VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:28
Behavior list
Basic Information
MD5:44aa87e652187dd35b78e8c18898980c
file type:EXE
Production company:360.cn
version:3.6.1.1005---3, 6, 1, 1005
Shell or compiler information:COMPILER:Microsoft Visual C++ 6.0
Key behavior
Behavior description:探测 Virtual PC是否存在
details:N/A
Behavior description:获取TickCount值
details:TickCount = 5350461, SleepMilliseconds = 8.
TickCount = 5350492, SleepMilliseconds = 8.
TickCount = 5350523, SleepMilliseconds = 8.
TickCount = 5350648, SleepMilliseconds = 8.
TickCount = 5355656, SleepMilliseconds = 5000.
TickCount = 5350773, SleepMilliseconds = 8.
TickCount = 5350789, SleepMilliseconds = 8.
TickCount = 5358492, SleepMilliseconds = 50.
TickCount = 5358492, SleepMilliseconds = 8.
TickCount = 5360096, SleepMilliseconds = 50.
TickCount = 5361648, SleepMilliseconds = 8.
Behavior description:对比可疑进程名
details:lstrcmpiA: System <------> DNF.EXE Des: DNF游戏
lstrcmpiA: smss.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: csrss.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: winlogon.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: services.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: lsass.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: 33oxService.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: 33acthlp.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: svchost.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: spoolsv.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: 33UpgradeHelper.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: alg.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: explorer.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: 33oxTray.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: ctfmon.exe <------> DNF.EXE Des: DNF游戏
Process behavior
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1396, ThreadID = 444, StartAddress = 00411260, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1396, ThreadID = 252, StartAddress = 004102F0, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1396, ThreadID = 1012, StartAddress = 00410BD0, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1396, ThreadID = 1360, StartAddress = 0041C689, Parameter = 009B4440
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1396, ThreadID = 1408, StartAddress = 0041C689, Parameter = 009B4900
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1396, ThreadID = 2104, StartAddress = 0041C689, Parameter = 009B4900
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:创建文件
details:C:\WINDOWS\V2012.exe
C:\WINDOWS\V2013.exe
C:\WINDOWS\system32\201682915416
Behavior description:创建可执行文件
details:C:\WINDOWS\V2012.exe
C:\WINDOWS\V2013.exe
Behavior description:修改文件内容
details:C:\WINDOWS\V2012.exe ---> Offset = 0
C:\WINDOWS\V2012.exe ---> Offset = 65536
C:\WINDOWS\V2012.exe ---> Offset = 131072
C:\WINDOWS\V2012.exe ---> Offset = 196608
C:\WINDOWS\V2012.exe ---> Offset = 262144
C:\WINDOWS\V2013.exe ---> Offset = 0
C:\WINDOWS\V2013.exe ---> Offset = 65536
C:\WINDOWS\V2013.exe ---> Offset = 131072
C:\WINDOWS\V2013.exe ---> Offset = 196608
C:\WINDOWS\V2013.exe ---> Offset = 262144
C:\WINDOWS\V2012.exe ---> Offset = 299008
C:\WINDOWS\V2012.exe ---> Offset = 364544
C:\WINDOWS\V2012.exe ---> Offset = 430080
C:\WINDOWS\V2012.exe ---> Offset = 495616
C:\WINDOWS\V2012.exe ---> Offset = 524288
Behavior description:查找文件
details:FileName = C:\WINDOWS\system32\201682915416
Behavior description:复制文件
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe ---> C:\WINDOWS\V2012.exe
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe ---> C:\WINDOWS\V2013.exe
Network behavior
Behavior description:建立到一个指定的套接字连接
details:URL: smile-pc, IP: **.133.40.**:80, SOCKET = 0x0000072c
URL: smile-pc, IP: **.133.40.**:80, SOCKET = 0x00000718
Behavior description:按名称获取主机地址
details:gethostbyname: smile-pc
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\MACHINE\SYSTEM\InfoTime\InfoTime
Behavior description:删除注册表键值
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW\DWFileTreeRoot
Behavior description:删除注册表键
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW\
Other behavior
Behavior description:探测 Virtual PC是否存在
details:N/A
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
AAAAAA8Pr2+wK67wCpp6+fCCCCCC2vYA8fzw/AXzv+MC9fYAAvC/2v79/gQC8Z8=|K38xgSlaK39ZUE9hUDErbVZ3LicxQWRRVFM1PCdrT2FWdy4nZGo1PD5Anw==
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = Global\userenv: User Profile setup event
Behavior description:对比可疑进程名
details:lstrcmpiA: System <------> DNF.EXE Des: DNF游戏
lstrcmpiA: smss.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: csrss.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: winlogon.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: services.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: lsass.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: 33oxService.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: 33acthlp.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: svchost.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: spoolsv.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: 33UpgradeHelper.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: alg.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: explorer.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: 33oxTray.exe <------> DNF.EXE Des: DNF游戏
lstrcmpiA: ctfmon.exe <------> DNF.EXE Des: DNF游戏
Behavior description:窗口信息
details:Pid = 588, Hwnd=0xd035e, Text = 确定, ClassName = Button.
Pid = 588, Hwnd=0x1002c8, Text = 取消, ClassName = Button.
Pid = 588, Hwnd=0xb032a, Text = "0x2001e388" 指令引用的 "0x00eb0000" 内存。该内存不能为 "read"。 要终止程序,请单击“确定”。 要调试程序,请单击“取消”。, ClassName = Static.
Pid = 588, Hwnd=0x80358, Text = %temp%\****.exe - 应用程序错误, ClassName = #32770.
Behavior description:获取TickCount值
details:TickCount = 5350461, SleepMilliseconds = 8.
TickCount = 5350492, SleepMilliseconds = 8.
TickCount = 5350523, SleepMilliseconds = 8.
TickCount = 5350648, SleepMilliseconds = 8.
TickCount = 5355656, SleepMilliseconds = 5000.
TickCount = 5350773, SleepMilliseconds = 8.
TickCount = 5350789, SleepMilliseconds = 8.
TickCount = 5358492, SleepMilliseconds = 50.
TickCount = 5358492, SleepMilliseconds = 8.
TickCount = 5360096, SleepMilliseconds = 50.
TickCount = 5361648, SleepMilliseconds = 8.
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
Behavior description:可执行文件签名信息
details:C:\WINDOWS\V2012.exe(签名验证: 未通过)
C:\WINDOWS\V2013.exe(签名验证: 未通过)
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 5000.
[2]: MilliSeconds = 100.
[3]: MilliSeconds = 1000.
[4]: MilliSeconds = 1000.
[5]: MilliSeconds = 1000.
[6]: MilliSeconds = 1000.
[7]: MilliSeconds = 1000.
[8]: MilliSeconds = 1000.
[9]: MilliSeconds = 1000.
[10]: MilliSeconds = 1000.
Behavior description:可执行文件MD5
details:C:\WINDOWS\V2012.exe ---> 44aa87e652187dd35b78e8c18898980c
C:\WINDOWS\V2013.exe ---> 44aa87e652187dd35b78e8c18898980c
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号