VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:75
Behavior list
Basic Information
MD5:f160b3223375420fd3437220da1876ee
file type:EXE
Production company:Ensemble Studios
version:3.2002.10.700---3.2002.10.
Shell or compiler information:COMPILER:Armadillo 1.82 - 1.83 beta1-> Silicon Realms Toolworks [Overlay]
Key behavior
Behavior description:跨进程写入数据
details:TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x00140000, Size = 0x00000020 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x00140020, Size = 0x00000034 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x7ffdf238, Size = 0x00000004 TargetPID = 0x00000d14
Behavior description:跨进程写代码段数据
details:TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x00401000, Size = 0x0000fdf6 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x00410df6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x00420bf6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x004309f6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x004407f6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x004505f6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x004603f6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x004701f6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x0047fff6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x0048fdf6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x0049fbf6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x004af9f6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x004bf7f6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x004cf5f6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x004df3f6, Size = 0x0000fe00 TargetPID = 0x00000d14
Behavior description:直接获取CPU时钟
details:EAX = 0xe70fce22, EDX = 0x00000077
Behavior description:尝试打开调试器或监控软件的驱动设备对象
details:\??\SICE
\??\NTICE
Process behavior
Behavior description:跨进程写入数据
details:TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x00140000, Size = 0x00000020 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x00140020, Size = 0x00000034 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x7ffdf238, Size = 0x00000004 TargetPID = 0x00000d14
Behavior description:创建新文件进程
details:[0x00000d14]ImagePath = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, CmdLine = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe
Behavior description:枚举进程
details:N/A
Behavior description:跨进程写代码段数据
details:TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x00401000, Size = 0x0000fdf6 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x00410df6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x00420bf6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x004309f6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x004407f6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x004505f6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x004603f6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x004701f6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x0047fff6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x0048fdf6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x0049fbf6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x004af9f6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x004bf7f6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x004cf5f6, Size = 0x0000fe00 TargetPID = 0x00000d14
TargetProcess = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0, WriteAddress = 0x004df3f6, Size = 0x0000fe00 TargetPID = 0x00000d14
File behavior
Behavior description:创建文件
details:C:\Users\Administrator\AppData\Local\Temp\Arm2E69.tmp
C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0
Behavior description:覆盖已有文件
details:C:\Users\Administrator\AppData\Local\Temp\Arm2E69.tmp
C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0
Behavior description:创建可执行文件
details:C:\Users\Administrator\AppData\Local\Temp\Arm2E69.tmp
C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0
Behavior description:修改文件内容
details:C:\Users\Administrator\AppData\Local\Temp\Arm2E69.tmp ---> Offset = 0
C:\Users\Administrator\AppData\Local\Temp\Arm2E69.tmp ---> Offset = 65024
C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0 ---> Offset = 0
C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0 ---> Offset = 65024
C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0 ---> Offset = 130048
C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0 ---> Offset = 195072
C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0 ---> Offset = 260096
C:\Windows\AppCompat\Programs\RecentFileCache.bcf ---> Offset = 19080
C:\Windows\AppCompat\Programs\RecentFileCache.bcf ---> Offset = 19084
C:\Windows\AppCompat\Programs\RecentFileCache.bcf ---> Offset = 16
Behavior description:查找文件
details:FileName = C:\Users\Administrator\AppData\Local\%temp%\ARM*.TMP
FileName = C:\Users\ADMINI~1\AppData\Local\Temp\ARM*.TMP
FileName = C:\Windows\*
FileName = C:\*
FileName = C:\Users\Administrator\AppData\Local\%temp%\Simulate.CD
FileName = C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0
FileName = C:\Users
FileName = C:\Users\Administrator\AppData
FileName = C:\Users\Administrator\AppData\Local
FileName = C:\Users\Administrator\AppData\Local\Temp
FileName = C:\Users\Administrator\AppData\Local\%temp%
FileName = C:\Users\Administrator\AppData\Local\%temp%\*.*
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\MACHINE\SOFTWARE\The Silicon Realms Toolworks\Armadillo\{3BE69020E11FA404}
\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{665C94CF-F293-11D1-B2E4-0060975B8649}\TypeLib\
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-*\RefCount
Other behavior
Behavior description:检测自身是否被调试
details:IsDebuggerPresent
Behavior description:窗口信息
details:Pid = 3068, Hwnd=0xa0186, Text = Loading..., ClassName = Bitmap Window.
Behavior description:打开互斥体
details:Local\MSCTF.Asm.MutexDefault1
Behavior description:尝试打开调试器或监控软件的驱动设备对象
details:\??\SICE
\??\NTICE
Behavior description:调整进程token权限
details:SE_ASSIGNPRIMARYTOKEN_PRIVILEGE
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
Local\MSCTF.CtfActivated.Default1
Local\MSCTF.AsmCacheReady.Default1
Behavior description:可执行文件签名信息
details:C:\Users\Administrator\AppData\Local\Temp\Arm2E69.tmp(签名验证: 未通过)
C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0(签名验证: 未通过)
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 100.
[2]: MilliSeconds = 100.
[3]: MilliSeconds = 100.
[4]: MilliSeconds = 100.
[5]: MilliSeconds = 100.
[6]: MilliSeconds = 100.
[7]: MilliSeconds = 100.
Behavior description:可执行文件MD5
details:C:\Users\Administrator\AppData\Local\Temp\Arm2E69.tmp ---> e99a5f2bf65521137b0276146c2b493a
C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0 ---> 文件过大!
Behavior description:直接获取CPU时钟
details:EAX = 0xe70fce22, EDX = 0x00000077
Behavior description:加载新释放的文件
details:Image: C:\Users\ADMINI~1\AppData\Local\Temp\Arm2E69.tmp.
Image: C:\Users\Administrator\AppData\Local\%temp%\b70c.TMP0.
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号