VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:40
Behavior list
Basic Information
MD5:91b9931ca801d79251192ada0be54f51
file type:zip
Production company:
version:
Shell or compiler information:PACKER:UPolyX v0.5
Subfile information:追心QQ大盗密码截取者 V2.1.exe / 2eb53b4c9ca589738b25f03dbba652b1 / EXE
Key behavior
Behavior description:修改原系统的EXE文件
details:C:\Documents and Settings\Administrator\Application Data\SogouExplorer\Extension\com.sogou.snapTaker\0.4.2\npprintscreen.dll
Behavior description:设置消息钩子
details:C:\Program Files\Tencent\QQ\Bin\QQ.exe
Behavior description:获取TickCount值
details:TickCount = 229953, SleepMilliseconds = 250.
Behavior description:打开注册表_检测虚拟机相关
details:\REGISTRY\MACHINE\SYSTEM\CurrentControlSet\Services\VMware Physical Disk Helper Service
Behavior description:获取窗口截图信息
details:Foreground window Info: HWND = 0x0002037e, DC = 0x040106bd.
Behavior description:设置特殊文件夹属性
details:C:\DiskX\RECYCLER
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache
C:\Documents and Settings\Administrator\IECompatCache
Behavior description:直接获取CPU时钟
details:EAX = 0xd2968c76, EDX = 0x000000ba
EAX = 0xd2968cc2, EDX = 0x000000ba
EAX = 0xd2968d0e, EDX = 0x000000ba
EAX = 0xd2968d5a, EDX = 0x000000ba
EAX = 0xd2968da6, EDX = 0x000000ba
EAX = 0xd2968df2, EDX = 0x000000ba
EAX = 0xd2968e3e, EDX = 0x000000ba
EAX = 0xd2968e8a, EDX = 0x000000ba
EAX = 0xd2968ed6, EDX = 0x000000ba
EAX = 0xd2968f22, EDX = 0x000000ba
Behavior description:自删除
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\追心QQ大盗密码截取者 V2.1.exe
Behavior description:修改注册表_启动项
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = , CmdLine = cmd.exe /c del "C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\追心QQ大盗密码截取者 V2.1.exe"
Behavior description:创建进程
details:[0x00000b64]ImagePath = C:\Program Files\Internet Explorer\iexplore.exe, CmdLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
[0x00000bf0]ImagePath = C:\Program Files\Tencent\QQ\Bin\Timwp.exe, CmdLine = "C:\Program Files\Tencent\QQ\Bin\Timwp.exe" "tencent://message/?uin=1125060456"
[0x00000c00]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd.exe /c del "C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\追心QQ大盗密码截取者 V2.1.exe"
[0x00000c5c]ImagePath = C:\Program Files\Tencent\QQ\Bin\QQ.exe, CmdLine = "C:\Program Files\Tencent\QQ\Bin\QQ.exe" 1 uin=1125060456
[0x00000c64]ImagePath = C:\Program Files\Internet Explorer\iexplore.exe, CmdLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:79873
Behavior description:创建新文件进程
details:[0x00000aec]ImagePath = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\追心QQ大盗密码截取者 V2.1Srv.exe, CmdLine = "C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\追心QQ大盗密码截取者 V2.1Srv.exe"
[0x00000b18]ImagePath = C:\Program Files\Microsoft\DesktopLayer.exe, CmdLine = "C:\Program Files\Microsoft\DesktopLayer.exe"
Behavior description:枚举进程
details:N/A
Behavior description:创建本地线程
details:TargetProcess: 追心QQ大盗密码截取者 V2.1.exe, InheritedFromPID = 2000, ProcessID = 2728, ThreadID = 2740, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: iexplore.exe, InheritedFromPID = 2840, ProcessID = 2916, ThreadID = 2928, StartAddress = 20057ACA, Parameter = 00050034
TargetProcess: iexplore.exe, InheritedFromPID = 2840, ProcessID = 2916, ThreadID = 2932, StartAddress = 20057626, Parameter = 00000000
TargetProcess: iexplore.exe, InheritedFromPID = 2840, ProcessID = 2916, ThreadID = 2936, StartAddress = 2005781F, Parameter = 00000000
TargetProcess: iexplore.exe, InheritedFromPID = 2840, ProcessID = 2916, ThreadID = 2940, StartAddress = 2005790C, Parameter = 00000000
TargetProcess: iexplore.exe, InheritedFromPID = 2840, ProcessID = 2916, ThreadID = 2944, StartAddress = 20056EA8, Parameter = 00000000
TargetProcess: iexplore.exe, InheritedFromPID = 2840, ProcessID = 2916, ThreadID = 2948, StartAddress = 20056EC2, Parameter = 00000000
TargetProcess: 追心QQ大盗密码截取者 V2.1.exe, InheritedFromPID = 2000, ProcessID = 2728, ThreadID = 2952, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: 追心QQ大盗密码截取者 V2.1.exe, InheritedFromPID = 2000, ProcessID = 2728, ThreadID = 2980, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: 追心QQ大盗密码截取者 V2.1.exe, InheritedFromPID = 2000, ProcessID = 2728, ThreadID = 2984, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: iexplore.exe, InheritedFromPID = 2428, ProcessID = 3064, ThreadID = 3084, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: Timwp.exe, InheritedFromPID = 2728, ProcessID = 3056, ThreadID = 3088, StartAddress = 77E56C7D, Parameter = 001B16B0
TargetProcess: Timwp.exe, InheritedFromPID = 2728, ProcessID = 3056, ThreadID = 3092, StartAddress = 769AE43B, Parameter = 001B4160
TargetProcess: Timwp.exe, InheritedFromPID = 2728, ProcessID = 3056, ThreadID = 3096, StartAddress = 77E56C7D, Parameter = 001B4930
TargetProcess: iexplore.exe, InheritedFromPID = 2428, ProcessID = 3064, ThreadID = 3100, StartAddress = 7C947EBB, Parameter = 00000000
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\追心QQ大盗密码截取者 V2.1Srv.exe
C:\Program Files\Microsoft\px3.tmp
C:\Program Files\Microsoft\DesktopLayer.exe
C:\Program Files\Internet Explorer\dmlconf.dat
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{77756E7C-9A8F-11E7-91C0-7B****28}.dat
C:\Program Files\Tencent\QQ\Users\testfile26297
C:\Documents and Settings\Administrator\Application Data\Tencent\Logs\Timwp.tlg
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFC968.tmp
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\yixun_com[1]
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\{77756E7D-9A8F-11E7-91C0-7B****28}.dat
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFFAB5.tmp
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\favicon[1].ico
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Behavior description:修改原系统的EXE文件
details:C:\Documents and Settings\Administrator\Application Data\SogouExplorer\Extension\com.sogou.snapTaker\0.4.2\npprintscreen.dll
Behavior description:创建可执行文件
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\追心QQ大盗密码截取者 V2.1Srv.exe
C:\Program Files\Microsoft\DesktopLayer.exe
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Behavior description:覆盖已有文件
details:C:\Program Files\Microsoft\px3.tmp
C:\Program Files\Internet Explorer\dmlconf.dat
C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
C:\Documents and Settings\Administrator\Local Settings\Temp\QDW4H%F6_VD5}08_GARX46J.xml
Behavior description:复制文件
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\追心QQ大盗密码截取者 V2.1Srv.exe ---> C:\Program Files\Microsoft\DesktopLayer.exe
Behavior description:内存映射方式修改可执行文件
details:C:\Documents and Settings\Administrator\Application Data\SogouExplorer\Extension\com.sogou.snapTaker\0.4.2\npprintscreen.dll
Behavior description:删除文件
details:C:\Program Files\Microsoft\px3.tmp
C:\Program Files\Tencent\QQ\Users\testfile26297
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFC968.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFFAB5.tmp
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\favicon[1].ico
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Behavior description:查找文件
details:FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Program Files\Internet Explorer\IEXPLORE.EXE
FileName = C:\Program Files\Internet Explorer\iexplore.exe
FileName = C:\*.*
FileName = C:\222c25ed\*.*
FileName = C:\222c25ed\IE8-Setup-Full\*.*
FileName = C:\222c25ed\IE8-Setup-Full\log\*.*
FileName = C:\AnalyzeControl\*.*
FileName = C:\DiskD\*.*
FileName = C:\DiskX\*.*
FileName = C:\DiskX\RECYCLER\*.*
FileName = C:\Documents and Settings\*.*
FileName = C:\Documents and Settings\Administrator\*.*
FileName = C:\Documents and Settings\Administrator\.oracle_jre_usage\*.*
Behavior description:设置特殊文件夹属性
details:C:\DiskX\RECYCLER
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache
C:\Documents and Settings\Administrator\IECompatCache
Behavior description:修改文件内容
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\追心QQ大盗密码截取者 V2.1Srv.exe ---> Offset = 0
C:\Program Files\Microsoft\DesktopLayer.exe ---> Offset = 0
C:\Program Files\Microsoft\DesktopLayer.exe ---> Offset = 4096
C:\Program Files\Microsoft\DesktopLayer.exe ---> Offset = 8192
C:\Program Files\Microsoft\DesktopLayer.exe ---> Offset = 12288
C:\Program Files\Internet Explorer\dmlconf.dat ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\QDW4H%F6_VD5}08_GARX46J.xml ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{77756E7C-9A8F-11E7-91C0-7B****28}.dat ---> Offset = 512
C:\Program Files\Tencent\QQ\Users\All Users\QQ\Registry.db ---> Offset = 17024
C:\Program Files\Tencent\QQ\Users\All Users\QQ\Registry.db ---> Offset = 33280
C:\Documents and Settings\Administrator\Application Data\Tencent\Logs\Timwp.tlg ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{77756E7C-9A8F-11E7-91C0-7B****28}.dat ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFC968.tmp ---> Offset = 16383
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFC968.tmp ---> Offset = 12288
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\{77756E7D-9A8F-11E7-91C0-7B****28}.dat ---> Offset = 512
Behavior description:自删除
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\追心QQ大盗密码截取者 V2.1.exe
Network behavior
Behavior description:下载文件
details:URLDownloadToFileW: http://ww****om/favicon.ico ---> C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Behavior description:打开指定IE网页
details:tencent://message/?uin=1125060456
Behavior description:连接指定站点
details:InternetConnectA: ServerName = us****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = ww****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = ur****om, PORT = 443, UserName = , Password = , hSession = 0x00cc0010, hConnect = 0x00cc0014, Flags = 0x00000200
Behavior description:打开HTTP连接
details:InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0), hSession = 0x00cc0004
InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489), hSession = 0x00cc0004
InternetOpenA: UserAgent: VCSoapClient, hSession = 0x00cc0010
Behavior description:建立到一个指定的套接字连接
details:URL: go****om, IP: **.133.40.**:80, SOCKET = 0x000000b0
URL: fg****om, IP: **.133.40.**:443, SOCKET = 0x000000b8
URL: us****om, IP: **.133.40.**:80, SOCKET = 0x000002a4
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000448
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000594
URL: ur****om, IP: **.133.40.**:443, SOCKET = 0x000001ec
Behavior description:读取网络文件
details:hFile = 0x00cc000c, BytesToRead =102400, BytesRead = 102400.
hFile = 0x00cc000c, BytesToRead =2048, BytesRead = 2048.
hFile = 0x00cc0018, BytesToRead =4095, BytesRead = 4095.
Behavior description:发送HTTP包
details:GET /fcg-bin/cgi_get_portrait.fcg?get_nick=1&uins=1125060456 HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Accept: */* Host: us****om Cache-Control: no-cache
GET / HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Accept-Encoding: gzip, deflate Host: ww****om Connection: Keep-Alive
GET /favicon.ico HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: ww****om Connection: Keep-Alive
Behavior description:打开HTTP请求
details:HttpOpenRequestA: us****om:80/fcg-bin/cgi_get_portrait.fcg?get_nick=1&uins=1125060456, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x84000000
HttpOpenRequestA: ww****om:80/, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400200
HttpOpenRequestA: ww****om:80/favicon.ico, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00600010
HttpOpenRequestA: ur****om:443/urs.asmx?msurs-client-key=yuxvjy%2bksfatygswwoltsa%3d%3d&msurs-patented-lock=fad2vrkhvbo%3d, hConnect = 0x00cc0014, hRequest = 0x00cc0018, Verb: POST, Referer: , Flags = 0x04880300
Behavior description:按名称获取主机地址
details:gethostbyname: go****om
gethostbyname: fg****om
GetAddrInfoW: us****om
GetAddrInfoW: ww****om
gethostbyname: up****om
GetAddrInfoW: ur****om
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\MACHINE\SOFTWARE\Classes\.key\
\REGISTRY\USER\S-*\Software\Microsoft\Multimedia\DrawDib\vga.drv 1920x973x32(BGR 0)
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\Program Files\Tencent\QQ\Bin\Timwp.exe
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\Recovery\Active\{77756E7C-9A8F-11E7-91C0-7B****28}
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\{63800dac-e7ca-4df9-9a5c-20765055488d}\Enable
\REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1EA4DBF0-3C3B-11CF-810C-00AA00389B71}\1.1\0\win32\
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\Main\Window_Placement
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Count
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Time
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTime
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTimeCount
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore\Count
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore\Time
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBA}\
Behavior description:删除注册表键值
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyOverride
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
Behavior description:打开注册表_检测虚拟机相关
details:\REGISTRY\MACHINE\SYSTEM\CurrentControlSet\Services\VMware Physical Disk Helper Service
Behavior description:删除注册表键
details:\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\{63800dac-e7ca-4df9-9a5c-20765055488d}\
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBA}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBA}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBB}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBB}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBC}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBC}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-FFFF-ABCDEFFEDCBA}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-FFFF-ABCDEFFEDCBA}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\
\REGISTRY\USER\S-*_CLASSES\JavaPlugin.1000\CLSID\
Behavior description:修改注册表_启动项
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit
Other behavior
Behavior description:创建互斥体
details:RasPbFile
KyUffThOkYwRRtgPP
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
MSCTF.Shared.MUTEX.IOH
Local\!BrowserEmulation!SharedMemory!Mutex
ConnHashTable<3064>_HashTable_Mutex
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = Global\userenv: User Profile setup event
EventName = Isolation Signal Registry Event (77756E79-9A8F-11E7-91C0-7B****28, 0)
EventName = IE_EarlyTabStart_0xbfc
EventName = Isolation Signal Registry Event (77756E7A-9A8F-11E7-91C0-7B****28, 0)
EventName = EvtPreLoadThreadExit3164
EventName = Local\RSS Eventing Event Event 00000bf8
EventName = Local\c64_29
EventName = Global\crypt32LogoffEvent
EventName = IEFrame.EventCheckDefaultBrowser
Behavior description:直接获取CPU时钟
details:EAX = 0xd2968c76, EDX = 0x000000ba
EAX = 0xd2968cc2, EDX = 0x000000ba
EAX = 0xd2968d0e, EDX = 0x000000ba
EAX = 0xd2968d5a, EDX = 0x000000ba
EAX = 0xd2968da6, EDX = 0x000000ba
EAX = 0xd2968df2, EDX = 0x000000ba
EAX = 0xd2968e3e, EDX = 0x000000ba
EAX = 0xd2968e8a, EDX = 0x000000ba
EAX = 0xd2968ed6, EDX = 0x000000ba
EAX = 0xd2968f22, EDX = 0x000000ba
Behavior description:修改后的可执行文件MD5
details:C:\Documents and Settings\Administrator\Application Data\SogouExplorer\Extension\com.sogou.snapTaker\0.4.2\npprintscreen.dll ---> b9c5b6907228c58946456e74e6612c42
Behavior description:窗口信息
details:Pid = 2728, Hwnd=0x103b0, Text = 确定, ClassName = Button.
Pid = 2728, Hwnd=0x103b4, Text = 您个人演示试用版本测试已到期,请联系作者购买使用软件!, ClassName = Static.
Pid = 2728, Hwnd=0x103ae, Text = 信息:, ClassName = #32770.
Behavior description:获取TickCount值
details:TickCount = 229953, SleepMilliseconds = 250.
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
SE_INC_BASE_PRIORITY_PRIVILEGE
SE_DEBUG_PRIVILEGE
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Global\SvcctrlStartEvent_A3752DX
\INSTALLATION_SECURITY_HOLD
CTF.ThreadMIConnectionEvent.000007E8.00000000.0000000F
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.0000000F
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
MSFT.VSA.COM.DISABLE.3056
MSFT.VSA.IEC.STATUS.6c736db0
Isolation Signal Registry Event (77756E79-9A8F-11E7-91C0-7B****28, 0)
MSFT.VSA.COM.DISABLE.3064
Isolation Signal Registry Event (77756E7A-9A8F-11E7-91C0-7B****28, 0)
IE_EarlyTabStart_0xbfc
_fCanRegisterWithShellService
Behavior description:修改后的可执行文件签名信息
details:C:\Documents and Settings\Administrator\Application Data\SogouExplorer\Extension\com.sogou.snapTaker\0.4.2\npprintscreen.dll(签名验证: 未通过)
Behavior description:获取窗口截图信息
details:Foreground window Info: HWND = 0x0002037e, DC = 0x040106bd.
Behavior description:可执行文件签名信息
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\追心QQ大盗密码截取者 V2.1Srv.exe(签名验证: 未通过)
C:\Program Files\Microsoft\DesktopLayer.exe(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico(签名验证: 未通过)
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 250.
Behavior description:隐藏指定窗口
details:[Window,Class] = [,_EL_CommonDlg]
[Window,Class] = [IMAPI Helper Window,TXIMAPI_Class]
[Window,Class] = [DNS Helper Window,TXDNS_Class]
[Window,Class] = [,BrowserFrameGripperClass]
[Window,Class] = [,TXEdit]
[Window,Class] = [J,Edit]
[Window,Class] = [,Edit]
[Window,Class] = [缩放级别,ToolbarWindow32]
[Window,Class] = [,msctls_progress32]
[Window,Class] = [,SysLink]
[Window,Class] = [,Static]
[Window,Class] = [文件大小未知,Static]
[Window,Class] = [打开此类文件前总是询问(&W),Button]
[Window,Class] = [发行者:,Static]
[Window,Class] = [http://www.yixun.com/ - Windows Internet Explorer,IEFrame]
Behavior description:可执行文件MD5
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\追心QQ大盗密码截取者 V2.1Srv.exe ---> ff5e1f27193ce51eec318714ef038bef
C:\Program Files\Microsoft\DesktopLayer.exe ---> ff5e1f27193ce51eec318714ef038bef
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico ---> fe1d0ee5901dd167ee9b28eece31786c
Behavior description:打开互斥体
details:RasPbFile
ShimCacheMutex
Local\_!MSFTHISTORY!_
Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Local\c:!documents and settings!administrator!cookies!
Local\c:!documents and settings!administrator!local settings!history!history.ie5!
Local\WininetStartupMutex
Local\WininetConnectionMutex
Local\WininetProxyRegistryMutex
Local\!IETld!Mutex
Local\!BrowserEmulation!SharedMemory!Mutex
{EF274FD2-54EF-4972-B730-2A142F137C38}-QQStorageTool
{888F23F6-F92D-454A-9980-3A192B851D77}-QQ
CtfmonInstMutexDefaultS-*
DBWinMutex
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [,Microsoft Internet Explorer]
NtUserFindWindowEx: [Class,Window] = [Static,]
NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号