VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:50
Behavior list
Basic Information
MD5:76ae3b9708559ba3572244e43cbcc5f7
file type:EXE
Production company:
version:
Shell or compiler information:PACKER:UPX 0.89.6 - 1.02 / 1.05 - 1.24 -> Markus & Laszlo [Overlay]
Subfile information:upx_c_0bc971fcdumpFile / 1379160a608825e1502d53b1f17e9dda / EXE
Key behavior
Behavior description:获取硬件属性检测虚拟机
details:检测Vmware: 调用WMI接口获取硬件信息
Behavior description:常规加载驱动
details:\??\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temp\yxbs.sys
Behavior description:获取TickCount值
details:TickCount = 280671, SleepMilliseconds = 60000.
TickCount = 280687, SleepMilliseconds = 60000.
TickCount = 280703, SleepMilliseconds = 60000.
TickCount = 280718, SleepMilliseconds = 60000.
TickCount = 280734, SleepMilliseconds = 60000.
TickCount = 280750, SleepMilliseconds = 60000.
TickCount = 280812, SleepMilliseconds = 60000.
TickCount = 280828, SleepMilliseconds = 60000.
TickCount = 280937, SleepMilliseconds = 60000.
TickCount = 280953, SleepMilliseconds = 60000.
TickCount = 280968, SleepMilliseconds = 60000.
TickCount = 221984, SleepMilliseconds = 1000.
TickCount = 281093, SleepMilliseconds = 60000.
TickCount = 281109, SleepMilliseconds = 60000.
TickCount = 281125, SleepMilliseconds = 60000.
Behavior description:杀掉进程
details:C:\WINDOWS\system32\svchost.exe
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\IETldCache
Behavior description:创建系统服务
details:[服务创建成功]: yxbs, C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temp\yxbs.sys
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = , CmdLine = C:\Windows\Fonts\Shenzhen.exe
Behavior description:创建进程
details:[0x00000b10]ImagePath = C:\Program Files\Tencent\QQ\Bin\Timwp.exe, CmdLine = "C:\Program Files\Tencent\QQ\Bin\Timwp.exe" "tencent://groupwpa/?subcmd=all&param=7B2267726F757055696E223A3730373730363438397D&fuin="
[0x00000b78]ImagePath = C:\WINDOWS\system32\svchost.exe, CmdLine = svchost.exe
Behavior description:创建新文件进程
details:[0x00000a9c]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temp\死亡单板Win10加速.exe, CmdLine = "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temp\死亡单板Win10加速.exe"
[0x00000aa4]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temp\321.exe, CmdLine = "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temp\321.exe"
[0x00000ae8]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temp\707706489.exe, CmdLine = "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temp\707706489.exe"
[0x00000af0]ImagePath = C:\WINDOWS\Fonts\Shenzhen.exe, CmdLine = C:\Windows\Fonts\Shenzhen.exe
[0x00000af8]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temp\不带签名的.exe, CmdLine = "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temp\不带签名的.exe"
Behavior description:创建本地线程
details:TargetProcess: 707706489.exe, InheritedFromPID = 2724, ProcessID = 2792, ThreadID = 2816, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: 不带签名的.exe, InheritedFromPID = 2724, ProcessID = 2808, ThreadID = 2820, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: Shenzhen.exe, InheritedFromPID = 2716, ProcessID = 2800, ThreadID = 2824, StartAddress = 77E56C7D, Parameter = 001B0DF8
TargetProcess: Shenzhen.exe, InheritedFromPID = 2716, ProcessID = 2800, ThreadID = 2828, StartAddress = 769AE43B, Parameter = 001B3748
TargetProcess: 不带签名的.exe, InheritedFromPID = 2724, ProcessID = 2808, ThreadID = 2840, StartAddress = 0046B00D, Parameter = 00AB4E88
TargetProcess: Timwp.exe, InheritedFromPID = 2792, ProcessID = 2832, ThreadID = 2888, StartAddress = 77E56C7D, Parameter = 001B16D8
TargetProcess: Timwp.exe, InheritedFromPID = 2792, ProcessID = 2832, ThreadID = 2892, StartAddress = 769AE43B, Parameter = 001B4188
TargetProcess: Timwp.exe, InheritedFromPID = 2792, ProcessID = 2832, ThreadID = 2896, StartAddress = 77E56C7D, Parameter = 001B4958
TargetProcess: 不带签名的.exe, InheritedFromPID = 2724, ProcessID = 2808, ThreadID = 2904, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: 不带签名的.exe, InheritedFromPID = 2724, ProcessID = 2808, ThreadID = 2908, StartAddress = 7C930230, Parameter = 00000000
Behavior description:杀掉进程
details:C:\WINDOWS\system32\svchost.exe
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\死亡单板Win10加速.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\321.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\707706489.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\不带签名的.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\dword.dll
C:\WINDOWS\Fonts\Shenzhen.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\yxbs.sys
C:\Program Files\Common Files\System\iminute.ini
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\203889906[1].txt
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\203889906[1].exe
C:\Documents and Settings\Administrator\Local Settings\Temp\MZ
Behavior description:创建可执行文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\死亡单板Win10加速.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\321.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\707706489.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\不带签名的.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\dword.dll
C:\WINDOWS\Fonts\Shenzhen.exe
Behavior description:覆盖已有文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\QDW4H%F6_VD5}08_GARX46J.xml
Behavior description:查找文件
details:FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\My Documents
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\Documents
FileName = C:\Documents and Settings\Administrator\桌面
FileName = C:\Documents and Settings\All Users\桌面
FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temp\321.exe
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temp\dword.dll
FileName = C:\Windows
Behavior description:删除文件
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\203889906[1].txt
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\IETldCache
Behavior description:修改文件内容
details:C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\死亡单板Win10加速.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\321.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\707706489.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\不带签名的.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\dword.dll ---> Offset = 0
C:\WINDOWS\Fonts\Shenzhen.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\yxbs.sys ---> Offset = 0
C:\Program Files\Common Files\System\iminute.ini ---> Offset = 0
C:\Program Files\Common Files\System\iminute.ini ---> Offset = 19
C:\Documents and Settings\Administrator\Local Settings\Temp\QDW4H%F6_VD5}08_GARX46J.xml ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\MZ ---> Offset = 0
Network behavior
Behavior description:联网打开网址
details:InternetOpenUrlA: http://5y****cn/config/203889906.exe, hInternet = 0x00cc0008, Flags = 0x80000002
Behavior description:打开指定IE网页
details:tencent://groupwpa/?subcmd=all&param=7B2267726F757055696E223A3730373730363438397D&fuin=
Behavior description:连接指定站点
details:InternetConnectA: ServerName = 5y****cn, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = 5y****cn, PORT = 80, UserName = , Password = , hSession = 0x00cc0008, hConnect = 0x00cc000c, Flags = 0x80000002
Behavior description:打开HTTP连接
details:InternetOpenA: UserAgent: HTTPREAD, hSession = 0x00cc0008
Behavior description:建立到一个指定的套接字连接
details:URL: 5y****cn, IP: **.133.40.**:80, SOCKET = 0x00000284
URL: 5y****cn, IP: **.133.40.**:80, SOCKET = 0x000001e8
Behavior description:读取网络文件
details:hFile = 0x00cc000c, BytesToRead =1024, BytesRead = 1024.
hFile = 0x00cc0010, BytesToRead =2048, BytesRead = 2048.
Behavior description:发送HTTP包
details:GET /config/203889906.txt HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727) CometHTTP Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */* Referer: http://5yyw.cn/config/203889906.txt Accept-Language: zh-cn Host: 5y****cn
GET /config/203889906.exe HTTP/1.1 User-Agent: HTTPREAD Host: 5y****cn Cache-Control: no-cache
Behavior description:打开HTTP请求
details:HttpOpenRequestA: 5y****cn:80/config/203889906.txt, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x0000c400
HttpOpenRequestA: 5y****cn:80/config/203889906.exe, hConnect = 0x00cc000c, hRequest = 0x00cc0010, Verb: GET, Referer: , Flags = 0x80000002
Behavior description:按名称获取主机地址
details:GetAddrInfoW: 5y****cn
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temp\死亡单板Win10加速.exe
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temp\321.exe
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temp\707706489.exe
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temp\不带签名的.exe
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\Program Files\Tencent\QQ\Bin\Timwp.exe
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Behavior description:删除注册表键
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW\
Behavior description:删除注册表键值
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyOverride
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
\REGISTRY\MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW\DWFileTreeRoot
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
MSCTF.Shared.MUTEX.IOH
RasPbFile
Local\c:!documents and settings!administrator!ietldcache!
MSCTF.Shared.MUTEX.AKK
MSCTF.Shared.MUTEX.EBL
Behavior description:获取硬件属性检测虚拟机
details:检测Vmware: 调用WMI接口获取硬件信息
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = Global\userenv: User Profile setup event
EventName = MSCTF.SendReceive.Event.AKK.IC
EventName = MSCTF.SendReceiveConection.Event.AKK.IC
EventName = MSCTF.SendReceive.Event.EBL.IC
EventName = MSCTF.SendReceiveConection.Event.EBL.IC
Behavior description:常规加载驱动
details:\??\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temp\yxbs.sys
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [OleMainThreadWndClass,]
Behavior description:窗口信息
details:Pid = 2716, Hwnd=0x1034e, Text = 确定, ClassName = Button.
Pid = 2716, Hwnd=0x10350, Text = 驱动加载失败,杀毒软件拦截请点击允许,驱动文件报毒请添加信任, ClassName = Static.
Pid = 2716, Hwnd=0x3034a, Text = 提示, ClassName = #32770.
Pid = 2808, Hwnd=0x10378, Text = 确定, ClassName = Button.
Pid = 2808, Hwnd=0x1037c, Text = 运行时出错! 错误代码:1 错误信息:数组成员引用下标超出定义范围 , ClassName = Static.
Pid = 2808, Hwnd=0x10376, Text = 错误, ClassName = #32770.
Pid = 2716, Hwnd=0x10348, Text = 当前倍数:原速, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2716, Hwnd=0x10346, Text = 精确变速:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2716, Hwnd=0x10344, Text = 恢复原速, ClassName = Button.
Pid = 2716, Hwnd=0x10342, Text = 精确变速, ClassName = Button.
Pid = 2716, Hwnd=0x10340, Text = 1.00, ClassName = Edit.
Pid = 2716, Hwnd=0x40336, Text = 死亡变速Win10单板, ClassName = WTWindow.
Behavior description:获取TickCount值
details:TickCount = 280671, SleepMilliseconds = 60000.
TickCount = 280687, SleepMilliseconds = 60000.
TickCount = 280703, SleepMilliseconds = 60000.
TickCount = 280718, SleepMilliseconds = 60000.
TickCount = 280734, SleepMilliseconds = 60000.
TickCount = 280750, SleepMilliseconds = 60000.
TickCount = 280812, SleepMilliseconds = 60000.
TickCount = 280828, SleepMilliseconds = 60000.
TickCount = 280937, SleepMilliseconds = 60000.
TickCount = 280953, SleepMilliseconds = 60000.
TickCount = 280968, SleepMilliseconds = 60000.
TickCount = 221984, SleepMilliseconds = 1000.
TickCount = 281093, SleepMilliseconds = 60000.
TickCount = 281109, SleepMilliseconds = 60000.
TickCount = 281125, SleepMilliseconds = 60000.
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
_fCanRegisterWithShellService
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Global\SvcctrlStartEvent_A3752DX
CTF.ThreadMIConnectionEvent.000007E8.00000000.0000000F
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.0000000F
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
MSFT.VSA.COM.DISABLE.2800
MSFT.VSA.IEC.STATUS.6c736db0
MSFT.VSA.COM.DISABLE.2832
\INSTALLATION_SECURITY_HOLD
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000011
Behavior description:可执行文件签名信息
details:C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\死亡单板Win10加速.exe(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\321.exe(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\707706489.exe(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\不带签名的.exe(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\dword.dll(签名验证: 未通过)
C:\WINDOWS\Fonts\Shenzhen.exe(签名验证: 未通过)
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 250.
[2]: MilliSeconds = 1000.
[1]: MilliSeconds = 60000.
[2]: MilliSeconds = 60000.
[3]: MilliSeconds = 60000.
[4]: MilliSeconds = 60000.
[5]: MilliSeconds = 60000.
[6]: MilliSeconds = 60000.
[7]: MilliSeconds = 60000.
[8]: MilliSeconds = 60000.
[9]: MilliSeconds = 60000.
[10]: MilliSeconds = 60000.
Behavior description:可执行文件MD5
details:C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\死亡单板Win10加速.exe ---> c9fc6385e8f5896165d4de98b8e4df72
C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\321.exe ---> 50f47dcc3872e909e8804ef855f8397d
C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\707706489.exe ---> f181facf823f5856ecddd035a5c745a1
C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\不带签名的.exe ---> 75c66150c9f1ae8b58e622ca06d972a3
C:\Documents and Settings\Administrator\Local Settings\Temp\Temp\dword.dll ---> d41db1d52a2be9e034ef7b20f4bf90a0
C:\WINDOWS\Fonts\Shenzhen.exe ---> 6d288ba71f3e0d24066dd1de56207ce8
Behavior description:打开互斥体
details:Local\!IETld!Mutex
ShimCacheMutex
Local\_!MSFTHISTORY!_
Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Local\c:!documents and settings!administrator!cookies!
Local\c:!documents and settings!administrator!local settings!history!history.ie5!
Local\WininetStartupMutex
Local\WininetConnectionMutex
Local\WininetProxyRegistryMutex
RasPbFile
Local\c:!documents and settings!administrator!ietldcache!
Behavior description:创建系统服务
details:[服务创建成功]: yxbs, C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temp\yxbs.sys
Behavior description:加载新释放的文件
details:Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temp\dword.dll.
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号