VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:41
Behavior list
Basic Information
MD5:daa7d70970c8d54f5cbeeaacbc5f351a
file type:Rar
Production company:
version:
Shell or compiler information:COMPILER:Elan
Subfile information:武侠.exedumpFile / 94ae44f572f82c042587a83d2256746c / EXE
武侠.exe / 94ae44f572f82c042587a83d2256746c / EXE
socks.inidumpFile / 3fbc197cd5614b821cc5a2b08fa56609 / Unknown
socks.ini / 3fbc197cd5614b821cc5a2b08fa56609 / Unknown
zdcomte.datdumpFile / 8a97a58608673cb9d49e60c942feeec5 / Unknown
zdcomte.dat / 8a97a58608673cb9d49e60c942feeec5 / Unknown
最新_武侠L2通道配套工具dumpFile / d41d8cd98f00b204e9800998ecf8427e / Unknown
Process behavior
Behavior description:创建本地线程
details:TargetProcess: 武侠.exe, InheritedFromPID = 1944, ProcessID = 896, ThreadID = 1836, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: 武侠.exe, InheritedFromPID = 1944, ProcessID = 896, ThreadID = 1856, StartAddress = 004094A1, Parameter = 00000000
TargetProcess: 武侠.exe, InheritedFromPID = 1944, ProcessID = 896, ThreadID = 1872, StartAddress = 00F40000, Parameter = 00000000
TargetProcess: 武侠.exe, InheritedFromPID = 1944, ProcessID = 896, ThreadID = 744, StartAddress = 00F30000, Parameter = 00000000
TargetProcess: 武侠.exe, InheritedFromPID = 1944, ProcessID = 896, ThreadID = 2044, StartAddress = 00F30000, Parameter = 00000000
TargetProcess: 武侠.exe, InheritedFromPID = 1944, ProcessID = 896, ThreadID = 468, StartAddress = 00F30000, Parameter = 00000000
TargetProcess: 武侠.exe, InheritedFromPID = 1944, ProcessID = 896, ThreadID = 124, StartAddress = 00F30000, Parameter = 00000000
TargetProcess: 武侠.exe, InheritedFromPID = 1944, ProcessID = 896, ThreadID = 1136, StartAddress = 00F30000, Parameter = 00000000
TargetProcess: 武侠.exe, InheritedFromPID = 1944, ProcessID = 896, ThreadID = 160, StartAddress = 00F30000, Parameter = 00000000
TargetProcess: 武侠.exe, InheritedFromPID = 1944, ProcessID = 896, ThreadID = 1172, StartAddress = 00F30000, Parameter = 00000000
TargetProcess: 武侠.exe, InheritedFromPID = 1944, ProcessID = 896, ThreadID = 280, StartAddress = 00F30000, Parameter = 00000000
TargetProcess: 武侠.exe, InheritedFromPID = 1944, ProcessID = 896, ThreadID = 1628, StartAddress = 00F30000, Parameter = 00000000
TargetProcess: 武侠.exe, InheritedFromPID = 1944, ProcessID = 896, ThreadID = 716, StartAddress = 00F30000, Parameter = 00000000
TargetProcess: 武侠.exe, InheritedFromPID = 1944, ProcessID = 896, ThreadID = 1252, StartAddress = 00F30000, Parameter = 00000000
TargetProcess: 武侠.exe, InheritedFromPID = 1944, ProcessID = 896, ThreadID = 408, StartAddress = 00F30000, Parameter = 00000000
File behavior
Behavior description:创建文件
details:C:\WINDOWS\TGear.dll
Behavior description:创建可执行文件
details:C:\WINDOWS\TGear.dll
Behavior description:修改文件内容
details:C:\WINDOWS\TGear.dll ---> Offset = 0
Behavior description:查找文件
details:FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\最新_武侠L2通道配套工具\zdcomte.dat
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\最新_武侠L2通道配套工具\TGear.dll
Network behavior
Behavior description:建立到一个指定的套接字连接
details:URL: , IP: **.253.96.**:7709, SOCKET = 0x00000618
URL: , IP: **.51.55.**:80, SOCKET = 0x000005f0
URL: , IP: **.253.96.**:7709, SOCKET = 0x00000610
URL: , IP: **.175.238.**:7707, SOCKET = 0x00000614
URL: , IP: **.135.142.**:443, SOCKET = 0x000005f8
URL: , IP: **.97.185.**:7709, SOCKET = 0x0000060c
URL: , IP: **.105.142.**:7709, SOCKET = 0x000005e0
URL: , IP: **.147.86.**:443, SOCKET = 0x00000604
URL: , IP: **.196.174.**:7709, SOCKET = 0x000005f4
URL: , IP: **.129.245.**:80, SOCKET = 0x00000608
URL: , IP: **.105.142.**:7709, SOCKET = 0x000005e8
URL: , IP: **.152.168.**:7715, SOCKET = 0x000005fc
URL: , IP: **.152.107.**:7707, SOCKET = 0x000005e4
URL: , IP: **.105.73.**:7721, SOCKET = 0x0000061c
URL: , IP: **.196.175.**:7709, SOCKET = 0x000005ec
Other behavior
Behavior description:创建互斥体
details:RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.ABG
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = MSCTF.SendReceive.Event.ABG.IC
EventName = MSCTF.SendReceiveConection.Event.ABG.IC
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000041
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000041
MSCTF.SendReceiveConection.Event.ELH.IC
MSCTF.SendReceive.Event.ELH.IC
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000042
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000042
Behavior description:窗口信息
details:Pid = 896, Hwnd=0x10034c, Text = 是否验证代理, ClassName = Button(CheckBox).
Pid = 896, Hwnd=0x1302c4, Text = 是否建立通道, ClassName = Button(CheckBox).
Pid = 896, Hwnd=0xc03a0, Text = 开始工作, ClassName = Button.
Pid = 896, Hwnd=0x40392, Text = 站点信息, ClassName = Button(GroupBox).
Pid = 896, Hwnd=0x703ba, Text = 登录信息, ClassName = Button(GroupBox).
Pid = 896, Hwnd=0x7037c, Text = 督, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 896, Hwnd=0x1902fe, Text = 任, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 896, Hwnd=0x503b0, Text = 主站:0, ClassName = msctls_statusbar32.
Pid = 896, Hwnd=0x7038e, Text = 确定, ClassName = Button.
Pid = 896, Hwnd=0xe02aa, Text = 运行时出错! 错误代码:1 错误信息:数组成员引用下标超出定义范围 , ClassName = Static.
Pid = 896, Hwnd=0xc0398, Text = 错误, ClassName = #32770.
Pid = 896, Hwnd=0xc03a0, Text = 停止工作, ClassName = Button.
Pid = 896, Hwnd=0x603ac, Text = 123456, ClassName = Edit.
Pid = 896, Hwnd=0x503b0, Text = 主站:0, ClassName = msctls_statusbar32.
Behavior description:可执行文件签名信息
details:C:\WINDOWS\TGear.dll(签名验证: 未通过)
Behavior description:隐藏指定窗口
details:[Window,Class] = [,Afx:400000:8:10011:1900015:0]
Behavior description:可执行文件MD5
details:C:\WINDOWS\TGear.dll ---> a04c95d11572f9330b95e60b62720332
Behavior description:打开互斥体
details:RasPbFile
ShimCacheMutex
Behavior description:加载新释放的文件
details:Image: C:\WINDOWS\TGear.dll.
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号