VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:60
Behavior list
Basic Information
MD5:03b24581b31b6aab563503e7b0cedcc2
file type:EXE
Production company:
version:1.0.0.0---1.0.0.0
Shell or compiler information:COMPILER:Microsoft Visual C# / Basic .NET
Key behavior
Behavior description:直接获取CPU时钟
details:EAX = 0xf28991f8, EDX = 0x0000039c
EAX = 0xf5116181, EDX = 0x0000039c
EAX = 0xf51161cd, EDX = 0x0000039c
EAX = 0xf7c46149, EDX = 0x0000039c
EAX = 0x398f6dc7, EDX = 0x0000039d
EAX = 0x5693a557, EDX = 0x0000039d
EAX = 0x9b11b105, EDX = 0x0000039d
EAX = 0x9b11b151, EDX = 0x0000039d
EAX = 0x9b11b19d, EDX = 0x0000039d
EAX = 0xc003b6ca, EDX = 0x0000039d
Behavior description:获取TickCount值
details:TickCount = 1169406, SleepMilliseconds = 60000.
TickCount = 1169421, SleepMilliseconds = 60000.
TickCount = 1169546, SleepMilliseconds = 60000.
TickCount = 1169625, SleepMilliseconds = 60000.
TickCount = 1169640, SleepMilliseconds = 60000.
TickCount = 1169671, SleepMilliseconds = 60000.
TickCount = 1169687, SleepMilliseconds = 60000.
TickCount = 1169734, SleepMilliseconds = 60000.
TickCount = 1169781, SleepMilliseconds = 60000.
TickCount = 1170250, SleepMilliseconds = 60000.
TickCount = 1171250, SleepMilliseconds = 60000.
TickCount = 1172250, SleepMilliseconds = 60000.
TickCount = 1173250, SleepMilliseconds = 60000.
TickCount = 1174250, SleepMilliseconds = 60000.
TickCount = 1175250, SleepMilliseconds = 60000.
Process behavior
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:创建文件
details:C:\Users\Administrator\AppData\Local\%temp%\BypassRuntm.dll
C:\Users\Administrator\AppData\Local\GDIPFONTCACHEV1.DAT
Behavior description:创建可执行文件
details:C:\Users\Administrator\AppData\Local\%temp%\BypassRuntm.dll
Behavior description:修改文件内容
details:C:\Users\Administrator\AppData\Local\%temp%\BypassRuntm.dll ---> Offset = 0
Behavior description:查找文件
details:FileName = C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll
FileName = C:\Windows\Microsoft.NET\Framework\\*
FileName = C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\*
FileName = C:\Users
FileName = C:\Users\Administrator\AppData
FileName = C:\Users\Administrator\AppData\Local
FileName = C:\Users\Administrator\AppData\Local\Temp
FileName = C:\Users\Administrator\AppData\Local\%temp%
FileName = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe
FileName = C:\Users\Administrator
FileName = C:\Windows\assembly\NativeImages_v4.0.30319_32\RuntmUpdate\*
FileName = C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Windows.Forms\*
FileName = C:\Windows\assembly\NativeImages_v4.0.30319_32\System\*
FileName = C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Drawing\*
FileName = C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\*
Network behavior
Behavior description:建立到一个指定的套接字连接
details:URL: ww****cn, IP: **.133.40.**:443, SOCKET = 0x00000400
Behavior description:按名称获取主机地址
details:GetAddrInfoW: ww****cn
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\GDIPlus\FontCachePath
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASAPI32\EnableFileTracing
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASAPI32\EnableConsoleTracing
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASAPI32\FileTracingMask
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASAPI32\ConsoleTracingMask
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASAPI32\MaxFileSize
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASAPI32\FileDirectory
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASMANCS\EnableFileTracing
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASMANCS\EnableConsoleTracing
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASMANCS\FileTracingMask
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASMANCS\ConsoleTracingMask
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASMANCS\MaxFileSize
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASMANCS\FileDirectory
Other behavior
Behavior description:检测自身是否被调试
details:IsDebuggerPresent
Behavior description:创建互斥体
details:RasPbFile
Behavior description:创建事件对象
details:EventName = Global\CPFATE_4024_v4.0.30319
Behavior description:打开互斥体
details:Local\MSCTF.Asm.MutexDefault1
RasPbFile
Behavior description:窗口信息
details:Pid = 4024, Hwnd=0x100284, Text = statusStrip1, ClassName = WindowsForms10.Window.8.app.0.141b42a_r14_ad1.
Pid = 4024, Hwnd=0x1102a6, Text = 自动更新, ClassName = WindowsForms10.Window.8.app.0.141b42a_r14_ad1.
Behavior description:获取TickCount值
details:TickCount = 1169406, SleepMilliseconds = 60000.
TickCount = 1169421, SleepMilliseconds = 60000.
TickCount = 1169546, SleepMilliseconds = 60000.
TickCount = 1169625, SleepMilliseconds = 60000.
TickCount = 1169640, SleepMilliseconds = 60000.
TickCount = 1169671, SleepMilliseconds = 60000.
TickCount = 1169687, SleepMilliseconds = 60000.
TickCount = 1169734, SleepMilliseconds = 60000.
TickCount = 1169781, SleepMilliseconds = 60000.
TickCount = 1170250, SleepMilliseconds = 60000.
TickCount = 1171250, SleepMilliseconds = 60000.
TickCount = 1172250, SleepMilliseconds = 60000.
TickCount = 1173250, SleepMilliseconds = 60000.
TickCount = 1174250, SleepMilliseconds = 60000.
TickCount = 1175250, SleepMilliseconds = 60000.
Behavior description:调整进程token权限
details:SE_DEBUG_PRIVILEGE
Behavior description:打开事件
details:Global\CLR_PerfMon_StartEnumEvent
\KernelObjects\LowMemoryCondition
HookSwitchHookEnabledEvent
Local\MSCTF.CtfActivated.Default1
Local\MSCTF.AsmCacheReady.Default1
Global\SvcctrlStartEvent_A3752DX
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
MSFT.VSA.COM.DISABLE.4024
MSFT.VSA.IEC.STATUS.6c736db0
Behavior description:可执行文件签名信息
details:C:\Users\Administrator\AppData\Local\%temp%\BypassRuntm.dll(签名验证: 未通过)
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 60000.
[2]: MilliSeconds = 60000.
[3]: MilliSeconds = -1.
[4]: MilliSeconds = 20.
Behavior description:可执行文件MD5
details:C:\Users\Administrator\AppData\Local\%temp%\BypassRuntm.dll ---> 839aec670d705c3cca340e5d26d51181
Behavior description:直接获取CPU时钟
details:EAX = 0xf28991f8, EDX = 0x0000039c
EAX = 0xf5116181, EDX = 0x0000039c
EAX = 0xf51161cd, EDX = 0x0000039c
EAX = 0xf7c46149, EDX = 0x0000039c
EAX = 0x398f6dc7, EDX = 0x0000039d
EAX = 0x5693a557, EDX = 0x0000039d
EAX = 0x9b11b105, EDX = 0x0000039d
EAX = 0x9b11b151, EDX = 0x0000039d
EAX = 0x9b11b19d, EDX = 0x0000039d
EAX = 0xc003b6ca, EDX = 0x0000039d
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号