE-BFC1-08002BE10318}Unknown operating system
Windows 2000
Windows XP
Windows Server 2003
Windows XP Professional x64 Edition
Windows Storage Server 2003
Windows Server 2003 R2
Windows Server 2008 R2
Windows 7
Windows Server 2008
Windows Vista
1620127iso_646.irv:19911351932windows-519320920001x-cp20001
1000932csshiftjis
1350221windows-502210712000cp12000
1028597iso_8859-70628605latin90501200utf160700154ptcp1541410010x-mac-romanian
1410001x-mac-japanese1200932cswindows31j
0601251cp12511201258windows-12580601125cp1125
1201257windows-12570601250cp12500601133cp1133
1201256windows-12561100932windows-31j
1000936csgb2312801201255windows-1255
1201254windows-1254
1052936hz-gb-23121201253windows-12531400949ks_c_5601_19871528599iso_8859-9:19890601201cp1201
0601200cp12001201252windows-1252
0810029x-mac-ce1201251windows-12511528598iso_8859-8:19880900949ks_c_56011110000csmacintosh
1201250windows-12501300932shifft_jis-ms
1528597csisolatingreek1100874windows-874
1100936windows-9360520127ascii
1100932windows-9321100437codepage437
0928596iso8859-60900154csptcp154
<>=\/?!"';
http-equiv
SELECT * FROM Win32_OperatingSystem
\\.\%s#{ad498944-762f-11d0-8dcb-00c04fc3358c}deflate 1.1.4 Copyright 1995-2002 Jean-loup Gailly
inflate 1.1.4 Copyright 1995-2002 Mark Adler
UrlUnescapeA
SHLWAPI.dll
MSVCR90.dll
_amsg_exit
_acmdln
_crt_debugger_hook
GetProcessHeap
KERNEL32.dll
EnumWindows
USER32.dll
RegCloseKey
RegOpenKeyExA
RegOpenKeyA
ADVAPI32.dll
ShellExecuteA
ShellExecuteExA
SHELL32.dll
ole32.dll
OLEAUT32.dll
InternetOpenUrlA
HttpAddRequestHeadersA
HttpQueryInfoA
HttpEndRequestA
InternetCrackUrlA
InternetCanonicalizeUrlA
HttpOpenRequestA
HttpSendRequestExA
WININET.dll
IPHLPAPI.DLL
NETAPI32.dll
.?AVCHttpFile@@
.?AVCHttpConnection@@
1.1.4
\www\jpg\hXXp://122.226.56.132:808/img/tj1.jpg\hXXp://tj.yuemar.com/count.asp\0\0
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
<assemblyIdentity type="win32" name="Microsoft.VC90.CRT" version="9.0.21022.8" processorArchitecture="x86" publicKeyToken="1fc8b3b9a1e18e3b"></assemblyIdentity>
00u0
6 6$6(60646
eHTTP/1.1
Content-Type: application/x-www-form-urlencoded
User-Agent: %s/%s (Windows %s)
dd.yuemar.net
/verify/verify.php
OperatingSystem
WindowsDirectory
2, 0, 0, 0
Microsoft(R) Windows(R) Operating System
usb3mon.exe
svohost.exe_1164:
.text
`.rdata
@.data
.rsrc
@.aspack
.adata
.aspack
SSSSh
L$TQSSh
aSSSh
FTPjK
FtPj;
C.PjRV
FTPQ
kernel32.dll
mscoree.dll
Please contact the application's support team for more information.
- Attempt to initialize the CRT more than once.
- CRT not initialized
KERNEL32.DLL
portuguese-brazilian
operator
GetProcessWindowStation
USER32.DLL
deflate 1.2.8 Copyright 1995-2013 Jean-loup Gailly and Mark Adler
1.2.8
inflate 1.2.8 Copyright 1995-2013 Mark Adler
svohost.log
svohost.exe
s_svost.ini
net stop %s
sc.exe delete %s
svohost1.exe
svohost.txt
sc.exe create %s binpath= "%s internal_start" DisplayName= %s start= auto
net start %s
192.168.1.15
\svohost.txt
taskh0st.exe
svch0st.exe
service.exe
win1ogon.exe
rund1132.exe
"%s" "%s"
client.log
WS2_32.dll
1234567890
Windows NT
[%d,%d.%d]
Windows 95
Windows 98
Windows Me
XXXXXX
e:\work\WebTools\bin\client_ex.pdb
KERNEL32.dll
USER32.dll
ReportEventA
RegOpenKeyExA
RegCloseKey
ADVAPI32.dll
WTSAPI32.dll
iphlpapi.dll
GetProcessHeap
GetCPInfo
GetConsoleOutputCP
zcÁ
.?AVCClientTcpSocket@@
%System%\svohost.exe
.rdata
.data
EØ)
!M6%s
V\%sK
uc.hZ
.WfGI
.zk.NU
[Q.eN
.Vs8?)
(,'-&.%/$
cOXY/P.Z0.0.QR00/ZPP0000000/0PPZR.BI@/DE0,
user32.dll
The procedure entry point %s could not be located in the dynamic link library %s
The ordinal %u could not be located in the dynamic link library %s
advapi32.dll
ole32.dll
oleaut32.dll
ws2_32.dll
wtsapi32.dll
svohost.exe_1164_rwx_00487000_00006000:
kernel32.dll
user32.dll
The procedure entry point %s could not be located in the dynamic link library %s
The ordinal %u could not be located in the dynamic link library %s
advapi32.dll
ws2_32.dll
wtsapi32.dll
iphlpapi.dll
iexplore.exe_1316:
%?9-*09,*19}*09
.text
`.data
.rsrc
msvcrt.dll
KERNEL32.dll
NTDLL.DLL
USER32.dll
SHLWAPI.dll
SHDOCVW.dll
Software\Microsoft\Windows\CurrentVersion\Explorer\BrowseNewProcess
IE-X-X
rsabase.dll
System\CurrentControlSet\Control\Windows
dw15 -x -s %u
watson.microsoft.com
IEWatsonURL
%s -h %u
iedw.exe
Iexplore.XPExceptionFilter
jscript.DLL
mshtml.dll
mlang.dll
urlmon.dll
wininet.dll
shdocvw.DLL
browseui.DLL
comctl32.DLL
IEXPLORE.EXE
iexplore.pdb
ADVAPI32.dll
MsgWaitForMultipleObjects
IExplorer.EXE
IIIIIB(II<.Fg
7?_____ZZSSH%
)z.UUUUUUUU
,....Qym
````2```
{.QLQIIIKGKGKGKGKGKG;33;33;0
8888880
8887080
browseui.dll
shdocvw.dll
6.00.2900.5512 (xpsp.080413-2105)
Windows
Operating System
6.00.2900.5512
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:1836
verclsid.exe:1396
verclsid.exe:1048
verclsid.exe:532
verclsid.exe:668
sc.exe:1772
net1.exe:536
tj1.exe:1760
net.exe:2036
cj1.exe:824
mscorsvw.exe:1912
gamedmon.exe:580 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings%\%current user%\Local Settings\Temp\Ãâ€ÃƒÂ¬ÃƒÆ’ÎÎ÷ÓÎ3ħÉñ¸¨Öú¶þ´úV1 6.zip (7386 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\tj1.exe (193 bytes)
%Documents and Settings%\%current user%\Start Menu\Æô¶¯\å¸载.lnk (663 bytes)
%Program Files%\Æô¶¯\Uninstall.exe (202 bytes)
%Program Files%\Æô¶¯\Æô¶¯.exe (3 bytes)
%Documents and Settings%\%current user%\Start Menu\Æô¶¯\Æô¶¯.lnk (636 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\gamedmon.exe (176 bytes)
%System%\svohost.exe (2105 bytes)
%System%\s_svost.ini (11 bytes)
%System%\svohost.txt (38 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\cj1.exe (2105 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\tj1[1].jpg (296 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\updatetimezone.ini (1776 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\cj1.jpg (174475 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\cj1[1].exe (174329 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\tj1[1].jpg (592 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KB1024FB11 (68 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KB1024FB13 (80 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.