VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

文件信息
安全评分 :79
基本信息
MD5:e5599268c77a2c6d65d0f3e930b01eb1
文件类型:EXE
出品公司:
版本:
壳或编译器信息:PACKER:UPolyX v0.5
关键行为
行为描述:直接调用系统关键API
详情信息:Index = 0x000000E5, Name: NtSetInformationThread, Instruction Address = 0x00A8E6E1
Index = 0x0000009B, Name: NtQueryInformationThread, Instruction Address = 0x009EFB8F
Index = 0x000000E5, Name: NtSetInformationThread, Instruction Address = 0x00A5DEA9
行为描述:设置特殊文件夹属性
详情信息:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\IETldCache
行为描述:直接获取CPU时钟
详情信息:EAX = 0x7a8bd68e, EDX = 0x000000b7
EAX = 0x7a8bd6da, EDX = 0x000000b7
EAX = 0x7a8bd726, EDX = 0x000000b7
EAX = 0x7a8bd772, EDX = 0x000000b7
EAX = 0x7fc6a62b, EDX = 0x000000b7
EAX = 0x7fc6a677, EDX = 0x000000b7
EAX = 0x7fc6a6c3, EDX = 0x000000b7
EAX = 0x7fc6a70f, EDX = 0x000000b7
EAX = 0x7fc6a75b, EDX = 0x000000b7
EAX = 0x824e76e4, EDX = 0x000000b7
进程行为
行为描述:创建本地线程
详情信息:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2676, ThreadID = 2912, StartAddress = 009F0695, Parameter = 001967C0
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2676, ThreadID = 2916, StartAddress = 009F0695, Parameter = 001967C0
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2676, ThreadID = 3044, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2676, ThreadID = 3128, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2676, ThreadID = 3148, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2676, ThreadID = 3152, StartAddress = 7C930230, Parameter = 00000000
文件行为
行为描述:创建文件
详情信息:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\blog_bfa8f06a0102x4as[1].html
行为描述:覆盖已有文件
详情信息:C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
行为描述:删除文件
详情信息:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\blog_bfa8f06a0102x4as[1].html
行为描述:设置特殊文件夹属性
详情信息:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\IETldCache
行为描述:查找文件
详情信息:FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\WINDOWS\system32\Ras\*.pbk
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\Documents and Settings\Administrator\Local Settings\History\History.IE5\MSHist012016091220160913\*.*
网络行为
行为描述:连接指定站点
详情信息:InternetConnectA: ServerName = bl****cn, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
行为描述:打开HTTP连接
详情信息:InternetOpenA: UserAgent: Mozilla/5.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/5.0), hSession = 0x00cc0004
行为描述:建立到一个指定的套接字连接
详情信息:URL: bl****cn, IP: **.133.40.**:80, SOCKET = 0x000002bc
URL: bl****cn, IP: **.133.40.**:80, SOCKET = 0x000002c0
行为描述:读取网络文件
详情信息:hFile = 0x00cc000c, BytesToRead =1024, BytesRead = 1024.
行为描述:发送HTTP包
详情信息:GET /s/blog_bfa8f06a0102x4as.html HTTP/1.1 Accept: */* Referer: http://blog.sina.com.cn/s/blog_bfa8f06a0102x4as.html Accept-Language: zh-cn Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/5.0) Host: bl****cn Cache-Control: no-cache
行为描述:打开HTTP请求
详情信息:HttpOpenRequestA: bl****cn:80/s/blog_bfa8f06a0102x4as.html, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x80004010
行为描述:按名称获取主机地址
详情信息:GetAddrInfoW: bl****cn
注册表行为
行为描述:修改注册表
详情信息:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
行为描述:删除注册表键值
详情信息:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyOverride
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
其他行为
行为描述:直接调用系统关键API
详情信息:Index = 0x000000E5, Name: NtSetInformationThread, Instruction Address = 0x00A8E6E1
Index = 0x0000009B, Name: NtQueryInformationThread, Instruction Address = 0x009EFB8F
Index = 0x000000E5, Name: NtSetInformationThread, Instruction Address = 0x00A5DEA9
行为描述:创建互斥体
详情信息:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
RasPbFile
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
Local\c:!documents and settings!administrator!ietldcache!
MSCTF.Shared.MUTEX.IHK
行为描述:创建事件对象
详情信息:EventName = DINPUTWINMM
EventName = Global\userenv: User Profile setup event
EventName = MSCTF.SendReceive.Event.IHK.IC
EventName = MSCTF.SendReceiveConection.Event.IHK.IC
行为描述:打开互斥体
详情信息:ShimCacheMutex
Local\_!MSFTHISTORY!_
Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Local\c:!documents and settings!administrator!cookies!
Local\c:!documents and settings!administrator!local settings!history!history.ie5!
Local\WininetStartupMutex
Local\WininetConnectionMutex
Local\WininetProxyRegistryMutex
RasPbFile
Local\!IETld!Mutex
Local\c:!documents and settings!administrator!ietldcache!
行为描述:查找指定窗口
详情信息:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
行为描述:窗口信息
详情信息:Pid = 2676, Hwnd=0x2044c, Text = 确定, ClassName = Button.
Pid = 2676, Hwnd=0x10450, Text = 获取服务器信息超时, 重开辅助试试~, ClassName = Static.
Pid = 2676, Hwnd=0x303d2, Text = Message, ClassName = #32770.
行为描述:调整进程token权限
详情信息:SE_DEBUG_PRIVILEGE
行为描述:打开事件
详情信息:HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Global\SvcctrlStartEvent_A3752DX
\INSTALLATION_SECURITY_HOLD
行为描述:直接获取CPU时钟
详情信息:EAX = 0x7a8bd68e, EDX = 0x000000b7
EAX = 0x7a8bd6da, EDX = 0x000000b7
EAX = 0x7a8bd726, EDX = 0x000000b7
EAX = 0x7a8bd772, EDX = 0x000000b7
EAX = 0x7fc6a62b, EDX = 0x000000b7
EAX = 0x7fc6a677, EDX = 0x000000b7
EAX = 0x7fc6a6c3, EDX = 0x000000b7
EAX = 0x7fc6a70f, EDX = 0x000000b7
EAX = 0x7fc6a75b, EDX = 0x000000b7
EAX = 0x824e76e4, EDX = 0x000000b7
运行截图
VirSCAN

About VirSCAN | Privacy Policy | Contact us | link | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号