VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

File information
Safety rating:30
Behavior list
Basic Information
MD5:3bc938e3e8e65cb4a22c66423a549427
file type:EXE
Production company:
version:
Shell or compiler information:COMPILER:Microsoft Visual Studio .NET 2005 -- 2008 -> Microsoft Corporation [RAR SFX] *
Subfile information:db.rar / 60c2b58b2fe14d41358424bab083a9d8 / Unknown
elpkk.vbs / ebcee991d1fd69485dd415196c249558 / Unknown
rar.exe / 061f64173293969577916832be29b90d / EXE
xvyv.bat / fdf1cf797bdd156c4a69fd5540e32621 / Unknown
Key behavior
Behavior description:杀掉进程
details:TASKKILL = taskkill /F /IM build.exe
Behavior description:获取TickCount值
details:TickCount = 223968, SleepMilliseconds = 1000.
Behavior description:设置启动项
details:C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\explorer.lnk
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = , CmdLine = "C:\Windows\miner\xvyv.bat"
ImagePath = , CmdLine = "C:\Windows\miner\mpvff.bat"
Behavior description:创建进程
details:[0x00000bbc]ImagePath = C:\WINDOWS\system32\wscript.exe, CmdLine = "C:\WINDOWS\System32\WScript.exe" "C:\Windows\miner\elpkk.vbs"
[0x00000c10]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd /c ""C:\Windows\miner\xvyv.bat" "
[0x00000c40]ImagePath = C:\WINDOWS\system32\wscript.exe, CmdLine = "C:\WINDOWS\System32\WScript.exe" "C:\Windows\miner\segiyg.vbs"
[0x00000c58]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd /c ""C:\Windows\miner\mpvff.bat" "
[0x00000c78]ImagePath = C:\WINDOWS\system32\powercfg.exe, CmdLine = powercfg -change -standby-timeout-ac 0
[0x00000c80]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = C:\WINDOWS\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq taskmgr.exe"
[0x00000c88]ImagePath = C:\WINDOWS\system32\tasklist.exe, CmdLine = tasklist /NH /FI "IMAGENAME eq taskmgr.exe"
[0x00000d0c]ImagePath = C:\WINDOWS\system32\taskkill.exe, CmdLine = taskkill /F /IM build.exe
[0x00000d48]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = C:\WINDOWS\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq taskmgr.exe"
[0x00000d50]ImagePath = C:\WINDOWS\system32\tasklist.exe, CmdLine = tasklist /NH /FI "IMAGENAME eq taskmgr.exe"
[0x00000d68]ImagePath = C:\WINDOWS\system32\taskkill.exe, CmdLine = taskkill /F /IM build.exe
[0x00000db0]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = C:\WINDOWS\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq taskmgr.exe"
[0x00000dbc]ImagePath = C:\WINDOWS\system32\tasklist.exe, CmdLine = tasklist /NH /FI "IMAGENAME eq taskmgr.exe"
[0x00000dec]ImagePath = C:\WINDOWS\system32\taskkill.exe, CmdLine = taskkill /F /IM build.exe
[0x00000e18]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = C:\WINDOWS\system32\cmd.exe /c tasklist /NH /FI "IMAGENAME eq taskmgr.exe"
Behavior description:创建本地线程
details:TargetProcess: wscript.exe, InheritedFromPID = 2860, ProcessID = 3004, ThreadID = 3020, StartAddress = 01002FD4, Parameter = 008E4110
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2860, ThreadID = 3024, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: wscript.exe, InheritedFromPID = 2860, ProcessID = 3004, ThreadID = 3044, StartAddress = 765E964D, Parameter = 001BCC00
TargetProcess: wscript.exe, InheritedFromPID = 2860, ProcessID = 3004, ThreadID = 3080, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: wscript.exe, InheritedFromPID = 3088, ProcessID = 3136, ThreadID = 3144, StartAddress = 01002FD4, Parameter = 008E4150
TargetProcess: wscript.exe, InheritedFromPID = 3088, ProcessID = 3136, ThreadID = 3152, StartAddress = 765E964D, Parameter = 001BCC00
TargetProcess: wscript.exe, InheritedFromPID = 3088, ProcessID = 3136, ThreadID = 3156, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: tasklist.exe, InheritedFromPID = 3200, ProcessID = 3208, ThreadID = 3216, StartAddress = 77E56C7D, Parameter = 000EAC50
TargetProcess: tasklist.exe, InheritedFromPID = 3200, ProcessID = 3208, ThreadID = 3220, StartAddress = 769AE43B, Parameter = 000ED5F0
TargetProcess: tasklist.exe, InheritedFromPID = 3200, ProcessID = 3208, ThreadID = 3224, StartAddress = 77E56C7D, Parameter = 000EDD78
TargetProcess: taskkill.exe, InheritedFromPID = 3160, ProcessID = 3340, ThreadID = 3376, StartAddress = 77E56C7D, Parameter = 000EAC28
TargetProcess: taskkill.exe, InheritedFromPID = 3160, ProcessID = 3340, ThreadID = 3380, StartAddress = 769AE43B, Parameter = 000ED5C8
TargetProcess: taskkill.exe, InheritedFromPID = 3160, ProcessID = 3340, ThreadID = 3384, StartAddress = 77E56C7D, Parameter = 000EDD50
TargetProcess: tasklist.exe, InheritedFromPID = 3400, ProcessID = 3408, ThreadID = 3420, StartAddress = 77E56C7D, Parameter = 000EAC50
TargetProcess: tasklist.exe, InheritedFromPID = 3400, ProcessID = 3408, ThreadID = 3424, StartAddress = 769AE43B, Parameter = 000ED5F0
Behavior description:创建新文件进程
details:[0x00000c18]ImagePath = C:\WINDOWS\miner\rar.exe, CmdLine = "Rar.exe" e -p4558 db.rar
Behavior description:杀掉进程
details:TASKKILL = taskkill /F /IM build.exe
File behavior
Behavior description:创建文件
details:C:\WINDOWS\miner\__tmp_rar_sfx_access_check_220015
C:\WINDOWS\miner\rar.exe
C:\WINDOWS\miner\db.rar
C:\WINDOWS\miner\xvyv.bat
C:\WINDOWS\miner\elpkk.vbs
C:\WINDOWS\miner\1.txt
C:\WINDOWS\miner\segiyg.vbs
C:\WINDOWS\miner\mpvff.bat
C:\WINDOWS\miner\config.json
C:\WINDOWS\miner\build.exe
Behavior description:创建可执行文件
details:C:\WINDOWS\miner\rar.exe
C:\WINDOWS\miner\build.exe
Behavior description:修改脚本文件
details:C:\WINDOWS\miner\xvyv.bat ---> Offset = 0
C:\WINDOWS\miner\elpkk.vbs ---> Offset = 0
C:\WINDOWS\miner\segiyg.vbs ---> Offset = 0
C:\WINDOWS\miner\mpvff.bat ---> Offset = 0
Behavior description:查找文件
details:FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
FileName = rar.exe
FileName = \\?\C:\Windows\miner\rar.exe
FileName = db.rar
FileName = \\?\C:\Windows\miner\db.rar
FileName = xvyv.bat
FileName = \\?\C:\Windows\miner\xvyv.bat
FileName = elpkk.vbs
FileName = \\?\C:\Windows\miner\elpkk.vbs
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\「开始」菜单
FileName = C:\Documents and Settings\Administrator\「开始」菜单\程序
FileName = C:\Documents and Settings\Administrator\「开始」菜单\程序\启动
FileName = C:\Windows
Behavior description:设置启动项
details:C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\explorer.lnk
Behavior description:删除文件
details:C:\WINDOWS\miner\__tmp_rar_sfx_access_check_220015
C:\WINDOWS\miner\elpkk.vbs
C:\WINDOWS\miner\1.txt
Behavior description:修改文件内容
details:C:\WINDOWS\miner\rar.exe ---> Offset = 0
C:\WINDOWS\miner\rar.exe ---> Offset = 65536
C:\WINDOWS\miner\rar.exe ---> Offset = 131072
C:\WINDOWS\miner\rar.exe ---> Offset = 196608
C:\WINDOWS\miner\rar.exe ---> Offset = 262144
C:\WINDOWS\miner\db.rar ---> Offset = 0
C:\WINDOWS\miner\db.rar ---> Offset = 262144
C:\Documents and Settings\Administrator\「开始」菜单\程序\启动\explorer.lnk ---> Offset = 0
C:\WINDOWS\miner\config.json ---> Offset = 0
C:\WINDOWS\miner\build.exe ---> Offset = 0
C:\WINDOWS\miner\build.exe ---> Offset = 65536
C:\WINDOWS\miner\build.exe ---> Offset = 196608
C:\WINDOWS\miner\build.exe ---> Offset = 262144
C:\WINDOWS\miner\build.exe ---> Offset = 327680
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\WINDOWS\System32\WScript.exe
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\Windows\miner\xvyv.bat
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\Windows\miner\mpvff.bat
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
_SHuassist.mtx
Behavior description:创建事件对象
details:EventName = Global\userenv: User Profile setup event
EventName = Global\crypt32LogoffEvent
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [EDIT,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [,]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
_fCanRegisterWithShellService
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Global\crypt32LogoffEvent
MSFT.VSA.COM.DISABLE.3004
MSFT.VSA.IEC.STATUS.6c736db0
MSFT.VSA.COM.DISABLE.3136
MSFT.VSA.COM.DISABLE.3208
MSFT.VSA.COM.DISABLE.3340
MSFT.VSA.COM.DISABLE.3408
MSFT.VSA.COM.DISABLE.3432
Behavior description:获取TickCount值
details:TickCount = 223968, SleepMilliseconds = 1000.
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
SE_SHUTDOWN_PRIVILEGE
SE_DEBUG_PRIVILEGE
Behavior description:枚举窗口
details:N/A
Behavior description:可执行文件签名信息
details:C:\WINDOWS\miner\rar.exe(签名验证: 未通过)
C:\WINDOWS\miner\build.exe(签名验证: 未通过)
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 1000.
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ComboLBox]
[Window,Class] = [,Auto-Suggest Dropdown]
[Window,Class] = [&Обзор...,Button]
[Window,Class] = [C:\Windows\miner,ComboBox]
Behavior description:可执行文件MD5
details:C:\WINDOWS\miner\rar.exe ---> 061f64173293969577916832be29b90d
C:\WINDOWS\miner\build.exe ---> 9992218786997671dd09e20d33cc07c7
Behavior description:打开互斥体
details:ShimCacheMutex
Local\!IETld!Mutex
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号