1.1 Searching for user-mode API hooks
Analysis: kernel32.dll, export table found in section .rdata
Function kernel32.dll:ReadConsoleInputExA (1133) intercepted, method - ProcAddressHijack.GetProcAddress ->76BBDD24->7619EBC0
Function kernel32.dll:ReadConsoleInputExW (1134) intercepted, method - ProcAddressHijack.GetProcAddress ->76BBDD57->7619EBF0
Analysis: ntdll.dll, export table found in section .text
Function ntdll.dll:NtCreateFile (296) intercepted, method - ProcAddressHijack.GetProcAddress ->77322FA0->6DC925C0
Function ntdll.dll:NtSetInformationFile (600) intercepted, method - ProcAddressHijack.GetProcAddress ->77322CC0->6DC92720
Function ntdll.dll:NtSetValueKey (632) intercepted, method - ProcAddressHijack.GetProcAddress ->77323050->6DC92790
Function ntdll.dll:ZwCreateFile (1841) intercepted, method - ProcAddressHijack.GetProcAddress ->77322FA0->6DC925C0
Function ntdll.dll:ZwSetInformationFile (2143) intercepted, method - ProcAddressHijack.GetProcAddress ->77322CC0->6DC92720
Function ntdll.dll:ZwSetValueKey (2175) intercepted, method - ProcAddressHijack.GetProcAddress ->77323050->6DC92790
Analysis: user32.dll, export table found in section .text
Function user32.dll:CallNextHookEx (1536) intercepted, method - ProcAddressHijack.GetProcAddress ->752CB6D0->6DC924B0
Function user32.dll:SetWindowsHookExW (2399) intercepted, method - ProcAddressHijack.GetProcAddress ->752D0900->6DC92800
Analysis: advapi32.dll, export table found in section .text
Function advapi32.dll:CveEventWrite (1234) intercepted, method - ProcAddressHijack.GetProcAddress ->76356812->761A15C0
Function advapi32.dll:I_ScRegisterPreshutdownRestart (1387) intercepted, method - ProcAddressHijack.GetProcAddress ->76357739->7525C140
Analysis: ws2_32.dll, export table found in section .text
Analysis: wininet.dll, export table found in section .text
Analysis: rasapi32.dll, export table found in section .text
Analysis: urlmon.dll, export table found in section .text
Analysis: netapi32.dll, export table found in section .text
Function netapi32.dll:NetFreeAadJoinInformation (130) intercepted, method - ProcAddressHijack.GetProcAddress ->6CBAD14A->6CB21560
Function netapi32.dll:NetGetAadJoinInformation (131) intercepted, method - ProcAddressHijack.GetProcAddress ->6CBAD179->6CB218E0
1.4 Searching for masking processes and drivers
Checking not performed: extended monitoring driver (AVZPM) is not installed
2. Scanning RAM
Number of processes found: 8
Number of modules loaded: 138
Scanning RAM - complete
3. Scanning disks
Direct reading: C:\ProgramData\Huorong\Sysdiag\scenter\sca69E5.tmp
Direct reading: C:\ProgramData\Huorong\Sysdiag\scenter\sca6CA5.tmp
Direct reading: C:\ProgramData\Huorong\Sysdiag\scenter\sca6DFE.tmp
Direct reading: C:\Users\XXXXXXX\AppData\Local\Microsoft\Windows\Explorer\IconCacheToDelete\icn51CA.tmp
Direct reading: C:\Users\XXXXXXX\AppData\Local\Microsoft\Windows\Explorer\IconCacheToDelete\icn51E4.tmp
Direct reading: C:\Users\XXXXXXX\AppData\Local\Microsoft\Windows\Explorer\IconCacheToDelete\icn51E6.tmp
Direct reading: C:\Users\XXXXXXX\AppData\Local\Microsoft\Windows\Explorer\IconCacheToDelete\icn51E7.tmp
Direct reading: C:\Users\XXXXXXX\AppData\Local\Microsoft\Windows\Explorer\IconCacheToDelete\icn51E8.tmp
Direct reading: C:\Users\XXXXXXX\AppData\Local\Temp\79c2c505-b0e4-4d06-8200-9fa0cb001c60.tmp
Direct reading: C:\Users\XXXXXXX\AppData\Local\Temp\cb838d5f-8b06-49d6-8771-6f27136fc352.tmp
Direct reading: F:\baidu\BaiduNetdisk\YunUtilityService.exe
4. Checking Winsock Layered Service Provider (SPI/LSP)
LSP settings checked. No errors detected
5. Searching for keyboard/mouse/windows events hooks (Keyloggers, Trojan DLLs)
6. Searching for opened TCP/UDP ports used by malicious software
Checking - disabled by user
7. Heuristic system check
Search settings IE using Policies [x64] HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0E7B197B-A3DE-4FD4-A19A-1EECF791D16F}, SuggestionsURL_JSON="http://suggestion.baidu.com/su?wd={searchTerms}&action=opensearch&ie={inputEncoding}&from=ie8"
Search settings IE using Policies [x32] HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0E7B197B-A3DE-4FD4-A19A-1EECF791D16F}, SuggestionsURL_JSON="http://suggestion.baidu.com/su?wd={searchTerms}&action=opensearch&ie={inputEncoding}&from=ie8"
Checking - complete
8. Searching for vulnerabilities
>> Services: potentially dangerous service allowed: TermService (Remote Desktop Services)
> Services: please bear in mind that the set of services depends on the use of the PC (home PC, office PC connected to corporate network, etc)!
Checking - complete
9. Troubleshooting wizard
>> Process termination timeout is out of admissible values
>> Starting Windows Media Center is blocked
Checking - complete
Files scanned: 96327, extracted from archives: 14230, malicious software found 0, suspicions - 0
Scanning finished at 27.07.2023 10:46:23
-------------------------------------------------------
火绒剑还要厉害,提示不少10多个文件被挂钩子
|