VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:84
Behavior list
Basic Information
MD5:a076b50d4a4ec49f9b3dfbdecdf71d5c
file type:EXE
Production company:游侠网
version:1.0.0.155---1.0.0.155
Shell or compiler information:PACKER:UPX 0.89.6 - 1.02 / 1.05 - 1.24 -> Markus & Laszlo [ZIP SFX]
Subfile information:ali213.d02 / a558dce4f2315e22776221d71a0800e7 / Unknown
upx_c_33d58311dumpFile / 7823393ce905e9a4c50e5bd9d7be18b6 / EXE
alirili2_setup.exe / fb8f346f024c4025c902de4d13d242e3 / EXE
ali213.d12 / 563945e3391344bb8df7e3ff37dd1add / Unknown
bink2w64.dll / de50fa95c40b73ee55b68e7e8c9450ea / DLL
bink2w64.dll / ebb3f9cdadbcf02b6ca06b51dd7aac76 / DLL
ali213.dll / bc31047b4590cf3cb8e6cff964fa33bc / DLL
ali213.d13 / 618146de0f11bfe6e7d1c518cf8f5a42 / Unknown
进入游侠NETSHOW论坛热门游戏讨论区.website / 34e9650a5aee982902d22ba77477fad8 / Unknown
alirili2_setup.exe.dow!oad / 8b2adc585803db1c26fbcea1c0b25d63 / Unknown
Key behavior
Behavior description:屏蔽窗口关闭消息
details:hWnd = 0x0002033c, Text = www.ali213.net 汉化安装包, ClassName = AAU_FORM[TID:3076].
Behavior description:查找PE资源信息
details:(FindResourceA) hModule = 0x00400000, ResName: /RES/YXLOADDLL.DLL, ResType: RES
Behavior description:获取TickCount值
details:TickCount = 223534, SleepMilliseconds = 50.
TickCount = 223612, SleepMilliseconds = 50.
TickCount = 223628, SleepMilliseconds = 50.
TickCount = 223643, SleepMilliseconds = 50.
TickCount = 223659, SleepMilliseconds = 50.
Process behavior
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3072, ThreadID = 3084, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3072, ThreadID = 3112, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3072, ThreadID = 3152, StartAddress = 5FE01259, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3072, ThreadID = 3156, StartAddress = 02034FE0, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3072, ThreadID = 3160, StartAddress = 76B2AEAF, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3072, ThreadID = 3180, StartAddress = 0045E051, Parameter = 0133F408
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3072, ThreadID = 3184, StartAddress = 030A0000, Parameter = 03090000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3072, ThreadID = 3188, StartAddress = 02070130, Parameter = 01B0F348
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3072, ThreadID = 3192, StartAddress = 030C0000, Parameter = 030B0000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3072, ThreadID = 3216, StartAddress = 030C0000, Parameter = 030B0000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3072, ThreadID = 3228, StartAddress = 030C0000, Parameter = 030B0000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3072, ThreadID = 3232, StartAddress = 030C0000, Parameter = 030B0000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3072, ThreadID = 3248, StartAddress = 030C0000, Parameter = 030B0000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3072, ThreadID = 3256, StartAddress = 030C0000, Parameter = 030B0000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3072, ThreadID = 3268, StartAddress = 030C0000, Parameter = 030B0000
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\YXLoadDll_2756\RES\YXLOADDLL.DLL
Behavior description:删除文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\YXLoadDll_2756\RES\YXLOADDLL.DLL
Behavior description:创建可执行文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\YXLoadDll_2756\RES\YXLOADDLL.DLL
Behavior description:修改文件内容
details:C:\Documents and Settings\Administrator\Local Settings\Temp\YXLoadDll_2756\RES\YXLOADDLL.DLL ---> Offset = 0
Behavior description:查找文件
details:FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
FileName = C:\WINDOWS
FileName = C:\WINDOWS\system32
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\YXLoadDll_2756\res\temp\
FileName = C:\*.*
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\YXLoadDll_2756
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\YXLoadDll_2756\*.*
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\YXLoadDll_2756\RES\*.*
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\YXLoadDll_2756\RES\temp\*.*
Network behavior
Behavior description:打开指定IE网页
details:http://ga****et/
Behavior description:建立到一个指定的套接字连接
details:URL: so****om, IP: **.133.40.**:128, SOCKET = 0x000001b0
Behavior description:发送HTTP包
details:GET /info/installinfo.xml HTTP/1.1 Host: so****om Accept: */* Cookie: Name=0telecomadmin
Behavior description:按名称获取主机地址
details:GetAddrInfoW: so****om
Registry behavior
Behavior description:删除注册表键
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW\
Behavior description:删除注册表键值
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW\DWFileTreeRoot
Other behavior
Behavior description:获取光标位置
details:CursorPos = (80,18468), SleepMilliseconds = 50.
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
oleacc-msaa-loaded
MSCTF.Shared.MUTEX.IOH
MSCTF.Shared.MUTEX.EAM
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = MSCTF.SendReceiveConection.Event.EAM.IC
EventName = MSCTF.SendReceive.Event.EAM.IC
EventName = Global\userenv: User Profile setup event
EventName = ShellCopyEngineRunning
EventName = Global\crypt32LogoffEvent
EventName = ShellCopyEngineFinished
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:窗口信息
details:Pid = 3072, Hwnd=0x2033c, Text = www.ali213.net 汉化安装包, ClassName = AAU_FORM[TID:3076].
Behavior description:获取TickCount值
details:TickCount = 223534, SleepMilliseconds = 50.
TickCount = 223612, SleepMilliseconds = 50.
TickCount = 223628, SleepMilliseconds = 50.
TickCount = 223643, SleepMilliseconds = 50.
TickCount = 223659, SleepMilliseconds = 50.
Behavior description:调整进程token权限
details:SE_DEBUG_PRIVILEGE
SE_LOAD_DRIVER_PRIVILEGE
Behavior description:屏蔽窗口关闭消息
details:hWnd = 0x0002033c, Text = www.ali213.net 汉化安装包, ClassName = AAU_FORM[TID:3076].
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
_fCanRegisterWithShellService
AtlTraceModuleManager_ProcessAddedStatic3
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceive.Event.IOH.IC
MSCTF.SendReceiveConection.Event.IOH.IC
Global\crypt32LogoffEvent
Behavior description:查找PE资源信息
details:(FindResourceA) hModule = 0x00400000, ResName: /RES/YXLOADDLL.DLL, ResType: RES
Behavior description:可执行文件签名信息
details:C:\Documents and Settings\Administrator\Local Settings\Temp\YXLoadDll_2756\RES\YXLOADDLL.DLL(签名验证: 未通过)
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 50.
[2]: MilliSeconds = 0.
[3]: MilliSeconds = 50.
[4]: MilliSeconds = 50.
[5]: MilliSeconds = 50.
[6]: MilliSeconds = 50.
[7]: MilliSeconds = 50.
[8]: MilliSeconds = 50.
[9]: MilliSeconds = 50.
[10]: MilliSeconds = 50.
Behavior description:可执行文件MD5
details:C:\Documents and Settings\Administrator\Local Settings\Temp\YXLoadDll_2756\RES\YXLOADDLL.DLL ---> a43bf0efe8b3dc0e6ae58ce7df563d0c
Behavior description:打开互斥体
details:ShimCacheMutex
Local\!IETld!Mutex
DBWinMutex
Behavior description:加载新释放的文件
details:Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\YXLoadDll_2756\RES\YXLOADDLL.DLL.
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号