VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:85
Behavior list
Basic Information
MD5:090b30de2a1d05aafa1d56867312577d
file type:Rar
Production company:
version:
Shell or compiler information:COMPILER:UPolyX v0.5
Subfile information:DDOS防火墙.exedumpFile / 062d73317a78f6c49e64bf2f0dcfbcb9 / EXE
DDOS防火墙.exe / 062d73317a78f6c49e64bf2f0dcfbcb9 / EXE
Key behavior
Behavior description:屏蔽窗口关闭消息
details:hWnd = 0x001802d8, Text = 冰盾抗DDoS防火墙 8.1 Build 60503 安装 , ClassName = #32770.
Behavior description:在桌面创建快捷方式
details:C:\Documents and Settings\Administrator\桌面\冰盾抗DDOS防火墙.lnk
Behavior description:创建系统服务
details:[服务创建成功]: EasyFirewall, system32\DRIVERS\enetfilt.sys
[服务已存在]: EasyFirewall, system32\DRIVERS\enetfilt.sys
[服务创建成功]: BingDunDDoSSvc, C:\Program Files\BingDun\Firewall\BdFwSvc.exe
Behavior description:获取TickCount值
details:TickCount = 5355531, SleepMilliseconds = 250.
TickCount = 5368581, SleepMilliseconds = 50.
TickCount = 5368862, SleepMilliseconds = 50.
TickCount = 5368925, SleepMilliseconds = 50.
TickCount = 5368940, SleepMilliseconds = 50.
TickCount = 5369846, SleepMilliseconds = 50.
TickCount = 5370596, SleepMilliseconds = 50.
TickCount = 5371693, SleepMilliseconds = 100.
TickCount = 5371709, SleepMilliseconds = 100.
TickCount = 5372206, SleepMilliseconds = 50.
TickCount = 5372237, SleepMilliseconds = 50.
TickCount = 5372253, SleepMilliseconds = 50.
TickCount = 5372331, SleepMilliseconds = 50.
TickCount = 5374331, SleepMilliseconds = 50.
TickCount = 5374346, SleepMilliseconds = 50.
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = , CmdLine = "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsi4D.tmp\ns4E.tmp" "C:\Program Files\BingDun\Firewall\bin\efwinstall.exe" -a "C:\Program Files\BingDun\Firewall\driver\xp\bdwrap.inf" -b s -c efw_filter
ImagePath = , CmdLine = "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsi4D.tmp\ns56.tmp" "C:\Program Files\BingDun\Firewall\BdFwSvc.exe" /install
Behavior description:创建进程
details:ImagePath = C:\WINDOWS\regedit.exe, CmdLine = "C:\WINDOWS\regedit.exe" -s ddos.reg
ImagePath = C:\WINDOWS\system32\runonce.exe, CmdLine = runonce -r
Behavior description:创建新文件进程
details:ImagePath = C:\WINDOWS\Temp\bdfwsetup.exe, CmdLine = "C:\WINDOWS\temp\bdfwsetup.exe"
ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsi4D.tmp\ns4E.tmp, CmdLine = "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsi4D.tmp\ns4E.tmp" "C:\Program Files\BingDun\Firewall\bin\efwinstall.exe" -a "C:\Program Files\BingDun\Firewall\driver\xp\bdwrap.inf" -b s -c efw_filter
ImagePath = C:\Program Files\BingDun\Firewall\bin\efwinstall.exe, CmdLine = "C:\Program Files\BingDun\Firewall\bin\efwinstall.exe" -a "C:\Program Files\BingDun\Firewall\driver\xp\bdwrap.inf" -b s -c efw_filter
ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsi4D.tmp\ns56.tmp, CmdLine = "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsi4D.tmp\ns56.tmp" "C:\Program Files\BingDun\Firewall\BdFwSvc.exe" /install
ImagePath = C:\Program Files\BingDun\Firewall\BdFwSvc.exe, CmdLine = "C:\Program Files\BingDun\Firewall\BdFwSvc.exe" /install
Behavior description:创建本地线程
details:TargetProcess: DDOS防火墙.exe, InheritedFromPID = 1944, ProcessID = 968, ThreadID = 764, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: bdfwsetup.exe, InheritedFromPID = 968, ProcessID = 1408, ThreadID = 2196, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: bdfwsetup.exe, InheritedFromPID = 968, ProcessID = 1408, ThreadID = 2200, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: bdfwsetup.exe, InheritedFromPID = 968, ProcessID = 1408, ThreadID = 2252, StartAddress = 00404DD9, Parameter = 00140340
TargetProcess: efwinstall.exe, InheritedFromPID = 2280, ProcessID = 2288, ThreadID = 2300, StartAddress = 010016D8, Parameter = 00000000
TargetProcess: efwinstall.exe, InheritedFromPID = 2280, ProcessID = 2288, ThreadID = 2312, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: efwinstall.exe, InheritedFromPID = 2280, ProcessID = 2288, ThreadID = 2316, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: efwinstall.exe, InheritedFromPID = 2280, ProcessID = 2288, ThreadID = 2320, StartAddress = 7C949B6F, Parameter = 00000000
TargetProcess: efwinstall.exe, InheritedFromPID = 2280, ProcessID = 2288, ThreadID = 2324, StartAddress = 765E964D, Parameter = 000C87A8
TargetProcess: efwinstall.exe, InheritedFromPID = 2280, ProcessID = 2288, ThreadID = 2328, StartAddress = 759D8761, Parameter = 00000000
TargetProcess: efwinstall.exe, InheritedFromPID = 2280, ProcessID = 2288, ThreadID = 2388, StartAddress = 77C0A1D7, Parameter = 00817C18
File behavior
Behavior description:创建文件
details:C:\WINDOWS\Temp\ddos.reg
C:\WINDOWS\Temp\bdfwsetup.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\nsh4C.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\UserInfo.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\ioSpecial.ini
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\modern-wizard.bmp
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\InstallOptions.dll
C:\Program Files\BingDun\Firewall\bin\efwinstall.exe
C:\Program Files\BingDun\Firewall\bin\deldriver.bat
C:\Program Files\BingDun\Firewall\driver\xp\bdwrap.inf
C:\Program Files\BingDun\Firewall\driver\xp\bdwrap_m.inf
C:\Program Files\BingDun\Firewall\driver\xp\enetfilt.sys
C:\Program Files\BingDun\Firewall\driver\2k\bdwrap2k.inf
C:\Program Files\BingDun\Firewall\driver\2k\bdwrap2k_m.inf
Behavior description:在系统敏感位置(如开始菜单等)释放链接或快捷方式
details:C:\Documents and Settings\Administrator\「开始」菜单\程序\冰盾抗DDOS防火墙\冰盾抗DDOS防火墙.lnk
C:\Documents and Settings\Administrator\「开始」菜单\程序\冰盾抗DDOS防火墙\冰盾科技网站.url
C:\Documents and Settings\Administrator\「开始」菜单\程序\冰盾抗DDOS防火墙\反安装.lnk
C:\Documents and Settings\Administrator\「开始」菜单\程序\冰盾抗DDOS防火墙\冰盾防火墙介绍.lnk
Behavior description:创建可执行文件
details:C:\WINDOWS\Temp\bdfwsetup.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\UserInfo.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\InstallOptions.dll
C:\Program Files\BingDun\Firewall\bin\efwinstall.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\nsExec.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\ns4E.tmp
C:\Program Files\BingDun\Firewall\bdfw.exe
C:\Program Files\BingDun\Firewall\PSAPI.DLL
C:\Program Files\BingDun\Firewall\easydb.dll
C:\Program Files\BingDun\Firewall\libcurl.dll
C:\Program Files\BingDun\Firewall\BdFwSvc.exe
C:\Program Files\BingDun\Firewall\lang\BdFwChs.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\ns56.tmp
C:\Program Files\BingDun\Firewall\Uninstall.exe
Behavior description:覆盖已有文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\ns4E.tmp
C:\WINDOWS\inf\oem12.inf
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\ns56.tmp
Behavior description:复制文件
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsi4D.tmp\nsExec.dll ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsi4D.tmp\ns4E.tmp
C:\Program Files\BingDun\Firewall\driver\xp\bdwrap.inf ---> C:\WINDOWS\INF\oem12.inf
C:\Program Files\BingDun\Firewall\driver\xp\enetfilt.sys ---> C:\WINDOWS\system32\DRIVERS\SET52.tmp
C:\Program Files\BingDun\Firewall\driver\xp\bdwrap_m.inf ---> C:\WINDOWS\INF\SET55.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsi4D.tmp\nsExec.dll ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsi4D.tmp\ns56.tmp
Behavior description:在桌面创建快捷方式
details:C:\Documents and Settings\Administrator\桌面\冰盾抗DDOS防火墙.lnk
Behavior description:删除文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\nsh4C.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp
C:\WINDOWS\inf\INFCACHE.2
C:\WINDOWS\system32\drivers\SET52.tmp
C:\WINDOWS\inf\SET55.tmp
Behavior description:查找文件
details:FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\DDOS防火墙.exe
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\My Documents
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\Documents
FileName = C:\Documents and Settings\Administrator\桌面
FileName = C:\Documents and Settings\All Users\桌面
FileName = C:\WINDOWS
FileName = C:\WINDOWS\temp
FileName = C:\WINDOWS\Temp
FileName = regedit.*
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsi4D.tmp
FileName = C:\WINDOWS\temp\regedit.*
FileName = C:\WINDOWS\system32\regedit.*
Behavior description:修改BAT脚本文件
details:C:\Program Files\BingDun\Firewall\bin\deldriver.bat ---> Offset = 0
C:\Program Files\BingDun\Firewall\bin\deldriver.bat ---> Offset = 44
Behavior description:重命名文件
details:C:\WINDOWS\LastGood\TMP4F.tmp ---> C:\WINDOWS\LastGood\INF\oem12.inf
C:\WINDOWS\LastGood\TMP50.tmp ---> C:\WINDOWS\LastGood\INF\oem12.PNF
C:\WINDOWS\inf\INFCACHE.1 ---> C:\WINDOWS\inf\INFCACHE.2
C:\WINDOWS\inf\INFCACHE.0 ---> C:\WINDOWS\inf\INFCACHE.1
C:\WINDOWS\inf\INFCACHE.2 ---> C:\WINDOWS\inf\OLDCACHE.000
C:\WINDOWS\system32\drivers\SET52.tmp ---> C:\WINDOWS\system32\DRIVERS\enetfilt.sys
C:\WINDOWS\LastGood\TMP53.tmp ---> C:\WINDOWS\LastGood\INF\bdwrap_m.inf
C:\WINDOWS\LastGood\TMP54.tmp ---> C:\WINDOWS\LastGood\INF\bdwrap_m.PNF
C:\WINDOWS\inf\SET55.tmp ---> C:\WINDOWS\INF\bdwrap_m.inf
Behavior description:修改文件内容
details:C:\WINDOWS\Temp\ddos.reg ---> Offset = 0
C:\WINDOWS\Temp\bdfwsetup.exe ---> Offset = 0
C:\WINDOWS\Temp\bdfwsetup.exe ---> Offset = 32768
C:\WINDOWS\Temp\bdfwsetup.exe ---> Offset = 98304
C:\WINDOWS\Temp\bdfwsetup.exe ---> Offset = 163840
C:\WINDOWS\Temp\bdfwsetup.exe ---> Offset = 229376
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\UserInfo.dll ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\ioSpecial.ini ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\ioSpecial.ini ---> Offset = 36
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\modern-wizard.bmp ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\ioSpecial.ini ---> Offset = 124
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\ioSpecial.ini ---> Offset = 33
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\ioSpecial.ini ---> Offset = 43
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\ioSpecial.ini ---> Offset = 60
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\ioSpecial.ini ---> Offset = 278
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\WINDOWS\temp\bdfwsetup.exe
\REGISTRY\MACHINE\SOFTWARE\BingDunDDoS\UserName
\REGISTRY\MACHINE\SOFTWARE\BingDunDDoS\RegisterCode
\REGISTRY\MACHINE\SOFTWARE\BingDunDDoS\Organization
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\TcpTimedWaitDelay
\REGISTRY\MACHINE\SYSTEM\LastKnownGoodRecovery\LastGood\INF/oem12.inf
\REGISTRY\MACHINE\SYSTEM\LastKnownGoodRecovery\LastGood\INF/oem12.PNF
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Network\NetCfgLockHolder\
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\@netcfgx.dll,-50003
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\@netcfgx.dll,-50015
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\@netcfgx.dll,-50002
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\@netcfgx.dll,-50001
\REGISTRY\MACHINE\SYSTEM\LastKnownGoodRecovery\LastGood\INF/bdwrap_m.inf
\REGISTRY\MACHINE\SYSTEM\LastKnownGoodRecovery\LastGood\INF/bdwrap_m.PNF
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Network\{4D36E974-E325-11CE-BFC1-08002BE10318}\{ACDA93F6-B32F-4B8A-9791-C7B659747A21}\Ndi\HelpText
Behavior description:删除注册表键值
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0012\InfSectionExt
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0013\InfSectionExt
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0014\InfSectionExt
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0011\Linkage\BindPath
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0011\Linkage\Bind
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0011\Linkage\Route
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0012\Linkage\BindPath
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0012\Linkage\Bind
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0012\Linkage\Route
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0009\Linkage\BindPath
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0009\Linkage\Bind
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0009\Linkage\Route
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0013\Linkage\BindPath
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0013\Linkage\Bind
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0013\Linkage\Route
Behavior description:删除注册表键
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Network\NetCfgLockHolder\
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
MSCTF.Shared.MUTEX.MCC
Global\NetCfgWriteLock
Global\{84b06608-8026-11d2-b1f2-00c04fd912b2}
RasPbFile
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ComboLBox]
[Window,Class] = [,Button]
[Window,Class] = [Nullsoft Install System v2.10,Static]
[Window,Class] = [Nullsoft Install System v2.10 ,Static]
[Window,Class] = [,Static]
[Window,Class] = [,Auto-Suggest Dropdown]
[Window,Class] = [显示细节(&D),Button]
[Window,Class] = [安装完成,Static]
[Window,Class] = [安装已成功完成。,Static]
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [EDIT,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [RegEdit_RegEdit,]
NtUserFindWindowEx: [Class,Window] = [#32770,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [OleMainThreadWndClass,]
NtUserFindWindowEx: [Class,Window] = [SysListView32,]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000041
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000041
MSCTF.SendReceiveConection.Event.ELH.IC
MSCTF.SendReceive.Event.ELH.IC
_fCanRegisterWithShellService
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000042
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000042
Global\crypt32LogoffEvent
Global\SvcctrlStartEvent_A3752DX
Global\userenv: Machine Group Policy has been applied
userenv: User Group Policy has been applied
\INSTALLATION_SECURITY_HOLD
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000043
Behavior description:获取TickCount值
details:TickCount = 5355531, SleepMilliseconds = 250.
TickCount = 5368581, SleepMilliseconds = 50.
TickCount = 5368862, SleepMilliseconds = 50.
TickCount = 5368925, SleepMilliseconds = 50.
TickCount = 5368940, SleepMilliseconds = 50.
TickCount = 5369846, SleepMilliseconds = 50.
TickCount = 5370596, SleepMilliseconds = 50.
TickCount = 5371693, SleepMilliseconds = 100.
TickCount = 5371709, SleepMilliseconds = 100.
TickCount = 5372206, SleepMilliseconds = 50.
TickCount = 5372237, SleepMilliseconds = 50.
TickCount = 5372253, SleepMilliseconds = 50.
TickCount = 5372331, SleepMilliseconds = 50.
TickCount = 5374331, SleepMilliseconds = 50.
TickCount = 5374346, SleepMilliseconds = 50.
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:屏蔽窗口关闭消息
details:hWnd = 0x001802d8, Text = 冰盾抗DDoS防火墙 8.1 Build 60503 安装 , ClassName = #32770.
Behavior description:窗口信息
details:Pid = 1408, Hwnd=0x8038a, Text = 下一步(&N) >, ClassName = Button.
Pid = 1408, Hwnd=0x1a02ce, Text = 取消(&C), ClassName = Button.
Pid = 1408, Hwnd=0x803ba, Text = Nullsoft Install System v2.10 , ClassName = Static.
Pid = 1408, Hwnd=0x1902fe, Text = Nullsoft Install System v2.10, ClassName = Static.
Pid = 1408, Hwnd=0xe039e, Text = 欢迎使用“冰盾抗DDoS防火墙 8.1 Build 60503”安装向导, ClassName = Static.
Pid = 1408, Hwnd=0xb0398, Text = 这个向导将指引你完成“冰盾抗DDoS防火墙 8.1 Build 60503”的安装进程。 在开始安装之前,建议先关闭其他所有应用程序。这将允许“安装, ClassName = Static.
Pid = 1408, Hwnd=0x1802d8, Text = 冰盾抗DDoS防火墙 8.1 Build 60503 安装, ClassName = #32770.
Pid = 1408, Hwnd=0x100358, Text = < 上一步(&P), ClassName = Button.
Pid = 1408, Hwnd=0x8038a, Text = 我接受(&I), ClassName = Button.
Pid = 1408, Hwnd=0xe035e, Text = 许可证协议, ClassName = Static.
Pid = 1408, Hwnd=0x603a2, Text = 在安装“冰盾抗DDoS防火墙 8.1 Build 60503”之前,请阅读授权协议。, ClassName = Static.
Pid = 1408, Hwnd=0xc0398, Text = 按 [PgDn] 阅读“授权协议”的其余部分。, ClassName = Static.
Pid = 1408, Hwnd=0x14033a, Text = 如果你接受协议中的条款,单击 [我同意(I)] 继续安装。如果你选定 [取消(C)] ,安装程序将会关闭。必须接受协议才能安装“冰盾抗DDoS防火墙, ClassName = Static.
Pid = 1408, Hwnd=0xe035e, Text = 选择组件, ClassName = Static.
Pid = 1408, Hwnd=0x603a2, Text = 选择你想要安装“冰盾抗DDoS防火墙 8.1 Build 60503”的那些功能。, ClassName = Static.
Behavior description:可执行文件签名信息
details:C:\WINDOWS\Temp\bdfwsetup.exe(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\UserInfo.dll(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\InstallOptions.dll(签名验证: 未通过)
C:\Program Files\BingDun\Firewall\bin\efwinstall.exe(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\nsExec.dll(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\ns4E.tmp(签名验证: 未通过)
C:\Program Files\BingDun\Firewall\bdfw.exe(签名验证: 未通过)
C:\Program Files\BingDun\Firewall\PSAPI.DLL(签名验证: 未通过)
C:\Program Files\BingDun\Firewall\easydb.dll(签名验证: 未通过)
C:\Program Files\BingDun\Firewall\libcurl.dll(签名验证: 未通过)
C:\Program Files\BingDun\Firewall\BdFwSvc.exe(签名验证: 未通过)
C:\Program Files\BingDun\Firewall\lang\BdFwChs.dll(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\ns56.tmp(签名验证: 未通过)
C:\Program Files\BingDun\Firewall\Uninstall.exe(签名验证: 未通过)
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 1000.
[2]: MilliSeconds = 250.
[3]: MilliSeconds = 250.
[1]: MilliSeconds = 100.
[2]: MilliSeconds = 100.
[3]: MilliSeconds = 100.
[4]: MilliSeconds = 100.
[5]: MilliSeconds = 100.
[6]: MilliSeconds = 100.
[7]: MilliSeconds = 100.
[8]: MilliSeconds = 100.
[9]: MilliSeconds = 100.
[10]: MilliSeconds = 100.
Behavior description:创建事件对象
details:EventName = MSCTF.SendReceive.Event.MCC.IC
EventName = MSCTF.SendReceiveConection.Event.MCC.IC
EventName = Global\crypt32LogoffEvent
EventName = Global\userenv: User Profile setup event
EventName = DINPUTWINMM
Behavior description:可执行文件MD5
details:C:\WINDOWS\Temp\bdfwsetup.exe ---> e3c00a7fce586b52fb48decb26e60e0a
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\UserInfo.dll ---> 33d9df432f3dc9ee89b0294fd8f0201a
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\InstallOptions.dll ---> 3c19f79ce11facc2fc4d3351dbb263e0
C:\Program Files\BingDun\Firewall\bin\efwinstall.exe ---> c164dff837af3f6316df8df59b8f1ec7
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\nsExec.dll ---> 05d80bc376fef439fb7d2dbb004aa662
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\ns4E.tmp ---> 05d80bc376fef439fb7d2dbb004aa662
C:\Program Files\BingDun\Firewall\bdfw.exe ---> 0042b3abbe017ee354ef8feb52ea3908
C:\Program Files\BingDun\Firewall\PSAPI.DLL ---> b3d22a483875a61cb2060c7d518effc2
C:\Program Files\BingDun\Firewall\easydb.dll ---> ee607ade2e11b920cbed5753060a8429
C:\Program Files\BingDun\Firewall\libcurl.dll ---> 459ba2db3d00c86979029792d2d0b519
C:\Program Files\BingDun\Firewall\BdFwSvc.exe ---> a92bc6bed2263e92fcc3c5dca8c93bfe
C:\Program Files\BingDun\Firewall\lang\BdFwChs.dll ---> 7f0d4f3d9bfc96f812da1fcee45c1a28
C:\Documents and Settings\Administrator\Local Settings\Temp\nsi4D.tmp\ns56.tmp ---> 05d80bc376fef439fb7d2dbb004aa662
C:\Program Files\BingDun\Firewall\Uninstall.exe ---> 4299043a94baf81e3f8bfd9d60972fd0
Behavior description:打开互斥体
details:ShimCacheMutex
Local\!IETld!Mutex
RasPbFile
Behavior description:创建系统服务
details:[服务创建成功]: EasyFirewall, system32\DRIVERS\enetfilt.sys
[服务已存在]: EasyFirewall, system32\DRIVERS\enetfilt.sys
[服务创建成功]: BingDunDDoSSvc, C:\Program Files\BingDun\Firewall\BdFwSvc.exe
Behavior description:加载新释放的文件
details:Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsi4D.tmp\UserInfo.dll.
Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsi4D.tmp\InstallOptions.dll.
Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsi4D.tmp\nsExec.dll.
Image: C:\Program Files\BingDun\Firewall\PSAPI.DLL.
Image: C:\Program Files\BingDun\Firewall\easydb.dll.
Image: C:\Program Files\BingDun\Firewall\libcurl.dll.
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号