VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:032fd206ed3d8667f05e985e0c2e9be0
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 跨进程写入数据
details: TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x00400000, Size = 0x00000200 TargetPID = 0x00000b18
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x00480000, Size = 0x00000a00 TargetPID = 0x00000b18
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x00482000, Size = 0x00000200 TargetPID = 0x00000b18
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x7ffde008, Size = 0x00000004 TargetPID = 0x00000b18
Behavior description: 设置消息钩子
details: C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
Behavior description: 设置线程上下文
details: C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
Behavior description: 获取TickCount值
details: TickCount = 228609, SleepMilliseconds = 10000.
TickCount = 220921, SleepMilliseconds = 2000.
TickCount = 221031, SleepMilliseconds = 2000.
TickCount = 221046, SleepMilliseconds = 2000.
TickCount = 219098, SleepMilliseconds = 20.
TickCount = 219113, SleepMilliseconds = 20.
TickCount = 219514, SleepMilliseconds = -1.
TickCount = 219530, SleepMilliseconds = -1.
TickCount = 219577, SleepMilliseconds = -1.
TickCount = 219608, SleepMilliseconds = -1.
TickCount = 219717, SleepMilliseconds = -1.
TickCount = 219733, SleepMilliseconds = -1.
TickCount = 220124, SleepMilliseconds = -1.
TickCount = 221003, SleepMilliseconds = 50.
TickCount = 221050, SleepMilliseconds = 50.
Behavior description: 跨进程写代码段数据
details: TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x00402000, Size = 0x0007cc00 TargetPID = 0x00000b18
Behavior description: 直接获取CPU时钟
details: EAX = 0x186b7f47, EDX = 0x000000b5
EAX = 0x186b7f93, EDX = 0x000000b5
EAX = 0x186b7fdf, EDX = 0x000000b5
EAX = 0x186b802b, EDX = 0x000000b5
EAX = 0x2d81ea1e, EDX = 0x000000b5
EAX = 0x2d81ea6a, EDX = 0x000000b5
EAX = 0x2d81eab6, EDX = 0x000000b5
EAX = 0x2d81eb02, EDX = 0x000000b5
EAX = 0x57aebe9c, EDX = 0x000000b5
EAX = 0x5a61be18, EDX = 0x000000b5

Process behavior

Behavior description: 创建进程
details: [0x00000b18]ImagePath = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, CmdLine = "C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe"
Behavior description: 创建本地线程
details: TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2688, ThreadID = 2712, StartAddress = 79F0237F, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2688, ThreadID = 2748, StartAddress = 79F91FCF, Parameter = 001A5780
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2688, ThreadID = 2848, StartAddress = 79F91FCF, Parameter = 001DFB10
TargetProcess: %temp%\****.exe, InheritedFromPID = 2688, ProcessID = 2840, ThreadID = 2852, StartAddress = 79F0237F, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2688, ProcessID = 2840, ThreadID = 2856, StartAddress = 79F91FCF, Parameter = 001A5780
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2688, ThreadID = 2860, StartAddress = 79FDA29C, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2688, ThreadID = 2864, StartAddress = 77E56C7D, Parameter = 001E2068
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2688, ThreadID = 2868, StartAddress = 769AE43B, Parameter = 001ED798
TargetProcess: %temp%\****.exe, InheritedFromPID = 2688, ProcessID = 2840, ThreadID = 2896, StartAddress = 7A13BE84, Parameter = 001C1CC0
TargetProcess: %temp%\****.exe, InheritedFromPID = 2688, ProcessID = 2840, ThreadID = 2900, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2688, ProcessID = 2840, ThreadID = 2904, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2688, ProcessID = 2840, ThreadID = 2908, StartAddress = 77E56C7D, Parameter = 001EC870
TargetProcess: %temp%\****.exe, InheritedFromPID = 2688, ProcessID = 2840, ThreadID = 2912, StartAddress = 769AE43B, Parameter = 001D6BD0
TargetProcess: %temp%\****.exe, InheritedFromPID = 2688, ProcessID = 2840, ThreadID = 2916, StartAddress = 79F91FCF, Parameter = 001F1298
TargetProcess: %temp%\****.exe, InheritedFromPID = 2688, ProcessID = 2840, ThreadID = 2920, StartAddress = 79F91FCF, Parameter = 00203EC8
Behavior description: 跨进程写入数据
details: TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x00400000, Size = 0x00000200 TargetPID = 0x00000b18
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x00480000, Size = 0x00000a00 TargetPID = 0x00000b18
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x00482000, Size = 0x00000200 TargetPID = 0x00000b18
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x7ffde008, Size = 0x00000004 TargetPID = 0x00000b18
Behavior description: 设置线程上下文
details: C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
Behavior description: 枚举进程
details: N/A
Behavior description: 跨进程写代码段数据
details: TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x00402000, Size = 0x0007cc00 TargetPID = 0x00000b18

File behavior

Behavior description: 创建文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\svhost.exe
C:\Documents and Settings\Administrator\Application Data\pid.txt
C:\Documents and Settings\Administrator\Application Data\pidloc.txt
Behavior description: 创建可执行文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\svhost.exe
Behavior description: 覆盖已有文件
details: C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
Behavior description: 查找文件
details: FileName = C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll
FileName = C:\WINDOWS\Microsoft.NET\Framework\\*
FileName = C:\WINDOWS
FileName = C:\WINDOWS\WinSxS
FileName = C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll
FileName = C:\WINDOWS\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.INI
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\996E.INI
FileName = C:\WINDOWS\assembly\GAC_MSIL\Microsoft.VisualBasic\8.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.INI
FileName = C:\WINDOWS\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.INI
Behavior description: 复制文件
details: C:\WINDOWS\Microsoft.NET\Framework\v3.5\MSBuild.exe ---> C:\Documents and Settings\Administrator\Local Settings\Temp\svhost.exe
Behavior description: 修改文件内容
details: C:\Documents and Settings\Administrator\Local Settings\Temp\svhost.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\svhost.exe ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Temp\svhost.exe ---> Offset = 4096
C:\Documents and Settings\Administrator\Local Settings\Temp\svhost.exe ---> Offset = 8192
C:\Documents and Settings\Administrator\Application Data\pid.txt ---> Offset = 0
C:\Documents and Settings\Administrator\Application Data\pidloc.txt ---> Offset = 0
C:\WINDOWS\system32\wbem\Logs\wbemprox.log ---> Offset = 224
C:\WINDOWS\system32\wbem\Logs\wbemprox.log ---> Offset = 299

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\996E\DEBUG\Trace Level
Behavior description: 删除注册表键值
details: \REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\996E\DEBUG\Trace Level

Other behavior

Behavior description: 检测自身是否被调试
details: IsDebuggerPresent
Behavior description: 创建互斥体
details: CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
Global\.net clr networking
RasPbFile
Behavior description: 创建事件对象
details: EventName = Global\CorDBIPCSetupSyncEvent_2688
EventName = Global\CorDBIPCSetupSyncEvent_2840
EventName = e48811ca-8af8-4e73-85dd-2045b9cca73a1.0Event
EventName = e48811ca-8af8-4e73-85dd-2045b9cca73a1.0Event2
EventName = Global\crypt32LogoffEvent
EventName = DINPUTWINMM
Behavior description: 打开互斥体
details: ShimCacheMutex
Global\CLR_CASOFF_MUTEX
Global\.net clr networking
RasPbFile
Behavior description: 加密数据
details: [CryptEncrypt] Data: 0x001C8E60, PlainTextLen: 16, CipherTextLen: 16, Flags: 0x00000000
[CryptEncrypt] Data: 0x001DBBA0, PlainTextLen: 16, CipherTextLen: 16, Flags: 0x00000000
Behavior description: 窗口信息
details: Pid = 2840, Hwnd=0x10348, Text = Debugger, ClassName = WindowsForms10.Window.8.app.0.378734a.
Behavior description: 获取TickCount值
details: TickCount = 228609, SleepMilliseconds = 10000.
TickCount = 220921, SleepMilliseconds = 2000.
TickCount = 221031, SleepMilliseconds = 2000.
TickCount = 221046, SleepMilliseconds = 2000.
TickCount = 219098, SleepMilliseconds = 20.
TickCount = 219113, SleepMilliseconds = 20.
TickCount = 219514, SleepMilliseconds = -1.
TickCount = 219530, SleepMilliseconds = -1.
TickCount = 219577, SleepMilliseconds = -1.
TickCount = 219608, SleepMilliseconds = -1.
TickCount = 219717, SleepMilliseconds = -1.
TickCount = 219733, SleepMilliseconds = -1.
TickCount = 220124, SleepMilliseconds = -1.
TickCount = 221003, SleepMilliseconds = 50.
TickCount = 221050, SleepMilliseconds = 50.
Behavior description: 调整进程token权限
details: SE_DEBUG_PRIVILEGE
Behavior description: 打开事件
details: Global\CLR_PerfMon_StartEnumEvent
\KernelObjects\LowMemoryCondition
HookSwitchHookEnabledEvent
MSFT.VSA.COM.DISABLE.2688
MSFT.VSA.IEC.STATUS.6c736db0
Global\crypt32LogoffEvent
MSFT.VSA.COM.DISABLE.2840
Behavior description: 可执行文件签名信息
details: C:\Documents and Settings\Administrator\Local Settings\Temp\svhost.exe(签名验证: 通过)
Behavior description: 调用Sleep函数
details: [2]: MilliSeconds = 100.
[1]: MilliSeconds = 2000.
[3]: MilliSeconds = 10000.
[4]: MilliSeconds = 2000.
[5]: MilliSeconds = 2000.
[6]: MilliSeconds = 2000.
[7]: MilliSeconds = -1.
[8]: MilliSeconds = 20.
[9]: MilliSeconds = 20.
[1]: MilliSeconds = -1.
[2]: MilliSeconds = 0.
[3]: MilliSeconds = 50.
[4]: MilliSeconds = 50.
[5]: MilliSeconds = 60000.
[6]: MilliSeconds = 60000.
Behavior description: 可执行文件MD5
details: C:\Documents and Settings\Administrator\Local Settings\Temp\svhost.exe ---> 160ce92b1fc86b1c25297e5dfded3a77
Behavior description: 直接获取CPU时钟
details: EAX = 0x186b7f47, EDX = 0x000000b5
EAX = 0x186b7f93, EDX = 0x000000b5
EAX = 0x186b7fdf, EDX = 0x000000b5
EAX = 0x186b802b, EDX = 0x000000b5
EAX = 0x2d81ea1e, EDX = 0x000000b5
EAX = 0x2d81ea6a, EDX = 0x000000b5
EAX = 0x2d81eab6, EDX = 0x000000b5
EAX = 0x2d81eb02, EDX = 0x000000b5
EAX = 0x57aebe9c, EDX = 0x000000b5
EAX = 0x5a61be18, EDX = 0x000000b5
Behavior description: 解密数据
details: [CryptDecrypt] Data: 0x001C9008, CipherTextLen: 4928, PlainTextLen: 4928, Flags: 0x00000000
[CryptDecrypt] Data: 0x01140020, CipherTextLen: 531760, PlainTextLen: 531760, Flags: 0x00000000
Behavior description: 导入密钥
details: [CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x00423793, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001C130C, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001C7FCC, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_DES (0x00006601), Data: 0x001C7C38, DataLen: 20, Flags: 0x00000001
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001952A4, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001C8074, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001DB8BC, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_DES (0x00006601), Data: 0x001DBF50, DataLen: 20, Flags: 0x00000001
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x0114068B, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001BB4AC, DataLen: 148, Flags: 0x00000000