VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:17d551da6af1cc9cd64cc51425eab097
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 修改注册表_Winsock劫持
details: \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000001\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000002\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000003\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000004\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000005\PackedCatalogItem
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\IETldCache
C:\Documents and Settings\Administrator\IECompatCache
Behavior description: 获取TickCount值
details: TickCount = 487081, SleepMilliseconds = 50.
TickCount = 487128, SleepMilliseconds = 50.
TickCount = 487143, SleepMilliseconds = 50.
TickCount = 487268, SleepMilliseconds = 50.
TickCount = 487284, SleepMilliseconds = 50.
TickCount = 487300, SleepMilliseconds = 50.
TickCount = 487315, SleepMilliseconds = 50.
TickCount = 487346, SleepMilliseconds = 50.
TickCount = 487362, SleepMilliseconds = 50.
TickCount = 487378, SleepMilliseconds = 50.
TickCount = 487425, SleepMilliseconds = 50.
TickCount = 487440, SleepMilliseconds = 50.
TickCount = 487456, SleepMilliseconds = 50.
TickCount = 487487, SleepMilliseconds = 50.
TickCount = 488721, SleepMilliseconds = 50.

Process behavior

Behavior description: 创建本地线程
details: TargetProcess: windows品牌1.7.exe, InheritedFromPID = 1944, ProcessID = 2012, ThreadID = 1956, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: windows品牌1.7.exe, InheritedFromPID = 1944, ProcessID = 2012, ThreadID = 1500, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: windows品牌1.7.exe, InheritedFromPID = 1944, ProcessID = 2012, ThreadID = 168, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: windows品牌1.7.exe, InheritedFromPID = 1944, ProcessID = 2012, ThreadID = 180, StartAddress = 6302B849, Parameter = 001A6B88
TargetProcess: day.exe, InheritedFromPID = 2012, ProcessID = 788, ThreadID = 1412, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: day.exe, InheritedFromPID = 2012, ProcessID = 788, ThreadID = 1048, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: iexplore.exe, InheritedFromPID = 1808, ProcessID = 1388, ThreadID = 2116, StartAddress = 6302B849, Parameter = 00196270
TargetProcess: iexplore.exe, InheritedFromPID = 1808, ProcessID = 1388, ThreadID = 2132, StartAddress = 77E56C7D, Parameter = 001D0908
TargetProcess: iexplore.exe, InheritedFromPID = 1808, ProcessID = 1388, ThreadID = 2136, StartAddress = 77E56C7D, Parameter = 001DBD28
TargetProcess: iexplore.exe, InheritedFromPID = 1808, ProcessID = 1388, ThreadID = 2144, StartAddress = 0138507F, Parameter = 0217E400
TargetProcess: iexplore.exe, InheritedFromPID = 888, ProcessID = 1808, ThreadID = 2164, StartAddress = 769AE43B, Parameter = 001CD988
TargetProcess: iexplore.exe, InheritedFromPID = 888, ProcessID = 1808, ThreadID = 2168, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: iexplore.exe, InheritedFromPID = 888, ProcessID = 1808, ThreadID = 2172, StartAddress = 7C930230, Parameter = 00000000
Behavior description: 创建新文件进程
details: ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\day.exe, CmdLine = "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\day.exe"

File behavior

Behavior description: 创建文件
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\wpad[1].dat
C:\Documents and Settings\Administrator\Local Settings\Temp\day.exe
C:\WINDOWS\system32\TenSP.dll
C:\WINDOWS\system32\ESPI11.dll
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\yixun_com[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\favicon[1].ico
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
C:\Documents and Settings\Administrator\Local Settings\Temp\Kno4.tmp
Behavior description: 创建可执行文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\day.exe
C:\WINDOWS\system32\TenSP.dll
C:\WINDOWS\system32\ESPI11.dll
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
C:\Documents and Settings\Administrator\Local Settings\Temp\Kno4.tmp
Behavior description: 覆盖已有文件
details: C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
C:\Documents and Settings\Administrator\Local Settings\Temp\Kno4.tmp
Behavior description: 查找文件
details: FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\WINDOWS\system32\Ras\*.pbk
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\Documents and Settings\Administrator\My Documents
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\Documents
FileName = C:\Documents and Settings\Administrator\桌面
FileName = C:\Documents and Settings\All Users\桌面
FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
Behavior description: 删除文件
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\wpad[1].dat
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\favicon[1].ico
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
C:\Documents and Settings\Administrator\Local Settings\Temp\Kno4.tmp
Behavior description: 复制文件
details: C:\WINDOWS\system32\/TenSP.dll ---> C:\WINDOWS\system32\ESPI11.dll
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\IETldCache
C:\Documents and Settings\Administrator\IECompatCache
Behavior description: 修改文件内容
details: C:\Documents and Settings\Administrator\Local Settings\Temp\day.exe ---> Offset = 0
C:\WINDOWS\system32\TenSP.dll ---> Offset = 0
C:\WINDOWS\system32\ESPI11.dll ---> Offset = 0
C:\WINDOWS\system32\ESPI11.dll ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT ---> Offset = 0
C:\WINDOWS\system32\ESPI11.dll ---> Offset = 4096
C:\WINDOWS\system32\ESPI11.dll ---> Offset = 8192
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\Kno4.tmp ---> Offset = 0

Network behavior

Behavior description: 联网打开网址
details: InternetOpenUrlA: http://**.133.40.**:128/wpad.dat, hInternet = 0x00cc0010, Flags = 0x00000010
Behavior description: 下载文件
details: C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
URLDownloadToFileW: https://go****om/fwlink/?LinkId=141260 ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Kno4.tmp
Behavior description: 连接指定站点
details: InternetConnectA: ServerName = ww****pw, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = **.133.40.**, PORT = 128, UserName = , Password = , hSession = 0x00cc0010, hConnect = 0x00cc0014, Flags = 0x00000010
InternetConnectA: ServerName = go****om, PORT = 443, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00800000
InternetConnectA: ServerName = ur****om, PORT = 443, UserName = , Password = , hSession = 0x00cc0010, hConnect = 0x00cc0014, Flags = 0x00000200
Behavior description: 打开HTTP连接
details: InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0), hSession = 0x00cc0004
InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0), hSession = 0x00cc0010
InternetOpenA: UserAgent: VCSoapClient, hSession = 0x00cc0010
Behavior description: 建立到一个指定的套接字连接
details: URL: wpad, IP: **.133.40.**:128, SOCKET = 0x00000528
URL: ww****pw, IP: **.133.40.**:80, SOCKET = 0x0000052c
URL: ww****pw, IP: **.133.40.**:80, SOCKET = 0x00000500
URL: ww****pw, IP: **.133.40.**:80, SOCKET = 0x000004f8
URL: , IP: **.0.0.**:1035, SOCKET = 0x00000410
URL: wpad, IP: **.133.40.**:128, SOCKET = 0x000004fc
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000504
URL: , IP: **.0.0.**:1038, SOCKET = 0x000002c8
URL: wpad, IP: **.133.40.**:128, SOCKET = 0x0000043c
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000440
URL: ur****om, IP: **.133.40.**:443, SOCKET = 0x000005fc
Behavior description: 读取网络文件
details: hFile = 0x00cc0018, BytesToRead =4010, BytesRead = 4010.
hFile = 0x00cc000c, BytesToRead =102400, BytesRead = 102400.
hFile = 0x00cc000c, BytesToRead =2048, BytesRead = 2048.
Behavior description: 发送HTTP包
details: GET /wpad.dat HTTP/1.1 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0) Host: **.133.40.**:128
GET /lyb.php?pid=51825 HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Accept: */* Host: ww****pw Cache-Control: no-cache
GET / HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Accept-Encoding: gzip, deflate Host: ww****om Connection: Keep-Alive
GET /favicon.ico HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: ww****om Connection: Keep-Alive
Behavior description: 打开HTTP请求
details: HttpOpenRequestA: ww****pw:80/lyb.php?pid=51825, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x84000000
HttpOpenRequestA: **.133.40.**:128/wpad.dat, hConnect = 0x00cc0014, hRequest = 0x00cc0018, Verb: GET, Referer: , Flags = 0x00000010
HttpOpenRequestA: go****om:443/fwlink/?linkid=141260, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00c00010
HttpOpenRequestA: ur****om:443/urs.asmx?msurs-client-key=wjxnpa1rp6tsig%2brfs52qq%3d%3d&msurs-patented-lock=pybtfii5afs%3d, hConnect = 0x00cc0014, hRequest = 0x00cc0018, Verb: POST, Referer: , Flags = 0x04880300
Behavior description: 按名称获取主机地址
details: GetAddrInfoW: computer
GetAddrInfoW: wpad
GetAddrInfoW: ww****pw
GetAddrInfoW: ww****om
GetAddrInfoW: go****om
GetAddrInfoW: ur****om

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\windows品牌1.7\DEBUG\Trace Level
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\day.exe
\REGISTRY\USER\S-*\Software\Microsoft\Direct3D\MostRecentApplication\Name
\REGISTRY\USER\S-*\Software\Microsoft\Multimedia\DrawDib\vga.drv 1920x973x16(565 0)
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Count
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Time
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTime
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTimeCount
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\SearchScopes\Version
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\SearchScopes\UpgradeTime
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\Security\AntiPhishing\2CEDBFBC-DBA8-43AA-B1FD-CC8E6316E3E2\UserFile
Behavior description: 删除注册表键值
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\windows品牌1.7\DEBUG\Trace Level
Behavior description: 修改注册表_分层网络协议
details: \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\ESPI11\1001
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\ESPI11\1002
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\ESPI11\1003
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\ESPI11\1004
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\ESPI11\1005
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\ESPI11\FileName
Behavior description: 修改注册表_Winsock劫持
details: \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000001\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000002\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000003\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000004\PackedCatalogItem
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000005\PackedCatalogItem

Other behavior

Behavior description: 创建互斥体
details: RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
Local\c:!documents and settings!administrator!ietldcache!
MSCTF.Shared.MUTEX.ELH
DDrawWindowListMutex
__DDrawExclMode__
Behavior description: 隐藏指定窗口
details: [Window,Class] = [,_EL_Timer]
[Window,Class] = [,WindowEx]
[Window,Class] = [,labelEx]
[Window,Class] = [,Afx:400000:8]
[Window,Class] = [,_EL_ClientSock]
[Window,Class] = [缩放级别,ToolbarWindow32]
[Window,Class] = [,msctls_progress32]
[Window,Class] = [http://www.yixun.com/ - Windows Internet Explorer,IEFrame]
[Window,Class] = [,SysLink]
[Window,Class] = [,UniversalSearchBand]
[Window,Class] = [,TravelBand]
[Window,Class] = [,CommandBarClass]
[Window,Class] = [,ReBarWindow32]
[Window,Class] = [,TabBandClass]
[Window,Class] = [,Static]
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [,Microsoft Internet Explorer]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
Behavior description: 获取TickCount值
details: TickCount = 487081, SleepMilliseconds = 50.
TickCount = 487128, SleepMilliseconds = 50.
TickCount = 487143, SleepMilliseconds = 50.
TickCount = 487268, SleepMilliseconds = 50.
TickCount = 487284, SleepMilliseconds = 50.
TickCount = 487300, SleepMilliseconds = 50.
TickCount = 487315, SleepMilliseconds = 50.
TickCount = 487346, SleepMilliseconds = 50.
TickCount = 487362, SleepMilliseconds = 50.
TickCount = 487378, SleepMilliseconds = 50.
TickCount = 487425, SleepMilliseconds = 50.
TickCount = 487440, SleepMilliseconds = 50.
TickCount = 487456, SleepMilliseconds = 50.
TickCount = 487487, SleepMilliseconds = 50.
TickCount = 488721, SleepMilliseconds = 50.
Behavior description: 调整进程token权限
details: SE_LOAD_DRIVER_PRIVILEGE
Behavior description: 窗口信息
details: Pid = 2012, Hwnd=0x202c2, Text = 确定, ClassName = Button.
Pid = 2012, Hwnd=0x402d4, Text = 信息:, ClassName = #32770.
Pid = 788, Hwnd=0x202f6, Text = 北哥破解, ClassName = WTWindow.
Behavior description: 可执行文件签名信息
details: C:\Documents and Settings\Administrator\Local Settings\Temp\day.exe(签名验证: 未通过)
C:\WINDOWS\system32\TenSP.dll(签名验证: 未通过)
C:\WINDOWS\system32\ESPI11.dll(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\Kno4.tmp(签名验证: 未通过)
Behavior description: 创建事件对象
details: EventName = DINPUTWINMM
EventName = Global\userenv: User Profile setup event
EventName = Global\crypt32LogoffEvent
EventName = MSCTF.SendReceive.Event.IGD.IC
EventName = MSCTF.SendReceiveConection.Event.IGD.IC
EventName = Local\56c_29
Behavior description: 可执行文件MD5
details: C:\Documents and Settings\Administrator\Local Settings\Temp\day.exe ---> 41b18e51f4a0113a8f6d89c5a78380a5
C:\WINDOWS\system32\TenSP.dll ---> c3adbb35a05b44bc877a895d273aa270
C:\WINDOWS\system32\ESPI11.dll ---> c3adbb35a05b44bc877a895d273aa270
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico ---> fe1d0ee5901dd167ee9b28eece31786c
C:\Documents and Settings\Administrator\Local Settings\Temp\Kno4.tmp ---> fe1d0ee5901dd167ee9b28eece31786c
Behavior description: 加载新释放的文件
details: Image: C:\WINDOWS\system32\TenSP.dll.
Image: C:\WINDOWS\system32\ESPI11.dll.