VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:76
Behavior list
Basic Information
MD5:ff2078423848e9ecd7b5caa5c4b756bc
file type:EXE
Production company:
version:
Shell or compiler information:
Key behavior
Behavior description:探测 Virtual PC是否存在
details:N/A
Behavior description:设置消息钩子
details:C:\WINDOWS\system32\DINPUT.dll
Behavior description:尝试打开调试器或监控软件的驱动设备对象
details:\??\SIce
\??\NTICE
\??\SIWVID
Behavior description:获取TickCount值
details:TickCount = 545921, SleepMilliseconds = 60000.
TickCount = 545937, SleepMilliseconds = 60000.
TickCount = 545953, SleepMilliseconds = 60000.
TickCount = 545968, SleepMilliseconds = 60000.
TickCount = 545984, SleepMilliseconds = 60000.
TickCount = 546031, SleepMilliseconds = 60000.
TickCount = 546046, SleepMilliseconds = 60000.
TickCount = 546062, SleepMilliseconds = 60000.
TickCount = 546234, SleepMilliseconds = 60000.
TickCount = 546500, SleepMilliseconds = 60000.
TickCount = 487204, SleepMilliseconds = 1.
TickCount = 487219, SleepMilliseconds = 1.
TickCount = 487329, SleepMilliseconds = 1.
TickCount = 487344, SleepMilliseconds = 1.
TickCount = 487516, SleepMilliseconds = 1.
Behavior description:修改注册表
details:\REGISTRY\MACHINE\SOFTWARE\Licenses\{K7C0DB872A3F777C0}
\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B979651E-6736-3526-93DC-B061A3736826}\
\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B979651E-6736-3526-93DC-B061A3736826}\InProcServer32\
\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B979651E-6736-3526-93DC-B061A3736826}\InProcServer32\ThreadingModel
\REGISTRY\MACHINE\SOFTWARE\Licenses\{I01FA40C665CEB4C3}
Behavior description:查询注册表_检测虚拟机相关
details:\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
Behavior description:查找反病毒常用工具窗口
details:NtUserFindWindowEx: [Class,Window] = [FileMonClass,]
NtUserFindWindowEx: [Class,Window] = [RegMonClass,]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
Process behavior
Behavior description:创建本地线程
details:N/A
Behavior description:进程退出
details:N/A
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\All Users\Application Data\TEMP\RAIDTest
C:\Documents and Settings\All Users\Application Data\TEMP:7A1689B3
C:\Documents and Settings\All Users\Application Data\Licenses\001FA40C665CEB4C3.Lic
Behavior description:覆盖已有文件
details:C:\Documents and Settings\All Users\Application Data\TEMP:7A1689B3
C:\Documents and Settings\All Users\Application Data\Licenses\001FA40C665CEB4C3.Lic
Behavior description:修改文件内容
details:C:\Documents and Settings\All Users\Application Data\TEMP\RAIDTest---> Offset = 0
C:\Documents and Settings\All Users\Application Data\TEMP:7A1689B3---> Offset = 0
C:\Documents and Settings\All Users\Application Data\Licenses\001FA40C665CEB4C3.Lic---> Offset = 0
Behavior description:查找文件
details:FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\WINDOWS\*
FileName = C:\*
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\*
FileName = C:\WINDOWS\system32\*
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\*
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\MACHINE\SOFTWARE\Licenses\{K7C0DB872A3F777C0}
\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B979651E-6736-3526-93DC-B061A3736826}\
\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B979651E-6736-3526-93DC-B061A3736826}\InProcServer32\
\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B979651E-6736-3526-93DC-B061A3736826}\InProcServer32\ThreadingModel
\REGISTRY\MACHINE\SOFTWARE\Licenses\{I01FA40C665CEB4C3}
Behavior description:删除注册表键值
details:\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B979651E-6736-3526-93DC-B061A3736826}\0
Behavior description:查询注册表_检测虚拟机相关
details:\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
Other behavior
Behavior description:探测 Virtual PC是否存在
details:N/A
Behavior description:创建互斥体
details:RAL67FB73B4
67FB73B4::WK
DDrawWindowListMutex
DDrawDriverObjectListMutex
__DDrawExclMode__
__DDrawCheckExclMode__
DirectSound DllMain mutex (0x00000540)
{10-2C-VS-32-56-SA-42-K0-PP-1S-38-94}
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = __REALITYLAB_INIT_EVENT__
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
Behavior description:枚举窗口
details:N/A
Behavior description:获取系统权限
details:SE_INC_BASE_PRIORITY_PRIVILEGE
Behavior description:尝试打开调试器或监控软件的驱动设备对象
details:\??\SIce
\??\NTICE
\??\SIWVID
Behavior description:窗口信息
details:Pid = 1344, Hwnd=0x202a8, Text = 确定, ClassName = Button.
Pid = 1344, Hwnd=0x202b4, Text = 请由 PlayOnline “易玩通”娱乐平台启动, ClassName = Static.
Pid = 1344, Hwnd=0x202a4, Text = 错误, ClassName = #32770.
Behavior description:直接操作物理设备
details:\??\PHYSICALDRIVE0
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 60000.
[2]: MilliSeconds = 60000.
[3]: MilliSeconds = 100.
[4]: MilliSeconds = 200.
Behavior description:获取TickCount值
details:TickCount = 545921, SleepMilliseconds = 60000.
TickCount = 545937, SleepMilliseconds = 60000.
TickCount = 545953, SleepMilliseconds = 60000.
TickCount = 545968, SleepMilliseconds = 60000.
TickCount = 545984, SleepMilliseconds = 60000.
TickCount = 546031, SleepMilliseconds = 60000.
TickCount = 546046, SleepMilliseconds = 60000.
TickCount = 546062, SleepMilliseconds = 60000.
TickCount = 546234, SleepMilliseconds = 60000.
TickCount = 546500, SleepMilliseconds = 60000.
TickCount = 487204, SleepMilliseconds = 1.
TickCount = 487219, SleepMilliseconds = 1.
TickCount = 487329, SleepMilliseconds = 1.
TickCount = 487344, SleepMilliseconds = 1.
TickCount = 487516, SleepMilliseconds = 1.
Behavior description:程序异常崩溃信息
details:EAX=0x00000000, EBX=0x000000AF, ECX=0x00000000, EDX=0x7C92E4F4,ESI=0x536CD652, EDI=0x001310C4, EBP=0x01384000, ESP=0x0012FF98,EIP=0x013841B3, ExceptionCode=0xC0000005(ACCESS_VIOLATION),ExceptionModule=C:\Documents and Settings\Administrator\Local Settings\Te Disassembly: 0x013841B3: pop dword ptr [eax] 0x013841B5: pop dword ptr fs:[0000h] 0x013841BB: add esp, 04h 0x013841BE: pop eax 0x013841BF: xor edi, edi 0x013841C1: inc edi 0x013841C2: pushad 0x013841C3: xor ecx, ecx 0x013841C5: jne 013841C9h 0x013841C7: jmp 013841DEh 0x013841C9: jmp 013841FEh 0x013841CB: leave 0x013841CC: jne 013841E6h 0x013841CE: jp 013841DCh 0x013841D0: jo 013841E0h 0x013841D2: jmp 013841E1h 0x013841D4: call FFFFFFFFF2B1504Bh 0x013841D9: call dword ptr [74097900h] 0x013841DF: jmp 01384169h 0x013841E2: fstp tbyte ptr [edx-10h]
EAX=0x00000000, EBX=0x00000000, ECX=0x00000070, EDX=0x013845CF,ESI=0x0138D9E7, EDI=0x00000008, EBP=0x01384000, ESP=0x0012FF98,EIP=0x01384888, ExceptionCode=0xC0000005(ACCESS_VIOLATION),ExceptionModule=C:\Documents and Settings\Administrator\Local Settings\Te Disassembly: 0x01384888: pop dword ptr [eax] 0x0138488A: pop dword ptr fs:[0000h] 0x01384890: add esp, 04h 0x01384893: pop eax 0x01384894: mov esi, eax 0x01384896: and esi, FFFF0000h 0x0138489C: mov ebx, 00000BF1h 0x013848A1: add ebx, ebp 0x013848A3: call ebx 0x013848A5: pushad 0x013848A6: xor ecx, ecx 0x013848A8: jne 013848ACh 0x013848AA: jmp 013848C1h 0x013848AC: jmp 013848E1h 0x013848AE: leave 0x013848AF: jne 013848C9h 0x013848B1: jp 013848BFh 0x013848B3: jo 013848C3h 0x013848B5: jmp 013848C4h
EAX=0x00000000, EBX=0x0138BF00, ECX=0x00000000, EDX=0x013878CD,ESI=0x7C80441C, EDI=0x00000004, EBP=0x01384000, ESP=0x0012FF7C,EIP=0x01387A84, ExceptionCode=0xC0000005(ACCESS_VIOLATION),ExceptionModule=C:\Documents and Settings\Administrator\Local Settings\Te Disassembly: 0x01387A84: pop dword ptr [eax] 0x01387A86: pop dword ptr fs:[0000h] 0x01387A8C: add esp, 04h 0x01387A8F: popad 0x01387A90: push eax 0x01387A91: push ecx 0x01387A92: bswap edx 0x01387A94: not edx 0x01387A96: pushfd 0x01387A97: not edx 0x01387A99: bswap edx 0x01387A9B: jmp 01387AACh 0x01387A9D: mov ecx, EBB80FEBh 0x01387AA2: pop es 0x01387AA3: mov ecx, EB900FEBh 0x01387AA8: or ch, bh 0x01387AAA: jmp 01387AB7h 0x01387AAC: jmp 01387AA4h 0x01387AAF: jmp 01387AA7h 0x01387AB1: jmp 01387ABCh 0x01387AB4: std
Behavior description:查找反病毒常用工具窗口
details:NtUserFindWindowEx: [Class,Window] = [FileMonClass,]
NtUserFindWindowEx: [Class,Window] = [RegMonClass,]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号