VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:55
Behavior list
Basic Information
MD5:14164bfd9aad1fb2f3d950e0ed9340b8
file type:EXE
Production company:Sysinternals - www.sysinternals.com
version:11.22.0.0---11.22
Shell or compiler information:COMPILER:Microsoft Visual Studio .NET 2005 -- 2008 -> Microsoft Corporation [Overlay] *
Key behavior
Behavior description:打开注册表_检测虚拟机相关
details:\REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\C:\Program Files\VMware\VMware Tools\VMwareTray.exe
\REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\C:\Program Files\VMware\VMware Tools\VSock SDK\bin\win32\vsocklib.dll
\REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\C:\Program Files\VMware\VMware Tools\VMwareUser.exe
\REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\C:\Program Files\VMware\VMware Tools\TPAutoConnSvc.exe
\REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\C:\Program Files\VMware\VMware Tools\TPVCGateway.exe
\REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\C:\Program Files\VMware\VMware Tools\vmtoolsd.exe
\REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\C:\Program Files\VMware\VMware Tools\VMUpgradeHelper.exe
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\VMware Physical Disk Helper Service
Behavior description:获取文件属性探测虚拟机
details:GetFileAttributes: FileName = C:\WINDOWS\system32\VBoxMRXNP.dll
GetFileAttributes: FileName = C:\WINDOWS\system32\VBoxMRXNP.dll.exe
GetFileAttributes: FileName = C:\WINDOWS\system32\VBoxMRXNP.dll.dll
GetFileAttributes: FileName = C:\Program Files\VMware\VMware Tools\VMwareTray.exe
GetFileAttributes: FileName = C:\Program Files\VMware\VMware Tools\VMwareTray.exe.exe
GetFileAttributes: FileName = C:\Program Files\VMware\VMware Tools\VMwareTray.exe.dll
GetFileAttributes: FileName = C:\Program Files\VMware\VMware
GetFileAttributes: FileName = C:\Program Files\VMware\VMware.exe
GetFileAttributes: FileName = C:\Program Files\VMware\VMware.dll
GetFileAttributes: FileName = C:\Program Files\VMware\VMware Tools\VSock
GetFileAttributes: FileName = C:\Program Files\VMware\VMware Tools\VSock SDK\bin\win32\vsocklib.dll
GetFileAttributes: FileName = C:\Program Files\VMware\VMware Tools\VSock SDK\bin\win32\vsocklib.dll.exe
GetFileAttributes: FileName = C:\Program Files\VMware\VMware Tools\VSock SDK\bin\win32\vsocklib.dll.dll
GetFileAttributes: FileName = C:\Program Files\VMware\VMware Tools\VSock.exe
GetFileAttributes: FileName = C:\Program Files\VMware\VMware Tools\VSock.dll
Process behavior
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2876, StartAddress = 00446298, Parameter = 00B154D8
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2880, StartAddress = 00446298, Parameter = 00B156F8
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2884, StartAddress = 00446298, Parameter = 00B15918
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2888, StartAddress = 00446298, Parameter = 00B15B38
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2892, StartAddress = 00446298, Parameter = 00B15D58
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2896, StartAddress = 00446298, Parameter = 00B15F78
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2900, StartAddress = 00446298, Parameter = 00B16198
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2904, StartAddress = 00446298, Parameter = 00B163B8
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2908, StartAddress = 00446298, Parameter = 00B165D8
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2912, StartAddress = 00446298, Parameter = 00B167F8
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2916, StartAddress = 00446298, Parameter = 00B16A18
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2920, StartAddress = 00446298, Parameter = 00B16C38
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2924, StartAddress = 00446298, Parameter = 00B16E58
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2928, StartAddress = 00446298, Parameter = 00B17078
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2932, StartAddress = 00446298, Parameter = 00B17298
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:获取文件属性探测虚拟机
details:GetFileAttributes: FileName = C:\WINDOWS\system32\VBoxMRXNP.dll
GetFileAttributes: FileName = C:\WINDOWS\system32\VBoxMRXNP.dll.exe
GetFileAttributes: FileName = C:\WINDOWS\system32\VBoxMRXNP.dll.dll
GetFileAttributes: FileName = C:\Program Files\VMware\VMware Tools\VMwareTray.exe
GetFileAttributes: FileName = C:\Program Files\VMware\VMware Tools\VMwareTray.exe.exe
GetFileAttributes: FileName = C:\Program Files\VMware\VMware Tools\VMwareTray.exe.dll
GetFileAttributes: FileName = C:\Program Files\VMware\VMware
GetFileAttributes: FileName = C:\Program Files\VMware\VMware.exe
GetFileAttributes: FileName = C:\Program Files\VMware\VMware.dll
GetFileAttributes: FileName = C:\Program Files\VMware\VMware Tools\VSock
GetFileAttributes: FileName = C:\Program Files\VMware\VMware Tools\VSock SDK\bin\win32\vsocklib.dll
GetFileAttributes: FileName = C:\Program Files\VMware\VMware Tools\VSock SDK\bin\win32\vsocklib.dll.exe
GetFileAttributes: FileName = C:\Program Files\VMware\VMware Tools\VSock SDK\bin\win32\vsocklib.dll.dll
GetFileAttributes: FileName = C:\Program Files\VMware\VMware Tools\VSock.exe
GetFileAttributes: FileName = C:\Program Files\VMware\VMware Tools\VSock.dll
Behavior description:查找文件
details:FileName = C:\WINDOWS
FileName = C:\WINDOWS\system32
FileName = C:\WINDOWS\system32\autochk.exe
FileName = C:\Program Files\Common Files\Adobe
FileName = C:\WINDOWS\system32\DRIVERS
FileName = C:\WINDOWS\system32\advapi32.dll
FileName = C:\Program Files\Common Files\Adobe\Acrobat
FileName = C:\WINDOWS\system32\DRIVERS\ACPI.sys
FileName = C:\WINDOWS\system32\mswsock.dll
FileName = C:\WINDOWS\system32\logonui.exe
FileName = C:\Program Files\Common Files\Adobe\Acrobat\ActiveX
FileName = C:\WINDOWS\system32\mscoree.dll
FileName = C:\WINDOWS\system32\midimap.dll
FileName = C:\WINDOWS\system32\localspl.dll
FileName = C:\WINDOWS\System32
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Sysinternals\AutoRuns\EulaAccepted
\REGISTRY\USER\S-*\Software\Sysinternals\AutoRuns\xpos
\REGISTRY\USER\S-*\Software\Sysinternals\AutoRuns\ypos
\REGISTRY\USER\S-*\Software\Sysinternals\AutoRuns\宽
\REGISTRY\USER\S-*\Software\Sysinternals\AutoRuns\高
\REGISTRY\USER\S-*\Software\Sysinternals\AutoRuns\showall
\REGISTRY\USER\S-*\Software\Sysinternals\AutoRuns\shownomicrosoft
\REGISTRY\USER\S-*\Software\Sysinternals\AutoRuns\shownowindows
\REGISTRY\USER\S-*\Software\Sysinternals\AutoRuns\verifysignatures
\REGISTRY\USER\S-*\Software\Sysinternals\AutoRuns\字体
\REGISTRY\USER\S-*\Software\Sysinternals\AutoRuns\列0
\REGISTRY\USER\S-*\Software\Sysinternals\AutoRuns\columnPos0
\REGISTRY\USER\S-*\Software\Sysinternals\AutoRuns\列1
\REGISTRY\USER\S-*\Software\Sysinternals\AutoRuns\columnPos1
\REGISTRY\USER\S-*\Software\Sysinternals\AutoRuns\列2
Behavior description:打开注册表_检测虚拟机相关
details:\REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\C:\Program Files\VMware\VMware Tools\VMwareTray.exe
\REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\C:\Program Files\VMware\VMware Tools\VSock SDK\bin\win32\vsocklib.dll
\REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\C:\Program Files\VMware\VMware Tools\VMwareUser.exe
\REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\C:\Program Files\VMware\VMware Tools\TPAutoConnSvc.exe
\REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\C:\Program Files\VMware\VMware Tools\TPVCGateway.exe
\REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\C:\Program Files\VMware\VMware Tools\vmtoolsd.exe
\REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\C:\Program Files\VMware\VMware Tools\VMUpgradeHelper.exe
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\VMware Physical Disk Helper Service
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
MSCTF.Shared.MUTEX.MFK
Behavior description:创建事件对象
details:EventName = Global\crypt32LogoffEvent
EventName = MSCTF.SendReceive.Event.MFK.IC
EventName = MSCTF.SendReceiveConection.Event.MFK.IC
EventName = Global\userenv: User Profile setup event
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [OleMainThreadWndClass,]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
Global\crypt32LogoffEvent
_fCanRegisterWithShellService
Behavior description:调整进程token权限
details:SE_DEBUG_PRIVILEGE
SE_IMPERSONATE_PRIVILEGE
SE_RESTORE_PRIVILEGE
SE_LOAD_DRIVER_PRIVILEGE
Behavior description:窗口信息
details:Pid = 2648, Hwnd=0x10344, Text = 您可以使用 /accepteula 命令行来接受最终用户许可协议。, ClassName = Static.
Pid = 2648, Hwnd=0x10346, Text = 同意(&A), ClassName = Button.
Pid = 2648, Hwnd=0x10348, Text = 拒绝(&D), ClassName = Button.
Pid = 2648, Hwnd=0x1034a, Text = 打印(&P), ClassName = Button.
Pid = 2648, Hwnd=0x1034c, Text = SYSINTERNALS SOFTWARE LICENSE TERMS These license terms are an agreement between Sysinternals (a wholly owned subsidiary of Micro, ClassName = RICHEDIT.
Pid = 2648, Hwnd=0x10340, Text = AutoRuns 许可协议, ClassName = #32770.
Pid = 2648, Hwnd=0x20348, Text = List2, ClassName = SysListView32.
Pid = 2648, Hwnd=0x2034e, Text = (按 Esc 取消)扫描中..., ClassName = Static.
Pid = 2648, Hwnd=0x10354, Text = 版本:, ClassName = Static.
Pid = 2648, Hwnd=0x10356, Text = 时间:, ClassName = Static.
Pid = 2648, Hwnd=0x10358, Text = 大小:, ClassName = Static.
Pid = 2648, Hwnd=0x1035c, Text = Static, ClassName = Static.
Pid = 2648, Hwnd=0x1035e, Text = Static, ClassName = Static.
Pid = 2648, Hwnd=0x10360, Text = Static, ClassName = Static.
Pid = 2648, Hwnd=0x10364, Text = 隐藏 Windows 条目。, ClassName = Static.
Behavior description:隐藏指定窗口
details:[Window,Class] = [,Edit]
[Window,Class] = [,Static]
[Window,Class] = [大小:,Static]
[Window,Class] = [Static,Static]
[Window,Class] = [时间:,Static]
[Window,Class] = [版本:,Static]
Behavior description:打开互斥体
details:ShimCacheMutex
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号