VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:32dae2483e5e934d9c6c59d07c37df79
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 获取TickCount值
details: TickCount = 486140, SleepMilliseconds = 500.
TickCount = 486171, SleepMilliseconds = 500.
TickCount = 486234, SleepMilliseconds = 500.
TickCount = 486265, SleepMilliseconds = 500.
TickCount = 486281, SleepMilliseconds = 500.
TickCount = 486343, SleepMilliseconds = 500.
TickCount = 486021, SleepMilliseconds = 100.
TickCount = 486131, SleepMilliseconds = 100.
TickCount = 486162, SleepMilliseconds = 100.
TickCount = 491496, SleepMilliseconds = 200.
TickCount = 491659, SleepMilliseconds = 300.
TickCount = 496965, SleepMilliseconds = 200.
TickCount = 677093, SleepMilliseconds = 180000.
TickCount = 504281, SleepMilliseconds = 2000.
TickCount = 682640, SleepMilliseconds = 180000.
Behavior description: 创建系统服务
details: [服务创建成功]: Pqrstu Wxyabcde Ghi, C:\WINDOWS\eiiboq.exe
Behavior description: 进程提权信息
details: NT AUTHORITY\SYSTEM

Process behavior

Behavior description: 隐藏窗口创建进程
details: ImagePath = , CmdLine = at \\**.133.40.** 18:21 admin$\
Behavior description: 创建进程
details: ImagePath = C:\WINDOWS\system32\at.exe, CmdLine = at \\**.133.40.** 18:21 admin$\
Behavior description: 创建新文件进程
details: ImagePath = C:\WINDOWS\eiiboq.exe, CmdLine = C:\WINDOWS\eiiboq.exe
Behavior description: 创建本地线程
details: TargetProcess: eiiboq.exe, InheritedFromPID = 656, ProcessID = 484, ThreadID = 1356, StartAddress = 77DC3519, Parameter = 001884B0
TargetProcess: eiiboq.exe, InheritedFromPID = 656, ProcessID = 484, ThreadID = 1372, StartAddress = 00402DD5, Parameter = 00000000
TargetProcess: eiiboq.exe, InheritedFromPID = 656, ProcessID = 484, ThreadID = 1004, StartAddress = 004051E0, Parameter = 00000000
TargetProcess: eiiboq.exe, InheritedFromPID = 656, ProcessID = 484, ThreadID = 544, StartAddress = 00405241, Parameter = 00000000
TargetProcess: eiiboq.exe, InheritedFromPID = 656, ProcessID = 484, ThreadID = 1648, StartAddress = 0040387C, Parameter = 00000000
TargetProcess: eiiboq.exe, InheritedFromPID = 656, ProcessID = 484, ThreadID = 792, StartAddress = 00405184, Parameter = 00000000
TargetProcess: eiiboq.exe, InheritedFromPID = 656, ProcessID = 484, ThreadID = 1012, StartAddress = 00404908, Parameter = 00000000
TargetProcess: eiiboq.exe, InheritedFromPID = 656, ProcessID = 484, ThreadID = 1352, StartAddress = 00405128, Parameter = 00000000
TargetProcess: eiiboq.exe, InheritedFromPID = 656, ProcessID = 484, ThreadID = 1276, StartAddress = 004040DA, Parameter = 00000000
TargetProcess: eiiboq.exe, InheritedFromPID = 656, ProcessID = 484, ThreadID = 1144, StartAddress = 00404908, Parameter = 00000000
TargetProcess: eiiboq.exe, InheritedFromPID = 656, ProcessID = 484, ThreadID = 888, StartAddress = 004040DA, Parameter = 00000000
TargetProcess: eiiboq.exe, InheritedFromPID = 656, ProcessID = 484, ThreadID = 2192, StartAddress = 00404908, Parameter = 00000000
TargetProcess: eiiboq.exe, InheritedFromPID = 656, ProcessID = 484, ThreadID = 2196, StartAddress = 004040DA, Parameter = 00000000
TargetProcess: eiiboq.exe, InheritedFromPID = 656, ProcessID = 484, ThreadID = 2308, StartAddress = 00404908, Parameter = 00000000
TargetProcess: eiiboq.exe, InheritedFromPID = 656, ProcessID = 484, ThreadID = 2312, StartAddress = 004040DA, Parameter = 00000000
Behavior description: 进程提权信息
details: NT AUTHORITY\SYSTEM

File behavior

Behavior description: 创建文件
details: C:\WINDOWS\eiiboq.exe
C:\WINDOWS\system32\eiiboq.exe
Behavior description: 覆盖已有文件
details: C:\WINDOWS\system32\eiiboq.exe
Behavior description: 创建可执行文件
details: C:\WINDOWS\eiiboq.exe
C:\WINDOWS\system32\eiiboq.exe
Behavior description: 修改文件内容
details: C:\WINDOWS\eiiboq.exe ---> Offset = 0
C:\WINDOWS\eiiboq.exe ---> Offset = 4096
C:\WINDOWS\eiiboq.exe ---> Offset = 8192
C:\WINDOWS\eiiboq.exe ---> Offset = 12288
C:\WINDOWS\system32\eiiboq.exe ---> Offset = 0
C:\WINDOWS\system32\eiiboq.exe ---> Offset = 4096
C:\WINDOWS\system32\eiiboq.exe ---> Offset = 8192
C:\WINDOWS\system32\eiiboq.exe ---> Offset = 12288
Behavior description: 查找文件
details: FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\My Documents
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\Documents
FileName = C:\Documents and Settings\Administrator\桌面
FileName = C:\Documents and Settings\All Users\桌面
FileName = C:\WINDOWS
FileName = C:\WINDOWS\system32
FileName = C:\WINDOWS\system32\at.exe
FileName = C:\WINDOWS\system32\cmd.exe
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%

Network behavior

Behavior description: 建立到一个指定的套接字连接
details: URL: tl****rg, IP: **.133.40.**:9999, SOCKET = 0x000000ec
URL: aa****om, IP: **.133.40.**:9533, SOCKET = 0x00000148
URL: x6****et, IP: **.133.40.**:9999, SOCKET = 0x00000150
URL: x6****et, IP: **.133.40.**:9999, SOCKET = 0x00000158
URL: aa****om, IP: **.133.40.**:9533, SOCKET = 0x0000014c
URL: x6****et, IP: **.133.40.**:9999, SOCKET = 0x0000015c
URL: aa****om, IP: **.133.40.**:9533, SOCKET = 0x0000015c
URL: aa****om, IP: **.133.40.**:9533, SOCKET = 0x00000158
Behavior description: 按名称获取主机地址
details: gethostbyname: tl****rg
gethostbyname: computer
gethostbyname: x6****et
gethostbyname: aa****om

Other behavior

Behavior description: 创建互斥体
details: CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
Pqrstu Wxyabcde Ghi
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
Behavior description: 启动系统服务
details: [服务启动成功]: LocalSystem, Pqrstu Wxyabcde Ghijklmn Pqrs, C:\WINDOWS\eiiboq.exe
Behavior description: 获取TickCount值
details: TickCount = 486140, SleepMilliseconds = 500.
TickCount = 486171, SleepMilliseconds = 500.
TickCount = 486234, SleepMilliseconds = 500.
TickCount = 486265, SleepMilliseconds = 500.
TickCount = 486281, SleepMilliseconds = 500.
TickCount = 486343, SleepMilliseconds = 500.
TickCount = 486021, SleepMilliseconds = 100.
TickCount = 486131, SleepMilliseconds = 100.
TickCount = 486162, SleepMilliseconds = 100.
TickCount = 491496, SleepMilliseconds = 200.
TickCount = 491659, SleepMilliseconds = 300.
TickCount = 496965, SleepMilliseconds = 200.
TickCount = 677093, SleepMilliseconds = 180000.
TickCount = 504281, SleepMilliseconds = 2000.
TickCount = 682640, SleepMilliseconds = 180000.
Behavior description: 调整进程token权限
details: SE_LOAD_DRIVER_PRIVILEGE
SE_INC_BASE_PRIORITY_PRIVILEGE
Behavior description: 可执行文件签名信息
details: C:\WINDOWS\eiiboq.exe(签名验证: 未通过)
C:\WINDOWS\system32\eiiboq.exe(签名验证: 未通过)
Behavior description: 调用Sleep函数
details: [1]: MilliSeconds = 500.
[2]: MilliSeconds = 500.
[3]: MilliSeconds = 100.
[4]: MilliSeconds = 100.
[5]: MilliSeconds = 200.
[6]: MilliSeconds = 100.
[7]: MilliSeconds = 100.
[8]: MilliSeconds = 180000.
[9]: MilliSeconds = 180000.
[10]: MilliSeconds = 200.
Behavior description: 可执行文件MD5
details: C:\WINDOWS\eiiboq.exe ---> 32dae2483e5e934d9c6c59d07c37df79
C:\WINDOWS\system32\eiiboq.exe ---> 32dae2483e5e934d9c6c59d07c37df79
Behavior description: 创建系统服务
details: [服务创建成功]: Pqrstu Wxyabcde Ghi, C:\WINDOWS\eiiboq.exe