VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:dbbff1afa4c4a74470542d50c9302022
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 跨进程写入数据
details: TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00040000, Size = 0x00000020 TargetPID = 0x000007b0
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00040020, Size = 0x00000034 TargetPID = 0x000007b0
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x7ffdf238, Size = 0x00000004 TargetPID = 0x000007b0
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00040000, Size = 0x00000020 TargetPID = 0x00000b10
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00040020, Size = 0x00000034 TargetPID = 0x00000b10
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x7ffde238, Size = 0x00000004 TargetPID = 0x00000b10
Behavior description: 添加浏览器收藏夹
details: C:\Users\Administrator\Favorites\Links\建议网站.url
Behavior description: 设置特殊文件夹属性
details: C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Cookies
C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\History.IE5
C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\PrivacIE\Low
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IECompatCache\Low
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IETldCache\Low
C:\Users\Administrator\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Users\Administrator\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Users\Administrator\AppData\Local\Microsoft\Feeds Cache
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IETldCache
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IECompatCache
C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012017071920170720
Behavior description: 获取窗口截图信息
details: Foreground window Info: HWND = 0x0001027a, DC = 0x22010ad8.
Behavior description: 设置消息钩子
details: C:\Windows\system32\IEFRAME.dll

Process behavior

Behavior description: 创建进程
details: [0x000007b0]ImagePath = C:\Program Files\Internet Explorer\iexplore.exe, CmdLine = "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2068 CREDAT:79873
[0x00000b10]ImagePath = C:\Program Files\Internet Explorer\iexplore.exe, CmdLine = "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2068 CREDAT:14341
Behavior description: 跨进程写入数据
details: TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00040000, Size = 0x00000020 TargetPID = 0x000007b0
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00040020, Size = 0x00000034 TargetPID = 0x000007b0
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x7ffdf238, Size = 0x00000004 TargetPID = 0x000007b0
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00040000, Size = 0x00000020 TargetPID = 0x00000b10
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00040020, Size = 0x00000034 TargetPID = 0x00000b10
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x7ffde238, Size = 0x00000004 TargetPID = 0x00000b10

File behavior

Behavior description: 创建文件
details: C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{D4BFC4A3-6C15-11E7-BEE9-080027488980}.dat
C:\Users\Administrator\AppData\Local\Temp\~DF33F1B6B51C1308D0.TMP
C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2KQWVTOD\wpad[1].dat
C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{D4BFC4A4-6C15-11E7-BEE9-080027488980}.dat
C:\Users\Administrator\AppData\Local\Temp\~DF50E88D41BBCA106A.TMP
C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2KQWVTOD\sand[1].jpg
C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2KQWVTOD\rid[1]
C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2KQWVTOD\favicon[1].ico
C:\Users\Administrator\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2KQWVTOD\qsml[1].aspx
C:\Users\Administrator\AppData\Local\Temp\StructuredQuery.log
C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012017071920170720\index.dat
C:\Users\Administrator\AppData\Local\Temp\www16EE.tmp
C:\Users\Administrator\AppData\Local\Temp\Kno2B42.tmp
C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{DAF3A2C5-6C15-11E7-BEE9-080027488980}.dat
Behavior description: 创建可执行文件
details: C:\Users\Administrator\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
C:\Users\Administrator\AppData\Local\Temp\Kno2B42.tmp
Behavior description: 覆盖已有文件
details: C:\Users\Administrator\AppData\Local\Temp\Kno2B42.tmp
C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\frameiconcache.dat
Behavior description: 查找文件
details: FileName = C:\Program Files\Common Files\Adobe
FileName = C:\Program Files\Common Files\Adobe\Acrobat
FileName = C:\Program Files\Common Files\Adobe\Acrobat\ActiveX
FileName = C:\ProgramData\Microsoft\Network\Connections\Pbk\rasphone.pbk
FileName = C:\ProgramData\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\Windows\system32\Ras\*.pbk
FileName = C:\Users\Administrator\AppData\Roaming\Microsoft\Network\Connections\Pbk\rasphone.pbk
FileName = C:\Users\Administrator\AppData\Roaming\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\*.*
FileName = C:\Windows
FileName = C:\Windows\WinSxS
FileName = C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\MSVCR80.dll
FileName = C:\Users
FileName = C:\Users\Administrator\AppData
FileName = C:\Users\Administrator\AppData\Local
Behavior description: 删除文件
details: C:\Users\Administrator\AppData\Local\Temp\~DF33F1B6B51C1308D0.TMP
C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2KQWVTOD\wpad[1].dat
C:\Users\Administrator\AppData\Local\Temp\~DF50E88D41BBCA106A.TMP
C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2KQWVTOD\sand[1].jpg
C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2KQWVTOD\favicon[1].ico
C:\Users\Administrator\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2KQWVTOD\qsml[1].aspx
C:\Users\Administrator\AppData\Local\Temp\www16EE.tmp
C:\Users\Administrator\Favorites\Links\建议网站.url
C:\Users\Administrator\AppData\Local\Temp\Kno2B42.tmp
C:\Users\Administrator\AppData\Local\Temp\~DFF07A7A627480935D.TMP
C:\Users\Administrator\AppData\Local\Temp\~DFB524048F199186E0.TMP
C:\Users\Administrator\AppData\Local\Temp\~DFE932C56B0DBCD4DA.TMP
C:\Users\Administrator\AppData\Local\Temp\~DF6D5E567888F4B8C3.TMP
C:\Users\Administrator\AppData\Local\Temp\~DFCF44A0E2E8A868AF.TMP
Behavior description: 设置特殊文件夹属性
details: C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Cookies
C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\History.IE5
C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\PrivacIE\Low
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IECompatCache\Low
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IETldCache\Low
C:\Users\Administrator\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Users\Administrator\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Users\Administrator\AppData\Local\Microsoft\Feeds Cache
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IETldCache
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IECompatCache
C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012017071920170720
Behavior description: 修改文件内容
details: C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{D4BFC4A3-6C15-11E7-BEE9-080027488980}.dat ---> Offset = 512
C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{D4BFC4A3-6C15-11E7-BEE9-080027488980}.dat ---> Offset = 0
C:\Users\Administrator\AppData\Local\Temp\~DF33F1B6B51C1308D0.TMP ---> Offset = 16383
C:\Users\Administrator\AppData\Local\Temp\~DF33F1B6B51C1308D0.TMP ---> Offset = 12288
C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{D4BFC4A3-6C15-11E7-BEE9-080027488980}.dat ---> Offset = 3072
C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{D4BFC4A3-6C15-11E7-BEE9-080027488980}.dat ---> Offset = 1536
C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{D4BFC4A4-6C15-11E7-BEE9-080027488980}.dat ---> Offset = 512
C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{D4BFC4A4-6C15-11E7-BEE9-080027488980}.dat ---> Offset = 0
C:\Users\Administrator\AppData\Local\Temp\~DF50E88D41BBCA106A.TMP ---> Offset = 16383
C:\Users\Administrator\AppData\Local\Temp\~DF50E88D41BBCA106A.TMP ---> Offset = 12288
C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{D4BFC4A4-6C15-11E7-BEE9-080027488980}.dat ---> Offset = 3072
C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{D4BFC4A4-6C15-11E7-BEE9-080027488980}.dat ---> Offset = 1536
C:\Users\Administrator\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico ---> Offset = 0
C:\Users\Administrator\AppData\Local\Temp\StructuredQuery.log ---> Offset = 0
C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012017071920170720\index.dat ---> Offset = 0
Behavior description: 添加浏览器收藏夹
details: C:\Users\Administrator\Favorites\Links\建议网站.url

Network behavior

Behavior description: 联网打开网址
details: InternetOpenUrlA: http://**.133.40.**:128/wpad.dat, hInternet = 0x00cc0004, Flags = 0x00000010
InternetOpenUrlA: http://**.133.40.**:128/wpad.dat, hInternet = 0x00cc0010, Flags = 0x00000010
Behavior description: 下载文件
details: URLDownloadToFileW: http://ww****om/favicon.ico ---> C:\Users\Administrator\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
C:\Users\Administrator\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
URLDownloadToFileW: https://go****om/fwlink/?LinkId=141260 ---> C:\Users\ADMINI~1\AppData\Local\Temp\Kno2B42.tmp
Behavior description: 连接指定站点
details: InternetConnectA: ServerName = ke****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = fu****pk, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = ww****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = ap****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0010, Flags = 0x00000000
InternetConnectA: ServerName = ie****om, PORT = 443, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00800000
InternetConnectA: ServerName = go****om, PORT = 443, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00800000
InternetConnectA: ServerName = ur****om, PORT = 443, UserName = , Password = , hSession = 0x00cc0010, hConnect = 0x00cc0014, Flags = 0x00000200
Behavior description: 打开HTTP连接
details: InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0), hSession = 0x00cc0004
InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0), hSession = 0x00cc0004
InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0), hSession = 0x00cc0010
InternetOpenA: UserAgent: VCSoapClient, hSession = 0x00cc0010
Behavior description: 建立到一个指定的套接字连接
details: URL: wpad, IP: **.133.40.**:128, SOCKET = 0x000004bc
URL: wpad, IP: **.133.40.**:128, SOCKET = 0x00000588
URL: ke****om, IP: **.133.40.**:80, SOCKET = 0x0000058c
URL: fu****pk, IP: **.133.40.**:80, SOCKET = 0x00000430
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x000005dc
URL: ap****om, IP: **.133.40.**:80, SOCKET = 0x00000684
URL: ap****om, IP: **.133.40.**:80, SOCKET = 0x00000688
URL: ie****om, IP: **.133.40.**:443, SOCKET = 0x0000065c
URL: go****om, IP: **.133.40.**:443, SOCKET = 0x00000718
URL: wpad, IP: **.133.40.**:128, SOCKET = 0x000004d4
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x000004d8
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x000008ac
URL: ur****om, IP: **.133.40.**:443, SOCKET = 0x00000688
Behavior description: 读取网络文件
details: hFile = 0x00cc000c, BytesToRead =4010, BytesRead = 4010.
hFile = 0x00cc0018, BytesToRead =4010, BytesRead = 4010.
hFile = 0x00cc000c, BytesToRead =8192, BytesRead = 8192.
hFile = 0x00cc0014, BytesToRead =2048, BytesRead = 2048.
hFile = 0x00cc000c, BytesToRead =2048, BytesRead = 2048.
Behavior description: 发送HTTP包
details: GET /wpad.dat HTTP/1.1 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0) Host: **.133.40.**:128
GET /sand.jpg HTTP/1.1 Accept: */* Accept-Language: zh-CN User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0) Accept-Encoding: gzip, deflate Host: ke****om Connection: Keep-Alive
GET /rid/ HTTP/1.1 Accept: image/jpeg, application/x-ms-application, image/gif, application/xaml+xml, image/pjpeg, application/x-ms-xbap, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */* Accept-Language: zh-CN User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0) Accept-Encoding: gzip, deflate Host: fu****pk Connection: Keep-Alive
GET /favicon.ico HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0) Host: ww****om Connection: Keep-Alive
GET /qsml.aspx?query=1&maxwidth=296&rowheight=21&sectionHeight=420&FORM=IE8SSC&market=zh-cn HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0) Accept-Encoding: gzip, deflate Host: ap****om Connection: Keep-Alive
GET /qsml.aspx?query=123456&maxwidth=296&rowheight=21&sectionHeight=420&FORM=IE8SSC&market=zh-cn HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0) Accept-Encoding: gzip, deflate Host: ap****om Connection: Keep-Alive
GET / HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0) Accept-Encoding: gzip, deflate Host: ww****om Connection: Keep-Alive
Behavior description: 打开HTTP请求
details: HttpOpenRequestA: ke****om:80/sand.jpg, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400000
HttpOpenRequestA: fu****pk:80/rid/, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400400
HttpOpenRequestA: ww****om:80/favicon.ico, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00600010
HttpOpenRequestA: ap****om:80/qsml.aspx?query=1&maxwidth=296&rowheight=21&sectionheight=420&form=ie8ssc&market=zh-cn, hConnect = 0x00cc0010, hRequest = 0x00cc0014, Verb: GET, Referer: , Flags = 0x00400210
HttpOpenRequestA: ap****om:80/qsml.aspx?query=123456&maxwidth=296&rowheight=21&sectionheight=420&form=ie8ssc&market=zh-cn, hConnect = 0x00cc0010, hRequest = 0x00cc0014, Verb: GET, Referer: , Flags = 0x00400210
HttpOpenRequestA: ie****om:443/favicon.ico, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00c00010
HttpOpenRequestA: go****om:443/fwlink/?linkid=141260, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00c00010
HttpOpenRequestA: ww****om:80/, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400200
HttpOpenRequestA: ur****om:443/urs.asmx?msurs-client-key=cxonpifdzb17ps/cbvfxdw%3d%3d&msurs-patented-lock=zb6edfmdswq%3d, hConnect = 0x00cc0014, hRequest = 0x00cc0018, Verb: POST, Referer: , Flags = 0x04880300
Behavior description: 按名称获取主机地址
details: GetAddrInfoW: a-PC
GetAddrInfoW: wpad
GetAddrInfoW: ke****om
GetAddrInfoW: fu****pk
GetAddrInfoW: ww****om
GetAddrInfoW: ap****om
GetAddrInfoW: ie****om
GetAddrInfoW: go****om
GetAddrInfoW: ur****om

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\VerCache
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4BFC4A3-6C15-11E7-BEE9-080027488980}
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{92780B25-18CC-41C8-B9BE-3C9C571A8263}\iexplore\Count
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{92780B25-18CC-41C8-B9BE-3C9C571A8263}\iexplore\Time
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Favorites\Links\Order
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Type
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Flags
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Count
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Time
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTime
\REGISTRY\USER\S-*_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Default MHTML Editor\Last
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{8856F961-340A-11D0-A96B-00C04FD705A2}\iexplore\Type
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{8856F961-340A-11D0-A96B-00C04FD705A2}\iexplore\Flags
Behavior description: 删除注册表键值
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyOverride
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0\Expiration
Behavior description: 删除注册表键
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012016022220160223\
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012016022320160224\

Other behavior

Behavior description: 检测自身是否被调试
details: IsDebuggerPresent
Behavior description: 创建互斥体
details: Local\_!MSFTHISTORY!_
Local\c:!users!administrator!appdata!local!microsoft!windows!temporary internet files!content.ie5!
Local\c:!users!administrator!appdata!roaming!microsoft!windows!cookies!
Local\c:!users!administrator!appdata!local!microsoft!windows!history!history.ie5!
Local\WininetStartupMutex
Local\WininetConnectionMutex
Local\WininetProxyRegistryMutex
Local\!BrowserEmulation!SharedMemory!Mutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
RasPbFile
ConnHashTable<2068>_HashTable_Mutex
Local\ZonesCounterMutex
Local\!IETld!Mutex
Behavior description: 创建事件对象
details: EventName = Isolation Signal Registry Event (D4BFC4A1-6C15-11E7-BEE9-080027488980, 0)
EventName = IE_EarlyTabStart_0x820
EventName = Isolation Signal Registry Event (D4BFC4A2-6C15-11E7-BEE9-080027488980, 0)
EventName = OleDfRoot1D4F7C6832A2D5DC
EventName = OleDfRootEE63E88B01457A2
EventName = Local\RSS Eventing Event Event 00000814
EventName = IEFrame.EventCheckDefaultBrowser
EventName = IE_EarlyTabStart_0xb24
EventName = Isolation Signal Registry Event (DAF3A2C4-6C15-11E7-BEE9-080027488980, 0)
EventName = OleDfRoot50F0D1A565E4D777
EventName = Local\Feed Arbitration Lock Event [ Process : 0x00000814 ]
EventName = Local\Feed Arbitration Unlock Event [ Process : 0x00000814 ]
EventName = OleDfRoot42A01D1919F6761
EventName = OleDfRoot395883C158C3476A
EventName = Local\b10_18be
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
NtUserFindWindowEx: [Class,Window] = [Static,]
Behavior description: 窗口信息
details: Pid = 2068, Hwnd=0x3016a, Text = 导航栏, ClassName = WorkerW.
Pid = 2068, Hwnd=0x20158, Text = 地址组合控制, ClassName = ToolbarWindow32.
Pid = 2068, Hwnd=0x2015a, Text = 页面控制, ClassName = ToolbarWindow32.
Pid = 2068, Hwnd=0x101f8, Text = 搜索组合控制, ClassName = ToolbarWindow32.
Pid = 2068, Hwnd=0x101fa, Text = 搜索控制, ClassName = ToolbarWindow32.
Pid = 2068, Hwnd=0x10218, Text = 命令栏, ClassName = ToolbarWindow32.
Pid = 2068, Hwnd=0x10210, Text = 收藏夹命令栏, ClassName = ToolbarWindow32.
Pid = 2068, Hwnd=0x10204, Text = LinksBand, ClassName = LinksBandClass.
Pid = 2068, Hwnd=0x1020c, Text = 收藏夹栏, ClassName = ToolbarWindow32.
Pid = 2068, Hwnd=0x10208, Text = 添加到收藏夹栏, ClassName = ToolbarWindow32.
Pid = 1968, Hwnd=0x10236, Text = 菜单栏, ClassName = WorkerW.
Pid = 1968, Hwnd=0x10248, Text = 缩放级别, ClassName = ToolbarWindow32.
Pid = 2068, Hwnd=0x20182, Text = C:\Users\Administrator\AppData\Local\%temp%\%temp%\****.html - Windows Internet Explorer, ClassName = IEFrame.
Pid = 1968, Hwnd=0x102bc, Text = 下载完毕, ClassName = Static.
Pid = 1968, Hwnd=0x102be, Text = 获取文件信息:, ClassName = Static.
Behavior description: 打开事件
details: \SECURITY\LSA_AUTHENTICATION_INITIALIZED
\KernelObjects\MaximumCommitCondition
MSFT.VSA.COM.DISABLE.2068
MSFT.VSA.IEC.STATUS.6c736db0
Isolation Signal Registry Event (D4BFC4A1-6C15-11E7-BEE9-080027488980, 0)
Global\SvcctrlStartEvent_A3752DX
Isolation Signal Registry Event (D4BFC4A2-6C15-11E7-BEE9-080027488980, 0)
IE_EarlyTabStart_0x820
Global\TabletHardwarePresent
Local\MSCTF.CtfActivated.Default1
Local\MSCTF.AsmCacheReady.Default1
MSFT.VSA.COM.DISABLE.1968
Local\RSS Eventing Event Event 00000814
MSFT.VSA.COM.DISABLE.2876
Isolation Signal Registry Event (DAF3A2C4-6C15-11E7-BEE9-080027488980, 0)
Behavior description: 获取窗口截图信息
details: Foreground window Info: HWND = 0x0001027a, DC = 0x22010ad8.
Behavior description: 可执行文件签名信息
details: C:\Users\Administrator\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico(签名验证: 未通过)
C:\Users\Administrator\AppData\Local\Temp\Kno2B42.tmp(签名验证: 未通过)
Behavior description: 隐藏指定窗口
details: [Window,Class] = [,BrowserFrameGripperClass]
[Window,Class] = [缩放级别,ToolbarWindow32]
[Window,Class] = [,msctls_progress32]
[Window,Class] = [,AddressDisplay Control]
[Window,Class] = [,CtrlNotifySink]
[Window,Class] = [,SysLink]
[Window,Class] = [,Static]
[Window,Class] = [http://www.yixun.com/ - Windows Internet Explorer,IEFrame]
[Window,Class] = [,UniversalSearchBand]
[Window,Class] = [,TravelBand]
[Window,Class] = [,CommandBarClass]
[Window,Class] = [,ReBarWindow32]
[Window,Class] = [,TabBandClass]
[Window,Class] = [文件大小未知,Static]
[Window,Class] = [打开此类文件前总是询问(&W),Button]
Behavior description: 可执行文件MD5
details: C:\Users\Administrator\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico ---> d0966601ecd6239a9ce0241c9aa21571
C:\Users\Administrator\AppData\Local\Temp\Kno2B42.tmp ---> d0966601ecd6239a9ce0241c9aa21571
Behavior description: 打开互斥体
details: Local\_!MSFTHISTORY!_
Local\c:!users!administrator!appdata!local!microsoft!windows!temporary internet files!content.ie5!
Local\c:!users!administrator!appdata!roaming!microsoft!windows!cookies!
Local\c:!users!administrator!appdata!local!microsoft!windows!history!history.ie5!
Local\WininetStartupMutex
Local\WininetConnectionMutex
Local\WininetProxyRegistryMutex
Local\!BrowserEmulation!SharedMemory!Mutex
Local\!IETld!Mutex
Local\MSCTF.Asm.MutexDefault1
Local\RSS Eventing Connection Database Mutex 00000814
Local\c:!users!administrator!appdata!local!microsoft!feeds cache!
RasPbFile
ConnHashTable<2068>_HashTable_Mutex
Local\c:!users!administrator!appdata!roaming!microsoft!windows!ietldcache!
Behavior description: 加载新释放的文件
details: Image: C:\Users\Administrator\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico.