VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load
VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

00银魂    Threatbook file behavior analysis report

Basic Information

file name: 00银魂
file type: DLLx86
Threat level: clean
MD5: 78650fe3f1fe9905a75f32e24ddc2be2
sha256: 1602e5c2950a3783ebb637282aea70231fe9b53c0e2c506c7110b9293e54b778

Document Threat Intelligence IOC Report

No intelligence IOC detected

Intelligence decision system

Undetected intelligence determination system

Network behavior report

domains: 0

Document release report

File release report not detected

File process number report

nofind

Document behavior signature report

Low risk behavior 0
Low risk behavior
Static File Characteristics: {"en": "PE file does not import any functions", "cn": "此可执行文件没有导入任何函数"}
High risk behavior 0
Low risk behavior 0
Low risk behavior
Reverse Engineering: {"en": "The binary likely contains encrypted or compressed data indicative of a packer", "cn": "这个二进制可能包含被加密或被压缩的数据,可能被加壳"}
High risk behavior 0
Low risk behavior 0
Low risk behavior
Reverse Engineering: {"en": "The executable is compressed using UPX", "cn": "该可执行文件使用UPX进行压缩"}
High risk behavior 0

Static information

Section name: UPX0
Virtual address: 0x00001000
Physical address: 0x00000400
Physical size: 0x00000000
Section permissions: RWE
Section name: UPX1
Virtual address: 0x000c5000
Physical address: 0x00000400
Physical size: 0x00053000
Section permissions: RWE
Section name: .rsrc
Virtual address: 0x00118000
Physical address: 0x00053400
Physical size: 0x00009e00
Section permissions: RW-
import_hash:
time_stamp: 2010-08-25 01:51:31
entry_point_section: UPX1
image_base: 0x10000000
entry_point: 0x117c40
PE resource information 0