VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:79
Behavior list
Basic Information
MD5:4f11b0aeec47f85e754dd6c4502c16a8
file type:Rar
Production company:
version:
Shell or compiler information:
Subfile information:3d3s11.0破解版 免费.exedumpFile / 95bd21e090d619be1688fb893db3cea1 / EXE
3d3s11.0破解版 免费.exe / 95bd21e090d619be1688fb893db3cea1 / EXE
Key behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-1-5-21-1482476501-1645522239-1417001333-500
MSCTF.MarshalInterface.FileMap.MMJ..AJBGF
MSCTF.MarshalInterface.FileMap.MMJ.B.AJBGF
MSCTF.MarshalInterface.FileMap.MMJ.C.AJBGF
MSCTF.MarshalInterface.FileMap.MMJ.D.AJBGF
MSCTF.MarshalInterface.FileMap.MMJ.E.AJBGF
MSCTF.MarshalInterface.FileMap.MMJ.F.AJBGF
MSCTF.MarshalInterface.FileMap.MMJ.G.AJBGF
MSCTF.MarshalInterface.FileMap.AJK..OOBGF
MSCTF.MarshalInterface.FileMap.AJK.B.OOBGF
MSCTF.MarshalInterface.FileMap.AJK.C.OOBGF
MSCTF.MarshalInterface.FileMap.AJK.D.OOBGF
MSCTF.MarshalInterface.FileMap.AJK.E.OOBGF
MSCTF.MarshalInterface.FileMap.AJK.F.OOBGF
MSCTF.MarshalInterface.FileMap.AJK.G.OOBGF
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:隐藏指定窗口
details:[Window,Class] = [,#32770]
Process behavior
Behavior description:创建新文件进程
details:ImagePath = c:\%temp%\1429375275.926257.exe_7zdump\3d3s11.0破解版 免费.exe, CmdLine = "c:\%temp%\1429375275.926257.exe_7zdump\3d3s11.0破解版 免费.exe"
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-1-5-21-1482476501-1645522239-1417001333-500
MSCTF.MarshalInterface.FileMap.MMJ..AJBGF
MSCTF.MarshalInterface.FileMap.MMJ.B.AJBGF
MSCTF.MarshalInterface.FileMap.MMJ.C.AJBGF
MSCTF.MarshalInterface.FileMap.MMJ.D.AJBGF
MSCTF.MarshalInterface.FileMap.MMJ.E.AJBGF
MSCTF.MarshalInterface.FileMap.MMJ.F.AJBGF
MSCTF.MarshalInterface.FileMap.MMJ.G.AJBGF
MSCTF.MarshalInterface.FileMap.AJK..OOBGF
MSCTF.MarshalInterface.FileMap.AJK.B.OOBGF
MSCTF.MarshalInterface.FileMap.AJK.C.OOBGF
MSCTF.MarshalInterface.FileMap.AJK.D.OOBGF
MSCTF.MarshalInterface.FileMap.AJK.E.OOBGF
MSCTF.MarshalInterface.FileMap.AJK.F.OOBGF
MSCTF.MarshalInterface.FileMap.AJK.G.OOBGF
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Network behavior
Behavior description:连接指定站点
details:InternetConnectA: ServerName = blog.sina.com.cn, PORT = 80
InternetConnectA: ServerName = hi.baidu.com, PORT = 80
InternetConnectA: ServerName = dreamcry.blog.163.com, PORT = 80
InternetConnectA: ServerName = 23896535.blog.hexun.com, PORT = 80
Behavior description:读取网络文件
details:hFile = 0x00000678, BytesToRead =10240, BytesRead = 10240.
hFile = 0x00000674, BytesToRead =10240, BytesRead = 10240.
Behavior description:打开HTTP请求
details:HttpOpenRequestA: blog.sina.com.cn:80/dreamcrydc, hConnect = 0x0000067c
HttpOpenRequestA: blog.sina.com.cn:80/baitanmaikaoya, hConnect = 0x00000678
HttpOpenRequestA: blog.sina.com.cn:80/fendoudc, hConnect = 0x00000678
HttpOpenRequestA: hi.baidu.com:80/dreamcry, hConnect = 0x00000678
HttpOpenRequestA: hi.baidu.com:80/raydc, hConnect = 0x00000678
HttpOpenRequestA: hi.baidu.com:80/baitandc, hConnect = 0x00000678
HttpOpenRequestA: dreamcry.blog.163.com:80/, hConnect = 0x00000678
HttpOpenRequestA: 23896535.blog.hexun.com:80/, hConnect = 0x00000678
Other behavior
Behavior description:创建互斥体
details:RasPbFile
CTF.LBES.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Compart.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Asm.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Layouts.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TMD.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TimListCache.FMPDefaultS-1-5-21-1482476501-1645522239-1417001333-500MUTEX.DefaultS-1-5-21-1482476501-1645522239-1417001333-500
MSCTF.Shared.MUTEX.AEH
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [,Microsoft Internet Explorer]
Behavior description:窗口信息
details:Pid = 2504, Hwnd=0x20354, Text = 确定, ClassName = Button.
Pid = 2504, Hwnd=0x20352, Text = 版本已更新,即将为您跳转到最新版本下载页面..., ClassName = Static.
Pid = 2504, Hwnd=0x20356, Text = 版本更新提醒:, ClassName = #32770.
Behavior description:隐藏指定窗口
details:[Window,Class] = [,#32770]
Behavior description:打开指定IE网页
details:http://dreamcrydc.blog.163.com/
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号