VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:97d088e20ec0ac79f438a5962cdf55b8
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 获取TickCount值
details: TickCount = 5452484, SleepMilliseconds = 20000.
TickCount = 5452500, SleepMilliseconds = 20000.
TickCount = 5460781, SleepMilliseconds = 20000.
TickCount = 5460828, SleepMilliseconds = 20000.
TickCount = 5460859, SleepMilliseconds = 20000.
TickCount = 5477015, SleepMilliseconds = 20000.
TickCount = 5477031, SleepMilliseconds = 20000.
Behavior description: 修改注册表_UAC关键设置
details: \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\EnableLUA
Behavior description: 修改注册表_启动项
details: \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pdnrwem.exe

Process behavior

Behavior description: 隐藏窗口创建进程
details: ImagePath = , CmdLine = C:\WINDOWS\WindowsUpdate\pdnrwem.exe
Behavior description: 创建新文件进程
details: [0x000003c8]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\C.exe, CmdLine = "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\C.exe"
[0x000005c0]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\SYSTEM.exe, CmdLine = "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\SYSTEM.exe"
[0x00000860]ImagePath = C:\WINDOWS\WindowsUpdate\pdnrwem.exe, CmdLine = C:\WINDOWS\WindowsUpdate\pdnrwem.exe
Behavior description: 创建本地线程
details: TargetProcess: C.exe, InheritedFromPID = 1608, ProcessID = 968, ThreadID = 1004, StartAddress = 004023C0, Parameter = 0012FCC4
TargetProcess: pdnrwem.exe, InheritedFromPID = 1472, ProcessID = 2144, ThreadID = 2184, StartAddress = 004040C0, Parameter = 00000000

File behavior

Behavior description: 创建文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\C.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\SYSTEM.exe
C:\WINDOWS\WindowsUpdate\pdnrwem.exe
C:\WINDOWS\WindowsUpdate\.temp.fortest
C:\WINDOWS\C.INI
Behavior description: 创建可执行文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\C.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\SYSTEM.exe
C:\WINDOWS\WindowsUpdate\pdnrwem.exe
Behavior description: 复制文件
details: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\SYSTEM.exe ---> C:\WINDOWS\WindowsUpdate\pdnrwem.exe
Behavior description: 查找文件
details: FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\My Documents
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\Documents
FileName = C:\Documents and Settings\Administrator\桌面
FileName = C:\Documents and Settings\All Users\桌面
FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\C.exe
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\SYSTEM.exe
FileName = C:\WINDOWS
FileName = C:\WINDOWS\WindowsUpdate\pdnrwem.exe
Behavior description: 修改文件内容
details: C:\Documents and Settings\Administrator\Local Settings\Temp\C.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\C.exe ---> Offset = 16384
C:\Documents and Settings\Administrator\Local Settings\Temp\C.exe ---> Offset = 32768
C:\Documents and Settings\Administrator\Local Settings\Temp\C.exe ---> Offset = 49152
C:\Documents and Settings\Administrator\Local Settings\Temp\C.exe ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Temp\SYSTEM.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\SYSTEM.exe ---> Offset = 16384
C:\Documents and Settings\Administrator\Local Settings\Temp\SYSTEM.exe ---> Offset = 32768
C:\Documents and Settings\Administrator\Local Settings\Temp\SYSTEM.exe ---> Offset = 49152
C:\Documents and Settings\Administrator\Local Settings\Temp\SYSTEM.exe ---> Offset = 65536
C:\WINDOWS\WindowsUpdate\pdnrwem.exe ---> Offset = 65536
C:\WINDOWS\WindowsUpdate\pdnrwem.exe ---> Offset = 131072
C:\WINDOWS\WindowsUpdate\pdnrwem.exe ---> Offset = 0
C:\WINDOWS\WindowsUpdate\pdnrwem.exe ---> Offset = 4096
C:\WINDOWS\WindowsUpdate\pdnrwem.exe ---> Offset = 148992
Behavior description: 修改新生成的可执行文件
details: C:\WINDOWS\WindowsUpdate\pdnrwem.exe

Network behavior

Behavior description: 建立到一个指定的套接字连接
details: URL: se****cc, IP: **.133.40.**:52, SOCKET = 0x000000cc
Behavior description: 按名称获取主机地址
details: gethostbyname: se****cc

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\C.exe
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\SYSTEM.exe
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\PromptOnSecureDesktop
Behavior description: 修改注册表_安全中心相关属性
details: \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\UACDisableNotify
Behavior description: 修改注册表_UAC关键设置
details: \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\EnableLUA
Behavior description: 修改注册表_启动项
details: \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pdnrwem.exe

Other behavior

Behavior description: 创建互斥体
details: CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
MSCTF.Shared.MUTEX.ELH
seo.kfj.cc
FuckShieldRefreshMutex
MSCTF.Shared.MUTEX.EPD
Behavior description: 创建事件对象
details: EventName = MSCTF.SendReceive.Event.EPD.IC
EventName = MSCTF.SendReceiveConection.Event.EPD.IC
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description: 打开事件
details: HookSwitchHookEnabledEvent
_fCanRegisterWithShellService
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000052
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000052
MSCTF.SendReceiveConection.Event.ELH.IC
MSCTF.SendReceive.Event.ELH.IC
Behavior description: 获取TickCount值
details: TickCount = 5452484, SleepMilliseconds = 20000.
TickCount = 5452500, SleepMilliseconds = 20000.
TickCount = 5460781, SleepMilliseconds = 20000.
TickCount = 5460828, SleepMilliseconds = 20000.
TickCount = 5460859, SleepMilliseconds = 20000.
TickCount = 5477015, SleepMilliseconds = 20000.
TickCount = 5477031, SleepMilliseconds = 20000.
Behavior description: 调整进程token权限
details: SE_LOAD_DRIVER_PRIVILEGE
SE_BACKUP_PRIVILEGE
Behavior description: 窗口信息
details: Pid = 968, Hwnd=0x1b02b6, Text = TCP.ABNORMAL, ClassName = Button(RadioButton).
Pid = 968, Hwnd=0xf033c, Text = TCP.GENERAL, ClassName = Button(RadioButton).
Pid = 968, Hwnd=0x60380, Text = TCP.Abnormal, ClassName = Button(RadioButton).
Pid = 968, Hwnd=0x140306, Text = TCP.LINKDATAT, ClassName = Button(RadioButton).
Pid = 968, Hwnd=0xa03b0, Text = SYN, ClassName = Button(RadioButton).
Pid = 968, Hwnd=0x303dc, Text = ICMP, ClassName = Button(RadioButton).
Pid = 968, Hwnd=0x2102bc, Text = CC1.Flood_GET, ClassName = Button(RadioButton).
Pid = 968, Hwnd=0x16032e, Text = CC2.Flood_GET, ClassName = Button(RadioButton).
Pid = 968, Hwnd=0x100320, Text = CC1.Flood_POST, ClassName = Button(RadioButton).
Pid = 968, Hwnd=0xf034a, Text = CC2.Flood_POST, ClassName = Button(RadioButton).
Pid = 968, Hwnd=0x603c6, Text = CC3.Flood_GZIP, ClassName = Button(RadioButton).
Pid = 968, Hwnd=0xc038a, Text = UDP, ClassName = Button(RadioButton).
Pid = 968, Hwnd=0x15030c, Text = DNS.RETRUND, ClassName = Button(RadioButton).
Pid = 968, Hwnd=0x403ca, Text = DNS.CRAWLER, ClassName = Button(RadioButton).
Pid = 968, Hwnd=0x6037e, Text = 测试方案, ClassName = Button(GroupBox).
Behavior description: 修改后的可执行文件签名信息
details: C:\WINDOWS\WindowsUpdate\pdnrwem.exe(签名验证: 未通过)
Behavior description: 可执行文件签名信息
details: C:\Documents and Settings\Administrator\Local Settings\Temp\C.exe(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\SYSTEM.exe(签名验证: 未通过)
C:\WINDOWS\WindowsUpdate\pdnrwem.exe(签名验证: 未通过)
Behavior description: 调用Sleep函数
details: [1]: MilliSeconds = 20000.
[2]: MilliSeconds = 20000.
[3]: MilliSeconds = 20000.
[4]: MilliSeconds = 20000.
[5]: MilliSeconds = 20000.
[6]: MilliSeconds = 20000.
[7]: MilliSeconds = 20000.
[8]: MilliSeconds = 20000.
[9]: MilliSeconds = 20000.
[10]: MilliSeconds = 20000.
Behavior description: 可执行文件MD5
details: C:\Documents and Settings\Administrator\Local Settings\Temp\C.exe ---> 410f5978f1d6e20e1a51af55189bedb7
C:\Documents and Settings\Administrator\Local Settings\Temp\SYSTEM.exe ---> 32f2dd61eda199e075ad5a9db991feba
C:\WINDOWS\WindowsUpdate\pdnrwem.exe ---> 32f2dd61eda199e075ad5a9db991feba
Behavior description: 打开互斥体
details: Local\!IETld!Mutex
ShimCacheMutex
Behavior description: 修改后的可执行文件MD5
details: C:\WINDOWS\WindowsUpdate\pdnrwem.exe ---> 文件过大!