VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load
6aa508d59bb9afd7d1cf11a6e7d3f8a4    Threatbook file behavior analysis report
Virscan.org multi-engine scan report
Basic Information
file name:6aa508d59bb9afd7d1cf11a6e7d3f8a4
file type:EXEx86
Submission time:2019-02-13 01:02:50
Threat level:malicious
MD5:6aa508d59bb9afd7d1cf11a6e7d3f8a4
sha256:1c2a90828a51b3684960c8d1d56f6163fa450f26a12a3aa418777b7dda643d06
Document Threat Intelligence IOC Report
No intelligence IOC detected
Intelligence decision system
Undetected intelligence determination system
Network behavior report
domains:0
dns:0
http:0
Document release report
file name:WERF695.tmp
file type:empty
file size:0
MD5:d41d8cd98f00b204e9800998ecf8427e
file name:wer5f7.tmp.hdmp
file type:MDMP crash report data
file size:45519915
MD5:bc4a436130f488615b03723a5077b94e
file name:werf695.tmp.werinternalmetadata.xml
file type:XML document, Little-endian UTF-16 Unicode text, with CRLF line terminators
file size:2616
MD5:6037ae6239a7bb4663dd431389b1e6f7
File process number report
Process details:0
                            
Document behavior signature report
Low risk behavior
General behavior:Creates a writable file in a temporary directory
Low risk behavior
General behavior:Contains ability to find and load resources of a specific module
Low risk behavior
System Environment Detection:Contains functionality to query system information
Low risk behavior
System Environment Detection:Contains ability to query machine timezone
Low risk behavior
General behavior:One or more processes crashed
Low risk behavior
System Environment Detection:Reads the active computer name
可疑行为
Reverse Engineering:Checks if process is being debugged by a debugger
可疑行为
Reverse Engineering:Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
可疑行为
General behavior:Contains functionality to enum modules
可疑行为
General behavior:Potential time zone aware malware
可疑行为
Information gathering:Contains functionality to retrieve information about pressed keystrokes
可疑行为
Anti-detection Technology:Checks amount of memory in system, this can be used to detect virtual machines that have a low amount of memory available
可疑行为
Anti-detection Technology:Checks adapter addresses which can be used to detect virtual network interfaces
可疑行为
Reverse Engineering:The binary likely contains encrypted or compressed data indicative of a packer
Static information
PE section table information
Section name:.text
Virtual address:0x00002000
Physical address:0x00001000
Physical size:0x0009c000
Section permissions:R-E
Section name:.rsrc
Virtual address:0x0009e000
Physical address:0x0009d000
Physical size:0x00001000
Section permissions:R--
Section name:.reloc
Virtual address:0x000a0000
Physical address:0x0009e000
Physical size:0x00001000
Section permissions:R--
PE basic information
import_hash:f34d5f2d4577ed6d9ceec516c1f5a744
time_stamp:2011-07-02 06:53:51
entry_point_section:.text
entry_point_section:.text
image_base:0x400000
entry_point:0x9d26e
PE resource information
name:RT_VERSION
language:LANG_NEUTRAL
filetype:data
sublanguage:SUBLANG_NEUTRAL
offset:0x0009e058
size:0x00000254

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号