VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:75
Behavior list
Basic Information
MD5:4fc0d882417105732e8fac20c468458a
file type:EXE
Production company:
version:1.0.0.0---1.0.0.0
Shell or compiler information:COMPILER:Microsoft Visual C# / Basic .NET [Overlay]
Key behavior
Behavior description:直接获取CPU时钟
details:EAX = 0x07bc22ef, EDX = 0x000000b6
EAX = 0x07bc233b, EDX = 0x000000b6
EAX = 0x07bc2387, EDX = 0x000000b6
EAX = 0x07bc23d3, EDX = 0x000000b6
EAX = 0x07bc241f, EDX = 0x000000b6
EAX = 0x0a43f3a8, EDX = 0x000000b6
EAX = 0x0a43f3f4, EDX = 0x000000b6
EAX = 0x0a43f440, EDX = 0x000000b6
EAX = 0x0fa9f2ec, EDX = 0x000000b6
EAX = 0x1797c0d5, EDX = 0x000000b6
Behavior description:获取TickCount值
details:TickCount = 241207, SleepMilliseconds = 20.
TickCount = 241223, SleepMilliseconds = 20.
TickCount = 241238, SleepMilliseconds = 20.
Process behavior
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2632, ThreadID = 2644, StartAddress = 79F0237F, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2632, ThreadID = 2648, StartAddress = 79F91FCF, Parameter = 001A5780
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2632, ThreadID = 2676, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2632, ThreadID = 3200, StartAddress = 79FDA29C, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2632, ThreadID = 3204, StartAddress = 77E56C7D, Parameter = 001D8E68
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2632, ThreadID = 3208, StartAddress = 769AE43B, Parameter = 001D7BA0
File behavior
Behavior description:覆盖已有文件
details:C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
Behavior description:查找文件
details:FileName = C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll
FileName = C:\WINDOWS\Microsoft.NET\Framework\\*
FileName = C:\WINDOWS
FileName = C:\WINDOWS\WinSxS
FileName = C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll
FileName = C:\WINDOWS\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.INI
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\996E.INI
FileName = C:\WINDOWS\assembly\GAC_MSIL\System.Windows.Forms\2.0.0.0__b77a5c561934e089\System.Windows.Forms.INI
FileName = C:\WINDOWS\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.INI
Other behavior
Behavior description:检测自身是否被调试
details:IsDebuggerPresent
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
MSCTF.Shared.MUTEX.MEK
Behavior description:创建事件对象
details:EventName = Global\CorDBIPCSetupSyncEvent_2632
EventName = MSCTF.SendReceive.Event.MEK.IC
EventName = MSCTF.SendReceiveConection.Event.MEK.IC
Behavior description:打开互斥体
details:ShimCacheMutex
Global\CLR_CASOFF_MUTEX
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:打开事件
details:Global\CLR_PerfMon_StartEnumEvent
\KernelObjects\LowMemoryCondition
HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
MSFT.VSA.COM.DISABLE.2632
MSFT.VSA.IEC.STATUS.6c736db0
Behavior description:获取TickCount值
details:TickCount = 241207, SleepMilliseconds = 20.
TickCount = 241223, SleepMilliseconds = 20.
TickCount = 241238, SleepMilliseconds = 20.
Behavior description:窗口信息
details:Pid = 2632, Hwnd=0x10350, Text = OK, ClassName = WindowsForms10.BUTTON.app.0.33c0d9d.
Pid = 2632, Hwnd=0x10354, Text = This copy of "Stubber" has expired and will no longer run. This happened because it was created using an evaluation version of Gapotchenko"s Eazfuscator.NET which is only licensed for testing purposes. You should report this problem to the vendor of "Stubb, ClassName = WindowsForms10.STATIC.app.0.33c0d9d.
Pid = 2632, Hwnd=0x3034c, Text = Program Has Expired, ClassName = WindowsForms10.Window.8.app.0.33c0d9d.
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = -1.
[2]: MilliSeconds = 20.
[3]: MilliSeconds = 20.
Behavior description:直接获取CPU时钟
details:EAX = 0x07bc22ef, EDX = 0x000000b6
EAX = 0x07bc233b, EDX = 0x000000b6
EAX = 0x07bc2387, EDX = 0x000000b6
EAX = 0x07bc23d3, EDX = 0x000000b6
EAX = 0x07bc241f, EDX = 0x000000b6
EAX = 0x0a43f3a8, EDX = 0x000000b6
EAX = 0x0a43f3f4, EDX = 0x000000b6
EAX = 0x0a43f440, EDX = 0x000000b6
EAX = 0x0fa9f2ec, EDX = 0x000000b6
EAX = 0x1797c0d5, EDX = 0x000000b6
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号