VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:60
Behavior list
Basic Information
MD5:2ea71cb70e1743de1b41fd13d3147bb3
file type:EXE
Production company:
version:3.6.17.109---3.6.17.109
Shell or compiler information:PACKER:UPX 0.89.6 - 1.02 / 1.05 - 1.24 -> Markus & Laszlo [Overlay]
Subfile information:upx_c_6808c070dumpFile / c33b20aab24eac254ef9f85540885abc / EXE
Key behavior
Behavior description:自删除
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = , CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\scratch.bat
Behavior description:创建进程
details:[0x00000b4c]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd /c C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\scratch.bat
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2796, ThreadID = 2844, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2796, ThreadID = 2872, StartAddress = 004499DF, Parameter = 0112B3E0
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\aut3.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\2796exinjyl
C:\Documents and Settings\Administrator\Local Settings\Temp\scratch.bat
Behavior description:修改脚本文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\scratch.bat ---> Offset = 0
Behavior description:覆盖已有文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\aut3.tmp
Behavior description:查找文件
details:FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\2796exinjyl
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\fxdhlbq
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\996ECA.exe
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\996ED3.exe
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\rwiosow
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nyduwtm
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\996ECZ.exe
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\scratch.bat
FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
Behavior description:删除文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\aut3.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\2796exinjyl
C:\Documents and Settings\Administrator\Local Settings\Temp\scratch.bat
Behavior description:修改文件内容
details:C:\Documents and Settings\Administrator\Local Settings\Temp\aut3.tmp ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\aut3.tmp ---> Offset = 24576
C:\Documents and Settings\Administrator\Local Settings\Temp\2796exinjyl ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\2796exinjyl ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Temp\2796exinjyl ---> Offset = 131072
C:\Documents and Settings\Administrator\Local Settings\Temp\2796exinjyl ---> Offset = 159744
Behavior description:自删除
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
Other behavior
Behavior description:检测自身是否被调试
details:IsDebuggerPresent
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
SetupSetupEx!!####
Behavior description:创建事件对象
details:EventName = Global\userenv: User Profile setup event
EventName = DINPUTWINMM
EventName = ShellCopyEngineRunning
EventName = Global\crypt32LogoffEvent
EventName = ShellCopyEngineFinished
Behavior description:调整进程token权限
details:SE_DEBUG_PRIVILEGE
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
Global\crypt32LogoffEvent
Behavior description:隐藏指定窗口
details:[Window,Class] = [AutoIt v3,AutoIt v3]
Behavior description:打开互斥体
details:ShimCacheMutex
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号