VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

File information
Safety rating:76
Behavior list
Basic Information
MD5:ac2c1bcd57e150b00ea80ffd5ef6bb3f
file type:zip
Production company:
version:
Shell or compiler information:
Subfile information:NFCGUI-Pro.exe / caf3cf2cd69331f1804b35c6a7b5a874 / EXE
M1卡服务程序.exe / aa073dfc78e445fdbc2e2c9688fcedcd / EXE
nfc.dll / c7a7fcad21f06248ddf5b9dc555e8153 / DLL
20170712.log / 151881132b61242849cc601ee90c7b22 / Unknown
20151218.log / 096d1b4291f15f1ae8be427e491bec77 / Unknown
20171010.log / f460cbb32aed210a639523ba37b3edd5 / Unknown
20171003.log / 5c11826d7e9cdefa40d38de03b62c7c8 / Unknown
20150313.log / e77c45223f19d0c8f23e44d59e53c0c2 / Unknown
7.85.dump / db305c26f26378083b540fda5210f9e5 / Unknown
8.05 - 副本.dump / a0c1ef27192ebc6d44f21029631eca67 / Unknown
8.05.dump / 728b9c26b86ae0ecc8b6126ab285c779 / Unknown
94.dump / 8e49f4242f9b37ef3d4d3594b4c8d9ab / Unknown
= =.dump / 2efb2918dc0d180823ce250f21b6308c / Unknown
aaaa.dump / 045b92208fb0791cef9bf57fd9cc3205 / Unknown
README.dump / c54c05bc769726cf31e54167d3252bab / Unknown
20171118.log / 09b56760a6070cd4cff274477f075049 / Unknown
20180130.log / 60a7e7f194c9bf8f335dc7634f32248d / Unknown
20151118.log / 37728063f5c475c7c83276bfb8f4b773 / Unknown
20171115.log / ea22a03927095490d06eba910c8563d3 / Unknown
Key behavior
Behavior description:直接获取CPU时钟
details:EAX = 0x7849986e, EDX = 0x000000ba
EAX = 0x7afc97ea, EDX = 0x000000ba
EAX = 0xceeb01e3, EDX = 0x000000ba
EAX = 0xceeb022f, EDX = 0x000000ba
EAX = 0xd19e01ab, EDX = 0x000000ba
EAX = 0xd19e01f7, EDX = 0x000000ba
EAX = 0xeea23987, EDX = 0x000000ba
EAX = 0xeea239d3, EDX = 0x000000ba
EAX = 0xf94306ec, EDX = 0x000000ba
EAX = 0xf9430738, EDX = 0x000000ba
Behavior description:获取TickCount值
details:TickCount = 250566, SleepMilliseconds = 20.
TickCount = 250582, SleepMilliseconds = 20.
Process behavior
Behavior description:创建本地线程
details:TargetProcess: NFCGUI-Pro.exe, InheritedFromPID = 2000, ProcessID = 4000, ThreadID = 4048, StartAddress = 792A741C, Parameter = 00000000
TargetProcess: NFCGUI-Pro.exe, InheritedFromPID = 2000, ProcessID = 4000, ThreadID = 4052, StartAddress = 791F59C0, Parameter = 001B5EF0
TargetProcess: NFCGUI-Pro.exe, InheritedFromPID = 2000, ProcessID = 4000, ThreadID = 1984, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: NFCGUI-Pro.exe, InheritedFromPID = 2000, ProcessID = 4000, ThreadID = 1336, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: NFCGUI-Pro.exe, InheritedFromPID = 2000, ProcessID = 4000, ThreadID = 2184, StartAddress = 792F7F68, Parameter = 00000000
TargetProcess: NFCGUI-Pro.exe, InheritedFromPID = 2000, ProcessID = 4000, ThreadID = 2180, StartAddress = 77E56C7D, Parameter = 001FB9D8
TargetProcess: NFCGUI-Pro.exe, InheritedFromPID = 2000, ProcessID = 4000, ThreadID = 2192, StartAddress = 769AE43B, Parameter = 001FAE20
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\nfc.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\mfoc.exe
Behavior description:覆盖已有文件
details:C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
Behavior description:创建可执行文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\nfc.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\mfoc.exe
Behavior description:修改文件内容
details:C:\Documents and Settings\Administrator\Local Settings\Temp\nfc.dll ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\mfoc.exe ---> Offset = 0
Behavior description:查找文件
details:FileName = C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll
FileName = C:\WINDOWS\Microsoft.NET\Framework\\*
FileName = C:\WINDOWS\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.INI
FileName = C:\WINDOWS\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.INI
FileName = C:\WINDOWS\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.INI
FileName = C:\WINDOWS\Microsoft.Net\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.INI
FileName = C:\DOCUME~1
FileName = C:\Documents and Settings\ADMINI~1
FileName = C:\Documents and Settings\Administrator\LOCALS~1
Other behavior
Behavior description:检测自身是否被调试
details:IsDebuggerPresent
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
MSCTF.Shared.MUTEX.EKP
Behavior description:创建事件对象
details:EventName = Global\CPFATE_4000_v4.0.30319
EventName = MSCTF.SendReceive.Event.EKP.IC
EventName = MSCTF.SendReceiveConection.Event.EKP.IC
Behavior description:打开互斥体
details:ShimCacheMutex
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
Global\CLR_PerfMon_StartEnumEvent
\KernelObjects\LowMemoryCondition
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
MSFT.VSA.COM.DISABLE.4000
MSFT.VSA.IEC.STATUS.6c736db0
Behavior description:获取TickCount值
details:TickCount = 250566, SleepMilliseconds = 20.
TickCount = 250582, SleepMilliseconds = 20.
Behavior description:调整进程token权限
details:SE_DEBUG_PRIVILEGE
Behavior description:窗口信息
details:Pid = 4000, Hwnd=0x1034e, Text = statusStrip1, ClassName = WindowsForms10.Window.8.app.0.34f5582_r23_ad1.
Pid = 4000, Hwnd=0x10350, Text = 密钥列表, ClassName = WindowsForms10.Window.8.app.0.34f5582_r23_ad1.
Pid = 4000, Hwnd=0x10356, Text = 卡片选项, ClassName = WindowsForms10.Window.8.app.0.34f5582_r23_ad1.
Pid = 4000, Hwnd=0x10358, Text = 计算控制位, ClassName = WindowsForms10.BUTTON.app.0.34f5582_r23_ad1.
Pid = 4000, Hwnd=0x1035a, Text = 保存密钥, ClassName = WindowsForms10.BUTTON.app.0.34f5582_r23_ad1.
Pid = 4000, Hwnd=0x1035c, Text = 加载密钥, ClassName = WindowsForms10.BUTTON.app.0.34f5582_r23_ad1.
Pid = 4000, Hwnd=0x1035e, Text = 写入UID卡, ClassName = WindowsForms10.BUTTON.app.0.34f5582_r23_ad1.
Pid = 4000, Hwnd=0x10360, Text = 写入一般白卡, ClassName = WindowsForms10.BUTTON.app.0.34f5582_r23_ad1.
Pid = 4000, Hwnd=0x10362, Text = 读取UID卡, ClassName = WindowsForms10.BUTTON.app.0.34f5582_r23_ad1.
Pid = 4000, Hwnd=0x10364, Text = 读取一般白卡, ClassName = WindowsForms10.BUTTON.app.0.34f5582_r23_ad1.
Pid = 4000, Hwnd=0x10366, Text = 枚举密钥, ClassName = WindowsForms10.BUTTON.app.0.34f5582_r23_ad1.
Pid = 4000, Hwnd=0x1036c, Text = 2, ClassName = WindowsForms10.EDIT.app.0.34f5582_r23_ad1.
Pid = 4000, Hwnd=0x1036e, Text = 差距, ClassName = WindowsForms10.STATIC.app.0.34f5582_r23_ad1.
Pid = 4000, Hwnd=0x10374, Text = 600, ClassName = WindowsForms10.EDIT.app.0.34f5582_r23_ad1.
Pid = 4000, Hwnd=0x10376, Text = 探测次数, ClassName = WindowsForms10.STATIC.app.0.34f5582_r23_ad1.
Behavior description:可执行文件签名信息
details:C:\Documents and Settings\Administrator\Local Settings\Temp\nfc.dll(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\mfoc.exe(签名验证: 未通过)
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = -1.
[2]: MilliSeconds = 20.
[3]: MilliSeconds = 250.
[4]: MilliSeconds = 20.
Behavior description:可执行文件MD5
details:C:\Documents and Settings\Administrator\Local Settings\Temp\nfc.dll ---> c7a7fcad21f06248ddf5b9dc555e8153
C:\Documents and Settings\Administrator\Local Settings\Temp\mfoc.exe ---> 0a0d3f70578d62d7b5cc2a394cdf511d
Behavior description:直接获取CPU时钟
details:EAX = 0x7849986e, EDX = 0x000000ba
EAX = 0x7afc97ea, EDX = 0x000000ba
EAX = 0xceeb01e3, EDX = 0x000000ba
EAX = 0xceeb022f, EDX = 0x000000ba
EAX = 0xd19e01ab, EDX = 0x000000ba
EAX = 0xd19e01f7, EDX = 0x000000ba
EAX = 0xeea23987, EDX = 0x000000ba
EAX = 0xeea239d3, EDX = 0x000000ba
EAX = 0xf94306ec, EDX = 0x000000ba
EAX = 0xf9430738, EDX = 0x000000ba
Behavior description:导入密钥
details:[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001BE8AC, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001C5AEC, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001CE76C, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001CE8CC, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x0012CCDC, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x0012E094, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x0019A7DC, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001D97EC, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001D9134, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001D871C, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001F3034, DataLen: 148, Flags: 0x00000000
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号