VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:77
Behavior list
Basic Information
MD5:73af40c883db84a22ff221f542a8b1a6
file type:zip
Production company:
version:
Shell or compiler information:COMPILER:.NET executable -> Microsoft *
Subfile information:RndStrSoft.exedumpFile / 5099613115e14b1ffab47dc623cbf4e3 / EXE
RndStrSoft.exe / 5099613115e14b1ffab47dc623cbf4e3 / EXE
Key behavior
Behavior description:直接获取CPU时钟
details:EAX = 0x7e96b019, EDX = 0x000000b4
EAX = 0x7e96b065, EDX = 0x000000b4
EAX = 0x8149afe1, EDX = 0x000000b4
EAX = 0x8149b02d, EDX = 0x000000b4
EAX = 0x8149b079, EDX = 0x000000b4
EAX = 0x8149b0c5, EDX = 0x000000b4
EAX = 0x86847f7e, EDX = 0x000000b4
EAX = 0x86847fca, EDX = 0x000000b4
EAX = 0x8e724db3, EDX = 0x000000b4
EAX = 0x8e724dff, EDX = 0x000000b4
Behavior description:获取TickCount值
details:TickCount = 240395, SleepMilliseconds = 20.
TickCount = 240410, SleepMilliseconds = 20.
Process behavior
Behavior description:创建本地线程
details:TargetProcess: RndStrSoft.exe, InheritedFromPID = 2000, ProcessID = 2784, ThreadID = 2844, StartAddress = 79F0237F, Parameter = 00000000
TargetProcess: RndStrSoft.exe, InheritedFromPID = 2000, ProcessID = 2784, ThreadID = 2848, StartAddress = 79F91FCF, Parameter = 001A5390
TargetProcess: RndStrSoft.exe, InheritedFromPID = 2000, ProcessID = 2784, ThreadID = 2880, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: RndStrSoft.exe, InheritedFromPID = 2000, ProcessID = 2784, ThreadID = 3332, StartAddress = 79FDA29C, Parameter = 00000000
TargetProcess: RndStrSoft.exe, InheritedFromPID = 2000, ProcessID = 2784, ThreadID = 3336, StartAddress = 77E56C7D, Parameter = 001D50F0
TargetProcess: RndStrSoft.exe, InheritedFromPID = 2000, ProcessID = 2784, ThreadID = 3340, StartAddress = 769AE43B, Parameter = 001DBB58
File behavior
Behavior description:覆盖已有文件
details:C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
Behavior description:查找文件
details:FileName = C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll
FileName = C:\WINDOWS\Microsoft.NET\Framework\\*
FileName = C:\WINDOWS
FileName = C:\WINDOWS\WinSxS
FileName = C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll
FileName = C:\WINDOWS\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.INI
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\RndStrSoft.exe
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\RndStrSoft.INI
FileName = C:\WINDOWS\assembly\GAC_MSIL\Microsoft.VisualBasic\8.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.INI
Other behavior
Behavior description:检测自身是否被调试
details:IsDebuggerPresent
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
MSCTF.Shared.MUTEX.EOK
Behavior description:创建事件对象
details:EventName = Global\CorDBIPCSetupSyncEvent_2784
EventName = MSCTF.SendReceive.Event.EOK.IC
EventName = MSCTF.SendReceiveConection.Event.EOK.IC
Behavior description:打开互斥体
details:ShimCacheMutex
Global\CLR_CASOFF_MUTEX
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:打开事件
details:Global\CLR_PerfMon_StartEnumEvent
\KernelObjects\LowMemoryCondition
HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
MSFT.VSA.COM.DISABLE.2784
MSFT.VSA.IEC.STATUS.6c736db0
Behavior description:获取TickCount值
details:TickCount = 240395, SleepMilliseconds = 20.
TickCount = 240410, SleepMilliseconds = 20.
Behavior description:窗口信息
details:Pid = 2784, Hwnd=0x10350, Text = 设置, ClassName = WindowsForms10.Window.8.app.0.378734a.
Pid = 2784, Hwnd=0x10352, Text = 规则说明, ClassName = WindowsForms10.Window.8.app.0.378734a.
Pid = 2784, Hwnd=0x10354, Text = A/a=字母,区分大写小 B/b=数字 C/c=符号 D/d=汉字 E/e=A+a+B/b 规则用{}表示 []中的数字表示数量 如: 生成IP特征: {b[1-3]}.{b[1-3]}.{b[1-3]}.{b[1-3]} 生成邮箱: {a[1-3]b[5]}@{e[3]}.com , ClassName = WindowsForms10.STATIC.app.0.378734a.
Pid = 2784, Hwnd=0x1035a, Text = 生成, ClassName = WindowsForms10.BUTTON.app.0.378734a.
Pid = 2784, Hwnd=0x1035c, Text = 0, ClassName = WindowsForms10.EDIT.app.0.378734a.
Pid = 2784, Hwnd=0x1035e, Text = 生成数量:, ClassName = WindowsForms10.STATIC.app.0.378734a.
Pid = 2784, Hwnd=0x10360, Text = 生成规则:, ClassName = WindowsForms10.Window.8.app.0.378734a.
Pid = 2784, Hwnd=0x10364, Text = 反, ClassName = WindowsForms10.BUTTON.app.0.378734a.
Pid = 2784, Hwnd=0x10366, Text = 全, ClassName = WindowsForms10.BUTTON.app.0.378734a.
Pid = 2784, Hwnd=0x10368, Text = 删, ClassName = WindowsForms10.BUTTON.app.0.378734a.
Pid = 2784, Hwnd=0x1036a, Text = 添, ClassName = WindowsForms10.BUTTON.app.0.378734a.
Pid = 2784, Hwnd=0x1034c, Text = 字符串生成器 v1.0 - By: 幼儿园小班 [52Pojie], ClassName = WindowsForms10.Window.8.app.0.378734a.
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = -1.
[2]: MilliSeconds = 20.
[3]: MilliSeconds = 20.
Behavior description:直接获取CPU时钟
details:EAX = 0x7e96b019, EDX = 0x000000b4
EAX = 0x7e96b065, EDX = 0x000000b4
EAX = 0x8149afe1, EDX = 0x000000b4
EAX = 0x8149b02d, EDX = 0x000000b4
EAX = 0x8149b079, EDX = 0x000000b4
EAX = 0x8149b0c5, EDX = 0x000000b4
EAX = 0x86847f7e, EDX = 0x000000b4
EAX = 0x86847fca, EDX = 0x000000b4
EAX = 0x8e724db3, EDX = 0x000000b4
EAX = 0x8e724dff, EDX = 0x000000b4
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号