VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:50
Behavior list
Basic Information
MD5:3c107090a3d9d26da44d466d33cb0a49
file type:EXE
Production company:天下辅助
version:1.0.0.0---1.0.0.0
Shell or compiler information:COMPILER:Elan
Key behavior
Behavior description:跨进程写入数据
details:TargetProcess = C:\WINDOWS\system32\DNF.exe, WriteAddress = 0x00a60000, Size = 0x00000030 TargetPID = 0x00000adc
TargetProcess = C:\WINDOWS\system32\DNF.exe, WriteAddress = 0x00a70000, Size = 0x00000027 TargetPID = 0x00000adc
TargetProcess = C:\WINDOWS\system32\DNF.exe, WriteAddress = 0x00b80000, Size = 0x0000000c TargetPID = 0x00000adc
TargetProcess = C:\WINDOWS\system32\DNF.exe, WriteAddress = 0x00b90000, Size = 0x00000027 TargetPID = 0x00000adc
TargetProcess = C:\WINDOWS\system32\DNF.exe, WriteAddress = 0x00ca0000, Size = 0x0000002c TargetPID = 0x00000adc
TargetProcess = C:\WINDOWS\system32\DNF.exe, WriteAddress = 0x00cb0000, Size = 0x00000027 TargetPID = 0x00000adc
TargetProcess = C:\WINDOWS\system32\DNF.exe, WriteAddress = 0x00dc0000, Size = 0x0000002a TargetPID = 0x00000adc
TargetProcess = C:\WINDOWS\system32\DNF.exe, WriteAddress = 0x00dd0000, Size = 0x00000027 TargetPID = 0x00000adc
Behavior description:设置特殊文件属性
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\XiaoMo.dll
Behavior description:创建远程线程
details:TargetProcess: DNF.exe, InheritedFromPID = 2000, ProcessID = 2780, ThreadID = 2808, StartAddress = 77D2A97D, Parameter = 00A70000
TargetProcess: DNF.exe, InheritedFromPID = 2000, ProcessID = 2780, ThreadID = 2824, StartAddress = 77D2A97D, Parameter = 00B90000
TargetProcess: DNF.exe, InheritedFromPID = 2000, ProcessID = 2780, ThreadID = 2828, StartAddress = 77D2A97D, Parameter = 00CB0000
TargetProcess: DNF.exe, InheritedFromPID = 2000, ProcessID = 2780, ThreadID = 2856, StartAddress = 77D2A97D, Parameter = 00DD0000
Process behavior
Behavior description:跨进程写入数据
details:TargetProcess = C:\WINDOWS\system32\DNF.exe, WriteAddress = 0x00a60000, Size = 0x00000030 TargetPID = 0x00000adc
TargetProcess = C:\WINDOWS\system32\DNF.exe, WriteAddress = 0x00a70000, Size = 0x00000027 TargetPID = 0x00000adc
TargetProcess = C:\WINDOWS\system32\DNF.exe, WriteAddress = 0x00b80000, Size = 0x0000000c TargetPID = 0x00000adc
TargetProcess = C:\WINDOWS\system32\DNF.exe, WriteAddress = 0x00b90000, Size = 0x00000027 TargetPID = 0x00000adc
TargetProcess = C:\WINDOWS\system32\DNF.exe, WriteAddress = 0x00ca0000, Size = 0x0000002c TargetPID = 0x00000adc
TargetProcess = C:\WINDOWS\system32\DNF.exe, WriteAddress = 0x00cb0000, Size = 0x00000027 TargetPID = 0x00000adc
TargetProcess = C:\WINDOWS\system32\DNF.exe, WriteAddress = 0x00dc0000, Size = 0x0000002a TargetPID = 0x00000adc
TargetProcess = C:\WINDOWS\system32\DNF.exe, WriteAddress = 0x00dd0000, Size = 0x00000027 TargetPID = 0x00000adc
Behavior description:创建远程线程
details:TargetProcess: DNF.exe, InheritedFromPID = 2000, ProcessID = 2780, ThreadID = 2808, StartAddress = 77D2A97D, Parameter = 00A70000
TargetProcess: DNF.exe, InheritedFromPID = 2000, ProcessID = 2780, ThreadID = 2824, StartAddress = 77D2A97D, Parameter = 00B90000
TargetProcess: DNF.exe, InheritedFromPID = 2000, ProcessID = 2780, ThreadID = 2828, StartAddress = 77D2A97D, Parameter = 00CB0000
TargetProcess: DNF.exe, InheritedFromPID = 2000, ProcessID = 2780, ThreadID = 2856, StartAddress = 77D2A97D, Parameter = 00DD0000
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Application Data\Microsoft\Crypto\RSA\S-*\a18ca4003deb042bbee7a40f15e1970b_dcff734b-bc3f-43cb-8911-9b5d467629cf
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
C:\Documents and Settings\Administrator\Local Settings\%temp%\XiaoMo.dll
Behavior description:创建可执行文件
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
C:\Documents and Settings\Administrator\Local Settings\%temp%\XiaoMo.dll
Behavior description:查找文件
details:FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Crypto\RSA\S-*\a18ca4003deb042bbee7a40f15e1970b_*
Behavior description:设置特殊文件属性
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\XiaoMo.dll
Behavior description:重命名文件
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\[3c107090a3d9d26da44d466d33cb0a49]
Behavior description:修改文件内容
details:C:\Documents and Settings\Administrator\Application Data\Microsoft\Crypto\RSA\S-*\a18ca4003deb042bbee7a40f15e1970b_dcff734b-bc3f-43cb-8911-9b5d467629cf ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\%temp%\XiaoMo.dll ---> Offset = 0
Registry behavior
Behavior description:删除注册表键
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW\
Behavior description:删除注册表键值
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW\DWFileTreeRoot
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = Global\userenv: User Profile setup event
EventName = Global\crypt32LogoffEvent
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [5B3838F5-0C81-46D9-A4C0-6EA28CA3E942,]
Behavior description:获取光标位置
details:CursorPos = (80,18468), SleepMilliseconds = 50.
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
\INSTALLATION_SECURITY_HOLD
Global\crypt32LogoffEvent
Behavior description:可执行文件签名信息
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\%temp%\XiaoMo.dll(签名验证: 未通过)
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 1000.
[2]: MilliSeconds = 50.
[3]: MilliSeconds = 50.
[4]: MilliSeconds = 50.
[5]: MilliSeconds = 50.
[6]: MilliSeconds = 50.
[7]: MilliSeconds = 50.
Behavior description:可执行文件MD5
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe ---> dcfd1537b142ad2bd6dc53d627434d26
C:\Documents and Settings\Administrator\Local Settings\%temp%\XiaoMo.dll ---> 335a37c596ba1831a57ddd3b1fe0faf8
Behavior description:打开互斥体
details:ShimCacheMutex
Behavior description:加载新释放的文件
details:Image: C:\Documents and Settings\Administrator\Local Settings\%temp%\XiaoMo.dll.
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号