VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:61
Behavior list
Basic Information
MD5:676cb3b4abe2d968e23b11984698084d
file type:EXE
Production company:Oracle Corporation
version:1.0.0.1---3.2.4.62467
Shell or compiler information:PACKER:nSPack 2.1 - 2.5 -> North Star/Liu Xing Ping [Overlay]
Subfile information:aspr.ske.2.x.new_cc3dc7fedumpFile / 93b838b81d4249dde14ea770353267d4 / EXE
nspack_a3916f00dumpFile / eb19d9377d30f7f51326221283059425 / EXE
nspack_6a9b5ac9dumpFile / 7b6adaee95ce5546facbc5ab6966662d / EXE
nspack_27d460e0dumpFile / 21348ea4695d3e2fd21865dee6dd4c19 / EXE
nspack_edf4a8b6dumpFile / ea3458f5574acd53c3107910524d5c22 / EXE
nspack_b20d2856dumpFile / a7126c61ad41153232d4d4a5ed4aebe7 / EXE
nspack_76455053dumpFile / d4d882b8d4fbde77066e336abb9e2735 / EXE
Key behavior
Behavior description:检测自身是否被调试
details:N/A
Behavior description:设置启动项
details:C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\server.exe
Behavior description:尝试打开调试器或监控软件的驱动设备对象
details:\??\SICE
\??\NTICE
\??\SIWVID
Behavior description:修改注册表_启动项
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = , CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\2.exe
Behavior description:创建新文件进程
details:ImagePath = C:\WINDOWS\Temp\Oath.exe, CmdLine = C:\windows\temp\Oath.exe
ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\2.exe, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\2.exe
ImagePath = C:\Program Files\Common Files\Microsoft Shared\MSInfo\复件 复件 复件 1.exe, CmdLine = "C:\program files\common files\microsoft shared\msinfo\复件 复件 复件 1.exe"
Behavior description:枚举进程
details:N/A
Behavior description:创建本地线程
details:TargetProcess: Oath.exe, InheritedFromPID = 2804, ProcessID = 3216, ThreadID = 3248, StartAddress = 5D1903E1, Parameter = 000CE5B8
TargetProcess: Oath.exe, InheritedFromPID = 2804, ProcessID = 3216, ThreadID = 3252, StartAddress = 01005190, Parameter = 00000000
File behavior
Behavior description:创建文件
details:C:\WINDOWS\Temp\Oath.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\TMP4351$.TMP
C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\2.exe
C:\Program Files\Common Files\Microsoft Shared\MSInfo\复件 复件 复件 1.jpg
Behavior description:创建可执行文件
details:C:\WINDOWS\Temp\Oath.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\2.exe
C:\Program Files\Common Files\Microsoft Shared\MSInfo\复件 复件 复件 1.jpg
C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\server.exe
Behavior description:复制文件
details:C:\program files\common files\microsoft shared\msinfo\复件 复件 复件 1.exe ---> C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\server.exe
Behavior description:设置启动项
details:C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\server.exe
Behavior description:删除文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\TMP4351$.TMP
Behavior description:查找文件
details:FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\aspr_keys.ini
FileName = C:\windows
FileName = C:\windows\temp
FileName = C:\windows\temp\Oath.exe
FileName = C:\WINDOWS
FileName = C:\WINDOWS\Temp
FileName = C:\WINDOWS\Temp\Oath.exe
FileName = C:\windows\temp\aspr_keys.ini
FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\IXP000.TMP\2.exe
FileName = C:\program files\common files\microsoft shared\msinfo\复件 复件 复件 1.jpg
Behavior description:重命名文件
details:C:\Program Files\Common Files\Microsoft Shared\MSInfo\复件 复件 复件 1.jpg ---> C:\program files\common files\microsoft shared\msinfo\复件 复件 复件 1.exe
Behavior description:修改文件内容
details:C:\WINDOWS\Temp\Oath.exe ---> Offset = 0
C:\WINDOWS\Temp\Oath.exe ---> Offset = 477184
C:\WINDOWS\Temp\Oath.exe ---> Offset = 477197
C:\WINDOWS\Temp\Oath.exe ---> Offset = 10741773
C:\WINDOWS\Temp\Oath.exe ---> Offset = 21006349
C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\2.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\2.exe ---> Offset = 32768
C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\2.exe ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\2.exe ---> Offset = 98304
C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\2.exe ---> Offset = 131072
C:\Program Files\Common Files\Microsoft Shared\MSInfo\复件 复件 复件 1.jpg ---> Offset = 0
C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\server.exe ---> Offset = 0
C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\server.exe ---> Offset = 65536
C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\server.exe ---> Offset = 4096
C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\server.exe ---> Offset = 8192
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\program files\common files\microsoft shared\msinfo\复件 复件 复件 1.exe
Behavior description:删除注册表键值
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0
Behavior description:修改注册表_启动项
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0
Other behavior
Behavior description:检测自身是否被调试
details:N/A
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
Behavior description:创建事件对象
details:EventName = Global\userenv: User Profile setup event
EventName = Global\crypt32LogoffEvent
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
Behavior description:尝试打开调试器或监控软件的驱动设备对象
details:\??\SICE
\??\NTICE
\??\SIWVID
Behavior description:搜索kernel32.dll基地址
details:Instruction Address = 0x0102d79a
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
Global\crypt32LogoffEvent
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000040
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000040
MSCTF.SendReceiveConection.Event.ELH.IC
MSCTF.SendReceive.Event.ELH.IC
_fCanRegisterWithShellService
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Behavior description:可执行文件签名信息
details:C:\WINDOWS\Temp\Oath.exe(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\2.exe(签名验证: 未通过)
C:\Program Files\Common Files\Microsoft Shared\MSInfo\复件 复件 复件 1.jpg(签名验证: 未通过)
C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\server.exe(签名验证: 未通过)
Behavior description:隐藏指定窗口
details:[Window,Class] = [正在初始化,请稍候...,Static]
Behavior description:可执行文件MD5
details:C:\WINDOWS\Temp\Oath.exe ---> 文件过大!
C:\Documents and Settings\Administrator\Local Settings\Temp\IXP000.TMP\2.exe ---> 101c9756a6f20915a2dd341ed2b49e5d
C:\Program Files\Common Files\Microsoft Shared\MSInfo\复件 复件 复件 1.jpg ---> dde10500a2eba85af3d37aad015932b3
C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\server.exe ---> dde10500a2eba85af3d37aad015932b3
Behavior description:打开互斥体
details:ShimCacheMutex
Local\!IETld!Mutex
DBWinMutex
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号