Gen.Variant.Graftor.175590_1e17b2e9f0
Gen:Variant.Graftor.175590 (B) (Emsisoft), Gen:Variant.Graftor.175590 (AdAware), TrojanFlyStudio.YR (Lavasoft MAS)
Behaviour: Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 1e17b2e9f0ae5777b274bd60bad96829
SHA1: df7595b50c0b251d30977013c1b9c7baaadcdd6b
SHA256: d10706b8ea9f0b07725d2b84ede7eb3d3b9300dee60fbc0add90c7a6eb5ed6d2
SSDeep: 49152:PuGHK7RZUbQhvUT5hC9i PAGPLBEHpgkT ch5x/aMEX:1ShsT5hki AGPLBEHphT/h5Mb
Size: 1692160 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2015-03-22 08:57:50
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
No processes have been created.
The Trojan injects its code into the following process(es):
yybox.exe:1304
%original file name%.exe:636
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process yybox.exe:1304 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\3879[1] (567 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\loading[1].swf (9541 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@yy[2].txt (334 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\loading[1].swf (430 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\crossdomain[1].xml (432 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\core[1].bmp (154233 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@yystatic[1].txt (189 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\crossdomain[1].xml (265 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\crossdomain[1].htm (260 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@yystatic[2].txt (361 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\main[1].swf (388 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\3879[1].htm (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\3879[1].swf&_=46553400 (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\main[1].swf (1967 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\crossdomain[2].htm (260 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (4240 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\3879[1].swf&_=46553400 (693 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@yy[1].txt (179 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\crossdomain[1].xml (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\3879[1] (0 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\MSHist012014040920140410\index.dat (0 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@yystatic[1].txt (0 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\MSHist012014040920140410 (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\3879[1].swf&_=46553400 (0 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@yy[1].txt (0 bytes)
The process %original file name%.exe:636 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\1e17b2e9f0_881.exe (10815 bytes)
%WinDir%\yybox.exe (1751 bytes)
C:\SkinH_EL.dll (88 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (964 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@baidu[1].txt (198 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\1127734\TemporaryFile (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\1127734\TemporaryFile\TemporaryFile (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\1127734 (0 bytes)
Registry activity
The process yybox.exe:1304 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012015041520150416]
"CacheRepair" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012015041520150416]
"CachePath" = "%USERPROFILE%\Local Settings\History\History.IE5\MSHist012015041520150416\"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012015041520150416]
"CacheLimit" = "8192"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1F 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012015041520150416]
"CacheOptions" = "11"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "12 12 39 A8 AC 79 A3 1E 47 00 53 24 04 05 AB CA"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012015041520150416]
"CachePrefix" = ":2015041520150416:"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"yybox" = "%WinDir%\yybox.exe"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan deletes the following registry key(s):
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012014040920140410]
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process %original file name%.exe:636 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Multimedia\DrawDib]
"vga.drv 1916x902x32(BGR 0)" = "31,31,31,31"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 20 00 00 00 01 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0D 3C AF 05 D8 19 51 04 DD 39 32 AD 7A 24 97 C0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
Dropped PE files
| MD5 | File path |
|---|---|
| 147127382e001f495d1842ee7a9e7912 | c:\SkinH_EL.dll |
| 2c319004ef54d46c26bc7256d2fb8d36 | c:\WINDOWS\yybox.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| UPX0 | 4096 | 1253376 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| UPX1 | 1257472 | 1687552 | 1683968 | 5.41964 | 3cce881bc5f973217e9387262e2f5ace |
| .rsrc | 2945024 | 8192 | 7168 | 3.6519 | 6d38bd4929c28a9a7c3258a054798fe5 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://hi.n.shifen.com/sqresxyrqmbmsyd/item/fabb7dc1cb1cc23e0ad93ac4 | |
| hxxp://tming.ys168.com/ | |
| hxxp://yy.com/s/3879/2344444135/main.swf | |
| hxxp://cc00077.h.cnc.ccgslb.com.cn/r/rc/main/main/1/53/main.swf?type=mini&topSid=3879&subSid=2344444135 | |
| hxxp://cc00077.h.cnc.ccgslb.com.cn/r/rc/main/main/1/43/main.swf?type=main&topSid=3879&subSid=2344444135&referer=http://yy.com/s/3879/2344444135/main.swf | |
| hxxp://yy.com/crossdomain.xml | |
| hxxp://yy.com//get-data/3879?subSid=2344444135&type=main&referer=hxxp://yy.com/s/3879/2344444135/main.swf&_=46553400 | |
| hxxp://weblbs.yystatic.com/crossdomain.xml | |
| hxxp://weblbs.yystatic.com//get-data/3879?subSid=2344444135&type=mini&_=1651379 | |
| hxxp://cc00077.h.cnc.ccgslb.com.cn/r/rc/main/loading/1/7/loading.swf | |
| hxxp://cc00077.h.cnc.ccgslb.com.cn/r/rc/main/core/1/449/core.bmp | |
| hxxp://weblbs2.yystatic.com/crossdomain.xml | |
| hxxp://cc00077.h.cnc.ccgslb.com.cn/r/rc/mini/loading/1/17/loading.swf | |
| hxxp://vr.duowan.com/crossdomain.xml | |
| hxxp://vr.duowan.com/mainstat.html?s=101&topSid=3879&subSid=2344444135&type=mini&tuna=115.238.59.218&res=24&getT=1954&qva=0 | |
| hxxp://hi.baidu.com/sqresxyrqmbmsyd/item/fabb7dc1cb1cc23e0ad93ac4 | |
| hxxp://c1.web.yystatic.com/r/rc/mini/loading/1/17/loading.swf | |
| hxxp://c1.web.yy.com/r/rc/main/loading/1/7/loading.swf | |
| hxxp://c1.web.yy.com/r/rc/main/main/1/53/main.swf?type=mini&topSid=3879&subSid=2344444135 | |
| hxxp://c1.web.yy.com/r/rc/main/core/1/449/core.bmp | |
| hxxp://c1.web.yy.com/r/rc/main/main/1/43/main.swf?type=main&topSid=3879&subSid=2344444135&referer=http://yy.com/s/3879/2344444135/main.swf | |
| hxxp://tming1.ys168.com/ |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET POLICY Unsupported/Fake Windows NT Version 5.0
ET POLICY Outdated Windows Flash Version IE
Traffic
GET /r/rc/main/main/1/43/main.swf?type=main&topSid=3879&subSid=2344444135&referer=http://yy.com/s/3879/2344444135/main.swf HTTP/1.1
Accept: */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: c1.web.yy.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: nginx
Date: Tue, 14 Apr 2015 19:17:23 GMT
Content-Type: application/x-shockwave-flash;charset=UTF-8
Content-Length: 10735
Last-Modified: Wed, 20 Nov 2013 02:27:55 GMT
Expires: Wed, 15 Apr 2015 19:17:23 GMT
Cache-Control: max-age=86400
Age: 22889
Powered-By-ChinaCache: HIT from CNC-YG-2-3gA.12CWS.QG..x..<.t[..w.{zWO.-......$&N..d!..!.....`;d."..%.%.I..RL...-4
.........[..oi..&...B..F........}O^...o<...s....3s.>s....c3.....
.q.c..........k;...mC.h.....C..pmu...[..............5.../........w[e41
.|.`..H....d8.u....F.....\...L.G...r._......d.zQ."d4.....C.....p$.....
[email protected]$..n ..8...6.Rg..|1Z.B..&.]1EM/...........?..
DVb..).bx...'B........V}..^..........>.G.....``ES..M.BFo2..#.......
h....^X}...........|!k.2..F..;."(...L..r.;Q.;.5..7.eo.].....wF>.^b.
~.!........._|w....?:.j._.\}.z...R.....N/|`......g.>......yv={k{[1.
...,...........d.....n.p.3..PjsW.......Cm//e.,..ji.`.=.......Vo.".V...
)..(J`....f...Kes..J.....i.....)a=w..\.k.8.-......E......R..F_...o.z.=
.i.........=.;.. ...^......:?..Jy...#U...oI.......6...=...U.[y...T....
$...XA. .v..9C_$...G.......S0..{.....U....~...266:..:z...w..........#.
$ *7k.k._~.#>[email protected]..,...@\4..d....V}.H2.Ih.....x
..=wM<6..$.bpN..)...3.....x8.}.K.G..>....Qe....Dg=.N.G..M]I.6 &g
t;.#:[...,.O..#[email protected]]............]..*d3.k.W...m..6.iC.....J4..
.v..}8@o......<.5.a@{..,.P...hm......,&.4.Q...H...0.6.$.9.H...V.y:.
..6.Rk.m...".a%..'U...".. .M..f.@~<0.N$...D.7..y....C...Y......z...
.fb...[...f...fl_....,F'.m.E.bC.....D.".-.H..Y....MQ.$..0...2....t.e.y
4jm..kB...."\.A.i.aF..N[..........n.y..@....`.k.gt..D;J.....N..\...I(.
............jE....R7l ..u:...iÜ...5...{..af.......cj.c...)...G8O....
...cO.}.[6.,.%......<k......R,eIy1.3YT.....k......'M[.k.$E.zh<w"
..3.~-....}y....G.6......(....h.1.w...d..}80.3....!!e.....%.(.m...<<< skipped >>>
GET /r/rc/main/core/1/449/core.bmp HTTP/1.1
Accept: */*
Accept-Language: en-US
Referer: hXXp://c1.web.yy.com/r/rc/main/main/1/43/main.swf?type=main&topSid=3879&subSid=2344444135&referer=http://yy.com/s/3879/234444413
x-flash-version: 11,6,602,168
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: c1.web.yy.com
Connection: Keep-Alive
Cookie: __wyy=6b7173887cf74a93b533e7156ed7bb85; hiido_ui=0.7859214506520492; JSESSIONID=yf51tqgtpwbg6uvo1ul0sksg6743s.yf5
HTTP/1.1 200 OK
Server: nginx
Date: Tue, 14 Apr 2015 18:21:26 GMT
Content-Length: 467365
Last-Modified: Fri, 10 Oct 2014 07:34:33 GMT
Expires: Wed, 15 Apr 2015 18:21:26 GMT
Cache-Control: max-age=86400
Age: 26251
Powered-By-ChinaCache: HIT from CNC-YG-2-3gA.12....u.-}!.[!g..{..eW.7.....Z.....V...Y.).....ALZFC....0..{.'..1.p..|f.
.cAl..B.X.=..E....Z....y.>...".kd..."}.lk.dy;.E. ...JU.... ..m.....
..."..$.7.:LZ....y;Z..H.p.:{.............9S.....XxW...So.e...A.....w..
.\.D....Vr..|.....'J.q.;.2EW..M..G?K./>7..j........A...../....6)B
K......".....&.>.BO.t.r.9A..`......C..|TT.X..........K. Qj#;:..C...
O.c.......).&.:...d.`[email protected]..`Ew.fb..r...=.\{i.c.?.Rw.....p
.c.u5...3.s...A.s.$v....!....:..IW.w]..TBW......>.f....<..!/k.9!
34..#'e.H..B.....~S."..Nc [email protected]~.....X.......Q.!...Z.K.....s._...g.
?...aT.XU...!.}.........&..1..'..&..F..gq.A.X4*u.y.`.$K.:3X.M%}u_..7%W
.....V...`!.#.....r;......`,......7b.A..#...j.%E .q..7...b.g-....j0...
....xu..9~.....2......... ...........Hp.u.A...,[email protected]..{nE...l
c.u.....{...=.G.....T'..#;.w..b!...........i7..p........e.B..l......e.
..nALP.gH[.K/\....7Q.K.F:W.5cZ`...k.wR......C.. F.p.......t..&Rr..OM.I
....$...~/.W..D5E.0.F.3j.1.....=_I....,....9I1.T..p)B...)..l....l=..1.
$...I..B.i..`...s...7t.i([email protected]}.f....j..<..d.......G..";
a.^R..0.z...G...../VP.......n.;.L........h..i..u.;.k..{h`4....Z..9....
.f7.2..A.....3//du,...g..ev...Es%.....*.J....H[AkXm.......P.;....9e.A*
[.C.........{..<w.......a..h...@..)n..G..........&7..O`.FV.Az....4H
.\..*V]Z.R..>...Z.........-..W..N...w._.....M......:9.e...m........
.......ZZ..b..........kUU...........Pc.....s..[BB..(C.*._. RR4o...4..9
z..?.LI....5....73....wT_..1....D.j..#0.t...p..R.t.V:...4I...z.eA.}wR-
..R.f.(.m......;...X....Y....8.;....A.na3[~.................x{q..H<<< skipped >>>
GET /r/rc/main/main/1/53/main.swf?type=mini&topSid=3879&subSid=2344444135 HTTP/1.1
Accept: */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: c1.web.yy.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: nginx
Date: Tue, 14 Apr 2015 18:21:17 GMT
Content-Type: application/x-shockwave-flash;charset=UTF-8
Content-Length: 11268
Last-Modified: Tue, 16 Dec 2014 07:37:43 GMT
Expires: Wed, 15 Apr 2015 18:21:17 GMT
Cache-Control: max-age=86400
Age: 26255
Powered-By-ChinaCache: HIT from CNC-YG-2-3gA.12CWS..L..x..|.`[.....V....s8..8.Ql..@ ....;..l...e..,.,.I..B1....p.C...
...M..";$iii...'_.. =...}O...~.~.yo.........6....c..16.X.}.c..1o.c'%:C
KZj].M..Xr.bKg.S..%...7n....".......'TV-.\.`.J.Kn..|....3f.,.....D.'..
...............!.=...P....F...X*Y9.b>*..,..........h$.#u...%.....}.
..BQ_2|R.. .IER.....q.....79.9....i]..;.'zr.2}.."....I.;{.8.....s....^
.4....'.....7.C.SI&...R...Y....XW.. xr]....b..T....*..W1.....I....Q.6(
.}'.Z.W.I.F.d2gXd._.A.v.....?.-....[.}..{.mE"..?....%..../...~..%..\8.
.9....-......m_.[..o/.:W;o.Wi....7....nx...d...H.{Q:..._......s......R
.#o\..G...,._...7E.....]...c.bQCW..h..>._.[.S..."..Ne...{....e..g..
....m.?......u...u....M......=f.X..sb.\.#.R.....o...I~....}.......i7H.
.{..o.....k/e.7..)...^..Y..{[email protected]...}YY.W....._..o&..........X.2....l
2..i.{%.eG..U...0X.QY.....n.t.7tD...H...T.g.y.c...;8..X..|...r..L!.t.C
o.C.5r_....f...o.....{..n.A........O.7..p.....!.....[..@.... ..].H....
.E..zSkM%p:0K...RV.co*.M..oN.........xW".L..E..@o"..<../...A_L..u%.
[email protected].[...bc..y.>t.Y.x....nn....)d8......;
".H..o....j})..N.Jq.R.....SA.hX<.X".5.D0.:FP.....ul..&.mDF0a.W....k
Z.....-M.....#1....O...ZG.....AI..3i.......q.....H.&...:R.C........;..
.yb...0.%.t4.....9S2.ZM.*d0-.l.. ..$[.m..L.....9..8.J.!.L.>....Z."N
.........G...m.|....,[email protected]@Rk.Gt.....1..Z#.......dM......oF
...F.g.........1&........!..xO.S...{....-...QA..[GN9.h..D.......W./...
..Ld.5....2K.2VRV...q..G./G.B.=...az.0..m.bd.u<..2_OPG.}.6YVA\Dd..c
.......-.}.)u...9E.......^.TA7...R.V@..._.Z...q..p..LR.=V..3.N.~9.<<< skipped >>>
GET /r/rc/main/loading/1/7/loading.swf HTTP/1.1
Accept: */*
Accept-Language: en-US
Referer: hXXp://c1.web.yy.com/r/rc/main/main/1/43/main.swf?type=main&topSid=3879&subSid=2344444135&referer=http://yy.com/s/3879/234444413
x-flash-version: 11,6,602,168
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: c1.web.yy.com
Connection: Keep-Alive
Cookie: __wyy=6b7173887cf74a93b533e7156ed7bb85; hiido_ui=0.7859214506520492; JSESSIONID=yf51tqgtpwbg6uvo1ul0sksg6743s.yf5
HTTP/1.1 200 OK
Server: nginx
Date: Tue, 14 Apr 2015 18:21:26 GMT
Content-Type: application/x-shockwave-flash;charset=UTF-8
Content-Length: 24647
Last-Modified: Tue, 14 May 2013 03:29:59 GMT
Expires: Wed, 15 Apr 2015 18:21:26 GMT
Cache-Control: max-age=86400
Age: 26249
Powered-By-ChinaCache: HIT from CNC-YG-2-3gA.12CWS.....x...wX.O./...W.(("EA..Dz.R.....J.I....E.tAA...H...;%tEQ.,..**b
...! <..}....u...........3....N\..k.."...F...b.....(.tI..:.&f..a...
[email protected].!P.....:9=............I...%FP...1
...-... ..E..).Bqa8.............IaX..6<<...E.)G ...~!Q.H.b@(....
....C.SBqz..D_..Y(.Zr.....t.y......zK..EF .....ID..?.S..E..t.""<.7.
O....".!.b.............s,....XB`.6..gjG.........l.1....%[email protected].
.:P....a......9..&.a....r..._..u..A.Op.uz..xG.|.[...'&y....N!x......#.
[email protected] .m..t.>E.:......3.....4.....w..... Y...y]G.x...4l;
".-).wL~W../.1YyZ.6,Zm...r..%>z.....{L..3.j...L.5...`......;z.m....
..o...B..L.b%7..U..trA.]..;T....V...\[..z..P..,,(....P..~&...:..."..o.
.`?{.b..8.0>...5..4H..57o)...E.$6..H.*....H..........n...0)I2>..
T..$...D.V.u....~8).P...#9.c.....R*J*...d..D..T..F/..;vu.R...9...u..).
C.....n.)f 6..4}1'X.Q..-[.u.n.Bw..........M..:`.....z.....$..,v...?...
.._I&w..........0...2...<....Y......G;uQ..[_..5,*;...m.l......H..B.
.......d...x..y.\n.u..I s..7.V}W.O-.].z.>..|.p..E....t-..~...U.f.$.
3ah..Hw.67@#=.|..*@...w.2]......................RvU.p.,.]...g...%*zv..
.......}..c........~.....2.s.EG....Q....y.G.p..pt.....Hg .D..V..-..7.9
P ..vW....aO......[...^b>...}...SfVY...T.}.....G8........|..U......
..J2...G.5..:&}>....Q....b>.......5....C0dQ....9..`.....z(..Ht..
....z....[:...R.T...7.......\q$....y...D.s.....sWD.N.q.d.......`2?.o.H
R.k.`..B.XdQ....3.DS. .g..-7.......TnD.3...K.i..F.i.!..i..&.........N.
....%.......&.Op.(...2f..at...}<......N~^.H.o2.@./..Y".\"...Wx.<<< skipped >>>
GET /crossdomain.xml HTTP/1.1
Accept: */*
Accept-Language: en-US
x-flash-version: 11,6,602,168
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: weblbs2.yystatic.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Connection: keep-alive
Content-Length: 260
Content-type: text/html
Last-Modified: Tue,14-Oct-14 13:38:57 GMT...<?xml version="1.0"?>.<cross-domain-policy>..<site-c
ontrol permitted-cross-domain-policies="all"/>..<allow-http-requ
est-headers-from domain="*" headers="*" secure="false"/>..<allow
-access-from domain="*" secure="false" to-ports="*" />.</cross-d
omain-policy>HTTP/1.1 200 OK..Connection: keep-alive..Content-Lengt
h: 260..Content-type: text/html..Last-Modified: Tue,14-Oct-14 13:38:57
GMT.....<?xml version="1.0"?>.<cross-domain-policy>..<
site-control permitted-cross-domain-policies="all"/>..<allow-htt
p-request-headers-from domain="*" headers="*" secure="false"/>..<
;allow-access-from domain="*" secure="false" to-ports="*" />.</c
ross-domain-policy>..
GET / HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: tming.ys168.com
Cache-Control: no-cache
HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 12114
Content-Type: text/html; charset=gb2312
Expires: -1
Set-Cookie: ASP.NET_SessionId=kd1t2hu5kduqvoxqxxezo0hg; path=/; HttpOnly
Server: IIS
X-AspNet-Version: 0
X-Powered-By: WAF/2.0
Date: Wed, 15 Apr 2015 01:37:47 GMT..<html>..<head>..<meta http-equiv="Content-Language" c
ontent="zh-cn" />..<meta http-equiv="Content-Type" content="text
/html; charset=gb2312" />..<title>...........................
...............</title>..<link rel="Stylesheet" href="hXXp://
zy.ys168.com/js/st_2.aspx?fg=5&tp=hXXp://zy.ys168.com/tp" type="text/c
ss" />..<script type="text/javascript">.. document.domain
= qdhost();xdwjsl=60;ddlmc='tming';duser=3998094;dxkbt=false;dxkly=0;d
xksc=false;dffpd=false;dxkjl=false;dfgxz='5';dxken=false;Qsjk=5;Nfs=fa
lse;.. var jzpd = 0; var owPd = 0; var wjscjs = 1;var isFir=false;
var isIE = false;var isIE10 = false;.. var Qcxzt=false;var PD_gzgg
="0";var Qzdqbh = -1; ffOK = false; ccOK = false;.. var FFGQPD = "0
";var Qzydz = "hXXp://zy.ys168.com";var Qccym = "c3.ys168.com";.. w
indow.onload = function () {.. var bbx = navigator.userAgent.to
LowerCase();.. if (bbx.indexOf("firefox") > 0) isFir = true;
.. if (bbx.indexOf("msie") > 0 || bbx.indexOf("trident")>
0) isIE = true.. if (isIE) {.. if (navigator.appVers
ion.match(/10./i) == '10.' || bbx.indexOf("trident") > 0) isIE10 =
true;.. }.. jcgd();.. $("scmore").checked = false
; .. Q.f_ly = 'tming.ys168.com';.. .. if (Qcxzt)
{ ysdy();} ffOK = true;.. }.. window.onresize = function() { jcg
d(); }...function $(rid) {return document.getElementById(rid);}...func
tion ysdy() { if (ccOK) return; ccOK = true; frxcx.zx();}...functi<<< skipped >>>
GET /r/rc/mini/loading/1/17/loading.swf HTTP/1.1
Accept: */*
Accept-Language: en-US
Referer: hXXp://c1.web.yy.com/r/rc/main/main/1/53/main.swf?type=mini&topSid=3879&subSid=2344444135
x-flash-version: 11,6,602,168
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: c1.web.yystatic.com
Connection: Keep-Alive
Cookie: wyy=067963e65c3947d6beb354e4af8274f5; hiido_ui=0.105668953203442
HTTP/1.1 200 OK
Content-Type: application/x-shockwave-flash;charset=UTF-8
Content-Length: 13707
Server: nginx
Date: Tue, 14 Apr 2015 18:09:29 GMT
Last-Modified: Mon, 29 Dec 2014 09:49:20 GMT
Expires: Wed, 15 Apr 2015 18:09:29 GMT
Cache-Control: max-age=86400
Age: 26969
Powered-By-ChinaCache: HIT from CNC-TI-2-3gF.7CWS..S..x....\S..(|NVH ,&...P.-.V.." .*.C@..$BH...-...PDA\.*..([.jD..T
ED.\X.VE.v....L.....{....~.....sf..y.e.!..n.A(...."n.3...r.9.A........
...q.I..j....d...EZZ.y...(q......-.V.VV...HZ...Ig.'...$.....K.....x=x.
..R....?1k.ojRqJb.|.(..?./..''YX.[...x...D!'..#...x.8.E:#)F..M.....q..
.G.7.pL. 9...$J........l..../[email protected].:.E&..6.....DQT........~{..B....$
....R.c.Ei.%..B.^"..,z.b....q...p.......M].q.$.....6.K ..B......o..h..
sB....:"...._...@......... .._......P.z...i|.8.9.`...q"NT@. ~..8...A..
.."....x=../M.D#........".(........k.....6....Y.X.QH./F.,.R..........D
iI.`.....v....l..2...L.. .D..0.....X..l....*VP.$b'..Q.j...qD.-.......x
...>..v|.[.N....1-..O...^,?Y.._#._l.C.).=A.b..[_.....#..4.....@....
.Q..8.9.;...B~2gB.....'w.....@[email protected]_?=WQ"_........-Xhnikicoi...am
......\q`.t....x....i....K.....j`0I.P<5.{ye.......-.........S.I....
.C'....-..I..D...............&9.~.{....>.......ll......E........N..
..{.. ...[l ..3.X ...............=.....s. ....B.%.l....ZZ..q.wq._.bk..
jk......&..@)L..z3...c.> F.....(.D.PO.....q..0...Q.....c-.2.pvzo..8
..=p1e..x`...6_?E(r.#QR....C.F.3........8.......@$*...ee.IYY.....b.8.2
...JV&..Q.KMM.7qPQS......PB...XT..h.X...Y. @......Dpx,.."D%e...hc.....
k..S....08...._.$....!x}M.% ..8...T..eDZ......#.t....Y..]m.....%u....q
.......3WG..mP&i...s...... #..c?..v.'~JvQy.......9..-]...e...5i.v.i...
.W{.....%.m=...4^..&X.ew...n>.... |...=..........,....... ..h`q.c.J
.1!!s.UY.3....9.4.n.s..6.Y......c......n....P....[.=?*9h..C........q..
.wQv.~...q.........M....%. i....j2.4P.....E....\.o.L.[D..$...U..?.<<< skipped >>>
GET /s/3879/2344444135/main.swf HTTP/1.1
Accept: */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: yy.com
Connection: Keep-Alive
HTTP/1.1 302 Found
Server: nginx
Date: Wed, 15 Apr 2015 01:38:51 GMT
Content-Type: FLASH;charset=UTF-8
Content-Length: 0
Connection: keep-alive
Content-Language: zh-CN
Location: hXXp://c1.web.yy.com/r/rc/main/main/1/43/main.swf?type=main&topSid=3879&subSid=2344444135&referer=http://yy.com/s/3879/2344444135/main.swfHTTP/1.1 302 Found..Server: nginx..Date: Wed, 15 Apr 2015 01:38:51 GMT
..Content-Type: FLASH;charset=UTF-8..Content-Length: 0..Connection: ke
ep-alive..Content-Language: zh-CN..Location: hXXp://c1.web.yy.com/r/rc
/main/main/1/43/main.swf?type=main&topSid=3879&subSid=2344444135&refer
er=http://yy.com/s/3879/2344444135/main.swf......
GET /s/3879/2344444135/main.swf HTTP/1.1
Accept: */*
Accept-Language: en-US
Referer: hXXp://yy.com/s/3879/2344444135/main.swf
x-flash-version: 11,6,602,168
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: yy.com
Connection: Keep-Alive
HTTP/1.1 302 Found
Server: nginx
Date: Wed, 15 Apr 2015 01:38:53 GMT
Content-Type: FLASH;charset=UTF-8
Content-Length: 0
Connection: keep-alive
Content-Language: zh-CN
Location: hXXp://c1.web.yy.com/r/rc/main/main/1/43/main.swf?type=main&topSid=3879&subSid=2344444135&referer=http://yy.com/s/3879/2344444135/main.swfHTTP/1.1 302 Found..Server: nginx..Date: Wed, 15 Apr 2015 01:38:53 GMT
..Content-Type: FLASH;charset=UTF-8..Content-Length: 0..Connection: ke
ep-alive..Content-Language: zh-CN..Location: hXXp://c1.web.yy.com/r/rc
/main/main/1/43/main.swf?type=main&topSid=3879&subSid=2344444135&refer
er=http://yy.com/s/3879/2344444135/main.swf......
GET /crossdomain.xml HTTP/1.1
Accept: */*
Accept-Language: en-US
x-flash-version: 11,6,602,168
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: yy.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: nginx
Date: Wed, 15 Apr 2015 01:38:54 GMT
Content-Type: application/xml
Transfer-Encoding: chunked
Connection: keep-alive
Last-Modified: Thu, 20 Feb 2014 07:37:13 GMT
Content-Encoding: gzipa..............a4..m.K..0.D. q.(K$S.'.,Q...........H\.....n4.7.../S.ST
W.....t8.........J..0P..Q... ..z....9..l`...V..u5qE..:..2^Fd..]S.B.)..
.z....4..3Z.....r.#..%....,s..7...>Q$.O......0......
GET //get-data/3879?subSid=2344444135&type=main&referer=hXXp://yy.com/s/3879/2344444135/main.swf&_=46553400 HTTP/1.1
Accept: */*
Accept-Language: en-US
Referer: hXXp://c1.web.yy.com/r/rc/main/main/1/43/main.swf?type=main&topSid=3879&subSid=2344444135&referer=http://yy.com/s/3879/234444413
x-flash-version: 11,6,602,168
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: yy.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: nginx
Date: Wed, 15 Apr 2015 01:38:55 GMT
Content-Type: text/plain;charset=UTF-8
Content-Length: 693
Connection: keep-alive
Set-Cookie: __wyy=6b7173887cf74a93b533e7156ed7bb85;Path=/;Domain=.yy.com;Expires=Thu, 14-Apr-2016 01:38:54 GMT
Set-Cookie: hiido_ui=0.7859214506520492;Path=/;Domain=.yy.com;Expires=Wed, 22-Apr-2015 01:38:54 GMT
Set-Cookie: JSESSIONID=yf51tqgtpwbg6uvo1ul0sksg6743s.yf5;Path=/
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Accept-Charset: big5, big5-hkscs, compound_text, euc-jp, euc-kr, gb18030, gb2312, gbk, ibm-thai, ibm00858, ibm01140, ibm01141, ibm01142, ibm01143, ibm01144, ibm01145, ibm01146, ibm01147, ibm01148, ibm01149, ibm037, ibm1026, ibm1047, ibm273, ibm277, ibm278, ibm280, ibm284, ibm285, ibm297, ibm420, ibm424, ibm437, ibm500, ibm775, ibm850, ibm852, ibm855, ibm857, ibm860, ibm861, ibm862, ibm863, ibm864, ibm865, ibm866, ibm868, ibm869, ibm870, ibm871, ibm918, iso-2022-cn, iso-2022-jp, iso-2022-jp-2, iso-2022-kr, iso-8859-1, iso-8859-13, iso-8859-15, iso-8859-2, iso-8859-3, iso-8859-4, iso-8859-5, iso-8859-6, iso-8859-7, iso-8859-8, iso-8859-9, jis_x0201, jis_x0212-1990, koi8-r, koi8-u, shift_jis, tis-620, us-ascii, utf-16, utf-16be, utf-16le, utf-32, utf-32be, utf-32le, utf-8, windows-1250, windows-1251, windows-1252, windows-1253, windows-1254, windows-1255, windows-1256, windows-1257, windows-1258, windows-31j, x-big5-hkscs-2001, x-big5-solaris, x-euc-jp-linux, x-euc-tw, x-eucjp-open, x-ibm1006, x-ibm1025, x-ibm1046, x-ibm1097, x-ibm1098, x-ibm1112, x-ibm1122, x-ibm1123, x-ibm1124, x-ibm1364, x-ibm1381, x-ibm1383, x-ibm33722, x-ibm737, x-ibm833, x-ibm834, x-ibm856, x-ibm874, x-ibm875, x-ibm921, x-ibm922, x-ibm930, x-ibm933, x-ibm935, x-ibm937, x-ibm939, x-ibm942, x-ibm942c, x-ibm943, x-ibm943c, x-ibm948, x-ibm949, x-ibm949c, x-ibm950, x-ibm964, x-ibm970, x-iscii91, x-iso-2022-cn-cns, x-iso-2022-cn-gb, x-iso-8859-11, x-jis0208, x-jisautodetect, x-johab, x-macarabic, x-maccentraleurope, x-maccroatian, x-maccyrillic, x-macdingbat, x-macgreek, x-machebrew, x-maciceland, x-macroman, x-macromania, x-macsymbol, x-macthai, x-macturkish, x-macukraine, x-ms932_0213, x-ms950-hkscs, x-ms950-hkscs-xp, x-mswin-936, x-pck, x-sjis_0213, x-utf-16le-bom, x-utf-32be-bom, x-utf-32le-bom, x-windows-50220, x-windows-50221, x-windows-874, x-windows-949, x-windows-950, x-windows-iso2022jp
Content-Encoding: gzip............oO.0...._.7v....je..i.$.4M(..."..8.t..........V.O.<.K..
'.Mk.2................v.s....:..SUM=xJ.....,.......... ..m.U.e...u. ..
...|....D:Ik.|.].O.......|.^...|.vZ...D.......%gi.fQ.JN.X.<.D..57..
JWhF&....Vh..bA~.]... .........rv...}>..R\...:6'..s.Rv^.X...oS.r.Z
.y-S4.v......j..mW.J.B......E.P.. .h...........J.J.]v.....n....2.n.J..
...7.`@...IH1|)C......=...`.....$e8.0..Gb....=H)..S.r......~D....b.4..
.....I....=..... ... .[...k..(nT!u......>.{[email protected]'a..T.W
]...I...i..b...c.^....].[U....=.....'.....>Pg..&.....hCz.aV.-i.....
of....C.U.v......9....(...........X........q...qY.c.......m.<v'..G.
..w$..C.ky%K.Zo..... ]m.....j..Z.hFC...FnB.],.<..\.#.u.3.KvK.....m.
B..=...GF.......<<< skipped >>>
GET /sqresxyrqmbmsyd/item/fabb7dc1cb1cc23e0ad93ac4 HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: hi.baidu.com
Cache-Control: no-cache
HTTP/1.1 200 OK
Set-Cookie: BAIDUID=A5C453D587B1ADA43087DF2518CAE1E9:FG=1; max-age=31536000; expires=Thu, 14-Apr-16 01:38:50 GMT; domain=.baidu.com; path=/; version=1
P3P: CP=" OTI DSP COR IVA OUR IND COM "
Content-type: text/html
Transfer-Encoding: chunked
Connection: close
Date: Wed, 15 Apr 2015 01:38:51 GMT
Server: apache100f.. <!DOCTYPE html><html id="customDoc">
<!--STATUS OK--> <head> <meta http-equiv=Content-Type c
ontent="text/html; charset=utf-8"> <title> ............_.....
....c........._............</title> <link rel="shortcut icon"
href="hXXp://hi.bdimg.com/static/qbase/img/mod/16_favicon.ico?v=116ba
471.ico" type=image/x-icon> <meta name=keywords content=".....
.......,"> <meta name=description content=",............"><
;script>window.wpo={start:new Date*1,pid:109,page:'qing'}</scrip
t><!--[if IE]><script type="text/javascript">(function(
){var e="abbr,article,aside,audio,canvas,datalist,details,dialog,event
source,figure,footer,header,hgroup,mark,menu,meter,nav,output,progress
,section,time,video".split(","),t=e.length;while(t--)document.createEl
ement(e[t])})();</script><![endif]--><script>window.
qDomain={"qing":"hXXp://hi.baidu.com","static":"hXXp://hi.bdimg.com","
passport":"hXXps://passport.baidu.com","portrait":"hXXp://tx.bdimg.com
","hiup":"hXXp://hi.baidu.com","photo":"hXXp://hiphotos.baidu.com","me
ssage":"hXXp://msg.baidu.com","friend":"hXXp://frd.baidu.com","mp3":"h
ttp://mp3.baidu.com","ting":"hXXp://ting.baidu.com","image":"hXXp://im
g.baidu.com","qup":"hXXp://upload.hi.baidu.com","www":"hXXp://VVV.baid
u.com"};window.qUserInfo={"userName":".........c","nickname":"........
.c","portrait":"bed17371726573787972716d626d7379642c36","qingUrl":"\/s
qresxyrqmbmsyd","spaceName":".........c.........","right":"0","ava<<< skipped >>>
GET /crossdomain.xml HTTP/1.1
Accept: */*
Accept-Language: en-US
x-flash-version: 11,6,602,168
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: weblbs.yystatic.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Connection: keep-alive
Content-Length: 260
Content-type: text/html
Last-Modified: Tue,14-Oct-14 13:38:55 GMT...<?xml version="1.0"?>.<cross-domain-policy>..<site-c
ontrol permitted-cross-domain-policies="all"/>..<allow-http-requ
est-headers-from domain="*" headers="*" secure="false"/>..<allow
-access-from domain="*" secure="false" to-ports="*" />.</cross-d
omain-policy>....
GET //get-data/3879?subSid=2344444135&type=mini&_=1651379 HTTP/1.1
Accept: */*
Accept-Language: en-US
Referer: hXXp://c1.web.yy.com/r/rc/main/main/1/53/main.swf?type=mini&topSid=3879&subSid=2344444135
x-flash-version: 11,6,602,168
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: weblbs.yystatic.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Connection: keep-alive
Content-Encoding: gzip
Content-Length: 567
Content-type: text/html
Set-Cookie: wyy=067963e65c3947d6beb354e4af8274f5;Path=/;Domain=yystatic.com;Expires=Thu,14-Apr-16 01:38:55 GMT
Set-Cookie: hiido_ui=0.105668953203442;Path=/;Domain=yystatic.com;Expires=Thu,14-Apr-16 01:38:55 GMT............M..0.....>.)r..8H..R{...=V...)V!.b........5.j....8..x.c
...y.U.M.;.B[..U....u.O'.rgJ\6....2...._.1.y.b{......K....2...}.4..q.q
._.Ks..W.]..E../..@...!0I.L9<l....*.T...9...L2...i"B%.J....`JA..f.#
&......0e$T.;f.&...G$.....]5.S5Y...*.N.m..B[.............=...'....&.=@
L.....[c..Wo..U$BJ........k.....$......I..../n...?p}.a4...07..........
]x....'......X&...k.bg..M..f....P.nf.{vw..................... .......G
.....O.zd*..l_.1...........V.G.....M.,>.0....Z?/........;T..O.D.R-Z
.r!...V$D..Na.aJ.8..w.........q....K..O.%.n..E"t<....i&...d.O Y....
y.Q4.......5B.._...HTTP/1.1 200 OK..Connection: keep-alive..Content-En
coding: gzip..Content-Length: 567..Content-type: text/html..Set-Cookie
: wyy=067963e65c3947d6beb354e4af8274f5;Path=/;Domain=yystatic.com;Expi
res=Thu,14-Apr-16 01:38:55 GMT..Set-Cookie: hiido_ui=0.105668953203442
;Path=/;Domain=yystatic.com;Expires=Thu,14-Apr-16 01:38:55 GMT........
......M..0.....>.)r..8H..R{...=V...)V!.b........5.j....8..x.c...y.U
.M.;.B[..U....u.O'.rgJ\6....2...._.1.y.b{......K....2...}.4..q.q._.Ks.
.W.]..E../..@...!0I.L9<l....*.T...9...L2...i"B%.J....`JA..f.#&.....
.0e$T.;f.&...G$.....]5.S5Y...*.N.m..B[.............=...'....&.=@L.....
[c..Wo..U$BJ........k.....$......I..../n...?p}.a4...07..........]x....
'......X&...k.bg..M..f....P.nf.{vw..................... .......G.....O
.zd*..l_.1...........V.G.....M.,>.0....Z?/........;T..O.D.R-Z.r!...
V$D..Na.aJ.8..w.........q....K..O.%.n..E"t<....i&...d.O Y....y.Q4..
.....5B.._.....<<< skipped >>>
GET / HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: tming1.ys168.com
Cache-Control: no-cache
HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 11996
Content-Type: text/html; charset=gb2312
Expires: -1
Set-Cookie: ASP.NET_SessionId=1sm1zqq3pzqkfb5kfadn5nqt; path=/; HttpOnly
Server: IIS
X-AspNet-Version: 0
X-Powered-By: WAF/2.0
Date: Wed, 15 Apr 2015 01:37:49 GMT..<html>..<head>..<meta http-equiv="Content-Language" c
ontent="zh-cn" />..<meta http-equiv="Content-Type" content="text
/html; charset=gb2312" />..<title>...........................
...............</title>..<link rel="Stylesheet" href="hXXp://
zy1.ys168.com/js/st_2.aspx?fg=5&tp=hXXp://zy1.ys168.com/tp" type="text
/css" />..<script type="text/javascript">.. document.domai
n = qdhost();xdwjsl=60;ddlmc='tming1';duser=4000568;dxkbt=false;dxkly=
0;dxksc=false;dffpd=false;dxkjl=false;dfgxz='5';dxken=false;Qsjk=5;Nfs
=false;.. var jzpd = 0; var owPd = 0; var wjscjs = 1;var isFir=fals
e; var isIE = false;var isIE10 = false;.. var Qcxzt=false;var PD_g
zgg="0";var Qzdqbh = -1; ffOK = false; ccOK = false;.. var FFGQPD =
"0";var Qzydz = "hXXp://zy1.ys168.com";var Qccym = "c5.ys168.com";..
window.onload = function () {.. var bbx = navigator.userAgen
t.toLowerCase();.. if (bbx.indexOf("firefox") > 0) isFir = t
rue;.. if (bbx.indexOf("msie") > 0 || bbx.indexOf("trident")
>0) isIE = true.. if (isIE) {.. if (navigator.app
Version.match(/10./i) == '10.' || bbx.indexOf("trident") > 0) isIE1
0 = true;.. }.. jcgd();.. $("scmore").checked = f
alse; .. Q.f_ly = 'tming1.ys168.com';.. .. if (Qc
xzt) { ysdy();} ffOK = true;.. }.. window.onresize = function()
{ jcgd(); }...function $(rid) {return document.getElementById(rid);}..
.function ysdy() { if (ccOK) return; ccOK = true; frxcx.zx();}...f<<< skipped >>>
GET /crossdomain.xml HTTP/1.1
Accept: */*
Accept-Language: en-US
x-flash-version: 11,6,602,168
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: vr.duowan.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: nginx
Date: Wed, 15 Apr 2015 01:38:59 GMT
Content-Type: text/xml
Content-Length: 258
Last-Modified: Thu, 09 Apr 2015 06:55:07 GMT
Connection: keep-alive
ETag: "5526224b-102"
Accept-Ranges: bytes<?xml version="1.0"?>.<cross-domain-policy>..<site-cont
rol permitted-cross-domain-policies="all"/>..<allow-http-request
-headers-from domain="*" headers="*" secure="false"/>..<allow-ac
cess-from domain="*" secure="false" to-ports="*" />.</cross-doma
in-policy>.....
GET /mainstat.html?s=101&topSid=3879&subSid=2344444135&type=mini&tuna=115.238.59.218&res=24&getT=1954&qva=0 HTTP/1.1
Accept: */*
Accept-Language: en-US
Referer: hXXp://c1.web.yy.com/r/rc/main/main/1/53/main.swf?type=mini&topSid=3879&subSid=2344444135
x-flash-version: 11,6,602,168
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: vr.duowan.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: nginx
Date: Wed, 15 Apr 2015 01:38:59 GMT
Content-Type: text/html
Content-Length: 0
Last-Modified: Thu, 09 Apr 2015 06:55:07 GMT
Connection: keep-alive
ETag: "5526224b-0"
Accept-Ranges: bytesHTTP/1.1 200 OK..Server: nginx..Date: Wed, 15 Apr 2015 01:38:59 GMT..C
ontent-Type: text/html..Content-Length: 0..Last-Modified: Thu, 09 Apr
2015 06:55:07 GMT..Connection: keep-alive..ETag: "5526224b-0"..Accept-
Ranges: bytes..
The Trojan connects to the servers at the folowing location(s):
`.rsrc
t$(SSh
|$D.tm
~%UVW
u.hXtf
u$SShe
SkinH_EL.dll
fmifs.dll
kernel32.dll
user32.dll
ntdll.dll
EnumWindows
UnhookWindowsHookEx
GetAsyncKeyState
MsgWaitForMultipleObjects
EnumChildWindows
MapVirtualKeyA
fJ.WM_
CX%xm
Õ6m*
n.BjCw
%s;7*
0%x@w
%C^L:
%s T5
]E4%F(
.Funr
k%UPp
fg.VG
%C',@
>Ùd
0'.Ll
[I(3/#N0.bd
j"%u=w
q%Xn`
@|H.NI
.wdd!
S|%u4
*.Ea]S
Q.CGo
fTpe
.LLbX
-.Mdl
\-A}=3K
Y:.akpS
$.Zcqn
.WE= T!N
#?%s(C(
u.Jck~
zx/%FN[
%s=\RI
}j%c%Y)
Rx.GR
4o#.dM
IeS`%C
[n 4\.UY
,4.qO,
gQ'.Io
%cLur?
s%DHB
]I%%X
5r.US
:mD].tB
f%fUZ
.fOuV12
*_.dC
&-N}<
({?.cQm.Cqx~c
.`.Qw
**.dU
!n]%x
%X,Cr
&.PFy{xh.um ZZE7L
/^p%u$
I.NoQY
zu.ew
D/.nT
b\SkinH_EL.dll
.rsrc
C$%cmb
.ppM|
aZ.mO
%-^
.hk;~
KERNEL32.DLL
COMCTL32.dll
GDI32.dll
MSIMG32.dll
MSVCRT.dll
MSVFW32.dll
USER32.dll
yybox.exe
\yybox.exe
lpi%S
| %4S2%SH\p%S2%
%SHK-
hŒQ
\UWSSHh
hx%x7p
*%1s4V
.Swls:I
\_|.TPD
T?%xF@_
@.BeM
h.YJ@kW
IK.sUQ
%d\,-;
@h`3-X}
C|fDR%D
%d"6_
H Î
.IY\p,
A.tCD8&
B.Rx4
%S``3
2>.Zx
WsX$/Ÿg
*.xnt2,#
?`A.Zd(
GzC.kwF
aT.Aga
Ð`D
.mlView
n.ntV
hXXp://
.com/s/3879/
.swZ0
O.OPP
CNotSupportedExcept
COMLZ.DLL
CmdT"
'.INIv.HLP
MSVCRTg
O(1'S{%Sb(%s,
(&07-034/)7
*w.AE
V2.ZI
7%s:%d
y.JZn~
zcÁ
!Gl.chs\S@
.lV,@
*G~P.Dx
Gt!.Ex
.Nv=-Cw
7Itn.Ey
*Eys.Ey
Eys.Ey
'G|M.Ey
6Lus.Dx
%CuK-Ey
*Fyt.Ey
G{y.EyI}z.Ey
,J~~.Ey
%Fx8 Fy
%D~&$E
(G~ .Gn
ADVAPI32.dll
comdlg32.dll
ole32.dll
OLEAUT32.dll
oledlg.dll
SHELL32.dll
WINMM.dll
WINSPOOL.DRV
WS2_32.dll
RegCloseKey
ShellExecuteA
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
127.0.0.1 localhost
C:\A7.ini
[email protected]
"! 778200
!! 778200
! 678200
&$$667100
'&f7100
!!!778210
!!!788210
""!788210
! !678200
$##677100
)'&567100
! 667100
! 778200
#!!667100
*(&567100
""!677100
!!!778200
"!!677100
#"!667100
('f7100%$#677100
! !677200
"!!788210
&%$667100
"! 788210
"! 788211
-, *)*)()('('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('%('%('%('%'&%'&%(&%'&%'&%'&%'&%'&%'&%(&%(&%('%''%'&%'&%'&%('%('&('&('&('&(&&(&%'&%'&%'&%('%('%('%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%('%('%('%''%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%('%('%('%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%('%('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&((')(( *)(('>=;&%%'&%('&('&('&('&('&('&('&('&('&('&('&('&('&('&('%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%(&%'&%'&%'&%'&%'&%('%('&('&('&('%''%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%('%('&('&('&('&('&('&('&('&)('))(''&/.-:98&&%'&%('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('%('%('%('%'&%'&%(&%'&%'&%'&%'&%'&%'&%(&%(&%('%''%'&%'&%'&%('%('&('&('&('&(&&(&%'&%'&%'&%('%('%('%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%('%('%('%''%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%('%('%('%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%('%('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&)('*)) **.-, *))((('('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&''%''%''%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%''%'&%'&%'&%'&%''%''%('&('&('&'&%'&%'&%'&%'&%'&%''%''%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%''%''%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%''%''%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%''%('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&)('*)(-, )((?>='&&'&&('&('&('&('&('&('&('&('&('&('&('&('&('&('%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%''%('&('&('&('%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%''%('&('&('&('&('&('&('&)('**))('0/.<;:'&&'&&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&''%''%''%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%''%'&%'&%'&%'&%''%''%('&('&('&'&%'&%'&%'&%'&%'&%''%''%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%''%''%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%''%''%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%''%('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&(('))(, *0.->;:?<;>;:>:9>;:@=;643
1/.ga_
GEDwsqb^\`\[a][a][a][a][a][a][a][a][a][a][`\Z`\Y`\ZqliysqLHG
&&%USR
0.-310%$$
*)(643&%%
454,, (('* *..---,`_^>=<
..-..-((')*)010%%&?=><;;
110}|{::9""!555)))
'''999987>>=998554>>=
&&&tsshgg
//.tsq
666///"""
C:\yy3879.bmp
%dw5a`9
1.2.18
inflate 1.1.3 Copyright 1995-1998 Mark Adler
%*.*f
CNotSupportedException
commctrl_DragListMsg
Afx:%x:%x:%x:%x:%x
Afx:%x:%x
COMCTL32.DLL
CCmdTarget
MSWHEEL_ROLLMSG
__MSVCRT_HEAP_SELECT
iphlpapi.dll
SHLWAPI.dll
MPR.dll
VERSION.dll
WSOCK32.dll
.PAVCException@@
.PAVCNotSupportedException@@
.PAVCFileException@@
(*.prn)|*.prn|
(*.*)|*.*||
Shell32.dll
Mpr.dll
Advapi32.dll
User32.dll
Gdi32.dll
Kernel32.dll
(&07-034/)7 '
?? / %d]
%d / %d]
: %d]
(*.WAV;*.MID)|*.WAV;*.MID|WAV
(*.WAV)|*.WAV|MIDI
(*.MID)|*.MID|
(*.txt)|*.txt|
(*.JPG;*.BMP;*.GIF;*.ICO;*.CUR)|*.JPG;*.BMP;*.GIF;*.ICO;*.CUR|JPG
(*.JPG)|*.JPG|BMP
(*.BMP)|*.BMP|GIF
(*.GIF)|*.GIF|
(*.ICO)|*.ICO|
(*.CUR)|*.CUR|
%s:%d
windows
out.prn
%d.%d
%d / %d
%d/%d
Bogus message code %d
(%d-%d):
%ld%c
(*.htm;*.html)|*.htm;*.html
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
HTTP/1.0
%s <%s>
Reply-To: %s
From: %s
To: %s
Subject: %s
Date: %s
Cc: %s
%a, %d %b %Y %H:%M:%S
SMTP
(*.avi)|*.avi
WPFT532.CNV
WPFT632.CNV
EXCEL32.CNV
write32.wpc
Windows Write
mswrd632.wpc
Word for Windows 6.0
wword5.cnv
Word for Windows 5.0
mswrd832.cnv
mswrd632.cnv
Word 6.0/95 for Windows & Macintosh
html32.cnv
1.1.3
;3 #>6.&
'2, / 0&7!4-)1#
.PAVCObject@@
.PAVCSimpleException@@
.PAVCMemoryException@@
.?AVCNotSupportedException@@
.PAVCResourceException@@
.PAVCUserException@@
.?AVCCmdTarget@@
.?AVCCmdUI@@
.?AVCTestCmdUI@@
.PAVCArchiveException@@
explorer.exe
777b274bd60bad96829.exe
c:\%original file name%.exe
#include "l.chs\afxres.rc" // Standard components
GetCPInfo
GetWindowsDirectoryA
WinExec
GetProcessHeap
RegCreateKeyA
RegOpenKeyExA
RegCreateKeyExA
GetViewportOrgEx
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
GetViewportExtEx
SetWindowsHookExA
CreateDialogIndirectParamA
ExitWindowsEx
keybd_event
VkKeyScanExA
GetKeyboardLayout
GetKeyState
InternetCanonicalizeUrlA
InternetCrackUrlA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
.text
`.rdata
@.data
&[.aH
-W %Z(8{Cou.NKkxkeybd_
%Http
AVIFIL32.dll
RASAPI32.dll
WININET.dll
1, 0, 6, 6
%original file name%.exe_636_rwx_00401000_002CC000:
t$(SSh
|$D.tm
~%UVW
u.hXtf
u$SShe
SkinH_EL.dll
fmifs.dll
kernel32.dll
user32.dll
ntdll.dll
EnumWindows
UnhookWindowsHookEx
GetAsyncKeyState
MsgWaitForMultipleObjects
EnumChildWindows
MapVirtualKeyA
fJ.WM_
CX%xm
Õ6m*
n.BjCw
%s;7*
0%x@w
%C^L:
%s T5
]E4%F(
.Funr
k%UPp
fg.VG
%C',@
>Ùd
0'.Ll
[I(3/#N0.bd
j"%u=w
q%Xn`
@|H.NI
.wdd!
S|%u4
*.Ea]S
Q.CGo
fTpe
.LLbX
-.Mdl
\-A}=3K
Y:.akpS
$.Zcqn
.WE= T!N
#?%s(C(
u.Jck~
zx/%FN[
%s=\RI
}j%c%Y)
Rx.GR
4o#.dM
IeS`%C
[n 4\.UY
,4.qO,
gQ'.Io
%cLur?
s%DHB
]I%%X
5r.US
:mD].tB
f%fUZ
.fOuV12
*_.dC
&-N}<
({?.cQm.Cqx~c
.`.Qw
**.dU
!n]%x
%X,Cr
&.PFy{xh.um ZZE7L
/^p%u$
I.NoQY
zu.ew
D/.nT
b\SkinH_EL.dll
.rsrc
C$%cmb
.ppM|
aZ.mO
%-^
.hk;~
KERNEL32.DLL
COMCTL32.dll
GDI32.dll
MSIMG32.dll
MSVCRT.dll
MSVFW32.dll
USER32.dll
yybox.exe
\yybox.exe
lpi%S
| %4S2%SH\p%S2%
%SHK-
hŒQ
\UWSSHh
hx%x7p
*%1s4V
.Swls:I
\_|.TPD
T?%xF@_
@.BeM
h.YJ@kW
IK.sUQ
%d\,-;
@h`3-X}
C|fDR%D
%d"6_
H Î
.IY\p,
A.tCD8&
B.Rx4
%S``3
2>.Zx
WsX$/Ÿg
*.xnt2,#
?`A.Zd(
GzC.kwF
aT.Aga
Ð`D
.mlView
n.ntV
hXXp://
.com/s/3879/
.swZ0
O.OPP
CNotSupportedExcept
COMLZ.DLL
CmdT"
'.INIv.HLP
MSVCRTg
O(1'S{%Sb(%s,
(&07-034/)7
*w.AE
V2.ZI
7%s:%d
y.JZn~
zcÁ
!Gl.chs\S@
.lV,@
*G~P.Dx
Gt!.Ex
.Nv=-Cw
7Itn.Ey
*Eys.Ey
Eys.Ey
'G|M.Ey
6Lus.Dx
%CuK-Ey
*Fyt.Ey
G{y.EyI}z.Ey
,J~~.Ey
%Fx8 Fy
%D~&$E
(G~ .Gn
ADVAPI32.dll
comdlg32.dll
ole32.dll
OLEAUT32.dll
oledlg.dll
SHELL32.dll
WINMM.dll
WINSPOOL.DRV
WS2_32.dll
RegCloseKey
ShellExecuteA
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
127.0.0.1 localhost
C:\A7.ini
[email protected]
"! 778200
!! 778200
! 678200
&$$667100
'&f7100
!!!778210
!!!788210
""!788210
! !678200
$##677100
)'&567100
! 667100
! 778200
#!!667100
*(&567100
""!677100
!!!778200
"!!677100
#"!667100
('f7100%$#677100
! !677200
"!!788210
&%$667100
"! 788210
"! 788211
-, *)*)()('('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('%('%('%('%'&%'&%(&%'&%'&%'&%'&%'&%'&%(&%(&%('%''%'&%'&%'&%('%('&('&('&('&(&&(&%'&%'&%'&%('%('%('%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%('%('%('%''%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%('%('%('%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%('%('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&((')(( *)(('>=;&%%'&%('&('&('&('&('&('&('&('&('&('&('&('&('&('&('%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%(&%'&%'&%'&%'&%'&%('%('&('&('&('%''%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%('%('&('&('&('&('&('&('&('&)('))(''&/.-:98&&%'&%('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('%('%('%('%'&%'&%(&%'&%'&%'&%'&%'&%'&%(&%(&%('%''%'&%'&%'&%('%('&('&('&('&(&&(&%'&%'&%'&%('%('%('%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%('%('%('%''%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%('%('%('%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%('%('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&)('*)) **.-, *))((('('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&''%''%''%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%''%'&%'&%'&%'&%''%''%('&('&('&'&%'&%'&%'&%'&%'&%''%''%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%''%''%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%''%''%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%''%('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&)('*)(-, )((?>='&&'&&('&('&('&('&('&('&('&('&('&('&('&('&('&('%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%''%('&('&('&('%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%''%('&('&('&('&('&('&('&)('**))('0/.<;:'&&'&&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&''%''%''%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%''%'&%'&%'&%'&%''%''%('&('&('&'&%'&%'&%'&%'&%'&%''%''%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%''%''%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%''%''%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%'&%''%('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&('&(('))(, *0.->;:?<;>;:>:9>;:@=;643
1/.ga_
GEDwsqb^\`\[a][a][a][a][a][a][a][a][a][a][`\Z`\Y`\ZqliysqLHG
&&%USR
0.-310%$$
*)(643&%%
454,, (('* *..---,`_^>=<
..-..-((')*)010%%&?=><;;
110}|{::9""!555)))
'''999987>>=998554>>=
&&&tsshgg
//.tsq
666///"""
C:\yy3879.bmp
%dw5a`9
1.2.18
inflate 1.1.3 Copyright 1995-1998 Mark Adler
%*.*f
CNotSupportedException
commctrl_DragListMsg
Afx:%x:%x:%x:%x:%x
Afx:%x:%x
COMCTL32.DLL
CCmdTarget
MSWHEEL_ROLLMSG
__MSVCRT_HEAP_SELECT
iphlpapi.dll
SHLWAPI.dll
MPR.dll
VERSION.dll
WSOCK32.dll
.PAVCException@@
.PAVCNotSupportedException@@
.PAVCFileException@@
(*.prn)|*.prn|
(*.*)|*.*||
Shell32.dll
Mpr.dll
Advapi32.dll
User32.dll
Gdi32.dll
Kernel32.dll
(&07-034/)7 '
?? / %d]
%d / %d]
: %d]
(*.WAV;*.MID)|*.WAV;*.MID|WAV
(*.WAV)|*.WAV|MIDI
(*.MID)|*.MID|
(*.txt)|*.txt|
(*.JPG;*.BMP;*.GIF;*.ICO;*.CUR)|*.JPG;*.BMP;*.GIF;*.ICO;*.CUR|JPG
(*.JPG)|*.JPG|BMP
(*.BMP)|*.BMP|GIF
(*.GIF)|*.GIF|
(*.ICO)|*.ICO|
(*.CUR)|*.CUR|
%s:%d
windows
out.prn
%d.%d
%d / %d
%d/%d
Bogus message code %d
(%d-%d):
%ld%c
(*.htm;*.html)|*.htm;*.html
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
HTTP/1.0
%s <%s>
Reply-To: %s
From: %s
To: %s
Subject: %s
Date: %s
Cc: %s
%a, %d %b %Y %H:%M:%S
SMTP
(*.avi)|*.avi
WPFT532.CNV
WPFT632.CNV
EXCEL32.CNV
write32.wpc
Windows Write
mswrd632.wpc
Word for Windows 6.0
wword5.cnv
Word for Windows 5.0
mswrd832.cnv
mswrd632.cnv
Word 6.0/95 for Windows & Macintosh
html32.cnv
1.1.3
;3 #>6.&
'2, / 0&7!4-)1#
.PAVCObject@@
.PAVCSimpleException@@
.PAVCMemoryException@@
.?AVCNotSupportedException@@
.PAVCResourceException@@
.PAVCUserException@@
.?AVCCmdTarget@@
.?AVCCmdUI@@
.?AVCTestCmdUI@@
.PAVCArchiveException@@
explorer.exe
777b274bd60bad96829.exe
c:\%original file name%.exe
#include "l.chs\afxres.rc" // Standard components
GetCPInfo
GetWindowsDirectoryA
WinExec
GetProcessHeap
RegCreateKeyA
RegOpenKeyExA
RegCreateKeyExA
GetViewportOrgEx
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
GetViewportExtEx
SetWindowsHookExA
CreateDialogIndirectParamA
ExitWindowsEx
keybd_event
VkKeyScanExA
GetKeyboardLayout
GetKeyState
InternetCanonicalizeUrlA
InternetCrackUrlA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
.text
`.rdata
@.data
1, 0, 6, 6
%original file name%.exe_636_rwx_10001000_00039000:
L$(h%f
SSh0j
msctls_hotkey32
TVCLHotKey
THotKey
\skinh.she
}uo,x6l5k%x-l h
9p%s m)t4`#b
e"m?c&y1`Ð<
SetViewportOrgEx
SetViewportExtEx
SetWindowsHookExA
UnhookWindowsHookEx
EnumThreadWindows
EnumChildWindows
`c%US.4/
!#$<#$#=
.text
`.rdata
@.data
.rsrc
@.UPX0
`.UPX1
`.reloc
yybox.exe_1304:
`.rsrc
t$(SSh
~%UVW
u$SShe
software\microsoft\windows\CurrentVersion\Run\yybox
hXXp://yy.com/s/3879/2344444135/main.swft
hXXp://c1.web.yy.com/r/rc/main/main/1/53/main.swf?type=mini&topSid=3879&subSid=2344444135
F%*.*f
CNotSupportedException
commctrl_DragListMsg
Afx:%x:%x:%x:%x:%x
Afx:%x:%x
COMCTL32.DLL
CCmdTarget
ole32.dll
__MSVCRT_HEAP_SELECT
user32.dll
iphlpapi.dll
SHLWAPI.dll
MPR.dll
VERSION.dll
WININET.dll
.PAVCException@@
.PAVCNotSupportedException@@
.PAVCFileException@@
(*.prn)|*.prn|
(*.*)|*.*||
Shell32.dll
Mpr.dll
Advapi32.dll
User32.dll
Gdi32.dll
Kernel32.dll
(&07-034/)7 '
?? / %d]
%d / %d]
: %d]
(*.WAV;*.MID)|*.WAV;*.MID|WAV
(*.WAV)|*.WAV|MIDI
(*.MID)|*.MID|
(*.txt)|*.txt|
(*.JPG;*.BMP;*.GIF;*.ICO;*.CUR)|*.JPG;*.BMP;*.GIF;*.ICO;*.CUR|JPG
(*.JPG)|*.JPG|BMP
(*.BMP)|*.BMP|GIF
(*.GIF)|*.GIF|
(*.ICO)|*.ICO|
(*.CUR)|*.CUR|
%s:%d
windows
out.prn
%d.%d
%d / %d
%d/%d
Bogus message code %d
(%d-%d):
%ld%c
(*.htm;*.html)|*.htm;*.html
.PAVCOleException@@
.PAVCObject@@
.PAVCSimpleException@@
.PAVCMemoryException@@
.?AVCNotSupportedException@@
.PAVCResourceException@@
.PAVCUserException@@
.?AVCCmdTarget@@
.?AVCCmdUI@@
.?AVCTestCmdUI@@
.PAVCArchiveException@@
.PAVCOleDispatchException@@
zcÁ
%WinDir%\yybox.exe
#include "l.chs\afxres.rc" // Standard components
GetCPInfo
WinExec
GetProcessHeap
RegCloseKey
RegOpenKeyExA
RegCreateKeyA
RegCreateKeyExA
GetViewportExtEx
GetViewportOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
ShellExecuteA
GetKeyState
CreateDialogIndirectParamA
UnhookWindowsHookEx
SetWindowsHookExA
.text
`.rdata
@.data
.rsrc
.lV,@
*G~P.Dx
Gt!.Ex
.Nv=-Cw
7Itn.Ey
*Eys.Ey
Eys.Ey
'G|M.Ey
6Lus.Dx
%CuK-Ey
*Fyt.Ey
G{y.EyI}z.Ey
,J~~.Ey
%Fx8 Fy
%D~&$E
(G~ .Gn
KERNEL32.DLL
ADVAPI32.dll
COMCTL32.dll
comdlg32.dll
GDI32.dll
OLEAUT32.dll
oledlg.dll
SHELL32.dll
USER32.dll
WINMM.dll
WINSPOOL.DRV
WS2_32.dll
yybox.exe_1304_rwx_00401000_000E8000:
t$(SSh
~%UVW
u$SShe
software\microsoft\windows\CurrentVersion\Run\yybox
hXXp://yy.com/s/3879/2344444135/main.swft
hXXp://c1.web.yy.com/r/rc/main/main/1/53/main.swf?type=mini&topSid=3879&subSid=2344444135
F%*.*f
CNotSupportedException
commctrl_DragListMsg
Afx:%x:%x:%x:%x:%x
Afx:%x:%x
COMCTL32.DLL
CCmdTarget
ole32.dll
__MSVCRT_HEAP_SELECT
user32.dll
iphlpapi.dll
SHLWAPI.dll
MPR.dll
VERSION.dll
WININET.dll
.PAVCException@@
.PAVCNotSupportedException@@
.PAVCFileException@@
(*.prn)|*.prn|
(*.*)|*.*||
Shell32.dll
Mpr.dll
Advapi32.dll
User32.dll
Gdi32.dll
Kernel32.dll
(&07-034/)7 '
?? / %d]
%d / %d]
: %d]
(*.WAV;*.MID)|*.WAV;*.MID|WAV
(*.WAV)|*.WAV|MIDI
(*.MID)|*.MID|
(*.txt)|*.txt|
(*.JPG;*.BMP;*.GIF;*.ICO;*.CUR)|*.JPG;*.BMP;*.GIF;*.ICO;*.CUR|JPG
(*.JPG)|*.JPG|BMP
(*.BMP)|*.BMP|GIF
(*.GIF)|*.GIF|
(*.ICO)|*.ICO|
(*.CUR)|*.CUR|
%s:%d
windows
out.prn
%d.%d
%d / %d
%d/%d
Bogus message code %d
(%d-%d):
%ld%c
(*.htm;*.html)|*.htm;*.html
.PAVCOleException@@
.PAVCObject@@
.PAVCSimpleException@@
.PAVCMemoryException@@
.?AVCNotSupportedException@@
.PAVCResourceException@@
.PAVCUserException@@
.?AVCCmdTarget@@
.?AVCCmdUI@@
.?AVCTestCmdUI@@
.PAVCArchiveException@@
.PAVCOleDispatchException@@
zcÁ
%WinDir%\yybox.exe
#include "l.chs\afxres.rc" // Standard components
GetCPInfo
WinExec
GetProcessHeap
RegCloseKey
RegOpenKeyExA
RegCreateKeyA
RegCreateKeyExA
GetViewportExtEx
GetViewportOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
ShellExecuteA
GetKeyState
CreateDialogIndirectParamA
UnhookWindowsHookEx
SetWindowsHookExA
.text
`.rdata
@.data
.rsrc
.lV,@
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):No processes have been created.
- Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\3879[1] (567 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\loading[1].swf (9541 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@yy[2].txt (334 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\loading[1].swf (430 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\crossdomain[1].xml (432 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\core[1].bmp (154233 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@yystatic[1].txt (189 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\crossdomain[1].xml (265 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\crossdomain[1].htm (260 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@yystatic[2].txt (361 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\main[1].swf (388 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\3879[1].htm (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\3879[1].swf&_=46553400 (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\main[1].swf (1967 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\crossdomain[2].htm (260 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (4240 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\3879[1].swf&_=46553400 (693 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@yy[1].txt (179 bytes)
C:\1e17b2e9f0_881.exe (10815 bytes)
%WinDir%\yybox.exe (1751 bytes)
C:\SkinH_EL.dll (88 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@baidu[1].txt (198 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"yybox" = "%WinDir%\yybox.exe" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.