VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

File information
Safety rating:77
Behavior list
Basic Information
MD5:7747aadebd9da9cfe680f65439d9b101
file type:EXE
Production company:
version:1.0.0.0---1.0.0.0
Shell or compiler information:COMPILER:Microsoft Visual C# / Basic .NET
Key behavior
Behavior description:直接获取CPU时钟
details:EAX = 0x5bc43abe, EDX = 0x000000b4
EAX = 0x5e773a3a, EDX = 0x000000b4
EAX = 0x5e773a86, EDX = 0x000000b4
EAX = 0x5e773ad2, EDX = 0x000000b4
EAX = 0x5e773b1e, EDX = 0x000000b4
EAX = 0xf5d12087, EDX = 0x000000b4
EAX = 0xf5d120d3, EDX = 0x000000b4
EAX = 0x423cfa1e, EDX = 0x000000b5
EAX = 0x423cfa6a, EDX = 0x000000b5
EAX = 0x423cfab6, EDX = 0x000000b5
Behavior description:获取TickCount值
details:TickCount = 277453, SleepMilliseconds = 60000.
TickCount = 277468, SleepMilliseconds = 60000.
TickCount = 286359, SleepMilliseconds = 60000.
TickCount = 299953, SleepMilliseconds = 60000.
TickCount = 300000, SleepMilliseconds = 60000.
TickCount = 240035, SleepMilliseconds = 20.
Process behavior
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2696, StartAddress = 79F0237F, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2712, StartAddress = 79F91FCF, Parameter = 001A5780
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2748, StartAddress = 79F91FCF, Parameter = 001BEA80
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2752, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2756, StartAddress = 77E56C7D, Parameter = 001C1340
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2760, StartAddress = 769AE43B, Parameter = 001D20E0
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 3200, StartAddress = 79FDA29C, Parameter = 00000000
File behavior
Behavior description:覆盖已有文件
details:C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
Behavior description:查找文件
details:FileName = C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll
FileName = C:\WINDOWS\Microsoft.NET\Framework\\*
FileName = C:\WINDOWS
FileName = C:\WINDOWS\WinSxS
FileName = C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll
FileName = C:\WINDOWS\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.INI
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\996E.INI
FileName = C:\WINDOWS\assembly\GAC_MSIL\Microsoft.VisualBasic\8.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.INI
FileName = C:\WINDOWS\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.INI
Other behavior
Behavior description:检测自身是否被调试
details:IsDebuggerPresent
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
MSCTF.Shared.MUTEX.MLK
Behavior description:创建事件对象
details:EventName = Global\CorDBIPCSetupSyncEvent_2648
EventName = MSCTF.SendReceive.Event.MLK.IC
EventName = MSCTF.SendReceiveConection.Event.MLK.IC
Behavior description:打开互斥体
details:ShimCacheMutex
Global\CLR_CASOFF_MUTEX
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:打开事件
details:Global\CLR_PerfMon_StartEnumEvent
\KernelObjects\LowMemoryCondition
HookSwitchHookEnabledEvent
MSFT.VSA.COM.DISABLE.2648
MSFT.VSA.IEC.STATUS.6c736db0
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceive.Event.IOH.IC
MSCTF.SendReceiveConection.Event.IOH.IC
Behavior description:获取TickCount值
details:TickCount = 277453, SleepMilliseconds = 60000.
TickCount = 277468, SleepMilliseconds = 60000.
TickCount = 286359, SleepMilliseconds = 60000.
TickCount = 299953, SleepMilliseconds = 60000.
TickCount = 300000, SleepMilliseconds = 60000.
TickCount = 240035, SleepMilliseconds = 20.
Behavior description:获取光标位置
details:CursorPos = (80,18468), SleepMilliseconds = 60000.
CursorPos = (6373,26501), SleepMilliseconds = 60000.
CursorPos = (19208,15725), SleepMilliseconds = 60000.
CursorPos = (11517,29359), SleepMilliseconds = 60000.
Behavior description:窗口信息
details:Pid = 2648, Hwnd=0x10350, Text = Yes, ClassName = WindowsForms10.BUTTON.app.0.3ce0bb8.
Pid = 2648, Hwnd=0x10352, Text = No, ClassName = WindowsForms10.BUTTON.app.0.3ce0bb8.
Pid = 2648, Hwnd=0x10354, Text = This application has been built with an evaluation version of Eazfuscator.NET, and therefore cannot be distributed. Press Yes if you want to run this application now. Press No if you aren"t sure. If you don"t trust the publisher, don"t know what it is or ho, ClassName = WindowsForms10.STATIC.app.0.3ce0bb8.
Pid = 2648, Hwnd=0x1034c, Text = Program Cannot Be Distributed, ClassName = WindowsForms10.Window.8.app.0.3ce0bb8.
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 60000.
[2]: MilliSeconds = -1.
[3]: MilliSeconds = 20.
Behavior description:隐藏指定窗口
details:[Window,Class] = [Program Cannot Be Distributed,WindowsForms10.Window.8.app.0.3ce0bb8]
Behavior description:直接获取CPU时钟
details:EAX = 0x5bc43abe, EDX = 0x000000b4
EAX = 0x5e773a3a, EDX = 0x000000b4
EAX = 0x5e773a86, EDX = 0x000000b4
EAX = 0x5e773ad2, EDX = 0x000000b4
EAX = 0x5e773b1e, EDX = 0x000000b4
EAX = 0xf5d12087, EDX = 0x000000b4
EAX = 0xf5d120d3, EDX = 0x000000b4
EAX = 0x423cfa1e, EDX = 0x000000b5
EAX = 0x423cfa6a, EDX = 0x000000b5
EAX = 0x423cfab6, EDX = 0x000000b5
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号