VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:50
Behavior list
Basic Information
MD5:a87ff4923511ee7dea3fac40c5cce0c6
file type:zip
Production company:
version:
Shell or compiler information:
Subfile information:vbaProject.bindumpFile / 3e6e08b3a8086ac5aa641802dace9c07 / Compound
styles.xmldumpFile / 27b72fcd066a6e364cd36132980ac61a / Unknown
001.docdumpFile / 90309352391cd820648bee20d2b355ef / zip
001.doc / 90309352391cd820648bee20d2b355ef / zip
~_QFPHW2_~.wsfdumpFile / d5ab5b9b3935a0ca2553df3f75267d14 / Unknown
~_M6LMNS_~.jsdumpFile / 04548a2810a28d72f1941879c6b7091b / Unknown
~_TFH4YZ_~.wsfdumpFile / 7caab516ce7f5ad9067039b3c0062cb6 / Unknown
~_VOEO2G_~.wsfdumpFile / 1055a9403795a1f6af72021462a70448 / Unknown
theme1.xmldumpFile / 3191d541839e4d100931377c4c66e0a1 / Unknown
002.zipdumpFile / eba259e5351ad2da5a2b01fe191bfd8e / zip
002.zip / eba259e5351ad2da5a2b01fe191bfd8e / zip
003.zipdumpFile / 51edcd7279ebf535e3fcff4b0d38696d / zip
003.zip / 51edcd7279ebf535e3fcff4b0d38696d / zip
004.zipdumpFile / af84c3511ec3def8837f9f2c3a2b7106 / zip
004.zip / af84c3511ec3def8837f9f2c3a2b7106 / zip
001.zipdumpFile / 4e8e5bcf977d4d11c3ecf4fe73580e19 / zip
001.zip / 4e8e5bcf977d4d11c3ecf4fe73580e19 / zip
settings.xmldumpFile / f979ed1f71ec6044842781eaed3ae814 / Unknown
document.xmldumpFile / 1451a6d0083932c79e036ad12aeefd87 / Unknown
Key behavior
Behavior description:打开注册表_检测虚拟机相关
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Oracle VM VirtualBox Guest Additions
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:获取窗口截图信息
details:Foreground window Info: HWND = 0x00000000, DC = 0x080104c0.
Foreground window Info: HWND = 0x00000000, DC = 0x99010486.
Foreground window Info: HWND = 0x00000000, DC = 0x07010751.
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = , CmdLine = rundll32.exe C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\sonmoga2.rudf,GetMessage
Behavior description:创建进程
details:ImagePath = C:\WINDOWS\system32\rundll32.exe, CmdLine = rundll32.exe C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\sonmoga2.rudf,GetMessage
Behavior description:创建本地线程
details:TargetProcess: WINWORD.EXE, InheritedFromPID = 1944, ProcessID = 2608, ThreadID = 2636, StartAddress = 77E56C7D, Parameter = 001A6640
TargetProcess: WINWORD.EXE, InheritedFromPID = 1944, ProcessID = 2608, ThreadID = 2640, StartAddress = 769AE43B, Parameter = 001A97F8
TargetProcess: WINWORD.EXE, InheritedFromPID = 1944, ProcessID = 2608, ThreadID = 2644, StartAddress = 77E56C7D, Parameter = 001AA6C8
TargetProcess: WINWORD.EXE, InheritedFromPID = 1944, ProcessID = 2608, ThreadID = 2788, StartAddress = 326138F8, Parameter = 04090AE0
TargetProcess: WINWORD.EXE, InheritedFromPID = 1944, ProcessID = 2608, ThreadID = 2888, StartAddress = 65002004, Parameter = 00000000
TargetProcess: WINWORD.EXE, InheritedFromPID = 1944, ProcessID = 2608, ThreadID = 2904, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: WINWORD.EXE, InheritedFromPID = 1944, ProcessID = 2608, ThreadID = 2924, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: WINWORD.EXE, InheritedFromPID = 1944, ProcessID = 2608, ThreadID = 2928, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: WINWORD.EXE, InheritedFromPID = 1944, ProcessID = 2608, ThreadID = 2936, StartAddress = 3264B7DB, Parameter = 00000000
TargetProcess: WINWORD.EXE, InheritedFromPID = 1944, ProcessID = 2608, ThreadID = 3064, StartAddress = 314AB3EA, Parameter = 320FDEB0
TargetProcess: WINWORD.EXE, InheritedFromPID = 1944, ProcessID = 2608, ThreadID = 3096, StartAddress = 314AB3EA, Parameter = 320FDEB0
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Application Data\Microsoft\Templates\~$Normal.dotm
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.Word\~WRS{6691ACD8-57C2-4107-9C56-DDE752C6686D}.tmp
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\~$001.docm
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.Word\~WRF{C15EC358-A80E-495A-BD86-997FD06B703B}.tmp
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.Word\~WRS{9959B5F3-876B-4576-AA6B-7BFAF35239F1}.tmp
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\001.docm.LNK
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\%temp%\****.exe_7zdump.LNK
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFF1AB.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\VBE\MSForms.exd
C:\Documents and Settings\Administrator\Application Data\Microsoft\Forms\WINWORD.box
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFFDEA.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFFE09.tmp
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\nbv364[1]
C:\Documents and Settings\Administrator\Local Settings\Temp\chillys2
C:\Documents and Settings\Administrator\Local Settings\Temp\sonmoga2.rudf
Behavior description:创建可执行文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\chillys2
Behavior description:查找文件
details:FileName = C:\Program Files
FileName = C:\Program Files\Microsoft Office 2007
FileName = C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll
FileName = C:\WINDOWS\Microsoft.NET\Framework\\*
FileName = C:\Program Files\Microsoft Office 2007\Office12\Normal.dotm
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Templates\Normal.dotm
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\桌面
FileName = C:\Documents and Settings\Administrator\Application Data
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Templates
FileName = C:\Documents and Settings\Administrator\My Documents
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\Documents
Behavior description:删除文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\~DFF1AB.tmp
C:\Documents and Settings\Administrator\Application Data\Microsoft\Forms\WINWORD.box
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFFE09.tmp
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\nbv364[1]
Behavior description:复制文件
details:C:\Program Files\Microsoft Office 2007\Office12\OPA12.BAK ---> C:\Program Files\Microsoft Office 2007\Office12\opa12.dat
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:修改文件内容
details:C:\Documents and Settings\Administrator\Application Data\Microsoft\Templates\~$Normal.dotm ---> Offset = 0
C:\Documents and Settings\Administrator\Application Data\Microsoft\Templates\~$Normal.dotm ---> Offset = 54
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.Word\~WRS{6691ACD8-57C2-4107-9C56-DDE752C6686D}.tmp ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\~$001.docm ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\~$001.docm ---> Offset = 54
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.Word\~WRS{9959B5F3-876B-4576-AA6B-7BFAF35239F1}.tmp ---> Offset = 0
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\001.docm.LNK ---> Offset = 0
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\index.dat ---> Offset = 28
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\%temp%\****.exe_7zdump.LNK ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\VBE\MSForms.exd ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\VBE\MSForms.exd ---> Offset = 4
C:\Documents and Settings\Administrator\Local Settings\Temp\VBE\MSForms.exd ---> Offset = 8
C:\Documents and Settings\Administrator\Local Settings\Temp\VBE\MSForms.exd ---> Offset = 12
C:\Documents and Settings\Administrator\Local Settings\Temp\VBE\MSForms.exd ---> Offset = 16
C:\Documents and Settings\Administrator\Local Settings\Temp\chillys2 ---> Offset = 0
Network behavior
Behavior description:下载文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\chillys2
Behavior description:连接指定站点
details:InternetConnectA: ServerName = us****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
Behavior description:打开HTTP连接
details:InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489), hSession = 0x00cc0004
Behavior description:建立到一个指定的套接字连接
details:URL: us****om, IP: **.133.40.**:80, SOCKET = 0x0000070c
Behavior description:读取网络文件
details:hFile = 0x00cc000c, BytesToRead =4096, BytesRead = 4096.
Behavior description:发送HTTP包
details:GET /nbv364 HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: "Mozilla/5.2 (Windows NT 6.2; rv:50.2) Gecko/20200103 Firefox/50.2" Accept-Encoding: gzip, deflate Host: us****om Connection: Keep-Alive
Behavior description:打开HTTP请求
details:HttpOpenRequestA: us****om:80/nbv364, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400000
Behavior description:按名称获取主机地址
details:GetAddrInfoW: us****om
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\Resiliency\StartupItems\w%}
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00002109030000000000000000F01FEC\Usage\ProductFiles
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Common\LanguageResources\EnabledLanguages\2052
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Common\LanguageResources\EnabledLanguages\1033
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00002109030000000000000000F01FEC\Usage\WORDFiles
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\MTTT
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\Resiliency\StartupItems\ 6}
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\Resiliency\StartupItems\.<}
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\Resiliency\StartupItems\{?}
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\Resiliency\StartupItems\6 }
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\Resiliency\StartupItems\4#}
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\Resiliency\StartupItems\l$}
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\Resiliency\StartupItems\f%}
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Common\ReviewCycle\ReviewToken
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\File MRU\Item 1
Behavior description:删除注册表键值
details:\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\Resiliency\StartupItems\ 6}
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\Resiliency\StartupItems\.<}
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\Resiliency\StartupItems\{?}
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\Resiliency\StartupItems\6 }
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\Resiliency\StartupItems\4#}
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\Resiliency\StartupItems\l$}
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\File MRU\Max Display
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\File MRU\Item 1
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\File MRU\Item 2
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\File MRU\Item 3
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\File MRU\Item 4
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\File MRU\Item 5
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\File MRU\Item 6
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\File MRU\Item 7
\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\File MRU\Item 8
Behavior description:打开注册表_检测虚拟机相关
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Oracle VM VirtualBox Guest Additions
Behavior description:删除注册表键
details:\REGISTRY\USER\S-*\Software\Microsoft\Office\12.0\Word\Resiliency\StartupItems\
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.GCompartListMUTEX.DefaultS-*
Global\MTX_MSO_Formal1_S-*
Global\MTX_MSO_AdHoc1_S-*
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
RasPbFile
MSCTF.Shared.MUTEX.ELH
Behavior description:创建事件对象
details:EventName = Local\PrimaryWord12Mutex_S-*
EventName = Global\userenv: User Profile setup event
EventName = DINPUTWINMM
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [mspim_wnd32,]
NtUserFindWindowEx: [Class,Window] = [MSOBALLOON,]
NtUserFindWindowEx: [Class,Window] = [MsoHelp10,]
NtUserFindWindowEx: [Class,Window] = [AgentAnim,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [MsoHelp11,]
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ThunderRT6Main]
[Window,Class] = [,_WwB]
[Window,Class] = [,ComboLBox]
[Window,Class] = [UserForm1,ThunderDFrame]
[Window,Class] = [,DesignerWindow]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
MSFT.VSA.COM.DISABLE.2608
MSFT.VSA.IEC.STATUS.6c736db0
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
_fCanRegisterWithShellService
Global\SvcctrlStartEvent_A3752DX
\INSTALLATION_SECURITY_HOLD
CTF.ThreadMIConnectionEvent.000007B4.00000001.00000056
CTF.ThreadMarshalInterfaceEvent.000007B4.00000001.00000056
MSCTF.SendReceiveConection.Event.ELH.IC
MSCTF.SendReceive.Event.ELH.IC
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000055
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000055
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:窗口信息
details:Pid = 2608, Hwnd=0x15030c, Text = MsoDockTop, ClassName = MsoCommandBarDock.
Pid = 2608, Hwnd=0x40394, Text = Ribbon, ClassName = MsoCommandBar.
Pid = 2608, Hwnd=0x6037e, Text = MsoDockBottom, ClassName = MsoCommandBarDock.
Pid = 2608, Hwnd=0xb03ba, Text = 状态栏, ClassName = MsoCommandBar.
Pid = 2608, Hwnd=0x303d0, Text = 状态栏, ClassName = MsoWorkPane.
Pid = 2608, Hwnd=0x16032e, Text = MsoWorkPane, ClassName = MsoWorkPane.
Pid = 2608, Hwnd=0x40382, Text = MsoWorkPane, ClassName = MsoWorkPane.
Pid = 2608, Hwnd=0x1c02b6, Text = 001.docm - Microsoft Word, ClassName = OpusApp.
Pid = 2980, Hwnd=0x4043c, Text = 确定, ClassName = Button.
Pid = 2980, Hwnd=0x4043e, Text = 加载 C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\sonmoga2.rudf 时出错 %1 不是有效的 Win32 应用程序。 , ClassName = Static.
Pid = 2980, Hwnd=0x6043a, Text = RUNDLL, ClassName = #32770.
Pid = 2608, Hwnd=0x30444, Text = Ribbon, ClassName = MsoWorkPane.
Pid = 2608, Hwnd=0x60384, Text = 001.docm, ClassName = _WwB.
Pid = 2608, Hwnd=0xe0362, Text = MSO Generic Control Container, ClassName = MsoCommandBar.
Pid = 2608, Hwnd=0x50376, Text = MSO Generic Control Container, ClassName = MsoCommandBar.
Behavior description:获取窗口截图信息
details:Foreground window Info: HWND = 0x00000000, DC = 0x080104c0.
Foreground window Info: HWND = 0x00000000, DC = 0x99010486.
Foreground window Info: HWND = 0x00000000, DC = 0x07010751.
Behavior description:可执行文件签名信息
details:C:\Documents and Settings\Administrator\Local Settings\Temp\chillys2(签名验证: 未通过)
Behavior description:枚举窗口
details:N/A
Behavior description:可执行文件MD5
details:C:\Documents and Settings\Administrator\Local Settings\Temp\chillys2 ---> fe1d0ee5901dd167ee9b28eece31786c
Behavior description:打开互斥体
details:ShimCacheMutex
Local\MU_ACBPIDS09_S-1-5-5-0-44034
CtfmonInstMutexDefaultS-*
Global\MTX_MSO_Formal1_S-*
Global\MTX_MSO_AdHoc1_S-*
Local\_!MSFTHISTORY!_
Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Local\c:!documents and settings!administrator!cookies!
Local\c:!documents and settings!administrator!local settings!history!history.ie5!
Local\WininetStartupMutex
Local\WininetConnectionMutex
Local\WininetProxyRegistryMutex
Local\!IETld!Mutex
RasPbFile
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号