VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

File information
Safety rating:50
Behavior list
Basic Information
MD5:964bf5c85d7b5c66be560fc9043e4b6b
file type:EXE
Production company:
version:1.0.0.1---1, 0, 0, 1
Shell or compiler information:COMPILER:Microsoft Visual C++ 6.0 [Overlay]
Key behavior
Behavior description:探测 Virtual PC是否存在
details:N/A
Behavior description:尝试打开调试器或监控软件的驱动设备对象
details:\??\NTICE
Behavior description:获取TickCount值
details:TickCount = 235640, SleepMilliseconds = 3000.
Behavior description:查找PE资源信息
details:(FindResourceA) hModule = 0x00000000, ResName: , ResType: EXE
Behavior description:直接获取CPU时钟
details:EAX = 0x85bbb398, EDX = 0x000000b6
EAX = 0x85bbb3e4, EDX = 0x000000b6
EAX = 0x85bbb430, EDX = 0x000000b6
EAX = 0x905c8149, EDX = 0x000000b6
Behavior description:查找反病毒常用工具窗口
details:NtUserFindWindowEx: [Class,Window] = [Regmonclass,]
NtUserFindWindowEx: [Class,Window] = [Filemonclass,]
Behavior description:VMWare特殊指令检测虚拟机
details:N/A
Process behavior
Behavior description:创建进程
details:[0x00000c88]ImagePath = C:\WINDOWS\explorer.exe, CmdLine = explorer.exe "http://www.0du520.com/"
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2672, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: .%temp%\****.exe, InheritedFromPID = 2648, ProcessID = 2772, ThreadID = 2904, StartAddress = 0082B129, Parameter = 001A60F8
TargetProcess: .%temp%\****.exe, InheritedFromPID = 2648, ProcessID = 2772, ThreadID = 2908, StartAddress = 0082B129, Parameter = 001A60F8
TargetProcess: .%temp%\****.exe, InheritedFromPID = 2648, ProcessID = 2772, ThreadID = 2912, StartAddress = 0082B129, Parameter = 001A60F8
TargetProcess: .%temp%\****.exe, InheritedFromPID = 2648, ProcessID = 2772, ThreadID = 2916, StartAddress = 0082B129, Parameter = 001A60F8
TargetProcess: .%temp%\****.exe, InheritedFromPID = 2648, ProcessID = 2772, ThreadID = 2920, StartAddress = 0082B129, Parameter = 001A6150
TargetProcess: .%temp%\****.exe, InheritedFromPID = 2648, ProcessID = 2772, ThreadID = 2924, StartAddress = 0082B129, Parameter = 001A60F8
TargetProcess: .%temp%\****.exe, InheritedFromPID = 2648, ProcessID = 2772, ThreadID = 2928, StartAddress = 0082B129, Parameter = 001A6160
TargetProcess: .%temp%\****.exe, InheritedFromPID = 2648, ProcessID = 2772, ThreadID = 2932, StartAddress = 0082B129, Parameter = 001A6160
TargetProcess: .%temp%\****.exe, InheritedFromPID = 2648, ProcessID = 2772, ThreadID = 2940, StartAddress = 0082B129, Parameter = 001A6160
Behavior description:创建新文件进程
details:[0x00000ad4]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\.%temp%\****.exe, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\.%temp%\****.exe
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\$readtxttemp.txt
C:\Documents and Settings\Administrator\Local Settings\Temp\.%temp%\****.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\Y1FyA54.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\$webpath.txt
Behavior description:创建可执行文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\.%temp%\****.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\Y1FyA54.exe
Behavior description:查找文件
details:FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\$readtxttemp.txt
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\.%temp%\****.exe
FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Y1FyA54.exe
FileName = C:\WINDOWS
FileName = C:\WINDOWS\explorer.exe
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
Behavior description:删除文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\$readtxttemp.txt
C:\Documents and Settings\Administrator\Local Settings\Temp\227906\TemporaryFile\TemporaryFile
C:\Documents and Settings\Administrator\Local Settings\Temp\$webpath.txt
Behavior description:重命名文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\Y1FyA54.exe ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\227906\...\TemporaryFile
C:\Documents and Settings\Administrator\Local Settings\Temp\227906\... ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\227906\TemporaryFile
Behavior description:修改文件内容
details:C:\Documents and Settings\Administrator\Local Settings\Temp\$readtxttemp.txt ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\.%temp%\****.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\Y1FyA54.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\$webpath.txt ---> Offset = 0
Other behavior
Behavior description:探测 Virtual PC是否存在
details:N/A
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
Behavior description:隐藏指定窗口
details:[Window,Class] = [tou,#32770]
Behavior description:打开互斥体
details:ShimCacheMutex
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [4823-00000029,]
NtUserFindWindowEx: [Class,Window] = [18467-41,]
Behavior description:尝试打开调试器或监控软件的驱动设备对象
details:\??\NTICE
Behavior description:获取TickCount值
details:TickCount = 235640, SleepMilliseconds = 3000.
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
_fCanRegisterWithShellService
Behavior description:查找PE资源信息
details:(FindResourceA) hModule = 0x00000000, ResName: , ResType: EXE
Behavior description:可执行文件签名信息
details:C:\Documents and Settings\Administrator\Local Settings\Temp\.%temp%\****.exe(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\Y1FyA54.exe(签名验证: 未通过)
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 3000.
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
Behavior description:可执行文件MD5
details:C:\Documents and Settings\Administrator\Local Settings\Temp\.%temp%\****.exe ---> 文件过大!
C:\Documents and Settings\Administrator\Local Settings\Temp\Y1FyA54.exe ---> 1e08bf4f0f48e096270dc389a0f7e525
Behavior description:直接获取CPU时钟
details:EAX = 0x85bbb398, EDX = 0x000000b6
EAX = 0x85bbb3e4, EDX = 0x000000b6
EAX = 0x85bbb430, EDX = 0x000000b6
EAX = 0x905c8149, EDX = 0x000000b6
Behavior description:查找反病毒常用工具窗口
details:NtUserFindWindowEx: [Class,Window] = [Regmonclass,]
NtUserFindWindowEx: [Class,Window] = [Filemonclass,]
Behavior description:VMWare特殊指令检测虚拟机
details:N/A
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号