VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:28
Behavior list
Basic Information
MD5:5942256ae7c5c5afef806950c59c92fb
file type:EXE
Production company:1
version:1.0.0.0---1.0.0.0
Shell or compiler information:PACKER:UPX 0.89.6 - 1.02 / 1.05 - 1.24 -> Markus & Laszlo
Subfile information:upx_c_2404a724dumpFile / 7b9e54afdeb5276601e97645e4cc9491 / EXE
Process behavior
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2692, ThreadID = 2840, StartAddress = 00407ACB, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2692, ThreadID = 2880, StartAddress = 00407ACB, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2692, ThreadID = 2908, StartAddress = 00407ACB, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2692, ThreadID = 3100, StartAddress = 00407ACB, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2692, ThreadID = 3156, StartAddress = 00407ACB, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2692, ThreadID = 3208, StartAddress = 00407ACB, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2692, ThreadID = 3244, StartAddress = 00407ACB, Parameter = 00000000
Network behavior
Behavior description:连接指定站点
details:WinHttpConnect: ServerName = ss****om, PORT = 443, UserName = , Password = , hSession = 0x010c3100, hConnect = 0x010c3200, Flags = 0x00000000
WinHttpConnect: ServerName = ss****om, PORT = 443, UserName = , Password = , hSession = 0x010c3100, hConnect = 0x010c3400, Flags = 0x00000000
WinHttpConnect: ServerName = ss****om, PORT = 443, UserName = , Password = , hSession = 0x01193100, hConnect = 0x01193200, Flags = 0x00000000
WinHttpConnect: ServerName = ss****om, PORT = 443, UserName = , Password = , hSession = 0x01193100, hConnect = 0x01193400, Flags = 0x00000000
Behavior description:打开HTTP连接
details:WinHttpOpen: UserAgent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5), hSession = 0x010c3100
WinHttpOpen: UserAgent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5), hSession = 0x01193100
Behavior description:建立到一个指定的套接字连接
details:URL: ss****om, IP: **.133.40.**:443, SOCKET = 0x00000194
URL: ss****om, IP: **.133.40.**:443, SOCKET = 0x000001f0
URL: ss****om, IP: **.133.40.**:443, SOCKET = 0x00000138
URL: ss****om, IP: **.133.40.**:443, SOCKET = 0x000001ec
URL: ss****om, IP: **.133.40.**:443, SOCKET = 0x000001f4
URL: ss****om, IP: **.133.40.**:443, SOCKET = 0x0000018c
URL: ss****om, IP: **.133.40.**:443, SOCKET = 0x00000174
URL: ss****om, IP: **.133.40.**:443, SOCKET = 0x000001f8
URL: ss****om, IP: **.133.40.**:443, SOCKET = 0x000001e4
URL: ss****om, IP: **.133.40.**:443, SOCKET = 0x00000120
URL: ss****om, IP: **.133.40.**:443, SOCKET = 0x00000200
URL: ss****om, IP: **.133.40.**:443, SOCKET = 0x00000140
URL: ss****om, IP: **.133.40.**:443, SOCKET = 0x00000204
URL: ss****om, IP: **.133.40.**:443, SOCKET = 0x0000020c
URL: ss****om, IP: **.133.40.**:443, SOCKET = 0x00000208
Behavior description:打开HTTP请求
details:WinHttpOpenRequest: ss****om:443/check?regmaster=&pt_tea=1&pt_vcode=1&uin=&appid=21000501&js_ver=10144&js_type=1&login_sig=tjcy5d*snokkri9uimaug17ux-xxldbxfnzfb3tyray6v-f60bqmoyhwxjdn6ldg&u1=http%3a%2f%2fcodol.qq.com%2fcp%2fa20151208hlw%2f&r=0.45362566632899514, hConnect = 0x010c3200, hRequest = 0x01150000, Verb: GET, Referer: , Flags = 0x00800080
WinHttpOpenRequest: ss****om:443/cap_union_show?clientype=2&uin=&aid=21000501&cap_cd=&pt_style=20&0.623658519144463, hConnect = 0x010c3400, hRequest = 0x01150000, Verb: GET, Referer: , Flags = 0x00800080
WinHttpOpenRequest: ss****om:443/getimgbysig?clientype=2&uin=&aid=21000501&cap_cd=&pt_style=20&0.623658519144463&rand=0.24617938852576193&sig=, hConnect = 0x010c3200, hRequest = 0x01150000, Verb: GET, Referer: , Flags = 0x00800080
WinHttpOpenRequest: ss****om:443/check?regmaster=&pt_tea=1&pt_vcode=1&uin=123456&appid=21000501&js_ver=10144&js_type=1&login_sig=tjcy5d*snokkri9uimaug17ux-xxldbxfnzfb3tyray6v-f60bqmoyhwxjdn6ldg&u1=http%3a%2f%2fcodol.qq.com%2fcp%2fa20151208hlw%2f&r=0.45362566632899514, hConnect = 0x010c3200, hRequest = 0x01150000, Verb: GET, Referer: , Flags = 0x00800080
WinHttpOpenRequest: ss****om:443/cap_union_show?clientype=2&uin=123456&aid=21000501&cap_cd=&pt_style=20&0.623658519144463, hConnect = 0x010c3400, hRequest = 0x01150000, Verb: GET, Referer: , Flags = 0x00800080
WinHttpOpenRequest: ss****om:443/getimgbysig?clientype=2&uin=123456&aid=21000501&cap_cd=&pt_style=20&0.623658519144463&rand=0.24617938852576193&sig=, hConnect = 0x010c3200, hRequest = 0x01150000, Verb: GET, Referer: , Flags = 0x00800080
WinHttpOpenRequest: ss****om:443/check?regmaster=&pt_tea=1&pt_vcode=1&uin=123456&appid=21000501&js_ver=10144&js_type=1&login_sig=tjcy5d*snokkri9uimaug17ux-xxldbxfnzfb3tyray6v-f60bqmoyhwxjdn6ldg&u1=http%3a%2f%2fcodol.qq.com%2fcp%2fa20151208hlw%2f&r=0.45362566632899514, hConnect = 0x01193200, hRequest = 0x011d0000, Verb: GET, Referer: , Flags = 0x00800080
WinHttpOpenRequest: ss****om:443/cap_union_show?clientype=2&uin=123456&aid=21000501&cap_cd=&pt_style=20&0.623658519144463, hConnect = 0x01193400, hRequest = 0x011d0000, Verb: GET, Referer: , Flags = 0x00800080
WinHttpOpenRequest: ss****om:443/getimgbysig?clientype=2&uin=123456&aid=21000501&cap_cd=&pt_style=20&0.623658519144463&rand=0.24617938852576193&sig=, hConnect = 0x01193200, hRequest = 0x011d0000, Verb: GET, Referer: , Flags = 0x00800080
Behavior description:按名称获取主机地址
details:GetAddrInfoW: ss****om
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
MSCTF.Shared.MUTEX.IIK
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = Global\crypt32LogoffEvent
EventName = Global\userenv: User Profile setup event
EventName = MSCTF.SendReceive.Event.IIK.IC
EventName = MSCTF.SendReceiveConection.Event.IIK.IC
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007E8.00000000.0000000F
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.0000000F
MSCTF.SendReceive.Event.IOH.IC
MSCTF.SendReceiveConection.Event.IOH.IC
Global\crypt32LogoffEvent
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Behavior description:窗口信息
details:Pid = 2692, Hwnd=0x10362, Text = 账号信息[右键单击列表可保存信息], ClassName = Button(GroupBox).
Pid = 2692, Hwnd=0x1035a, Text = 游戏选择, ClassName = Button(GroupBox).
Pid = 2692, Hwnd=0x1036c, Text = 清空, ClassName = Button.
Pid = 2692, Hwnd=0x1036a, Text = 提示信息, ClassName = _EL_Label.
Pid = 2692, Hwnd=0x10360, Text = 扫描账号信息, ClassName = Button.
Pid = 2692, Hwnd=0x10346, Text = 登录, ClassName = Button(GroupBox).
Pid = 2692, Hwnd=0x10358, Text = 登录提示, ClassName = _EL_Label.
Pid = 2692, Hwnd=0x10356, Text = 验证码, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2692, Hwnd=0x10354, Text = 密码, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2692, Hwnd=0x10352, Text = QQ, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2692, Hwnd=0x1034c, Text = 登录, ClassName = Button.
Pid = 2692, Hwnd=0x10342, Text = 龙少技术网发布! , ClassName = WTWindow.
Pid = 2692, Hwnd=0x1035c, Text = 穿越火线, ClassName = ComboBox.
Pid = 2692, Hwnd=0x10350, Text = 免码, ClassName = Edit.
Pid = 2692, Hwnd=0x10348, Text = 123456, ClassName = Edit.
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ComboLBox]
Behavior description:打开互斥体
details:ShimCacheMutex
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号