VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:9e4990c6980312d27c9a7d078896fcf5
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 检测自身是否被调试
details: N/A
Behavior description: 获取TickCount值
details: TickCount = 490457, SleepMilliseconds = 20.
TickCount = 490473, SleepMilliseconds = 20.
TickCount = 490504, SleepMilliseconds = 20.
TickCount = 494844, SleepMilliseconds = 1.
TickCount = 495016, SleepMilliseconds = 1.
TickCount = 495094, SleepMilliseconds = 1.
TickCount = 495829, SleepMilliseconds = 1.
Behavior description: 修改注册表_系统防火墙可信进程列表
details: \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Documents and Settings\Administrator\Local Settings\Temp\Chrome.exe
Behavior description: 修改注册表_启动项
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Run\e79d569ba77562f0d4316e586835f0a2
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e79d569ba77562f0d4316e586835f0a2

Process behavior

Behavior description: 隐藏窗口创建进程
details: ImagePath = , CmdLine = netsh firewall add allowedprogram "C:\Documents and Settings\Administrator\Local Settings\Temp\Chrome.exe" "Chrome.exe" ENABLE
Behavior description: 创建进程
details: ImagePath = C:\WINDOWS\system32\wscript.exe, CmdLine = "C:\WINDOWS\System32\WScript.exe" "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Google.wsf"
ImagePath = C:\WINDOWS\system32\rundll32.exe, CmdLine = "rundll32.exe" C:\WINDOWS\system32\shimgvw.dll,ImageView_Fullscreen C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\12196084_134275546931313_5888537433197025821_n.jpg
ImagePath = C:\WINDOWS\system32\netsh.exe, CmdLine = netsh firewall add allowedprogram "C:\Documents and Settings\Administrator\Local Settings\Temp\Chrome.exe" "Chrome.exe" ENABLE
Behavior description: 创建本地线程
details: TargetProcess: wscript.exe, InheritedFromPID = 1384, ProcessID = 1048, ThreadID = 1668, StartAddress = 01002FD4, Parameter = 008E4448
TargetProcess: rundll32.exe, InheritedFromPID = 1384, ProcessID = 908, ThreadID = 540, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: wscript.exe, InheritedFromPID = 1384, ProcessID = 1048, ThreadID = 672, StartAddress = 765E964D, Parameter = 001BE990
TargetProcess: wscript.exe, InheritedFromPID = 1384, ProcessID = 1048, ThreadID = 528, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: wscript.exe, InheritedFromPID = 1384, ProcessID = 1048, ThreadID = 792, StartAddress = 77E56C7D, Parameter = 001B8E48
TargetProcess: wscript.exe, InheritedFromPID = 1384, ProcessID = 1048, ThreadID = 1872, StartAddress = 769AE43B, Parameter = 001C31C8
TargetProcess: rundll32.exe, InheritedFromPID = 1384, ProcessID = 908, ThreadID = 2000, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: rundll32.exe, InheritedFromPID = 1384, ProcessID = 908, ThreadID = 556, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: wscript.exe, InheritedFromPID = 1384, ProcessID = 1048, ThreadID = 1004, StartAddress = 5A225840, Parameter = 022B6810
TargetProcess: txw45g.exe, InheritedFromPID = 1048, ProcessID = 1352, ThreadID = 1952, StartAddress = 79F0237F, Parameter = 00000000
TargetProcess: txw45g.exe, InheritedFromPID = 1048, ProcessID = 1352, ThreadID = 444, StartAddress = 79F91FCF, Parameter = 001A5360
TargetProcess: txw45g.exe, InheritedFromPID = 1048, ProcessID = 1352, ThreadID = 284, StartAddress = 79FDA29C, Parameter = 00000000
TargetProcess: txw45g.exe, InheritedFromPID = 1048, ProcessID = 1352, ThreadID = 1392, StartAddress = 77E56C7D, Parameter = 001EF720
TargetProcess: txw45g.exe, InheritedFromPID = 1048, ProcessID = 1352, ThreadID = 1648, StartAddress = 769AE43B, Parameter = 001D2828
TargetProcess: Chrome.exe, InheritedFromPID = 1352, ProcessID = 1840, ThreadID = 1012, StartAddress = 79F0237F, Parameter = 00000000
Behavior description: 创建新文件进程
details: ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\txw45g.exe, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\txw45g.exe
ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Chrome.exe, CmdLine = "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Chrome.exe"
Behavior description: 枚举进程
details: N/A

File behavior

Behavior description: 创建文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\nsg4.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\Google.wsf
C:\Documents and Settings\Administrator\Local Settings\Temp\12196084_134275546931313_5888537433197025821_n.jpg
C:\Documents and Settings\Administrator\Local Settings\Temp\txw45g.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\Chrome.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\Chrome.exe.tmp
Behavior description: 创建可执行文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\txw45g.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\Chrome.exe
Behavior description: 查找文件
details: FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings\Administrator\My Documents
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\Documents
FileName = C:\Documents and Settings\Administrator\桌面
FileName = C:\Documents and Settings\All Users\桌面
FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Google.wsf
Behavior description: 删除文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\nsg4.tmp
Behavior description: 复制文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\txw45g.exe ---> C:\Documents and Settings\Administrator\Local Settings\Temp\Chrome.exe
Behavior description: 修改文件内容
details: C:\Documents and Settings\Administrator\Local Settings\Temp\Google.wsf ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\Google.wsf ---> Offset = 32768
C:\Documents and Settings\Administrator\Local Settings\Temp\Google.wsf ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Temp\Google.wsf ---> Offset = 98304
C:\Documents and Settings\Administrator\Local Settings\Temp\Google.wsf ---> Offset = 131072
C:\Documents and Settings\Administrator\Local Settings\Temp\12196084_134275546931313_5888537433197025821_n.jpg ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\12196084_134275546931313_5888537433197025821_n.jpg ---> Offset = 16753
C:\Documents and Settings\Administrator\Local Settings\Temp\12196084_134275546931313_5888537433197025821_n.jpg ---> Offset = 33205
C:\Documents and Settings\Administrator\Local Settings\Temp\txw45g.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\txw45g.exe ---> Offset = 2048
C:\Documents and Settings\Administrator\Local Settings\Temp\txw45g.exe ---> Offset = 4096
C:\Documents and Settings\Administrator\Local Settings\Temp\txw45g.exe ---> Offset = 6144
C:\Documents and Settings\Administrator\Local Settings\Temp\txw45g.exe ---> Offset = 8192
C:\Documents and Settings\Administrator\Local Settings\Temp\Chrome.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\Chrome.exe ---> Offset = 4096

Network behavior

Behavior description: 按名称获取主机地址
details: GetAddrInfoW: su****om

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\WINDOWS\System32\WScript.exe
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\WINDOWS\system32\shimgvw.dll
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Chrome.exe
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\EnableFileTracing
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\EnableConsoleTracing
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\FileTracingMask
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\ConsoleTracingMask
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\MaxFileSize
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\FileDirectory
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\LogSessionName
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\Active
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\ControlFlags
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\Napmontr\Guid
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\Napmontr\BitNames
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent\LogSessionName
Behavior description: 修改注册表_系统环境变量
details: \REGISTRY\USER\S-*\Environment\SEE_MASK_NOZONECHECKS
Behavior description: 修改注册表_系统防火墙可信进程列表
details: \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Documents and Settings\Administrator\Local Settings\Temp\Chrome.exe
Behavior description: 修改注册表_启动项
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Run\e79d569ba77562f0d4316e586835f0a2
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e79d569ba77562f0d4316e586835f0a2

Other behavior

Behavior description: 检测自身是否被调试
details: N/A
Behavior description: 创建互斥体
details: CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
MSCTF.Shared.MUTEX.ELH
e79d569ba77562f0d4316e586835f0a2
Global\.net clr networking
MSCTF.Shared.MUTEX.IHD
Behavior description: 创建事件对象
details: EventName = Global\crypt32LogoffEvent
EventName = Global\CorDBIPCSetupSyncEvent_1352
EventName = Global\CorDBIPCSetupSyncEvent_1840
EventName = MSCTF.SendReceive.Event.IHD.IC
EventName = MSCTF.SendReceiveConection.Event.IHD.IC
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [ShImgVw:CPreviewWnd,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description: 获取TickCount值
details: TickCount = 490457, SleepMilliseconds = 20.
TickCount = 490473, SleepMilliseconds = 20.
TickCount = 490504, SleepMilliseconds = 20.
TickCount = 494844, SleepMilliseconds = 1.
TickCount = 495016, SleepMilliseconds = 1.
TickCount = 495094, SleepMilliseconds = 1.
TickCount = 495829, SleepMilliseconds = 1.
Behavior description: 调整进程token权限
details: SE_LOAD_DRIVER_PRIVILEGE
SE_DEBUG_PRIVILEGE
Behavior description: 枚举窗口
details: N/A
Behavior description: 可执行文件签名信息
details: C:\Documents and Settings\Administrator\Local Settings\Temp\txw45g.exe(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\Chrome.exe(签名验证: 未通过)
Behavior description: 调用Sleep函数
details: [1]: MilliSeconds = -1.
[1]: MilliSeconds = 1000.
[2]: MilliSeconds = 2500.
[3]: MilliSeconds = 1000.
[4]: MilliSeconds = 1000.
[5]: MilliSeconds = 1000.
[6]: MilliSeconds = 1000.
[7]: MilliSeconds = 1000.
[8]: MilliSeconds = 2500.
[9]: MilliSeconds = 1000.
[10]: MilliSeconds = 1000.
Behavior description: 可执行文件MD5
details: C:\Documents and Settings\Administrator\Local Settings\Temp\txw45g.exe ---> df01db8933f881f69a9f915f560e170b
C:\Documents and Settings\Administrator\Local Settings\Temp\Chrome.exe ---> df01db8933f881f69a9f915f560e170b