VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:88
Behavior list
Basic Information
MD5:cb218a8bbf64d8b21a3f3f7a65447e47
file type:EXE
Production company:
version:
Shell or compiler information:COMPILER:UPolyX v0.5
Subfile information:WinRAR.exe / 4c29efc4f5a9f4d11567c4fa57d9ca06 / EXE
setup2.exe / 8f34f3a01e4eed72b0273c4c9e99b212 / EXE
Rar.exe / c7e858e4a51ba7d26af9235064988274 / EXE
WinRAR.chm / b445d3a7d8bad9d1a6a1fc7f6888c19d / Chm
UnRAR.exe / c5d2225eb5a0dc51560c8da674389100 / EXE
7zxa.dll / 7a2262c83329256d7bef84746f0b8ca0 / DLL
RarExt.dll / 60fe004235a8108446dcfc1e526fde0e / DLL
Default.SFX / a179ab69bc5d988f18634bed7225e6f4 / EXE
Uninstall.exe / 0f0c069b8ae00a5146cc14bbcf244852 / EXE
7z.fmt / d38467ec186d519d7f844d003b826f20 / DLL
WinCon.SFX / d27e328bcfa0d2e644fde477d0453634 / EXE
UNACEV2.DLL / de02c4d04088b69e64ecc30a3d9e22e5 / DLL
bz2.fmt / f89ed69935275fff1628b38920fc15e9 / DLL
iso.fmt / 60b34a0c5879ddc45ead326ed414d00f / DLL
Zip.SFX / a17877a53e58c94090c8bbcc42aef318 / EXE
gz.fmt / eadd9cef1c9aa0a14301d83508b49490 / DLL
z.fmt / 89a60936f695f4b62dd26c900db57e7c / DLL
lzh.fmt / ef2c5584fce7f7d7d7d48eb23a3d97cd / DLL
ace.fmt / e1befe60ff21fe20a37143a893760dcd / DLL
Key behavior
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:直接获取CPU时钟
details:EAX = 0xc6d4f845, EDX = 0x000000b7
Behavior description:获取TickCount值
details:TickCount = 220956, SleepMilliseconds = 50.
TickCount = 221065, SleepMilliseconds = 50.
TickCount = 221081, SleepMilliseconds = 50.
TickCount = 221096, SleepMilliseconds = 50.
TickCount = 221112, SleepMilliseconds = 50.
TickCount = 221143, SleepMilliseconds = 50.
TickCount = 221159, SleepMilliseconds = 50.
TickCount = 221190, SleepMilliseconds = 50.
TickCount = 221206, SleepMilliseconds = 50.
TickCount = 221221, SleepMilliseconds = 50.
TickCount = 221237, SleepMilliseconds = 50.
TickCount = 221253, SleepMilliseconds = 50.
TickCount = 221268, SleepMilliseconds = 50.
TickCount = 221284, SleepMilliseconds = 50.
TickCount = 221300, SleepMilliseconds = 50.
Process behavior
Behavior description:创建进程
details:[0x00000ff0]ImagePath = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe, CmdLine = "C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe" -el -s2 "-d" "-p" "-sp"
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3816, ThreadID = 3828, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3816, ThreadID = 3884, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3816, ThreadID = 3888, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3816, ThreadID = 3940, StartAddress = 6359727B, Parameter = 001AF808
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3816, ThreadID = 4036, StartAddress = 76BDD451, Parameter = 028E2AA0
File behavior
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:查找文件
details:FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\My Documents
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\Documents
FileName = C:\Documents and Settings\Administrator\桌面
FileName = C:\Documents and Settings\All Users\桌面
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\SystemCertificates\My\Certificates\*
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\SystemCertificates\My\CRLs\*
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\SystemCertificates\My\CTLs\*
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\996E\DEBUG\Trace Level
Behavior description:删除注册表键值
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\996E\DEBUG\Trace Level
Other behavior
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
SE_ASSIGNPRIMARYTOKEN_PRIVILEGE
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
Local\!PrivacIE!SharedMemory!Mutex
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
RasPbFile
MSCTF.Shared.MUTEX.IOH
MSCTF.Shared.MUTEX.MOO
_SHuassist.mtx
Behavior description:创建事件对象
details:EventName = Global\crypt32LogoffEvent
EventName = DINPUTWINMM
EventName = Global\userenv: User Profile setup event
EventName = Global\Microsoft Smart Card Resource Manager Started
EventName = MSCTF.SendReceive.Event.MOO.IC
EventName = MSCTF.SendReceiveConection.Event.MOO.IC
Behavior description:打开互斥体
details:ShimCacheMutex
Local\!IETld!Mutex
RasPbFile
CtfmonInstMutexDefaultS-*
Local\_!MSFTHISTORY!_
Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Local\c:!documents and settings!administrator!cookies!
Local\c:!documents and settings!administrator!local settings!history!history.ie5!
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [EDIT,]
NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Global\crypt32LogoffEvent
CTF.ThreadMIConnectionEvent.000007E8.00000000.0000000F
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.0000000F
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
_fCanRegisterWithShellService
\INSTALLATION_SECURITY_HOLD
Global\SvcctrlStartEvent_A3752DX
Global\Microsoft Smart Card Resource Manager Started
Behavior description:获取TickCount值
details:TickCount = 220956, SleepMilliseconds = 50.
TickCount = 221065, SleepMilliseconds = 50.
TickCount = 221081, SleepMilliseconds = 50.
TickCount = 221096, SleepMilliseconds = 50.
TickCount = 221112, SleepMilliseconds = 50.
TickCount = 221143, SleepMilliseconds = 50.
TickCount = 221159, SleepMilliseconds = 50.
TickCount = 221190, SleepMilliseconds = 50.
TickCount = 221206, SleepMilliseconds = 50.
TickCount = 221221, SleepMilliseconds = 50.
TickCount = 221237, SleepMilliseconds = 50.
TickCount = 221253, SleepMilliseconds = 50.
TickCount = 221268, SleepMilliseconds = 50.
TickCount = 221284, SleepMilliseconds = 50.
TickCount = 221300, SleepMilliseconds = 50.
Behavior description:获取光标位置
details:CursorPos = (80,18468), SleepMilliseconds = 50.
CursorPos = (6373,26501), SleepMilliseconds = 50.
CursorPos = (19208,15725), SleepMilliseconds = 50.
CursorPos = (11517,29359), SleepMilliseconds = 50.
CursorPos = (27001,24465), SleepMilliseconds = 50.
CursorPos = (5744,28146), SleepMilliseconds = 50.
CursorPos = (23320,16828), SleepMilliseconds = 50.
CursorPos = (10000,492), SleepMilliseconds = 50.
CursorPos = (3034,11943), SleepMilliseconds = 50.
CursorPos = (4866,5437), SleepMilliseconds = 50.
CursorPos = (32430,14605), SleepMilliseconds = 50.
CursorPos = (3941,154), SleepMilliseconds = 50.
CursorPos = (331,12383), SleepMilliseconds = 50.
CursorPos = (17460,18717), SleepMilliseconds = 50.
CursorPos = (19757,19896), SleepMilliseconds = 50.
Behavior description:窗口信息
details:Pid = 3816, Hwnd=0x10340, Text = TITLE_BMP, ClassName = Static.
Pid = 3816, Hwnd=0x10342, Text = 版权所有 (C) 1993-2007, ClassName = Static.
Pid = 3816, Hwnd=0x10344, Text = Alexander Roshal, ClassName = Static.
Pid = 3816, Hwnd=0x10348, Text = 目标文件夹(&D), ClassName = Static.
Pid = 3816, Hwnd=0x1034a, Text = C:\Program Files\WinRAR, ClassName = ComboBox.
Pid = 3816, Hwnd=0x1034e, Text = C:\Program Files\WinRAR, ClassName = Edit.
Pid = 3816, Hwnd=0x10350, Text = 浏览(&W)..., ClassName = Button.
Pid = 3816, Hwnd=0x10356, Text = 安装, ClassName = Button.
Pid = 3816, Hwnd=0x10358, Text = 取消, ClassName = Button.
Pid = 3816, Hwnd=0x1033c, Text = WinRAR 3.71 简体中文版, ClassName = #32770.
Pid = 3816, Hwnd=0x70372, Text = 您想使用哪个用户帐户运行这个程序?, ClassName = Static.
Pid = 3816, Hwnd=0xa036a, Text = 当前用户(&C) (COMPUTER\Administrator), ClassName = Button(RadioButton).
Pid = 3816, Hwnd=0x70376, Text = 保护我的计算机和数据不受未授权程序的活动影响(&P) 这个选项可以保护您的计算机或个人数据不受病毒损害,但是选择这项可能会引起程序工作不正确。, ClassName = Button(CheckBox).
Pid = 3816, Hwnd=0x60374, Text = 下列用户(&F):, ClassName = Button(RadioButton).
Pid = 3816, Hwnd=0x90384, Text = 用户名(&U):, ClassName = Static.
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 50.
[2]: MilliSeconds = 50.
[3]: MilliSeconds = 500.
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ComboLBox]
[Window,Class] = [,RICHEDIT]
[Window,Class] = [,Shell Embedding]
[Window,Class] = [,Auto-Suggest Dropdown]
[Window,Class] = [,Internet Explorer_Server]
Behavior description:直接获取CPU时钟
details:EAX = 0xc6d4f845, EDX = 0x000000b7
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号