VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:50
Behavior list
Basic Information
MD5:fcc81de1c31407262b53c98d18b0d7d8
file type:Rar
Production company:
version:
Shell or compiler information:COMPILER:Microsoft Visual C++ 6.0 [Overlay]
Subfile information:QQ暴力无限刷名片赞(无需小号).exedumpFile / a2f05eae508366c00fd33befbc9ab8d3 / EXE
使用前必看.txtdumpFile / 493136b03a7b4f61f4f7e6dccc9d475b / Unknown
QQ暴力无限刷名片赞(无需小号).exe / a2f05eae508366c00fd33befbc9ab8d3 / EXE
使用前必看.txt / 493136b03a7b4f61f4f7e6dccc9d475b / Unknown
Key behavior
Behavior description:设置特殊文件属性
details:C:\updata.exe
Behavior description:修改注册表_启动项
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Run\updata
Process behavior
Behavior description:创建进程
details:ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = C:\WINDOWS\system32\cmd.exe /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v updata /t REG_SZ /d C:\updata.exe /f
ImagePath = C:\WINDOWS\system32\reg.exe, CmdLine = reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v updata /t REG_SZ /d C:\updata.exe /f
Behavior description:创建新文件进程
details:ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\QQ暴力无限刷名片赞(无需小号).e, CmdLine = "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\QQ暴力无限刷名片赞(无需小号).e"
ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\System Forlll.exe, CmdLine = "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\System Forlll.exe"
Behavior description:创建本地线程
details:TargetProcess: System Forlll.exe, InheritedFromPID = 1996, ProcessID = 1004, ThreadID = 1140, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: System Forlll.exe, InheritedFromPID = 1996, ProcessID = 1004, ThreadID = 1172, StartAddress = 00417C96, Parameter = 00A13988
TargetProcess: System Forlll.exe, InheritedFromPID = 1996, ProcessID = 1004, ThreadID = 1276, StartAddress = 00417C96, Parameter = 00A13988
TargetProcess: System Forlll.exe, InheritedFromPID = 1996, ProcessID = 1004, ThreadID = 2136, StartAddress = 00417C96, Parameter = 00A13988
TargetProcess: System Forlll.exe, InheritedFromPID = 1996, ProcessID = 1004, ThreadID = 2184, StartAddress = 00417C96, Parameter = 00F60168
TargetProcess: System Forlll.exe, InheritedFromPID = 1996, ProcessID = 1004, ThreadID = 2276, StartAddress = 00417C96, Parameter = 00A13988
TargetProcess: System Forlll.exe, InheritedFromPID = 1996, ProcessID = 1004, ThreadID = 2316, StartAddress = 00417C96, Parameter = 00A13988
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\QQ暴力无限刷名片赞(无需小号).e
C:\Documents and Settings\Administrator\Local Settings\Temp\System Forlll.exe
Behavior description:创建可执行文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\QQ暴力无限刷名片赞(无需小号).e
C:\Documents and Settings\Administrator\Local Settings\Temp\System Forlll.exe
Behavior description:查找文件
details:FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\QQ暴力无限刷名片赞(无需小号).e
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\System Forlll.exe
FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
FileName = C:\WINDOWS
FileName = C:\WINDOWS\system32
FileName = C:\WINDOWS\system32\cmd.exe
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump
Behavior description:设置特殊文件属性
details:C:\updata.exe
Behavior description:重命名文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\System Forlll.exe ---> C:\updata.exe
Behavior description:修改文件内容
details:C:\Documents and Settings\Administrator\Local Settings\Temp\QQ暴力无限刷名片赞(无需小号).e ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\System Forlll.exe ---> Offset = 0
Network behavior
Behavior description:建立到一个指定的套接字连接
details:URL: , IP: **.193.233.**:6002, SOCKET = 0x000000e0
URL: , IP: **.193.233.**:6002, SOCKET = 0x0000013c
URL: , IP: **.193.233.**:6002, SOCKET = 0x00000150
Registry behavior
Behavior description:删除注册表键
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW\
Behavior description:删除注册表键值
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW\DWFileTreeRoot
Behavior description:修改注册表_启动项
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Run\updata
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.MPC
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = MSCTF.SendReceive.Event.MPC.IC
EventName = MSCTF.SendReceiveConection.Event.MPC.IC
EventName = Global\userenv: User Profile setup event
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [OleMainThreadWndClass,]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007B4.00000000.0000003F
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.0000003F
MSCTF.SendReceiveConection.Event.ELH.IC
MSCTF.SendReceive.Event.ELH.IC
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000040
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000040
Behavior description:窗口信息
details:Pid = 556, Hwnd=0xb032a, Text = 开始, ClassName = Button.
Pid = 556, Hwnd=0x1802fe, Text = QQ:, ClassName = _EL_Label.
Pid = 556, Hwnd=0xd035e, Text = QQ暴力无限刷名片赞(无需小号), ClassName = WTWindow.
Pid = 556, Hwnd=0x1002c8, Text = 123456, ClassName = Edit.
Pid = 588, Hwnd=0x1402f2, Text = 确定, ClassName = Button.
Pid = 588, Hwnd=0x10402, Text = 取消, ClassName = Button.
Pid = 588, Hwnd=0x10406, Text = "0x2001e07a" 指令引用的 "0x00a40000" 内存。该内存不能为 "read"。 要终止程序,请单击“确定”。 要调试程序,请单击“取消”。, ClassName = Static.
Pid = 588, Hwnd=0xa036e, Text = System Forlll.exe - 应用程序错误, ClassName = #32770.
Behavior description:可执行文件签名信息
details:C:\Documents and Settings\Administrator\Local Settings\Temp\QQ暴力无限刷名片赞(无需小号).e(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\System Forlll.exe(签名验证: 未通过)
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 1000.
[2]: MilliSeconds = 1000.
[3]: MilliSeconds = 1000.
[4]: MilliSeconds = 1000.
[5]: MilliSeconds = 1000.
[6]: MilliSeconds = 1000.
[7]: MilliSeconds = 1000.
[8]: MilliSeconds = 1000.
[9]: MilliSeconds = 1000.
[10]: MilliSeconds = 1000.
Behavior description:可执行文件MD5
details:C:\Documents and Settings\Administrator\Local Settings\Temp\QQ暴力无限刷名片赞(无需小号).e ---> aa69c67296ecca222352f06137bbc8d5
C:\Documents and Settings\Administrator\Local Settings\Temp\System Forlll.exe ---> 3e811e3083391d39b10579b09138bbf3
Behavior description:打开互斥体
details:ShimCacheMutex
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号