魔盾安全分析报告文件详细信息特征
Transcription
魔盾安全分析报告文件详细信息特征
魔盾安全分析报告 分析类型 开始时间 结束时间 持续时间 分析引擎版本 FILE 2016-05-04 14:56:24 2016-05-04 14:58:47 143 秒 1.4-Maldun 虚拟机机器名 标签 虚拟机管理 开机时间 关机时间 win7-sp1-x64-1 win7-sp1-x64-1 KVM 2016-05-04 14:56:25 2016-05-04 14:58:46 魔盾分数 10.0 恶意的 文件详细信息 文件名 Factuur_09480602.pdf.exe 文件大小 742541 字节 文件类型 PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive CRC32 6E46EFA8 MD5 f3669aa9d7272d0db49bcd97b65ea23b SHA1 9cb87d56e5c51ceb26d9da945a139855329fa549 SHA256 faf62fde4104945b85f6c1381c3009d5f676fe8adf0cd0c2f0e15931f3c41f73 SHA512 97d16c26a144f5dbb9de0360896758936ac064c51358da23db4a3574825cb136cf218a452d603eb4059164f376d5f0a0509e9e99 b5d11271ca6e1960f8d2bb45 Ssdeep 12288:GkirMt70NAthrkeKqt9ICRUBioUwc7Phuuo23IKDIRKYfJf2:GkirAtRtKqzkiNbZ94AYBf2 PEiD 无匹配 Yara 无Yara规则匹配 VirusTotal VirusTotal链接 VirusTotal扫描时间: 2016-05-03 13:51:31 扫描结果: 38/57 特征 创建RWX内存 从文件自身的二进制镜像中读取数据 self_read: process: Factuur_09480602.pdf.exe, pid: 2512, offset: 0x00000000, length: 0x0000c400 self_read: process: Factuur_09480602.pdf.exe, pid: 2512, offset: 0x0000c21c, length: 0x000a9271 self_read: process: Factuur_09480602.pdf.exe, pid: 1940, offset: 0x00000000, length: 0x000b548d 尝试模仿一个 PDF document 的文件扩展名,通过使用 'pdf' 在文件名中 执行了一个进程并在其中注入代码(可能是在解包过程中) 检测到网络活动但没有显示在API日志中 文件已被至少十个VirusTotal上的反病毒引擎检测为病毒 Bkav: W32.StatulisC.Trojan MicroWorld-eScan: Trojan.GenericKD.3150143 nProtect: Trojan.GenericKD.3150143 CAT-QuickHeal: TrojanRansom.Onion.r5 ALYac: Trojan.GenericKD.3150143 Malwarebytes: Trojan.Kovter.Generic VIPRE: Trojan.Win32.Generic.pak!cobra K7GW: Trojan ( 004e294d1 ) K7AntiVirus: Trojan ( 004e294d1 ) Symantec: Trojan.Gen ESET-NOD32: a variant of Generik.GQZQICK Avast: Win32:Malware-gen GData: Trojan.GenericKD.3150143 Kaspersky: Trojan-Ransom.NSIS.Onion.ncm BitDefender: Trojan.GenericKD.3150143 NANO-Antivirus: Trojan.Win32.Encoder.ebqmyp Tencent: Win32.Trojan.Bp-generic.Wpav Ad-Aware: Trojan.GenericKD.3150143 Emsisoft: Trojan.GenericKD.3150143 (B) F-Secure: Trojan.GenericKD.3150629 DrWeb: Trojan.Encoder.858 Zillya: Trojan.Onion.Win32.918 TrendMicro: TROJ_GEN.R0CCC0DDD16 McAfee-GW-Edition: BehavesLike.Win32.Ransom.bc Sophos: Troj/Ransom-CVG Cyren: W32/Trojan.RTRZ-0424 Arcabit: Trojan.Generic.D30113F ViRobot: Trojan.Win32.Z.Agent.742541[h] Microsoft: Ransom:Win32/Critroni.B AhnLab-V3: Malware/Gen.Generic McAfee: RDN/Ransom AVware: Trojan.Win32.Generic.pak!cobra Yandex: Trojan.Steamilik! Ikarus: Trojan.Win32.Steamilik Fortinet: Malicious_Behavior.VEX.89 AVG: Inject3.AJIL Panda: Trj/CI.A Qihoo-360: QVM42.0.Malware.Gen 生成一个自己的复制文件 copy: C:\Users\test\AppData\Local\Temp\mgusien.exe 运行截图 网络分析 访问主机记录 直接访问 IP地址 国家名 是 23.41.176.45 United States 是 74.125.23.138 United States 是 74.125.23.113 United States 是 74.125.23.102 United States 是 74.125.23.101 United States 是 74.125.23.100 United States UDP连接 IP地址 端口 192.168.122.1 53 192.168.122.1 53 192.168.122.255 138 静态分析 PE 信息 初始地址 0x00400000 入口地址 0x00403217 声明校验值 0x00000000 实际校验值 0x000c0bed 最低操作系统版本要求 4.0 编译时间 2014-10-07 12:40:17 图标 图标精确哈希值 9c24fac0d4a2cfd0100bcfcb83a9ca33 图标相似性哈希值 c680bc2cc6d7fc57335e6ed3cb09c9ec PE数据组成 名称 虚拟地址 虚拟大小 原始数据大小 特征 熵 (Entropy) .text 0x00001000 0x00005bf4 0x00005c00 IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ 6.48 .rdata 0x00007000 0x000011ce 0x00001200 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 5.24 .data 0x00009000 0x0001a7f8 0x00000400 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 5.03 .ndata 0x00024000 0x00008000 0x00000000 IMAGE_SCN_CNT_UNINITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 0.00 .rsrc 0x0002c000 0x00004a35 0x00004c00 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 3.86 覆盖 偏移量: 0x0000c200 大小: 0x000a928d 资源 名称 偏移量 大小 语言 子语言 熵 (Entropy) 文件类型 RT_ICON 0x0002c1c0 0x00004228 LANG_ENGLISH SUBLANG_ENGLISH_US 3.51 dBase IV DBT of \200.DBF, blocks size 64, block length 16384, next free block index 40, 1st item "\377\377\377" RT_DIALOG 0x000306bc 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US 2.49 data RT_DIALOG 0x000306bc 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US 2.49 data RT_DIALOG 0x000306bc 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US 2.49 data RT_DIALOG 0x000306bc 0x00000060 LANG_ENGLISH SUBLANG_ENGLISH_US 2.49 data RT_GROUP_ICON 0x0003071c 0x00000014 LANG_ENGLISH SUBLANG_ENGLISH_US 1.92 MS Windows icon resource - 1 icon RT_MANIFEST 0x00030730 0x00000305 LANG_ENGLISH SUBLANG_ENGLISH_US 5.27 XML document text 导入 库 KERNEL32.dll: • 0x407060 - GetTickCount • 0x407064 - GetFullPathNameA • 0x407068 - MoveFileA • 0x40706c - SetCurrentDirectoryA • 0x407070 - GetFileAttributesA • 0x407074 - GetLastError • 0x407078 - CreateDirectoryA • 0x40707c - SetFileAttributesA • 0x407080 - SearchPathA • 0x407084 - GetShortPathNameA • 0x407088 - CreateFileA • 0x40708c - GetFileSize • 0x407090 - GetModuleFileNameA • 0x407094 - ReadFile • 0x407098 - GetCurrentProcess • 0x40709c - CopyFileA • 0x4070a0 - ExitProcess • 0x4070a4 - SetEnvironmentVariableA • 0x4070a8 - Sleep • 0x4070ac - CloseHandle • 0x4070b0 - GetCommandLineA • 0x4070b4 - SetErrorMode • 0x4070b8 - LoadLibraryA • 0x4070bc - lstrlenA • 0x4070c0 - lstrcpynA • 0x4070c4 - GetDiskFreeSpaceA • 0x4070c8 - GlobalUnlock • 0x4070cc - GlobalLock • 0x4070d0 - CreateThread • 0x4070d4 - CreateProcessA • 0x4070d8 - RemoveDirectoryA • 0x4070dc - GetTempFileNameA • 0x4070e0 - lstrcpyA • 0x4070e4 - lstrcatA • 0x4070e8 - GetSystemDirectoryA • 0x4070ec - GetVersion • 0x4070f0 - GetProcAddress • 0x4070f4 - GlobalAlloc • 0x4070f8 - CompareFileTime • 0x4070fc - SetFileTime • 0x407100 - ExpandEnvironmentStringsA • 0x407104 - lstrcmpiA • 0x407108 - lstrcmpA • 0x40710c - WaitForSingleObject • 0x407110 - GlobalFree • 0x407114 - GetExitCodeProcess • 0x407118 - GetModuleHandleA • 0x40711c - GetTempPathA • 0x407120 - GetWindowsDirectoryA • 0x407124 - LoadLibraryExA • 0x407128 - FindFirstFileA • 0x40712c - FindNextFileA • 0x407130 - DeleteFileA • 0x407134 - SetFilePointer • 0x407138 - WriteFile • 0x40713c - FindClose • 0x407140 - WritePrivateProfileStringA • 0x407144 - MultiByteToWideChar • 0x407148 - MulDiv • 0x40714c - GetPrivateProfileStringA • 0x407150 - FreeLibrary 库 USER32.dll: • 0x407174 - CreateWindowExA • 0x407178 - EndDialog • 0x40717c - ScreenToClient • 0x407180 - GetWindowRect • 0x407184 - EnableMenuItem • 0x407188 - GetSystemMenu • 0x40718c - SetClassLongA • 0x407190 - IsWindowEnabled • 0x407194 - SetWindowPos • 0x407198 - GetSysColor • 0x40719c - GetWindowLongA • 0x4071a0 - SetCursor • 0x4071a4 - LoadCursorA • 0x4071a8 - CheckDlgButton • 0x4071ac - GetMessagePos • 0x4071b0 - LoadBitmapA • 0x4071b4 - CallWindowProcA • 0x4071b8 - IsWindowVisible • 0x4071bc - CloseClipboard • 0x4071c0 - GetDC • 0x4071c4 - SystemParametersInfoA • 0x4071c8 - RegisterClassA • 0x4071cc - TrackPopupMenu • 0x4071d0 - AppendMenuA • 0x4071d4 - CreatePopupMenu • 0x4071d8 - GetSystemMetrics • 0x4071dc - SetDlgItemTextA • 0x4071e0 - GetDlgItemTextA • 0x4071e4 - MessageBoxIndirectA • 0x4071e8 - CharPrevA • 0x4071ec - DispatchMessageA • 0x4071f0 - PeekMessageA • 0x4071f4 - ReleaseDC • 0x4071f8 - EnableWindow • 0x4071fc - InvalidateRect • 0x407200 - SendMessageA • 0x407204 - DefWindowProcA • 0x407208 - BeginPaint • 0x40720c - GetClientRect • 0x407210 - FillRect • 0x407214 - DrawTextA • 0x407218 - GetClassInfoA • 0x40721c - DialogBoxParamA • 0x407220 - CharNextA • 0x407224 - ExitWindowsEx • 0x407228 - DestroyWindow • 0x40722c - CreateDialogParamA • 0x407230 - SetTimer • 0x407234 - GetDlgItem • 0x407238 - wsprintfA • 0x40723c - SetForegroundWindow • 0x407240 - ShowWindow • 0x407244 - IsWindow • 0x407248 - LoadImageA • 0x40724c - SetWindowLongA • 0x407250 - SetClipboardData • 0x407254 - EmptyClipboard • 0x407258 - OpenClipboard • 0x40725c - EndPaint • 0x407260 - PostQuitMessage • 0x407264 - FindWindowExA • 0x407268 - SendMessageTimeoutA • 0x40726c - SetWindowTextA 库 GDI32.dll: • 0x40703c - SelectObject • 0x407040 - SetBkMode • 0x407044 - CreateFontIndirectA • 0x407048 - SetTextColor • 0x40704c - DeleteObject • 0x407050 - GetDeviceCaps • 0x407054 - CreateBrushIndirect • 0x407058 - SetBkColor 库 SHELL32.dll: • 0x407158 - SHGetSpecialFolderLocation • 0x40715c - SHGetPathFromIDListA • 0x407160 - SHBrowseForFolderA • 0x407164 - SHGetFileInfoA • 0x407168 - ShellExecuteA • 0x40716c - SHFileOperationA 库 ADVAPI32.dll: • 0x407000 - RegCloseKey • 0x407004 - RegOpenKeyExA • 0x407008 - RegDeleteKeyA • 0x40700c - RegDeleteValueA • 0x407010 - RegEnumValueA • 0x407014 - RegCreateKeyExA • 0x407018 - RegSetValueExA • 0x40701c - RegQueryValueExA • 0x407020 - RegEnumKeyA 库 COMCTL32.dll: • 0x407028 - ImageList_Create • 0x40702c - ImageList_AddMasked • 0x407030 - ImageList_Destroy • 0x407034 - None 库 ole32.dll: • 0x407284 - CoCreateInstance • 0x407288 - CoTaskMemFree • 0x40728c - OleInitialize • 0x407290 - OleUninitialize 库 VERSION.dll: • 0x407274 - GetFileVersionInfoSizeA • 0x407278 - GetFileVersionInfoA • 0x40727c - VerQueryValueA 投放文件 Hinayana.dll 文件名 相关文件 Hinayana.dll C:\Users\test\AppData\Roaming\Hinayana.dll 文件大小 8704 bytes 文件类型 PE32 executable (DLL) (GUI) Intel 80386, for MS Windows MD5 893b9bfaf09e2795f2aeaca7c97eb8bd SHA1 c426245a28ba6191dac71e263c9766f802eae725 SHA256 02a5ee6c9e41b9665f2e6b87bc9352ae7fd8d1257ec058f0133ba5d8e0b98ec8 SHA512 4a80a86b897451e422d062ebc291dcadeded5ac6fe03d4899af69d10dabfda6e6aec5cb030c099815c3a993ea3abb6edb298e67 820ca63f54958f51a5229dc75 Ssdeep 192:70SdeO2y4z94bV+8e5m7fxLT8ihYNpfg:u9ijTxcihYffg Yara 无匹配 VirusTotal 搜索相关分析 System.dll 文件名 相关文件 System.dll C:\Users\test\AppData\Roaming\System.dll 文件大小 11264 bytes 文件类型 PE32 executable (DLL) (GUI) Intel 80386, for MS Windows MD5 883eff06ac96966270731e4e22817e11 SHA1 523c87c98236cbc04430e87ec19b977595092ac8 SHA256 44e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82 SHA512 60333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af 4e91c298ba51e28109a390 Ssdeep 96:UPDYcJ+nx4vVp76JX7zBlkCg21Fxz4THxtrqw1at0JgwLEjo+OB3yUVCdl/wNj+l:UPtkuWJX7zB3kGwfy0nyUVsxCjOMb1u Yara 无匹配 VirusTotal 搜索相关分析 olink.lang.fallback.sequence.xml 文件名 相关文件 olink.lang.fallback.sequence.xml C:\Users\test\AppData\Roaming\olink.lang.fallback.sequence.xml 文件大小 3225 bytes 文件类型 HTML document, ASCII text MD5 a29ae6b99ab34923686b06694320ebe7 SHA1 482a8ada65985d189cbff15166645e74474e2828 SHA256 b83b1ee4a1a47958eb630b285d379b712af80216697e355c61648d4d2797d682 SHA512 3aa51e5e0eb09867e620127d9d5e79c2b9362ac2c2572d63464376f9ea9a0600fd8297eedc254240669f0f92ee18a0b3c4dcf88e 2e9ce6654acf0bddf6ec0b1d Ssdeep 48:B6CatuxO57AOmnr0pNH0AWK+wGtAFheGEWgi2/XUX5Aar8wXACgCcW75wtsXB+Fv:B6Cah578YNUAB+wGtEEi2/5x3tsXoFv Yara 无匹配 VirusTotal 搜索相关分析 htmlhelp.button.jump1.xml 文件名 相关文件 htmlhelp.button.jump1.xml C:\Users\test\AppData\Roaming\htmlhelp.button.jump1.xml 文件大小 931 bytes 文件类型 HTML document, ASCII text MD5 cd4e62cafe8d87d0a9a608877ec10156 SHA1 47ed56c7802d144b9f19de5c3c82720f5ae79564 SHA256 8d507582aeb225c227ce58932cc1956fd612032163c8407d9318bd76fd57d8ce SHA512 d11948ca912a0d78a96da4b431fbbc566bbb697e43878bb26e9c0022a09858e66673c518d9961d7aee0a4c6889c49b5af0e926f 138a37b631a37a457d2ddf2f3 Ssdeep 12:B97AMW3FYpTRynMfamzRIQJaF9t4Y45XMWEtcAWEQ+AVf1mJXWlG6:B97AMv1RyMvzRIbFI1MWEUEvxWlV Yara 无匹配 VirusTotal 搜索相关分析 mgusien.exe 文件名 相关文件 mgusien.exe C:\Users\test\AppData\Local\Temp\mgusien.exe 文件大小 742541 bytes 文件类型 PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive MD5 f3669aa9d7272d0db49bcd97b65ea23b SHA1 9cb87d56e5c51ceb26d9da945a139855329fa549 SHA256 faf62fde4104945b85f6c1381c3009d5f676fe8adf0cd0c2f0e15931f3c41f73 SHA512 97d16c26a144f5dbb9de0360896758936ac064c51358da23db4a3574825cb136cf218a452d603eb4059164f376d5f0a0509e9e99 b5d11271ca6e1960f8d2bb45 Ssdeep 12288:GkirMt70NAthrkeKqt9ICRUBioUwc7Phuuo23IKDIRKYfJf2:GkirAtRtKqzkiNbZ94AYBf2 Yara 无匹配 VirusTotal 搜索相关分析 500-17.htm 文件名 相关文件 500-17.htm C:\Users\test\AppData\Roaming\500-17.htm 文件大小 669371 bytes 文件类型 data MD5 a9880ab8a111de0b335270465edaae39 SHA1 6ed679e0081c66f2d16a11c6960ff534a668a5ba SHA256 4807df85f8f22c49c257467b799d413bd3fdc5e5a83a51562fa14ff20c44b511 SHA512 5d506e11080d43ecf4f2482a01c53ba4c15afae7540b8fde5bf2236aeccc512a24ac0b817f1515bc1be2be7ece1931ff923676d879 74c99a2456ad0dbf0c5ab4 Ssdeep 12288:bedSjCB6xnzHwYiHUGA9UJ0WtTWK2CQeEFkmzJvCOEOR682qT/GAKauD:bedxB6hL/UJtTbLxEFk8vCOEOs8/Gfa6 Yara 无匹配 VirusTotal 搜索相关分析 ArilStealthNephropathy 文件名 相关文件 ArilStealthNephropathy C:\Users\test\AppData\Roaming\ArilStealthNephropathy 文件大小 1521 bytes 文件类型 data MD5 bb42ac656ca8987293e2efa9de95f947 SHA1 6fee95a0c27efa9677fa898535cb084cdde3adad SHA256 57ae5316f8ffb2b2500b1ab4e689ece881d3035acfbe96f1ed11cc12d7c642f4 SHA512 ae0eb17db8386aa3056f2f66fb4c0c98d41ab4e1eadae6d00cc67429a7d4c4f0505357f5cb37d4a5bc59aa1b790ad65bfb4b3ef8a 1c9ffe16f807ce740b487b6 Ssdeep 24:IrPPvwEVGDVGaKto6x8iAOblOIPikwFKjOfhcbpAicvAqS+3VcVIvlc0fiW0HlZs:PEVGDVNKyg8TyPikwF4OJcVA4+Wivlcc Yara 无匹配 VirusTotal 搜索相关分析 appbar.eve 文件名 相关文件 appbar.eve C:\Users\test\AppData\Roaming\appbar.eve 文件大小 3336 bytes 文件类型 ASCII text, with very long lines, with CRLF line terminators MD5 411d6db1d5d113a3a67180a4c397744b SHA1 740b6607247d1effb6f34b0117ed1018179e64c7 SHA256 1cabd4a66164c69b74872badcee0fff5d0965d0cf53b320a13a522b37926c644 SHA512 23b57656501670e0af2c215ac880837755f8c32013ba6017f2a8357e635b701e714f4dfa29d1a7ebf435bb0345347cb1c4a8a1761 d263674b9e19f460d745624 Ssdeep 48:N7FIggjnP6GK1GpU5GDWQ+oHWW7ymn4raYtFbVZVf2p/4/6kkLCx:ZOggjnSGXpLDWQ+MZiaGFbzmkkLG Yara 无匹配 VirusTotal 搜索相关分析 Monochromatic Artistic.hdt 文件名 相关文件 Monochromatic Artistic.hdt C:\Users\test\AppData\Roaming\Monochromatic Artistic.hdt 文件大小 112 bytes 文件类型 data MD5 a7083a1006c7d7fa41dd67dca98384d3 SHA1 0e33d2481903382f702fe77b020c36dc271e82a8 SHA256 03e5f17eb8b361f044dd3f2c4efc6ff51ee3591768f245e74017e3c673f12a39 SHA512 3b0d2718cd44479bfe4f45e6b16cd69d6b27e2e043cd06c98b3a27b838c932f7a1a97e7bce84993ede2bab512df4c1232136facca 4997b9e6a1e07d346083116 Ssdeep 3:bflHlxl3C7HTl/flt3TE/5at/ntu1/nN/kOi9n:brct/Iys1/OV Yara 无匹配 VirusTotal 搜索相关分析 行为分析 互斥量(Mutexes) lahcnybwiiiwgn 执行的命令 "C:\Users\test\AppData\Local\Temp\Factuur_09480602.pdf.exe" 创建的服务 无信息 启动的服务 无信息 进程 Factuur_09480602.pdf.exe PID: 2512, 上一级进程 PID: 2256 Factuur_09480602.pdf.exe PID: 1940, 上一级进程 PID: 2512 访问的文件 \Device\KsecDD C:\Users\test\AppData\Local\Temp\SHFOLDER.DLL C:\Windows\System32\shfolder.dll C:\Users\test\AppData\Local\Temp\ C:\Users\test\AppData\Local\Temp C:\Users\test\AppData\Local\Temp\nsg4FE4.tmp C:\Users\test\AppData\Local\Temp\Factuur_09480602.pdf.exe C:\Users\test\AppData\Local\Temp\nsl5004.tmp C:\Windows\ \??\MountPointManager C:\Users C:\Users\test C:\Users\test\AppData C:\Users\test\AppData\Roaming C:\Users\test\AppData\Roaming\olink.lang.fallback.sequence.xml C:\Users\test\AppData\Roaming\ArilStealthNephropathy C:\Users\test\AppData\Roaming\500-17.htm C:\Users\test\AppData\Roaming\htmlhelp.button.jump1.xml C:\Users\test\AppData\Roaming\Monochromatic Artistic.hdt C:\Users\test\AppData\Roaming\appbar.eve C:\Users\test\AppData\Roaming\Hinayana.dll C:\Users\test\AppData\Roaming\System.dll C:\Users\test\AppData\Local\Temp\System.dll C:\Windows\System32\System.dll C:\Windows\system\System.dll C:\Windows\System.dll C:\Users\test\AppData\Local\Temp\Hinayana.DLL C:\Windows\System32\Hinayana.DLL C:\Windows\system\Hinayana.DLL C:\Windows\Hinayana.DLL C:\ProgramData\*.* C:\ProgramData\Adobe\lcwkzhh C:\ProgramData\alipay\lcwkzhh C:\ProgramData\Baidu\lcwkzhh C:\ProgramData\Microsoft\lcwkzhh C:\ProgramData\Microsoft Help\lcwkzhh C:\Users\test\AppData\Local\Temp\mgusien.exe 读取的文件 \Device\KsecDD C:\Windows\System32\shfolder.dll C:\Users\test\AppData\Local\Temp\nsg4FE4.tmp C:\Users\test\AppData\Local\Temp\Factuur_09480602.pdf.exe C:\Users\test\AppData\Local\Temp\nsl5004.tmp C:\Windows\ C:\Users\test\AppData\Roaming\System.dll C:\Users\test\AppData\Roaming\Hinayana.dll C:\Users\test\AppData\Roaming\500-17.htm C:\Users\test\AppData\Roaming\ArilStealthNephropathy C:\ProgramData\Adobe\lcwkzhh C:\ProgramData\alipay\lcwkzhh C:\ProgramData\Baidu\lcwkzhh C:\ProgramData\Microsoft\lcwkzhh C:\ProgramData\Microsoft Help\lcwkzhh 修改的文件 C:\Users\test\AppData\Local\Temp\nsl5004.tmp C:\Windows\ C:\Users\test\AppData\Roaming\olink.lang.fallback.sequence.xml C:\Users\test\AppData\Roaming\ArilStealthNephropathy C:\Users\test\AppData\Roaming\500-17.htm C:\Users\test\AppData\Roaming\htmlhelp.button.jump1.xml C:\Users\test\AppData\Roaming\Monochromatic Artistic.hdt C:\Users\test\AppData\Roaming\appbar.eve C:\Users\test\AppData\Roaming\Hinayana.dll C:\Users\test\AppData\Roaming\System.dll C:\Users\test\AppData\Local\Temp\mgusien.exe 删除的文件 C:\Users\test\AppData\Local\Temp\nsg4FE4.tmp 注册表键 HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{372941a3-1bd9-11e5-9838806e6f6e6963}\ HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{372941a3-1bd9-11e5-9838806e6f6e6963}\Data HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{372941a3-1bd9-11e5-9838806e6f6e6963}\Generation HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{372941a4-1bd9-11e5-9838806e6f6e6963}\ HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{372941a4-1bd9-11e5-9838806e6f6e6963}\Data HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{372941a4-1bd9-11e5-9838806e6f6e6963}\Generation HKEY_LOCAL_MACHINE\Software\Microsoft\Rpc\Extensions HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Rpc\Extensions\NdrOleExtDLL HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\GRE_Initialize HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableMetaFiles HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid HKEY_CURRENT_USER\Software\Classes HKEY_CURRENT_USER\Software\Classes\AppID\Factuur_09480602.pdf.exe HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\SQMClient\Windows HKEY_LOCAL_MACHINE\Software\Microsoft\SQMClient\Windows HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SQMClient\Windows\CEIPEnable 读取的注册表键 HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{372941a3-1bd9-11e5-9838806e6f6e6963}\Data HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{372941a3-1bd9-11e5-9838806e6f6e6963}\Generation HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{372941a4-1bd9-11e5-9838806e6f6e6963}\Data HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{372941a4-1bd9-11e5-9838806e6f6e6963}\Generation HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Rpc\Extensions\NdrOleExtDLL HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableMetaFiles HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SQMClient\Windows\CEIPEnable 修改的注册表键 无信息 删除的注册表键 无信息 API解析 cryptbase.dll.SystemFunction036 uxtheme.dll.ThemeInitApiHook user32.dll.IsProcessDPIAware shfolder.dll.SHGetFolderPathA setupapi.dll.CM_Get_Device_Interface_List_Size_ExW kernel32.dll.GetUserDefaultUILanguage setupapi.dll.CM_Get_Device_Interface_List_ExW system.dll.Call hinayana.dll.Orthopsychiatry kernel32.dll.GetFileSize kernel32.dll.LocalAlloc kernel32.dll.CreateProcessA kernel32.dll.GetModuleFileNameA kernel32.dll.VirtualAllocEx kernel32.dll.VirtualAlloc kernel32.dll.GetThreadContext kernel32.dll.ReadProcessMemory ntdll.dll.NtUnmapViewOfSection kernel32.dll.WriteProcessMemory kernel32.dll.SetThreadContext kernel32.dll.ResumeThread kernel32.dll.Sleep ole32.dll.CoRevokeInitializeSpy comctl32.dll.#388 ole32.dll.NdrOleInitializeExtension ole32.dll.CoGetClassObject ole32.dll.CoGetMarshalSizeMax ole32.dll.CoMarshalInterface ole32.dll.CoUnmarshalInterface ole32.dll.StringFromIID ole32.dll.CoGetPSClsid ole32.dll.CoTaskMemAlloc ole32.dll.CoTaskMemFree ole32.dll.CoCreateInstance ole32.dll.CoReleaseMarshalData ole32.dll.DcomChannelSetHResult oleaut32.dll.#500 advapi32.dll.UnregisterTraceGuids comctl32.dll.#321 kernel32.dll.FindFirstFileExA kernel32.dll.GetDriveTypeA kernel32.dll.SetEnvironmentVariableA kernel32.dll.CompareStringW kernel32.dll.GetCurrentDirectoryW kernel32.dll.RaiseException kernel32.dll.SetEndOfFile kernel32.dll.GetFileInformationByHandle kernel32.dll.FileTimeToLocalFileTime kernel32.dll.FileTimeToSystemTime kernel32.dll.CreateFileA kernel32.dll.SetConsoleMode kernel32.dll.ReadConsoleInputA kernel32.dll.GetFileAttributesW kernel32.dll.ExitThread kernel32.dll.GetDateFormatA kernel32.dll.GetTimeFormatA kernel32.dll.CreateDirectoryW kernel32.dll.CreateMutexW kernel32.dll.OpenMutexW kernel32.dll.GetModuleHandleW kernel32.dll.WTSGetActiveConsoleSessionId kernel32.dll.CreateProcessW kernel32.dll.OpenProcess kernel32.dll.GetModuleHandleA kernel32.dll.GetProcAddress kernel32.dll.LoadLibraryA kernel32.dll.WideCharToMultiByte kernel32.dll.ExitProcess kernel32.dll.VirtualProtectEx kernel32.dll.VirtualProtect kernel32.dll.FindFirstFileW kernel32.dll.HeapDestroy kernel32.dll.DeleteCriticalSection kernel32.dll.WaitForMultipleObjects kernel32.dll.HeapCreate kernel32.dll.GetDriveTypeW kernel32.dll.InitializeCriticalSection kernel32.dll.GetLogicalDriveStringsW kernel32.dll.SetThreadPriority kernel32.dll.GetTempPathW kernel32.dll.MoveFileExW kernel32.dll.WaitForSingleObject kernel32.dll.CreateThread kernel32.dll.TerminateThread kernel32.dll.MultiByteToWideChar kernel32.dll.GetTimeZoneInformation kernel32.dll.GetUserGeoID kernel32.dll.GetModuleFileNameW kernel32.dll.GetNativeSystemInfo kernel32.dll.GetVersionExW kernel32.dll.GetVersion kernel32.dll.GetCurrentThread kernel32.dll.LocalFree kernel32.dll.GetLastError kernel32.dll.GetCurrentProcess kernel32.dll.Process32NextW kernel32.dll.Process32FirstW kernel32.dll.CreateToolhelp32Snapshot kernel32.dll.DeleteFileW kernel32.dll.SetFileTime kernel32.dll.WriteFile kernel32.dll.SetFilePointer kernel32.dll.GetFileTime kernel32.dll.CloseHandle kernel32.dll.ReadFile kernel32.dll.CreateFileW kernel32.dll.GetCurrentThreadId kernel32.dll.GetCurrentProcessId kernel32.dll.GetTickCount kernel32.dll.GetSystemTimeAsFileTime kernel32.dll.HeapFree kernel32.dll.GetProcessHeap kernel32.dll.FindClose kernel32.dll.FindNextFileW kernel32.dll.LeaveCriticalSection kernel32.dll.HeapReAlloc kernel32.dll.EnterCriticalSection kernel32.dll.SetErrorMode kernel32.dll.VirtualQuery kernel32.dll.CreateIoCompletionPort kernel32.dll.PostQueuedCompletionStatus kernel32.dll.ReleaseSemaphore kernel32.dll.CreateSemaphoreA kernel32.dll.GetQueuedCompletionStatus kernel32.dll.FlushConsoleInputBuffer kernel32.dll.GetVersionExA kernel32.dll.GlobalMemoryStatus kernel32.dll.GetSystemInfo kernel32.dll.FormatMessageW kernel32.dll.CreatePipe kernel32.dll.GetFullPathNameA kernel32.dll.HeapAlloc kernel32.dll.GetSystemDirectoryW kernel32.dll.SetHandleInformation kernel32.dll.PeekNamedPipe kernel32.dll.FlushFileBuffers kernel32.dll.HeapSize kernel32.dll.IsProcessorFeaturePresent kernel32.dll.WriteConsoleW kernel32.dll.GetCommandLineW kernel32.dll.HeapSetInformation kernel32.dll.GetStartupInfoW kernel32.dll.UnhandledExceptionFilter kernel32.dll.SetUnhandledExceptionFilter kernel32.dll.IsDebuggerPresent kernel32.dll.TerminateProcess kernel32.dll.GetCPInfo kernel32.dll.InterlockedIncrement kernel32.dll.InterlockedDecrement kernel32.dll.GetACP kernel32.dll.GetOEMCP kernel32.dll.IsValidCodePage kernel32.dll.TlsAlloc kernel32.dll.TlsGetValue kernel32.dll.TlsSetValue kernel32.dll.TlsFree kernel32.dll.SetLastError kernel32.dll.GetStdHandle kernel32.dll.FreeEnvironmentStringsW kernel32.dll.GetEnvironmentStringsW kernel32.dll.SetHandleCount kernel32.dll.InitializeCriticalSectionAndSpinCount kernel32.dll.GetFileType kernel32.dll.QueryPerformanceCounter kernel32.dll.GetConsoleCP kernel32.dll.GetConsoleMode kernel32.dll.LCMapStringW kernel32.dll.GetStringTypeW kernel32.dll.SetConsoleCtrlHandler kernel32.dll.FreeLibrary kernel32.dll.LoadLibraryW kernel32.dll.RtlUnwind kernel32.dll.SetStdHandle user32.dll.EndPaint user32.dll.DestroyWindow user32.dll.PostQuitMessage user32.dll.SetTimer user32.dll.DefWindowProcW user32.dll.DrawTextW user32.dll.GetDC user32.dll.ReleaseDC user32.dll.MoveWindow user32.dll.ShowWindow user32.dll.SetWindowTextA user32.dll.GetDesktopWindow user32.dll.OemToCharW user32.dll.SetWindowTextW user32.dll.GetWindowTextW user32.dll.GetUserObjectInformationW user32.dll.GetProcessWindowStation user32.dll.SetWindowRgn user32.dll.CreateIconFromResource user32.dll.LoadCursorW user32.dll.RegisterClassExW user32.dll.CreateWindowExW user32.dll.UpdateWindow user32.dll.GetMessageW user32.dll.TranslateMessage user32.dll.DispatchMessageW user32.dll.GetClientRect user32.dll.wsprintfW user32.dll.OpenWindowStationW user32.dll.RedrawWindow user32.dll.FindWindowW user32.dll.FindWindowExW user32.dll.SetThreadDesktop user32.dll.OpenDesktopW user32.dll.UnregisterClassW user32.dll.BeginPaint user32.dll.SendMessageW user32.dll.SetProcessWindowStation gdi32.dll.SetDIBits gdi32.dll.CreateCompatibleDC gdi32.dll.CreateCompatibleBitmap gdi32.dll.CreateRoundRectRgn gdi32.dll.SetBkColor gdi32.dll.CreateFontW gdi32.dll.TextOutW gdi32.dll.GetTextExtentPointW gdi32.dll.SetTextColor gdi32.dll.SetBkMode gdi32.dll.BitBlt gdi32.dll.GetTextExtentPoint32W gdi32.dll.SelectObject advapi32.dll.SetSecurityDescriptorGroup advapi32.dll.CryptSetHashParam advapi32.dll.CryptReleaseContext advapi32.dll.CryptSignHashA advapi32.dll.CryptAcquireContextA advapi32.dll.CryptCreateHash advapi32.dll.CreateProcessAsUserW advapi32.dll.DuplicateTokenEx advapi32.dll.RegSetValueExW advapi32.dll.RegCreateKeyExW advapi32.dll.AdjustTokenPrivileges advapi32.dll.LookupPrivilegeValueW advapi32.dll.GetUserNameW advapi32.dll.CryptAcquireContextW advapi32.dll.FreeSid advapi32.dll.AccessCheck advapi32.dll.IsValidSecurityDescriptor advapi32.dll.SetSecurityDescriptorOwner advapi32.dll.SetSecurityDescriptorDacl advapi32.dll.AddAccessAllowedAce advapi32.dll.InitializeAcl advapi32.dll.GetLengthSid advapi32.dll.InitializeSecurityDescriptor advapi32.dll.AllocateAndInitializeSid advapi32.dll.DuplicateToken advapi32.dll.OpenThreadToken advapi32.dll.GetSidSubAuthority advapi32.dll.GetTokenInformation advapi32.dll.OpenProcessToken advapi32.dll.RegCloseKey advapi32.dll.RegQueryValueExA advapi32.dll.RegOpenKeyExA advapi32.dll.CryptGenRandom advapi32.dll.CryptDestroyKey advapi32.dll.CryptDecrypt advapi32.dll.CryptDestroyHash shell32.dll.ShellExecuteW shell32.dll.SHGetFolderPathW shell32.dll.ShellExecuteA ole32.dll.CoUninitialize ole32.dll.CoInitializeSecurity ole32.dll.CoInitialize ole32.dll.CoInitializeEx oleaut32.dll.#2 ws2_32.dll.#7 ws2_32.dll.#2 ws2_32.dll.#21 ws2_32.dll.#112 ws2_32.dll.#22 ws2_32.dll.#20 ws2_32.dll.#17 ws2_32.dll.WSAIoctl ws2_32.dll.#13 ws2_32.dll.#1 ws2_32.dll.#111 ws2_32.dll.#15 ws2_32.dll.#6 ws2_32.dll.#52 ws2_32.dll.#8 ws2_32.dll.#9 ws2_32.dll.#116 ws2_32.dll.#57 ws2_32.dll.#23 ws2_32.dll.getaddrinfo ws2_32.dll.#4 ws2_32.dll.freeaddrinfo ws2_32.dll.#19 ws2_32.dll.#18 ws2_32.dll.#10 ws2_32.dll.#16 ws2_32.dll.#11 ws2_32.dll.#3 ws2_32.dll.#14 ws2_32.dll.#115 wtsapi32.dll.WTSQueryUserToken wtsapi32.dll.WTSFreeMemory wtsapi32.dll.WTSEnumerateSessionsW comctl32.dll.InitCommonControlsEx wininet.dll.InternetOpenA wininet.dll.InternetConnectA wininet.dll.HttpOpenRequestA wininet.dll.InternetSetOptionA wininet.dll.HttpSendRequestA wininet.dll.InternetReadFile wininet.dll.InternetCloseHandle crypt32.dll.CertFreeCertificateContext kernel32.dll.FlsAlloc kernel32.dll.FlsGetValue kernel32.dll.FlsSetValue kernel32.dll.FlsFree sechost.dll.LookupAccountNameLocalW advapi32.dll.LookupAccountSidW sechost.dll.LookupAccountSidLocalW sspicli.dll.GetUserNameExW xmllite.dll.CreateXmlWriter xmllite.dll.CreateXmlWriterOutputWithEncodingName ©2016 上海魔盾信息科技有限公司