VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:97
Behavior list
Basic Information
MD5:476b9bd816fa4ddf98486b1177a7d32e
file type:EXE
Production company:Sysinternals - www.sysinternals.com
version:2.91.0.0---2.91
Shell or compiler information:COMPILER:Microsoft Visual C++ [Overlay]
Key behavior
Behavior description:常规加载驱动
details:\??\C:\WINDOWS\system32\Drivers\PROCMON20.SYS
Behavior description:查找PE资源信息
details:(FindResourceW) hModule = 0x00000000, ResName: RCDRIVERNT, ResType: BINRES
Behavior description:获取窗口截图信息
details:Foreground window Info: HWND = 0x00000000, DC = 0x9b01055d.
File behavior
Behavior description:创建文件
details:C:\WINDOWS\system32\drivers\PROCMON20.SYS
Behavior description:删除文件
details:C:\WINDOWS\system32\drivers\PROCMON20.SYS
Behavior description:修改文件内容
details:C:\WINDOWS\system32\drivers\PROCMON20.SYS ---> Offset = 0
C:\WINDOWS\system32\drivers\PROCMON20.SYS ---> Offset = 49152
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Sysinternals\Process Monitor\EulaAccepted
\REGISTRY\USER\S-*_CLASSES\.PML\
\REGISTRY\USER\S-*_CLASSES\ProcMon.Logfile.1\
\REGISTRY\USER\S-*_CLASSES\ProcMon.Logfile.1\shell\open\command\
\REGISTRY\USER\S-*_CLASSES\ProcMon.Logfile.1\DefaultIcon\
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\PROCMON20\Type
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\PROCMON20\ErrorControl
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\PROCMON20\Instances\DefaultInstance
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\PROCMON20\Instances\Process Monitor Instance\Altitude
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\PROCMON20\Instances\Process Monitor Instance\Flags
\REGISTRY\USER\S-*\Software\Sysinternals\Process Monitor\MainWindow
\REGISTRY\USER\S-*\Software\Sysinternals\Process Monitor\Columns
\REGISTRY\USER\S-*\Software\Sysinternals\Process Monitor\ColumnCount
\REGISTRY\USER\S-*\Software\Sysinternals\Process Monitor\ColumnMap
\REGISTRY\USER\S-*\Software\Sysinternals\Process Monitor\DbgHelpPath
Behavior description:删除注册表键值
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\PROCMON20\Type
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\PROCMON20\ErrorControl
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\PROCMON20\Start
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\PROCMON20\ImagePath
Behavior description:修改注册表_服务项
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\PROCMON20\Start
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\PROCMON20\ImagePath
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.ELE
Behavior description:隐藏指定窗口
details:[Window,Class] = [balloon,BALLOON]
[Window,Class] = [Process Monitor - Sysinternals: www.sysinternals.com,PROCMON_WINDOW_CLASS]
Behavior description:常规加载驱动
details:\??\C:\WINDOWS\system32\Drivers\PROCMON20.SYS
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [OleMainThreadWndClass,]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000053
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000053
MSCTF.SendReceiveConection.Event.ELH.IC
MSCTF.SendReceive.Event.ELH.IC
Behavior description:调整进程token权限
details:SE_DEBUG_PRIVILEGE
SE_LOAD_DRIVER_PRIVILEGE
Behavior description:窗口信息
details:Pid = 1608, Hwnd=0x1a0324, Text = You can also use the /accepteula command-line switch to accept the EULA., ClassName = Static.
Pid = 1608, Hwnd=0x1b02b6, Text = &Agree, ClassName = Button.
Pid = 1608, Hwnd=0xf033c, Text = &Decline, ClassName = Button.
Pid = 1608, Hwnd=0x60380, Text = &Print, ClassName = Button.
Pid = 1608, Hwnd=0x140306, Text = SYSINTERNALS SOFTWARE LICENSE TERMS These license terms are an agreement between Sysinternals (a wholly owned subsidiary of Micro, ClassName = RICHEDIT.
Pid = 1608, Hwnd=0xb02ae, Text = Process Monitor License Agreement, ClassName = #32770.
Pid = 1608, Hwnd=0x150306, Text = Process Monitor - Sysinternals: www.sysinternals.com, ClassName = PROCMON_WINDOW_CLASS.
Pid = 1608, Hwnd=0x603c6, Text = 确定, ClassName = Button.
Pid = 1608, Hwnd=0x15030c, Text = Unable to load Process Monitor device driver, ClassName = Static.
Pid = 1608, Hwnd=0xf034a, Text = Process Monitor, ClassName = #32770.
Pid = 1608, Hwnd=0x10033c, Text = No events (capture disabled), ClassName = msctls_statusbar32.
Behavior description:查找PE资源信息
details:(FindResourceW) hModule = 0x00000000, ResName: RCDRIVERNT, ResType: BINRES
Behavior description:获取窗口截图信息
details:Foreground window Info: HWND = 0x00000000, DC = 0x9b01055d.
Behavior description:创建事件对象
details:EventName = MSCTF.SendReceive.Event.ELE.IC
EventName = MSCTF.SendReceiveConection.Event.ELE.IC
Behavior description:打开互斥体
details:ShimCacheMutex
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号