VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:84
Behavior list
Basic Information
MD5:0b27539263a36354933241e82ff151f7
file type:EXE
Production company:IT源助力_火山薅羊毛
version:1.0.1.0---1.0.1.0
Shell or compiler information:PACKER:UPX 0.89.6 - 1.02 / 1.05 - 1.24 -> Markus & Laszlo
Subfile information:upx_c_46b455d3dumpFile / 7de4f3aed242074068e3c22882d350de / EXE
Key behavior
Behavior description:直接调用系统关键API
details:Index = 0x0000007B, Name: NtOpenProcessToken, Instruction Address = 0x0042FA1D
Index = 0x0000000B, Name: NtAdjustPrivilegesToken, Instruction Address = 0x0042FB67
Index = 0x00000019, Name: NtClose, Instruction Address = 0x0042F991
Index = 0x000000B2, Name: NtQueryVirtualMemory, Instruction Address = 0x00432D2B
Index = 0x000000B2, Name: NtQueryVirtualMemory, Instruction Address = 0x004123C9
Behavior description:直接获取CPU时钟
details:EAX = 0x0fdf00b4, EDX = 0x000000b7
EAX = 0x4f223df5, EDX = 0x000000b7
EAX = 0x4f223e41, EDX = 0x000000b7
EAX = 0x4f223e8d, EDX = 0x000000b7
EAX = 0x4f223ed9, EDX = 0x000000b7
EAX = 0x4f223f25, EDX = 0x000000b7
EAX = 0x4f223f71, EDX = 0x000000b7
EAX = 0x4f223fbd, EDX = 0x000000b7
EAX = 0x4f224009, EDX = 0x000000b7
EAX = 0x4f224055, EDX = 0x000000b7
Process behavior
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2696, ThreadID = 2708, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2696, ThreadID = 2916, StartAddress = 4AEA7456, Parameter = 00000000
File behavior
Behavior description:创建文件
details:C:\WINDOWS\system32\yxkey.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\354f7.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\355c3.tmp
Behavior description:创建可执行文件
details:C:\WINDOWS\system32\yxkey.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\354f7.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\355c3.tmp
Behavior description:查找文件
details:FileName = C:\WINDOWS\system32\yxkey.dll
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\354f7.tmp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\355c3.tmp
Behavior description:删除文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\354f7.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\355c3.tmp
Behavior description:复制文件
details:C:\WINDOWS\system32\ntdll.dll ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\354f7.tmp
C:\WINDOWS\system32\user32.dll ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\355c3.tmp
Behavior description:修改文件内容
details:C:\WINDOWS\system32\yxkey.dll ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\354f7.tmp ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\354f7.tmp ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Temp\354f7.tmp ---> Offset = 131072
C:\Documents and Settings\Administrator\Local Settings\Temp\354f7.tmp ---> Offset = 196608
C:\Documents and Settings\Administrator\Local Settings\Temp\354f7.tmp ---> Offset = 262144
C:\Documents and Settings\Administrator\Local Settings\Temp\355c3.tmp ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\355c3.tmp ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Temp\355c3.tmp ---> Offset = 131072
C:\Documents and Settings\Administrator\Local Settings\Temp\355c3.tmp ---> Offset = 196608
C:\Documents and Settings\Administrator\Local Settings\Temp\355c3.tmp ---> Offset = 262144
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Multimedia\DrawDib\vga.drv 1920x973x32(BGR 0)
Other behavior
Behavior description:直接调用系统关键API
details:Index = 0x0000007B, Name: NtOpenProcessToken, Instruction Address = 0x0042FA1D
Index = 0x0000000B, Name: NtAdjustPrivilegesToken, Instruction Address = 0x0042FB67
Index = 0x00000019, Name: NtClose, Instruction Address = 0x0042F991
Index = 0x000000B2, Name: NtQueryVirtualMemory, Instruction Address = 0x00432D2B
Index = 0x000000B2, Name: NtQueryVirtualMemory, Instruction Address = 0x004123C9
Behavior description:创建互斥体
details:RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
Behavior description:打开互斥体
details:RasPbFile
ShimCacheMutex
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
Behavior description:调整进程token权限
details:SE_DEBUG_PRIVILEGE
Behavior description:窗口信息
details:Pid = 2696, Hwnd=0x10354, Text = 视频分离系统, ClassName = Button.
Pid = 2696, Hwnd=0x10352, Text = 手机注册系统, ClassName = Button.
Pid = 2696, Hwnd=0x10350, Text = 刷单行为系统, ClassName = Button.
Pid = 2696, Hwnd=0x1034e, Text = 微信提现系统, ClassName = Button.
Pid = 2696, Hwnd=0x1034a, Text = 总控台, ClassName = WTWindow.
Behavior description:可执行文件签名信息
details:C:\WINDOWS\system32\yxkey.dll(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\354f7.tmp(签名验证: 通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\355c3.tmp(签名验证: 通过)
Behavior description:隐藏指定窗口
details:[Window,Class] = [,Comet.Shadow]
Behavior description:可执行文件MD5
details:C:\WINDOWS\system32\yxkey.dll ---> 032319ae9e8756d3c3eb3d08e04079b2
C:\Documents and Settings\Administrator\Local Settings\Temp\354f7.tmp ---> 9e762b21dd4d10695799a9a6e9570b79
C:\Documents and Settings\Administrator\Local Settings\Temp\355c3.tmp ---> f697644d5f59050fbe6af896c19cca93
Behavior description:直接获取CPU时钟
details:EAX = 0x0fdf00b4, EDX = 0x000000b7
EAX = 0x4f223df5, EDX = 0x000000b7
EAX = 0x4f223e41, EDX = 0x000000b7
EAX = 0x4f223e8d, EDX = 0x000000b7
EAX = 0x4f223ed9, EDX = 0x000000b7
EAX = 0x4f223f25, EDX = 0x000000b7
EAX = 0x4f223f71, EDX = 0x000000b7
EAX = 0x4f223fbd, EDX = 0x000000b7
EAX = 0x4f224009, EDX = 0x000000b7
EAX = 0x4f224055, EDX = 0x000000b7
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号