VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:34
Behavior list
Basic Information
MD5:07270db65db7e6bc80f7713845a8300a
file type:EXE
Production company:
version:
Shell or compiler information:PACKER:FSG 2.0 -> bart/xt
Subfile information:fsg2.0_49ebbdc5dumpFile / b0098099a69bfc71a1801d6d6476bb98 / EXE
Key behavior
Behavior description:跨进程写入数据
details:TargetProcess = C:\WINDOWS\system32\svchost.exe, WriteAddress = 0x7ffd8008, Size = 0x00000004
TargetProcess = C:\WINDOWS\system32\svchost.exe, WriteAddress = 0x00400000, Size = 0x00028000
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x7ffda008, Size = 0x00000004
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00400000, Size = 0x00028000
Behavior description:在系统目录释放敏感文件
details:C:\WINDOWS\Fonts\eobg.fon
C:\WINDOWS\Fonts\rkdq.fon
Behavior description:修改注册表_镜像劫持
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360hotfix.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rpt.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safebox.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\adam.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AgentSvr.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AntiArp.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AppSvc32.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\arvmon.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AutoGuarder.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgrssvc.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvMonitor.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.com\Debugger
Behavior description:常规加载驱动
details:\??\C:\WINDOWS\Fonts\eobg.fon
Behavior description:对比可疑进程名
details:lstrcmpiA: [System Process] <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: System <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: smss.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: csrss.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: winlogon.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: services.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: lsass.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: 33oxService.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: 33acthlp.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: svchost.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: spoolsv.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: 33UpgradeHelper.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: alg.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: explorer.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: 33oxTray.exe <------> 360Safe.exe Des: 360安全卫士
Behavior description:杀掉进程
details:C:\WINDOWS\system32\360tray.exe
C:\WINDOWS\system32\RavMon.exe
Behavior description:设置线程上下文
details:C:\Program Files\Common Files\SysAnti.exe
C:\WINDOWS\system32\svchost.exe
Behavior description:获取TickCount值
details:TickCount = 5350287, SleepMilliseconds = 100.
TickCount = 5350475, SleepMilliseconds = 100.
TickCount = 5350506, SleepMilliseconds = 100.
TickCount = 5350537, SleepMilliseconds = 100.
TickCount = 5350553, SleepMilliseconds = 100.
TickCount = 5350568, SleepMilliseconds = 100.
TickCount = 5350631, SleepMilliseconds = 100.
TickCount = 5350678, SleepMilliseconds = 100.
TickCount = 5350709, SleepMilliseconds = 100.
TickCount = 5350771, SleepMilliseconds = 100.
TickCount = 5350803, SleepMilliseconds = 100.
TickCount = 5350834, SleepMilliseconds = 100.
TickCount = 5351350, SleepMilliseconds = 100.
TickCount = 5351381, SleepMilliseconds = 100.
TickCount = 5351412, SleepMilliseconds = 100.
Behavior description:修改HOST文件
details:C:\WINDOWS\system32\drivers\etc\hosts ---> Offset = 0
Behavior description:设置特殊文件属性
details:C:\Program Files\Common Files\SysAnti.exe
C:\SysAnti.exe
C:\DiskD\SysAnti.exe
C:\DiskX\SysAnti.exe
Behavior description:在根目录创建自运行文件
details:C:\AutoRun.inf
C:\DiskD\AutoRun.inf
C:\DiskX\AutoRun.inf
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\IETldCache
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache
Behavior description:创建系统服务
details:[服务创建成功]: DrvKiller, C:\WINDOWS\Fonts\eobg.fon
[服务已存在]: DrvKiller, C:\WINDOWS\Fonts\rkdq.fon
Behavior description:修改注册表_启动项
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run\SysAnti
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = , CmdLine = C:\Program Files\Common Files\SysAnti.exe -One
ImagePath = , CmdLine = C:\WINDOWS\System32\Svchost.exe
ImagePath = , CmdLine = C:\Program Files\Internet Explorer\IEXPLORE.EXE -Down
Behavior description:创建进程
details:ImagePath = C:\WINDOWS\system32\rundll32.exe, CmdLine = C:\WINDOWS\System32\Rundll32.exe "C:\WINDOWS\Fonts\peitk.dll",MyKILLEntry
ImagePath = C:\WINDOWS\system32\rundll32.exe, CmdLine = C:\WINDOWS\System32\Rundll32.exe "C:\WINDOWS\Fonts\vkphd.dll",MyKILLEntry
ImagePath = C:\WINDOWS\system32\svchost.exe, CmdLine = C:\WINDOWS\System32\Svchost.exe
ImagePath = C:\Program Files\Internet Explorer\iexplore.exe, CmdLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -Down
ImagePath = C:\Program Files\Internet Explorer\iexplore.exe, CmdLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:79873
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 888, ThreadID = 1456, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 888, ThreadID = 124, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 888, ThreadID = 1136, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 888, ThreadID = 716, StartAddress = 6302B849, Parameter = 0018D1C0
TargetProcess: SysAnti.exe, InheritedFromPID = 888, ProcessID = 968, ThreadID = 796, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: svchost.exe, InheritedFromPID = 968, ProcessID = 1528, ThreadID = 2056, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: iexplore.exe, InheritedFromPID = 1528, ProcessID = 2060, ThreadID = 2068, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: iexplore.exe, InheritedFromPID = 940, ProcessID = 2112, ThreadID = 2120, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: iexplore.exe, InheritedFromPID = 940, ProcessID = 2112, ThreadID = 2136, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: iexplore.exe, InheritedFromPID = 940, ProcessID = 2112, ThreadID = 2140, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: iexplore.exe, InheritedFromPID = 940, ProcessID = 2112, ThreadID = 2144, StartAddress = 7C949B6F, Parameter = 00000000
TargetProcess: iexplore.exe, InheritedFromPID = 940, ProcessID = 2112, ThreadID = 2148, StartAddress = 77E56C7D, Parameter = 00196038
TargetProcess: iexplore.exe, InheritedFromPID = 940, ProcessID = 2112, ThreadID = 2152, StartAddress = 5DE05ABD, Parameter = 00197F50
TargetProcess: iexplore.exe, InheritedFromPID = 940, ProcessID = 2112, ThreadID = 2156, StartAddress = 5DE05BC0, Parameter = 001938A8
TargetProcess: iexplore.exe, InheritedFromPID = 940, ProcessID = 2112, ThreadID = 2160, StartAddress = 0122F74F, Parameter = 00000208
Behavior description:跨进程写入数据
details:TargetProcess = C:\WINDOWS\system32\svchost.exe, WriteAddress = 0x7ffd8008, Size = 0x00000004
TargetProcess = C:\WINDOWS\system32\svchost.exe, WriteAddress = 0x00400000, Size = 0x00028000
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x7ffda008, Size = 0x00000004
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00400000, Size = 0x00028000
Behavior description:设置线程上下文
details:C:\Program Files\Common Files\SysAnti.exe
C:\WINDOWS\system32\svchost.exe
Behavior description:枚举进程
details:N/A
Behavior description:杀掉进程
details:C:\WINDOWS\system32\360tray.exe
C:\WINDOWS\system32\RavMon.exe
Behavior description:创建新文件进程
details:ImagePath = C:\Program Files\Common Files\SysAnti.exe, CmdLine = "C:\Program Files\Common Files\SysAnti.exe" -One
File behavior
Behavior description:创建文件
details:C:\WINDOWS\Fonts\peitk.dll
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6P4O8QNJ\wpad[1].dat
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6P4O8QNJ\Count[1].asp
C:\Program Files\Common Files\SysAnti.exe
C:\WINDOWS\Fonts\vkphd.dll
C:\SysAnti.exe
C:\DiskD\SysAnti.exe
C:\DiskX\SysAnti.exe
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{D1713420-3D01-11E6-91BE-7B****28}.dat
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF416F.tmp
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\{D1713421-3D01-11E6-91BE-7B****28}.dat
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF61D6.tmp
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6P4O8QNJ\dnserrordiagoff[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\ErrorPageTemplate[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\errorPageStrings[1]
Behavior description:创建可执行文件
details:C:\WINDOWS\Fonts\peitk.dll
C:\WINDOWS\Fonts\eobg.fon
C:\Program Files\Common Files\SysAnti.exe
C:\WINDOWS\Fonts\vkphd.dll
C:\WINDOWS\Fonts\rkdq.fon
C:\SysAnti.exe
C:\DiskD\SysAnti.exe
C:\DiskX\SysAnti.exe
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
C:\Documents and Settings\Administrator\Local Settings\Temp\Kno4C.tmp
Behavior description:删除文件
details:C:\WINDOWS\Fonts\eobg.fon
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6P4O8QNJ\wpad[1].dat
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6P4O8QNJ\Count[1].asp
C:\WINDOWS\Fonts\rkdq.fon
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF416F.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF61D6.tmp
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\dnserrordiagoff[2]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\ErrorPageTemplate[2]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\errorPageStrings[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\httpErrorPagesScripts[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\noConnect[3]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\bullet[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\background_gradient[2]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\down[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\favcenter[3]
Behavior description:覆盖已有文件
details:C:\WINDOWS\system32\drivers\etc\hosts
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6P4O8QNJ\dnserrordiagoff[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\ErrorPageTemplate[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\errorPageStrings[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\httpErrorPagesScripts[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\noConnect[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\bullet[2]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\background_gradient[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\down[2]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\favcenter[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\tools[2]
C:\Documents and Settings\Administrator\Local Settings\Temp\Kno4C.tmp
Behavior description:复制文件
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe ---> C:\Program Files\Common Files\SysAnti.exe
Behavior description:修改HOST文件
details:C:\WINDOWS\system32\drivers\etc\hosts ---> Offset = 0
Behavior description:设置特殊文件属性
details:C:\Program Files\Common Files\SysAnti.exe
C:\SysAnti.exe
C:\DiskD\SysAnti.exe
C:\DiskX\SysAnti.exe
Behavior description:查找文件
details:FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
FileName = C:\WINDOWS
FileName = C:\WINDOWS\System32
FileName = C:\WINDOWS\System32\Rundll32.exe
FileName = C:\WINDOWS\system32
FileName = C:\WINDOWS\system32\rundll32.exe
FileName = C:\Program Files\Common Files\SysAnti.exe
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\WINDOWS\system32\Ras\*.pbk
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\WINDOWS\System32\Svchost.exe
FileName = C:\WINDOWS\system32\svchost.exe
Behavior description:在系统目录释放敏感文件
details:C:\WINDOWS\Fonts\eobg.fon
C:\WINDOWS\Fonts\rkdq.fon
Behavior description:在根目录创建自运行文件
details:C:\AutoRun.inf
C:\DiskD\AutoRun.inf
C:\DiskX\AutoRun.inf
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\IETldCache
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache
Behavior description:修改文件内容
details:C:\WINDOWS\Fonts\peitk.dll ---> Offset = 0
C:\WINDOWS\Fonts\eobg.fon ---> Offset = 0
C:\Program Files\Common Files\SysAnti.exe ---> Offset = 0
C:\Program Files\Common Files\SysAnti.exe ---> Offset = 4096
C:\Program Files\Common Files\SysAnti.exe ---> Offset = 8192
C:\Program Files\Common Files\SysAnti.exe ---> Offset = 12288
C:\WINDOWS\Fonts\vkphd.dll ---> Offset = 0
C:\WINDOWS\Fonts\rkdq.fon ---> Offset = 0
C:\AutoRun.inf ---> Offset = 0
C:\SysAnti.exe ---> Offset = 0
C:\DiskD\AutoRun.inf ---> Offset = 0
C:\DiskD\SysAnti.exe ---> Offset = 0
C:\DiskX\AutoRun.inf ---> Offset = 0
C:\DiskX\SysAnti.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{D1713420-3D01-11E6-91BE-7B****28}.dat ---> Offset = 512
Network behavior
Behavior description:联网打开网址
details:InternetOpenUrlA: http://**.133.40.**:128/wpad.dat, hInternet = 0x00cc0010, Flags = 0x00000010
InternetOpenUrlA: http://**.133.40.**:128/wpad.dat, hInternet = 0x00cc0004, Flags = 0x80000010
Behavior description:下载文件
details:URLDownloadToFileW: http://ww****om/favicon.ico ---> C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
URLDownloadToFileW: https://go****om/fwlink/?LinkId=141260 ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Kno4C.tmp
Behavior description:连接指定站点
details:InternetConnectA: ServerName = qm****cn, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = **.133.40.**, PORT = 128, UserName = , Password = , hSession = 0x00cc0010, hConnect = 0x00cc0014, Flags = 0x00000010
InternetConnectA: ServerName = **.133.40.**, PORT = 128, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x80000010
InternetConnectA: ServerName = ww****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = go****om, PORT = 443, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00800000
Behavior description:打开HTTP连接
details:InternetOpenA: UserAgent: MyApp, hSession = 0x00cc0004
InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0), hSession = 0x00cc0010
InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0), hSession = 0x00cc0004
InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489), hSession = 0x00cc0004
Behavior description:建立到一个指定的套接字连接
details:URL: wpad, IP: **.133.40.**:128, SOCKET = 0x00000544
URL: qm****cn, IP: **.133.40.**:80, SOCKET = 0x00000548
URL: wpad, IP: **.133.40.**:128, SOCKET = 0x000004bc
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x000004f4
URL: go****om, IP: **.133.40.**:443, SOCKET = 0x00000694
Behavior description:读取网络文件
details:hFile = 0x00cc0018, BytesToRead =4010, BytesRead = 4010.
hFile = 0x00cc000c, BytesToRead =1024, BytesRead = 1024.
hFile = 0x00cc000c, BytesToRead =4010, BytesRead = 4010.
Behavior description:发送HTTP包
details:GET /wpad.dat HTTP/1.1 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0) Host: **.133.40.**:128
POST /Count/Count.asp HTTP/1.1 Accept: Accept: */* Content-Type: application/x-www-form-urlencoded User-Agent: MyApp Host: qm****cn Content-Length: 85 Cache-Control: no-cache Mac=7B-*-*-*-*-28&Os=Windows+XP&Ver=20090530&Key=01d0ebe975be443db62124fb5f19b197
GET /wpad.dat HTTP/1.1 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0) Host: **.133.40.**:128 Cache-Control: no-cache
GET /favicon.ico HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: ww****om Connection: Keep-Alive
Behavior description:打开HTTP请求
details:HttpOpenRequestA: qm****cn:80/count/count.asp, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: POST, Referer: , Flags = 0x80000000
HttpOpenRequestA: **.133.40.**:128/wpad.dat, hConnect = 0x00cc0014, hRequest = 0x00cc0018, Verb: GET, Referer: , Flags = 0x00000010
HttpOpenRequestA: **.133.40.**:128/wpad.dat, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x80000010
HttpOpenRequestA: ww****om:80/favicon.ico, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00600010
HttpOpenRequestA: go****om:443/fwlink/?linkid=141260, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00c00010
Behavior description:按名称获取主机地址
details:GetAddrInfoW: computer
GetAddrInfoW: wpad
GetAddrInfoW: qm****cn
GetAddrInfoW: ww****om
GetAddrInfoW: go****om
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\996E\DEBUG\Trace Level
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\Recovery\Active\{D1713420-3D01-11E6-91BE-7B****28}
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\{63800dac-e7ca-4df9-9a5c-20765055488d}\Enable
\REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1EA4DBF0-3C3B-11CF-810C-00AA00389B71}\1.1\0\win32\
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\Main\Window_Placement
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Count
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Time
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTime
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTimeCount
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore\Count
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore\Time
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBA}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBA}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBA}\InprocServer32\ThreadingModel
Behavior description:删除注册表键值
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\996E\DEBUG\Trace Level
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0\Expiration
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1\Expiration
Behavior description:删除注册表键
details:\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\{63800dac-e7ca-4df9-9a5c-20765055488d}\
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBA}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBA}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBB}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBB}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBC}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBC}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-FFFF-ABCDEFFEDCBA}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-FFFF-ABCDEFFEDCBA}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\
\REGISTRY\USER\S-*_CLASSES\JavaPlugin.1000\CLSID\
Behavior description:修改注册表_镜像劫持
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360hotfix.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rpt.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safebox.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\adam.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AgentSvr.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AntiArp.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AppSvc32.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\arvmon.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AutoGuarder.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgrssvc.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvMonitor.exe\Debugger
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.com\Debugger
Behavior description:修改注册表_启动项
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run\SysAnti
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
RasPbFile
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
Local\c:!documents and settings!administrator!ietldcache!
SnowDownVip2009v2
SnowDownVip2009v2-Down
Local\!BrowserEmulation!SharedMemory!Mutex
Behavior description:隐藏指定窗口
details:[Window,Class] = [,BrowserFrameGripperClass]
[Window,Class] = [缩放级别,ToolbarWindow32]
[Window,Class] = [,msctls_progress32]
Behavior description:常规加载驱动
details:\??\C:\WINDOWS\Fonts\eobg.fon
Behavior description:对比可疑进程名
details:lstrcmpiA: [System Process] <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: System <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: smss.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: csrss.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: winlogon.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: services.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: lsass.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: 33oxService.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: 33acthlp.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: svchost.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: spoolsv.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: 33UpgradeHelper.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: alg.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: explorer.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: 33oxTray.exe <------> 360Safe.exe Des: 360安全卫士
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
NtUserFindWindowEx: [Class,Window] = [Static,]
Behavior description:启动系统服务
details:[服务启动成功]: , DrvKiller, \??\C:\WINDOWS\Fonts\eobg.fon
Behavior description:获取TickCount值
details:TickCount = 5350287, SleepMilliseconds = 100.
TickCount = 5350475, SleepMilliseconds = 100.
TickCount = 5350506, SleepMilliseconds = 100.
TickCount = 5350537, SleepMilliseconds = 100.
TickCount = 5350553, SleepMilliseconds = 100.
TickCount = 5350568, SleepMilliseconds = 100.
TickCount = 5350631, SleepMilliseconds = 100.
TickCount = 5350678, SleepMilliseconds = 100.
TickCount = 5350709, SleepMilliseconds = 100.
TickCount = 5350771, SleepMilliseconds = 100.
TickCount = 5350803, SleepMilliseconds = 100.
TickCount = 5350834, SleepMilliseconds = 100.
TickCount = 5351350, SleepMilliseconds = 100.
TickCount = 5351381, SleepMilliseconds = 100.
TickCount = 5351412, SleepMilliseconds = 100.
Behavior description:调整进程token权限
details:SE_DEBUG_PRIVILEGE
SE_LOAD_DRIVER_PRIVILEGE
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
Global\SvcctrlStartEvent_A3752DX
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
\INSTALLATION_SECURITY_HOLD
Global\crypt32LogoffEvent
Isolation Signal Registry Event (D171341D-3D01-11E6-91BE-7B****28, 0)
Isolation Signal Registry Event (D171341E-3D01-11E6-91BE-7B****28, 0)
IE_EarlyTabStart_0x844
_fCanRegisterWithShellService
MSFT.VSA.COM.DISABLE.2112
MSFT.VSA.IEC.STATUS.6c736db0
MSFT.VSA.COM.DISABLE.2180
Local\RSS Eventing Event Event 00000840
Behavior description:可执行文件签名信息
details:C:\WINDOWS\Fonts\peitk.dll(签名验证: 未通过)
C:\WINDOWS\Fonts\eobg.fon(签名验证: 未通过)
C:\Program Files\Common Files\SysAnti.exe(签名验证: 未通过)
C:\WINDOWS\Fonts\vkphd.dll(签名验证: 未通过)
C:\WINDOWS\Fonts\rkdq.fon(签名验证: 未通过)
C:\SysAnti.exe(签名验证: 未通过)
C:\DiskD\SysAnti.exe(签名验证: 未通过)
C:\DiskX\SysAnti.exe(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\Kno4C.tmp(签名验证: 未通过)
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 100.
[2]: MilliSeconds = 100.
[3]: MilliSeconds = 100.
[4]: MilliSeconds = 100.
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = Global\userenv: User Profile setup event
EventName = Global\crypt32LogoffEvent
EventName = Isolation Signal Registry Event (D171341D-3D01-11E6-91BE-7B****28, 0)
EventName = IE_EarlyTabStart_0x844
EventName = Isolation Signal Registry Event (D171341E-3D01-11E6-91BE-7B****28, 0)
EventName = Local\RSS Eventing Event Event 00000840
EventName = IEFrame.EventCheckDefaultBrowser
EventName = Local\Feed Arbitration Lock Event [ Process : 0x00000840 ]
EventName = Local\Feed Arbitration Unlock Event [ Process : 0x00000840 ]
Behavior description:可执行文件MD5
details:C:\WINDOWS\Fonts\peitk.dll ---> 4b77cf1af4536852fa7a9e055610daee
C:\WINDOWS\Fonts\eobg.fon ---> 0da780782b9de4153113c9cf581e4332
C:\Program Files\Common Files\SysAnti.exe ---> 07270db65db7e6bc80f7713845a8300a
C:\WINDOWS\Fonts\vkphd.dll ---> 4b77cf1af4536852fa7a9e055610daee
C:\WINDOWS\Fonts\rkdq.fon ---> 0da780782b9de4153113c9cf581e4332
C:\SysAnti.exe ---> 07270db65db7e6bc80f7713845a8300a
C:\DiskD\SysAnti.exe ---> 07270db65db7e6bc80f7713845a8300a
C:\DiskX\SysAnti.exe ---> 07270db65db7e6bc80f7713845a8300a
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico ---> fe1d0ee5901dd167ee9b28eece31786c
C:\Documents and Settings\Administrator\Local Settings\Temp\Kno4C.tmp ---> fe1d0ee5901dd167ee9b28eece31786c
Behavior description:打开互斥体
details:SnowDownVip2009v2
ShimCacheMutex
Local\_!MSFTHISTORY!_
Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Local\c:!documents and settings!administrator!cookies!
Local\c:!documents and settings!administrator!local settings!history!history.ie5!
Local\WininetStartupMutex
Local\WininetConnectionMutex
Local\WininetProxyRegistryMutex
RasPbFile
Local\!IETld!Mutex
Local\c:!documents and settings!administrator!ietldcache!
Local\!BrowserEmulation!SharedMemory!Mutex
CtfmonInstMutexDefaultS-*
Local\RSS Eventing Connection Database Mutex 00000840
Behavior description:创建系统服务
details:[服务创建成功]: DrvKiller, C:\WINDOWS\Fonts\eobg.fon
[服务已存在]: DrvKiller, C:\WINDOWS\Fonts\rkdq.fon
Behavior description:加载新释放的文件
details:Image: C:\WINDOWS\Fonts\peitk.dll.
Image: C:\WINDOWS\Fonts\vkphd.dll.
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号