VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:77
Behavior list
Basic Information
MD5:069a56cc10c6ef2a5e1953050360d785
file type:EXE
Production company:
version:
Shell or compiler information:
Key behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-*
MSCTF.MarshalInterface.FileMap.EHF..KMPGI
MSCTF.MarshalInterface.FileMap.EHF.B.JPPGI
MSCTF.MarshalInterface.FileMap.EHF.C.JPPGI
MSCTF.MarshalInterface.FileMap.EHF.D.JPPGI
MSCTF.MarshalInterface.FileMap.EHF.E.JPPGI
MSCTF.MarshalInterface.FileMap.EHF.F.IAAHI
MSCTF.MarshalInterface.FileMap.EHF.G.IAAHI
MSCTF.MarshalInterface.FileMap.EHF.H.IAAHI
Local\UrlZonesSM_Administrator
MSCTF.Shared.SFM.EHF
MSCTF.MarshalInterface.FileMap.EHF.C.PDIKI
MSCTF.MarshalInterface.FileMap.EHF.D.PDIKI
MSCTF.MarshalInterface.FileMap.EHF.E.PDIKI
MSCTF.MarshalInterface.FileMap.EHF.F.PDIKI
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:查找反病毒常用工具窗口
details:NtUserFindWindowEx: [Class,Window] = [Regmonclass,]
NtUserFindWindowEx: [Class,Window] = [Filemonclass,]
Behavior description:按名称获取主机地址
details:mypcqq.b0.upaiyun.com
Process behavior
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-*
MSCTF.MarshalInterface.FileMap.EHF..KMPGI
MSCTF.MarshalInterface.FileMap.EHF.B.JPPGI
MSCTF.MarshalInterface.FileMap.EHF.C.JPPGI
MSCTF.MarshalInterface.FileMap.EHF.D.JPPGI
MSCTF.MarshalInterface.FileMap.EHF.E.JPPGI
MSCTF.MarshalInterface.FileMap.EHF.F.IAAHI
MSCTF.MarshalInterface.FileMap.EHF.G.IAAHI
MSCTF.MarshalInterface.FileMap.EHF.H.IAAHI
Local\UrlZonesSM_Administrator
MSCTF.Shared.SFM.EHF
MSCTF.MarshalInterface.FileMap.EHF.C.PDIKI
MSCTF.MarshalInterface.FileMap.EHF.D.PDIKI
MSCTF.MarshalInterface.FileMap.EHF.E.PDIKI
MSCTF.MarshalInterface.FileMap.EHF.F.PDIKI
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:修改文件内容
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\Set.ini---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\Set.ini---> Offset = 15
C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\Set.ini---> Offset = 32
C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\Set.ini---> Offset = 59
C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\Set.ini---> Offset = 64
C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\Set.ini---> Offset = 13
Behavior description:查找文件
details:FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\WINDOWS\system32\Ras\*.pbk
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
Network behavior
Behavior description:发送一个已连接的套接字数据
details:SOCKET = 0x00000404, TotalSize = 238, Offset = 0, ReadSize = 238.
SOCKET = 0x00000480, TotalSize = 311, Offset = 0, ReadSize = 311.
Behavior description:连接指定站点
details:InternetConnectA: ServerName = mypcqq.b0.upaiyun.com, PORT = 80
Behavior description:建立到一个指定的套接字连接
details:110.110.110.110:80
219.133.40.1:80
Behavior description:读取网络文件
details:hFile = 0x000003fc, BytesToRead =10240, BytesRead = 10240.
Behavior description:打开HTTP请求
details:HttpOpenRequestA: mypcqq.b0.upaiyun.com:80/api.php, hConnect = 0x000003f4
Behavior description:按名称获取主机地址
details:mypcqq.b0.upaiyun.com
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Behavior description:删除注册表键值_IE连接设置
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
RasPbFile
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
MSCTF.Shared.MUTEX.EHF
Behavior description:内联HOOK
details:C:\WINDOWS\system32\ntdll.dll--->RtlCaptureContext Offset = 0xe6
C:\WINDOWS\system32\kernel32.dll--->WaitForSingleObjectEx Offset = 0xdc
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [4823-00000029,]
NtUserFindWindowEx: [Class,Window] = [18467-41,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:尝试打开调试器或监控软件的驱动设备对象
details:\??\NTICE
Behavior description:获取TickCount值
details:TickCount = 550921, SleepMilliseconds = 60000.
TickCount = 550937, SleepMilliseconds = 60000.
TickCount = 550953, SleepMilliseconds = 60000.
TickCount = 550968, SleepMilliseconds = 60000.
TickCount = 550984, SleepMilliseconds = 60000.
TickCount = 551015, SleepMilliseconds = 60000.
TickCount = 551031, SleepMilliseconds = 60000.
TickCount = 551046, SleepMilliseconds = 60000.
TickCount = 551062, SleepMilliseconds = 60000.
TickCount = 551718, SleepMilliseconds = 60000.
TickCount = 551906, SleepMilliseconds = 60000.
TickCount = 552609, SleepMilliseconds = 60000.
TickCount = 552656, SleepMilliseconds = 60000.
TickCount = 552671, SleepMilliseconds = 60000.
TickCount = 552718, SleepMilliseconds = 60000.
Behavior description:窗口信息
details:Pid = 1344, Hwnd=0x10324, Text = -, ClassName = _EL_Label.
Pid = 1344, Hwnd=0x10322, Text = ×, ClassName = _EL_Label.
Pid = 1344, Hwnd=0x10320, Text = 测试, ClassName = _EL_Label.
Pid = 1344, Hwnd=0x1031e, Text = 关于, ClassName = _EL_Label.
Pid = 1344, Hwnd=0x1031c, Text = 设置, ClassName = _EL_Label.
Pid = 1344, Hwnd=0x1031a, Text = 插件, ClassName = _EL_Label.
Pid = 1344, Hwnd=0x10318, Text = 帐号, ClassName = _EL_Label.
Pid = 1344, Hwnd=0x10316, Text = 日志, ClassName = _EL_Label.
Pid = 1344, Hwnd=0x102fa, Text = Build20151024, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1344, Hwnd=0x102f0, Text = MyPCQQ, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1344, Hwnd=0x10328, Text = 输出用户名, ClassName = _EL_Label.
Pid = 1344, Hwnd=0x10326, Text = 显示聊天信息, ClassName = _EL_Label.
Pid = 1344, Hwnd=0x10314, Text = 云黑检测, ClassName = Button.
Pid = 1344, Hwnd=0x10312, Text = 02 00 04 00 00 00 00, ClassName = Edit.
Pid = 1344, Hwnd=0x10310, Text = 372287478, ClassName = Edit.
Behavior description:直接操作物理设备
details:\??\PhysicalDrive0
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 60000.
[2]: MilliSeconds = 60000.
[3]: MilliSeconds = 60000.
[4]: MilliSeconds = 60000.
[5]: MilliSeconds = 60000.
[6]: MilliSeconds = 60000.
[7]: MilliSeconds = 60000.
[8]: MilliSeconds = 60000.
[9]: MilliSeconds = 60000.
[10]: MilliSeconds = 60000.
Behavior description:查找反病毒常用工具窗口
details:NtUserFindWindowEx: [Class,Window] = [Regmonclass,]
NtUserFindWindowEx: [Class,Window] = [Filemonclass,]
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号