VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:e3abfa088d4f04493282c29d520e5408
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 探测 Virtual PC是否存在
details: N/A
Behavior description: 查询注册表_检测虚拟机相关
details: \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
Behavior description: 尝试打开调试器或监控软件的驱动设备对象
details: \??\SICE
\??\SIWVID
\??\NTICE
Behavior description: 获取TickCount值
details: TickCount = 5430268, SleepMilliseconds = 50.
TickCount = 5430362, SleepMilliseconds = 50.
TickCount = 5430456, SleepMilliseconds = 50.
TickCount = 5430534, SleepMilliseconds = 50.
TickCount = 5430675, SleepMilliseconds = 50.
TickCount = 5431862, SleepMilliseconds = 50.
TickCount = 5431909, SleepMilliseconds = 50.
TickCount = 5432659, SleepMilliseconds = 50.
TickCount = 5432690, SleepMilliseconds = 50.
TickCount = 5432721, SleepMilliseconds = 50.
TickCount = 5432737, SleepMilliseconds = 50.
TickCount = 5432784, SleepMilliseconds = 50.
TickCount = 5432815, SleepMilliseconds = 50.
TickCount = 5432862, SleepMilliseconds = 50.
TickCount = 5432909, SleepMilliseconds = 50.
Behavior description: 打开注册表_检测虚拟机相关
details: \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Behavior description: 获取窗口截图信息
details: Foreground window Info: HWND = 0x00000000, DC = 0x130104c0.
Foreground window Info: HWND = 0x00000000, DC = 0xb30105c3.
Foreground window Info: HWND = 0x00000000, DC = 0xbe010537.
Foreground window Info: HWND = 0x00000000, DC = 0x7f010177.
Foreground window Info: HWND = 0x00000000, DC = 0x5201055e.
Foreground window Info: HWND = 0x00000000, DC = 0x1b010567.
Foreground window Info: HWND = 0x00000000, DC = 0x3a010203.
Foreground window Info: HWND = 0x00000000, DC = 0x4f010501.
Foreground window Info: HWND = 0x00000000, DC = 0x16010594.
Foreground window Info: HWND = 0x00000000, DC = 0x1a01070f.
Foreground window Info: HWND = 0x00000000, DC = 0x0d01070d.
Foreground window Info: HWND = 0x00000000, DC = 0x01010715.
Foreground window Info: HWND = 0x00000000, DC = 0x09010710.
Foreground window Info: HWND = 0x00000000, DC = 0x06010727.
Foreground window Info: HWND = 0x00000000, DC = 0x04010728.
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache
C:\Documents and Settings\Administrator\IECompatCache
Behavior description: 直接获取CPU时钟
details: EAX = 0x0eabc22f, EDX = 0x00001193
EAX = 0x0eabc27b, EDX = 0x00001193
EAX = 0x0eabc2c7, EDX = 0x00001193
EAX = 0x0eabc313, EDX = 0x00001193
EAX = 0x0eabc35f, EDX = 0x00001193
EAX = 0x0eabc3ab, EDX = 0x00001193
EAX = 0x0eabc3f7, EDX = 0x00001193
EAX = 0x0eabc443, EDX = 0x00001193
EAX = 0x0eabc48f, EDX = 0x00001193
EAX = 0x0eabc4db, EDX = 0x00001193
Behavior description: 查找指定内核模块
details: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> hal.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> KDCOM.DLL Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BOOTVID.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ACPI.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> WMILIB.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> pci.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> isapnp.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> compbatt.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BATTC.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> intelide.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> MountMgr.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ftdisk.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> dmload.sys Des: SoftICE驱动
Behavior description: 查找反病毒常用工具窗口
details: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]
Behavior description: VMWare特殊指令检测虚拟机
details: N/A

Process behavior

Behavior description: 创建进程
details: ImagePath = C:\Program Files\Internet Explorer\iexplore.exe, CmdLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
ImagePath = C:\Program Files\Internet Explorer\iexplore.exe, CmdLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE" SCODEF:2160 CREDAT:79873
ImagePath = C:\Program Files\Internet Explorer\iexplore.exe, CmdLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:79873
Behavior description: 创建本地线程
details: TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1392, ThreadID = 1844, StartAddress = 00637ECB, Parameter = 007F53E8
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1392, ThreadID = 1568, StartAddress = 00637ECB, Parameter = 007F5C65
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1392, ThreadID = 824, StartAddress = 00637ECB, Parameter = 007F6CFA
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1392, ThreadID = 1952, StartAddress = 00637ECB, Parameter = 007F772F
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1392, ThreadID = 196, StartAddress = 00637ECB, Parameter = 007F821F
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1392, ThreadID = 1472, StartAddress = 00637ECB, Parameter = 007F8D94
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1392, ThreadID = 412, StartAddress = 00637ECB, Parameter = 007F9886
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1392, ThreadID = 1252, StartAddress = 00637ECB, Parameter = 007FA338
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1392, ThreadID = 1528, StartAddress = 00637ECB, Parameter = 007FE943
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1392, ThreadID = 564, StartAddress = 00637ECB, Parameter = 007FF8A3
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1392, ThreadID = 1532, StartAddress = 00637ECB, Parameter = 00800970
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1392, ThreadID = 160, StartAddress = 00637ECB, Parameter = 0080317A
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1392, ThreadID = 2044, StartAddress = 00637ECB, Parameter = 0080592B
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1392, ThreadID = 1004, StartAddress = 00637ECB, Parameter = 00807FCB
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1392, ThreadID = 740, StartAddress = 00637ECB, Parameter = 00809008
Behavior description: 枚举进程
details: N/A

File behavior

Behavior description: 创建文件
details: C:\Documents and Settings\Administrator\Local Settings\%temp%\update.exe
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{0ECC7786-B92F-11E6-91BE-7B****28}.dat
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFD6F1.tmp
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{0F7F47E4-B92F-11E6-91BE-7B****28}.dat
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFDB2A.tmp
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\{0F7F47E5-B92F-11E6-91BE-7B****28}.dat
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF655.tmp
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\{0ECC7787-B92F-11E6-91BE-7B****28}.dat
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF88E.tmp
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6P4O8QNJ\yixun_com[1]
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF5CC6.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF5D1C.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF5F63.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF5F76.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF6737.tmp
Behavior description: 修改文件内容
details: C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{0ECC7786-B92F-11E6-91BE-7B****28}.dat ---> Offset = 512
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{0ECC7786-B92F-11E6-91BE-7B****28}.dat ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFD6F1.tmp ---> Offset = 16383
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFD6F1.tmp ---> Offset = 12288
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{0ECC7786-B92F-11E6-91BE-7B****28}.dat ---> Offset = 3072
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{0ECC7786-B92F-11E6-91BE-7B****28}.dat ---> Offset = 1536
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{0F7F47E4-B92F-11E6-91BE-7B****28}.dat ---> Offset = 512
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{0F7F47E4-B92F-11E6-91BE-7B****28}.dat ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFDB2A.tmp ---> Offset = 16383
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFDB2A.tmp ---> Offset = 12288
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{0F7F47E4-B92F-11E6-91BE-7B****28}.dat ---> Offset = 3072
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{0F7F47E4-B92F-11E6-91BE-7B****28}.dat ---> Offset = 1536
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\{0F7F47E5-B92F-11E6-91BE-7B****28}.dat ---> Offset = 512
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\{0F7F47E5-B92F-11E6-91BE-7B****28}.dat ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF655.tmp ---> Offset = 16383
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache
C:\Documents and Settings\Administrator\IECompatCache
Behavior description: 删除文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\~DFD6F1.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFDB2A.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF655.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF88E.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF5CC6.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF5D1C.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF5F63.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF5F76.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF6737.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF6755.tmp
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6P4O8QNJ\update-list[1]
Behavior description: 查找文件
details: FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\WINDOWS\system32\Ras\*.pbk
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%update.exe
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\update.exe
FileName = C:\Program Files\Internet Explorer\iexplore.exe
FileName = C:\Program Files\Common Files\Adobe
FileName = C:\Program Files\Common Files\Adobe\Acrobat
FileName = C:\Program Files\Common Files\Adobe\Acrobat\ActiveX
FileName = C:\Program Files\Java

Network behavior

Behavior description: 下载文件
details: URLDownloadToFileW: http://ww****om/favicon.ico ---> C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Behavior description: 连接指定站点
details: InternetConnectA: ServerName = ww****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
Behavior description: 打开HTTP连接
details: InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0), hSession = 0x00cc0004
InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489), hSession = 0x00cc0004
Behavior description: 建立到一个指定的套接字连接
details: URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000350
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000360
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000448
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x000004e0
Behavior description: 读取网络文件
details: hFile = 0x00cc000c, BytesToRead =102400, BytesRead = 102400.
hFile = 0x00cc000c, BytesToRead =2048, BytesRead = 2048.
hFile = 0x00cc000c, BytesToRead =4096, BytesRead = 4096.
Behavior description: 发送HTTP包
details: GET /i_box/update.txt HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Accept: */* Host: ww****om Cache-Control: no-cache
GET / HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Accept-Encoding: gzip, deflate Host: ww****om Connection: Keep-Alive
GET /update-list/ HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Accept-Encoding: gzip, deflate Host: ww****om Connection: Keep-Alive
Behavior description: 打开HTTP请求
details: HttpOpenRequestA: ww****om:80/i_box/update.txt, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x84000000
HttpOpenRequestA: ww****om:80/, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400200
HttpOpenRequestA: ww****om:80/update-list/, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400000
Behavior description: 按名称获取主机地址
details: GetAddrInfoW: ww****om

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\Software\Microsoft\Direct3D\MostRecentApplication\Name
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\Documents and Settings\Administrator\Local Settings\%temp%\update.exe
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\Recovery\Active\{0ECC7786-B92F-11E6-91BE-7B****28}
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\Recovery\Active\{0F7F47E4-B92F-11E6-91BE-7B****28}
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\{63800dac-e7ca-4df9-9a5c-20765055488d}\Enable
\REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1EA4DBF0-3C3B-11CF-810C-00AA00389B71}\1.1\0\win32\
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\Main\Window_Placement
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Count
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Time
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTime
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTimeCount
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore\Count
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore\Time
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBA}\
Behavior description: 删除注册表键值
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0\Expiration
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1\Expiration
Behavior description: 打开注册表_检测虚拟机相关
details: \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Behavior description: 查询注册表_检测虚拟机相关
details: \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
Behavior description: 删除注册表键
details: \REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\{63800dac-e7ca-4df9-9a5c-20765055488d}\
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBA}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBA}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBB}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBB}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBC}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-0000-ABCDEFFEDCBC}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-FFFF-ABCDEFFEDCBA}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{CAFEEFAC-0017-0000-FFFF-ABCDEFFEDCBA}\
\REGISTRY\USER\S-*_CLASSES\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\InprocServer32\
\REGISTRY\USER\S-*_CLASSES\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\
\REGISTRY\USER\S-*_CLASSES\JavaPlugin.1000\CLSID\

Other behavior

Behavior description: 探测 Virtual PC是否存在
details: N/A
Behavior description: 创建互斥体
details: RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
DDrawWindowListMutex
__DDrawExclMode__
__DDrawCheckExclMode__
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
MSCTF.Shared.MUTEX.ELH
Behavior description: 创建事件对象
details: EventName = 网商网
EventName = DINPUTWINMM
EventName = Global\userenv: User Profile setup event
EventName = Isolation Signal Registry Event (0ECC7783-B92F-11E6-91BE-7B****28, 0)
EventName = IE_EarlyTabStart_0x874
EventName = Isolation Signal Registry Event (0F7F47E1-B92F-11E6-91BE-7B****28, 0)
EventName = Isolation Signal Registry Event (0ECC7784-B92F-11E6-91BE-7B****28, 0)
EventName = IE_EarlyTabStart_0x88c
EventName = Isolation Signal Registry Event (0F7F47E2-B92F-11E6-91BE-7B****28, 0)
EventName = Local\IEDDEExecuteEvent
EventName = Local\RSS Eventing Event Event 00000870
EventName = Local\RSS Eventing Event Event 00000888
EventName = Local\Feed Arbitration Lock Event [ Process : 0x00000888 ]
EventName = Local\Feed Arbitration Unlock Event [ Process : 0x00000888 ]
Behavior description: 窗口信息
details: Pid = 1392, Hwnd=0x503b2, Text = 确定, ClassName = Button.
Pid = 1392, Hwnd=0xa03ac, Text = 发现新版本,点击确定更新, ClassName = Static.
Pid = 1392, Hwnd=0x50382, Text = 发现新版本, ClassName = #32770.
Behavior description: 打开互斥体
details: DBWinMutex
RasPbFile
ShimCacheMutex
Local\_!MSFTHISTORY!_
Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Local\c:!documents and settings!administrator!cookies!
Local\c:!documents and settings!administrator!local settings!history!history.ie5!
Local\WininetStartupMutex
Local\WininetConnectionMutex
Local\WininetProxyRegistryMutex
Local\!IETld!Mutex
Local\!BrowserEmulation!SharedMemory!Mutex
CtfmonInstMutexDefaultS-*
Local\RSS Eventing Connection Database Mutex 00000870
Local\RSS Eventing Connection Database Mutex 00000888
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [18467-41,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [,Microsoft Internet Explorer]
NtUserFindWindowEx: [Class,Window] = [IEFrame,]
NtUserFindWindowEx: [Class,Window] = [Static,]
Behavior description: 尝试打开调试器或监控软件的驱动设备对象
details: \??\SICE
\??\SIWVID
\??\NTICE
Behavior description: 搜索kernel32.dll基地址
details: Instruction Address = 0x00638a8f
Behavior description: 调整进程token权限
details: SE_LOAD_DRIVER_PRIVILEGE
Behavior description: 打开事件
details: HookSwitchHookEnabledEvent
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Global\SvcctrlStartEvent_A3752DX
\INSTALLATION_SECURITY_HOLD
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000053
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000053
MSCTF.SendReceiveConection.Event.ELH.IC
MSCTF.SendReceive.Event.ELH.IC
_fCanRegisterWithShellService
Isolation Signal Registry Event (0ECC7783-B92F-11E6-91BE-7B****28, 0)
Isolation Signal Registry Event (0F7F47E1-B92F-11E6-91BE-7B****28, 0)
Isolation Signal Registry Event (0ECC7784-B92F-11E6-91BE-7B****28, 0)
IE_EarlyTabStart_0x874
MSFT.VSA.COM.DISABLE.2160
MSFT.VSA.IEC.STATUS.6c736db0
Behavior description: 获取窗口截图信息
details: Foreground window Info: HWND = 0x00000000, DC = 0x130104c0.
Foreground window Info: HWND = 0x00000000, DC = 0xb30105c3.
Foreground window Info: HWND = 0x00000000, DC = 0xbe010537.
Foreground window Info: HWND = 0x00000000, DC = 0x7f010177.
Foreground window Info: HWND = 0x00000000, DC = 0x5201055e.
Foreground window Info: HWND = 0x00000000, DC = 0x1b010567.
Foreground window Info: HWND = 0x00000000, DC = 0x3a010203.
Foreground window Info: HWND = 0x00000000, DC = 0x4f010501.
Foreground window Info: HWND = 0x00000000, DC = 0x16010594.
Foreground window Info: HWND = 0x00000000, DC = 0x1a01070f.
Foreground window Info: HWND = 0x00000000, DC = 0x0d01070d.
Foreground window Info: HWND = 0x00000000, DC = 0x01010715.
Foreground window Info: HWND = 0x00000000, DC = 0x09010710.
Foreground window Info: HWND = 0x00000000, DC = 0x06010727.
Foreground window Info: HWND = 0x00000000, DC = 0x04010728.
Behavior description: 调用Sleep函数
details: [1]: MilliSeconds = 50.
Behavior description: 隐藏指定窗口
details: [Window,Class] = [,ComboLBox]
[Window,Class] = [,ComboBox]
[Window,Class] = [,Edit]
[Window,Class] = [,_EL_PicBox]
[Window,Class] = [,BrowserFrameGripperClass]
[Window,Class] = [缩放级别,ToolbarWindow32]
[Window,Class] = [,msctls_progress32]
[Window,Class] = [,SysLink]
[Window,Class] = [,Static]
Behavior description: 获取光标位置
details: CursorPos = (96,18500), SleepMilliseconds = 50.
Behavior description: 获取TickCount值
details: TickCount = 5430268, SleepMilliseconds = 50.
TickCount = 5430362, SleepMilliseconds = 50.
TickCount = 5430456, SleepMilliseconds = 50.
TickCount = 5430534, SleepMilliseconds = 50.
TickCount = 5430675, SleepMilliseconds = 50.
TickCount = 5431862, SleepMilliseconds = 50.
TickCount = 5431909, SleepMilliseconds = 50.
TickCount = 5432659, SleepMilliseconds = 50.
TickCount = 5432690, SleepMilliseconds = 50.
TickCount = 5432721, SleepMilliseconds = 50.
TickCount = 5432737, SleepMilliseconds = 50.
TickCount = 5432784, SleepMilliseconds = 50.
TickCount = 5432815, SleepMilliseconds = 50.
TickCount = 5432862, SleepMilliseconds = 50.
TickCount = 5432909, SleepMilliseconds = 50.
Behavior description: 直接获取CPU时钟
details: EAX = 0x0eabc22f, EDX = 0x00001193
EAX = 0x0eabc27b, EDX = 0x00001193
EAX = 0x0eabc2c7, EDX = 0x00001193
EAX = 0x0eabc313, EDX = 0x00001193
EAX = 0x0eabc35f, EDX = 0x00001193
EAX = 0x0eabc3ab, EDX = 0x00001193
EAX = 0x0eabc3f7, EDX = 0x00001193
EAX = 0x0eabc443, EDX = 0x00001193
EAX = 0x0eabc48f, EDX = 0x00001193
EAX = 0x0eabc4db, EDX = 0x00001193
Behavior description: 查找指定内核模块
details: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> hal.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> KDCOM.DLL Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BOOTVID.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ACPI.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> WMILIB.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> pci.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> isapnp.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> compbatt.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BATTC.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> intelide.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> MountMgr.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ftdisk.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> dmload.sys Des: SoftICE驱动
Behavior description: 查找反病毒常用工具窗口
details: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]
Behavior description: VMWare特殊指令检测虚拟机
details: N/A