VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:e9fe1e36c2dd49ac5e91249326b02f67
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 探测 Virtual PC是否存在
details: N/A
Behavior description: 跨进程写入数据
details: TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00010000, Size = 0x0000080a
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00020000, Size = 0x000007b0
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x7ffd4010, Size = 0x00000004
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x7ffd41e8, Size = 0x00000004
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00020000, Size = 0x000007d0
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x7ffd5010, Size = 0x00000004
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x7ffd51e8, Size = 0x00000004
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00010000, Size = 0x000007fa
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00020000, Size = 0x00000788
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x7ffde010, Size = 0x00000004
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x7ffde1e8, Size = 0x00000004
Behavior description: 尝试打开调试器或监控软件的驱动设备对象
details: \??\SICE
\??\SIWVID
\??\NTICE
Behavior description: 获取TickCount值
details: TickCount = 488253, SleepMilliseconds = 50.
TickCount = 488331, SleepMilliseconds = 50.
TickCount = 488346, SleepMilliseconds = 50.
TickCount = 488393, SleepMilliseconds = 50.
TickCount = 490003, SleepMilliseconds = 50.
TickCount = 490190, SleepMilliseconds = 50.
TickCount = 491846, SleepMilliseconds = 50.
TickCount = 491878, SleepMilliseconds = 50.
TickCount = 491987, SleepMilliseconds = 50.
TickCount = 492018, SleepMilliseconds = 50.
TickCount = 492065, SleepMilliseconds = 50.
TickCount = 492096, SleepMilliseconds = 50.
TickCount = 492378, SleepMilliseconds = 50.
TickCount = 492409, SleepMilliseconds = 50.
TickCount = 492487, SleepMilliseconds = 50.
Behavior description: 获取窗口截图信息
details: Foreground window Info: HWND = 0x00000000, DC = 0x0e010495.
Foreground window Info: HWND = 0x00000000, DC = 0x09010488.
Foreground window Info: HWND = 0x00000000, DC = 0x2c0102e7.
Foreground window Info: HWND = 0x00000000, DC = 0x020104c8.
Foreground window Info: HWND = 0x00000000, DC = 0x0201051a.
Foreground window Info: HWND = 0x00000000, DC = 0x010106a9.
Foreground window Info: HWND = 0x00000000, DC = 0x020106a3.
Foreground window Info: HWND = 0x00000000, DC = 0x010106b9.
Foreground window Info: HWND = 0x00000000, DC = 0x020106b3.
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache
C:\Documents and Settings\Administrator\IECompatCache
Behavior description: 查找指定内核模块
details: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> hal.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> KDCOM.DLL Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BOOTVID.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ACPI.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> WMILIB.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> pci.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> isapnp.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> compbatt.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BATTC.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> intelide.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> MountMgr.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ftdisk.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> dmload.sys Des: SoftICE驱动
Behavior description: 查找反病毒常用工具窗口
details: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]

Process behavior

Behavior description: 创建进程
details: ImagePath = C:\Program Files\Internet Explorer\iexplore.exe, CmdLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
ImagePath = C:\Program Files\Internet Explorer\iexplore.exe, CmdLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:79873
ImagePath = C:\Program Files\Internet Explorer\iexplore.exe, CmdLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:79873
Behavior description: 创建本地线程
details: TargetProcess: %temp%\1461920631.701086.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 632, StartAddress = 00857727, Parameter = 008C1555
TargetProcess: %temp%\1461920631.701487.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 124, StartAddress = 00857727, Parameter = 008C1E8B
TargetProcess: %temp%\1461920631.701869.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 716, StartAddress = 00857727, Parameter = 008C30CE
TargetProcess: %temp%\1461920631.702250.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 252, StartAddress = 00857727, Parameter = 008C3C68
TargetProcess: %temp%\1461920631.702630.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 1500, StartAddress = 00857727, Parameter = 008C4708
TargetProcess: %temp%\1461920631.703010.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 168, StartAddress = 00857727, Parameter = 008C5216
TargetProcess: %temp%\1461920631.703389.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 180, StartAddress = 00857727, Parameter = 008C5D3F
TargetProcess: %temp%\1461920631.703768.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 508, StartAddress = 00857727, Parameter = 008C67FA
TargetProcess: %temp%\1461920631.704146.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 484, StartAddress = 00857727, Parameter = 008C93B2
TargetProcess: %temp%\1461920631.704532.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 1856, StartAddress = 00857727, Parameter = 008CA2F1
TargetProcess: %temp%\1461920631.704912.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 1388, StartAddress = 00857727, Parameter = 008CB4B9
TargetProcess: %temp%\1461920631.705291.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 416, StartAddress = 00857727, Parameter = 008CC4B4
TargetProcess: %temp%\1461920631.705670.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 1872, StartAddress = 00857727, Parameter = 008CD571
TargetProcess: %temp%\1461920631.706049.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 1360, StartAddress = 00857727, Parameter = 008CE73F
TargetProcess: %temp%\1461920631.706427.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 1316, StartAddress = 00857727, Parameter = 008CF784
Behavior description: 枚举进程
details: N/A
Behavior description: 跨进程写入数据
details: TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00010000, Size = 0x0000080a
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00020000, Size = 0x000007b0
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x7ffd4010, Size = 0x00000004
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x7ffd41e8, Size = 0x00000004
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00020000, Size = 0x000007d0
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x7ffd5010, Size = 0x00000004
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x7ffd51e8, Size = 0x00000004
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00010000, Size = 0x000007fa
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00020000, Size = 0x00000788
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x7ffde010, Size = 0x00000004
TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x7ffde1e8, Size = 0x00000004

File behavior

Behavior description: 创建文件
details: C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{2C06384C-0DE9-11E6-91BE-000000000000}.dat
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\wpad[1].dat
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFF83C.tmp
C:\kss.ini
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\io[1].php
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\dnserrordiagoff[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\wpad[1].dat
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\pandamh_com[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\favicon[1].ico
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\ErrorPageTemplate[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\errorPageStrings[1]
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF90AA.tmp
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{2DCB3718-0DE9-11E6-91BE-000000000000}.dat
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF910C.tmp
Behavior description: 创建可执行文件
details: C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
C:\Documents and Settings\Administrator\Local Settings\Temp\Kno3.tmp
Behavior description: 覆盖已有文件
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\dnserrordiagoff[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\ErrorPageTemplate[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\errorPageStrings[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\httpErrorPagesScripts[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\noConnect[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\bullet[2]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\background_gradient[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\down[2]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\favcenter[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\tools[2]
C:\Documents and Settings\Administrator\Local Settings\Temp\Kno3.tmp
Behavior description: 查找文件
details: FileName = C:\WINDOWS
FileName = C:\WINDOWS\system32
FileName = C:\WINDOWS\system32\msctfime.ime
FileName = C:\WINDOWS\system32\ieframe.dll
FileName = C:\Program Files\Internet Explorer\IEXPLORE.EXE
FileName = C:\Program Files\Internet Explorer\iexplore.exe
FileName = C:\Program Files\Common Files\Adobe
FileName = C:\Program Files\Common Files\Adobe\Acrobat
FileName = C:\Program Files\Common Files\Adobe\Acrobat\ActiveX
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\WINDOWS\system32\Ras\*.pbk
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
Behavior description: 删除文件
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\wpad[1].dat
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFF83C.tmp
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\io[1].php
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\dnserrordiagoff[2]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\wpad[1].dat
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\pandamh_com[1]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\ErrorPageTemplate[2]
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\errorPageStrings[1]
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF90AA.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF910C.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF9429.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF9465.tmp
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\favicon[1].ico
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
C:\Documents and Settings\Administrator\Local Settings\Temp\~DF988A.tmp
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache
C:\Documents and Settings\Administrator\IECompatCache
Behavior description: 修改文件内容
details: C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{2C06384C-0DE9-11E6-91BE-000000000000}.dat ---> Offset = 512
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{2C06384C-0DE9-11E6-91BE-000000000000}.dat ---> Offset = 0
C:\kss.ini ---> Offset = 0
C:\kss.ini ---> Offset = 30
C:\kss.ini ---> Offset = 51
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFF83C.tmp ---> Offset = 16383
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFF83C.tmp ---> Offset = 12288
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{2C06384C-0DE9-11E6-91BE-000000000000}.dat ---> Offset = 3072
C:\kss.ini ---> Offset = 193
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\dnserrordiagoff[1] ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\ErrorPageTemplate[1] ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\errorPageStrings[1] ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{2DCB3718-0DE9-11E6-91BE-000000000000}.dat ---> Offset = 512
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\httpErrorPagesScripts[1] ---> Offset = 0

Network behavior

Behavior description: 联网打开网址
details: InternetOpenUrlA: http://<FAKE_SERVER_IP>:128/wpad.dat, hInternet = 0x00cc0004, Flags = 0x80000010
InternetOpenUrlA: http://<FAKE_SERVER_IP>:128/wpad.dat, hInternet = 0x00cc0010, Flags = 0x00000010
Behavior description: 下载文件
details: URLDownloadToFileW: http://ww********om/favicon.ico ---> C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
URLDownloadToFileW: https://go************om/fwlink/?LinkId=141260 ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Kno3.tmp
Behavior description: 打开HTTP连接
details: InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0), hSession = 0x00cc0004
InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0), hSession = 0x00cc0004
InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0), hSession = 0x00cc0010
InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489), hSession = 0x00cc0004
InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489), hSession = 0x00cc0008
InternetOpenA: UserAgent: VCSoapClient, hSession = 0x00cc0010
Behavior description: 连接指定站点
details: InternetConnectA: ServerName = <FAKE_SERVER_IP>, PORT = 128, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x80000010
InternetConnectA: ServerName = ww**************om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = <FAKE_SERVER_IP>, PORT = 128, UserName = , Password = , hSession = 0x00cc0010, hConnect = 0x00cc0014, Flags = 0x00000010
InternetConnectA: ServerName = ww**************om, PORT = 80, UserName = , Password = , hSession = 0x00cc0008, hConnect = 0x00cc000c, Flags = 0x00000000
InternetConnectA: ServerName = ww***********om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = ww********om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = ur*************om, PORT = 443, UserName = , Password = , hSession = 0x00cc0010, hConnect = 0x00cc0014, Flags = 0x00000200
InternetConnectA: ServerName = go************om, PORT = 443, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00800000
Behavior description: 打开指定IE网页
details: http://ww***********om/
Behavior description: 建立到一个指定的套接字连接
details: URL: wpad, IP: <FAKE_SERVER_IP>:128, SOCKET = 0x0000040c
URL: wpad, IP: <FAKE_SERVER_IP>:128, SOCKET = 0x000004b8
URL: wpad, IP: <FAKE_SERVER_IP>:128, SOCKET = 0x000003a4
URL: ww**************om, IP: <FAKE_SERVER_IP>:80, SOCKET = 0x00000390
URL: ww**************om, IP: <FAKE_SERVER_IP>:80, SOCKET = 0x0000055c
URL: ww**************om, IP: <FAKE_SERVER_IP>:80, SOCKET = 0x000006d4
URL: ww**************om, IP: <FAKE_SERVER_IP>:80, SOCKET = 0x00000388
URL: ww**************om, IP: <FAKE_SERVER_IP>:80, SOCKET = 0x00000384
URL: ww**************om, IP: <FAKE_SERVER_IP>:80, SOCKET = 0x00000368
URL: ww**************om, IP: <FAKE_SERVER_IP>:80, SOCKET = 0x0000036c
URL: wpad, IP: <FAKE_SERVER_IP>:128, SOCKET = 0x00000540
URL: ww***********om, IP: <FAKE_SERVER_IP>:80, SOCKET = 0x0000054c
URL: ww***********om, IP: <FAKE_SERVER_IP>:80, SOCKET = 0x00000578
URL: ww********om, IP: <FAKE_SERVER_IP>:80, SOCKET = 0x000004c8
URL: ur*************om, IP: <FAKE_SERVER_IP>:443, SOCKET = 0x000005e4
Behavior description: 读取网络文件
details: hFile = 0x00cc000c, BytesToRead =4010, BytesRead = 4010.
hFile = 0x00cc0018, BytesToRead =4010, BytesRead = 4010.
hFile = 0x00cc000c, BytesToRead =102400, BytesRead = 102400.
hFile = 0x00cc0010, BytesToRead =4096, BytesRead = 4096.
hFile = 0x00cc000c, BytesToRead =4096, BytesRead = 4096.
Behavior description: 发送HTTP包
details: GET /wpad.dat HTTP/1.1 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0) Host: <FAKE_SERVER_IP>:128 Cache-Control: no-cache
GET /wpad.dat HTTP/1.1 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0) Host: <FAKE_SERVER_IP>:128
GET /fuckall2.txt HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Accept: */* Host: ww**************om Cache-Control: no-cache
GET /blacklist.txt HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Accept: */* Host: ww**************om Cache-Control: no-cache
GET /kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000002&&lgid=0&f=&x=51500509656 HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSiE 6.0; Windows NT 5.1;) Accept-Encoding: gzip, deflate Host: ww**************om Connection: Keep-Alive
GET /kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000002&lgid=0&f=&x=51500510343 HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSiE 6.0; Windows NT 5.1;) Accept-Encoding: gzip, deflate Host: ww**************om Connection: Keep-Alive
GET /kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000002&&lgid=0&f=&x=51500510750 HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSiE 6.0; Windows NT 5.1;) Accept-Encoding: gzip, deflate Host: ww**************om Connection: Keep-Alive
GET /kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000002&lgid=0&f=&x=51500511171 HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSiE 6.0; Windows NT 5.1;) Accept-Encoding: gzip, deflate Host: ww**************om Connection: Keep-Alive
GET /kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000002&&lgid=0&f=&x=51500511500 HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSiE 6.0; Windows NT 5.1;) Accept-Encoding: gzip, deflate Host: ww**************om Connection: Keep-Alive
GET /kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000002&lgid=0&f=&x=51500512796 HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSiE 6.0; Windows NT 5.1;) Accept-Encoding: gzip, deflate Host: ww**************om Connection: Keep-Alive
GET /kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000002&&lgid=0&f=&x=51500513015 HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSiE 6.0; Windows NT 5.1;) Accept-Encoding: gzip, deflate Host: ww**************om Connection: Keep-Alive
GET /kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000002&lgid=0&f=&x=51500513390 HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSiE 6.0; Windows NT 5.1;) Accept-Encoding: gzip, deflate Host: ww**************om Connection: Keep-Alive
POST /kss_api/io.php?apiver=905&&lgid=0&f=&x=51500514046 HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSiE 6.0; Windows NT 5.1;) Content-Type: application/x-www-form-urlencoded Accept-Encoding: gzip, deflate Host: ww**************om Content-Length: 205 Connection: Keep-Alive Cache-Control: no-cache
GET / HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Accept-Encoding: gzip, deflate Host: ww***********om Connection: Keep-Alive
GET / HTTP/1.1 Accept: */* Accept-Language: zh-cn Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: ww***********om Connection: Keep-Alive
Behavior description: 打开HTTP请求
details: HttpOpenRequestA: <FAKE_SERVER_IP>:128/wpad.dat, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x80000010
HttpOpenRequestA: ww**************om:80/fuckall2.txt, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x84000000
HttpOpenRequestA: <FAKE_SERVER_IP>:128/wpad.dat, hConnect = 0x00cc0014, hRequest = 0x00cc0018, Verb: GET, Referer: , Flags = 0x00000010
HttpOpenRequestA: ww**************om:80/blacklist.txt, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x84000000
HttpOpenRequestA: ww**************om:80/kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000002&&lgid=0&f=&x=51500509656, hConnect = 0x00cc000c, hRequest = 0x00cc0010, Verb: GET, Referer: , Flags = 0x00400000
HttpOpenRequestA: ww**************om:80/kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000002&lgid=0&f=&x=51500510343, hConnect = 0x00cc000c, hRequest = 0x00cc0010, Verb: GET, Referer: , Flags = 0x00400000
HttpOpenRequestA: ww**************om:80/kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000002&&lgid=0&f=&x=51500510750, hConnect = 0x00cc000c, hRequest = 0x00cc0010, Verb: GET, Referer: , Flags = 0x00400000
HttpOpenRequestA: ww**************om:80/kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000002&lgid=0&f=&x=51500511171, hConnect = 0x00cc000c, hRequest = 0x00cc0010, Verb: GET, Referer: , Flags = 0x00400000
HttpOpenRequestA: ww**************om:80/kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000002&&lgid=0&f=&x=51500511500, hConnect = 0x00cc000c, hRequest = 0x00cc0010, Verb: GET, Referer: , Flags = 0x00400000
HttpOpenRequestA: ww***********om:80/, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400000
HttpOpenRequestA: ww**************om:80/kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000002&lgid=0&f=&x=51500512796, hConnect = 0x00cc000c, hRequest = 0x00cc0010, Verb: GET, Referer: , Flags = 0x00400000
HttpOpenRequestA: ww**************om:80/kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000002&&lgid=0&f=&x=51500513015, hConnect = 0x00cc000c, hRequest = 0x00cc0010, Verb: GET, Referer: , Flags = 0x00400000
HttpOpenRequestA: ww**************om:80/kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000002&lgid=0&f=&x=51500513390, hConnect = 0x00cc000c, hRequest = 0x00cc0010, Verb: GET, Referer: , Flags = 0x00400000
HttpOpenRequestA: ww**************om:80/kss_api/io.php?apiver=905&&lgid=0&f=&x=51500514046, hConnect = 0x00cc000c, hRequest = 0x00cc0010, Verb: POST, Referer: , Flags = 0x04600000
HttpOpenRequestA: ww***********om:80/, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400010
Behavior description: 按名称获取主机地址
details: GetAddrInfoW: computer
GetAddrInfoW: wpad
GetAddrInfoW: ww**************om
GetAddrInfoW: ww***********om
GetAddrInfoW: ww********om
GetAddrInfoW: ur*************om
GetAddrInfoW: go************om

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\Recovery\Active\{2C06384C-0DE9-11E6-91BE-000000000000}
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\{63800dac-e7ca-4df9-9a5c-20765055488d}\Enable
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\Recovery\Active\{2DCB3718-0DE9-11E6-91BE-000000000000}
\REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1EA4DBF0-3C3B-11CF-810C-00AA00389B71}\1.1\0\win32\
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\Main\Window_Placement
\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\996E\DEBUG\Trace Level
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Count
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Time
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTime
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTimeCount
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0\DisplayName
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0\ErrorState
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0\DisplayMask
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1\DisplayName
Behavior description: 删除注册表键
details: \REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\{63800dac-e7ca-4df9-9a5c-20765055488d}\
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\
\REGISTRY\MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW\
Behavior description: 删除注册表键值
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\996E\DEBUG\Trace Level
\REGISTRY\MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW\DWFileTreeRoot
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0\Expiration
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1\Expiration

Other behavior

Behavior description: 探测 Virtual PC是否存在
details: N/A
Behavior description: 创建互斥体
details: RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
ini_read_write
Local\!BrowserEmulation!SharedMemory!Mutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
ConnHashTable<1924>_HashTable_Mutex
Local\ZonesCounterMutex
ConnHashTable<2064>_HashTable_Mutex
Behavior description: 可执行文件MD5
details: C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico ---> fe1d0ee5901dd167ee9b28eece31786c
C:\Documents and Settings\Administrator\Local Settings\Temp\Kno3.tmp ---> fe1d0ee5901dd167ee9b28eece31786c
Behavior description: 创建事件对象
details: EventName = DINPUTWINMM
EventName = Isolation Signal Registry Event (2C063849-0DE9-11E6-91BE-000000000000, 0)
EventName = IE_EarlyTabStart_0x418
EventName = Isolation Signal Registry Event (2C06384A-0DE9-11E6-91BE-000000000000, 0)
EventName = Global\userenv: User Profile setup event
EventName = Global\crypt32LogoffEvent
EventName = Isolation Signal Registry Event (2DCB3715-0DE9-11E6-91BE-000000000000, 0)
EventName = Local\IEDDEExecuteEvent
EventName = IE_EarlyTabStart_0x814
EventName = Isolation Signal Registry Event (2DCB3716-0DE9-11E6-91BE-000000000000, 0)
EventName = Local\RSS Eventing Event Event 00000784
EventName = Local\RSS Eventing Event Event 00000810
EventName = Local\568_29
EventName = IEFrame.EventCheckDefaultBrowser
EventName = Local\Feed Arbitration Lock Event [ Process : 0x00000784 ]
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [18467-41,]
NtUserFindWindowEx: [Class,Window] = [,Microsoft Internet Explorer]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [IEFrame,]
NtUserFindWindowEx: [Class,Window] = [,]
NtUserFindWindowEx: [Class,Window] = [Static,]
NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
Behavior description: 尝试打开调试器或监控软件的驱动设备对象
details: \??\SICE
\??\SIWVID
\??\NTICE
Behavior description: 搜索kernel32.dll基地址
details: Instruction Address = 0x0085895b
Behavior description: 调整进程token权限
details: SE_DEBUG_PRIVILEGE
SE_LOAD_DRIVER_PRIVILEGE
Behavior description: 窗口信息
details: Pid = 588, Hwnd=0x103aa, Text = 确定, ClassName = Button.
Pid = 588, Hwnd=0x103ac, Text = 取消, ClassName = Button.
Pid = 588, Hwnd=0x103b0, Text = 应用程序发生异常 未知的软件异常 (0x0eedfade),位置为 0x7c812aeb。 , ClassName = Static.
Pid = 588, Hwnd=0x103a8, Text = 11平台Panda全图[免费版]-04.24 Panda全图官方交流群:422245379: %temp%\1461920632.296483.exe - 应用程序错误, ClassName = #32770.
Behavior description: 获取窗口截图信息
details: Foreground window Info: HWND = 0x00000000, DC = 0x0e010495.
Foreground window Info: HWND = 0x00000000, DC = 0x09010488.
Foreground window Info: HWND = 0x00000000, DC = 0x2c0102e7.
Foreground window Info: HWND = 0x00000000, DC = 0x020104c8.
Foreground window Info: HWND = 0x00000000, DC = 0x0201051a.
Foreground window Info: HWND = 0x00000000, DC = 0x010106a9.
Foreground window Info: HWND = 0x00000000, DC = 0x020106a3.
Foreground window Info: HWND = 0x00000000, DC = 0x010106b9.
Foreground window Info: HWND = 0x00000000, DC = 0x020106b3.
Behavior description: 可执行文件签名信息
details: C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\Kno3.tmp(签名验证: 未通过)
Behavior description: 调用Sleep函数
details: [1]: MilliSeconds = 2000.
[2]: MilliSeconds = 2000.
[3]: MilliSeconds = 2000.
[4]: MilliSeconds = 2000.
[5]: MilliSeconds = 2000.
[6]: MilliSeconds = 2000.
[7]: MilliSeconds = 2000.
[8]: MilliSeconds = 2000.
[9]: MilliSeconds = 2000.
[10]: MilliSeconds = 2000.
Behavior description: 隐藏指定窗口
details: [Window,Class] = [,Afx:400000:8:10011:1900015:0]
[Window,Class] = [,BrowserFrameGripperClass]
[Window,Class] = [缩放级别,ToolbarWindow32]
[Window,Class] = [,msctls_progress32]
[Window,Class] = [,SysLink]
[Window,Class] = [,Static]
[Window,Class] = [文件大小未知,Static]
[Window,Class] = [打开此类文件前总是询问(&W),Button]
[Window,Class] = [发行者:,Static]
[Window,Class] = [Windows Internet Explorer,IEFrame]
[Window,Class] = [,UniversalSearchBand]
[Window,Class] = [,TravelBand]
[Window,Class] = [,CommandBarClass]
[Window,Class] = [,ReBarWindow32]
[Window,Class] = [,TabBandClass]
Behavior description: 获取TickCount值
details: TickCount = 488253, SleepMilliseconds = 50.
TickCount = 488331, SleepMilliseconds = 50.
TickCount = 488346, SleepMilliseconds = 50.
TickCount = 488393, SleepMilliseconds = 50.
TickCount = 490003, SleepMilliseconds = 50.
TickCount = 490190, SleepMilliseconds = 50.
TickCount = 491846, SleepMilliseconds = 50.
TickCount = 491878, SleepMilliseconds = 50.
TickCount = 491987, SleepMilliseconds = 50.
TickCount = 492018, SleepMilliseconds = 50.
TickCount = 492065, SleepMilliseconds = 50.
TickCount = 492096, SleepMilliseconds = 50.
TickCount = 492378, SleepMilliseconds = 50.
TickCount = 492409, SleepMilliseconds = 50.
TickCount = 492487, SleepMilliseconds = 50.
Behavior description: 查找指定内核模块
details: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> hal.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> KDCOM.DLL Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BOOTVID.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ACPI.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> WMILIB.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> pci.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> isapnp.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> compbatt.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BATTC.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> intelide.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> MountMgr.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ftdisk.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> dmload.sys Des: SoftICE驱动
Behavior description: 查找反病毒常用工具窗口
details: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]