VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load
6aad80fe467af3e5cb2c2486f3873cef    Threatbook file behavior analysis report
Virscan.org multi-engine scan report
Basic Information
file name:6aad80fe467af3e5cb2c2486f3873cef
file type:EXEx86
Submission time:2019-02-13 01:03:09
Threat level:malicious
MD5:6aad80fe467af3e5cb2c2486f3873cef
sha256:c2b6116eac1b25349128ddb5840f304527d2a0d97d9cf981e52cf52ace136435
Document Threat Intelligence IOC Report
No intelligence IOC detected
Intelligence decision system
Undetected intelligence determination system
Network behavior report
domains:0
dns:0
http:0
Document release report
file name:~DF558820A8AD2BA26C.TMP
file type:Composite Document File V2 Document, No summary info
file size:3072
MD5:a2feea0d82ac176d49ffa953662882a8
file name:scsD7E1.tmp
file type:ASCII text, with CRLF line terminators
file size:174
MD5:1d08020decc6aa416883dea43d77600d
file name:scsD811.tmp
file type:DOS batch file, ASCII text, with CRLF line terminators
file size:139
MD5:4c361dea398f7aeef49953bdc0ab4a9b
file name:.exe
file type:MS-DOS executable
file size:1478815
MD5:0d5202c3a095f1df21f9f59cc2898891
File process number report
Process details:0
                                      
Document behavior signature report
Low risk behavior
General behavior:Read or write ini files
Low risk behavior
System Environment Detection:Queries for the computername
Low risk behavior
General behavior:Contains ability to find and load resources of a specific module
Low risk behavior
System Environment Detection:Contains functionality to query system information
Low risk behavior
Static File Characteristics:Found potential IP address or url in binary/memory
Low risk behavior
System Environment Detection:Contains ability to query machine timezone
Low risk behavior
System Environment Detection:Contains functionality to query the account / user name
Low risk behavior
General behavior:One or more processes crashed
可疑行为
Reverse Engineering:Checks for the presence of known windows from debuggers and forensic tools
可疑行为
Reverse Engineering:Checks if process is being debugged by a debugger
可疑行为
Static File Characteristics:Creates executable files without a name
可疑行为
System Sensitive Operations:Creates executable files on the filesystem
可疑行为
System Sensitive Operations:Disables application error messsages (SetErrorMode)
可疑行为
General behavior:Contains functionality to enum modules
可疑行为
General behavior:Potential time zone aware malware
可疑行为
Information gathering:Contains functionality to retrieve information about pressed keystrokes
可疑行为
可疑行为
Static File Characteristics:PE file has nameless sections
可疑行为
Reverse Engineering:The binary likely contains encrypted or compressed data indicative of a packer
高危行为
System Sensitive Operations:Creates an executable file in a user folder
Static information
PE section table information
Section name:
Virtual address:0x00001000
Physical address:0x00001000
Physical size:0x0000f000
Section permissions:RWE
Section name:
Virtual address:0x0002c000
Physical address:0x00010000
Physical size:0x00000000
Section permissions:RWE
Section name:
Virtual address:0x0002e000
Physical address:0x00010000
Physical size:0x0000a000
Section permissions:RWE
Section name:.rsrc
Virtual address:0x0003e000
Physical address:0x0001a000
Physical size:0x0000a000
Section permissions:RWE
Section name:
Virtual address:0x00048000
Physical address:0x00024000
Physical size:0x0002c000
Section permissions:RWE
Section name:.data
Virtual address:0x002c6000
Physical address:0x00050000
Physical size:0x000d6000
Section permissions:RWE
PE basic information
import_hash:37c6c0cc4d20c311c793c6b743da8942
time_stamp:2011-06-15 03:01:16
entry_point_section:
entry_point_section:
image_base:0x400000
entry_point:0x64d2
PE resource information
name:RT_ICON
language:LANG_NEUTRAL
filetype:data
sublanguage:SUBLANG_NEUTRAL
offset:0x0003e2f8
size:0x00000cd0
name:RT_ICON
language:LANG_NEUTRAL
filetype:data
sublanguage:SUBLANG_NEUTRAL
offset:0x0003e2f8
size:0x00000cd0
name:RT_ICON
language:LANG_NEUTRAL
filetype:data
sublanguage:SUBLANG_NEUTRAL
offset:0x0003e2f8
size:0x00000cd0
name:RT_ICON
language:LANG_NEUTRAL
filetype:data
sublanguage:SUBLANG_NEUTRAL
offset:0x0003e2f8
size:0x00000cd0
name:RT_ICON
language:LANG_NEUTRAL
filetype:data
sublanguage:SUBLANG_NEUTRAL
offset:0x0003e2f8
size:0x00000cd0
name:RT_ICON
language:LANG_NEUTRAL
filetype:data
sublanguage:SUBLANG_NEUTRAL
offset:0x0003e2f8
size:0x00000cd0
name:RT_ICON
language:LANG_NEUTRAL
filetype:data
sublanguage:SUBLANG_NEUTRAL
offset:0x0003e2f8
size:0x00000cd0
name:RT_ICON
language:LANG_NEUTRAL
filetype:data
sublanguage:SUBLANG_NEUTRAL
offset:0x0003e2f8
size:0x00000cd0
name:RT_ICON
language:LANG_NEUTRAL
filetype:data
sublanguage:SUBLANG_NEUTRAL
offset:0x0003e2f8
size:0x00000cd0
name:RT_ICON
language:LANG_NEUTRAL
filetype:data
sublanguage:SUBLANG_NEUTRAL
offset:0x0003e2f8
size:0x00000cd0
name:RT_ICON
language:LANG_NEUTRAL
filetype:data
sublanguage:SUBLANG_NEUTRAL
offset:0x0003e2f8
size:0x00000cd0
name:RT_ICON
language:LANG_NEUTRAL
filetype:data
sublanguage:SUBLANG_NEUTRAL
offset:0x0003e2f8
size:0x00000cd0
name:RT_GROUP_ICON
language:LANG_NEUTRAL
filetype:MS Windows icon resource - 12 icons, 32x32, 256-colors
sublanguage:SUBLANG_NEUTRAL
offset:0x00047cb8
size:0x000000ae
name:RT_VERSION
language:LANG_ENGLISH
filetype:data
sublanguage:SUBLANG_ENGLISH_US
offset:0x00047d68
size:0x000001f4

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号