VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:77
Behavior list
Basic Information
MD5:96985ead8917a6de687d279fe1a3cc5f
file type:Rar
Production company:
version:
Shell or compiler information:COMPILER:Microsoft Visual C# / Basic .NET [Overlay]
Subfile information:RegexTester.exe / 05e6ee317be606129250add1a37844ae / EXE
如果无法启动,请读我.txt / 05aea79c314fec6c5b02e31a89152200 / Unknown
软件最终用户许可协议.rtf / 61658062331af399120b78586c79aab9 / Unknown
Key behavior
Behavior description:直接获取CPU时钟
details:EAX = 0x80008a82, EDX = 0x000000b4
EAX = 0x80008ace, EDX = 0x000000b4
EAX = 0x80008b1a, EDX = 0x000000b4
EAX = 0x80008b66, EDX = 0x000000b4
EAX = 0x97c9f489, EDX = 0x000000b4
EAX = 0x97c9f4d5, EDX = 0x000000b4
EAX = 0x97c9f521, EDX = 0x000000b4
EAX = 0x97c9f56d, EDX = 0x000000b4
EAX = 0x9a7cf4e9, EDX = 0x000000b4
EAX = 0x9a7cf535, EDX = 0x000000b4
Behavior description:获取TickCount值
details:TickCount = 240328, SleepMilliseconds = 250.
TickCount = 240113, SleepMilliseconds = 20.
TickCount = 240129, SleepMilliseconds = 20.
Process behavior
Behavior description:创建本地线程
details:TargetProcess: RegexTester.exe, InheritedFromPID = 2000, ProcessID = 2576, ThreadID = 2612, StartAddress = 792A741C, Parameter = 00000000
TargetProcess: RegexTester.exe, InheritedFromPID = 2000, ProcessID = 2576, ThreadID = 2616, StartAddress = 791F59C0, Parameter = 001B00D8
TargetProcess: RegexTester.exe, InheritedFromPID = 2000, ProcessID = 2576, ThreadID = 2700, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: RegexTester.exe, InheritedFromPID = 2000, ProcessID = 2576, ThreadID = 2704, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: RegexTester.exe, InheritedFromPID = 2000, ProcessID = 2576, ThreadID = 3144, StartAddress = 792F7F68, Parameter = 00000000
TargetProcess: RegexTester.exe, InheritedFromPID = 2000, ProcessID = 2576, ThreadID = 3148, StartAddress = 77E56C7D, Parameter = 001DDA18
TargetProcess: RegexTester.exe, InheritedFromPID = 2000, ProcessID = 2576, ThreadID = 3152, StartAddress = 769AE43B, Parameter = 001EA6E0
File behavior
Behavior description:覆盖已有文件
details:C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
Behavior description:查找文件
details:FileName = C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll
FileName = C:\WINDOWS\Microsoft.NET\Framework\\*
FileName = C:\WINDOWS\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.INI
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\RegexTester
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\RegexTester\RegexTester.exe
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\RegexTester\RegexTester.INI
FileName = C:\WINDOWS\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.INI
FileName = C:\WINDOWS\Microsoft.Net\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.INI
FileName = C:\WINDOWS\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.INI
Other behavior
Behavior description:检测自身是否被调试
details:IsDebuggerPresent
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
MSCTF.Shared.MUTEX.EBK
Behavior description:创建事件对象
details:EventName = Global\CPFATE_2576_v4.0.30319
EventName = MSCTF.SendReceive.Event.EBK.IC
EventName = MSCTF.SendReceiveConection.Event.EBK.IC
Behavior description:打开互斥体
details:ShimCacheMutex
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:打开事件
details:Global\CLR_PerfMon_StartEnumEvent
\KernelObjects\LowMemoryCondition
HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
MSFT.VSA.COM.DISABLE.2576
MSFT.VSA.IEC.STATUS.6c736db0
Behavior description:获取TickCount值
details:TickCount = 240328, SleepMilliseconds = 250.
TickCount = 240113, SleepMilliseconds = 20.
TickCount = 240129, SleepMilliseconds = 20.
Behavior description:窗口信息
details:Pid = 2576, Hwnd=0x1035c, Text = 正则表达式, ClassName = WindowsForms10.Window.8.app.0.2bf8098_r19_ad1.
Pid = 2576, Hwnd=0x10366, Text = 源文本, ClassName = WindowsForms10.Window.8.app.0.2bf8098_r19_ad1.
Pid = 2576, Hwnd=0x1036c, Text = 结果, ClassName = WindowsForms10.Window.8.app.0.2bf8098_r19_ad1.
Pid = 2576, Hwnd=0x10378, Text = toolStrip1, ClassName = WindowsForms10.Window.8.app.0.2bf8098_r19_ad1.
Pid = 2576, Hwnd=0x1037a, Text = 表格, ClassName = WindowsForms10.COMBOBOX.app.0.2bf8098_r19_ad1.
Pid = 2576, Hwnd=0x1037e, Text = statusStrip1, ClassName = WindowsForms10.Window.8.app.0.2bf8098_r19_ad1.
Pid = 2576, Hwnd=0x1034e, Text = 正则表达式测试器 - deerchao.net 版权所有, ClassName = WindowsForms10.Window.8.app.0.2bf8098_r19_ad1.
Behavior description:调用Sleep函数
details:[2]: MilliSeconds = -1.
[3]: MilliSeconds = 20.
[1]: MilliSeconds = 250.
[4]: MilliSeconds = 20.
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ComboLBox]
Behavior description:直接获取CPU时钟
details:EAX = 0x80008a82, EDX = 0x000000b4
EAX = 0x80008ace, EDX = 0x000000b4
EAX = 0x80008b1a, EDX = 0x000000b4
EAX = 0x80008b66, EDX = 0x000000b4
EAX = 0x97c9f489, EDX = 0x000000b4
EAX = 0x97c9f4d5, EDX = 0x000000b4
EAX = 0x97c9f521, EDX = 0x000000b4
EAX = 0x97c9f56d, EDX = 0x000000b4
EAX = 0x9a7cf4e9, EDX = 0x000000b4
EAX = 0x9a7cf535, EDX = 0x000000b4
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号