VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

File information
Safety rating:50
Behavior list
Basic Information
MD5:28e7e661e9e0fc95e89d569305dfc122
file type:EXE
Production company:
version:
Shell or compiler information:COMPILER:Borland Delphi 6.0 - 7.0
Key behavior
Behavior description:跨进程写入数据
details:TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x000a0000, Size = 0x0000000d TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x00200000, Size = 0x0000000b TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x00210000, Size = 0x00000006 TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x00220000, Size = 0x0000000c TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x00230000, Size = 0x0000000f TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x00240000, Size = 0x0000000d TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x00250000, Size = 0x0000000d TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x00260000, Size = 0x0000000d TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x00270000, Size = 0x0000000c TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x00280000, Size = 0x0000000b TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x00290000, Size = 0x0000000c TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x002a0000, Size = 0x0000000b TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x002b0000, Size = 0x00000011 TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x002c0000, Size = 0x00000013 TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x002d0000, Size = 0x00000010 TargetPID = 0x00000a88
Behavior description:创建远程线程
details:TargetProcess: notepad.exe, InheritedFromPID = 2652, ProcessID = 2696, ThreadID = 2708, StartAddress = 00310000, Parameter = 00300000
TargetProcess: notepad.exe, InheritedFromPID = 2820, ProcessID = 2860, ThreadID = 2868, StartAddress = 009C0000, Parameter = 009B0000
TargetProcess: notepad.exe, InheritedFromPID = 2820, ProcessID = 2872, ThreadID = 2880, StartAddress = 00320000, Parameter = 00310000
Behavior description:修改注册表_启动项
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Run\DtServ32sm.exe
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = , CmdLine = notepad
ImagePath = C:\Documents and Settings\Administrator\Application Data\DtServ32.exe, CmdLine = "C:\Documents and Settings\Administrator\Application Data\DtServ32.exe"
Behavior description:创建进程
details:[0x00000a88]ImagePath = C:\WINDOWS\system32\notepad.exe, CmdLine = notepad
[0x00000b2c]ImagePath = C:\WINDOWS\system32\notepad.exe, CmdLine = notepad
[0x00000b38]ImagePath = C:\WINDOWS\system32\notepad.exe, CmdLine = notepad
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2652, ThreadID = 2664, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2652, ThreadID = 2668, StartAddress = 0040523C, Parameter = 00F24D80
TargetProcess: DtServ32.exe, InheritedFromPID = 2652, ProcessID = 2820, ThreadID = 2828, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: DtServ32.exe, InheritedFromPID = 2652, ProcessID = 2820, ThreadID = 2856, StartAddress = 0040523C, Parameter = 00F24D80
TargetProcess: DtServ32.exe, InheritedFromPID = 2652, ProcessID = 2820, ThreadID = 2884, StartAddress = 0045B320, Parameter = 00000000
TargetProcess: DtServ32.exe, InheritedFromPID = 2652, ProcessID = 2820, ThreadID = 2888, StartAddress = 0040523C, Parameter = 00F24D80
Behavior description:跨进程写入数据
details:TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x000a0000, Size = 0x0000000d TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x00200000, Size = 0x0000000b TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x00210000, Size = 0x00000006 TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x00220000, Size = 0x0000000c TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x00230000, Size = 0x0000000f TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x00240000, Size = 0x0000000d TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x00250000, Size = 0x0000000d TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x00260000, Size = 0x0000000d TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x00270000, Size = 0x0000000c TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x00280000, Size = 0x0000000b TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x00290000, Size = 0x0000000c TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x002a0000, Size = 0x0000000b TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x002b0000, Size = 0x00000011 TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x002c0000, Size = 0x00000013 TargetPID = 0x00000a88
TargetProcess = C:\WINDOWS\system32\notepad.exe, WriteAddress = 0x002d0000, Size = 0x00000010 TargetPID = 0x00000a88
Behavior description:创建远程线程
details:TargetProcess: notepad.exe, InheritedFromPID = 2652, ProcessID = 2696, ThreadID = 2708, StartAddress = 00310000, Parameter = 00300000
TargetProcess: notepad.exe, InheritedFromPID = 2820, ProcessID = 2860, ThreadID = 2868, StartAddress = 009C0000, Parameter = 009B0000
TargetProcess: notepad.exe, InheritedFromPID = 2820, ProcessID = 2872, ThreadID = 2880, StartAddress = 00320000, Parameter = 00310000
Behavior description:枚举进程
details:N/A
Behavior description:创建新文件进程
details:[0x00000b04]ImagePath = C:\Documents and Settings\Administrator\Application Data\DtServ32.exe, CmdLine = "C:\Documents and Settings\Administrator\Application Data\DtServ32.exe"
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Application Data\DtServ32.exe
Behavior description:创建可执行文件
details:C:\Documents and Settings\Administrator\Application Data\DtServ32.exe
Behavior description:修改文件内容
details:C:\Documents and Settings\Administrator\Application Data\DtServ32.exe ---> Offset = 0
Behavior description:查找文件
details:FileName = C:\WINDOWS
FileName = C:\WINDOWS\system32
FileName = C:\WINDOWS\system32\notepad.exe
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\My Documents
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\Documents
FileName = C:\Documents and Settings\Administrator\桌面
FileName = C:\Documents and Settings\All Users\桌面
FileName = C:\Documents and Settings\Administrator\Application Data\DtServ32.exe
Behavior description:复制文件
details:C:\Documents and Settings\Administrator\Application Data\DtServ32.exe ---> C:\Documents and Settings\Administrator\Application Data\DtServ32.exe
Network behavior
Behavior description:建立到一个指定的套接字连接
details:URL: ze****rg, IP: **.133.40.**:49264, SOCKET = 0x00000260
Behavior description:按名称获取主机地址
details:gethostbyname: ze****rg
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\ActiveMovie\devenum\Version
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\Documents and Settings\Administrator\Application Data\DtServ32.exe
Behavior description:修改注册表_启动项
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Run\DtServ32sm.exe
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
eed3bd3a-a1ad-4e99-987b-d7cb3fcfa7f0 - S-*
I_AM_DTJnnHvifu
SHIMLIB_LOG_MUTEX
Local\ZonesCounterMutex
DCPERSFWBP
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
Behavior description:创建事件对象
details:EventName = Global\crypt32LogoffEvent
EventName = DINPUTWINMM
EventName = NewFrame
EventName = Global\userenv: User Profile setup event
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
Global\crypt32LogoffEvent
_fCanRegisterWithShellService
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Behavior description:可执行文件签名信息
details:C:\Documents and Settings\Administrator\Application Data\DtServ32.exe(签名验证: 未通过)
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 7.
[2]: MilliSeconds = 7.
[3]: MilliSeconds = 7.
[4]: MilliSeconds = 7.
[5]: MilliSeconds = 7.
[6]: MilliSeconds = 7.
[7]: MilliSeconds = 7.
[8]: MilliSeconds = 7.
[9]: MilliSeconds = 7.
[10]: MilliSeconds = 7.
Behavior description:隐藏指定窗口
details:[Window,Class] = [User Chat,TMainFormx]
[Window,Class] = [无标题 - 记事本,Notepad]
Behavior description:可执行文件MD5
details:C:\Documents and Settings\Administrator\Application Data\DtServ32.exe ---> 28e7e661e9e0fc95e89d569305dfc122
Behavior description:打开互斥体
details:ShimCacheMutex
Local\!IETld!Mutex
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号