VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

File information
Safety rating:60
Behavior list
Basic Information
MD5:6a354ea928f599bf818c438775fbe931
file type:Nsis
Production company:
version:1.0.0.1001---1.0.0.1001
Shell or compiler information:
Subfile information:UikoEngine.dll / 3f747ec76cd82c77016c8a3763185e04 / DLL
k.jpeg / c4431db00651d1186652a71fc0a87376 / Unknown
nsInstallAssist.dll / 28b411f3793dbcb81d6f3d3b0527cdba / DLL
dbg.exe / 180d7a5bdb4b223b68f34545e1c3a31e / EXE
ZipDLL.dll / 2dc35ddcabcb2b24919b9afae4ec3091 / DLL
bk2.png / 2a3cc239d6b366e6b7a65412f2ef7874 / Unknown
inst_begin.png / 855a2c09710ad5aea86e0141f79e8623 / Unknown
[NSIS].nsi / 6fffaa1cf8913b280236880dc0d7b256 / Unknown
inst_welcome.png / 00560a59533548da071c136333f4783e / Unknown
bk.png / fc6d38a9a9ed563bd451c3ad38fa2115 / Unknown
NsRandom.dll / 9b54944ce476591d65288b0701a52c46 / DLL
inst_end.png / 1ad682f47b99ddbbc1d0f88eebb85eaa / Unknown
bk3.png / 147be0b8d898b9dd93115748ca752167 / Unknown
inst.xml / 88c0639947efc709f0f3ad0d1fdc8cf8 / Unknown
Inetc.dll / 50fdadda3e993688401f6f1108fabdb4 / DLL
sys_dlg_btn2.png / e83e3445eac843a00f24a41d03aa6714 / Unknown
messagebox.png / 0c51a26c3991bf3ed73a50d3d975454c / Unknown
uninst.xml / af2b7ba8cb9ae9eb8f2225aae9135c5b / Unknown
System.dll / c17103ae9072a06da581dec998343fc1 / DLL
Key behavior
Behavior description:隐藏指定窗口
details:[Window,Class] = [,BrowserFrameGripperClass]
[Window,Class] = [缩放级别,ToolbarWindow32]
[Window,Class] = [,msctls_progress32]
[Window,Class] = [,AddressDisplay Control]
[Window,Class] = [,CtrlNotifySink]
[Window,Class] = [,tooltips_class32]
Behavior description:设置消息钩子
details:C:\WINDOWS\system32\IEFRAME.dll
Behavior description:打开注册表_检测虚拟机相关
details:\REGISTRY\MACHINE\Software\VMware, Inc.
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-*
MSCTF.MarshalInterface.FileMap.EMK..IFOGH
MSCTF.MarshalInterface.FileMap.EMK.B.IFOGH
MSCTF.MarshalInterface.FileMap.EMK.C.IFOGH
MSCTF.MarshalInterface.FileMap.EMK.D.IFOGH
MSCTF.MarshalInterface.FileMap.EMK.E.IFOGH
MSCTF.MarshalInterface.FileMap.EMK.F.IFOGH
MSCTF.MarshalInterface.FileMap.EMK.G.IFOGH
\WINDOWS\system32\zh-cn\ieframe.dll.mui
Internet Explorer Immutable Application State (00000F38-0000-0000-0000-000000000000)
ie_lcie_main_f38
Isolation Process Registry (5B16E36B-7C4B-11E5-91BE-000000000000)
Isolation Signal Registry (5B16E36B-7C4B-11E5-91BE-000000000000, 0)
ie_lcie_LogonMedium
Local\IEFrame!GetAsyncKeyStateSharedMem!3896
Behavior description:向窗口发送DDE执行消息
details:Process = [System Process], hWnd = 0x000702b4, Window = , Class = .
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache
C:\Documents and Settings\Administrator\IECompatCache
C:\Program Files
Behavior description:按名称获取主机地址
details:computer
wpad
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = , CmdLine = c:\windows\system32\cmd.exe /c copy /b "c:\docume~1\admini~1\locals~1\temp\nso5.tmp\sohuva_4.5.77.0-c204900003-nti-ng-tp-s.exe" + "c:\windows\fonts\verdana.ttf" "c:\docume~1\admini~1\locals~1\temp\nso5.tmp\sohuva_4.5.77.0-c204900003-nti
ImagePath = , CmdLine = c:\windows\system32\cmd.exe /c copy /b "c:\docume~1\admini~1\locals~1\temp\nso5.tmp\kele2014beta3.6.2promote0714_20090195130.exe" + "c:\windows\fonts\verdana.ttf" "c:\docume~1\admini~1\locals~1\temp\nso5.tmp\kele2014beta3.6.2promote0714
ImagePath = , CmdLine = c:\windows\system32\cmd.exe /c copy /b "c:\docume~1\admini~1\locals~1\temp\nso5.tmp\tribute.exe" + "c:\windows\fonts\verdana.ttf" "c:\docume~1\admini~1\locals~1\temp\nso5.tmp\tribute.exe"
Behavior description:创建进程
details:ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = C:\WINDOWS\system32\cmd.exe /C copy /b "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\SoHuVA_4.5.77.0-c204900003-nti-ng-tp-s.exe" + "C:\WINDOWS\Fonts\verdana.ttf" "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\SoH
ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = C:\WINDOWS\system32\cmd.exe /C copy /b "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\KeLe2014Beta3.6.2Promote0714_20090195130.exe" + "C:\WINDOWS\Fonts\verdana.ttf" "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\K
ImagePath = C:\Program Files\Internet Explorer\IEXPLORE.EXE, CmdLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
ImagePath = C:\Program Files\Internet Explorer\IEXPLORE.EXE, CmdLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE" SCODEF:3896 CREDAT:79873
ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = C:\WINDOWS\system32\cmd.exe /C copy /b "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\tribute.exe" + "C:\WINDOWS\Fonts\verdana.ttf" "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\tribute.exe"
Behavior description:创建下载文件进程
details:ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\uni1248517c.exe, CmdLine = uni1248517c.exe
ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\qqpcmgr_v11.0.16794.227_45163_Silence.exe, CmdLine = qqpcmgr_v11.0.16794.227_45163_Silence.exe
ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\UCBrowser_V5.4.4799.303_4640_(Build1509241503)_downloader.exe, CmdLine = UCBrowser_V5.4.4799.303_4640_(Build1509241503)_downloader.exe
ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\setup_001.exe, CmdLine = setup_001.exe
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-*
MSCTF.MarshalInterface.FileMap.EMK..IFOGH
MSCTF.MarshalInterface.FileMap.EMK.B.IFOGH
MSCTF.MarshalInterface.FileMap.EMK.C.IFOGH
MSCTF.MarshalInterface.FileMap.EMK.D.IFOGH
MSCTF.MarshalInterface.FileMap.EMK.E.IFOGH
MSCTF.MarshalInterface.FileMap.EMK.F.IFOGH
MSCTF.MarshalInterface.FileMap.EMK.G.IFOGH
\WINDOWS\system32\zh-cn\ieframe.dll.mui
Internet Explorer Immutable Application State (00000F38-0000-0000-0000-000000000000)
ie_lcie_main_f38
Isolation Process Registry (5B16E36B-7C4B-11E5-91BE-000000000000)
Isolation Signal Registry (5B16E36B-7C4B-11E5-91BE-000000000000, 0)
ie_lcie_LogonMedium
Local\IEFrame!GetAsyncKeyStateSharedMem!3896
Behavior description:创建可执行文件
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\System.dll
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\Inetc.dll
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\Base64.dll
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\NsRandom.dll
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\ZipDLL.dll
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\ExecCmd.dll
Behavior description:修改文件内容
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\k.jpeg---> Offset = 49140
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\nsf6.tmp---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\dnserrordiagoff[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\ErrorPageTemplate[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\errorPageStrings[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\httpErrorPagesScripts[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\noConnect[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\bullet[2]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\background_gradient[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\down[2]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\favcenter[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\tools[2]---> Offset = 0
C:\WINDOWS\wininit.ini---> Offset = 0
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache
C:\Documents and Settings\Administrator\IECompatCache
C:\Program Files
Behavior description:查找文件
details:FileName = C:\DOCUME~1
FileName = C:\Documents and Settings\ADMINI~1
FileName = C:\Documents and Settings\Administrator\LOCALS~1
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\1.zip
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\*.*
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\C\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\1.zip
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\C\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\C\DOCUME~1\ADMINI~1\LOCALS~1\Temp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\C\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\C\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\C\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\C
Network behavior
Behavior description:联网打开网址
details:InternetOpenUrlA: http://110.110.110.110:80/wpad.dat hInternet = 0x000004a8
Behavior description:下载文件
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\1.zip
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\21.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\38.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\uni1248517c.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\23.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\50.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\32.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\25.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\26.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\24.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\12.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\qqpcmgr_v11.0.16794.227_45163_Silence.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\UCBrowser_V5.4.4799.303_4640_(Build1509241503)_downloader.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\30.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nso5.tmp\27.tmp
Behavior description:连接指定站点
details:InternetConnectA: ServerName = int.dpool.sina.com.cn, PORT = 80
InternetConnectA: ServerName = t.cn, PORT = 80
InternetConnectA: ServerName = k.rising.com.cn, PORT = 80
InternetConnectA: ServerName = 121.40.3.130, PORT = 80
InternetConnectA: ServerName = r.photo.store.qq.com, PORT = 80
InternetConnectA: ServerName = dlied6.qq.com, PORT = 80
InternetConnectA: ServerName = down2.uc.cn, PORT = 80
InternetConnectA: ServerName = 121.41.113.227, PORT = 80
Behavior description:建立到一个指定的套接字连接
details:127.0.0.1:1031
Behavior description:读取网络文件
details:hFile = 0x00000638, BytesToRead =8192, BytesRead = 8192.
hFile = 0x00000640, BytesToRead =8192, BytesRead = 8192.
hFile = 0x000006c8, BytesToRead =8192, BytesRead = 8192.
hFile = 0x00000580, BytesToRead =8192, BytesRead = 8192.
hFile = 0x000004a8, BytesToRead =4010, BytesRead = 4010.
hFile = 0x0000057c, BytesToRead =8192, BytesRead = 8192.
hFile = 0x00000570, BytesToRead =8192, BytesRead = 8192.
hFile = 0x00000584, BytesToRead =8192, BytesRead = 8192.
hFile = 0x00000564, BytesToRead =8192, BytesRead = 8192.
hFile = 0x00000560, BytesToRead =8192, BytesRead = 8192.
Behavior description:打开HTTP请求
details:HttpOpenRequestA: int.dpool.sina.com.cn:80/iplookup/iplookup.php, hConnect = 0x00000634
HttpOpenRequestA: t.cn:80/ryvgmgb, hConnect = 0x00000634
HttpOpenRequestA: t.cn:80/rywpelm, hConnect = 0x00000634
HttpOpenRequestA: k.rising.com.cn:80/d/uni1248517c.exe, hConnect = 0x000006c8
HttpOpenRequestA: t.cn:80/rlenczm, hConnect = 0x00000698
HttpOpenRequestA: t.cn:80/ruuvyfw, hConnect = 0x00000584
HttpOpenRequestA: t.cn:80/rupbcbc, hConnect = 0x00000584
HttpOpenRequestA: t.cn:80/ruwiq6b, hConnect = 0x00000584
HttpOpenRequestA: t.cn:80/ryydtxt, hConnect = 0x00000584
HttpOpenRequestA: t.cn:80/rllqt95, hConnect = 0x0000056c
HttpOpenRequestA: 121.40.3.130:80/otk2rs5legu=/40.html, hConnect = 0x000004d0
HttpOpenRequestA: r.photo.store.qq.com:80/psb?/v1185hox09uqsj/vswzwjtehikduoiwtk76rtbo8so01wgs*yssaddn.5m!/r/dmk.g23oaaaa, hConnect = 0x00000584
HttpOpenRequestA: dlied6.qq.com:80/invc/qqpcmgr/qudao/qqpcmgr_v11.0.16794.227_45163_silence.exe, hConnect = 0x00000584
HttpOpenRequestA: down2.uc.cn:80/pcbrowser/down.php?id=101&pid=4640&type=downloader, hConnect = 0x00000564
HttpOpenRequestA: t.cn:80/ryfv75v, hConnect = 0x00000570
Behavior description:按名称获取主机地址
details:computer
wpad
Registry behavior
Behavior description:删除注册表键
details:\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\{63800dac-e7ca-4df9-9a5c-20765055488d}
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}
Behavior description:修改注册表_延迟重命名项
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Session Manager\PendingFileRenameOperations
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\Recovery\Active\{5B16E36E-7C4B-11E5-91BE-000000000000}
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\{63800dac-e7ca-4df9-9a5c-20765055488d}\Enable
\REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1EA4DBF0-3C3B-11CF-810C-00AA00389B71}\1.1\0\win32\
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Count
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Time
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTime
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTimeCount
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0\DisplayName
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0\ErrorState
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0\DisplayMask
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1\DisplayName
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1\ErrorState
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1\DisplayMask
Behavior description:删除注册表键值_IE连接设置
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
Behavior description:删除注册表键值
details:\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0\Expiration
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1\Expiration
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
1
MSCTF.Shared.MUTEX.ELH
SHIMLIB_LOG_MUTEX
Local\!BrowserEmulation!SharedMemory!Mutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
RasPbFile
ConnHashTable<3896>_HashTable_Mutex
Behavior description:隐藏指定窗口
details:[Window,Class] = [,BrowserFrameGripperClass]
[Window,Class] = [缩放级别,ToolbarWindow32]
[Window,Class] = [,msctls_progress32]
[Window,Class] = [,AddressDisplay Control]
[Window,Class] = [,CtrlNotifySink]
[Window,Class] = [,tooltips_class32]
Behavior description:设置消息钩子
details:C:\WINDOWS\system32\IEFRAME.dll
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [#32770,]
NtUserFindWindowEx: [Class,Window] = [SysListView32,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [IEFrame,]
NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
NtUserFindWindowEx: [Class,Window] = [OleMainThreadWndClass,]
NtUserFindWindowEx: [Class,Window] = [Static,]
Behavior description:打开指定IE网页
details:http://121.40.3.130/OTk2RS5leGU=/40.html
Behavior description:获取系统权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:获取TickCount值
details:TickCount = 489403, SleepMilliseconds = 200.
TickCount = 489418, SleepMilliseconds = 200.
TickCount = 489496, SleepMilliseconds = 200.
TickCount = 489512, SleepMilliseconds = 200.
TickCount = 489528, SleepMilliseconds = 200.
TickCount = 491200, SleepMilliseconds = 200.
TickCount = 491246, SleepMilliseconds = 200.
TickCount = 491262, SleepMilliseconds = 200.
TickCount = 491293, SleepMilliseconds = 200.
TickCount = 491309, SleepMilliseconds = 200.
TickCount = 491340, SleepMilliseconds = 200.
TickCount = 491418, SleepMilliseconds = 200.
TickCount = 491465, SleepMilliseconds = 200.
TickCount = 492965, SleepMilliseconds = 200.
TickCount = 492981, SleepMilliseconds = 200.
Behavior description:打开注册表_检测虚拟机相关
details:\REGISTRY\MACHINE\Software\VMware, Inc.
Behavior description:枚举窗口
details:N/A
Behavior description:向窗口发送DDE执行消息
details:Process = [System Process], hWnd = 0x000702b4, Window = , Class = .
Behavior description:窗口信息
details:Pid = 3896, Hwnd=0x402e0, Text = 导航栏, ClassName = WorkerW.
Pid = 3896, Hwnd=0x902ce, Text = 地址组合控制, ClassName = ToolbarWindow32.
Pid = 3896, Hwnd=0x102fa, Text = 页面控制, ClassName = ToolbarWindow32.
Pid = 3896, Hwnd=0x702aa, Text = 搜索..., ClassName = Edit.
Pid = 3896, Hwnd=0x702b0, Text = 搜索组合控制, ClassName = ToolbarWindow32.
Pid = 3896, Hwnd=0xd02d4, Text = 搜索控制, ClassName = ToolbarWindow32.
Pid = 3896, Hwnd=0x1030c, Text = 命令栏, ClassName = ToolbarWindow32.
Pid = 3896, Hwnd=0x10304, Text = 收藏夹命令栏, ClassName = ToolbarWindow32.
Pid = 3896, Hwnd=0x302ec, Text = LinksBand, ClassName = LinksBandClass.
Pid = 3896, Hwnd=0x10300, Text = 收藏夹栏, ClassName = ToolbarWindow32.
Pid = 3896, Hwnd=0x302f0, Text = 添加到收藏夹栏, ClassName = ToolbarWindow32.
Pid = 2004, Hwnd=0x10322, Text = ITBarHost, ClassName = InternetToolbarHost.
Pid = 2004, Hwnd=0x10324, Text = 菜单栏, ClassName = WorkerW.
Pid = 2004, Hwnd=0x802d2, Text = Windows Internet Explorer, ClassName = TabWindowClass.
Pid = 2004, Hwnd=0x1032e, Text = 完成, ClassName = msctls_statusbar32.
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号