VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:5879fbcd2cf48d38b56aca931888fc65
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 探测 Virtual PC是否存在
details: N/A
Behavior description: 对比可疑进程名
details: lstrcmpiA: System <------> avp.exe Des: 卡巴斯基
lstrcmpiA: smss.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: csrss.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: winlogon.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: services.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: lsass.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: 33oxService.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: 33acthlp.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: svchost.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: spoolsv.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: 33UpgradeHelper.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: alg.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: explorer.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: 33oxTray.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: ctfmon.exe <------> avp.exe Des: 卡巴斯基
Behavior description: 尝试打开调试器或监控软件的驱动设备对象
details: \??\SICE
\??\SIWVID
\??\NTICE
Behavior description: 获取TickCount值
details: TickCount = 5429612, SleepMilliseconds = 50.
TickCount = 5429628, SleepMilliseconds = 50.
TickCount = 5429800, SleepMilliseconds = 50.
TickCount = 5429831, SleepMilliseconds = 50.
TickCount = 5430346, SleepMilliseconds = 50.
TickCount = 5431003, SleepMilliseconds = 50.
TickCount = 5431081, SleepMilliseconds = 50.
TickCount = 5433893, SleepMilliseconds = 50.
TickCount = 5433925, SleepMilliseconds = 50.
TickCount = 5434034, SleepMilliseconds = 50.
TickCount = 5434065, SleepMilliseconds = 50.
TickCount = 5434534, SleepMilliseconds = 50.
TickCount = 5434565, SleepMilliseconds = 50.
TickCount = 5434581, SleepMilliseconds = 50.
TickCount = 5434612, SleepMilliseconds = 50.
Behavior description: 创建系统服务
details: [服务创建成功]: Aqrjab Tlmdu, C:\Program Files\Google\systev.com
Behavior description: 打开注册表_检测虚拟机相关
details: \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Behavior description: 自删除
details: C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\LocalService\Local Settings\History
C:\Documents and Settings\LocalService\Local Settings\History\History.IE5
C:\Documents and Settings\LocalService\Cookies
Behavior description: 直接获取CPU时钟
details: EAX = 0xe688658f, EDX = 0x0000118f
EAX = 0xe68865db, EDX = 0x0000118f
EAX = 0xe6886627, EDX = 0x0000118f
EAX = 0xe6886673, EDX = 0x0000118f
EAX = 0xe68866bf, EDX = 0x0000118f
EAX = 0xe688670b, EDX = 0x0000118f
EAX = 0xe6886757, EDX = 0x0000118f
EAX = 0xe68867a3, EDX = 0x0000118f
EAX = 0xe68867ef, EDX = 0x0000118f
EAX = 0xe688683b, EDX = 0x0000118f
EAX = 0xdd3c86fa, EDX = 0x00001194
EAX = 0xdd3c8746, EDX = 0x00001194
EAX = 0xdd3c8792, EDX = 0x00001194
EAX = 0xdd3c87de, EDX = 0x00001194
EAX = 0xdd3c882a, EDX = 0x00001194
Behavior description: 查找指定内核模块
details: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> hal.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> KDCOM.DLL Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BOOTVID.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ACPI.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> WMILIB.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> pci.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> isapnp.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> compbatt.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BATTC.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> intelide.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> MountMgr.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ftdisk.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> dmload.sys Des: SoftICE驱动
Behavior description: 查找反病毒常用工具窗口
details: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]
Behavior description: VMWare特殊指令检测虚拟机
details: N/A

Process behavior

Behavior description: 隐藏窗口创建进程
details: ImagePath = C:\WINDOWS\System32\WScript.exe, CmdLine = "C:\WINDOWS\System32\WScript.exe" "C:\2928.vbs"
Behavior description: 创建进程
details: ImagePath = C:\WINDOWS\system32\wscript.exe, CmdLine = "C:\WINDOWS\System32\WScript.exe" "C:\2928.vbs"
Behavior description: 创建新文件进程
details: ImagePath = C:\Program Files\Google\systev.com, CmdLine = "C:\Program Files\Google\systev.com"
Behavior description: 枚举进程
details: N/A
Behavior description: 创建本地线程
details: TargetProcess: systev.com, InheritedFromPID = 656, ProcessID = 2012, ThreadID = 2064, StartAddress = 77DC3519, Parameter = 001956C0
TargetProcess: systev.com, InheritedFromPID = 656, ProcessID = 2012, ThreadID = 2080, StartAddress = 7854345E, Parameter = 00D675D8
TargetProcess: wscript.exe, InheritedFromPID = 576, ProcessID = 2240, ThreadID = 2256, StartAddress = 01002FD4, Parameter = 008E4400
TargetProcess: systev.com, InheritedFromPID = 656, ProcessID = 2012, ThreadID = 2272, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: systev.com, InheritedFromPID = 656, ProcessID = 2012, ThreadID = 2284, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: systev.com, InheritedFromPID = 656, ProcessID = 2012, ThreadID = 2288, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: wscript.exe, InheritedFromPID = 576, ProcessID = 2240, ThreadID = 2296, StartAddress = 765E964D, Parameter = 001BCAF8
TargetProcess: systev.com, InheritedFromPID = 656, ProcessID = 2012, ThreadID = 2300, StartAddress = 6302B849, Parameter = 001C89C8

File behavior

Behavior description: 创建文件
details: C:\Program Files\Google\systev.com
C:\2928.vbs
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\0DQRCL6J\wpad[1].dat
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\0DQRCL6J\cgi_get_portrait[1].fcg
Behavior description: 创建可执行文件
details: C:\Program Files\Google\systev.com
Behavior description: 复制文件
details: C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe ---> C:\Program Files\Google\systev.com
Behavior description: 删除文件
details: C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\0DQRCL6J\wpad[1].dat
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\0DQRCL6J\cgi_get_portrait[1].fcg
C:\2928.vbs
Behavior description: 查找文件
details: FileName = C:\WINDOWS
FileName = C:\WINDOWS\WinSxS
FileName = C:\WINDOWS\WinSxS\x86_Microsoft.VC90.CRT_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_6f74963e\MSVCR90.dll
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\My Documents
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\Documents
FileName = C:\Documents and Settings\Administrator\桌面
FileName = C:\Documents and Settings\All Users\桌面
FileName = C:\2928.vbs
FileName = C:\WINDOWS\System32
FileName = C:\WINDOWS\System32\WScript.exe
FileName = C:\WINDOWS\system32
FileName = C:\WINDOWS\system32\wscript.exe
Behavior description: 修改BAT脚本文件
details: C:\2928.vbs ---> Offset = 0
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\LocalService\Local Settings\History
C:\Documents and Settings\LocalService\Local Settings\History\History.IE5
C:\Documents and Settings\LocalService\Cookies
Behavior description: 修改文件内容
details: C:\Program Files\Google\systev.com ---> Offset = 0
C:\Program Files\Google\systev.com ---> Offset = 65536
C:\Program Files\Google\systev.com ---> Offset = 131072
C:\Program Files\Google\systev.com ---> Offset = 196608
C:\Program Files\Google\systev.com ---> Offset = 262144
Behavior description: 自删除
details: C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe

Network behavior

Behavior description: 联网打开网址
details: InternetOpenUrlA: http://us****om/fcg-bin/cgi_get_portrait.fcg?uins=860100371, hInternet = 0x00cc0004, Flags = 0x00000001
InternetOpenUrlA: http://**.133.40.**:128/wpad.dat, hInternet = 0x00cc0008, Flags = 0x00000010
Behavior description: 连接指定站点
details: InternetConnectA: ServerName = **.133.40.**, PORT = 128, UserName = , Password = , hSession = 0x00cc0008, hConnect = 0x00cc000c, Flags = 0x00000010
InternetConnectA: ServerName = us****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000001
Behavior description: 打开HTTP连接
details: InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0), hSession = 0x00cc0008
Behavior description: 建立到一个指定的套接字连接
details: URL: , IP: **.5.252.**:81, SOCKET = 0x0000012c
URL: wpad, IP: **.133.40.**:128, SOCKET = 0x000003e0
URL: us****om, IP: **.133.40.**:80, SOCKET = 0x00000320
URL: us****om, IP: **.133.40.**:80, SOCKET = 0x000003e8
URL: us****om, IP: **.133.40.**:80, SOCKET = 0x00000364
URL: us****om, IP: **.133.40.**:80, SOCKET = 0x00000358
URL: us****om, IP: **.133.40.**:80, SOCKET = 0x0000035c
Behavior description: 读取网络文件
details: hFile = 0x00cc0010, BytesToRead =4010, BytesRead = 4010.
hFile = 0x00cc000c, BytesToRead =4096, BytesRead = 4096.
Behavior description: 发送HTTP包
details: GET /wpad.dat HTTP/1.1 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0) Host: **.133.40.**:128
GET /fcg-bin/cgi_get_portrait.fcg?uins=860100371 HTTP/1.1 Host: us****om
Behavior description: 打开HTTP请求
details: HttpOpenRequestA: **.133.40.**:128/wpad.dat, hConnect = 0x00cc000c, hRequest = 0x00cc0010, Verb: GET, Referer: , Flags = 0x00000010
HttpOpenRequestA: us****om:80/fcg-bin/cgi_get_portrait.fcg?uins=860100371, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00000001
Behavior description: 按名称获取主机地址
details: GetAddrInfoW: computer
GetAddrInfoW: wpad
GetAddrInfoW: us****om

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\Aqrjab Tlmdu\MarkTime
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\Aqrjab Tlmdu\Description
\REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum\Version
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\WINDOWS\System32\WScript.exe
\REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Cache
\REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Cookies
\REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\History
\REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ParseAutoexec
\REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable
\REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\systev\DEBUG\Trace Level
\REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect
Behavior description: 删除注册表键值
details: \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyOverride
\REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\systev\DEBUG\Trace Level
Behavior description: 打开注册表_检测虚拟机相关
details: \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__

Other behavior

Behavior description: 检测自身是否被调试
details: N/A
Behavior description: 启动系统服务
details: [服务启动成功]: LocalSystem, Abrjkb Tumduvne Gxoghypq Jbcs, C:\Program Files\Google\systev.com
Behavior description: 获取光标位置
details: CursorPos = (96,18500), SleepMilliseconds = 50.
CursorPos = (6389,26533), SleepMilliseconds = 50.
Behavior description: 可执行文件签名信息
details: C:\Program Files\Google\systev.com(签名验证: 未通过)
Behavior description: 查找指定内核模块
details: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> hal.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> KDCOM.DLL Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BOOTVID.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ACPI.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> WMILIB.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> pci.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> isapnp.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> compbatt.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BATTC.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> intelide.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> MountMgr.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ftdisk.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> dmload.sys Des: SoftICE驱动
Behavior description: VMWare特殊指令检测虚拟机
details: N/A
Behavior description: 可执行文件MD5
details: C:\Program Files\Google\systev.com ---> 5879fbcd2cf48d38b56aca931888fc65
Behavior description: 创建系统服务
details: [服务创建成功]: Aqrjab Tlmdu, C:\Program Files\Google\systev.com
Behavior description: 查找反病毒常用工具窗口
details: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]
Behavior description: 创建互斥体
details: CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
81
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
eed3bd3a-a1ad-4e99-987b-d7cb3fcfa7f0 - S-1-5-18
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
RasPbFile
Behavior description: 对比可疑进程名
details: lstrcmpiA: System <------> avp.exe Des: 卡巴斯基
lstrcmpiA: smss.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: csrss.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: winlogon.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: services.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: lsass.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: 33oxService.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: 33acthlp.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: svchost.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: spoolsv.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: 33UpgradeHelper.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: alg.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: explorer.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: 33oxTray.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: ctfmon.exe <------> avp.exe Des: 卡巴斯基
Behavior description: 尝试打开调试器或监控软件的驱动设备对象
details: \??\SICE
\??\SIWVID
\??\NTICE
Behavior description: 获取TickCount值
details: TickCount = 5429612, SleepMilliseconds = 50.
TickCount = 5429628, SleepMilliseconds = 50.
TickCount = 5429800, SleepMilliseconds = 50.
TickCount = 5429831, SleepMilliseconds = 50.
TickCount = 5430346, SleepMilliseconds = 50.
TickCount = 5431003, SleepMilliseconds = 50.
TickCount = 5431081, SleepMilliseconds = 50.
TickCount = 5433893, SleepMilliseconds = 50.
TickCount = 5433925, SleepMilliseconds = 50.
TickCount = 5434034, SleepMilliseconds = 50.
TickCount = 5434065, SleepMilliseconds = 50.
TickCount = 5434534, SleepMilliseconds = 50.
TickCount = 5434565, SleepMilliseconds = 50.
TickCount = 5434581, SleepMilliseconds = 50.
TickCount = 5434612, SleepMilliseconds = 50.
Behavior description: 打开事件
details: HookSwitchHookEnabledEvent
Global\SvcctrlStartEvent_A3752DX
_fCanRegisterWithShellService
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
MSFT.VSA.COM.DISABLE.2240
MSFT.VSA.IEC.STATUS.6c736db0
Global\crypt32LogoffEvent
\INSTALLATION_SECURITY_HOLD
Behavior description: 搜索kernel32.dll基地址
details: Instruction Address = 0x004338e4
Behavior description: 直接获取CPU时钟
details: EAX = 0xe688658f, EDX = 0x0000118f
EAX = 0xe68865db, EDX = 0x0000118f
EAX = 0xe6886627, EDX = 0x0000118f
EAX = 0xe6886673, EDX = 0x0000118f
EAX = 0xe68866bf, EDX = 0x0000118f
EAX = 0xe688670b, EDX = 0x0000118f
EAX = 0xe6886757, EDX = 0x0000118f
EAX = 0xe68867a3, EDX = 0x0000118f
EAX = 0xe68867ef, EDX = 0x0000118f
EAX = 0xe688683b, EDX = 0x0000118f
EAX = 0xdd3c86fa, EDX = 0x00001194
EAX = 0xdd3c8746, EDX = 0x00001194
EAX = 0xdd3c8792, EDX = 0x00001194
EAX = 0xdd3c87de, EDX = 0x00001194
EAX = 0xdd3c882a, EDX = 0x00001194
Behavior description: 探测 Virtual PC是否存在
details: N/A
Behavior description: 创建事件对象
details: EventName = DINPUTWINMM
EventName = Global\crypt32LogoffEvent
EventName = Global\userenv: User Profile setup event
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [18467-41,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
Behavior description: 调整进程token权限
details: SE_LOAD_DRIVER_PRIVILEGE
Behavior description: 调用Sleep函数
details: [1]: MilliSeconds = 50.
[2]: MilliSeconds = 50.
[2]: MilliSeconds = 1.
[3]: MilliSeconds = 0.
[4]: MilliSeconds = 0.
[5]: MilliSeconds = 0.
[6]: MilliSeconds = 0.
[7]: MilliSeconds = 0.
[8]: MilliSeconds = 0.
[9]: MilliSeconds = 0.
[10]: MilliSeconds = 0.
Behavior description: 打开互斥体
details: DBWinMutex
Local\!IETld!Mutex
ShimCacheMutex
Local\_!MSFTHISTORY!_
Local\c:!documents and settings!localservice!local settings!temporary internet files!content.ie5!
Local\c:!documents and settings!localservice!cookies!
Local\c:!documents and settings!localservice!local settings!history!history.ie5!
Local\WininetStartupMutex
Local\WininetProxyRegistryMutex
RasPbFile