VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:55
Behavior list
Basic Information
MD5:cf1c8c58b749e7400c25d55aad077303
file type:EXE
Production company:
version:
Shell or compiler information:PACKER:Enigma Protector V1.1X-V1.3X -> Sukhov Vladimir & Serge N. Markin *
Key behavior
Behavior description:探测 Virtual PC是否存在
details:N/A
Behavior description:直接获取CPU时钟
details:EAX = 0xbd45ab59, EDX = 0x000000b7
EAX = 0xbd45aba5, EDX = 0x000000b7
EAX = 0xc1952377, EDX = 0x000000ba
EAX = 0xc19523c3, EDX = 0x000000ba
EAX = 0xc195240f, EDX = 0x000000ba
EAX = 0xc195245b, EDX = 0x000000ba
EAX = 0xc19524a7, EDX = 0x000000ba
EAX = 0xc19524f3, EDX = 0x000000ba
EAX = 0xc195253f, EDX = 0x000000ba
EAX = 0xc195258b, EDX = 0x000000ba
Behavior description:尝试打开调试器或监控软件的驱动设备对象
details:\??\NTICE
\??\SICE
Behavior description:获取TickCount值
details:TickCount = 220265, SleepMilliseconds = 1000.
TickCount = 220281, SleepMilliseconds = 1000.
TickCount = 220406, SleepMilliseconds = 1000.
TickCount = 220421, SleepMilliseconds = 1000.
TickCount = 220437, SleepMilliseconds = 1000.
TickCount = 220453, SleepMilliseconds = 1000.
TickCount = 220578, SleepMilliseconds = 1000.
TickCount = 220750, SleepMilliseconds = 1000.
TickCount = 220765, SleepMilliseconds = 1000.
TickCount = 221000, SleepMilliseconds = 1000.
TickCount = 221296, SleepMilliseconds = 1000.
TickCount = 221312, SleepMilliseconds = 1000.
TickCount = 221625, SleepMilliseconds = 1000.
TickCount = 221765, SleepMilliseconds = 1000.
TickCount = 221937, SleepMilliseconds = 1000.
Behavior description:直接调用系统关键API
details:Index = 0x00000025, Name: NtCreateFile, Instruction Address = 0x0054D772
Index = 0x000000E0, Name: NtSetInformationFile, Instruction Address = 0x0054D681
Index = 0x000000B7, Name: NtReadFile, Instruction Address = 0x0054D70A
Behavior description:查找反病毒常用工具窗口
details:NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
Behavior description:VMWare特殊指令检测虚拟机
details:N/A
Process behavior
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2664, ThreadID = 2676, StartAddress = 005BD9A0, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2664, ThreadID = 2680, StartAddress = 004FC1E0, Parameter = 01112720
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2664, ThreadID = 2684, StartAddress = 792A741C, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2664, ThreadID = 2688, StartAddress = 791F59C0, Parameter = 001B3248
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2664, ThreadID = 2788, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2664, ThreadID = 2792, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2664, ThreadID = 2876, StartAddress = 791F59C0, Parameter = 001F6C88
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2664, ThreadID = 2880, StartAddress = 77E56C7D, Parameter = 001F70E0
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2664, ThreadID = 2884, StartAddress = 769AE43B, Parameter = 001C4D88
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2664, ThreadID = 2944, StartAddress = 792F7F68, Parameter = 00000000
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:覆盖已有文件
details:C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
Behavior description:查找文件
details:FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\
FileName = C:\DOCUME~1\ADMINI~1\
FileName = C:\DOCUME~1\
FileName = C:\DOCUME~1
FileName = C:\Documents and Settings\ADMINI~1
FileName = C:\Documents and Settings\Administrator\LOCALS~1
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp\
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
FileName = C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll
FileName = C:\WINDOWS\Microsoft.NET\Framework\\*
FileName = C:\WINDOWS\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.INI
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings
Network behavior
Behavior description:建立到一个指定的套接字连接
details:URL: pa****om, IP: **.133.40.**:443, SOCKET = 0x00000348
Behavior description:按名称获取主机地址
details:gethostbyname: pa****om
Other behavior
Behavior description:直接调用系统关键API
details:Index = 0x00000025, Name: NtCreateFile, Instruction Address = 0x0054D772
Index = 0x000000E0, Name: NtSetInformationFile, Instruction Address = 0x0054D681
Index = 0x000000B7, Name: NtReadFile, Instruction Address = 0x0054D70A
Behavior description:探测 Virtual PC是否存在
details:N/A
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
Mutex object: Unique: -1647578752--914245759. Number: 0
RasPbFile
MSCTF.Shared.MUTEX.MGK
Behavior description:创建事件对象
details:EventName = Global\CPFATE_2664_v4.0.30319
EventName = DINPUTWINMM
EventName = Global\crypt32LogoffEvent
EventName = Global\userenv: User Profile setup event
EventName = MSCTF.SendReceive.Event.MGK.IC
EventName = MSCTF.SendReceiveConection.Event.MGK.IC
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
Global\CLR_PerfMon_StartEnumEvent
\KernelObjects\LowMemoryCondition
Global\SvcctrlStartEvent_A3752DX
MSFT.VSA.COM.DISABLE.2664
MSFT.VSA.IEC.STATUS.6c736db0
Global\crypt32LogoffEvent
Behavior description:检测自身是否被调试
details:IsDebuggerPresent
Behavior description:打开互斥体
details:ShimCacheMutex
RasPbFile
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:枚举窗口
details:N/A
Behavior description:尝试打开调试器或监控软件的驱动设备对象
details:\??\NTICE
\??\SICE
Behavior description:获取光标位置
details:CursorPos = (80,18468), SleepMilliseconds = 1000.
CursorPos = (6373,26501), SleepMilliseconds = 1000.
CursorPos = (19208,15725), SleepMilliseconds = 1000.
CursorPos = (11517,29359), SleepMilliseconds = 1000.
CursorPos = (27001,24465), SleepMilliseconds = 1000.
CursorPos = (5744,28146), SleepMilliseconds = 1000.
Behavior description:窗口信息
details:Pid = 2664, Hwnd=0x1035a, Text = 0, ClassName = WindowsForms10.Window.8.app.0.2bf8098_r29_ad1.
Pid = 2664, Hwnd=0x1035e, Text = X, ClassName = WindowsForms10.Window.8.app.0.2bf8098_r29_ad1.
Pid = 2664, Hwnd=0x10360, Text = ExcisionSeparator1, ClassName = WindowsForms10.Window.8.app.0.2bf8098_r29_ad1.
Pid = 2664, Hwnd=0x10362, Text = Login, ClassName = WindowsForms10.Window.8.app.0.2bf8098_r29_ad1.
Pid = 2664, Hwnd=0x10364, Text = Remember Me, ClassName = WindowsForms10.Window.8.app.0.2bf8098_r29_ad1.
Pid = 2664, Hwnd=0x10368, Text = Password:, ClassName = WindowsForms10.STATIC.app.0.2bf8098_r29_ad1.
Pid = 2664, Hwnd=0x1036c, Text = Username:, ClassName = WindowsForms10.STATIC.app.0.2bf8098_r29_ad1.
Pid = 2664, Hwnd=0x10358, Text = VisualHook Loader, ClassName = WindowsForms10.Window.8.app.0.2bf8098_r29_ad1.
Pid = 2664, Hwnd=0x1036e, Text = 确定, ClassName = Button.
Pid = 2664, Hwnd=0x10370, Text = Could not connect to loader server, ClassName = Static.
Pid = 2664, Hwnd=0x6034c, Text = GebrishHazl, ClassName = #32770.
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 0.
[2]: MilliSeconds = 0.
[3]: MilliSeconds = 0.
[4]: MilliSeconds = 0.
[5]: MilliSeconds = 1000.
[6]: MilliSeconds = 1000.
[7]: MilliSeconds = 1000.
[8]: MilliSeconds = 1000.
[9]: MilliSeconds = 1000.
[10]: MilliSeconds = 1000.
Behavior description:隐藏指定窗口
details:[Window,Class] = [VisualHook Loader,WindowsForms10.Window.8.app.0.2bf8098_r29_ad1]
[Window,Class] = [,TEnigmaProtectorLoaderFormSplashScreen.UnicodeClass]
Behavior description:获取TickCount值
details:TickCount = 220265, SleepMilliseconds = 1000.
TickCount = 220281, SleepMilliseconds = 1000.
TickCount = 220406, SleepMilliseconds = 1000.
TickCount = 220421, SleepMilliseconds = 1000.
TickCount = 220437, SleepMilliseconds = 1000.
TickCount = 220453, SleepMilliseconds = 1000.
TickCount = 220578, SleepMilliseconds = 1000.
TickCount = 220750, SleepMilliseconds = 1000.
TickCount = 220765, SleepMilliseconds = 1000.
TickCount = 221000, SleepMilliseconds = 1000.
TickCount = 221296, SleepMilliseconds = 1000.
TickCount = 221312, SleepMilliseconds = 1000.
TickCount = 221625, SleepMilliseconds = 1000.
TickCount = 221765, SleepMilliseconds = 1000.
TickCount = 221937, SleepMilliseconds = 1000.
Behavior description:直接获取CPU时钟
details:EAX = 0xbd45ab59, EDX = 0x000000b7
EAX = 0xbd45aba5, EDX = 0x000000b7
EAX = 0xc1952377, EDX = 0x000000ba
EAX = 0xc19523c3, EDX = 0x000000ba
EAX = 0xc195240f, EDX = 0x000000ba
EAX = 0xc195245b, EDX = 0x000000ba
EAX = 0xc19524a7, EDX = 0x000000ba
EAX = 0xc19524f3, EDX = 0x000000ba
EAX = 0xc195253f, EDX = 0x000000ba
EAX = 0xc195258b, EDX = 0x000000ba
Behavior description:查找反病毒常用工具窗口
details:NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
Behavior description:VMWare特殊指令检测虚拟机
details:N/A
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号