VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:83
Behavior list
Basic Information
MD5:17749351ea59307132c50e3562dbe61f
file type:EXE
Production company:
version:
Shell or compiler information:COMPILER:NSIS
Subfile information:pwsafe.exe / cd5a9f97bbf57c3648e1c4b746394ba8 / EXE
pwsafeDE.chm / ebaecb752fcc8449eef93dd6620c8626 / Chm
pwsafe.chm / 18dd56acd9f749db3945c80434ccd89c / Chm
pwsafeES.chm / 2cbfee66cf40903bb12b1954bf866777 / Chm
pwsafeRU.chm / 4ad630621971ee231988cf60f4e59f5b / Chm
pwsafeZH.chm / 6ab8b938e5bde6868d99c5b04a3f5748 / Chm
pwsafeIT.dll / 46ac1e25e8f6f9fc28c46a2fcc776a30 / DLL
pwsafeFR.dll / f2e25bacc08872f8f2cab3439e73cb8c / DLL
pwsafeDE.dll / 72ee1713bec69811ec04a148dba4a88f / DLL
pwsafeNL.dll / 1470b07268b82625a1af50729d9426d3 / DLL
pwsafeES.dll / 244fe0d9008bac401ce98f7c698fa85c / DLL
pwsafeHU.dll / 2697dd8912ac5083f49740dff26fd101 / DLL
pwsafeRU.dll / 8412fac55400449fb6423746eb825365 / DLL
pwsafeTR.dll / baf2766e7b363087bc9b7bf05591771d / DLL
pwsafePL.dll / 5bc94d3fda09e16e67bc62ce4fec85e9 / DLL
pwsafeDA.dll / a8db8da93bbe5ad0e574415b8946f483 / DLL
pwsafeSV.dll / 9c52760792b57e68d842fbb7479a008b / DLL
pwsafeCZ.dll / ee65f66fa35b75b98127d7ad27ed4515 / DLL
pwsafeKO.dll / 98c5ad2861abffd2a86d3fc595a10101 / DLL
Process behavior
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\nsv3.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\nsk4.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\nsk4.tmp\pws-install.ini
C:\Documents and Settings\Administrator\Local Settings\Temp\nsk4.tmp\System.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\nsk4.tmp\nsProcess.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\nsk4.tmp\LangDLL.dll
C:\WINDOWS\wininit.ini
Behavior description:删除文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\nsv3.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\nsk4.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\nsk4.tmp\LangDLL.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\nsk4.tmp\nsProcess.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\nsk4.tmp\pws-install.ini
C:\Documents and Settings\Administrator\Local Settings\Temp\nsk4.tmp\System.dll
Behavior description:创建可执行文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\nsk4.tmp\System.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\nsk4.tmp\nsProcess.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\nsk4.tmp\LangDLL.dll
Behavior description:修改文件内容
details:C:\Documents and Settings\Administrator\Local Settings\Temp\nsk4.tmp\pws-install.ini ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\nsk4.tmp\pws-install.ini ---> Offset = 59
C:\Documents and Settings\Administrator\Local Settings\Temp\nsk4.tmp\System.dll ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\nsk4.tmp\nsProcess.dll ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\nsk4.tmp\LangDLL.dll ---> Offset = 0
C:\WINDOWS\wininit.ini ---> Offset = 0
Behavior description:查找文件
details:FileName = C:\WINDOWS
FileName = C:\WINDOWS\system32
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsk4.tmp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsk4.tmp\*.*
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsk4.tmp\LangDLL.dll.AmBackup3
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsk4.tmp\nsProcess.dll.AmBackup2
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsk4.tmp\System.dll.AmBackup1
Registry behavior
Behavior description:修改注册表_延迟重命名项
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Session Manager\PendingFileRenameOperations
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
pwsInstallMutex
MSCTF.Shared.MUTEX.IOH
MSCTF.Shared.MUTEX.IEO
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ComboLBox]
[Window,Class] = [,Button]
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [#32770,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
_fCanRegisterWithShellService
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:窗口信息
details:Pid = 3652, Hwnd=0x10346, Text = Chinese (Simplified), ClassName = ComboBox.
Pid = 3652, Hwnd=0x1034a, Text = OK, ClassName = Button.
Pid = 3652, Hwnd=0x1034c, Text = Cancel, ClassName = Button.
Pid = 3652, Hwnd=0x1034e, Text = 请选择安装语言, ClassName = Static.
Pid = 3652, Hwnd=0x10342, Text = 安装语言, ClassName = #32770.
Pid = 3652, Hwnd=0x2034c, Text = и钡(&I), ClassName = Button.
Pid = 3652, Hwnd=0x2034a, Text = (&C), ClassName = Button.
Pid = 3652, Hwnd=0x60356, Text = PasswordSafe 3.43.0 (32-bit) Installer , ClassName = Static.
Pid = 3652, Hwnd=0x10358, Text = PasswordSafe 3.43.0 (32-bit) Installer, ClassName = Static.
Pid = 3652, Hwnd=0x1035c, Text = 甭舦某, ClassName = Static.
Pid = 3652, Hwnd=0x1035e, Text = 杆 Password Safe 3.43.0 (32-bit) ぇ玡叫浪綷甭舦兵蹿, ClassName = Static.
Pid = 3652, Hwnd=0x10368, Text = 浪綷某ㄤ緇场だ叫 [PgDn] ┕辈笆, ClassName = Static.
Pid = 3652, Hwnd=0x1036a, Text = This collective work is Copyright (c)2003-2017 by Rony Shapiro. Individual portions may be copyright by individual contributors, , ClassName = RichEdit20A.
Pid = 3652, Hwnd=0x1036c, Text = 狦钡某い兵蹿 [и種(I)] 膥尿杆狦匡 [(C)] 杆祘Α盢穦闽超ゲ斗璶钡某杆 Password Safe 3.43.0 (32-bit) , ClassName = Static.
Pid = 3652, Hwnd=0x20342, Text = Password Safe 3.43.0 (32-bit) 杆 , ClassName = #32770.
Behavior description:可执行文件签名信息
details:C:\Documents and Settings\Administrator\Local Settings\Temp\nsk4.tmp\System.dll(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\nsk4.tmp\nsProcess.dll(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\nsk4.tmp\LangDLL.dll(签名验证: 未通过)
Behavior description:创建事件对象
details:EventName = MSCTF.SendReceive.Event.IEO.IC
EventName = MSCTF.SendReceiveConection.Event.IEO.IC
Behavior description:可执行文件MD5
details:C:\Documents and Settings\Administrator\Local Settings\Temp\nsk4.tmp\System.dll ---> c17103ae9072a06da581dec998343fc1
C:\Documents and Settings\Administrator\Local Settings\Temp\nsk4.tmp\nsProcess.dll ---> 05450face243b3a7472407b999b03a72
C:\Documents and Settings\Administrator\Local Settings\Temp\nsk4.tmp\LangDLL.dll ---> 9384f4007c492d4fa040924f31c00166
Behavior description:打开互斥体
details:ShimCacheMutex
Behavior description:加载新释放的文件
details:Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsk4.tmp\System.dll.
Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsk4.tmp\nsProcess.dll.
Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsk4.tmp\LangDLL.dll.
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号