Trojan.GenericKD.3145748_259af714dd
Trojan.GenericKD.3145748 (AdAware), Trojan.Win32.IEDummy.FD, Trojan.Win32.Swrort.3.FD, GenericPhysicalDrive0.YR (Lavasoft MAS)
Behaviour: Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 259af714ddcf5e9407353e066144a1d7
SHA1: df4f0b2df5b755f41665a2717f848bb09a454c92
SHA256: 352588f2e20edd22693af1f21fcb010caf6076fe8d6af2ac8ae0da0896196155
SSDeep: 49152:ON26FOnzGn6LJvqkwnpC mWd6uIccz31vqa T8qJkiR:O06FOznLo0 Dd6uxcrqJkiR
Size: 2300219 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2012-06-14 19:16:10
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
Dementia.exe:1992
Dementia.exe:1532
Dementia.exe:1012
attrib.exe:868
attrib.exe:2088
attrib.exe:1988
attrib.exe:1536
attrib.exe:2112
attrib.exe:2064
sc.exe:212
taskkill.exe:1436
taskkill.exe:2028
%original file name%.exe:772
ping.exe:2120
msdtc.exe:1788
net.exe:1976
net.exe:1336
net1.exe:380
net1.exe:1236
Miciosoft .NET.exe:948
irsetup.exe:1332
rar.exe:1512
The Trojan injects its code into the following process(es):
No processes have been created.
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process Dementia.exe:1532 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings% (4 bytes)
C:\ (4 bytes)
%WinDir%\oci.dll (4708 bytes)
%Documents and Settings%\%current user%\FAVORITES (4 bytes)
%Documents and Settings%\All Users\APPLICATION DATA (4 bytes)
%Program Files%\WIRESHARK (16 bytes)
%WinDir%\WinSxS (12 bytes)
%Program Files%\Internet Explorer (4 bytes)
%WinDir%\AppPatch (4 bytes)
%Documents and Settings%\%current user%\Local Settings (4 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft dementia\Dementia.exe (2850 bytes)
%WinDir%\oci.temp (39 bytes)
%Documents and Settings%\All Users (4 bytes)
%WinDir%\REGISTRATION (4 bytes)
%WinDir%\Fonts (920 bytes)
%Documents and Settings%\All Users\Documents\My Music (4 bytes)
C:\$Directory (1388 bytes)
%System% (6144 bytes)
%WinDir% (492 bytes)
%Program Files%\COMMON FILES (4 bytes)
%WinDir%\WinSxS\Policies\x86_Policy.6.0.Microsoft.Windows.Common-Controls_6595b64144ccf1df_x-ww_5ddad775 (4 bytes)
%WinDir%\oci.txt (1588 bytes)
%WinDir%\Prefetch\IRSETUP.EXE-1B1C97F2.pf (40 bytes)
%WinDir%\WinSxS\Policies\x86_Policy.8.0.Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_x-ww_77c24773 (4 bytes)
%Program Files% (8 bytes)
%Documents and Settings%\%current user%\APPLICATION DATA (4 bytes)
%System%\config (8 bytes)
%Documents and Settings%\All Users\Documents (4 bytes)
%System%\wbem (1064 bytes)
%System%\drivers (32 bytes)
%Documents and Settings%\All Users\Start Menu (4 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft dementia\360Game.zlib (99 bytes)
%Documents and Settings%\%current user% (4 bytes)
%WinDir%\Temp\Perflib_Perfdata_668.dat (4 bytes)
%WinDir%\Prefetch\259AF714DDCF5E9407353E066144A-10973936.pf (20 bytes)
%Documents and Settings%\%current user%\Start Menu\Programs (4 bytes)
%Program Files%\Common Files\Adobe\Acrobat\ActiveX (4 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft dementia\360Game.temp (6264 bytes)
%Documents and Settings%\All Users\Start Menu\Programs (4 bytes)
%Documents and Settings%\%current user%\Cookies (192 bytes)
%Documents and Settings%\%current user%\My Documents (4 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\All Users\Application Data\Microsoft dementia\360Game.zlib (0 bytes)
%WinDir%\oci.temp (0 bytes)
%WinDir%\oci.txt (0 bytes)
The process %original file name%.exe:772 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\_ir_sf_temp_0\lua5.1.dll (325 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\_ir_sf_temp_0\irsetup.exe (7386 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\_ir_sf_temp_0 (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\_ir_sf_temp_0\lua5.1.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\_ir_sf_temp_0\irsetup.exe (0 bytes)
The process msdtc.exe:1788 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%System%\MsDtc\MSDTC.LOG (3888 bytes)
%System%\config\SOFTWARE.LOG (5606 bytes)
%System%\config\software (2708 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft dementia\360Game.exe (7403 bytes)
%System%\MsDtc\Trace\dtctrace.log (28 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft dementia\config.ini (4686 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\All Users\Application Data\Microsoft dementia\config.ini (0 bytes)
The process Miciosoft .NET.exe:948 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\WindowsNET\Dementia.sys (79290 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\Dementia[1].rar (110785 bytes)
The process irsetup.exe:1332 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\_ir_sf_temp_0\5.ico (3634 bytes)
C:\WindowsNET\Miciosoft .NET.exe (28 bytes)
C:\WindowsNET\Rar.exe (5761 bytes)
C:\ProgramData\Temps\Dementia.exe (5777 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\_ir_sf_temp_0\irsetup.dat (1137 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\_ir_sf_temp_0\5.ico (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\_ir_sf_temp_0 (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\_ir_sf_temp_0\irsetup.dat (0 bytes)
The process rar.exe:1512 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\All Users\Application Data\Microsoft dementia\dlcore.dll (8545 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft dementia\Dementia.exe (6761 bytes)
Registry activity
The process Dementia.exe:1992 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "49 0F 41 D9 5F 61 55 AB A0 DD 8C 9D F7 AA 4A 47"
The process Dementia.exe:1532 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "7F 46 07 9F DC 66 40 10 FF 43 9C F5 A8 07 B1 A9"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%System%]
"net.exe" = "Net Command"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\MSDTC\MTxOCI]
"OracleOciLibPath" = "%WinDir%"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%Documents and Settings%\All Users\Application Data\Microsoft dementia]
"Dementia.exe" = "Creative Software AutoUpdate"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKLM\System\CurrentControlSet\Services\MSDTC]
"ObjectName" = "LocalSystem"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%System%]
"sc.exe" = "A tool to aid in developing services for WindowsNT"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass" = "1"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
"IntranetName" = "1"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Trojan deletes the following registry key(s):
[HKCU\Software\Local AppWizard-Generated Applications\hello word\Recent File List]
The process Dementia.exe:1012 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "AF E4 15 28 F5 3E B8 D1 88 BA E7 E1 EB 90 C6 33"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Tencent\TodayDo]
"RunTaskQQ" = "20160528"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\System\CurrentControlSet\Services]
"MarkTime" = "2016-05-28 01:27"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
The process attrib.exe:868 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0B 09 8C 1F F1 5B 76 71 58 4B A8 D4 E2 BF 59 82"
The process attrib.exe:2088 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F8 76 56 6D DC 63 CC 96 A4 F4 64 55 DD 58 7F D3"
The process attrib.exe:1988 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "18 81 C3 BD F8 96 98 F6 BD BD 0C C2 5C AC C2 3C"
The process attrib.exe:1536 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "FF 72 29 F3 AA FC 00 BF 05 76 12 56 51 80 12 5F"
The process attrib.exe:2112 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F4 1D 35 02 C6 D9 83 0A 05 7A DD 67 CB 8D 1C 04"
The process attrib.exe:2064 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "84 94 16 C3 99 8E 31 E0 C0 5B 3F 8B 2A A4 11 4C"
The process sc.exe:212 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "F3 D8 8B 40 C0 6B 6E 06 51 CA F6 B9 DB C1 9E 72"
The process taskkill.exe:1436 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "85 CF A1 D4 1B 2F 2B F5 D1 45 8E 1B C5 22 42 DC"
The process taskkill.exe:2028 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BA 4E 29 B7 8D 68 2E 1F F2 59 B6 17 E7 27 CB 39"
The process %original file name%.exe:772 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "00 E8 5D 8C B5 02 E3 DD EA AF 11 2B FA D9 27 D8"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\_ir_sf_temp_0]
"irsetup.exe" = "Setup Application"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
The process ping.exe:2120 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "6F 0D 7F 9A B8 F1 21 3B A3 85 E9 5D D1 5A 66 15"
The process msdtc.exe:1788 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D7 3D 9E 20 3A 0A C1 56 D8 BB BD A7 D1 45 5C EF"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Windows PlayGame" = "%Documents and Settings%\All Users\Application Data\Microsoft dementia\360Game.exe"
The process net.exe:1976 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "44 83 E2 61 C9 32 2B EE DD 25 1C CF 12 B3 73 31"
The process net.exe:1336 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "75 21 8F FE DA 59 D8 3E 5E E2 22 5F 6E 7E 22 F3"
The process net1.exe:380 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "39 0F 4B A1 53 1F D3 2F E3 41 3C 50 AB 47 FE 18"
The process net1.exe:1236 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "1D DB 2D 1B 96 CE B0 03 3A C1 99 57 32 D6 48 AA"
The process Miciosoft .NET.exe:948 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1E 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\ProgramData\Temps]
"Dementia.exe" = "Creative Software AutoUpdate"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "7D 55 88 40 BC E2 B3 62 F9 09 E7 61 41 8F 94 67"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\WindowsNET]
"rar.exe" = "命令行 RAR"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process irsetup.exe:1332 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"My Video" = ""
"Fonts" = "%WinDir%\Fonts"
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Start Menu" = "%Documents and Settings%\All Users\Start Menu"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
"Startup" = "%Documents and Settings%\%current user%\Start Menu\Programs\Startup"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"My Pictures" = "%Documents and Settings%\%current user%\My Documents\My Pictures"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
"Common Startup" = "%Documents and Settings%\All Users\Start Menu\Programs\Startup"
"Common Documents" = "%Documents and Settings%\All Users\Documents"
"CommonMusic" = "%Documents and Settings%\All Users\Documents\My Music"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\WindowsNET]
"Miciosoft .NET.exe" = "Miciosoft .NET"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Start Menu" = "%Documents and Settings%\%current user%\Start Menu"
"My Music" = "%Documents and Settings%\%current user%\My Documents\My Music"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonVideo" = "%Documents and Settings%\All Users\Documents\My Videos"
"CommonPictures" = "%Documents and Settings%\All Users\Documents\My Pictures"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "55 A4 F5 01 51 B6 66 7E CE 1E BE CA 96 C4 F6 12"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Programs" = "%Documents and Settings%\All Users\Start Menu\Programs"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
"Programs" = "%Documents and Settings%\%current user%\Start Menu\Programs"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
"IntranetName" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
The process rar.exe:1512 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "18 A6 C3 70 B3 4B ED CE C6 4F 95 5D 7B 78 78 B7"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
Dropped PE files
| MD5 | File path |
|---|---|
| d641a3f56fc8b4a79328177a609b5b20 | c:\Documents and Settings\All Users\Application Data\Microsoft dementia\360Game.exe |
| d641a3f56fc8b4a79328177a609b5b20 | c:\Documents and Settings\All Users\Application Data\Microsoft dementia\360Game.temp |
| 60164af0388620090a69c8b6c08bbddb | c:\Documents and Settings\All Users\Application Data\Microsoft dementia\Dementia.exe |
| ca07ec98e407dd7e196831207703e3a0 | c:\Documents and Settings\All Users\Application Data\Microsoft dementia\dlcore.dll |
| 05a45d03e9641ea467f34473aa71fe52 | c:\WINDOWS\oci.dll |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
Company Name:
Product Name: Setup Factory Runtime
Product Version: 9.1.0.0
Legal Copyright: Setup Engine Copyright (c) 2004-2012 Indigo Rose Corporation
Legal Trademarks: Setup Factory is a trademark of Indigo Rose Corporation.
Original Filename: suf_launch.exe
Internal Name: suf_launch
File Version: 9.1.0.0
File Description: Setup Application
Comments: Created with Setup Factory
Language: English (United States)
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 22296 | 22528 | 4.47735 | c76b9ce587690b8a39ba7840b7dd540c |
| .rdata | 28672 | 11906 | 12288 | 3.44864 | e96aa4f970e6f6799910a72904df3100 |
| .data | 40960 | 6504 | 3072 | 1.79291 | e504fdbba062ee9bbd9ac425a4f5c0f5 |
| .rsrc | 49152 | 28108 | 28160 | 4.03415 | f07da938ca4a81c16d34f6b033be873e |
| .reloc | 77824 | 4242 | 4608 | 2.5731 | a88bdb6f651ecf67b1b3db4a2866ea4e |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Total found: 13
2561ffa6912df85a0bb87432895cb317
e9e40026efc93b842bebcb877eb31eca
3538c76ffd14e375ef9312822024c600
95d4c354da12c172e4d48780dd53be79
80594f65f65a77c7d877a0ff53c51e71
3db1efb1e8735ae3426c9f46153e5377
f482854f7f32af1c960b43c2cc1c8ace
0c9a8a861f7e9b9b24f3715187e4ec07
cff88f12e54579f4fe5db5c960fea71f
640b80532feb77e1b9f1b70ec7c6cc66
0544897a94eb799b364b0ff2d5e6aae0
18b03133a016b751096c507e93e8e4cb
85bd4dce420cbf20f67e1be20971983a
URLs
| URL | IP |
|---|---|
| hxxp://yun.n.shifen.com/s/1dD5xS7B | |
| hxxp://yun.n.shifen.com/ppres/static/css/error_all.css?t=201303212934 | |
| hxxp://yun.n.shifen.com/ppres/static/js/plug/html5.js | |
| hxxp://yun.n.shifen.com/ppres/static/js/buss/error_all.js | |
| hxxp://yun.n.shifen.com/ppres/static/thirdparty/header/module_header.js?t=201303212934 | |
| hxxp://yun.n.shifen.com/feproxy/ad/list?list[0][id]=web-text&list[0][w]=0&list[0][h]=0&uk= | |
| hxxp://yun.n.shifen.com/ppres/static/images/frame-icon.png?t=201605245555?@=-1 | |
| hxxp://yun.n.shifen.com/api/analytics?type=web_header_title_click&clienttype=0¤tUrl=http://yun.baidu.com/s/1dD5xS7B&t=1464388027447 | |
| hxxp://yun.n.shifen.com/rest/2.0/pcs/adx?m=callback&h=0&w=0&p=web-text&s=1464388018;661327933426169;web-text-s-20;v;4f1c1e4b8de8c18859a70f1891ebeb11&t=1464388027478 | |
| hxxp://yun.n.shifen.com/disk/cmsdata?do=manual&ch=pan_focuspic&t=1464388027806 | |
| hxxp://yun.n.shifen.com/ppres/static/images/error/error.png?t=201605245555?@=-1 | |
| hxxp://www.xmhairong.com/htl/Dementia.rar | |
| hxxp://yun.baidu.com/feproxy/ad/list?list[0][id]=web-text&list[0][w]=0&list[0][h]=0&uk= | |
| hxxp://pan.baidu.com/api/analytics?type=web_header_title_click&clienttype=0¤tUrl=http://yun.baidu.com/s/1dD5xS7B&t=1464388027447 | |
| hxxp://pan.baidu.com/ppres/static/js/plug/html5.js | |
| hxxp://pan.baidu.com/ppres/static/images/frame-icon.png?t=201605245555?@=-1 | |
| hxxp://pan.baidu.com/ppres/static/css/error_all.css?t=201303212934 | |
| hxxp://yun.baidu.com/ppres/static/thirdparty/header/module_header.js?t=201303212934 | |
| hxxp://pan.baidu.com/rest/2.0/pcs/adx?m=callback&h=0&w=0&p=web-text&s=1464388018;661327933426169;web-text-s-20;v;4f1c1e4b8de8c18859a70f1891ebeb11&t=1464388027478 | |
| hxxp://pan.baidu.com/ppres/static/images/error/error.png?t=201605245555?@=-1 | |
| hxxp://yun.baidu.com/ppres/static/js/buss/error_all.js | |
| hxxp://yun.baidu.com/s/1dD5xS7B | |
| hxxp://yun.baidu.com/disk/cmsdata?do=manual&ch=pan_focuspic&t=1464388027806 | |
| www.360renzheng.com |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET /ppres/static/css/error_all.css?t=201303212934 HTTP/1.1
Accept: */*
Referer: hXXp://yun.baidu.com/s/1dD5xS7B
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: pan.baidu.com
Connection: Keep-Alive
Cookie: BAIDUID=8BAB9156D0B005C2C41AEA5B41BB81E4:FG=1
HTTP/1.1 200 OK
Cache-Control: no-cache
Connection: keep-alive
Content-Encoding: gzip
Content-Type: text/css
Date: Fri, 27 May 2016 22:26:54 GMT
Flow-Level: 3
Last-Modified: Tue, 24 May 2016 07:00:28 GMT
P3p: CP=" OTI DSP COR IVA OUR IND COM "
Pragma: no-cache
Server: nginx
Set-Cookie: BAIDUID=4BDF7007B4308A7CF0BB5A41A0BD4591:FG=1; expires=Sat, 27-May-17 22:26:54 GMT; max-age=31536000; path=/; domain=.baidu.com; version=1
Vary: Accept-Encoding
X-Powered-By: BaiduCloud
Yld: 9203377068009788232
Yme: ZIGW/i4rX00WdTQMUmr/tGtPovkeQhz0owpHwyiEoxOA
Transfer-Encoding: chunked8f9.............Z.....}..P.0.......\..... @..)@..%...dI......y..... ..
<./r.H"%Z.,..P....<w..t../vL..8....c.I.<.Sj'..xv.......dc.%..
<&.>/.vM.k\.lW$%Qm.E}(..`.h..{J..".....b...4..~n...ub.q{...f...8
.iv..S....m..1)a.....MiU..~I....9M@..<.....]...$6o.<.K..q.......
.....&..=>....YBJZ.....G..=.zH.nL.Yl8..F...4#(....w..H.K.. D...E.b.
..A)~H..~N!...q....b.z...p/.M.0.QL.....$..........>.......[..I...j.
.D...........|[email protected].......:.q...W<.w.k..I~.6.
)N.............~.....aRk9.8....#.&%........{.,...a.lt...4..X..u.<..
.4.....8&.b%N ..hJu......<?..i...g$m...\.8.....{./.}.../..>.....
a.*.....j.M....}I..U.....#>._a..S`qq.......n...Z...~........;.W<
w.e9*IAp}z......C.>[email protected](.'......N.F. .....%r..... ..[.;.=0
.$.../...)-*Z.O0..8~..o...........O%..f. ..NY.$.............J.......#T
P..E.H..~...5..K........^.D.:.V.......:i.a g-aV0...9.....M.4.{.8.b9...
.B....)x}.yX"z\..g..|[.z.G..U.r;..[.S....H..E..L&..;...[...E...Ho.,...
....q..a...5.....E.G`".H..Hbt.4..a..}...4l..X.'Ak=...N.......ET.>5.
.d..T..%.G.0.......#x..3..L.rO..W.h.4...6j...T.<..h..D..J..tz....H.
1..&..U.A...XX.b......,...Fd..c..!....@ ..t3.....x...L....!a.......r..
~..m..S...=MA.~.....r..."..w..N..Z........=.q.yL~.b<..e.....S. ..e.
$FF8..s9.....uo...yg..Y..._..x....."x....~..~...Yx.......p.. ..1.r.Q..
..7.X...j..6X...N.......w..i~....#...kr...hH.j..!:..H.e ....Q.5....i..
..u F.g.b]..B...}m..... [..mB....._...A..=##R. .{.C.N..lZ......j\`k-l.
.4.........&.d...\!....1.j,.&.E.{.hk*......gL|.....1..nM/ ........<<< skipped >>>
GET /ppres/static/images/frame-icon.png?t=201605245555?@=-1 HTTP/1.1
Accept: */*
Referer: hXXp://yun.baidu.com/s/1dD5xS7B
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: pan.baidu.com
Connection: Keep-Alive
Cookie: BAIDUID=9E219A7B836381A2B347DBECDD711A52:FG=1
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: no-cache
Connection: keep-alive
Content-Length: 4846
Content-Type: image/png
Date: Fri, 27 May 2016 22:26:58 GMT
Etag: "5743fc0c-12ee"
Flow-Level: 3
Last-Modified: Tue, 24 May 2016 07:00:28 GMT
P3p: CP=" OTI DSP COR IVA OUR IND COM "
Pragma: no-cache
Server: nginx
Set-Cookie: BAIDUID=F97250058CC2F845A25D3E889712053B:FG=1; expires=Sat, 27-May-17 22:26:58 GMT; max-age=31536000; path=/; domain=.baidu.com; version=1
X-Powered-By: BaiduCloud
Yld: 9203378124887204427
Yme: ZIGW/i4rV0kMajYYTmvhr21XvfkfVAHyoAhPyyfHzLTyFFozKcfreg==.PNG........IHDR...q..........o./....tEXtSoftware.Adobe ImageReadyq.e&
lt;...$iTXtXML:com.adobe.xmp.....<?xpacket begin="..." id="W5M0MpCe
hiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk=
"Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> &
lt;rdf:RDF xmlns:rdf="hXXp://VVV.w3.org/1999/02/22-rdf-syntax-ns#">
<rdf:Description rdf:about="" xmlns:xmp="hXXp://ns.adobe.com/xap/1
.0/" xmlns:xmpMM="hXXp://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http:/
/ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photo
shop CS6 (Macintosh)" xmpMM:InstanceID="xmp.iid:112DEC527BD511E59855F7
10C66B7D33" xmpMM:DocumentID="xmp.did:112DEC537BD511E59855F710C66B7D33
"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:112DEC507BD511E5
9855F710C66B7D33" stRef:documentID="xmp.did:112DEC517BD511E59855F710C6
6B7D33"/> </rdf:Description> </rdf:RDF> </x:xmpmeta&
gt; <?xpacket end="r"?>...t....PLTE-j....&V..C?@@@...........2.*
T...............PPP...9r.....94...C..ppp.V{...7~....000...:v.4i..F....
]]].;{.GJzY.......mmm......9|... )Y.9z..........JII...MMM...#D.2s.....
..4s....ddd.E.&&& ...(M..KU......VUU..7#R.......ZZZ*`.... >.8...1
jSSS......www*)).^.3t.Dj..7t,,,.#KNt.0g....XXX!L.4.....*R.6p.6{....5x.
...7}.###.3c5u.."C'W.....8l._.._.===:::333444666...222>>>...8
88```.........8..9t.9........hhh.A3utu~~~|||8..zyy7.....8..sst...EEE8.
.8..ccc...kkk6y.9...[.. .............5u..........oooHGG.......&..t..*.
........G.{..."......stu...........0.v.........*.............-^..6<<< skipped >>>
GET /rest/2.0/pcs/adx?m=callback&h=0&w=0&p=web-text&s=1464388018;661327933426169;web-text-s-20;v;4f1c1e4b8de8c18859a70f1891ebeb11&t=1464388027478 HTTP/1.1
Accept: */*
Referer: hXXp://yun.baidu.com/s/1dD5xS7B
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: pan.baidu.com
Connection: Keep-Alive
Cookie: BAIDUID=F97250058CC2F845A25D3E889712053B:FG=1
HTTP/1.1 200 OK
Cache-Control: no-cache
Connection: keep-alive
Content-Encoding: gzip
Content-Type: text/html
Date: Fri, 27 May 2016 22:26:59 GMT
P3p: CP=" OTI DSP COR IVA OUR IND COM "
Pragma: no-cache
Server: nginx
Set-Cookie: BAIDUID=7F754715B3C043D1D5C01F59E97795FE:FG=1; expires=Sat, 27-May-17 22:26:59 GMT; max-age=31536000; path=/; domain=.baidu.com; version=1
Vary: Accept-Encoding
X-Powered-By: BaiduCloud
Yld: 9203378329914334767
Yme: ZIGW/i4rX0wbdTYEUmr/tGpJovIaVAHyoAhKyiA=
Content-Length: 54..........S..V*J-,M-...LQ.R21.413031.402.4S...../@"...HTTP/1.1 200 OK.
.Cache-Control: no-cache..Connection: keep-alive..Content-Encoding: gz
ip..Content-Type: text/html..Date: Fri, 27 May 2016 22:26:59 GMT..P3p:
CP=" OTI DSP COR IVA OUR IND COM "..Pragma: no-cache..Server: nginx..
Set-Cookie: BAIDUID=7F754715B3C043D1D5C01F59E97795FE:FG=1; expires=Sat
, 27-May-17 22:26:59 GMT; max-age=31536000; path=/; domain=.baidu.com;
version=1..Vary: Accept-Encoding..X-Powered-By: BaiduCloud..Yld: 9203
378329914334767..Yme: ZIGW/i4rX0wbdTYEUmr/tGpJovIaVAHyoAhKyiA=..Conten
t-Length: 54............S..V*J-,M-...LQ.R21.413031.402.4S...../@".....
GET /s/1dD5xS7B HTTP/1.1
Accept: */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: yun.baidu.com
Connection: Keep-Alive
HTTP/1.1 403 Forbidden
Cache-Control: no-cache
Connection: keep-alive
Content-Encoding: gzip
Content-Type: text/html
Date: Fri, 27 May 2016 22:26:53 GMT
P3p: CP=" OTI DSP COR IVA OUR IND COM "
Pragma: no-cache
Server: nginx
Set-Cookie: BAIDUID=8BAB9156D0B005C2C41AEA5B41BB81E4:FG=1; expires=Sat, 27-May-17 22:26:53 GMT; max-age=31536000; path=/; domain=.baidu.com; version=1
Vary: Accept-Encoding
X-Powered-By: BaiduCloud
Yld: 9203376732233638179
Transfer-Encoding: chunked8bc.............Y{s.......w...$3......m.K....0.n..0.k....uU=b{;;.Y.$.!
e.,......$..nI.!......W....X.l9!..K.q....=?]G?..9....O3.# ..........._
d...X..#.~g...!.4..1....p.v.!.2.....v^.wnY...;.Ey...eI.c2.N.X.W..L"I4.
.....a...dH./eQ..Rh^....?,.a9......i0..m.t.............X...^.u...0...F
.Y$.Ax:e.FN..'.#..Hx.....].R.l0g...E......../.y......>z/..*.i..|,xI
g.Q..m ...QJ]..&]..V)I...VI....I.U....:.k|....g.'..f.f.|=*.D,0..t=..8.
....Di.... .a6.$.s.\QGC}RF.h/<b...<kOr.....P}F.....$M..\0...2...
P...N.|.....A...P$.....tA.Y....*.V.Q...7J..8[..iX...H.D..J..3........V
....dK.!..Bu..C......c..[.g....,.$.p........6.7F.t......DZ....:.S..4;c
l..si.....D&............h.ij..Ac...$.g.8....d...!.e...#j..F...$5......
.k..v..Z..v..*gjrC.(......B.<.e.VQ.....0.....,1.a....w...[....Ew,.f
...O.x"5.....lv.K.F..i.?:......Mk..!..%(p..3um.'.$.......m[W.>...V.
...?..qGg...k.WO..Y!.......Z..*..(....hE.)y.P=.sm..!/?~].{z...l.1%?;..
......y....Z{.3l...s.. K...e.........{.......lbf.s....K..8...b[.P,....
.............fm.......8Q.*F.>)..,n ..R.k....$....{.*.....1.w...9..*
..V...u.q.V...3.c....".U.....Z^}...x....Ti%%E...L..:.vM.9..p....9....
...s.L..c..KgXk.Z..J.o..6..7*...X./K=.W.Ww.k!.f...V..........*.I.!.%Z.
*./..h}..c.x.2*.s.}0Z..2...o.......!6.S..V....-Gx..D.W..d.Is./)"....z.
~............f<.HD..'....._..D(....#...HoB.O.....=-a.$.?.&....S...-
q$...M.?.......[.. .....e........p6..2XJg..6...k...Bd..{i.?.oV.7.. o..
.U...R....I7.V8V..........o^.V~..c.....^..e.k.D_.ZU....YA...n}...,..K.
........L..@^.R3KvR..*..P..D.....{..r......\.h....[_..?..W*...G..I<<< skipped >>>
GET /ppres/static/js/buss/error_all.js HTTP/1.1
Accept: */*
Referer: hXXp://yun.baidu.com/s/1dD5xS7B
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: yun.baidu.com
Connection: Keep-Alive
Cookie: BAIDUID=B5E62F285F9858A09A611B208AD33D0E:FG=1
HTTP/1.1 200 OK
Cache-Control: no-cache
Connection: keep-alive
Content-Encoding: gzip
Content-Type: application/x-javascript
Date: Fri, 27 May 2016 22:26:55 GMT
Flow-Level: 3
Last-Modified: Tue, 24 May 2016 07:00:28 GMT
P3p: CP=" OTI DSP COR IVA OUR IND COM "
Pragma: no-cache
Server: nginx
Set-Cookie: BAIDUID=E94612E1118354C80756FECFA78B0F72:FG=1; expires=Sat, 27-May-17 22:26:55 GMT; max-age=31536000; path=/; domain=.baidu.com; version=1
Vary: Accept-Encoding
X-Powered-By: BaiduCloud
Yld: 9203377364629014437
Yme: ZIGW/i4rX04SdTYCUmr/tGZLovkYVAH1oAhPyyfXwa7qUR5hG2 2s7E=
Transfer-Encoding: chunked8dc...............{.F.0.W$$K.&D.9.......C..9..P4.Z.$&....mE.....>AP
......".>.....j..qz.....I.O[....|....4......b....q:.4..-gs...'.....
........z....</........u...6..........)....c1......~.].~p....7{....
.......;o.......o\|.3|.}...E.{y...C..E}....E..]..o....u.r..r........l.
.....>...~..r..fw.k.y..:.....o...p.8h..m.s..t..?.x....h..|.B......Z
.....h.(V...d.....CC.....^..,:.A..._.642.v...U..=,.C.xu.p..>..../..
....'...a.=.2{(.#..x.../..^.T..../.....}.w.?..........w..............x
...o...h.~.....W5.s..n^w........JG...E.9:n6...<.E..._.......o....0.
-g.....],........n.8.<=....O...x>.=.....w.Ok....U.g..lv6....Z...
..rz..3z~..A...5z..M...W.......(@d~.O..s.......w;S8.../..x.5....=..=..
.4.,.,#|.4.Q...I1.].E.p..(.....'.V...jO..>.Z{j..AQ..]...g..np...-.m
A.t.g....h./.....`..U&..i..w.._......h....|.3._..'...Q|)......Z.....j.
...O|..;Qgk.K0.^......]......;...i1...Z.:.S...Q_...u....xq6....i...E..
....-....6..v;$Lh...y.j4..R......f\]...t..>>.'.......pBC....0...
4|uW.>N..A.j2....F....7@..:...U.Kv../....K.grX...m..cJ.........I..4
.Fs..m.T...z;......q........[..PB;..,........5~...."!...t.T...0v ,....
....M......~....r.0e.v.Q...5.L.2.?.. J...........<..i5.W.;.g..M.1..
...iN..AC..5]Q.'.FZ.&..k..)...G.n.6. .s......n`tX......."........ .).|
.sI..&.[...K...{c..0yr...bE%.. ..y..w"..&.IT...S.*[email protected]...]...l9..^=
......v.N=.;.S.~.9.-....~..4..i....W#.y..p.......D....6F..$={....V.<
;.....vZ.....@`>.y..].....&.*.p._&.W..PK...R.?...*..G.[....w....d._
....S....{..=T.n...j...*..k.s'..'..bz.q...V.5L.-#[email protected]./.........<<< skipped >>>
GET /ppres/static/thirdparty/header/module_header.js?t=201303212934 HTTP/1.1
Accept: */*
Referer: hXXp://yun.baidu.com/s/1dD5xS7B
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: yun.baidu.com
Connection: Keep-Alive
Cookie: BAIDUID=E94612E1118354C80756FECFA78B0F72:FG=1
HTTP/1.1 200 OK
Cache-Control: no-cache
Connection: keep-alive
Content-Encoding: gzip
Content-Type: application/x-javascript
Date: Fri, 27 May 2016 22:26:57 GMT
Flow-Level: 3
Last-Modified: Tue, 24 May 2016 07:00:28 GMT
P3p: CP=" OTI DSP COR IVA OUR IND COM "
Pragma: no-cache
Server: nginx
Set-Cookie: BAIDUID=9E219A7B836381A2B347DBECDD711A52:FG=1; expires=Sat, 27-May-17 22:26:57 GMT; max-age=31536000; path=/; domain=.baidu.com; version=1
Vary: Accept-Encoding
X-Powered-By: BaiduCloud
Yld: 9203377820361116565
Yme: ZIGW/i4rX04SdTQBUmr/tGZLovoeTxz3qApHwyiEkOq7
Transfer-Encoding: chunkedd98...............[.H.8.U.2.{.On...|`.$..2...G.e...<..`......V.u.&.
...yg..u.Q]]]w.2....9.(....&...;..{.7........e../.....g..f......:w....
.....f.Q.9.i....9S.L..75G..~....z..'..z.c[;......'=.Y?..H.?...........
..ck?.U..u,O...l4.sz../.4...........Y..........Q.C..;i...c..Zc..~'vw..
....N...l,..<{.Ypi..'......m.............k.......3._....g.q.}..&dj}
]...........5..nO...U..3.\. N.%D..}.....3.....k<..:T."....0v'.tMWg.
f...].(._...l`......y^q}=.........e....g...>..j)../.U....O..?|*.$.k
..F.8...l0........E.].g..6.....`jS.....=,.._g.P6...zQk....q......m#...
.LM;.6n5C;.B.N..3..o..K9..}.5...]_.Z1o53....j.....q......u.../...*..:.
..Y9^_.Se]?>.....d...h....Fvn^.|.......U.....L..z..Aw....S.(./.1|..
I.6.G0...7.j...D....?\"*x..~)h..B5....@cd..#.$<.g ...x..K4..q......
.....L].)...88.a...w7q.i.\..7'..=..5......G..u..;..2raZ......k0.Uh....
[.#8.&2....3RK.........$m.Y]?...A....:4.......gp~ .G0..I"}....k...k..T
.8[m.>. .....j-.`k...y..5o .G3..z.'...~...U.....'......I...........
..[.:Aq.^......Z..-.)..e.t6._.tm\.....G.......hA^...*..2pV...).C....(/
..Kz^.........=f....d.......u.._.k.....0'ih.......M0k.M....J]........=
..o)....Km.....\...h.W..e...@..#..f];......%...A3*.D.WK.......`M..*.C.
.Z...._..&N.....}q?'w...D.!...a!.&wP.;.!.L}[email protected]#.....Y.s...
=..7.....-....;..g.D..0\.V..*.....Jy...Z....?~k0....!.`.....2$......B`
.@F..[.R....-.........{...&9..VCn....S...;..._>2.o...;..<.[.....
..,.`\..u.Hp...r\........H..G..k...3c.yz.P...;J...P....[1r.5....z..D.u
...r)j2..A.......l.a....f^.r.[..S.?z..dU.-VQ7... 1u9.G..r_..&...h1<<< skipped >>>
GET /feproxy/ad/list?list[0][id]=web-text&list[0][w]=0&list[0][h]=0&uk= HTTP/1.1
x-requested-with: XMLHttpRequest
Accept-Language: en-us
Referer: hXXp://yun.baidu.com/s/1dD5xS7B
Accept: application/json, text/javascript, */*; q=0.01
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: yun.baidu.com
Connection: Keep-Alive
Cookie: BAIDUID=9E219A7B836381A2B347DBECDD711A52:FG=1
HTTP/1.1 200 OK
Cache-Control: no-cache
Connection: keep-alive
Content-Encoding: gzip
Content-Type: application/json; charset=UTF-8
Date: Fri, 27 May 2016 22:26:58 GMT
Flow-Level: 3
P3p: CP=" OTI DSP COR IVA OUR IND COM "
Pragma: no-cache
Server: nginx
Set-Cookie: BAIDUID=30B24ECA2B45FEE949724FB6D146F482:FG=1; expires=Sat, 27-May-17 22:26:58 GMT; max-age=31536000; path=/; domain=.baidu.com; version=1
Vary: Accept-Encoding
X-Powered-By: BaiduCloud
Yld: 9203378085759463058
Yme: ZIGW/i4rX04SdTYCUmr/tGtPovkcQhz3qQpHwyiE
Content-Length: 340.............n. .E..EWN..0...CJ...G(~.6$M..{.R...........`....8C.... .
..yx.)..........0.1...n;...XD*.Vr.J....#Z...L1.X%].3D.*.ZI.!.a.:.eGqL^
a^.4n2.Q\P.et..m....Z.........m...........J....x.W.T..F*W.=.{.]..v.Tn.
].6......A>u.4.n.}...Y....>....x...o............QAD....NI..b....
.OS....m.4.T..!8P.Z\.S..XYt.J....^..5..3..i....%.....0.$;.T,h.....HTTP
/1.1 200 OK..Cache-Control: no-cache..Connection: keep-alive..Content-
Encoding: gzip..Content-Type: application/json; charset=UTF-8..Date: F
ri, 27 May 2016 22:26:58 GMT..Flow-Level: 3..P3p: CP=" OTI DSP COR IVA
OUR IND COM "..Pragma: no-cache..Server: nginx..Set-Cookie: BAIDUID=3
0B24ECA2B45FEE949724FB6D146F482:FG=1; expires=Sat, 27-May-17 22:26:58
GMT; max-age=31536000; path=/; domain=.baidu.com; version=1..Vary: Acc
ept-Encoding..X-Powered-By: BaiduCloud..Yld: 9203378085759463058..Yme:
ZIGW/i4rX04SdTYCUmr/tGtPovkcQhz3qQpHwyiE..Content-Length: 340........
.......n. .E..EWN..0...CJ...G(~.6$M..{.R...........`....8C.... ...yx.)
..........0.1...n;...XD*.Vr.J....#Z...L1.X%].3D.*.ZI.!.a.:.eGqL^a^.4n2
.Q\P.et..m....Z.........m...........J....x.W.T..F*W.=.{.]..v.Tn.].6...
...A>u.4.n.}...Y....>....x...o............QAD....NI..b.....OS...
.m.4.T..!8P.Z\.S..XYt.J....^..5..3..i....%.....0.$;.T,h........
.<<< skipped >>>
GET /disk/cmsdata?do=manual&ch=pan_focuspic&t=1464388027806 HTTP/1.1
x-requested-with: XMLHttpRequest
Accept-Language: en-us
Referer: hXXp://yun.baidu.com/s/1dD5xS7B
Accept: application/json, text/javascript, */*; q=0.01
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: yun.baidu.com
Connection: Keep-Alive
Cookie: BAIDUID=F97250058CC2F845A25D3E889712053B:FG=1
HTTP/1.1 200 OK
Cache-Control: no-cache
Connection: keep-alive
Content-Encoding: gzip
Content-Type: text/html; charset=utf-8
Date: Fri, 27 May 2016 22:26:59 GMT
Expires: 0
Flow-Level: 3
Nginx-Cache: HIT
P3p: CP=" OTI DSP COR IVA OUR IND COM "
Pragma: no-cache
Server: nginx
Set-Cookie: BAIDUID=71994A0F65150656ECDC127D78FA4E74:FG=1; expires=Sat, 27-May-17 22:26:59 GMT; max-age=31536000; path=/; domain=.baidu.com; version=1
Vary: Accept-Encoding
X-Powered-By: BaiduCloud
Yld: 9203378421075766597
Content-Length: 183............A..0.E...Pf].X,j/.!.H..!b..L.)..)...D.........$.....X.d..Z
.d.....S........X..b...T`.V$e.......c%.y..a.Bw...;/../....i"J..o..|...
.nbY.|. .f.....V...3~<...q..J.3.a|..0......HTTP/1.1 200 OK..Cache-C
ontrol: no-cache..Connection: keep-alive..Content-Encoding: gzip..Cont
ent-Type: text/html; charset=utf-8..Date: Fri, 27 May 2016 22:26:59 GM
T..Expires: 0..Flow-Level: 3..Nginx-Cache: HIT..P3p: CP=" OTI DSP COR
IVA OUR IND COM "..Pragma: no-cache..Server: nginx..Set-Cookie: BAIDUI
D=71994A0F65150656ECDC127D78FA4E74:FG=1; expires=Sat, 27-May-17 22:26:
59 GMT; max-age=31536000; path=/; domain=.baidu.com; version=1..Vary:
Accept-Encoding..X-Powered-By: BaiduCloud..Yld: 9203378421075766597..C
ontent-Length: 183..............A..0.E...Pf].X,j/.!.H..!b..L.)..)...D.
........$.....X.d..Z.d.....S........X..b...T`.V$e.......c%.y..a.Bw...;
/../....i"J..o..|....nbY.|. .f.....V...3~<...q..J.3.a|..0........
GET /ppres/static/js/plug/html5.js HTTP/1.1
Accept: */*
Referer: hXXp://yun.baidu.com/s/1dD5xS7B
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: pan.baidu.com
Connection: Keep-Alive
Cookie: BAIDUID=8BAB9156D0B005C2C41AEA5B41BB81E4:FG=1
HTTP/1.1 200 OK
Cache-Control: no-cache
Connection: keep-alive
Content-Encoding: gzip
Content-Type: application/x-javascript
Date: Fri, 27 May 2016 22:26:54 GMT
Flow-Level: 3
Last-Modified: Tue, 24 May 2016 07:00:28 GMT
P3p: CP=" OTI DSP COR IVA OUR IND COM "
Pragma: no-cache
Server: nginx
Set-Cookie: BAIDUID=B5E62F285F9858A09A611B208AD33D0E:FG=1; expires=Sat, 27-May-17 22:26:54 GMT; max-age=31536000; path=/; domain=.baidu.com; version=1
Vary: Accept-Encoding
X-Powered-By: BaiduCloud
Yld: 9203377068331699211
Yme: ZIGW/i4rX0wbdTYEUmr/tGtNov4eVAP3oAhPyyeT
Content-Length: 780..........mTMs.6...W8.......7.i&.3=..L...D%..K.............J......}...
w....f4.:-...&.d...z...s...J...S2..T&..........B...C.p.,....6T...)....
p........t..|h.)-8...........j lcR..#.k.%....."g...../LJ$..........%_.
...b..s$..$g...K_%...-W...yJ.k&..JU.1gk..T<.N^1.b...<..s.n....5.
.....p...<.-....G.6Jc.H?$....(.j.HZR.5..........Z.....BIE.j..Hp....
.OSRlG][....I.S.........#.5d.#..v3DPr.J.}..a..n....]./.f.^..v...o.....
e.e....?!.S.....Z?[^.5.d....|.DZ..-.u..Po:.W.lWn.sD._Z...!..TcA.a..:..
........".I.i...Vi...r.....#....8Y...L....8k..c..*.....:....$O.....A..
z.s.Qx..9...]]..&5.|9_.....x."4f....Ao.TA.~.y.H..."#t}..(>...eQ.Q.r
X.=.. ..m....._x.qUd......q.i....$../...5wn..M...W..H...k.......6..{Ky
...c.qA.....I.s0 ...~^..|?..'hq3/L.......".p......%.B....l..g.3...4B=.
{.}.\r.4I...}....$[...HTTP/1.1 200 OK..Cache-Control: no-cache..Connec
tion: keep-alive..Content-Encoding: gzip..Content-Type: application/x-
javascript..Date: Fri, 27 May 2016 22:26:54 GMT..Flow-Level: 3..Last-M
odified: Tue, 24 May 2016 07:00:28 GMT..P3p: CP=" OTI DSP COR IVA OUR
IND COM "..Pragma: no-cache..Server: nginx..Set-Cookie: BAIDUID=B5E62F
285F9858A09A611B208AD33D0E:FG=1; expires=Sat, 27-May-17 22:26:54 GMT;
max-age=31536000; path=/; domain=.baidu.com; version=1..Vary: Accept-E
ncoding..X-Powered-By: BaiduCloud..Yld: 9203377068331699211..Yme: ZIGW
/i4rX0wbdTYEUmr/tGtNov4eVAP3oAhPyyeT..Content-Length: 780............m
TMs.6...W8.......7.i&.3=..L...D%..K.............J......}...w....f4.:-.
..&.d...z...s...J...S2..T&..........B...C.p.,....6T...)....p......<<< skipped >>>
GET /api/analytics?type=web_header_title_click&clienttype=0¤tUrl=http://yun.baidu.com/s/1dD5xS7B&t=1464388027447 HTTP/1.1
Accept: */*
Referer: hXXp://yun.baidu.com/s/1dD5xS7B
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: pan.baidu.com
Connection: Keep-Alive
Cookie: BAIDUID=F97250058CC2F845A25D3E889712053B:FG=1
HTTP/1.1 200 OK
Cache-Control: no-cache
Connection: keep-alive
Content-Type: image/jpeg; charset=UTF-8
Date: Fri, 27 May 2016 22:26:59 GMT
Flow-Level: 3
P3p: CP=" OTI DSP COR IVA OUR IND COM "
Pragma: no-cache
Server: nginx
Set-Cookie: BAIDUID=4F9C212ADBC36B6EA9203FA30D512549:FG=1; expires=Sat, 27-May-17 22:26:59 GMT; max-age=31536000; path=/; domain=.baidu.com; version=1
X-Powered-By: BaiduCloud
Yld: 9203378327851027777
Yme: ZIGW/i4rV0kMajYYTmvhrmlXvvsWVAf3oAhPyyc=
Content-Length: 48..{"errno":0,"request_id":3438770804414139713}....
GET /ppres/static/images/error/error.png?t=201605245555?@=-1 HTTP/1.1
Accept: */*
Referer: hXXp://yun.baidu.com/s/1dD5xS7B
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: pan.baidu.com
Connection: Keep-Alive
Cookie: BAIDUID=F97250058CC2F845A25D3E889712053B:FG=1
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: no-cache
Connection: keep-alive
Content-Length: 5719
Content-Type: image/png
Date: Fri, 27 May 2016 22:26:59 GMT
Etag: "5743fc0c-1657"
Flow-Level: 3
Last-Modified: Tue, 24 May 2016 07:00:28 GMT
P3p: CP=" OTI DSP COR IVA OUR IND COM "
Pragma: no-cache
Server: nginx
Set-Cookie: BAIDUID=4F9C212ADBC36B6EDBB0B7BE7202F274:FG=1; expires=Sat, 27-May-17 22:26:59 GMT; max-age=31536000; path=/; domain=.baidu.com; version=1
X-Powered-By: BaiduCloud
Yld: 9203378425521977887
Yme: ZIGW/ywrWk8MaT0YTmvhrm1XvfMXVAPxoAhPyyc=.PNG........IHDR..............n......sBIT.....O.....PLTE`3.s.......0..
...L.....`.f,........S.jZ}S)..<.....".p$...........:...yS?.....r.}=
l@!..x.|[.....i....R"..I....{A.....s.........{....i....T...].s/..\....
......kMsJ)...........u..7...........W.t'...........r....X...c..~.C...
..j'..[..|..n...d8!}X3..z.......]H.....G.....I.............sc..t......
..z..F....t(..Y..~.....n..;.`<..........lC..Q.........uO8..c.......
..kB)...........:.}K...........y.pI..>.......dR....K..c,.rC........
m....e...l..>...sK4..5...h<"..Y..m.......`9..B.....d.~,...._)..c
..W.....r..Fs...xj....i:..,..M.rCmD/b5...b..R............zS1..j....q:}
]C..H..a..~....{R.....7...................aI....n!..Q..r..|..s.......r
X..b.....T....~(.f4.....P..y.....-.|1..z.......vQ.n:.......K!.........
..Y.................m..R.....{........t..?..X.\0..b.c".....4..o.....y.
9.-....tRNS...........................................................
......................................................................
......................................................................
..........................................................`......pHYs.
..........~.....tEXtCreation Time.11/06/13.y.m....tEXtSoftware.Adobe F
ireworks CS5q..6....IDATx....\S......].....`.RW..Z*b...V..,....E....V.
...-......B...@........*R..r/..El...... ..m..^.s.9..sN......Q..=.|.<
;......7.....V..<Q0..0......{.l./<...7.4_x.UA.|.......4_x..AAl.x
..w..=`.|...........A.Ao...{...=..._p.;A.}....7.}...=Av)..s.4vk.i.E.'.
r....J.......=..8Q.....[[email protected]......,..pjb..Z.......o..3.A.<<< skipped >>>
GET /htl/Dementia.rar HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: VVV.xmhairong.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Content-Type: application/octet-stream
Last-Modified: Sun, 08 May 2016 07:14:37 GMT
Accept-Ranges: bytes
ETag: "1880548f9a8d11:0"
Server: Microsoft-IIS/7.5
Date: Fri, 27 May 2016 22:27:00 GMT
Content-Length: 478300Rar!.....s..................|N.....h.=*[email protected]..|..[j.$..1...*.T
{[email protected]}..u.,........H5t)^.~..`..a.'..Rr..
G3..t.....B.._.>[email protected]..,....../k.....<.....<
;.. ......k....B....=$0..k.5."t!..c..k&x.}.(v.kEiNb...6.u,)... ."B.'..
k ....X.....8.p...Y.L.R.g........ .?.o...j...D.5..c...<.....<..E
.)........6.:...L........?Q..EZF6......L....fV.&..4..lL|.0...(x...J5].
TT.F....I.z......']...:G9.V....".U....t!l.L.i.i...{.YH....(?...y.y.T..
.....S.TI$.........I...%.Eo.]......$;.:..('*DOS.%._qs.w....y.*.&...p9.
.yC.....V..V`.w.......a N'.B..^.Z|J....0...b...........(...F=..RC.Fr.x
g..kVaP... ./...a.?.^..D.T....>H....%#............-_.]....e..Y3.-u.
...~...7.I.0%.....l....M.{n.....$.4..4.MU.../{......(.......01...A..~.
.(..M...`-&.X....v...H.:>......ixK.O.._.......R_....S|..S.....#Bw..
..........cJ`.P..;.R...=O.....u..}M.42..gjn.66....L..J.Z...f.D.]|...M.
`.....\p..WL..D... ?;..........\.>M...5...N,.r..6.S...W.V..Y- .....
%j.... ..I...$.~_..1c....a..u....4............,.._.......TV.......9...
O....*..|.u........di.4\*m..5...jc..m..).D=.....Y..K......ig.z*.....1.
...k......?RB.W>.f|..WymS.R.....j.._B.`.....e...-i.z..k.f.......a6.
ZS.......D.yK&.....-..U`S.....D....Z'...K..y..Q.A.....p...N.......H..9
.9..r..T.%V...1....Fn..v..%....M...:2.SEr...;N.:.z .T..^..&.....<.q
GLK...d...kX..j.M...*.-J]...S...6....&.... .>...Y[.|.7F?.P..IH.j...
.....t?qvw..".1...w..[.0../.p......OJ.H.X...H.7.[.T...:..........O.1..
.FxXZ.o..9 ....h.q..._[.b.)\....j.F.......Z!.......c..*...g.q.r...<<< skipped >>>
The Trojan connects to the servers at the folowing location(s):
%?9-*09,*19}*09
.text
`.data
.rsrc
msvcrt.dll
KERNEL32.dll
NTDLL.DLL
USER32.dll
SHLWAPI.dll
SHDOCVW.dll
Software\Microsoft\Windows\CurrentVersion\Explorer\BrowseNewProcess
IE-X-X
rsabase.dll
System\CurrentControlSet\Control\Windows
dw15 -x -s %u
watson.microsoft.com
IEWatsonURL
%s -h %u
iedw.exe
Iexplore.XPExceptionFilter
jscript.DLL
mshtml.dll
mlang.dll
urlmon.dll
wininet.dll
shdocvw.DLL
browseui.DLL
comctl32.DLL
IEXPLORE.EXE
iexplore.pdb
ADVAPI32.dll
MsgWaitForMultipleObjects
IExplorer.EXE
IIIIIB(II<.Fg
7?_____ZZSSH%
)z.UUUUUUUU
,....Qym
````2```
{.QLQIIIKGKGKGKGKGKG;33;33;0
8888880
8887080
browseui.dll
shdocvw.dll
6.00.2900.5512 (xpsp.080413-2105)
Windows
Operating System
6.00.2900.5512
msdtc.exe_1788:
.text
`.data
.rsrc
KERNEL32.dll
msvcrt.dll
MSDTCTM.dll
msdtcexe.pdb
_wcmdln
2001.12.4414.700
MSDTC.EXE
Microsoft(R) is a registered trademark of Microsoft Corporation. Windows(TM) is a trademark of Microsoft Corporation
03.01.00.4414
Dementia.exe_1012:
.text
`.rdata
@.data
.ndata
.rsrc
@.reloc
;~TtCP
tJSSh
FtPj
RegDeleteKeyExW
Kernel32.DLL
PSAPI.DLL
operator
GetProcessWindowStation
127.0.0.1
0.0.0.0
RegCreateKeyTransactedW
,%u,%u,%u,%u,%u,%u,%u,%u,%u,%u,%u,%u,%u,%u,%u
upload_data.qq.com
121.14.102.16
COMM:%u,%u,%u,%I64u,%I64u,%d,%d,%d,%d,%d,%d,%d,%d,%d
,0,0,0,0,0
User-Agent: Mozilla/4.0 (compatible; MSIE 5.00; Windows Xp)
Host: %s:%d
(%d) d:d:d.d000 %s: %s
pdlxf.qq.com
fs-tcp-conn.qq.com
stun.qq.com
xuanfengnet.qq.com
fs-hello.qq.com
fs-conn.qq.com
fs-h2u.qq.com
fs-report.qq.com
R:\TempView\Misc\Setup3\build\Release\QQSetupEx.pdb
WS2_32.dll
NETAPI32.dll
VERSION.dll
CreatePipe
GetWindowsDirectoryW
KERNEL32.dll
USER32.dll
GDI32.dll
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
RegCreateKeyW
RegDeleteKeyW
RegEnumKeyW
ADVAPI32.dll
SHFileOperationW
ShellExecuteW
ShellExecuteExW
SHELL32.dll
ole32.dll
SHLWAPI.dll
CryptCATCatalogInfoFromContext
WTHelperGetProvCertFromChain
WINTRUST.dll
CertGetNameStringW
CRYPT32.dll
GetCPInfo
GetProcessHeap
.?AVCVideoMsg@@
zcÁ
^SQLS^
'%cMMV#)
Hummer Backup Setup EXE
<requestedExecutionLevel level="requireAdministrator" uiAccess="false"></requestedExecutionLevel>
<!-- Windows 8.1 -->
<supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/><!-- Windows Vista -->
<supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/><!-- Windows 7 -->
<supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><!-- Windows 8 -->
<supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*"></assemblyIdentity>
2(3,3034383<3
?#? ?<?[?
0#0-02070
8 8$8(8,808
6'7,717@7
Software\Microsoft\Windows\CurrentVersion
*?|<>/":
invalid registry key
HKEY_DYN_DATA
HKEY_CURRENT_CONFIG
HKEY_PERFORMANCE_DATA
HKEY_USERS
HKEY_LOCAL_MACHINE
HKEY_CURRENT_USER
HKEY_CLASSES_ROOT
RMDir: RemoveDirectory failed("%s")RMDir: RemoveDirectory("%s")RMDir: RemoveDirectory invalid input("%s")Delete: DeleteFile failed("%s")Delete: DeleteFile("%s")install.log
Section: "%s"
.DEFAULT\Control Panel\International
logging set to %d
settings logging to %d
WriteReg: error creating key "%s\%s"
WriteReg: error writing into "%s\%s" "%s"
WriteRegDWORD: "%s\%s" "%s"="0xx"
WriteRegExpandStr: "%s\%s" "%s"="%s"
WriteRegStr: "%s\%s" "%s"="%s"
DeleteRegKey: "%s\%s"
DeleteRegValue: "%s\%s" "%s"
WriteINIStr: wrote [%s] %s=%s in %s
CopyFiles "%s"->"%s"
Exec: failed createprocess ("%s")Exec: success ("%s")Exec: command="%s"
ExecShell: success ("%s": file:"%s" params:"%s")ExecShell: warning: error ("%s": file:"%s" params:"%s")=%dExch: stack < %d elements
RMDir: "%s"
MessageBox: %d,"%s"
Delete: "%s"
Rename failed: %s
Rename: %s
IfFileExists: file "%s" does not exist, jumping %d
IfFileExists: file "%s" exists, jumping %d
CreateDirectory: "%s" created
CreateDirectory: can't create "%s" - a file already exists
CreateDirectory: can't create "%s" (err=%d)
CreateDirectory: "%s" (%d)
SetFileAttributes: "%s":X
Sleep(%d)
detailprint: %s
Call: %d
Aborting: "%s"
Jump: %d
HKERNEL32.DLL
mscoree.dll
- Attempt to initialize the CRT more than once.
- CRT not initialized
- floating point support not loaded
WUSER32.DLL
hXXp://dldir1.qq.com/qqfile/qq/plugin/setuppkg.7z.output
_TX~QQSetupEx~0503~A1C22B84-CE8D-437A-AA60-6D3ABCB18ACF
Advapi32.dll
windows
RCreateWindowsDirTemp
R:\TempView\Misc\Setup3\BackupDownloader\BackupDownload.cpp
create folder :%s error, errcode:%lu
dir:%s
ParseCmdLine
`anonymous-namespace'::ParseCmdLine
Software\Tencent\Report
cmd line
r:\tempview\misc\setup3\backupdownloader\installobject\InstallObject.h
GetExitCodeProcess exit code : %u
CInstallObjectAgent::CloseProcessHandle
ID=%d
r:\tempview\misc\setup3\backupdownloader\installobject\InstallObjectDefault.h
%d.%d.%d.%d
R:\TempView\Misc\Setup3\BackupDownloader\InstallObject\InstallObjectDefault.cpp
%s\drivers\usbvideo.sys
usbvideo.sys file version: %s
5.1.2600.2729
usbvideo.sys file version is big than 5.1.2600.2729, no need install KB899271
SOFTWARE\Microsoft\Updates\Windows XP\SP3\KB899271
has register key:SOFTWARE\Microsoft\Updates\Windows XP\SP3\KB899271 , no need install KB899271
hXXp://download.microsoft.com/download/4/6/0/460ca2ec-55b8-46d6-afb6-b644a7e03d71/WindowsXP-KB899271-v4-x86-CHS.exe
hXXp://dldir1.qq.com/music/clntupate/QzoneMusicInstall.exe
hXXp://dldir1.qq.com/music/clntupate/QQPhotoDrawExSetupForQQ.exe
hXXp://dldir1.qq.com/P2PUpdate/P2PSetup.exe
hXXp://dldir1.qq.com/qqfile/qq/videomsg/VideoMsgInstall.exe
hXXp://dldir1.qq.com/qqfile/qq/plugin/VideoShowPlayerInstall.exe
hXXp://dldir1.qq.com/qqfile/qq/plugin/VideoBeautyInstall.exe
hXXp://dldir1.qq.com/invc/cyclone/QQMiniDL_Setup.exe
hXXp://dldir1.qq.com/qqfile/qq/plugin/QQGameMicro_setup.exe
\QQGame.exe
QQGame.exe
hXXp://dldir1.qq.com/qqfile/qq/plugin/HotWordInstall.exe
hXXp://androidpc.app.qq.com/app1/vertis.do?id=201409090001
BrowserInstaller.exe
@hXXp://dldl.qq.com/dl/qqie8
hXXp://dldl.qq.com/dl/qq
hXXp://dldir1.qq.com/music/clntupate/QQMusicDownloader.exe
hXXp://dldir1.qq.com/qqtv/qqlivesetup.exe
QQBrowser_Setup_QQ.exe
hXXp://dldir3.qq.com/minigamefile/QQGameDownloader.exe
hXXp://ws.sj.qq.com/webservices/download.do?yw=qq
QQPhoneManager_700024.exe
@\rundll32.exe
R:\TempView\Misc\Setup3\BackupDownloader\Util\7zUtil.cpp
decoder doesn't support this archive
ERROR #%d
gfile path : %s
R:\TempView\Misc\Setup3\BackupDownloader\Util\DecryptUtil.cpp
Open file failed, error code : %u
Get file size failed, error code : %u
File size too large, HighPart = %u
AR:\TempView\Misc\Setup3\BackupDownloader\DataReport\DataReport.cpp
DataReport::UploadInstallResult
log.tlg
\\.\PhysicalDrive0
Siphlpapi.dll
ACreateDownloader. uiCustomID = %d
strFilePath = %s
uiCustomID = %d
CDownload::IsWorking(). m_bInited = %d
strUrl = %s
strFileName = %s
CDownload::DeleteTask(). uiTaskID = %d
CDownload::HandleDeleteTask(). uiTaskID = %d
CDownload::DeleteTask(). strUrl = %s
CDownload::HandleDeleteTask(). strUrl = %s
CDownload::SetDownloadSpeed(). uiSpeed = %d
CDownload::SetP2PUploadSpeed(). uiSpeed = %d
CDownload::HandleSetP2PUploadSpeed(). uiSpeed = %d
CDownload::SetSafeMode(). bSafeMode = %d
CDownload::HandleSetSafeMode(). bSafeMode = %d
stProxyInfo.eProxyType = %d
stProxyInfo.strProxyIP = %s
stProxyInfo.usProxyPort = %d
CDownload::OnNotify()->OnDownloadComplete. uiTaskID = %d, uiResult = %d, uiErrorCode = %d, uiDetailErrorCode = %d
Adlcore.dll
QQPCDetector.dll
R:\TempView\Misc\Setup3\BackupDownloader\Network\BizInstallerMgr.cpp
task:%lu, download error code:%d
task:%lu, filename:%s
{39F5E8C5-2BA9-48df-B58E-D30D58E271ED}%d not need to download
%d need to download
name = %s
url = %s
args = %s
filename = %s
dlcore dll not exist, file:%s
iter->bFinished:%d
Start ObjectId:%u
m_oDownloadMgr.StartTask returns:%d
default file %s download ok, local file : %s
optional file %s download ok, local file : %s
%s...
ObjId: %u
Name: %s
Url: %s
Args: %s
Filename: %s
install a file:%s
run install failed, error code : %u
GetDectectorResult() successed, wording: %s
RunDetector successed, dwOperator == %d
RunDetector failed, dwOperator == %d
dwOperator Invaild, dwOperator == %d
GetInstallObjsReportString
CBizInstallerMgr::GetInstallObjsReportString
R:\TempView\Misc\Setup3\BackupDownloader\Network\BizInstallerWindow.cpp
WM_TASKTRAY_MSG
dwCookie:%d
R:\TempView\Misc\Setup3\BackupDownloader\Network\DownloadMgr.cpp
CreateDownloadTask,Url:%s, localPath:%s
CDownloadMgr::CreateHttpDownloadTask
m_oDownloader.StartTask, dwCookie:%d, return %d
CDownloadMgr::DeleteTask, dwCookie:%d
m_mapCookieToTask.erase, dwCookie:%d
szFileName = %s
%Documents and Settings%\All Users\Application Data\Microsoft dementia\Dementia.exe
8.2.17724.0
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
Dementia.exe:1992
Dementia.exe:1532
Dementia.exe:1012
attrib.exe:868
attrib.exe:2088
attrib.exe:1988
attrib.exe:1536
attrib.exe:2112
attrib.exe:2064
sc.exe:212
taskkill.exe:1436
taskkill.exe:2028
%original file name%.exe:772
ping.exe:2120
msdtc.exe:1788
net.exe:1976
net.exe:1336
net1.exe:380
net1.exe:1236
Miciosoft .NET.exe:948
irsetup.exe:1332
rar.exe:1512 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings% (4 bytes)
%WinDir%\oci.dll (4708 bytes)
%Documents and Settings%\%current user%\FAVORITES (4 bytes)
%Documents and Settings%\All Users\APPLICATION DATA (4 bytes)
%Program Files%\WIRESHARK (16 bytes)
%WinDir%\WinSxS (12 bytes)
%Program Files%\Internet Explorer (4 bytes)
%WinDir%\AppPatch (4 bytes)
%Documents and Settings%\%current user%\Local Settings (4 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft dementia\Dementia.exe (2850 bytes)
%WinDir%\oci.temp (39 bytes)
%WinDir%\REGISTRATION (4 bytes)
%WinDir%\Fonts (920 bytes)
%Documents and Settings%\All Users\Documents\My Music (4 bytes)
C:\$Directory (1388 bytes)
%System% (6144 bytes)
%Program Files%\COMMON FILES (4 bytes)
%WinDir%\WinSxS\Policies\x86_Policy.6.0.Microsoft.Windows.Common-Controls_6595b64144ccf1df_x-ww_5ddad775 (4 bytes)
%WinDir%\oci.txt (1588 bytes)
%WinDir%\Prefetch\IRSETUP.EXE-1B1C97F2.pf (40 bytes)
%WinDir%\WinSxS\Policies\x86_Policy.8.0.Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_x-ww_77c24773 (4 bytes)
%Documents and Settings%\%current user%\APPLICATION DATA (4 bytes)
%System%\config (8 bytes)
%System%\wbem (1064 bytes)
%System%\drivers (32 bytes)
%Documents and Settings%\All Users\Start Menu (4 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft dementia\360Game.zlib (99 bytes)
%WinDir%\Temp\Perflib_Perfdata_668.dat (4 bytes)
%WinDir%\Prefetch\259AF714DDCF5E9407353E066144A-10973936.pf (20 bytes)
%Documents and Settings%\%current user%\Start Menu\Programs (4 bytes)
%Program Files%\Common Files\Adobe\Acrobat\ActiveX (4 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft dementia\360Game.temp (6264 bytes)
%Documents and Settings%\All Users\Start Menu\Programs (4 bytes)
%Documents and Settings%\%current user%\Cookies (192 bytes)
%Documents and Settings%\%current user%\My Documents (4 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\_ir_sf_temp_0\lua5.1.dll (325 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\_ir_sf_temp_0\irsetup.exe (7386 bytes)
%System%\MsDtc\MSDTC.LOG (3888 bytes)
%System%\config\SOFTWARE.LOG (5606 bytes)
%System%\config\software (2708 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft dementia\360Game.exe (7403 bytes)
%System%\MsDtc\Trace\dtctrace.log (28 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft dementia\config.ini (4686 bytes)
C:\WindowsNET\Dementia.sys (79290 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\Dementia[1].rar (110785 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\_ir_sf_temp_0\5.ico (3634 bytes)
C:\WindowsNET\Miciosoft .NET.exe (28 bytes)
C:\WindowsNET\Rar.exe (5761 bytes)
C:\ProgramData\Temps\Dementia.exe (5777 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\_ir_sf_temp_0\irsetup.dat (1137 bytes)
%Documents and Settings%\All Users\Application Data\Microsoft dementia\dlcore.dll (8545 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Windows PlayGame" = "%Documents and Settings%\All Users\Application Data\Microsoft dementia\360Game.exe" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.