VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:28
Behavior list
Basic Information
MD5:dc62740fb75914f031ac58d57b474c5d
file type:EXE
Production company:
version:
Shell or compiler information:PACKER:UPX 0.89.6 - 1.02 / 1.05 - 1.24 -> Markus & Laszlo
Subfile information:upx_c_63b621e8dumpFile / c8b295b210971777278f488eb5fcc5a5 / EXE
Key behavior
Behavior description:自删除
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
Behavior description:获取TickCount值
details:TickCount = 5351296, SleepMilliseconds = 500.
TickCount = 5351390, SleepMilliseconds = 500.
TickCount = 5351303, SleepMilliseconds = 100.
TickCount = 7151281, SleepMilliseconds = 1800000.
TickCount = 7151296, SleepMilliseconds = 1800000.
TickCount = 5356778, SleepMilliseconds = 200.
TickCount = 5356987, SleepMilliseconds = 300.
TickCount = 5362200, SleepMilliseconds = 200.
TickCount = 5362925, SleepMilliseconds = 300.
TickCount = 5368450, SleepMilliseconds = 200.
TickCount = 5370484, SleepMilliseconds = 2000.
TickCount = 5374059, SleepMilliseconds = 200.
TickCount = 5376125, SleepMilliseconds = 2000.
TickCount = 5379856, SleepMilliseconds = 200.
TickCount = 5380096, SleepMilliseconds = 300.
Behavior description:创建系统服务
details:[服务创建成功]: .Net CLR, C:\WINDOWS\jmvtmm.exe
Behavior description:进程提权信息
details:NT AUTHORITY\SYSTEM
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = , CmdLine = at \\**.133.40.** 22:52 admin$\
ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = "C:\WINDOWS\system32\cmd.exe" /c del C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\****.exe > nul
ImagePath = , CmdLine = at \\**.133.40.** 22:53 admin$\
Behavior description:创建进程
details:ImagePath = C:\WINDOWS\system32\at.exe, CmdLine = at \\**.133.40.** 22:52 admin$\
ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = "C:\WINDOWS\system32\cmd.exe" /c del C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\****.exe > nul
ImagePath = C:\WINDOWS\system32\at.exe, CmdLine = at \\**.133.40.** 22:53 admin$\
Behavior description:创建新文件进程
details:ImagePath = C:\WINDOWS\jmvtmm.exe, CmdLine = C:\WINDOWS\jmvtmm.exe
Behavior description:创建本地线程
details:TargetProcess: jmvtmm.exe, InheritedFromPID = 656, ProcessID = 1004, ThreadID = 1872, StartAddress = 77DC3519, Parameter = 00186990
TargetProcess: jmvtmm.exe, InheritedFromPID = 656, ProcessID = 1004, ThreadID = 2044, StartAddress = 00402DD5, Parameter = 00000000
TargetProcess: jmvtmm.exe, InheritedFromPID = 656, ProcessID = 1004, ThreadID = 124, StartAddress = 004051E0, Parameter = 00000000
TargetProcess: jmvtmm.exe, InheritedFromPID = 656, ProcessID = 1004, ThreadID = 1136, StartAddress = 00405241, Parameter = 00000000
TargetProcess: jmvtmm.exe, InheritedFromPID = 656, ProcessID = 1004, ThreadID = 160, StartAddress = 0040387C, Parameter = 00000000
TargetProcess: jmvtmm.exe, InheritedFromPID = 656, ProcessID = 1004, ThreadID = 1172, StartAddress = 00405184, Parameter = 00000000
TargetProcess: jmvtmm.exe, InheritedFromPID = 656, ProcessID = 1004, ThreadID = 280, StartAddress = 00405128, Parameter = 00000000
TargetProcess: jmvtmm.exe, InheritedFromPID = 656, ProcessID = 1004, ThreadID = 1628, StartAddress = 004040DA, Parameter = 00000000
TargetProcess: jmvtmm.exe, InheritedFromPID = 656, ProcessID = 1004, ThreadID = 716, StartAddress = 00404908, Parameter = 00000000
TargetProcess: jmvtmm.exe, InheritedFromPID = 656, ProcessID = 1004, ThreadID = 2060, StartAddress = 004040DA, Parameter = 00000000
TargetProcess: jmvtmm.exe, InheritedFromPID = 656, ProcessID = 1004, ThreadID = 2064, StartAddress = 00404908, Parameter = 00000000
TargetProcess: jmvtmm.exe, InheritedFromPID = 656, ProcessID = 1004, ThreadID = 2224, StartAddress = 004040DA, Parameter = 00000000
TargetProcess: jmvtmm.exe, InheritedFromPID = 656, ProcessID = 1004, ThreadID = 2228, StartAddress = 00404908, Parameter = 00000000
TargetProcess: jmvtmm.exe, InheritedFromPID = 656, ProcessID = 1004, ThreadID = 2372, StartAddress = 004040DA, Parameter = 00000000
TargetProcess: jmvtmm.exe, InheritedFromPID = 656, ProcessID = 1004, ThreadID = 2376, StartAddress = 00404908, Parameter = 00000000
Behavior description:进程提权信息
details:NT AUTHORITY\SYSTEM
File behavior
Behavior description:创建文件
details:C:\WINDOWS\jmvtmm.exe
C:\WINDOWS\system32\jmvtmm.exe
Behavior description:创建可执行文件
details:C:\WINDOWS\jmvtmm.exe
C:\WINDOWS\system32\jmvtmm.exe
Behavior description:覆盖已有文件
details:C:\WINDOWS\system32\jmvtmm.exe
Behavior description:复制文件
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe ---> C:\WINDOWS\jmvtmm.exe
C:\WINDOWS\jmvtmm.exe ---> \\**.133.40.**\admin$\g1fd.exe
Behavior description:查找文件
details:FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\My Documents
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\Documents
FileName = C:\Documents and Settings\Administrator\桌面
FileName = C:\Documents and Settings\All Users\桌面
FileName = C:\WINDOWS
FileName = C:\WINDOWS\system32
FileName = C:\WINDOWS\system32\at.exe
FileName = C:\WINDOWS\system32\cmd.exe
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\****.exe
Behavior description:修改文件内容
details:C:\WINDOWS\jmvtmm.exe ---> Offset = 0
C:\WINDOWS\jmvtmm.exe ---> Offset = 4096
C:\WINDOWS\jmvtmm.exe ---> Offset = 8192
C:\WINDOWS\jmvtmm.exe ---> Offset = 12288
C:\WINDOWS\system32\jmvtmm.exe ---> Offset = 0
C:\WINDOWS\system32\jmvtmm.exe ---> Offset = 4096
C:\WINDOWS\system32\jmvtmm.exe ---> Offset = 8192
C:\WINDOWS\system32\jmvtmm.exe ---> Offset = 12288
Behavior description:自删除
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
Network behavior
Behavior description:建立到一个指定的套接字连接
details:URL: , IP: **.0.0.**:8080, SOCKET = 0x000000ec
URL: ww****in, IP: **.133.40.**:7777, SOCKET = 0x00000138
URL: ww****cc, IP: **.133.40.**:9999, SOCKET = 0x00000154
URL: ww****in, IP: **.133.40.**:7777, SOCKET = 0x00000114
URL: ww****cc, IP: **.133.40.**:9999, SOCKET = 0x00000138
URL: ww****in, IP: **.133.40.**:7777, SOCKET = 0x0000016c
URL: ww****cc, IP: **.133.40.**:9999, SOCKET = 0x00000174
URL: ww****in, IP: **.133.40.**:7777, SOCKET = 0x00000170
URL: ww****cc, IP: **.133.40.**:9999, SOCKET = 0x0000017c
URL: ww****cc, IP: **.133.40.**:9999, SOCKET = 0x0000016c
URL: ww****cc, IP: **.133.40.**:9999, SOCKET = 0x00000164
Behavior description:按名称获取主机地址
details:gethostbyname: computer
DnsQuery_W: 1.110.110.110.in-addr.arpa.
gethostbyname: ww****in
gethostbyname: ww****cc
DnsQuery_W: 2.110.110.110.in-addr.arpa.
DnsQuery_W: 3.110.110.110.in-addr.arpa.
DnsQuery_W: 4.110.110.110.in-addr.arpa.
DnsQuery_W: 5.110.110.110.in-addr.arpa.
DnsQuery_W: 6.110.110.110.in-addr.arpa.
DnsQuery_W: 7.110.110.110.in-addr.arpa.
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
.Net CLR
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
Behavior description:启动系统服务
details:[服务启动成功]: LocalSystem, Microsoft .Net Framework COM+ Support, C:\WINDOWS\jmvtmm.exe
Behavior description:获取TickCount值
details:TickCount = 5351296, SleepMilliseconds = 500.
TickCount = 5351390, SleepMilliseconds = 500.
TickCount = 5351303, SleepMilliseconds = 100.
TickCount = 7151281, SleepMilliseconds = 1800000.
TickCount = 7151296, SleepMilliseconds = 1800000.
TickCount = 5356778, SleepMilliseconds = 200.
TickCount = 5356987, SleepMilliseconds = 300.
TickCount = 5362200, SleepMilliseconds = 200.
TickCount = 5362925, SleepMilliseconds = 300.
TickCount = 5368450, SleepMilliseconds = 200.
TickCount = 5370484, SleepMilliseconds = 2000.
TickCount = 5374059, SleepMilliseconds = 200.
TickCount = 5376125, SleepMilliseconds = 2000.
TickCount = 5379856, SleepMilliseconds = 200.
TickCount = 5380096, SleepMilliseconds = 300.
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
SE_INC_BASE_PRIORITY_PRIVILEGE
Behavior description:打开事件
details:Global\SvcctrlStartEvent_A3752DX
HookSwitchHookEnabledEvent
_fCanRegisterWithShellService
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Behavior description:可执行文件签名信息
details:C:\WINDOWS\jmvtmm.exe(签名验证: 未通过)
C:\WINDOWS\system32\jmvtmm.exe(签名验证: 未通过)
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 500.
[2]: MilliSeconds = 500.
[3]: MilliSeconds = 200.
[4]: MilliSeconds = 100.
[5]: MilliSeconds = 100.
[6]: MilliSeconds = 100.
[7]: MilliSeconds = 100.
[8]: MilliSeconds = 1800000.
[9]: MilliSeconds = 1800000.
[10]: MilliSeconds = 200.
Behavior description:可执行文件MD5
details:C:\WINDOWS\jmvtmm.exe ---> dc62740fb75914f031ac58d57b474c5d
C:\WINDOWS\system32\jmvtmm.exe ---> dc62740fb75914f031ac58d57b474c5d
Behavior description:打开互斥体
details:ShimCacheMutex
Local\!IETld!Mutex
Behavior description:创建系统服务
details:[服务创建成功]: .Net CLR, C:\WINDOWS\jmvtmm.exe
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号