VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:75
Behavior list
Basic Information
MD5:618b6a0c1ca70ee192404a232aee1ac8
file type:Rar
Production company:
version:
Shell or compiler information:COMPILER:Microsoft Visual C++ 6.0
Subfile information:摄像头远程控制器2.1.exedumpFile / 80aecf377dce887b07b4aeb5e70f296c / EXE
配置17.dlldumpFile / 8f08a8bb02cc3d73f2c1b0e846407e1d / Unknown
摄像头远程控制器2.1.exe / 80aecf377dce887b07b4aeb5e70f296c / EXE
配置17.dll / 8f08a8bb02cc3d73f2c1b0e846407e1d / Unknown
Key behavior
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:隐藏指定窗口
details:[Window,Class] = [,#32770]
Process behavior
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-1-5-21-1482476501-1645522239-1417001333-500
MSCTF.MarshalInterface.FileMap.AOJ..EHGFF
MSCTF.MarshalInterface.FileMap.AOJ.B.EHGFF
MSCTF.MarshalInterface.FileMap.AOJ.C.EHGFF
MSCTF.MarshalInterface.FileMap.AOJ.D.EHGFF
MSCTF.MarshalInterface.FileMap.AOJ.E.EHGFF
MSCTF.MarshalInterface.FileMap.AOJ.F.EHGFF
MSCTF.MarshalInterface.FileMap.AOJ.G.EHGFF
MSCTF.MarshalInterface.FileMap.EKK..CNGFF
MSCTF.MarshalInterface.FileMap.EKK.B.CNGFF
MSCTF.MarshalInterface.FileMap.EKK.C.CNGFF
MSCTF.MarshalInterface.FileMap.EKK.D.CNGFF
MSCTF.MarshalInterface.FileMap.EKK.E.CNGFF
MSCTF.MarshalInterface.FileMap.EKK.F.CNGFF
MSCTF.MarshalInterface.FileMap.EKK.G.CNGFF
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Network behavior
Behavior description:连接指定站点
details:InternetConnectA: ServerName = base.qzone.qq.com, PORT = 80
InternetConnectA: ServerName = blog.sina.com.cn, PORT = 80
InternetConnectA: ServerName = hi.baidu.com, PORT = 80
InternetConnectA: ServerName = dreamcry.blog.163.com, PORT = 80
InternetConnectA: ServerName = 23896535.blog.hexun.com, PORT = 80
Behavior description:读取网络文件
details:hFile = 0x00000678, BytesToRead =10240, BytesRead = 10240.
hFile = 0x00000674, BytesToRead =10240, BytesRead = 10240.
Behavior description:打开HTTP请求
details:HttpOpenRequestA: base.qzone.qq.com:80/fcg-bin/cgi_get_portrait.fcg?uins=1900831539, hConnect = 0x0000067c
HttpOpenRequestA: blog.sina.com.cn:80/dreamcrydc, hConnect = 0x00000678
HttpOpenRequestA: blog.sina.com.cn:80/baitanmaikaoya, hConnect = 0x00000678
HttpOpenRequestA: blog.sina.com.cn:80/fendoudc, hConnect = 0x00000678
HttpOpenRequestA: hi.baidu.com:80/dreamcry, hConnect = 0x00000678
HttpOpenRequestA: hi.baidu.com:80/raydc, hConnect = 0x00000678
HttpOpenRequestA: hi.baidu.com:80/baitandc, hConnect = 0x00000678
HttpOpenRequestA: dreamcry.blog.163.com:80/, hConnect = 0x00000678
HttpOpenRequestA: 23896535.blog.hexun.com:80/, hConnect = 0x00000678
Other behavior
Behavior description:打开指定IE网页
details:http://dreamcrydc.blog.163.com/
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [,Microsoft Internet Explorer]
Behavior description:创建互斥体
details:RasPbFile
CTF.LBES.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Compart.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Asm.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Layouts.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TMD.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TimListCache.FMPDefaultS-1-5-21-1482476501-1645522239-1417001333-500MUTEX.DefaultS-1-5-21-1482476501-1645522239-1417001333-500
MSCTF.Shared.MUTEX.AEH
Behavior description:隐藏指定窗口
details:[Window,Class] = [,#32770]
Behavior description:窗口信息
details:Pid = 2524, Hwnd=0x1035a, Text = 确定, ClassName = Button.
Pid = 2524, Hwnd=0x1035c, Text = 版本已更新,即将为您跳转到最新版本下载页面..., ClassName = Static.
Pid = 2524, Hwnd=0x10356, Text = 版本更新提醒:, ClassName = #32770.
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号