VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:75
Behavior list
Basic Information
MD5:38e165031f883e96c33e68f3918871ba
file type:zip
Production company:
version:
Shell or compiler information:COMPILER:Microsoft Visual C++ 6.0 DLL
Subfile information:pljd.dll / fd7abad352cbcd97009de05f6dc971b6 / DLL
G_box破解BY无中.exe / 8b81febfaa3f3f968201da545a5b3e63 / EXE
UpData.exe / 68cf139d8f4c4f0f4919846af2019195 / EXE
v5_hook.dll / b389f0cf1c898d41002da73e9a332205 / DLL
V5.exe / f54f31047e4e9d064112ee681d842667 / EXE
v5_Process_Manager.dll / ee8972133eb4a6a9386057feea021797 / DLL
v5_Log.dll / 09937a2d15039a0960e4e8bba04bf13e / DLL
list.lst / e42d5c340b883e452c5584d0a9b015cd / Unknown
Dwlist.lst / a16813772486ddc1968184a053b51302 / Unknown
cfg.ini / 27ca292c788875e58f2f9c430afa4bde / Unknown
config.ini / a5122d2da1c2a89f7c7b161773be4ba0 / Unknown
mtemp.ini / 8912c7d2142d85191fa3296a0dfa642d / Unknown
Uplog.dat / 3b2b0a84140752acc34c859edf978189 / Unknown
Key behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-*
Local\UrlZonesSM_Administrator
\WINDOWS\system32\zh-cn\ieframe.dll.mui
Local\!PrivacIE!SharedMem!Counter
MSCTF.MarshalInterface.FileMap.ABD..GFGHH
MSCTF.MarshalInterface.FileMap.ABD.B.GHGHH
MSCTF.MarshalInterface.FileMap.ABD.C.GHGHH
MSCTF.MarshalInterface.FileMap.ABD.D.GHGHH
MSCTF.MarshalInterface.FileMap.ABD.E.GHGHH
MSCTF.MarshalInterface.FileMap.ABD.F.GHGHH
MSCTF.MarshalInterface.FileMap.ABD.G.GHGHH
MSCTF.Shared.SFM.ABD
\WINDOWS\system32\zh-cn\mshtml.dll.mui
MSCTF.MarshalInterface.FileMap.ABD.H.PBKHH
MSCTF.MarshalInterface.FileMap.ABD.I.PBKHH
Behavior description:屏蔽窗口关闭消息
details:hWnd = 0x000202a4, Text = G_box破解by无中, ClassName = TApplication.
hWnd = 0x000202cc, Text = 大牛 超级盒子, ClassName = TFrm_Main.
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:隐藏指定窗口
details:[Window,Class] = [,Internet Explorer_Server]
Behavior description:按名称获取主机地址
details:a.guazihe.com
Process behavior
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-*
Local\UrlZonesSM_Administrator
\WINDOWS\system32\zh-cn\ieframe.dll.mui
Local\!PrivacIE!SharedMem!Counter
MSCTF.MarshalInterface.FileMap.ABD..GFGHH
MSCTF.MarshalInterface.FileMap.ABD.B.GHGHH
MSCTF.MarshalInterface.FileMap.ABD.C.GHGHH
MSCTF.MarshalInterface.FileMap.ABD.D.GHGHH
MSCTF.MarshalInterface.FileMap.ABD.E.GHGHH
MSCTF.MarshalInterface.FileMap.ABD.F.GHGHH
MSCTF.MarshalInterface.FileMap.ABD.G.GHGHH
MSCTF.Shared.SFM.ABD
\WINDOWS\system32\zh-cn\mshtml.dll.mui
MSCTF.MarshalInterface.FileMap.ABD.H.PBKHH
MSCTF.MarshalInterface.FileMap.ABD.I.PBKHH
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:修改文件内容
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445486646.323338.exe_7zdump\新建文件夹\mtemp.ini---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\navcancl[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\ErrorPageTemplate[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\errorPageStrings[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\httpErrorPagesScripts[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\background_gradient[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\info_48[1]---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\bullet[1]---> Offset = 0
Behavior description:查找文件
details:FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445486646.684134.exe_7zdump\新建文件夹\G_box破解BY无中.exe
FileName = C:\DOCUME~1
FileName = C:\Documents and Settings\ADMINI~1
FileName = C:\Documents and Settings\Administrator\LOCALS~1
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\1445486646.704755.exe_7zdump
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\1445486646.708224.exe_7zdump\新建文件夹
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\1445486646.711685.exe_7zdump\新建文件夹\G_box破解BY无中.exe
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445486646.715177.exe_7zdump\新建文件夹\UpData.exe
FileName = E:\Control\Skins\Black Box.asz
FileName = E:\Control\Skins\Black Box\Options.dat
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
Network behavior
Behavior description:连接指定站点
details:InternetConnectA: ServerName = wot.guazihe.com, PORT = 80
InternetConnectA: ServerName = 51.guazihe.com, PORT = 80
Behavior description:建立到一个指定的套接字连接
details:219.133.40.1:80
127.0.0.1:1032
Behavior description:打开HTTP请求
details:HttpOpenRequestA: wot.guazihe.com:80/api/xmlapi.asmx/getinfo, hConnect = 0x00000518
HttpOpenRequestA: wot.guazihe.com:80/api/xmlapi.asmx/getinfo, hConnect = 0x00000514
HttpOpenRequestA: 51.guazihe.com:80/news/dn.html, hConnect = 0x00000544
Behavior description:按名称获取主机地址
details:a.guazihe.com
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Behavior description:删除注册表键值_IE连接设置
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
RasPbFile
Local\!PrivacIE!SharedMemory!Mutex
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.ABD
Behavior description:隐藏指定窗口
details:[Window,Class] = [,Internet Explorer_Server]
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [msctls_updown32,]
NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [MS_WINHELP,]
Behavior description:窗口信息
details:Pid = 1396, Hwnd=0x702c0, Text = 确定, ClassName = Button.
Pid = 1396, Hwnd=0x302b6, Text = Access violation at address 004B1757 in module "G_box破解BY无中.exe". Read of address 00000000., ClassName = Static.
Pid = 1396, Hwnd=0x502be, Text = G_box破解by无中, ClassName = #32770.
Pid = 1396, Hwnd=0x202b0, Text = 大牛 超级盒子, ClassName = TTitleBar.
Pid = 1396, Hwnd=0x302b8, Text = Panel5, ClassName = TPanel.
Pid = 1396, Hwnd=0x202b4, Text = Panel3, ClassName = TPanel.
Pid = 1396, Hwnd=0x202b2, Text = Panel1, ClassName = TPanel.
Pid = 1396, Hwnd=0x202d6, Text = 登录使用, ClassName = TTabSheet.
Pid = 1396, Hwnd=0x202c6, Text = 保存密码, ClassName = TCheckBox.
Pid = 1396, Hwnd=0x202ca, Text = 试用开启, ClassName = TRadioButton.
Pid = 1396, Hwnd=0x202c8, Text = 正常开启, ClassName = TRadioButton.
Pid = 1396, Hwnd=0x202c4, Text = 登录软件, ClassName = TButton.
Pid = 1396, Hwnd=0x202cc, Text = 大牛 超级盒子, ClassName = TFrm_Main.
Pid = 1396, Hwnd=0x602ce, Text = 新闻动态, ClassName = TTitleBar.
Pid = 1396, Hwnd=0x402b6, Text = pnl1, ClassName = TPanel.
Behavior description:获取系统权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:屏蔽窗口关闭消息
details:hWnd = 0x000202a4, Text = G_box破解by无中, ClassName = TApplication.
hWnd = 0x000202cc, Text = 大牛 超级盒子, ClassName = TFrm_Main.
Behavior description:枚举窗口
details:N/A
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号