VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:23
Behavior list
Basic Information
MD5:6462c43fd2a2fbce1e14505ffe1c1eee
file type:EXE
Production company:
version:
Shell or compiler information:COMPILER:Elan
Process behavior
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1384, ThreadID = 444, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1384, ThreadID = 1012, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1384, ThreadID = 1408, StartAddress = 00410E87, Parameter = 00000001
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1384, ThreadID = 556, StartAddress = 00410E87, Parameter = 00000002
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1384, ThreadID = 1004, StartAddress = 00410E87, Parameter = 00000003
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1384, ThreadID = 1856, StartAddress = 00410E87, Parameter = 00000004
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1384, ThreadID = 744, StartAddress = 00410E87, Parameter = 00000005
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1384, ThreadID = 468, StartAddress = 00410E87, Parameter = 00000006
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1384, ThreadID = 124, StartAddress = 00410E87, Parameter = 00000007
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1384, ThreadID = 716, StartAddress = 00410E87, Parameter = 00000008
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1384, ThreadID = 1388, StartAddress = 00410E87, Parameter = 00000009
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1384, ThreadID = 1808, StartAddress = 00410E87, Parameter = 0000000A
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1384, ThreadID = 764, StartAddress = 00410E87, Parameter = 0000000B
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1384, ThreadID = 300, StartAddress = 00410E87, Parameter = 0000000C
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1384, ThreadID = 156, StartAddress = 00410E87, Parameter = 0000000D
Other behavior
Behavior description:创建互斥体
details:RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.MLH
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = MSCTF.SendReceive.Event.MLH.IC
EventName = MSCTF.SendReceiveConection.Event.MLH.IC
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000040
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000040
MSCTF.SendReceiveConection.Event.ELH.IC
MSCTF.SendReceive.Event.ELH.IC
Behavior description:窗口信息
details:Pid = 1384, Hwnd=0x1802f8, Text = 上线特征码, ClassName = Button(GroupBox).
Pid = 1384, Hwnd=0x4037e, Text = 生成, ClassName = Button.
Pid = 1384, Hwnd=0xd032c, Text = 服务描述:, ClassName = _EL_Label.
Pid = 1384, Hwnd=0xd033c, Text = 显示名称:, ClassName = _EL_Label.
Pid = 1384, Hwnd=0x20382, Text = 监测和监视新硬件设备并自动更新设备驱动。, ClassName = Edit.
Pid = 1384, Hwnd=0x2702f0, Text = Microsoft Device Manager, ClassName = Edit.
Pid = 1384, Hwnd=0xb035a, Text = 6to4.dll, ClassName = Edit.
Pid = 1384, Hwnd=0x120308, Text = %System32%, ClassName = ComboBox.
Pid = 1384, Hwnd=0x1002b0, Text = DLL 路径:, ClassName = _EL_Label.
Pid = 1384, Hwnd=0xf0322, Text = 开机启动, ClassName = Button(CheckBox).
Pid = 1384, Hwnd=0x110350, Text = 希网更新, ClassName = Button.
Pid = 1384, Hwnd=0x12030c, Text = 更新IP :, ClassName = _EL_Label.
Pid = 1384, Hwnd=0x1102f2, Text = 0.0.0.0, ClassName = Edit.
Pid = 1384, Hwnd=0x1102ca, Text = 密码 :, ClassName = _EL_Label.
Pid = 1384, Hwnd=0x203c2, Text = 用户名 :, ClassName = _EL_Label.
Behavior description:隐藏指定窗口
details:[Window,Class] = [<,AfxWnd42s]
[Window,Class] = [>,AfxWnd42s]
[Window,Class] = [,ComboLBox]
[Window,Class] = [选择主机:,Button]
[Window,Class] = [DDOS,Button]
[Window,Class] = [,_EL_Timer]
[Window,Class] = [系统配置,Button]
[Window,Class] = [上线特征码,Button]
[Window,Class] = [,_EL_CommonDlg]
Behavior description:打开互斥体
details:RasPbFile
ShimCacheMutex
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号