VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:75
Behavior list
Basic Information
MD5:263bf28c862bbab91086f39d8a0c2554
file type:Rar
Production company:
version:
Shell or compiler information:COMPILER:Microsoft Visual Studio .NET 2005 -- 2008 -> Microsoft Corporation [Overlay] *
Subfile information:素材提取软件wdfpkg.exedumpFile / 0159be576b651b944f74d9e19d50aef9 / EXE
素材提取软件wdfpkg.exe / 0159be576b651b944f74d9e19d50aef9 / EXE
Key behavior
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:获取TickCount值
details:TickCount = 5355691, SleepMilliseconds = 20.
TickCount = 5355723, SleepMilliseconds = 20.
TickCount = 5355738, SleepMilliseconds = 20.
TickCount = 5355754, SleepMilliseconds = 20.
TickCount = 5355832, SleepMilliseconds = 20.
TickCount = 5355816, SleepMilliseconds = 20.
TickCount = 5356328, SleepMilliseconds = 500.
TickCount = 5356343, SleepMilliseconds = 500.
TickCount = 5355863, SleepMilliseconds = 20.
TickCount = 5355895, SleepMilliseconds = 20.
TickCount = 5355926, SleepMilliseconds = 20.
TickCount = 5355957, SleepMilliseconds = 20.
TickCount = 5355988, SleepMilliseconds = 20.
TickCount = 5356020, SleepMilliseconds = 20.
TickCount = 5356051, SleepMilliseconds = 20.
Process behavior
Behavior description:创建本地线程
details:TargetProcess: 素材提取软件wdfpkg.exe, InheritedFromPID = 1944, ProcessID = 1396, ThreadID = 888, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: 素材提取软件wdfpkg.exe, InheritedFromPID = 1944, ProcessID = 1396, ThreadID = 640, StartAddress = 004A55FF, Parameter = 001AE978
TargetProcess: 素材提取软件wdfpkg.exe, InheritedFromPID = 1944, ProcessID = 1396, ThreadID = 1456, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: 素材提取软件wdfpkg.exe, InheritedFromPID = 1944, ProcessID = 1396, ThreadID = 972, StartAddress = 004291E0, Parameter = 00000000
TargetProcess: 素材提取软件wdfpkg.exe, InheritedFromPID = 1944, ProcessID = 1396, ThreadID = 1844, StartAddress = 004A55FF, Parameter = 001BA218
TargetProcess: 素材提取软件wdfpkg.exe, InheritedFromPID = 1944, ProcessID = 1396, ThreadID = 1136, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: 素材提取软件wdfpkg.exe, InheritedFromPID = 1944, ProcessID = 1396, ThreadID = 160, StartAddress = 7C930230, Parameter = 00000000
File behavior
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:查找文件
details:FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Application Data
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\WINDOWS\system32\Ras\*.pbk
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
Network behavior
Behavior description:联网打开网址
details:InternetOpenUrlA: http://ss****om/sshz5/config.ini, hInternet = 0x00cc0004, Flags = 0x84000100
Behavior description:连接指定站点
details:InternetConnectA: ServerName = ss****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x84000100
Behavior description:打开HTTP连接
details:InternetOpenA: UserAgent: Agent5363332, hSession = 0x00cc0004
Behavior description:建立到一个指定的套接字连接
details:URL: ss****om, IP: **.133.40.**:80, SOCKET = 0x00000514
Behavior description:读取网络文件
details:hFile = 0x00cc000c, BytesToRead =16384, BytesRead = 16384.
Behavior description:发送HTTP包
details:GET /sshz5/config.ini HTTP/1.1 Accept: */* User-Agent: Agent5363332 Host: ss****om Cache-Control: no-cache
Behavior description:打开HTTP请求
details:HttpOpenRequestA: ss****om:80/sshz5/config.ini, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x84000100
Behavior description:按名称获取主机地址
details:GetAddrInfoW: ss****om
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted\C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\素材提取软件wdfpkg.exe
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Behavior description:删除注册表键值
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
RasPbFile
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
MSCTF.Shared.MUTEX.IHF
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = Global\userenv: User Profile setup event
EventName = MSCTF.SendReceive.Event.IHF.IC
EventName = MSCTF.SendReceiveConection.Event.IHF.IC
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [OleMainThreadWndClass,]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
_fCanRegisterWithShellService
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000041
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000041
MSCTF.SendReceiveConection.Event.ELH.IC
MSCTF.SendReceive.Event.ELH.IC
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Global\SvcctrlStartEvent_A3752DX
\INSTALLATION_SECURITY_HOLD
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000042
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000042
Behavior description:获取TickCount值
details:TickCount = 5355691, SleepMilliseconds = 20.
TickCount = 5355723, SleepMilliseconds = 20.
TickCount = 5355738, SleepMilliseconds = 20.
TickCount = 5355754, SleepMilliseconds = 20.
TickCount = 5355832, SleepMilliseconds = 20.
TickCount = 5355816, SleepMilliseconds = 20.
TickCount = 5356328, SleepMilliseconds = 500.
TickCount = 5356343, SleepMilliseconds = 500.
TickCount = 5355863, SleepMilliseconds = 20.
TickCount = 5355895, SleepMilliseconds = 20.
TickCount = 5355926, SleepMilliseconds = 20.
TickCount = 5355957, SleepMilliseconds = 20.
TickCount = 5355988, SleepMilliseconds = 20.
TickCount = 5356020, SleepMilliseconds = 20.
TickCount = 5356051, SleepMilliseconds = 20.
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:窗口信息
details:Pid = 1396, Hwnd=0xa02b2, Text = XCGUI-Window, ClassName = XCGUI.
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 500.
[2]: MilliSeconds = 500.
[3]: MilliSeconds = 500.
[4]: MilliSeconds = 500.
[5]: MilliSeconds = 500.
[6]: MilliSeconds = 500.
[7]: MilliSeconds = 500.
[8]: MilliSeconds = 500.
[9]: MilliSeconds = 500.
[10]: MilliSeconds = 500.
Behavior description:打开互斥体
details:ShimCacheMutex
Local\_!MSFTHISTORY!_
Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Local\c:!documents and settings!administrator!cookies!
Local\c:!documents and settings!administrator!local settings!history!history.ie5!
Local\WininetStartupMutex
Local\WininetConnectionMutex
Local\WininetProxyRegistryMutex
RasPbFile
Local\!IETld!Mutex
DBWinMutex
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号