VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:75
Behavior list
Basic Information
MD5:a2a17ec7417bad9ea589223e024c393c
file type:Rar
Production company:
version:
Shell or compiler information:
Subfile information:Boilsoft Video Splitter_7.02.2.exe / big file / EXE
当客软件园.url / f0875b9a0a22c48d5310a1a878b2a02b / Unknown
Key behavior
Behavior description:屏蔽窗口关闭消息
details:hWnd = 0x00170142, Text = Boilsoft Video Splitter 7.02.2, ClassName = #32770.
Process behavior
Behavior description:创建本地线程
details:N/A
Behavior description:进程退出
details:N/A
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:创建文件
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb4.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb5.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb6.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb7.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb8.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb9.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbA.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbB.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbC.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbD.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbE.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbF.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb10.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb11.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb12.tmp
Behavior description:覆盖已有文件
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb4.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb5.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb6.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb7.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb8.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb9.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbA.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbB.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbC.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbD.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbE.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbF.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb10.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb11.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb12.tmp
Behavior description:创建可执行文件
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb4.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb5.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb6.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb7.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb8.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb9.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbA.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbB.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbC.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbD.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbE.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbF.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb10.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb11.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb12.tmp
Behavior description:查找文件
details:FileName = c:\docume~1
FileName = c:\Documents and Settings\admini~1
FileName = c:\Documents and Settings\Administrator\locals~1
FileName = c:\Documents and Settings\Administrator\Local Settings\temp
FileName = c:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = c:\Documents and Settings\Administrator\Local Settings\%temp%\1453277725.276058.exe_7zdump
FileName = c:\Documents and Settings\Administrator\Local Settings\%temp%\1453277725.279797.exe_7zdump\boilsoftvideosplitterportable
FileName = c:\Documents and Settings\Administrator\Local Settings\%temp%\1453277725.283470.exe_7zdump\BoilsoftVideoSplitterPortable\boilsoft video splitter_7.02.2.exe
FileName = c:\documents and settings
FileName = c:\Documents and Settings\administrator
FileName = c:\Documents and Settings\Administrator\local settings
FileName = c:\DOCUME~1\administrator
FileName = c:\DOCUME~1\ADMINI~1\local settings
FileName = c:\DOCUME~1\ADMINI~1\LOCALS~1\temp
FileName = c:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%
Other behavior
Behavior description:创建互斥体
details:oleacc-msaa-loaded
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.MPB
Behavior description:创建事件对象
details:EventName = EVB_EC19264D36ADF786_000000B4
EventName = DINPUTWINMM
EventName = MSCTF.SendReceive.Event.MPB.IC
EventName = MSCTF.SendReceiveConection.Event.MPB.IC
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:屏蔽窗口关闭消息
details:hWnd = 0x00170142, Text = Boilsoft Video Splitter 7.02.2, ClassName = #32770.
Behavior description:窗口信息
details:Pid = 180, Hwnd=0x802a8, Text = 打开, ClassName = Button.
Pid = 180, Hwnd=0x302a6, Text = 2, ClassName = Edit.
Pid = 180, Hwnd=0x302a4, Text = Spin1, ClassName = msctls_updown32.
Pid = 180, Hwnd=0x401f2, Text = 00:00:00.000, ClassName = Edit.
Pid = 180, Hwnd=0x302d6, Text = Spin1, ClassName = msctls_updown32.
Pid = 180, Hwnd=0x402ba, Text = 00:00:00.000, ClassName = Edit.
Pid = 180, Hwnd=0x302d4, Text = Spin1, ClassName = msctls_updown32.
Pid = 180, Hwnd=0x302b4, Text = 分割选择, ClassName = Button(RadioButton).
Pid = 180, Hwnd=0x302b2, Text = 分割为, ClassName = Button(RadioButton).
Pid = 180, Hwnd=0x202ca, Text = 关于, ClassName = Button.
Pid = 180, Hwnd=0x302b8, Text = Slider1, ClassName = msctls_trackbar32.
Pid = 180, Hwnd=0x202b0, Text = 00:00:00 / 00:00:00, ClassName = Static.
Pid = 180, Hwnd=0x202ae, Text = 开始时间:, ClassName = Static.
Pid = 180, Hwnd=0x202aa, Text = 结束时间:, ClassName = Static.
Pid = 180, Hwnd=0x402be, Text = HH:MM:SS.sss, ClassName = Static.
Behavior description:可执行文件签名信息
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb4.tmp(签名验证: 未通过)
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb5.tmp(签名验证: 未通过)
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb6.tmp(签名验证: 未通过)
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb7.tmp(签名验证: 未通过)
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb8.tmp(签名验证: 未通过)
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb9.tmp(签名验证: 未通过)
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbA.tmp(签名验证: 未通过)
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbB.tmp(签名验证: 未通过)
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbC.tmp(签名验证: 未通过)
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbD.tmp(签名验证: 未通过)
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbE.tmp(签名验证: 未通过)
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbF.tmp(签名验证: 未通过)
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb10.tmp(签名验证: 未通过)
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb11.tmp(签名验证: 未通过)
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb12.tmp(签名验证: 未通过)
Behavior description:隐藏指定窗口
details:[Window,Class] = [,Static]
[Window,Class] = [,tooltips_class32]
[Window,Class] = [,Button]
Behavior description:可执行文件MD5
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb4.tmp ---> fcbe3548c136420a1a926e079a205850
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb5.tmp ---> 261a8ec75c336021ca4d82d186af705b
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb6.tmp ---> 2afd4ee38dd3e640db7562c928375ee3
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb7.tmp ---> 01f7ef80b4dca4862327c2ab6d4d949d
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb8.tmp ---> a10ed57202fc112ef4b4b727e90a1d65
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb9.tmp ---> 0d4c91849e21a72b082ebd3790e11dea
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbA.tmp ---> 9a6734b4ec9915161feea42e24370934
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbB.tmp ---> e30724b9234fd81711ca79db296f3e1b
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbC.tmp ---> 2eb3ce4e44e4c8ffe81c59fc6f46824b
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbD.tmp ---> 389ef5ff10fd2735ff37fc9db6f1e083
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbE.tmp ---> a52e054785d7561224ee0b747d917a44
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbF.tmp ---> a9b2e0c5a1f0d0170753f249ecc8f8be
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb10.tmp ---> 3b6d537f000c0ab29c83c2c602e21e03
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb11.tmp ---> 04c1fc7cd341e93fe3104164e2c07b6e
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb12.tmp ---> abcbac8b4fd08c79b812aab9ca609a21
Behavior description:加载新释放的文件
details:Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb4.tmp.
Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb5.tmp.
Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb6.tmp.
Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb7.tmp.
Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb8.tmp.
Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb9.tmp.
Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbA.tmp.
Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbB.tmp.
Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbC.tmp.
Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbD.tmp.
Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbE.tmp.
Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evbF.tmp.
Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb10.tmp.
Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb11.tmp.
Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\evb12.tmp.
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号