VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:60
Behavior list
Basic Information
MD5:8e0865f5e72e817da10e18eca45421c8
file type:DLL
Production company:
version:4.0.5.69---4,0,5,0069
Shell or compiler information:COMPILER:UPolyX v0.5
Key behavior
Behavior description:跨进程写入数据
details:TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x00050000, Size = 0x000005dc TargetPID = 0x00000dac
TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x7ffd31e8, Size = 0x00000004 TargetPID = 0x00000dac
TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x00060000, Size = 0x00000020 TargetPID = 0x00000dac
TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x00060020, Size = 0x00000034 TargetPID = 0x00000dac
TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x7ffd3238, Size = 0x00000004 TargetPID = 0x00000dac
Process behavior
Behavior description:创建进程
details:[0x00000dac]ImagePath = C:\Windows\System32\regsvr32.exe, CmdLine = Regsvr32.exe c:\users\administrator\appdata\local\%temp%\b70c.dll
Behavior description:跨进程写入数据
details:TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x00050000, Size = 0x000005dc TargetPID = 0x00000dac
TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x7ffd31e8, Size = 0x00000004 TargetPID = 0x00000dac
TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x00060000, Size = 0x00000020 TargetPID = 0x00000dac
TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x00060020, Size = 0x00000034 TargetPID = 0x00000dac
TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x7ffd3238, Size = 0x00000004 TargetPID = 0x00000dac
File behavior
Behavior description:创建文件
details:C:\Users\Administrator\AppData\Local\Temp\NEW260C.tmp
C:\Users\Administrator\AppData\Local\Temp\NEW260D.tmp
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db-journal
C:\Users\Administrator\AppData\Local\Temp\etilqs_jqzVKjzvjbQw5mE
C:\Users\Administrator\AppData\Local\Temp\etilqs_th7PoCjyoYaOsLD
C:\Users\Administrator\AppData\Local\Temp\NEW2747.tmp
C:\Users\Administrator\AppData\Local\Temp\NEW2754.tmp
C:\Users\Administrator\AppData\Local\Temp\NEW2755.tmp
C:\Users\Administrator\AppData\Local\Temp\etilqs_jQqcuZz6QEnB22D
C:\Users\Administrator\AppData\Local\Temp\etilqs_QCzmffLMaYJajf2
C:\Users\Administrator\AppData\Local\Temp\NEW2775.tmp
Behavior description:删除文件
details:C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db-journal
C:\Users\Administrator\AppData\Local\Temp\etilqs_jqzVKjzvjbQw5mE
C:\Users\Administrator\AppData\Local\Temp\etilqs_th7PoCjyoYaOsLD
C:\Users\Administrator\AppData\Local\Temp\etilqs_jQqcuZz6QEnB22D
C:\Users\Administrator\AppData\Local\Temp\etilqs_QCzmffLMaYJajf2
Behavior description:修改文件内容
details:C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db-journal ---> Offset = 0
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db ---> Offset = 0
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db ---> Offset = 1024
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db ---> Offset = 2048
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db ---> Offset = 3072
C:\Users\Administrator\AppData\Local\Temp\etilqs_jqzVKjzvjbQw5mE ---> Offset = 0
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db-journal ---> Offset = 512
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db-journal ---> Offset = 516
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db-journal ---> Offset = 1540
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db-journal ---> Offset = 1544
C:\Users\Administrator\AppData\Local\Temp\etilqs_th7PoCjyoYaOsLD ---> Offset = 0
C:\Users\Administrator\AppData\Local\Temp\etilqs_th7PoCjyoYaOsLD ---> Offset = 1024
C:\Users\Administrator\AppData\Local\Temp\etilqs_th7PoCjyoYaOsLD ---> Offset = 2048
C:\Users\Administrator\AppData\Local\Temp\etilqs_th7PoCjyoYaOsLD ---> Offset = 3072
C:\Users\Administrator\AppData\Local\Temp\etilqs_jQqcuZz6QEnB22D ---> Offset = 0
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.asf\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.wm\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.wma\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.wmv\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.avi\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.rm\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.rmvb\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.ra\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.ram\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.rp\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.rpm\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.rt\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.smil\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.dat\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.m1v\shellex\ContextMenuHandlers\pptvfilelink\
Other behavior
Behavior description:检测自身是否被调试
details:IsDebuggerPresent
Behavior description:创建互斥体
details:DBWinMutex
Behavior description:隐藏指定窗口
details:[Window,Class] = [,CtrlNotifySink]
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
SE_DEBUG_PRIVILEGE
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
Local\MSCTF.CtfActivated.Default1
Local\MSCTF.AsmCacheReady.Default1
Behavior description:打开互斥体
details:Local\MSCTF.Asm.MutexDefault1
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号