VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:61
Behavior list
Basic Information
MD5:a1c995316426d5f626ba0dea2a5d247b
file type:zip
Production company:
version:
Shell or compiler information:COMPILER:Microsoft Visual C++ 6.0 DLL
Subfile information:upx_c_03be52f9dumpFile / c41e28e89cad60d7bc63bd6543444bab / DLL
vcore.dll / a94df81e566f95810df3c034b077e248 / DLL
openvpn.dll / 4d1a21b8860730ff067971a9353371a9 / DLL
RexCC破解.exe / c8614b74ce1b84faef73220b6e383953 / EXE
tapinstall.exe / 47099c6460814f10e6c641db8689ab55 / EXE
vpnclient.dll / e96957508e4351e6aea0b27301a92dd4 / DLL
tapinstall.exe / 20f619ebb6d10ee6a5c164d7dfd36f32 / EXE
main.dat / 3dcbaaa0006dec809719406ce4bd4d53 / Unknown
tap0901.sys / 595cb8da5b522ad8cc28193dc21fd496 / SYS
tap0901.sys / 1e89de7a4fb7a854ebb241d0aa8996dd / SYS
tap0901.cat / bdf91df5e7ed2e4f1b16e824acbe2e5a / Unknown
tap0901.cat / 47dc0ae2b1d80e3c6a2be625ee5bfd71 / Unknown
OemWin2k.inf / d953442fee4713903dc02555e1e7fb86 / Unknown
OemWin2k.inf / 25ec8d92149e76cbb6d3e1011625f1f6 / Unknown
ca.crt / 35a11219589576a4362101148c8ef0d3 / Unknown
安装使用说明.txt / bca4a62eb068f09c8a7dac303f2f7458 / Unknown
deltapall.bat / 878c61f36ad1fd585fc3d305ee0af8b9 / Unknown
deltapall.bat / 878c61f36ad1fd585fc3d305ee0af8b9 / Unknown
最新QQ软件下载.url / 9f36733525857a875b9aa9b0dc78da08 / Unknown
Key behavior
Behavior description:跨进程写入数据
details:TargetProcess = [System Process], WriteAddress = 0x02620000, Size = 85
C:\WINDOWS\explorer.exe
Behavior description:隐藏指定窗口
details:[Window,Class] = [,Static]
[Window,Class] = [挂断,Button]
[Window,Class] = [,Shell Embedding]
Behavior description:创建远程线程
details:C:\WINDOWS\explorer.exe
Behavior description:屏蔽窗口关闭消息
details:hWnd = 0x000202a4, Text = RexCC韩服专线, ClassName = #32770.
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-*
\WINDOWS\system32\zh-cn\ieframe.dll.mui
Local\UrlZonesSM_Administrator
MSCTF.MarshalInterface.FileMap.ENB..BJEHH
MSCTF.MarshalInterface.FileMap.ENB.B.BJEHH
MSCTF.MarshalInterface.FileMap.ENB.C.BJEHH
MSCTF.MarshalInterface.FileMap.ENB.D.BJEHH
MSCTF.MarshalInterface.FileMap.ENB.E.BJEHH
MSCTF.MarshalInterface.FileMap.ENB.F.BKEHH
MSCTF.MarshalInterface.FileMap.ENB.G.BKEHH
MSCTF.MarshalInterface.FileMap.ELH.NB.BKEHH
MSCTF.MarshalInterface.FileMap.ELH.OB.BLEHH
MSCTF.MarshalInterface.FileMap.ELH.PB.BLEHH
MSCTF.Shared.SFM.ENB
MSCTF.MarshalInterface.FileMap.ELH.AC.FKNJH
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:按名称获取主机地址
details:auth.app365.net
auth.buyaoren.com
auth.yigangzh.com
Process behavior
Behavior description:跨进程写入数据
details:TargetProcess = [System Process], WriteAddress = 0x02620000, Size = 85
C:\WINDOWS\explorer.exe
Behavior description:创建远程线程
details:C:\WINDOWS\explorer.exe
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-*
\WINDOWS\system32\zh-cn\ieframe.dll.mui
Local\UrlZonesSM_Administrator
MSCTF.MarshalInterface.FileMap.ENB..BJEHH
MSCTF.MarshalInterface.FileMap.ENB.B.BJEHH
MSCTF.MarshalInterface.FileMap.ENB.C.BJEHH
MSCTF.MarshalInterface.FileMap.ENB.D.BJEHH
MSCTF.MarshalInterface.FileMap.ENB.E.BJEHH
MSCTF.MarshalInterface.FileMap.ENB.F.BKEHH
MSCTF.MarshalInterface.FileMap.ENB.G.BKEHH
MSCTF.MarshalInterface.FileMap.ELH.NB.BKEHH
MSCTF.MarshalInterface.FileMap.ELH.OB.BLEHH
MSCTF.MarshalInterface.FileMap.ELH.PB.BLEHH
MSCTF.Shared.SFM.ENB
MSCTF.MarshalInterface.FileMap.ELH.AC.FKNJH
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:修改文件内容
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445518446.905591.exe_7zdump\RexCChfzx_pj\RexCC.ini---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\_img.img---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445518446.922810.exe_7zdump\RexCChfzx_pj\RexCC.ini---> Offset = 32
Behavior description:查找文件
details:FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\WINDOWS\system32\Ras\*.pbk
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = KERNEL32.DLL
Network behavior
Behavior description:连接指定站点
details:InternetConnectA: ServerName = www.rexcc.net, PORT = 80
Behavior description:建立到一个指定的套接字连接
details:127.0.0.1:1031
Behavior description:打开HTTP请求
details:HttpOpenRequestA: www.rexcc.net:80/note.html, hConnect = 0x0000059c
Behavior description:按名称获取主机地址
details:auth.app365.net
auth.buyaoren.com
auth.yigangzh.com
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\MACHINE\SOFTWARE\RexCC\vcore\Path
\REGISTRY\MACHINE\SOFTWARE\RexCC\vcore\Version
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Ras\Current\
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Ras\Current\KeepAlive
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Ras\Current\KeepAliveID
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Ras\Current\Reason
\REGISTRY\MACHINE\SOFTWARE\robert\robertHook\
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445518446.864061.exe_7zdump\RexCChfzx_pj\RexCC破解.exe
\REGISTRY\USER\S-*\SessionInformation\ProgramCount
Behavior description:删除注册表键值_IE连接设置
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
RasPbFile
SmartVpn
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.ENB
Behavior description:隐藏指定窗口
details:[Window,Class] = [,Static]
[Window,Class] = [挂断,Button]
[Window,Class] = [,Shell Embedding]
Behavior description:样本控制台输出内容
details:N/A
Behavior description:窗口信息
details:Pid = 1840, Hwnd=0x202b4, Text = 连接, ClassName = Button.
Pid = 1840, Hwnd=0x202b2, Text = 挂断, ClassName = Button.
Pid = 1840, Hwnd=0x302ba, Text = 退出, ClassName = Button.
Pid = 1840, Hwnd=0x302bc, Text = 设置, ClassName = Button.
Pid = 1840, Hwnd=0x302d6, Text = 注册, ClassName = Button.
Pid = 1840, Hwnd=0x202c2, Text = 充值, ClassName = Button.
Pid = 1840, Hwnd=0x502ce, Text = 连接成功, ClassName = #32770.
Pid = 1840, Hwnd=0x102de, Text = 登录框, ClassName = #32770.
Pid = 1840, Hwnd=0x102e8, Text = RexCC官网 www.RexCC.net, ClassName = Static.
Pid = 1840, Hwnd=0x102ea, Text = 用户名, ClassName = Afx:10000000:3:10011:1900014:0.
Pid = 1840, Hwnd=0x102ec, Text = 密码, ClassName = Afx:10000000:3:10011:1900014:0.
Pid = 1840, Hwnd=0x102ee, Text = 保存密码, ClassName = Afx:10000000:3:10011:1900014:0.
Pid = 1840, Hwnd=0x102f0, Text = L2TP协议, ClassName = Afx:10000000:3:10011:1900014:0.
Pid = 1840, Hwnd=0x202a4, Text = RexCC韩服专线, ClassName = #32770.
Pid = 1840, Hwnd=0x10366, Text = 是(&Y), ClassName = Button.
Behavior description:获取系统权限
details:SE_DEBUG_PRIVILEGE
Behavior description:屏蔽窗口关闭消息
details:hWnd = 0x000202a4, Text = RexCC韩服专线, ClassName = #32770.
Behavior description:枚举窗口
details:N/A
Behavior description:直接操作物理设备
details:\??\PhysicalDrive0
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [OleMainThreadWndClass,]
Behavior description:打开图片文件
details:1bg5.jpg
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号