VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:75
Behavior list
Basic Information
MD5:b9d1f657dad6480eacb482d6b0e0cd27
file type:EXE
Production company:
version:
Shell or compiler information:COMPILER:Microsoft Visual Studio .NET 2005 -- 2008 -> Microsoft Corporation [RAR SFX] *
Subfile information:BaiduYunGuanjia.exe / big file / EXE
YunLogic.dll / 4f739137a677c99c9db74e743c3fb816 / DLL
default.db / 3e6eb242c8101661d995488f20f53a3d / Compound
Basement.dll / d66f4ae5dff9e08b9fbba543927717eb / DLL
exiv2.dll / b71a33087be2815d09ab7a45a8a43d93 / DLL
Key behavior
Behavior description:检测自身是否被调试
details:N/A
Behavior description:在桌面创建快捷方式
details:C:\Documents and Settings\Administrator\桌面\百度云.lnk
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:获取TickCount值
details:TickCount = 358143, SleepMilliseconds = 50.
TickCount = 358221, SleepMilliseconds = 50.
TickCount = 358284, SleepMilliseconds = 50.
TickCount = 358346, SleepMilliseconds = 50.
TickCount = 358393, SleepMilliseconds = 50.
TickCount = 358409, SleepMilliseconds = 50.
TickCount = 358503, SleepMilliseconds = 50.
TickCount = 358550, SleepMilliseconds = 50.
TickCount = 358659, SleepMilliseconds = 50.
TickCount = 358675, SleepMilliseconds = 50.
TickCount = 358706, SleepMilliseconds = 50.
TickCount = 358721, SleepMilliseconds = 50.
TickCount = 358737, SleepMilliseconds = 50.
TickCount = 358846, SleepMilliseconds = 50.
TickCount = 358878, SleepMilliseconds = 50.
Process behavior
Behavior description:创建本地线程
details:TargetProcess: b70c.exe, InheritedFromPID = 2008, ProcessID = 3328, ThreadID = 3664, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: BaiduYunGuanjia.exe, InheritedFromPID = 3328, ProcessID = 3600, ThreadID = 3876, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: BaiduYunGuanjia.exe, InheritedFromPID = 3328, ProcessID = 3600, ThreadID = 3880, StartAddress = 00F0BFB4, Parameter = 001985E0
TargetProcess: BaiduYunGuanjia.exe, InheritedFromPID = 3328, ProcessID = 3600, ThreadID = 3956, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: BaiduYunGuanjia.exe, InheritedFromPID = 3328, ProcessID = 3600, ThreadID = 3964, StartAddress = 00F0BFB4, Parameter = 00200318
TargetProcess: BaiduYunGuanjia.exe, InheritedFromPID = 3328, ProcessID = 3600, ThreadID = 3968, StartAddress = 76B2AEAF, Parameter = 00000000
TargetProcess: BaiduYunGuanjia.exe, InheritedFromPID = 3328, ProcessID = 3600, ThreadID = 4004, StartAddress = 00F0BFB4, Parameter = 0024B008
TargetProcess: BaiduYunGuanjia.exe, InheritedFromPID = 3328, ProcessID = 3600, ThreadID = 4008, StartAddress = 02B30F30, Parameter = 0021C4F4
TargetProcess: BaiduYunGuanjia.exe, InheritedFromPID = 3328, ProcessID = 3600, ThreadID = 4012, StartAddress = 02BF7DB0, Parameter = 0021C368
TargetProcess: BaiduYunGuanjia.exe, InheritedFromPID = 3328, ProcessID = 3600, ThreadID = 4016, StartAddress = 02BF7DB0, Parameter = 0021C3A0
TargetProcess: BaiduYunGuanjia.exe, InheritedFromPID = 3328, ProcessID = 3600, ThreadID = 4020, StartAddress = 02BF7DB0, Parameter = 0021C3D4
TargetProcess: BaiduYunGuanjia.exe, InheritedFromPID = 3328, ProcessID = 3600, ThreadID = 4024, StartAddress = 02BF7DB0, Parameter = 0021C794
TargetProcess: BaiduYunGuanjia.exe, InheritedFromPID = 3328, ProcessID = 3600, ThreadID = 4040, StartAddress = 02BF7DB0, Parameter = 0023E194
TargetProcess: BaiduYunGuanjia.exe, InheritedFromPID = 3328, ProcessID = 3600, ThreadID = 4044, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: BaiduYunGuanjia.exe, InheritedFromPID = 3328, ProcessID = 3600, ThreadID = 4048, StartAddress = 7C930230, Parameter = 00000000
Behavior description:创建新文件进程
details:ImagePath = C:\Program Files\xia ke\BaiduYunGuanjia.exe, CmdLine = "C:\Program Files\xia ke\BaiduYunGuanjia.exe"
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:创建文件
details:C:\Program Files\__tmp_rar_sfx_access_check_343625
C:\Program Files\xia ke\AppProperty.xml
C:\Program Files\xia ke\AppSettingApp.dat
C:\Program Files\xia ke\AppUtil.dll
C:\Program Files\xia ke\autobackup.ico
C:\Program Files\xia ke\BaiduYunGuanjia.exe
C:\Program Files\xia ke\Basement.dll
C:\Program Files\xia ke\Bull120U.dll
C:\Program Files\xia ke\channelpcsdk.dll
C:\Program Files\xia ke\exiv2.dll
C:\Program Files\xia ke\guanjia_logo.ico
C:\Program Files\xia ke\kernel.dll
C:\Program Files\xia ke\libexpat.dll
C:\Program Files\xia ke\msvcp120.dll
C:\Program Files\xia ke\msvcr120.dll
Behavior description:创建可执行文件
details:C:\Program Files\xia ke\AppUtil.dll
C:\Program Files\xia ke\BaiduYunGuanjia.exe
C:\Program Files\xia ke\Basement.dll
C:\Program Files\xia ke\Bull120U.dll
C:\Program Files\xia ke\channelpcsdk.dll
C:\Program Files\xia ke\exiv2.dll
C:\Program Files\xia ke\kernel.dll
C:\Program Files\xia ke\libexpat.dll
C:\Program Files\xia ke\msvcp120.dll
C:\Program Files\xia ke\msvcr120.dll
C:\Program Files\xia ke\npYunWebDetect.dll
C:\Program Files\xia ke\uninst.exe
C:\Program Files\xia ke\xImage.dll
C:\Program Files\xia ke\YunDb.dll
C:\Program Files\xia ke\YunLogic.dll
Behavior description:查找文件
details:FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\b70c.exe
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\桌面
FileName = C:\Program Files
FileName = C:\Program Files\xia ke
FileName = C:\Program Files\xia ke\BaiduYunGuanjia.exe
FileName = C:\Documents and Settings\Administrator\My Documents
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\Documents
FileName = C:\Documents and Settings\All Users\桌面
FileName = C:\Documents and Settings\Administrator\「开始」菜单
FileName = C:\Documents and Settings\All Users\「开始」菜单
FileName = C:\Documents and Settings\All Users\Application Data
FileName = C:\Documents and Settings\Administrator\Application Data
Behavior description:在桌面创建快捷方式
details:C:\Documents and Settings\Administrator\桌面\百度云.lnk
Behavior description:删除文件
details:C:\Program Files\__tmp_rar_sfx_access_check_343625
C:\Program Files\xia ke\users\localdata.dat
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\wpad[1].dat
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:修改文件内容
details:C:\Program Files\xia ke\AppProperty.xml ---> Offset = 0
C:\Program Files\xia ke\AppSettingApp.dat ---> Offset = 0
C:\Program Files\xia ke\AppUtil.dll ---> Offset = 0
C:\Program Files\xia ke\AppUtil.dll ---> Offset = 65536
C:\Program Files\xia ke\AppUtil.dll ---> Offset = 131072
C:\Program Files\xia ke\AppUtil.dll ---> Offset = 196608
C:\Program Files\xia ke\AppUtil.dll ---> Offset = 262144
C:\Program Files\xia ke\AppSettingApp.dat ---> Offset = 4096
C:\Program Files\xia ke\autobackup.ico ---> Offset = 0
C:\Program Files\xia ke\autobackup.ico ---> Offset = 75008
C:\Program Files\xia ke\autobackup.ico ---> Offset = 76288
C:\Program Files\xia ke\autobackup.ico ---> Offset = 94464
C:\Program Files\xia ke\autobackup.ico ---> Offset = 95744
C:\Program Files\xia ke\BaiduYunGuanjia.exe ---> Offset = 0
C:\Program Files\xia ke\BaiduYunGuanjia.exe ---> Offset = 65536
Network behavior
Behavior description:联网打开网址
details:InternetOpenUrlA: http://**.133.40.**:128/wpad.dat, hInternet = 0x00cc001c, Flags = 0x00000010
Behavior description:连接指定站点
details:InternetConnectA: ServerName = pa****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x80000000
InternetConnectA: ServerName = up****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0010, hConnect = 0x00cc0014, Flags = 0x00000000
InternetConnectA: ServerName = **.133.40.**, PORT = 128, UserName = , Password = , hSession = 0x00cc001c, hConnect = 0x00cc0020, Flags = 0x00000010
Behavior description:打开HTTP连接
details:InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E), hSession = 0x00cc0004
InternetOpenA: UserAgent: LogStatistic, hSession = 0x00cc0010
InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0), hSession = 0x00cc001c
Behavior description:建立到一个指定的套接字连接
details:URL: pa****om, IP: **.133.40.**:128, SOCKET = 0x00000468
URL: pa****om, IP: **.133.40.**:128, SOCKET = 0x00000460
URL: pa****om, IP: **.133.40.**:80, SOCKET = 0x00000478
URL: , IP: **.149.132.**:80, SOCKET = 0x000004c0
URL: wpad, IP: **.133.40.**:128, SOCKET = 0x000004f4
URL: up****om, IP: **.133.40.**:80, SOCKET = 0x00000500
Behavior description:读取网络文件
details:hFile = 0x00cc0024, BytesToRead =4010, BytesRead = 4010.
hFile = 0x00cc0018, BytesToRead =366592, BytesRead = 366592.
Behavior description:发送HTTP包
details:GET /res/static/thirdparty/connect.jpg?t=1472069210 HTTP/1.1 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E) Host: pa****om Cache-Control: no-cache
GET /wpad.dat HTTP/1.1 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0) Host: **.133.40.**:128
POST /statistics?clienttype=8&devuid=BDIMXV2%2DO%5F10FC0E328760443899BEF1D86E4881DB%2DC%5F0%2DD%5F42563737623232333732322d3039343862622033%2DM%5F7B****28%2DV%5FF44048E7&channel=00000000000000000000000000000000&version=5.3.2.4&ver=1&id=1472069212075A27F45E024A0192EB7035601B5D48 HTTP/1.1 Content-Type: multipart/form-data; boundary=--MULTI-PARTS-FORM-DATA-BOUNDARY Accept: */* Content-Length: 386 User-Agent: LogStatistic Host: up****om Connection: Keep-Alive Cache-Control: no-cache
Behavior description:打开HTTP请求
details:HttpOpenRequestA: pa****om:80/res/static/thirdparty/connect.jpg?t=1472069210, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x84280100
HttpOpenRequestA: up****om:80/statistics?clienttype=8&devuid=bdimxv2%2do%5f10fc0e328760443899bef1d86e4881db%2dc%5f0%2dd%5f42563737623232333732322d3039343862622033%2dm%5f7B****28%2dv%5ff44048e7&channel=00000000000000000000000000000000&version=5.3.2.4&ver=1&id=14, hConnect = 0x00cc0014, hRequest = 0x00cc0018, Verb: POST, Referer: , Flags = 0x04480040
HttpOpenRequestA: **.133.40.**:128/wpad.dat, hConnect = 0x00cc0020, hRequest = 0x00cc0024, Verb: GET, Referer: , Flags = 0x00000010
Behavior description:按名称获取主机地址
details:GetAddrInfoW: pa****om
GetAddrInfoW: computer
GetAddrInfoW: wpad
GetAddrInfoW: up****om
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\Program Files\xia ke\BaiduYunGuanjia.exe
\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\BaiduYunGuanjia\DEBUG\Trace Level
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Behavior description:删除注册表键值
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\BaiduYunGuanjia\DEBUG\Trace Level
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
Other behavior
Behavior description:检测自身是否被调试
details:N/A
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.APH
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
_SHuassist.mtx
RasPbFile
YunBrowserSharedMemoryLock_3600
54B55498-0BB1-4896-AC08-2595F474CBDE
Behavior description:创建事件对象
details:EventName = Global\userenv: User Profile setup event
EventName = Global\crypt32LogoffEvent
EventName = DINPUTWINMM
EventName = BAIDU-8A1-5581-4005-8389-1603C4D312E7
EventName = {DAF9CDB4-1826-4ba0-A6B6-52ABD4C8DE1A}
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [EDIT,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
Behavior description:窗口信息
details:Pid = 3600, Hwnd=0x102b8, Text = dummyLayeredWnd, ClassName = DuiHostWnd.
Pid = 3600, Hwnd=0x102b4, Text = 欢迎使用百度云管家, ClassName = DuiHostWnd.
Behavior description:获取TickCount值
details:TickCount = 358143, SleepMilliseconds = 50.
TickCount = 358221, SleepMilliseconds = 50.
TickCount = 358284, SleepMilliseconds = 50.
TickCount = 358346, SleepMilliseconds = 50.
TickCount = 358393, SleepMilliseconds = 50.
TickCount = 358409, SleepMilliseconds = 50.
TickCount = 358503, SleepMilliseconds = 50.
TickCount = 358550, SleepMilliseconds = 50.
TickCount = 358659, SleepMilliseconds = 50.
TickCount = 358675, SleepMilliseconds = 50.
TickCount = 358706, SleepMilliseconds = 50.
TickCount = 358721, SleepMilliseconds = 50.
TickCount = 358737, SleepMilliseconds = 50.
TickCount = 358846, SleepMilliseconds = 50.
TickCount = 358878, SleepMilliseconds = 50.
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007F0.00000000.0000001F
CTF.ThreadMarshalInterfaceEvent.000007F0.00000000.0000001F
MSCTF.SendReceiveConection.Event.APH.IC
MSCTF.SendReceive.Event.APH.IC
_fCanRegisterWithShellService
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Global\crypt32LogoffEvent
Local\{C15730E2-145C-4c5e-B005-3BC753F42475}-once-flagMDEPKNCAABOAAAAA
Global\SvcctrlStartEvent_A3752DX
\INSTALLATION_SECURITY_HOLD
CTF.ThreadMIConnectionEvent.000007F0.00000000.00000020
CTF.ThreadMarshalInterfaceEvent.000007F0.00000000.00000020
CTF.ThreadMIConnectionEvent.000007F0.00000000.00000021
CTF.ThreadMarshalInterfaceEvent.000007F0.00000000.00000021
Behavior description:可执行文件签名信息
details:C:\Program Files\xia ke\AppUtil.dll(签名验证: 通过)
C:\Program Files\xia ke\BaiduYunGuanjia.exe(签名验证: 通过)
C:\Program Files\xia ke\Basement.dll(签名验证: 通过)
C:\Program Files\xia ke\Bull120U.dll(签名验证: 通过)
C:\Program Files\xia ke\channelpcsdk.dll(签名验证: 通过)
C:\Program Files\xia ke\exiv2.dll(签名验证: 未通过)
C:\Program Files\xia ke\kernel.dll(签名验证: 未通过)
C:\Program Files\xia ke\libexpat.dll(签名验证: 未通过)
C:\Program Files\xia ke\msvcp120.dll(签名验证: 通过)
C:\Program Files\xia ke\msvcr120.dll(签名验证: 通过)
C:\Program Files\xia ke\npYunWebDetect.dll(签名验证: 通过)
C:\Program Files\xia ke\uninst.exe(签名验证: 通过)
C:\Program Files\xia ke\xImage.dll(签名验证: 通过)
C:\Program Files\xia ke\YunDb.dll(签名验证: 通过)
C:\Program Files\xia ke\YunLogic.dll(签名验证: 通过)
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ComboLBox]
[Window,Class] = [,Auto-Suggest Dropdown]
[Window,Class] = [浏览(&W)...,Button]
[Window,Class] = [C:\Program Files,ComboBox]
[Window,Class] = [TimerWin,LOG_MSG_WINDOW]
[Window,Class] = [,BaseGui]
Behavior description:可执行文件MD5
details:C:\Program Files\xia ke\AppUtil.dll ---> 09c24870331df910e5c4e1320558c748
C:\Program Files\xia ke\BaiduYunGuanjia.exe ---> 文件过大!
C:\Program Files\xia ke\Basement.dll ---> d66f4ae5dff9e08b9fbba543927717eb
C:\Program Files\xia ke\Bull120U.dll ---> 5464a73b4da04815d9c0f09bf861aa6b
C:\Program Files\xia ke\channelpcsdk.dll ---> 0d2494411e4ee37c9fd56056cf6e72db
C:\Program Files\xia ke\exiv2.dll ---> b71a33087be2815d09ab7a45a8a43d93
C:\Program Files\xia ke\kernel.dll ---> 99ddc5e3f465c5d283df144052c4f3cf
C:\Program Files\xia ke\libexpat.dll ---> 02bf3ace442fd31a243f26123833d43c
C:\Program Files\xia ke\msvcp120.dll ---> fd5cabbe52272bd76007b68186ebaf00
C:\Program Files\xia ke\msvcr120.dll ---> 034ccadc1c073e4216e9466b720f9849
C:\Program Files\xia ke\npYunWebDetect.dll ---> ceade7e4cf36bc6fb187fdc523509e99
C:\Program Files\xia ke\uninst.exe ---> 97d3a0bfe10e59949697c2213063bfa8
C:\Program Files\xia ke\xImage.dll ---> eef972a936dde6cd1b84d142b5490537
C:\Program Files\xia ke\YunDb.dll ---> 0228878d152dd0be49ba2baaebe905ca
C:\Program Files\xia ke\YunLogic.dll ---> 4f739137a677c99c9db74e743c3fb816
Behavior description:打开互斥体
details:ShimCacheMutex
Local\!IETld!Mutex
YunBrowserSharedMemoryLock_0
YunBrowserSharedMemoryLock_4
YunBrowserSharedMemoryLock_532
YunBrowserSharedMemoryLock_588
YunBrowserSharedMemoryLock_612
YunBrowserSharedMemoryLock_656
YunBrowserSharedMemoryLock_668
YunBrowserSharedMemoryLock_824
YunBrowserSharedMemoryLock_836
YunBrowserSharedMemoryLock_876
YunBrowserSharedMemoryLock_944
YunBrowserSharedMemoryLock_984
YunBrowserSharedMemoryLock_1064
Behavior description:加载新释放的文件
details:Image: C:\Program Files\xia ke\Bull120U.dll.
Image: C:\Program Files\xia ke\msvcr120.dll.
Image: C:\Program Files\xia ke\msvcp120.dll.
Image: C:\Program Files\xia ke\xImage.dll.
Image: C:\Program Files\xia ke\AppUtil.dll.
Image: C:\Program Files\xia ke\Basement.dll.
Image: C:\Program Files\xia ke\YunLogic.dll.
Image: C:\Program Files\xia ke\exiv2.dll.
Image: C:\Program Files\xia ke\libexpat.dll.
Image: C:\Program Files\xia ke\YunDb.dll.
Image: C:\Program Files\xia ke\kernel.dll.
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号