VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:73
Behavior list
Basic Information
MD5:9d71b7d26bb3c54998e51dbe7cb8e0ee
file type:EXE
Production company:
version:
Shell or compiler information:COMPILER:Elan
Key behavior
Behavior description:设置特殊文件属性
details:C:\monitor\SkinH_EL.dll
Behavior description:隐藏指定窗口
details:[Window,Class] = [,_EL_ServerSock]
[Window,Class] = [,_EL_Label]
[Window,Class] = [V4.0,Edit]
[Window,Class] = [,Edit]
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
File behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-1-5-21-1482476501-1645522239-1417001333-500
\WINDOWS\system32\zh-cn\ieframe.dll.mui
MSCTF.MarshalInterface.FileMap.AOJ..OCPFF
MSCTF.MarshalInterface.FileMap.AOJ.B.OCPFF
MSCTF.MarshalInterface.FileMap.AOJ.C.OCPFF
MSCTF.MarshalInterface.FileMap.AOJ.D.OCPFF
MSCTF.MarshalInterface.FileMap.AOJ.E.OCPFF
MSCTF.MarshalInterface.FileMap.AOJ.F.OCPFF
MSCTF.MarshalInterface.FileMap.AOJ.G.OCPFF
MSCTF.Shared.SFM.AOJ
Behavior description:设置特殊文件属性
details:C:\monitor\SkinH_EL.dll
Behavior description:创建可执行文件
details:C:\monitor\SkinH_EL.dll
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Network behavior
Behavior description:连接指定站点
details:InternetConnectA: ServerName = xaosho.360maca.com, PORT = 80
Behavior description:读取网络文件
details:hFile = 0x00000580, BytesToRead =10240, BytesRead = 10240.
hFile = 0x0000057c, BytesToRead =10240, BytesRead = 10240.
Behavior description:打开HTTP请求
details:HttpOpenRequestA: xaosho.360maca.com:80/1.txt, hConnect = 0x00000584
HttpOpenRequestA: xaosho.360maca.com:80/1.txt, hConnect = 0x00000580
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Multimedia\DrawDib\vga.drv 1920x973x16(565 0)
Other behavior
Behavior description:创建互斥体
details:RasPbFile
CTF.LBES.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Compart.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Asm.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Layouts.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TMD.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TimListCache.FMPDefaultS-1-5-21-1482476501-1645522239-1417001333-500MUTEX.DefaultS-1-5-21-1482476501-1645522239-1417001333-500
MSCTF.Shared.MUTEX.AEH
MSCTF.Shared.MUTEX.AOJ
Behavior description:内联HOOK
details:C:\WINDOWS\system32\GDI32.dll--->ExtTextOutA Offset = 0x0
C:\WINDOWS\system32\GDI32.dll--->ExtTextOutW Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetWindowLongA Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->SetWindowLongA Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->SetWindowLongW Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetWindowLongW Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->BeginPaint Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->EndPaint Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetDC Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetWindowDC Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->ReleaseDC Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->WindowFromDC Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetScrollInfo Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetScrollPos Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetScrollRange Offset = 0x0
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:隐藏指定窗口
details:[Window,Class] = [,_EL_ServerSock]
[Window,Class] = [,_EL_Label]
[Window,Class] = [V4.0,Edit]
[Window,Class] = [,Edit]
Behavior description:窗口信息
details:Pid = 2524, Hwnd=0x1037c, Text = 发现新版本是否更新MZ, ClassName = _EL_Label.
Pid = 2524, Hwnd=0x1037a, Text = MZ, ClassName = Edit.
Pid = 2524, Hwnd=0x10378, Text = 取消, ClassName = Button.
Pid = 2524, Hwnd=0x10376, Text = 更新, ClassName = Button.
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号