VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:81235cb7e48405a41befd9021094f3c4
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies

Process behavior

Behavior description: 创建进程
details: [0x00000b4c]ImagePath = C:\WINDOWS\system32\rundll32.exe, CmdLine = "C:\WINDOWS\system32\rundll32.exe" K0.pdf,bitcoin
[0x00000bb0]ImagePath = C:\WINDOWS\system32\rundll32.exe, CmdLine = "C:\WINDOWS\system32\rundll32.exe" S1.pdf,bitcoin
Behavior description: 创建本地线程
details: TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2760, ThreadID = 2840, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: rundll32.exe, InheritedFromPID = 2760, ProcessID = 2892, ThreadID = 2924, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: rundll32.exe, InheritedFromPID = 2760, ProcessID = 2892, ThreadID = 2976, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: rundll32.exe, InheritedFromPID = 2760, ProcessID = 2892, ThreadID = 2980, StartAddress = 7C930230, Parameter = 00000000

File behavior

Behavior description: 创建文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\__tmp_rar_sfx_access_check_217359
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\K0.pdf
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\S1.pdf
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\Extensions[1].zip
C:\Documents and Settings\Administrator\Local Settings\Temp\Extensions.zip
Behavior description: 创建可执行文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\K0.pdf
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\S1.pdf
C:\Documents and Settings\Administrator\Local Settings\Temp\Extensions.zip
Behavior description: 查找文件
details: FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\996E.z01
FileName = \\?\C:\Documents and Settings\Administrator\Local Settings\%temp%\996E.z01
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
FileName = K0.pdf
FileName = \\?\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\K0.pdf
FileName = S1.pdf
FileName = \\?\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\S1.pdf
FileName = C:\WINDOWS
FileName = C:\WINDOWS\system32
FileName = C:\WINDOWS\system32\rundll32.exe
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\K0.zh-CN
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\K0.zh-Hans
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\K0.zh
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\K0.CHS
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\K0.CH
Behavior description: 删除文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\__tmp_rar_sfx_access_check_217359
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\Extensions[1].zip
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description: 修改文件内容
details: C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\K0.pdf ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\K0.pdf ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\K0.pdf ---> Offset = 131072
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\K0.pdf ---> Offset = 4096
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\S1.pdf ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\S1.pdf ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\S1.pdf ---> Offset = 131072
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\S1.pdf ---> Offset = 196608
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\S1.pdf ---> Offset = 262144
C:\Documents and Settings\Administrator\Local Settings\Temp\Extensions.zip ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\Extensions.zip ---> Offset = 1024
C:\Documents and Settings\Administrator\Local Settings\Temp\Extensions.zip ---> Offset = 2048
C:\Documents and Settings\Administrator\Local Settings\Temp\Extensions.zip ---> Offset = 3072
C:\Documents and Settings\Administrator\Local Settings\Temp\Extensions.zip ---> Offset = 4096

Network behavior

Behavior description: 联网打开网址
details: InternetOpenUrlA: http://**.211.190.**/oldschool/Extensions.zip, hInternet = 0x00cc0004, Flags = 0x00000000
Behavior description: 下载文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\Extensions.zip
Behavior description: 连接指定站点
details: InternetConnectA: ServerName = **.211.190.**, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
Behavior description: 打开HTTP连接
details: InternetOpenA: UserAgent: Extensions.zip, hSession = 0x00cc0004
Behavior description: 建立到一个指定的套接字连接
details: IP: **.211.190.**:80, SOCKET = 0x00000288
Behavior description: 读取网络文件
details: hFile = 0x00cc000c, BytesToRead =1024, BytesRead = 1024.
Behavior description: 发送HTTP包
details: GET /oldschool/Extensions.zip HTTP/1.1 User-Agent: Extensions.zip Host: **.211.190.**
Behavior description: 打开HTTP请求
details: HttpOpenRequestA: **.211.190.**:80/oldschool/extensions.zip, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00000000

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\USER\S-*\Software\SBSx\SBSx
\REGISTRY\USER\S-*\Software\SBSx\SBSl
Behavior description: 删除注册表键值
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL

Other behavior

Behavior description: 创建互斥体
details: CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
_SHuassist.mtx
RasPbFile
MSCTF.Shared.MUTEX.ELL
Behavior description: 创建事件对象
details: EventName = Global\crypt32LogoffEvent
EventName = MSCTF.SendReceiveConection.Event.ELL.IC
EventName = MSCTF.SendReceive.Event.ELL.IC
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [EDIT,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description: 调整进程token权限
details: SE_LOAD_DRIVER_PRIVILEGE
Behavior description: 打开事件
details: HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007E8.00000000.0000000F
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.0000000F
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
_fCanRegisterWithShellService
Global\crypt32LogoffEvent
Global\SvcctrlStartEvent_A3752DX
\INSTALLATION_SECURITY_HOLD
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceive.Event.IOH.IO
MSCTF.SendReceiveConection.Event.IOH.IO
Behavior description: 可执行文件签名信息
details: C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\K0.pdf(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\S1.pdf(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\Extensions.zip(签名验证: 未通过)
Behavior description: 隐藏指定窗口
details: [Window,Class] = [,ComboLBox]
[Window,Class] = [,Auto-Suggest Dropdown]
[Window,Class] = [Pro&curar...,Button]
[Window,Class] = [C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0,ComboBox]
Behavior description: 可执行文件MD5
details: C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\K0.pdf ---> 0afb6241c0879b71ac6d2b388732acc8
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\S1.pdf ---> 0d8e6670dc0c2f0af0c5a8f3726c475e
C:\Documents and Settings\Administrator\Local Settings\Temp\Extensions.zip ---> fe1d0ee5901dd167ee9b28eece31786c
Behavior description: 打开互斥体
details: ShimCacheMutex
Local\!IETld!Mutex
Local\_!MSFTHISTORY!_
Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Local\c:!documents and settings!administrator!cookies!
Local\c:!documents and settings!administrator!local settings!history!history.ie5!
Local\WininetStartupMutex
Local\WininetConnectionMutex
Local\WininetProxyRegistryMutex
RasPbFile
Behavior description: 加载新释放的文件
details: Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\K0.pdf.
Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\S1.pdf.