GenericEmailWorm.YR, TrojanFlyStudio.YR (Lavasoft MAS)Behaviour: Trojan, Worm, EmailWorm
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Summary
MD5: 9d47568b311bab588769ba0807e9bfd2
SHA1: a18ae0de689207fdfeaa6cb76cc3804688a9858b
SHA256: e1c802419d8ddde3a881e4564e6118b05dc87259f54fdbb76f1f01f34b22e121
SSDeep: 196608:0pTYySW79JWxISFCdIac4njpZzN7E5Ih3fVc6mBMcKeDJb23MfBRrueCnz:0Snq9MdaIX4nh7E6h3tfcMcFDJb2wCzz
Size: 8428416 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2014-07-11 08:40:10
Analyzed on: WindowsXP SP3 32-bit
Summary: Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Dynamic Analysis
Payload
Behaviour | Description |
---|---|
EmailWorm | Worm can send e-mails. |
Process activity
The Trojan creates the following process(es):No processes have been created.The Trojan injects its code into the following process(es):
%original file name%.exe:1044
Mutexes
The following mutexes were created/opened:No objects were found.
File activity
The process %original file name%.exe:1044 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÓÎ÷ÂÛ̳.µãȼüƬ.tmp (19 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÃÂÂ˳öÓÎ÷.Õý³£Ã¼Ƭ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\TPHNX2CD\core[1].php (751 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÃÂÂÞ¸ÄÃÜÂë.µãȼüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WH6BWP6F\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥¹Ù·½Ö÷Ò³.µãȼüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥Ã½¨Õ˺Å.°´ÃÂÂÂüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\W1IFKDIZ\z_stat[1].php (1097 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÓÎ÷¹«¸æ.°´ÃÂÂÂüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\5PN7CW2U\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÓÎ÷¹«¸æ.µãȼüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥¹Ù·½Ö÷Ò³.Õý³£Ã¼Ƭ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\W1IFKDIZ\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥µÇ½ÓÎ÷.µãȼüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥µÇ½ÓÎ÷.°´ÃÂÂÂüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÃÂÂà¹ØÃÂÂÂÃâ€ÂØ.°´ÃÂÂÂüƬ.tmp (20 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥¿Ã·þÖÃÂÂÃÂÂÄ.°´ÃÂÂÂüƬ.tmp (19 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@jy.38kc[1].txt (208 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥Ãâ€â€Ãƒâ€šÃ‚°Ã‚±Â¸Â½Ã©Ã‰Ãœ.°´ÃÂÂÂüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥¿Ã·þÖÃÂÂÃÂÂÄ.µãȼüƬ.tmp (19 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÓÎ÷¹«¸æ.Õý³£Ã¼Ƭ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÕÒ»ØÃÜÂë.µãȼüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÓÎ÷ÂÛ̳.Õý³£Ã¼Ƭ.tmp (19 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥Ãâ€â€Ãƒâ€šÃ‚°Ã‚±Â¸Â½Ã©Ã‰Ãœ.Õý³£Ã¼Ƭ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WH6BWP6F\stat[1].gif (43 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\9d47568b311bab588769ba0807e9bfd2.ini (381 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (1552 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥¿Ã·þÖÃÂÂÃÂÂÄ.Õý³£Ã¼Ƭ.tmp (19 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@mmstat[1].txt (170 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÃÂÂ˳öÓÎ÷.°´ÃÂÂÂüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥µÇ½ÓÎ÷.Õý³£Ã¼Ƭ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÃÂÂæ¼ÒÕÕÆ¬.°´ÃÂÂÂüƬ.tmp (19 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÃÂÂ˳öÓÎ÷.µãȼüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\TPHNX2CD\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥¹Ø±Õ.µãȼüƬ.tmp (824 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\5PN7CW2U\jy.38kc[1].htm (359 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÕÒ»ØÃÜÂë.°´ÃÂÂÂüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥Ãâ€â€Ãƒâ€šÃ‚°Ã‚±Â¸Â½Ã©Ã‰Ãœ.µãȼüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥Ã½¨Õ˺Å.µãȼüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥Ãâ€â€ÃƒÆ’®Ã¡»¯.Õý³£Ã¼Ƭ.tmp (14 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÓÎ÷ÂÛ̳.°´ÃÂÂÂüƬ.tmp (19 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@cnzz.mmstat[1].txt (205 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥Ã½¨Õ˺Å.Õý³£Ã¼Ƭ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÃÂÂÞ¸ÄÃÜÂë.Õý³£Ã¼Ƭ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥Ãâ€â€ÃƒÆ’®Ã¡»¯.µãȼüƬ.tmp (824 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÕÒ»ØÃÜÂë.Õý³£Ã¼Ƭ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÃÂÂà¹ØÃÂÂÂÃâ€ÂØ.Õý³£Ã¼Ƭ.tmp (19 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\µÃâ€â€ÃƒÆ’¼.tmp (189 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÃÂÂà¹ØÃÂÂÂÃâ€ÂØ.µãȼüƬ.tmp (19 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@cnzz[1].txt (165 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\DLQ.ini (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥¹Ù·½Ö÷Ò³.°´ÃÂÂÂüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\pack.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÃÂÂæ¼ÒÕÕÆ¬.Õý³£Ã¼Ƭ.tmp (19 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÃÂÂÞ¸ÄÃÜÂë.°´ÃÂÂÂüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÃÂÂæ¼ÒÕÕÆ¬.µãȼüƬ.tmp (19 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥¹Ø±Õ.Õý³£Ã¼Ƭ.tmp (14 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\pack.tmp (0 bytes)
Registry activity
The process %original file name%.exe:1044 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache]
"@xpsp3res.dll,-20001" = "Diagnose Connection Problems..."
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1A 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "CF 71 1B AF FF CC 36 F7 C8 A1 71 C0 DA 9E 20 FC"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
Dropped PE files
There are no dropped PE files.
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
Removals
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):No processes have been created.
- Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÓÎ÷ÂÛ̳.µãȼüƬ.tmp (19 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÃÂÂ˳öÓÎ÷.Õý³£Ã¼Ƭ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\TPHNX2CD\core[1].php (751 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÃÂÂÞ¸ÄÃÜÂë.µãȼüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WH6BWP6F\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥¹Ù·½Ö÷Ò³.µãȼüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥Ã½¨Õ˺Å.°´ÃÂÂÂüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\W1IFKDIZ\z_stat[1].php (1097 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÓÎ÷¹«¸æ.°´ÃÂÂÂüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\5PN7CW2U\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÓÎ÷¹«¸æ.µãȼüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥¹Ù·½Ö÷Ò³.Õý³£Ã¼Ƭ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\W1IFKDIZ\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥µÇ½ÓÎ÷.µãȼüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥µÇ½ÓÎ÷.°´ÃÂÂÂüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÃÂÂà¹ØÃÂÂÂÃâ€ÂØ.°´ÃÂÂÂüƬ.tmp (20 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥¿Ã·þÖÃÂÂÃÂÂÄ.°´ÃÂÂÂüƬ.tmp (19 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@jy.38kc[1].txt (208 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥Ãâ€â€Ãƒâ€šÃ‚°Ã‚±Â¸Â½Ã©Ã‰Ãœ.°´ÃÂÂÂüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥¿Ã·þÖÃÂÂÃÂÂÄ.µãȼüƬ.tmp (19 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÓÎ÷¹«¸æ.Õý³£Ã¼Ƭ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÕÒ»ØÃÜÂë.µãȼüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÓÎ÷ÂÛ̳.Õý³£Ã¼Ƭ.tmp (19 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥Ãâ€â€Ãƒâ€šÃ‚°Ã‚±Â¸Â½Ã©Ã‰Ãœ.Õý³£Ã¼Ƭ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WH6BWP6F\stat[1].gif (43 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\9d47568b311bab588769ba0807e9bfd2.ini (381 bytes)
%Documents and Settings%\%current user%\Cookies\index.dat (1552 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥¿Ã·þÖÃÂÂÃÂÂÄ.Õý³£Ã¼Ƭ.tmp (19 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@mmstat[1].txt (170 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÃÂÂ˳öÓÎ÷.°´ÃÂÂÂüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥µÇ½ÓÎ÷.Õý³£Ã¼Ƭ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÃÂÂæ¼ÒÕÕÆ¬.°´ÃÂÂÂüƬ.tmp (19 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÃÂÂ˳öÓÎ÷.µãȼüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\TPHNX2CD\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥¹Ø±Õ.µãȼüƬ.tmp (824 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\5PN7CW2U\jy.38kc[1].htm (359 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÕÒ»ØÃÜÂë.°´ÃÂÂÂüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥Ãâ€â€Ãƒâ€šÃ‚°Ã‚±Â¸Â½Ã©Ã‰Ãœ.µãȼüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥Ã½¨Õ˺Å.µãȼüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥Ãâ€â€ÃƒÆ’®Ã¡»¯.Õý³£Ã¼Ƭ.tmp (14 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÓÎ÷ÂÛ̳.°´ÃÂÂÂüƬ.tmp (19 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@cnzz.mmstat[1].txt (205 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥Ã½¨Õ˺Å.Õý³£Ã¼Ƭ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÃÂÂÞ¸ÄÃÜÂë.Õý³£Ã¼Ƭ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥Ãâ€â€ÃƒÆ’®Ã¡»¯.µãȼüƬ.tmp (824 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÕÒ»ØÃÜÂë.Õý³£Ã¼Ƭ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÃÂÂà¹ØÃÂÂÂÃâ€ÂØ.Õý³£Ã¼Ƭ.tmp (19 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\µÃâ€â€ÃƒÆ’¼.tmp (189 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÃÂÂà¹ØÃÂÂÂÃâ€ÂØ.µãȼüƬ.tmp (19 bytes)
%Documents and Settings%\%current user%\Cookies\Current_User@cnzz[1].txt (165 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\DLQ.ini (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥¹Ù·½Ö÷Ò³.°´ÃÂÂÂüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\pack.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÃÂÂæ¼ÒÕÕÆ¬.Õý³£Ã¼Ƭ.tmp (19 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÃÂÂÞ¸ÄÃÜÂë.°´ÃÂÂÂüƬ.tmp (2 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥ÃÂÂæ¼ÒÕÕÆ¬.µãȼüƬ.tmp (19 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\9d47568b311bab588769ba0807e9bfd2\°´Å¥¹Ø±Õ.Õý³£Ã¼Ƭ.tmp (14 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
Static Analysis
VersionInfo
No information is available.
No information is available.
PE Sections
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
---|---|---|---|---|---|
UPX0 | 4096 | 3235840 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
UPX1 | 3239936 | 5455872 | 5452288 | 5.39586 | 8588bb018963a8f9f6d9153d51ae9425 |
.rsrc | 8695808 | 24576 | 21504 | 3.14518 | ff8b158e71331a921912a92a2e7dbd8d |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Network Activity
URLs
URL | IP |
---|---|
hxxp://jy.38kc.com/ | 59.63.178.149 |
hxxp://all.cnzz.com.danuoyi.tbcache.com/z_stat.php?id=1253004038 | |
hxxp://z.gds.cnzz.com/stat.htm?id=1253004038&r=&lg=en-us&ntime=none&cnzz_eid=1959928650-1424968782-&showp=1276x846&t=&h=1&rnd=535817321 | |
hxxp://all.cnzz.com.danuoyi.tbcache.com/core.php?web_id=1253004038&t=z | |
hxxp://cnzz.mmstat.com/9.gif?abc=1&rnd=1886823750 | 42.120.219.171 |
hxxp://s95.cnzz.com/z_stat.php?id=1253004038 | 1.99.192.16 |
hxxp://c.cnzz.com/core.php?web_id=1253004038&t=z | 195.27.31.246 |
hxxp://z4.cnzz.com/stat.htm?id=1253004038&r=&lg=en-us&ntime=none&cnzz_eid=1959928650-1424968782-&showp=1276x846&t=&h=1&rnd=535817321 | 1.122.192.15 |
pcookie.cnzz.com | 42.120.219.171 |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET / HTTP/1.1
Accept: */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: jy.38kc.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Content-Length: 359
Content-Type: text/html
Content-Location: hXXp://jy.38kc.com/index.htm
Last-Modified: Wed, 19 Nov 2014 15:31:33 GMT
Accept-Ranges: bytes
ETag: "f81f32e6d4d01:c00"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 26 Feb 2015 16:39:17 GMT
<html>..<body>..<script type="text/javascript">var cnzz_protocol = (("https:" == document.location.protocol) ? " hXXps://" : " hXXp://");document.write(unescape(""));</script>..<br>..</html>HTTP/1.1 200 OK..Content-Length: 359..Content-Type: text/html..Content-Location: hXXp://jy.38kc.com/index.htm..Last-Modified: Wed, 19 Nov 2014 15:31:33 GMT..Accept-Ranges: bytes..ETag: "f81f32e6d4d01:c00"..Server: Microsoft-IIS/6.0..X-Powered-By: ASP.NET..Date: Thu, 26 Feb 2015 16:39:17 GMT..<html>..<body>..<script type="text/javascript">var cnzz_protocol = (("https:" == document.location.protocol) ? " hXXps://" : " hXXp://");document.write(unescape("%3C/span>"));</script>..<br>..</html>..
GET /9.gif?abc=1&rnd=1886823750 HTTP/1.1
Accept: */*
Referer: hXXp://jy.38kc.com/
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: cnzz.mmstat.com
Connection: Keep-Alive
HTTP/1.1 302 Found
Server: Tengine
Date: Thu, 26 Feb 2015 16:39:44 GMT
Content-Type: image/gif
Content-Length: 43
Connection: keep-alive
P3P: CP="NOI DSP COR CURa ADMa DEVa PSAa PSDa OUR IND UNI PUR NAV"
Set-Cookie: cna=UDp2DQ/YlxgCAcGK9Oe0QUOr; expires=Sun, 23-Feb-25 16:39:44 GMT; path=/; domain=.mmstat.com
Set-Cookie: sca=180594b3; path=/; domain=.cnzz.mmstat.com
Set-Cookie: atpsida=e16a4df096434d94a808eb5a_1424968784; expires=Sun, 23-Feb-25 16:39:44 GMT; path=/; domain=.cnzz.mmstat.com
Location: hXXp://pcookie.cnzz.com/app.gif?&cna=UDp2DQ/YlxgCAcGK9Oe0QUOr
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache
Pragma: no-cache
GIF89a.............!.......,...........L..;HTTP/1.1 302 Found..Server: Tengine..Date: Thu, 26 Feb 2015 16:39:44 GMT..Content-Type: image/gif..Content-Length: 43..Connection: keep-alive..P3P: CP="NOI DSP COR CURa ADMa DEVa PSAa PSDa OUR IND UNI PUR NAV"..Set-Cookie: cna=UDp2DQ/YlxgCAcGK9Oe0QUOr; expires=Sun, 23-Feb-25 16:39:44 GMT; path=/; domain=.mmstat.com..Set-Cookie: sca=180594b3; path=/; domain=.cnzz.mmstat.com..Set-Cookie: atpsida=e16a4df096434d94a808eb5a_1424968784; expires=Sun, 23-Feb-25 16:39:44 GMT; path=/; domain=.cnzz.mmsta..
GET /core.php?web_id=1253004038&t=z HTTP/1.1
Accept: */*
Referer: hXXp://jy.38kc.com/
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: c.cnzz.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: Tengine
Content-Type: application/javascript
Content-Length: 751
Connection: keep-alive
Date: Thu, 26 Feb 2015 16:39:43 GMT
Last-Modified: Thu, 26 Feb 2015 16:39:43 GMT
Expires: Thu, 26 Feb 2015 16:54:43 GMT
Via: cache40.l2de1[310,200-0,M], cache64.l2de1[311,0], cache4.de1[311,200-0,M], cache1.de1[311,0]
X-Cache: MISS TCP_REFRESH_MISS dirn:-2:-2
X-Swift-SaveTime: Thu, 26 Feb 2015 16:39:44 GMT
X-Swift-CacheTime: 899
!function(){var p,q,r,a=encodeURIComponent,b="1253004038",c="",d="",e="online_v3.php",f="z4.cnzz.com",g="1",h="text",i="z",j="站长统计",k=window["_CNZZDbridge_" b].bobject,l="http:",m="0",n=l "//online.cnzz.com/online/" e,o=[];o.push("id=" b),o.push("h=" f),o.push("on=" a(d)),o.push("s=" a(c)),n ="?" o.join("&"),"0"===m&&k.callRequest([l "//cnzz.mmstat.com/9.gif?abc=1"]),g&&(""!==d?k.createScriptIcon(n,"utf-8"):(q="z"==i?"hXXp://VVV.cnzz.com/stat/website.php?web_id=" b:"hXXp://quanjing.cnzz.com","pic"===h?(r=l "//icon.cnzz.com/img/" c ".gif",p="<a href='" q "' target=_blank title='" j "'><img border=0 hspace=0 vspace=0 src='" r "'></a>"):p="<a href='" q "' target=_blank title='" j "'>" j "</a>",k.createIcon([p])))}();HTTP/1.1 200 OK..Server: Tengine..Content-Type: application/javascript..Content-Length: 751..Connection: keep-alive..Date: Thu, 26 Feb 2015 16:39:43 GMT..Last-Modified: Thu, 26 Feb 2015 16:39:43 GMT..Expires: Thu, 26 Feb 2015 16:54:43 GMT..Via: cache40.l2de1[310,200-0,M], cache64.l2de1[311,0], cache4.de1[311,200-0,M], cache1.de1[311,0]..X-Cache: MISS TCP_REFRESH_MISS dirn:-2:-2..X-Swift-SaveTime: Thu, 26 Feb 2015 16:39:44 GMT..X-Swift-CacheTime: 899..!function(){var p,q,r,a=encodeURIComponent,b="1253004038",c="",d="",e="online_v3.php",f="z4.cnzz.com",g="1",h="text",i="z",j="站长统计",k=window["_CNZZDbridge_" b].bobject,l="http:",m="0",n=l "//online.cnzz.com/online/" e,o=[];o.push("id=" b),o.push("h=" f),o.push("on=" a(d))
<<< skipped >>>
GET /stat.htm?id=1253004038&r=&lg=en-us&ntime=none&cnzz_eid=1959928650-1424968782-&showp=1276x846&t=&h=1&rnd=535817321 HTTP/1.1
Accept: */*
Referer: hXXp://jy.38kc.com/
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: z4.cnzz.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: Tengine/1.4.1
Date: Thu, 26 Feb 2015 16:39:43 GMT
Content-Type: image/gif
Content-Length: 43
Last-Modified: Tue, 28 May 2013 02:57:17 GMT
Connection: close
Accept-Ranges: bytes
GIF89a.............!.......,...........D..;..
GET /z_stat.php?id=1253004038 HTTP/1.1
Accept: */*
Referer: hXXp://jy.38kc.com/
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: s95.cnzz.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: Tengine
Content-Type: application/javascript
Transfer-Encoding: chunked
Connection: keep-alive
Date: Thu, 26 Feb 2015 16:39:42 GMT
Last-Modified: Thu, 26 Feb 2015 16:39:42 GMT
Cache-Control: max-age=5400,s-maxage=5400
Via: cache49.l2de1[1320,200-0,M], cache30.l2de1[1320,0], cache2.de1[1320,200-0,M], cache4.de1[1321,0]
X-Cache: MISS TCP_REFRESH_MISS dirn:-2:-2
X-Swift-SaveTime: Thu, 26 Feb 2015 16:39:42 GMT
X-Swift-CacheTime: 5400
29b..(function(){function k(){this.c="1253004038";this.R="z";this.N="";this.K="";this.M="";this.r="1424968782";this.P="z4.cnzz.com";this.L="";this.u="CNZZDATA" this.c;this.t="_CNZZDbridge_" this.c;this.F="_cnzz_CV" this.c;this.G="CZ_UUID" this.c;this.v="0";this.A={};this.a={};this.la()}function g(a,b){try{var c=.[];c.push("siteid=1253004038");c.push("name=" f(a.name));c.push("msg=" f(a.message));c.push("r=" f(h.referrer));c.push("page=" f(e.location.href));c.push("agent=" f(e.navigator.userAgent));c.push("ex=" f(b));c.push("rnd=" Math.floor(2147483648*Math.random()));(new Image).src="hXXp://jserr.cnzz.com/log.php?" c.join("&")}catch(d){}}var h=document,e=window,f=..24c0..encodeURIComponent,l=decodeURIComponent,n=unescape,p=escape;k.prototype={la:function(){try{this.U(),this.J(),this.ia(),this.H(),this.o(),.this.ga(),this.fa(),this.ja(),this.j(),this.ea(),this.ha(),this.ka(),this.ca(),this.aa(),this.da(),this.qa(),e[this.t]=e[this.t]||{},this.ba("_cnzz_CV")}catch(a){g(a,"i failed")}},oa:function(){try{var a=this;e._czc={push:function(){return a.B.apply(a,arguments)}}}catch(b){g(b,"oP failed")}},aa:function(){try{var a=e._czc;if("[object Array]"==={}.toString.call(a))for(var b=0;b<a.length;b ){var c=a[b];switch(c[0]){case "_setAccount":e._cz_account="[object String]"==={}.toString.call(c[1])?c[1]:String(c[1]);.break;case "_setAutoPageview":"boolean"===typeof c[1]&&(e._cz_autoPageview=c[1])}}}catch(d){g(d,"cS failed")}},qa:function(){try{if("undefined"===typeof e._cz_account||e._cz_account===this.c){e._cz_acco
<<< skipped >>>
Map
The Trojan connects to the servers at the folowing location(s):
Strings from Dumps
%original file name%.exe_1044:
`.rsrc
`.rsrc
t$(SSh
t$(SSh
|$D.tm
|$D.tm
~%UVW
~%UVW
t.It It
t.It It
u$SShe
u$SShe
shell32.dll
shell32.dll
ntdll.dll
ntdll.dll
kernel32.dll
kernel32.dll
ole32.dll
ole32.dll
ws2_32.dll
ws2_32.dll
shlwapi.dll
shlwapi.dll
user32.dll
user32.dll
advapi32.dll
advapi32.dll
msimg32.dll
msimg32.dll
MsgWaitForMultipleObjects
MsgWaitForMultipleObjects
weburl
weburl
data\prguse.wis
data\prguse.wis
data\prguse2.wis
data\prguse2.wis
data\prguse3.wis
data\prguse3.wis
tedlq.dll
tedlq.dll
xlq.txt
xlq.txt
qwstart.exe
qwstart.exe
.text
.text
`.data
`.data
.rsrc
.rsrc
C:\DistributedAutoLink\Temp\CompileOutputDir\i386\snetcfg.pdb
C:\DistributedAutoLink\Temp\CompileOutputDir\i386\snetcfg.pdb
msvcrt.dll
msvcrt.dll
ADVAPI32.dll
ADVAPI32.dll
KERNEL32.dll
KERNEL32.dll
SETUPAPI.dll
SETUPAPI.dll
version="1.0.0.0"
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
publicKeyToken="6595b64144ccf1df"
hXXp://ocsp.verisign.com0
hXXp://ocsp.verisign.com0
"hXXp://crl.verisign.com/tss-ca.crl0
"hXXp://crl.verisign.com/tss-ca.crl0
Thawte Certification1
Thawte Certification1
0hXXp://crl.verisign.com/ThawteTimestampingCA.crl0
0hXXp://crl.verisign.com/ThawteTimestampingCA.crl0
.Class 3 Public Primary Certification Authority0
.Class 3 Public Primary Certification Authority0
2Terms of use at hXXps://VVV.verisign.com/rpa (c)09100.
2Terms of use at hXXps://VVV.verisign.com/rpa (c)09100.
hXXps://VVV.verisign.com/cps0*
hXXps://VVV.verisign.com/cps0*
hXXps://VVV.verisign.com/rpa0
hXXps://VVV.verisign.com/rpa0
#hXXp://logo.verisign.com/vslogo.gif0
#hXXp://logo.verisign.com/vslogo.gif0
hXXp://ocsp.verisign.com01
hXXp://ocsp.verisign.com01
hXXp://crl.verisign.com/pca3.crl0)
hXXp://crl.verisign.com/pca3.crl0)
DhXXp://crl.microsoft.com/pki/crl/products/MicrosoftCodeVerifRoot.crl0
DhXXp://crl.microsoft.com/pki/crl/products/MicrosoftCodeVerifRoot.crl0
n.aAHu
n.aAHu
3hXXp://csc3-2009-2-crl.verisign.com/CSC3-2009-2.crl0D
3hXXp://csc3-2009-2-crl.verisign.com/CSC3-2009-2.crl0D
hXXp://ocsp.verisign.com0?
hXXp://ocsp.verisign.com0?
3hXXp://csc3-2009-2-aia.verisign.com/CSC3-2009-2.cer0
3hXXp://csc3-2009-2-aia.verisign.com/CSC3-2009-2.cer0
!Game.ini
!Game.ini
ServerPort=30471
ServerPort=30471
LoginNo=15683
LoginNo=15683
ServerAddr=127.0.0.1
ServerAddr=127.0.0.1
ShowInitialMsg=1
ShowInitialMsg=1
xhelp.dll
xhelp.dll
.nR89
.nR89
/%sC\
/%sC\
.bSEdTG
.bSEdTG
`w.Yw
`w.Yw
8.KTQ
8.KTQ
"n.hk3
"n.hk3
cc{vpG%xM
cc{vpG%xM
Mj.Dh
Mj.Dh
x.uGS
x.uGS
}%sFW
}%sFW
cAN.pI7
cAN.pI7
_p\.mQe
_p\.mQe
.thE.u
.thE.u
.GKVLP@
.GKVLP@
iF%x,
iF%x,
.eqkT
.eqkT
R .Ft~
R .Ft~
4F.XTs
4F.XTs
aqfzb.exe
aqfzb.exe
qD8Y%D
qD8Y%D
P.oJK
P.oJK
O3i
O3i
KH}{.pm
KH}{.pm
.Vx.U
.Vx.U
%.kQkn
%.kQkn
t.GSlMh
t.GSlMh
.LkLZa|
.LkLZa|
5[N.fY
5[N.fY
%8x;-.N
%8x;-.N
_ 3
:.IG@1
u.pY]
Y%FHL0c.rrZ%StMlBløo.obqGVTd[%s-a.kse.k-G}hQjL%fiL."^xS%f.ttJR_wm[.pZG>@.Jf9,@.LV@vYV.ySwn%FPo.RA(@.LV?yg%UWu-u.ueO[6/4N^.sDXBB@DW e%u~?*%u`D^.gB!)%D[BC1%FOJ1;C} ".rF.uyD;sqlDDd.UbD7.vQ_Hw.xE8wB%Us\O5.twrq>0%D\%X[\=:.aF9Lp9|
*.
.SSUg
ssH6]
:*.WZ
dW.Ao
.sQ|~
5%upB
_.vr{w
&y-2}
.Vi)E
.yds>
7.qxfr
%DG>8
f%Ds5
J.uAZA.QJ"rY*=,%S,\:y7%st.dQx%FqESI%dm[U0I.o.Jca9,-7}PU`.vS^6.RlvB?.GV9.Ov0C).YHg!N#.Im6.yRmW.ssRWum.afpt%Sr%Ch0ODyx%fUk%Ch0O.%Ch0Od-Be}W=%FyU%dN@i:vz%u[:f.Crc/$]*%dv%sc%XD9.WVW{*,.un}-E}gw9-J}JPkj.bgL.HBPC.gzmxw1Q%u@.mE=5||XbiÃI;Wy.lm(NL%DiV.WLfT:%xQ.kjDIKWV].xh.gEpsFJ)-VH}f{.OW\.syWTf:\-S.PBgZ.dlC) Z8M.PjK.pJ[N%N.PRjW5|bu.MjW;%dw|LQ(}%u..hv'v%uFC`I1qh>%dxq.TTNVM%FYoBh}GE.kd\xEÄN.XQqSJ.cQJ9%dmNH.rH7HTr:.ipM%U{kM.QD/xH-8}a}FSsh=.Lh@L.PI!1b~UM.XM-GÃT{um(1C.OP9.UUu.BF 9:1.Fo`.%X3.be:|0fP%F^ut{%X.4[(À.yjHO%DWP%Ê0upH%SdW_%S 0FYp.sNtSQlWN.Ue/T7WR%cnmhftp.ePc}mMUdP%dv#'*@%%D]Sli*M.%snB.ne,\%UB|C~np%Se%dv#')%1u`I.OFu^D%S^m.oHxX;L8.EbH%uk:_,|.MZ63.bh\xp.qX1q(%x4ImWn.uq=tWn.uqb.My}p.WA|d.Uwb)%U;$x.UbmeÛrP[>.OkU\{.qCC%0u?.jj3%-L}FI%S(C#.fhJ8'X%UAWY=.Kfa',%cz=%F XcT\W.AFTn.Cjt}D.GE97gA.Cws%u)EKd.Ym3X.FV;=%s|5fSsh=#]%8XT.fd}>|%4Ug0.YJh%sX`kPÕrAU$%s|g:n%X {%F|=!FG]m7bÔVWHvJ%S:M;u.pQ%8.c~.Fn)g9.mKnf%CN5oOj7G1T.yF%snci_%XAb`.xCDQmHW[d.yjxF;1d%xg3%S<:e9>|*"{.vl}b5.Fl?.%c!$Z.Uk#T^\6.JvS#7..LH!DwzMj.FFFC%URr&7.lleEF.aFm3`.Gp{.FF:n.ZjwA4"%2uEecMDe%dl5Z"7fc^-KY}qw:urLA.Wj`z'`.lD:ORH]-%FI#h.TUV.owns3B@.wS`9.wf3.vCe6P~0A%CRv24%%u;.fou%C]Jh.PfTx"key`.ZO.hzlf;jtw%dD^-t}M%dKr.Wu/PW*.WEeZa%vM.yN-.obfR.yR*-]D%uO{_.xZ`Y.JA'k|~iX%fL.BxX.kp9qaNp/%S]4X4:.MCm6u.aS.cdh\CN@%D}#;5Ä3%p<.iy95>@%XcKFq%u`,ZX.eCr0v.fw8v.xe@.dd@U:.fir)\zr*%xF_.Sb)LqR~.Rn{.QqkR.8.mLS=É)1W.gQ8%c&j6.VmBw,^6K%SVD9S.qh_G)a%cwj.Rk0`&6bX%CKpf~aabp;.lo~NÆB:.vL,e.zB-MYNsER.eNGOz%ufB.yhP?Chj.BI$y.ZPBO.HRwP%SPW>$"%c.DW>6z1.SG."Bsg%d|.Mdq~ca.YFdCrh].GsHfl.uLrqh%xk\{%Sk2.ZLa7.lV.dD_>l}C:.kp%=%x"FyD%Sf5"'P7.Sb%c/C*!.LwiSF.Oq?.LManM%dZ.tp?|vpv/-%Sg%x)hcD.JlKL_t.buVqQ.QS!.kI.F`%uHp%c"^X0#)?lZZQi^.YU!M.lzP{']%x2'5.AKI%X2#p|.Jv>.Ut>V%dG3Uaxqer.exeGLCore.dll287650928hXXp://zp.38kc.com/hXXp://pan.baidu.com/s/1i3HXSETinternetexplorer.application`.rdata@.data.reloc__MSVCRT_HEAP_SELECTUSER32.dllWS2_32.dllGetCPInfoCjDll.dll
xxxxxxxxxxxxxxxx
3 3$3(3,3034383
8!9)9/979
77P7[7`7h7
0(3,30343
hXXp://open.baidu.com/special/time/
window.baidu_time(
cq.dat
hXXp://hi.baidu.com/popplmplm2009/item/ad4bd800f53323c42e4c6b2a
GameGuardurlmd5
data\itemsas.wzl
GameGuardurl
Y@downurl
cxq.txt
\!wjm.ini
\DLQ.ini
data\Prguse.wzl
data\Prguse.wil
\data\Prguse.wzl
\data\Prguse.wil
tkzz.txt
\tkzz.txt
lj.txt
MemoryGuard.dll
.kkp2
pack.tmp
[weburl]
\user.ini
updateurl
!wjm.ini
\Map\0.map
\map\0122.map
\map\0150.map
\map\11.map
Map\0.map
map\0122.map
map\0150.map
map\11.map
\data\DefaultBoss.dat
anonymous@123.com
.exe|.rar|.zip|.gif|.jpg|.mp3|.rm
hXXp://jy.38kc.com
Adobe Photoshop CS Windows
2011:06:28 21:54:43
urlTEXT
MsgeTEXT
0hXXp://ns.adobe.com/xap/1.0/
xmlns:exif='hXXp://ns.adobe.com/exif/1.0/'>xmlns:pdf='hXXp://ns.adobe.com/pdf/1.3/'>xmlns:photoshop='hXXp://ns.adobe.com/photoshop/1.0/'>xmlns:tiff='hXXp://ns.adobe.com/tiff/1.0/'>xmlns:xap='hXXp://ns.adobe.com/xap/1.0/'>Adobe Photoshop CS Windowsxmlns:stRef='hXXp://ns.adobe.com/xap/1.0/sType/ResourceRef#'xmlns:xapMM='hXXp://ns.adobe.com/xap/1.0/mm/'>uuid:193736f5-a18e-11e0-91f5-b945b6a58a8badobe:docid:photoshop:4717c0ba-47cf-11e0-8c96-bde67cf84c29adobe:docid:photoshop:193736f8-a18e-11e0-91f5-b945b6a58a8bxmlns:dc='hXXp://purl.org/dc/elements/1.1/'>IEC hXXp://VVV.iec.ch.IEC 61966-2.1 Default RGB colour space - sRGBCRT curv2011:06:28 21:55:072hXXp://ns.adobe.com/xap/1.0/uuid:08f2867b-7fa2-11e0-9d22-f842cbbb5ea9adobe:docid:photoshop:193736fe-a18e-11e0-91f5-b945b6a58a8b2013:12:15 18:46:01.fKf[[YhXXp://ns.adobe.com/xap/1.0/adobe:docid:photoshop:e740154d-6575-11e3-8b42-e5bd279358ebócnl5f?.sboih 38%DuQ]2013:12:15 18:39:21adobe:docid:photoshop:b2dc8a01-6574-11e3-8b42-e5bd279358eb2013:12:15 18:40:18adobe:docid:photoshop:4a35f138-6575-11e3-8b42-e5bd279358eb2013:12:15 18:41:20adobe:docid:photoshop:4a35f140-6575-11e3-8b42-e5bd279358eb2013:12:15 18:42:00adobe:docid:photoshop:6f7911d7-6575-11e3-8b42-e5bd279358eb2013:12:15 18:42:29adobe:docid:photoshop:6f7911db-6575-11e3-8b42-e5bd279358eb1%D>=2013:12:15 18:43:084.nv#adobe:docid:photoshop:987d061e-6575-11e3-8b42-e5bd279358eb2013:12:15 18:36:04adobe:docid:photoshop:9e0be246-6574-11e3-8b42-e5bd279358eb}%4SVOFd9vy.ll1911/01/012013:12:15 18:49:20.ifL:adobe:docid:photoshop:865b835f-6576-11e3-8b42-e5bd279358ebw%d 52013:12:15 16:39:17adobe:docid:photoshop:30a667db-6564-11e3-adb6-920a1e92ee64_.jZni9/%fO%UDNEV)7.KoI.LaB(*.*)|*.*inflate 1.1.3 Copyright 1995-1998 Mark AdlerF%*.*fCNotSupportedExceptioncommctrl_DragListMsgAfx:%x:%x:%x:%x:%xAfx:%x:%xCOMCTL32.DLLCCmdTargetSHLWAPI.dllMPR.dllVERSION.dll.PAVCException@@.PAVCNotSupportedException@@.PAVCFileException@@(*.prn)|*.prn|(*.*)|*.*||Shell32.dllMpr.dllAdvapi32.dllUser32.dllGdi32.dllKernel32.dll(&07-034/)7 '?? / %d]%d / %d]: %d](*.WAV;*.MID)|*.WAV;*.MID|WAV(*.WAV)|*.WAV|MIDI(*.MID)|*.MID|(*.txt)|*.txt|(*.JPG;*.BMP;*.GIF;*.ICO;*.CUR)|*.JPG;*.BMP;*.GIF;*.ICO;*.CUR|JPG(*.JPG)|*.JPG|BMP(*.BMP)|*.BMP|GIF(*.GIF)|*.GIF|(*.ICO)|*.ICO|(*.CUR)|*.CUR|%s:%dwindowsout.prn%d.%d%d / %d%d/%dBogus message code %d(%d-%d):%ld%c(*.htm;*.html)|*.htm;*.htmlits:%s::%sVVV.dywt.com.cnindex.datdesktop.inix86 Family %s Model %s Stepping %s
X-X-X-X
X-X-X-X-X-X
[%s:%d]
Range: bytes=%s-
[%s:%d]
PASS %s
PASS ******
USER %s
E:\dev\e\static_link\static_libs\source\downlib\mystrlib.cpp
SIZE %s
PORT
User-Agent: %s
Mozilla/4.0 (compatible; MSIE 5.00; Windows 98)
Referer: %s
Host: %s
GET %s HTTP/1.1
HTTP/1.0
HTTP/1.1
hXXp://
Cookie: %s
%d, %s
\\192.168.0.129\TCP\1037
NSPlayer/9.0.0.2980; {%s}; Host: %s
rmff_fix_header: assuming data.size=%i
rmff_fix_header: assuming data.num_packets=%i
rmff_fix_header: assuming prop.num_packets=%i
rmff_fix_header: setting prop.data_offset from %i to %i
rmff_fix_header: correcting prop.num_streams from %i to %i
rmff_fix_header: correcting prop.size from %i to %i
%s %s %s
Session: %s
Cseq: %u
%*s %s
%*s %u
CSeq: %u
rtsp://%s:%i
rtsp://%s:%i/%s
ClientID: Linux_2.4_6.0.9.1235_play32_RN01_EN_586
GUID: 00000000-0000-0000-0000-000000000000
[%s:%d]
User-Agent: RealMedia Player Version 6.0.9.1235 (linux-2.0-libc6-i386-gcc2.95)
Range: npt=%s-
%s/streamid=1
%s/streamid=0
Transport: x-pn-tng/tcp;mode=play,rtp/avp/tcp;unicast;mode=play
If-Match: %s
RealChallenge2: %s, sd=%s
Title: %s
Copyright: %s
Author: %s
real: Content-length for description too big (> %uMB)!
Require: com.real.retain-entity-for-setup
SupportsMaximumASMBandwidth: 1
Bandwidth: %u
Challenge1: %s
hash output: %x %x %x %x
hash input: %x %x %x %x
stream=%u;rule=%u,
Illegal character '%c' in input.
1.1.3
;3 #>6.&
'2, / 0&7!4-)1#
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
%s
Reply-To: %s
From: %s
To: %s
Subject: %s
Date: %s
Cc: %s
%a, %d %b %Y %H:%M:%S
SMTP
hXXp://dywt.com.cn
service@dywt.com.cn
86(0411)88995834
86(0411)88995831
Windows
(ESPINN.dll(NN
This is a runtime library file for EPL applications. The EPL is a software development environment. For details please visit VVV.dywt.com.cn/info
CallerInfoCopyCmd
SetIPPort
GetIPPort
"C:\Windows\System32\ESPI11.dll"
ProviderInstallCopyCmd
SockDataCopyCmd
SockAddrCopyCmd
enetintercept_fnSockAddrSetIPPort
enetintercept_fnSockAddrGetIPPort
enetintercept_fnInstallCopyCmd
enetintercept_fnSockDataCopyCmd
enetintercept_fnSockAddrCopyCmd
enetintercept_fnCallerInfoCopyCmd
%s\ESPI%d.dll
.PAVCOleException@@
.PAVCObject@@
.PAVCSimpleException@@
.PAVCMemoryException@@
.?AVCNotSupportedException@@
.PAVCResourceException@@
.PAVCUserException@@
.?AVCCmdTarget@@
.?AVCCmdUI@@
.?AVCTestCmdUI@@
.PAVCOleDispatchException@@
.PAVCArchiveException@@
zcÃ
c:\%original file name%.exe
GetWindowsDirectoryA
WinExec
GetProcessHeap
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegCreateKeyExA
RegOpenKeyA
RegCloseKey
GetViewportExtEx
GetViewportOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
ShellExecuteA
GetKeyState
SetWindowsHookExA
CreateDialogIndirectParamA
UnhookWindowsHookEx
InternetCanonicalizeUrlA
InternetCrackUrlA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
"bKey
aAOsH8k%CQe
AUrlA3
%Http
#include "l.chs\afxres.rc" // Standard components
KERNEL32.DLL
COMCTL32.dll
comdlg32.dll
GDI32.dll
iphlpapi.dll
OLEAUT32.dll
oledlg.dll
RASAPI32.dll
SHELL32.dll
WININET.dll
WINMM.dll
WINSPOOL.DRV
snetcfg.exe
26.0.0.2
553956680156250
23456789
(*.*)%original file name%.exe_1044_rwx_00401000_00849000:
t$(SSh
|$D.tm
~%UVW
t.It It
u$SShe
shell32.dll
ntdll.dll
kernel32.dll
ole32.dll
ws2_32.dll
shlwapi.dll
user32.dll
advapi32.dll
msimg32.dll
MsgWaitForMultipleObjects
weburl
data\prguse.wis
data\prguse2.wis
data\prguse3.wis
tedlq.dll
xlq.txt
qwstart.exe
.text
`.data
.rsrc
C:\DistributedAutoLink\Temp\CompileOutputDir\i386\snetcfg.pdb
msvcrt.dll
ADVAPI32.dll
KERNEL32.dll
SETUPAPI.dll
version="1.0.0.0"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
hXXp://ocsp.verisign.com0"hXXp://crl.verisign.com/tss-ca.crl0Thawte Certification10hXXp://crl.verisign.com/ThawteTimestampingCA.crl0.Class 3 Public Primary Certification Authority02Terms of use at hXXps://VVV.verisign.com/rpa (c)09100.hXXps://VVV.verisign.com/cps0*hXXps://VVV.verisign.com/rpa0#hXXp://logo.verisign.com/vslogo.gif0hXXp://ocsp.verisign.com01hXXp://crl.verisign.com/pca3.crl0)DhXXp://crl.microsoft.com/pki/crl/products/MicrosoftCodeVerifRoot.crl0n.aAHu3hXXp://csc3-2009-2-crl.verisign.com/CSC3-2009-2.crl0DhXXp://ocsp.verisign.com0?3hXXp://csc3-2009-2-aia.verisign.com/CSC3-2009-2.cer0!Game.iniServerPort=30471LoginNo=15683ServerAddr=127.0.0.1ShowInitialMsg=1xhelp.dll.nR89/%sC\.bSEdTG`w.Yw8.KTQ"n.hk3cc{vpG%xMMj.Dhx.uGS}%sFWcAN.pI7_p\.mQe.thE.u.GKVLP@iF%x,.eqkTR .Ft~4F.XTsaqfzb.exeqD8Y%DP.oJKO3iKH}{.pm.Vx.U%.kQknt.GSlMh.LkLZa|5[N.fY%8x;-.N_ 3:.IG@1u.pY]Y%FHL0c.rrZ%StMlBløo.obqGVTd[%s-a.kse.k-G}hQjL%fiL."^xS%f.ttJR_wm[.pZG>@.Jf9,@.LV@vYV.ySwn%FPo.RA(@.LV?yg%UWu-u.ueO[6/4N^.sDXBB@DW e%u~?*%u`D^.gB!)%D[BC1%FOJ1;C} ".rF.uyD;sqlDDd.UbD7.vQ_Hw.xE8wB%Us\O5.twrq>0%D\%X[\=:.aF9Lp9|
*.
.SSUg
ssH6]
:*.WZ
dW.Ao
.sQ|~
5%upB
_.vr{w
&y-2}
.Vi)E
.yds>
7.qxfr
%DG>8
f%Ds5
J.uAZA.QJ"rY*=,%S,\:y7%st.dQx%FqESI%dm[U0I.o.Jca9,-7}PU`.vS^6.RlvB?.GV9.Ov0C).YHg!N#.Im6.yRmW.ssRWum.afpt%Sr%Ch0ODyx%fUk%Ch0O.%Ch0Od-Be}W=%FyU%dN@i:vz%u[:f.Crc/$]*%dv%sc%XD9.WVW{*,.un}-E}gw9-J}JPkj.bgL.HBPC.gzmxw1Q%u@.mE=5||XbiÃI;Wy.lm(NL%DiV.WLfT:%xQ.kjDIKWV].xh.gEpsFJ)-VH}f{.OW\.syWTf:\-S.PBgZ.dlC) Z8M.PjK.pJ[N%N.PRjW5|bu.MjW;%dw|LQ(}%u..hv'v%uFC`I1qh>%dxq.TTNVM%FYoBh}GE.kd\xEÄN.XQqSJ.cQJ9%dmNH.rH7HTr:.ipM%U{kM.QD/xH-8}a}FSsh=.Lh@L.PI!1b~UM.XM-GÃT{um(1C.OP9.UUu.BF 9:1.Fo`.%X3.be:|0fP%F^ut{%X.4[(À.yjHO%DWP%Ê0upH%SdW_%S 0FYp.sNtSQlWN.Ue/T7WR%cnmhftp.ePc}mMUdP%dv#'*@%%D]Sli*M.%snB.ne,\%UB|C~np%Se%dv#')%1u`I.OFu^D%S^m.oHxX;L8.EbH%uk:_,|.MZ63.bh\xp.qX1q(%x4ImWn.uq=tWn.uqb.My}p.WA|d.Uwb)%U;$x.UbmeÛrP[>.OkU\{.qCC%0u?.jj3%-L}FI%S(C#.fhJ8'X%UAWY=.Kfa',%cz=%F XcT\W.AFTn.Cjt}D.GE97gA.Cws%u)EKd.Ym3X.FV;=%s|5fSsh=#]%8XT.fd}>|%4Ug0.YJh%sX`kPÕrAU$%s|g:n%X {%F|=!FG]m7bÔVWHvJ%S:M;u.pQ%8.c~.Fn)g9.mKnf%CN5oOj7G1T.yF%snci_%XAb`.xCDQmHW[d.yjxF;1d%xg3%S<:e9>|*"{.vl}b5.Fl?.%c!$Z.Uk#T^\6.JvS#7..LH!DwzMj.FFFC%URr&7.lleEF.aFm3`.Gp{.FF:n.ZjwA4"%2uEecMDe%dl5Z"7fc^-KY}qw:urLA.Wj`z'`.lD:ORH]-%FI#h.TUV.owns3B@.wS`9.wf3.vCe6P~0A%CRv24%%u;.fou%C]Jh.PfTx"key`.ZO.hzlf;jtw%dD^-t}M%dKr.Wu/PW*.WEeZa%vM.yN-.obfR.yR*-]D%uO{_.xZ`Y.JA'k|~iX%fL.BxX.kp9qaNp/%S]4X4:.MCm6u.aS.cdh\CN@%D}#;5Ä3%p<.iy95>@%XcKFq%u`,ZX.eCr0v.fw8v.xe@.dd@U:.fir)\zr*%xF_.Sb)LqR~.Rn{.QqkR.8.mLS=É)1W.gQ8%c&j6.VmBw,^6K%SVD9S.qh_G)a%cwj.Rk0`&6bX%CKpf~aabp;.lo~NÆB:.vL,e.zB-MYNsER.eNGOz%ufB.yhP?Chj.BI$y.ZPBO.HRwP%SPW>$"%c.DW>6z1.SG."Bsg%d|.Mdq~ca.YFdCrh].GsHfl.uLrqh%xk\{%Sk2.ZLa7.lV.dD_>l}C:.kp%=%x"FyD%Sf5"'P7.Sb%c/C*!.LwiSF.Oq?.LManM%dZ.tp?|vpv/-%Sg%x)hcD.JlKL_t.buVqQ.QS!.kI.F`%uHp%c"^X0#)?lZZQi^.YU!M.lzP{']%x2'5.AKI%X2#p|.Jv>.Ut>V%dG3Uaxqer.exeGLCore.dll287650928hXXp://zp.38kc.com/hXXp://pan.baidu.com/s/1i3HXSETinternetexplorer.application`.rdata@.data.reloc__MSVCRT_HEAP_SELECTUSER32.dllWS2_32.dllGetCPInfoCjDll.dll
xxxxxxxxxxxxxxxx
3 3$3(3,3034383
8!9)9/979
77P7[7`7h7
0(3,30343
hXXp://open.baidu.com/special/time/
window.baidu_time(
cq.dat
hXXp://hi.baidu.com/popplmplm2009/item/ad4bd800f53323c42e4c6b2a
GameGuardurlmd5
data\itemsas.wzl
GameGuardurl
Y@downurl
cxq.txt
\!wjm.ini
\DLQ.ini
data\Prguse.wzl
data\Prguse.wil
\data\Prguse.wzl
\data\Prguse.wil
tkzz.txt
\tkzz.txt
lj.txt
MemoryGuard.dll
.kkp2
pack.tmp
[weburl]
\user.ini
updateurl
!wjm.ini
\Map\0.map
\map\0122.map
\map\0150.map
\map\11.map
Map\0.map
map\0122.map
map\0150.map
map\11.map
\data\DefaultBoss.dat
anonymous@123.com
.exe|.rar|.zip|.gif|.jpg|.mp3|.rm
hXXp://jy.38kc.com
Adobe Photoshop CS Windows
2011:06:28 21:54:43
urlTEXT
MsgeTEXT
0hXXp://ns.adobe.com/xap/1.0/
xmlns:exif='hXXp://ns.adobe.com/exif/1.0/'>xmlns:pdf='hXXp://ns.adobe.com/pdf/1.3/'>xmlns:photoshop='hXXp://ns.adobe.com/photoshop/1.0/'>xmlns:tiff='hXXp://ns.adobe.com/tiff/1.0/'>xmlns:xap='hXXp://ns.adobe.com/xap/1.0/'>Adobe Photoshop CS Windowsxmlns:stRef='hXXp://ns.adobe.com/xap/1.0/sType/ResourceRef#'xmlns:xapMM='hXXp://ns.adobe.com/xap/1.0/mm/'>uuid:193736f5-a18e-11e0-91f5-b945b6a58a8badobe:docid:photoshop:4717c0ba-47cf-11e0-8c96-bde67cf84c29adobe:docid:photoshop:193736f8-a18e-11e0-91f5-b945b6a58a8bxmlns:dc='hXXp://purl.org/dc/elements/1.1/'>IEC hXXp://VVV.iec.ch.IEC 61966-2.1 Default RGB colour space - sRGBCRT curv2011:06:28 21:55:072hXXp://ns.adobe.com/xap/1.0/uuid:08f2867b-7fa2-11e0-9d22-f842cbbb5ea9adobe:docid:photoshop:193736fe-a18e-11e0-91f5-b945b6a58a8b2013:12:15 18:46:01.fKf[[YhXXp://ns.adobe.com/xap/1.0/adobe:docid:photoshop:e740154d-6575-11e3-8b42-e5bd279358ebócnl5f?.sboih 38%DuQ]2013:12:15 18:39:21adobe:docid:photoshop:b2dc8a01-6574-11e3-8b42-e5bd279358eb2013:12:15 18:40:18adobe:docid:photoshop:4a35f138-6575-11e3-8b42-e5bd279358eb2013:12:15 18:41:20adobe:docid:photoshop:4a35f140-6575-11e3-8b42-e5bd279358eb2013:12:15 18:42:00adobe:docid:photoshop:6f7911d7-6575-11e3-8b42-e5bd279358eb2013:12:15 18:42:29adobe:docid:photoshop:6f7911db-6575-11e3-8b42-e5bd279358eb1%D>=2013:12:15 18:43:084.nv#adobe:docid:photoshop:987d061e-6575-11e3-8b42-e5bd279358eb2013:12:15 18:36:04adobe:docid:photoshop:9e0be246-6574-11e3-8b42-e5bd279358eb}%4SVOFd9vy.ll1911/01/012013:12:15 18:49:20.ifL:adobe:docid:photoshop:865b835f-6576-11e3-8b42-e5bd279358ebw%d 52013:12:15 16:39:17adobe:docid:photoshop:30a667db-6564-11e3-adb6-920a1e92ee64_.jZni9/%fO%UDNEV)7.KoI.LaB(*.*)|*.*inflate 1.1.3 Copyright 1995-1998 Mark AdlerF%*.*fCNotSupportedExceptioncommctrl_DragListMsgAfx:%x:%x:%x:%x:%xAfx:%x:%xCOMCTL32.DLLCCmdTargetSHLWAPI.dllMPR.dllVERSION.dll.PAVCException@@.PAVCNotSupportedException@@.PAVCFileException@@(*.prn)|*.prn|(*.*)|*.*||Shell32.dllMpr.dllAdvapi32.dllUser32.dllGdi32.dllKernel32.dll(&07-034/)7 '?? / %d]%d / %d]: %d](*.WAV;*.MID)|*.WAV;*.MID|WAV(*.WAV)|*.WAV|MIDI(*.MID)|*.MID|(*.txt)|*.txt|(*.JPG;*.BMP;*.GIF;*.ICO;*.CUR)|*.JPG;*.BMP;*.GIF;*.ICO;*.CUR|JPG(*.JPG)|*.JPG|BMP(*.BMP)|*.BMP|GIF(*.GIF)|*.GIF|(*.ICO)|*.ICO|(*.CUR)|*.CUR|%s:%dwindowsout.prn%d.%d%d / %d%d/%dBogus message code %d(%d-%d):%ld%c(*.htm;*.html)|*.htm;*.htmlits:%s::%sVVV.dywt.com.cnindex.datdesktop.inix86 Family %s Model %s Stepping %s
X-X-X-X
X-X-X-X-X-X
[%s:%d]
Range: bytes=%s-
[%s:%d]
PASS %s
PASS ******
USER %s
E:\dev\e\static_link\static_libs\source\downlib\mystrlib.cpp
SIZE %s
PORT
User-Agent: %s
Mozilla/4.0 (compatible; MSIE 5.00; Windows 98)
Referer: %s
Host: %s
GET %s HTTP/1.1
HTTP/1.0
HTTP/1.1
hXXp://
Cookie: %s
%d, %s
\\192.168.0.129\TCP\1037
NSPlayer/9.0.0.2980; {%s}; Host: %s
rmff_fix_header: assuming data.size=%i
rmff_fix_header: assuming data.num_packets=%i
rmff_fix_header: assuming prop.num_packets=%i
rmff_fix_header: setting prop.data_offset from %i to %i
rmff_fix_header: correcting prop.num_streams from %i to %i
rmff_fix_header: correcting prop.size from %i to %i
%s %s %s
Session: %s
Cseq: %u
%*s %s
%*s %u
CSeq: %u
rtsp://%s:%i
rtsp://%s:%i/%s
ClientID: Linux_2.4_6.0.9.1235_play32_RN01_EN_586
GUID: 00000000-0000-0000-0000-000000000000
[%s:%d]
User-Agent: RealMedia Player Version 6.0.9.1235 (linux-2.0-libc6-i386-gcc2.95)
Range: npt=%s-
%s/streamid=1
%s/streamid=0
Transport: x-pn-tng/tcp;mode=play,rtp/avp/tcp;unicast;mode=play
If-Match: %s
RealChallenge2: %s, sd=%s
Title: %s
Copyright: %s
Author: %s
real: Content-length for description too big (> %uMB)!
Require: com.real.retain-entity-for-setup
SupportsMaximumASMBandwidth: 1
Bandwidth: %u
Challenge1: %s
hash output: %x %x %x %x
hash input: %x %x %x %x
stream=%u;rule=%u,
Illegal character '%c' in input.
1.1.3
;3 #>6.&
'2, / 0&7!4-)1#
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
%s
Reply-To: %s
From: %s
To: %s
Subject: %s
Date: %s
Cc: %s
%a, %d %b %Y %H:%M:%S
SMTP
hXXp://dywt.com.cn
service@dywt.com.cn
86(0411)88995834
86(0411)88995831
Windows
(ESPINN.dll(NN
This is a runtime library file for EPL applications. The EPL is a software development environment. For details please visit VVV.dywt.com.cn/info
CallerInfoCopyCmd
SetIPPort
GetIPPort
"C:\Windows\System32\ESPI11.dll"
ProviderInstallCopyCmd
SockDataCopyCmd
SockAddrCopyCmd
enetintercept_fnSockAddrSetIPPort
enetintercept_fnSockAddrGetIPPort
enetintercept_fnInstallCopyCmd
enetintercept_fnSockDataCopyCmd
enetintercept_fnSockAddrCopyCmd
enetintercept_fnCallerInfoCopyCmd
%s\ESPI%d.dll
.PAVCOleException@@
.PAVCObject@@
.PAVCSimpleException@@
.PAVCMemoryException@@
.?AVCNotSupportedException@@
.PAVCResourceException@@
.PAVCUserException@@
.?AVCCmdTarget@@
.?AVCCmdUI@@
.?AVCTestCmdUI@@
.PAVCOleDispatchException@@
.PAVCArchiveException@@
zcÃ
c:\%original file name%.exe
GetWindowsDirectoryA
WinExec
GetProcessHeap
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegCreateKeyExA
RegOpenKeyA
RegCloseKey
GetViewportExtEx
GetViewportOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
ShellExecuteA
GetKeyState
SetWindowsHookExA
CreateDialogIndirectParamA
UnhookWindowsHookEx
InternetCanonicalizeUrlA
InternetCrackUrlA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
"bKey
aAOsH8k%CQe
AUrlA3
%Http
snetcfg.exe
26.0.0.2
553956680156250
23456789