VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:61
Behavior list
Basic Information
MD5:fa118dbdc7df208bc24d762f7b125cbd
file type:DLL
Production company:
version:1.0.0.0---1.0.0.0
Shell or compiler information:PACKER:UPolyX v0.5
Key behavior
Behavior description:打开注册表_检测虚拟机相关
details:\REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Behavior description:查询注册表_检测虚拟机相关
details:\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
Behavior description:尝试打开调试器或监控软件的驱动设备对象
details:\??\SICE
\??\SIWVID
\??\NTICE
Behavior description:查找反病毒常用工具窗口
details:NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]
Process behavior
Behavior description:创建本地线程
details:TargetProcess: DllLoader.exe, InheritedFromPID = 1944, ProcessID = 1568, ThreadID = 1124, StartAddress = 101AF547, Parameter = 10322F37
TargetProcess: DllLoader.exe, InheritedFromPID = 1944, ProcessID = 1568, ThreadID = 1172, StartAddress = 101AF547, Parameter = 103238D8
TargetProcess: DllLoader.exe, InheritedFromPID = 1944, ProcessID = 1568, ThreadID = 328, StartAddress = 101AF547, Parameter = 10324A24
TargetProcess: DllLoader.exe, InheritedFromPID = 1944, ProcessID = 1568, ThreadID = 1656, StartAddress = 101AF547, Parameter = 103254EC
TargetProcess: DllLoader.exe, InheritedFromPID = 1944, ProcessID = 1568, ThreadID = 1472, StartAddress = 101AF547, Parameter = 10325FC3
TargetProcess: DllLoader.exe, InheritedFromPID = 1944, ProcessID = 1568, ThreadID = 564, StartAddress = 101AF547, Parameter = 10326B39
TargetProcess: DllLoader.exe, InheritedFromPID = 1944, ProcessID = 1568, ThreadID = 468, StartAddress = 101AF547, Parameter = 10327494
TargetProcess: DllLoader.exe, InheritedFromPID = 1944, ProcessID = 1568, ThreadID = 1204, StartAddress = 101AF547, Parameter = 10327F43
TargetProcess: DllLoader.exe, InheritedFromPID = 1944, ProcessID = 1568, ThreadID = 2012, StartAddress = 101AF547, Parameter = 10329B26
TargetProcess: DllLoader.exe, InheritedFromPID = 1944, ProcessID = 1568, ThreadID = 2044, StartAddress = 101AF547, Parameter = 1032AC59
TargetProcess: DllLoader.exe, InheritedFromPID = 1944, ProcessID = 1568, ThreadID = 1804, StartAddress = 101AF547, Parameter = 1032BC47
TargetProcess: DllLoader.exe, InheritedFromPID = 1944, ProcessID = 1568, ThreadID = 1532, StartAddress = 101AF547, Parameter = 1032CC74
TargetProcess: DllLoader.exe, InheritedFromPID = 1944, ProcessID = 1568, ThreadID = 412, StartAddress = 101AF547, Parameter = 1032DD43
TargetProcess: DllLoader.exe, InheritedFromPID = 1944, ProcessID = 1568, ThreadID = 740, StartAddress = 101AF547, Parameter = 1032F4B8
TargetProcess: DllLoader.exe, InheritedFromPID = 1944, ProcessID = 1568, ThreadID = 788, StartAddress = 101AF547, Parameter = 10330A56
Behavior description:枚举进程
details:N/A
Registry behavior
Behavior description:打开注册表_检测虚拟机相关
details:\REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Behavior description:查询注册表_检测虚拟机相关
details:\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
Other behavior
Behavior description:创建互斥体
details:RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [18467-41,]
Behavior description:尝试打开调试器或监控软件的驱动设备对象
details:\??\SICE
\??\SIWVID
\??\NTICE
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
SE_DEBUG_PRIVILEGE
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
Behavior description:打开互斥体
details:DBWinMutex
RasPbFile
ShimCacheMutex
Behavior description:查找反病毒常用工具窗口
details:NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号