VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:0c8a4e45ee2934c41c4eb7491a6cfb2e
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 获取TickCount值
details: TickCount = 218750, SleepMilliseconds = 1000.
TickCount = 218906, SleepMilliseconds = 1000.
TickCount = 219046, SleepMilliseconds = 1000.
TickCount = 219078, SleepMilliseconds = 1000.
TickCount = 219109, SleepMilliseconds = 1000.
TickCount = 219125, SleepMilliseconds = 1000.
TickCount = 219718, SleepMilliseconds = 1000.
TickCount = 219734, SleepMilliseconds = 1000.
TickCount = 218754, SleepMilliseconds = 20.
TickCount = 218801, SleepMilliseconds = 20.
TickCount = 218816, SleepMilliseconds = 20.
TickCount = 218848, SleepMilliseconds = 20.
TickCount = 225671, SleepMilliseconds = 1000.
TickCount = 226734, SleepMilliseconds = 2000.
TickCount = 226750, SleepMilliseconds = 2000.
Behavior description: 利用进程调试属性使系统蓝屏
details: N/A
Behavior description: 修改注册表_系统防火墙可信进程列表
details: \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Documents and Settings\Administrator\Application Data\ProcessHacker.exe
Behavior description: 设置启动项
details: C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\a223d1b02de5a23bdfdf789bdb7360de.exe
Behavior description: 直接获取CPU时钟
details: EAX = 0x1477e646, EDX = 0x000000bb
EAX = 0x65de8102, EDX = 0x000000bb
EAX = 0x62138563, EDX = 0x000000bc
EAX = 0x621385af, EDX = 0x000000bc
EAX = 0x6269e5e1, EDX = 0x000000bc
EAX = 0x6269e62d, EDX = 0x000000bc
EAX = 0x6269e679, EDX = 0x000000bc
EAX = 0x6269e6c5, EDX = 0x000000bc
EAX = 0x6269e711, EDX = 0x000000bc
EAX = 0x6269e75d, EDX = 0x000000bc
Behavior description: 修改注册表_启动项
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Run\a223d1b02de5a23bdfdf789bdb7360de
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a223d1b02de5a23bdfdf789bdb7360de

Process behavior

Behavior description: 隐藏窗口创建进程
details: ImagePath = , CmdLine = netsh firewall add allowedprogram "C:\Documents and Settings\Administrator\Application Data\ProcessHacker.exe" "ProcessHacker.exe" ENABLE
Behavior description: 创建进程
details: [0x00000b18]ImagePath = C:\WINDOWS\system32\netsh.exe, CmdLine = netsh firewall add allowedprogram "C:\Documents and Settings\Administrator\Application Data\ProcessHacker.exe" "ProcessHacker.exe" ENABLE
Behavior description: 创建新文件进程
details: [0x00000ae0]ImagePath = C:\Documents and Settings\Administrator\Application Data\ProcessHacker.exe, CmdLine = "C:\Documents and Settings\Administrator\Application Data\ProcessHacker.exe"
Behavior description: 创建本地线程
details: TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2628, ThreadID = 2664, StartAddress = 79F0237F, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2628, ThreadID = 2692, StartAddress = 79F91FCF, Parameter = 00195778
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2628, ThreadID = 2792, StartAddress = 79FDA29C, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2628, ThreadID = 2796, StartAddress = 77E56C7D, Parameter = 001E0BF0
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2628, ThreadID = 2800, StartAddress = 769AE43B, Parameter = 001C1A08
TargetProcess: ProcessHacker.exe, InheritedFromPID = 2628, ProcessID = 2784, ThreadID = 2804, StartAddress = 79F0237F, Parameter = 00000000
TargetProcess: ProcessHacker.exe, InheritedFromPID = 2628, ProcessID = 2784, ThreadID = 2808, StartAddress = 79F91FCF, Parameter = 00195560
TargetProcess: netsh.exe, InheritedFromPID = 2784, ProcessID = 2840, ThreadID = 2848, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: netsh.exe, InheritedFromPID = 2784, ProcessID = 2840, ThreadID = 2852, StartAddress = 77E56C7D, Parameter = 001B7460
TargetProcess: netsh.exe, InheritedFromPID = 2784, ProcessID = 2840, ThreadID = 2856, StartAddress = 769AE43B, Parameter = 001B9040
TargetProcess: netsh.exe, InheritedFromPID = 2784, ProcessID = 2840, ThreadID = 2860, StartAddress = 77E56C7D, Parameter = 001BE328
TargetProcess: ProcessHacker.exe, InheritedFromPID = 2628, ProcessID = 2784, ThreadID = 2940, StartAddress = 79F91FCF, Parameter = 001BC208
TargetProcess: ProcessHacker.exe, InheritedFromPID = 2628, ProcessID = 2784, ThreadID = 2952, StartAddress = 79F91FCF, Parameter = 001BC208
TargetProcess: ProcessHacker.exe, InheritedFromPID = 2628, ProcessID = 2784, ThreadID = 3052, StartAddress = 77E56C7D, Parameter = 001D1DE0
TargetProcess: ProcessHacker.exe, InheritedFromPID = 2628, ProcessID = 2784, ThreadID = 3060, StartAddress = 769AE43B, Parameter = 001CB198

File behavior

Behavior description: 创建文件
details: C:\Documents and Settings\Administrator\Application Data\ProcessHacker.exe
Behavior description: 创建可执行文件
details: C:\Documents and Settings\Administrator\Application Data\ProcessHacker.exe
C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\a223d1b02de5a23bdfdf789bdb7360de.exe
Behavior description: 查找文件
details: FileName = C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll
FileName = C:\WINDOWS\Microsoft.NET\Framework\\*
FileName = C:\WINDOWS
FileName = C:\WINDOWS\WinSxS
FileName = C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll
FileName = C:\WINDOWS\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.INI
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\996E.INI
FileName = C:\WINDOWS\assembly\GAC_MSIL\Microsoft.VisualBasic\8.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.INI
FileName = C:\WINDOWS\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.INI
Behavior description: 设置启动项
details: C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\a223d1b02de5a23bdfdf789bdb7360de.exe
Behavior description: 复制文件
details: C:\Documents and Settings\Administrator\Application Data\ProcessHacker.exe ---> C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\a223d1b02de5a23bdfdf789bdb7360de.exe
Behavior description: 修改文件内容
details: C:\Documents and Settings\Administrator\Application Data\ProcessHacker.exe ---> Offset = 0
C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\a223d1b02de5a23bdfdf789bdb7360de.exe ---> Offset = 0
C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\a223d1b02de5a23bdfdf789bdb7360de.exe ---> Offset = 65536
C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\a223d1b02de5a23bdfdf789bdb7360de.exe ---> Offset = 4096
C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\a223d1b02de5a23bdfdf789bdb7360de.exe ---> Offset = 8192

Network behavior

Behavior description: 建立到一个指定的套接字连接
details: IP: **.0.0.**:1177, SOCKET = 0x00000220
IP: **.0.0.**:1177, SOCKET = 0x00000398
IP: **.0.0.**:1177, SOCKET = 0x000003ac
IP: **.0.0.**:1177, SOCKET = 0x000003c8
IP: **.0.0.**:1177, SOCKET = 0x000003dc
IP: **.0.0.**:1177, SOCKET = 0x000003f0
IP: **.0.0.**:1177, SOCKET = 0x00000404
IP: **.0.0.**:1177, SOCKET = 0x00000418
IP: **.0.0.**:1177, SOCKET = 0x0000042c
IP: **.0.0.**:1177, SOCKET = 0x00000440
IP: **.0.0.**:1177, SOCKET = 0x00000454
IP: **.0.0.**:1177, SOCKET = 0x00000468
IP: **.0.0.**:1177, SOCKET = 0x0000047c
IP: **.0.0.**:1177, SOCKET = 0x00000490
IP: **.0.0.**:1177, SOCKET = 0x000004ac

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\di
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\Documents and Settings\Administrator\Application Data\ProcessHacker.exe
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\EnableFileTracing
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\EnableConsoleTracing
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\FileTracingMask
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\ConsoleTracingMask
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\MaxFileSize
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\FileDirectory
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\LogSessionName
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\Active
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\ControlFlags
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\Napmontr\Guid
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\Napmontr\BitNames
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent\LogSessionName
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent\Active
Behavior description: 修改注册表_系统环境变量
details: \REGISTRY\USER\S-*\Environment\SEE_MASK_NOZONECHECKS
Behavior description: 修改注册表_系统防火墙可信进程列表
details: \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Documents and Settings\Administrator\Application Data\ProcessHacker.exe
Behavior description: 修改注册表_启动项
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Run\a223d1b02de5a23bdfdf789bdb7360de
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a223d1b02de5a23bdfdf789bdb7360de

Other behavior

Behavior description: 检测自身是否被调试
details: IsDebuggerPresent
Behavior description: 创建互斥体
details: CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
a223d1b02de5a23bdfdf789bdb7360de
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
Global\.net clr networking
Behavior description: 创建事件对象
details: EventName = Global\CorDBIPCSetupSyncEvent_2628
EventName = Global\CorDBIPCSetupSyncEvent_2784
EventName = Global\crypt32LogoffEvent
EventName = DINPUTWINMM
Behavior description: 打开互斥体
details: ShimCacheMutex
Global\CLR_CASOFF_MUTEX
Local\!IETld!Mutex
Global\.net clr networking
Behavior description: 获取TickCount值
details: TickCount = 218750, SleepMilliseconds = 1000.
TickCount = 218906, SleepMilliseconds = 1000.
TickCount = 219046, SleepMilliseconds = 1000.
TickCount = 219078, SleepMilliseconds = 1000.
TickCount = 219109, SleepMilliseconds = 1000.
TickCount = 219125, SleepMilliseconds = 1000.
TickCount = 219718, SleepMilliseconds = 1000.
TickCount = 219734, SleepMilliseconds = 1000.
TickCount = 218754, SleepMilliseconds = 20.
TickCount = 218801, SleepMilliseconds = 20.
TickCount = 218816, SleepMilliseconds = 20.
TickCount = 218848, SleepMilliseconds = 20.
TickCount = 225671, SleepMilliseconds = 1000.
TickCount = 226734, SleepMilliseconds = 2000.
TickCount = 226750, SleepMilliseconds = 2000.
Behavior description: 调整进程token权限
details: SE_LOAD_DRIVER_PRIVILEGE
SE_DEBUG_PRIVILEGE
SE_INC_BASE_PRIORITY_PRIVILEGE
Behavior description: 打开事件
details: Global\CLR_PerfMon_StartEnumEvent
\KernelObjects\LowMemoryCondition
HookSwitchHookEnabledEvent
_fCanRegisterWithShellService
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
MSFT.VSA.COM.DISABLE.2628
MSFT.VSA.IEC.STATUS.6c736db0
Global\crypt32LogoffEvent
Global\SvcctrlStartEvent_A3752DX
MSFT.VSA.COM.DISABLE.2840
MSFT.VSA.COM.DISABLE.2784
Behavior description: 利用进程调试属性使系统蓝屏
details: N/A
Behavior description: 可执行文件签名信息
details: C:\Documents and Settings\Administrator\Application Data\ProcessHacker.exe(签名验证: 未通过)
C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\a223d1b02de5a23bdfdf789bdb7360de.exe(签名验证: 未通过)
Behavior description: 调用Sleep函数
details: [1]: MilliSeconds = 20000.
[2]: MilliSeconds = 5000.
[3]: MilliSeconds = 1000.
[4]: MilliSeconds = -1.
[5]: MilliSeconds = 20.
[6]: MilliSeconds = 20.
[7]: MilliSeconds = 20.
[4]: MilliSeconds = 2000.
[5]: MilliSeconds = 1.
[6]: MilliSeconds = 1.
[7]: MilliSeconds = 1000.
[8]: MilliSeconds = 1.
[9]: MilliSeconds = 1.
[10]: MilliSeconds = 1.
Behavior description: 可执行文件MD5
details: C:\Documents and Settings\Administrator\Application Data\ProcessHacker.exe ---> 0c8a4e45ee2934c41c4eb7491a6cfb2e
C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\a223d1b02de5a23bdfdf789bdb7360de.exe ---> 0c8a4e45ee2934c41c4eb7491a6cfb2e
Behavior description: 直接获取CPU时钟
details: EAX = 0x1477e646, EDX = 0x000000bb
EAX = 0x65de8102, EDX = 0x000000bb
EAX = 0x62138563, EDX = 0x000000bc
EAX = 0x621385af, EDX = 0x000000bc
EAX = 0x6269e5e1, EDX = 0x000000bc
EAX = 0x6269e62d, EDX = 0x000000bc
EAX = 0x6269e679, EDX = 0x000000bc
EAX = 0x6269e6c5, EDX = 0x000000bc
EAX = 0x6269e711, EDX = 0x000000bc
EAX = 0x6269e75d, EDX = 0x000000bc