VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:71
Behavior list
Basic Information
MD5:83cf0e269c6161ab69bf34321c52de0d
file type:Rar
Production company:
version:
Shell or compiler information:COMPILER:Elan
Subfile information:新云卡CC攻击器-威力美化版.exe / f3d5ee935d6cf0abd0644846374df4a4 / EXE
Process behavior
Behavior description:创建本地线程
details:TargetProcess: 新云卡CC攻击器-威力美化版.exe, InheritedFromPID = 2000, ProcessID = 2560, ThreadID = 2576, StartAddress = 77DC845A, Parameter = 00000000
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
MSCTF.Shared.MUTEX.EAK
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = MSCTF.SendReceive.Event.EAK.IC
EventName = MSCTF.SendReceiveConection.Event.EAK.IC
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [OleMainThreadWndClass,]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007E8.00000000.0000000F
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.0000000F
MSCTF.SendReceive.Event.IOH.IC
MSCTF.SendReceiveConection.Event.IOH.IC
Behavior description:窗口信息
details:Pid = 2560, Hwnd=0x10372, Text = 导出IP, ClassName = Button.
Pid = 2560, Hwnd=0x10370, Text = Cookie, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2560, Hwnd=0x1036e, Text = UA头, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2560, Hwnd=0x1036c, Text = 来源, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2560, Hwnd=0x1036a, Text = 目标, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2560, Hwnd=0x10368, Text = 0, ClassName = Edit.
Pid = 2560, Hwnd=0x10364, Text = http://www.89ip.cn/tiqv.php?sxb=&tqsl=100000000&ports=&ktip=&xl=on&submit=%CC%E1++%C8%A1, ClassName = Edit.
Pid = 2560, Hwnd=0x10362, Text = 提取IP, ClassName = Button.
Pid = 2560, Hwnd=0x1035c, Text = 攻击选项, ClassName = Button(GroupBox).
Pid = 2560, Hwnd=0x103b0, Text = 攻击, ClassName = Button.
Pid = 2560, Hwnd=0x103aa, Text = cookie获取器, ClassName = _EL_HyperLinker.
Pid = 2560, Hwnd=0x103a8, Text = 天降CC攻击器下载, ClassName = _EL_HyperLinker.
Pid = 2560, Hwnd=0x103a2, Text = 存活, ClassName = _EL_Label.
Pid = 2560, Hwnd=0x103a0, Text = 0, ClassName = Edit.
Pid = 2560, Hwnd=0x1039e, Text = ip数, ClassName = _EL_Label.
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ComboLBox]
[Window,Class] = [,_EL_CommonDlg]
[Window,Class] = [,_EL_Timer]
Behavior description:打开互斥体
details:ShimCacheMutex
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号