VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:1db494df9d35c4ecbda1d8d29180a992
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 跨进程写入数据
details: TargetProcess = %temp%\1445929728.659095.exe, WriteAddress = 0x00400000, Size = 4096
TargetProcess = %temp%\1445929728.666098.exe, WriteAddress = 0x00401000, Size = 53248
TargetProcess = %temp%\1445929728.673104.exe, WriteAddress = 0x0040e000, Size = 8192
TargetProcess = %temp%\1445929728.680123.exe, WriteAddress = 0x00410000, Size = 16384
TargetProcess = %temp%\1445929728.687132.exe, WriteAddress = 0x7ffd6008, Size = 4
C:\WINDOWS\explorer.exe
TargetProcess = Jvmkmt.exe, WriteAddress = 0x00400000, Size = 4096
TargetProcess = Jvmkmt.exe, WriteAddress = 0x00401000, Size = 53248
TargetProcess = Jvmkmt.exe, WriteAddress = 0x0040e000, Size = 8192
TargetProcess = Jvmkmt.exe, WriteAddress = 0x00410000, Size = 16384
TargetProcess = Jvmkmt.exe, WriteAddress = 0x7ffdf008, Size = 4
TargetProcess = smss.exe, WriteAddress = 0x00300000, Size = 624
C:\WINDOWS\system32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
Behavior description: 隐藏指定窗口
details: [Window,Class] = [,BrowserFrameGripperClass]
[Window,Class] = [缩放级别,ToolbarWindow32]
Behavior description: 创建远程线程
details: C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\alg.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Tencent\QQ\Bin\QQ.exe
C:\Program Files\Tencent\QQ\Bin\TXPlatform.exe
C:\WINDOWS\system32\conime.exe
C:\WINDOWS\system32\PersonalBankPortal.exe
C:\%temp%\1445929729.600171.exe
C:\WINDOWS\system32\taskmgr.exe
Behavior description: 设置线程上下文
details: C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445929728.185470.exe
C:\Documents and Settings\Administrator\Application Data\Jvmkmt.exe
Behavior description: 跨进程写代码段数据
details: C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00401A25, EntryPoint = 0x00401A25
Behavior description: 写权限映射文件
details: t2f_0
Local\UrlZonesSM_Administrator
\WINDOWS\system32\zh-cn\ieframe.dll.mui
Internet Explorer Immutable Application State (00000178-0000-0000-0000-000000000000)
CiceroSharedMemDefaultS-*
ie_lcie_LogonMedium
ie_lcie_main_178
Isolation Process Registry (7FDDC7DB-7C79-11E5-91BE-000000000000)
Isolation Signal Registry (7FDDC7DB-7C79-11E5-91BE-000000000000, 0)
Local\IEFrame!GetAsyncKeyStateSharedMem!376
ie_lcie_ConnHashTable<376>
DfRoot0003DACDC
CTF.AsmListCache.FMPDefaultS-*
DfRoot0003DC40A
Local\Feed Eventing Shared Memory S-*
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache
C:\Documents and Settings\Administrator\IECompatCache
Behavior description: 按名称获取主机地址
details: ng.marketallone.com
Behavior description: 自删除
details: C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445929730.338271.exe
Behavior description: 修改注册表_启动项
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Run\Jvmkmt

Process behavior

Behavior description: 隐藏窗口创建进程
details: ImagePath = c:\documents and settings\administrator\application data\jvmkmt.exe, CmdLine =
Behavior description: 跨进程写入数据
details: TargetProcess = %temp%\1445929728.659095.exe, WriteAddress = 0x00400000, Size = 4096
TargetProcess = %temp%\1445929728.666098.exe, WriteAddress = 0x00401000, Size = 53248
TargetProcess = %temp%\1445929728.673104.exe, WriteAddress = 0x0040e000, Size = 8192
TargetProcess = %temp%\1445929728.680123.exe, WriteAddress = 0x00410000, Size = 16384
TargetProcess = %temp%\1445929728.687132.exe, WriteAddress = 0x7ffd6008, Size = 4
C:\WINDOWS\explorer.exe
TargetProcess = Jvmkmt.exe, WriteAddress = 0x00400000, Size = 4096
TargetProcess = Jvmkmt.exe, WriteAddress = 0x00401000, Size = 53248
TargetProcess = Jvmkmt.exe, WriteAddress = 0x0040e000, Size = 8192
TargetProcess = Jvmkmt.exe, WriteAddress = 0x00410000, Size = 16384
TargetProcess = Jvmkmt.exe, WriteAddress = 0x7ffdf008, Size = 4
TargetProcess = smss.exe, WriteAddress = 0x00300000, Size = 624
C:\WINDOWS\system32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
Behavior description: 创建新文件进程
details: ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445929728.170677.exe, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445929728.170677.exe
ImagePath = C:\Documents and Settings\Administrator\Application Data\Jvmkmt.exe, CmdLine = "C:\Documents and Settings\Administrator\Application Data\Jvmkmt.exe"
ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445929728.181318.exe, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445929728.181318.exe
Behavior description: 创建进程
details: ImagePath = C:\Program Files\Internet Explorer\IEXPLORE.EXE, CmdLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.yixun.com/
ImagePath = C:\Program Files\Internet Explorer\IEXPLORE.EXE, CmdLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE" SCODEF:376 CREDAT:79873
Behavior description: 创建远程线程
details: C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\alg.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Tencent\QQ\Bin\QQ.exe
C:\Program Files\Tencent\QQ\Bin\TXPlatform.exe
C:\WINDOWS\system32\conime.exe
C:\WINDOWS\system32\PersonalBankPortal.exe
C:\%temp%\1445929729.600171.exe
C:\WINDOWS\system32\taskmgr.exe
Behavior description: 设置线程上下文
details: C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445929728.185470.exe
C:\Documents and Settings\Administrator\Application Data\Jvmkmt.exe
Behavior description: 枚举进程
details: N/A
Behavior description: 跨进程写代码段数据
details: C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00401A25, EntryPoint = 0x00401A25

File behavior

Behavior description: 写权限映射文件
details: t2f_0
Local\UrlZonesSM_Administrator
\WINDOWS\system32\zh-cn\ieframe.dll.mui
Internet Explorer Immutable Application State (00000178-0000-0000-0000-000000000000)
CiceroSharedMemDefaultS-*
ie_lcie_LogonMedium
ie_lcie_main_178
Isolation Process Registry (7FDDC7DB-7C79-11E5-91BE-000000000000)
Isolation Signal Registry (7FDDC7DB-7C79-11E5-91BE-000000000000, 0)
Local\IEFrame!GetAsyncKeyStateSharedMem!376
ie_lcie_ConnHashTable<376>
DfRoot0003DACDC
CTF.AsmListCache.FMPDefaultS-*
DfRoot0003DC40A
Local\Feed Eventing Shared Memory S-*
Behavior description: 创建可执行文件
details: C:\Documents and Settings\Administrator\Application Data\Jvmkmt.exe
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache
C:\Documents and Settings\Administrator\IECompatCache
Behavior description: 查找文件
details: FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445929730.247251.exe
FileName = C:\Documents and Settings\Administrator\Application Data\Jvmkmt.exe
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\My Documents
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\Documents
FileName = C:\Documents and Settings\Administrator\桌面
FileName = C:\Documents and Settings\All Users\桌面
FileName = C:\Program Files\Internet Explorer\IEXPLORE.EXE
Behavior description: 自删除
details: C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445929730.338271.exe

Network behavior

Behavior description: 联网打开网址
details: InternetOpenUrlA: http://api.wipmania.com/ hInternet = 0x000001f4
Behavior description: 建立到一个指定的套接字连接
details: 219.133.40.1:3800
Behavior description: 读取网络文件
details: hFile = 0x000001f4, BytesToRead =4088, BytesRead = 4088.
Behavior description: 按名称获取主机地址
details: ng.marketallone.com

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\SessionInformation\ProgramCount
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Prefetcher\TracesProcessed
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-*\RefCount
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\Recovery\Active\{7FDDC7DE-7C79-11E5-91BE-000000000000}
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\{63800dac-e7ca-4df9-9a5c-20765055488d}\Enable
\REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1EA4DBF0-3C3B-11CF-810C-00AA00389B71}\1.1\0\win32\
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\Main\Window_Placement
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Count
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Time
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTime
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTimeCount
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0\DisplayName
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0\ErrorState
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0\DisplayMask
Behavior description: 删除注册表键
details: \REGISTRY\MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\{63800dac-e7ca-4df9-9a5c-20765055488d}
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile
\REGISTRY\USER\S-*\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}
Behavior description: 删除注册表键值
details: \REGISTRY\MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW\DWFileTreeRoot
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0\Expiration
\REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1\Expiration
Behavior description: 删除注册表键值_IE连接设置
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
Behavior description: 修改注册表_启动项
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Run\Jvmkmt

Other behavior

Behavior description: 创建互斥体
details: t2f-Mutex
djQPssJO4SAQzkgw
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
Local\!BrowserEmulation!SharedMemory!Mutex
RasPbFile
ConnHashTable<376>_HashTable_Mutex
Behavior description: 内联HOOK
details: C:\WINDOWS\system32\ntdll.dll--->NtEnumerateValueKey Offset = 0x0
C:\WINDOWS\system32\ntdll.dll--->NtQueryDirectoryFile Offset = 0x0
C:\WINDOWS\system32\kernel32.dll--->CopyFileA Offset = 0x0
C:\WINDOWS\system32\kernel32.dll--->CopyFileW Offset = 0x0
C:\WINDOWS\system32\kernel32.dll--->MoveFileA Offset = 0x0
C:\WINDOWS\system32\kernel32.dll--->MoveFileW Offset = 0x0
C:\WINDOWS\system32\kernel32.dll--->CreateFileA Offset = 0x0
C:\WINDOWS\system32\kernel32.dll--->CreateFileW Offset = 0x0
C:\WINDOWS\system32\ADVAPI32.dll--->RegCreateKeyExA Offset = 0x0
C:\WINDOWS\system32\ADVAPI32.dll--->RegCreateKeyExW Offset = 0x0
C:\WINDOWS\system32\WS2_32.dll--->send Offset = 0x0
C:\WINDOWS\system32\WS2_32.dll--->GetAddrInfoW Offset = 0x0
C:\WINDOWS\system32\ntdll.dll--->NtResumeThread Offset = 0x0
C:\WINDOWS\system32\ntdll.dll--->LdrLoadDll Offset = 0x0
c:\windows\system32\DNSAPI.dll--->DnsQuery_A Offset = 0x0
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [TXGuiFoundation,QQ2013]
NtUserFindWindowEx: [Class,Window] = [CTXOPConntion_Class,OP_2269840561]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [Static,]
Behavior description: 获取系统权限
details: SE_DEBUG_PRIVILEGE
SE_LOAD_DRIVER_PRIVILEGE
SE_AUDIT_PRIVILEGE
Behavior description: 获取TickCount值
details: TickCount = 495305, SleepMilliseconds = 9352.
Behavior description: 枚举窗口
details: N/A
Behavior description: 调用Sleep函数
details: [1]: MilliSeconds = 9352.
Behavior description: 隐藏指定窗口
details: [Window,Class] = [,BrowserFrameGripperClass]
[Window,Class] = [缩放级别,ToolbarWindow32]