VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:30
Behavior list
Basic Information
MD5:3aef11f085bb24e66fdeaa3d3b21a44a
file type:EXE
Production company:
version:
Shell or compiler information:PACKER:UPX 0.89.6 - 1.02 / 1.05 - 1.24 -> Markus & Laszlo
Subfile information:upx_c_679fca0edumpFile / 178722503977b49186fa15697e1ec851 / EXE
Key behavior
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:直接获取CPU时钟
details:EAX = 0x0ddb0725, EDX = 0x000000b7
EAX = 0x0ddb0771, EDX = 0x000000b7
EAX = 0x0ddb07bd, EDX = 0x000000b7
EAX = 0x0ddb0809, EDX = 0x000000b7
EAX = 0x0ddb0855, EDX = 0x000000b7
EAX = 0x0ddb08a1, EDX = 0x000000b7
EAX = 0x108e081d, EDX = 0x000000b7
EAX = 0x108e0869, EDX = 0x000000b7
EAX = 0x108e08b5, EDX = 0x000000b7
EAX = 0x108e0901, EDX = 0x000000b7
Behavior description:杀掉进程
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = , CmdLine = C:\AA.BAT
Behavior description:创建进程
details:[0x00000b68]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd /c C:\AA.BAT
[0x00000b7c]ImagePath = C:\Documents and Settings\Administrator\Local Settings\%temp%\TEYAL.exe, CmdLine = "C:\Documents and Settings\Administrator\Local Settings\%temp%\TEYAL.exe"
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2724, ThreadID = 2736, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2724, ThreadID = 2828, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: TEYAL.exe, InheritedFromPID = 2920, ProcessID = 2940, ThreadID = 2952, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: TEYAL.exe, InheritedFromPID = 2920, ProcessID = 2940, ThreadID = 3012, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: TEYAL.exe, InheritedFromPID = 2920, ProcessID = 2940, ThreadID = 3016, StartAddress = 7C930230, Parameter = 00000000
Behavior description:枚举进程
details:N/A
Behavior description:杀掉进程
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
File behavior
Behavior description:创建文件
details:C:\WINDOWS\system32\SuperEC_Hook.dll
C:\AA.BAT
C:\AA.ini
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\io[1].php
Behavior description:创建可执行文件
details:C:\WINDOWS\system32\SuperEC_Hook.dll
Behavior description:修改脚本文件
details:C:\AA.BAT ---> Offset = 0
Behavior description:覆盖已有文件
details:C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
C:\WINDOWS\system32\SuperEC_Hook.dll
Behavior description:查找文件
details:FileName = C:\AA.BAT
FileName = C:\Windows\SysWOW64\HOOK.dll
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\TEYAL.exe
FileName = c:\windows\system32\drivers\etc\hosts
FileName = C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\WINDOWS\system32\Ras\*.pbk
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
Behavior description:删除文件
details:C:\AA.BAT
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\io[1].php
Behavior description:重命名文件
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe ---> C:\Documents and Settings\Administrator\Local Settings\%temp%\TEYAL.exe
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:修改文件内容
details:C:\WINDOWS\system32\SuperEC_Hook.dll ---> Offset = 0
C:\AA.ini ---> Offset = 0
C:\AA.ini ---> Offset = 27
C:\AA.ini ---> Offset = 48
Network behavior
Behavior description:连接指定站点
details:InternetConnectA: ServerName = ww****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
Behavior description:打开HTTP连接
details:InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489), hSession = 0x00cc0004
Behavior description:建立到一个指定的套接字连接
details:URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x000004ac
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x000004b0
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000638
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x0000049c
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x000004a0
Behavior description:读取网络文件
details:hFile = 0x00cc000c, BytesToRead =4096, BytesRead = 4096.
Behavior description:发送HTTP包
details:GET /kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000001&&lgid=0&f=&x=36545223609 HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSiE 6.0; Windows NT 5.1;) Accept-Encoding: gzip, deflate Host: ww****om Connection: Keep-Alive
GET /kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000001&lgid=0&f=&x=36545224640 HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSiE 6.0; Windows NT 5.1;) Accept-Encoding: gzip, deflate Host: ww****om Connection: Keep-Alive
GET /kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000001&&lgid=0&f=&x=36545224750 HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSiE 6.0; Windows NT 5.1;) Accept-Encoding: gzip, deflate Host: ww****om Connection: Keep-Alive
GET /kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000001&lgid=0&f=&x=36545224796 HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSiE 6.0; Windows NT 5.1;) Accept-Encoding: gzip, deflate Host: ww****om Connection: Keep-Alive
GET /kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000001&&lgid=0&f=&x=36545224828 HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSiE 6.0; Windows NT 5.1;) Accept-Encoding: gzip, deflate Host: ww****om Connection: Keep-Alive
GET /kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000001&lgid=0&f=&x=36545224859 HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSiE 6.0; Windows NT 5.1;) Accept-Encoding: gzip, deflate Host: ww****om Connection: Keep-Alive
GET /kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000001&&lgid=0&f=&x=36545224890 HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSiE 6.0; Windows NT 5.1;) Accept-Encoding: gzip, deflate Host: ww****om Connection: Keep-Alive
GET /kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000001&lgid=0&f=&x=36545224921 HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSiE 6.0; Windows NT 5.1;) Accept-Encoding: gzip, deflate Host: ww****om Connection: Keep-Alive
Behavior description:打开HTTP请求
details:HttpOpenRequestA: ww****om:80/kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000001&&lgid=0&f=&x=36545223609, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400000
HttpOpenRequestA: ww****om:80/kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000001&lgid=0&f=&x=36545224640, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400000
HttpOpenRequestA: ww****om:80/kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000001&&lgid=0&f=&x=36545224750, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400000
HttpOpenRequestA: ww****om:80/kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000001&lgid=0&f=&x=36545224796, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400000
HttpOpenRequestA: ww****om:80/kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000001&&lgid=0&f=&x=36545224828, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400000
HttpOpenRequestA: ww****om:80/kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000001&lgid=0&f=&x=36545224859, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400000
HttpOpenRequestA: ww****om:80/kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000001&&lgid=0&f=&x=36545224890, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400000
HttpOpenRequestA: ww****om:80/kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000001&lgid=0&f=&x=36545224921, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400000
Behavior description:按名称获取主机地址
details:GetAddrInfoW: ww****om
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Behavior description:删除注册表键值
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyOverride
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
Other behavior
Behavior description:创建互斥体
details:RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
ini_read_write
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
MSCTF.Shared.MUTEX.IOH
MSCTF.Shared.MUTEX.AIL
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = Global\userenv: User Profile setup event
EventName = MSCTF.SendReceive.Event.AIL.IC
EventName = MSCTF.SendReceiveConection.Event.AIL.IC
Behavior description:打开互斥体
details:RasPbFile
ShimCacheMutex
Local\_!MSFTHISTORY!_
Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Local\c:!documents and settings!administrator!cookies!
Local\c:!documents and settings!administrator!local settings!history!history.ie5!
Local\WininetStartupMutex
Local\WininetConnectionMutex
Local\WininetProxyRegistryMutex
Local\!IETld!Mutex
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [,%temp%\****.exe]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Global\SvcctrlStartEvent_A3752DX
\INSTALLATION_SECURITY_HOLD
CTF.ThreadMIConnectionEvent.000007E8.00000000.0000000F
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.0000000F
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
Behavior description:枚举窗口
details:N/A
Behavior description:可执行文件签名信息
details:C:\WINDOWS\system32\SuperEC_Hook.dll(签名验证: 未通过)
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ComboLBox]
[Window,Class] = [,Afx:400000:8:10011:1900015:0]
[Window,Class] = [超速更新,ComboBox]
[Window,Class] = [,msctls_progress32]
Behavior description:可执行文件MD5
details:C:\WINDOWS\system32\SuperEC_Hook.dll ---> 6446f02463634295797ff698eb7eb92e
Behavior description:直接获取CPU时钟
details:EAX = 0x0ddb0725, EDX = 0x000000b7
EAX = 0x0ddb0771, EDX = 0x000000b7
EAX = 0x0ddb07bd, EDX = 0x000000b7
EAX = 0x0ddb0809, EDX = 0x000000b7
EAX = 0x0ddb0855, EDX = 0x000000b7
EAX = 0x0ddb08a1, EDX = 0x000000b7
EAX = 0x108e081d, EDX = 0x000000b7
EAX = 0x108e0869, EDX = 0x000000b7
EAX = 0x108e08b5, EDX = 0x000000b7
EAX = 0x108e0901, EDX = 0x000000b7
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号