VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

File information
Safety rating:50
behaviorlist
Basic Information
MD5:ab44e07150108c243a6bcf3baff2a6e0
file type:EXE
Production company:
version:
Shell or compiler information:PACKER:UPolyX v0.5
Key behavior
Behavior description:直接调用系统关键API
details:Index = 0x000000EA, Name: NtQueryInformationProcess, Instruction Address = 0x00D36C54
Index = 0x0000014F, Name: NtSetInformationThread, Instruction Address = 0x00D36C54
Index = 0x000000B3, Name: NtOpenFile, Instruction Address = 0x00D35A01
Index = 0x00000054, Name: NtCreateSection, Instruction Address = 0x00CE1A14
Index = 0x000000A8, Name: NtMapViewOfSection, Instruction Address = 0x0093FE95
Index = 0x00000181, Name: NtUnmapViewOfSection, Instruction Address = 0x00CE1A14
Index = 0x00000032, Name: NtClose, Instruction Address = 0x00CE1A14
Index = 0x00000032, Name: NtClose, Instruction Address = 0x0091699D
Index = 0x000000D7, Name: NtProtectVirtualMemory, Instruction Address = 0x00D148CF
Behavior description:直接获取CPU时钟
details:EAX = 0x70ce7259, EDX = 0x000003a0
EAX = 0x738171d5, EDX = 0x000003a0
EAX = 0x73817221, EDX = 0x000003a0
EAX = 0x7381726d, EDX = 0x000003a0
EAX = 0x738172b9, EDX = 0x000003a0
EAX = 0x73817305, EDX = 0x000003a0
EAX = 0x73817351, EDX = 0x000003a0
EAX = 0x7381739d, EDX = 0x000003a0
EAX = 0x738173e9, EDX = 0x000003a0
EAX = 0x73817435, EDX = 0x000003a0
Behavior description:VMWare特殊指令检测虚拟机
details:N/A
Other behavior
Behavior description:直接调用系统关键API
details:Index = 0x000000EA, Name: NtQueryInformationProcess, Instruction Address = 0x00D36C54
Index = 0x0000014F, Name: NtSetInformationThread, Instruction Address = 0x00D36C54
Index = 0x000000B3, Name: NtOpenFile, Instruction Address = 0x00D35A01
Index = 0x00000054, Name: NtCreateSection, Instruction Address = 0x00CE1A14
Index = 0x000000A8, Name: NtMapViewOfSection, Instruction Address = 0x0093FE95
Index = 0x00000181, Name: NtUnmapViewOfSection, Instruction Address = 0x00CE1A14
Index = 0x00000032, Name: NtClose, Instruction Address = 0x00CE1A14
Index = 0x00000032, Name: NtClose, Instruction Address = 0x0091699D
Index = 0x000000D7, Name: NtProtectVirtualMemory, Instruction Address = 0x00D148CF
Behavior description:检测自身是否被调试
details:IsDebuggerPresent
Behavior description:打开互斥体
details:Local\MSCTF.Asm.MutexDefault1
Behavior description:窗口信息
details:Pid = 1304, Hwnd=0xe02a6, Text = 确定, ClassName = Button.
Pid = 1304, Hwnd=0xa01ee, Text = Sorry, this application cannot run under a Virtual Machine., ClassName = Static.
Pid = 1304, Hwnd=0x120228, Text = b70c.exe, ClassName = #32770.
Behavior description:搜索kernel32.dll基地址
details:Instruction Address = 0x00cb8cd5
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
Local\MSCTF.CtfActivated.Default1
Local\MSCTF.AsmCacheReady.Default1
Behavior description:直接获取CPU时钟
details:EAX = 0x70ce7259, EDX = 0x000003a0
EAX = 0x738171d5, EDX = 0x000003a0
EAX = 0x73817221, EDX = 0x000003a0
EAX = 0x7381726d, EDX = 0x000003a0
EAX = 0x738172b9, EDX = 0x000003a0
EAX = 0x73817305, EDX = 0x000003a0
EAX = 0x73817351, EDX = 0x000003a0
EAX = 0x7381739d, EDX = 0x000003a0
EAX = 0x738173e9, EDX = 0x000003a0
EAX = 0x73817435, EDX = 0x000003a0
Behavior description:VMWare特殊指令检测虚拟机
details:N/A
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | link | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号