VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:72
Behavior list
Basic Information
MD5:c4b8cfa9a80112614d00efdedd0a5eef
file type:EXE
Production company:
version:1.0.0.0---1.0.0.0
Shell or compiler information:COMPILER:Elan
Key behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-*
\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
MSCTF.MarshalInterface.FileMap.MAI..LMKFI
MSCTF.MarshalInterface.FileMap.MAI.B.LMKFI
MSCTF.MarshalInterface.FileMap.MAI.C.LMKFI
MSCTF.MarshalInterface.FileMap.MAI.D.LMKFI
MSCTF.MarshalInterface.FileMap.MAI.E.KNKFI
MSCTF.MarshalInterface.FileMap.MAI.F.KNKFI
MSCTF.MarshalInterface.FileMap.MAI.G.KNKFI
MSCTF.Shared.SFM.MAI
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:隐藏指定窗口
details:[Window,Class] = [,Afx:400000:8:10011:1900015:0]
[Window,Class] = [提示:,Ex_DirectUI]
[Window,Class] = [挖矿挂机-登录,WTWindow]
Behavior description:按名称获取主机地址
details:www.rjgx80.com
city.ip138.com
Process behavior
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-*
\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
MSCTF.MarshalInterface.FileMap.MAI..LMKFI
MSCTF.MarshalInterface.FileMap.MAI.B.LMKFI
MSCTF.MarshalInterface.FileMap.MAI.C.LMKFI
MSCTF.MarshalInterface.FileMap.MAI.D.LMKFI
MSCTF.MarshalInterface.FileMap.MAI.E.KNKFI
MSCTF.MarshalInterface.FileMap.MAI.F.KNKFI
MSCTF.MarshalInterface.FileMap.MAI.G.KNKFI
MSCTF.Shared.SFM.MAI
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:修改文件内容
details:C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT---> Offset = 0
Behavior description:查找文件
details:FileName = C:\Documents and Settings\Administrator\Local Settings\History\History.IE5\MSHist012015082520150826\*.*
Network behavior
Behavior description:发送一个已连接的套接字数据
details:SOCKET = 0x000005a8, TotalSize = 261, Offset = 0, ReadSize = 261.
SOCKET = 0x000004a8, TotalSize = 269, Offset = 0, ReadSize = 269.
Behavior description:连接指定站点
details:InternetConnectA: ServerName = www.ip138.com, PORT = 80
Behavior description:建立到一个指定的套接字连接
details:110.110.110.110:80
115.28.97.88:3306
Behavior description:读取网络文件
details:hFile = 0x000004c8, BytesToRead =1024, BytesRead = 1024.
Behavior description:打开HTTP请求
details:HttpOpenRequestA: www.ip138.com:80/, hConnect = 0x000004c4
Behavior description:按名称获取主机地址
details:www.rjgx80.com
city.ip138.com
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Multimedia\DrawDib\vga.drv 1920x973x16(565 0)
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.MAI
Behavior description:隐藏指定窗口
details:[Window,Class] = [,Afx:400000:8:10011:1900015:0]
[Window,Class] = [提示:,Ex_DirectUI]
[Window,Class] = [挖矿挂机-登录,WTWindow]
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:打开HTTP连接
details:Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
Behavior description:获取TickCount值
details:TickCount = 547453, SleepMilliseconds = 60000.
TickCount = 547468, SleepMilliseconds = 60000.
TickCount = 547484, SleepMilliseconds = 60000.
TickCount = 547500, SleepMilliseconds = 60000.
TickCount = 547515, SleepMilliseconds = 60000.
TickCount = 547531, SleepMilliseconds = 60000.
TickCount = 547546, SleepMilliseconds = 60000.
TickCount = 547578, SleepMilliseconds = 60000.
TickCount = 547593, SleepMilliseconds = 60000.
TickCount = 547640, SleepMilliseconds = 60000.
TickCount = 547796, SleepMilliseconds = 60000.
TickCount = 548093, SleepMilliseconds = 60000.
TickCount = 548125, SleepMilliseconds = 60000.
TickCount = 548140, SleepMilliseconds = 60000.
TickCount = 548171, SleepMilliseconds = 60000.
Behavior description:枚举窗口
details:N/A
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 60000.
[2]: MilliSeconds = 60000.
[3]: MilliSeconds = 60000.
[4]: MilliSeconds = 60000.
[5]: MilliSeconds = 60000.
[6]: MilliSeconds = 60000.
[7]: MilliSeconds = 60000.
[8]: MilliSeconds = 60000.
[9]: MilliSeconds = 60000.
[10]: MilliSeconds = 60000.
Behavior description:内联HOOK
details:C:\WINDOWS\system32\GDI32.dll--->ExtTextOutA Offset = 0x0
C:\WINDOWS\system32\GDI32.dll--->ExtTextOutW Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetWindowLongA Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->SetWindowLongA Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->SetWindowLongW Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetWindowLongW Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->BeginPaint Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->EndPaint Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetDC Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetWindowDC Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->ReleaseDC Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->WindowFromDC Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetScrollInfo Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetScrollPos Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetScrollRange Offset = 0x0
Behavior description:窗口信息
details:Pid = 1476, Hwnd=0x202c2, Text = 提示:, ClassName = Ex_DirectUI.
Pid = 1476, Hwnd=0x202b4, Text = 挖矿挂机-登录, ClassName = WTWindow.
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号