VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

File information
Safety rating:50
Behavior list
Basic Information
MD5:366ddda8deb221c906978a8f45f968c1
file type:EXE
Production company:Acute Systems
version:12.2.0.0---12.2
Shell or compiler information:PACKER:EXECryptor V2.2X-V2.4X -> StrongBit Technology [Overlay] *
Key behavior
Behavior description:直接调用系统关键API
details:Index = 0x00000029, Name: NtCreateKey, Instruction Address = 0x0077A182
Index = 0x000000B1, Name: NtQueryValueKey, Instruction Address = 0x00753B7B
Index = 0x00000019, Name: NtClose, Instruction Address = 0x006F1D9B
Process behavior
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2652, ThreadID = 2664, StartAddress = 00722D82, Parameter = 0012FF80
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2652, ThreadID = 2668, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2652, ThreadID = 2672, StartAddress = 0074EE65, Parameter = 0012F344
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2652, ThreadID = 2676, StartAddress = 0074EE65, Parameter = 0159FF34
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2652, ThreadID = 2680, StartAddress = 0074EE65, Parameter = 0169FF90
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2652, ThreadID = 2684, StartAddress = 0074EE65, Parameter = 0169FF90
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2652, ThreadID = 2688, StartAddress = 0074EE65, Parameter = 0159FF34
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2652, ThreadID = 2692, StartAddress = 0074EE65, Parameter = 0169FF90
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2652, ThreadID = 2696, StartAddress = 0074EE65, Parameter = 0159FF34
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2652, ThreadID = 2700, StartAddress = 0074EE65, Parameter = 0012F344
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2652, ThreadID = 2704, StartAddress = 0074EE65, Parameter = 0012F344
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2652, ThreadID = 2708, StartAddress = 0074EE65, Parameter = 0012F340
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2652, ThreadID = 2712, StartAddress = 0074EE65, Parameter = 0159FF34
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2652, ThreadID = 2716, StartAddress = 0074EE65, Parameter = 0169FF90
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2652, ThreadID = 2720, StartAddress = 0074EE65, Parameter = 0169FF90
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{F1ECE530-62CE-F8A1-3466-513688355176}\
Other behavior
Behavior description:创建互斥体
details:oleacc-msaa-loaded
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
MSCTF.Shared.MUTEX.AGK
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = MSCTF.SendReceive.Event.AGK.IC
EventName = MSCTF.SendReceiveConection.Event.AGK.IC
Behavior description:直接调用系统关键API
details:Index = 0x00000029, Name: NtCreateKey, Instruction Address = 0x0077A182
Index = 0x000000B1, Name: NtQueryValueKey, Instruction Address = 0x00753B7B
Index = 0x00000019, Name: NtClose, Instruction Address = 0x006F1D9B
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [TransMacClass,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007E8.00000000.0000000F
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.0000000F
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
Behavior description:窗口信息
details:Pid = 2652, Hwnd=0x10344, Text = Enter Key, ClassName = Button.
Pid = 2652, Hwnd=0x10346, Text = Wait...9, ClassName = Button.
Pid = 2652, Hwnd=0x1033e, Text = TransMac Trial, ClassName = #32770.
Pid = 2652, Hwnd=0x2033e, Text = Enter License Key, ClassName = #32770.
Pid = 2652, Hwnd=0x40342, Text = 确定, ClassName = Button.
Pid = 2652, Hwnd=0x30344, Text = Please restart this application., ClassName = Static.
Pid = 2652, Hwnd=0x3033e, Text = License Information Saved, ClassName = #32770.
Behavior description:打开互斥体
details:ShimCacheMutex
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号