Gen.Variant.Zusy.46800_4f1aed7bbb
HEUR:Trojan.Win32.Generic (Kaspersky), Gen:Variant.Zusy.46800 (B) (Emsisoft), Gen:Variant.Zusy.46800 (AdAware), GenericInjector.YR (Lavasoft MAS)
Behaviour: Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 4f1aed7bbbe43e65cf416fdedb00ecff
SHA1: b9e73c7f73e697932bc7cd2fa2eff0f133da39f9
SHA256: b7ab11bcccb084b0fd3fea86713fe576efe9d8e0e2e36ac266e0491aa48b0b33
SSDeep: 6144:FRkVBq2ypZBpupPAcYrV3eyZuU2i1mB1kCrN:HCBq2GXpuOt3eGrrY1
Size: 228352 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: AirInstaller
Created at: 2013-03-15 12:36:24
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
regsvr32.exe:816
%original file name%.exe:320
The Trojan injects its code into the following process(es):
svchost.exe:1152
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process %original file name%.exe:320 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\ (4 bytes)
%System%\drivers\3a2ba1fa.sys (71 bytes)
%WinDir%\WinSxS (12 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Coor.bat (112 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\giynhrYsD.dll (90 bytes)
%System%\wshtcpip.dll (45 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\index.dat (400 bytes)
%WinDir%\AppPatch (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\B1.zip (19 bytes)
%System%\config\SOFTWARE.LOG (11686 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\A1.zip (19 bytes)
%WinDir%\REGISTRATION (4 bytes)
%WinDir% (492 bytes)
C:\$Directory (2360 bytes)
%System%\wshtcptk.dll (19 bytes)
%System% (4664 bytes)
%System%\midimap.dll (18 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\dyeky.dll (90 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\desktop.ini (159 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\C1.zip (18 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\ZHHNK1RJ\desktop.ini (67 bytes)
%System%\drivers\4680947c.sys (32 bytes)
%WinDir%\WinSxS\Policies\x86_Policy.6.0.Microsoft.Windows.Common-Controls_6595b64144ccf1df_x-ww_5ddad775 (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WHUF81E3\desktop.ini (67 bytes)
%System%\wbem (1064 bytes)
%System%\drivers (32 bytes)
%Documents and Settings%\All Users\Start Menu (4 bytes)
%System%\config\software (4303 bytes)
%System%\kakutk.dll (294 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\G1U3S5Y7\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\index.dat (16 bytes)
%System%\wbem\Repository\FS\INDEX.BTR (4624 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (16 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\KQHFGPHV\desktop.ini (67 bytes)
%System%\wbem\Repository\FS\OBJECTS.DATA (10986 bytes)
The Trojan deletes the following file(s):
%System%\drivers\4680947c.sys (0 bytes)
Registry activity
The process regsvr32.exe:816 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCR\CLSID\{AB705622-B25B-491B-A6BF-4A46FDDBC88E}\VersionIndependentProgID]
"(Default)" = "IEHlprObj.IEHlprObj"
[HKCR\TypeLib\{AB705628-B25B-491B-A6BF-4A46FDDBC88E}\1.0\0\win32]
"(Default)" = "%System%\kakutk.dll"
[HKCR\Interface\{AB705621-B25B-491B-A6BF-4A46FDDBC88E}\TypeLib]
"(Default)" = "{AB705628-B25B-491B-A6BF-4A46FDDBC88E}"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKCR\TypeLib\{AB705628-B25B-491B-A6BF-4A46FDDBC88E}\1.0]
"(Default)" = "IEHelper 1.0 Type Library"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCR\IEHlprObj.IEHlprObj\CurVer]
"(Default)" = "IEHlprObj.IEHlprObj.1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKCR\Interface\{AB705621-B25B-491B-A6BF-4A46FDDBC88E}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\Interface\{AB705621-B25B-491B-A6BF-4A46FDDBC88E}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\TypeLib\{AB705628-B25B-491B-A6BF-4A46FDDBC88E}\1.0\FLAGS]
"(Default)" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKCR\IEHlprObj.IEHlprObj.1]
"(Default)" = "IEHlprObj Class"
[HKCR\Interface\{AB705621-B25B-491B-A6BF-4A46FDDBC88E}\TypeLib]
"Version" = "1.0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCR\CLSID\{AB705622-B25B-491B-A6BF-4A46FDDBC88E}\InprocServer32]
"ThreadingModel" = "Apartment"
[HKCR\Interface\{AB705621-B25B-491B-A6BF-4A46FDDBC88E}]
"(Default)" = "IIEHlprObj"
[HKCR\IEHlprObj.IEHlprObj]
"(Default)" = "IEHlprObj Class"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCR\IEHlprObj.IEHlprObj.1\CLSID]
"(Default)" = "{AB705622-B25B-491B-A6BF-4A46FDDBC88E}"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "15 98 20 1B 1E E7 D1 34 F6 7E C6 18 68 C2 9A 84"
[HKCR\CLSID\{AB705622-B25B-491B-A6BF-4A46FDDBC88E}]
"(Default)" = "IEHlprObj Class"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCR\CLSID\{AB705622-B25B-491B-A6BF-4A46FDDBC88E}\InprocServer32]
"(Default)" = "%System%\kakutk.dll"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCR\CLSID\{AB705622-B25B-491B-A6BF-4A46FDDBC88E}\ProgID]
"(Default)" = "IEHlprObj.IEHlprObj.1"
[HKCR\TypeLib\{AB705628-B25B-491B-A6BF-4A46FDDBC88E}\1.0\HELPDIR]
"(Default)" = "%System%\"
The process %original file name%.exe:320 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCR\CLSID\HOOK_ID]
"Name" = "%original file name%.exe"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1B 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "49 20 93 85 03 9A 75 75 8A E3 0B E7 DE DC D1 D5"
[HKCR\CLSID\SYS_DLL]
"Name" = "giynhrYsD.dll"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKLM\System\CurrentControlSet\Control\Session Manager]
"PendingFileRenameOperations" = "\??\%System%\jdiguuwBsh, \??\%System%\jdiguuwBsh"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan deletes the following registry key(s):
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects]
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435b-BC74-9C25C1C588A9}]
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E7E6F031-17CE-4C07-BC86-EABFE594F69C}]
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}]
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
Dropped PE files
| MD5 | File path |
|---|---|
| 90affacb3c4f110ba63df2be93f2e41a | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\A1.zip |
| 0b14dfd82a538cf8933435397dbc4925 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\B1.zip |
| 743cac2a53ba132d086853141246d7d7 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\C1.zip |
| 5c12660a97822f6e61576943b49aaad6 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\H7Ui28hui |
| a581a82cb3267abb7543946ada12bcfa | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\dyeky.dll |
| 1f08a122535451e44926934069f39d2a | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\giynhrYsD.dll |
| 883ef2dd3c9f68691ce02daac7267d41 | c:\Program Files\Java\jre6\bin\swe5i |
| fd60844f7dc0cf7c7afa70b7ec6d0a7e | c:\Program Files\Java\jre6\lib\deploy\jqs\ie\7PhfhwYk |
| 565caee4622770caac3aa1213d6738cc | c:\WINDOWS\system32\drivers\3a2ba1fa.sys |
| 4e3d06d6e68eedb52565080f55b460d3 | c:\WINDOWS\system32\jdiguuwBsh |
| 28d9e9a9f8184972ce262a4d9fad6aac | c:\WINDOWS\system32\kakutk.dll |
| 4e3d06d6e68eedb52565080f55b460d3 | c:\WINDOWS\system32\wshtcptk.dll |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
Using the driver "%System%\drivers\3a2ba1fa.sys" the Trojan controls loading executable images into a memory by installing the Load image notifier.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 806912 | 1536 | 0 | 033faf6d9fca77f29d3529b55e7abba8 |
| .data | 811008 | 204800 | 201216 | 5.53196 | 4a79f1b149a5041886eaece7dd20e9be |
| .rsrc | 1015808 | 8192 | 6144 | 0.378005 | 0445acc62bc38f6c01f643cc6b44dfe6 |
| .reloc | 1024000 | 4096 | 1536 | 0.065844 | c158ec72e8b1f3d2ed53aff4d702d457 |
| .idata | 1028096 | 20480 | 16896 | 3.2386 | 31347d4c9120a884a1f55d165cb539f2 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://198.105.210.188/get.asp?mac=D51B80D0FFCCD68BB0C633ADD668FF39&os=winxp Professional&avs=unknow&ps=NO.&ver=jack | |
| hxxp://educaresurvivorship.com/get.asp?mac=D51B80D0FFCCD68BB0C633ADD668FF39&os=winxp Professional&avs=unknow&ps=NO.&ver=jack | |
| hxxp://www.educaresurvivorship.com/get.asp?mac=D51B80D0FFCCD68BB0C633ADD668FF39&os=winxp Professional&avs=unknow&ps=NO.&ver=jack |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET USER_AGENTS Suspicious user agent (Google page)
ET TROJAN Win32/Comisproc Checkin
ET TROJAN Murlo Trojan Checkin
Traffic
GET /get.asp?mac=D51B80D0FFCCD68BB0C633ADD668FF39&os=winxp Professional&avs=unknow&ps=NO.&ver=jack HTTP/1.1
User-Agent: Google page
Connection: Keep-Alive
Cache-Control: no-cache
Host: VVV.educaresurvivorship.com
HTTP/1.1 404 Not Found
Date: Tue, 16 Dec 2014 05:40:31 GMT
Server: Apache/2.2.26 (Unix) mod_ssl/2.2.26 OpenSSL/1.0.1e-fips mod_bwlimited/1.4
X-Powered-By: PHP/5.4.25
Connection: close
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8
X-Pad: avoid browser bug4cd..<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"hXXp://VVV.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">.<htm
l xmlns="hXXp://VVV.w3.org/1999/xhtml">.<head>.<meta http-
equiv="Content-Type" content="text/html; charset=utf-8" />.<titl
e>EduCare Survivorship - Page Not Found</title>.<link href
="/styles/styles.css" rel="stylesheet" type="text/css" />.</head
>.<body>.<div id="container">..<div id="nav">&nbs
p;</div>..<img id="banner_img" src="/images/educares.jpg" use
map="#banner_img" border="0" width="990" height="416" alt="EduCare, In
c" />..<map id="_banner_img" name="banner_img">...<area sh
ape="rect" coords="792,341,985,411" href="hXXp://VVV.educareinc.com" a
lt="EduCare, Inc" />..</map>..<div id="subnav">. .&n
bsp;..</div>..<div id="content"> ...<h1>Page Not Fou
nd</h1>...<p>We apologize for the inconvenience, but the r
equested page (VVV.educaresurvivorship.com/get.asp) was not found.<
/p>. <p><a href="/" title="Return Home">Return H
ome</a></p>..</div> ..<div id="footer-content">
;<a href="hXXp://EduCareInc.com" target="_blank">EduCareInc.com&
lt;/a> ... 8420 ..<<< skipped >>>
GET /get.asp?mac=D51B80D0FFCCD68BB0C633ADD668FF39&os=winxp Professional&avs=unknow&ps=NO.&ver=jack HTTP/1.1
User-Agent: Google page
Host: 198.105.210.188
Cache-Control: no-cache
HTTP/1.1 302 Moved Temporarily
Date: Tue, 16 Dec 2014 05:40:30 GMT
Server: Apache/2.2.26 (Unix) mod_ssl/2.2.26 OpenSSL/1.0.1e-fips mod_bwlimited/1.4
X-Powered-By: PHP/5.4.25
Location: hXXp://VVV.educaresurvivorship.com/get.asp?mac=D51B80D0FFCCD68BB0C633ADD668FF39&os=winxp Professional&avs=unknow&ps=NO.&ver=jack
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8
The Trojan connects to the servers at the folowing location(s):
Lineage Windows Client
[email protected]
%s?up=%s&pp=%s&spp=%s
Diablo III.exe
ws2_32.dll
ti.asp?up=%s&pp=%s
%s?ap=%s&sp=%s&up=%s&pp=%s&ssp=%s&spp=%s&rp=%s&lp=%d
X,
%s?ap=%s&sp=%s&up=%s&pp=%s&ssp=%s&spp=%s&rp=%s
DNF.cfg
\res\PCOTP.okf
kernel32.dll
dnf.exe
%sHShield\ehsvc.dll
pcotp.exe
%s?ap=%s&sp=%s&mp=%s&ssp=%s&spp=%s&rp=%s&up=%s&pp=%s
%s?ap=%s&sp=%s&mp=%s&ssp=%s&spp=%s&up=%s&pp=%s
%s?ap=%s&sp=%s&up=%s&pp=%s&ssp=%s&spp=%s
explorer.exe
%s?ap=%s&sp=%s&up=%s&pp=%s&lp=%s&spp=%s
maplestory.exe
%s?ap=%s&sp=%s&up=%s&pp=%s&ssp=%s&spp=%s&lp=%s&rp=%s&op=%s
ngm.exe
baramt.exe
winbaram.exe
ngmdll.dll
%s?ap=%s&sp=%s&up=%s&pp=%s&spp=%s&ssp=%s
0xx
8888888
%s?ap=%s&sp=%s&up=%s&pp=%s&ssp=%s
client.exe
msvcr90.dll
119.205.224.147
119.205.224.149
119.205.224.150
119.205.224.151
119.205.224.153
119.205.224.159
119.205.224.157
119.205.224.158
119.205.224.160
119.205.224.163
YGOnline.exe
211.39.155.77
211.39.155.78
211.39.155.79
211.39.155.84
211.39.155.81
211.39.155.82
211.39.155.83
211.39.155.80
211.39.155.85
211.39.155.86
211.39.155.95
211.39.155.96
211.39.155.97
211.39.155.98
211.39.155.99
211.39.155.100
211.39.155.101
211.39.155.102
211.39.155.106
211.39.155.107
211.39.155.108
211.39.155.109
211.39.155.110
211.39.155.90
211.39.155.88
211.39.155.89
cabal2main.exe
gameguard.des
%s-%s-%s-%s
%s-%s-%s-%s-%s
%s-%s-%s
ie ....Hwnd::::::::%x
Hwnd::::::::%x,class:%s
OLEACC.DLL
1111111%s:%s
gtc_pay_info%d
btc_pay_passwd
btc_pay_info%d
FunnyCard$txtFunnyCardNo%d
ftc_pay_info%d
Pyunweijum$txtPin%d
ptc_pay_info%d
TeenCash$txtPin%d
tc_pay_info%d
ctl00$ContentPlaceHolder1$PayInfoControl$GAMEGIFTControl$txt_gamegift_pin%d
GameCulture$txtPinNumber_%d
ctl00$ContentPlaceHolder1$PayInfoControl$GTCARDControl$txt_gtcard_pin%d
ctl00$ContentPlaceHolder1$PayInfoControl$BOOKLIFEControl$txt_booklife_pin%d
ctl00$ContentPlaceHolder1$PayInfoControl$TEENCASHControl$txt_teencash_pin%d
fifazf.exe
raycity.exe
launchern.exe
ModuMarble.exe
cstrike-online.exe
suddenattack.exe
KartRider.exe
%s?ap=%s&up=%s&pp=%s&ssp=%s
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
Mozilla/4.0 (compatible)
sos.exe
ykm.exe
~!@#$%^&*
heroes.exe
MYSFTY.EXE
CHROME.EXE
FIREFOX.EXE
NVCAGENT.NPC
NSVMON.NPC
NSAVSVC.NPC
V3SP.EXE
V3SVC.EXE
V3UP.EXE
V3LSVC.EXE
V3LRUN.EXE
V3LTRAY.EXE
MUPDATE2.EXE
SGSVC.EXE
SGUI.EXE
SGRUN.EXE
NAVERAGENT.EXE
AVP.EXE
AYRTSRV.AYE
AYUPDSRV.AYE
AYAGENT.AYE
AVGNT.EXE
AVCENTER.EXE
AVGUARD.EXE
AVSCAN.EXE
AVUPGSVC.EXE
AVWSC.EXE
AVASTSVC.EXE
ASHUPD.EXE
AVASTUI.EXE
SHSTAT.EXE
MCTRAY.EXE
UDATERUI.EXE
MSSECES.EXE
EGUI.EXE
EKRN.EXE
CCSVCHST.EXE
NAVW32.EXE
UPDATESRV.EXE
VSSERV.EXE
SECCENTER.EXE
BDAGENT.EXE
BDREINIT.EXE
AVGAM.EXE
AVGEMC.EXE
AVGNSX.EXE
AVGRSX.EXE
AVGFRW.EXE
AVGWDSVC.EXE
AVGUPD.EXE
bsier2.dat
bsiezq.dat
bsiejh.dat
bsiepk.dat
bsielq.dat
bsgdsos.dat
bsiegd.dat
bsiemxd.dat
bsiedk.dat
bsdfsos.dat
bsdfloc.dat
bsiednf.dat
bsiear.dat
bsieal.dat
V3LRun.exe
V3LTray.exe
iexplore.exe
EstRtw.sys
fltlib.dll
Mozilla/5.0 (compatible)
ntdll.dll
urlinfo
\\.\%s
Mozilla/6.0 (compatible)
\??\%s
Software\Microsoft\Windows\CurrentVersion\Run
r2client.exe
|9|3|1|1|0|
|9|1|1|1|0|
CMStarterCore.exe
archeage.exe
msvcr100.dll
x2game.dll
%s%s.dat
%s[%d]
lin.bin
mss32.dll
%s?ap=%s&sp=%s&up=%s&pp=%s&ssp=%s&rp=