VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:60
Behavior list
Basic Information
MD5:7152ef768c401431f4f57e7d5af443f4
file type:EXE
Production company:
version:
Shell or compiler information:COMPILER:Borland Delphi 6.0 - 7.0
Key behavior
Behavior description:杀掉进程
details:TASKKILL = taskkill /F /im cspmain.exe
TASKKILL = taskkill /F /im CSPFRONT.exe
TASKKILL = taskkill /F /im Cspcrm.exe
TASKKILL = taskkill /F /im CSPAR.exe
TASKKILL = taskkill /F /im CSPHistory.exe
TASKKILL = taskkill /F /im cspos.exe
TASKKILL = taskkill /F /im tel.exe
TASKKILL = taskkill /F /im CSPConfig.exe
TASKKILL = taskkill /F /im Engine.exe
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = , CmdLine = cmd.exe /c ""C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\44O0DDPW.bat" "C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe""
Behavior description:创建进程
details:[0x00000a50]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd.exe /c ""C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\44O0DDPW.bat" "C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe""
[0x00000a70]ImagePath = C:\WINDOWS\system32\taskkill.exe, CmdLine = taskkill /F /im cspmain.exe
[0x00000afc]ImagePath = C:\WINDOWS\system32\taskkill.exe, CmdLine = taskkill /F /im CSPFRONT.exe
[0x00000b40]ImagePath = C:\WINDOWS\system32\taskkill.exe, CmdLine = taskkill /F /im Cspcrm.exe
[0x00000b54]ImagePath = C:\WINDOWS\system32\taskkill.exe, CmdLine = taskkill /F /im CSPAR.exe
[0x00000b68]ImagePath = C:\WINDOWS\system32\taskkill.exe, CmdLine = taskkill /F /im CSPHistory.exe
[0x00000b7c]ImagePath = C:\WINDOWS\system32\taskkill.exe, CmdLine = taskkill /F /im cspos.exe
[0x00000ba8]ImagePath = C:\WINDOWS\system32\taskkill.exe, CmdLine = taskkill /F /im tel.exe
[0x00000bbc]ImagePath = C:\WINDOWS\system32\taskkill.exe, CmdLine = taskkill /F /im CSPConfig.exe
[0x00000bd0]ImagePath = C:\WINDOWS\system32\taskkill.exe, CmdLine = taskkill /F /im Engine.exe
Behavior description:创建本地线程
details:TargetProcess: taskkill.exe, InheritedFromPID = 2640, ProcessID = 2672, ThreadID = 2704, StartAddress = 77E56C7D, Parameter = 000EAC28
TargetProcess: taskkill.exe, InheritedFromPID = 2640, ProcessID = 2672, ThreadID = 2712, StartAddress = 769AE43B, Parameter = 000ED5B8
TargetProcess: taskkill.exe, InheritedFromPID = 2640, ProcessID = 2672, ThreadID = 2724, StartAddress = 77E56C7D, Parameter = 000EDD50
TargetProcess: taskkill.exe, InheritedFromPID = 2640, ProcessID = 2812, ThreadID = 2856, StartAddress = 77E56C7D, Parameter = 000EAC28
TargetProcess: taskkill.exe, InheritedFromPID = 2640, ProcessID = 2812, ThreadID = 2868, StartAddress = 769AE43B, Parameter = 000ED5C8
TargetProcess: taskkill.exe, InheritedFromPID = 2640, ProcessID = 2812, ThreadID = 2876, StartAddress = 77E56C7D, Parameter = 000EDD50
TargetProcess: taskkill.exe, InheritedFromPID = 2640, ProcessID = 2880, ThreadID = 2888, StartAddress = 77E56C7D, Parameter = 000EAC28
TargetProcess: taskkill.exe, InheritedFromPID = 2640, ProcessID = 2880, ThreadID = 2892, StartAddress = 769AE43B, Parameter = 000ED5C8
TargetProcess: taskkill.exe, InheritedFromPID = 2640, ProcessID = 2880, ThreadID = 2896, StartAddress = 77E56C7D, Parameter = 000EDD50
TargetProcess: taskkill.exe, InheritedFromPID = 2640, ProcessID = 2900, ThreadID = 2908, StartAddress = 77E56C7D, Parameter = 000EAC28
TargetProcess: taskkill.exe, InheritedFromPID = 2640, ProcessID = 2900, ThreadID = 2912, StartAddress = 769AE43B, Parameter = 000ED5C8
TargetProcess: taskkill.exe, InheritedFromPID = 2640, ProcessID = 2900, ThreadID = 2916, StartAddress = 77E56C7D, Parameter = 000EDC60
TargetProcess: taskkill.exe, InheritedFromPID = 2640, ProcessID = 2920, ThreadID = 2928, StartAddress = 77E56C7D, Parameter = 000EAC28
TargetProcess: taskkill.exe, InheritedFromPID = 2640, ProcessID = 2920, ThreadID = 2932, StartAddress = 769AE43B, Parameter = 000ED5C8
TargetProcess: taskkill.exe, InheritedFromPID = 2640, ProcessID = 2920, ThreadID = 2936, StartAddress = 77E56C7D, Parameter = 000EDD50
Behavior description:杀掉进程
details:TASKKILL = taskkill /F /im cspmain.exe
TASKKILL = taskkill /F /im CSPFRONT.exe
TASKKILL = taskkill /F /im Cspcrm.exe
TASKKILL = taskkill /F /im CSPAR.exe
TASKKILL = taskkill /F /im CSPHistory.exe
TASKKILL = taskkill /F /im cspos.exe
TASKKILL = taskkill /F /im tel.exe
TASKKILL = taskkill /F /im CSPConfig.exe
TASKKILL = taskkill /F /im Engine.exe
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\44O0DDPW.bat
Behavior description:修改BAT脚本文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\44O0DDPW.bat ---> Offset = 0
Behavior description:查找文件
details:FileName = C:\WINDOWS
FileName = C:\WINDOWS\system32
FileName = C:\WINDOWS\system32\cmd.exe
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\44O0DDPW.bat
FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\taskkill.*
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\taskkill
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
MSCTF.Shared.MUTEX.EFK
Behavior description:创建事件对象
details:EventName = MSCTF.SendReceive.Event.EFK.IC
EventName = MSCTF.SendReceiveConection.Event.EFK.IC
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:打开事件
details:MSFT.VSA.COM.DISABLE.2672
MSFT.VSA.IEC.STATUS.6c736db0
MSFT.VSA.COM.DISABLE.2812
MSFT.VSA.COM.DISABLE.2880
MSFT.VSA.COM.DISABLE.2900
MSFT.VSA.COM.DISABLE.2920
MSFT.VSA.COM.DISABLE.2940
MSFT.VSA.COM.DISABLE.2984
MSFT.VSA.COM.DISABLE.3004
MSFT.VSA.COM.DISABLE.3024
_fCanRegisterWithShellService
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
Behavior description:调整进程token权限
details:SE_DEBUG_PRIVILEGE
SE_LOAD_DRIVER_PRIVILEGE
Behavior description:枚举窗口
details:N/A
Behavior description:打开互斥体
details:ShimCacheMutex
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号