VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:75
Behavior list
Basic Information
MD5:74b0aae6948522e14adc1838748164ee
file type:zip
Production company:
version:
Shell or compiler information:COMPILER:Microsoft Visual C++ 8.0 [Debug]
Subfile information:HorrorGameProject.exe / big file / EXE
Key behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-*
DirectInput.{5944E681-C92E-11CF-BFC7-444553540000}
MSCTF.MarshalInterface.FileMap.MNF..CKMGH
DirectSound Administrator shared thread array
MSCTF.MarshalInterface.FileMap.MNF.B.FNOGH
MSCTF.MarshalInterface.FileMap.MNF.C.FNOGH
MSCTF.MarshalInterface.FileMap.MNF.D.FNOGH
MSCTF.MarshalInterface.FileMap.MNF.E.AIPGH
MSCTF.MarshalInterface.FileMap.MNF.F.AIPGH
MSCTF.MarshalInterface.FileMap.MNF.G.AIPGH
MSCTF.Shared.SFM.MNF
Behavior description:设置消息钩子
details:C:\WINDOWS\system32\dinput.dll
Process behavior
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-*
DirectInput.{5944E681-C92E-11CF-BFC7-444553540000}
MSCTF.MarshalInterface.FileMap.MNF..CKMGH
DirectSound Administrator shared thread array
MSCTF.MarshalInterface.FileMap.MNF.B.FNOGH
MSCTF.MarshalInterface.FileMap.MNF.C.FNOGH
MSCTF.MarshalInterface.FileMap.MNF.D.FNOGH
MSCTF.MarshalInterface.FileMap.MNF.E.AIPGH
MSCTF.MarshalInterface.FileMap.MNF.F.AIPGH
MSCTF.MarshalInterface.FileMap.MNF.G.AIPGH
MSCTF.Shared.SFM.MNF
Behavior description:修改文件内容
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445322288.513996.exe_7zdump\Log.txt---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445322288.517521.exe_7zdump\Log.txt---> Offset = 6
C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445322288.521041.exe_7zdump\Log.txt---> Offset = 42
C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445322288.524540.exe_7zdump\Log.txt---> Offset = 84
C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445322288.528065.exe_7zdump\Log.txt---> Offset = 120
C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445322288.531577.exe_7zdump\Log.txt---> Offset = 128
C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445322288.535100.exe_7zdump\Log.txt---> Offset = 220
C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445322288.538605.exe_7zdump\Log.txt---> Offset = 276
C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445322288.542125.exe_7zdump\Log.txt---> Offset = 312
C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445322288.545649.exe_7zdump\Log.txt---> Offset = 350
C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445322288.549153.exe_7zdump\Log.txt---> Offset = 390
C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445322288.552684.exe_7zdump\Log.txt---> Offset = 404
C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445322288.556194.exe_7zdump\Log.txt---> Offset = 412
C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445322288.559725.exe_7zdump\Log.txt---> Offset = 420
C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445322288.563241.exe_7zdump\Log.txt---> Offset = 428
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\MediaProperties\PrivateProperties\DirectInput\VID_80EE&PID_0021\Calibration\0\GUID
\REGISTRY\USER\S-*\Software\Microsoft\DirectInput\MostRecentApplication\Version
\REGISTRY\USER\S-*\Software\Microsoft\DirectInput\MostRecentApplication\Name
\REGISTRY\USER\S-*\Software\Microsoft\DirectInput\MostRecentApplication\Id
\REGISTRY\USER\S-*\Software\Microsoft\DirectInput\MostRecentApplication\MostRecentStart
\REGISTRY\USER\S-*\Software\Microsoft\Direct3D\MostRecentApplication\Name
\REGISTRY\MACHINE\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication\Name
\REGISTRY\MACHINE\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication\ID
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
DirectInput.{89521361-AA8A-11CF-BFC7-444553540000}
DirectInput.{5944E682-C92E-11CF-BFC7-444553540000}
DirectSound DllMain mutex (0x000000FC)
DirectSound Administrator shared thread array (lock)
DDrawWindowListMutex
__DDrawExclMode__
__DDrawCheckExclMode__
DDrawDriverObjectListMutex
MSCTF.Shared.MUTEX.ELH
Behavior description:设置消息钩子
details:C:\WINDOWS\system32\dinput.dll
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [D123987X,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:获取系统权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:窗口信息
details:Pid = 252, Hwnd=0x302bc, Text = 确定, ClassName = Button.
Pid = 252, Hwnd=0x302dc, Text = imageのロードに失敗しました{c:\users\slime\documents\visual studio 2010\projects\c++\horrorgameproject\horrorgameproject\startings, ClassName = Static.
Pid = 252, Hwnd=0x302ba, Text = エラーが発生しました。, ClassName = #32770.
Pid = 252, Hwnd=0x202a4, Text = DxLib, ClassName = D123987X.
Behavior description:打开图片文件
details:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445322288.925300.exe_7zdump\Data\Start\Image\DxLogo.jpg
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号