VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load
52fdfdf60f79f0d59922ae6a20ace18c    Threatbook file behavior analysis report
Virscan.org multi-engine scan report
Basic Information
file name:52fdfdf60f79f0d59922ae6a20ace18c
file type:EXEx86
Submission time:2019-03-16 01:02:03
Threat level:clean
MD5:52fdfdf60f79f0d59922ae6a20ace18c
sha256:2862bc2300c626a050335d8f97ae42b9cc83fc827476dbc1cbf0a9e7781f1386
Document Threat Intelligence IOC Report
No intelligence IOC detected
Intelligence decision system
Undetected intelligence determination system
Network behavior report
domains:0
dns:0
http:0
udp:0
smtp:0
icmp:0
irc:0
hosts:0
Document release report
file name:.exe
file type:MS-DOS executable
file size:607407
MD5:524ac77e5b9dcb8a34ce791e995de473
file name:~DF75CD2E5C91C29295.TMP
file type:Composite Document File V2 Document, No summary info
file size:3072
MD5:a05c5a54e14a89fe423d45816724b9b2
file name:scsA76B.tmp
file type:ASCII text, with CRLF line terminators
file size:174
MD5:1d08020decc6aa416883dea43d77600d
file name:scsA7D9.tmp
file type:DOS batch file, ASCII text, with CRLF line terminators
file size:139
MD5:4c361dea398f7aeef49953bdc0ab4a9b
File process number report
Process details:共分析了2个进程
Document behavior signature report
Low risk behavior
General behavior:Read or write ini files
Suspicious behavior0
High risk behavior0
Low risk behavior
System Environment Detection:Queries for the computername
Suspicious behavior0
High risk behavior0
Low risk behavior
System Sensitive Operations:Creates executable files on the filesystem
Suspicious behavior0
High risk behavior0
Low risk behavior
General behavior:Contains ability to find and load resources of a specific module
Suspicious behavior0
High risk behavior0
Low risk behavior
System Environment Detection:Contains functionality to query system information
Suspicious behavior0
High risk behavior0
Low risk behavior
Static File Characteristics:Found potential IP address or url in binary/memory
Suspicious behavior0
High risk behavior0
Low risk behavior
System Environment Detection:Contains functionality to query the account / user name
Suspicious behavior0
High risk behavior0
Low risk behavior
General behavior:One or more processes crashed
Suspicious behavior0
High risk behavior0
Low risk behavior
System Environment Detection:Reads the active computer name
Suspicious behavior0
High risk behavior0
Low risk behavior0
Suspicious behavior
Reverse Engineering:Checks for the presence of known windows from debuggers and forensic tools
High risk behavior0
Low risk behavior0
Suspicious behavior
Reverse Engineering:Checks if process is being debugged by a debugger
High risk behavior0
Low risk behavior0
Suspicious behavior
Static File Characteristics:Creates executable files without a name
High risk behavior0
Low risk behavior0
Suspicious behavior
System Sensitive Operations:Disables application error messsages (SetErrorMode)
High risk behavior0
Low risk behavior0
Suspicious behavior
Information gathering:Contains functionality to retrieve information about pressed keystrokes
High risk behavior0
Low risk behavior0
Suspicious behavior
High risk behavior0
Low risk behavior0
Suspicious behavior0
High risk behavior
System Sensitive Operations:Creates an executable file in a user folder
Static information
Section name:.text
Virtual address:0x00001000
Physical address:0x00001000
Physical size:0x0002b000
Section permissions:R-E
Section name:.data
Virtual address:0x0002c000
Physical address:0x0002c000
Physical size:0x00001000
Section permissions:RW-
Section name:.rsrc
Virtual address:0x0002e000
Physical address:0x0002d000
Physical size:0x00060000
Section permissions:R--
import_hash:98f67c550a7da65513e63ffd998f6b2e
time_stamp:2011-06-15 03:01:16
entry_point_section:.text
entry_point_section:.text
image_base:0x400000
entry_point:0x3670
name:RT_ICON
language:LANG_NEUTRAL
filetype:data
sublanguage:SUBLANG_NEUTRAL
offset:0x0002e2c8
size:0x00000cd0
name:RT_ICON
language:LANG_NEUTRAL
filetype:data
sublanguage:SUBLANG_NEUTRAL
offset:0x0002e2c8
size:0x00000cd0
name:RT_ICON
language:LANG_NEUTRAL
filetype:data
sublanguage:SUBLANG_NEUTRAL
offset:0x0002e2c8
size:0x00000cd0
name:RT_ICON
language:LANG_NEUTRAL
filetype:data
sublanguage:SUBLANG_NEUTRAL
offset:0x0002e2c8
size:0x00000cd0
name:RT_ICON
language:LANG_NEUTRAL
filetype:data
sublanguage:SUBLANG_NEUTRAL
offset:0x0002e2c8
size:0x00000cd0
name:RT_ICON
language:LANG_NEUTRAL
filetype:data
sublanguage:SUBLANG_NEUTRAL
offset:0x0002e2c8
size:0x00000cd0
name:RT_ICON
language:LANG_NEUTRAL
filetype:data
sublanguage:SUBLANG_NEUTRAL
offset:0x0002e2c8
size:0x00000cd0
name:RT_ICON
language:LANG_NEUTRAL
filetype:data
sublanguage:SUBLANG_NEUTRAL
offset:0x0002e2c8
size:0x00000cd0
name:RT_ICON
language:LANG_NEUTRAL
filetype:data
sublanguage:SUBLANG_NEUTRAL
offset:0x0002e2c8
size:0x00000cd0
name:RT_ICON
language:LANG_NEUTRAL
filetype:data
sublanguage:SUBLANG_NEUTRAL
offset:0x0002e2c8
size:0x00000cd0
name:RT_ICON
language:LANG_NEUTRAL
filetype:data
sublanguage:SUBLANG_NEUTRAL
offset:0x0002e2c8
size:0x00000cd0
name:RT_GROUP_ICON
language:LANG_NEUTRAL
filetype:MS Windows icon resource - 11 icons, 32x32, 256-colors
sublanguage:SUBLANG_NEUTRAL
offset:0x0008d108
size:0x000000a0
name:RT_VERSION
language:LANG_ENGLISH
filetype:data
sublanguage:SUBLANG_ENGLISH_US
offset:0x0008d1a8
size:0x000001d0

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号