VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:35
Behavior list
Basic Information
MD5:1a534816fd367349c1e049a6c6f1a18a
file type:EXE
Production company:童年
version:1.0.0.0---1.0.0.0
Shell or compiler information:COMPILER:Elan
Process behavior
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 2016, ThreadID = 1396, StartAddress = 77DC845A, Parameter = 00000000
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.IGD
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = MSCTF.SendReceive.Event.IGD.IC
EventName = MSCTF.SendReceiveConection.Event.IGD.IC
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000041
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000041
MSCTF.SendReceiveConection.Event.ELH.IC
MSCTF.SendReceive.Event.ELH.IC
Behavior description:窗口信息
details:Pid = 2016, Hwnd=0x4038c, Text = 自定义包, ClassName = Button.
Pid = 2016, Hwnd=0x100354, Text = 高级设置, ClassName = Button.
Pid = 2016, Hwnd=0x10032e, Text = 捐款者功能, ClassName = Button(GroupBox).
Pid = 2016, Hwnd=0x503b8, Text = 给我捐款, ClassName = Button.
Pid = 2016, Hwnd=0x1203be, Text = 给我捐款, ClassName = Button.
Pid = 2016, Hwnd=0xe02aa, Text = 登录账户, ClassName = Button.
Pid = 2016, Hwnd=0x110342, Text = 法律说明, ClassName = Button(GroupBox).
Pid = 2016, Hwnd=0x7038e, Text = 程序性质不受法律保护,请勿以身试法,若使用者使用本程序触法,作者一概不负任何责任!, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2016, Hwnd=0xe039e, Text = 关于程序, ClassName = Button(GroupBox).
Pid = 2016, Hwnd=0xb0398, Text = 作者:童年(QQ:483831973) 测试:橙影,无私的玉兔 建议:橙影,无私的玉兔,233 然后到这里就没有了~, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2016, Hwnd=0x10034c, Text = 获取代理, ClassName = Button.
Pid = 2016, Hwnd=0x1302c4, Text = 导入代理, ClassName = Button.
Pid = 2016, Hwnd=0x603ac, Text = 发包方式, ClassName = Button(GroupBox).
Pid = 2016, Hwnd=0x1d02bc, Text = GET包, ClassName = Button(RadioButton).
Pid = 2016, Hwnd=0x9039c, Text = POST包, ClassName = Button(RadioButton).
Behavior description:隐藏指定窗口
details:[Window,Class] = [,Edit]
[Window,Class] = [代理IP地址:,Afx:400000:b:10011:1900015:0]
[Window,Class] = [,_EL_CommonDlg]
[Window,Class] = [导入代理,Button]
[Window,Class] = [获取代理,Button]
[Window,Class] = [关于程序,Button]
[Window,Class] = [法律说明,Button]
[Window,Class] = [捐款者功能,Button]
Behavior description:打开互斥体
details:ShimCacheMutex
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号