VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:72
Behavior list
Basic Information
MD5:3aef213f3661ee9df1fd4d988897eae7
file type:Rar
Production company:
version:
Shell or compiler information:COMPILER:UPX 0.89.6 - 1.02 / 1.05 - 1.24 -> Markus & Laszlo
Subfile information:upx_c_515ddfe3dumpFile / 29d3c8cc5a12f99438ccfb85dac56e83 / EXE
&%2365279%3BNDS口袋妖怪金心银魂存档修改器pokesavhgss0@39_60751.exedumpFile / d716bb79f41e7f27e6833ee42c472f87 / EXE
&%2365279%3BNDS口袋妖怪金心银魂存档修改器pokesavhgss0@39_60751.exe / d716bb79f41e7f27e6833ee42c472f87 / EXE
Key behavior
Behavior description:屏蔽窗口关闭消息
details:hWnd = 0x001802fe, Text = , ClassName = DownLoadFrame_splash.
Process behavior
Behavior description:创建本地线程
details:TargetProcess: &%2365279%3BNDS口袋妖怪金心银魂存档修改器pokesavhgss0@39_60751.exe, InheritedFromPID = 1944, ProcessID = 2044, ThreadID = 1628, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: &%2365279%3BNDS口袋妖怪金心银魂存档修改器pokesavhgss0@39_60751.exe, InheritedFromPID = 1944, ProcessID = 2044, ThreadID = 716, StartAddress = 004A7533, Parameter = 001D05E8
TargetProcess: &%2365279%3BNDS口袋妖怪金心银魂存档修改器pokesavhgss0@39_60751.exe, InheritedFromPID = 1944, ProcessID = 2044, ThreadID = 1252, StartAddress = 004A7533, Parameter = 001D09B0
TargetProcess: &%2365279%3BNDS口袋妖怪金心银魂存档修改器pokesavhgss0@39_60751.exe, InheritedFromPID = 1944, ProcessID = 2044, ThreadID = 1656, StartAddress = 004A7533, Parameter = 001C4460
TargetProcess: &%2365279%3BNDS口袋妖怪金心银魂存档修改器pokesavhgss0@39_60751.exe, InheritedFromPID = 1944, ProcessID = 2044, ThreadID = 1044, StartAddress = 77DC845A, Parameter = 00000000
Behavior description:枚举进程
details:N/A
Network behavior
Behavior description:建立到一个指定的套接字连接
details:URL: ap****cc, IP: **.133.40.**:80, SOCKET = 0x00000620
Behavior description:发送HTTP包
details:POST /api/getdown HTTP/1.1 Host: ap****cc Content-Length: 25 Connection:close Accept-Language: zh-cn Cache-Conbtrol:no-cache Content-Type:application/x-www-form-urlencoded &appid=39&sid=60751&ver=2
Behavior description:按名称获取主机地址
details:gethostbyname: ap****cc
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Direct3D\MostRecentApplication\Name
Other behavior
Behavior description:创建互斥体
details:DDrawWindowListMutex
__DDrawExclMode__
__DDrawCheckExclMode__
ATL:MemData03EACOMPUTER
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.ENB
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ATL:DLGFrame032E]
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:屏蔽窗口关闭消息
details:hWnd = 0x001802fe, Text = , ClassName = DownLoadFrame_splash.
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000040
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000040
MSCTF.SendReceiveConection.Event.ELH.IC
MSCTF.SendReceive.Event.ELH.IC
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000041
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000041
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = MSCTF.SendReceive.Event.ENB.IC
EventName = MSCTF.SendReceiveConection.Event.ENB.IC
Behavior description:打开互斥体
details:ShimCacheMutex
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号