VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:60
Behavior list
Basic Information
MD5:dc3d5f86edb833214c76d1462d04139b
file type:zip
Production company:
version:
Shell or compiler information:PACKER:UPolyX v0.5
Subfile information:⑨ Box.exedumpFile / f0e9df2715e8b6e5b7514c2f407b7dc5 / EXE
⑨ Box.exe / f0e9df2715e8b6e5b7514c2f407b7dc5 / EXE
Key behavior
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\IETldCache
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = , CmdLine = netsh advfirewall firewall add rule name="BOX_firewall_in" dir=in program="C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\⑨ Box.exe" action=allow
ImagePath = , CmdLine = netsh advfirewall firewall add rule name="BOX_firewall_out" dir=out program="C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\⑨ Box.exe" action=allow
ImagePath = , CmdLine = netsh advfirewall firewall add rule name="trayin" dir=in program="C:\Documents and Settings\Administrator\Application Data\EnGine\360Tray.exe" action=allow
ImagePath = , CmdLine = netsh advfirewall firewall add rule name="trayout" dir=out program="C:\Documents and Settings\Administrator\Application Data\EnGine\360Tray.exe" action=allow
Behavior description:创建进程
details:ImagePath = C:\WINDOWS\system32\netsh.exe, CmdLine = netsh advfirewall firewall add rule name="BOX_firewall_in" dir=in program="C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\⑨ Box.exe" action=allow
ImagePath = C:\WINDOWS\system32\netsh.exe, CmdLine = netsh advfirewall firewall add rule name="BOX_firewall_out" dir=out program="C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\⑨ Box.exe" action=allow
ImagePath = C:\WINDOWS\system32\netsh.exe, CmdLine = netsh advfirewall firewall add rule name="trayin" dir=in program="C:\Documents and Settings\Administrator\Application Data\EnGine\360Tray.exe" action=allow
ImagePath = C:\WINDOWS\system32\netsh.exe, CmdLine = netsh advfirewall firewall add rule name="trayout" dir=out program="C:\Documents and Settings\Administrator\Application Data\EnGine\360Tray.exe" action=allow
Behavior description:创建本地线程
details:TargetProcess: ⑨ Box.exe, InheritedFromPID = 1944, ProcessID = 1188, ThreadID = 2016, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: netsh.exe, InheritedFromPID = 1188, ProcessID = 2088, ThreadID = 2116, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: netsh.exe, InheritedFromPID = 1188, ProcessID = 2088, ThreadID = 2120, StartAddress = 77E56C7D, Parameter = 001B6FD8
TargetProcess: netsh.exe, InheritedFromPID = 1188, ProcessID = 2088, ThreadID = 2124, StartAddress = 769AE43B, Parameter = 001B8BC8
TargetProcess: netsh.exe, InheritedFromPID = 1188, ProcessID = 2088, ThreadID = 2128, StartAddress = 77E56C7D, Parameter = 001BE098
TargetProcess: netsh.exe, InheritedFromPID = 1188, ProcessID = 2200, ThreadID = 2208, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: netsh.exe, InheritedFromPID = 1188, ProcessID = 2200, ThreadID = 2232, StartAddress = 77E56C7D, Parameter = 001B6FD8
TargetProcess: netsh.exe, InheritedFromPID = 1188, ProcessID = 2200, ThreadID = 2236, StartAddress = 769AE43B, Parameter = 001B8BC8
TargetProcess: netsh.exe, InheritedFromPID = 1188, ProcessID = 2200, ThreadID = 2240, StartAddress = 77E56C7D, Parameter = 001BE098
TargetProcess: netsh.exe, InheritedFromPID = 1188, ProcessID = 2252, ThreadID = 2304, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: netsh.exe, InheritedFromPID = 1188, ProcessID = 2252, ThreadID = 2356, StartAddress = 77E56C7D, Parameter = 001B6F90
TargetProcess: netsh.exe, InheritedFromPID = 1188, ProcessID = 2252, ThreadID = 2360, StartAddress = 769AE43B, Parameter = 001B8B28
TargetProcess: netsh.exe, InheritedFromPID = 1188, ProcessID = 2252, ThreadID = 2368, StartAddress = 77E56C7D, Parameter = 001BE028
TargetProcess: netsh.exe, InheritedFromPID = 1188, ProcessID = 2252, ThreadID = 2372, StartAddress = 77E56C7D, Parameter = 001B3058
TargetProcess: netsh.exe, InheritedFromPID = 1188, ProcessID = 2404, ThreadID = 2432, StartAddress = 77DC845A, Parameter = 00000000
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:创建文件
details:C:\midishow.dll
C:\Pz.ini
C:\Documents and Settings\Administrator\桌面\无法上网紧急修复.bat
C:\Documents and Settings\Administrator\Application Data\EnGine\Pz.ini
Behavior description:创建可执行文件
details:C:\midishow.dll
Behavior description:查找文件
details:FileName = C:\midishow.dll
FileName = C:\Documents and Settings\Administrator\桌面\更新地址.html
FileName = C:\WINDOWS
FileName = C:\WINDOWS\system32
FileName = C:\WINDOWS\system32\netsh.exe
FileName = C:\Documents and Settings\Administrator\桌面\无法上网紧急修复.bat
FileName = C:\Documents and Settings\Administrator\Application Data\EnGine\Pz.ini
FileName = C:\Documents and Settings\Administrator\Application Data\EnGine\clx文件
FileName = C:\Documents and Settings\Administrator\Application Data\EnGine\BOX_NSF
FileName = C:\Documents and Settings\Administrator\Application Data\EnGine\BOX_NSF\*.*
Behavior description:修改BAT脚本文件
details:C:\Documents and Settings\Administrator\桌面\无法上网紧急修复.bat ---> Offset = 0
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
C:\Documents and Settings\Administrator\IETldCache
Behavior description:修改文件内容
details:C:\midishow.dll ---> Offset = 0
C:\Pz.ini ---> Offset = 0
C:\Documents and Settings\Administrator\Application Data\EnGine\Pz.ini ---> Offset = 0
Network behavior
Behavior description:打开指定IE网页
details:http://ww****cn/space_CirnoIX.html
Behavior description:建立到一个指定的套接字连接
details:URL: sq****om, IP: **.133.40.**:3306, SOCKET = 0x000005fc
URL: my****et, IP: **.133.40.**:3306, SOCKET = 0x000005fc
Behavior description:按名称获取主机地址
details:gethostbyname: sq****om
gethostbyname: my****et
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Multimedia\DrawDib\vga.drv 1920x973x16(565 0)
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\EnableFileTracing
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\EnableConsoleTracing
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\FileTracingMask
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\ConsoleTracingMask
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\MaxFileSize
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\FWCFG\FileDirectory
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\LogSessionName
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\Active
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\ControlFlags
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\Napmontr\Guid
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\NAP\Netsh\Napmontr\BitNames
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent\LogSessionName
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent\Active
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\qagent\ControlFlags
Other behavior
Behavior description:创建互斥体
details:RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.ADH
Local\c:!documents and settings!administrator!ietldcache!
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = Global\crypt32LogoffEvent
EventName = MSCTF.SendReceive.Event.ADH.IC
EventName = MSCTF.SendReceiveConection.Event.ADH.IC
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [OleMainThreadWndClass,]
NtUserFindWindowEx: [Class,Window] = [,speed.exe]
NtUserFindWindowEx: [Class,Window] = [,networktunnelx64helper.exe]
NtUserFindWindowEx: [Class,Window] = [,UpdateTime.exe]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000028
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000028
MSCTF.SendReceiveConection.Event.ELH.IC
MSCTF.SendReceive.Event.ELH.IC
Global\crypt32LogoffEvent
Global\SvcctrlStartEvent_A3752DX
MSFT.VSA.COM.DISABLE.2088
MSFT.VSA.IEC.STATUS.6c736db0
MSFT.VSA.COM.DISABLE.2200
MSFT.VSA.COM.DISABLE.2252
MSFT.VSA.COM.DISABLE.2404
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000029
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000029
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Behavior description:窗口信息
details:Pid = 1188, Hwnd=0xc030c, Text = 确定, ClassName = Button.
Pid = 1188, Hwnd=0x60348, Text = 软件是完全免费的!!如果通过付费获得说明已被坑!, ClassName = Static.
Pid = 1188, Hwnd=0x7033a, Text = 提示, ClassName = #32770.
Pid = 1188, Hwnd=0x203be, Text = 确定, ClassName = Button.
Pid = 1188, Hwnd=0x2040c, Text = 无法获取网络数据,请尝试重新打开软件。 如果仍无法获取,可能是防火墙或者安全软件拦截的问题。, ClassName = Static.
Pid = 1188, Hwnd=0xd033a, Text = 数据获取失败, ClassName = #32770.
Pid = 1188, Hwnd=0xb02b0, Text = 切换为注入器模式, ClassName = Button.
Pid = 1188, Hwnd=0x90320, Text = 手动选择, ClassName = Button.
Pid = 1188, Hwnd=0x80324, Text = 3, ClassName = Button(RadioButton).
Pid = 1188, Hwnd=0x90354, Text = 代理模式:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1188, Hwnd=0x6034a, Text = 1, ClassName = Button(RadioButton).
Pid = 1188, Hwnd=0x4036a, Text = 2, ClassName = Button(RadioButton).
Pid = 1188, Hwnd=0x4036c, Text = 如果需要使用别的DLL 请勾选上面的不使用,然后把DLL拖进本窗口! 如果感觉模式1有延迟,可尝试使用模式2或3!, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1188, Hwnd=0x29031a, Text = 不使用内置DLL, ClassName = Button(CheckBox).
Pid = 1188, Hwnd=0xa0300, Text = 有问题请点此进行修复, ClassName = Button(CheckBox).
Behavior description:可执行文件签名信息
details:C:\midishow.dll(签名验证: 未通过)
Behavior description:隐藏指定窗口
details:[Window,Class] = [,Afx:400000:b:10011:1900010:0]
[Window,Class] = [,Afx:400000:b:10011:0:0]
[Window,Class] = [,_EL_CommonDlg]
[Window,Class] = [,ComboLBox ]
[Window,Class] = [,CPPToolTip]
Behavior description:可执行文件MD5
details:C:\midishow.dll ---> 114054313070472cd1a6d7d28f7c5002
Behavior description:打开互斥体
details:RasPbFile
ShimCacheMutex
Local\!IETld!Mutex
Local\_!MSFTHISTORY!_
Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Local\c:!documents and settings!administrator!cookies!
Local\c:!documents and settings!administrator!local settings!history!history.ie5!
Local\c:!documents and settings!administrator!ietldcache!
Behavior description:加载新释放的文件
details:Image: C:\midishow.dll.
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号