VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:119102576ce91d3c7fb162258b4fcd8e
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 修改注册表_启动项
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Run\244f564b343858ca4bf98f563b5fb06c
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\244f564b343858ca4bf98f563b5fb06c
Behavior description: 直接获取CPU时钟
details: EAX = 0x9fa3fa0b, EDX = 0x000000b4
EAX = 0x9fa3fa57, EDX = 0x000000b4
EAX = 0xa22bc9e0, EDX = 0x000000b4
EAX = 0xa22bca2c, EDX = 0x000000b4
EAX = 0xa22bca78, EDX = 0x000000b4
EAX = 0xa22bcac4, EDX = 0x000000b4
EAX = 0xa22bcb10, EDX = 0x000000b4
EAX = 0xa22bcb5c, EDX = 0x000000b4
EAX = 0xa22bcba8, EDX = 0x000000b4
EAX = 0xa22bcbf4, EDX = 0x000000b4
EAX = 0x8aa72544, EDX = 0x000000c4
EAX = 0x8aa72590, EDX = 0x000000c4
EAX = 0x8d2ef519, EDX = 0x000000c4
EAX = 0x8d2ef565, EDX = 0x000000c4
EAX = 0x8d2ef5b1, EDX = 0x000000c4
Behavior description: 获取TickCount值
details: TickCount = 234921, SleepMilliseconds = 2000.
TickCount = 234953, SleepMilliseconds = 2000.
TickCount = 234281, SleepMilliseconds = 1000.
TickCount = 234343, SleepMilliseconds = 1000.
TickCount = 234375, SleepMilliseconds = 1000.
TickCount = 234390, SleepMilliseconds = 1000.
TickCount = 234828, SleepMilliseconds = 1000.
TickCount = 234921, SleepMilliseconds = 1000.
TickCount = 293937, SleepMilliseconds = 60000.
TickCount = 293968, SleepMilliseconds = 60000.
TickCount = 294000, SleepMilliseconds = 60000.
TickCount = 294031, SleepMilliseconds = 60000.
TickCount = 294046, SleepMilliseconds = 60000.
TickCount = 294062, SleepMilliseconds = 60000.
TickCount = 294078, SleepMilliseconds = 60000.
Behavior description: 设置启动项
details: C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\244f564b343858ca4bf98f563b5fb06c.exe

Process behavior

Behavior description: 隐藏窗口创建进程
details: ImagePath = , CmdLine = netsh firewall add allowedprogram "C:\Documents and Settings\All Users\hostserver.exe" "hostserver.exe" ENABLE
Behavior description: 创建进程
details: [0x00000dc0]ImagePath = C:\WINDOWS\system32\netsh.exe, CmdLine = netsh firewall add allowedprogram "C:\Documents and Settings\All Users\hostserver.exe" "hostserver.exe" ENABLE
Behavior description: 创建新文件进程
details: [0x00000c84]ImagePath = C:\Documents and Settings\All Users\hostserver.exe, CmdLine = "C:\Documents and Settings\All Users\hostserver.exe"
Behavior description: 创建本地线程
details: TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2628, ThreadID = 2664, StartAddress = 792A741C, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2628, ThreadID = 2668, StartAddress = 791F59C0, Parameter = 001B01D0
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2628, ThreadID = 2796, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2628, ThreadID = 3112, StartAddress = 791F59C0, Parameter = 001E7810
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2628, ThreadID = 3116, StartAddress = 791F59C0, Parameter = 001E7810
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2628, ThreadID = 3120, StartAddress = 791F59C0, Parameter = 001E7810
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2628, ThreadID = 3148, StartAddress = 77E56C7D, Parameter = 001FDFC0
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2628, ThreadID = 3152, StartAddress = 769AE43B, Parameter = 001D4AF8
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2628, ThreadID = 3156, StartAddress = 791F59C0, Parameter = 001E50B8
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2628, ThreadID = 3172, StartAddress = 74E53861, Parameter = 0370F178
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2628, ThreadID = 3176, StartAddress = 77E56C7D, Parameter = 0020EC80
TargetProcess: hostserver.exe, InheritedFromPID = 2628, ProcessID = 3204, ThreadID = 3240, StartAddress = 792A741C, Parameter = 00000000
TargetProcess: hostserver.exe, InheritedFromPID = 2628, ProcessID = 3204, ThreadID = 3244, StartAddress = 791F59C0, Parameter = 001AFE90
TargetProcess: hostserver.exe, InheritedFromPID = 2628, ProcessID = 3204, ThreadID = 3280, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: hostserver.exe, InheritedFromPID = 2628, ProcessID = 3204, ThreadID = 3452, StartAddress = 791F59C0, Parameter = 001E4058

File behavior

Behavior description: 创建文件
details: C:\Documents and Settings\All Users\hostserver.exe
C:\DiskX\244f564b343858ca4bf98f563b5fb06c.exe
Behavior description: 创建可执行文件
details: C:\Documents and Settings\All Users\hostserver.exe
C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\244f564b343858ca4bf98f563b5fb06c.exe
Behavior description: 查找文件
details: FileName = C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll
FileName = C:\WINDOWS\Microsoft.NET\Framework\\*
FileName = C:\WINDOWS\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.INI
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\996E.INI
FileName = C:\WINDOWS\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.INI
FileName = C:\WINDOWS\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.INI
FileName = C:\WINDOWS\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.INI
FileName = C:\WINDOWS\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.INI
FileName = C:\WINDOWS\Microsoft.Net\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.INI
Behavior description: 设置启动项
details: C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\244f564b343858ca4bf98f563b5fb06c.exe
Behavior description: 复制文件
details: C:\Documents and Settings\All Users\hostserver.exe ---> C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\244f564b343858ca4bf98f563b5fb06c.exe
C:\Documents and Settings\All Users\hostserver.exe ---> X:\244f564b343858ca4bf98f563b5fb06c.exe
Behavior description: 修改文件内容
details: C:\Documents and Settings\All Users\hostserver.exe ---> Offset = 0
C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\244f564b343858ca4bf98f563b5fb06c.exe ---> Offset = 0
C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\244f564b343858ca4bf98f563b5fb06c.exe ---> Offset = 65536
C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\244f564b343858ca4bf98f563b5fb06c.exe ---> Offset = 4096
C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\244f564b343858ca4bf98f563b5fb06c.exe ---> Offset = 8192
C:\DiskX\244f564b343858ca4bf98f563b5fb06c.exe ---> Offset = 65536
C:\DiskX\244f564b343858ca4bf98f563b5fb06c.exe ---> Offset = 0
C:\DiskX\244f564b343858ca4bf98f563b5fb06c.exe ---> Offset = 4096
C:\DiskX\244f564b343858ca4bf98f563b5fb06c.exe ---> Offset = 8192

Network behavior

Behavior description: 建立到一个指定的套接字连接
details: URL: zo****et, IP: **.133.40.**:4444, SOCKET = 0x00000248
URL: zo****et, IP: **.133.40.**:4444, SOCKET = 0x00000250
Behavior description: 按名称获取主机地址
details: GetAddrInfoW: zo****et

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\Software\244f564b343858ca4bf98f563b5fb06c\i
\REGISTRY\USER\S-*\di
\REGISTRY\USER\S-*\Software\244f564b343858ca4bf98f563b5fb06c\hp
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\Documents and Settings\All Users\hostserver.exe
Behavior description: 修改注册表_Explorer文件显示相关属性
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden
Behavior description: 修改注册表_系统环境变量
details: \REGISTRY\USER\S-*\Environment\SEE_MASK_NOZONECHECKS
Behavior description: 修改注册表_启动项
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Run\244f564b343858ca4bf98f563b5fb06c
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\244f564b343858ca4bf98f563b5fb06c

Other behavior

Behavior description: 检测自身是否被调试
details: IsDebuggerPresent
Behavior description: 创建互斥体
details: CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
244f564b343858ca4bf98f563b5fb06caG9zdHNlcnZlcg==
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
Behavior description: 创建事件对象
details: EventName = Global\CPFATE_2628_v4.0.30319
EventName = Global\CPFATE_3204_v4.0.30319
EventName = DINPUTWINMM
Behavior description: 打开互斥体
details: ShimCacheMutex
Local\!IETld!Mutex
Behavior description: 加密数据
details: [CryptEncrypt] Data: 0x001C6A90, PlainTextLen: 16, CipherTextLen: 16, Flags: 0x00000000
[CryptEncrypt] Data: 0x001D6158, PlainTextLen: 16, CipherTextLen: 16, Flags: 0x00000000
[CryptEncrypt] Data: 0x001CACE8, PlainTextLen: 16, CipherTextLen: 16, Flags: 0x00000000
[CryptEncrypt] Data: 0x001D1F28, PlainTextLen: 16, CipherTextLen: 16, Flags: 0x00000000
Behavior description: 获取TickCount值
details: TickCount = 234921, SleepMilliseconds = 2000.
TickCount = 234953, SleepMilliseconds = 2000.
TickCount = 234281, SleepMilliseconds = 1000.
TickCount = 234343, SleepMilliseconds = 1000.
TickCount = 234375, SleepMilliseconds = 1000.
TickCount = 234390, SleepMilliseconds = 1000.
TickCount = 234828, SleepMilliseconds = 1000.
TickCount = 234921, SleepMilliseconds = 1000.
TickCount = 293937, SleepMilliseconds = 60000.
TickCount = 293968, SleepMilliseconds = 60000.
TickCount = 294000, SleepMilliseconds = 60000.
TickCount = 294031, SleepMilliseconds = 60000.
TickCount = 294046, SleepMilliseconds = 60000.
TickCount = 294062, SleepMilliseconds = 60000.
TickCount = 294078, SleepMilliseconds = 60000.
Behavior description: 调整进程token权限
details: SE_DEBUG_PRIVILEGE
SE_INC_BASE_PRIORITY_PRIVILEGE
SE_LOAD_DRIVER_PRIVILEGE
Behavior description: 打开事件
details: Global\CLR_PerfMon_StartEnumEvent
\KernelObjects\LowMemoryCondition
HookSwitchHookEnabledEvent
MSFT.VSA.COM.DISABLE.2628
MSFT.VSA.IEC.STATUS.6c736db0
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
_fCanRegisterWithShellService
MSFT.VSA.COM.DISABLE.3204
Behavior description: 可执行文件签名信息
details: C:\Documents and Settings\All Users\hostserver.exe(签名验证: 未通过)
Behavior description: 调用Sleep函数
details: [1]: MilliSeconds = 2000.
[2]: MilliSeconds = 1000.
[3]: MilliSeconds = 5000.
[4]: MilliSeconds = 2000.
[5]: MilliSeconds = 500.
[6]: MilliSeconds = 1000.
[7]: MilliSeconds = 1000.
[8]: MilliSeconds = 60000.
[9]: MilliSeconds = 1000.
[10]: MilliSeconds = 1000.
[2]: MilliSeconds = 5000.
[3]: MilliSeconds = 500.
[4]: MilliSeconds = 1000.
[5]: MilliSeconds = 2000.
[10]: MilliSeconds = 60000.
Behavior description: 可执行文件MD5
details: C:\Documents and Settings\All Users\hostserver.exe ---> 119102576ce91d3c7fb162258b4fcd8e
Behavior description: 直接获取CPU时钟
details: EAX = 0x9fa3fa0b, EDX = 0x000000b4
EAX = 0x9fa3fa57, EDX = 0x000000b4
EAX = 0xa22bc9e0, EDX = 0x000000b4
EAX = 0xa22bca2c, EDX = 0x000000b4
EAX = 0xa22bca78, EDX = 0x000000b4
EAX = 0xa22bcac4, EDX = 0x000000b4
EAX = 0xa22bcb10, EDX = 0x000000b4
EAX = 0xa22bcb5c, EDX = 0x000000b4
EAX = 0xa22bcba8, EDX = 0x000000b4
EAX = 0xa22bcbf4, EDX = 0x000000b4
EAX = 0x8aa72544, EDX = 0x000000c4
EAX = 0x8aa72590, EDX = 0x000000c4
EAX = 0x8d2ef519, EDX = 0x000000c4
EAX = 0x8d2ef565, EDX = 0x000000c4
EAX = 0x8d2ef5b1, EDX = 0x000000c4
Behavior description: 解密数据
details: [CryptDecrypt] Data: 0x001B3930, CipherTextLen: 144, PlainTextLen: 144, Flags: 0x00000000
[CryptDecrypt] Data: 0x001E9E68, CipherTextLen: 61632, PlainTextLen: 61632, Flags: 0x00000000
[CryptDecrypt] Data: 0x001B4DF8, CipherTextLen: 144, PlainTextLen: 144, Flags: 0x00000000
[CryptDecrypt] Data: 0x001EDFC8, CipherTextLen: 61632, PlainTextLen: 61632, Flags: 0x00000000
Behavior description: 导入密钥
details: [CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x00409813, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001C4164, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_DES (0x00006601), Data: 0x001CBCB0, DataLen: 20, Flags: 0x00000001
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001BDC4C, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001D5644, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001D546C, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_DES (0x00006601), Data: 0x001C7DE0, DataLen: 20, Flags: 0x00000001
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001D72A4, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x0350040F, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001C4804, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_DES (0x00006601), Data: 0x001C77D8, DataLen: 20, Flags: 0x00000001
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001BD6DC, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001D2B34, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001D48CC, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_DES (0x00006601), Data: 0x001D6D90, DataLen: 20, Flags: 0x00000001