VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:79
Behavior list
Basic Information
MD5:02a74feacbdff9ef3962551ecf301e71
file type:Rar
Production company:
version:
Shell or compiler information:COMPILER:Microsoft Visual Studio .NET 2005 -- 2008 -> Microsoft Corporation [Overlay] *
Subfile information:CADReader.exedumpFile / 24b7efe7725da5a44a1c16d74b7636a3 / EXE
Key behavior
Behavior description:直接获取CPU时钟
details:EAX = 0x4016108b, EDX = 0x000011a5
EAX = 0x52fb0b27, EDX = 0x000011a5
EAX = 0x5835d9e0, EDX = 0x000011a5
EAX = 0x6dcdd3ac, EDX = 0x000011a5
Behavior description:获取TickCount值
details:TickCount = 5451425, SleepMilliseconds = 50.
TickCount = 5452050, SleepMilliseconds = 50.
TickCount = 5452284, SleepMilliseconds = 50.
TickCount = 5453159, SleepMilliseconds = 50.
TickCount = 5453175, SleepMilliseconds = 50.
TickCount = 5453237, SleepMilliseconds = 50.
TickCount = 5453268, SleepMilliseconds = 50.
TickCount = 5460643, SleepMilliseconds = 50.
TickCount = 5463940, SleepMilliseconds = 50.
TickCount = 5463956, SleepMilliseconds = 50.
TickCount = 5477081, SleepMilliseconds = 50.
TickCount = 5477128, SleepMilliseconds = 50.
TickCount = 5477143, SleepMilliseconds = 50.
TickCount = 5477159, SleepMilliseconds = 50.
TickCount = 5537281, SleepMilliseconds = 60000.
Process behavior
Behavior description:创建进程
details:[0x00000f10]ImagePath = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\CADReader\MsgPoper.exe, CmdLine = "C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\CADReader\msgpoper.exe"
Behavior description:创建本地线程
details:TargetProcess: CADReader.exe, InheritedFromPID = 1944, ProcessID = 3436, ThreadID = 3468, StartAddress = 78AFC724, Parameter = 032FB410
TargetProcess: CADReader.exe, InheritedFromPID = 1944, ProcessID = 3436, ThreadID = 3472, StartAddress = 78AFC724, Parameter = 032FB410
TargetProcess: CADReader.exe, InheritedFromPID = 1944, ProcessID = 3436, ThreadID = 3476, StartAddress = 78AFC724, Parameter = 032FB410
TargetProcess: CADReader.exe, InheritedFromPID = 1944, ProcessID = 3436, ThreadID = 3480, StartAddress = 719CD33A, Parameter = 001AD218
TargetProcess: CADReader.exe, InheritedFromPID = 1944, ProcessID = 3436, ThreadID = 3496, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: CADReader.exe, InheritedFromPID = 1944, ProcessID = 3436, ThreadID = 3520, StartAddress = 78AFC724, Parameter = 04789830
TargetProcess: CADReader.exe, InheritedFromPID = 1944, ProcessID = 3436, ThreadID = 3832, StartAddress = 77E56C7D, Parameter = 001C2DF8
TargetProcess: CADReader.exe, InheritedFromPID = 1944, ProcessID = 3436, ThreadID = 3836, StartAddress = 769AE43B, Parameter = 001C36D0
File behavior
Behavior description:查找文件
details:FileName = *.fip
FileName = plugins\*.fip
FileName = \\?\C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\CADReader\plugins\imageformats\*
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\CADReader\msgpoper.exe
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\CADReader
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\CADReader\MsgPoper.exe
FileName = \\?\C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\CADReader\*
FileName = \\?\C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\CADReader\CADReader\*
FileName = \\?\C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\CADReader\plugins\*
Network behavior
Behavior description:建立到一个指定的套接字连接
details:URL: ca****om, IP: **.133.40.**:80, SOCKET = 0x00000240
URL: ca****om, IP: **.133.40.**:80, SOCKET = 0x000004f4
Behavior description:发送HTTP包
details:GET /update/version/info/cadpc?clientVersion=5.3.3.39 HTTP/1.1 Connection: Keep-Alive Accept-Encoding: gzip Accept-Language: zh-CN,en,* User-Agent: Mozilla/5.0 Host: ca****om
POST /receiver/infosimple/cadpc HTTP/1.1 Content-Length: 114 Connection: Keep-Alive Accept-Encoding: gzip Accept-Language: zh-CN,en,* User-Agent: Mozilla/5.0 Host: ca****om Content-Type: application/x-www-form-urlencoded
Behavior description:按名称获取主机地址
details:GetAddrInfoW: ca****om
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication\Name
\REGISTRY\MACHINE\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication\ID
\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\CADReader\DEBUG\Trace Level
\REGISTRY\USER\S-*\Software\Trolltech\OrganizationDefaults\Qt Plugin Cache 4.8.false\C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\CADReader\plugins\imageformats\qgif4.dll
\REGISTRY\USER\S-*\Software\Trolltech\OrganizationDefaults\Qt Factory Cache 4.8\com.trolltech.Qt.QImageIOHandlerFactoryInterface:\C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\CADReader\plugins\imageformats\qgif4.dll
\REGISTRY\USER\S-*\Software\Trolltech\OrganizationDefaults\Qt Plugin Cache 4.8.false\C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\CADReader\plugins\imageformats\qgif4.dll-samplefile
\REGISTRY\USER\S-*\Software\Trolltech\OrganizationDefaults\Qt Plugin Cache 4.8.false\C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\CADReader\plugins\imageformats\qjpeg4.dll
\REGISTRY\USER\S-*\Software\Trolltech\OrganizationDefaults\Qt Factory Cache 4.8\com.trolltech.Qt.QImageIOHandlerFactoryInterface:\C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\CADReader\plugins\imageformats\qjpeg4.dll
\REGISTRY\USER\S-*\Software\Trolltech\OrganizationDefaults\Qt Plugin Cache 4.8.false\C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\CADReader\plugins\imageformats\qjpeg4.dll-samplefile
\REGISTRY\USER\S-*\Software\GrandSoft\CADReader\CloudConfig\NeedRestoreLastOpenStatus
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\CADReader\msgpoper.exe
Behavior description:删除注册表键值
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\CADReader\DEBUG\Trace Level
Other behavior
Behavior description:获取光标位置
details:CursorPos = (96,18500), SleepMilliseconds = 50.
CursorPos = (6389,26533), SleepMilliseconds = 50.
CursorPos = (19224,15757), SleepMilliseconds = 50.
Behavior description:创建互斥体
details:DDrawWindowListMutex
DDrawDriverObjectListMutex
__DDrawExclMode__
__DDrawCheckExclMode__
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
RasPbFile
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.AHN
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = Global\crypt32LogoffEvent
EventName = MSCTF.SendReceive.Event.AHN.IC
EventName = MSCTF.SendReceiveConection.Event.AHN.IC
Behavior description:打开互斥体
details:ShimCacheMutex
RasPbFile
DBWinMutex
Local\!IETld!Mutex
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:窗口信息
details:Pid = 3436, Hwnd=0x100320, Text = 提示, ClassName = QWidget.
Behavior description:获取TickCount值
details:TickCount = 5451425, SleepMilliseconds = 50.
TickCount = 5452050, SleepMilliseconds = 50.
TickCount = 5452284, SleepMilliseconds = 50.
TickCount = 5453159, SleepMilliseconds = 50.
TickCount = 5453175, SleepMilliseconds = 50.
TickCount = 5453237, SleepMilliseconds = 50.
TickCount = 5453268, SleepMilliseconds = 50.
TickCount = 5460643, SleepMilliseconds = 50.
TickCount = 5463940, SleepMilliseconds = 50.
TickCount = 5463956, SleepMilliseconds = 50.
TickCount = 5477081, SleepMilliseconds = 50.
TickCount = 5477128, SleepMilliseconds = 50.
TickCount = 5477143, SleepMilliseconds = 50.
TickCount = 5477159, SleepMilliseconds = 50.
TickCount = 5537281, SleepMilliseconds = 60000.
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
Global\crypt32LogoffEvent
Global\SvcctrlStartEvent_A3752DX
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000052
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000052
MSCTF.SendReceiveConection.Event.ELH.IC
MSCTF.SendReceive.Event.ELH.IC
MSFT.VSA.COM.DISABLE.3436
MSFT.VSA.IEC.STATUS.6c736db0
_fCanRegisterWithShellService
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 50.
[2]: MilliSeconds = 50.
[3]: MilliSeconds = 60000.
Behavior description:隐藏指定窗口
details:[Window,Class] = [提示,QWidget]
Behavior description:直接获取CPU时钟
details:EAX = 0x4016108b, EDX = 0x000011a5
EAX = 0x52fb0b27, EDX = 0x000011a5
EAX = 0x5835d9e0, EDX = 0x000011a5
EAX = 0x6dcdd3ac, EDX = 0x000011a5
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号