Trojan.GenericKD.2401598 (B) (Emsisoft), Trojan.GenericKD.2401598 (AdAware), Trojan-PSW.Win32.MSNPassword.FD, Trojan.Win32.FlyStudio.FD, GenericEmailWorm.YR, TrojanFlyStudio.YR (Lavasoft MAS)Behaviour: Trojan-PSW, Trojan, Worm, EmailWorm
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Summary
MD5: c008687e35a052bda4eb7c7a9bfb7beb
SHA1: bbecb59c9da15b2e81ffd0b15c64b99f03bdc2a2
SHA256: 7ca33c8f74d6e645b9f72e2b543415ddbfe33fa8f68f45178a66456c0a5d90a5
SSDeep: 24576:cZ v38iSg2uCOPizG37vpHJDqrEbE3LyzqaFvyJ8FowEG8GN9Q1z/:cZhgi5G37vpHJuAbELymaxyWFv
Size: 1531904 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2014-02-28 15:22:56
Analyzed on: WindowsXP SP3 32-bit
Summary: Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Dynamic Analysis
Payload
Behaviour | Description |
---|---|
EmailWorm | Worm can send e-mails. |
Process activity
The Trojan creates the following process(es):No processes have been created.The Trojan injects its code into the following process(es):
%original file name%.exe:188
Mutexes
The following mutexes were created/opened:
CTF.TMD.MutexDefaultS-1-5-21-1844237615-1960408961-1801674531-1003CTF.Layouts.MutexDefaultS-1-5-21-1844237615-1960408961-1801674531-1003CTF.Asm.MutexDefaultS-1-5-21-1844237615-1960408961-1801674531-1003CTF.Compart.MutexDefaultS-1-5-21-1844237615-1960408961-1801674531-1003CTF.LBES.MutexDefaultS-1-5-21-1844237615-1960408961-1801674531-1003oleacc-msaa-loadedZonesLockedCacheCounterMutexZonesCacheCounterMutexZonesCounterMutexWininetProxyRegistryMutexWininetConnectionMutexWininetStartupMutexc:!documents and settings!adm!local settings!history!history.ie5!c:!documents and settings!adm!cookies!c:!documents and settings!adm!local settings!temporary internet files!content.ie5!_!MSFTHISTORY!_RasPbFileShimCacheMutex
File activity
The process %original file name%.exe:188 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Cookies\Current_User@moxiwang.free3v[1].txt (256 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@mmstat[2].txt (168 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\UVKJ45OV\bg[1].gif (753 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\UVKJ45OV\boxbg[1].gif (8831 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@moxiwang.free3v[2].txt (256 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\6APR5SOT\stat[1].gif (43 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\UVKJ45OV\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\E32DQHGF\stat[1].gif (43 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@cnzz[1].txt (163 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@mmstat[1].txt (168 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@cnzz[2].txt (163 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\UVKJ45OV\stat[1].php (5895 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\desktop.ini (159 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@cnzz.mmstat[2].txt (203 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@cnzz.mmstat[1].txt (203 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OGJ3DGA8\app[1].gif (43 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OGJ3DGA8\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\E32DQHGF\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\E32DQHGF\login1[1].htm (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\6APR5SOT\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (3116 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OGJ3DGA8\core[1].php (750 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OGJ3DGA8\app[1].gif (0 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@cnzz.mmstat[1].txt (0 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@mmstat[1].txt (0 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@moxiwang.free3v[1].txt (0 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@cnzz[1].txt (0 bytes)
Registry activity
The process %original file name%.exe:188 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKCR\TypeLib\{1EA4DBF0-3C3B-11CF-810C-00AA00389B71}\1.1\0\win32]
"(Default)" = "%System%\oleacc.dll"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1B 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "01 5E B0 8C 70 33 45 91 69 A5 0C C9 E0 61 15 C4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
Dropped PE files
There are no dropped PE files.
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
Removals
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):No processes have been created.
- Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings%\%current user%\Cookies\Current_User@moxiwang.free3v[1].txt (256 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@mmstat[2].txt (168 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\UVKJ45OV\bg[1].gif (753 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\UVKJ45OV\boxbg[1].gif (8831 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@moxiwang.free3v[2].txt (256 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\6APR5SOT\stat[1].gif (43 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\UVKJ45OV\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\E32DQHGF\stat[1].gif (43 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@cnzz[1].txt (163 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@mmstat[1].txt (168 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@cnzz[2].txt (163 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\UVKJ45OV\stat[1].php (5895 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\History\History.IE5\desktop.ini (159 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@cnzz.mmstat[2].txt (203 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@cnzz.mmstat[1].txt (203 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OGJ3DGA8\app[1].gif (43 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OGJ3DGA8\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\E32DQHGF\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\E32DQHGF\login1[1].htm (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\6APR5SOT\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (3116 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OGJ3DGA8\core[1].php (750 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
Static Analysis
VersionInfo
Company Name: ???????
Product Name: ???????
Product Version: 1.0.0.0
Legal Copyright: ??????? ????
Legal Trademarks:
Original Filename:
Internal Name:
File Version: 1.0.0.0
File Description: ???????
Comments: ???????
Language: English (United States)
Company Name: ???????Product Name: ???????Product Version: 1.0.0.0Legal Copyright: ??????? ????Legal Trademarks: Original Filename: Internal Name: File Version: 1.0.0.0File Description: ???????Comments: ???????Language: English (United States)
PE Sections
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
---|---|---|---|---|---|
.text | 4096 | 884350 | 884736 | 5.13621 | 9776503996c2996b82dd8fba0e0dc46b |
.rdata | 888832 | 538270 | 540672 | 4.65864 | 008cd29276ad058495e675db119f4d90 |
.data | 1429504 | 409418 | 69632 | 4.34191 | 96e462d4f478c44677d62c84e5b24e5f |
.rsrc | 1839104 | 27780 | 28672 | 3.82968 | 32505695d24d018b21638a8c9054085a |
.text | 1867776 | 1057 | 4096 | 1.8805 | f8f25f1157ad8d9b382ea30e1f58edfd |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Network Activity
URLs
URL | IP |
---|---|
hxxp://moxiwang.free3v.net/1/login1.asp | 174.139.121.126 |
hxxp://all.cnzz.com.danuoyi.tbcache.com/stat.php?id=986628&web_id=986628 | |
hxxp://all.cnzz.com.danuoyi.tbcache.com/core.php?web_id=986628&t=z | |
hxxp://oz.cnzz.com/stat.htm?id=986628&r=&lg=en-us&ntime=none&cnzz_eid=2005226779-1432564554-&showp=1276x846&t=undefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefined...&h=1&rnd=756335749 | 198.11.132.200 |
hxxp://oz.cnzz.com/stat.htm?id=986628&r=http://moxiwang.free3v.net/1/login1.asp&lg=en-us&ntime=1432564554&cnzz_eid=2005226779-1432564554-&showp=1276x846&t=undefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefined...&h=1&rnd=330115055 | 198.11.132.200 |
hxxp://cnzz.mmstat.com/9.gif?abc=1&rnd=781591846 | 42.120.219.171 |
hxxp://moxiwang.free3v.net/boxbg.gif | 174.139.121.126 |
hxxp://moxiwang.free3v.net/bg.gif | 174.139.121.126 |
hxxp://cnzz.mmstat.com/9.gif?abc=1&rnd=748174615 | 42.120.219.171 |
hxxp://cnzz.mmstat.com/app.gif?&cna=AS3qDVW8o3MCAcGK9Oe3JH25 | 42.120.219.171 |
hxxp://cnzz.mmstat.com/app.gif?&cna=AS3qDaH4ogoCAcGK9OcMhe/1 | 42.120.219.171 |
hxxp://im.free3v.net/bg.gif | 174.139.121.126 |
hxxp://im.free3v.net/boxbg.gif | 174.139.121.126 |
hxxp://s9.cnzz.com/stat.php?id=986628&web_id=986628 | 1.99.192.15 |
hxxp://pcookie.cnzz.com/app.gif?&cna=AS3qDVW8o3MCAcGK9Oe3JH25 | 42.120.219.171 |
hxxp://c.cnzz.com/core.php?web_id=986628&t=z | 195.27.31.248 |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET /app.gif?&cna=AS3qDVW8o3MCAcGK9Oe3JH25 HTTP/1.1
Accept: */*
Referer: hXXp://moxiwang.free3v.net/1/login1.asp
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Connection: Keep-Alive
Host: pcookie.cnzz.com
HTTP/1.1 200 OK
Server: Tengine
Date: Mon, 25 May 2015 15:25:54 GMT
Content-Type: image/gif
Content-Length: 43
Connection: keep-alive
P3P: CP="NOI DSP COR CURa ADMa DEVa PSAa PSDa OUR IND UNI PUR NAV"
Set-Cookie: cna=AS3qDVW8o3MCAcGK9Oe3JH25; expires=Thu, 22-May-25 15:25:54 GMT; path=/; domain=.cnzz.com
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache
Pragma: no-cache
GIF89a.............!.......,...........L..;HTTP/1.1 200 OK..Server: Tengine..Date: Mon, 25 May 2015 15:25:54 GMT..Content-Type: image/gif..Content-Length: 43..Connection: keep-alive..P3P: CP="NOI DSP COR CURa ADMa DEVa PSAa PSDa OUR IND UNI PUR NAV"..Set-Cookie: cna=AS3qDVW8o3MCAcGK9Oe3JH25; expires=Thu, 22-May-25 15:25:54 GMT; path=/; domain=.cnzz.com..Expires: Thu, 01 Jan 1970 00:00:01 GMT..Cache-Control: no-cache..Pragma: no-cache..GIF89a.............!.......,...........L..;..
GET /boxbg.gif HTTP/1.1
Accept: */*
Referer: hXXp://moxiwang.free3v.net/1/login1.asp
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: im.free3v.net
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Mon, 25 May 2015 15:26:03 GMT
Content-Length: 34665
Content-Type: image/gif
Content-Location: hXXp://im.free3v.net/boxbg.gif
Last-Modified: Wed, 04 Sep 2013 01:44:53 GMT
Accept-Ranges: bytes
ETag: "a64c4c5a10a9ce1:e32"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
GIF89a....................&'. ,..0.13.35.59.59.12.,-.67.7;.79.79.79.;?.KL.|~.op...........#.*0.JN.Z_.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................##.((.......('.$$.55.//.55.44.33.97.88.::.88.LL!..............JGGhdd533.......................................................................................................................................VVV...,...............8pG....*\......#J.H.....3j...... C..I....(S.\.p.../....C....r.......@...J....H.*].....P.J.J....X.j....N...h.Y....4}$2g....p...K....x............L...... ^......#.5..G.....u.....`]..A..i.8R.^.Z5...c..!.....s..=.........;....S...:...=..H.b...(....=........O......._.........O........q.3A..X.....v.h.........l..'....g...QX[..-.\s.A'.u.Y....u...,....0.(..4.h..R...@...H:..Q...&. ..>8..L.....5.!r.}.Z.RH7]u%.pb...(..d.i..h..f......V8!@.C..`....`.H@....@)(pRvX.i.]...\v.e!.y....Vj...f..z......LAg.........$.M.....R...i.b.h..i.......... ...%...=....!.j.....j.......2y.......#......k...........wR...........*..Lb ..S"..i...........7....Z!E(...D.X.Z..x....}../..B.........5z..(F*).4.l..8.G.A.c.q....q...<..%?y2..!Zp..:J..9Wm..XW.s!.......m..8.
<<< skipped >>>
GET /stat.htm?id=986628&r=http://moxiwang.free3v.net/1/login1.asp&lg=en-us&ntime=1432564554&cnzz_eid=2005226779-1432564554-&showp=1276x846&t=undefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefined...&h=1&rnd=330115055 HTTP/1.1
Accept: */*
Referer: hXXp://moxiwang.free3v.net/1/login1.asp
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: oz.cnzz.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: Tengine/1.4.6
Date: Mon, 25 May 2015 15:25:53 GMT
Content-Type: image/gif
Content-Length: 43
Last-Modified: Mon, 09 Mar 2015 09:01:02 GMT
Connection: close
Accept-Ranges: bytes
GIF89a.............!.......,...........D..;..
GET /stat.htm?id=986628&r=&lg=en-us&ntime=none&cnzz_eid=2005226779-1432564554-&showp=1276x846&t=undefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefined...&h=1&rnd=756335749 HTTP/1.1
Accept: */*
Referer: hXXp://moxiwang.free3v.net/1/login1.asp
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: oz.cnzz.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: Tengine/1.4.6
Date: Mon, 25 May 2015 15:25:53 GMT
Content-Type: image/gif
Content-Length: 43
Last-Modified: Mon, 09 Mar 2015 09:01:02 GMT
Connection: close
Accept-Ranges: bytes
GIF89a.............!.......,...........D..;..
GET /1/login1.asp HTTP/1.1
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/x-ms-application, application/x-ms-xbap, application/vnd.ms-xpsdocument, application/xaml xml, */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: moxiwang.free3v.net
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Mon, 25 May 2015 15:26:01 GMT
Server: Microsoft-IIS/6.0
Content-Type: text/html
Content-Length: 1657
<html>..<head>..<meta http-equiv="Content-Language" content="zh-cn">..<meta http-equiv="Content-Type" content="text/html; charset=gb2312">..<title>........ free.3v.do ....100M........ASP....</title>..<style>..A:link {.. color: #008000;.. text-decoration: none..}..A:visited {.. color: #008000;.. text-decoration: none..}..A:hover {.. color: #ff7f24;.. text-decoration: none;..}..A:active {.. color: #ff7f24; .. text-decoration: none;..}..</style>..</head>..<body oncontextmenu=self.event.returnValue=false scroll="no" style="margin:0">..<div id="ad_3v" style="z-index:1000;position:absolute;right:40px;top:50px;font-size:14px;line-height:20px;"><a title="..........................40%.........." href="hXXp://VVV.3v.do/kefu/news/121.html" target="_blank"><font color=red>........</font></a><br><a href="http://free.3v.do" target="_blank">........</a><br><a href="hXXp://VVV.3v.do/xnzj/" target="_blank">........</a><br><a href="hXXp://VVV.3v.do/xnzj/hk.html" target="_blank">........</a><br><a href="hXXp://VVV.3v.do/xnzj/gf.html" target="_blank">........</a></div>..<a href="hXXp://moxiwang.free3v.net/1/login1.asp" id="link" target="frm"></a>..<iframe name="frm" src="" border="0" frameborder="no" scrolling="auto" allowtransparency="yes" marginheight="0" marginwidth="0" width="100%" height="100%"></iframe>..<script type="text/javascri
<<< skipped >>>
GET /9.gif?abc=1&rnd=748174615 HTTP/1.1
Accept: */*
Referer: hXXp://moxiwang.free3v.net/1/login1.asp
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: cnzz.mmstat.com
Connection: Keep-Alive
HTTP/1.1 302 Found
Server: Tengine
Date: Mon, 25 May 2015 15:25:53 GMT
Content-Type: image/gif
Content-Length: 43
Connection: keep-alive
P3P: CP="NOI DSP COR CURa ADMa DEVa PSAa PSDa OUR IND UNI PUR NAV"
Set-Cookie: cna=AS3qDaH4ogoCAcGK9OcMhe/1; expires=Thu, 22-May-25 15:25:53 GMT; path=/; domain=.mmstat.com
Set-Cookie: sca=478d4441; path=/; domain=.cnzz.mmstat.com
Set-Cookie: atpsida=de48c14461ad409a4f42fd22_1432567553; expires=Thu, 22-May-25 15:25:53 GMT; path=/; domain=.cnzz.mmstat.com
Location: hXXp://pcookie.cnzz.com/app.gif?&cna=AS3qDaH4ogoCAcGK9OcMhe/1
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache
Pragma: no-cache
GIF89a.............!.......,...........L..;HTTP/1.1 302 Found..Server: Tengine..Date: Mon, 25 May 2015 15:25:53 GMT..Content-Type: image/gif..Content-Length: 43..Connection: keep-alive..P3P: CP="NOI DSP COR CURa ADMa DEVa PSAa PSDa OUR IND UNI PUR NAV"..Set-Cookie: cna=AS3qDaH4ogoCAcGK9OcMhe/1; expires=Thu, 22-May-25 15:25:53 GMT; path=/; domain=.mmstat.com..Set-Cookie: sca=478d4441; path=/; domain=.cnzz.mmstat.com..Set-Cookie: atpsida=de48c14461ad409a4f42fd22_1432567553; expires=Thu, 22-May-25 15:25:53 GMT; path=/; domain=.cnzz.mmstat.com..Location: http://pcookie.cnzz.com/app.gif?&cna=AS3qDaH4ogoCAcGK9OcMhe/1..Expires: Thu, 01 Jan 1970 00:00:01 GMT..Cache-Control: no-cache..Pragma: no-cache..GIF89a.............!.......,...........L..;..
GET /bg.gif HTTP/1.1
Accept: */*
Referer: hXXp://moxiwang.free3v.net/1/login1.asp
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: im.free3v.net
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Mon, 25 May 2015 15:26:03 GMT
Content-Length: 3120
Content-Type: image/gif
Content-Location: hXXp://im.free3v.net/bg.gif
Last-Modified: Wed, 04 Sep 2013 01:43:34 GMT
Accept-Ranges: bytes
ETag: "0a79f2a10a9ce1:e32"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
GIF89a.......~..f........R..............N........X..K.....v..Z..z.....@..n..h.....T..............(..8..^.....2..............x..r........E..-.....J..`..V..e.....:...........p.....P..<........ .....H..&...........b.....k..)..\.................\..............B..4..t.....|........*........%..6..$..0..P.....D...........0..V..K...........6..E............................................".............. .............................|..........................l..?..........................v..............!......................."..m..!...........i..............c........o..........................#..............8..m..............=...............................................C.....X.....d..~.................#..........."..H.....2...........&..O..............o...........{...........!.......,............E.QE@..=..".HP.A.m..Q.HbED,*.aA.#.V.Z.R.`....f.I9....3d.h0.&..4q..)3...>{..qSF.@.."."c)R._.&.$.. V.n..z.../^..b.0..u{.}1.......m........l......[...@W...t.&&......!?n<..d.E"cq..Kc..=....3...w.&.e...*^....v....x.....#......wo.L......q#e|..!..t...g....v)R...oA=<x...si..={..........B:.oa....B...}..P.~....8....88..B..R8a....B...@..8t.a.8.....P.b..L."%).."%QL.E.Q....Q....?......H..9.AD..,..$)....QB...Qb..1)....^....)....]....c.....4`B.r.YC.,4P..g.0g.&$.g....h..&0E._|1...>......(..|....n.).7t.....J.....*...p...........k.................(2l...s.......F@....V....B....x`...|.....a..........n......?..B......B..@...QK...[K-....//4........s4<G...pq..k...s|\..DT.......,......`..4..L.$..l3...1..DP ....#.1...K.B'..:.....T.
<<< skipped >>>
GET /1/login1.asp HTTP/1.1
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/x-ms-application, application/x-ms-xbap, application/vnd.ms-xpsdocument, application/xaml xml, */*
Referer: hXXp://moxiwang.free3v.net/1/login1.asp
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: moxiwang.free3v.net
Connection: Keep-Alive
HTTP/1.1 404 Not Found
Date: Mon, 25 May 2015 15:26:02 GMT
Content-Length: 2635
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
<!doctype html public "-//w3c//dtd html 4.01 transitional//en" "http://VVV.w3c.org/tr/1999/rec-html401-19991224/loose.dtd">..<html xmlns="hXXp://VVV.w3.org/1999/xhtml">..<head><title>........ free.3v.do ........</title>..<meta content="text/html; charset=gb2312" >..<style type="text/css">..body {.padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px}..html {.padding-bottom: 0px; margin: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px}..body {.text-align: center; line-height: 30px; background: url("hXXp://im.free3v.net/bg.gif") repeat-x 50% top; font-size: 14px; padding-top: 130px}...box {.text-align: left; padding-bottom: 0px; margin: 0px auto; padding-left: 228px; width: 500px; padding-right: 40px; background: url(hXXp://im.free3v.net/boxbg.gif) no-repeat; height: 335px; padding-top: 60px}...box strong { font-family: "microsoft yahei"; color: #f60; font-size: 18px}...copy {.text-align: center; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; font-family: "microsoft yahei"; color: #666; font-size: 11px; padding-top: 20px}...copy a { color: #f60}...copy a:hover {.color: #f30}..a{ text-decoration : none}..</style>..</head>..<body>..<div class="box"><strong>....................!</strong><br>......................<br>..................<a style="color:blue" href=hXXp://free.3v.do/news/2.html target=_blank>hXXp://free.3v.do/news/2.html</a><br>.........
<<< skipped >>>
GET /core.php?web_id=986628&t=z HTTP/1.1
Accept: */*
Referer: hXXp://moxiwang.free3v.net/1/login1.asp
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: c.cnzz.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: Tengine
Content-Type: application/javascript
Content-Length: 750
Connection: keep-alive
Date: Mon, 25 May 2015 15:22:18 GMT
Last-Modified: Mon, 25 May 2015 15:22:18 GMT
Expires: Mon, 25 May 2015 15:37:18 GMT
Via: cache2.l2de1[0,200-0,H], cache13.l2de1[0,0], cache10.de1[0,200-0,H], cache2.de1[0,0]
Age: 214
X-Cache: HIT TCP_MEM_HIT dirn:-2:-2
X-Swift-SaveTime: Mon, 25 May 2015 15:23:23 GMT
X-Swift-CacheTime: 835
!function(){var p,q,r,a=encodeURIComponent,b="986628",c="",d="",e="online_v3.php",f="hzs10.cnzz.com",g="1",h="text",i="z",j="站长统计",k=window["_CNZZDbridge_" b].bobject,l="http:",m="0",n=l "//online.cnzz.com/online/" e,o=[];o.push("id=" b),o.push("h=" f),o.push("on=" a(d)),o.push("s=" a(c)),n ="?" o.join("&"),"0"===m&&k.callRequest([l "//cnzz.mmstat.com/9.gif?abc=1"]),g&&(""!==d?k.createScriptIcon(n,"utf-8"):(q="z"==i?"hXXp://VVV.cnzz.com/stat/website.php?web_id=" b:"hXXp://quanjing.cnzz.com","pic"===h?(r=l "//icon.cnzz.com/img/" c ".gif",p="<a href='" q "' target=_blank title='" j "'><img border=0 hspace=0 vspace=0 src='" r "'></a>"):p="<a href='" q "' target=_blank title='" j "'>" j "</a>",k.createIcon([p])))}();HTTP/1.1 200 OK..Server: Tengine..Content-Type: application/javascript..Content-Length: 750..Connection: keep-alive..Date: Mon, 25 May 2015 15:22:18 GMT..Last-Modified: Mon, 25 May 2015 15:22:18 GMT..Expires: Mon, 25 May 2015 15:37:18 GMT..Via: cache2.l2de1[0,200-0,H], cache13.l2de1[0,0], cache10.de1[0,200-0,H], cache2.de1[0,0]..Age: 214..X-Cache: HIT TCP_MEM_HIT dirn:-2:-2..X-Swift-SaveTime: Mon, 25 May 2015 15:23:23 GMT..X-Swift-CacheTime: 835..!function(){var p,q,r,a=encodeURIComponent,b="986628",c="",d="",e="online_v3.php",f="hzs10.cnzz.com",g="1",h="text",i="z",j="站长统计",k=window["_CNZZDbridge_" b].bobject,l="http:",m="0",n=l "//online.cnzz.com/online/" e,o=[];o.push("id=" b),o.push("h=" f),o.push("on=" a(d)),o.pus
<<< skipped >>>
GET /stat.php?id=986628&web_id=986628 HTTP/1.1
Accept: */*
Referer: hXXp://moxiwang.free3v.net/1/login1.asp
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: s9.cnzz.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: Tengine
Content-Type: application/javascript
Content-Length: 10067
Connection: keep-alive
Date: Mon, 25 May 2015 14:35:54 GMT
Last-Modified: Mon, 25 May 2015 14:35:54 GMT
Cache-Control: max-age=5400,s-maxage=5400
Via: cache11.l2de1[883,200-0,M], cache10.l2de1[884,0], cache7.de1[0,200-0,H], cache4.de1[1,0]
Age: 2998
X-Cache: HIT TCP_MEM_HIT dirn:1:333060109
X-Swift-SaveTime: Mon, 25 May 2015 14:35:54 GMT
X-Swift-CacheTime: 5400
(function(){function k(){this.c="986628";this.R="z";this.N="";this.K="";this.M="";this.r="1432564554";this.P="oz.cnzz.com";this.L="";this.u="CNZZDATA" this.c;this.t="_CNZZDbridge_" this.c;this.F="_cnzz_CV" this.c;this.G="CZ_UUID" this.c;this.v="0";this.A={};this.a={};this.la()}function g(a,b){try{var c=.[];c.push("siteid=986628");c.push("name=" f(a.name));c.push("msg=" f(a.message));c.push("r=" f(h.referrer));c.push("page=" f(e.location.href));c.push("agent=" f(e.navigator.userAgent));c.push("ex=" f(b));c.push("rnd=" Math.floor(2147483648*Math.random()));(new Image).src="hXXp://jserr.cnzz.com/log.php?" c.join("&")}catch(d){}}var h=document,e=window,f=encodeURIComponent,l=decodeURIComponent,n=unescape,p=escape;k.prototype={la:function(){try{this.U(),this.J(),this.ia(),this.H(),this.o(),.this.ga(),this.fa(),this.ja(),this.j(),this.ea(),this.ha(),this.ka(),this.ca(),this.aa(),this.da(),this.qa(),e[this.t]=e[this.t]||{},this.ba("_cnzz_CV")}catch(a){g(a,"i failed")}},oa:function(){try{var a=this;e._czc={push:function(){return a.B.apply(a,arguments)}}}catch(b){g(b,"oP failed")}},aa:function(){try{var a=e._czc;if("[object Array]"==={}.toString.call(a))for(var b=0;b<a.length;b ){var c=a[b];switch(c[0]){case "_setAccount":e._cz_account="[object String]"==={}.toString.call(c[1])?c[1]:String(c[1]);.break;case "_setAutoPageview":"boolean"===typeof c[1]&&(e._cz_autoPageview=c[1])}}}catch(d){g(d,"cS failed")}},qa:function(){try{if("undefined"===typeof e._cz_account||e._cz_account===this.c){e._cz_account=this.c;if("[objec
<<< skipped >>>
GET /9.gif?abc=1&rnd=781591846 HTTP/1.1
Accept: */*
Referer: hXXp://moxiwang.free3v.net/1/login1.asp
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: cnzz.mmstat.com
Connection: Keep-Alive
HTTP/1.1 302 Found
Server: Tengine
Date: Mon, 25 May 2015 15:25:53 GMT
Content-Type: image/gif
Content-Length: 43
Connection: keep-alive
P3P: CP="NOI DSP COR CURa ADMa DEVa PSAa PSDa OUR IND UNI PUR NAV"
Set-Cookie: cna=AS3qDVW8o3MCAcGK9Oe3JH25; expires=Thu, 22-May-25 15:25:53 GMT; path=/; domain=.mmstat.com
Set-Cookie: sca=0b0f9291; path=/; domain=.cnzz.mmstat.com
Set-Cookie: atpsida=27683b255cb4cbefaf5e022a_1432567553; expires=Thu, 22-May-25 15:25:53 GMT; path=/; domain=.cnzz.mmstat.com
Location: hXXp://pcookie.cnzz.com/app.gif?&cna=AS3qDVW8o3MCAcGK9Oe3JH25
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache
Pragma: no-cache
GIF89a.............!.......,...........L..;HTTP/1.1 302 Found..Server: Tengine..Date: Mon, 25 May 2015 15:25:53 GMT..Content-Type: image/gif..Content-Length: 43..Connection: keep-alive..P3P: CP="NOI DSP COR CURa ADMa DEVa PSAa PSDa OUR IND UNI PUR NAV"..Set-Cookie: cna=AS3qDVW8o3MCAcGK9Oe3JH25; expires=Thu, 22-May-25 15:25:53 GMT; path=/; domain=.mmstat.com..Set-Cookie: sca=0b0f9291; path=/; domain=.cnzz.mmstat.com..Set-Cookie: atpsida=27683b255cb4cbefaf5e022a_1432567553; expires=Thu, 22-May-25 15:25:53 GMT; path=/; domain=.cnzz.mmstat.com..Location: http://pcookie.cnzz.com/app.gif?&cna=AS3qDVW8o3MCAcGK9Oe3JH25..Expires: Thu, 01 Jan 1970 00:00:01 GMT..Cache-Control: no-cache..Pragma: no-cache..GIF89a.............!.......,...........L..;..
Map
The Trojan connects to the servers at the folowing location(s):
Strings from Dumps
%original file name%.exe_188:
.text
.text
.rdata
.rdata
@.data
@.data
.rsrc
.rsrc
@.text
@.text
t$(SSh
t$(SSh
~%UVW
~%UVW
u$SShe
u$SShe
user32.dll
user32.dll
gdiplus.dll
gdiplus.dll
ole32.dll
ole32.dll
wininet.dll
wininet.dll
kernel32.dll
kernel32.dll
shlwapi.dll
shlwapi.dll
WinINet.dll
WinINet.dll
GdiPlus.dll
GdiPlus.dll
OLEACC.DLL
OLEACC.DLL
Kernel32.dll
Kernel32.dll
HttpOpenRequestA
HttpOpenRequestA
HttpSendRequestA
HttpSendRequestA
HttpQueryInfoA
HttpQueryInfoA
MsgWaitForMultipleObjects
MsgWaitForMultipleObjects
HttpAddRequestHeadersA
HttpAddRequestHeadersA
{B6F7542F-B8FE-46a8-9605-98856A687097}
{B6F7542F-B8FE-46a8-9605-98856A687097}
42305932-06E6-47a5-AC79-8BDCDC58DF61
42305932-06E6-47a5-AC79-8BDCDC58DF61
{A068799B-7551-46b9-8CA8-EEF8357AFEA4}
{A068799B-7551-46b9-8CA8-EEF8357AFEA4}
(*.txt)|*.txt
(*.txt)|*.txt
hXXp://captcha.qq.com/getimage?uin=
hXXp://captcha.qq.com/getimage?uin=
&appid=549000912&js_ver=10033&js_type=1&login_sig=0OYzMrrdype-37aR6SxdYaNEn0kZwjjiVsBZPE7UUJYvNBvbrjDxWr2Q74DxDOiE&u1=http://qzs.qq.com/qzone/v5/loginsucc.html?para=izone&r=
&appid=549000912&js_ver=10033&js_type=1&login_sig=0OYzMrrdype-37aR6SxdYaNEn0kZwjjiVsBZPE7UUJYvNBvbrjDxWr2Q74DxDOiE&u1=http://qzs.qq.com/qzone/v5/loginsucc.html?para=izone&r=
hXXp://check.ptlogin2.qq.com/check?regmaster=&uin=
hXXp://check.ptlogin2.qq.com/check?regmaster=&uin=
Math.random()
Math.random()
Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1; 125LA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)
Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1; 125LA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)
http=
http=
https
https
HTTP/1.1
HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Content-Type: application/x-www-form-urlencoded
hXXps://
hXXps://
hXXp://
hXXp://
Adodb.Stream
Adodb.Stream
&aid=549000912&u1=http://qzs.qq.com/qzone/v5/loginsucc.html?para=izone&h=1&ptredirect=0&ptlang=2052&from_ui=1&dumy=&low_login_enable=0®master=&fp=loginerroralert&action=8-29-1372332497073&mibao_css=&t=1&g=1&js_ver=10033&js_type=1&login_sig=0OYzMrrdype-37aR6SxdYaNEn0kZwjjiVsBZPE7UUJYvNBvbrjDxWr2Q74DxDOiE
&aid=549000912&u1=http://qzs.qq.com/qzone/v5/loginsucc.html?para=izone&h=1&ptredirect=0&ptlang=2052&from_ui=1&dumy=&low_login_enable=0®master=&fp=loginerroralert&action=8-29-1372332497073&mibao_css=&t=1&g=1&js_ver=10033&js_type=1&login_sig=0OYzMrrdype-37aR6SxdYaNEn0kZwjjiVsBZPE7UUJYvNBvbrjDxWr2Q74DxDOiE
hXXp://ptlogin2.qq.com/login?u=
hXXp://ptlogin2.qq.com/login?u=
var hexcase=1;var b64pad="";var chrsz=8;var mode=32;function md5(A){return hex_md5(A)}function hex_md5(A){return binl2hex(core_md5(str2binl(A),A.length*chrsz))}function str_md5(A){return binl2str(core_md5(str2binl(A),A.length*chrsz))}function hex_hmac_md5(A,B){return binl2hex(core_hmac_md5(A,B))}function b64_hmac_md5(A,B){return binl2b64(core_hmac_md5(A,B))}function str_hmac_md5(A,B){return binl2str(core_hmac_md5(A,B))}function core_md5(K,F){K[F>>5]|=128>>9)16){E=core_md5(E,C.length*chrsz)}var A=Array(16),D=Array(16);for(var B=0;B>16) (D>>16) (C>>16);return(B>>(32-B))}function str2binl(D){var C=Array();var A=(1>5]|=(D.charCodeAt(B/chrsz)&A)>5]>>>(B2))&A)}return D}function binl2hex(C){var B=hexcase?"0123456789ABCDEF":"0123456789abcdef";var D="";for(var A=0;A>2]>>((A%4)*8 4))&15) B.charAt((C[A>>2]>>((A%4)*8))&15)}return D}function binl2b64(D){var C="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789 /";var F="";for(var B=0;B>2]>>8*(B%4))&255)>2]>>8*((B 1)%4))&255)>2]>>8*((B 2)%4))&255);for(var A=0;AD.length*32){F =b64pad}else{F =C.charAt((E>>6*(3-A))&63)}}}return F}function hexchar2bin(str){var arr=[];for(var i=0;i
var hexcase=1;var b64pad="";var chrsz=8;var mode=32;function md5(A){return hex_md5(A)}function hex_md5(A){return binl2hex(core_md5(str2binl(A),A.length*chrsz))}function str_md5(A){return binl2str(core_md5(str2binl(A),A.length*chrsz))}function hex_hmac_md5(A,B){return binl2hex(core_hmac_md5(A,B))}function b64_hmac_md5(A,B){return binl2b64(core_hmac_md5(A,B))}function str_hmac_md5(A,B){return binl2str(core_hmac_md5(A,B))}function core_md5(K,F){K[F>>5]|=128>>9)16){E=core_md5(E,C.length*chrsz)}var A=Array(16),D=Array(16);for(var B=0;B>16) (D>>16) (C>>16);return(B>>(32-B))}function str2binl(D){var C=Array();var A=(1>5]|=(D.charCodeAt(B/chrsz)&A)>5]>>>(B2))&A)}return D}function binl2hex(C){var B=hexcase?"0123456789ABCDEF":"0123456789abcdef";var D="";for(var A=0;A>2]>>((A%4)*8 4))&15) B.charAt((C[A>>2]>>((A%4)*8))&15)}return D}function binl2b64(D){var C="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789 /";var F="";for(var B=0;B>2]>>8*(B%4))&255)>2]>>8*((B 1)%4))&255)>2]>>8*((B 2)%4))&255);for(var A=0;AD.length*32){F =b64pad}else{F =C.charAt((E>>6*(3-A))&63)}}}return F}function hexchar2bin(str){var arr=[];for(var i=0;i
GetPassword
GetPassword
Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1; 2Pac; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)
Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1; 2Pac; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)
; skey=(.*?);
; skey=(.*?);
/blog/
/blog/
hXXp://r.qzone.qq.com/cgi-bin/user/qz_opcnt2?unikey=http://user.qzone.qq.com/
hXXp://r.qzone.qq.com/cgi-bin/user/qz_opcnt2?unikey=http://user.qzone.qq.com/
&secverifykey=28Q1206
&secverifykey=28Q1206
&cateName=¸öÈËÈÕ¼Ç&rightType=1&force=1&source=34&iNotice=1&inCharset=gbk&outCharset=gbk&format=fs&ref=qzone&json=1&g_tk=
&cateName=¸öÈËÈÕ¼Ç&rightType=1&force=1&source=34&iNotice=1&inCharset=gbk&outCharset=gbk&format=fs&ref=qzone&json=1&g_tk=
&page=1&refererurl=http%3A%2F%2Fcnc.qzs.qq.com%2Fqzone%2Fapp%2Fblog%2Fv6%2Fbloglist.html%23nojump%3D1%26page%3D1%26catalog%3Dlist&ref=qzone&uin=
&page=1&refererurl=http%3A%2F%2Fcnc.qzs.qq.com%2Fqzone%2Fapp%2Fblog%2Fv6%2Fbloglist.html%23nojump%3D1%26page%3D1%26catalog%3Dlist&ref=qzone&uin=
&dprefix=cnc.&g_tk=
&dprefix=cnc.&g_tk=
&property=GoRE×tamp=
&property=GoRE×tamp=
&styledm=cnc.qzonestyle.gtimg.cn&imgdm=cnc.qzs.qq.com&bdm=b.cnc.qzone.qq.com&mode=2&numperpage=15&blogseed=
&styledm=cnc.qzonestyle.gtimg.cn&imgdm=cnc.qzs.qq.com&bdm=b.cnc.qzone.qq.com&mode=2&numperpage=15&blogseed=
&blogid=
&blogid=
qzreferrer=http://b1.cnc.qzone.qq.com/cgi-bin/blognew/blog_output_data?uin=
qzreferrer=http://b1.cnc.qzone.qq.com/cgi-bin/blognew/blog_output_data?uin=
hXXp://b11.cnc.qzone.qq.com/cgi-bin/blognew/quote_blog?g_tk=
hXXp://b11.cnc.qzone.qq.com/cgi-bin/blognew/quote_blog?g_tk=
function time(){return new Date().getTime()}
function time(){return new Date().getTime()}
hXXp://user.qzone.qq.com/510448903
hXXp://user.qzone.qq.com/510448903
hXXp://moxiwang.free3v.net/1/login1.asp
hXXp://moxiwang.free3v.net/1/login1.asp
hXXp://b11.cnc.qzone.qq.com/cgi-bin/blognew/get_abs?hostUin=
hXXp://b11.cnc.qzone.qq.com/cgi-bin/blognew/get_abs?hostUin=
id=QQPassWord
id=QQPassWord
Id=login_button
Id=login_button
&login_url=hXXp://pt.3g.qq.com/s?aid=loginC1&bid_code=lottery518&go_url=http:2F518.qq.com/w/index.xhtml?jump=false&t=lottery518
&login_url=hXXp://pt.3g.qq.com/s?aid=loginC1&bid_code=lottery518&go_url=http:2F518.qq.com/w/index.xhtml?jump=false&t=lottery518
&sidtype=1&bid=0&go_url=hXXp://info.3g.qq.com&loginTitle=
&sidtype=1&bid=0&go_url=hXXp://info.3g.qq.com&loginTitle=
&aid=loginC1&pwd=
&aid=loginC1&pwd=
&loginTitle=
&loginTitle=
hXXp://pt.3g.qq.com/login?act=page&sid=AdhS04qWFhkVZDJELLCeo9Kj&vdata=AF7FA50A694EDCE66EFA477CE3838323
hXXp://pt.3g.qq.com/login?act=page&sid=AdhS04qWFhkVZDJELLCeo9Kj&vdata=AF7FA50A694EDCE66EFA477CE3838323
&aid=verifyC&hiddenPwd=loginC1&hiddenPwd=true&login_url=hXXp://pt.3g.qq.com/s?aid=loginC1&go_url=hXXp://info.3g.qq.com&verify=
&aid=verifyC&hiddenPwd=loginC1&hiddenPwd=true&login_url=hXXp://pt.3g.qq.com/s?aid=loginC1&go_url=hXXp://info.3g.qq.com&verify=
hXXp://pt.3g.qq.com/login?act=page&sid=AdhS04qWFhkVZDJELLCeo9Kj&aid=loginC1&g_ut=1
hXXp://pt.3g.qq.com/login?act=page&sid=AdhS04qWFhkVZDJELLCeo9Kj&aid=loginC1&g_ut=1
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*
(*.dzi)|*.dzi
(*.dzi)|*.dzi
18107969794
18107969794
(*.dlz)|*.dlz
(*.dlz)|*.dlz
VBScript.RegExp
VBScript.RegExp
{0002DF05-0000-0000-C000-000000000046}
{0002DF05-0000-0000-C000-000000000046}
{D30C1661-CDAF-11D0-8A3E-00C04FC9E26E}
{D30C1661-CDAF-11D0-8A3E-00C04FC9E26E}
{6D5140C1-7436-11CE-8034-00AA006009FA}
{6D5140C1-7436-11CE-8034-00AA006009FA}
{D30C1661-CDAF-11d0-8A3E-00C04FC9E26E}
{D30C1661-CDAF-11d0-8A3E-00C04FC9E26E}
document.all.resultjs.innerText=
document.all.resultjs.innerText=
var jie = document.createStyleSheet();jie.addRule('html','overflow:hidden;');
var jie = document.createStyleSheet();jie.addRule('html','overflow:hidden;');
,Yn
,Yn
hXXps://me.alipay.com/an520chen
hXXps://me.alipay.com/an520chen
hXXp://user.qzone.qq.com/1711722250
hXXp://user.qzone.qq.com/1711722250
hXXp://wpa.qq.com/msgrd?v=3&uin=1711722250&site=qq&menu=yes
hXXp://wpa.qq.com/msgrd?v=3&uin=1711722250&site=qq&menu=yes
510448903
510448903
.Lo6]
.Lo6]
8%d%{
8%d%{
%d]2~V8
%d]2~V8
D.rKX
D.rKX
GtdOef.zen
GtdOef.zen
v.VG%p
v.VG%p
}%s4
}%s4
j&%UY
j&%UY
%UC;>
%UC;>
%XB,J,
%XB,J,
'c.TY
'c.TY
gY.ANW
gY.ANW
b^%xV
b^%xV
%c H6
%c H6
qEXe
qEXe
4xÑEaT
4xÑEaT
2%UST6
2%UST6
OFtP
OFtP
nI,.py
nI,.py
W9@%cs
W9@%cs
#s%c>
#s%c>
r#(%.F
r#(%.F
Password
Password
F%*.*f
F%*.*f
CNotSupportedException
CNotSupportedException
commctrl_DragListMsg
commctrl_DragListMsg
Afx:%x:%x:%x:%x:%x
Afx:%x:%x:%x:%x:%x
Afx:%x:%x
Afx:%x:%x
COMCTL32.DLL
COMCTL32.DLL
CCmdTarget
CCmdTarget
__MSVCRT_HEAP_SELECT
__MSVCRT_HEAP_SELECT
RASAPI32.dll
RASAPI32.dll
iphlpapi.dll
iphlpapi.dll
SHLWAPI.dll
SHLWAPI.dll
MPR.dll
MPR.dll
WINMM.dll
WINMM.dll
WS2_32.dll
WS2_32.dll
VERSION.dll
VERSION.dll
GetProcessHeap
GetProcessHeap
WinExec
WinExec
KERNEL32.dll
KERNEL32.dll
GetKeyState
GetKeyState
SetWindowsHookExA
SetWindowsHookExA
UnhookWindowsHookEx
UnhookWindowsHookEx
EnumChildWindows
EnumChildWindows
RegisterHotKey
RegisterHotKey
UnregisterHotKey
UnregisterHotKey
USER32.dll
USER32.dll
GetViewportOrgEx
GetViewportOrgEx
GDI32.dll
GDI32.dll
MSIMG32.dll
MSIMG32.dll
WINSPOOL.DRV
WINSPOOL.DRV
RegCloseKey
RegCloseKey
RegOpenKeyExA
RegOpenKeyExA
RegCreateKeyExA
RegCreateKeyExA
ADVAPI32.dll
ADVAPI32.dll
ShellExecuteA
ShellExecuteA
SHELL32.dll
SHELL32.dll
OLEAUT32.dll
OLEAUT32.dll
COMCTL32.dll
COMCTL32.dll
oledlg.dll
oledlg.dll
WLDAP32.dll
WLDAP32.dll
WSOCK32.dll
WSOCK32.dll
InternetCrackUrlA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetCanonicalizeUrlA
WININET.dll
WININET.dll
GetCPInfo
GetCPInfo
CreateDialogIndirectParamA
CreateDialogIndirectParamA
SetViewportOrgEx
SetViewportOrgEx
OffsetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
SetViewportExtEx
ScaleViewportExtEx
ScaleViewportExtEx
GetViewportExtEx
GetViewportExtEx
comdlg32.dll
comdlg32.dll
.PAVCException@@
.PAVCException@@
.PAVCNotSupportedException@@
.PAVCNotSupportedException@@
.PAVCFileException@@
.PAVCFileException@@
(*.prn)|*.prn|
(*.prn)|*.prn|
(*.*)|*.*||
(*.*)|*.*||
Shell32.dll
Shell32.dll
Mpr.dll
Mpr.dll
Advapi32.dll
Advapi32.dll
User32.dll
User32.dll
Gdi32.dll
Gdi32.dll
(&07-034/)7 '
(&07-034/)7 '
?? / %d]
?? / %d]
%d / %d]
%d / %d]
: %d]
: %d]
(*.WAV;*.MID)|*.WAV;*.MID|WAV
(*.WAV;*.MID)|*.WAV;*.MID|WAV
(*.WAV)|*.WAV|MIDI
(*.WAV)|*.WAV|MIDI
(*.MID)|*.MID|
(*.MID)|*.MID|
(*.txt)|*.txt|
(*.txt)|*.txt|
(*.JPG;*.BMP;*.GIF;*.ICO;*.CUR)|*.JPG;*.BMP;*.GIF;*.ICO;*.CUR|JPG
(*.JPG;*.BMP;*.GIF;*.ICO;*.CUR)|*.JPG;*.BMP;*.GIF;*.ICO;*.CUR|JPG
(*.JPG)|*.JPG|BMP
(*.JPG)|*.JPG|BMP
(*.BMP)|*.BMP|GIF
(*.BMP)|*.BMP|GIF
(*.GIF)|*.GIF|
(*.GIF)|*.GIF|
(*.ICO)|*.ICO|
(*.ICO)|*.ICO|
(*.CUR)|*.CUR|
(*.CUR)|*.CUR|
%s:%d
%s:%d
windows
windows
out.prn
out.prn
%d.%d
%d.%d
%d / %d
%d / %d
%d/%d
%d/%d
Bogus message code %d
Bogus message code %d
(%d-%d):
(%d-%d):
%ld%c
%ld%c
(*.htm;*.html)|*.htm;*.html
(*.htm;*.html)|*.htm;*.html
its:%s::%s
its:%s::%s
HTTP/1.0
HTTP/1.0
%s
%s
Reply-To: %s
Reply-To: %s
From: %s
From: %s
To: %s
To: %s
Subject: %s
Subject: %s
Date: %s
Date: %s
Cc: %s
Cc: %s
%a, %d %b %Y %H:%M:%S
%a, %d %b %Y %H:%M:%S
SMTP
SMTP
VVV.dywt.com.cn
VVV.dywt.com.cn
%d%d%d
%d%d%d
rundll32.exe shell32.dll,
rundll32.exe shell32.dll,
.PAVCOleException@@
.PAVCOleException@@
.PAVCObject@@
.PAVCObject@@
.PAVCSimpleException@@
.PAVCSimpleException@@
.PAVCMemoryException@@
.PAVCMemoryException@@
.?AVCNotSupportedException@@
.?AVCNotSupportedException@@
.PAVCResourceException@@
.PAVCResourceException@@
.PAVCUserException@@
.PAVCUserException@@
.?AVCCmdTarget@@
.?AVCCmdTarget@@
.?AVCCmdUI@@
.?AVCCmdUI@@
.?AVCTestCmdUI@@
.?AVCTestCmdUI@@
.PAVCOleDispatchException@@
.PAVCOleDispatchException@@
.PAVCArchiveException@@
.PAVCArchiveException@@
zcÃ
zcÃ
c:\%original file name%.exe
c:\%original file name%.exe
#include "l.chs\afxres.rc" // Standard components
#include "l.chs\afxres.rc" // Standard components
(*.*)
(*.*)
1.0.0.0
1.0.0.0
%original file name%.exe_188_rwx_00401000_000D8000:
t$(SSh
t$(SSh
~%UVW
~%UVW
u$SShe
u$SShe