VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

File information
Safety rating:78
Behavior list
Basic Information
MD5:30cf940a809b20e93a80cb03070c0077
file type:Rar
Production company:
version:
Shell or compiler information:COMPILER:UPolyX v0.5
Subfile information:Clip Studio Paint EX 32 Crack.vbs / 10e31d173d181f80aaf626165c293f43 / Unknown
Clip Studio Paint EX 64 Crack.vbs / 56e6b346c7d1c86b2d5fb6bd755e5c27 / Unknown
maiinj.dll / 57e637afee79fea103e4e329bdf1aec4 / DLL
maiinj.dll / 30a179f6d4f7b0bba4f35655a6acebfa / DLL
Clip Studio Paint EX 32 Crack.lnk / b95dd46bc702deb57946e065d8bf3b38 / Unknown
Clip Studio Paint EX 64 Crack.lnk / 95b99e3166861e33b21aadda5d071925 / Unknown
Serial.txt / 4950666b582e1c2f88cb1a2ea153b59f / Unknown
Serial.txt / 4950666b582e1c2f88cb1a2ea153b59f / Unknown
Name.txt / 7dfcfb3fd2b5f36cf925d95bb1fa2ef3 / Unknown
Name.txt / 7dfcfb3fd2b5f36cf925d95bb1fa2ef3 / Unknown
Key behavior
Behavior description:获取TickCount值
details:TickCount = 232197, SleepMilliseconds = 10.
TickCount = 232369, SleepMilliseconds = 10.
TickCount = 232385, SleepMilliseconds = 10.
TickCount = 232400, SleepMilliseconds = 10.
TickCount = 232431, SleepMilliseconds = 10.
TickCount = 232806, SleepMilliseconds = 10.
Process behavior
Behavior description:创建进程
details:[0x00000cb8]ImagePath = C:\WINDOWS\system32\wscript.exe, CmdLine = "C:\WINDOWS\System32\WScript.exe" "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\WinUpdat.vbs"
Behavior description:创建新文件进程
details:[0x00000c5c]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\yhthjyj45678tfgtjtyjyt.cmd, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\yhthjyj45678tfgtjtyjyt.cmd
[0x00000c8c]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\WinUpdat.exe, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\WinUpdat.exe
Behavior description:创建本地线程
details:TargetProcess: wscript.exe, InheritedFromPID = 2000, ProcessID = 2804, ThreadID = 2816, StartAddress = 01002FD4, Parameter = 008E44E8
TargetProcess: wscript.exe, InheritedFromPID = 2000, ProcessID = 2804, ThreadID = 2820, StartAddress = 765E964D, Parameter = 001BCD68
TargetProcess: wscript.exe, InheritedFromPID = 2000, ProcessID = 2804, ThreadID = 3120, StartAddress = 77E56C7D, Parameter = 001B6F98
TargetProcess: wscript.exe, InheritedFromPID = 2000, ProcessID = 2804, ThreadID = 3124, StartAddress = 769AE43B, Parameter = 001F9FA0
TargetProcess: wscript.exe, InheritedFromPID = 2000, ProcessID = 2804, ThreadID = 3172, StartAddress = 5A225840, Parameter = 008E8110
TargetProcess: yhthjyj45678tfgtjtyjyt.cmd, InheritedFromPID = 2804, ProcessID = 3164, ThreadID = 3192, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: yhthjyj45678tfgtjtyjyt.cmd, InheritedFromPID = 2804, ProcessID = 3164, ThreadID = 3196, StartAddress = 0044B5CB, Parameter = 016B3010
TargetProcess: wscript.exe, InheritedFromPID = 3164, ProcessID = 3256, ThreadID = 3264, StartAddress = 01002FD4, Parameter = 008E4450
TargetProcess: wscript.exe, InheritedFromPID = 3164, ProcessID = 3256, ThreadID = 3292, StartAddress = 765E964D, Parameter = 001F70D8
TargetProcess: wscript.exe, InheritedFromPID = 3164, ProcessID = 3256, ThreadID = 3296, StartAddress = 77E56C7D, Parameter = 001F1308
TargetProcess: wscript.exe, InheritedFromPID = 3164, ProcessID = 3256, ThreadID = 3300, StartAddress = 769AE43B, Parameter = 01A9BEE0
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\yhthjyj45678tfgtjtyjyt.cmd
C:\Documents and Settings\Administrator\Local Settings\Temp\aut3.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\WinUpdat.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\aut4.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\WinUpdat.vbs
Behavior description:创建可执行文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\yhthjyj45678tfgtjtyjyt.cmd
C:\Documents and Settings\Administrator\Local Settings\Temp\WinUpdat.exe
Behavior description:修改脚本文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\WinUpdat.vbs ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\WinUpdat.vbs ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Temp\WinUpdat.vbs ---> Offset = 118784
Behavior description:覆盖已有文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\aut3.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\aut4.tmp
Behavior description:查找文件
details:FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\Crack
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\Crack\32
FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
FileName = C:\Documents and Settings\ADMINI~1
FileName = C:\Documents and Settings\Administrator\LOCALS~1
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp\yhthjyj45678tfgtjtyjyt.cmd
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\WinUpdat.exe
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\WinUpdat.vbs
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
Behavior description:删除文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\aut3.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\aut4.tmp
Behavior description:修改文件内容
details:C:\Documents and Settings\Administrator\Local Settings\Temp\yhthjyj45678tfgtjtyjyt.cmd ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\yhthjyj45678tfgtjtyjyt.cmd ---> Offset = 2048
C:\Documents and Settings\Administrator\Local Settings\Temp\yhthjyj45678tfgtjtyjyt.cmd ---> Offset = 4096
C:\Documents and Settings\Administrator\Local Settings\Temp\yhthjyj45678tfgtjtyjyt.cmd ---> Offset = 6144
C:\Documents and Settings\Administrator\Local Settings\Temp\yhthjyj45678tfgtjtyjyt.cmd ---> Offset = 8192
C:\Documents and Settings\Administrator\Local Settings\Temp\aut3.tmp ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\aut3.tmp ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Temp\aut3.tmp ---> Offset = 90112
C:\Documents and Settings\Administrator\Local Settings\Temp\WinUpdat.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\WinUpdat.exe ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Temp\WinUpdat.exe ---> Offset = 131072
C:\Documents and Settings\Administrator\Local Settings\Temp\WinUpdat.exe ---> Offset = 155648
C:\Documents and Settings\Administrator\Local Settings\Temp\aut4.tmp ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\aut4.tmp ---> Offset = 24576
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\WINDOWS\System32\WScript.exe
Other behavior
Behavior description:检测自身是否被调试
details:IsDebuggerPresent
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
Behavior description:创建事件对象
details:EventName = Global\crypt32LogoffEvent
EventName = Global\userenv: User Profile setup event
EventName = DINPUTWINMM
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
Behavior description:打开事件
details:MSFT.VSA.COM.DISABLE.2804
MSFT.VSA.IEC.STATUS.6c736db0
Global\crypt32LogoffEvent
HookSwitchHookEnabledEvent
_fCanRegisterWithShellService
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
MSFT.VSA.COM.DISABLE.3256
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000012
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000012
Behavior description:获取TickCount值
details:TickCount = 232197, SleepMilliseconds = 10.
TickCount = 232369, SleepMilliseconds = 10.
TickCount = 232385, SleepMilliseconds = 10.
TickCount = 232400, SleepMilliseconds = 10.
TickCount = 232431, SleepMilliseconds = 10.
TickCount = 232806, SleepMilliseconds = 10.
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:窗口信息
details:Pid = 3212, Hwnd=0x10416, Text = 确定, ClassName = Button.
Pid = 3212, Hwnd=0x10418, Text = 破解失败,也许已经破解过了?, ClassName = Static.
Pid = 3212, Hwnd=0x20412, Text = Info, ClassName = #32770.
Pid = 3212, Hwnd=0x20344, Text = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\WinUpdat.exe, ClassName = ConsoleWindowClass.
Pid = 3256, Hwnd=0x30412, Text = 确定, ClassName = Button.
Pid = 3256, Hwnd=0x20416, Text = 脚本: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\WinUpdat.vbs 行: 0 字符: 1 错误: 写入文件失败。 代码: 800A0BBC 源: ADODB.Stream , ClassName = Static.
Pid = 3256, Hwnd=0x50344, Text = Windows Script Host, ClassName = #32770.
Behavior description:可执行文件签名信息
details:C:\Documents and Settings\Administrator\Local Settings\Temp\yhthjyj45678tfgtjtyjyt.cmd(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\WinUpdat.exe(签名验证: 未通过)
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 10.
[2]: MilliSeconds = 10.
[3]: MilliSeconds = 10.
[4]: MilliSeconds = 10.
[5]: MilliSeconds = 10.
[6]: MilliSeconds = 10.
[7]: MilliSeconds = 10.
[8]: MilliSeconds = 10.
[9]: MilliSeconds = 10.
[10]: MilliSeconds = 10.
Behavior description:隐藏指定窗口
details:[Window,Class] = [AutoIt v3,AutoIt v3]
Behavior description:可执行文件MD5
details:C:\Documents and Settings\Administrator\Local Settings\Temp\yhthjyj45678tfgtjtyjyt.cmd ---> c20198361ef1ffca6eaed948b94b647e
C:\Documents and Settings\Administrator\Local Settings\Temp\WinUpdat.exe ---> fbea12ff8adcd8027c3c805965439890
Behavior description:打开互斥体
details:ShimCacheMutex
Local\!IETld!Mutex
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号