VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

File information
Safety rating:50
Behavior list
Basic Information
MD5:1a2cae9fbf490d3934477126c27e5cf9
file type:EXE
Production company:SQ
version:1.4.0.0---1.4.0.0
Shell or compiler information:COMPILER:Elan
Key behavior
Behavior description:屏蔽窗口关闭消息
details:hWnd = 0x00010342, Text = 局域网监测v1.4, ClassName = WTWindow.
Behavior description:直接获取CPU时钟
details:EAX = 0xb24442fb, EDX = 0x000000b4
EAX = 0xb2444347, EDX = 0x000000b4
EAX = 0xb2444393, EDX = 0x000000b4
EAX = 0xb24443df, EDX = 0x000000b4
EAX = 0xb244442b, EDX = 0x000000b4
EAX = 0xb2444477, EDX = 0x000000b4
EAX = 0xb4f743f3, EDX = 0x000000b4
EAX = 0xb4f7443f, EDX = 0x000000b4
EAX = 0xb4f7448b, EDX = 0x000000b4
EAX = 0xb4f744d7, EDX = 0x000000b4
Behavior description:获取窗口截图信息
details:Foreground window Info: HWND = 0x001903e2, DC = 0x01010761.
Foreground window Info: HWND = 0x00040428, DC = 0x01010761.
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = , CmdLine = cmd /c start reg add "HKEY_LOCAL_MACHINE\system\CurrentControlSet\Control\terminal server" /v AllowRemoteRPC /d 1 /t REG_DWORD /f
Behavior description:创建进程
details:[0x00000a70]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd /c start reg add "HKEY_LOCAL_MACHINE\system\CurrentControlSet\Control\terminal server" /v AllowRemoteRPC /d 1 /t REG_DWORD /f
[0x00000a90]ImagePath = C:\WINDOWS\system32\reg.exe, CmdLine = reg add "HKEY_LOCAL_MACHINE\system\CurrentControlSet\Control\terminal server" /v AllowRemoteRPC /d 1 /t REG_DWORD /f
File behavior
Behavior description:查找文件
details:FileName = C:\WINDOWS
FileName = C:\WINDOWS\system32
FileName = C:\WINDOWS\system32\cmd.exe
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\reg.*
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\reg
FileName = C:\Python27\reg.*
FileName = C:\Python27\reg
FileName = C:\Python27\Scripts\reg.*
FileName = C:\Python27\Scripts\reg
FileName = C:\WINDOWS\system32\reg.*
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Multimedia\DrawDib\vga.drv 1920x973x32(BGR 0)
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Terminal Server\AllowRemoteRPC
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
MSCTF.Shared.MUTEX.MEK
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = MSCTF.SendReceiveConection.Event.MEK.IC
EventName = MSCTF.SendReceive.Event.MEK.IC
Behavior description:打开互斥体
details:ShimCacheMutex
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007E8.00000000.0000000F
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.0000000F
MSCTF.SendReceive.Event.IOH.IC
MSCTF.SendReceiveConection.Event.IOH.IC
Behavior description:屏蔽窗口关闭消息
details:hWnd = 0x00010342, Text = 局域网监测v1.4, ClassName = WTWindow.
Behavior description:窗口信息
details:Pid = 2632, Hwnd=0x1035e, Text = 取消, ClassName = Button.
Pid = 2632, Hwnd=0x1035c, Text = 重启, ClassName = Button.
Pid = 2632, Hwnd=0x1035a, Text = 关机, ClassName = Button.
Pid = 2632, Hwnd=0x10358, Text = ×, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2632, Hwnd=0x10356, Text = 写出bat文件, ClassName = Button.
Pid = 2632, Hwnd=0x1034e, Text = 发送内容:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2632, Hwnd=0x1034c, Text = 对方IP:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2632, Hwnd=0x10362, Text = 批量操作, ClassName = Button.
Pid = 2632, Hwnd=0x10360, Text = wlan, ClassName = Button.
Pid = 2632, Hwnd=0x10348, Text = 远程, ClassName = Button.
Pid = 2632, Hwnd=0x10344, Text = 获取, ClassName = Button.
Pid = 2632, Hwnd=0x10342, Text = 局域网监测v1.4, ClassName = WTWindow.
Pid = 2632, Hwnd=0x10352, Text = 123456, ClassName = Edit.
Pid = 2632, Hwnd=0x1903e2, Text = 是(&Y), ClassName = Button.
Pid = 2632, Hwnd=0x40428, Text = 否(&N), ClassName = Button.
Behavior description:获取窗口截图信息
details:Foreground window Info: HWND = 0x001903e2, DC = 0x01010761.
Foreground window Info: HWND = 0x00040428, DC = 0x01010761.
Behavior description:隐藏指定窗口
details:[Window,Class] = [,Button]
Behavior description:直接获取CPU时钟
details:EAX = 0xb24442fb, EDX = 0x000000b4
EAX = 0xb2444347, EDX = 0x000000b4
EAX = 0xb2444393, EDX = 0x000000b4
EAX = 0xb24443df, EDX = 0x000000b4
EAX = 0xb244442b, EDX = 0x000000b4
EAX = 0xb2444477, EDX = 0x000000b4
EAX = 0xb4f743f3, EDX = 0x000000b4
EAX = 0xb4f7443f, EDX = 0x000000b4
EAX = 0xb4f7448b, EDX = 0x000000b4
EAX = 0xb4f744d7, EDX = 0x000000b4
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号