VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:fabfa8da1c49a4e74ebe450c47facc1b
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 设置特殊文件夹属性
details: C:\System32
Behavior description: 设置特殊文件属性
details: C:\System32\%temp%\1461600772.163688.exe
Behavior description: 获取窗口截图信息
details: Foreground window Info: HWND = 0x00000000, DC = 0x0e010495.
Foreground window Info: HWND = 0x00000000, DC = 0x08010485.
Behavior description: 获取TickCount值
details: TickCount = 486719, SleepMilliseconds = 1.
TickCount = 486969, SleepMilliseconds = 1.
TickCount = 487969, SleepMilliseconds = 1.
TickCount = 488969, SleepMilliseconds = 1.
TickCount = 489969, SleepMilliseconds = 1.
TickCount = 490985, SleepMilliseconds = 1.
TickCount = 492001, SleepMilliseconds = 1.
TickCount = 493001, SleepMilliseconds = 1.
TickCount = 494016, SleepMilliseconds = 1.
TickCount = 495032, SleepMilliseconds = 1.
TickCount = 496063, SleepMilliseconds = 1.
TickCount = 497047, SleepMilliseconds = 1.
TickCount = 498047, SleepMilliseconds = 1.
TickCount = 499047, SleepMilliseconds = 1.
TickCount = 500047, SleepMilliseconds = 1.
Behavior description: 跨进程写入数据
details: TargetProcess = C:\WINDOWS\system32\wscript.exe, WriteAddress = 0x00010000, Size = 0x000007c2
TargetProcess = C:\WINDOWS\system32\wscript.exe, WriteAddress = 0x00020000, Size = 0x00000778
TargetProcess = C:\WINDOWS\system32\wscript.exe, WriteAddress = 0x7ffde010, Size = 0x00000004
TargetProcess = C:\WINDOWS\system32\wscript.exe, WriteAddress = 0x00030000, Size = 0x00000184
TargetProcess = C:\WINDOWS\system32\wscript.exe, WriteAddress = 0x7ffde1e8, Size = 0x00000004

Process behavior

Behavior description: 跨进程写入数据
details: TargetProcess = C:\WINDOWS\system32\wscript.exe, WriteAddress = 0x00010000, Size = 0x000007c2
TargetProcess = C:\WINDOWS\system32\wscript.exe, WriteAddress = 0x00020000, Size = 0x00000778
TargetProcess = C:\WINDOWS\system32\wscript.exe, WriteAddress = 0x7ffde010, Size = 0x00000004
TargetProcess = C:\WINDOWS\system32\wscript.exe, WriteAddress = 0x00030000, Size = 0x00000184
TargetProcess = C:\WINDOWS\system32\wscript.exe, WriteAddress = 0x7ffde1e8, Size = 0x00000004
Behavior description: 创建本地线程
details: TargetProcess: %temp%\1461600772.105428.exe, InheritedFromPID = 1944, ProcessID = 1868, ThreadID = 124, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: %temp%\1461600772.105807.exe, InheritedFromPID = 1944, ProcessID = 1868, ThreadID = 716, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: %temp%\1461600772.106182.exe, InheritedFromPID = 1944, ProcessID = 1868, ThreadID = 484, StartAddress = 004011C7, Parameter = 00000000
TargetProcess: %temp%\1461600772.106557.exe, InheritedFromPID = 1944, ProcessID = 1868, ThreadID = 1392, StartAddress = 00401DD8, Parameter = 00000000
TargetProcess: %temp%\1461600772.106931.exe, InheritedFromPID = 1944, ProcessID = 1868, ThreadID = 1856, StartAddress = 00402131, Parameter = 00000000
TargetProcess: %temp%\1461600772.107307.exe, InheritedFromPID = 1944, ProcessID = 1868, ThreadID = 1388, StartAddress = 00402296, Parameter = 00000000
TargetProcess: wscript.exe, InheritedFromPID = 1868, ProcessID = 180, ThreadID = 1044, StartAddress = 01002FD4, Parameter = 008E4488
TargetProcess: %temp%\1461600772.107964.exe, InheritedFromPID = 1944, ProcessID = 1868, ThreadID = 1344, StartAddress = 00492B50, Parameter = 00E272E0
TargetProcess: %temp%\1461600772.108338.exe, InheritedFromPID = 1944, ProcessID = 1868, ThreadID = 1476, StartAddress = 00492BC0, Parameter = 00E272E0
TargetProcess: %temp%\1461600772.108713.exe, InheritedFromPID = 1944, ProcessID = 1868, ThreadID = 412, StartAddress = 00492C30, Parameter = 00E272E0
TargetProcess: wscript.exe, InheritedFromPID = 1868, ProcessID = 180, ThreadID = 568, StartAddress = 765E964D, Parameter = 001BD0E0
TargetProcess: %temp%\1461600772.109375.exe, InheritedFromPID = 1944, ProcessID = 1868, ThreadID = 1884, StartAddress = 004011C7, Parameter = 00000000
TargetProcess: %temp%\1461600772.109751.exe, InheritedFromPID = 1944, ProcessID = 1868, ThreadID = 148, StartAddress = 00401DD8, Parameter = 00000000
TargetProcess: %temp%\1461600772.110125.exe, InheritedFromPID = 1944, ProcessID = 1868, ThreadID = 1668, StartAddress = 00402131, Parameter = 00000000
TargetProcess: %temp%\1461600772.110501.exe, InheritedFromPID = 1944, ProcessID = 1868, ThreadID = 1008, StartAddress = 00402296, Parameter = 00000000
Behavior description: 枚举进程
details: N/A
Behavior description: 创建进程
details: ImagePath = C:\WINDOWS\system32\wscript.exe, CmdLine = "C:\WINDOWS\System32\WScript.exe" "C:\Documents and Settings\Administrator\Application Data\Microsoft\VBS1.vbs"

File behavior

Behavior description: 创建文件
details: C:\System32\%temp%\1461600772.001155.exe
C:\Documents and Settings\Administrator\Application Data\Microsoft\VBS1.vbs
Behavior description: 创建可执行文件
details: C:\System32\%temp%\1461600771.976956.exe
Behavior description: 复制文件
details: C:\Documents and Settings\Administrator\Local Settings\%temp%\mcplanuch.exe ---> C:\System32\mcplanuch.exe
Behavior description: 设置特殊文件属性
details: C:\System32\%temp%\1461600772.163688.exe
Behavior description: 查找文件
details: FileName = C:\Documents and Settings\Administrator\Application Data\%temp%\1461600772.229846.exe
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\VBS1.vbs
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\My Documents
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\Documents
FileName = C:\Documents and Settings\Administrator\桌面
FileName = C:\Documents and Settings\All Users\桌面
FileName = C:\WINDOWS
FileName = C:\WINDOWS\System32
FileName = C:\WINDOWS\System32\WScript.exe
FileName = C:\WINDOWS\system32
FileName = C:\WINDOWS\system32\wscript.exe
FileName = C:\System32\%temp%\1461600772.232774.exe
Behavior description: 修改BAT脚本文件
details: C:\Documents and Settings\Administrator\Application Data\Microsoft\VBS1.vbs ---> Offset = 0
Behavior description: 重命名文件
details: C:\Documents and Settings\Administrator\Local Settings\%temp%\1461600772.102102.exe ---> C:\Documents and Settings\Administrator\Application Data\%temp%\1461600772.102102.exe
Behavior description: 设置特殊文件夹属性
details: C:\System32
Behavior description: 修改文件内容
details: C:\System32\%temp%\1461600772.102606.exe ---> Offset = 0

Network behavior

Behavior description: 建立到一个指定的套接字连接
details: URL: , IP: 192.168.239.1:3000, SOCKET = 0x000005a4

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\WINDOWS\System32\WScript.exe

Other behavior

Behavior description: 创建互斥体
details: RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
SHIMLIB_LOG_MUTEX
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.ABD
Behavior description: 创建事件对象
details: EventName = DINPUTWINMM
EventName = Global\userenv: User Profile setup event
EventName = Global\crypt32LogoffEvent
EventName = MSCTF.SendReceive.Event.ABD.IC
EventName = MSCTF.SendReceiveConection.Event.ABD.IC
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [#32770,视频源]
NtUserFindWindowEx: [Class,Window] = [,Windows 脚本宿主设置]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description: 获取TickCount值
details: TickCount = 486719, SleepMilliseconds = 1.
TickCount = 486969, SleepMilliseconds = 1.
TickCount = 487969, SleepMilliseconds = 1.
TickCount = 488969, SleepMilliseconds = 1.
TickCount = 489969, SleepMilliseconds = 1.
TickCount = 490985, SleepMilliseconds = 1.
TickCount = 492001, SleepMilliseconds = 1.
TickCount = 493001, SleepMilliseconds = 1.
TickCount = 494016, SleepMilliseconds = 1.
TickCount = 495032, SleepMilliseconds = 1.
TickCount = 496063, SleepMilliseconds = 1.
TickCount = 497047, SleepMilliseconds = 1.
TickCount = 498047, SleepMilliseconds = 1.
TickCount = 499047, SleepMilliseconds = 1.
TickCount = 500047, SleepMilliseconds = 1.
Behavior description: 调整进程token权限
details: SE_LOAD_DRIVER_PRIVILEGE
Behavior description: 获取窗口截图信息
details: Foreground window Info: HWND = 0x00000000, DC = 0x0e010495.
Foreground window Info: HWND = 0x00000000, DC = 0x08010485.
Behavior description: 可执行文件签名信息
details: C:\System32\%temp%\1461600772.167953.exe(签名验证: 未通过)
Behavior description: 隐藏指定窗口
details: [Window,Class] = [,_EL_Timer]
[Window,Class] = [,Afx:400000:8]
[Window,Class] = [帮助,Button]
Behavior description: 可执行文件MD5
details: C:\System32\%temp%\1461600772.167275.exe ---> b4aecf6244c2f5310589092e8d2b958f