VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Basic Information

MD5:83daf29acd66418a27e96b9784ae2f94
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 查找PE资源信息
details: (FindResourceA) hModule = 0x00400000, ResName: , ResType: BINARY
Behavior description: 跨进程写入数据
details: TargetProcess = C:\WINDOWS\system32\lsass.exe, WriteAddress = 0x00bf0000, Size = 0x00000838 TargetPID = 0x00000298
TargetProcess = C:\WINDOWS\system32\lsass.exe, WriteAddress = 0x00c00000, Size = 0x00000814 TargetPID = 0x00000298
TargetProcess = C:\WINDOWS\system32\lsass.exe, WriteAddress = 0x00c00818, Size = 0x00000070 TargetPID = 0x00000298
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x009a0000, Size = 0x000000a6 TargetPID = 0x00000a18
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x009a0000, Size = 0x000000ac TargetPID = 0x00000a18
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x009a0000, Size = 0x000000b0 TargetPID = 0x00000a18
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x009a0000, Size = 0x00000064 TargetPID = 0x00000a18
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x009a0000, Size = 0x00000094 TargetPID = 0x00000a18
TargetProcess = C:\WINDOWS\system32\%temp%\****.exe, WriteAddress = 0x011d0000, Size = 0x00000030 TargetPID = 0x00000334
TargetProcess = C:\WINDOWS\system32\%temp%\****.exe, WriteAddress = 0x011e0000, Size = 0x000000ba TargetPID = 0x00000334
TargetProcess = C:\WINDOWS\system32\%temp%\****.exe, WriteAddress = 0x011e0000, Size = 0x000000a6 TargetPID = 0x00000334
TargetProcess = C:\WINDOWS\system32\%temp%\****.exe, WriteAddress = 0x011e0000, Size = 0x000000ac TargetPID = 0x00000334
TargetProcess = C:\WINDOWS\system32\%temp%\****.exe, WriteAddress = 0x011e0000, Size = 0x000000b0 TargetPID = 0x00000334
TargetProcess = C:\WINDOWS\system32\%temp%\****.exe, WriteAddress = 0x011e0000, Size = 0x00000064 TargetPID = 0x00000334
TargetProcess = C:\WINDOWS\system32\%temp%\****.exe, WriteAddress = 0x011e0000, Size = 0x00000094 TargetPID = 0x00000334
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Documents and Settings\Administrator\IECompatCache
Behavior description: 创建远程线程
details: TargetProcess: lsass.exe, InheritedFromPID = 608, ProcessID = 664, ThreadID = 2600, StartAddress = 00C00818, Parameter = 00C00000
TargetProcess: lsass.exe, InheritedFromPID = 608, ProcessID = 664, ThreadID = 2604, StartAddress = 00C00818, Parameter = 00C00000
TargetProcess: lsass.exe, InheritedFromPID = 608, ProcessID = 664, ThreadID = 2608, StartAddress = 00C00818, Parameter = 00C00000
TargetProcess: lsass.exe, InheritedFromPID = 608, ProcessID = 664, ThreadID = 2612, StartAddress = 00C00818, Parameter = 00C00000
TargetProcess: lsass.exe, InheritedFromPID = 608, ProcessID = 664, ThreadID = 2616, StartAddress = 00C00818, Parameter = 00C00000
TargetProcess: lsass.exe, InheritedFromPID = 608, ProcessID = 664, ThreadID = 2620, StartAddress = 00C00818, Parameter = 00C00000

Process behavior

Behavior description: 跨进程写入数据
details: TargetProcess = C:\WINDOWS\system32\lsass.exe, WriteAddress = 0x00bf0000, Size = 0x00000838 TargetPID = 0x00000298
TargetProcess = C:\WINDOWS\system32\lsass.exe, WriteAddress = 0x00c00000, Size = 0x00000814 TargetPID = 0x00000298
TargetProcess = C:\WINDOWS\system32\lsass.exe, WriteAddress = 0x00c00818, Size = 0x00000070 TargetPID = 0x00000298
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x009a0000, Size = 0x000000a6 TargetPID = 0x00000a18
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x009a0000, Size = 0x000000ac TargetPID = 0x00000a18
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x009a0000, Size = 0x000000b0 TargetPID = 0x00000a18
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x009a0000, Size = 0x00000064 TargetPID = 0x00000a18
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x009a0000, Size = 0x00000094 TargetPID = 0x00000a18
TargetProcess = C:\WINDOWS\system32\%temp%\****.exe, WriteAddress = 0x011d0000, Size = 0x00000030 TargetPID = 0x00000334
TargetProcess = C:\WINDOWS\system32\%temp%\****.exe, WriteAddress = 0x011e0000, Size = 0x000000ba TargetPID = 0x00000334
TargetProcess = C:\WINDOWS\system32\%temp%\****.exe, WriteAddress = 0x011e0000, Size = 0x000000a6 TargetPID = 0x00000334
TargetProcess = C:\WINDOWS\system32\%temp%\****.exe, WriteAddress = 0x011e0000, Size = 0x000000ac TargetPID = 0x00000334
TargetProcess = C:\WINDOWS\system32\%temp%\****.exe, WriteAddress = 0x011e0000, Size = 0x000000b0 TargetPID = 0x00000334
TargetProcess = C:\WINDOWS\system32\%temp%\****.exe, WriteAddress = 0x011e0000, Size = 0x00000064 TargetPID = 0x00000334
TargetProcess = C:\WINDOWS\system32\%temp%\****.exe, WriteAddress = 0x011e0000, Size = 0x00000094 TargetPID = 0x00000334
Behavior description: 创建本地线程
details: TargetProcess: svchost.exe, InheritedFromPID = 652, ProcessID = 976, ThreadID = 2884, StartAddress = 77E56C7D, Parameter = 0018BDC0
TargetProcess: iexplore.exe, InheritedFromPID = 2304, ProcessID = 2832, ThreadID = 2916, StartAddress = 77C0A341, Parameter = 003F95C8
TargetProcess: iexplore.exe, InheritedFromPID = 2304, ProcessID = 2832, ThreadID = 2920, StartAddress = 77E56C7D, Parameter = 001AF200
TargetProcess: iexplore.exe, InheritedFromPID = 2304, ProcessID = 2832, ThreadID = 2924, StartAddress = 769AE43B, Parameter = 001C01B8
TargetProcess: iexplore.exe, InheritedFromPID = 2304, ProcessID = 2832, ThreadID = 2928, StartAddress = 769AE43B, Parameter = 001C2E80
TargetProcess: iexplore.exe, InheritedFromPID = 2304, ProcessID = 2832, ThreadID = 2948, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: iexplore.exe, InheritedFromPID = 2304, ProcessID = 2832, ThreadID = 2952, StartAddress = 77E56C7D, Parameter = 002011F8
TargetProcess: iexplore.exe, InheritedFromPID = 2304, ProcessID = 2832, ThreadID = 2976, StartAddress = 77E56C7D, Parameter = 002032B8
TargetProcess: iexplore.exe, InheritedFromPID = 2832, ProcessID = 2872, ThreadID = 2988, StartAddress = 77E56C7D, Parameter = 001D5410
TargetProcess: iexplore.exe, InheritedFromPID = 2832, ProcessID = 2872, ThreadID = 2996, StartAddress = 0138507F, Parameter = 0217E400
TargetProcess: iexplore.exe, InheritedFromPID = 2832, ProcessID = 2872, ThreadID = 3024, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: iexplore.exe, InheritedFromPID = 2832, ProcessID = 2872, ThreadID = 3028, StartAddress = 77E56C7D, Parameter = 001D8FD8
TargetProcess: iexplore.exe, InheritedFromPID = 2304, ProcessID = 2832, ThreadID = 3032, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: lsass.exe, InheritedFromPID = 608, ProcessID = 664, ThreadID = 3132, StartAddress = 743B0005, Parameter = 00000000
TargetProcess: svchost.exe, InheritedFromPID = 652, ProcessID = 976, ThreadID = 3248, StartAddress = 7C930230, Parameter = 00000000
Behavior description: 创建远程线程
details: TargetProcess: lsass.exe, InheritedFromPID = 608, ProcessID = 664, ThreadID = 2600, StartAddress = 00C00818, Parameter = 00C00000
TargetProcess: lsass.exe, InheritedFromPID = 608, ProcessID = 664, ThreadID = 2604, StartAddress = 00C00818, Parameter = 00C00000
TargetProcess: lsass.exe, InheritedFromPID = 608, ProcessID = 664, ThreadID = 2608, StartAddress = 00C00818, Parameter = 00C00000
TargetProcess: lsass.exe, InheritedFromPID = 608, ProcessID = 664, ThreadID = 2612, StartAddress = 00C00818, Parameter = 00C00000
TargetProcess: lsass.exe, InheritedFromPID = 608, ProcessID = 664, ThreadID = 2616, StartAddress = 00C00818, Parameter = 00C00000
TargetProcess: lsass.exe, InheritedFromPID = 608, ProcessID = 664, ThreadID = 2620, StartAddress = 00C00818, Parameter = 00C00000
Behavior description: 枚举进程
details: N/A

File behavior

Behavior description: 创建文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\wceaux.dll
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{D96F415C-3980-11E9-91C0-7B****28}.dat
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFD16C.tmp
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\{D96F415D-3980-11E9-91C0-7B****28}.dat
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFEBA4.tmp
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\yixun_com[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\favicon[1].ico
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
C:\Documents and Settings\Administrator\Application Data\Microsoft\Protect\S-*\141c7c51-f92f-4790-8873-a46d9975cabe
Behavior description: 创建可执行文件
details: C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Behavior description: 查找文件
details: FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\WINDOWS\system32\Ras\*.pbk
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\Documents and Settings\Administrator\Favorites
FileName = C:\Documents and Settings\Administrator\Favorites\链接
FileName = C:\Documents and Settings\Administrator\Favorites\链接\建议网站.url
FileName = C:\Documents and Settings\Administrator\Favorites\链接\网页快讯库.url
FileName = C:\Documents and Settings\Administrator\Favorites\链接\*.*
FileName = C:\WINDOWS
FileName = C:\WINDOWS\WinSxS
FileName = C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll
FileName = C:\Program Files\Java
Behavior description: 删除文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\wceaux.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFD16C.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFEBA4.tmp
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\favicon[1].ico
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Documents and Settings\Administrator\IECompatCache
Behavior description: 修改文件内容
details: C:\Documents and Settings\Administrator\Local Settings\Temp\wceaux.dll ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{D96F415C-3980-11E9-91C0-7B****28}.dat ---> Offset = 512
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{D96F415C-3980-11E9-91C0-7B****28}.dat ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFD16C.tmp ---> Offset = 16383
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFD16C.tmp ---> Offset = 12288
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{D96F415C-3980-11E9-91C0-7B****28}.dat ---> Offset = 3072
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{D96F415C-3980-11E9-91C0-7B****28}.dat ---> Offset = 1536
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\{D96F415D-3980-11E9-91C0-7B****28}.dat ---> Offset = 512
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\{D96F415D-3980-11E9-91C0-7B****28}.dat ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFEBA4.tmp ---> Offset = 16383
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFEBA4.tmp ---> Offset = 12288
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\{D96F415D-3980-11E9-91C0-7B****28}.dat ---> Offset = 3072
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\{D96F415D-3980-11E9-91C0-7B****28}.dat ---> Offset = 1536
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico ---> Offset = 0
C:\Documents and Settings\Administrator\Application Data\Microsoft\Protect\S-*\141c7c51-f92f-4790-8873-a46d9975cabe ---> Offset = 0

Network behavior

Behavior description: 下载文件
details: URLDownloadToFileW: http://ww****om/favicon.ico ---> C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Behavior description: 连接指定站点
details: InternetConnectA: ServerName = ww****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = ur****om, PORT = 443, UserName = , Password = , hSession = 0x00cc0010, hConnect = 0x00cc0014, Flags = 0x00000200
Behavior description: 打开HTTP连接
details: InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489), hSession = 0x00cc0004
InternetOpenA: UserAgent: VCSoapClient, hSession = 0x00cc0010
Behavior description: 建立到一个指定的套接字连接
details: URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000448
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000598
URL: ur****om, IP: **.133.40.**:443, SOCKET = 0x00000598
Behavior description: 读取网络文件
details: hFile = 0x00cc000c, BytesToRead =2048, BytesRead = 2048.
hFile = 0x00cc0018, BytesToRead =4095, BytesRead = 4095.
Behavior description: 发送HTTP包
details: GET / HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Accept-Encoding: gzip, deflate Host: ww****om Connection: Keep-Alive
GET /favicon.ico HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: ww****om Connection: Keep-Alive
Behavior description: 打开HTTP请求
details: HttpOpenRequestA: ww****om:80/, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400200
HttpOpenRequestA: ww****om:80/favicon.ico, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00600010
HttpOpenRequestA: ur****om:443/urs.asmx?msurs-client-key=kuybh%2bhjtcqyprdpeqt87w%3d%3d&msurs-patented-lock=w/bkanyg5fg%3d, hConnect = 0x00cc0014, hRequest = 0x00cc0018, Verb: POST, Referer: , Flags = 0x04880300
Behavior description: 按名称获取主机地址
details: GetAddrInfoW: ww****om
GetAddrInfoW: ur****om

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\MACHINE\SAM\SAM\Domains\Account\Users\000001F4\F
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\Recovery\Active\{D96F415C-3980-11E9-91C0-7B****28}
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\{63800dac-e7ca-4df9-9a5c-20765055488d}\Enable
\REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1EA4DBF0-3C3B-11CF-810C-00AA00389B71}\1.1\0\win32\
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\Main\Window_Placement
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Prefetcher\TracesProcessed
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Count
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Time
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTime
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTimeCount
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore\Count
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore\Time
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBA}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBA}\InprocServer32\
Behavior description: 删除注册表键值
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyOverride
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
Behavior description: 删除注册表键
details: \REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\{63800dac-e7ca-4df9-9a5c-20765055488d}\
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBA}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBA}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBB}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBB}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBC}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBC}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-FFFF-ABCDEFFEDCBA}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-FFFF-ABCDEFFEDCBA}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\
\REGISTRY\USER\S-*_CLASSES\JavaPlugin.1000\CLSID\

Other behavior

Behavior description: 创建互斥体
details: ConnHashTable<2832>_HashTable_Mutex
oleacc-msaa-loaded
Local\ZonesCounterMutex
Local\RSS Eventing Connection Database Mutex 00000b10
Local\Feed Eventing Shared Memory Mutex S-*
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
Local\!IECompat!Mutex
Local\c:!documents and settings!administrator!iecompatcache!
CritOpMutex
SmartScreen_UrsCacheMutex_2CEDBFBC-DBA8-43AA-B1FD-CC8E6316E3E2High_S-*
SmartScreen_ClientId_Mutex
MSCTF.Shared.MUTEX.IOH
Behavior description: 隐藏指定窗口
details: [Window,Class] = [,BrowserFrameGripperClass]
[Window,Class] = [缩放级别,ToolbarWindow32]
[Window,Class] = [,msctls_progress32]
[Window,Class] = [,SysLink]
[Window,Class] = [,Static]
[Window,Class] = [文件大小未知,Static]
[Window,Class] = [打开此类文件前总是询问(&W),Button]
[Window,Class] = [发行者:,Static]
[Window,Class] = [http://www.yixun.com/ - Windows Internet Explorer,IEFrame]
[Window,Class] = [,UniversalSearchBand]
[Window,Class] = [,TravelBand]
[Window,Class] = [,CommandBarClass]
[Window,Class] = [,ReBarWindow32]
[Window,Class] = [,TabBandClass]
Behavior description: 样本控制台输出内容
details: N/A
Behavior description: 调整进程token权限
details: SE_DEBUG_PRIVILEGE
SE_CHANGE_NOTIFY_PRIVILEGE
SE_LOAD_DRIVER_PRIVILEGE
Behavior description: 打开事件
details: \SECURITY\LSA_AUTHENTICATION_INITIALIZED
\INSTALLATION_SECURITY_HOLD
Global\SvcctrlStartEvent_A3752DX
MSFT.VSA.COM.DISABLE.2832
MSFT.VSA.IEC.STATUS.6c736db0
_fCanRegisterWithShellService
Local\RSS Eventing Event Event 00000b10
Isolation Signal Registry Event (D96F4159-3980-11E9-91C0-7B****28, 0)
Global\crypt32LogoffEvent
WINMGMT_PROVIDER_CANSHUTDOWN
Local\b38_29
CTF.ThreadMIConnectionEvent.000007E8.00000000.0000000F
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.0000000F
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
Behavior description: 查找PE资源信息
details: (FindResourceA) hModule = 0x00400000, ResName: , ResType: BINARY
Behavior description: 可执行文件签名信息
details: C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico(签名验证: 未通过)
Behavior description: 创建事件对象
details: EventName = Local\RSS Eventing Event Event 00000b10
EventName = Global\crypt32LogoffEvent
EventName = Local\b38_29
EventName = IEFrame.EventCheckDefaultBrowser
Behavior description: 可执行文件MD5
details: C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico ---> fe1d0ee5901dd167ee9b28eece31786c
Behavior description: 打开互斥体
details: CtfmonInstMutexDefaultS-*
Local\RSS Eventing Connection Database Mutex 00000b10
Local\!IECompat!Mutex
Local\c:!documents and settings!administrator!iecompatcache!
Local\!BrowserEmulation!SharedMemory!Mutex
ConnHashTable<2832>_HashTable_Mutex
ShimCacheMutex
Local\WininetStartupMutex
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [Static,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
Behavior description: 加载新释放的文件
details: Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\wceaux.dll.