VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:72
Behavior list
Behavior analysis report:         Threatbook file behavior analysis report
Basic Information
MD5:0aa80a26990724def72556aab3a4995e
file type:EXE
Production company:独月
version:1.0.0.0---1.0.0.0
Shell or compiler information:COMPILER:Elan
Key behavior
Behavior description:屏蔽窗口关闭消息
details:hWnd = 0x00010346, Text = 小脚本3.5 , ClassName = WTWindow.
Behavior description:直接调用系统关键API
details:Index = 0x000000A3, Name: NtQueryObject, Instruction Address = 0x0061C82E
Index = 0x00000019, Name: NtClose, Instruction Address = 0x004898F7
Behavior description:杀掉进程
details:C:\WINDOWS\system32\adb.exe
Process behavior
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2480, ThreadID = 2492, StartAddress = 4AEA7456, Parameter = 00000000
Behavior description:枚举进程
details:N/A
Behavior description:杀掉进程
details:C:\WINDOWS\system32\adb.exe
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\35da2.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\35eab.tmp
Behavior description:创建可执行文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\35da2.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\35eab.tmp
Behavior description:查找文件
details:FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\gamesfq\*.*
Behavior description:删除文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\35da2.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\35eab.tmp
Behavior description:复制文件
details:C:\WINDOWS\system32\ntdll.dll ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\35da2.tmp
C:\WINDOWS\system32\user32.dll ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\35eab.tmp
Behavior description:修改文件内容
details:C:\Documents and Settings\Administrator\Local Settings\Temp\35da2.tmp ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\35da2.tmp ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Temp\35da2.tmp ---> Offset = 131072
C:\Documents and Settings\Administrator\Local Settings\Temp\35eab.tmp ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\35eab.tmp ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Temp\35eab.tmp ---> Offset = 131072
C:\Documents and Settings\Administrator\Local Settings\Temp\35eab.tmp ---> Offset = 196608
C:\Documents and Settings\Administrator\Local Settings\Temp\35eab.tmp ---> Offset = 262144
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
MSCTF.Shared.MUTEX.ELJ
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = MSCTF.SendReceiveConection.Event.ELJ.IC
EventName = MSCTF.SendReceive.Event.ELJ.IC
Behavior description:直接调用系统关键API
details:Index = 0x000000A3, Name: NtQueryObject, Instruction Address = 0x0061C82E
Index = 0x00000019, Name: NtClose, Instruction Address = 0x004898F7
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
Global\SvcctrlStartEvent_A3752DX
Behavior description:调整进程token权限
details:SE_DEBUG_PRIVILEGE
Behavior description:屏蔽窗口关闭消息
details:hWnd = 0x00010346, Text = 小脚本3.5 , ClassName = WTWindow.
Behavior description:窗口信息
details:Pid = 2480, Hwnd=0x1037c, Text = QQ会话昵称, ClassName = Edit.
Pid = 2480, Hwnd=0x10378, Text = QQ答题, ClassName = Button(RadioButton).
Pid = 2480, Hwnd=0x10374, Text = 服务器IP, ClassName = _EL_Label.
Pid = 2480, Hwnd=0x10372, Text = 127.0.0.1, ClassName = Edit.
Pid = 2480, Hwnd=0x40344, Text = 端口, ClassName = _EL_Label.
Pid = 2480, Hwnd=0x10370, Text = 19730, ClassName = Edit.
Pid = 2480, Hwnd=0x1036e, Text = 连接, ClassName = Button.
Pid = 2480, Hwnd=0x1036c, Text = 答题活动, ClassName = Button(RadioButton).
Pid = 2480, Hwnd=0x10366, Text = 挂机答题, ClassName = Button(RadioButton).
Pid = 2480, Hwnd=0x10360, Text = 变量值(可双击修改), ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2480, Hwnd=0x1035e, Text = 变量名称(不可修改), ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2480, Hwnd=0x1037a, Text = 小脚本吧, ClassName = _EL_HyperLinker.
Pid = 2480, Hwnd=0x10376, Text = 答题调试, ClassName = Button.
Pid = 2480, Hwnd=0x10346, Text = 小脚本3.5 , ClassName = WTWindow.
Pid = 2480, Hwnd=0x1036a, Text = 123456, ClassName = Edit.
Behavior description:可执行文件签名信息
details:C:\Documents and Settings\Administrator\Local Settings\Temp\35da2.tmp(签名验证: 通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\35eab.tmp(签名验证: 通过)
Behavior description:隐藏指定窗口
details:[Window,Class] = [,Edit]
[Window,Class] = [,ListBox]
[Window,Class] = [,_EL_CommonDlg]
[Window,Class] = [,_EL_ClientSock]
[Window,Class] = [,_EL_ShapeBox]
[Window,Class] = [,Afx:400000:b:10011:0:0]
Behavior description:可执行文件MD5
details:C:\Documents and Settings\Administrator\Local Settings\Temp\35da2.tmp ---> 9e762b21dd4d10695799a9a6e9570b79
C:\Documents and Settings\Administrator\Local Settings\Temp\35eab.tmp ---> f697644d5f59050fbe6af896c19cca93
Behavior description:打开互斥体
details:ShimCacheMutex
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号