VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

File information
Safety rating:60
Behavior list
Basic Information
MD5:cab932c4dcfbd439a9ed41ad35e93869
file type:Nsis
Production company:
version:1.0.0.1---1.0.0.1
Shell or compiler information:
Subfile information:BPad.exe / 55be664cf13144e1c3dddf7ca49fa32d / EXE
BPor.exe / bd827a405e751bab6a200d9bdc98f4dd / EXE
SmallPander.exe / 77484d2161bff1865954595e3be22157 / Rar
uninst.exe / 6f3793e0494da3d74c183ac1e636b422 / EXE
BPExt64.dll / 2d0fd67623c2c2970ee1fdd86d55dfd6 / DLL
BPExt.dll / 8ec199b32b361fd8e870a721533a200e / DLL
processwork.dll / 0a4fa7a9ba969a805eb0603c7cfe3378 / DLL
unrar.dll / 7af814f37309e7bd2002bddaf60b35b7 / DLL
ZipDLL.dll / 2dc35ddcabcb2b24919b9afae4ec3091 / DLL
BP.exe / 747dd6a32425e9be875fa45e2539b547 / EXE
[NSIS].nsi / 8cc119cc9918cc6d59b00a42db50736a / Unknown
bk.png / d8cf77f9563bbb8b9050714a6ecd8efa / Unknown
SimpleSC.dll / d63975ce28f801f236c4aca5af726961 / DLL
ProKill.dll / a671be1512202de08571068637bb3e90 / DLL
ProKill.dll / a671be1512202de08571068637bb3e90 / DLL
ProKill.dll / e1fa7f89c07ab350c33bfb928d576211 / DLL
RC4dll.dll / c13bf5eead03e5989d157d5ed66e20f4 / DLL
crypto.dll / d6d69f665395bc87cc37ffd5c1d0de1a / DLL
KillProcDLL.dll / 83142eac84475f4ca889c73f10d9c179 / DLL
Key behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-*
MSCTF.MarshalInterface.FileMap.MHN..NNGHH
MSCTF.MarshalInterface.FileMap.MHN.B.NNGHH
MSCTF.MarshalInterface.FileMap.MHN.C.NNGHH
MSCTF.MarshalInterface.FileMap.MHN.D.NNGHH
MSCTF.MarshalInterface.FileMap.MHN.E.NNGHH
MSCTF.MarshalInterface.FileMap.MHN.F.NOGHH
MSCTF.MarshalInterface.FileMap.MHN.G.NOGHH
MSCTF.MarshalInterface.FileMap.ELM..KGHHH
MSCTF.MarshalInterface.FileMap.ELM.B.KGHHH
MSCTF.MarshalInterface.FileMap.ELM.C.KGHHH
MSCTF.MarshalInterface.FileMap.ELM.D.KGHHH
MSCTF.MarshalInterface.FileMap.ELM.E.KGHHH
MSCTF.MarshalInterface.FileMap.ELM.F.KGHHH
MSCTF.MarshalInterface.FileMap.ELM.G.KHHHH
Behavior description:屏蔽窗口关闭消息
details:hWnd = 0x000302a4, Text = InStaller , ClassName = #32770.
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:隐藏指定窗口
details:[Window,Class] = [,Button]
[Window,Class] = [,Auto-Suggest Dropdown]
Behavior description:按名称获取主机地址
details:computer
wpad
tjkaola.sulang.com
Process behavior
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-*
MSCTF.MarshalInterface.FileMap.MHN..NNGHH
MSCTF.MarshalInterface.FileMap.MHN.B.NNGHH
MSCTF.MarshalInterface.FileMap.MHN.C.NNGHH
MSCTF.MarshalInterface.FileMap.MHN.D.NNGHH
MSCTF.MarshalInterface.FileMap.MHN.E.NNGHH
MSCTF.MarshalInterface.FileMap.MHN.F.NOGHH
MSCTF.MarshalInterface.FileMap.MHN.G.NOGHH
MSCTF.MarshalInterface.FileMap.ELM..KGHHH
MSCTF.MarshalInterface.FileMap.ELM.B.KGHHH
MSCTF.MarshalInterface.FileMap.ELM.C.KGHHH
MSCTF.MarshalInterface.FileMap.ELM.D.KGHHH
MSCTF.MarshalInterface.FileMap.ELM.E.KGHHH
MSCTF.MarshalInterface.FileMap.ELM.F.KGHHH
MSCTF.MarshalInterface.FileMap.ELM.G.KHHHH
Behavior description:创建可执行文件
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\Banner.dll
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\inetc.dll
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\RC4dll.dll
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\Unicode.dll
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\System.dll
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\DialogEx.dll
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\crypto.dll
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\ProKill.dll
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\ToolTips.dll
Behavior description:修改文件内容
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\ti.dat---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\tmp2.txt---> Offset = 12288
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\config.ini---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\page1A.ini---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\page1A.ini---> Offset = 17
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\page3A.ini---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\page3A.ini---> Offset = 17
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\CloseBtn.png---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\bg.png---> Offset = 16384
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\bk.png---> Offset = 49152
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\cancel.png---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\cancel2.png---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\cancel3.png---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\change.png---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\check-box.png---> Offset = 0
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:查找文件
details:FileName = C:\DOCUME~1
FileName = C:\Documents and Settings\ADMINI~1
FileName = C:\Documents and Settings\Administrator\LOCALS~1
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\WINDOWS\system32\Ras\*.pbk
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\unicode.dll
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\RC4dll.dll
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\config.ini
Network behavior
Behavior description:发送一个已连接的套接字数据
details:SOCKET = 0x000004b8, TotalSize = 137, Offset = 0, ReadSize = 137.
Behavior description:联网打开网址
details:InternetOpenUrlA: http://110.110.110.110:80/wpad.dat hInternet = 0x000004f4
Behavior description:下载文件
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsr6.tmp\tmp.txt
Behavior description:连接指定站点
details:InternetConnectA: ServerName = tjkaola.sulang.com, PORT = 80
Behavior description:建立到一个指定的套接字连接
details:110.110.110.110:80
Behavior description:读取网络文件
details:hFile = 0x000004f4, BytesToRead =4010, BytesRead = 4010.
hFile = 0x00000638, BytesToRead =8192, BytesRead = 8192.
Behavior description:打开HTTP请求
details:HttpOpenRequestA: tjkaola.sulang.com:80/conf.php, hConnect = 0x000004c0
Behavior description:按名称获取主机地址
details:computer
wpad
tjkaola.sulang.com
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\kaola\service\setup
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\996E\DEBUG\Trace Level
Behavior description:删除注册表键值
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\996E\DEBUG\Trace Level
Behavior description:删除注册表键值_IE连接设置
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
RasPbFile
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
MSCTF.Shared.MUTEX.MHN
MSCTF.Shared.MUTEX.ELM
Behavior description:隐藏指定窗口
details:[Window,Class] = [,Button]
[Window,Class] = [,Auto-Suggest Dropdown]
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [#32770,]
NtUserFindWindowEx: [Class,Window] = [OleMainThreadWndClass,]
Behavior description:获取系统权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:获取TickCount值
details:TickCount = 489135, SleepMilliseconds = 10.
TickCount = 489181, SleepMilliseconds = 10.
TickCount = 489197, SleepMilliseconds = 10.
TickCount = 489228, SleepMilliseconds = 10.
TickCount = 489244, SleepMilliseconds = 10.
TickCount = 489260, SleepMilliseconds = 10.
TickCount = 489322, SleepMilliseconds = 10.
TickCount = 489338, SleepMilliseconds = 10.
TickCount = 489353, SleepMilliseconds = 10.
TickCount = 489369, SleepMilliseconds = 10.
TickCount = 489400, SleepMilliseconds = 10.
TickCount = 489416, SleepMilliseconds = 10.
TickCount = 489431, SleepMilliseconds = 10.
TickCount = 489447, SleepMilliseconds = 10.
TickCount = 489463, SleepMilliseconds = 10.
Behavior description:屏蔽窗口关闭消息
details:hWnd = 0x000302a4, Text = InStaller , ClassName = #32770.
Behavior description:窗口信息
details:Pid = 3248, Hwnd=0x402ba, Text = 欢迎, ClassName = Static.
Pid = 3248, Hwnd=0x302b4, Text = >, ClassName = Static.
Pid = 3248, Hwnd=0x302cc, Text = 解压, ClassName = Static.
Pid = 3248, Hwnd=0x302b2, Text = >, ClassName = Static.
Pid = 3248, Hwnd=0xf02c0, Text = 完成, ClassName = Static.
Pid = 3248, Hwnd=0x402d4, Text = , ClassName = Button.
Pid = 3248, Hwnd=0x402ca, Text = 所需空间: 9.3MB, ClassName = Static.
Pid = 3248, Hwnd=0x402c6, Text = 可用空间: 5.8GB, ClassName = Static.
Pid = 3248, Hwnd=0x502da, Text = C:\Program Files\xiaoxiong, ClassName = Edit.
Pid = 3248, Hwnd=0x502b8, Text = , ClassName = Button.
Pid = 3248, Hwnd=0x402b0, Text = 解压路径:, ClassName = Static.
Pid = 3248, Hwnd=0x502b6, Text = 使用360网址导航服务, ClassName = Static.
Pid = 3248, Hwnd=0x302d0, Text = , ClassName = Button(CheckBox).
Pid = 3248, Hwnd=0x102de, Text = <<返回, ClassName = Button.
Pid = 3248, Hwnd=0x202e2, Text = 我已经阅读并同意, ClassName = Button(CheckBox).
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号