VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:b8208ed3970c4e605f60a52d60683216
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description: 在桌面创建文件
details: C:\Documents and Settings\Administrator\桌面\进程截杀器.lnk
Behavior description: 获取窗口截图信息
details: Foreground window Info: HWND = 0x00000000, DC = 0x5c0105f4.
Foreground window Info: HWND = 0x00000000, DC = 0xae01057a.
Foreground window Info: HWND = 0x00000000, DC = 0x87010205.
Foreground window Info: HWND = 0x00000000, DC = 0xa5010573.
Foreground window Info: HWND = 0x00000000, DC = 0x40010589.
Behavior description: 获取TickCount值
details: TickCount = 5438834, SleepMilliseconds = 350.
TickCount = 5439100, SleepMilliseconds = 350.
TickCount = 5439162, SleepMilliseconds = 350.
TickCount = 5439193, SleepMilliseconds = 350.
TickCount = 5439443, SleepMilliseconds = 350.
TickCount = 5439506, SleepMilliseconds = 350.
TickCount = 5439631, SleepMilliseconds = 350.
TickCount = 5439646, SleepMilliseconds = 350.
TickCount = 5439662, SleepMilliseconds = 350.
TickCount = 5439928, SleepMilliseconds = 350.
TickCount = 5439975, SleepMilliseconds = 350.
TickCount = 5439990, SleepMilliseconds = 350.
TickCount = 5440006, SleepMilliseconds = 350.
TickCount = 5440068, SleepMilliseconds = 350.
TickCount = 5440100, SleepMilliseconds = 350.
Behavior description: 修改注册表_启动项
details: \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BugCode_taskkill

Process behavior

Behavior description: 创建本地线程
details: TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 2976, ThreadID = 3136, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 2976, ThreadID = 3140, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 2976, ThreadID = 3160, StartAddress = 004050F1, Parameter = 001003C8
TargetProcess: ProcessKiller.exe, InheritedFromPID = 2976, ProcessID = 3432, ThreadID = 3440, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: ProcessKiller.exe, InheritedFromPID = 2976, ProcessID = 3432, ThreadID = 3444, StartAddress = 00470465, Parameter = 001A5278
TargetProcess: ProcessKiller.exe, InheritedFromPID = 2976, ProcessID = 3432, ThreadID = 3448, StartAddress = 765E964D, Parameter = 001EB1D0
TargetProcess: ProcessKiller.exe, InheritedFromPID = 2976, ProcessID = 3432, ThreadID = 3464, StartAddress = 7C949B6F, Parameter = 00000000
TargetProcess: ProcessKiller.exe, InheritedFromPID = 2976, ProcessID = 3432, ThreadID = 3472, StartAddress = 759D8761, Parameter = 00000000
TargetProcess: ProcessKiller.exe, InheritedFromPID = 2976, ProcessID = 3432, ThreadID = 3476, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: ProcessKiller.exe, InheritedFromPID = 2976, ProcessID = 3432, ThreadID = 3480, StartAddress = 00470465, Parameter = 02F36D20
TargetProcess: ProcessKiller.exe, InheritedFromPID = 2976, ProcessID = 3432, ThreadID = 3484, StartAddress = 00470465, Parameter = 02F36DD0
TargetProcess: ProcessKiller.exe, InheritedFromPID = 2976, ProcessID = 3432, ThreadID = 3488, StartAddress = 757D4D37, Parameter = 02F361A0
TargetProcess: ProcessKiller.exe, InheritedFromPID = 2976, ProcessID = 3432, ThreadID = 3528, StartAddress = 757D4D37, Parameter = 01DFFAF8
TargetProcess: ProcessKiller.exe, InheritedFromPID = 2976, ProcessID = 3432, ThreadID = 3532, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: ProcessKiller.exe, InheritedFromPID = 2976, ProcessID = 3432, ThreadID = 3536, StartAddress = 7C930230, Parameter = 00000000
Behavior description: 创建新文件进程
details: ImagePath = C:\Program Files\进程截杀器\ProcessKiller.exe, CmdLine = "C:\Program Files\进程截杀器\ProcessKiller.exe" "install"
Behavior description: 枚举进程
details: N/A

File behavior

Behavior description: 创建文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\nsd51.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\nss52.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\Registry.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\ioSpecial.ini
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\modern-wizard.bmp
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\InstallOptions.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\KillProcDLL.dll
C:\Program Files\进程截杀器\ProcessKiller.exe
C:\Program Files\进程截杀器\MainEngine.dll
C:\Program Files\进程截杀器\ClearEngine.dll
C:\Program Files\进程截杀器\lua52.dll
C:\Program Files\进程截杀器\zlib1.dll
C:\Program Files\进程截杀器\jcprok\FeaturesLib.prok
C:\Program Files\进程截杀器\tools\time_checked.exe
Behavior description: 在系统敏感位置(如开始菜单等)释放链接或快捷方式
details: C:\Documents and Settings\Administrator\「开始」菜单\程序\进程截杀器\进程截杀器.lnk
C:\Documents and Settings\Administrator\「开始」菜单\程序\进程截杀器\Uninstall.lnk
Behavior description: 创建可执行文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\Registry.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\InstallOptions.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\KillProcDLL.dll
C:\Program Files\进程截杀器\ProcessKiller.exe
C:\Program Files\进程截杀器\MainEngine.dll
C:\Program Files\进程截杀器\ClearEngine.dll
C:\Program Files\进程截杀器\lua52.dll
C:\Program Files\进程截杀器\zlib1.dll
C:\Program Files\进程截杀器\tools\time_checked.exe
C:\Program Files\进程截杀器\uninst.exe
C:\Program Files\进程截杀器\CloudIni.ini
C:\Program Files\进程截杀器\jcprok\FeaturesLib_Tmp.prok
Behavior description: 覆盖已有文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\nss52.tmp
C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
C:\Documents and Settings\Administrator\Local Settings\Temp\Cab54.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\Tar55.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\Cab56.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\Tar57.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\Cab58.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\Tar59.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\Cab5A.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\Tar5B.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\Cab5C.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\Tar5D.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\Cab5E.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\Tar5F.tmp
Behavior description: 查找文件
details: FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsy53.tmp
FileName = C:\Program Files\进程截杀器
FileName = C:\Program Files
FileName = C:\Documents and Settings\Administrator\桌面\BugCode-进程截杀器.lnk
FileName = C:\Documents and Settings\Administrator\桌面
FileName = C:\Documents and Settings\Administrator\「开始」菜单\程序\BugCode-进程截杀器\进程截杀器.lnk
FileName = C:\Documents and Settings\Administrator\「开始」菜单\程序\BugCode-进程截杀器
FileName = C:\Documents and Settings\Administrator\「开始」菜单\程序
FileName = C:\Documents and Settings\Administrator\「开始」菜单
FileName = C:\Documents and Settings\Administrator\「开始」菜单\程序\BugCode-进程截杀器\Uninstall.lnk
Behavior description: 删除文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\nsd51.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\nss52.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\InstallOptions.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\ioSpecial.ini
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\KillProcDLL.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\modern-wizard.bmp
C:\Program Files\进程截杀器\jcprok\Lib.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\Cab54.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\Tar55.tmp
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\CloudIni[1].html
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\FeaturesLib[1].html
C:\Documents and Settings\Administrator\Local Settings\Temp\Cab56.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\Tar57.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\Cab58.tmp
Behavior description: 在桌面创建文件
details: C:\Documents and Settings\Administrator\桌面\进程截杀器.lnk
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description: 修改文件内容
details: C:\Documents and Settings\Administrator\Local Settings\Temp\nss52.tmp ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\nss52.tmp ---> Offset = 32768
C:\Documents and Settings\Administrator\Local Settings\Temp\nss52.tmp ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Temp\nss52.tmp ---> Offset = 74649
C:\Documents and Settings\Administrator\Local Settings\Temp\nss52.tmp ---> Offset = 107417
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\Registry.dll ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\Registry.dll ---> Offset = 16384
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\ioSpecial.ini ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\ioSpecial.ini ---> Offset = 36
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\modern-wizard.bmp ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\modern-wizard.bmp ---> Offset = 16384
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\ioSpecial.ini ---> Offset = 124
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\ioSpecial.ini ---> Offset = 33
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\ioSpecial.ini ---> Offset = 43
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\ioSpecial.ini ---> Offset = 60

Network behavior

Behavior description: 联网打开网址
details: InternetOpenUrlA: http://cl****om/tongji.php?type=InstallChange&InstallType=install&usermid=12ef92a1c2d5005d6b8b907e592268d5&SrcType=install, hInternet = 0x00cc0008, Flags = 0x04000000
InternetOpenUrlA: http://cl****om/tongji.php?Filever=1.1.2.4&usermid=12ef92a1c2d5005d6b8b907e592268d5, hInternet = 0x00cc0010, Flags = 0x04000000
Behavior description: 下载文件
details: URLDownloadToFileW: http://cl****om/check/CloudConfig/CloudIni.html ---> C:\Program Files\进程截杀器\CloudIni.ini
C:\Program Files\进程截杀器\CloudIni.ini
URLDownloadToFileW: http://cl****om/check/CloudConfig/FeaturesLib.html ---> C:\Program Files\进程截杀器\jcprok\FeaturesLib_Tmp.prok
C:\Program Files\进程截杀器\jcprok\FeaturesLib_Tmp.prok
Behavior description: 连接指定站点
details: WinHttpConnect: ServerName = zh****om, PORT = 80, UserName = , Password = , hSession = 0x04042000, hConnect = 0x04042100, Flags = 0x00000000
InternetConnectA: ServerName = cl****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = cl****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc000c, Flags = 0x00000000
InternetConnectA: ServerName = cl****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0010, hConnect = 0x00cc001c, Flags = 0x04000000
InternetConnectA: ServerName = cl****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0008, hConnect = 0x00cc0018, Flags = 0x04000000
WinHttpConnect: ServerName = ww****om, PORT = 80, UserName = , Password = , hSession = 0x04042000, hConnect = 0x04042100, Flags = 0x00000000
Behavior description: 打开HTTP连接
details: WinHttpOpen: UserAgent: Microsoft-CryptoAPI/5.131.2600.5512, hSession = 0x04042000
InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489), hSession = 0x00cc0004
InternetOpenA: UserAgent: taskkill_tongji, hSession = 0x00cc0008
InternetOpenA: UserAgent: taskkill_tongji, hSession = 0x00cc0010
Behavior description: 建立到一个指定的套接字连接
details: URL: , IP: **.0.0.**:1037, SOCKET = 0x00000324
URL: zh****om, IP: **.133.40.**:80, SOCKET = 0x000003f4
URL: cl****om, IP: **.133.40.**:80, SOCKET = 0x00000444
URL: cl****om, IP: **.133.40.**:80, SOCKET = 0x00000460
URL: cl****om, IP: **.133.40.**:80, SOCKET = 0x00000448
URL: cl****om, IP: **.133.40.**:80, SOCKET = 0x00000470
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000458
Behavior description: 读取网络文件
details: hFile = 0x00cc000c, BytesToRead =2048, BytesRead = 2048.
hFile = 0x00cc0020, BytesToRead =2048, BytesRead = 2048.
hFile = 0x00cc0014, BytesToRead =2048, BytesRead = 2048.
hFile = 0x00cc0024, BytesToRead =2048, BytesRead = 2048.
Behavior description: 发送HTTP包
details: GET /CertEnroll/zhanghao-a4c765.Sign.shajincheng.com_!6740!8fdb!7a0b!7f51!7b7e!540d!670d!52a1!5668.crt HTTP/1.1 Accept: */* User-Agent: Microsoft-CryptoAPI/5.131.2600.5512 Host: zh****om Connection: Keep-Alive
GET /check/CloudConfig/CloudIni.html HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: cl****om Connection: Keep-Alive
GET /tongji.php?Filever=1.1.2.4&usermid=12ef92a1c2d5005d6b8b907e592268d5 HTTP/1.1 User-Agent: taskkill_tongji Host: cl****om
GET /check/CloudConfig/FeaturesLib.html HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: cl****om Connection: Keep-Alive
GET /tongji.php?type=InstallChange&InstallType=install&usermid=12ef92a1c2d5005d6b8b907e592268d5&SrcType=install HTTP/1.1 User-Agent: taskkill_tongji Host: cl****om
GET /msdownload/update/v3/static/trustedr/en/authrootseq.txt HTTP/1.1 Accept: */* User-Agent: Microsoft-CryptoAPI/5.131.2600.5512 Host: ww****om Connection: Keep-Alive Cache-Control: no-cache Pragma: no-cache
Behavior description: 打开HTTP请求
details: WinHttpOpenRequest: zh****om:80/certenroll/zhanghao-a4c765.sign.shajincheng.com_!6740!8fdb!7a0b!7f51!7b7e!540d!670d!52a1!5668.crt, hConnect = 0x04042100, hRequest = 0x04090000, Verb: GET, Referer: , Flags = 0x00000000
HttpOpenRequestA: cl****om:80/check/cloudconfig/cloudini.html, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400010
HttpOpenRequestA: cl****om:80/check/cloudconfig/featureslib.html, hConnect = 0x00cc000c, hRequest = 0x00cc0014, Verb: GET, Referer: , Flags = 0x00400010
HttpOpenRequestA: cl****om:80/tongji.php?filever=1.1.2.4&usermid=12ef92a1c2d5005d6b8b907e592268d5, hConnect = 0x00cc001c, hRequest = 0x00cc0020, Verb: GET, Referer: , Flags = 0x04000000
HttpOpenRequestA: cl****om:80/tongji.php?type=installchange&installtype=install&usermid=12ef92a1c2d5005d6b8b907e592268d5&srctype=install, hConnect = 0x00cc0018, hRequest = 0x00cc0024, Verb: GET, Referer: , Flags = 0x04000000
WinHttpOpenRequest: ww****om:80/msdownload/update/v3/static/trustedr/en/authrootseq.txt, hConnect = 0x04042100, hRequest = 0x04090000, Verb: GET, Referer: , Flags = 0x00000100
Behavior description: 按名称获取主机地址
details: GetAddrInfoW: zh****om
GetAddrInfoW: cl****om
GetAddrInfoW: ww****om

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\进程截杀器.exe\
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\进程截杀器\DisplayName
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\进程截杀器\UninstallString
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\进程截杀器\DisplayIcon
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\进程截杀器\URLInfoAbout
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\进程截杀器\Publisher
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\进程截杀器\InstallDir
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Behavior description: 修改注册表_延迟重命名项
details: \REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Session Manager\PendingFileRenameOperations
Behavior description: 删除注册表键值
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
Behavior description: 修改注册表_启动项
details: \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BugCode_taskkill

Other behavior

Behavior description: 创建互斥体
details: CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.EKL
RasPbFile
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
MSCTF.Shared.MUTEX.MGN
Behavior description: 隐藏指定窗口
details: [Window,Class] = [,Button]
[Window,Class] = [Nullsoft Install System v3.0b2,Static]
[Window,Class] = [Nullsoft Install System v3.0b2 ,Static]
[Window,Class] = [,Static]
[Window,Class] = [,Auto-Suggest Dropdown]
[Window,Class] = [显示细节(&D),Button]
[Window,Class] = [安装完成,Static]
[Window,Class] = [安装程序已成功地运行完成。,Static]
[Window,Class] = [,Window]
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [#32770,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [Window,进程截杀器]
Behavior description: 打开事件
details: HookSwitchHookEnabledEvent
_fCanRegisterWithShellService
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000053
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000053
MSCTF.SendReceiveConection.Event.ELH.IC
MSCTF.SendReceive.Event.ELH.IC
Global\crypt32LogoffEvent
Global\userenv: Machine Group Policy has been applied
userenv: User Group Policy has been applied
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
\INSTALLATION_SECURITY_HOLD
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000056
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000056
Global\SvcctrlStartEvent_A3752DX
Behavior description: 获取TickCount值
details: TickCount = 5438834, SleepMilliseconds = 350.
TickCount = 5439100, SleepMilliseconds = 350.
TickCount = 5439162, SleepMilliseconds = 350.
TickCount = 5439193, SleepMilliseconds = 350.
TickCount = 5439443, SleepMilliseconds = 350.
TickCount = 5439506, SleepMilliseconds = 350.
TickCount = 5439631, SleepMilliseconds = 350.
TickCount = 5439646, SleepMilliseconds = 350.
TickCount = 5439662, SleepMilliseconds = 350.
TickCount = 5439928, SleepMilliseconds = 350.
TickCount = 5439975, SleepMilliseconds = 350.
TickCount = 5439990, SleepMilliseconds = 350.
TickCount = 5440006, SleepMilliseconds = 350.
TickCount = 5440068, SleepMilliseconds = 350.
TickCount = 5440100, SleepMilliseconds = 350.
Behavior description: 调整进程token权限
details: SE_LOAD_DRIVER_PRIVILEGE
SE_DEBUG_PRIVILEGE
Behavior description: 窗口信息
details: Pid = 2976, Hwnd=0xa03b0, Text = 下一步(&N) >, ClassName = Button.
Pid = 2976, Hwnd=0x303dc, Text = 取消(&C), ClassName = Button.
Pid = 2976, Hwnd=0xc038a, Text = Nullsoft Install System v3.0b2 , ClassName = Static.
Pid = 2976, Hwnd=0x15030c, Text = Nullsoft Install System v3.0b2, ClassName = Static.
Pid = 2976, Hwnd=0x1f02fe, Text = 欢迎使用 进程截杀器 安装向导, ClassName = Static.
Pid = 2976, Hwnd=0xa03ac, Text = 这个向导将指引你完成 进程截杀器 的安装进程。 在开始安装之前,建议先关闭其他所有应用程序。这将允许“安装程序”更新指定的系统文件,而不需要重新启动你的计算机。 单击 [下一步(N)] 继续。, ClassName = Static.
Pid = 2976, Hwnd=0x1f02b6, Text = 进程截杀器 安装, ClassName = #32770.
Pid = 2976, Hwnd=0x140306, Text = < 上一步(&P), ClassName = Button.
Pid = 2976, Hwnd=0xa03b0, Text = 我接受(&I), ClassName = Button.
Pid = 2976, Hwnd=0x6037e, Text = 许可证协议, ClassName = Static.
Pid = 2976, Hwnd=0x40394, Text = 在安装 进程截杀器 之前,请检阅授权条款。, ClassName = Static.
Pid = 2976, Hwnd=0xb03ac, Text = 检阅协议的其余部分,按 [PgDn] 往下卷动页面。, ClassName = Static.
Pid = 2976, Hwnd=0x603b2, Text = 如果你接受协议中的条款,单击 [我同意(I)] 继续安装。必须要接受协议才能安装 进程截杀器 。, ClassName = Static.
Pid = 2976, Hwnd=0xa03b0, Text = 安装(&I), ClassName = Button.
Pid = 2976, Hwnd=0x6037e, Text = 选定安装位置, ClassName = Static.
Behavior description: 获取窗口截图信息
details: Foreground window Info: HWND = 0x00000000, DC = 0x5c0105f4.
Foreground window Info: HWND = 0x00000000, DC = 0xae01057a.
Foreground window Info: HWND = 0x00000000, DC = 0x87010205.
Foreground window Info: HWND = 0x00000000, DC = 0xa5010573.
Foreground window Info: HWND = 0x00000000, DC = 0x40010589.
Behavior description: 可执行文件签名信息
details: C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\Registry.dll(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\InstallOptions.dll(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\KillProcDLL.dll(签名验证: 未通过)
C:\Program Files\进程截杀器\ProcessKiller.exe(签名验证: 未通过)
C:\Program Files\进程截杀器\MainEngine.dll(签名验证: 未通过)
C:\Program Files\进程截杀器\ClearEngine.dll(签名验证: 未通过)
C:\Program Files\进程截杀器\lua52.dll(签名验证: 未通过)
C:\Program Files\进程截杀器\zlib1.dll(签名验证: 未通过)
C:\Program Files\进程截杀器\tools\time_checked.exe(签名验证: 未通过)
C:\Program Files\进程截杀器\uninst.exe(签名验证: 未通过)
C:\Program Files\进程截杀器\CloudIni.ini(签名验证: 未通过)
C:\Program Files\进程截杀器\jcprok\FeaturesLib_Tmp.prok(签名验证: 未通过)
Behavior description: 调用Sleep函数
details: [1]: MilliSeconds = 350.
[1]: MilliSeconds = 1000.
[2]: MilliSeconds = 1000.
[3]: MilliSeconds = 1000.
[4]: MilliSeconds = 1000.
[5]: MilliSeconds = 1000.
[6]: MilliSeconds = 1000.
[7]: MilliSeconds = 1000.
[8]: MilliSeconds = 1000.
[9]: MilliSeconds = 1000.
[10]: MilliSeconds = 1000.
Behavior description: 创建事件对象
details: EventName = MSCTF.SendReceiveConection.Event.EKL.IC
EventName = MSCTF.SendReceive.Event.EKL.IC
EventName = Global\userenv: User Profile setup event
EventName = Global\crypt32LogoffEvent
EventName = DINPUTWINMM
EventName = MSCTF.SendReceive.Event.MGN.IC
EventName = MSCTF.SendReceiveConection.Event.MGN.IC
Behavior description: 可执行文件MD5
details: C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\Registry.dll ---> 2b7007ed0262ca02ef69d8990815cbeb
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\InstallOptions.dll ---> 2a03c4a7ac5ee5e0e0a683949f70971b
C:\Documents and Settings\Administrator\Local Settings\Temp\nsy53.tmp\KillProcDLL.dll ---> 99f345cf51b6c3c317d20a81acb11012
C:\Program Files\进程截杀器\ProcessKiller.exe ---> 58e7d72a7a978018ee4e41c3ce720f97
C:\Program Files\进程截杀器\MainEngine.dll ---> 74ec3c68ae43248f674d753b40a18bcd
C:\Program Files\进程截杀器\ClearEngine.dll ---> ac260aa4626bed2fca8fd89652206625
C:\Program Files\进程截杀器\lua52.dll ---> ffd736cd5c9a0b632dec4d3f42e8a1f9
C:\Program Files\进程截杀器\zlib1.dll ---> df74d6e00eb6733a3c0769387a3f1999
C:\Program Files\进程截杀器\tools\time_checked.exe ---> 7c58cf970fb15ace0d5a0faea0cf15d8
C:\Program Files\进程截杀器\uninst.exe ---> e3fdc719a91ba53d364f3edc5e9fae14
C:\Program Files\进程截杀器\CloudIni.ini ---> fe1d0ee5901dd167ee9b28eece31786c
C:\Program Files\进程截杀器\jcprok\FeaturesLib_Tmp.prok ---> fe1d0ee5901dd167ee9b28eece31786c
Behavior description: 打开互斥体
details: ShimCacheMutex
DBWinMutex
Local\_!MSFTHISTORY!_
Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Local\c:!documents and settings!administrator!cookies!
Local\c:!documents and settings!administrator!local settings!history!history.ie5!
Local\!IETld!Mutex
RasPbFile
Local\WininetStartupMutex
Local\WininetConnectionMutex
Local\WininetProxyRegistryMutex
Behavior description: 加载新释放的文件
details: Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsy53.tmp\Registry.dll.
Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsy53.tmp\InstallOptions.dll.
Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsy53.tmp\KillProcDLL.dll.
Image: C:\Program Files\进程截杀器\lua52.dll.
Image: C:\Program Files\进程截杀器\MainEngine.dll.
Image: C:\Program Files\进程截杀器\zlib1.dll.
Image: C:\Program Files\进程截杀器\ClearEngine.dll.