VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:d7bb38605e6df50a093a5af46aa65ecf
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\IETldCache
Behavior description: 直接获取CPU时钟
details: EAX = 0x9dce6a39, EDX = 0x00001190
EAX = 0x9dce6a85, EDX = 0x00001190
EAX = 0x9dce6ad1, EDX = 0x00001190
EAX = 0x9dce6b1d, EDX = 0x00001190
EAX = 0x9dce6b69, EDX = 0x00001190
EAX = 0x9dce6bb5, EDX = 0x00001190
EAX = 0x9dce6c01, EDX = 0x00001190
EAX = 0x9dce6c4d, EDX = 0x00001190
EAX = 0x9dce6c99, EDX = 0x00001190
EAX = 0x9dce6ce5, EDX = 0x00001190
Behavior description: 获取窗口截图信息
details: Foreground window Info: HWND = 0x00000000, DC = 0x880105f4.
Behavior description: 获取TickCount值
details: TickCount = 5433156, SleepMilliseconds = 1000.
TickCount = 5433171, SleepMilliseconds = 1000.
TickCount = 5433203, SleepMilliseconds = 1000.
TickCount = 5433265, SleepMilliseconds = 1000.
TickCount = 5433296, SleepMilliseconds = 1000.
TickCount = 5433328, SleepMilliseconds = 1000.
TickCount = 5433359, SleepMilliseconds = 1000.
TickCount = 5433390, SleepMilliseconds = 1000.
TickCount = 5433406, SleepMilliseconds = 1000.
TickCount = 5433421, SleepMilliseconds = 1000.
TickCount = 5433437, SleepMilliseconds = 1000.
TickCount = 5433453, SleepMilliseconds = 1000.
TickCount = 5433484, SleepMilliseconds = 1000.
TickCount = 5433500, SleepMilliseconds = 1000.
TickCount = 5433531, SleepMilliseconds = 1000.

Process behavior

Behavior description: 创建本地线程
details: TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 968, ThreadID = 1656, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 968, ThreadID = 1532, StartAddress = 6359727B, Parameter = 001E14F0
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 968, ThreadID = 1664, StartAddress = 0040A213, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 968, ThreadID = 1412, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 968, ThreadID = 1956, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 968, ThreadID = 2052, StartAddress = 0040BC36, Parameter = 00001388
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 968, ThreadID = 2068, StartAddress = 77E56C7D, Parameter = 0027B730
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 968, ThreadID = 2072, StartAddress = 769AE43B, Parameter = 02516420
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 968, ThreadID = 2076, StartAddress = 016C507F, Parameter = 0012DAD0
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 968, ThreadID = 2080, StartAddress = 016C507F, Parameter = 0012DAD0

File behavior

Behavior description: 创建文件
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6P4O8QNJ\blog_8ff93ba80102wj0q[1].html
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6P4O8QNJ\2415475624[1]
Behavior description: 删除文件
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6P4O8QNJ\blog_8ff93ba80102wj0q[1].html
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\IETldCache
Behavior description: 查找文件
details: FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\WINDOWS\system32\Ras\*.pbk
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\WINDOWS
FileName = C:\WINDOWS\system32
FileName = C:\WINDOWS\system32\urlmon.dll

Network behavior

Behavior description: 连接指定站点
details: InternetConnectA: ServerName = bl****cn, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = bl****cn, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0010, Flags = 0x00000000
Behavior description: 打开HTTP连接
details: InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489), hSession = 0x00cc0004
Behavior description: 建立到一个指定的套接字连接
details: URL: bl****cn, IP: **.133.40.**:80, SOCKET = 0x000003f0
URL: bl****cn, IP: **.133.40.**:80, SOCKET = 0x00000360
URL: bl****cn, IP: **.133.40.**:80, SOCKET = 0x000003fc
Behavior description: 读取网络文件
details: hFile = 0x00cc000c, BytesToRead =4096, BytesRead = 4096.
hFile = 0x00cc0014, BytesToRead =2048, BytesRead = 2048.
Behavior description: 发送HTTP包
details: GET /s/blog_8ff93ba80102wj0q.html HTTP/1.1 Accept: */* Content-Type: text/XML Accept-Language: zh-cn Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: bl****cn Connection: Keep-Alive
GET /s/blog_8ff93ba80102wj0q.html HTTP/1.1 Accept: application/x-shockwave-flash, image/gif, image/jpeg, image/pjpeg, image/pjpeg, application/x-ms-application, application/x-ms-xbap, application/vnd.ms-xpsdocument, application/xaml+xml, application/msword, */* Accept-Language: zh-cn Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: bl****cn Connection: Keep-Alive
GET /u/2415475624 HTTP/1.1 Accept: application/x-shockwave-flash, image/gif, image/jpeg, image/pjpeg, image/pjpeg, application/x-ms-application, application/x-ms-xbap, application/vnd.ms-xpsdocument, application/xaml+xml, application/msword, */* Accept-Language: zh-cn Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489) Host: bl****cn Connection: Keep-Alive
Behavior description: 打开HTTP请求
details: HttpOpenRequestA: bl****cn:80/s/blog_8ff93ba80102wj0q.html, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400000
HttpOpenRequestA: bl****cn:80/s/blog_8ff93ba80102wj0q.html, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400200
HttpOpenRequestA: bl****cn:80/u/2415475624, hConnect = 0x00cc0010, hRequest = 0x00cc0014, Verb: GET, Referer: , Flags = 0x00400200
Behavior description: 按名称获取主机地址
details: GetAddrInfoW: bl****cn

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\Software\Microsoft\Multimedia\DrawDib\vga.drv 1920x973x16(565 0)
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Behavior description: 删除注册表键值
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL

Other behavior

Behavior description: 调整进程token权限
details: SE_LOAD_DRIVER_PRIVILEGE
Behavior description: 创建互斥体
details: RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
Local\!PrivacIE!SharedMemory!Mutex
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
Local\c:!documents and settings!administrator!ietldcache!
MSCTF.Shared.MUTEX.ELH
CritOpMutex
Behavior description: 创建事件对象
details: EventName = DINPUTWINMM
EventName = Global\userenv: User Profile setup event
EventName = MSCTF.SendReceive.Event.MBI.IC
EventName = MSCTF.SendReceiveConection.Event.MBI.IC
EventName = MSCTF.SendReceive.Event.ACI.IC
EventName = MSCTF.SendReceiveConection.Event.ACI.IC
EventName = MSCTF.SendReceive.Event.EJE.IC
EventName = MSCTF.SendReceiveConection.Event.EJE.IC
Behavior description: 打开互斥体
details: RasPbFile
ShimCacheMutex
Local\!IETld!Mutex
CtfmonInstMutexDefaultS-*
Local\_!MSFTHISTORY!_
Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Local\c:!documents and settings!administrator!cookies!
Local\c:!documents and settings!administrator!local settings!history!history.ie5!
Local\WininetStartupMutex
Local\WininetConnectionMutex
Local\WininetProxyRegistryMutex
Local\c:!documents and settings!administrator!ietldcache!
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description: 窗口信息
details: Pid = 968, Hwnd=0x30416, Text = 您想运行或保存此文件吗?, ClassName = Static.
Pid = 968, Hwnd=0x3041e, Text = 名称:, ClassName = Static.
Pid = 968, Hwnd=0x30420, Text = update.exe, ClassName = SysLink.
Pid = 968, Hwnd=0x30422, Text = 发行者:, ClassName = Static.
Pid = 968, Hwnd=0x30426, Text = 类型:, ClassName = Static.
Pid = 968, Hwnd=0x30428, Text = 应用程序, 358KB, ClassName = Static.
Pid = 968, Hwnd=0x3042c, Text = 从:, ClassName = Static.
Pid = 968, Hwnd=0x3042e, Text = blog.sina.com.cn, ClassName = Static.
Pid = 968, Hwnd=0x30430, Text = 运行(&R), ClassName = Button.
Pid = 968, Hwnd=0x30432, Text = 保存(&S), ClassName = Button.
Pid = 968, Hwnd=0x3045c, Text = 取消, ClassName = Button.
Pid = 968, Hwnd=0x3042a, Text = 打开此类文件前总是询问(&W), ClassName = Button(CheckBox).
Pid = 968, Hwnd=0x30494, Text = 来自 Internet 的文件可能对您有所帮助,但此文件类型可能危害您的计算机。如果您不信任其来源,请不要运行或保存该软件。<A>有何风险?</A>, ClassName = SysLink.
Pid = 968, Hwnd=0x1202b0, Text = 文件下载 - 安全警告, ClassName = #32770.
Pid = 968, Hwnd=0x1b02d8, Text = 下载完毕, ClassName = Static.
Behavior description: 获取TickCount值
details: TickCount = 5433156, SleepMilliseconds = 1000.
TickCount = 5433171, SleepMilliseconds = 1000.
TickCount = 5433203, SleepMilliseconds = 1000.
TickCount = 5433265, SleepMilliseconds = 1000.
TickCount = 5433296, SleepMilliseconds = 1000.
TickCount = 5433328, SleepMilliseconds = 1000.
TickCount = 5433359, SleepMilliseconds = 1000.
TickCount = 5433390, SleepMilliseconds = 1000.
TickCount = 5433406, SleepMilliseconds = 1000.
TickCount = 5433421, SleepMilliseconds = 1000.
TickCount = 5433437, SleepMilliseconds = 1000.
TickCount = 5433453, SleepMilliseconds = 1000.
TickCount = 5433484, SleepMilliseconds = 1000.
TickCount = 5433500, SleepMilliseconds = 1000.
TickCount = 5433531, SleepMilliseconds = 1000.
Behavior description: 获取光标位置
details: CursorPos = (96,18500), SleepMilliseconds = 1000.
CursorPos = (6389,26533), SleepMilliseconds = 1000.
CursorPos = (19224,15757), SleepMilliseconds = 1000.
CursorPos = (11533,29391), SleepMilliseconds = 1000.
CursorPos = (27017,24497), SleepMilliseconds = 1000.
CursorPos = (5760,28178), SleepMilliseconds = 1000.
CursorPos = (23336,16860), SleepMilliseconds = 1000.
CursorPos = (10016,524), SleepMilliseconds = 1000.
CursorPos = (3050,11975), SleepMilliseconds = 1000.
CursorPos = (4882,5469), SleepMilliseconds = 1000.
CursorPos = (32446,14637), SleepMilliseconds = 1000.
CursorPos = (3957,186), SleepMilliseconds = 1000.
CursorPos = (347,12415), SleepMilliseconds = 1000.
CursorPos = (17476,18749), SleepMilliseconds = 1000.
CursorPos = (19773,19928), SleepMilliseconds = 1000.
Behavior description: 打开事件
details: HookSwitchHookEnabledEvent
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Global\SvcctrlStartEvent_A3752DX
\INSTALLATION_SECURITY_HOLD
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000053
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000053
MSCTF.SendReceiveConection.Event.ELH.IC
MSCTF.SendReceive.Event.ELH.IC
MSFT.VSA.COM.DISABLE.968
MSFT.VSA.IEC.STATUS.6c736db0
_fCanRegisterWithShellService
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000054
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000054
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000055
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000055
Behavior description: 获取窗口截图信息
details: Foreground window Info: HWND = 0x00000000, DC = 0x880105f4.
Behavior description: 调用Sleep函数
details: [1]: MilliSeconds = 50.
[2]: MilliSeconds = 100.
[3]: MilliSeconds = 1000.
[4]: MilliSeconds = 60000.
[5]: MilliSeconds = 100.
[6]: MilliSeconds = 100.
[7]: MilliSeconds = 60000.
[8]: MilliSeconds = 100.
[9]: MilliSeconds = 100.
[10]: MilliSeconds = 60000.
Behavior description: 隐藏指定窗口
details: [Window,Class] = [获取,Button]
[Window,Class] = [导出,Button]
[Window,Class] = [,Edit]
[Window,Class] = [,Afx:400000:b:10011:1900010:0]
[Window,Class] = [ 正在获取请稍候!,Afx:400000:b:10011:1900015:0]
[Window,Class] = [,SysLink]
[Window,Class] = [,Static]
[Window,Class] = [文件大小未知,Static]
[Window,Class] = [打开此类文件前总是询问(&W),Button]
[Window,Class] = [发行者:,Static]
[Window,Class] = [,Shell Embedding]
[Window,Class] = [,Internet Explorer_Server]
Behavior description: 直接获取CPU时钟
details: EAX = 0x9dce6a39, EDX = 0x00001190
EAX = 0x9dce6a85, EDX = 0x00001190
EAX = 0x9dce6ad1, EDX = 0x00001190
EAX = 0x9dce6b1d, EDX = 0x00001190
EAX = 0x9dce6b69, EDX = 0x00001190
EAX = 0x9dce6bb5, EDX = 0x00001190
EAX = 0x9dce6c01, EDX = 0x00001190
EAX = 0x9dce6c4d, EDX = 0x00001190
EAX = 0x9dce6c99, EDX = 0x00001190
EAX = 0x9dce6ce5, EDX = 0x00001190