VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:14
Behavior list
Basic Information
MD5:b780924d866d1c3ef1097af49f5d802b
file type:EXE
Production company:灰灰
version:1.0.0.0---1.0.0.0
Shell or compiler information:
Key behavior
Behavior description:修改原系统的EXE文件
details:C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE---> Offset = 12378112
C:\WINDOWS\system32\Cmb_Pb_LiveUpdate.exe---> Offset = 405504
C:\Program Files\VMware\VMware Tools\VMwareTray.exe---> Offset = 253952
C:\Program Files\VMware\VMware Tools\VMwareUser.exe---> Offset = 1171456
C:\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe---> Offset = 98816
C:\Program Files\Microsoft Office\OFFICE11\EXCEL.EXE---> Offset = 10420224
C:\Program Files\Microsoft Office\OFFICE11\POWERPNT.EXE---> Offset = 6482432
Behavior description:跨进程写入数据
details:TargetProcess = explorer.exe, WriteAddress = 0x02620000, Size = 8192
C:\WINDOWS\explorer.exe
TargetProcess = explorer.exe, WriteAddress = 0x02630000, Size = 4096
TargetProcess = ctfmon.exe, WriteAddress = 0x009a0000, Size = 8192
C:\WINDOWS\system32\ctfmon.exe
TargetProcess = ctfmon.exe, WriteAddress = 0x009b0000, Size = 4096
TargetProcess = QQ.exe, WriteAddress = 0x00c60000, Size = 8192
C:\Program Files\Tencent\QQ\Bin\QQ.exe
TargetProcess = QQ.exe, WriteAddress = 0x00c90000, Size = 4096
C:\Program Files\Tencent\QQ\Bin\TXPlatform.exe
TargetProcess = conime.exe, WriteAddress = 0x00910000, Size = 8192
C:\WINDOWS\system32\conime.exe
TargetProcess = conime.exe, WriteAddress = 0x00e30000, Size = 4096
C:\WINDOWS\system32\PersonalBankPortal.exe
TargetProcess = EasyWebSvr.exe, WriteAddress = 0x00d20000, Size = 8192
Behavior description:获取文件属性探测虚拟机
details:GetFileAttributes: FileName = c:\program files\vmware\vmware tools\vmwaretray.exe
GetFileAttributes: FileName = c:\program files\vmware\vmware tools\vmwareuser.exe
GetFileAttributes: FileName = c:\windows\system32\vboxtray.exe
Behavior description:修改注册表_系统防火墙可信进程列表
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445762626.868627.exe
Behavior description:修改注册表_UAC关键设置
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\EnableLUA
Behavior description:常规加载驱动
details:system32\DRIVERS\ipfltdrv.sys
\??\C:\WINDOWS\system32\drivers\prlpf.sys
Behavior description:创建远程线程
details:C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Tencent\QQ\Bin\QQ.exe
C:\Program Files\Tencent\QQ\Bin\TXPlatform.exe
C:\WINDOWS\system32\conime.exe
C:\WINDOWS\system32\PersonalBankPortal.exe
C:\%temp%\1445762626.524675.exe
C:\%temp%\1445762626.531551.exe
C:\WINDOWS\system32\taskmgr.exe
C:\%temp%\1445762626.552162.exe
C:\%temp%\1445762626.559037.exe
C:\WINDOWS\system32\patchupdate.exe
C:\WINDOWS\system32\tm.exe
C:\Program Files\Internet Explorer\iexplore.exe
Behavior description:内存映射方式修改可执行文件
details:\device\harddiskvolume1\program files\microsoft office\office11\winword.exe
\device\harddiskvolume1\windows\system32\notepad.exe
\device\harddiskvolume1\windows\system32\cmb_pb_liveupdate.exe
\device\harddiskvolume1\program files\adobe\reader 9.0\reader\reader_sl.exe
\device\harddiskvolume1\program files\vmware\vmware tools\vmwaretray.exe
\device\harddiskvolume1\windows\system32\cmd.exe
\device\harddiskvolume1\program files\vmware\vmware tools\vmwareuser.exe
\device\harddiskvolume1\program files\microsoft office\office11\excel.exe
\device\harddiskvolume1\program files\microsoft office\office11\powerpnt.exe
Behavior description:设置特殊文件属性
details:C:\vptvvn.exe
C:\DiskD\kvmej.pif
C:\DiskX\dyknsi.pif
C:\Program Files\VMware\VMware Tools\VMwareTray.exe
C:\Program Files\VMware\VMware Tools\VMwareUser.exe
C:\WINDOWS\system32\VBoxTray.exe
Behavior description:停止系统服务
details:ServiceName = Application Layer Gateway Service
ServiceName = Windows Firewall/Internet Connection Sharing (ICS)
ServiceName = Security Center
Behavior description:尝试连接RootKit驱动设备对象
details:\??\amsint32
Behavior description:写权限映射文件
details:hh8geqpHJTkdns0
purity_control_90833
\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cboofr.exe
\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE
\WINDOWS\system32\notepad.exe
\WINDOWS\system32\Cmb_Pb_LiveUpdate.exe
Local\UrlZonesSM_Administrator
\WINDOWS\system32\zh-cn\ieframe.dll.mui
Internet Explorer Immutable Application State (00000F14-0000-0000-0000-000000000000)
CiceroSharedMemDefaultS-*
ie_lcie_LogonMedium
ie_lcie_main_f14
Isolation Process Registry (6D58D8BB-7AF4-11E5-91BE-000000000000)
Isolation Signal Registry (6D58D8BB-7AF4-11E5-91BE-000000000000, 0)
Local\IEFrame!GetAsyncKeyStateSharedMem!3860
Behavior description:在根目录创建自运行文件
details:C:\autorun.inf
C:\DiskD\autorun.inf
C:\DiskX\autorun.inf
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:创建系统服务
details:[服务已存在]: IPFILTERDRIVER, C:\WINDOWS\system32\drivers\ipfltdrv.sys
[服务创建成功]: amsint32, C:\WINDOWS\system32\drivers\prlpf.sys
Process behavior
Behavior description:跨进程写入数据
details:TargetProcess = explorer.exe, WriteAddress = 0x02620000, Size = 8192
C:\WINDOWS\explorer.exe
TargetProcess = explorer.exe, WriteAddress = 0x02630000, Size = 4096
TargetProcess = ctfmon.exe, WriteAddress = 0x009a0000, Size = 8192
C:\WINDOWS\system32\ctfmon.exe
TargetProcess = ctfmon.exe, WriteAddress = 0x009b0000, Size = 4096
TargetProcess = QQ.exe, WriteAddress = 0x00c60000, Size = 8192
C:\Program Files\Tencent\QQ\Bin\QQ.exe
TargetProcess = QQ.exe, WriteAddress = 0x00c90000, Size = 4096
C:\Program Files\Tencent\QQ\Bin\TXPlatform.exe
TargetProcess = conime.exe, WriteAddress = 0x00910000, Size = 8192
C:\WINDOWS\system32\conime.exe
TargetProcess = conime.exe, WriteAddress = 0x00e30000, Size = 4096
C:\WINDOWS\system32\PersonalBankPortal.exe
TargetProcess = EasyWebSvr.exe, WriteAddress = 0x00d20000, Size = 8192
Behavior description:创建远程线程
details:C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Tencent\QQ\Bin\QQ.exe
C:\Program Files\Tencent\QQ\Bin\TXPlatform.exe
C:\WINDOWS\system32\conime.exe
C:\WINDOWS\system32\PersonalBankPortal.exe
C:\%temp%\1445762626.524675.exe
C:\%temp%\1445762626.531551.exe
C:\WINDOWS\system32\taskmgr.exe
C:\%temp%\1445762626.552162.exe
C:\%temp%\1445762626.559037.exe
C:\WINDOWS\system32\patchupdate.exe
C:\WINDOWS\system32\tm.exe
C:\Program Files\Internet Explorer\iexplore.exe
Behavior description:枚举进程
details:N/A
Behavior description:创建进程
details:ImagePath = C:\Program Files\Internet Explorer\IEXPLORE.EXE, CmdLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.yixun.com/
File behavior
Behavior description:修改原系统的EXE文件
details:C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE---> Offset = 12378112
C:\WINDOWS\system32\Cmb_Pb_LiveUpdate.exe---> Offset = 405504
C:\Program Files\VMware\VMware Tools\VMwareTray.exe---> Offset = 253952
C:\Program Files\VMware\VMware Tools\VMwareUser.exe---> Offset = 1171456
C:\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe---> Offset = 98816
C:\Program Files\Microsoft Office\OFFICE11\EXCEL.EXE---> Offset = 10420224
C:\Program Files\Microsoft Office\OFFICE11\POWERPNT.EXE---> Offset = 6482432
Behavior description:创建可执行文件
details:C:\WINDOWS\system32\drivers\prlpf.sys
C:\vptvvn.exe
C:\DiskD\kvmej.pif
C:\DiskX\dyknsi.pif
Behavior description:查找文件
details:FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\*
FileName = C:\*
FileName = C:\ANALYZECONTROL\*
FileName = D:\*
FileName = E:\*
FileName = F:\*
FileName = C:\DISKD\*
FileName = G:\*
FileName = C:\DISKX\*
FileName = I:\*
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\My Documents
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\Documents
Behavior description:内存映射方式修改可执行文件
details:\device\harddiskvolume1\program files\microsoft office\office11\winword.exe
\device\harddiskvolume1\windows\system32\notepad.exe
\device\harddiskvolume1\windows\system32\cmb_pb_liveupdate.exe
\device\harddiskvolume1\program files\adobe\reader 9.0\reader\reader_sl.exe
\device\harddiskvolume1\program files\vmware\vmware tools\vmwaretray.exe
\device\harddiskvolume1\windows\system32\cmd.exe
\device\harddiskvolume1\program files\vmware\vmware tools\vmwareuser.exe
\device\harddiskvolume1\program files\microsoft office\office11\excel.exe
\device\harddiskvolume1\program files\microsoft office\office11\powerpnt.exe
Behavior description:设置特殊文件属性
details:C:\vptvvn.exe
C:\DiskD\kvmej.pif
C:\DiskX\dyknsi.pif
C:\Program Files\VMware\VMware Tools\VMwareTray.exe
C:\Program Files\VMware\VMware Tools\VMwareUser.exe
C:\WINDOWS\system32\VBoxTray.exe
Behavior description:写权限映射文件
details:hh8geqpHJTkdns0
purity_control_90833
\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cboofr.exe
\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE
\WINDOWS\system32\notepad.exe
\WINDOWS\system32\Cmb_Pb_LiveUpdate.exe
Local\UrlZonesSM_Administrator
\WINDOWS\system32\zh-cn\ieframe.dll.mui
Internet Explorer Immutable Application State (00000F14-0000-0000-0000-000000000000)
CiceroSharedMemDefaultS-*
ie_lcie_LogonMedium
ie_lcie_main_f14
Isolation Process Registry (6D58D8BB-7AF4-11E5-91BE-000000000000)
Isolation Signal Registry (6D58D8BB-7AF4-11E5-91BE-000000000000, 0)
Local\IEFrame!GetAsyncKeyStateSharedMem!3860
Behavior description:在根目录创建自运行文件
details:C:\autorun.inf
C:\DiskD\autorun.inf
C:\DiskX\autorun.inf
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:修改文件内容
details:C:\WINDOWS\system.ini---> Offset = 231
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cboofr.exe---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ccchr.exe---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\jcte.exe---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winyfyu.exe---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winueyn.exe---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\uogb.exe---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winijfqb.exe---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\wintbaiyq.exe---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winipumwg.exe---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\xmirdh.exe---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winhepuso.exe---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\apmqn.exe---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winslnteo.exe---> Offset = 0
C:\autorun.inf---> Offset = 0
Network behavior
Behavior description:联网打开网址
details:InternetOpenUrlA: http://althawry.org/images/xs.jpg?77dca=1963816 hInternet = 0x00000554
InternetOpenUrlA: http://www.careerdesk.org/images/xs.jpg?777d0=4404816 hInternet = 0x00000554
InternetOpenUrlA: http://arthur.niria.biz/xs.jpg?7787f=2937594 hInternet = 0x0000053c
InternetOpenUrlA: http://amsamex.com/xs.jpg?7786d=4406229 hInternet = 0x0000053c
InternetOpenUrlA: http://apple-pie.in/images/xs.jpg?7789c=4406652 hInternet = 0x0000053c
InternetOpenUrlA: http://ahmediye.net/xs.jpg?778da=1958760 hInternet = 0x0000053c
InternetOpenUrlA: http://g2.arrowhitech.com/xs.jpg?77999=4898810 hInternet = 0x0000053c
InternetOpenUrlA: http://ampyazilim.com.tr/images/xs2.jpg?779c7=3429489 hInternet = 0x0000053c
InternetOpenUrlA: http://althawry.org/images/xs.jpg?7cb0e=3064404 hInternet = 0x000006e4
InternetOpenUrlA: http://www.careerdesk.org/images/xs.jpg?77f1d=4912930 hInternet = 0x000006e4
InternetOpenUrlA: http://arthur.niria.biz/xs.jpg?77ddb=4418739 hInternet = 0x000006e4
InternetOpenUrlA: http://amsamex.com/xs.jpg?781a9=4919450 hInternet = 0x000005e4
InternetOpenUrlA: http://apple-pie.in/images/xs.jpg?77e87=4420287 hInternet = 0x000005e4
InternetOpenUrlA: http://ahmediye.net/xs.jpg?77f04=491268 hInternet = 0x0000052c
InternetOpenUrlA: http://g2.arrowhitech.com/xs.jpg?77fe2=4914900 hInternet = 0x0000052c
Behavior description:下载文件
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ccchr.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\jcte.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winyfyu.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winueyn.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\uogb.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winijfqb.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\wintbaiyq.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winipumwg.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\xmirdh.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winhepuso.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\apmqn.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winslnteo.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winevef.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\winxhvl.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\aanl.exe
Behavior description:读取网络文件
details:hFile = 0x00000554, BytesToRead =1024, BytesRead = 1024.
hFile = 0x0000053c, BytesToRead =1024, BytesRead = 1024.
hFile = 0x000006e4, BytesToRead =1024, BytesRead = 1024.
hFile = 0x000005e4, BytesToRead =1024, BytesRead = 1024.
hFile = 0x0000052c, BytesToRead =1024, BytesRead = 1024.
hFile = 0x000006cc, BytesToRead =1024, BytesRead = 1024.
hFile = 0x00000544, BytesToRead =1024, BytesRead = 1024.
hFile = 0x00000534, BytesToRead =1024, BytesRead = 1024.
hFile = 0x0000051c, BytesToRead =1024, BytesRead = 1024.
hFile = 0x00000558, BytesToRead =1024, BytesRead = 1024.
hFile = 0x000004f4, BytesToRead =1024, BytesRead = 1024.
hFile = 0x000004ec, BytesToRead =1024, BytesRead = 1024.
hFile = 0x000004fc, BytesToRead =1024, BytesRead = 1024.
hFile = 0x000004d4, BytesToRead =1024, BytesRead = 1024.
hFile = 0x00000518, BytesToRead =1024, BytesRead = 1024.
Registry behavior
Behavior description:修改注册表_Explorer文件显示相关属性
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden
Behavior description:删除注册表键_安全模式启动项
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\AppMgmt
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\Base
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\Boot Bus Extender
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\Boot file system
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\CryptSvc
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\DcomLaunch
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\dmadmin
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\dmboot.sys
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\dmio.sys
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\dmload.sys
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\dmserver
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\EventLog
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\File system
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\Filter
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\Minimal\Netlogon
Behavior description:修改注册表_UAC关键设置
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\EnableLUA
Behavior description:删除注册表键值_安全模式启动项
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\SafeBoot\AlternateShell
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\GlobalUserOffline
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\-993627007\1768776769
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\-993627007\-757413758
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\-993627007\1011363011
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\-993627007\-1514827516
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\-993627007\253949253
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\-993627007\-503464505
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\A1_0
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\A2_0
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\A3_0
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\A4_0
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\A1_1
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\A2_1
Behavior description:修改注册表_系统防火墙可信进程列表
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445762626.868627.exe
Behavior description:修改注册表_安全中心相关属性
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusOverride
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\FirewallOverride
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\UacDisableNotify
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusOverride
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusDisableNotify
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\FirewallDisableNotify
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\FirewallOverride
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\UpdatesDisableNotify
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\UacDisableNotify
Behavior description:删除注册表键值
details:\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\A1_0
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\A2_0
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\A3_0
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\A4_0
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\A1_1
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\A2_1
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\A3_1
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\A4_1
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\A1_2
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\A2_2
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\A3_2
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\A4_2
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\A1_3
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\A2_3
\REGISTRY\USER\S-*\Software\Aasppapmmxkvs\A3_3
Other behavior
Behavior description:创建互斥体
details:uxJLpe1m
smss.exeM_532_
csrss.exeM_588_
winlogon.exeM_612_
services.exeM_656_
lsass.exeM_668_
33oxservice.exeM_828_
33acthlp.exeM_840_
svchost.exeM_880_
svchost.exeM_944_
svchost.exeM_984_
svchost.exeM_1068_
svchost.exeM_1100_
spoolsv.exeM_1240_
33upgradehelper.exeM_1504_
Behavior description:常规加载驱动
details:system32\DRIVERS\ipfltdrv.sys
\??\C:\WINDOWS\system32\drivers\prlpf.sys
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [TXGuiFoundation,QQ2013]
NtUserFindWindowEx: [Class,Window] = [CTXOPConntion_Class,OP_2269840561]
Behavior description:启动系统服务
details:[服务启动成功]: , IP Traffic Filter Driver, system32\DRIVERS\ipfltdrv.sys
[服务启动成功]: , amsint32, \??\C:\WINDOWS\system32\drivers\prlpf.sys
Behavior description:获取文件属性探测虚拟机
details:GetFileAttributes: FileName = c:\program files\vmware\vmware tools\vmwaretray.exe
GetFileAttributes: FileName = c:\program files\vmware\vmware tools\vmwareuser.exe
GetFileAttributes: FileName = c:\windows\system32\vboxtray.exe
Behavior description:获取系统权限
details:SE_DEBUG_PRIVILEGE
SE_LOAD_DRIVER_PRIVILEGE
Behavior description:搜索kernel32.dll基地址
details:Instruction Address = 0x00d1e17e
Behavior description:枚举窗口
details:N/A
Behavior description:停止系统服务
details:ServiceName = Application Layer Gateway Service
ServiceName = Windows Firewall/Internet Connection Sharing (ICS)
ServiceName = Security Center
Behavior description:尝试连接RootKit驱动设备对象
details:\??\amsint32
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 1024.
[2]: MilliSeconds = 120000.
[3]: MilliSeconds = 180000.
[4]: MilliSeconds = 512.
[5]: MilliSeconds = 300000.
[6]: MilliSeconds = 10240.
[7]: MilliSeconds = -1.
[8]: MilliSeconds = -1.
[9]: MilliSeconds = 10000.
[10]: MilliSeconds = 512.
Behavior description:获取TickCount值
details:TickCount = 486793, SleepMilliseconds = 12.
TickCount = 486824, SleepMilliseconds = 12.
TickCount = 486871, SleepMilliseconds = 12.
TickCount = 787375, SleepMilliseconds = 300000.
TickCount = 487693, SleepMilliseconds = 256.
TickCount = 487709, SleepMilliseconds = 256.
TickCount = 487724, SleepMilliseconds = 256.
TickCount = 487740, SleepMilliseconds = 256.
TickCount = 487756, SleepMilliseconds = 256.
TickCount = 487771, SleepMilliseconds = 256.
TickCount = 487787, SleepMilliseconds = 256.
TickCount = 488146, SleepMilliseconds = 256.
TickCount = 488224, SleepMilliseconds = 256.
TickCount = 488840, SleepMilliseconds = 512.
TickCount = 498531, SleepMilliseconds = 10000.
Behavior description:创建系统服务
details:[服务已存在]: IPFILTERDRIVER, C:\WINDOWS\system32\drivers\ipfltdrv.sys
[服务创建成功]: amsint32, C:\WINDOWS\system32\drivers\prlpf.sys
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号