VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:30
Behavior list
Basic Information
MD5:20ce79d1b746aae792101f38f9e0b9f8
file type:EXE
Production company:
version:
Shell or compiler information:COMPILER:Microsoft Visual C++ 6.0 SPx Method 1 [Overlay]
Key behavior
Behavior description:跨进程写入数据
details:C:\WINDOWS\explorer.exe
TargetProcess = iexplore.exe, WriteAddress = 0x7ff90000, Size = 26112
TargetProcess = iexplore.exe, WriteAddress = 0x7ff80000, Size = 863
TargetProcess = iexplore.exe, WriteAddress = 0x7ff70000, Size = 3944
TargetProcess = iexplore.exe, WriteAddress = 0x7ff60000, Size = 28
TargetProcess = iexplore.exe, WriteAddress = 0x00401a25, Size = 11
Behavior description:跨进程写代码段数据
details:C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00401A25, EntryPoint = 0x00401A25
Behavior description:创建远程线程
details:C:\WINDOWS\explorer.exe
Behavior description:按名称获取主机地址
details:taaal.myq-see.com
Process behavior
Behavior description:跨进程写入数据
details:C:\WINDOWS\explorer.exe
TargetProcess = iexplore.exe, WriteAddress = 0x7ff90000, Size = 26112
TargetProcess = iexplore.exe, WriteAddress = 0x7ff80000, Size = 863
TargetProcess = iexplore.exe, WriteAddress = 0x7ff70000, Size = 3944
TargetProcess = iexplore.exe, WriteAddress = 0x7ff60000, Size = 28
TargetProcess = iexplore.exe, WriteAddress = 0x00401a25, Size = 11
Behavior description:跨进程写代码段数据
details:C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00401A25, EntryPoint = 0x00401A25
Behavior description:创建远程线程
details:C:\WINDOWS\explorer.exe
Behavior description:枚举进程
details:N/A
Behavior description:创建进程
details:ImagePath = C:\Program Files\Internet Explorer\IEXPLORE.EXE, CmdLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
File behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-1-5-21-1482476501-1645522239-1417001333-500
Behavior description:创建可执行文件
details:C:\WINDOWS\system32\nvn\mbmner.exe
Network behavior
Behavior description:发送一个已连接的套接字数据
details:SOCKET = 0x0000013c, TotalSize = 251, Offset = 0, ReadSize = 251.
Behavior description:建立到一个指定的套接字连接
details:219.133.40.1:21
10.0.0.6:21
Behavior description:按名称获取主机地址
details:taaal.myq-see.com
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\MACHINE\SOFTWARE\jj\nck
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\jj\klg
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\SessionInformation\ProgramCount
Behavior description:修改注册表_系统动态组件
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{76E92825-5B62-8E63-CBB5-D759367AFF3E}\stubpath
Other behavior
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:创建互斥体
details:jj
CTF.LBES.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Compart.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Asm.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Layouts.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TMD.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TimListCache.FMPDefaultS-1-5-21-1482476501-1645522239-1417001333-500MUTEX.DefaultS-1-5-21-1482476501-1645522239-1417001333-500
Behavior description:内联HOOK
details:C:\WINDOWS\system32\kernel32.dll--->VirtualAllocEx Offset = 0x0
C:\WINDOWS\system32\kernel32.dll--->VirtualProtectEx Offset = 0x0
C:\WINDOWS\system32\kernel32.dll--->VirtualProtect Offset = 0x0
C:\WINDOWS\system32\kernel32.dll--->WriteProcessMemory Offset = 0x0
C:\WINDOWS\system32\kernel32.dll--->CreateRemoteThread Offset = 0x0
C:\WINDOWS\system32\kernel32.dll--->CreateProcessW Offset = 0x0
C:\WINDOWS\system32\kernel32.dll--->CreateProcessA Offset = 0x0
C:\WINDOWS\system32\kernel32.dll--->ExitProcess Offset = 0x0
C:\WINDOWS\system32\kernel32.dll--->GetProcAddress Offset = 0x0
C:\WINDOWS\system32\kernel32.dll--->LoadLibraryExW Offset = 0x0
C:\WINDOWS\system32\kernel32.dll--->LoadLibraryExA Offset = 0x0
C:\WINDOWS\system32\kernel32.dll--->LoadLibraryW Offset = 0x0
C:\WINDOWS\system32\kernel32.dll--->LoadLibraryA Offset = 0x0
C:\WINDOWS\system32\ntdll.dll--->LdrLoadDll Offset = 0x0
C:\WINDOWS\system32\ntdll.dll--->ZwCreateThread Offset = 0x0
Behavior description:枚举窗口
details:N/A
Behavior description:获取系统权限
details:SE_DEBUG_PRIVILEGE
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号