VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:a1ec208e2ca63299281bd0fe08c7feec
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 检测自身是否被调试
details: N/A
Behavior description: 尝试打开调试器或监控软件的驱动设备对象
details: \??\SICE
\??\SIWVID
\??\NTICE
Behavior description: 获取TickCount值
details: TickCount = 1149109, SleepMilliseconds = 60000.
TickCount = 1149265, SleepMilliseconds = 60000.
TickCount = 1149328, SleepMilliseconds = 60000.
TickCount = 1149953, SleepMilliseconds = 60000.
TickCount = 1150031, SleepMilliseconds = 60000.
TickCount = 1150046, SleepMilliseconds = 60000.
TickCount = 1150093, SleepMilliseconds = 60000.
TickCount = 1150125, SleepMilliseconds = 60000.
TickCount = 1150140, SleepMilliseconds = 60000.
TickCount = 1150250, SleepMilliseconds = 60000.
TickCount = 1150312, SleepMilliseconds = 60000.
TickCount = 1150328, SleepMilliseconds = 60000.
TickCount = 1150375, SleepMilliseconds = 60000.
TickCount = 1150406, SleepMilliseconds = 60000.
TickCount = 1150593, SleepMilliseconds = 60000.
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description: 查询注册表_检测虚拟机相关
details: \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
Behavior description: 查找指定内核模块
details: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> hal.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> KDCOM.DLL Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BOOTVID.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ACPI.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> WMILIB.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> pci.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> isapnp.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> compbatt.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BATTC.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> intelide.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> MountMgr.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ftdisk.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> dmload.sys Des: SoftICE驱动
Behavior description: 查找反病毒常用工具窗口
details: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]

Process behavior

Behavior description: 创建本地线程
details: TargetProcess: 火影木叶辅助.exe, InheritedFromPID = 1944, ProcessID = 1044, ThreadID = 1568, StartAddress = 79F0237F, Parameter = 00000000
TargetProcess: 火影木叶辅助.exe, InheritedFromPID = 1944, ProcessID = 1044, ThreadID = 2008, StartAddress = 79F91FCF, Parameter = 0018EBE8
TargetProcess: 火影木叶辅助.exe, InheritedFromPID = 1944, ProcessID = 1044, ThreadID = 2172, StartAddress = 6001ABEE, Parameter = 011E2280
TargetProcess: 火影木叶辅助.exe, InheritedFromPID = 1944, ProcessID = 1044, ThreadID = 2156, StartAddress = 6001ABEE, Parameter = 011E3A88
TargetProcess: 火影木叶辅助.exe, InheritedFromPID = 1944, ProcessID = 1044, ThreadID = 2160, StartAddress = 77E56C7D, Parameter = 001C0660
TargetProcess: 火影木叶辅助.exe, InheritedFromPID = 1944, ProcessID = 1044, ThreadID = 2152, StartAddress = 769AE43B, Parameter = 001E1B30
TargetProcess: 火影木叶辅助.exe, InheritedFromPID = 1944, ProcessID = 1044, ThreadID = 2164, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: 火影木叶辅助.exe, InheritedFromPID = 1944, ProcessID = 1044, ThreadID = 2140, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: 火影木叶辅助.exe, InheritedFromPID = 1944, ProcessID = 1044, ThreadID = 2144, StartAddress = 79FD8897, Parameter = 0012F2E4
TargetProcess: 火影木叶辅助.exe, InheritedFromPID = 1944, ProcessID = 1044, ThreadID = 2128, StartAddress = 79F91FCF, Parameter = 001F7218
TargetProcess: 火影木叶辅助.exe, InheritedFromPID = 1944, ProcessID = 1044, ThreadID = 2132, StartAddress = 79F91FCF, Parameter = 001F7218
TargetProcess: 火影木叶辅助.exe, InheritedFromPID = 1944, ProcessID = 1044, ThreadID = 2124, StartAddress = 79F91FCF, Parameter = 0021D7C8
TargetProcess: 火影木叶辅助.exe, InheritedFromPID = 1944, ProcessID = 1044, ThreadID = 2196, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: 火影木叶辅助.exe, InheritedFromPID = 1944, ProcessID = 1044, ThreadID = 2200, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: 火影木叶辅助.exe, InheritedFromPID = 1944, ProcessID = 1044, ThreadID = 2204, StartAddress = 6302B849, Parameter = 001E1A10
Behavior description: 枚举进程
details: N/A

File behavior

Behavior description: 创建文件
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6P4O8QNJ\wpad[1].dat
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6P4O8QNJ\1[1].html
Behavior description: 覆盖已有文件
details: C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6P4O8QNJ\navcancl[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\ErrorPageTemplate[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\errorPageStrings[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\httpErrorPagesScripts[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\background_gradient[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\info_48[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\bullet[1]
Behavior description: 查找文件
details: FileName = C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll
FileName = C:\WINDOWS\Microsoft.NET\Framework\\*
FileName = C:\WINDOWS
FileName = C:\WINDOWS\WinSxS
FileName = C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll
FileName = C:\WINDOWS\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.INI
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
Behavior description: 删除文件
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6P4O8QNJ\wpad[1].dat
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6P4O8QNJ\1[1].html
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description: 修改文件内容
details: C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT ---> Offset = 4096

Network behavior

Behavior description: 联网打开网址
details: InternetOpenUrlA: http://**.133.40.**:128/wpad.dat, hInternet = 0x00cc0010, Flags = 0x00000010
Behavior description: 连接指定站点
details: InternetConnectA: ServerName = yz****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = **.133.40.**, PORT = 128, UserName = , Password = , hSession = 0x00cc0010, hConnect = 0x00cc0014, Flags = 0x00000010
Behavior description: 打开HTTP连接
details: InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489), hSession = 0x00cc0004
InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0), hSession = 0x00cc0010
Behavior description: 建立到一个指定的套接字连接
details: URL: wpad, IP: **.133.40.**:128, SOCKET = 0x000001f8
URL: yz****om, IP: **.133.40.**:80, SOCKET = 0x000001f0
URL: yz****om, IP: **.133.40.**:80, SOCKET = 0x00000008
URL: yz****om, IP: **.133.40.**:80, SOCKET = 0x00000018
URL: yz****om, IP: **.133.40.**:80, SOCKET = 0x00000850
Behavior description: 读取网络文件
details: hFile = 0x00cc0018, BytesToRead =4010, BytesRead = 4010.
hFile = 0x00cc000c, BytesToRead =4096, BytesRead = 4096.
Behavior description: 发送HTTP包
details: GET /wpad.dat HTTP/1.1 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0) Host: **.133.40.**:128
GET /1.html HTTP/1.1 Accept: */* Accept-Language: zh-cn Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: yz****om Connection: Keep-Alive
POST /kss_api/io.php?apiver=905&&lgid=0&f=&x=123901160828 HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSiE 6.0; Windows NT 5.1;) Content-Type: application/x-www-form-urlencoded Accept-Encoding: gzip, deflate Host: yz****om Content-Length: 225 Connection: Keep-Alive Cache-Control: no-cache
Behavior description: 打开HTTP请求
details: HttpOpenRequestA: yz****om:80/1.html, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400000
HttpOpenRequestA: **.133.40.**:128/wpad.dat, hConnect = 0x00cc0014, hRequest = 0x00cc0018, Verb: GET, Referer: , Flags = 0x00000010
HttpOpenRequestA: yz****om:80/kss_api/io.php?apiver=905&&lgid=0&f=&x=123901160828, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: POST, Referer: , Flags = 0x04600000
HttpOpenRequestA: yz****om:80/1.html, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400010
Behavior description: 按名称获取主机地址
details: gethostbyname: w****.
gethostbyname: yz****om
GetAddrInfoW: computer
GetAddrInfoW: wpad
GetAddrInfoW: yz****om

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\火影木叶辅助\DEBUG\Trace Level
\REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8CC497C9-A1DF-11CE-8098-00AA0047BE5D}\1.0\
\REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8CC497C9-A1DF-11CE-8098-00AA0047BE5D}\1.0\FLAGS\
\REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8CC497C9-A1DF-11CE-8098-00AA0047BE5D}\1.0\0\win32\
\REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8CC497C9-A1DF-11CE-8098-00AA0047BE5D}\1.0\HELPDIR\
\REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{00020430-0000-0000-C000-000000000046}\1.0\0\win32\
\REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8CC497C0-A1DF-11CE-8098-00AA0047BE5D}\
\REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8CC497C0-A1DF-11CE-8098-00AA0047BE5D}\ProxyStubClsid\
\REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8CC497C0-A1DF-11CE-8098-00AA0047BE5D}\ProxyStubClsid32\
\REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8CC497C0-A1DF-11CE-8098-00AA0047BE5D}\TypeLib\
\REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8CC497C0-A1DF-11CE-8098-00AA0047BE5D}\TypeLib\Version
\REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8CC497C2-A1DF-11CE-8098-00AA0047BE5D}\
\REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8CC497C2-A1DF-11CE-8098-00AA0047BE5D}\ProxyStubClsid\
\REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8CC497C2-A1DF-11CE-8098-00AA0047BE5D}\ProxyStubClsid32\
Behavior description: 删除注册表键值
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\火影木叶辅助\DEBUG\Trace Level
Behavior description: 查询注册表_检测虚拟机相关
details: \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion

Other behavior

Behavior description: 检测自身是否被调试
details: N/A
Behavior description: 创建互斥体
details: CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
RasPbFile
Global\.net clr networking
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
CritOpMutex
ini_read_write
Local\!PrivacIE!SharedMemory!Mutex
Behavior description: 创建事件对象
details: EventName = Global\CorDBIPCSetupSyncEvent_1044
EventName = DINPUTWINMM
EventName = Global\userenv: User Profile setup event
EventName = Global\crypt32LogoffEvent
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [18467-41,]
NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
Behavior description: 尝试打开调试器或监控软件的驱动设备对象
details: \??\SICE
\??\SIWVID
\??\NTICE
Behavior description: 获取TickCount值
details: TickCount = 1149109, SleepMilliseconds = 60000.
TickCount = 1149265, SleepMilliseconds = 60000.
TickCount = 1149328, SleepMilliseconds = 60000.
TickCount = 1149953, SleepMilliseconds = 60000.
TickCount = 1150031, SleepMilliseconds = 60000.
TickCount = 1150046, SleepMilliseconds = 60000.
TickCount = 1150093, SleepMilliseconds = 60000.
TickCount = 1150125, SleepMilliseconds = 60000.
TickCount = 1150140, SleepMilliseconds = 60000.
TickCount = 1150250, SleepMilliseconds = 60000.
TickCount = 1150312, SleepMilliseconds = 60000.
TickCount = 1150328, SleepMilliseconds = 60000.
TickCount = 1150375, SleepMilliseconds = 60000.
TickCount = 1150406, SleepMilliseconds = 60000.
TickCount = 1150593, SleepMilliseconds = 60000.
Behavior description: 调整进程token权限
details: SE_DEBUG_PRIVILEGE
SE_LOAD_DRIVER_PRIVILEGE
Behavior description: 窗口信息
details: Pid = 1044, Hwnd=0x60352, Text = statusStrip1, ClassName = WindowsForms10.Window.8.app.0.378734a.
Pid = 1044, Hwnd=0xb02f2, Text = skinMenuStrip1, ClassName = WindowsForms10.Window.8.app.0.378734a.
Pid = 1044, Hwnd=0xe02fe, Text = 游戏账号列表, ClassName = WindowsForms10.Window.8.app.0.378734a.
Pid = 1044, Hwnd=0x60360, Text = 正在初始化..., ClassName = WindowsForms10.Window.8.app.0.378734a.
Pid = 1044, Hwnd=0x7033c, Text = (鼠标右键点击账号列表有更多功能), ClassName = WindowsForms10.STATIC.app.0.378734a.
Pid = 1044, Hwnd=0x1002b6, Text = 挂机日志, ClassName = WindowsForms10.Window.8.app.0.378734a.
Pid = 1044, Hwnd=0x7033a, Text = 系统日志, ClassName = WindowsForms10.Window.8.app.0.378734a.
Pid = 1044, Hwnd=0xc030c, Text = 登录辅助, ClassName = WindowsForms10.Window.8.app.0.378734a.
Pid = 1044, Hwnd=0x90350, Text = 添加游戏挂机账号, ClassName = WindowsForms10.BUTTON.app.0.378734a.
Pid = 1044, Hwnd=0x60348, Text = 全部停止, ClassName = WindowsForms10.BUTTON.app.0.378734a.
Pid = 1044, Hwnd=0x80312, Text = 使用帮助, ClassName = WindowsForms10.BUTTON.app.0.378734a.
Pid = 1044, Hwnd=0x6035a, Text = 全部开始, ClassName = WindowsForms10.BUTTON.app.0.378734a.
Pid = 1044, Hwnd=0x60336, Text = 检查更新, ClassName = WindowsForms10.BUTTON.app.0.378734a.
Pid = 1044, Hwnd=0x902fc, Text = 系统设置, ClassName = WindowsForms10.Window.8.app.0.378734a.
Pid = 1044, Hwnd=0x40366, Text = (*此方法可以把账号踢下线), ClassName = WindowsForms10.STATIC.app.0.378734a.
Behavior description: 调用Sleep函数
details: [1]: MilliSeconds = 60000.
[2]: MilliSeconds = -1.
[3]: MilliSeconds = -1.
[4]: MilliSeconds = 60000.
[5]: MilliSeconds = 100.
[6]: MilliSeconds = 1000.
[7]: MilliSeconds = 60000.
[8]: MilliSeconds = 10000.
[9]: MilliSeconds = 10000.
[10]: MilliSeconds = 500.
Behavior description: 隐藏指定窗口
details: [Window,Class] = [,ComboLBox]
[Window,Class] = [,SysLink]
[Window,Class] = [,Static]
[Window,Class] = [文件大小未知,Static]
[Window,Class] = [打开此类文件前总是询问(&W),Button]
[Window,Class] = [发行者:,Static]
Behavior description: 查找指定内核模块
details: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> hal.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> KDCOM.DLL Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BOOTVID.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ACPI.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> WMILIB.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> pci.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> isapnp.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> compbatt.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BATTC.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> intelide.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> MountMgr.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ftdisk.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> dmload.sys Des: SoftICE驱动
Behavior description: 查找反病毒常用工具窗口
details: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]