本帖最后由 墨家小子 于 2015-12-25 10:19 编辑
SHA256: 6fb3edacf6eabc50836725e956edbd1b450abb1e208b5db466243d2ae51e5d2d
File name: tmp9EDE.tmp.exe
Detection ratio: 6 / 54
Analysis date: 2015-12-25 02:13:25 UTC ( 1 minute ago )
https://www.virustotal.com/en/fi ... nalysis/1451009605/
2015/12/25 10:15:23,C:\Windows\explorer.exe,53,Allowed ;执行应用程序 ("C:\Users\AA\Desktop\1\tmp9EDE.tmp.exe" )
2015/12/25 10:15:25,C:\Users\AA\Desktop\1\tmp9EDE.tmp.exe,53,Allowed ;执行应用程序 ("C:\Windows\System32\cmd.exe" /c PING 8.8.8.8 -n 5 > nul)
2015/12/25 10:15:26,C:\Windows\SysWOW64\cmd.exe,53,Allowed ;执行应用程序 (PING 8.8.8.8 -n 5 )
2015/12/25 10:15:27,C:\Windows\SysWOW64\PING.EXE,48,Allowed ;出站网络访问
2015/12/25 10:15:32,C:\Users\AA\Desktop\1\tmp9EDE.tmp.exe,47,Allowed ;创建交换数据流 (C:\Users\AA\Desktop\1\tmp9EDE.tmp.exe:Zone.Identifier)
2015/12/25 10:15:35,C:\Users\AA\Desktop\1\tmp9EDE.tmp.exe,53,Allowed ;执行应用程序 ("C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe" "C:\Users\AA\Desktop\1\tmp9EDE.tmp.exe" "C:\Users\AA\AppData\Roaming\vrg4zna4.bfe.exe")
2015/12/25 10:15:37,C:\Users\AA\Desktop\1\tmp9EDE.tmp.exe,53,Allowed ;执行应用程序 ("C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe" "C:\Users\AA\Desktop\1\tmp9EDE.tmp.exe" "C:\Users\AA\AppData\Roaming\vrg4zna4.bfe.exe")
2015/12/25 10:15:44,C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe,53,Allowed ;执行应用程序 ("C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\AA\AppData\Local\Temp\zg2mkobo.cmdline")
2015/12/25 10:15:44,C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe,53,Allowed ;执行应用程序 (\??\C:\windows\system32\conhost.exe 0xffffffff)
2015/12/25 10:15:44,C:\Windows\System32\conhost.exe,40,Allowed ;以修改权限打开进程或线程 (csc.exe(pid=6012))
2015/12/25 10:15:49,C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe,53,Allowed ;执行应用程序 (C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\AA\AppData\Local\Temp\RES5191.tmp" "c:\Users\AA\AppData\Roaming\CSC53B817A7B10644E6B932491214E1182.TMP")
2015/12/25 10:15:51,C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe,41,Blocked ;修改受保护的文件 (C:\Users\AA\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bbjadfvl.p0p.url)
2015/12/25 10:15:52,C:\Users\AA\Desktop\1\tmp9EDE.tmp.exe,53,Allowed ;执行应用程序 ("C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe")
2015/12/25 10:15:55,C:\Users\AA\Desktop\1\tmp9EDE.tmp.exe,53,Allowed ;执行应用程序 ("C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe")
2015/12/25 10:15:57,C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe,11,Blocked ;记录键盘输入
2015/12/25 10:15:59,C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe,53,Allowed ;执行应用程序 ("C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\AA\AppData\Local\Temp\41vsywcq.cmdline")
2015/12/25 10:15:59,C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe,53,Allowed ;执行应用程序 (\??\C:\windows\system32\conhost.exe 0xffffffff)
2015/12/25 10:15:59,C:\Windows\System32\conhost.exe,40,Allowed ;以修改权限打开进程或线程 (csc.exe(pid=5568))
2015/12/25 10:16:00,C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe,50,Allowed ;使用 DNS 解析服务访问网络
2015/12/25 10:16:02,C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe,53,Allowed ;执行应用程序 (C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\AA\AppData\Local\Temp\RES8C58.tmp" "c:\Users\AA\AppData\Local\Temp\CSCC8AB9309A79746DF8F592EEBF5CFB69E.TMP")
2015/12/25 10:16:06,C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe,48,Blocked ;出站网络访问
2015/12/25 10:16:09,C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe,53,Allowed ;执行应用程序 ("C:\Users\AA\AppData\Local\Temp\41vsywcq.exe" )
2015/12/25 10:16:13,C:\Users\AA\AppData\Local\Temp\41vsywcq.exe,53,Allowed ;执行应用程序 ("C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe" )
2015/12/25 10:16:13,C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe,53,Allowed ;执行应用程序 (\??\C:\windows\system32\conhost.exe 0xffffffff)
2015/12/25 10:16:13,C:\Windows\System32\conhost.exe,40,Allowed ;以修改权限打开进程或线程 (ilasm.exe(pid=9708))
|