VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:fcf79a5f7396f1b1c880efb56e0fb37c
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 修改原系统的EXE文件
details: C:\install.exe
C:\222c25ed\IE8-Setup-Full\installservices.exe
C:\Program Files\Adobe\Reader 9.0\Reader\A3DUtility.exe
C:\Program Files\Adobe\Reader 9.0\Reader\AcroBroker.exe
C:\Program Files\Adobe\Reader 9.0\Reader\AcroRd32.exe
C:\Program Files\Adobe\Reader 9.0\Reader\AcroRd32Info.exe
C:\Program Files\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe
C:\Program Files\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe
C:\Program Files\Adobe\Reader 9.0\Reader\Eula.exe
C:\Program Files\Adobe\Reader 9.0\Reader\LogTransport2.exe
C:\Program Files\Adobe\Reader 9.0\Reader\PDFPrevHndlrShim.exe
C:\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe
C:\Program Files\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-2052-7B44-A90000000001}\Setup.exe
C:\Program Files\e\e.exe
C:\Program Files\e\unins000.exe
Behavior description: 跨进程写入数据
details: TargetProcess = C:\WINDOWS\explorer.exe, WriteAddress = 0x03550000, Size = 0x00000014
TargetProcess = C:\WINDOWS\explorer.exe, WriteAddress = 0x03540000, Size = 0x00000028
Behavior description: 检测自身是否被调试
details: N/A
Behavior description: 设置线程上下文
details: C:\WINDOWS\Logo1_.exe
Behavior description: 杀掉进程
details: C:\WINDOWS\system32\RavMon.exe
Behavior description: 获取TickCount值
details: TickCount = 487296, SleepMilliseconds = 2000.
TickCount = 487328, SleepMilliseconds = 2000.
TickCount = 487359, SleepMilliseconds = 2000.
TickCount = 487406, SleepMilliseconds = 2000.
TickCount = 487421, SleepMilliseconds = 2000.
TickCount = 487531, SleepMilliseconds = 2000.
TickCount = 487640, SleepMilliseconds = 2000.
TickCount = 487656, SleepMilliseconds = 2000.
TickCount = 487765, SleepMilliseconds = 2000.
TickCount = 505906, SleepMilliseconds = 20000.
TickCount = 506453, SleepMilliseconds = 20000.
TickCount = 506468, SleepMilliseconds = 20000.
TickCount = 506484, SleepMilliseconds = 20000.
TickCount = 504551, SleepMilliseconds = 20.
TickCount = 504566, SleepMilliseconds = 20.
Behavior description: 查找文件方式探测虚拟机
details: FindFirstFileEx: FileName = C:\Program Files\VMware\_desktop.ini
FindFirstFileEx: FileName = C:\Program Files\VMware\*.exe
FindFirstFileEx: FileName = C:\Program Files\VMware\*.*

Process behavior

Behavior description: 隐藏窗口创建进程
details: ImagePath = , CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\$$a3.bat
ImagePath = , CmdLine = net stop "Kingsoft AntiVirus Service"
Behavior description: 跨进程写入数据
details: TargetProcess = C:\WINDOWS\explorer.exe, WriteAddress = 0x03550000, Size = 0x00000014
TargetProcess = C:\WINDOWS\explorer.exe, WriteAddress = 0x03540000, Size = 0x00000028
Behavior description: 创建新文件进程
details: ImagePath = C:\WINDOWS\Logo1_.exe, CmdLine = C:\WINDOWS\Logo1_.exe
Behavior description: 创建进程
details: ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd /c C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\$$a3.bat
ImagePath = C:\WINDOWS\system32\net.exe, CmdLine = net stop "Kingsoft AntiVirus Service"
ImagePath = C:\WINDOWS\system32\net1.exe, CmdLine = net1 stop "Kingsoft AntiVirus Service"
Behavior description: 设置线程上下文
details: C:\WINDOWS\Logo1_.exe
Behavior description: 枚举进程
details: N/A
Behavior description: 杀掉进程
details: C:\WINDOWS\system32\RavMon.exe
Behavior description: 创建本地线程
details: TargetProcess: Logo1_.exe, InheritedFromPID = 632, ProcessID = 1160, ThreadID = 1044, StartAddress = 0040A364, Parameter = 00000000
TargetProcess: Logo1_.exe, InheritedFromPID = 632, ProcessID = 1160, ThreadID = 1048, StartAddress = 0040A4A8, Parameter = 00000000
TargetProcess: explorer.exe, InheritedFromPID = 1868, ProcessID = 1944, ThreadID = 580, StartAddress = 03564238, Parameter = 00000000
TargetProcess: explorer.exe, InheritedFromPID = 1868, ProcessID = 1944, ThreadID = 1880, StartAddress = 6302B849, Parameter = 000DE9C0
Behavior description: 创建下载文件进程
details: ImagePath = C:\WINDOWS\0Sy.exe, CmdLine = C:\WINDOWS\0Sy.exe
ImagePath = C:\WINDOWS\1Sy.exe, CmdLine = C:\WINDOWS\1Sy.exe
ImagePath = C:\WINDOWS\2Sy.exe, CmdLine = C:\WINDOWS\2Sy.exe
ImagePath = C:\WINDOWS\3Sy.exe, CmdLine = C:\WINDOWS\3Sy.exe
ImagePath = C:\WINDOWS\4Sy.exe, CmdLine = C:\WINDOWS\4Sy.exe
ImagePath = C:\WINDOWS\5Sy.exe, CmdLine = C:\WINDOWS\5Sy.exe
ImagePath = C:\WINDOWS\6Sy.exe, CmdLine = C:\WINDOWS\6Sy.exe
ImagePath = C:\WINDOWS\7Sy.exe, CmdLine = C:\WINDOWS\7Sy.exe
ImagePath = C:\WINDOWS\8Sy.exe, CmdLine = C:\WINDOWS\8Sy.exe
ImagePath = C:\WINDOWS\9Sy.exe, CmdLine = C:\WINDOWS\9Sy.exe

File behavior

Behavior description: 创建文件
details: C:\WINDOWS\rundl132.exe
Behavior description: 修改原系统的EXE文件
details: C:\install.exe
C:\222c25ed\IE8-Setup-Full\installservices.exe
C:\Program Files\Adobe\Reader 9.0\Reader\A3DUtility.exe
C:\Program Files\Adobe\Reader 9.0\Reader\AcroBroker.exe
C:\Program Files\Adobe\Reader 9.0\Reader\AcroRd32.exe
C:\Program Files\Adobe\Reader 9.0\Reader\AcroRd32Info.exe
C:\Program Files\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe
C:\Program Files\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe
C:\Program Files\Adobe\Reader 9.0\Reader\Eula.exe
C:\Program Files\Adobe\Reader 9.0\Reader\LogTransport2.exe
C:\Program Files\Adobe\Reader 9.0\Reader\PDFPrevHndlrShim.exe
C:\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe
C:\Program Files\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-2052-7B44-A90000000001}\Setup.exe
C:\Program Files\e\e.exe
C:\Program Files\e\unins000.exe
Behavior description: 创建可执行文件
details: C:\WINDOWS\rundl132.exe
C:\WINDOWS\Logo1_.exe
Behavior description: 覆盖已有文件
details: C:\WINDOWS\rundl132.exe
C:\1.txt
Behavior description: 查找文件
details: FileName = c:\gamevir.txt
FileName = C:\WINDOWS\rundl132.exe
Behavior description: 删除文件
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\wpad[1].dat
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\1[1].txt
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\1[1].exe
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\2[1].txt
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\2[1].exe
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\3[1].txt
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\3[1].exe
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\4[1].txt
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\4[1].exe
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\5[1].txt
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\5[1].exe
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\6[1].txt
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\6[1].exe
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\7[1].txt
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\7[1].exe
Behavior description: 修改BAT脚本文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\$$a3.bat ---> Offset = 0
Behavior description: 修改文件内容
details: C:\WINDOWS\rundl132.exe ---> Offset = 0
C:\WINDOWS\Logo1_.exe ---> Offset = 0

Network behavior

Behavior description: 联网打开网址
details: InternetOpenUrlA: http://**.133.40.**:128/wpad.dat, hInternet = 0x00cc0010, Flags = 0x00000010
Behavior description: 下载文件
details: URLDownloadToFileW: http://ww****et/vipmh2/mm/1.txt ---> c:\1.txt
C:\1.txt
URLDownloadToFileW: http://ww****et/vipmh2/mm/1.exe ---> C:\WINDOWS\0Sy.exe
C:\WINDOWS\0Sy.exe
URLDownloadToFileW: http://ww****et/vipmh2/mm/2.txt ---> c:\1.txt
URLDownloadToFileW: http://ww****et/vipmh2/mm/2.exe ---> C:\WINDOWS\1Sy.exe
C:\WINDOWS\1Sy.exe
URLDownloadToFileW: http://ww****et/vipmh2/mm/3.txt ---> c:\1.txt
URLDownloadToFileW: http://ww****et/vipmh2/mm/3.exe ---> C:\WINDOWS\2Sy.exe
C:\WINDOWS\2Sy.exe
URLDownloadToFileW: http://ww****et/vipmh2/mm/4.txt ---> c:\1.txt
URLDownloadToFileW: http://ww****et/vipmh2/mm/4.exe ---> C:\WINDOWS\3Sy.exe
C:\WINDOWS\3Sy.exe
URLDownloadToFileW: http://ww****et/vipmh2/mm/5.txt ---> c:\1.txt
URLDownloadToFileW: http://ww****et/vipmh2/mm/5.exe ---> C:\WINDOWS\4Sy.exe
Behavior description: 连接指定站点
details: InternetConnectA: ServerName = ww****et, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = **.133.40.**, PORT = 128, UserName = , Password = , hSession = 0x00cc0010, hConnect = 0x00cc0014, Flags = 0x00000010
Behavior description: 打开HTTP连接
details: InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489), hSession = 0x00cc0004
InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0), hSession = 0x00cc0010
Behavior description: 建立到一个指定的套接字连接
details: URL: wpad, IP: **.133.40.**:128, SOCKET = 0x000007b4
URL: ww****et, IP: **.133.40.**:80, SOCKET = 0x000007b8
URL: ww****et, IP: **.133.40.**:80, SOCKET = 0x000007cc
URL: ww****et, IP: **.133.40.**:80, SOCKET = 0x000007d0
URL: ww****et, IP: **.133.40.**:80, SOCKET = 0x000007c0
URL: ww****et, IP: **.133.40.**:80, SOCKET = 0x000007b0
URL: ww****et, IP: **.133.40.**:80, SOCKET = 0x00000700
URL: ww****et, IP: **.133.40.**:80, SOCKET = 0x00000364
Behavior description: 读取网络文件
details: hFile = 0x00cc0018, BytesToRead =4010, BytesRead = 4010.
hFile = 0x00cc000c, BytesToRead =2048, BytesRead = 2048.
Behavior description: 发送HTTP包
details: GET /wpad.dat HTTP/1.1 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0) Host: **.133.40.**:128
GET /vipmh2/mm/1.txt HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: ww****et Connection: Keep-Alive
GET /vipmh2/mm/1.exe HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: ww****et Connection: Keep-Alive
GET /vipmh2/mm/2.txt HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: ww****et Connection: Keep-Alive
GET /vipmh2/mm/2.exe HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: ww****et Connection: Keep-Alive
GET /vipmh2/mm/3.txt HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: ww****et Connection: Keep-Alive
GET /vipmh2/mm/3.exe HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: ww****et Connection: Keep-Alive
GET /vipmh2/mm/4.txt HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: ww****et Connection: Keep-Alive
GET /vipmh2/mm/4.exe HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: ww****et Connection: Keep-Alive
GET /vipmh2/mm/5.txt HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: ww****et Connection: Keep-Alive
GET /vipmh2/mm/5.exe HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: ww****et Connection: Keep-Alive
GET /vipmh2/mm/6.txt HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: ww****et Connection: Keep-Alive
GET /vipmh2/mm/6.exe HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: ww****et Connection: Keep-Alive
GET /vipmh2/mm/7.txt HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: ww****et Connection: Keep-Alive
GET /vipmh2/mm/7.exe HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: ww****et Connection: Keep-Alive
Behavior description: 打开HTTP请求
details: HttpOpenRequestA: ww****et:80/vipmh2/mm/1.txt, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400010
HttpOpenRequestA: **.133.40.**:128/wpad.dat, hConnect = 0x00cc0014, hRequest = 0x00cc0018, Verb: GET, Referer: , Flags = 0x00000010
HttpOpenRequestA: ww****et:80/vipmh2/mm/1.exe, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400010
HttpOpenRequestA: ww****et:80/vipmh2/mm/2.txt, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400010
HttpOpenRequestA: ww****et:80/vipmh2/mm/2.exe, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400010
HttpOpenRequestA: ww****et:80/vipmh2/mm/3.txt, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400010
HttpOpenRequestA: ww****et:80/vipmh2/mm/3.exe, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400010
HttpOpenRequestA: ww****et:80/vipmh2/mm/4.txt, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400010
HttpOpenRequestA: ww****et:80/vipmh2/mm/4.exe, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400010
HttpOpenRequestA: ww****et:80/vipmh2/mm/5.txt, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400010
HttpOpenRequestA: ww****et:80/vipmh2/mm/5.exe, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400010
HttpOpenRequestA: ww****et:80/vipmh2/mm/6.txt, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400010
HttpOpenRequestA: ww****et:80/vipmh2/mm/6.exe, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400010
HttpOpenRequestA: ww****et:80/vipmh2/mm/7.txt, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400010
HttpOpenRequestA: ww****et:80/vipmh2/mm/7.exe, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400010
Behavior description: 按名称获取主机地址
details: gethostbyname: computer
GetAddrInfoW: computer
GetAddrInfoW: wpad
GetAddrInfoW: ww****et

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows NT\CurrentVersion\Windows\load
\REGISTRY\MACHINE\SOFTWARE\Soft\DownloadWWW\auto
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\ver_down0
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\WINDOWS\0Sy.exe
\REGISTRY\USER\S-*\SessionInformation\ProgramCount
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\ver_down1
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\WINDOWS\1Sy.exe
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\ver_down2
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\WINDOWS\2Sy.exe
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\ver_down3
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\WINDOWS\3Sy.exe
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\ver_down4
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\WINDOWS\4Sy.exe
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\ver_down5
Behavior description: 删除注册表键值
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL

Other behavior

Behavior description: 检测自身是否被调试
details: N/A
Behavior description: 创建互斥体
details: CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
RasPbFile
MSCTF.Shared.MUTEX.AIF
MSCTF.Shared.MUTEX.APH
MSCTF.Shared.MUTEX.ELH
Behavior description: 枚举网络共享资源
details: N/A
Behavior description: 创建事件对象
details: EventName = Global\CorDBIPCSetupSyncEvent_1656
EventName = MSCTF.SendReceive.Event.MJH.IC
EventName = MSCTF.SendReceiveConection.Event.MJH.IC
EventName = MSCTF.SendReceive.Event.ELH.IC
EventName = MSCTF.SendReceiveConection.Event.ELH.IC
EventName = CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000013
EventName = CTF.ThreadMIConnectionEvent.000007B4.00000000.00000013
EventName = CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000014
EventName = CTF.ThreadMIConnectionEvent.000007B4.00000000.00000014
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [RavMonClass,RavMon.exe]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
Behavior description: 窗口信息
details: Pid = 1656, Hwnd=0x10356, Text = 确定, ClassName = Button.
Pid = 1656, Hwnd=0x10358, Text = 文件路径: C:\Documents and Settings\Administrator\Local Settings\%temp%\NewtopJCV4.exe 识别不到,程序启动出错,请重装工作站 , ClassName = Static.
Behavior description: 获取TickCount值
details: TickCount = 487296, SleepMilliseconds = 2000.
TickCount = 487328, SleepMilliseconds = 2000.
TickCount = 487359, SleepMilliseconds = 2000.
TickCount = 487406, SleepMilliseconds = 2000.
TickCount = 487421, SleepMilliseconds = 2000.
TickCount = 487531, SleepMilliseconds = 2000.
TickCount = 487640, SleepMilliseconds = 2000.
TickCount = 487656, SleepMilliseconds = 2000.
TickCount = 487765, SleepMilliseconds = 2000.
TickCount = 505906, SleepMilliseconds = 20000.
TickCount = 506453, SleepMilliseconds = 20000.
TickCount = 506468, SleepMilliseconds = 20000.
TickCount = 506484, SleepMilliseconds = 20000.
TickCount = 504551, SleepMilliseconds = 20.
TickCount = 504566, SleepMilliseconds = 20.
Behavior description: 枚举窗口
details: N/A
Behavior description: 修改后的可执行文件签名信息
details: C:\install.exe(签名验证: 未通过)
C:\222c25ed\IE8-Setup-Full\installservices.exe(签名验证: 未通过)
C:\Program Files\Adobe\Reader 9.0\Reader\A3DUtility.exe(签名验证: 未通过)
C:\Program Files\Adobe\Reader 9.0\Reader\AcroBroker.exe(签名验证: 未通过)
C:\Program Files\Adobe\Reader 9.0\Reader\AcroRd32.exe(签名验证: 未通过)
C:\Program Files\Adobe\Reader 9.0\Reader\AcroRd32Info.exe(签名验证: 未通过)
C:\Program Files\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe(签名验证: 未通过)
C:\Program Files\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe(签名验证: 未通过)
C:\Program Files\Adobe\Reader 9.0\Reader\Eula.exe(签名验证: 未通过)
C:\Program Files\Adobe\Reader 9.0\Reader\LogTransport2.exe(签名验证: 未通过)
C:\Program Files\Adobe\Reader 9.0\Reader\PDFPrevHndlrShim.exe(签名验证: 未通过)
C:\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe(签名验证: 未通过)
C:\Program Files\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-2052-7B44-A90000000001}\Setup.exe(签名验证: 未通过)
C:\Program Files\e\e.exe(签名验证: 未通过)
C:\Program Files\e\unins000.exe(签名验证: 未通过)
Behavior description: 可执行文件签名信息
details: C:\WINDOWS\rundl132.exe(签名验证: 未通过)
C:\WINDOWS\Logo1_.exe(签名验证: 未通过)
Behavior description: 调用Sleep函数
details: [1]: MilliSeconds = 2000.
[2]: MilliSeconds = 20000.
[3]: MilliSeconds = 100.
[4]: MilliSeconds = 100.
[5]: MilliSeconds = 100.
[6]: MilliSeconds = 100.
[7]: MilliSeconds = 100.
[8]: MilliSeconds = 100.
[9]: MilliSeconds = 20000.
[10]: MilliSeconds = 100.
[1]: MilliSeconds = -1.
[2]: MilliSeconds = 60000.
Behavior description: 可执行文件MD5
details: C:\WINDOWS\rundl132.exe ---> f93ee6c1ab8fa54827654bf1676e3bf4
C:\WINDOWS\Logo1_.exe ---> f93ee6c1ab8fa54827654bf1676e3bf4
Behavior description: 修改后的可执行文件MD5
details: C:\install.exe ---> f37edf2ebfc185bba04c77fc916d3520
C:\222c25ed\IE8-Setup-Full\installservices.exe ---> 32c8790b3dcb11cf1df2fb856c65e62f
C:\Program Files\Adobe\Reader 9.0\Reader\A3DUtility.exe ---> 210a5e9ef0af43b868b1b054f98891d9
C:\Program Files\Adobe\Reader 9.0\Reader\AcroBroker.exe ---> 9bad2eefb49a183eee931e5b16136a39
C:\Program Files\Adobe\Reader 9.0\Reader\AcroRd32.exe ---> 8cfae1eaf08676e6bbde62aeda0b8990
C:\Program Files\Adobe\Reader 9.0\Reader\AcroRd32Info.exe ---> dd1dffc8dd96e39b5f525d35336b697e
C:\Program Files\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe ---> c0fbddfe301aa73ea2d1ac68112a974a
C:\Program Files\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe ---> 8789a0072d9483f4b33ff6c5d51c091a
C:\Program Files\Adobe\Reader 9.0\Reader\Eula.exe ---> f4a91d2c2acc3c308d9ffb05e2036cf7
C:\Program Files\Adobe\Reader 9.0\Reader\LogTransport2.exe ---> a04977a11bacd100633ca83698811421
C:\Program Files\Adobe\Reader 9.0\Reader\PDFPrevHndlrShim.exe ---> 9e2b21f64b8d6cd0f25f0c2dfab4dac6
C:\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe ---> 9f4b44db886c4734c3b6bd7ed3ff6a2d
C:\Program Files\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-2052-7B44-A90000000001}\Setup.exe ---> 24a7c9fe249bc1d70b34a778826e1cad
C:\Program Files\e\e.exe ---> a850445b0e129df825ee1aeac26020bd
C:\Program Files\e\unins000.exe ---> 5e24136ba49dfa436d8edb9919423bda
Behavior description: 加载新释放的文件
details: Image: C:\WINDOWS\vDll.dll.
Behavior description: 查找文件方式探测虚拟机
details: FindFirstFileEx: FileName = C:\Program Files\VMware\_desktop.ini
FindFirstFileEx: FileName = C:\Program Files\VMware\*.exe
FindFirstFileEx: FileName = C:\Program Files\VMware\*.*