VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:212e90dc542ad4d3fe6509b99b88cf23
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 跨进程写入数据
details: TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00300000, Size = 0x00000190 TargetPID = 0x00000b48
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00400000, Size = 0x00001000 TargetPID = 0x00000b48
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x0040e000, Size = 0x00000600 TargetPID = 0x00000b48
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00418600, Size = 0x00003a00 TargetPID = 0x00000b48
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x0041c600, Size = 0x00000600 TargetPID = 0x00000b48
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x7ffdb008, Size = 0x00000004 TargetPID = 0x00000b48
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, WriteAddress = 0x00300000, Size = 0x00000190 TargetPID = 0x00000e1c
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, WriteAddress = 0x00400000, Size = 0x00001000 TargetPID = 0x00000e1c
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, WriteAddress = 0x0042e000, Size = 0x0000ae00 TargetPID = 0x00000e1c
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, WriteAddress = 0x00439000, Size = 0x00018800 TargetPID = 0x00000e1c
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, WriteAddress = 0x0047f800, Size = 0x0000ae00 TargetPID = 0x00000e1c
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, WriteAddress = 0x0048a800, Size = 0x00018800 TargetPID = 0x00000e1c
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, WriteAddress = 0x7ffde008, Size = 0x00000004 TargetPID = 0x00000e1c
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, WriteAddress = 0x00438b41, Size = 0x00000002 TargetPID = 0x00000e1c
Behavior description: 杀掉进程
details: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz
Behavior description: 设置线程上下文
details: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz
Behavior description: 获取TickCount值
details: TickCount = 218909, SleepMilliseconds = 800.
Behavior description: 设置启动项
details: C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\x.vbs
Behavior description: 多次强杀进程
details: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz
Behavior description: 跨进程写代码段数据
details: TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x0040a000, Size = 0x00003a00 TargetPID = 0x00000b48
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x0040d761, Size = 0x00000002 TargetPID = 0x00000b48
Behavior description: 进程提权信息
details: NT AUTHORITY\SYSTEM
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Documents and Settings\Administrator\IECompatCache
Behavior description: 创建系统服务
details: [服务创建成功]: Sou, C:\WINDOWS\system32\qqdvwy.exe
Behavior description: 修改注册表_启动项
details: \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0

Process behavior

Behavior description: 隐藏窗口创建进程
details: ImagePath = , CmdLine = C:\WINDOWS\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz",1: >"C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\x.vbs"
Behavior description: 跨进程写入数据
details: TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00300000, Size = 0x00000190 TargetPID = 0x00000b48
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00400000, Size = 0x00001000 TargetPID = 0x00000b48
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x0040e000, Size = 0x00000600 TargetPID = 0x00000b48
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00418600, Size = 0x00003a00 TargetPID = 0x00000b48
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x0041c600, Size = 0x00000600 TargetPID = 0x00000b48
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x7ffdb008, Size = 0x00000004 TargetPID = 0x00000b48
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, WriteAddress = 0x00300000, Size = 0x00000190 TargetPID = 0x00000e1c
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, WriteAddress = 0x00400000, Size = 0x00001000 TargetPID = 0x00000e1c
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, WriteAddress = 0x0042e000, Size = 0x0000ae00 TargetPID = 0x00000e1c
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, WriteAddress = 0x00439000, Size = 0x00018800 TargetPID = 0x00000e1c
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, WriteAddress = 0x0047f800, Size = 0x0000ae00 TargetPID = 0x00000e1c
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, WriteAddress = 0x0048a800, Size = 0x00018800 TargetPID = 0x00000e1c
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, WriteAddress = 0x7ffde008, Size = 0x00000004 TargetPID = 0x00000e1c
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, WriteAddress = 0x00438b41, Size = 0x00000002 TargetPID = 0x00000e1c
Behavior description: 创建新文件进程
details: [0x00000b04]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz
[0x00000b64]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz
[0x00000b78]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz
[0x00000b80]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz
[0x00000b88]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz
[0x00000b90]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz
[0x00000b98]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz
[0x00000ba0]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz
[0x00000ba8]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz
[0x00000bb0]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz
[0x00000bb8]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz
[0x00000bc0]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz
[0x00000bc8]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz
[0x00000bd0]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz
[0x00000bd8]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz
Behavior description: 创建进程
details: [0x00000b40]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = C:\WINDOWS\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz",1: >"C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\x.vbs"
[0x00000b48]ImagePath = C:\Program Files\Internet Explorer\iexplore.exe, CmdLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
[0x00000e74]ImagePath = C:\Program Files\Internet Explorer\iexplore.exe, CmdLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE" SCODEF:3660 CREDAT:79873
Behavior description: 设置线程上下文
details: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz
Behavior description: 枚举进程
details: N/A
Behavior description: 跨进程写代码段数据
details: TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x0040a000, Size = 0x00003a00 TargetPID = 0x00000b48
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x0040d761, Size = 0x00000002 TargetPID = 0x00000b48
Behavior description: 多次强杀进程
details: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz
Behavior description: 创建本地线程
details: TargetProcess: iexplore.exe, InheritedFromPID = 2820, ProcessID = 2888, ThreadID = 2896, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: iexplore.exe, InheritedFromPID = 2820, ProcessID = 2888, ThreadID = 2900, StartAddress = 00401020, Parameter = 00000000
TargetProcess: iexplore.exe, InheritedFromPID = 2820, ProcessID = 2888, ThreadID = 3072, StartAddress = 77E56C7D, Parameter = 00242D88
TargetProcess: iexplore.exe, InheritedFromPID = 2820, ProcessID = 2888, ThreadID = 3076, StartAddress = 769AE43B, Parameter = 001C76E0
TargetProcess: iexplore.exe, InheritedFromPID = 2820, ProcessID = 2888, ThreadID = 3216, StartAddress = 6359727B, Parameter = 002690F8
TargetProcess: iexplore.exe, InheritedFromPID = 2820, ProcessID = 2888, ThreadID = 3228, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: iexplore.exe, InheritedFromPID = 2820, ProcessID = 2888, ThreadID = 3232, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: iexplore.exe, InheritedFromPID = 2820, ProcessID = 2888, ThreadID = 3300, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: iexplore.exe, InheritedFromPID = 2388, ProcessID = 3660, ThreadID = 3668, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: iexplore.exe, InheritedFromPID = 2388, ProcessID = 3660, ThreadID = 3672, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: iexplore.exe, InheritedFromPID = 2388, ProcessID = 3660, ThreadID = 3676, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: iexplore.exe, InheritedFromPID = 2388, ProcessID = 3660, ThreadID = 3680, StartAddress = 7C949B6F, Parameter = 00000000
TargetProcess: iexplore.exe, InheritedFromPID = 2388, ProcessID = 3660, ThreadID = 3684, StartAddress = 77E56C7D, Parameter = 001967C8
TargetProcess: iexplore.exe, InheritedFromPID = 2388, ProcessID = 3660, ThreadID = 3688, StartAddress = 5DE05ABD, Parameter = 001985C0
TargetProcess: iexplore.exe, InheritedFromPID = 2388, ProcessID = 3660, ThreadID = 3692, StartAddress = 5DE05BC0, Parameter = 00194128
Behavior description: 进程提权信息
details: NT AUTHORITY\SYSTEM
Behavior description: 杀掉进程
details: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz

File behavior

Behavior description: 创建文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\TMP4351$.TMP
C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\1.xyz
C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\1.xy_
C:\Documents and Settings\Administrator\Local Settings\Application Data\CSIDL_
C:\Documents and Settings\Administrator\Local Settings\Application Data\CSIDL_X
C:\WINDOWS\system32\qqdvwy.exe
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{8D056ED0-685E-11E7-91C0-7B****28}.dat
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF6907.tmp
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\{8D056ED1-685E-11E7-91C0-7B****28}.dat
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF8101.tmp
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\yixun_com[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\favicon[1].ico
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Behavior description: 创建可执行文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\1.xyz
C:\WINDOWS\system32\qqdvwy.exe
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Behavior description: 复制文件
details: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xy_ ---> C:\Documents and Settings\Administrator\Local Settings\Application Data\CSIDL_
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xy_ ---> C:\Documents and Settings\Administrator\Local Settings\Application Data\CSIDL_X
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz ---> C:\WINDOWS\system32\qqdvwy.exe
Behavior description: 设置启动项
details: C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\x.vbs
Behavior description: 删除文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\TMP4351$.TMP
C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\1.xy_
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF6907.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF8101.tmp
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\favicon[1].ico
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Behavior description: 查找文件
details: FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\1.xyz
FileName = C:\WINDOWS
FileName = C:\WINDOWS\system32
FileName = C:\WINDOWS\system32\cmd.exe
FileName = C:\Program Files\Internet Explorer\iexplore.exe
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\*
FileName = C:\Program Files\Common Files\Adobe
FileName = C:\Program Files\Common Files\Adobe\Acrobat
FileName = C:\Program Files\Common Files\Adobe\Acrobat\ActiveX
FileName = C:\Program Files\Java
Behavior description: 修改BAT脚本文件
details: C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\x.vbs ---> Offset = 0
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Documents and Settings\Administrator\IECompatCache
Behavior description: 修改文件内容
details: C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\1.xyz ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\1.xyz ---> Offset = 32768
C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\1.xyz ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\1.xyz ---> Offset = 98304
C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\1.xyz ---> Offset = 131072
C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\1.xy_ ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\1.xy_ ---> Offset = 4320
C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\1.xy_ ---> Offset = 37088
C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\1.xy_ ---> Offset = 69856
C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\1.xy_ ---> Offset = 102624
C:\Documents and Settings\Administrator\Local Settings\Application Data\CSIDL_ ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Application Data\CSIDL_ ---> Offset = 131072
C:\Documents and Settings\Administrator\Local Settings\Application Data\CSIDL_ ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Application Data\CSIDL_X ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Application Data\CSIDL_X ---> Offset = 65536

Network behavior

Behavior description: 下载文件
details: URLDownloadToFileW: http://ww****om/favicon.ico ---> C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Behavior description: 连接指定站点
details: InternetConnectA: ServerName = ww****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = ur****om, PORT = 443, UserName = , Password = , hSession = 0x00cc0010, hConnect = 0x00cc0014, Flags = 0x00000200
Behavior description: 打开HTTP连接
details: InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489), hSession = 0x00cc0004
InternetOpenA: UserAgent: VCSoapClient, hSession = 0x00cc0010
Behavior description: 建立到一个指定的套接字连接
details: URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000444
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x0000057c
URL: ur****om, IP: **.133.40.**:443, SOCKET = 0x00000588
Behavior description: 读取网络文件
details: hFile = 0x00cc000c, BytesToRead =2048, BytesRead = 2048.
hFile = 0x00cc0018, BytesToRead =4095, BytesRead = 4095.
Behavior description: 发送HTTP包
details: GET / HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Accept-Encoding: gzip, deflate Host: ww****om Connection: Keep-Alive
GET /favicon.ico HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: ww****om Connection: Keep-Alive
Behavior description: 打开HTTP请求
details: HttpOpenRequestA: ww****om:80/, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400200
HttpOpenRequestA: ww****om:80/favicon.ico, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00600010
HttpOpenRequestA: ur****om:443/urs.asmx?msurs-client-key=nu59ascpi7ztukgtf49a4a%3d%3d&msurs-patented-lock=oo8vhtfjqgy%3d, hConnect = 0x00cc0014, hRequest = 0x00cc0018, Verb: POST, Referer: , Flags = 0x04880300
Behavior description: 按名称获取主机地址
details: GetAddrInfoW: ww****om
GetAddrInfoW: ur****om

Registry behavior

Behavior description: 删除注册表键
details: \REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\{63800dac-e7ca-4df9-9a5c-20765055488d}\
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBA}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBA}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBB}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBB}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBC}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBC}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-FFFF-ABCDEFFEDCBA}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-FFFF-ABCDEFFEDCBA}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\
\REGISTRY\USER\S-*_CLASSES\JavaPlugin.1000\CLSID\
Behavior description: 删除注册表键值
details: \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\Security\AntiPhishing\2CEDBFBC-DBA8-43AA-B1FD-CC8E6316E3E2\UserFile
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\Recovery\Active\{8D056ED0-685E-11E7-91C0-7B****28}
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\{63800dac-e7ca-4df9-9a5c-20765055488d}\Enable
\REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1EA4DBF0-3C3B-11CF-810C-00AA00389B71}\1.1\0\win32\
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\Main\Window_Placement
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Count
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Time
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTime
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTimeCount
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore\Count
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore\Time
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBA}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBA}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBA}\InprocServer32\ThreadingModel
Behavior description: 修改注册表_启动项
details: \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0

Other behavior

Behavior description: 创建互斥体
details: CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
qazwsxedcrfv
Local\c:!documents and settings!administrator!local settings!application data!microsoft!feeds cache!
Local\!PrivacIE!SharedMemory!Mutex
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
SmartScreen_UrsCacheMutex_2CEDBFBC-DBA8-43AA-B1FD-CC8E6316E3E2High_S-*
SmartScreen_ClientId_Mutex
Behavior description: 创建事件对象
details: EventName = Global\userenv: User Profile setup event
EventName = Global\crypt32LogoffEvent
EventName = Isolation Signal Registry Event (8D056ECD-685E-11E7-91C0-7B****28, 0)
EventName = IE_EarlyTabStart_0xe50
EventName = Isolation Signal Registry Event (8D056ECE-685E-11E7-91C0-7B****28, 0)
EventName = DINPUTWINMM
EventName = Local\RSS Eventing Event Event 00000e4c
EventName = Local\e74_29
EventName = IEFrame.EventCheckDefaultBrowser
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [Progman,]
NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
NtUserFindWindowEx: [Class,Window] = [Static,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
Behavior description: 启动系统服务
details: [服务启动失败]: LocalSystem, Gou, C:\WINDOWS\system32\qqdvwy.exe
Behavior description: 获取TickCount值
details: TickCount = 218909, SleepMilliseconds = 800.
Behavior description: 调整进程token权限
details: SE_LOAD_DRIVER_PRIVILEGE
Behavior description: 打开事件
details: Global\crypt32LogoffEvent
HookSwitchHookEnabledEvent
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
MSFT.VSA.COM.DISABLE.2888
MSFT.VSA.IEC.STATUS.6c736db0
Global\SvcctrlStartEvent_A3752DX
Isolation Signal Registry Event (8D056ECD-685E-11E7-91C0-7B****28, 0)
\INSTALLATION_SECURITY_HOLD
Isolation Signal Registry Event (8D056ECE-685E-11E7-91C0-7B****28, 0)
IE_EarlyTabStart_0xe50
_fCanRegisterWithShellService
MSFT.VSA.COM.DISABLE.3660
MSFT.VSA.COM.DISABLE.3700
Local\RSS Eventing Event Event 00000e4c
Local\e74_29
Behavior description: 可执行文件签名信息
details: C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\1.xyz(签名验证: 未通过)
C:\WINDOWS\system32\qqdvwy.exe(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico(签名验证: 未通过)
Behavior description: 调用Sleep函数
details: [1]: MilliSeconds = 800.
[2]: MilliSeconds = 300.
[3]: MilliSeconds = 300.
Behavior description: 隐藏指定窗口
details: [Window,Class] = [1 - My11,AfxMDIFrame42]
[Window,Class] = [,BrowserFrameGripperClass]
[Window,Class] = [缩放级别,ToolbarWindow32]
[Window,Class] = [,msctls_progress32]
[Window,Class] = [,SysLink]
[Window,Class] = [,Static]
[Window,Class] = [文件大小未知,Static]
[Window,Class] = [http://www.yixun.com/ - Windows Internet Explorer,IEFrame]
[Window,Class] = [打开此类文件前总是询问(&W),Button]
[Window,Class] = [发行者:,Static]
[Window,Class] = [,UniversalSearchBand]
[Window,Class] = [,TravelBand]
[Window,Class] = [,CommandBarClass]
[Window,Class] = [,ReBarWindow32]
[Window,Class] = [,TabBandClass]
Behavior description: 可执行文件MD5
details: C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\1.xyz ---> ee35aa7b54d7027a50a777d6c523c2cf
C:\WINDOWS\system32\qqdvwy.exe ---> ee35aa7b54d7027a50a777d6c523c2cf
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico ---> fe1d0ee5901dd167ee9b28eece31786c
Behavior description: 打开互斥体
details: ShimCacheMutex
qazwsxedc
qazwsxedcrfv
Local\_!MSFTHISTORY!_
Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Local\c:!documents and settings!administrator!cookies!
Local\c:!documents and settings!administrator!local settings!history!history.ie5!
Local\c:!documents and settings!administrator!local settings!application data!microsoft!feeds cache!
Local\!IETld!Mutex
CtfmonInstMutexDefaultS-*
Local\WininetStartupMutex
Local\WininetConnectionMutex
Local\WininetProxyRegistryMutex
Local\!BrowserEmulation!SharedMemory!Mutex
RasPbFile
Behavior description: 创建系统服务
details: [服务创建成功]: Sou, C:\WINDOWS\system32\qqdvwy.exe