VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:41
Behavior list
Basic Information
MD5:96327f330224784d0085c51873bfd58f
file type:EXE
Production company:
version:
Shell or compiler information:COMPILER:Microsoft Visual C++ 6.0
Key behavior
Behavior description:跨进程写入数据
details:TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x00010000, Size = 0x000007c2
TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x00020000, Size = 0x00000724
TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x7ffd6010, Size = 0x00000004
TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x7ffd61e8, Size = 0x00000004
TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x00020018, Size = 0x00000004
TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x0002001c, Size = 0x00000004
TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x00020020, Size = 0x00000004
TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x7ffdd010, Size = 0x00000004
TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x7ffdd1e8, Size = 0x00000004
TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x7ffd9010, Size = 0x00000004
TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x7ffd91e8, Size = 0x00000004
TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x7ffdf010, Size = 0x00000004
TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x7ffdf1e8, Size = 0x00000004
Behavior description:获取TickCount值
details:TickCount = 492906, SleepMilliseconds = 1000.
TickCount = 493662, SleepMilliseconds = 100.
TickCount = 501687, SleepMilliseconds = 5000.
TickCount = 498537, SleepMilliseconds = 100.
TickCount = 502578, SleepMilliseconds = 1000.
Behavior description:设置启动项
details:C:\Documents and Settings\All Users\「开始」菜单\程序\启动\msdfma.txt
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = , CmdLine = C:\WINDOWS\junction.exe "C:\WINDOWS\junction" "C:\Documents and Settings\All Users\「开始」菜单\程序\启动"
Behavior description:跨进程写入数据
details:TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x00010000, Size = 0x000007c2
TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x00020000, Size = 0x00000724
TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x7ffd6010, Size = 0x00000004
TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x7ffd61e8, Size = 0x00000004
TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x00020018, Size = 0x00000004
TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x0002001c, Size = 0x00000004
TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x00020020, Size = 0x00000004
TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x7ffdd010, Size = 0x00000004
TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x7ffdd1e8, Size = 0x00000004
TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x7ffd9010, Size = 0x00000004
TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x7ffd91e8, Size = 0x00000004
TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x7ffdf010, Size = 0x00000004
TargetProcess = C:\WINDOWS\junction.exe, WriteAddress = 0x7ffdf1e8, Size = 0x00000004
Behavior description:创建新文件进程
details:ImagePath = C:\WINDOWS\junction.exe, CmdLine = C:\WINDOWS\junction.exe "C:\WINDOWS\junction" "C:\Documents and Settings\All Users\「开始」菜单\程序\启动"
Behavior description:创建本地线程
details:TargetProcess: %temp%\1461059574.993796.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 124, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: %temp%\1461059574.994181.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 716, StartAddress = 77C0A341, Parameter = 003F44A8
TargetProcess: %temp%\1461059574.994561.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 252, StartAddress = 77C0A341, Parameter = 003F44A8
TargetProcess: %temp%\1461059574.994939.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 1500, StartAddress = 77C0A341, Parameter = 003F44A8
TargetProcess: %temp%\1461059574.995320.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 484, StartAddress = 77C0A341, Parameter = 003F47D8
TargetProcess: %temp%\1461059574.995696.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 1656, StartAddress = 77C0A341, Parameter = 003F47D8
TargetProcess: %temp%\1461059574.996074.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 2032, StartAddress = 77C0A341, Parameter = 003F45E8
File behavior
Behavior description:创建文件
details:C:\WINDOWS\svchost.exe
C:\WINDOWS\junction.exe
Behavior description:创建可执行文件
details:C:\WINDOWS\svchost.exe
C:\WINDOWS\junction.exe
Behavior description:查找文件
details:FileName = C:\WINDOWS
FileName = C:\WINDOWS\junction.exe
Behavior description:设置启动项
details:C:\Documents and Settings\All Users\「开始」菜单\程序\启动\msdfma.txt
Behavior description:复制文件
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\1461059575.002545.exe ---> C:\WINDOWS\svchost.exe
Behavior description:修改文件内容
details:C:\WINDOWS\svchost.exe ---> Offset = 0
C:\WINDOWS\svchost.exe ---> Offset = 65536
C:\WINDOWS\svchost.exe ---> Offset = 131072
C:\WINDOWS\svchost.exe ---> Offset = 196608
C:\WINDOWS\svchost.exe ---> Offset = 262144
C:\WINDOWS\junction.exe ---> Offset = 0
C:\Documents and Settings\All Users\「开始」菜单\程序\启动\msdfma.txt ---> Offset = 0
Network behavior
Behavior description:建立到一个指定的套接字连接
details:URL: , IP: 192.168.242.1:2016, SOCKET = 0x000006e4
URL: , IP: 192.168.242.1:2016, SOCKET = 0x000006e0
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Sysinternals\Junction\EulaAccepted
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments\HideZoneInfoOnProperties
Behavior description:修改注册表_延迟重命名项
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Session Manager\PendingFileRenameOperations
Other behavior
Behavior description:创建互斥体
details:192.168.242.1
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
Behavior description:获取TickCount值
details:TickCount = 492906, SleepMilliseconds = 1000.
TickCount = 493662, SleepMilliseconds = 100.
TickCount = 501687, SleepMilliseconds = 5000.
TickCount = 498537, SleepMilliseconds = 100.
TickCount = 502578, SleepMilliseconds = 1000.
Behavior description:可执行文件签名信息
details:C:\WINDOWS\svchost.exe(签名验证: 未通过)
C:\WINDOWS\junction.exe(签名验证: 通过)
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 1000.
[2]: MilliSeconds = 1000.
[3]: MilliSeconds = 1000.
[4]: MilliSeconds = 1000.
[5]: MilliSeconds = 1000.
[6]: MilliSeconds = 1000.
[7]: MilliSeconds = 1000.
[8]: MilliSeconds = 1000.
[9]: MilliSeconds = 1000.
[10]: MilliSeconds = 1000.
Behavior description:可执行文件MD5
details:C:\WINDOWS\svchost.exe ---> 96327f330224784d0085c51873bfd58f
C:\WINDOWS\junction.exe ---> f1f23d4df41c5da5444c97781ff2cab7
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号