VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:17
Behavior list
Basic Information
MD5:b81ac0697343b4ceb8d352a4ed44c6ca
file type:EXE
Production company:
version:
Shell or compiler information:PACKER:UPX 0.89.6 - 1.02 / 1.05 - 1.24 -> Markus & Laszlo
Subfile information:upx_c_dd93d1ffdumpFile / 3601d57fd3e769fcc9ff8aa3ab52dadb / EXE
Key behavior
Behavior description:自删除
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
Behavior description:获取TickCount值
details:TickCount = 216906, SleepMilliseconds = 500.
TickCount = 216937, SleepMilliseconds = 500.
TickCount = 216990, SleepMilliseconds = 100.
TickCount = 396984, SleepMilliseconds = 180000.
TickCount = 222168, SleepMilliseconds = 200.
TickCount = 224203, SleepMilliseconds = 2000.
TickCount = 229828, SleepMilliseconds = 2000.
TickCount = 228206, SleepMilliseconds = 300.
TickCount = 233387, SleepMilliseconds = 200.
TickCount = 233612, SleepMilliseconds = 300.
TickCount = 238731, SleepMilliseconds = 200.
TickCount = 238856, SleepMilliseconds = 200.
TickCount = 244075, SleepMilliseconds = 200.
TickCount = 244200, SleepMilliseconds = 200.
TickCount = 249418, SleepMilliseconds = 200.
Behavior description:创建系统服务
details:[服务创建成功]: .Net CLR, C:\WINDOWS\fsblou.exe
Behavior description:进程提权信息
details:NT AUTHORITY\SYSTEM
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = , CmdLine = at \\**.133.40.** 19:57 admin$\
ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = "C:\WINDOWS\system32\cmd.exe" /c del C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\****.exe > nul
ImagePath = , CmdLine = at \\**.133.40.** 19:58 admin$\
Behavior description:创建进程
details:[0x00000b54]ImagePath = C:\WINDOWS\system32\at.exe, CmdLine = at \\**.133.40.** 19:57 admin$\
[0x00000b6c]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = "C:\WINDOWS\system32\cmd.exe" /c del C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\****.exe > nul
[0x00000b74]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = "C:\WINDOWS\system32\cmd.exe" /c del C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\****.exe > nul
[0x00000bb8]ImagePath = C:\WINDOWS\system32\at.exe, CmdLine = at \\**.133.40.** 19:57 admin$\
[0x00000c68]ImagePath = C:\WINDOWS\system32\at.exe, CmdLine = at \\**.133.40.** 19:57 admin$\
[0x00000cf8]ImagePath = C:\WINDOWS\system32\at.exe, CmdLine = at \\**.133.40.** 19:57 admin$\
[0x00000d48]ImagePath = C:\WINDOWS\system32\at.exe, CmdLine = at \\**.133.40.** 19:58 admin$\
[0x00000d98]ImagePath = C:\WINDOWS\system32\at.exe, CmdLine = at \\**.133.40.** 19:58 admin$\
[0x00000de8]ImagePath = C:\WINDOWS\system32\at.exe, CmdLine = at \\**.133.40.** 19:58 admin$\
[0x00000e4c]ImagePath = C:\WINDOWS\system32\at.exe, CmdLine = at \\**.133.40.** 19:58 admin$\
Behavior description:创建新文件进程
details:[0x00000ad8]ImagePath = C:\WINDOWS\fsblou.exe, CmdLine = C:\WINDOWS\fsblou.exe
Behavior description:创建本地线程
details:TargetProcess: fsblou.exe, InheritedFromPID = 652, ProcessID = 2776, ThreadID = 2796, StartAddress = 77DC3519, Parameter = 00186BB8
TargetProcess: fsblou.exe, InheritedFromPID = 652, ProcessID = 2776, ThreadID = 2816, StartAddress = 00402DD5, Parameter = 00000000
TargetProcess: fsblou.exe, InheritedFromPID = 652, ProcessID = 2776, ThreadID = 2840, StartAddress = 004051E0, Parameter = 00000000
TargetProcess: fsblou.exe, InheritedFromPID = 652, ProcessID = 2776, ThreadID = 2848, StartAddress = 00405241, Parameter = 00000000
TargetProcess: fsblou.exe, InheritedFromPID = 652, ProcessID = 2776, ThreadID = 2852, StartAddress = 0040387C, Parameter = 00000000
TargetProcess: fsblou.exe, InheritedFromPID = 652, ProcessID = 2776, ThreadID = 2880, StartAddress = 00405184, Parameter = 00000000
TargetProcess: fsblou.exe, InheritedFromPID = 652, ProcessID = 2776, ThreadID = 2884, StartAddress = 00404908, Parameter = 00000000
TargetProcess: fsblou.exe, InheritedFromPID = 652, ProcessID = 2776, ThreadID = 2908, StartAddress = 00405128, Parameter = 00000000
TargetProcess: fsblou.exe, InheritedFromPID = 652, ProcessID = 2776, ThreadID = 2912, StartAddress = 004040DA, Parameter = 00000000
TargetProcess: fsblou.exe, InheritedFromPID = 652, ProcessID = 2776, ThreadID = 3008, StartAddress = 00404908, Parameter = 00000000
TargetProcess: fsblou.exe, InheritedFromPID = 652, ProcessID = 2776, ThreadID = 3012, StartAddress = 004040DA, Parameter = 00000000
TargetProcess: fsblou.exe, InheritedFromPID = 652, ProcessID = 2776, ThreadID = 3196, StartAddress = 00404908, Parameter = 00000000
TargetProcess: fsblou.exe, InheritedFromPID = 652, ProcessID = 2776, ThreadID = 3204, StartAddress = 004040DA, Parameter = 00000000
TargetProcess: fsblou.exe, InheritedFromPID = 652, ProcessID = 2776, ThreadID = 3328, StartAddress = 00404908, Parameter = 00000000
TargetProcess: fsblou.exe, InheritedFromPID = 652, ProcessID = 2776, ThreadID = 3332, StartAddress = 004040DA, Parameter = 00000000
Behavior description:进程提权信息
details:NT AUTHORITY\SYSTEM
File behavior
Behavior description:创建文件
details:C:\WINDOWS\fsblou.exe
C:\WINDOWS\system32\fsblou.exe
Behavior description:创建可执行文件
details:C:\WINDOWS\fsblou.exe
C:\WINDOWS\system32\fsblou.exe
Behavior description:覆盖已有文件
details:C:\WINDOWS\system32\fsblou.exe
Behavior description:复制文件
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe ---> C:\WINDOWS\fsblou.exe
C:\WINDOWS\fsblou.exe ---> \\**.133.40.**\admin$\g1fd.exe
Behavior description:查找文件
details:FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\My Documents
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\Documents
FileName = C:\Documents and Settings\Administrator\桌面
FileName = C:\Documents and Settings\All Users\桌面
FileName = C:\WINDOWS
FileName = C:\WINDOWS\system32
FileName = C:\WINDOWS\system32\at.exe
FileName = C:\WINDOWS\system32\cmd.exe
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\****.exe
Behavior description:修改文件内容
details:C:\WINDOWS\fsblou.exe ---> Offset = 0
C:\WINDOWS\fsblou.exe ---> Offset = 4096
C:\WINDOWS\fsblou.exe ---> Offset = 8192
C:\WINDOWS\fsblou.exe ---> Offset = 12288
C:\WINDOWS\system32\fsblou.exe ---> Offset = 0
C:\WINDOWS\system32\fsblou.exe ---> Offset = 4096
C:\WINDOWS\system32\fsblou.exe ---> Offset = 8192
C:\WINDOWS\system32\fsblou.exe ---> Offset = 12288
Behavior description:自删除
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
Network behavior
Behavior description:建立到一个指定的套接字连接
details:IP: **.186.59.**:1122, SOCKET = 0x00000100
URL: ww****om, IP: **.133.40.**:9999, SOCKET = 0x00000148
URL: ql****et, IP: **.133.40.**:9898, SOCKET = 0x0000012c
URL: ww****om, IP: **.133.40.**:9999, SOCKET = 0x00000158
URL: ql****et, IP: **.133.40.**:9898, SOCKET = 0x00000174
URL: ww****om, IP: **.133.40.**:9999, SOCKET = 0x0000017c
URL: ql****et, IP: **.133.40.**:9898, SOCKET = 0x0000013c
URL: ww****om, IP: **.133.40.**:9999, SOCKET = 0x0000016c
URL: ql****et, IP: **.133.40.**:9898, SOCKET = 0x0000017c
URL: ww****om, IP: **.133.40.**:9999, SOCKET = 0x00000170
URL: ql****et, IP: **.133.40.**:9898, SOCKET = 0x0000016c
URL: ww****om, IP: **.133.40.**:9999, SOCKET = 0x00000154
URL: ql****et, IP: **.133.40.**:9898, SOCKET = 0x00000170
Behavior description:按名称获取主机地址
details:gethostbyname: computer
DnsQuery_W: 1.110.110.110.in-addr.arpa.
gethostbyname: ww****om
gethostbyname: ql****et
DnsQuery_W: 2.110.110.110.in-addr.arpa.
DnsQuery_W: 3.110.110.110.in-addr.arpa.
DnsQuery_W: 4.110.110.110.in-addr.arpa.
DnsQuery_W: 5.110.110.110.in-addr.arpa.
DnsQuery_W: 6.110.110.110.in-addr.arpa.
DnsQuery_W: 7.110.110.110.in-addr.arpa.
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
.Net CLR
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
Behavior description:启动系统服务
details:[服务启动成功]: LocalSystem, Microsoft .Net Framewor1k COM+ Support, C:\WINDOWS\fsblou.exe
Behavior description:获取TickCount值
details:TickCount = 216906, SleepMilliseconds = 500.
TickCount = 216937, SleepMilliseconds = 500.
TickCount = 216990, SleepMilliseconds = 100.
TickCount = 396984, SleepMilliseconds = 180000.
TickCount = 222168, SleepMilliseconds = 200.
TickCount = 224203, SleepMilliseconds = 2000.
TickCount = 229828, SleepMilliseconds = 2000.
TickCount = 228206, SleepMilliseconds = 300.
TickCount = 233387, SleepMilliseconds = 200.
TickCount = 233612, SleepMilliseconds = 300.
TickCount = 238731, SleepMilliseconds = 200.
TickCount = 238856, SleepMilliseconds = 200.
TickCount = 244075, SleepMilliseconds = 200.
TickCount = 244200, SleepMilliseconds = 200.
TickCount = 249418, SleepMilliseconds = 200.
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
SE_INC_BASE_PRIORITY_PRIVILEGE
Behavior description:打开事件
details:Global\SvcctrlStartEvent_A3752DX
HookSwitchHookEnabledEvent
_fCanRegisterWithShellService
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Behavior description:可执行文件签名信息
details:C:\WINDOWS\fsblou.exe(签名验证: 未通过)
C:\WINDOWS\system32\fsblou.exe(签名验证: 未通过)
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 500.
[2]: MilliSeconds = 500.
[3]: MilliSeconds = 200.
[4]: MilliSeconds = 200.
[5]: MilliSeconds = 100.
[6]: MilliSeconds = 100.
[7]: MilliSeconds = 100.
[8]: MilliSeconds = 100.
[9]: MilliSeconds = 180000.
[10]: MilliSeconds = 2000.
Behavior description:可执行文件MD5
details:C:\WINDOWS\fsblou.exe ---> b81ac0697343b4ceb8d352a4ed44c6ca
C:\WINDOWS\system32\fsblou.exe ---> b81ac0697343b4ceb8d352a4ed44c6ca
Behavior description:打开互斥体
details:Local\!IETld!Mutex
ShimCacheMutex
Behavior description:创建系统服务
details:[服务创建成功]: .Net CLR, C:\WINDOWS\fsblou.exe
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号