查杀引擎 | 查杀结果 | 查杀时间 | 查杀版本 |
---|---|---|---|
McAfee | GenericRXIW-NR!DA39A171C75F | 20191019 | 6.0.6.653 |
Alibaba | 20190527 | 0.3.0.5 | |
CrowdStrike | 20190702 | 1.0 | |
Baidu | 20190318 | 1.0.0.2 | |
Avast | Win32:Malware-gen | 20191019 | 18.4.3895.0 |
Tencent | 20191019 | 1.0.0.1 | |
Kingsoft | 20191019 | 2013.8.14.323 |
Time & API | Arguments | Status | Return | Repeated |
---|---|---|---|---|
1621006491.168499 GetComputerNameW |
computer_name:
OSKAR-PC
|
success | 1 | 0 |
1621006491.246499 GetComputerNameW |
computer_name:
OSKAR-PC
|
success | 1 | 0 |
section | .gfids |
resource name | ZIPRES |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://i.haotukankan.com/tui/tpop/tpop4/tpop.xml | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://hotnews.dftoutiao.com/hotwordsnews/getnews?qid=haotutitle&platform=pc&newstype=now |
request | GET http://i.haotukankan.com/tui/tpop/tpop4/tpop.xml |
request | GET http://hotnews.dftoutiao.com/hotwordsnews/getnews?qid=haotutitle&platform=pc&newstype=now |
request | GET http://news.7654.com/tpop4/haotushtpop4/2.html?qid=&env=0&quid=24AEBD0FDEFA6370B2156096BB11532E&titleNews=%e5%9b%bd%e5%ae%b6%e5%8d%ab%e5%81%a5%e5%a7%94%e6%b4%be%e5%87%ba%e4%b8%93%e5%ae%b6%e7%bb%84%e5%89%8d%e5%be%80%e5%ae%89%e5%be%bd&tuid=24AEBD0FDEFA6370B2156096BB11532E&1621008895 |
request | GET http://news.7654.com/tpop4/haotushtpop4/statics/kuaiya_new/css/reset.css?1609137003 |
request | GET http://news.7654.com/tpop4/haotushtpop4/statics/tpop1130/css/news.css?1609137003 |
request | GET http://news.7654.com/tpop4/haotushtpop4/statics/jquery.js?1609137003 |
request | GET http://tt-img.7654.com/image/285cb44d6b67a338d91f44fa605e366f?imageMogr2/crop/144x86 |
request | GET http://news.7654.com/tpop4/haotushtpop4/statics/tpop1130/imgs/close.png |
request | GET http://news.7654.com/tpop4/haotushtpop4/statics/js/jquery.xdomainrequest.min.js?1609137003 |
request | GET http://news.7654.com/tpop4/haotushtpop4/statics/tpop1130/js/base64.js?1609137003 |
request | GET http://news.7654.com/tpop4/haotushtpop4/statics/tpop1130/js/tpop.js?1609137003 |
request | GET http://show.g.mediav.com/s?type=1&of=4&newf=1&showid=UIFwyR&uid=16210089051062298&reqtimes=1&impct=2&jsonp=jQuery19108689790511174189_1621008903574&_=1621008903575 |
request | GET http://news.7654.com/tpop4/haotushtpop4/statics/imgs/logo_haotu.png |
request | GET http://max-l.mediav.com/rtb?type=2&v=CGQSEDE1NTczNmU0ZWFiMTA0MWIYiaOOASC0k0EoAWIXMjI2MjM1MDI3NTEzNjE1MTQwNTAwMjFwAYgBAJoBEDE1NTczNmU0ZWFiMTA4MWKiARAxNTU3MzZlNGVhYjEwNDFi&k=Jp8ZVwAAAAA=&ver=1&exp=EABDEgBDIABDNQBDQABDVABDcgBDggBDIAJDQAJDBQBECQBECQFENwJERQJEYgJE&w=AAAAAGCeKJMAAAAAAAPPMIlf-dT4wZct0374nw&i=alrRnuGEzDVE&st=__EVENT_TIME_START__&et=__EVENT_TIME_END__ |
request | GET http://g1xd.mediav.com/s?type=1&r=20&tid=MjI2MjM1MDI3NTEzNjE1MTQwNTAwMjE&finfo=DAABCAABAAAAIQgAAgAAAAQEAAM/gOc/otTkSQAIAAIAAAADCgADJeRSPHeyEAsIAAQAAAAEBgAGLbcGAAoAAAoADwAAAAAABQkQAA&mv_ref=news.7654.com&enup=CAABOzJVEwgAAhNVMjsA&mvid=MjI2MjM1MDI3NTEzNjE1MTQwNTAwMjE&bid=155736e4eab1041b&ugi=FeimggEVjKJjTBUCFZQCFZgCFQAAFd+TmrYDFoAIFcgBFoCr6OmpkeEFHBadgKfYh57fg+wBFQAAJbH758QPAA&uai=FZLGnAIlCBUCFtrdgLuPyaTkSxXyCCWUg7SvDyUAFRoUABwW9Nn7r9uPwvx4FQAAAA&ubi=FaKGhAEVhJXEAxWkosscFY7C5GAVBBUcFqyMmcQYFtrdlaKZj6nkSzQCFqKgkIDAAiUGFYC63Y4HFeQOFQAkFBbTtL63oryQhJUBFQAl5gIVDBUMFQIXAAAAAJpCor8A&ds=1&price=AAAAAGCeKJMAAAAAAAPPFjwgeqhBUQHyyWnlgQ== |
request | GET http://max-l.mediav.com/rtb?type=2&v=CGQSEDE1NTczNmU0ZWFiMTA0MWIYiaOOASC0k0EoAmIXMjI2MjM1MDI3NTEzNjE1MTQwNTAwMjFwAYgBAJoBEDE1NTczNmU0ZWFiMTA4MWKiARAxNTU3MzZlNGVhYjEwNDFi&k=J8EmOQAAAAA=&ver=1&exp=EABDEgBDIABDNQBDQABDVABDcgBDggBDIAJDQAJDBQBECQBECQFENwJERQJEYgJE&w=AAAAAGCeKJMAAAAAAAPPaZ6kbguPBZlh4ofL0A&i=al6RnuGEzDVm&st=__EVENT_TIME_START__&et=__EVENT_TIME_END__ |
request | GET http://g1xd.mediav.com/s?type=1&r=20&tid=MjI2MjM1MDI3NTEzNjE1MTQwNTAwMjE&finfo=DAABCAABAAAABwgAAgAAAAMEAAM/Yg6bqxgXMgAIAAIAAAADCgADJeRbVWLKSl4IAAQAAAADBgAGLbcGAAoAAAoADwAAAAAAARFwAA&mv_ref=news.7654.com&enup=CAABOzJVEwgAAhNVMjsA&mvid=MjI2MjM1MDI3NTEzNjE1MTQwNTAwMjE&bid=155736e4eab1041b&ugi=FeimggEVjKJjTBUCFZQCFZgCFQAAFd+TmrYDFoAIFcgBFoCr6OmpkeEFHBadgKfYh57fg+wBFQAAJbH758QPAA&uai=FZLGnAIlCBUCFtrdgLuPyaTkSxXyCCWUg7SvDyUAFRoUABwW9Nn7r9uPwvx4FQAAAA&ubi=FfSLggEV6tbEAxXK8s0cFZS86GAVBBUcFtjcoL4YFtrdqomj1a3kSzQEFqKgkIDAAiUGFZzH4vYHFeQOFQAkFBaywJyHnPTa9bEBFQAlpAIVCBUMFQIXAAAAgORhmr8A&ds=2&price=AAAAAGCeKJMAAAAAAAPPT0r9eBnXH4hccDeOQQ== |
request | GET http://s3m5.fenxi.com/galileo/ac6a34648a9723474dbcea56daafeb9b.jpg |
request | GET http://s3m4.fenxi.com/galileo/53a2b3c1f5c06094821753c62214d370-rs_small.gif |
request | GET http://ocsp.globalsign.com/rootr1/MEwwSjBIMEYwRDAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCCwQAAAAAAURO8EJH |
request | GET http://ocsp2.globalsign.com/gsorganizationvalsha2g2/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBQMnk2cPe3vhNiR6XLHz4QGvBl7BwQUlt5h8b0cFilTHMDMfTuDAEDmGnwCDBhyuElvTh7HbtMMiw%3D%3D |
request | GET https://hm.baidu.com/hm.js?cbb8eca4662b5865ba0f0a501ba84561 |
request | GET https://hm.baidu.com/hm.gif?cc=1&ck=1&cl=32-bit&ds=800x600&vl=377&et=0&ja=1&ln=zh-cn&lo=0&rnd=1299522948&si=cbb8eca4662b5865ba0f0a501ba84561&v=1.2.80&lv=1&sn=697&r=0&ww=396&ct=!!&u=http%3A%2F%2Fnews.7654.com%2Ftpop4%2Fhaotushtpop4%2F2.html%3Fqid%3D%26env%3D0%26quid%3D24AEBD0FDEFA6370B2156096BB11532E%26titleNews%3D%25e5%259b%25bd%25e5%25ae%25b6%25e5%258d%25ab%25e5%2581%25a5%25e5%25a7%2594%25e6%25b4%25be%25e5%2587%25ba%25e4%25b8%2593%25e5%25ae%25b6%25e7%25bb%2584%25e5%2589%258d%25e5%25be%2580%25e5%25ae%2589%25e5%25be%25bd%26tuid%3D24AEBD0FDEFA6370B2156096BB11532E%261621008895&tt=%E5%A5%BD%E5%9B%BE%E6%96%B0%E9%97%BB |
name | RT_MENU | language | LANG_CHINESE | offset | 0x00188068 | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | size | 0x0000001c | ||||||||||||||||||
name | RT_MENU | language | LANG_CHINESE | offset | 0x00188068 | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | size | 0x0000001c | ||||||||||||||||||
name | RT_DIALOG | language | LANG_CHINESE | offset | 0x00188098 | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | size | 0x00000114 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | offset | 0x0019a0f8 | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | size | 0x0000003c | ||||||||||||||||||
name | RT_ACCELERATOR | language | LANG_CHINESE | offset | 0x00188088 | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | size | 0x00000010 | ||||||||||||||||||
name | RT_VERSION | language | LANG_CHINESE | offset | 0x001881b0 | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | size | 0x00000278 |
file | C:\Users\Administrator.Oskar-PC\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6ZOR341Z\base64[1].js |
file | C:\Users\Administrator.Oskar-PC\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JSSP0KXB\tpop[1].js |
file | C:\Users\Administrator.Oskar-PC\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\X6VHVO8H\jquery[1].js |
file | C:\Users\Administrator.Oskar-PC\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JSSP0KXB\hm[1].js |
file | C:\Users\Administrator.Oskar-PC\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JSSP0KXB\jquery.xdomainrequest.min[1].js |
Time & API | Arguments | Status | Return | Repeated |
---|---|---|---|---|
1621006494.262499 GetAdaptersAddresses |
flags:
0
family: 0 |
failed | 111 | 0 |
entropy | 7.570457710338706 | section | {'size_of_data': '0x00018400', 'virtual_address': '0x00182000', 'entropy': 7.570457710338706, 'name': '.rsrc', 'virtual_size': '0x000183b8'} | description | A section with a high entropy has been found |
host | 104.16.236.79 | |||
host | 104.18.87.101 | |||
host | 113.108.239.196 | |||
host | 172.217.24.14 |
Time & API | Arguments | Status | Return | Repeated |
---|---|---|---|---|
1621006490.996499 EnumServicesStatusW |
service_handle:
0x0093a648
service_type: 59 service_status: 1 |
failed | 0 | 0 |
registry | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL\da39a171c75fcc4705e0341dba534105.exe |
registry | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING \da39a171c75fcc4705e0341dba534105.exe |
registry | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\da39a171c75fcc4705e0341dba534105.exe |
registry | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SCRIPTURL_MITIGATION\da39a171c75fcc4705e0341dba534105.exe |
registry | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT\da39a171c75fcc4705e0341dba534105.exe |
registry | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_IVIEWOBJECTDRAW_DMLT9_WITH_GDI \da39a171c75fcc4705e0341dba534105.exe |
registry | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_STATUS_BAR_THROTTLING\da39a171c75fcc4705e0341dba534105.exe |
registry | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS\da39a171c75fcc4705e0341dba534105.exe |
registry | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_NINPUT_LEGACYMODE\da39a171c75fcc4705e0341dba534105.exe |
registry | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_DOCUMENT_ZOOM\da39a171c75fcc4705e0341dba534105.exe |
registry | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SPELLCHECKING\da39a171c75fcc4705e0341dba534105.exe |
registry | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\da39a171c75fcc4705e0341dba534105.exe |
registry | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT\da39a171c75fcc4705e0341dba534105.exe |
registry | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBSOCKET\da39a171c75fcc4705e0341dba534105.exe |
registry | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_AJAX_CONNECTIONEVENTS\da39a171c75fcc4705e0341dba534105.exe |