VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:70
Behavior list
Basic Information
MD5:fda826a2bb5e465a44b232fdc2ce6aa7
file type:EXE
Production company:Doodk
version:3.3.2017.9140---3.3.2017.09140
Shell or compiler information:COMPILER:Microsoft Visual C# / Basic .NET
Key behavior
Behavior description:直接获取CPU时钟
details:EAX = 0x5efc9537, EDX = 0x00000077
EAX = 0x61af94b3, EDX = 0x00000077
EAX = 0x61af94ff, EDX = 0x00000077
EAX = 0x61af954b, EDX = 0x00000077
EAX = 0x8e8f6815, EDX = 0x00000077
EAX = 0x9e6b039b, EDX = 0x00000077
EAX = 0xf54c79c0, EDX = 0x00000077
EAX = 0x84b8918c, EDX = 0x00000078
EAX = 0x84b891d8, EDX = 0x00000078
EAX = 0x9468fd6b, EDX = 0x00000078
Behavior description:获取TickCount值
details:TickCount = 203671, SleepMilliseconds = 60000.
TickCount = 208125, SleepMilliseconds = 60000.
TickCount = 208687, SleepMilliseconds = 60000.
TickCount = 208843, SleepMilliseconds = 60000.
TickCount = 209015, SleepMilliseconds = 60000.
TickCount = 209031, SleepMilliseconds = 60000.
TickCount = 209218, SleepMilliseconds = 60000.
TickCount = 209296, SleepMilliseconds = 60000.
TickCount = 209406, SleepMilliseconds = 60000.
TickCount = 209468, SleepMilliseconds = 60000.
TickCount = 209531, SleepMilliseconds = 60000.
TickCount = 209593, SleepMilliseconds = 60000.
TickCount = 209718, SleepMilliseconds = 60000.
TickCount = 209734, SleepMilliseconds = 60000.
TickCount = 209750, SleepMilliseconds = 60000.
Process behavior
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:创建文件
details:C:\Users\Administrator\AppData\Local\GDIPFONTCACHEV1.DAT
Behavior description:查找文件
details:FileName = C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll
FileName = C:\Windows\Microsoft.NET\Framework\\*
FileName = C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\*
FileName = C:\Users
FileName = C:\Users\Administrator\AppData
FileName = C:\Users\Administrator\AppData\Local
FileName = C:\Users\Administrator\AppData\Local\Temp
FileName = C:\Users\Administrator\AppData\Local\%temp%
FileName = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe
FileName = C:\Users\Administrator
FileName = C:\Windows\assembly\NativeImages_v4.0.30319_32\AutoFishing\*
FileName = C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Windows.Forms\*
FileName = C:\Windows\assembly\NativeImages_v4.0.30319_32\System\*
FileName = C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Drawing\*
FileName = C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Speech\*
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\GDIPlus\FontCachePath
Other behavior
Behavior description:检测自身是否被调试
details:IsDebuggerPresent
Behavior description:创建互斥体
details:Global\dc63e842-5557-11e6-beb8-9e71128cae77
Behavior description:创建事件对象
details:EventName = Global\CPFATE_1960_v4.0.30319
Behavior description:打开事件
details:Global\CLR_PerfMon_StartEnumEvent
\KernelObjects\LowMemoryCondition
HookSwitchHookEnabledEvent
MSFT.VSA.COM.DISABLE.1960
MSFT.VSA.IEC.STATUS.6c736db0
Local\MSCTF.CtfActivated.Default1
Local\MSCTF.AsmCacheReady.Default1
Behavior description:打开互斥体
details:Local\MSCTF.Asm.MutexDefault1
Behavior description:枚举窗口
details:N/A
Behavior description:获取TickCount值
details:TickCount = 203671, SleepMilliseconds = 60000.
TickCount = 208125, SleepMilliseconds = 60000.
TickCount = 208687, SleepMilliseconds = 60000.
TickCount = 208843, SleepMilliseconds = 60000.
TickCount = 209015, SleepMilliseconds = 60000.
TickCount = 209031, SleepMilliseconds = 60000.
TickCount = 209218, SleepMilliseconds = 60000.
TickCount = 209296, SleepMilliseconds = 60000.
TickCount = 209406, SleepMilliseconds = 60000.
TickCount = 209468, SleepMilliseconds = 60000.
TickCount = 209531, SleepMilliseconds = 60000.
TickCount = 209593, SleepMilliseconds = 60000.
TickCount = 209718, SleepMilliseconds = 60000.
TickCount = 209734, SleepMilliseconds = 60000.
TickCount = 209750, SleepMilliseconds = 60000.
Behavior description:调整进程token权限
details:SE_DEBUG_PRIVILEGE
Behavior description:窗口信息
details:Pid = 1960, Hwnd=0x70204, Text = 简体中文, ClassName = WindowsForms10.COMBOBOX.app.0.141b42a_r14_ad1.
Pid = 1960, Hwnd=0x40184, Text = 钓鱼相关, ClassName = WindowsForms10.Window.8.app.0.141b42a_r14_ad1.
Pid = 1960, Hwnd=0x401b6, Text = 钓鱼按键:, ClassName = WindowsForms10.STATIC.app.0.141b42a_r14_ad1.
Pid = 1960, Hwnd=0x3024a, Text = 游戏中的钓鱼键位, ClassName = WindowsForms10.EDIT.app.0.141b42a_r14_ad1.
Pid = 1960, Hwnd=0x501d4, Text = 寻找浮标效率, ClassName = WindowsForms10.Window.8.app.0.141b42a_r14_ad1.
Pid = 1960, Hwnd=0x801d2, Text = 精确, ClassName = WindowsForms10.COMBOBOX.app.0.141b42a_r14_ad1.
Pid = 1960, Hwnd=0x501e0, Text = 寻找浮标范围, ClassName = WindowsForms10.Window.8.app.0.141b42a_r14_ad1.
Pid = 1960, Hwnd=0x501ec, Text = 显示/选择范围, ClassName = WindowsForms10.BUTTON.app.0.141b42a_r14_ad1.
Pid = 1960, Hwnd=0x501e8, Text = 游戏网络延时:, ClassName = WindowsForms10.STATIC.app.0.141b42a_r14_ad1.
Pid = 1960, Hwnd=0x501ea, Text = 100 毫秒, ClassName = WindowsForms10.EDIT.app.0.141b42a_r14_ad1.
Pid = 1960, Hwnd=0x50170, Text = 确定修改时间, ClassName = WindowsForms10.BUTTON.app.0.141b42a_r14_ad1.
Pid = 1960, Hwnd=0x40162, Text = 钓鱼时长, ClassName = WindowsForms10.Window.8.app.0.141b42a_r14_ad1.
Pid = 1960, Hwnd=0x50176, Text = 此处显示钓鱼剩余时间, ClassName = WindowsForms10.EDIT.app.0.141b42a_r14_ad1.
Pid = 1960, Hwnd=0xc01ca, Text = 自动钓鱼每次试用限时15分钟, ClassName = WindowsForms10.STATIC.app.0.141b42a_r14_ad1.
Pid = 1960, Hwnd=0xc01fc, Text = 输入注册码, 解锁自动鱼饵功能, 并取消钓鱼限时, ClassName = WindowsForms10.Window.8.app.0.141b42a_r14_ad1.
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 60000.
[2]: MilliSeconds = 800.
[3]: MilliSeconds = -1.
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ComboLBox]
Behavior description:获取光标位置
details:CursorPos = (806,18728), SleepMilliseconds = 60000.
CursorPos = (7099,26761), SleepMilliseconds = 60000.
Behavior description:直接获取CPU时钟
details:EAX = 0x5efc9537, EDX = 0x00000077
EAX = 0x61af94b3, EDX = 0x00000077
EAX = 0x61af94ff, EDX = 0x00000077
EAX = 0x61af954b, EDX = 0x00000077
EAX = 0x8e8f6815, EDX = 0x00000077
EAX = 0x9e6b039b, EDX = 0x00000077
EAX = 0xf54c79c0, EDX = 0x00000077
EAX = 0x84b8918c, EDX = 0x00000078
EAX = 0x84b891d8, EDX = 0x00000078
EAX = 0x9468fd6b, EDX = 0x00000078
Behavior description:导入密钥
details:[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x6B1F3828, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x6B25F920, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x0032AA3C, DataLen: 148, Flags: 0x00000000
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号