VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

File information
Safety rating:30
Behavior list
Basic Information
MD5:a22da47f8c124aa8db409e69ee4e55bd
file type:EXE
Production company:
version:1.0.0.1---1, 0, 0, 1
Shell or compiler information:COMPILER:Microsoft Visual C++ 6.0 [Overlay]
Key behavior
Behavior description:查找PE资源信息
details:(FindResourceA) hModule = 0x00000000, ResName: , ResType: EXE
Process behavior
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2680, ThreadID = 2716, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: .%temp%\****.exe, InheritedFromPID = 2680, ProcessID = 2804, ThreadID = 2860, StartAddress = 0040F976, Parameter = 001AD980
TargetProcess: .%temp%\****.exe, InheritedFromPID = 2680, ProcessID = 2804, ThreadID = 2864, StartAddress = 0040F976, Parameter = 001AD980
TargetProcess: .%temp%\****.exe, InheritedFromPID = 2680, ProcessID = 2804, ThreadID = 2868, StartAddress = 0040F976, Parameter = 001AD980
TargetProcess: .%temp%\****.exe, InheritedFromPID = 2680, ProcessID = 2804, ThreadID = 2872, StartAddress = 0040F976, Parameter = 001AD980
TargetProcess: .%temp%\****.exe, InheritedFromPID = 2680, ProcessID = 2804, ThreadID = 2876, StartAddress = 0040F976, Parameter = 001AD980
TargetProcess: .%temp%\****.exe, InheritedFromPID = 2680, ProcessID = 2804, ThreadID = 2880, StartAddress = 0040F976, Parameter = 001AD980
TargetProcess: .%temp%\****.exe, InheritedFromPID = 2680, ProcessID = 2804, ThreadID = 2884, StartAddress = 0040F976, Parameter = 001AD980
TargetProcess: .%temp%\****.exe, InheritedFromPID = 2680, ProcessID = 2804, ThreadID = 2888, StartAddress = 0040F976, Parameter = 001AD980
TargetProcess: .%temp%\****.exe, InheritedFromPID = 2680, ProcessID = 2804, ThreadID = 2892, StartAddress = 0040F976, Parameter = 001AD980
TargetProcess: .%temp%\****.exe, InheritedFromPID = 2680, ProcessID = 2804, ThreadID = 2896, StartAddress = 0040F976, Parameter = 001AD980
TargetProcess: .%temp%\****.exe, InheritedFromPID = 2680, ProcessID = 2804, ThreadID = 2900, StartAddress = 0040F976, Parameter = 001AD980
TargetProcess: .%temp%\****.exe, InheritedFromPID = 2680, ProcessID = 2804, ThreadID = 2904, StartAddress = 0040F976, Parameter = 001AD980
TargetProcess: .%temp%\****.exe, InheritedFromPID = 2680, ProcessID = 2804, ThreadID = 2908, StartAddress = 0040F976, Parameter = 001AD980
TargetProcess: .%temp%\****.exe, InheritedFromPID = 2680, ProcessID = 2804, ThreadID = 2912, StartAddress = 0040F976, Parameter = 001AD980
Behavior description:创建新文件进程
details:[0x00000af4]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\.%temp%\****.exe, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\.%temp%\****.exe
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\$readtxttemp.txt
C:\Documents and Settings\Administrator\Local Settings\Temp\.%temp%\****.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\__tmp_rar_sfx_access_check_220406
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\ico.ico
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\msimg32.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\自瞄上色方框透视.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\$webpath.txt
Behavior description:删除文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\$readtxttemp.txt
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\__tmp_rar_sfx_access_check_220406
C:\Documents and Settings\Administrator\Local Settings\Temp\$webpath.txt
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\ico.ico
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\msimg32.dll
Behavior description:创建可执行文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\.%temp%\****.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\msimg32.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\自瞄上色方框透视.exe
Behavior description:修改文件内容
details:C:\Documents and Settings\Administrator\Local Settings\Temp\$readtxttemp.txt ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\.%temp%\****.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\ico.ico ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\ico.ico ---> Offset = 5888
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\ico.ico ---> Offset = 6400
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\ico.ico ---> Offset = 9472
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\msimg32.dll ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\msimg32.dll ---> Offset = 4096
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\msimg32.dll ---> Offset = 8192
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\msimg32.dll ---> Offset = 12288
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\自瞄上色方框透视.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\自瞄上色方框透视.exe ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\自瞄上色方框透视.exe ---> Offset = 131072
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\自瞄上色方框透视.exe ---> Offset = 196608
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\自瞄上色方框透视.exe ---> Offset = 262144
Behavior description:查找文件
details:FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\$readtxttemp.txt
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\.%temp%\****.exe
FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\My Documents
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\Documents
FileName = C:\Documents and Settings\Administrator\桌面
FileName = C:\Documents and Settings\All Users\桌面
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\自瞄上色方框透视.exe
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\自瞄上色方框透视.exe
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ComboLBox]
[Window,Class] = [,Auto-Suggest Dropdown]
[Window,Class] = [浏览(&W)...,Button]
[Window,Class] = [C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0,ComboBox]
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [EDIT,]
Behavior description:窗口信息
details:Pid = 2804, Hwnd=0x1037c, Text = 确定, ClassName = Button.
Pid = 2804, Hwnd=0x10380, Text = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\自瞄上色方框透视.exe 不是有效的 Win32 应用程序。 , ClassName = Static.
Pid = 2804, Hwnd=0x1037a, Text = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\自瞄上色方框透视.exe, ClassName = #32770.
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007E8.00000000.0000000F
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.0000000F
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
_fCanRegisterWithShellService
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IK
MSCTF.SendReceive.Event.IOH.IK
Global\crypt32LogoffEvent
Behavior description:查找PE资源信息
details:(FindResourceA) hModule = 0x00000000, ResName: , ResType: EXE
Behavior description:可执行文件签名信息
details:C:\Documents and Settings\Administrator\Local Settings\Temp\.%temp%\****.exe(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\msimg32.dll(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\自瞄上色方框透视.exe(签名验证: 未通过)
Behavior description:创建事件对象
details:EventName = ShellCopyEngineRunning
EventName = Global\crypt32LogoffEvent
EventName = Global\userenv: User Profile setup event
EventName = ShellCopyEngineFinished
Behavior description:可执行文件MD5
details:C:\Documents and Settings\Administrator\Local Settings\Temp\.%temp%\****.exe ---> 4644aa75c8cbe9102461f2e4b40c030a
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\msimg32.dll ---> e7943d8f2a2ae75e3814f6ffcce40fd5
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\自瞄上色方框透视.exe ---> 331f5e4a802b30f37d596c6aa755d75b
Behavior description:打开互斥体
details:ShimCacheMutex
Local\!IETld!Mutex
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号