VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:30
Behavior list
Basic Information
MD5:c687de13b0eec6884e6cf68399ca2ff2
file type:Rar
Production company:
version:
Shell or compiler information:COMPILER:Elan
Subfile information:SHELL采集扫描.EXE / cde27dc011236601b7147b3800a6325e / EXE
SHELL管理.EXE / 15bb76fbc390a31131793d9120380b17 / EXE
扫出来的webshell.txt / 5860faf74066c4d6820685f32e76d435 / Unknown
config.txt / 08d3edf2b9d60d4c467c3a0da3e6fc9e / Unknown
域名.txt / 607d6cfbdac6b7e9cb4116e8a2d34f23 / Unknown
Key behavior
Behavior description:跨进程写入数据
details:C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\alg.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Tencent\QQ\Bin\QQ.exe
C:\Program Files\Tencent\QQ\Bin\TXPlatform.exe
C:\WINDOWS\system32\conime.exe
C:\WINDOWS\system32\PersonalBankPortal.exe
C:\%temp%\1446390864.754267.exe
C:\%temp%\1446390864.761157.exe
C:\%temp%\1446390864.768181.exe
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ComboLBox]
Behavior description:创建远程线程
details:C:\WINDOWS\system32\winlogon.exe
Behavior description:关闭系统文件保护
details:N/A
Behavior description:获取窗口截图信息
details:Foreground window Info: HWND = 0x070104da, DC = 0x070104da.
Foreground window Info: HWND = 0x01010055, DC = 0x01010055.
Foreground window Info: HWND = 0x01010056, DC = 0x01010056.
Behavior description:修改注册表_系统防火墙可信进程列表
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\\??\C:\WINDOWS\system32\winlogon.exe
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-*
MSCTF.MarshalInterface.FileMap.IHF..ELJGH
MSCTF.MarshalInterface.FileMap.IHF.B.ELJGH
MSCTF.MarshalInterface.FileMap.IHF.C.ELJGH
MSCTF.MarshalInterface.FileMap.IHF.D.ELJGH
MSCTF.MarshalInterface.FileMap.IHF.E.ELJGH
MSCTF.MarshalInterface.FileMap.IHF.F.EMJGH
MSCTF.MarshalInterface.FileMap.IHF.G.EMJGH
MSCTF.Shared.SFM.IHF
Behavior description:通过内存映射跨进程修改内存
details:TargetProcess = [System Process]
Behavior description:按名称获取主机地址
details:ilo.brenz.pl
ant.trenz.pl
Process behavior
Behavior description:跨进程写入数据
details:C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\alg.exe
C:\WINDOWS\explorer.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Tencent\QQ\Bin\QQ.exe
C:\Program Files\Tencent\QQ\Bin\TXPlatform.exe
C:\WINDOWS\system32\conime.exe
C:\WINDOWS\system32\PersonalBankPortal.exe
C:\%temp%\1446390864.754267.exe
C:\%temp%\1446390864.761157.exe
C:\%temp%\1446390864.768181.exe
Behavior description:创建远程线程
details:C:\WINDOWS\system32\winlogon.exe
Behavior description:通过内存映射跨进程修改内存
details:TargetProcess = [System Process]
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-*
MSCTF.MarshalInterface.FileMap.IHF..ELJGH
MSCTF.MarshalInterface.FileMap.IHF.B.ELJGH
MSCTF.MarshalInterface.FileMap.IHF.C.ELJGH
MSCTF.MarshalInterface.FileMap.IHF.D.ELJGH
MSCTF.MarshalInterface.FileMap.IHF.E.ELJGH
MSCTF.MarshalInterface.FileMap.IHF.F.EMJGH
MSCTF.MarshalInterface.FileMap.IHF.G.EMJGH
MSCTF.Shared.SFM.IHF
Network behavior
Behavior description:发送一个已连接的套接字数据
details:SOCKET = 0x00000318, TotalSize = 20, Offset = 0, ReadSize = 20.
SOCKET = 0x00000318, TotalSize = 40, Offset = 0, ReadSize = 40.
SOCKET = 0x00000494, TotalSize = 20, Offset = 0, ReadSize = 20.
SOCKET = 0x00000494, TotalSize = 40, Offset = 0, ReadSize = 40.
Behavior description:建立到一个指定的套接字连接
details:219.133.40.1:80
Behavior description:按名称获取主机地址
details:ilo.brenz.pl
ant.trenz.pl
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Multimedia\DrawDib\vga.drv 1920x973x16(565 0)
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-*\RefCount
Behavior description:修改注册表_系统防火墙可信进程列表
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\\??\C:\WINDOWS\system32\winlogon.exe
Other behavior
Behavior description:创建互斥体
details:RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.IHF
Behavior description:内联HOOK
details:C:\WINDOWS\system32\GDI32.dll--->ExtTextOutA Offset = 0x0
C:\WINDOWS\system32\GDI32.dll--->ExtTextOutW Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetWindowLongA Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->SetWindowLongA Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->SetWindowLongW Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetWindowLongW Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->BeginPaint Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->EndPaint Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetDC Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetWindowDC Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->ReleaseDC Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->WindowFromDC Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetScrollInfo Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetScrollPos Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetScrollRange Offset = 0x0
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:窗口信息
details:Pid = 284, Hwnd=0x102f4, Text = SHell管理, ClassName = Button.
Pid = 284, Hwnd=0x102f2, Text = 刷外链, ClassName = Button.
Pid = 284, Hwnd=0x102ee, Text = 寄生虫模板, ClassName = Button(CheckBox).
Pid = 284, Hwnd=0x102ec, Text = 去重复, ClassName = Button(CheckBox).
Pid = 284, Hwnd=0x102de, Text = 自定义漏洞扫描, ClassName = Button(GroupBox).
Pid = 284, Hwnd=0x102f0, Text = 优化了几个功能, ClassName = _EL_Label.
Pid = 284, Hwnd=0x102ea, Text = 批量采集Shell2.3, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 284, Hwnd=0x102e8, Text = 清空, ClassName = Button.
Pid = 284, Hwnd=0x102e6, Text = 改为原来默认后缀, ClassName = Button.
Pid = 284, Hwnd=0x102e4, Text = 确定修改后缀, ClassName = Button.
Pid = 284, Hwnd=0x102e2, Text = 在下方添加自定义漏洞路径, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 284, Hwnd=0x102e0, Text = 说明: 添加格式 /漏洞路径|一句户密码 一行一个 添加时候记得删除说明, ClassName = Edit.
Pid = 284, Hwnd=0x202c8, Text = 关键词爬行, ClassName = Button(GroupBox).
Pid = 284, Hwnd=0x702c0, Text = 导出, ClassName = Button.
Pid = 284, Hwnd=0x202ac, Text = 页数, ClassName = Afx:400000:b:10011:1900015:0.
Behavior description:获取系统权限
details:SE_DEBUG_PRIVILEGE
SE_INC_BASE_PRIORITY_PRIVILEGE
Behavior description:关闭系统文件保护
details:N/A
Behavior description:获取窗口截图信息
details:Foreground window Info: HWND = 0x070104da, DC = 0x070104da.
Foreground window Info: HWND = 0x01010055, DC = 0x01010055.
Foreground window Info: HWND = 0x01010056, DC = 0x01010056.
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ComboLBox]
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号