[ Network_Services ]
Connects to "222.169.224.183" on port 3128 (IP).
Connects to "222.169.224.183" on port 8080 (IP).
[ Process-window information ]
Creates process "C:\WINDOWS\TEMP\LYLOADER.EXE".
Checks if privilege "SeRestorePrivilege" is available.
Enumerates running processes.
Modifies other process memory.
Creates a remote thread.
Will inject library C:\WINDOWS\SYSTEM32\LYMANGR.DLL into remote processes.
Enumerates running processes several parses....
10.exe
[ General_Information]
**Locates window "NULL [class AVP.AlertDialog]" on desktop.
**Locates window "NULL [class AVP.Product_Notification]" on desktop.
**Locates window "瑞星注册表监控提示 [class NULL]" on desktop.
[ Process-window information ]
Creates an event called 32718848.
11.exe
[ General_Information]
File might be compressed.
Decompressing ASPack.
Accesses executable file from resource section.
Creating several executable files on hard-drive.
File length: 42289 bytes.
MD5 hash: 7ca51ccaa6dcafd5325074843e5bd400.
[ Changes to registry ]
Creates value "WinSysM"="C:\WINDOWS\418429M.exe" in key "HKLM\Software\Microsoft\Windows\CurrentVersion\Run".
[ Process-window information ]
Attemps to open C:\WINDOWS\418429M.exe NULL.
Creates process "C:\WINDOWS\418429M.exe".
Attemps to Open C:\COMMAND.COM NULL.
Will automatically restart after boot (I'll be back...).
Checks if privilege "SeDebugPrivilege" is available.
Enumerates running processes.
Modifies other process memory.
Creates a remote thread.
Will inject library C into remote processes.
Enumerates running processes several parses....
[ Changes to registry ]
Creates key "HKCR\CLSID\{471B15AD-7A9C-491D-9C19-4E15B12DCE00}".
Sets value ""="" in key "HKCR\CLSID\{471B15AD-7A9C-491D-9C19-4E15B12DCE00}".
Creates key "HKCR\CLSID\{471B15AD-7A9C-491D-9C19-4E15B12DCE00}\InProcServer32".
Sets value ""="C:\Program Files\Internet Explorer\PLUGINS\NvSys_55.Sys" in key "HKCR\CLSID\{471B15AD-7A9C-491D-9C19-4E15B12DCE00}\InProcServer32".
Sets value "ThreadingModel"="Apartment" in key "HKCR\CLSID\{471B15AD-7A9C-491D-9C19-4E15B12DCE00}\InProcServer32".
Creates key "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{471B15AD-7A9C-491D-9C19-4E15B12DCE00}".
Creates value "{471B15AD-7A9C-491D-9C19-4E15B12DCE00}"="" in key "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks".
[ Network ]
Hooks into Shell explorer.
[ Process-window information ]
Creates process ""c:\sample.exe"".
13.exe
[ General_Information]
File might be compressed.
Decompressing Unk3!FSG?.
**Locates window "HM_MESSWOWAGEWFTCDLL [class HM_MESSWOWFTCDLL]" on desktop.
Accesses executable file from resource section.
Drops files in %WINSYS% folder.
**Locates window "NULL [class GxWindowClassD3d]" on desktop.
File length: 33389 bytes.
MD5 hash: b651ccc0006c5f204f2eeadec825f825.
[ Changes to registry ]
Creates key "HKCR\CLSID\{58847374-8323-FADC-B443-4732ABCD3785}\InprocServer32".
Sets value ""="C:\WINDOWS\SYSTEM32\sidjezy.dll" in key "HKCR\CLSID\{58847374-8323-FADC-B443-4732ABCD3785}\InprocServer32".
Sets value "ThreadingModel"="Apartment" in key "HKCR\CLSID\{58847374-8323-FADC-B443-4732ABCD3785}\InprocServer32".
Creates value "{58847374-8323-FADC-B443-4732ABCD3785}"="sidjezy.dll" in key "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks".
[ Changes to system settings ]
Modifies profile key "Url1"="15E3FFFFFBB1A4A4B9B9B9A5BAB3BDA5BAB2BAA5BAB8A4EFEAE4E1E2EAE5A4E8EEFAF9E8BDA4FBE4F8FFA5EAF8FB" in section [Send] of file C:\WINDOWS\Fonts\cadaafx.fon.
Modifies profile key "Url1"="hxxp://222.186.191.13/daojian/ceqrc6/post.asp" in section [Send] of file C:\WINDOWS\Fonts\sidjecs.dll.
Creates Windows_Hook_monitoring _keyboard activity.
Creates Windows_Hook_monitoring _mouse activity.
[ Network ]
Hooks into Shell explorer.
[ Process-window information ]
Enumerates running processes.
Creates process "C:\WINDOWS\SYSTEM32\sidjeaz.exe".
[ Changes to registry ]
Creates key "HKCR\CLSID\{8A1247C1-53DA-FF43-ABD3-345F323A48D8}\InprocServer32".
Sets value ""="C:\WINDOWS\SYSTEM32\avwghmn.dll" in key "HKCR\CLSID\{8A1247C1-53DA-FF43-ABD3-345F323A48D8}\InprocServer32".
Sets value "ThreadingModel"="Apartment" in key "HKCR\CLSID\{8A1247C1-53DA-FF43-ABD3-345F323A48D8}\InprocServer32".
Creates value "{8A1247C1-53DA-FF43-ABD3-345F323A48D8}"="avwghmn.dll" in key "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks".
[ Changes to system settings ]
Modifies profile key "Url1"="BF495555511B0E0E5656560F4B4C474052550F424F0E5249484B48404F0E55444C5144520E514E52550F405251" in section [Send] of file C:\WINDOWS\Fonts\msguasd.fon.
Modifies profile key "Url1"="hxxp://www.jmfast.cn/shijian/tempes/post.asp" in section [Send] of file C:\WINDOWS\Fonts\avwghin.dll.
Creates Windows_Hook_monitoring _keyboard activity.
Creates Windows_Hook_monitoring _mouse activity.
Modifies profile key "Url1"="B94F5353571D0808505050094D4A4146545309444908544F4E4D4E46490853424A574254085748545309465457" in section [Send] of file C:\WINDOWS\Fonts\msguasd.fon.
Modifies profile key "Url2"="A25448484C0613134B4B4B1256515A5D4F48125F52134F545556555D52134859514C594F134C534F48125D4F4C" in section [Send] of file C:\WINDOWS\Fonts\msguasd.fon.
[ Network ]
Hooks into Shell explorer.
[ Process-window information ]
Enumerates running processes.
Creates process "C:\WINDOWS\SYSTEM32\avwghst.exe".
[ Changes to registry ]
Creates key "HKCR\CLSID\{B859245F-345D-BC13-AC4F-145D47DA34FB}\InprocServer32".
Sets value ""="C:\WINDOWS\SYSTEM32\avzxkmn.dll" in key "HKCR\CLSID\{B859245F-345D-BC13-AC4F-145D47DA34FB}\InprocServer32".
Sets value "ThreadingModel"="Apartment" in key "HKCR\CLSID\{B859245F-345D-BC13-AC4F-145D47DA34FB}\InprocServer32".
Creates value "{B859245F-345D-BC13-AC4F-145D47DA34FB}"="avzxkmn.dll" in key "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks".
[ Changes to system settings ]
Modifies profile key "Url1"="B24458585C1603035B5B5B025E4948584D434E4D43024F43410341441B1B1B035C435F58024D5F5C" in section [Send] of file C:\WINDOWS\Fonts\mszhasd.fon.
Modifies profile key "Url1"="hxxp://www.redtaobao.com/mh777/post.asp" in section [Send] of file C:\WINDOWS\Fonts\avzxkin.dll.
Creates Windows_Hook_monitoring _keyboard activity.
Creates Windows_Hook_monitoring _mouse activity.
Modifies profile key "Url1"="07F1EDEDE9A3B6B6EEEEEEB7EBFCFDEDF8F6FBF8F6B7FAF6F4B6F4F1AEAEAEB6E9F6EAEDB7F8EAE9" in section [Send] of file C:\WINDOWS\Fonts\mszhasd.fon.
Modifies profile key "Url2"="D7213D3D397366663E3E3E673B2C2D3D28262B2826672A26246624217E7E7E6639263A3D67283A39" in section [Send] of file C:\WINDOWS\Fonts\mszhasd.fon.
[ Network ]
Hooks into Shell explorer.
[ Process-window information ]
Enumerates running processes.
Creates process "C:\WINDOWS\SYSTEM32\avzxkst.exe".
[ Changes to registry ]
Creates key "HKLM\System\CurrentControlSet\Services\AsyncMac".
Creates key "HKLM\System\CurrentControlSet\Services\comint32".
Sets value "ImagePath"="C:\WINDOWS\SYSTEM32\DRIVERS\comint32.sys" in key "HKLM\System\CurrentControlSet\Services\comint32".
Sets value "DisplayName"="comint32" in key "HKLM\System\CurrentControlSet\Services\comint32".
[ Process-window information ]
Enumerates running processes.
Attempts to access service "comint32".
Creates service "comint32 (comint32)" as "C:\WINDOWS\SYSTEM32\DRIVERS\comint32.sys".
Creates a mutex __B_WL.
18.exe
[ General_Information]
File might be compressed.
Decompressing ASPack.
Drops files in %WINSYS% folder.
Accesses executable file from resource section.
Creating several executable files on hard-drive.
File length: 52529 bytes.
MD5 hash: b40effc6a00ca92dd93af804974b0084.
[ Changes to registry ]
Creates value "WinSysW"="C:\WINDOWS\418429L.exe" in key "HKLM\Software\Microsoft\Windows\CurrentVersion\Run".
[ Process-window information ]
Attemps to open C:\WINDOWS\418429L.exe NULL.
Creates process "C:\WINDOWS\418429L.exe".
Attemps to Open C:\COMMAND.COM NULL.
Will automatically restart after boot (I'll be back...).
Checks if privilege "SeDebugPrivilege" is available.
Enumerates running processes.
Modifies other process memory.
Creates a remote thread.
Will inject library C into remote processes.
Enumerates running processes several parses....
19.exe
[ General_Information]
File might be compressed.
Decompressing Unk3!FSG?.
Accesses executable file from resource section.
Drops files in %WINSYS% folder.
Creating several executable files on hard-drive.
File length: 176813 bytes.
MD5 hash: db6bcdf0d382fbd9bfc42ba7cf3fc41e.
[ Changes to registry ]
Creates value "KVP"="C:\WINDOWS\SYSTEM32\drivers\svchost.exe" in key "HKLM\Software\Microsoft\Windows\CurrentVersion\Run".
[ Process-window information ]
Will automatically restart after boot (I'll be back...).
Creates process "C:\WINDOWS\SYSTEM32\drivers\svchost.exe".
Attemps to open C:\WINDOWS\SYSTEM32\drivers\scvhost.exe -idx 0 -ip 192..
Creates process "C:\WINDOWS\SYSTEM32\drivers\scvhost.exe".
2.exe
[ General_Information]
Decompressing Upack?.
**Locates window "NULL [class AVP.AlertDialog]" on desktop.
**Locates window "NULL [class AVP.Product_Notification]" on desktop.
**Locates window "瑞星注册表监控提示 [class NULL]" on desktop.
[ Process-window information ]
Creates an event called 63925483.
[ Network_Services ]
Downloads file from hxxp://sdo.969111.com/wm/hosts.txt as C:\WINDOWS\system32\drivers\etc\hosts.
Connects to "sdo.969111.com" on port 80 (TCP).
Opens URL: sdo.969111.com/wm/hosts.txt.
[ Changes to registry ]
Creates key "HKLM\System\CurrentControlSet\Services\PciHdd".
Sets value "ImagePath"="C:\WINDOWS\system32\drivers\pcihdd.sys" in key "HKLM\System\CurrentControlSet\Services\PciHdd".
Sets value "DisplayName"="PciHdd" in key "HKLM\System\CurrentControlSet\Services\PciHdd".
[ Process-window information ]
Creates service "PciHdd (PciHdd)" as "C:\WINDOWS\system32\drivers\pcihdd.sys".
Attempts to access service "PciHdd".
[ Changes to registry ]
Creates key "HKLM\System\CurrentControlSet\Services\AsyncMac".
Creates key "HKLM\System\CurrentControlSet\Services\comint32".
Sets value "ImagePath"="C:\WINDOWS\SYSTEM32\DRIVERS\comint32.sys" in key "HKLM\System\CurrentControlSet\Services\comint32".
Sets value "DisplayName"="comint32" in key "HKLM\System\CurrentControlSet\Services\comint32".
[ Process-window information ]
Attempts to access service "comint32".
Creates service "comint32 (comint32)" as "C:\WINDOWS\SYSTEM32\DRIVERS\comint32.sys".
Creates a mutex __B_JZ.
[ Changes to registry ]
Creates key "HKLM\System\CurrentControlSet\Services\AsyncMac".
Creates key "HKLM\System\CurrentControlSet\Services\comint32".
Sets value "ImagePath"="C:\WINDOWS\SYSTEM32\DRIVERS\comint32.sys" in key "HKLM\System\CurrentControlSet\Services\comint32".
Sets value "DisplayName"="comint32" in key "HKLM\System\CurrentControlSet\Services\comint32".
[ Process-window information ]
Enumerates running processes.
Attempts to access service "comint32".
Creates service "comint32 (comint32)" as "C:\WINDOWS\SYSTEM32\DRIVERS\comint32.sys".
Creates a mutex __B_q qHX.
[ Changes to registry ]
Creates key "HKCR\CLSID\{5A321487-4977-D98A-C8D5-6488257545A5}\InprocServer32".
Sets value ""="C:\WINDOWS\SYSTEM32\kapjezy.dll" in key "HKCR\CLSID\{5A321487-4977-D98A-C8D5-6488257545A5}\InprocServer32".
Sets value "ThreadingModel"="Apartment" in key "HKCR\CLSID\{5A321487-4977-D98A-C8D5-6488257545A5}\InprocServer32".
Creates value "{5A321487-4977-D98A-C8D5-6488257545A5}"="kapjezy.dll" in key "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks".
[ Changes to system settings ]
Modifies profile key "Url1"="827468686C2633337372707572796B7B327F723364757D737E7D73337D2B24252A2A2A7D327D6F6C" in section [Send] of file C:\WINDOWS\Fonts\enpoafx.fon.
Modifies profile key "Url1"="hxxp://onlinewg.cn/xiaobao/a789666a.asp" in section [Send] of file C:\WINDOWS\Fonts\kapjecs.dll.
Creates Windows_Hook_monitoring _keyboard activity.
Creates Windows_Hook_monitoring _mouse activity.
[ Network ]
Hooks into Shell explorer.
[ Process-window information ]
Enumerates running processes.
Creates process "C:\WINDOWS\SYSTEM32\kapjeaz.exe".
[ Changes to registry ]
Creates key "HKCR\CLSID\{24909874-8982-F344-A322-7898787FA742}\InprocServer32".
Sets value ""="C:\WINDOWS\SYSTEM32\swjqbzc.dll" in key "HKCR\CLSID\{24909874-8982-F344-A322-7898787FA742}\InprocServer32".
Sets value "ThreadingModel"="Apartment" in key "HKCR\CLSID\{24909874-8982-F344-A322-7898787FA742}\InprocServer32".
Creates value "{24909874-8982-F344-A322-7898787FA742}"="swjqbzc.dll" in key "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks".
[ Changes to system settings ]
Modifies profile key "Url1"="699F838387CDD8D8808080D9879CC2C6C0C4D99499D890969A92D88F95D88F8F8FD9968487" in section [Send] of file C:\WINDOWS\Fonts\wijiafw.fon.
Modifies profile key "Url1"="hxxp://www.pk5173.cn/game/xb/xxx.asp" in section [Send] of file C:\WINDOWS\Fonts\swjqbcs.dll.
Creates Windows_Hook_monitoring _keyboard activity.
Creates Windows_Hook_monitoring _mouse activity.
[ Network ]
Hooks into Shell explorer.
[ Process-window information ]
Enumerates running processes.
Creates process "C:\WINDOWS\SYSTEM32\swjqbac.exe".
Enumerates running processes several parses....
3.exe
[ General_Information]
**Locates window "NULL [class AVP.AlertDialog]" on desktop.
**Locates window "NULL [class AVP.Product_Notification]" on desktop.
**Locates window "瑞星注册表监控提示 [class NULL]" on desktop.
[ Process-window information ]
Creates an event called 51343281.
4.exe
[ General_Information]
Drops files in %WINSYS% folder.
**Locates window "瑞星注册表监控提示 [class #32770]" on desktop.
**Locates window "IE 执行保护 [class #32770]" on desktop.
**Locates window "瑞星卡卡上网安全助手 - IE防漏墙 [class #32770]" on desktop.
**Locates window "NULL [class AVP.AlertDialog]" on desktop.
**Locates window "NULL [class AVP.Product_Notification]" on desktop.
**Locates window "NULL [class AVP.TrafficMonConnectionTerm]" on desktop.