VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

File information
Safety rating:77
Behavior list
Basic Information
MD5:094b91aea9655f89df83d80779195a54
file type:EXE
Production company:
version:1.0.0.0---1.0.0.0
Shell or compiler information:COMPILER:Microsoft Visual C# / Basic .NET
Key behavior
Behavior description:直接获取CPU时钟
details:EAX = 0xd72b3985, EDX = 0x000000b4
EAX = 0x85448569, EDX = 0x000000b5
EAX = 0x854485b5, EDX = 0x000000b5
EAX = 0x87cc553e, EDX = 0x000000b5
EAX = 0x87cc558a, EDX = 0x000000b5
EAX = 0x8a7f5506, EDX = 0x000000b5
EAX = 0x8a7f5552, EDX = 0x000000b5
EAX = 0xa7838ce2, EDX = 0x000000b5
EAX = 0xa7838d2e, EDX = 0x000000b5
EAX = 0xb4d75977, EDX = 0x000000b5
Process behavior
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2632, ThreadID = 2644, StartAddress = 79F0237F, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2632, ThreadID = 2648, StartAddress = 79F91FCF, Parameter = 001A5780
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2632, ThreadID = 2700, StartAddress = 4AEA7456, Parameter = 00000000
File behavior
Behavior description:覆盖已有文件
details:C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
Behavior description:查找文件
details:FileName = C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll
FileName = C:\WINDOWS\Microsoft.NET\Framework\\*
FileName = C:\WINDOWS
FileName = C:\WINDOWS\WinSxS
FileName = C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll
FileName = C:\WINDOWS\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.INI
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\996E.INI
FileName = C:\WINDOWS\assembly\GAC_MSIL\Microsoft.VisualBasic\8.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.INI
FileName = C:\WINDOWS\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.INI
Other behavior
Behavior description:检测自身是否被调试
details:IsDebuggerPresent
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
MSCTF.Shared.MUTEX.MEK
Behavior description:创建事件对象
details:EventName = Global\CorDBIPCSetupSyncEvent_2632
EventName = MSCTF.SendReceive.Event.MEK.IC
EventName = MSCTF.SendReceiveConection.Event.MEK.IC
Behavior description:打开互斥体
details:ShimCacheMutex
Global\CLR_CASOFF_MUTEX
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:打开事件
details:Global\CLR_PerfMon_StartEnumEvent
\KernelObjects\LowMemoryCondition
HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007E8.00000000.0000000F
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.0000000F
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
Behavior description:窗口信息
details:Pid = 2632, Hwnd=0x1034c, Text = 破解微信密码, ClassName = WindowsForms10.BUTTON.app.0.378734a.
Pid = 2632, Hwnd=0x1034e, Text = 软件注册, ClassName = WindowsForms10.BUTTON.app.0.378734a.
Pid = 2632, Hwnd=0x10350, Text = 联系我们, ClassName = WindowsForms10.BUTTON.app.0.378734a.
Pid = 2632, Hwnd=0x10352, Text = 开始破解密码, ClassName = WindowsForms10.BUTTON.app.0.378734a.
Pid = 2632, Hwnd=0x10354, Text = 111111, ClassName = WindowsForms10.EDIT.app.0.378734a.
Pid = 2632, Hwnd=0x10356, Text = 请输入微信账号, ClassName = WindowsForms10.STATIC.app.0.378734a.
Pid = 2632, Hwnd=0x10358, Text = 查询当前位置, ClassName = WindowsForms10.BUTTON.app.0.378734a.
Pid = 2632, Hwnd=0x1035a, Text = 强制查看朋友圈, ClassName = WindowsForms10.BUTTON.app.0.378734a.
Pid = 2632, Hwnd=0x1035c, Text = 强制查看微信, ClassName = WindowsForms10.BUTTON.app.0.378734a.
Pid = 2632, Hwnd=0x1035e, Text = 查询聊天记录, ClassName = WindowsForms10.BUTTON.app.0.378734a.
Pid = 2632, Hwnd=0x10360, Text = StatusStrip1, ClassName = WindowsForms10.Window.8.app.0.378734a.
Pid = 2632, Hwnd=0x2034a, Text = QQ客服:228589645 www.qqmam.top , ClassName = WindowsForms10.Window.8.app.0.378734a.
Behavior description:直接获取CPU时钟
details:EAX = 0xd72b3985, EDX = 0x000000b4
EAX = 0x85448569, EDX = 0x000000b5
EAX = 0x854485b5, EDX = 0x000000b5
EAX = 0x87cc553e, EDX = 0x000000b5
EAX = 0x87cc558a, EDX = 0x000000b5
EAX = 0x8a7f5506, EDX = 0x000000b5
EAX = 0x8a7f5552, EDX = 0x000000b5
EAX = 0xa7838ce2, EDX = 0x000000b5
EAX = 0xa7838d2e, EDX = 0x000000b5
EAX = 0xb4d75977, EDX = 0x000000b5
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号