VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:608b4885b392aa74513f073b598e7660
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 探测 Virtual PC是否存在
details: N/A
Behavior description: 跨进程写入数据
details: TargetProcess = C:\WINDOWS\system32\cmdl32.exe, WriteAddress = 0x00400000, Size = 0x00001000
TargetProcess = C:\WINDOWS\system32\cmdl32.exe, WriteAddress = 0x00551000, Size = 0x0000d000
TargetProcess = C:\WINDOWS\system32\cmdl32.exe, WriteAddress = 0x00566000, Size = 0x00096000
TargetProcess = C:\WINDOWS\system32\cmdl32.exe, WriteAddress = 0x005fc000, Size = 0x00001000
TargetProcess = C:\WINDOWS\system32\cmdl32.exe, WriteAddress = 0x7ffd5008, Size = 0x00000004
Behavior description: 设置线程上下文
details: C:\Program Files\Common Files\rocky.exe
Behavior description: 尝试打开调试器或监控软件的驱动设备对象
details: \??\NTICE
Behavior description: 获取TickCount值
details: TickCount = 493440, SleepMilliseconds = 50.
TickCount = 493503, SleepMilliseconds = 50.
TickCount = 493565, SleepMilliseconds = 50.
TickCount = 493581, SleepMilliseconds = 50.
TickCount = 493596, SleepMilliseconds = 50.
TickCount = 493612, SleepMilliseconds = 50.
TickCount = 493628, SleepMilliseconds = 50.
TickCount = 494003, SleepMilliseconds = 50.
TickCount = 494018, SleepMilliseconds = 50.
TickCount = 494081, SleepMilliseconds = 50.
TickCount = 494096, SleepMilliseconds = 50.
TickCount = 494112, SleepMilliseconds = 50.
TickCount = 494128, SleepMilliseconds = 50.
TickCount = 494175, SleepMilliseconds = 50.
TickCount = 494190, SleepMilliseconds = 50.
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description: 查找反病毒常用工具窗口
details: NtUserFindWindowEx: [Class,Window] = [Regmonclass,]
NtUserFindWindowEx: [Class,Window] = [Filemonclass,]

Process behavior

Behavior description: 隐藏窗口创建进程
details: ImagePath = , CmdLine = cmdl32.exe
Behavior description: 跨进程写入数据
details: TargetProcess = C:\WINDOWS\system32\cmdl32.exe, WriteAddress = 0x00400000, Size = 0x00001000
TargetProcess = C:\WINDOWS\system32\cmdl32.exe, WriteAddress = 0x00551000, Size = 0x0000d000
TargetProcess = C:\WINDOWS\system32\cmdl32.exe, WriteAddress = 0x00566000, Size = 0x00096000
TargetProcess = C:\WINDOWS\system32\cmdl32.exe, WriteAddress = 0x005fc000, Size = 0x00001000
TargetProcess = C:\WINDOWS\system32\cmdl32.exe, WriteAddress = 0x7ffd5008, Size = 0x00000004
Behavior description: 创建本地线程
details: TargetProcess: nlstk66969.exe, InheritedFromPID = 1352, ProcessID = 468, ThreadID = 148, StartAddress = 0042F418, Parameter = 00A85038
TargetProcess: ktw.exe, InheritedFromPID = 1352, ProcessID = 1880, ThreadID = 788, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: ktw.exe, InheritedFromPID = 1352, ProcessID = 1880, ThreadID = 648, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: ktw.exe, InheritedFromPID = 1352, ProcessID = 1880, ThreadID = 1808, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: ktw.exe, InheritedFromPID = 1352, ProcessID = 1880, ThreadID = 1552, StartAddress = 6302B849, Parameter = 001A4B38
TargetProcess: zhongxia.exe, InheritedFromPID = 168, ProcessID = 284, ThreadID = 908, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: rocky.exe, InheritedFromPID = 468, ProcessID = 888, ThreadID = 940, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: rocky.exe, InheritedFromPID = 468, ProcessID = 888, ThreadID = 2052, StartAddress = 0040741D, Parameter = 00000000
TargetProcess: rocky.exe, InheritedFromPID = 468, ProcessID = 888, ThreadID = 2056, StartAddress = 004075D6, Parameter = 00000000
TargetProcess: rocky.exe, InheritedFromPID = 468, ProcessID = 888, ThreadID = 2080, StartAddress = 004075CA, Parameter = 00000000
TargetProcess: zhongxia.exe, InheritedFromPID = 168, ProcessID = 284, ThreadID = 2084, StartAddress = 009332F9, Parameter = 001ABC38
TargetProcess: zhongxia.exe, InheritedFromPID = 168, ProcessID = 284, ThreadID = 2088, StartAddress = 009332F9, Parameter = 001ABC38
TargetProcess: zhongxia.exe, InheritedFromPID = 168, ProcessID = 284, ThreadID = 2092, StartAddress = 009332F9, Parameter = 001ABC38
TargetProcess: zhongxia.exe, InheritedFromPID = 168, ProcessID = 284, ThreadID = 2096, StartAddress = 009332F9, Parameter = 001ABCD8
TargetProcess: zhongxia.exe, InheritedFromPID = 168, ProcessID = 284, ThreadID = 2100, StartAddress = 009332F9, Parameter = 001ABC38
Behavior description: 创建进程
details: ImagePath = C:\WINDOWS\system32\cmdl32.exe, CmdLine = cmdl32.exe
Behavior description: 设置线程上下文
details: C:\Program Files\Common Files\rocky.exe
Behavior description: 枚举进程
details: N/A
Behavior description: 创建新文件进程
details: ImagePath = C:\kk321.exe, CmdLine = c:\kk321.exe
ImagePath = C:\WINDOWS\Media\nlstk66969.exe, CmdLine = C:\Windows\Media\nlstk66969.exe
ImagePath = C:\Program Files\Common Files\ktw.exe, CmdLine = "C:\Program Files\Common Files\ktw.exe"
ImagePath = C:\zhongxia.exe, CmdLine = c:\zhongxia.exe
ImagePath = C:\Program Files\Common Files\rocky.exe, CmdLine = "C:\Program Files\Common Files\rocky.exe"
Behavior description: 创建下载文件进程
details: ImagePath = C:\Program Files\Common Files\2345pic_lm_509068_v6.2.7346_silent.exe, CmdLine = "C:\Program Files\Common Files\2345pic_lm_509068_v6.2.7346_silent.exe"

File behavior

Behavior description: 创建文件
details: C:\kk321.exe
C:\zhongxia.exe
C:\Program Files\Common Files\ktw.exe
C:\WINDOWS\Media\dlcore.dll
C:\Program Files\Common Files\System\rocky.exe.gip
C:\WINDOWS\Media\gzip.dll
C:\Program Files\Internet Explorer\config.ini
C:\WINDOWS\Media\nlstk66969.exe
C:\Documents and Settings\Administrator\Local Settings\%temp%\gzip.dll
C:\Program Files\Common Files\rocky.exe
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\wpad[1].dat
C:\Program Files\Common Files\2345pic_lm_509068_v6.2.7346_silent.exe
C:\WINDOWS\Media\fizcn07423.exe
C:\Documents and Settings\Administrator\Application Data\Tencent\Logs\nlstk66969.tlg
Behavior description: 创建可执行文件
details: C:\kk321.exe
C:\zhongxia.exe
C:\Program Files\Common Files\ktw.exe
C:\WINDOWS\Media\dlcore.dll
C:\WINDOWS\Media\gzip.dll
C:\WINDOWS\Media\nlstk66969.exe
C:\Documents and Settings\Administrator\Local Settings\%temp%\gzip.dll
C:\Program Files\Common Files\rocky.exe
C:\WINDOWS\Media\fizcn07423.exe
C:\Program Files\Common Files\2345pic_lm_509068_v6.2.7346_silent.exe
Behavior description: 查找文件
details: FileName = c:\kk321.exe
FileName = C:\kk321.exe
FileName = C:\Windows
FileName = C:\Windows\Media
FileName = C:\WINDOWS
FileName = C:\WINDOWS\Media
FileName = C:\Program Files\Common Files\ktw.exe
FileName = c:\zhongxia.exe
FileName = C:\zhongxia.exe
FileName = C:\Documents and Settings\Administrator\Application Data\Tencent\Logs\nlstk66969.tlg
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Application Data
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
Behavior description: 删除文件
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\wpad[1].dat
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description: 修改文件内容
details: C:\kk321.exe ---> Offset = 0
C:\zhongxia.exe ---> Offset = 0
C:\Program Files\Common Files\ktw.exe ---> Offset = 0
C:\WINDOWS\Media\dlcore.dll ---> Offset = 0
C:\Program Files\Common Files\System\rocky.exe.gip ---> Offset = 0
C:\WINDOWS\Media\gzip.dll ---> Offset = 0
C:\Program Files\Internet Explorer\config.ini ---> Offset = 0
C:\WINDOWS\Media\nlstk66969.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\%temp%\gzip.dll ---> Offset = 0
C:\Program Files\Common Files\rocky.exe ---> Offset = 0
C:\Program Files\Common Files\2345pic_lm_509068_v6.2.7346_silent.exe ---> Offset = 0
C:\WINDOWS\Media\fizcn07423.exe ---> Offset = 0
C:\Program Files\Internet Explorer\config.ini ---> Offset = 13
C:\Documents and Settings\Administrator\Application Data\Tencent\Logs\nlstk66969.tlg ---> Offset = 0

Network behavior

Behavior description: 联网打开网址
details: InternetOpenUrlA: http://**.133.40.**:128/wpad.dat, hInternet = 0x00cc0010, Flags = 0x00000010
Behavior description: 下载文件
details: C:\Program Files\Common Files\2345pic_lm_509068_v6.2.7346_silent.exe
Behavior description: 连接指定站点
details: InternetConnectA: ServerName = do****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = **.133.40.**, PORT = 128, UserName = , Password = , hSession = 0x00cc0010, hConnect = 0x00cc0014, Flags = 0x00000010
Behavior description: 打开HTTP连接
details: InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0), hSession = 0x00cc0004
InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0), hSession = 0x00cc0010
Behavior description: 建立到一个指定的套接字连接
details: URL: wpad, IP: **.133.40.**:128, SOCKET = 0x0000055c
URL: do****om, IP: **.133.40.**:80, SOCKET = 0x00000558
URL: up****om, IP: **.133.40.**:443, SOCKET = 0x000006d4
URL: up****om, IP: **.133.40.**:443, SOCKET = 0x000006d8
URL: up****om, IP: **.133.40.**:443, SOCKET = 0x000006ec
Behavior description: 读取网络文件
details: hFile = 0x00cc0018, BytesToRead =4010, BytesRead = 4010.
hFile = 0x00cc000c, BytesToRead =102400, BytesRead = 102400.
Behavior description: 发送HTTP包
details: GET /wpad.dat HTTP/1.1 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0) Host: **.133.40.**:128
GET /unionpic/2345pic_lm_509068_v6.2.7346_silent.exe HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Accept: */* Host: do****om Cache-Control: no-cache
GET Upload_Data VERSION: 1 MODULE_ID: 618 COMM:26569,327681,196608,8816475304592831608,283951560476634320,3,0,0,31,0,15078,0,0,0,0,0,0,0,0,11,1,1,1,2,0,0,0,0,0,0,0,0,0,0,0,2,1,2,1,0,1,0,16,2,0,0,0,0,0,0,3,1,2,1,0,1,0,0,2,0,0,0,0,0,0,4,1,2,1,0,1,0,78,2,0,0,0,0,0,0,5,1,2,1,0,1,0,62,2,0,0,0,0,0,0,7,1,2,1,0,1,0,31,2,0,0,0,0,0,0,8,1,2,1,0,1,0,79,2,0,0,0,0,0,0,9,1,2,1,0,1,0,31,2,0,0,0,0,0,0,12,1,2,1,0,1,0,31,2,0,0,0,0,0,0,13,1,2,1,0,1,0,31,2,0,0,0,0,0,0,11,1,2,1,0,1,0,47,2,0,0,0,0,0,0 User-Agent: Mozilla/4.0 (compatible; MSIE 5.00; Windows Xp) Host: %s:%d Cache-Control: no-cache
Behavior description: 打开HTTP请求
details: HttpOpenRequestA: do****om:80/unionpic/2345pic_lm_509068_v6.2.7346_silent.exe, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x84000000
HttpOpenRequestA: **.133.40.**:128/wpad.dat, hConnect = 0x00cc0014, hRequest = 0x00cc0018, Verb: GET, Referer: , Flags = 0x00000010
Behavior description: 按名称获取主机地址
details: GetAddrInfoW: computer
GetAddrInfoW: wpad
GetAddrInfoW: do****om
gethostbyname: up****om

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows NT\CurrentVersion\Windows\load
\REGISTRY\USER\S-*\Software\Tencent\TodayDo\RunTaskQQ
\REGISTRY\MACHINE\SOFTWARE\Tencent\BackupDownloader\times
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\ktw\DEBUG\Trace Level
\REGISTRY\USER\S-*\Software\Tencent\Report\134239449
\REGISTRY\MACHINE\SOFTWARE\Tencent\BackupDownloader\Default\BitmapValue1
\REGISTRY\MACHINE\SOFTWARE\Tencent\BackupDownloader\Default\BitmapValue2
Behavior description: 删除注册表键值
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\ktw\DEBUG\Trace Level
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Lsa\Notification Packages

Other behavior

Behavior description: 探测 Virtual PC是否存在
details: N/A
Behavior description: 创建互斥体
details: CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
_TX~QQSetupEx~0503~A1C22B84-CE8D-437A-AA60-6D3ABCB18ACF
RasPbFile
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.AHF
Behavior description: 创建事件对象
details: EventName = DINPUTWINMM
EventName = Global\crypt32LogoffEvent
EventName = Global\userenv: User Profile setup event
EventName = MSCTF.SendReceive.Event.AHF.IC
EventName = MSCTF.SendReceiveConection.Event.AHF.IC
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [LogView_qqpcmgr,]
NtUserFindWindowEx: [Class,Window] = [,{39F5E8C5-2BA9-48df-B58E-D30D58E271ED}]
NtUserFindWindowEx: [Class,Window] = [4823-00000029,]
NtUserFindWindowEx: [Class,Window] = [18467-41,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [,rocky.exe]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [OleMainThreadWndClass,]
NtUserFindWindowEx: [Class,Window] = [,locker32.exe]
NtUserFindWindowEx: [Class,Window] = [,locker64.exe]
NtUserFindWindowEx: [Class,Window] = [IEFrame,]
NtUserFindWindowEx: [Class,Window] = [WorkerW,]
NtUserFindWindowEx: [Class,Window] = [ReBarWindow32,]
NtUserFindWindowEx: [Class,Window] = [Address Band Root,]
NtUserFindWindowEx: [Class,Window] = [Edit,]
Behavior description: 尝试打开调试器或监控软件的驱动设备对象
details: \??\NTICE
Behavior description: 获取TickCount值
details: TickCount = 493440, SleepMilliseconds = 50.
TickCount = 493503, SleepMilliseconds = 50.
TickCount = 493565, SleepMilliseconds = 50.
TickCount = 493581, SleepMilliseconds = 50.
TickCount = 493596, SleepMilliseconds = 50.
TickCount = 493612, SleepMilliseconds = 50.
TickCount = 493628, SleepMilliseconds = 50.
TickCount = 494003, SleepMilliseconds = 50.
TickCount = 494018, SleepMilliseconds = 50.
TickCount = 494081, SleepMilliseconds = 50.
TickCount = 494096, SleepMilliseconds = 50.
TickCount = 494112, SleepMilliseconds = 50.
TickCount = 494128, SleepMilliseconds = 50.
TickCount = 494175, SleepMilliseconds = 50.
TickCount = 494190, SleepMilliseconds = 50.
Behavior description: 调整进程token权限
details: SE_LOAD_DRIVER_PRIVILEGE
SE_INC_BASE_PRIORITY_PRIVILEGE
SE_DEBUG_PRIVILEGE
Behavior description: 窗口信息
details: Pid = 284, Hwnd=0x202aa, Text = 确定, ClassName = Button.
Pid = 284, Hwnd=0x402be, Text = 请不要在虚拟机中运行此程序。, ClassName = Static.
Pid = 284, Hwnd=0x302b0, Text = Safengine, ClassName = #32770.
Behavior description: 查找反病毒常用工具窗口
details: NtUserFindWindowEx: [Class,Window] = [Regmonclass,]
NtUserFindWindowEx: [Class,Window] = [Filemonclass,]
Behavior description: 直接操作物理设备
details: \??\PhysicalDrive0
Behavior description: 可执行文件签名信息
details: C:\kk321.exe(签名验证: 未通过)
C:\zhongxia.exe(签名验证: 未通过)
C:\Program Files\Common Files\ktw.exe(签名验证: 未通过)
C:\WINDOWS\Media\dlcore.dll(签名验证: 未通过)
C:\WINDOWS\Media\gzip.dll(签名验证: 未通过)
C:\WINDOWS\Media\nlstk66969.exe(签名验证: 通过)
C:\Documents and Settings\Administrator\Local Settings\%temp%\gzip.dll(签名验证: 未通过)
C:\Program Files\Common Files\rocky.exe(签名验证: 未通过)
C:\WINDOWS\Media\fizcn07423.exe(签名验证: 通过)
C:\Program Files\Common Files\2345pic_lm_509068_v6.2.7346_silent.exe(签名验证: 未通过)
Behavior description: 调用Sleep函数
details: [1]: MilliSeconds = 10000.
[2]: MilliSeconds = 3000.
[3]: MilliSeconds = 10000.
[4]: MilliSeconds = 3000.
[5]: MilliSeconds = 10000.
Behavior description: 隐藏指定窗口
details: [Window,Class] = [loger command window,TXLOGGER_BYCORETEAM]
[Window,Class] = [TENCENT-INSTLLER-WINDOW,TENCENT-INSTLLER]
[Window,Class] = [,Afx:400000:8]
Behavior description: 可执行文件MD5
details: C:\kk321.exe ---> 766f6872f3e08bf7f9f0b349169284cc
C:\zhongxia.exe ---> 文件过大!
C:\Program Files\Common Files\ktw.exe ---> 64ff79ddb23b12e010802f77261dc284
C:\WINDOWS\Media\dlcore.dll ---> 2c763885abc6ac4c272827d081c48dce
C:\WINDOWS\Media\gzip.dll ---> 8b3591965f623b219c0c528153746cab
C:\WINDOWS\Media\nlstk66969.exe ---> 60164af0388620090a69c8b6c08bbddb
C:\Documents and Settings\Administrator\Local Settings\%temp%\gzip.dll ---> 8b3591965f623b219c0c528153746cab
C:\Program Files\Common Files\rocky.exe ---> 45b41e4b4a40085868d6e7c4b1706dad
C:\WINDOWS\Media\fizcn07423.exe ---> 60164af0388620090a69c8b6c08bbddb
C:\Program Files\Common Files\2345pic_lm_509068_v6.2.7346_silent.exe ---> fe1d0ee5901dd167ee9b28eece31786c
Behavior description: 加载新释放的文件
details: Image: C:\WINDOWS\Media\dlcore.dll.
Image: C:\WINDOWS\Media\gzip.dll.