VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:14
Behavior list
Basic Information
MD5:1df3d1f353e6df17a3cae0d80256a590
file type:EXE
Production company:杭州顺网科技股份有限公司
version:2014.9.23.1---2014,09,23,1
Shell or compiler information:
Key behavior
Behavior description:修改原系统的EXE文件
details:C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE---> Offset = 12382208
C:\WINDOWS\system32\Cmb_Pb_LiveUpdate.exe---> Offset = 397312
C:\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe---> Offset = 98816
C:\Program Files\VMware\VMware Tools\VMwareTray.exe---> Offset = 253952
C:\Program Files\VMware\VMware Tools\VMwareUser.exe---> Offset = 1167360
C:\Program Files\Microsoft Office 2007\Office12\WINWORD.EXE---> Offset = 475136
C:\Program Files\Microsoft Office 2007\Office12\POWERPNT.EXE---> Offset = 580608
Behavior description:跨进程写入数据
details:C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Tencent\QQ\Bin\QQ.exe
TargetProcess = TXPlatform.exe, WriteAddress = 0x01220000, Size = 8192
C:\Program Files\Tencent\QQ\Bin\TXPlatform.exe
TargetProcess = TXPlatform.exe, WriteAddress = 0x01230000, Size = 4096
C:\WINDOWS\system32\conime.exe
TargetProcess = conime.exe, WriteAddress = 0x00e30000, Size = 4096
C:\WINDOWS\system32\PersonalBankPortal.exe
C:\%temp%\1446010776.202595.exe
C:\%temp%\1446010776.209511.exe
TargetProcess = taskmgr.exe, WriteAddress = 0x00b60000, Size = 8192
C:\WINDOWS\system32\taskmgr.exe
TargetProcess = Simulator.exe, WriteAddress = 0x00de0000, Size = 8192
C:\%temp%\1446010776.244140.exe
Behavior description:获取文件属性探测虚拟机
details:GetFileAttributes: FileName = c:\program files\vmware\vmware tools\vmwaretray.exe
GetFileAttributes: FileName = c:\program files\vmware\vmware tools\vmwareuser.exe
GetFileAttributes: FileName = c:\windows\system32\vboxtray.exe
Behavior description:修改注册表_系统防火墙可信进程列表
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1446010778.489927.exe
Behavior description:修改注册表_UAC关键设置
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\EnableLUA
Behavior description:常规加载驱动
details:system32\DRIVERS\ipfltdrv.sys
\??\C:\WINDOWS\system32\drivers\plrph.sys
Behavior description:创建远程线程
details:C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Tencent\QQ\Bin\QQ.exe
C:\Program Files\Tencent\QQ\Bin\TXPlatform.exe
C:\WINDOWS\system32\conime.exe
C:\WINDOWS\system32\PersonalBankPortal.exe
C:\%temp%\1446010778.586745.exe
C:\%temp%\1446010778.593652.exe
C:\WINDOWS\system32\taskmgr.exe
C:\%temp%\1446010778.614306.exe
C:\%temp%\1446010778.621229.exe
C:\WINDOWS\system32\patchupdate.exe
C:\WINDOWS\system32\tm.exe
C:\Program Files\Internet Explorer\iexplore.exe
Behavior description:内存映射方式修改可执行文件
details:\device\harddiskvolume1\program files\microsoft office\office11\winword.exe
\device\harddiskvolume1\windows\system32\notepad.exe
\device\harddiskvolume1\windows\system32\cmb_pb_liveupdate.exe
\device\harddiskvolume1\program files\adobe\reader 9.0\reader\reader_sl.exe
\device\harddiskvolume1\windows\system32\cmd.exe
\device\harddiskvolume1\program files\vmware\vmware tools\vmwaretray.exe
\device\harddiskvolume1\program files\vmware\vmware tools\vmwareuser.exe
\device\harddiskvolume1\program files\microsoft office 2007\office12\winword.exe
\device\harddiskvolume1\program files\microsoft office 2007\office12\powerpnt.exe
\device\harddiskvolume1\program files\microsoft office 2007\office12\excel.exe
Behavior description:设置特殊文件属性
details:C:\vageie.pif
C:\DiskD\gwlfgw.exe
C:\DiskX\wukt.exe
C:\Program Files\VMware\VMware Tools\VMwareTray.exe
C:\Program Files\VMware\VMware Tools\VMwareUser.exe
Behavior description:停止系统服务
details:ServiceName = Application Layer Gateway Service
ServiceName = Windows Firewall/Internet Connection Sharing (ICS)
ServiceName = Security Center
Behavior description:尝试连接RootKit驱动设备对象
details:\??\amsint32
Behavior description:写权限映射文件
details:hh8geqpHJTkdns6
purity_control_7728
\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winyllc.exe
\DOCUME~1\ADMINI~1\LOCALS~1\Temp\pgqhy.exe
\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE
\WINDOWS\system32\notepad.exe
\WINDOWS\system32\Cmb_Pb_LiveUpdate.exe
\DiskD\gwlfgw.exe
\DiskX\wukt.exe
Local\UrlZonesSM_Administrator
\WINDOWS\system32\zh-cn\ieframe.dll.mui
\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe
\WINDOWS\system32\cmd.exe
\Program Files\VMware\VMware Tools\VMwareTray.exe
\Program Files\VMware\VMware Tools\VMwareUser.exe
Behavior description:在根目录创建自运行文件
details:C:\autorun.inf
C:\DiskD\autorun.inf
C:\DiskX\autorun.inf
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:创建系统服务
details:[服务已存在]: IPFILTERDRIVER, C:\WINDOWS\system32\drivers\ipfltdrv.sys
[服务创建成功]: amsint32, C:\WINDOWS\system32\drivers\plrph.sys
Process behavior
Behavior description:跨进程写入数据
details:C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Tencent\QQ\Bin\QQ.exe
TargetProcess = TXPlatform.exe, WriteAddress = 0x01220000, Size = 8192
C:\Program Files\Tencent\QQ\Bin\TXPlatform.exe
TargetProcess = TXPlatform.exe, WriteAddress = 0x01230000, Size = 4096
C:\WINDOWS\system32\conime.exe
TargetProcess = conime.exe, WriteAddress = 0x00e30000, Size = 4096
C:\WINDOWS\system32\PersonalBankPortal.exe
C:\%temp%\1446010776.202595.exe
C:\%temp%\1446010776.209511.exe
TargetProcess = taskmgr.exe, WriteAddress = 0x00b60000, Size = 8192
C:\WINDOWS\system32\taskmgr.exe
TargetProcess = Simulator.exe, WriteAddress = 0x00de0000, Size = 8192
C:\%temp%\1446010776.244140.exe
Behavior description:创建远程线程
details:C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Tencent\QQ\Bin\QQ.exe
C:\Program Files\Tencent\QQ\Bin\TXPlatform.exe
C:\WINDOWS\system32\conime.exe
C:\WINDOWS\system32\PersonalBankPortal.exe
C:\%temp%\1446010778.586745.exe
C:\%temp%\1446010778.593652.exe
C:\WINDOWS\system32\taskmgr.exe
C:\%temp%\1446010778.614306.exe
C:\%temp%\1446010778.621229.exe
C:\WINDOWS\system32\patchupdate.exe
C:\WINDOWS\system32\tm.exe
C:\Program Files\Internet Explorer\iexplore.exe
Behavior description:枚举进程
details:N/A
Behavior description:创建进程
details:ImagePath = C:\Program Files\Internet Explorer\IEXPLORE.EXE, CmdLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.yixun.com/
File behavior
Behavior description:修改原系统的EXE文件
details:C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE---> Offset = 12382208
C:\WINDOWS\system32\Cmb_Pb_LiveUpdate.exe---> Offset = 397312
C:\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe---> Offset = 98816
C:\Program Files\VMware\VMware Tools\VMwareTray.exe---> Offset = 253952
C:\Program Files\VMware\VMware Tools\VMwareUser.exe---> Offset = 1167360
C:\Program Files\Microsoft Office 2007\Office12\WINWORD.EXE---> Offset = 475136
C:\Program Files\Microsoft Office 2007\Office12\POWERPNT.EXE---> Offset = 580608
Behavior description:创建可执行文件
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winyllc.exe
C:\WINDOWS\system32\drivers\plrph.sys
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\pgqhy.exe
C:\vageie.pif
C:\DiskD\gwlfgw.exe
C:\DiskX\wukt.exe
Behavior description:查找文件
details:FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\*
FileName = C:\*
FileName = C:\AnalyzeControl\*
FileName = D:\*
FileName = E:\*
FileName = C:\DiskD\*
FileName = F:\*
FileName = G:\*
FileName = C:\DiskX\*
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\My Documents
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\Documents
FileName = C:\Documents and Settings\Administrator\桌面
Behavior description:内存映射方式修改可执行文件
details:\device\harddiskvolume1\program files\microsoft office\office11\winword.exe
\device\harddiskvolume1\windows\system32\notepad.exe
\device\harddiskvolume1\windows\system32\cmb_pb_liveupdate.exe
\device\harddiskvolume1\program files\adobe\reader 9.0\reader\reader_sl.exe
\device\harddiskvolume1\windows\system32\cmd.exe
\device\harddiskvolume1\program files\vmware\vmware tools\vmwaretray.exe
\device\harddiskvolume1\program files\vmware\vmware tools\vmwareuser.exe
\device\harddiskvolume1\program files\microsoft office 2007\office12\winword.exe
\device\harddiskvolume1\program files\microsoft office 2007\office12\powerpnt.exe
\device\harddiskvolume1\program files\microsoft office 2007\office12\excel.exe
Behavior description:设置特殊文件属性
details:C:\vageie.pif
C:\DiskD\gwlfgw.exe
C:\DiskX\wukt.exe
C:\Program Files\VMware\VMware Tools\VMwareTray.exe
C:\Program Files\VMware\VMware Tools\VMwareUser.exe
Behavior description:写权限映射文件
details:hh8geqpHJTkdns6
purity_control_7728
\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winyllc.exe
\DOCUME~1\ADMINI~1\LOCALS~1\Temp\pgqhy.exe
\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE
\WINDOWS\system32\notepad.exe
\WINDOWS\system32\Cmb_Pb_LiveUpdate.exe
\DiskD\gwlfgw.exe
\DiskX\wukt.exe
Local\UrlZonesSM_Administrator
\WINDOWS\system32\zh-cn\ieframe.dll.mui
\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe
\WINDOWS\system32\cmd.exe
\Program Files\VMware\VMware Tools\VMwareTray.exe
\Program Files\VMware\VMware Tools\VMwareUser.exe
Behavior description:在根目录创建自运行文件
details:C:\autorun.inf
C:\DiskD\autorun.inf
C:\DiskX\autorun.inf
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:修改文件内容
details:C:\WINDOWS\7673f---> Offset = 0
C:\WINDOWS\system.ini---> Offset = 231
C:\autorun.inf---> Offset = 0
C:\DiskD\autorun.inf---> Offset = 0
C:\DiskX\autorun.inf---> Offset = 0
Behavior description:修改新生成的可执行文件
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winyllc.exe---> Offset = 66560
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\pgqhy.exe---> Offset = 66560
Network behavior
Behavior description:联网打开网址
details:InternetOpenUrlA: http://slwocfd/sobaka1.gif?777d0=3425968 hInternet = 0x000004f0
InternetOpenUrlA: http://46.105.103.219/sobakavolos.gif?77947=2448995 hInternet = 0x00000500
InternetOpenUrlA: http://slwocfd/sobaka1.gif?7a8c6=501958 hInternet = 0x000004c4
InternetOpenUrlA: http://46.105.103.219/sobakavolos.gif?7a8d6=3011844 hInternet = 0x000004dc
InternetOpenUrlA: http://slwocfd/sobaka1.gif?78936=1975512 hInternet = 0x000004ac
InternetOpenUrlA: http://46.105.103.219/sobakavolos.gif?78945=1481679 hInternet = 0x000006d0
InternetOpenUrlA: http://slwocfd/sobaka1.gif?791b4=1488156 hInternet = 0x00000490
InternetOpenUrlA: http://46.105.103.219/sobakavolos.gif?7def4=1031656 hInternet = 0x000004d4
InternetOpenUrlA: http://slwocfd/sobaka1.gif?799c3=5178590 hInternet = 0x0000046c
InternetOpenUrlA: http://46.105.103.219/sobakavolos.gif?799d3=3486917 hInternet = 0x000004a0
InternetOpenUrlA: http://slwocfd/sobaka1.gif?7a1b2=4001168 hInternet = 0x00000460
InternetOpenUrlA: http://46.105.103.219/sobakavolos.gif?7a1c2=4001296 hInternet = 0x00000434
InternetOpenUrlA: http://slwocfd/sobaka1.gif?7f6c1=1506531 hInternet = 0x0000044c
InternetOpenUrlA: http://46.105.103.219/sobakavolos.gif?7f6d1=5219370 hInternet = 0x00000444
InternetOpenUrlA: http://slwocfd/sobaka1.gif?7b111=5044650 hInternet = 0x000003e0
Behavior description:下载文件
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\bmcnk.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winwbeaqh.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winhbgckb.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winnhojl.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\bmlc.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winpsdalw.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\aogbq.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\wingpavmv.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winwdipot.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\omlunr.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ndnpyt.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winjwjm.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\dcdtk.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winltrff.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winyfrf.exe
Behavior description:读取网络文件
details:hFile = 0x000004f0, BytesToRead =1024, BytesRead = 1024.
hFile = 0x00000500, BytesToRead =1024, BytesRead = 1024.
hFile = 0x000004c4, BytesToRead =1024, BytesRead = 1024.
hFile = 0x000004dc, BytesToRead =1024, BytesRead = 1024.
hFile = 0x000004ac, BytesToRead =1024, BytesRead = 1024.
hFile = 0x000006d0, BytesToRead =1024, BytesRead = 1024.
hFile = 0x00000490, BytesToRead =1024, BytesRead = 1024.
hFile = 0x000004d4, BytesToRead =1024, BytesRead = 1024.
hFile = 0x0000046c, BytesToRead =1024, BytesRead = 1024.
hFile = 0x000004a0, BytesToRead =1024, BytesRead = 1024.
hFile = 0x00000460, BytesToRead =1024, BytesRead = 1024.
hFile = 0x00000434, BytesToRead =1024, BytesRead = 1024.
hFile = 0x0000044c, BytesToRead =1024, BytesRead = 1024.
hFile = 0x00000444, BytesToRead =1024, BytesRead = 1024.
hFile = 0x000003e0, BytesToRead =1024, BytesRead = 1024.
Registry behavior
Behavior description:修改注册表_Explorer文件显示相关属性
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden
Behavior description:删除注册表键_安全模式启动项
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\AppMgmt
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\Base
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\Boot Bus Extender
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\Boot file system
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\CryptSvc
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\DcomLaunch
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\dmadmin
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\dmboot.sys
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\dmio.sys
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\dmload.sys
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\dmserver
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\EventLog
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\File system
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\Filter
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\Netlogon
Behavior description:修改注册表_UAC关键设置
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\EnableLUA
Behavior description:删除注册表键值_安全模式启动项
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\AlternateShell
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\GlobalUserOffline
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications
\REGISTRY\USER\S-*\Software\Fobvexllmtqkq\A1_0
\REGISTRY\USER\S-*\Software\Fobvexllmtqkq\A2_0
\REGISTRY\USER\S-*\Software\Fobvexllmtqkq\A3_0
\REGISTRY\USER\S-*\Software\Fobvexllmtqkq\A4_0
\REGISTRY\USER\S-*\Software\Fobvexllmtqkq\A1_1
\REGISTRY\USER\S-*\Software\Fobvexllmtqkq\A2_1
\REGISTRY\USER\S-*\Software\Fobvexllmtqkq\A3_1
\REGISTRY\USER\S-*\Software\Fobvexllmtqkq\A4_1
\REGISTRY\USER\S-*\Software\Fobvexllmtqkq\A1_2
\REGISTRY\USER\S-*\Software\Fobvexllmtqkq\A2_2
\REGISTRY\USER\S-*\Software\Fobvexllmtqkq\A3_2
\REGISTRY\USER\S-*\Software\Fobvexllmtqkq\A4_2
Behavior description:修改注册表_系统防火墙可信进程列表
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1446010778.489927.exe
Behavior description:修改注册表_安全中心相关属性
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusOverride
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\FirewallOverride
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\UacDisableNotify
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusOverride
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusDisableNotify
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\FirewallDisableNotify
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\FirewallOverride
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\UpdatesDisableNotify
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\UacDisableNotify
Other behavior
Behavior description:创建互斥体
details:uxJLpe1m
smss.exeM_532_
csrss.exeM_588_
winlogon.exeM_612_
services.exeM_656_
lsass.exeM_668_
33oxservice.exeM_828_
33acthlp.exeM_840_
svchost.exeM_880_
svchost.exeM_944_
svchost.exeM_984_
svchost.exeM_1068_
svchost.exeM_1100_
spoolsv.exeM_1240_
33upgradehelper.exeM_1504_
Behavior description:常规加载驱动
details:system32\DRIVERS\ipfltdrv.sys
\??\C:\WINDOWS\system32\drivers\plrph.sys
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [TXGuiFoundation,QQ2013]
NtUserFindWindowEx: [Class,Window] = [CTXOPConntion_Class,OP_2269840561]
Behavior description:启动系统服务
details:[服务启动成功]: , IP Traffic Filter Driver, system32\DRIVERS\ipfltdrv.sys
[服务启动成功]: , amsint32, \??\C:\WINDOWS\system32\drivers\plrph.sys
Behavior description:获取文件属性探测虚拟机
details:GetFileAttributes: FileName = c:\program files\vmware\vmware tools\vmwaretray.exe
GetFileAttributes: FileName = c:\program files\vmware\vmware tools\vmwareuser.exe
GetFileAttributes: FileName = c:\windows\system32\vboxtray.exe
Behavior description:获取系统权限
details:SE_DEBUG_PRIVILEGE
SE_LOAD_DRIVER_PRIVILEGE
Behavior description:获取TickCount值
details:TickCount = 485105, SleepMilliseconds = 12.
TickCount = 485137, SleepMilliseconds = 12.
TickCount = 485152, SleepMilliseconds = 12.
TickCount = 485183, SleepMilliseconds = 12.
TickCount = 486277, SleepMilliseconds = 12.
TickCount = 606281, SleepMilliseconds = 120000.
TickCount = 786359, SleepMilliseconds = 300000.
TickCount = 786375, SleepMilliseconds = 300000.
TickCount = 786406, SleepMilliseconds = 300000.
TickCount = 786421, SleepMilliseconds = 300000.
TickCount = 786437, SleepMilliseconds = 300000.
TickCount = 786453, SleepMilliseconds = 300000.
TickCount = 786484, SleepMilliseconds = 300000.
TickCount = 786500, SleepMilliseconds = 300000.
TickCount = 786515, SleepMilliseconds = 300000.
Behavior description:枚举窗口
details:N/A
Behavior description:停止系统服务
details:ServiceName = Application Layer Gateway Service
ServiceName = Windows Firewall/Internet Connection Sharing (ICS)
ServiceName = Security Center
Behavior description:尝试连接RootKit驱动设备对象
details:\??\amsint32
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 120000.
[2]: MilliSeconds = 60088.
[3]: MilliSeconds = 180000.
[4]: MilliSeconds = 512.
[5]: MilliSeconds = 300000.
[6]: MilliSeconds = 10240.
[7]: MilliSeconds = -1.
[8]: MilliSeconds = 10000.
[9]: MilliSeconds = -1.
[10]: MilliSeconds = 1024.
Behavior description:创建系统服务
details:[服务已存在]: IPFILTERDRIVER, C:\WINDOWS\system32\drivers\ipfltdrv.sys
[服务创建成功]: amsint32, C:\WINDOWS\system32\drivers\plrph.sys
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号