VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:76
Behavior list
Basic Information
MD5:0ffb95b98181d05bd8ef520d1e6c1f14
file type:Rar
Production company:
version:
Shell or compiler information:
Subfile information:Windows Loader.exedumpFile / 323c0fd51071400b51eedb1be90a8188 / EXE
Windows Loader.exe / 323c0fd51071400b51eedb1be90a8188 / EXE
upx30_587df61bdumpFile / aa4bb8fc9630ec0f8e36f8e6f606be9f / EXE
upx30_5c5f65a9dumpFile / aa4bb8fc9630ec0f8e36f8e6f606be9f / EXE
Read me.txtdumpFile / 3e83d11dcd0d1dc8b6cf531353cf9e81 / Unknown
Read me.txt / 3e83d11dcd0d1dc8b6cf531353cf9e81 / Unknown
Keys.inidumpFile / 3ba4950bcf43b1c7b714a1d93b57ea86 / Unknown
Keys.ini / 3ba4950bcf43b1c7b714a1d93b57ea86 / Unknown
checksums.md5dumpFile / cab45d50be4c1fc788d29593464b1f35 / Unknown
checksums.md5 / cab45d50be4c1fc788d29593464b1f35 / Unknown
Phần mềm máy tính - Game Android Phanmemaz.com.URLdumpFile / 64c569dd623968bf7dbe06a479253182 / Unknown
Ph_n m_m máy tính - Game Android Phanmemaz.com.URL / 64c569dd623968bf7dbe06a479253182 / Unknown
Phanmemaz.com---Windows LoaderdumpFile / d41d8cd98f00b204e9800998ecf8427e / Unknown
Key behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-1-5-21-1482476501-1645522239-1417001333-500
MSCTF.MarshalInterface.FileMap.ELK..EINHF
MSCTF.MarshalInterface.FileMap.ELK.B.EINHF
MSCTF.MarshalInterface.FileMap.ELK.C.EINHF
MSCTF.MarshalInterface.FileMap.ELK.D.EINHF
MSCTF.MarshalInterface.FileMap.ELK.E.EINHF
MSCTF.MarshalInterface.FileMap.ELK.F.EINHF
MSCTF.MarshalInterface.FileMap.ELK.G.EINHF
MSCTF.Shared.SFM.ELK
Behavior description:隐藏指定窗口
details:[Window,Class] = [ACPI tables,Button]
[Window,Class] = [,RB_Pane]
[Window,Class] = [Memory,Button]
[Window,Class] = [Boot menu,Button]
[Window,Class] = [,ComboLBox]
[Window,Class] = [,ComboBox]
[Window,Class] = [,RICHEDIT50W]
[Window,Class] = [OS information,Button]
[Window,Class] = [,msctls_progress32]
[Window,Class] = [Options,Button]
[Window,Class] = [,RB_CanvasPane]
[Window,Class] = [Patch OEM table ID"s,Button]
[Window,Class] = [Reverse search direction,Button]
[Window,Class] = [Ignore the existing SLIC,Button]
[Window,Class] = [Move the RSDP to EBDA,Button]
Process behavior
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-1-5-21-1482476501-1645522239-1417001333-500
MSCTF.MarshalInterface.FileMap.ELK..EINHF
MSCTF.MarshalInterface.FileMap.ELK.B.EINHF
MSCTF.MarshalInterface.FileMap.ELK.C.EINHF
MSCTF.MarshalInterface.FileMap.ELK.D.EINHF
MSCTF.MarshalInterface.FileMap.ELK.E.EINHF
MSCTF.MarshalInterface.FileMap.ELK.F.EINHF
MSCTF.MarshalInterface.FileMap.ELK.G.EINHF
MSCTF.Shared.SFM.ELK
Registry behavior
Behavior description:删除注册表键
details:\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Compart.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Asm.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Layouts.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TMD.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TimListCache.FMPDefaultS-1-5-21-1482476501-1645522239-1417001333-500MUTEX.DefaultS-1-5-21-1482476501-1645522239-1417001333-500
WIN7LDRMU
MSCTF.Shared.MUTEX.AEH
MSCTF.Shared.MUTEX.ELK
Behavior description:隐藏指定窗口
details:[Window,Class] = [ACPI tables,Button]
[Window,Class] = [,RB_Pane]
[Window,Class] = [Memory,Button]
[Window,Class] = [Boot menu,Button]
[Window,Class] = [,ComboLBox]
[Window,Class] = [,ComboBox]
[Window,Class] = [,RICHEDIT50W]
[Window,Class] = [OS information,Button]
[Window,Class] = [,msctls_progress32]
[Window,Class] = [Options,Button]
[Window,Class] = [,RB_CanvasPane]
[Window,Class] = [Patch OEM table ID"s,Button]
[Window,Class] = [Reverse search direction,Button]
[Window,Class] = [Ignore the existing SLIC,Button]
[Window,Class] = [Move the RSDP to EBDA,Button]
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [STATIC,q3TDgcZ4p2up0Z77amQP 00000AB0]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:窗口信息
details:Pid = 2736, Hwnd=0x103b2, Text = OS information, ClassName = Button(GroupBox).
Pid = 2736, Hwnd=0x103ba, Text = Options, ClassName = Button(GroupBox).
Pid = 2736, Hwnd=0x103be, Text = Install, ClassName = Button.
Pid = 2736, Hwnd=0x103c2, Text = Uninstall, ClassName = Button.
Pid = 2736, Hwnd=0x20356, Text = Windows Loader v2.2.2 - By Daz, ClassName = RBWindow.
Behavior description:获取系统权限
details:SE_LOAD_DRIVER_PRIVILEGE
SE_INC_BASE_PRIORITY_PRIVILEGE
Behavior description:枚举窗口
details:N/A
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号