Trojan.GenericKD.2401598_c008687e35
Trojan.GenericKD.2401598 (B) (Emsisoft), Trojan.GenericKD.2401598 (AdAware), Trojan-PSW.Win32.MSNPassword.FD, Trojan.Win32.FlyStudio.FD, GenericEmailWorm.YR, TrojanFlyStudio.YR (Lavasoft MAS)
Behaviour: Trojan-PSW, Trojan, Worm, EmailWorm
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: c008687e35a052bda4eb7c7a9bfb7beb
SHA1: bbecb59c9da15b2e81ffd0b15c64b99f03bdc2a2
SHA256: 7ca33c8f74d6e645b9f72e2b543415ddbfe33fa8f68f45178a66456c0a5d90a5
SSDeep: 24576:cZ v38iSg2uCOPizG37vpHJDqrEbE3LyzqaFvyJ8FowEG8GN9Q1z/:cZhgi5G37vpHJuAbELymaxyWFv
Size: 1531904 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2014-02-28 15:22:56
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
| Behaviour | Description |
|---|---|
| EmailWorm | Worm can send e-mails. |
Process activity
The Trojan creates the following process(es):
No processes have been created.
The Trojan injects its code into the following process(es):
%original file name%.exe:188
Mutexes
The following mutexes were created/opened:
CTF.TMD.MutexDefaultS-1-5-21-1844237615-1960408961-1801674531-1003
CTF.Layouts.MutexDefaultS-1-5-21-1844237615-1960408961-1801674531-1003
CTF.Asm.MutexDefaultS-1-5-21-1844237615-1960408961-1801674531-1003
CTF.Compart.MutexDefaultS-1-5-21-1844237615-1960408961-1801674531-1003
CTF.LBES.MutexDefaultS-1-5-21-1844237615-1960408961-1801674531-1003
oleacc-msaa-loaded
ZonesLockedCacheCounterMutex
ZonesCacheCounterMutex
ZonesCounterMutex
WininetProxyRegistryMutex
WininetConnectionMutex
WininetStartupMutex
c:!documents and settings!adm!local settings!history!history.ie5!
c:!documents and settings!adm!cookies!
c:!documents and settings!adm!local settings!temporary internet files!content.ie5!
_!MSFTHISTORY!_
RasPbFile
ShimCacheMutex
File activity
The process %original file name%.exe:188 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (256 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@mmstat[2].txt (168 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\UVKJ45OV\bg[1].gif (753 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\UVKJ45OV\boxbg[1].gif (8831 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][2].txt (256 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\6APR5SOT\stat[1].gif (43 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\UVKJ45OV\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\E32DQHGF\stat[1].gif (43 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@cnzz[1].txt (163 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@mmstat[1].txt (168 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@cnzz[2].txt (163 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\UVKJ45OV\stat[1].php (5895 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\desktop.ini (159 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][2].txt (203 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (203 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OGJ3DGA8\app[1].gif (43 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OGJ3DGA8\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\E32DQHGF\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\E32DQHGF\login1[1].htm (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\6APR5SOT\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (3116 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OGJ3DGA8\core[1].php (750 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OGJ3DGA8\app[1].gif (0 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (0 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@mmstat[1].txt (0 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (0 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@cnzz[1].txt (0 bytes)
Registry activity
The process %original file name%.exe:188 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKCR\TypeLib\{1EA4DBF0-3C3B-11CF-810C-00AA00389B71}\1.1\0\win32]
"(Default)" = "%System%\oleacc.dll"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1B 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "01 5E B0 8C 70 33 45 91 69 A5 0C C9 E0 61 15 C4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
Dropped PE files
There are no dropped PE files.
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
Company Name: ???????
Product Name: ???????
Product Version: 1.0.0.0
Legal Copyright: ??????? ????
Legal Trademarks:
Original Filename:
Internal Name:
File Version: 1.0.0.0
File Description: ???????
Comments: ???????
Language: English (United States)
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 884350 | 884736 | 5.13621 | 9776503996c2996b82dd8fba0e0dc46b |
| .rdata | 888832 | 538270 | 540672 | 4.65864 | 008cd29276ad058495e675db119f4d90 |
| .data | 1429504 | 409418 | 69632 | 4.34191 | 96e462d4f478c44677d62c84e5b24e5f |
| .rsrc | 1839104 | 27780 | 28672 | 3.82968 | 32505695d24d018b21638a8c9054085a |
| .text | 1867776 | 1057 | 4096 | 1.8805 | f8f25f1157ad8d9b382ea30e1f58edfd |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://moxiwang.free3v.net/1/login1.asp | |
| hxxp://all.cnzz.com.danuoyi.tbcache.com/stat.php?id=986628&web_id=986628 | |
| hxxp://all.cnzz.com.danuoyi.tbcache.com/core.php?web_id=986628&t=z | |
| hxxp://oz.cnzz.com/stat.htm?id=986628&r=&lg=en-us&ntime=none&cnzz_eid=2005226779-1432564554-&showp=1276x846&t=undefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefined...&h=1&rnd=756335749 | |
| hxxp://oz.cnzz.com/stat.htm?id=986628&r=http://moxiwang.free3v.net/1/login1.asp&lg=en-us&ntime=1432564554&cnzz_eid=2005226779-1432564554-&showp=1276x846&t=undefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefined...&h=1&rnd=330115055 | |
| hxxp://cnzz.mmstat.com/9.gif?abc=1&rnd=781591846 | |
| hxxp://moxiwang.free3v.net/boxbg.gif | |
| hxxp://moxiwang.free3v.net/bg.gif | |
| hxxp://cnzz.mmstat.com/9.gif?abc=1&rnd=748174615 | |
| hxxp://cnzz.mmstat.com/app.gif?&cna=AS3qDVW8o3MCAcGK9Oe3JH25 | |
| hxxp://cnzz.mmstat.com/app.gif?&cna=AS3qDaH4ogoCAcGK9OcMhe/1 | |
| hxxp://im.free3v.net/bg.gif | |
| hxxp://im.free3v.net/boxbg.gif | |
| hxxp://s9.cnzz.com/stat.php?id=986628&web_id=986628 | |
| hxxp://pcookie.cnzz.com/app.gif?&cna=AS3qDVW8o3MCAcGK9Oe3JH25 | |
| hxxp://c.cnzz.com/core.php?web_id=986628&t=z |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET /app.gif?&cna=AS3qDVW8o3MCAcGK9Oe3JH25 HTTP/1.1
Accept: */*
Referer: hXXp://moxiwang.free3v.net/1/login1.asp
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Connection: Keep-Alive
Host: pcookie.cnzz.com
HTTP/1.1 200 OK
Server: Tengine
Date: Mon, 25 May 2015 15:25:54 GMT
Content-Type: image/gif
Content-Length: 43
Connection: keep-alive
P3P: CP="NOI DSP COR CURa ADMa DEVa PSAa PSDa OUR IND UNI PUR NAV"
Set-Cookie: cna=AS3qDVW8o3MCAcGK9Oe3JH25; expires=Thu, 22-May-25 15:25:54 GMT; path=/; domain=.cnzz.com
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache
Pragma: no-cacheGIF89a.............!.......,...........L..;HTTP/1.1 200 OK..Server: Te
ngine..Date: Mon, 25 May 2015 15:25:54 GMT..Content-Type: image/gif..C
ontent-Length: 43..Connection: keep-alive..P3P: CP="NOI DSP COR CURa A
DMa DEVa PSAa PSDa OUR IND UNI PUR NAV"..Set-Cookie: cna=AS3qDVW8o3MCA
cGK9Oe3JH25; expires=Thu, 22-May-25 15:25:54 GMT; path=/; domain=.cnzz
.com..Expires: Thu, 01 Jan 1970 00:00:01 GMT..Cache-Control: no-cache.
.Pragma: no-cache..GIF89a.............!.......,...........L..;..
GET /boxbg.gif HTTP/1.1
Accept: */*
Referer: hXXp://moxiwang.free3v.net/1/login1.asp
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: im.free3v.net
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Mon, 25 May 2015 15:26:03 GMT
Content-Length: 34665
Content-Type: image/gif
Content-Location: hXXp://im.free3v.net/boxbg.gif
Last-Modified: Wed, 04 Sep 2013 01:44:53 GMT
Accept-Ranges: bytes
ETag: "a64c4c5a10a9ce1:e32"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NETGIF89a....................&'. ,..0.13.35.59.59.12.,-.67.7;.79.79.79.;?
.KL.|~.op...........#.*0.JN.Z_........................................
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
.........##.((.......('.$$.55.//.55.44.33.97.88.::.88.LL!.............
.JGGhdd533............................................................
......................................................................
.....VVV...,...............8pG....*\......#J.H.....3j...... C..I....(S
.\.p.../[email protected].*].....P.J.J....X.j....N...h.Y....
4}$2g....p...K....x............L...... ^......#.5..G.....u.....`]..A..
i.8R.^.Z5...c..!.....s..=.........;....S...:...=..H.b...(....=........
O......._.........O........q.3A..X.....v.h.........l..'....g...QX[..-.
\s.A'.u.Y....u...,....0.([email protected]:..Q...&. ..>8..L.....5.!r
.}.Z.RH7]u%.pb...([email protected]..`....`.H@....@)(pRvX.i.]...
\v.e!.y....Vj...f..z......LAg.........$.M.....R...i.b.h..i.......... .
..%...=....!.j.....j.......2y.......#......k...........wR...........*.
.Lb ..S"..i...........7....Z!E(...D.X.Z..x....}../..B.........5z..(F*)
.4.l..8.G.A.c.q....q...<..%?y2..!Zp..:J..9Wm..XW.s!.......m..8.<<< skipped >>>
GET /stat.htm?id=986628&r=http://moxiwang.free3v.net/1/login1.asp&lg=en-us&ntime=1432564554&cnzz_eid=2005226779-1432564554-&showp=1276x846&t=undefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefined...&h=1&rnd=330115055 HTTP/1.1
Accept: */*
Referer: hXXp://moxiwang.free3v.net/1/login1.asp
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: oz.cnzz.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: Tengine/1.4.6
Date: Mon, 25 May 2015 15:25:53 GMT
Content-Type: image/gif
Content-Length: 43
Last-Modified: Mon, 09 Mar 2015 09:01:02 GMT
Connection: close
Accept-Ranges: bytesGIF89a.............!.......,...........D..;..
GET /stat.htm?id=986628&r=&lg=en-us&ntime=none&cnzz_eid=2005226779-1432564554-&showp=1276x846&t=undefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefined...&h=1&rnd=756335749 HTTP/1.1
Accept: */*
Referer: hXXp://moxiwang.free3v.net/1/login1.asp
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: oz.cnzz.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: Tengine/1.4.6
Date: Mon, 25 May 2015 15:25:53 GMT
Content-Type: image/gif
Content-Length: 43
Last-Modified: Mon, 09 Mar 2015 09:01:02 GMT
Connection: close
Accept-Ranges: bytesGIF89a.............!.......,...........D..;..
GET /1/login1.asp HTTP/1.1
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/x-ms-application, application/x-ms-xbap, application/vnd.ms-xpsdocument, application/xaml xml, */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: moxiwang.free3v.net
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Mon, 25 May 2015 15:26:01 GMT
Server: Microsoft-IIS/6.0
Content-Type: text/html
Content-Length: 1657<html>..<head>..<meta http-equiv="Content-Language" con
tent="zh-cn">..<meta http-equiv="Content-Type" content="text/htm
l; charset=gb2312">..<title>........ free.3v.do ....100M.....
...ASP....</title>..<style>..A:link {.. color: #008000;..
text-decoration: none..}..A:visited {.. color: #008000;.. text-decorat
ion: none..}..A:hover {.. color: #ff7f24;.. text-decoration: none;..}.
.A:active {.. color: #ff7f24; .. text-decoration: none;..}..</styl
e>..</head>..<body oncontextmenu=self.event.returnValue=fa
lse scroll="no" style="margin:0">..<div id="ad_3v" style="z-inde
x:1000;position:absolute;right:40px;top:50px;font-size:14px;line-heigh
t:20px;"><a title="..........................40%.........." hre
f="hXXp://VVV.3v.do/kefu/news/121.html" target="_blank"><font co
lor=red>........</font></a><br><a href="http:/
/free.3v.do" target="_blank">........</a><br><a href
="hXXp://VVV.3v.do/xnzj/" target="_blank">........</a><br&
gt;<a href="hXXp://VVV.3v.do/xnzj/hk.html" target="_blank">.....
...</a><br><a href="hXXp://VVV.3v.do/xnzj/gf.html" targ
et="_blank">........</a></div>..<a href="hXXp://moxi
wang.free3v.net/1/login1.asp" id="link" target="frm"></a>..&l
t;iframe name="frm" src="" border="0" frameborder="no" scrolling="auto
" allowtransparency="yes" marginheight="0" marginwidth="0" width="100%
" height="100%"></iframe>..<script type="text/javascri<<< skipped >>>
GET /9.gif?abc=1&rnd=748174615 HTTP/1.1
Accept: */*
Referer: hXXp://moxiwang.free3v.net/1/login1.asp
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: cnzz.mmstat.com
Connection: Keep-Alive
HTTP/1.1 302 Found
Server: Tengine
Date: Mon, 25 May 2015 15:25:53 GMT
Content-Type: image/gif
Content-Length: 43
Connection: keep-alive
P3P: CP="NOI DSP COR CURa ADMa DEVa PSAa PSDa OUR IND UNI PUR NAV"
Set-Cookie: cna=AS3qDaH4ogoCAcGK9OcMhe/1; expires=Thu, 22-May-25 15:25:53 GMT; path=/; domain=.mmstat.com
Set-Cookie: sca=478d4441; path=/; domain=.cnzz.mmstat.com
Set-Cookie: atpsida=de48c14461ad409a4f42fd22_1432567553; expires=Thu, 22-May-25 15:25:53 GMT; path=/; domain=.cnzz.mmstat.com
Location: hXXp://pcookie.cnzz.com/app.gif?&cna=AS3qDaH4ogoCAcGK9OcMhe/1
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache
Pragma: no-cacheGIF89a.............!.......,...........L..;HTTP/1.1 302 Found..Server:
Tengine..Date: Mon, 25 May 2015 15:25:53 GMT..Content-Type: image/gif
..Content-Length: 43..Connection: keep-alive..P3P: CP="NOI DSP COR CUR
a ADMa DEVa PSAa PSDa OUR IND UNI PUR NAV"..Set-Cookie: cna=AS3qDaH4og
oCAcGK9OcMhe/1; expires=Thu, 22-May-25 15:25:53 GMT; path=/; domain=.m
mstat.com..Set-Cookie: sca=478d4441; path=/; domain=.cnzz.mmstat.com..
Set-Cookie: atpsida=de48c14461ad409a4f42fd22_1432567553; expires=Thu,
22-May-25 15:25:53 GMT; path=/; domain=.cnzz.mmstat.com..Location: htt
p://pcookie.cnzz.com/app.gif?&cna=AS3qDaH4ogoCAcGK9OcMhe/1..Expires: T
hu, 01 Jan 1970 00:00:01 GMT..Cache-Control: no-cache..Pragma: no-cach
e..GIF89a.............!.......,...........L..;..
GET /bg.gif HTTP/1.1
Accept: */*
Referer: hXXp://moxiwang.free3v.net/1/login1.asp
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: im.free3v.net
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Mon, 25 May 2015 15:26:03 GMT
Content-Length: 3120
Content-Type: image/gif
Content-Location: hXXp://im.free3v.net/bg.gif
Last-Modified: Wed, 04 Sep 2013 01:43:34 GMT
Accept-Ranges: bytes
ETag: "0a79f2a10a9ce1:e32"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NETGIF89a.......~..f........R..............N........X..K.....v..Z..z.....
@..n..h.....T..............(..8..^.....2..............x..r........E..-
.....J..`..V..e.....:...........p.....P..<........ .....H..&.......
....b.....k..)..\.................\..............B..4..t.....|........
*........%..6..$..0..P.....D...........0..V..K...........6..E.........
...................................".............. ...................
..........|..........................l..?..........................v..
............!......................."..m..!...........i..............c
........o..........................#..............8..m..............=.
..............................................C.....X.....d..~........
.........#..........."..H.....2...........&..O..............o.........
..{...........!.......,............E.QE@..=..".HP.A.m..Q.HbED,*.aA.#.V
.Z.R.`....f.I9....3d.h0.&..4q..)3...>{..qSF.@.."."c)R._.&.$.. V.n..
z.../^..b.0..u{.}1.......m........l......[[email protected].&&......!?n<..d
.E"cq..Kc..=....3...w.&.e...*^....v....x.....#......wo.L......q#e|..!.
.t...g....v)R...oA=<x...si..={..........B:.oa....B...}..P.~....8...
[email protected]."%).."%QL.E.Q....Q....?......H
..9.AD..,..$)....QB...Qb..1)....^....)....]....c.....4`B.r.YC.,4P..g.0
g.&$.g....h..&0E._|1...>......(..|....n.).7t.....J.....*...p.......
....k.................([email protected]`...|.....a......
[email protected]...[K-....//4........s4<G...pq..k...s
|\..DT.......,......`..4..L.$..l3...1..DP ....#.1...K.B'..:.....T.<<< skipped >>>
GET /1/login1.asp HTTP/1.1
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/x-ms-application, application/x-ms-xbap, application/vnd.ms-xpsdocument, application/xaml xml, */*
Referer: hXXp://moxiwang.free3v.net/1/login1.asp
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: moxiwang.free3v.net
Connection: Keep-Alive
HTTP/1.1 404 Not Found
Date: Mon, 25 May 2015 15:26:02 GMT
Content-Length: 2635
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET<!doctype html public "-//w3c//dtd html 4.01 transitional//en" "htt
p://VVV.w3c.org/tr/1999/rec-html401-19991224/loose.dtd">..<html
xmlns="hXXp://VVV.w3.org/1999/xhtml">..<head><title>...
..... free.3v.do ........</title>..<meta content="text/html;
charset=gb2312" >..<style type="text/css">..body {.padding-bo
ttom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; padding
-top: 0px}..html {.padding-bottom: 0px; margin: 0px; padding-left: 0px
; padding-right: 0px; padding-top: 0px}..body {.text-align: center; li
ne-height: 30px; background: url("hXXp://im.free3v.net/bg.gif") repeat
-x 50% top; font-size: 14px; padding-top: 130px}...box {.text-align: l
eft; padding-bottom: 0px; margin: 0px auto; padding-left: 228px; width
: 500px; padding-right: 40px; background: url(hXXp://im.free3v.net/box
bg.gif) no-repeat; height: 335px; padding-top: 60px}...box strong { fo
nt-family: "microsoft yahei"; color: #f60; font-size: 18px}...copy {.t
ext-align: center; padding-bottom: 0px; padding-left: 0px; padding-rig
ht: 0px; font-family: "microsoft yahei"; color: #666; font-size: 11px;
padding-top: 20px}...copy a { color: #f60}...copy a:hover {.color: #f
30}..a{ text-decoration : none}..</style>..</head>..<bo
dy>..<div class="box"><strong>....................!<
/strong><br>......................<br>.................
.<a style="color:blue" href=hXXp://free.3v.do/news/2.html target=_b
lank>hXXp://free.3v.do/news/2.html</a><br>.........<<< skipped >>>
GET /core.php?web_id=986628&t=z HTTP/1.1
Accept: */*
Referer: hXXp://moxiwang.free3v.net/1/login1.asp
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: c.cnzz.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: Tengine
Content-Type: application/javascript
Content-Length: 750
Connection: keep-alive
Date: Mon, 25 May 2015 15:22:18 GMT
Last-Modified: Mon, 25 May 2015 15:22:18 GMT
Expires: Mon, 25 May 2015 15:37:18 GMT
Via: cache2.l2de1[0,200-0,H], cache13.l2de1[0,0], cache10.de1[0,200-0,H], cache2.de1[0,0]
Age: 214
X-Cache: HIT TCP_MEM_HIT dirn:-2:-2
X-Swift-SaveTime: Mon, 25 May 2015 15:23:23 GMT
X-Swift-CacheTime: 835!function(){var p,q,r,a=encodeURIComponent,b="986628",c="",d="",e="onl
ine_v3.php",f="hzs10.cnzz.com",g="1",h="text",i="z",j="站长
;统计",k=window["_CNZZDbridge_" b].bobject,l="http:",m="0"
,n=l "//online.cnzz.com/online/" e,o=[];o.push("id=" b),o.push("h=" f)
,o.push("on=" a(d)),o.push("s=" a(c)),n ="?" o.join("&"),"0"===m&&k.ca
llRequest([l "//cnzz.mmstat.com/9.gif?abc=1"]),g&&(""!==d?k.createScri
ptIcon(n,"utf-8"):(q="z"==i?"hXXp://VVV.cnzz.com/stat/website.php?web_
id=" b:"hXXp://quanjing.cnzz.com","pic"===h?(r=l "//icon.cnzz.com/img/
" c ".gif",p="<a href='" q "' target=_blank title='" j "'><im
g border=0 hspace=0 vspace=0 src='" r "'></a>"):p="<a href
='" q "' target=_blank title='" j "'>" j "</a>",k.createIcon(
[p])))}();HTTP/1.1 200 OK..Server: Tengine..Content-Type: application/
javascript..Content-Length: 750..Connection: keep-alive..Date: Mon, 25
May 2015 15:22:18 GMT..Last-Modified: Mon, 25 May 2015 15:22:18 GMT..
Expires: Mon, 25 May 2015 15:37:18 GMT..Via: cache2.l2de1[0,200-0,H],
cache13.l2de1[0,0], cache10.de1[0,200-0,H], cache2.de1[0,0]..Age: 214.
.X-Cache: HIT TCP_MEM_HIT dirn:-2:-2..X-Swift-SaveTime: Mon, 25 May 20
15 15:23:23 GMT..X-Swift-CacheTime: 835..!function(){var p,q,r,a=encod
eURIComponent,b="986628",c="",d="",e="online_v3.php",f="hzs10.cnzz.com
",g="1",h="text",i="z",j="站长统计",k=window["
_CNZZDbridge_" b].bobject,l="http:",m="0",n=l "//online.cnzz.com/onlin
e/" e,o=[];o.push("id=" b),o.push("h=" f),o.push("on=" a(d)),o.pus<<< skipped >>>
GET /stat.php?id=986628&web_id=986628 HTTP/1.1
Accept: */*
Referer: hXXp://moxiwang.free3v.net/1/login1.asp
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: s9.cnzz.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: Tengine
Content-Type: application/javascript
Content-Length: 10067
Connection: keep-alive
Date: Mon, 25 May 2015 14:35:54 GMT
Last-Modified: Mon, 25 May 2015 14:35:54 GMT
Cache-Control: max-age=5400,s-maxage=5400
Via: cache11.l2de1[883,200-0,M], cache10.l2de1[884,0], cache7.de1[0,200-0,H], cache4.de1[1,0]
Age: 2998
X-Cache: HIT TCP_MEM_HIT dirn:1:333060109
X-Swift-SaveTime: Mon, 25 May 2015 14:35:54 GMT
X-Swift-CacheTime: 5400(function(){function k(){this.c="986628";this.R="z";this.N="";this.K="
";this.M="";this.r="1432564554";this.P="oz.cnzz.com";this.L="";this.u=
"CNZZDATA" this.c;this.t="_CNZZDbridge_" this.c;this.F="_cnzz_CV" this
.c;this.G="CZ_UUID" this.c;this.v="0";this.A={};this.a={};this.la()}fu
nction g(a,b){try{var c=.[];c.push("siteid=986628");c.push("name=" f(a
.name));c.push("msg=" f(a.message));c.push("r=" f(h.referrer));c.push(
"page=" f(e.location.href));c.push("agent=" f(e.navigator.userAgent));
c.push("ex=" f(b));c.push("rnd=" Math.floor(2147483648*Math.random()))
;(new Image).src="hXXp://jserr.cnzz.com/log.php?" c.join("&")}catch(d)
{}}var h=document,e=window,f=encodeURIComponent,l=decodeURIComponent,n
=unescape,p=escape;k.prototype={la:function(){try{this.U(),this.J(),th
is.ia(),this.H(),this.o(),.this.ga(),this.fa(),this.ja(),this.j(),this
.ea(),this.ha(),this.ka(),this.ca(),this.aa(),this.da(),this.qa(),e[th
is.t]=e[this.t]||{},this.ba("_cnzz_CV")}catch(a){g(a,"i failed")}},oa:
function(){try{var a=this;e._czc={push:function(){return a.B.apply(a,a
rguments)}}}catch(b){g(b,"oP failed")}},aa:function(){try{var a=e._czc
;if("[object Array]"==={}.toString.call(a))for(var b=0;b<a.length;b
){var c=a[b];switch(c[0]){case "_setAccount":e._cz_account="[object
String]"==={}.toString.call(c[1])?c[1]:String(c[1]);.break;case "_setA
utoPageview":"boolean"===typeof c[1]&&(e._cz_autoPageview=c[1])}}}catc
h(d){g(d,"cS failed")}},qa:function(){try{if("undefined"===typeof e._c
z_account||e._cz_account===this.c){e._cz_account=this.c;if("[objec<<< skipped >>>
GET /9.gif?abc=1&rnd=781591846 HTTP/1.1
Accept: */*
Referer: hXXp://moxiwang.free3v.net/1/login1.asp
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: cnzz.mmstat.com
Connection: Keep-Alive
HTTP/1.1 302 Found
Server: Tengine
Date: Mon, 25 May 2015 15:25:53 GMT
Content-Type: image/gif
Content-Length: 43
Connection: keep-alive
P3P: CP="NOI DSP COR CURa ADMa DEVa PSAa PSDa OUR IND UNI PUR NAV"
Set-Cookie: cna=AS3qDVW8o3MCAcGK9Oe3JH25; expires=Thu, 22-May-25 15:25:53 GMT; path=/; domain=.mmstat.com
Set-Cookie: sca=0b0f9291; path=/; domain=.cnzz.mmstat.com
Set-Cookie: atpsida=27683b255cb4cbefaf5e022a_1432567553; expires=Thu, 22-May-25 15:25:53 GMT; path=/; domain=.cnzz.mmstat.com
Location: hXXp://pcookie.cnzz.com/app.gif?&cna=AS3qDVW8o3MCAcGK9Oe3JH25
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache
Pragma: no-cacheGIF89a.............!.......,...........L..;HTTP/1.1 302 Found..Server:
Tengine..Date: Mon, 25 May 2015 15:25:53 GMT..Content-Type: image/gif
..Content-Length: 43..Connection: keep-alive..P3P: CP="NOI DSP COR CUR
a ADMa DEVa PSAa PSDa OUR IND UNI PUR NAV"..Set-Cookie: cna=AS3qDVW8o3
MCAcGK9Oe3JH25; expires=Thu, 22-May-25 15:25:53 GMT; path=/; domain=.m
mstat.com..Set-Cookie: sca=0b0f9291; path=/; domain=.cnzz.mmstat.com..
Set-Cookie: atpsida=27683b255cb4cbefaf5e022a_1432567553; expires=Thu,
22-May-25 15:25:53 GMT; path=/; domain=.cnzz.mmstat.com..Location: htt
p://pcookie.cnzz.com/app.gif?&cna=AS3qDVW8o3MCAcGK9Oe3JH25..Expires: T
hu, 01 Jan 1970 00:00:01 GMT..Cache-Control: no-cache..Pragma: no-cach
e..GIF89a.............!.......,...........L..;..
The Trojan connects to the servers at the folowing location(s):
.text
.rdata
@.data
.rsrc
@.text
t$(SSh
~%UVW
u$SShe
user32.dll
gdiplus.dll
ole32.dll
wininet.dll
kernel32.dll
shlwapi.dll
WinINet.dll
GdiPlus.dll
OLEACC.DLL
Kernel32.dll
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
MsgWaitForMultipleObjects
HttpAddRequestHeadersA
{B6F7542F-B8FE-46a8-9605-98856A687097}42305932-06E6-47a5-AC79-8BDCDC58DF61
{A068799B-7551-46b9-8CA8-EEF8357AFEA4}(*.txt)|*.txt
hXXp://captcha.qq.com/getimage?uin=
&appid=549000912&js_ver=10033&js_type=1&login_sig=0OYzMrrdype-37aR6SxdYaNEn0kZwjjiVsBZPE7UUJYvNBvbrjDxWr2Q74DxDOiE&u1=http://qzs.qq.com/qzone/v5/loginsucc.html?para=izone&r=
hXXp://check.ptlogin2.qq.com/check?regmaster=&uin=
Math.random()
Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1; 125LA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)
http=
https
HTTP/1.1
Content-Type: application/x-www-form-urlencoded
hXXps://
hXXp://
Adodb.Stream
&aid=549000912&u1=http://qzs.qq.com/qzone/v5/loginsucc.html?para=izone&h=1&ptredirect=0&ptlang=2052&from_ui=1&dumy=&low_login_enable=0®master=&fp=loginerroralert&action=8-29-1372332497073&mibao_css=&t=1&g=1&js_ver=10033&js_type=1&login_sig=0OYzMrrdype-37aR6SxdYaNEn0kZwjjiVsBZPE7UUJYvNBvbrjDxWr2Q74DxDOiE
hXXp://ptlogin2.qq.com/login?u=
var hexcase=1;var b64pad="";var chrsz=8;var mode=32;function md5(A){return hex_md5(A)}function hex_md5(A){return binl2hex(core_md5(str2binl(A),A.length*chrsz))}function str_md5(A){return binl2str(core_md5(str2binl(A),A.length*chrsz))}function hex_hmac_md5(A,B){return binl2hex(core_hmac_md5(A,B))}function b64_hmac_md5(A,B){return binl2b64(core_hmac_md5(A,B))}function str_hmac_md5(A,B){return binl2str(core_hmac_md5(A,B))}function core_md5(K,F){K[F>>5]|=128<<((F)2);K[(((F 64)>>>9)<<4) 14]=F;var J=1732584193;var I=-271733879;var H=-1732584194;var G=271733878;for(var C=0;C<K.length;C =16){var E=J;var D=I;var B=H;var A=G;J=md5_ff(J,I,H,G,K[C 0],7,-680876936);G=md5_ff(G,J,I,H,K[C 1],12,-389564586);H=md5_ff(H,G,J,I,K[C 2],17,606105819);I=md5_ff(I,H,G,J,K[C 3],22,-1044525330);J=md5_ff(J,I,H,G,K[C 4],7,-176418897);G=md5_ff(G,J,I,H,K[C 5],12,1200080426);H=md5_ff(H,G,J,I,K[C 6],17,-1473231341);I=md5_ff(I,H,G,J,K[C 7],22,-45705983);J=md5_ff(J,I,H,G,K[C 8],7,1770035416);G=md5_ff(G,J,I,H,K[C 9],12,-1958414417);H=md5_ff(H,G,J,I,K[C 10],17,-42063);I=md5_ff(I,H,G,J,K[C 11],22,-1990404162);J=md5_ff(J,I,H,G,K[C 12],7,1804603682);G=md5_ff(G,J,I,H,K[C 13],12,-40341101);H=md5_ff(H,G,J,I,K[C 14],17,-1502002290);I=md5_ff(I,H,G,J,K[C 15],22,1236535329);J=md5_gg(J,I,H,G,K[C 1],5,-165796510);G=md5_gg(G,J,I,H,K[C 6],9,-1069501632);H=md5_gg(H,G,J,I,K[C 11],14,643717713);I=md5_gg(I,H,G,J,K[C 0],20,-373897302);J=md5_gg(J,I,H,G,K[C 5],5,-701558691);G=md5_gg(G,J,I,H,K[C 10],9,38016083);H=md5_gg(H,G,J,I,K[C 15],14,-660478335);I=md5_gg(I,H,G,J,K[C 4],20,-405537848);J=md5_gg(J,I,H,G,K[C 9],5,568446438);G=md5_gg(G,J,I,H,K[C 14],9,-1019803690);H=md5_gg(H,G,J,I,K[C 3],14,-187363961);I=md5_gg(I,H,G,J,K[C 8],20,1163531501);J=md5_gg(J,I,H,G,K[C 13],5,-1444681467);G=md5_gg(G,J,I,H,K[C 2],9,-51403784);H=md5_gg(H,G,J,I,K[C 7],14,1735328473);I=md5_gg(I,H,G,J,K[C 12],20,-1926607734);J=md5_hh(J,I,H,G,K[C 5],4,-378558);G=md5_hh(G,J,I,H,K[C 8],11,-2022574463);H=md5_hh(H,G,J,I,K[C 11],16,1839030562);I=md5_hh(I,H,G,J,K[C 14],23,-35309556);J=md5_hh(J,I,H,G,K[C 1],4,-1530992060);G=md5_hh(G,J,I,H,K[C 4],11,1272893353);H=md5_hh(H,G,J,I,K[C 7],16,-155497632);I=md5_hh(I,H,G,J,K[C 10],23,-1094730640);J=md5_hh(J,I,H,G,K[C 13],4,681279174);G=md5_hh(G,J,I,H,K[C 0],11,-358537222);H=md5_hh(H,G,J,I,K[C 3],16,-722521979);I=md5_hh(I,H,G,J,K[C 6],23,76029189);J=md5_hh(J,I,H,G,K[C 9],4,-640364487);G=md5_hh(G,J,I,H,K[C 12],11,-421815835);H=md5_hh(H,G,J,I,K[C 15],16,530742520);I=md5_hh(I,H,G,J,K[C 2],23,-995338651);J=md5_ii(J,I,H,G,K[C 0],6,-198630844);G=md5_ii(G,J,I,H,K[C 7],10,1126891415);H=md5_ii(H,G,J,I,K[C 14],15,-1416354905);I=md5_ii(I,H,G,J,K[C 5],21,-57434055);J=md5_ii(J,I,H,G,K[C 12],6,1700485571);G=md5_ii(G,J,I,H,K[C 3],10,-1894986606);H=md5_ii(H,G,J,I,K[C 10],15,-1051523);I=md5_ii(I,H,G,J,K[C 1],21,-2054922799);J=md5_ii(J,I,H,G,K[C 8],6,1873313359);G=md5_ii(G,J,I,H,K[C 15],10,-30611744);H=md5_ii(H,G,J,I,K[C 6],15,-1560198380);I=md5_ii(I,H,G,J,K[C 13],21,1309151649);J=md5_ii(J,I,H,G,K[C 4],6,-145523070);G=md5_ii(G,J,I,H,K[C 11],10,-1120210379);H=md5_ii(H,G,J,I,K[C 2],15,718787259);I=md5_ii(I,H,G,J,K[C 9],21,-343485551);J=safe_add(J,E);I=safe_add(I,D);H=safe_add(H,B);G=safe_add(G,A)}if(mode==16){return Array(I,H)}else{return Array(J,I,H,G)}}function md5_cmn(F,C,B,A,E,D){return safe_add(bit_rol(safe_add(safe_add(C,F),safe_add(A,D)),E),B)}function md5_ff(C,B,G,F,A,E,D){return md5_cmn((B&G)|((~B)&F),C,B,A,E,D)}function md5_gg(C,B,G,F,A,E,D){return md5_cmn((B&F)|(G&(~F)),C,B,A,E,D)}function md5_hh(C,B,G,F,A,E,D){return md5_cmn(B^G^F,C,B,A,E,D)}function md5_ii(C,B,G,F,A,E,D){return md5_cmn(G^(B|(~F)),C,B,A,E,D)}function core_hmac_md5(C,F){var E=str2binl(C);if(E.length>16){E=core_md5(E,C.length*chrsz)}var A=Array(16),D=Array(16);for(var B=0;B<16;B ){A[B]=E[B]^909522486;D[B]=E[B]^1549556828}var G=core_md5(A.concat(str2binl(F)),512 F.length*chrsz);return core_md5(D.concat(G),512 128)}function safe_add(A,D){var C=(A&65535) (D&65535);var B=(A>>16) (D>>16) (C>>16);return(B<<16)|(C&65535)}function bit_rol(A,B){return(A<<B)|(A>>>(32-B))}function str2binl(D){var C=Array();var A=(1<<chrsz)-1;for(var B=0;B<D.length*chrsz;B =chrsz){C[B>>5]|=(D.charCodeAt(B/chrsz)&A)<<(B2)}return C}function binl2str(C){var D="";var A=(1<<chrsz)-1;for(var B=0;B<C.length*32;B =chrsz){D =String.fromCharCode((C[B>>5]>>>(B2))&A)}return D}function binl2hex(C){var B=hexcase?"0123456789ABCDEF":"0123456789abcdef";var D="";for(var A=0;A<C.length*4;A ){D =B.charAt((C[A>>2]>>((A%4)*8 4))&15) B.charAt((C[A>>2]>>((A%4)*8))&15)}return D}function binl2b64(D){var C="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789 /";var F="";for(var B=0;B<D.length*4;B =3){var E=(((D[B>>2]>>8*(B%4))&255)<<16)|(((D[B 1>>2]>>8*((B 1)%4))&255)<<8)|((D[B 2>>2]>>8*((B 2)%4))&255);for(var A=0;A<4;A ){if(B*8 A*6>D.length*32){F =b64pad}else{F =C.charAt((E>>6*(3-A))&63)}}}return F}function hexchar2bin(str){var arr=[];for(var i=0;i<str.length;i=i 2){arr.push("\\x" str.substr(i,2))}arr=arr.join("");eval("var temp = '" arr "'");return temp}function GetPassword(pt_uin,p,vc){var I=hexchar2bin(md5(p));var H=md5(I TTescapechar2bin(pt_uin));var G=md5(H vc.toUpperCase());return G}function TTescapechar2bin(str){eval("var temp = '" str "'");return temp}GetPassword
Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1; 2Pac; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)
; skey=(.*?);
/blog/
hXXp://r.qzone.qq.com/cgi-bin/user/qz_opcnt2?unikey=http://user.qzone.qq.com/
&secverifykey=28Q1206
&cateName=¸öÈËÈÕ¼Ç&rightType=1&force=1&source=34&iNotice=1&inCharset=gbk&outCharset=gbk&format=fs&ref=qzone&json=1&g_tk=
&page=1&refererurl=http%3A%2F%2Fcnc.qzs.qq.com%2Fqzone%2Fapp%2Fblog%2Fv6%2Fbloglist.html%23nojump%3D1%26page%3D1%26catalog%3Dlist&ref=qzone&uin=
&dprefix=cnc.&g_tk=
&property=GoRE×tamp=
&styledm=cnc.qzonestyle.gtimg.cn&imgdm=cnc.qzs.qq.com&bdm=b.cnc.qzone.qq.com&mode=2&numperpage=15&blogseed=
&blogid=
qzreferrer=http://b1.cnc.qzone.qq.com/cgi-bin/blognew/blog_output_data?uin=
hXXp://b11.cnc.qzone.qq.com/cgi-bin/blognew/quote_blog?g_tk=
function time(){return new Date().getTime()}hXXp://user.qzone.qq.com/510448903
hXXp://moxiwang.free3v.net/1/login1.asp
hXXp://b11.cnc.qzone.qq.com/cgi-bin/blognew/get_abs?hostUin=
id=QQPassWord
Id=login_button
&login_url=hXXp://pt.3g.qq.com/s?aid=loginC1&bid_code=lottery518&go_url=http:2F518.qq.com/w/index.xhtml?jump=false&t=lottery518
&sidtype=1&bid=0&go_url=hXXp://info.3g.qq.com&loginTitle=
&aid=loginC1&pwd=
&loginTitle=
hXXp://pt.3g.qq.com/login?act=page&sid=AdhS04qWFhkVZDJELLCeo9Kj&vdata=AF7FA50A694EDCE66EFA477CE3838323
&aid=verifyC&hiddenPwd=loginC1&hiddenPwd=true&login_url=hXXp://pt.3g.qq.com/s?aid=loginC1&go_url=hXXp://info.3g.qq.com&verify=
hXXp://pt.3g.qq.com/login?act=page&sid=AdhS04qWFhkVZDJELLCeo9Kj&aid=loginC1&g_ut=1
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*
(*.dzi)|*.dzi
18107969794
(*.dlz)|*.dlz
VBScript.RegExp
{0002DF05-0000-0000-C000-000000000046}{D30C1661-CDAF-11D0-8A3E-00C04FC9E26E}{6D5140C1-7436-11CE-8034-00AA006009FA}{D30C1661-CDAF-11d0-8A3E-00C04FC9E26E}document.all.resultjs.innerText=
var jie = document.createStyleSheet();jie.addRule('html','overflow:hidden;');,Yn
hXXps://me.alipay.com/an520chen
hXXp://user.qzone.qq.com/1711722250
hXXp://wpa.qq.com/msgrd?v=3&uin=1711722250&site=qq&menu=yes
510448903
.Lo6]
8%d%{%d]2~V8
D.rKX
GtdOef.zen
v.VG%p
}%s4
j&%UY
%UC;>
%XB,J,
'c.TY
gY.ANW
b^%xV
%c H6
qEXe
4xÑEaT
2%UST6
OFtP
nI,.py
W9@%cs
#s%c>
r#(%.F
Password
F%*.*f
CNotSupportedException
commctrl_DragListMsg
Afx:%x:%x:%x:%x:%x
Afx:%x:%x
COMCTL32.DLL
CCmdTarget
__MSVCRT_HEAP_SELECT
RASAPI32.dll
iphlpapi.dll
SHLWAPI.dll
MPR.dll
WINMM.dll
WS2_32.dll
VERSION.dll
GetProcessHeap
WinExec
KERNEL32.dll
GetKeyState
SetWindowsHookExA
UnhookWindowsHookEx
EnumChildWindows
RegisterHotKey
UnregisterHotKey
USER32.dll
GetViewportOrgEx
GDI32.dll
MSIMG32.dll
WINSPOOL.DRV
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
ADVAPI32.dll
ShellExecuteA
SHELL32.dll
OLEAUT32.dll
COMCTL32.dll
oledlg.dll
WLDAP32.dll
WSOCK32.dll
InternetCrackUrlA
InternetCanonicalizeUrlA
WININET.dll
GetCPInfo
CreateDialogIndirectParamA
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
GetViewportExtEx
comdlg32.dll
.PAVCException@@
.PAVCNotSupportedException@@
.PAVCFileException@@
(*.prn)|*.prn|
(*.*)|*.*||
Shell32.dll
Mpr.dll
Advapi32.dll
User32.dll
Gdi32.dll
(&07-034/)7 '
?? / %d]
%d / %d]
: %d]
(*.WAV;*.MID)|*.WAV;*.MID|WAV
(*.WAV)|*.WAV|MIDI
(*.MID)|*.MID|
(*.txt)|*.txt|
(*.JPG;*.BMP;*.GIF;*.ICO;*.CUR)|*.JPG;*.BMP;*.GIF;*.ICO;*.CUR|JPG
(*.JPG)|*.JPG|BMP
(*.BMP)|*.BMP|GIF
(*.GIF)|*.GIF|
(*.ICO)|*.ICO|
(*.CUR)|*.CUR|
%s:%d
windows
out.prn
%d.%d
%d / %d
%d/%d
Bogus message code %d
(%d-%d):
%ld%c
(*.htm;*.html)|*.htm;*.html
its:%s::%s
HTTP/1.0
%s <%s>
Reply-To: %s
From: %s
To: %s
Subject: %s
Date: %s
Cc: %s
%a, %d %b %Y %H:%M:%S
SMTP
VVV.dywt.com.cn
%d%d%d
rundll32.exe shell32.dll,
.PAVCOleException@@
.PAVCObject@@
.PAVCSimpleException@@
.PAVCMemoryException@@
.?AVCNotSupportedException@@
.PAVCResourceException@@
.PAVCUserException@@
.?AVCCmdTarget@@
.?AVCCmdUI@@
.?AVCTestCmdUI@@
.PAVCOleDispatchException@@
.PAVCArchiveException@@
zcÁ
c:\%original file name%.exe
#include "l.chs\afxres.rc" // Standard components
(*.*)
1.0.0.0
%original file name%.exe_188_rwx_00401000_000D8000:
t$(SSh
~%UVW
u$SShe
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):No processes have been created.
- Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (256 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@mmstat[2].txt (168 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\UVKJ45OV\bg[1].gif (753 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\UVKJ45OV\boxbg[1].gif (8831 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][2].txt (256 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\6APR5SOT\stat[1].gif (43 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\UVKJ45OV\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\E32DQHGF\stat[1].gif (43 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@cnzz[1].txt (163 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@mmstat[1].txt (168 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@cnzz[2].txt (163 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\UVKJ45OV\stat[1].php (5895 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\desktop.ini (159 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][2].txt (203 bytes)
%Documents and Settings%\%current user%\Cookies\[email protected][1].txt (203 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OGJ3DGA8\app[1].gif (43 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OGJ3DGA8\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\E32DQHGF\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\E32DQHGF\login1[1].htm (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\6APR5SOT\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (3116 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OGJ3DGA8\core[1].php (750 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.