VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:f4d7534afc72e6480c2f06b765e04a77
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 跨进程写入数据
details: TargetProcess = przesylka _n 000094758840W _PDF.exe, WriteAddress = 0x00400000, Size = 1024
TargetProcess = przesylka _n 000094758840W _PDF.exe, WriteAddress = 0x00401000, Size = 15360
TargetProcess = przesylka _n 000094758840W _PDF.exe, WriteAddress = 0x00405000, Size = 3072
TargetProcess = przesylka _n 000094758840W _PDF.exe, WriteAddress = 0x00406000, Size = 1536
TargetProcess = przesylka _n 000094758840W _PDF.exe, WriteAddress = 0x00407000, Size = 4096
TargetProcess = przesylka _n 000094758840W _PDF.exe, WriteAddress = 0x00408000, Size = 153088
TargetProcess = przesylka _n 000094758840W _PDF.exe, WriteAddress = 0x7ffdd008, Size = 4
TargetProcess = explorer.exe, WriteAddress = 0x7c80c0e8, Size = 4
C:\WINDOWS\explorer.exe
TargetProcess = explorer.exe, WriteAddress = 0x02890000, Size = 792
TargetProcess = Simulator.exe, WriteAddress = 0x7c80c0e8, Size = 4
C:\monitor\Simulator.exe
TargetProcess = Simulator.exe, WriteAddress = 0x00ce0000, Size = 792
TargetProcess = Simulator.exe, WriteAddress = 0x00cf0000, Size = 792
TargetProcess = Simulator.exe, WriteAddress = 0x01410000, Size = 792
Behavior description: 隐藏指定窗口
details: [Window,Class] = [QQ2013,TXGuiFoundation]
[Window,Class] = [OP_2269840561,CTXOPConntion_Class]
[Window,Class] = [,BrowserFrameGripperClass]
[Window,Class] = [Windows Internet Explorer,IEFrame]
[Window,Class] = [缩放级别,ToolbarWindow32]
[Window,Class] = [,msctls_progress32]
Behavior description: 设置消息钩子
details: C:\WINDOWS\Explorer.EXE
Behavior description: 创建远程线程
details: C:\WINDOWS\explorer.exe
C:\monitor\Simulator.exe
Behavior description: 设置线程上下文
details: C:\monitor\sample.exe_7zdump\przesylka _n 000094758840W _PDF.exe
C:\WINDOWS\explorer.exe
C:\monitor\Simulator.exe
C:\Program Files\Internet Explorer\iexplore.exe
Behavior description: 自删除
details: C:\monitor\sample.exe_7zdump\przesylka _n 000094758840W _PDF.exe
Behavior description: 跨进程写代码段数据
details: C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00401A25, EntryPoint = 0x00401A25
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache
C:\Documents and Settings\Administrator\IECompatCache
Behavior description: 按名称获取主机地址
details: wpad
www.yixun.com
Behavior description: 通过内存映射跨进程修改内存
details: TargetProcess = explorer.exe
TargetProcess = Simulator.exe
TargetProcess = iexplore.exe
Behavior description: 修改注册表_启动项
details: \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Run\comcm700

Process behavior

Behavior description: 隐藏窗口创建进程
details: ImagePath = , CmdLine = "c:\monitor\sample.exe_7zdump\1352421.bat" "c:\monitor\sample.exe_7zdump\przesylka _n 000094758840w _pdf.exe"
ImagePath = c:\program files\internet explorer\iexplore.exe, CmdLine = "c:\program files\internet explorer\iexplore.exe" http://www.yixun.com/
Behavior description: 跨进程写入数据
details: TargetProcess = przesylka _n 000094758840W _PDF.exe, WriteAddress = 0x00400000, Size = 1024
TargetProcess = przesylka _n 000094758840W _PDF.exe, WriteAddress = 0x00401000, Size = 15360
TargetProcess = przesylka _n 000094758840W _PDF.exe, WriteAddress = 0x00405000, Size = 3072
TargetProcess = przesylka _n 000094758840W _PDF.exe, WriteAddress = 0x00406000, Size = 1536
TargetProcess = przesylka _n 000094758840W _PDF.exe, WriteAddress = 0x00407000, Size = 4096
TargetProcess = przesylka _n 000094758840W _PDF.exe, WriteAddress = 0x00408000, Size = 153088
TargetProcess = przesylka _n 000094758840W _PDF.exe, WriteAddress = 0x7ffdd008, Size = 4
TargetProcess = explorer.exe, WriteAddress = 0x7c80c0e8, Size = 4
C:\WINDOWS\explorer.exe
TargetProcess = explorer.exe, WriteAddress = 0x02890000, Size = 792
TargetProcess = Simulator.exe, WriteAddress = 0x7c80c0e8, Size = 4
C:\monitor\Simulator.exe
TargetProcess = Simulator.exe, WriteAddress = 0x00ce0000, Size = 792
TargetProcess = Simulator.exe, WriteAddress = 0x00cf0000, Size = 792
TargetProcess = Simulator.exe, WriteAddress = 0x01410000, Size = 792
Behavior description: 创建新文件进程
details: ImagePath = c:\monitor\sample.exe_7zdump\przesylka _n 000094758840w _pdf.exe, CmdLine = "c:\monitor\sample.exe_7zdump\przesylka _n 000094758840w _pdf.exe"
Behavior description: 创建进程
details: ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd /c ""c:\monitor\sample.exe_7zdump\1352421.bat" "c:\monitor\sample.exe_7zdump\przesylka _n 000094758840w _pdf.exe""
ImagePath = C:\WINDOWS\system32\attrib.exe, CmdLine = attrib -r -s -h "c:\monitor\sample.exe_7zdump\przesylka _n 000094758840w _pdf.exe"
ImagePath = C:\Program Files\Internet Explorer\IEXPLORE.EXE, CmdLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.yixun.com/
ImagePath = C:\Program Files\Internet Explorer\IEXPLORE.EXE, CmdLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:79873
Behavior description: 创建远程线程
details: C:\WINDOWS\explorer.exe
C:\monitor\Simulator.exe
Behavior description: 设置线程上下文
details: C:\monitor\sample.exe_7zdump\przesylka _n 000094758840W _PDF.exe
C:\WINDOWS\explorer.exe
C:\monitor\Simulator.exe
C:\Program Files\Internet Explorer\iexplore.exe
Behavior description: 枚举进程
details: N/A
Behavior description: 跨进程写代码段数据
details: C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00401A25, EntryPoint = 0x00401A25
Behavior description: 通过内存映射跨进程修改内存
details: TargetProcess = explorer.exe
TargetProcess = Simulator.exe
TargetProcess = iexplore.exe

File behavior

Behavior description: 写权限映射文件
details: Global\Cor_Private_IPCBlock_872
Global\Cor_Public_IPCBlock_872
Local\UrlZonesSM_Administrator
DfSharedHeapBE3EB
\WINDOWS\system32\zh-cn\wshext.dll.mui
\WINDOWS\system32\zh-cn\ieframe.dll.mui
Internet Explorer Immutable Application State (0000094C-0000-0000-0000-000000000000)
Local\SqmData_IESQM-2380_S-1-5-21-1482476501-1645522239-1417001333-500
ie_lcie_main_94c
Isolation Process Registry (749F00D7-3E5A-11E4-B5D3-000C2938259F)
Isolation Signal Registry (749F00D7-3E5A-11E4-B5D3-000C2938259F, 0)
ie_lcie_LogonMedium
Local\IEFrame!GetAsyncKeyStateSharedMem!2380
ie_lcie_ConnHashTable<2380>
AtlDebugAllocator_FileMappingNameStatic3_94c
Behavior description: 创建可执行文件
details: C:\WINDOWS\system32\d3diuoui.exe
Behavior description: 修改文件内容
details: C:\monitor\sample.exe_7zdump\1352421.bat---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\D2F4.tmp---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\dnserrordiagoff[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\ErrorPageTemplate[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6P4O8QNJ\errorPageStrings[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\httpErrorPagesScripts[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\noConnect[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\bullet[2]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\background_gradient[2]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\down[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\favcenter[2]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\tools[1]---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\1F30.tmp---> Offset = 0
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache
C:\Documents and Settings\Administrator\IECompatCache
Behavior description: 自删除
details: C:\monitor\sample.exe_7zdump\przesylka _n 000094758840W _PDF.exe

Network behavior

Behavior description: 下载文件
details: URLDownloadToFileW: http://www.live.com/favicon.ico ---> C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Behavior description: 连接指定站点
details: InternetConnectA: ServerName = whaugirls.ru, PORT = 80
Behavior description: 建立到一个指定的套接字连接
details: 127.0.0.1:1040
Behavior description: 读取网络文件
details: hFile = 0x000006a4, BytesToRead =4096, BytesRead = 4096.
Behavior description: 打开HTTP请求
details: HttpOpenRequestA: whaugirls.ru:80/tyssva.php?ctvwox=5olaf81+xbvtlltvsufxdscam+iuflpuyb9g8orf67lyvukcpu2xinyt/73zkserounvfg1+cbl6mfqzrjknnulguxka00uo9adfozy+7wmlgdnnxg7zfumttswiq8hm, hConnect = 0x000006d8
Behavior description: 按名称获取主机地址
details: wpad
www.yixun.com

Registry behavior

Behavior description: 删除注册表键
details: \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\{63800dac-e7ca-4df9-9a5c-20765055488d}
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}
Behavior description: 修改注册表
details: \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\50F945AA-6F7C-027F-7984-1356BDF8F7EA\Install
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\AppDataLow\50F945AA-6F7C-027F-7984-1356BDF8F7EA\Client
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\X\BaseClass
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\ShellNoRoam\MUICache\c:\monitor\sample.exe_7zdump\1352421.bat
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\SessionInformation\ProgramCount
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Internet Explorer\SQM\PIDs\PID_2380
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Internet Explorer\Recovery\Active\{749F00DA-3E5A-11E4-B5D3-000C2938259F}
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\{63800dac-e7ca-4df9-9a5c-20765055488d}\Enable
\REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1EA4DBF0-3C3B-11CF-810C-00AA00389B71}\1.1\0\win32\
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Count
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Time
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTime
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTimeCount
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath
Behavior description: 删除注册表键值
details: \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0\Expiration
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1\Expiration
Behavior description: 删除注册表键值_IE连接设置
details: \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
Behavior description: 修改注册表_启动项
details: \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Run\comcm700

Other behavior

Behavior description: 创建互斥体
details: {108352BD-2FFB-C26E-3944-D3167DB8B7AA}
Local\{2C2E614D-9BD3-3E74-8520-FF528954A3A6}
{188F16F4-97C7-0A40-E1CC-BBDEA5C01FF2}
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
SHIMLIB_LOG_MUTEX
{2CBA6696-9BEF-3EE0-8520-FF528954A3A6}
Local\{060C0F45-ADF3-2841-679A-31DC8B6EF5D0}
Local\{E459E696-F35B-B670-9D58-D74A210CFB1E}
IESQM-2380_S-1-5-21-1482476501-1645522239-1417001333-500
IExplore.Sqm.psenr
Local\!BrowserEmulation!SharedMemory!Mutex
{24D5D4AB-331E-F6CD-DD98-178A614C3B5E}
Behavior description: 隐藏指定窗口
details: [Window,Class] = [QQ2013,TXGuiFoundation]
[Window,Class] = [OP_2269840561,CTXOPConntion_Class]
[Window,Class] = [,BrowserFrameGripperClass]
[Window,Class] = [Windows Internet Explorer,IEFrame]
[Window,Class] = [缩放级别,ToolbarWindow32]
[Window,Class] = [,msctls_progress32]
Behavior description: 设置消息钩子
details: C:\WINDOWS\Explorer.EXE
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [TXGuiFoundation,QQ2013]
NtUserFindWindowEx: [Class,Window] = [CTXOPConntion_Class,OP_2269840561]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
NtUserFindWindowEx: [Class,Window] = [Static,]
Behavior description: 获取系统权限
details: SE_LOAD_DRIVER_PRIVILEGE
Behavior description: 枚举窗口
details: N/A
Behavior description: 内联HOOK
details: C:\WINDOWS\system32\kernel32.dll--->CreateProcessInternalWSecure Offset = 0x3b09
C:\WINDOWS\system32\kernel32.dll--->WaitForSingleObjectEx Offset = 0x29c
C:\WINDOWS\system32\kernel32.dll--->CreateProcessInternalWSecure Offset = 0x3b0e
C:\WINDOWS\system32\kernel32.dll--->WaitForSingleObjectEx Offset = 0x28c
C:\WINDOWS\system32\SHELL32.dll--->SHLockShared Offset = 0x5635201
C:\WINDOWS\system32\SHELL32.dll--->SHLockShared Offset = 0x5634e05
C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll--->_CRT_RTC_INIT Offset = 0x42a1
C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll--->_CRT_RTC_INIT Offset = 0x429d