VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

File information
Safety rating:50
Behavior list
Basic Information
MD5:4af5bfbb1519ecffbc61d411da8f27f9
file type:EXE
Production company:
version:
Shell or compiler information:COMPILER:Elan
Key behavior
Behavior description:跨进程写入数据
details:TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\揍狗66.exe, WriteAddress = 0x00400000, Size = 0x00001000 TargetPID = 0x00000b70
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\揍狗66.exe, WriteAddress = 0x00401000, Size = 0x000fc000 TargetPID = 0x00000b70
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\揍狗66.exe, WriteAddress = 0x004fd000, Size = 0x0071e000 TargetPID = 0x00000b70
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\揍狗66.exe, WriteAddress = 0x00c1b000, Size = 0x0001b000 TargetPID = 0x00000b70
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\揍狗66.exe, WriteAddress = 0x00c8e000, Size = 0x00016000 TargetPID = 0x00000b70
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\揍狗66.exe, WriteAddress = 0x7ffde008, Size = 0x00000004 TargetPID = 0x00000b70
Behavior description:修改注册表_Winsock劫持
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Num_Catalog_Entries
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Next_Catalog_Entry_ID
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Serial_Access_Num
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000001\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000002\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000003\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000004\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000005\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000006\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000007\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000008\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000009\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000010\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000011\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000012\PackedCatalogItem
Behavior description:直接获取CPU时钟
details:EAX = 0xbd40b261, EDX = 0x000000c2
EAX = 0xbd40b2ad, EDX = 0x000000c2
EAX = 0xbd40b2f9, EDX = 0x000000c2
EAX = 0xbd40b345, EDX = 0x000000c2
EAX = 0xbff3b2c1, EDX = 0x000000c2
EAX = 0xbff3b30d, EDX = 0x000000c2
EAX = 0xbff3b359, EDX = 0x000000c2
EAX = 0xbff3b3a5, EDX = 0x000000c2
EAX = 0xbff3b3f1, EDX = 0x000000c2
EAX = 0xbff3b43d, EDX = 0x000000c2
Behavior description:设置线程上下文
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
Behavior description:杀掉进程
details:C:\WINDOWS\system32\crossfire.exe
Behavior description:设置特殊文件属性
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\揍狗66.exe
C:\Documents and Settings\Administrator\Local Settings\%temp%\SkinH_EL.dll
Behavior description:获取窗口截图信息
details:Foreground window Info: HWND = 0x00010418, DC = 0x01010057.
Foreground window Info: HWND = 0x00010456, DC = 0x0a010375.
Foreground window Info: HWND = 0x00010458, DC = 0x01010057.
Foreground window Info: HWND = 0x00010418, DC = 0x06010874.
Foreground window Info: HWND = 0x00010458, DC = 0x0a010375.
Foreground window Info: HWND = 0x00010456, DC = 0x06010874.
Behavior description:直接调用系统关键API
details:Index = 0x000000B2, Name: NtQueryVirtualMemory, Instruction Address = 0x00466B7E
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = , CmdLine = netsh winsock reset
Behavior description:跨进程写入数据
details:TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\揍狗66.exe, WriteAddress = 0x00400000, Size = 0x00001000 TargetPID = 0x00000b70
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\揍狗66.exe, WriteAddress = 0x00401000, Size = 0x000fc000 TargetPID = 0x00000b70
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\揍狗66.exe, WriteAddress = 0x004fd000, Size = 0x0071e000 TargetPID = 0x00000b70
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\揍狗66.exe, WriteAddress = 0x00c1b000, Size = 0x0001b000 TargetPID = 0x00000b70
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\揍狗66.exe, WriteAddress = 0x00c8e000, Size = 0x00016000 TargetPID = 0x00000b70
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\揍狗66.exe, WriteAddress = 0x7ffde008, Size = 0x00000004 TargetPID = 0x00000b70
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2724, ThreadID = 2788, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: 揍狗66.exe, InheritedFromPID = 2724, ProcessID = 2928, ThreadID = 3016, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: netsh.exe, InheritedFromPID = 2928, ProcessID = 3080, ThreadID = 3088, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: netsh.exe, InheritedFromPID = 2928, ProcessID = 3080, ThreadID = 3092, StartAddress = 77E56C7D, Parameter = 001B73C0
TargetProcess: netsh.exe, InheritedFromPID = 2928, ProcessID = 3080, ThreadID = 3096, StartAddress = 769AE43B, Parameter = 001B8FA8
TargetProcess: netsh.exe, InheritedFromPID = 2928, ProcessID = 3080, ThreadID = 3124, StartAddress = 77E56C7D, Parameter = 001BE3A0
Behavior description:创建进程
details:[0x00000c08]ImagePath = C:\WINDOWS\system32\netsh.exe, CmdLine = netsh winsock reset
Behavior description:设置线程上下文
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
Behavior description:枚举进程
details:N/A
Behavior description:杀掉进程
details:C:\WINDOWS\system32\crossfire.exe
Behavior description:创建新文件进程
details:[0x00000b70]ImagePath = C:\Documents and Settings\Administrator\Local Settings\%temp%\揍狗66.exe, CmdLine = 揍狗66.exe
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\3641a.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\36534.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\36748.tmp
C:\Documents and Settings\Administrator\Local Settings\%temp%\揍狗66.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\373ca.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\37448.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\374d5.tmp
C:\Documents and Settings\Administrator\Local Settings\%temp%\SkinH_EL.dll
Behavior description:创建可执行文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\3641a.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\36534.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\36748.tmp
C:\Documents and Settings\Administrator\Local Settings\%temp%\揍狗66.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\373ca.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\37448.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\374d5.tmp
C:\Documents and Settings\Administrator\Local Settings\%temp%\SkinH_EL.dll
Behavior description:删除文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\3641a.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\36534.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\36748.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\373ca.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\37448.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\374d5.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\228375\TemporaryFile\TemporaryFile
Behavior description:复制文件
details:C:\WINDOWS\system32\ntdll.dll ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\3641a.tmp
C:\WINDOWS\system32\user32.dll ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\36534.tmp
C:\WINDOWS\system32\gdi32.dll ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\36748.tmp
C:\WINDOWS\system32\ntdll.dll ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\373ca.tmp
C:\WINDOWS\system32\user32.dll ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\37448.tmp
C:\WINDOWS\system32\gdi32.dll ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\374d5.tmp
Behavior description:设置特殊文件属性
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\揍狗66.exe
C:\Documents and Settings\Administrator\Local Settings\%temp%\SkinH_EL.dll
Behavior description:查找文件
details:FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\3641a.tmp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\36534.tmp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\36748.tmp
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\224890\*.*
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\224890\TemporaryFile\*.*
FileName = 揍狗66.exe
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\揍狗66.exe
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\373ca.tmp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\37448.tmp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\374d5.tmp
Behavior description:重命名文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\224890\... ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\224890\TemporaryFile
C:\Documents and Settings\Administrator\Local Settings\%temp%\揍狗66.exe ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\228343\...\TemporaryFile
C:\Documents and Settings\Administrator\Local Settings\Temp\228343\... ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\228343\TemporaryFile
C:\Documents and Settings\Administrator\Local Settings\%temp%\揍狗66.exe ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\228375\...\TemporaryFile
C:\Documents and Settings\Administrator\Local Settings\Temp\228375\... ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\228375\TemporaryFile
Behavior description:修改文件内容
details:C:\Documents and Settings\Administrator\Local Settings\Temp\3641a.tmp ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\3641a.tmp ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Temp\3641a.tmp ---> Offset = 131072
C:\Documents and Settings\Administrator\Local Settings\Temp\3641a.tmp ---> Offset = 196608
C:\Documents and Settings\Administrator\Local Settings\Temp\3641a.tmp ---> Offset = 262144
C:\Documents and Settings\Administrator\Local Settings\Temp\36534.tmp ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\36534.tmp ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Temp\36534.tmp ---> Offset = 131072
C:\Documents and Settings\Administrator\Local Settings\Temp\36534.tmp ---> Offset = 196608
C:\Documents and Settings\Administrator\Local Settings\Temp\36534.tmp ---> Offset = 262144
C:\Documents and Settings\Administrator\Local Settings\Temp\36748.tmp ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\36748.tmp ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Temp\36748.tmp ---> Offset = 131072
C:\Documents and Settings\Administrator\Local Settings\Temp\36748.tmp ---> Offset = 196608
C:\Documents and Settings\Administrator\Local Settings\Temp\36748.tmp ---> Offset = 262144
Network behavior
Behavior description:连接指定站点
details:WinHttpConnect: ServerName = 2.****om, PORT = 80, UserName = , Password = , hSession = 0x03173100, hConnect = 0x03173200, Flags = 0x00000000
WinHttpConnect: ServerName = 1.****om, PORT = 80, UserName = , Password = , hSession = 0x03173800, hConnect = 0x03173900, Flags = 0x00000000
WinHttpConnect: ServerName = 3.****om, PORT = 80, UserName = , Password = , hSession = 0x03173f00, hConnect = 0x03205000, Flags = 0x00000000
Behavior description:打开HTTP连接
details:WinHttpOpen: UserAgent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5), hSession = 0x03173100
WinHttpOpen: UserAgent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5), hSession = 0x03173800
WinHttpOpen: UserAgent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5), hSession = 0x03173f00
Behavior description:建立到一个指定的套接字连接
details:URL: 2.****om, IP: **.133.40.**:80, SOCKET = 0x000001f8
URL: 1.****om, IP: **.133.40.**:80, SOCKET = 0x00000218
URL: 3.****om, IP: **.133.40.**:80, SOCKET = 0x00000234
Behavior description:发送HTTP包
details:GET /UserC2?param=39A711C85F77E0D0D40051557B48A9236359EFE2FAAC77DB9318ADE1BB2BF0DAAF4C0601CF86D8C499BF99C662816830D09C71FDC0157991607E862D245278DEBE062DE94252DC79A9F1E2A42007821A9BFBC365011806C47F86C312B1786511F955B361E0E3 HTTP/1.1 Accept: */* Accept-Languge: zh-CN User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) Content-Type: application/x-www-form-urlencoded Referer: http://2.5yyz.com/UserC2?param=39A711C85F77E0D0D40051557B48A9236359EFE2FAAC77DB9318ADE1BB2BF0DAAF4C0601CF86D8C499BF99C662816830D09C71FDC0157991607E862D245278DEBE062DE94252DC79A9F1E2A42007821A9BFBC365011806C47F86C312B1786511F955B361E0E3 Host: 2.****om Connection: Keep-Alive
Behavior description:打开HTTP请求
details:WinHttpOpenRequest: 2.****om:80/userc2?param=39a711c85f77e0d0d40051557b48a9236359efe2faac77db9318ade1bb2bf0daaf4c0601cf86d8c499bf99c662816830d09c71fdc0157991607e862d245278debe062de94252dc79a9f1e2a42007821a9bfbc365011806c47f86c312b1786511f955b361e0e3, hConnect = 0x03173200, hRequest = 0x031e0000, Verb: GET, Referer: , Flags = 0x00000080
WinHttpOpenRequest: 1.****om:80/userc2?param=39a711c85f77e0d0d40051557b48a9236359efe2faac77db9318ade1bb2bf0daaf4c0601cf86d8c499bf99c662816830d09c71fdc0157991607e862d245278debe062de94252dc79a9f1e2a42007821a9bfbc365011806c47f86c312b1786511f955b361e0e3, hConnect = 0x03173900, hRequest = 0x031e0400, Verb: GET, Referer: , Flags = 0x00000080
WinHttpOpenRequest: 3.****om:80/userc2?param=39a711c85f77e0d0d40051557b48a9236359efe2faac77db9318ade1bb2bf0daaf4c0601cf86d8c499bf99c662816830d09c71fdc0157991607e862d245278debe062de94252dc79a9f1e2a42007821a9bfbc365011806c47f86c312b1786511f955b361e0e3, hConnect = 0x03205000, hRequest = 0x031e0800, Verb: GET, Referer: , Flags = 0x00000080
Behavior description:按名称获取主机地址
details:GetAddrInfoW: 2.****om
GetAddrInfoW: 1.****om
GetAddrInfoW: 3.****om
Registry behavior
Behavior description:删除注册表键_分层网络协议
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\Winsock\Setup Migration\Providers\NetBIOS\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\Winsock\Setup Migration\Providers\Tcpip\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\Winsock\Setup Migration\Providers\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\Winsock\Setup Migration\Well Known Guids\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\Winsock\Setup Migration\
Behavior description:修改注册表_Winsock劫持
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Num_Catalog_Entries
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Next_Catalog_Entry_ID
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Serial_Access_Num
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000001\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000002\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000003\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000004\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000005\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000006\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000007\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000008\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000009\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000010\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000011\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000012\PackedCatalogItem
Behavior description:修改注册表
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\EnableFileTracing
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\EnableConsoleTracing
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\FileTracingMask
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\ConsoleTracingMask
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\MaxFileSize
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\FileDirectory
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\LogSessionName
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\Active
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\ControlFlags
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\Napmontr\Guid
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\Napmontr\BitNames
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent\LogSessionName
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent\Active
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent\ControlFlags
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent\traceIdentifier\Guid
Behavior description:修改注册表_分层网络协议
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\Winsock\Setup Migration\Setup Version
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\Winsock\Setup Migration\Provider List
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\Winsock\Setup Migration\Known Static Providers
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\Winsock\Setup Migration\Well Known Guids\IsoTp
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\Winsock\Setup Migration\Well Known Guids\McsXns
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\Winsock\Setup Migration\Well Known Guids\AppleTalk
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\Winsock\Setup Migration\Providers\Tcpip\WinSock 2.0 Provider ID
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\Winsock\Setup Migration\Providers\NetBIOS\WinSock 2.0 Provider ID
Behavior description:删除注册表键_Winsock劫持
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000001\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000002\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000003\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000004\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000005\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000006\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000007\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000008\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000009\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000010\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000011\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000012\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000013\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000014\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000015\
Other behavior
Behavior description:直接调用系统关键API
details:Index = 0x000000B2, Name: NtQueryVirtualMemory, Instruction Address = 0x00466B7E
Behavior description:创建互斥体
details:RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
oleacc-msaa-loaded
MSCTF.Shared.MUTEX.IOH
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = Global\crypt32LogoffEvent
Behavior description:打开互斥体
details:RasPbFile
ShimCacheMutex
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
Behavior description:窗口信息
details:Pid = 2928, Hwnd=0x10458, Text = 版本:1.0.9, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2928, Hwnd=0x10456, Text = 玩房软件, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2928, Hwnd=0x10450, Text = 解绑, ClassName = Button.
Pid = 2928, Hwnd=0x1044e, Text = 开始登录, ClassName = Button.
Pid = 2928, Hwnd=0x1044c, Text = 记住密码, ClassName = Button(CheckBox).
Pid = 2928, Hwnd=0x10446, Text = 登录密码:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2928, Hwnd=0x10444, Text = 登录账号:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2928, Hwnd=0x10440, Text = 充值卡密:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2928, Hwnd=0x1043c, Text = 输入密码:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2928, Hwnd=0x1043a, Text = 输入账号:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2928, Hwnd=0x10436, Text = 注册账号, ClassName = Button.
Pid = 2928, Hwnd=0x10434, Text = 确定充值, ClassName = Button.
Pid = 2928, Hwnd=0x10432, Text = 充值卡密:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2928, Hwnd=0x1042c, Text = 充值账号:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2928, Hwnd=0x1042a, Text = *, ClassName = Afx:400000:b:10011:1900015:0.
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
Global\crypt32LogoffEvent
Global\SvcctrlStartEvent_A3752DX
MSFT.VSA.COM.DISABLE.3080
MSFT.VSA.IEC.STATUS.6c736db0
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
Behavior description:获取窗口截图信息
details:Foreground window Info: HWND = 0x00010418, DC = 0x01010057.
Foreground window Info: HWND = 0x00010456, DC = 0x0a010375.
Foreground window Info: HWND = 0x00010458, DC = 0x01010057.
Foreground window Info: HWND = 0x00010418, DC = 0x06010874.
Foreground window Info: HWND = 0x00010458, DC = 0x0a010375.
Foreground window Info: HWND = 0x00010456, DC = 0x06010874.
Behavior description:可执行文件签名信息
details:C:\Documents and Settings\Administrator\Local Settings\Temp\3641a.tmp(签名验证: 通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\36534.tmp(签名验证: 通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\36748.tmp(签名验证: 通过)
C:\Documents and Settings\Administrator\Local Settings\%temp%\揍狗66.exe(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\373ca.tmp(签名验证: 通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\37448.tmp(签名验证: 通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\374d5.tmp(签名验证: 通过)
C:\Documents and Settings\Administrator\Local Settings\%temp%\SkinH_EL.dll(签名验证: 未通过)
Behavior description:隐藏指定窗口
details:[Window,Class] = [,Button]
[Window,Class] = [,Edit]
[Window,Class] = [验证码:,_EL_Label]
[Window,Class] = [试用,Button]
[Window,Class] = [,_EL_Label]
[Window,Class] = [,SysTabControl32]
[Window,Class] = [,_EL_DrawPanel]
[Window,Class] = [,_EL_Timer]
[Window,Class] = [修改密码,Button]
[Window,Class] = [新的密码:,Afx:400000:b:10011:1900015:0]
[Window,Class] = [现在密码:,Afx:400000:b:10011:1900015:0]
[Window,Class] = [用户账号:,Afx:400000:b:10011:1900015:0]
[Window,Class] = [*,Afx:400000:b:10011:1900015:0]
[Window,Class] = [充值账号:,Afx:400000:b:10011:1900015:0]
[Window,Class] = [充值卡密:,Afx:400000:b:10011:1900015:0]
Behavior description:可执行文件MD5
details:C:\Documents and Settings\Administrator\Local Settings\Temp\3641a.tmp ---> 9e762b21dd4d10695799a9a6e9570b79
C:\Documents and Settings\Administrator\Local Settings\Temp\36534.tmp ---> f697644d5f59050fbe6af896c19cca93
C:\Documents and Settings\Administrator\Local Settings\Temp\36748.tmp ---> 2ccdf9fc160e3af611510decc1359516
C:\Documents and Settings\Administrator\Local Settings\%temp%\揍狗66.exe ---> ecd71562fa3dcd332a4a03960e840b96
C:\Documents and Settings\Administrator\Local Settings\Temp\373ca.tmp ---> 9e762b21dd4d10695799a9a6e9570b79
C:\Documents and Settings\Administrator\Local Settings\Temp\37448.tmp ---> f697644d5f59050fbe6af896c19cca93
C:\Documents and Settings\Administrator\Local Settings\Temp\374d5.tmp ---> 2ccdf9fc160e3af611510decc1359516
C:\Documents and Settings\Administrator\Local Settings\%temp%\SkinH_EL.dll ---> 147127382e001f495d1842ee7a9e7912
Behavior description:直接获取CPU时钟
details:EAX = 0xbd40b261, EDX = 0x000000c2
EAX = 0xbd40b2ad, EDX = 0x000000c2
EAX = 0xbd40b2f9, EDX = 0x000000c2
EAX = 0xbd40b345, EDX = 0x000000c2
EAX = 0xbff3b2c1, EDX = 0x000000c2
EAX = 0xbff3b30d, EDX = 0x000000c2
EAX = 0xbff3b359, EDX = 0x000000c2
EAX = 0xbff3b3a5, EDX = 0x000000c2
EAX = 0xbff3b3f1, EDX = 0x000000c2
EAX = 0xbff3b43d, EDX = 0x000000c2
Behavior description:加载新释放的文件
details:Image: C:\Documents and Settings\Administrator\Local Settings\%temp%\SkinH_EL.dll.
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号