VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:86
Behavior list
Basic Information
MD5:89f86f407238be29a5506e8e8c613635
file type:EXE
Production company:
version:
Shell or compiler information:COMPILER:UPolyX v0.5
Subfile information:porttalk.sys / 7d5a2d755b6c6579f63657b527d6ff1b / SYS
vcr40.ini / 0530078d7dc0754e564ce55ccecb96d3 / Unknown
Victoria.exe / f236529df469adff4028d8fedc30f3fd / EXE
Key behavior
Behavior description:直接获取CPU时钟
details:EAX = 0xc61bb74b, EDX = 0x000000b5
EAX = 0xc61bb797, EDX = 0x000000b5
EAX = 0xcb568650, EDX = 0x000000b5
EAX = 0xd0915509, EDX = 0x000000b5
EAX = 0xdb322222, EDX = 0x000000b5
EAX = 0xdb32226e, EDX = 0x000000b5
EAX = 0xdb3222ba, EDX = 0x000000b5
EAX = 0xe0982166, EDX = 0x000000b5
EAX = 0xeb0dbe8c, EDX = 0x000000b5
EAX = 0xeb0dbed8, EDX = 0x000000b5
Behavior description:获取窗口截图信息
details:Foreground window Info: HWND = 0x00010548, DC = 0x0c0101e7.
Foreground window Info: HWND = 0x0001054e, DC = 0x19010823.
Foreground window Info: HWND = 0x00010550, DC = 0x0a010375.
Foreground window Info: HWND = 0x00010552, DC = 0x0c0101e7.
Foreground window Info: HWND = 0x00010554, DC = 0x0c0101e7.
Foreground window Info: HWND = 0x000104e6, DC = 0x19010823.
Foreground window Info: HWND = 0x00010556, DC = 0x19010823.
Foreground window Info: HWND = 0x00010558, DC = 0x0a010375.
Foreground window Info: HWND = 0x000104f0, DC = 0x0c0101e7.
Foreground window Info: HWND = 0x00010460, DC = 0x0a010375.
Foreground window Info: HWND = 0x00010562, DC = 0x0a010375.
Process behavior
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2768, ThreadID = 2884, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: Victoria.exe, InheritedFromPID = 2768, ProcessID = 2852, ThreadID = 3248, StartAddress = 0464FB99, Parameter = 001B60F8
TargetProcess: Victoria.exe, InheritedFromPID = 2768, ProcessID = 2852, ThreadID = 3280, StartAddress = 0464FB99, Parameter = 001A1DC0
Behavior description:创建新文件进程
details:[0x00000b24]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\Victoria.exe, CmdLine = "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\Victoria.exe"
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\__tmp_rar_sfx_access_check_216562
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\Victoria.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\porttalk.sys
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\vcr40.ini
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\LOGS\eventlog.txt
C:\WINDOWS\system32\drivers\PortTalk.sys
Behavior description:修改文件内容
details:C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\Victoria.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\Victoria.exe ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\Victoria.exe ---> Offset = 131072
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\Victoria.exe ---> Offset = 196608
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\Victoria.exe ---> Offset = 262144
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\porttalk.sys ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\vcr40.ini ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\LOGS\eventlog.txt ---> Offset = 0
C:\WINDOWS\system32\drivers\PortTalk.sys ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\LOGS\eventlog.txt ---> Offset = 101
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\LOGS\eventlog.txt ---> Offset = 140
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\LOGS\eventlog.txt ---> Offset = 180
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\LOGS\eventlog.txt ---> Offset = 245
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\LOGS\eventlog.txt ---> Offset = 280
Behavior description:创建可执行文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\Victoria.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\porttalk.sys
C:\WINDOWS\system32\drivers\PortTalk.sys
Behavior description:删除文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\__tmp_rar_sfx_access_check_216562
Behavior description:查找文件
details:FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\My Documents
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\Documents
FileName = C:\Documents and Settings\Administrator\桌面
FileName = C:\Documents and Settings\All Users\桌面
FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\Victoria.exe
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\Victoria.exe
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
_SHuassist.mtx
MSCTF.Shared.MUTEX.ICL
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ComboLBox]
[Window,Class] = [,Auto-Suggest Dropdown]
Behavior description:打开互斥体
details:ShimCacheMutex
Local\!IETld!Mutex
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [EDIT,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
_fCanRegisterWithShellService
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Global\crypt32LogoffEvent
Global\SvcctrlStartEvent_A3752DX
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000011
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000011
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
SE_INC_BASE_PRIORITY_PRIVILEGE
Behavior description:窗口信息
details:Pid = 2852, Hwnd=0x1056a, Text = 确定, ClassName = Button.
Pid = 2852, Hwnd=0x1056e, Text = File access denied., ClassName = Static.
Pid = 2852, Hwnd=0x10568, Text = Victoria , ClassName = #32770.
Pid = 2852, Hwnd=0x1050c, Text = PIO, ClassName = TRzGroupButton.
Pid = 2852, Hwnd=0x20560, Text = API, ClassName = TRzGroupButton.
Pid = 2852, Hwnd=0x1054c, Text = 声音, ClassName = TRzCheckBox.
Pid = 2852, Hwnd=0x105ba, Text = 电源(&P), ClassName = TRzBitBtn.
Pid = 2852, Hwnd=0x105b8, Text = 详细信息, ClassName = TRzBitBtn.
Pid = 2852, Hwnd=0x105b6, Text = 重置(&C), ClassName = TRzBitBtn.
Pid = 2852, Hwnd=0x105b4, Text = 休眠(&S), ClassName = TRzBitBtn.
Pid = 2852, Hwnd=0x105b2, Text = 中断全部, ClassName = TRzBitBtn.
Pid = 2852, Hwnd=0x1055e, Text = 提示, ClassName = TRzCheckBox.
Pid = 2852, Hwnd=0x10442, Text = 标准, ClassName = TTabSheet.
Pid = 2852, Hwnd=0x105ae, Text = 详细信息, ClassName = TRzBitBtn.
Pid = 2852, Hwnd=0x1055c, Text = reset+, ClassName = TRzCheckBox.
Behavior description:获取窗口截图信息
details:Foreground window Info: HWND = 0x00010548, DC = 0x0c0101e7.
Foreground window Info: HWND = 0x0001054e, DC = 0x19010823.
Foreground window Info: HWND = 0x00010550, DC = 0x0a010375.
Foreground window Info: HWND = 0x00010552, DC = 0x0c0101e7.
Foreground window Info: HWND = 0x00010554, DC = 0x0c0101e7.
Foreground window Info: HWND = 0x000104e6, DC = 0x19010823.
Foreground window Info: HWND = 0x00010556, DC = 0x19010823.
Foreground window Info: HWND = 0x00010558, DC = 0x0a010375.
Foreground window Info: HWND = 0x000104f0, DC = 0x0c0101e7.
Foreground window Info: HWND = 0x00010460, DC = 0x0a010375.
Foreground window Info: HWND = 0x00010562, DC = 0x0a010375.
Behavior description:直接操作物理设备
details:\??\PhysicalDrive0
Behavior description:可执行文件签名信息
details:C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\Victoria.exe(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\porttalk.sys(签名验证: 未通过)
C:\WINDOWS\system32\drivers\PortTalk.sys(签名验证: 未通过)
Behavior description:创建事件对象
details:EventName = Global\crypt32LogoffEvent
EventName = DINPUTWINMM
EventName = MSCTF.SendReceive.Event.ICL.IC
EventName = MSCTF.SendReceiveConection.Event.ICL.IC
Behavior description:可执行文件MD5
details:C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\Victoria.exe ---> f236529df469adff4028d8fedc30f3fd
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\porttalk.sys ---> 7d5a2d755b6c6579f63657b527d6ff1b
C:\WINDOWS\system32\drivers\PortTalk.sys ---> 7d5a2d755b6c6579f63657b527d6ff1b
Behavior description:直接获取CPU时钟
details:EAX = 0xc61bb74b, EDX = 0x000000b5
EAX = 0xc61bb797, EDX = 0x000000b5
EAX = 0xcb568650, EDX = 0x000000b5
EAX = 0xd0915509, EDX = 0x000000b5
EAX = 0xdb322222, EDX = 0x000000b5
EAX = 0xdb32226e, EDX = 0x000000b5
EAX = 0xdb3222ba, EDX = 0x000000b5
EAX = 0xe0982166, EDX = 0x000000b5
EAX = 0xeb0dbe8c, EDX = 0x000000b5
EAX = 0xeb0dbed8, EDX = 0x000000b5
Behavior description:使用SCSI指令读写硬盘
details:LBA = 0x0 SCSIOP = 0x25
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号