VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:75
Behavior list
Basic Information
MD5:6a7728e872c943ffe352515af32b915f
file type:EXE
Production company:The Enigma Protector Developers Team
version:7.5.0.0---7.5.0.0
Shell or compiler information:PACKER:UPolyX v0.5
Key behavior
Behavior description:直接调用系统关键API
details:Index = 0x00000025, Name: NtCreateFile, Instruction Address = 0x006ACD52
Index = 0x000000E0, Name: NtSetInformationFile, Instruction Address = 0x006ACC61
Index = 0x000000B7, Name: NtReadFile, Instruction Address = 0x006ACCEA
Behavior description:获取TickCount值
details:TickCount = 222218, SleepMilliseconds = 1000.
TickCount = 222312, SleepMilliseconds = 1000.
TickCount = 222531, SleepMilliseconds = 1000.
TickCount = 222546, SleepMilliseconds = 1000.
TickCount = 222765, SleepMilliseconds = 1000.
TickCount = 222781, SleepMilliseconds = 1000.
TickCount = 222828, SleepMilliseconds = 1000.
TickCount = 222843, SleepMilliseconds = 1000.
TickCount = 222859, SleepMilliseconds = 1000.
TickCount = 222875, SleepMilliseconds = 1000.
TickCount = 222921, SleepMilliseconds = 1000.
TickCount = 222937, SleepMilliseconds = 1000.
TickCount = 223093, SleepMilliseconds = 1000.
TickCount = 223140, SleepMilliseconds = 1000.
TickCount = 223156, SleepMilliseconds = 1000.
Process behavior
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2676, ThreadID = 2700, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2676, ThreadID = 2776, StartAddress = 006D640C, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2676, ThreadID = 2804, StartAddress = 00667E8C, Parameter = 019C00E8
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2676, ThreadID = 2860, StartAddress = 0040418C, Parameter = 01E28D58
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\evb3.tmp
Behavior description:覆盖已有文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\evb3.tmp
Behavior description:查找文件
details:FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\
FileName = C:\DOCUME~1\ADMINI~1\
FileName = C:\DOCUME~1\
FileName = C:\DOCUME~1
FileName = C:\Documents and Settings\ADMINI~1
FileName = C:\Documents and Settings\Administrator\LOCALS~1
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp\
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
FileName = c:\documents and settings
FileName = c:\Documents and Settings\administrator
FileName = c:\Documents and Settings\Administrator\local settings
FileName = c:\Documents and Settings\Administrator\Local Settings\temp
FileName = c:\Documents and Settings\Administrator\Local Settings\%temp%
Network behavior
Behavior description:建立到一个指定的套接字连接
details:URL: en****om, IP: **.133.40.**:80, SOCKET = 0x0000015c
Behavior description:按名称获取主机地址
details:GetAddrInfoW: en****om
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MutexNPA_UnitVersioning_2676
MSCTF.Shared.MUTEX.IOH
MSCTF.Shared.MUTEX.IHK
Behavior description:创建事件对象
details:EventName = EVB_1BC582818E3F188F_00000A74
EventName = MSCTF.SendReceive.Event.IHK.IC
EventName = MSCTF.SendReceiveConection.Event.IHK.IC
Behavior description:窗口信息
details:Pid = 2676, Hwnd=0x1037a, Text = Packaging, ClassName = TTntTabSheet.UnicodeClass.
Pid = 2676, Hwnd=0x10366, Text = Registry, ClassName = TTntTabSheet.UnicodeClass.
Pid = 2676, Hwnd=0x10368, Text = vtvRegistry, ClassName = TVirtualBoxRegistryView.
Pid = 2676, Hwnd=0x10352, Text = Files, ClassName = TTntTabSheet.UnicodeClass.
Pid = 2676, Hwnd=0x103a8, Text = Files Options, ClassName = TTntButton.UnicodeClass.
Pid = 2676, Hwnd=0x103a6, Text = Remove, ClassName = TTntButton.UnicodeClass.
Pid = 2676, Hwnd=0x103a4, Text = Edit, ClassName = TTntButton.UnicodeClass.
Pid = 2676, Hwnd=0x103a2, Text = Add..., ClassName = TTntButton.UnicodeClass.
Pid = 2676, Hwnd=0x103a0, Text = Browse..., ClassName = TTntButton.UnicodeClass.
Pid = 2676, Hwnd=0x1039e, Text = Browse..., ClassName = TTntButton.UnicodeClass.
Pid = 2676, Hwnd=0x10396, Text = Process, ClassName = TTntButton.UnicodeClass.
Pid = 2676, Hwnd=0x1034e, Text = Enigma Virtual Box 7.80 Build 20170713, ClassName = TfrmMain.UnicodeClass.
Pid = 2676, Hwnd=0x70480, Text = JvStandardPage2, ClassName = TJvStandardPage.
Behavior description:直接调用系统关键API
details:Index = 0x00000025, Name: NtCreateFile, Instruction Address = 0x006ACD52
Index = 0x000000E0, Name: NtSetInformationFile, Instruction Address = 0x006ACC61
Index = 0x000000B7, Name: NtReadFile, Instruction Address = 0x006ACCEA
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [MS_WINHELP,]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
Behavior description:获取TickCount值
details:TickCount = 222218, SleepMilliseconds = 1000.
TickCount = 222312, SleepMilliseconds = 1000.
TickCount = 222531, SleepMilliseconds = 1000.
TickCount = 222546, SleepMilliseconds = 1000.
TickCount = 222765, SleepMilliseconds = 1000.
TickCount = 222781, SleepMilliseconds = 1000.
TickCount = 222828, SleepMilliseconds = 1000.
TickCount = 222843, SleepMilliseconds = 1000.
TickCount = 222859, SleepMilliseconds = 1000.
TickCount = 222875, SleepMilliseconds = 1000.
TickCount = 222921, SleepMilliseconds = 1000.
TickCount = 222937, SleepMilliseconds = 1000.
TickCount = 223093, SleepMilliseconds = 1000.
TickCount = 223140, SleepMilliseconds = 1000.
TickCount = 223156, SleepMilliseconds = 1000.
Behavior description:获取光标位置
details:CursorPos = (80,18468), SleepMilliseconds = 1000.
CursorPos = (6373,26501), SleepMilliseconds = 1000.
CursorPos = (19208,15725), SleepMilliseconds = 1000.
CursorPos = (11517,29359), SleepMilliseconds = 1000.
CursorPos = (27001,24465), SleepMilliseconds = 1000.
CursorPos = (5744,28146), SleepMilliseconds = 1000.
CursorPos = (23320,16828), SleepMilliseconds = 1000.
CursorPos = (10000,492), SleepMilliseconds = 1000.
CursorPos = (3034,11943), SleepMilliseconds = 1000.
CursorPos = (4866,5437), SleepMilliseconds = 1000.
CursorPos = (32430,14605), SleepMilliseconds = 1000.
CursorPos = (3941,154), SleepMilliseconds = 1000.
CursorPos = (331,12383), SleepMilliseconds = 1000.
CursorPos = (17460,18717), SleepMilliseconds = 1000.
CursorPos = (19757,19896), SleepMilliseconds = 1000.
Behavior description:枚举窗口
details:N/A
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 0.
[2]: MilliSeconds = 0.
[3]: MilliSeconds = 0.
[4]: MilliSeconds = 0.
[5]: MilliSeconds = 0.
[6]: MilliSeconds = 0.
[7]: MilliSeconds = 0.
[8]: MilliSeconds = 0.
[9]: MilliSeconds = 1000.
[10]: MilliSeconds = 1000.
Behavior description:隐藏指定窗口
details:[Window,Class] = [Enigma Virtual Box 7.80 Build 20170713,TfrmMain.UnicodeClass]
Behavior description:打开互斥体
details:ShimCacheMutex
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号