VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

File information
Safety rating:70
behaviorlist
Basic Information
MD5:69eb52ed36f13a1417fcd199b4d6bd7d
file type:EXE
Production company:方晨曦
version:3.0.0.0---3.0.0.0
Shell or compiler information:PACKER:UPX 0.89.6 - 1.02 / 1.05 - 1.24 -> Markus & Laszlo
Subfile information:upx_c_993d62a6dumpFile / 8c194fcbb0eb901ce7b441bfd7794c4b / EXE
Key behavior
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:直接获取CPU时钟
details:EAX = 0x95c4a6df, EDX = 0x000000b6
EAX = 0x95c4a72b, EDX = 0x000000b6
EAX = 0x95c4a777, EDX = 0x000000b6
EAX = 0x95c4a7c3, EDX = 0x000000b6
EAX = 0x95c4a80f, EDX = 0x000000b6
EAX = 0x95c4a85b, EDX = 0x000000b6
EAX = 0xd254e66c, EDX = 0x000000b6
EAX = 0xd254e6b8, EDX = 0x000000b6
EAX = 0xd254e704, EDX = 0x000000b6
EAX = 0xd254e750, EDX = 0x000000b6
Behavior description:获取窗口截图信息
details:Foreground window Info: HWND = 0x00010364, DC = 0x0c0101e7.
Foreground window Info: HWND = 0x00010362, DC = 0x0c0101e7.
Foreground window Info: HWND = 0x00010366, DC = 0x0c0101e7.
Foreground window Info: HWND = 0x00010360, DC = 0x01010055.
Foreground window Info: HWND = 0x0001035e, DC = 0x01010055.
Foreground window Info: HWND = 0x0001035c, DC = 0x0c0101e7.
Behavior description:获取TickCount值
details:TickCount = 283203, SleepMilliseconds = 60000.
TickCount = 283218, SleepMilliseconds = 60000.
TickCount = 283234, SleepMilliseconds = 60000.
TickCount = 283250, SleepMilliseconds = 60000.
TickCount = 283265, SleepMilliseconds = 60000.
Process behavior
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2776, ThreadID = 2800, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2776, ThreadID = 2964, StartAddress = 6359727B, Parameter = 001F28F8
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2776, ThreadID = 2972, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2776, ThreadID = 2976, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2776, ThreadID = 3004, StartAddress = 77E56C7D, Parameter = 0028CAC8
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2776, ThreadID = 3008, StartAddress = 769AE43B, Parameter = 02459500
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2776, ThreadID = 3012, StartAddress = 016E507F, Parameter = 0012E2C8
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2776, ThreadID = 3072, StartAddress = 016E507F, Parameter = 0012E2C8
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\soft[1].html
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\soft[2].html
Behavior description:删除文件
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\soft[1].html
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:查找文件
details:FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\WINDOWS\system32\Ras\*.pbk
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\WINDOWS
FileName = C:\WINDOWS\system32
FileName = C:\WINDOWS\system32\urlmon.dll
FileName = C:\Documents and Settings\Administrator\Local Settings\History\History.IE5\MSHist012016091220160913\*.*
Network behavior
Behavior description:连接指定站点
details:InternetConnectA: ServerName = pc****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = ww****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0010, hConnect = 0x00cc0014, Flags = 0x00000000
InternetConnectA: ServerName = pc****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0014, Flags = 0x00000000
Behavior description:打开HTTP连接
details:InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489), hSession = 0x00cc0004
InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0), hSession = 0x00cc0010
Behavior description:建立到一个指定的套接字连接
details:URL: pc****om, IP: **.133.40.**:80, SOCKET = 0x000003d4
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000410
URL: pc****om, IP: **.133.40.**:80, SOCKET = 0x00000340
Behavior description:读取网络文件
details:hFile = 0x00cc000c, BytesToRead =2048, BytesRead = 2048.
hFile = 0x00cc0018, BytesToRead =102400, BytesRead = 102400.
Behavior description:发送HTTP包
details:GET /soft.html?video_x0 HTTP/1.1 Accept: application/x-shockwave-flash, image/gif, image/jpeg, image/pjpeg, image/pjpeg, application/x-ms-application, application/x-ms-xbap, application/vnd.ms-xpsdocument, application/xaml+xml, application/msword, */* Accept-Language: zh-cn Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: pc****om Connection: Keep-Alive
GET /video_down/var.html HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Accept: */* Host: ww****om Cache-Control: no-cache
GET /soft.html?video_x3 HTTP/1.1 Accept: application/x-shockwave-flash, image/gif, image/jpeg, image/pjpeg, image/pjpeg, application/x-ms-application, application/x-ms-xbap, application/vnd.ms-xpsdocument, application/xaml+xml, application/msword, */* Accept-Language: zh-cn Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: pc****om Connection: Keep-Alive
Behavior description:打开HTTP请求
details:HttpOpenRequestA: pc****om:80/soft.html?video_x0, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400200
HttpOpenRequestA: ww****om:80/video_down/var.html, hConnect = 0x00cc0014, hRequest = 0x00cc0018, Verb: GET, Referer: , Flags = 0x84000000
HttpOpenRequestA: pc****om:80/soft.html?video_x3, hConnect = 0x00cc0014, hRequest = 0x00cc0018, Verb: GET, Referer: , Flags = 0x00400200
Behavior description:按名称获取主机地址
details:GetAddrInfoW: pc****om
GetAddrInfoW: ww****om
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Multimedia\DrawDib\vga.drv 1920x973x32(BGR 0)
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Behavior description:删除注册表键值
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyOverride
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
Other behavior
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:创建互斥体
details:RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
Local\!PrivacIE!SharedMemory!Mutex
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
MSCTF.Shared.MUTEX.IOH
CritOpMutex
MSCTF.Shared.MUTEX.MNK
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = Global\userenv: User Profile setup event
EventName = MSCTF.SendReceive.Event.MNK.IC
EventName = MSCTF.SendReceiveConection.Event.MNK.IC
EventName = MSCTF.SendReceive.Event.AAM.IC
EventName = MSCTF.SendReceiveConection.Event.AAM.IC
EventName = MSCTF.SendReceive.Event.EML.IC
EventName = MSCTF.SendReceiveConection.Event.EML.IC
Behavior description:打开互斥体
details:RasPbFile
ShimCacheMutex
Local\!IETld!Mutex
CtfmonInstMutexDefaultS-*
Local\_!MSFTHISTORY!_
Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Local\c:!documents and settings!administrator!cookies!
Local\c:!documents and settings!administrator!local settings!history!history.ie5!
Local\WininetStartupMutex
Local\WininetConnectionMutex
Local\WininetProxyRegistryMutex
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:窗口信息
details:Pid = 2776, Hwnd=0x103e0, Text = 下载完毕, ClassName = Static.
Pid = 2776, Hwnd=0x103e2, Text = 获取文件信息:, ClassName = Static.
Pid = 2776, Hwnd=0x103e4, Text = update.exe (来自 pc.d1kf.com), ClassName = Static.
Pid = 2776, Hwnd=0x103e8, Text = 文件大小未知, ClassName = Static.
Pid = 2776, Hwnd=0x103ea, Text = 估计剩余时间:, ClassName = Static.
Pid = 2776, Hwnd=0x103ec, Text = 已下载:, ClassName = Static.
Pid = 2776, Hwnd=0x103ee, Text = 下载到:, ClassName = Static.
Pid = 2776, Hwnd=0x103f0, Text = 传输速度:, ClassName = Static.
Pid = 2776, Hwnd=0x103f8, Text = 下载完成后关闭此对话框(&C), ClassName = Button(CheckBox).
Pid = 2776, Hwnd=0x103fa, Text = 打开(&O), ClassName = Button.
Pid = 2776, Hwnd=0x103fc, Text = 打开文件夹(&F), ClassName = Button.
Pid = 2776, Hwnd=0x103fe, Text = 取消, ClassName = Button.
Pid = 2776, Hwnd=0x1003a6, Text = 已完成安装 0% - soft.html (来自 pc.d1kf.com), ClassName = #32770.
Pid = 2776, Hwnd=0x203a0, Text = 爆笑一刻 (在线观看视频、批量下载搞笑视频,笑一笑 十年少), ClassName = Button.
Pid = 2776, Hwnd=0x1037c, Text = 了解详情, ClassName = Button.
Behavior description:获取TickCount值
details:TickCount = 283203, SleepMilliseconds = 60000.
TickCount = 283218, SleepMilliseconds = 60000.
TickCount = 283234, SleepMilliseconds = 60000.
TickCount = 283250, SleepMilliseconds = 60000.
TickCount = 283265, SleepMilliseconds = 60000.
Behavior description:获取光标位置
details:CursorPos = (80,18468), SleepMilliseconds = 60000.
CursorPos = (6373,26501), SleepMilliseconds = 60000.
CursorPos = (19208,15725), SleepMilliseconds = 60000.
CursorPos = (11517,29359), SleepMilliseconds = 60000.
CursorPos = (27001,24465), SleepMilliseconds = 60000.
CursorPos = (5744,28146), SleepMilliseconds = 60000.
CursorPos = (23320,16828), SleepMilliseconds = 60000.
CursorPos = (10000,492), SleepMilliseconds = 60000.
CursorPos = (3034,11943), SleepMilliseconds = 60000.
CursorPos = (4866,5437), SleepMilliseconds = 60000.
CursorPos = (32430,14605), SleepMilliseconds = 60000.
CursorPos = (3941,154), SleepMilliseconds = 60000.
CursorPos = (331,12383), SleepMilliseconds = 60000.
CursorPos = (17460,18717), SleepMilliseconds = 60000.
CursorPos = (19757,19896), SleepMilliseconds = 60000.
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
Global\SvcctrlStartEvent_A3752DX
\INSTALLATION_SECURITY_HOLD
MSFT.VSA.COM.DISABLE.2776
MSFT.VSA.IEC.STATUS.6c736db0
_fCanRegisterWithShellService
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000011
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000011
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000012
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000012
Behavior description:获取窗口截图信息
details:Foreground window Info: HWND = 0x00010364, DC = 0x0c0101e7.
Foreground window Info: HWND = 0x00010362, DC = 0x0c0101e7.
Foreground window Info: HWND = 0x00010366, DC = 0x0c0101e7.
Foreground window Info: HWND = 0x00010360, DC = 0x01010055.
Foreground window Info: HWND = 0x0001035e, DC = 0x01010055.
Foreground window Info: HWND = 0x0001035c, DC = 0x0c0101e7.
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 60000.
[2]: MilliSeconds = 100.
[3]: MilliSeconds = 60000.
[4]: MilliSeconds = 60000.
[5]: MilliSeconds = 100.
[6]: MilliSeconds = 60000.
[7]: MilliSeconds = 1000.
[8]: MilliSeconds = 1000.
[9]: MilliSeconds = 1000.
[10]: MilliSeconds = 1000.
Behavior description:隐藏指定窗口
details:[Window,Class] = [,_EL_PicBox]
[Window,Class] = [晨曦快递批量查询高手 推单、超级查单,Afx:400000:b:10011:1900015:0]
[Window,Class] = [会员登录 全能版,Afx:400000:b:10011:1900015:0]
[Window,Class] = [  《快递批量查询高手》提供上百家快递查询,自动识别快递公司,批量查询快递单号,统一管理快递,支持导出CSV/EXCEL表格、多种筛选方式、多种单号类推方式、超级查单、提前签收分析等功能。表格一目了然,易操作,订单详情独立,非常方便。适合各路电商、微商、村淘精英们的使用。,Afx:400000:b:10011:1900015:0]
[Window,Class] = [新用户免费注册会员、免费试用,Afx:400000:b:10011:1900015:0]
[Window,Class] = [支持国内外100多家快递、物流信息跟踪,Afx:400000:b:10011:1900015:0]
[Window,Class] = [多种查询风格、多线程查询更快捷,Afx:400000:b:10011:1900015:0]
[Window,Class] = [提前签收、多次揽收、派件时效等智能分析,Afx:400000:b:10011:1900015:0]
[Window,Class] = [了解详情,Button]
[Window,Class] = [,_EL_Timer]
[Window,Class] = [,Afx:400000:b:10011:1900010:0]
[Window,Class] = [,SysLink]
[Window,Class] = [,Static]
[Window,Class] = [文件大小未知,Static]
[Window,Class] = [打开此类文件前总是询问(&W),Button]
Behavior description:直接获取CPU时钟
details:EAX = 0x95c4a6df, EDX = 0x000000b6
EAX = 0x95c4a72b, EDX = 0x000000b6
EAX = 0x95c4a777, EDX = 0x000000b6
EAX = 0x95c4a7c3, EDX = 0x000000b6
EAX = 0x95c4a80f, EDX = 0x000000b6
EAX = 0x95c4a85b, EDX = 0x000000b6
EAX = 0xd254e66c, EDX = 0x000000b6
EAX = 0xd254e6b8, EDX = 0x000000b6
EAX = 0xd254e704, EDX = 0x000000b6
EAX = 0xd254e750, EDX = 0x000000b6
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | link | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号