VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:32
Behavior list
Basic Information
MD5:a8a18b8568943f9d0b2957e825253128
file type:EXE
Production company:Microsoft Corp.
version:10.0.61637.0---10.0.61637.0 (FSX-Xpack.20070926-1421)
Shell or compiler information:PACKER:ASPack 2.x (without poly) -> Alexey Solodovnikov
Key behavior
Behavior description:修改注册表_安装输入法项
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Keyboard Layouts\E0200409\Layout Text
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Keyboard Layouts\E0200409\Layout File
\REGISTRY\USER\S-*\Keyboard Layout\Preload\2
Behavior description:对比可疑进程名
details:lstrcmpiA: [System Process] <------> ZhuDongFangYu.exe Des: 360主动防御
lstrcmpiA: [System Process] <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: System <------> ZhuDongFangYu.exe Des: 360主动防御
lstrcmpiA: System <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: smss.exe <------> ZhuDongFangYu.exe Des: 360主动防御
lstrcmpiA: smss.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: csrss.exe <------> ZhuDongFangYu.exe Des: 360主动防御
lstrcmpiA: csrss.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: winlogon.exe <------> ZhuDongFangYu.exe Des: 360主动防御
lstrcmpiA: winlogon.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: services.exe <------> ZhuDongFangYu.exe Des: 360主动防御
lstrcmpiA: services.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: lsass.exe <------> ZhuDongFangYu.exe Des: 360主动防御
lstrcmpiA: lsass.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: 33oxService.exe <------> ZhuDongFangYu.exe Des: 360主动防御
Behavior description:杀掉进程
details:C:\WINDOWS\system32\verclsid.exe
Behavior description:多次强杀进程
details:C:\WINDOWS\system32\verclsid.exe
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = , CmdLine = reg add HKLM\SYSTEM\CurrentControlSet\Enum\SW\{eec12db6-ad9c-4168-8658-b03daef417fe}\{ABD61E00-9350-47e2-A632-4438B90C6641} /v Service /t REG_SZ /d 289C59A3 /f
ImagePath = , CmdLine = reg add HKLM\SYSTEM\CurrentControlSet\Enum\SW\{eec12db6-ad9c-4168-8658-b03daef417fe}\{ABD61E00-9350-47e2-A632-4438B90C6641} /v ConfigFlags /t REG_DWORD /d 0 /f
ImagePath = , CmdLine = reg add HKLM\SYSTEM\CurrentControlSet\Services\289C59A3 /v Start /t REG_DWORD /d 2 /f
ImagePath = , CmdLine = reg add HKLM\SYSTEM\CurrentControlSet\Services\289C59A3 /v Type /t REG_DWORD /d 1 /f
ImagePath = , CmdLine = reg add HKLM\SYSTEM\CurrentControlSet\Services\289C59A3 /v ImagePath /t REG_EXPAND_SZ /d system32\289C59A3.sys /f
ImagePath = , CmdLine = reg add HKLM\SYSTEM\CurrentControlSet\Services\289C59A3 /v ErrorControl /t REG_DWORD /d 1 /f
Behavior description:创建进程
details:ImagePath = C:\WINDOWS\system32\reg.exe, CmdLine = reg add HKLM\SYSTEM\CurrentControlSet\Enum\SW\{eec12db6-ad9c-4168-8658-b03daef417fe}\{ABD61E00-9350-47e2-A632-4438B90C6641} /v Service /t REG_SZ /d 289C59A3 /f
ImagePath = C:\WINDOWS\system32\reg.exe, CmdLine = reg add HKLM\SYSTEM\CurrentControlSet\Enum\SW\{eec12db6-ad9c-4168-8658-b03daef417fe}\{ABD61E00-9350-47e2-A632-4438B90C6641} /v ConfigFlags /t REG_DWORD /d 0 /f
ImagePath = C:\WINDOWS\system32\reg.exe, CmdLine = reg add HKLM\SYSTEM\CurrentControlSet\Services\289C59A3 /v Start /t REG_DWORD /d 2 /f
ImagePath = C:\WINDOWS\system32\reg.exe, CmdLine = reg add HKLM\SYSTEM\CurrentControlSet\Services\289C59A3 /v Type /t REG_DWORD /d 1 /f
ImagePath = C:\WINDOWS\system32\reg.exe, CmdLine = reg add HKLM\SYSTEM\CurrentControlSet\Services\289C59A3 /v ImagePath /t REG_EXPAND_SZ /d system32\289C59A3.sys /f
ImagePath = C:\WINDOWS\system32\reg.exe, CmdLine = reg add HKLM\SYSTEM\CurrentControlSet\Services\289C59A3 /v ErrorControl /t REG_DWORD /d 1 /f
ImagePath = C:\WINDOWS\system32\verclsid.exe, CmdLine = /S /C {FF393560-C2A7-11CF-BFF4-444553540000} /I {000214E6-0000-0000-C000-000000000046} /X 0x401
Behavior description:创建新文件进程
details:ImagePath = C:\5549719e.exe, CmdLine = C:\5549719e.exe
Behavior description:枚举进程
details:N/A
Behavior description:杀掉进程
details:C:\WINDOWS\system32\verclsid.exe
Behavior description:多次强杀进程
details:C:\WINDOWS\system32\verclsid.exe
Behavior description:创建本地线程
details:TargetProcess: explorer.exe, InheritedFromPID = 1868, ProcessID = 1944, ThreadID = 872, StartAddress = 0353228B, Parameter = 00000000
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Infotmp.txt
C:\WINDOWS\system32\4ed23d49.dll
C:\WINDOWS\system32\289C59A3.sys
Behavior description:创建可执行文件
details:C:\5549719e.exe
C:\WINDOWS\system32\4ed23d49.dll
C:\WINDOWS\system32\289C59A3.sys
Behavior description:修改文件内容
details:C:\5549719e.exe ---> Offset = 0
C:\Documents and Settings\Infotmp.txt ---> Offset = 0
C:\WINDOWS\system32\4ed23d49.dll ---> Offset = 0
C:\WINDOWS\system32\289C59A3.sys ---> Offset = 0
Behavior description:查找文件
details:FileName = C:\WINDOWS
FileName = C:\WINDOWS\WinSxS
FileName = C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll
FileName = C:\5549719e.exe
FileName = C:\WINDOWS\system32
FileName = C:\WINDOWS\system32\reg.exe
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\SessionInformation\ProgramCount
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Enum\SW\{eec12db6-ad9c-4168-8658-b03daef417fe}\{ABD61E00-9350-47e2-A632-4438B90C6641}\Service
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Enum\SW\{eec12db6-ad9c-4168-8658-b03daef417fe}\{ABD61E00-9350-47e2-A632-4438B90C6641}\ConfigFlags
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\289C59A3\Type
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\289C59A3\ErrorControl
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU\MRUList
Behavior description:修改注册表_服务项
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\289C59A3\Start
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\289C59A3\ImagePath
Behavior description:删除注册表键
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\DeviceClasses\{ffbb6e3f-ccfe-4d84-90d9-421418b03a8e}\##?#Root#SYSTEM#0000#{ffbb6e3f-ccfe-4d84-90d9-421418b03a8e}\Control\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\DeviceClasses\{ffbb6e3f-ccfe-4d84-90d9-421418b03a8e}\##?#Root#SYSTEM#0000#{ffbb6e3f-ccfe-4d84-90d9-421418b03a8e}\#{eec12db6-ad9c-4168-8658-b03daef417fe}&{ABD61E00-9350-47e2-A632-4438B90C6641}\Control\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\DeviceClasses\{ffbb6e3f-ccfe-4d84-90d9-421418b03a8e}\##?#Root#SYSTEM#0000#{ffbb6e3f-ccfe-4d84-90d9-421418b03a8e}\#{eec12db6-ad9c-4168-8658-b03daef417fe}&{ABD61E00-9350-47e2-A632-4438B90C6641}\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\DeviceClasses\{ffbb6e3f-ccfe-4d84-90d9-421418b03a8e}\##?#Root#SYSTEM#0000#{ffbb6e3f-ccfe-4d84-90d9-421418b03a8e}\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\DeviceClasses\{ffbb6e3f-ccfe-4d84-90d9-421418b03a8e}\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Enum\SW\{eec12db6-ad9c-4168-8658-b03daef417fe}\{ABD61E00-9350-47e2-A632-4438B90C6641}\Control\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Enum\SW\{eec12db6-ad9c-4168-8658-b03daef417fe}\{ABD61E00-9350-47e2-A632-4438B90C6641}\LogConf\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Enum\SW\{eec12db6-ad9c-4168-8658-b03daef417fe}\{ABD61E00-9350-47e2-A632-4438B90C6641}\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Enum\SW\{eec12db6-ad9c-4168-8658-b03daef417fe}\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\swenum\Devices\{eec12db6-ad9c-4168-8658-b03daef417fe}\{ABD61E00-9350-47e2-A632-4438B90C6641}\{ffbb6e3f-ccfe-4d84-90d9-421418b03a8e}\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\swenum\Devices\{eec12db6-ad9c-4168-8658-b03daef417fe}\{ABD61E00-9350-47e2-A632-4438B90C6641}\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\swenum\Devices\{eec12db6-ad9c-4168-8658-b03daef417fe}\
\REGISTRY\MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW\
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{67ff5543-c5c9-11e0-9f6d-806d6172696f}\
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\CPC\Volume\{61066b64-7a09-11e4-91b2-806d6172696f}\
Behavior description:修改注册表_安装输入法项
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Keyboard Layouts\E0200409\Layout Text
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Keyboard Layouts\E0200409\Layout File
\REGISTRY\USER\S-*\Keyboard Layout\Preload\2
Behavior description:删除注册表键值
details:\REGISTRY\USER\S-*\Keyboard Layout\Preload\2
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\{DD61BB6\Enum\0
\REGISTRY\MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW\DWFileTreeRoot
Behavior description:删除注册表键_安装输入法项
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Keyboard Layouts\E0200409\
Other behavior
Behavior description:设置对象安全信息
details:MACHINE\SYSTEM\CurrentControlSet\Enum\SW
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
Behavior description:创建事件对象
details:EventName = Global\crypt32LogoffEvent
EventName = {5DA73361-9169-470d-A278-F0F58FD22476}
EventName = FS98MAIN
EventName = MSCTF.SendReceive.Event.MJH.IC
EventName = MSCTF.SendReceiveConection.Event.MJH.IC
EventName = Global\{01277674-32D0-4bf9-80B3-473F2383C8DC}
Behavior description:对比可疑进程名
details:lstrcmpiA: [System Process] <------> ZhuDongFangYu.exe Des: 360主动防御
lstrcmpiA: [System Process] <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: System <------> ZhuDongFangYu.exe Des: 360主动防御
lstrcmpiA: System <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: smss.exe <------> ZhuDongFangYu.exe Des: 360主动防御
lstrcmpiA: smss.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: csrss.exe <------> ZhuDongFangYu.exe Des: 360主动防御
lstrcmpiA: csrss.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: winlogon.exe <------> ZhuDongFangYu.exe Des: 360主动防御
lstrcmpiA: winlogon.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: services.exe <------> ZhuDongFangYu.exe Des: 360主动防御
lstrcmpiA: services.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: lsass.exe <------> ZhuDongFangYu.exe Des: 360主动防御
lstrcmpiA: lsass.exe <------> 360Safe.exe Des: 360安全卫士
lstrcmpiA: 33oxService.exe <------> ZhuDongFangYu.exe Des: 360主动防御
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [,Program Manager]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
Behavior description:窗口信息
details:Pid = 588, Hwnd=0x20098, Text = 确定, ClassName = Button.
Pid = 588, Hwnd=0x302ba, Text = Error ID = 25 (null), ClassName = Static.
Pid = 588, Hwnd=0x4003e, Text = 错误, ClassName = #32770.
Pid = 588, Hwnd=0x160142, Text = 确定, ClassName = Button.
Pid = 588, Hwnd=0x6003e, Text = 取消, ClassName = Button.
Pid = 588, Hwnd=0x3015a, Text = "0x77dc4c38" 指令引用的 "0x85f444c8" 内存。该内存不能为 "written"。 要终止程序,请单击“确定”。 要调试程序,请单击“取消”。, ClassName = Static.
Pid = 588, Hwnd=0x1d0134, Text = Explorer.EXE - 应用程序错误, ClassName = #32770.
Pid = 588, Hwnd=0x1033a, Text = 确定, ClassName = Button.
Pid = 588, Hwnd=0x1033c, Text = 取消, ClassName = Button.
Pid = 588, Hwnd=0x10340, Text = "0x769da72b" 指令引用的 "0x00740066" 内存。该内存不能为 "read"。 要终止程序,请单击“确定”。 要调试程序,请单击“取消”。, ClassName = Static.
Pid = 588, Hwnd=0x10338, Text = Explorer.EXE - 应用程序错误, ClassName = #32770.
Pid = 588, Hwnd=0x2033e, Text = 确定, ClassName = Button.
Pid = 588, Hwnd=0x2033c, Text = 取消, ClassName = Button.
Pid = 588, Hwnd=0x30352, Text = "0x001420f0" 指令引用的 "0x001420f0" 内存。该内存不能为 "written"。 要终止程序,请单击“确定”。 要调试程序,请单击“取消”。, ClassName = Static.
Pid = 588, Hwnd=0x20340, Text = Explorer.EXE - 应用程序错误, ClassName = #32770.
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:枚举窗口
details:N/A
Behavior description:可执行文件签名信息
details:C:\5549719e.exe(签名验证: 未通过)
C:\WINDOWS\system32\4ed23d49.dll(签名验证: 未通过)
C:\WINDOWS\system32\289C59A3.sys(签名验证: 未通过)
Behavior description:可执行文件MD5
details:C:\5549719e.exe ---> 2f85e77cf24aeccc9b45fbb8111e8281
C:\WINDOWS\system32\4ed23d49.dll ---> 9998f3c081fe4f1868a46f19ba376b45
C:\WINDOWS\system32\289C59A3.sys ---> 4e43b848e244fd5b0730c664ff66627c
Behavior description:加载新释放的文件
details:Image: C:\WINDOWS\system32\4ed23d49.dll.
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号