VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:35
Behavior list
Basic Information
MD5:356998ae1a1bd437cb0e0dbfc91a02e9
file type:EXE
Production company:UCWeb Inc.
version:6.2.3964.2---6.2.3964.2
Shell or compiler information:COMPILER:MingWin32 - Dev C++ v4.x (h) [Overlay] *
Key behavior
Behavior description:对比可疑进程名
details:stricmp: [System Process] <------> avp.exe Des: 卡巴斯基
lstrcmpiA: System <------> avp.exe Des: 卡巴斯基
lstrcmpiA: smss.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: csrss.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: winlogon.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: services.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: lsass.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: JHqxService.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: byccthlp.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: svchost.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: spoolsv.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: jqs.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: JSQpgradeHelper.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: alg.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: explorer.exe <------> avp.exe Des: 卡巴斯基
Behavior description:搜索可疑进程名
details:strstr: avp.exe <------> Des: 卡巴斯基
Behavior description:直接调用系统关键API
details:Index = 0x00000011, Name: NtAllocateVirtualMemory, Instruction Address = 0x0040313A
Index = 0x00000053, Name: NtFreeVirtualMemory, Instruction Address = 0x00401C98
Process behavior
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2860, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2864, StartAddress = 77C0A341, Parameter = 003FF6D8
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:查找文件
details:FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
FileName = C:/Documents and Settings/Administrator/Local Settings/Temp/EB93A6/%temp%\****.exe.10001.Manifest
FileName = \\?\C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\LOCAL SETTINGS\%temp%\****.exe.10001.Manifest
FileName = C:/Documents and Settings/Administrator/Local Settings/Temp/EB93A6/%temp%\****.exe.Manifest
FileName = \\?\C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\LOCAL SETTINGS\%temp%\****.exe.Manifest
FileName = C:/Documents and Settings/Administrator/Local Settings/Temp/EB93A6/%temp%\****.exe.10001.Config
FileName = \\?\C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\LOCAL SETTINGS\%temp%\****.exe.10001.Config
FileName = C:/Documents and Settings/Administrator/Local Settings/Temp/EB93A6/%temp%\****.exe.Config
FileName = \\?\C:\DOCUMENTS AND SETTINGS\ADMINISTRATOR\LOCAL SETTINGS\%temp%\****.exe.Config
FileName = C:\WINDOWS\system32\COMCTL32.dll.124.Manifest
Network behavior
Behavior description:建立到一个指定的套接字连接
details:IP: **.248.20.**:12955, SOCKET = 0x00000144
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\MarkTime
\REGISTRY\USER\S-*\Software\Microsoft\ActiveMovie\devenum\Version
Other behavior
Behavior description:检测自身是否被调试
details:IsDebuggerPresent
Behavior description:创建互斥体
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
43.248.20.148
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
eed3bd3a-a1ad-4e99-987b-d7cb3fcfa7f0 - S-*
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = Global\crypt32LogoffEvent
Behavior description:直接调用系统关键API
details:Index = 0x00000011, Name: NtAllocateVirtualMemory, Instruction Address = 0x0040313A
Index = 0x00000053, Name: NtFreeVirtualMemory, Instruction Address = 0x00401C98
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [CTXOPConntion_Class,]
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
Global\crypt32LogoffEvent
Global\SvcctrlStartEvent_A3752DX
Behavior description:对比可疑进程名
details:stricmp: [System Process] <------> avp.exe Des: 卡巴斯基
lstrcmpiA: System <------> avp.exe Des: 卡巴斯基
lstrcmpiA: smss.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: csrss.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: winlogon.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: services.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: lsass.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: JHqxService.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: byccthlp.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: svchost.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: spoolsv.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: jqs.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: JSQpgradeHelper.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: alg.exe <------> avp.exe Des: 卡巴斯基
lstrcmpiA: explorer.exe <------> avp.exe Des: 卡巴斯基
Behavior description:打开互斥体
details:DBWinMutex
Behavior description:搜索可疑进程名
details:strstr: avp.exe <------> Des: 卡巴斯基
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号