VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:75
Behavior list
Basic Information
MD5:56fab3c6237bdf234e87eceb9eedfde7
file type:EXE
Production company:Piriform Ltd
version:2.19.0.982---2.19.0.982
Shell or compiler information:
Key behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-*
MSCTF.MarshalInterface.FileMap.MJB..OGCHH
MSCTF.MarshalInterface.FileMap.MJB.B.OGCHH
MSCTF.MarshalInterface.FileMap.MJB.C.OGCHH
MSCTF.MarshalInterface.FileMap.MJB.D.OHCHH
MSCTF.MarshalInterface.FileMap.MJB.E.OHCHH
MSCTF.MarshalInterface.FileMap.MJB.F.OICHH
MSCTF.MarshalInterface.FileMap.MJB.G.OICHH
MSCTF.MarshalInterface.FileMap.EFI..IGDHH
MSCTF.MarshalInterface.FileMap.EFI.B.IGDHH
MSCTF.MarshalInterface.FileMap.EFI.C.IGDHH
MSCTF.MarshalInterface.FileMap.EFI.D.IGDHH
MSCTF.MarshalInterface.FileMap.EFI.E.IHDHH
MSCTF.MarshalInterface.FileMap.EFI.F.IHDHH
MSCTF.MarshalInterface.FileMap.EFI.G.IHDHH
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ComboLBox]
[Window,Class] = [,#32770]
[Window,Class] = [,msctls_updown32]
[Window,Class] = [View files...,Button]
Process behavior
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-*
MSCTF.MarshalInterface.FileMap.MJB..OGCHH
MSCTF.MarshalInterface.FileMap.MJB.B.OGCHH
MSCTF.MarshalInterface.FileMap.MJB.C.OGCHH
MSCTF.MarshalInterface.FileMap.MJB.D.OHCHH
MSCTF.MarshalInterface.FileMap.MJB.E.OHCHH
MSCTF.MarshalInterface.FileMap.MJB.F.OICHH
MSCTF.MarshalInterface.FileMap.MJB.G.OICHH
MSCTF.MarshalInterface.FileMap.EFI..IGDHH
MSCTF.MarshalInterface.FileMap.EFI.B.IGDHH
MSCTF.MarshalInterface.FileMap.EFI.C.IGDHH
MSCTF.MarshalInterface.FileMap.EFI.D.IGDHH
MSCTF.MarshalInterface.FileMap.EFI.E.IHDHH
MSCTF.MarshalInterface.FileMap.EFI.F.IHDHH
MSCTF.MarshalInterface.FileMap.EFI.G.IHDHH
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:查找文件
details:FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\lang\lang-*.dll
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\lang-*.dll
FileName = C:\DOCUME~1
FileName = C:\Documents and Settings\ADMINI~1
FileName = C:\Documents and Settings\Administrator\LOCALS~1
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\WINDOWS\System32\dfboottime.exe
FileName = C:\WINDOWS\System32\dfboottime.cfg
Network behavior
Behavior description:联网打开网址
details:InternetOpenUrlA: http://www.piriform.com/auto?p=df&v=2.19.982&l=1033 hInternet = 0x000004e0
Behavior description:读取网络文件
details:hFile = 0x000004e0, BytesToRead =128, BytesRead = 128.
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Piriform\Defraggler\UpdateKey
\REGISTRY\USER\S-*\Software\Piriform\Defraggler\window_left
\REGISTRY\USER\S-*\Software\Piriform\Defraggler\window_top
\REGISTRY\USER\S-*\Software\Piriform\Defraggler\window_width
\REGISTRY\USER\S-*\Software\Piriform\Defraggler\window_height
\REGISTRY\USER\S-*\Software\Piriform\Defraggler\window_max
\REGISTRY\USER\S-*\Software\Piriform\Defraggler\window_flags
\REGISTRY\USER\S-*\Software\Piriform\Defraggler\MainWindowTopSplitterProportionalPos
\REGISTRY\USER\S-*\Software\Piriform\Defraggler\MainWindowBottomSplitterProportionalPos
\REGISTRY\USER\S-*\Software\Piriform\Defraggler\WasRunManualSilentUpdate
\REGISTRY\USER\S-*\Software\Piriform\Defraggler\DisplaySSDVolumes
\REGISTRY\USER\S-*\Software\Piriform\Defraggler\DisplayRemovableVolumes
\REGISTRY\USER\S-*\Software\Piriform\Defraggler\DisplayUnmountedVolumes
\REGISTRY\USER\S-*\Software\Piriform\Defraggler\DisplayEjectedVolumes
\REGISTRY\USER\S-*\Software\Piriform\Defraggler\UpdateCheck
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.MJB
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ComboLBox]
[Window,Class] = [,#32770]
[Window,Class] = [,msctls_updown32]
[Window,Class] = [View files...,Button]
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:获取系统权限
details:SE_LOAD_DRIVER_PRIVILEGE
SE_BACKUP_PRIVILEGE
SE_RESTORE_PRIVILEGE
Behavior description:窗口信息
details:Pid = 1396, Hwnd=0x103a2, Text = 确定, ClassName = Button.
Pid = 1396, Hwnd=0x103a6, Text = Server returned invalid string, ClassName = Static.
Pid = 1396, Hwnd=0x1039e, Text = Check for updates error, ClassName = #32770.
Pid = 1396, Hwnd=0x202cc, Text = Online Help, ClassName = Static.
Pid = 1396, Hwnd=0x202b2, Text = Check for updates..., ClassName = Static.
Pid = 1396, Hwnd=0x1036e, Text = This Month, ClassName = ComboBox.
Pid = 1396, Hwnd=0x10372, Text = Disk Stats , ClassName = Static.
Pid = 1396, Hwnd=0x10374, Text = Disk Performance , ClassName = Static.
Pid = 1396, Hwnd=0x10376, Text = Analyzed:, ClassName = Static.
Pid = 1396, Hwnd=0x10378, Text = Defrag Executions:, ClassName = Static.
Pid = 1396, Hwnd=0x1037a, Text = Files Defragged:, ClassName = Static.
Pid = 1396, Hwnd=0x1037c, Text = Fragments Reduced:, ClassName = Static.
Pid = 1396, Hwnd=0x1037e, Text = Longest Defrag Execution:, ClassName = Static.
Pid = 1396, Hwnd=0x10380, Text = Last Defrag Execution:, ClassName = Static.
Pid = 1396, Hwnd=0x10382, Text = 0, ClassName = Static.
Behavior description:使用SCSI指令读写硬盘
details:N/A
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号