VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:77
Behavior list
Behavior analysis report:         Threatbook file behavior analysis report
Basic Information
MD5:385d26128a2c117a2dda6c14dec840ed
file type:Rar
Production company:
version:
Shell or compiler information:
Subfile information:be.exedumpFile / 54da4a3ebae0f043465b781d45eb7e50 / EXE
be.exe / 54da4a3ebae0f043465b781d45eb7e50 / EXE
BOOTFONT.BINdumpFile / 99f68407c9470130eb0f3d7350ec109d / Unknown
BOOTFONT.BIN / 99f68407c9470130eb0f3d7350ec109d / Unknown
NTLDR1 / 2ef2b5825e20a76540662a0333e0d522 / Unknown
NTLDR1dumpFile / 2ef2b5825e20a76540662a0333e0d522 / Unknown
ConsExt.exedumpFile / 71ae72fb2cee3fdac2ece55a7290df07 / EXE
ConsExt.exe / 71ae72fb2cee3fdac2ece55a7290df07 / EXE
bb.exedumpFile / 0e4c7b89452f3fb5a42137e7e43d7b50 / EXE
bb.exe / 0e4c7b89452f3fb5a42137e7e43d7b50 / EXE
bs.exedumpFile / 05a87372cf6f32f99794e8571b44fa2e / EXE
bs.exe / 05a87372cf6f32f99794e8571b44fa2e / EXE
bschk.exedumpFile / 366c14b6d2ec6882699e939db081316e / EXE
bsmbr.exedumpFile / ba33b1f798be1af468918cda0a7d80ef / EXE
bsmbr.exe / ba33b1f798be1af468918cda0a7d80ef / EXE
bschk.exe / 366c14b6d2ec6882699e939db081316e / EXE
NTBOOTautofix.cmd / dd3f9d8048b21af22f220b3a56f87a9a / Unknown
NTBOOTautofix.cmddumpFile / dd3f9d8048b21af22f220b3a56f87a9a / Unknown
reg5.exedumpFile / 322649497639c0836a304a57c5dfb781 / EXE
Key behavior
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ComboLBox]
[Window,Class] = [,Auto-Suggest Dropdown]
Process behavior
Behavior description:创建进程
details:ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd /c ""C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\main.cmd" "
ImagePath = C:\WINDOWS\system32\mode.com, CmdLine = mode con cols=80 lines=25
ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = C:\WINDOWS\system32\cmd.exe /S /D /c" dir ..\NTaufix/ad 2>nul"
ImagePath = C:\WINDOWS\system32\find.exe, CmdLine = find /i "NTaufix"
ImagePath = C:\WINDOWS\system32\reg.exe, CmdLine = reg query HKCU\Console\%SystemRoot%_system32_cmd.exe /v QuickEdit
ImagePath = C:\WINDOWS\system32\reg.exe, CmdLine = reg query HKCU\Console /v QuickEdit
ImagePath = C:\WINDOWS\system32\chcp.com, CmdLine = chcp 936
ImagePath = C:\WINDOWS\system32\chcp.com, CmdLine = chcp 950
ImagePath = C:\WINDOWS\system32\reg.exe, CmdLine = reg unload HKLM\BCD00000000
ImagePath = C:\WINDOWS\system32\reg.exe, CmdLine = reg unload HKLM\BCD00000001
ImagePath = C:\WINDOWS\system32\reg.exe, CmdLine = reg unload HKLM\BCD00000002
ImagePath = C:\WINDOWS\system32\reg.exe, CmdLine = reg unload HKLM\BCD00000003
ImagePath = C:\WINDOWS\system32\reg.exe, CmdLine = REG QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v InstallDate
ImagePath = C:\WINDOWS\system32\find.exe, CmdLine = find /i "InstallDate"
ImagePath = C:\WINDOWS\system32\find.exe, CmdLine = find "\\" autofixx.tmp
Behavior description:创建新文件进程
details:ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\NTaufix\ConsExt.exe, CmdLine = ConsExt /crv 0
ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\NTaufix\bschk.exe, CmdLine = bschk /nt60 sys
ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\NTaufix\ConsExt.exe, CmdLine = ConsExt /event
File behavior
Behavior description:写权限映射文件
details:Local\UrlZonesSM_Administrator
\WINDOWS\system32\zh-cn\ieframe.dll.mui
Behavior description:创建可执行文件
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\reg5.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\attrib5.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\bb.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\be.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\bs.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\bschk.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\bsmbr.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\chcp5.com
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\chz_fix.bcd
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\chzdp.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\ConsExt.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\find5.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\sc.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\mv.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\NTaufix\attrib5.exe
Behavior description:修改文件内容
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\BOOTFONT.BIN---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\main.cmd---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\NTBOOTautofix.cmd---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\NTDETECT.COM---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\NTLDRC---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\NTLDRE---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\NTLDR1---> Offset = 131072
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\NTaufix\BOOTFONT.BIN---> Offset = 262144
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\NTaufix\main.cmd---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\NTaufix\NTBOOTautofix.cmd---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\NTaufix\NTDETECT.COM---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\NTaufix\NTLDR1---> Offset = 262144
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\NTaufix\NTLDRC---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\NTaufix\NTLDRE---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\autofixx.tmp---> Offset = 54
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\X\BaseClass
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\main.cmd
Other behavior
Behavior description:创建互斥体
details:Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
_SHuassist.mtx
SHIMLIB_LOG_MUTEX
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [EDIT,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ComboLBox]
[Window,Class] = [,Auto-Suggest Dropdown]
Behavior description:窗口信息
details:Pid = 1264, Hwnd=0xd01ac, Text = NTBOOTautofix, ClassName = ConsoleWindowClass.
Behavior description:获取系统权限
details:SE_LOAD_DRIVER_PRIVILEGE
SE_RESTORE_PRIVILEGE
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号