VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

File information
Safety rating:87
Behavior list
Basic Information
MD5:9315e48d35d34c61b9fa4218722a6b47
file type:EXE
Production company:
version:
Shell or compiler information:PACKER:PECompact 2.x -> Jeremy Collake
Subfile information:pecompact2x_c3f9e625dumpFile / 2224ff64451718be76657788e48dcd06 / EXE
Key behavior
Behavior description:屏蔽窗口关闭消息
details:hWnd = 0x000202a2, Text = PdfToy, ClassName = #32770.
Process behavior
Behavior description:创建本地线程
details:N/A
Behavior description:进程退出
details:N/A
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:创建文件
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\996E.ini
Behavior description:修改文件内容
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\996E.ini---> Offset = 0
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.IBE
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ComboLBox]
[Window,Class] = [转为图像,#32770]
[Window,Class] = [导出图像,#32770]
[Window,Class] = [取消,Button]
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:屏蔽窗口关闭消息
details:hWnd = 0x000202a2, Text = PdfToy, ClassName = #32770.
Behavior description:窗口信息
details:Pid = 872, Hwnd=0x302bc, Text = 转为图像, ClassName = #32770.
Pid = 872, Hwnd=0x202d4, Text = 1、需要转换的PDF文件:, ClassName = Static.
Pid = 872, Hwnd=0x302dc, Text = 3、转换出的图像文件存到文件夹:, ClassName = Static.
Pid = 872, Hwnd=0x202c4, Text = 正在处理:, ClassName = Static.
Pid = 872, Hwnd=0x202ca, Text = 4、开始导出, ClassName = Button.
Pid = 872, Hwnd=0x202b0, Text = 只转第, ClassName = Button(CheckBox).
Pid = 872, Hwnd=0x202ae, Text = 1, ClassName = Edit.
Pid = 872, Hwnd=0x202aa, Text = 页到第, ClassName = Static.
Pid = 872, Hwnd=0x202ac, Text = 页(绝对页码), ClassName = Static.
Pid = 872, Hwnd=0x402be, Text = 1, ClassName = Edit.
Pid = 872, Hwnd=0x502ce, Text = Animate1, ClassName = SysAnimate32.
Pid = 872, Hwnd=0x302b6, Text = 2、选项, ClassName = Button(GroupBox).
Pid = 872, Hwnd=0x202d0, Text = 每页转换成一个图像,存为, ClassName = Static.
Pid = 872, Hwnd=0x202d2, Text = 彩色PNG, ClassName = ComboBox.
Pid = 872, Hwnd=0x102e0, Text = JPG质量, ClassName = Static.
Behavior description:创建事件对象
details:EventName = MSCTF.SendReceive.Event.IBE.IC
EventName = MSCTF.SendReceiveConection.Event.IBE.IC
Behavior description:程序异常崩溃信息
details:EAX=0x00000000, EBX=0x7FFD4000, ECX=0x0012FFB0, EDX=0x7C92E4F4,ESI=0x536CD652, EDI=0x001310C4, EBP=0x0012FFF0, ESP=0x0012FFBC,EIP=0x00401016, ExceptionCode=0xC0000005(ACCESS_VIOLATION),ExceptionModule=C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1446689052.242059.exe Disassembly: 0x00401016: mov dword ptr [eax], ecx 0x00401018: push eax 0x00401019: inc ebp 0x0040101A: inc ebx 0x0040101B: outsd 0x0040101C: insd 0x0040101D: jo 00401080h 0x0040101F: arpl word ptr [edx+esi+00h], si 0x00401023: in eax, 94h 0x00401025: pop ebx 0x00401026: loope 0040108Dh 0x00401028: adc dh, byte ptr [esp+18h] 0x0040102C: add byte ptr [ecx], bl 0x0040102E: cmpsd 0x0040102F: mov dword ptr [B38C014Ch], eax 0x00401034: pop esp 0x00401035: popad 0x00401036: sbb byte ptr [eax+702A55E3h], al
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号