VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:767c612eb0fd9ce4d8a5e62ac217d5ac
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 检测自身是否被调试
details: N/A
Behavior description: 直接获取CPU时钟
details: N/A
Behavior description: 获取TickCount值
details: TickCount = 390218, SleepMilliseconds = 60000.
TickCount = 390234, SleepMilliseconds = 60000.
TickCount = 390296, SleepMilliseconds = 60000.
TickCount = 390312, SleepMilliseconds = 60000.
TickCount = 390328, SleepMilliseconds = 60000.
TickCount = 390343, SleepMilliseconds = 60000.
TickCount = 390421, SleepMilliseconds = 60000.
TickCount = 390515, SleepMilliseconds = 60000.
TickCount = 390531, SleepMilliseconds = 60000.
TickCount = 390609, SleepMilliseconds = 60000.
TickCount = 390640, SleepMilliseconds = 60000.
TickCount = 390656, SleepMilliseconds = 60000.
TickCount = 390671, SleepMilliseconds = 60000.
TickCount = 390843, SleepMilliseconds = 60000.
TickCount = 391062, SleepMilliseconds = 60000.

Process behavior

Behavior description: 创建本地线程
details: TargetProcess: b70c.exe, InheritedFromPID = 2008, ProcessID = 112, ThreadID = 1032, StartAddress = 77E56C7D, Parameter = 001D7AF8
TargetProcess: b70c.exe, InheritedFromPID = 2008, ProcessID = 112, ThreadID = 2020, StartAddress = 769AE43B, Parameter = 001DA418
TargetProcess: b70c.exe, InheritedFromPID = 2008, ProcessID = 112, ThreadID = 764, StartAddress = 77E56C7D, Parameter = 001DABD8
TargetProcess: b70c.exe, InheritedFromPID = 2008, ProcessID = 112, ThreadID = 1916, StartAddress = 77E56C7D, Parameter = 001DEB88
TargetProcess: b70c.exe, InheritedFromPID = 2008, ProcessID = 112, ThreadID = 1920, StartAddress = 00525AC0, Parameter = 00226100
TargetProcess: b70c.exe, InheritedFromPID = 2008, ProcessID = 112, ThreadID = 784, StartAddress = 005659B5, Parameter = 002423A8
TargetProcess: b70c.exe, InheritedFromPID = 2008, ProcessID = 112, ThreadID = 2016, StartAddress = 005659B5, Parameter = 0024BD80
TargetProcess: b70c.exe, InheritedFromPID = 2008, ProcessID = 112, ThreadID = 1432, StartAddress = 005659B5, Parameter = 0024BD80
TargetProcess: b70c.exe, InheritedFromPID = 2008, ProcessID = 112, ThreadID = 1168, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: b70c.exe, InheritedFromPID = 2008, ProcessID = 112, ThreadID = 1264, StartAddress = 005659B5, Parameter = 0024BD80
Behavior description: 枚举进程
details: N/A

File behavior

Behavior description: 创建文件
details: C:\Documents and Settings\Administrator\Local Settings\%temp%\debug.log
C:\Documents and Settings\Administrator\Application Data\dandelion\Dandelion.exe
Behavior description: 添加计划任务
details: C:\WINDOWS\Tasks\DandelionStarter.job
Behavior description: 创建可执行文件
details: C:\Documents and Settings\Administrator\Application Data\dandelion\Dandelion.exe
Behavior description: 查找文件
details: FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\b70c.exe
Behavior description: 复制文件
details: C:\Documents and Settings\Administrator\Local Settings\%temp%\b70c.exe ---> C:\Documents and Settings\Administrator\Application Data\dandelion\Dandelion.exe
Behavior description: 修改文件内容
details: C:\Documents and Settings\Administrator\Local Settings\%temp%\debug.log ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\%temp%\debug.log ---> Offset = 87
C:\Documents and Settings\Administrator\Local Settings\%temp%\debug.log ---> Offset = 158
C:\Documents and Settings\Administrator\Local Settings\%temp%\debug.log ---> Offset = 245
C:\WINDOWS\Tasks\DandelionStarter.job ---> Offset = 0
C:\WINDOWS\Tasks\DandelionStarter.job ---> Offset = 70
C:\Documents and Settings\Administrator\Application Data\dandelion\Dandelion.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Application Data\dandelion\Dandelion.exe ---> Offset = 65536
C:\Documents and Settings\Administrator\Application Data\dandelion\Dandelion.exe ---> Offset = 131072
C:\Documents and Settings\Administrator\Application Data\dandelion\Dandelion.exe ---> Offset = 196608
C:\Documents and Settings\Administrator\Application Data\dandelion\Dandelion.exe ---> Offset = 262144

Network behavior

Behavior description: 建立到一个指定的套接字连接
details: URL: mm****om, IP: **.133.40.**:128, SOCKET = 0x000005ac
URL: gm****om, IP: **.133.40.**:128, SOCKET = 0x000005c0
URL: mm****om, IP: **.133.40.**:128, SOCKET = 0x0000059c
URL: gm****om, IP: **.133.40.**:128, SOCKET = 0x00000598
URL: ip****om, IP: **.133.40.**:128, SOCKET = 0x000005c8
URL: mm****om, IP: **.133.40.**:128, SOCKET = 0x00000594
URL: gm****om, IP: **.133.40.**:128, SOCKET = 0x000005a0
URL: tc****om, IP: **.133.40.**:128, SOCKET = 0x00000590
Behavior description: 按名称获取主机地址
details: GetAddrInfoW: mm****om
GetAddrInfoW: gm****om
GetAddrInfoW: ip****om
GetAddrInfoW: tc****om

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\Software\AlimamaShortcuts\MID\mid
\REGISTRY\USER\S-*\Software\AlimamaShortcuts\MID\midex
\REGISTRY\USER\S-*\Software\AlimamaShortcuts\version_404
\REGISTRY\MACHINE\SOFTWARE\Classes\alimama\
\REGISTRY\MACHINE\SOFTWARE\Classes\alimama\shell\open\command\
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\alimama\WarnOnOpen
Behavior description: 修改注册表_URL协议关联
details: \REGISTRY\MACHINE\SOFTWARE\Classes\alimama\URL Protocol

Other behavior

Behavior description: 检测自身是否被调试
details: N/A
Behavior description: 创建互斥体
details: CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
Global\C:/Documents and Settings/Administrator/Local Settings/Temp/EB93A6/debug.log
Behavior description: 创建事件对象
details: EventName = Global\userenv: User Profile setup event
EventName = Global\crypt32LogoffEvent
EventName = DINPUTWINMM
Behavior description: 打开互斥体
details: ShimCacheMutex
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [Progman,Program Manager]
NtUserFindWindowEx: [Class,Window] = [Chrome_MessageWindow,wow.alimama.marketing_service]
Behavior description: 获取TickCount值
details: TickCount = 390218, SleepMilliseconds = 60000.
TickCount = 390234, SleepMilliseconds = 60000.
TickCount = 390296, SleepMilliseconds = 60000.
TickCount = 390312, SleepMilliseconds = 60000.
TickCount = 390328, SleepMilliseconds = 60000.
TickCount = 390343, SleepMilliseconds = 60000.
TickCount = 390421, SleepMilliseconds = 60000.
TickCount = 390515, SleepMilliseconds = 60000.
TickCount = 390531, SleepMilliseconds = 60000.
TickCount = 390609, SleepMilliseconds = 60000.
TickCount = 390640, SleepMilliseconds = 60000.
TickCount = 390656, SleepMilliseconds = 60000.
TickCount = 390671, SleepMilliseconds = 60000.
TickCount = 390843, SleepMilliseconds = 60000.
TickCount = 391062, SleepMilliseconds = 60000.
Behavior description: 打开事件
details: Global\crypt32LogoffEvent
HookSwitchHookEnabledEvent
MSFT.VSA.COM.DISABLE.112
MSFT.VSA.IEC.STATUS.6c736db0
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Behavior description: 直接操作物理设备
details: \??\PhysicalDrive0
Behavior description: 可执行文件签名信息
details: C:\Documents and Settings\Administrator\Application Data\dandelion\Dandelion.exe(签名验证: 未通过)
Behavior description: 调用Sleep函数
details: [1]: MilliSeconds = 60000.
[2]: MilliSeconds = 60000.
[3]: MilliSeconds = 60000.
[4]: MilliSeconds = 60000.
[5]: MilliSeconds = 60000.
Behavior description: 可执行文件MD5
details: C:\Documents and Settings\Administrator\Application Data\dandelion\Dandelion.exe ---> 767c612eb0fd9ce4d8a5e62ac217d5ac
Behavior description: 直接获取CPU时钟
details: N/A