VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:84
Behavior list
Basic Information
MD5:1eb950f823cd434f15e5963a76576ff0
file type:EXE
Production company:Sysinternals
version:2.9.0.0---2.9
Shell or compiler information:COMPILER:Microsoft Visual C++ 6.0 [Overlay]
Key behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-*
MSCTF.MarshalInterface.FileMap.MBB..ECHGH
MSCTF.MarshalInterface.FileMap.MBB.B.ECHGH
MSCTF.MarshalInterface.FileMap.MBB.C.ECHGH
MSCTF.MarshalInterface.FileMap.MBB.D.ECHGH
MSCTF.MarshalInterface.FileMap.MBB.E.ECHGH
MSCTF.MarshalInterface.FileMap.MBB.F.ECHGH
MSCTF.MarshalInterface.FileMap.MBB.G.ECHGH
MSCTF.Shared.SFM.MBB
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:自删除
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1446361439.332341.exe
Behavior description:按名称获取主机地址
details:1.1.1.1
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = , CmdLine = cmd.exe /c ping 1.1.1.1 -n 1 -w 3000 > nul & del "c:\docume~1\admini~1\locals~1\%temp%\1446361439.116553.exe"
Behavior description:创建进程
details:ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1446361439.037336.exe"
ImagePath = C:\WINDOWS\system32\ping.exe, CmdLine = ping 1.1.1.1 -n 1 -w 3000
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-*
MSCTF.MarshalInterface.FileMap.MBB..ECHGH
MSCTF.MarshalInterface.FileMap.MBB.B.ECHGH
MSCTF.MarshalInterface.FileMap.MBB.C.ECHGH
MSCTF.MarshalInterface.FileMap.MBB.D.ECHGH
MSCTF.MarshalInterface.FileMap.MBB.E.ECHGH
MSCTF.MarshalInterface.FileMap.MBB.F.ECHGH
MSCTF.MarshalInterface.FileMap.MBB.G.ECHGH
MSCTF.Shared.SFM.MBB
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:自删除
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1446361439.332341.exe
Behavior description:查找文件
details:FileName = C:\WINDOWS
FileName = C:\WINDOWS\system32
FileName = C:\WINDOWS\system32\cmd.exe
FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\ping.*
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\ping
FileName = C:\Python27\ping.*
FileName = C:\Python27\ping
FileName = C:\Python27\Scripts\ping.*
FileName = C:\Python27\Scripts\ping
FileName = C:\WINDOWS\system32\ping.*
Network behavior
Behavior description:连接指定站点
details:InternetConnectA: ServerName = apiipapa.com, PORT = 80
InternetConnectA: ServerName = qqq.apiipapa.com, PORT = 80
Behavior description:读取网络文件
details:hFile = 0x00000640, BytesToRead =1024, BytesRead = 1024.
Behavior description:打开HTTP请求
details:HttpOpenRequestA: apiipapa.com:80/api/auth/gettoken?user=loader&ver=2&key=67d899412493813e1cdba8abcb91505e, hConnect = 0x0000063c
HttpOpenRequestA: qqq.apiipapa.com:80/api/installer/error?user=loader&ver=2&key=6e063a01c3e56e46aee16a58a169a3e1, hConnect = 0x0000063c
Behavior description:按名称获取主机地址
details:1.1.1.1
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.MBB
SHIMLIB_LOG_MUTEX
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:获取TickCount值
details:TickCount = 490500, SleepMilliseconds = 1000.
TickCount = 491890, SleepMilliseconds = 1000.
TickCount = 491906, SleepMilliseconds = 1000.
TickCount = 492015, SleepMilliseconds = 1000.
Behavior description:窗口信息
details:Pid = 1372, Hwnd=0x202cc, Text = Подождите, выполняется инициализация приложения..., ClassName = Static.
Pid = 1372, Hwnd=0x202a6, Text = Инициализация..., ClassName = #32770.
Pid = 1372, Hwnd=0x302bc, Text = 确定, ClassName = Button.
Pid = 1372, Hwnd=0x302dc, Text = Ошибка подключения к серверу: 1, ClassName = Static.
Pid = 1372, Hwnd=0x302ba, Text = Ошибка, ClassName = #32770.
Behavior description:直接操作物理设备
details:\??\PhysicalDrive0
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 1000.
[2]: MilliSeconds = 1000.
[3]: MilliSeconds = 1000.
[4]: MilliSeconds = 1000.
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号