VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:77
Behavior list
Basic Information
MD5:7465f64de83737208fcf5fcc1348aa51
file type:EXE
Production company:Tensons Corporation
version:4.12.7.0---4.12.7
Shell or compiler information:COMPILER:Microsoft Visual C# / Basic .NET [Overlay]
Key behavior
Behavior description:检测自身是否被调试
details:N/A
Behavior description:跨进程写入数据
details:TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x00400000, Size = 0x00000400
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x00462000, Size = 0x00008e00
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x0046c000, Size = 0x00000e00
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x0046e000, Size = 0x00000200
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x0046f000, Size = 0x00002800
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x7ffd4008, Size = 0x00000004
Behavior description:设置线程上下文
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
Behavior description:获取TickCount值
details:TickCount = 5416078, SleepMilliseconds = 60000.
TickCount = 5416265, SleepMilliseconds = 60000.
TickCount = 5416546, SleepMilliseconds = 60000.
TickCount = 5416562, SleepMilliseconds = 60000.
TickCount = 5416578, SleepMilliseconds = 60000.
TickCount = 5356598, SleepMilliseconds = 20.
TickCount = 5356613, SleepMilliseconds = 20.
TickCount = 5356645, SleepMilliseconds = 20.
Behavior description:跨进程写代码段数据
details:TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x00401000, Size = 0x00060200
Behavior description:直接获取CPU时钟
details:N/A
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, CmdLine = "C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe"
Behavior description:创建进程
details:ImagePath = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, CmdLine = "C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe"
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1400, ThreadID = 792, StartAddress = 79F0237F, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1400, ThreadID = 1980, StartAddress = 79F91FCF, Parameter = 001A57B0
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1400, ThreadID = 164, StartAddress = 765E964D, Parameter = 001BFFE8
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1400, ThreadID = 1996, StartAddress = 7C949B6F, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1400, ThreadID = 1360, StartAddress = 759D8761, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1400, ThreadID = 1408, StartAddress = 757D4D37, Parameter = 00200B58
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1400, ThreadID = 764, StartAddress = 757D4D37, Parameter = 00200BF0
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1400, ThreadID = 1872, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1400, ThreadID = 1372, StartAddress = 77E56C7D, Parameter = 0020CD90
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1400, ThreadID = 300, StartAddress = 769AE43B, Parameter = 001E26D0
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1400, ThreadID = 972, StartAddress = 79FDA29C, Parameter = 00000000
Behavior description:跨进程写入数据
details:TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x00400000, Size = 0x00000400
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x00462000, Size = 0x00008e00
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x0046c000, Size = 0x00000e00
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x0046e000, Size = 0x00000200
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x0046f000, Size = 0x00002800
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x7ffd4008, Size = 0x00000004
Behavior description:设置线程上下文
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
Behavior description:跨进程写代码段数据
details:TargetProcess = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, WriteAddress = 0x00401000, Size = 0x00060200
File behavior
Behavior description:覆盖已有文件
details:C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
Behavior description:修改文件内容
details:C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT ---> Offset = 0
Behavior description:查找文件
details:FileName = C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll
FileName = C:\WINDOWS\Microsoft.NET\Framework\\*
FileName = C:\WINDOWS
FileName = C:\WINDOWS\WinSxS
FileName = C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll
FileName = C:\WINDOWS\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.INI
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\SystemCertificates\My\Certificates\*
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\SystemCertificates\My\CRLs\*
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\SystemCertificates\My\CTLs\*
Network behavior
Behavior description:连接指定站点
details:WinHttpConnect: ServerName = cr****om, PORT = 80, UserName = , Password = , hSession = 0x03b92000, hConnect = 0x03b92100, Flags = 0x00000000
WinHttpConnect: ServerName = cs****om, PORT = 80, UserName = , Password = , hSession = 0x03b92000, hConnect = 0x03b92100, Flags = 0x00000000
Behavior description:打开HTTP连接
details:WinHttpOpen: UserAgent: Microsoft-CryptoAPI/5.131.2600.5512, hSession = 0x03b92000
Behavior description:建立到一个指定的套接字连接
details:URL: w****., IP: **.133.40.**:80, SOCKET = 0x00000494
URL: w****., IP: **.133.40.**:80, SOCKET = 0x0000048c
URL: cr****om, IP: **.133.40.**:80, SOCKET = 0x00000490
URL: w****., IP: **.133.40.**:80, SOCKET = 0x0000053c
URL: cs****om, IP: **.133.40.**:80, SOCKET = 0x00000490
Behavior description:发送HTTP包
details:GET /wpad.dat HTTP/1.1 Accept: */* User-Agent: Microsoft-CryptoAPI/5.131.2600.5512 Host: **.133.40.** Connection: Keep-Alive
GET /ThawtePCA.crl HTTP/1.1 Accept: */* User-Agent: Microsoft-CryptoAPI/5.131.2600.5512 Host: cr****om Connection: Keep-Alive Cache-Control: no-cache Pragma: no-cache
GET /ThawteCSG2.crl HTTP/1.1 Accept: */* User-Agent: Microsoft-CryptoAPI/5.131.2600.5512 Host: cs****om Connection: Keep-Alive Cache-Control: no-cache Pragma: no-cache
Behavior description:打开HTTP请求
details:WinHttpOpenRequest: cr****om:80/thawtepca.crl, hConnect = 0x03b92100, hRequest = 0x03c00000, Verb: GET, Referer: , Flags = 0x00000100
WinHttpOpenRequest: cs****om:80/thawtecsg2.crl, hConnect = 0x03b92100, hRequest = 0x03c00000, Verb: GET, Referer: , Flags = 0x00000100
Behavior description:按名称获取主机地址
details:gethostbyname: w****.
GetAddrInfoW: cr****om
GetAddrInfoW: cs****om
Other behavior
Behavior description:检测自身是否被调试
details:N/A
Behavior description:创建互斥体
details:RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
bkEWxljAkDHrNUHXAEYf
Behavior description:创建事件对象
details:EventName = Global\CorDBIPCSetupSyncEvent_1400
EventName = Global\crypt32LogoffEvent
EventName = Global\userenv: User Profile setup event
EventName = DINPUTWINMM
Behavior description:打开互斥体
details:ShimCacheMutex
Global\CLR_CASOFF_MUTEX
RasPbFile
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
Behavior description:获取TickCount值
details:TickCount = 5416078, SleepMilliseconds = 60000.
TickCount = 5416265, SleepMilliseconds = 60000.
TickCount = 5416546, SleepMilliseconds = 60000.
TickCount = 5416562, SleepMilliseconds = 60000.
TickCount = 5416578, SleepMilliseconds = 60000.
TickCount = 5356598, SleepMilliseconds = 20.
TickCount = 5356613, SleepMilliseconds = 20.
TickCount = 5356645, SleepMilliseconds = 20.
Behavior description:打开事件
details:Global\CLR_PerfMon_StartEnumEvent
\KernelObjects\LowMemoryCondition
Global\crypt32LogoffEvent
Global\userenv: Machine Group Policy has been applied
userenv: User Group Policy has been applied
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
\INSTALLATION_SECURITY_HOLD
Global\SvcctrlStartEvent_A3752DX
HookSwitchHookEnabledEvent
MSFT.VSA.COM.DISABLE.1400
MSFT.VSA.IEC.STATUS.6c736db0
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 60000.
[2]: MilliSeconds = -1.
Behavior description:直接获取CPU时钟
details:N/A
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号