VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:76
Behavior list
Basic Information
MD5:9a13c6880b93f8f640d2992c61893504
file type:Rar
Production company:
version:
Shell or compiler information:COMPILER:Microsoft Visual Studio .NET 2005 -- 2008 -> Microsoft Corporation *
Subfile information:Config.datdumpFile / 6bd964dc74c40ffcab184fdaf0100f2d / Unknown
Config.dat / 6bd964dc74c40ffcab184fdaf0100f2d / Unknown
io.datdumpFile / 710bde297471f60869613501d4d20c95 / Unknown
io.dat / 710bde297471f60869613501d4d20c95 / Unknown
baidu.comdumpFile / 13ce2e69fbbe6f06602b435d21c5d70a / EXE
baidu.com / 13ce2e69fbbe6f06602b435d21c5d70a / EXE
图片.lnkdumpFile / ca155c8c9898ceb603b12abe4b02c36e / Unknown
图片.lnk / ca155c8c9898ceb603b12abe4b02c36e / Unknown
datdumpFile / d41d8cd98f00b204e9800998ecf8427e / Unknown
BB88168dumpFile / d41d8cd98f00b204e9800998ecf8427e / Unknown
Key behavior
Behavior description:获取窗口截图信息
details:Foreground window Info: HWND = 0x00000000, DC = 0x8d01044c.
Foreground window Info: HWND = 0x00000000, DC = 0xe2010485.
Foreground window Info: HWND = 0x00000000, DC = 0x610102d5.
Foreground window Info: HWND = 0x00000000, DC = 0x3701057d.
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = , CmdLine = C:\WINDOWS\limit\dllhost.exe
Behavior description:创建进程
details:ImagePath = C:\WINDOWS\system32\rundll32.exe, CmdLine = "rundll32.exe" C:\WINDOWS\system32\shimgvw.dll,ImageView_Fullscreen C:\Documents and Settings\Administrator\Application Data\变民吸血鬼109 攻,不错的.jpg
Behavior description:创建本地线程
details:TargetProcess: baidu.exe, InheritedFromPID = 1944, ProcessID = 1204, ThreadID = 1456, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: baidu.exe, InheritedFromPID = 1944, ProcessID = 1204, ThreadID = 1172, StartAddress = 1000A170, Parameter = 00000000
TargetProcess: rundll32.exe, InheritedFromPID = 1204, ProcessID = 1136, ThreadID = 1004, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: rundll32.exe, InheritedFromPID = 1204, ProcessID = 1136, ThreadID = 1872, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: rundll32.exe, InheritedFromPID = 1204, ProcessID = 1136, ThreadID = 744, StartAddress = 7C930230, Parameter = 00000000
Behavior description:创建新文件进程
details:ImagePath = C:\Program Files\Tencent\QQGAME\QQGame.exe, CmdLine = "C:\Program Files\Tencent\QQGAME\QQGame.exe"
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:创建文件
details:C:\Program Files\Tencent\QQGAME\QQGame.exe
C:\Documents and Settings\Administrator\Application Data\变民吸血鬼109 攻,不错的.jpg
C:\WINDOWS\limit\config.dat
Behavior description:创建可执行文件
details:C:\Program Files\Tencent\QQGAME\QQGame.exe
Behavior description:修改文件内容
details:C:\Program Files\Tencent\QQGAME\QQGame.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Application Data\变民吸血鬼109 攻,不错的.jpg ---> Offset = 0
C:\WINDOWS\limit\config.dat ---> Offset = 0
C:\WINDOWS\limit\config.dat ---> Offset = 65536
C:\WINDOWS\limit\config.dat ---> Offset = 131072
C:\WINDOWS\limit\config.dat ---> Offset = 196608
C:\WINDOWS\limit\config.dat ---> Offset = 262144
Behavior description:查找文件
details:FileName = C:\Program Files\Tencent
FileName = C:\Program Files\Tencent\QQGAME
FileName = C:\Program Files\Tencent\QQGAME\QQGame.exe
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\My Documents
FileName = C:\WINDOWS
FileName = C:\WINDOWS\WinSxS
FileName = C:\WINDOWS\WinSxS\x86_Microsoft.VC90.CRT_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_6f74963e\MSVCR90.dll
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\Documents
FileName = C:\Documents and Settings\Administrator\桌面
FileName = C:\Documents and Settings\All Users\桌面
FileName = C:\WINDOWS\system32
FileName = C:\WINDOWS\system32\rundll32.exe
Behavior description:复制文件
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\BB88168\dat\config.dat ---> C:\WINDOWS\limit\config.dat
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\BB88168\dat\baidu.com ---> C:\WINDOWS\limit\dllhost.exe
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.MPH
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = MSCTF.SendReceive.Event.MPH.IC
EventName = MSCTF.SendReceiveConection.Event.MPH.IC
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [ConsoleWindowClass,]
NtUserFindWindowEx: [Class,Window] = [ShImgVw:CPreviewWnd,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:打开照片查看器
details:C:\Documents and Settings\Administrator\Application Data\变民吸血鬼109 攻,不错的.jpg
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
_fCanRegisterWithShellService
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000055
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000055
MSCTF.SendReceiveConection.Event.ELH.IC
MSCTF.SendReceive.Event.ELH.IC
Behavior description:获取窗口截图信息
details:Foreground window Info: HWND = 0x00000000, DC = 0x8d01044c.
Foreground window Info: HWND = 0x00000000, DC = 0xe2010485.
Foreground window Info: HWND = 0x00000000, DC = 0x610102d5.
Foreground window Info: HWND = 0x00000000, DC = 0x3701057d.
Behavior description:可执行文件签名信息
details:C:\Program Files\Tencent\QQGAME\QQGame.exe(签名验证: 通过)
Behavior description:隐藏指定窗口
details:[Window,Class] = [C:\%temp%\****.exe,ConsoleWindowClass]
Behavior description:可执行文件MD5
details:C:\Program Files\Tencent\QQGAME\QQGame.exe ---> d6dd00617e737a5e604bc70b1c344eac
Behavior description:打开互斥体
details:ShimCacheMutex
DBWinMutex
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号