VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

File information

Scanner results
Scanner results:0%Scanner(s) (0/39)found malware!
Behavior analysis report:         Habo file analysis
Time: 2014-11-08 18:31:58 (CST)
Scanner Engine Ver Sig Ver Sig Date Scan result Time
ahnlab 9.9.9 9.9.9 2013-05-28 Found nothing 5
antivir 1.9.2.0 1.9.159.0 7.11.183.172 Found nothing 15
antiy 112612 AVL141106 2014-11-07 Found nothing 5
arcavir 1.0 2011 2014-05-30 Found nothing 8
asquared 9.0.0.4324 9.0.0.4324 2014-07-03 Found nothing 2
avast 141106-0 4.7.4 2014-11-06 Found nothing 6
avg 2109/8019 10.0.1405 2014-11-06 Found nothing 3
baidu 2.0.1.0 4.1.3.52192 2.0.1.0 Found nothing 5
baidusd 1.0 1.0 2014-04-02 Found nothing 1
bitdefender 7.57607 7.90123 2014-11-07 Found nothing 6
clamav 19595 0.97.5 2014-11-07 Found nothing 3
comodo 15023 5.1 2014-11-07 Found nothing 3
ctch 4.6.5 5.3.14 2013-12-01 Found nothing 1
drweb 5.0.2.3300 5.0.1.1 2014-10-31 Found nothing 58
fortinet 23.129, 23.129 5.1.158 2014-11-07 Found nothing 1
fprot 4.6.2.117 6.5.1.5418 2014-11-07 Found nothing 1
fsecure 2014-04-02-01 9.13 2014-04-02 Found nothing 4
gdata 24.4834 24.4834 2014-11-07 Found nothing 12
hauri 2.73 2.73 2014-11-07 Found nothing 1
ikarus 1.06.01 V1.32.31.0 2014-11-07 Found nothing 15
jiangmin 16.0.100 1.0.0.0 2014-08-20 Found nothing 39
kaspersky 5.5.33 5.5.33 2014-04-01 Found nothing 25
kingsoft 2.1 2.1 2013-09-22 Found nothing 5
mcafee 7520 5400.1158 2014-08-04 Found nothing 10
nod32 0436 3.0.21 2014-09-18 Found nothing 2
panda 9.05.01 9.05.01 2014-11-07 Found nothing 6
pcc 11.262.06 9.500-1005 2014-11-07 Found nothing 2
qh360 1.0.1 1.0.1 1.0.1 Found nothing 14
qqphone 1.0.0.0 1.0.0.0 2014-11-08 Found nothing 1
quickheal 14.00 14.00 2014-11-07 Found nothing 4
rising 25.39.03.04 25.39.03.04 2014-11-06 Found nothing 5
sophos 5.04 3.51.0 2014-08-05 Found nothing 7
sunbelt 3.9.2595.2 3.9.2595.2 2014-11-06 Found nothing 4
symantec 20141104.004 1.3.0.24 2014-11-04 Found nothing 1
tachyon 9.9.9 9.9.9 2013-12-27 Found nothing 9
thehacker 6.8.0.5 6.8.0.5 2014-11-07 Found nothing 8
tws 17.47.17308 1.0.2.2108 2014-11-07 Found nothing 9
vba 3.12.26.3 3.12.26.3 2014-11-06 Found nothing 6
virusbuster 15.0.961.0 5.5.2.13 2014-11-07 Found nothing 16

没有相关的权限信息

文件信息
VirSCANVirSCAN
安全评分 :75
基本信息
VirSCANVirSCAN
MD5:9e7a257e6a0eeeb5d7d9d385019d3e0c
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
包名:
最低运行环境:
版权:
关键行为
VirSCANVirSCAN
行为描述: 隐藏指定窗口
详情信息: [Window,Class] = [,BrowserFrameGripperClass]
[Window,Class] = [缩放级别,ToolbarWindow32]
[Window,Class] = [,msctls_progress32]
[Window,Class] = [,ComboLBox]
[Window,Class] = [「开始」菜单,DV2ControlHost]
[Window,Class] = [,tooltips_class32]
[Window,Class] = [,Auto-Suggest Dropdown]
[Window,Class] = [Connections Tray,Connections Tray]
行为描述: 修改注册表_任务管理器关键属性
详情信息: \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr
行为描述: 设置消息钩子
详情信息: c:\monitor\Hook.dll
行为描述: 常规加载驱动
详情信息: \??\c:\monitor\LianXue_SuperKill.sys
行为描述: 杀掉进程
详情信息: TargetProcess = KAVSVC.EXE
TargetProcess = KVXP.KXP
TargetProcess = RAV.EXE
TargetProcess = RAVMON.EXE
TargetProcess = MCSHIELD.EXE
TargetProcess = VSTSKMGR.EXE
TargetProcess = 360TRAY.EXE
C:\WINDOWS\Explorer.EXE
行为描述: 修改硬盘引导扇区
详情信息: N/A
行为描述: 修改注册表_启动项
详情信息: \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\360.
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Run\sample.exe
行为描述: 创建系统服务
详情信息: [服务创建成功]: LianXue_SuperKill, c:\monitor\LianXue_SuperKill.sys
行为描述: 修改注册表_关联EXE文件默认图标
详情信息: \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\DefaultIcon\
行为描述: 设置特殊文件属性
详情信息: C:\monitor\Hook.dll
C:\WINDOWS\fveupdate.exe
C:\WINDOWS\Top.exe
行为描述: 查找文件方式探测VMware
详情信息: FindFirstFileEx: FileName = c:\program files\vmware
行为描述: 获取文件属性探测VMware
详情信息: GetFileAttributes: FileName = c:\program files\vmware\vmware tools\vmwaretray.exe
GetFileAttributes: FileName = c:\program files\vmware\vmware tools\vmwareuser.exe
行为描述: 设置特殊文件夹属性
详情信息: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache
C:\Documents and Settings\Administrator\IECompatCache
行为描述: 查找指定内核模块
详情信息: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe (ntice.sys)
lstrcmpiA: ntice.sys <------> hal.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> KDCOM.DLL (ntice.sys)
lstrcmpiA: ntice.sys <------> BOOTVID.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> ACPI.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> WMILIB.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> pci.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> isapnp.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> compbatt.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> BATTC.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> intelide.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> MountMgr.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> ftdisk.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> dmload.sys (ntice.sys)
行为描述: 查找反病毒常用工具窗口
详情信息: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]
行为描述: 按名称获取主机地址
详情信息: wpad
www.yixun.com
进程行为
VirSCANVirSCAN
行为描述: 隐藏指定窗口
详情信息: [Window,Class] = [,BrowserFrameGripperClass]
[Window,Class] = [缩放级别,ToolbarWindow32]
[Window,Class] = [,msctls_progress32]
[Window,Class] = [,ComboLBox]
[Window,Class] = [「开始」菜单,DV2ControlHost]
[Window,Class] = [,tooltips_class32]
[Window,Class] = [,Auto-Suggest Dropdown]
[Window,Class] = [Connections Tray,Connections Tray]
行为描述: 修改注册表_任务管理器关键属性
详情信息: \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr
行为描述: 设置消息钩子
详情信息: c:\monitor\Hook.dll
行为描述: 常规加载驱动
详情信息: \??\c:\monitor\LianXue_SuperKill.sys
行为描述: 杀掉进程
详情信息: TargetProcess = KAVSVC.EXE
TargetProcess = KVXP.KXP
TargetProcess = RAV.EXE
TargetProcess = RAVMON.EXE
TargetProcess = MCSHIELD.EXE
TargetProcess = VSTSKMGR.EXE
TargetProcess = 360TRAY.EXE
C:\WINDOWS\Explorer.EXE
行为描述: 修改硬盘引导扇区
详情信息: N/A
行为描述: 修改注册表_启动项
详情信息: \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\360.
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Run\sample.exe
行为描述: 创建系统服务
详情信息: [服务创建成功]: LianXue_SuperKill, c:\monitor\LianXue_SuperKill.sys
行为描述: 修改注册表_关联EXE文件默认图标
详情信息: \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\DefaultIcon\
行为描述: 设置特殊文件属性
详情信息: C:\monitor\Hook.dll
C:\WINDOWS\fveupdate.exe
C:\WINDOWS\Top.exe
行为描述: 查找文件方式探测VMware
详情信息: FindFirstFileEx: FileName = c:\program files\vmware
行为描述: 获取文件属性探测VMware
详情信息: GetFileAttributes: FileName = c:\program files\vmware\vmware tools\vmwaretray.exe
GetFileAttributes: FileName = c:\program files\vmware\vmware tools\vmwareuser.exe
行为描述: 设置特殊文件夹属性
详情信息: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache
C:\Documents and Settings\Administrator\IECompatCache
行为描述: 查找指定内核模块
详情信息: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe (ntice.sys)
lstrcmpiA: ntice.sys <------> hal.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> KDCOM.DLL (ntice.sys)
lstrcmpiA: ntice.sys <------> BOOTVID.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> ACPI.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> WMILIB.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> pci.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> isapnp.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> compbatt.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> BATTC.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> intelide.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> MountMgr.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> ftdisk.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> dmload.sys (ntice.sys)
行为描述: 查找反病毒常用工具窗口
详情信息: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]
行为描述: 按名称获取主机地址
详情信息: wpad
www.yixun.com
文件行为
VirSCANVirSCAN
行为描述: 写权限映射文件
详情信息: Local\Feed Eventing Shared Memory S-1-5-21-1482476501-1645522239-1417001333-500
DfRoot0000C6624
\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache\index.datndex.dat_32768
Local\UrlZonesSM_Administrator
\Documents and Settings\Administrator\IECompatCache\index.datndex.dat_16384
AtlDebugAllocator_FileMappingNameStatic3_ee0
ie_lcie_ConnHashTable<3600>
\WINDOWS\system32\zh-cn\urlmon.dll.mui
Local\!PrivacIE!SharedMem!Settings
Local\!PrivacIE!SharedMem!Counter
\WINDOWS\system32\zh-cn\ieframe.dll.mui
SmartScreen_UrsCache_2CEDBFBC-DBA8-43AA-B1FD-CC8E6316E3E2High_S-1-5-21-1482476501-1645522239-1417001333-500
\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\AntiPhishing\2CEDBFBC-DBA8-43AA-B1FD-CC8E6316E3E2.dat
CiceroSharedMemDefaultS-1-5-21-1482476501-1645522239-1417001333-500
\WINDOWS\system32\zh-cn\mshtml.dll.mui
行为描述: 设置特殊文件属性
详情信息: C:\monitor\Hook.dll
C:\WINDOWS\fveupdate.exe
C:\WINDOWS\Top.exe
行为描述: 创建可执行文件
详情信息: C:\monitor\Hook.dll
C:\monitor\LianXue_SuperKill.sys
C:\WINDOWS\fveupdate.exe
C:\WINDOWS\Top.exe
行为描述: 修改文件内容
详情信息: C:\17mt.ico---> Offset = 0
C:\17mt.ico---> Offset = 22
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\dnserrordiagoff[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\ErrorPageTemplate[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6P4O8QNJ\errorPageStrings[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\httpErrorPagesScripts[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\noConnect[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\bullet[2]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\background_gradient[2]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\down[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\favcenter[2]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\tools[1]---> Offset = 0
行为描述: 设置特殊文件夹属性
详情信息: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache
C:\Documents and Settings\Administrator\IECompatCache
网络行为
VirSCANVirSCAN
行为描述: 下载文件
详情信息: URLDownloadToFileW: http://www.live.com/favicon.ico ---> C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
行为描述: 按名称获取主机地址
详情信息: wpad
www.yixun.com
注册表行为
VirSCANVirSCAN
行为描述: 修改注册表_关联EXE文件默认图标
详情信息: \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\DefaultIcon\
行为描述: 删除注册表键值_IE连接设置
详情信息: \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
行为描述: 修改注册表_任务管理器关键属性
详情信息: \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr
行为描述: 修改注册表
详情信息: \REGISTRY\MACHINE\SOFTWARE\360Safe\safemon\ExecAccess
\REGISTRY\MACHINE\SOFTWARE\360Safe\safemon\MonAccess
\REGISTRY\MACHINE\SOFTWARE\360Safe\safemon\SiteAccess
\REGISTRY\MACHINE\SOFTWARE\360Safe\safemon\UDiskAccess
\REGISTRY\MACHINE\SOFTWARE\Classes\.iso\
\REGISTRY\MACHINE\SOFTWARE\Classes\.GHOST\
\REGISTRY\MACHINE\SOFTWARE\Classes\.GHO\
\REGISTRY\MACHINE\SOFTWARE\Classes\.jpg\
\REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile\
\REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile\DefaultIcon\
\REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile\shell\open\command\
\REGISTRY\MACHINE\SOFTWARE\Classes\pngfile\
\REGISTRY\MACHINE\SOFTWARE\Classes\pngfile\DefaultIcon\
\REGISTRY\MACHINE\SOFTWARE\Classes\pngfile\shell\open\command\
\REGISTRY\MACHINE\SOFTWARE\Classes\.bmp\
行为描述: 修改注册表_文件关联
详情信息: \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\
\REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\DefaultIcon\
\REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\
行为描述: 删除注册表键值
详情信息: \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0\Expiration
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1\Expiration
行为描述: 修改注册表_启动项
详情信息: \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\360.
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Run\sample.exe
其他行为
VirSCANVirSCAN
行为描述: 创建驱动文件镜像
详情信息: C:\monitor\LianXue_SuperKill.sys
行为描述: 创建互斥体
详情信息: SHIMLIB_LOG_MUTEX
Local\RSS Eventing Connection Database Mutex 00000e10
Local\Feed Eventing Shared Memory Mutex S-1-5-21-1482476501-1645522239-1417001333-500
Local\c:!documents and settings!administrator!local settings!application data!microsoft!feeds cache!
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
RasPbFile
Local\!IECompat!Mutex
Local\c:!documents and settings!administrator!iecompatcache!
IESQMMUTEX_3600_27
Local\!PrivacIE!SharedMemory!Mutex
SmartScreen_UrsCacheMutex_2CEDBFBC-DBA8-43AA-B1FD-CC8E6316E3E2High_S-1-5-21-1482476501-1645522239-1417001333-500
CTF.LBES.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
行为描述: 内联HOOK
详情信息: C:\WINDOWS\system32\ntdll.dll--->DbgUiRemoteBreakin Offset = 0x0
C:\WINDOWS\system32\ntdll.dll--->DbgBreakPoint Offset = 0x0
C:\WINDOWS\system32\kernel32.dll--->OpenProcess Offset = 0x0
行为描述: 获取文件属性探测VMware
详情信息: GetFileAttributes: FileName = c:\program files\vmware\vmware tools\vmwaretray.exe
GetFileAttributes: FileName = c:\program files\vmware\vmware tools\vmwareuser.exe
行为描述: 设置消息钩子
详情信息: c:\monitor\Hook.dll
行为描述: 常规加载驱动
详情信息: \??\c:\monitor\LianXue_SuperKill.sys
行为描述: 查找指定窗口
详情信息: NtUserFindWindowEx: [Class,Window] = [18467-41,]
NtUserFindWindowEx: [Class,Window] = [,]
NtUserFindWindowEx: [Class,Window] = [,DefenderDaemon.exe]
NtUserFindWindowEx: [Class,Window] = [,explorer.exe]
NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
NtUserFindWindowEx: [Class,Window] = [Proxy Desktop,]
NtUserFindWindowEx: [Class,Window] = [Static,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [BaseBar,ChanApp]
NtUserFindWindowEx: [Class,Window] = [SysListView32,]
NtUserFindWindowEx: [Class,Window] = [SystemTray_Main,]
NtUserFindWindowEx: [Class,Window] = [CSCHiddenWindow,]
行为描述: 修改硬盘引导扇区
详情信息: N/A
行为描述: 尝试打开调试器或监控软件的驱动设备对象
详情信息: \??\SICE
\??\SIWVID
\??\NTICE
行为描述: 获取系统权限
详情信息: SE_DEBUG_PRIVILEGE
SE_SYSTEMTIME_PRIVILEGE
SE_LOAD_DRIVER_PRIVILEGE
SE_SHUTDOWN_PRIVILEGE
行为描述: 查找指定内核模块
详情信息: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe (ntice.sys)
lstrcmpiA: ntice.sys <------> hal.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> KDCOM.DLL (ntice.sys)
lstrcmpiA: ntice.sys <------> BOOTVID.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> ACPI.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> WMILIB.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> pci.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> isapnp.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> compbatt.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> BATTC.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> intelide.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> MountMgr.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> ftdisk.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> dmload.sys (ntice.sys)
行为描述: 枚举窗口
详情信息: N/A
行为描述: 查找文件方式探测VMware
详情信息: FindFirstFileEx: FileName = c:\program files\vmware
行为描述: 直接操作物理设备
详情信息: \??\PHYSICALDRIVE0
行为描述: 隐藏指定窗口
详情信息: [Window,Class] = [,BrowserFrameGripperClass]
[Window,Class] = [缩放级别,ToolbarWindow32]
[Window,Class] = [,msctls_progress32]
[Window,Class] = [,ComboLBox]
[Window,Class] = [「开始」菜单,DV2ControlHost]
[Window,Class] = [,tooltips_class32]
[Window,Class] = [,Auto-Suggest Dropdown]
[Window,Class] = [Connections Tray,Connections Tray]
行为描述: 窗口信息
详情信息: Pid = 2188, Hwnd=0x200ca, Text = 开始, ClassName = Button.
Pid = 2188, Hwnd=0x200ac, Text = 0:00, ClassName = TrayClockWClass.
Pid = 2188, Hwnd=0x3005e, Text = 通知区域, ClassName = ToolbarWindow32.
Pid = 2188, Hwnd=0x20080, Text = TF_FloatingLangBar_WndTitle, ClassName = CiceroUIWndFrame.
Pid = 2188, Hwnd=0x2007e, Text = 运行应用程序, ClassName = MSTaskSwWClass.
Pid = 2188, Hwnd=0x20092, Text = 运行应用程序, ClassName = ToolbarWindow32.
Pid = 2188, Hwnd=0x2007c, Text = Quick Launch, ClassName = ToolbarWindow32.
Pid = 2188, Hwnd=0x30068, Text = FolderView, ClassName = SysListView32.
Pid = 2188, Hwnd=0x20098, Text = Program Manager, ClassName = Progman.
Pid = 2188, Hwnd=0x30066, Text = Administrator, ClassName = Static.
Pid = 2188, Hwnd=0x2006c, Text = 所有程序(&P), ClassName = Button.
Pid = 2188, Hwnd=0x200b0, Text = 「开始」菜单, ClassName = DV2ControlHost.
Pid = 2188, Hwnd=0x403de, Text = 我的文档, ClassName = ComboBoxEx32.
Pid = 2188, Hwnd=0x803ec, Text = 我的文档, ClassName = Edit.
Pid = 2188, Hwnd=0x903e6, Text = 3 个对象, ClassName = msctls_statusbar32.
行为描述: 创建系统服务
详情信息: [服务创建成功]: LianXue_SuperKill, c:\monitor\LianXue_SuperKill.sys
行为描述: 查找反病毒常用工具窗口
详情信息: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]
异常崩溃
VirSCANVirSCAN
行为描述: 创建驱动文件镜像
详情信息: C:\monitor\LianXue_SuperKill.sys
行为描述: 创建互斥体
详情信息: SHIMLIB_LOG_MUTEX
Local\RSS Eventing Connection Database Mutex 00000e10
Local\Feed Eventing Shared Memory Mutex S-1-5-21-1482476501-1645522239-1417001333-500
Local\c:!documents and settings!administrator!local settings!application data!microsoft!feeds cache!
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
RasPbFile
Local\!IECompat!Mutex
Local\c:!documents and settings!administrator!iecompatcache!
IESQMMUTEX_3600_27
Local\!PrivacIE!SharedMemory!Mutex
SmartScreen_UrsCacheMutex_2CEDBFBC-DBA8-43AA-B1FD-CC8E6316E3E2High_S-1-5-21-1482476501-1645522239-1417001333-500
CTF.LBES.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
行为描述: 内联HOOK
详情信息: C:\WINDOWS\system32\ntdll.dll--->DbgUiRemoteBreakin Offset = 0x0
C:\WINDOWS\system32\ntdll.dll--->DbgBreakPoint Offset = 0x0
C:\WINDOWS\system32\kernel32.dll--->OpenProcess Offset = 0x0
行为描述: 获取文件属性探测VMware
详情信息: GetFileAttributes: FileName = c:\program files\vmware\vmware tools\vmwaretray.exe
GetFileAttributes: FileName = c:\program files\vmware\vmware tools\vmwareuser.exe
行为描述: 设置消息钩子
详情信息: c:\monitor\Hook.dll
行为描述: 常规加载驱动
详情信息: \??\c:\monitor\LianXue_SuperKill.sys
行为描述: 查找指定窗口
详情信息: NtUserFindWindowEx: [Class,Window] = [18467-41,]
NtUserFindWindowEx: [Class,Window] = [,]
NtUserFindWindowEx: [Class,Window] = [,DefenderDaemon.exe]
NtUserFindWindowEx: [Class,Window] = [,explorer.exe]
NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
NtUserFindWindowEx: [Class,Window] = [Proxy Desktop,]
NtUserFindWindowEx: [Class,Window] = [Static,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [BaseBar,ChanApp]
NtUserFindWindowEx: [Class,Window] = [SysListView32,]
NtUserFindWindowEx: [Class,Window] = [SystemTray_Main,]
NtUserFindWindowEx: [Class,Window] = [CSCHiddenWindow,]
行为描述: 修改硬盘引导扇区
详情信息: N/A
行为描述: 尝试打开调试器或监控软件的驱动设备对象
详情信息: \??\SICE
\??\SIWVID
\??\NTICE
行为描述: 获取系统权限
详情信息: SE_DEBUG_PRIVILEGE
SE_SYSTEMTIME_PRIVILEGE
SE_LOAD_DRIVER_PRIVILEGE
SE_SHUTDOWN_PRIVILEGE
行为描述: 查找指定内核模块
详情信息: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe (ntice.sys)
lstrcmpiA: ntice.sys <------> hal.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> KDCOM.DLL (ntice.sys)
lstrcmpiA: ntice.sys <------> BOOTVID.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> ACPI.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> WMILIB.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> pci.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> isapnp.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> compbatt.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> BATTC.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> intelide.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> MountMgr.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> ftdisk.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> dmload.sys (ntice.sys)
行为描述: 枚举窗口
详情信息: N/A
行为描述: 查找文件方式探测VMware
详情信息: FindFirstFileEx: FileName = c:\program files\vmware
行为描述: 直接操作物理设备
详情信息: \??\PHYSICALDRIVE0
行为描述: 隐藏指定窗口
详情信息: [Window,Class] = [,BrowserFrameGripperClass]
[Window,Class] = [缩放级别,ToolbarWindow32]
[Window,Class] = [,msctls_progress32]
[Window,Class] = [,ComboLBox]
[Window,Class] = [「开始」菜单,DV2ControlHost]
[Window,Class] = [,tooltips_class32]
[Window,Class] = [,Auto-Suggest Dropdown]
[Window,Class] = [Connections Tray,Connections Tray]
行为描述: 窗口信息
详情信息: Pid = 2188, Hwnd=0x200ca, Text = 开始, ClassName = Button.
Pid = 2188, Hwnd=0x200ac, Text = 0:00, ClassName = TrayClockWClass.
Pid = 2188, Hwnd=0x3005e, Text = 通知区域, ClassName = ToolbarWindow32.
Pid = 2188, Hwnd=0x20080, Text = TF_FloatingLangBar_WndTitle, ClassName = CiceroUIWndFrame.
Pid = 2188, Hwnd=0x2007e, Text = 运行应用程序, ClassName = MSTaskSwWClass.
Pid = 2188, Hwnd=0x20092, Text = 运行应用程序, ClassName = ToolbarWindow32.
Pid = 2188, Hwnd=0x2007c, Text = Quick Launch, ClassName = ToolbarWindow32.
Pid = 2188, Hwnd=0x30068, Text = FolderView, ClassName = SysListView32.
Pid = 2188, Hwnd=0x20098, Text = Program Manager, ClassName = Progman.
Pid = 2188, Hwnd=0x30066, Text = Administrator, ClassName = Static.
Pid = 2188, Hwnd=0x2006c, Text = 所有程序(&P), ClassName = Button.
Pid = 2188, Hwnd=0x200b0, Text = 「开始」菜单, ClassName = DV2ControlHost.
Pid = 2188, Hwnd=0x403de, Text = 我的文档, ClassName = ComboBoxEx32.
Pid = 2188, Hwnd=0x803ec, Text = 我的文档, ClassName = Edit.
Pid = 2188, Hwnd=0x903e6, Text = 3 个对象, ClassName = msctls_statusbar32.
行为描述: 创建系统服务
详情信息: [服务创建成功]: LianXue_SuperKill, c:\monitor\LianXue_SuperKill.sys
行为描述: 查找反病毒常用工具窗口
详情信息: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]
运行截图
VirSCANVirSCAN
VirSCAN