VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:60
Behavior list
Basic Information
MD5:c01f8aba9602aa5997e0c0df2f013277
file type:Rar
Production company:
version:
Shell or compiler information:COMPILER:UPX 0.89.6 - 1.02 / 1.05 - 1.24 -> Markus & Laszlo
Subfile information:upx_c_65284711dumpFile / 9146931dc7c1d7a3933d77167a43c76f / EXE
upx_c_80268ecedumpFile / 74f24f7a581211adb5b04f8b98fda55b / EXE
remove.exedumpFile / 3ef074bffcb400ca61b62f91f7b77bd6 / EXE
remove.exe / 3ef074bffcb400ca61b62f91f7b77bd6 / EXE
restore.exedumpFile / 1c0fb1b74b40432fe93b33807afa2f9d / EXE
restore.exe / 1c0fb1b74b40432fe93b33807afa2f9d / EXE
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = "C:\WINDOWS\system32\cmd.exe" /c remove.bat
Behavior description:创建进程
details:ImagePath = C:\WINDOWS\system32\wscript.exe, CmdLine = "C:\WINDOWS\System32\WScript.exe" "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\runbat.vbs"
ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = "C:\WINDOWS\system32\cmd.exe" /c remove.bat
ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = C:\WINDOWS\system32\cmd.exe /c cscript tmp.vbs //nologo //e:vbscript
ImagePath = C:\WINDOWS\system32\cscript.exe, CmdLine = cscript tmp.vbs //nologo //e:vbscript
Behavior description:创建本地线程
details:TargetProcess: wscript.exe, InheritedFromPID = 2568, ProcessID = 2632, ThreadID = 2640, StartAddress = 01002FD4, Parameter = 008E4440
TargetProcess: wscript.exe, InheritedFromPID = 2568, ProcessID = 2632, ThreadID = 2644, StartAddress = 765E964D, Parameter = 001BCC10
TargetProcess: wscript.exe, InheritedFromPID = 2568, ProcessID = 2632, ThreadID = 2648, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: cscript.exe, InheritedFromPID = 2672, ProcessID = 2680, ThreadID = 2688, StartAddress = 01002A66, Parameter = 008E3FA8
TargetProcess: cscript.exe, InheritedFromPID = 2672, ProcessID = 2680, ThreadID = 2708, StartAddress = 765E964D, Parameter = 001BCE58
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\FP4C.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\remove.bat
C:\Documents and Settings\Administrator\Local Settings\Temp\RemoveFocusRect.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\runbat.vbs
C:\Documents and Settings\Administrator\Local Settings\Temp\tmp.vbs
Behavior description:创建可执行文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\RemoveFocusRect.dll
Behavior description:覆盖已有文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\FP4C.tmp
Behavior description:查找文件
details:FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\My Documents
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\Documents
FileName = C:\Documents and Settings\Administrator\桌面
FileName = C:\Documents and Settings\All Users\桌面
FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\runbat.vbs
FileName = C:\WINDOWS
FileName = C:\WINDOWS\System32
FileName = C:\WINDOWS\System32\WScript.exe
Behavior description:删除文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\FP4C.tmp
Behavior description:修改BAT脚本文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\remove.bat ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\runbat.vbs ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\tmp.vbs ---> Offset = 0
Behavior description:修改文件内容
details:C:\Documents and Settings\Administrator\Local Settings\Temp\FP4C.tmp ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\RemoveFocusRect.dll ---> Offset = 0
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\WINDOWS\System32\WScript.exe
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.MHK
Behavior description:创建事件对象
details:EventName = Global\crypt32LogoffEvent
EventName = MSCTF.SendReceive.Event.MHK.IC
EventName = MSCTF.SendReceiveConection.Event.MHK.IC
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
_fCanRegisterWithShellService
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
MSFT.VSA.COM.DISABLE.2632
MSFT.VSA.IEC.STATUS.6c736db0
Global\crypt32LogoffEvent
MSFT.VSA.COM.DISABLE.2680
CTF.ThreadMIConnectionEvent.000007B4.00000000.0000003F
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.0000003F
MSCTF.SendReceiveConection.Event.ELH.IC
MSCTF.SendReceive.Event.ELH.IC
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000040
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000040
Behavior description:可执行文件签名信息
details:C:\Documents and Settings\Administrator\Local Settings\Temp\RemoveFocusRect.dll(签名验证: 未通过)
Behavior description:可执行文件MD5
details:C:\Documents and Settings\Administrator\Local Settings\Temp\RemoveFocusRect.dll ---> 818f7749eaa4b523da958c18d701f89a
Behavior description:打开互斥体
details:Local\!IETld!Mutex
ShimCacheMutex
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号