VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:10
Behavior list
Basic Information
MD5:08fa5fa2676f63824020030b8dba65e4
file type:EXE
Production company:
version:
Shell or compiler information:COMPILER:Microsoft Visual C++ 6.0 [Overlay]
Key behavior
Behavior description:跨进程写入数据
details:C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\alg.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Tencent\QQ\Bin\QQ.exe
C:\Program Files\Tencent\QQ\Bin\TXPlatform.exe
C:\WINDOWS\system32\conime.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\%temp%\1436291568.721609.exe
C:\%temp%\1436291568.781146.exe
Behavior description:创建远程线程
details:C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\explorer.exe
Behavior description:设置线程上下文
details:C:\%temp%\1436291558.131885.exe
Behavior description:内存映射方式修改可执行文件
details:\device\harddiskvolume1\windows\system32\userinit.exe
Behavior description:关闭系统文件保护
details:N/A
Behavior description:跨进程写代码段数据
details:C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00401A25, EntryPoint = 0x00401A25
Behavior description:写权限映射文件
details:\WINDOWS\system32\userinit.exe
CiceroSharedMemDefaultS-1-5-21-1482476501-1645522239-1417001333-500
MSCTF.MarshalInterface.FileMap.AEH.NB.CHAIF
MSCTF.MarshalInterface.FileMap.AEH.OB.CHAIF
MSCTF.MarshalInterface.FileMap.AEH.PB.CHAIF
MSCTF.MarshalInterface.FileMap.AEH.AC.CHAIF
MSCTF.MarshalInterface.FileMap.AEH.BC.CHAIF
MSCTF.MarshalInterface.FileMap.AEH.CC.CHAIF
MSCTF.MarshalInterface.FileMap.AEH.DC.CHAIF
MSCTF.MarshalInterface.FileMap.AEH.EC.CHAIF
MSCTF.MarshalInterface.FileMap.AEH.FC.DPCIF
MSCTF.MarshalInterface.FileMap.AEH.GC.DPCIF
MSCTF.MarshalInterface.FileMap.AEH.HC.DPCIF
MSCTF.MarshalInterface.FileMap.AEH.IC.DPCIF
MSCTF.MarshalInterface.FileMap.AEH.JC.DPCIF
Behavior description:通过内存映射跨进程修改内存
details:TargetProcess = [System Process]
TargetProcess = sample.exe
TargetProcess = iexplore.exe
Behavior description:查找反病毒常用工具窗口
details:NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]
Behavior description:按名称获取主机地址
details:ilo.brenz.pl
momox89x.zapto.org
ant.trenz.pl
Process behavior
Behavior description:创建进程
details:ImagePath = C:\Program Files\Internet Explorer\IEXPLORE.EXE, CmdLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
Behavior description:创建新文件进程
details:ImagePath = c:\%temp%\1436291553.266695.exe, CmdLine = "c:\%temp%\1436291553.266695.exe"
Behavior description:跨进程写入数据
details:C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\alg.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Tencent\QQ\Bin\QQ.exe
C:\Program Files\Tencent\QQ\Bin\TXPlatform.exe
C:\WINDOWS\system32\conime.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\%temp%\1436291568.721609.exe
C:\%temp%\1436291568.781146.exe
Behavior description:创建远程线程
details:C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\explorer.exe
Behavior description:设置线程上下文
details:C:\%temp%\1436291558.131885.exe
Behavior description:枚举进程
details:N/A
Behavior description:跨进程写代码段数据
details:C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00401A25, EntryPoint = 0x00401A25
Behavior description:通过内存映射跨进程修改内存
details:TargetProcess = [System Process]
TargetProcess = sample.exe
TargetProcess = iexplore.exe
File behavior
Behavior description:写权限映射文件
details:\WINDOWS\system32\userinit.exe
CiceroSharedMemDefaultS-1-5-21-1482476501-1645522239-1417001333-500
MSCTF.MarshalInterface.FileMap.AEH.NB.CHAIF
MSCTF.MarshalInterface.FileMap.AEH.OB.CHAIF
MSCTF.MarshalInterface.FileMap.AEH.PB.CHAIF
MSCTF.MarshalInterface.FileMap.AEH.AC.CHAIF
MSCTF.MarshalInterface.FileMap.AEH.BC.CHAIF
MSCTF.MarshalInterface.FileMap.AEH.CC.CHAIF
MSCTF.MarshalInterface.FileMap.AEH.DC.CHAIF
MSCTF.MarshalInterface.FileMap.AEH.EC.CHAIF
MSCTF.MarshalInterface.FileMap.AEH.FC.DPCIF
MSCTF.MarshalInterface.FileMap.AEH.GC.DPCIF
MSCTF.MarshalInterface.FileMap.AEH.HC.DPCIF
MSCTF.MarshalInterface.FileMap.AEH.IC.DPCIF
MSCTF.MarshalInterface.FileMap.AEH.JC.DPCIF
Behavior description:内存映射方式修改可执行文件
details:\device\harddiskvolume1\windows\system32\userinit.exe
Behavior description:创建可执行文件
details:C:\Program Files\Bifrost\server.exe
Network behavior
Behavior description:发送一个已连接的套接字数据
details:SOCKET = 0x0000049c, TotalSize = 20, Offset = 0, ReadSize = 20.
SOCKET = 0x0000049c, TotalSize = 40, Offset = 0, ReadSize = 40.
SOCKET = 0x00000134, TotalSize = 261, Offset = 0, ReadSize = 261.
SOCKET = 0x00000134, TotalSize = 284, Offset = 0, ReadSize = 284.
SOCKET = 0x00000134, TotalSize = 246, Offset = 0, ReadSize = 246.
SOCKET = 0x00000490, TotalSize = 20, Offset = 0, ReadSize = 20.
SOCKET = 0x00000490, TotalSize = 40, Offset = 0, ReadSize = 40.
Behavior description:建立到一个指定的套接字连接
details:219.133.40.1:80
219.133.40.1:81
Behavior description:按名称获取主机地址
details:ilo.brenz.pl
momox89x.zapto.org
ant.trenz.pl
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\\??\C:\WINDOWS\system32\winlogon.exe
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-21-1482476501-1645522239-1417001333-500\RefCount
\REGISTRY\MACHINE\SOFTWARE\Bifrost\nck
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Bifrost\klg
Behavior description:修改注册表_系统动态组件
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9D71D88C-C598-4935-C5D1-43AA4DB90836}\stubpath
Other behavior
Behavior description:创建互斥体
details:Bif1234
CTF.LBES.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Compart.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Asm.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Layouts.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TMD.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TimListCache.FMPDefaultS-1-5-21-1482476501-1645522239-1417001333-500MUTEX.DefaultS-1-5-21-1482476501-1645522239-1417001333-500
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [,The Wireshark Network Analyzer]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [OleMainThreadWndClass,]
Behavior description:枚举窗口
details:N/A
Behavior description:获取系统权限
details:SE_DEBUG_PRIVILEGE
Behavior description:关闭系统文件保护
details:N/A
Behavior description:查找反病毒常用工具窗口
details:NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]
Abnormal crash
Behavior description:创建互斥体
details:Bif1234
CTF.LBES.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Compart.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Asm.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Layouts.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TMD.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TimListCache.FMPDefaultS-1-5-21-1482476501-1645522239-1417001333-500MUTEX.DefaultS-1-5-21-1482476501-1645522239-1417001333-500
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [,The Wireshark Network Analyzer]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [OleMainThreadWndClass,]
Behavior description:枚举窗口
details:N/A
Behavior description:获取系统权限
details:SE_DEBUG_PRIVILEGE
Behavior description:关闭系统文件保护
details:N/A
Behavior description:查找反病毒常用工具窗口
details:NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号