VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

File information
Safety rating:71
Behavior list
Basic Information
MD5:5962891edd8b0e6075cdbd1462bed332
file type:EXE
Production company:
version:1.0.0.0---1.0.0.0
Shell or compiler information:COMPILER:Elan
Key behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-*
\WINDOWS\system32\zh-cn\wshom.ocx.mui
MSCTF.MarshalInterface.FileMap.MFF..DNJGH
MSCTF.MarshalInterface.FileMap.MFF.B.DNJGH
MSCTF.MarshalInterface.FileMap.MFF.C.DNJGH
MSCTF.MarshalInterface.FileMap.MFF.D.DNJGH
MSCTF.MarshalInterface.FileMap.MFF.E.DNJGH
MSCTF.MarshalInterface.FileMap.MFF.F.DNJGH
MSCTF.MarshalInterface.FileMap.MFF.G.DOJGH
MSCTF.Shared.SFM.MFF
Behavior description:在桌面创建快捷方式
details:C:\Documents and Settings\Administrator\桌面\财富空间.lnk
Behavior description:隐藏指定窗口
details:[Window,Class] = [,Afx:400000:8:10011:1900015:0]
[Window,Class] = [,Edit]
[Window,Class] = [您的注册码是:,Afx:400000:b:10011:1900015:0]
Process behavior
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-*
\WINDOWS\system32\zh-cn\wshom.ocx.mui
MSCTF.MarshalInterface.FileMap.MFF..DNJGH
MSCTF.MarshalInterface.FileMap.MFF.B.DNJGH
MSCTF.MarshalInterface.FileMap.MFF.C.DNJGH
MSCTF.MarshalInterface.FileMap.MFF.D.DNJGH
MSCTF.MarshalInterface.FileMap.MFF.E.DNJGH
MSCTF.MarshalInterface.FileMap.MFF.F.DNJGH
MSCTF.MarshalInterface.FileMap.MFF.G.DOJGH
MSCTF.Shared.SFM.MFF
Behavior description:在桌面创建快捷方式
details:C:\Documents and Settings\Administrator\桌面\财富空间.lnk
Behavior description:修改文件内容
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\ini.dat---> Offset = 0
C:\Documents and Settings\Administrator\桌面\财富空间.lnk---> Offset = 0
Behavior description:查找文件
details:FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\ini.dat
FileName = C:\Documents and Settings\Administrator\桌面\财富空间.lnk
FileName = C:\DOCUME~1
FileName = C:\Documents and Settings\ADMINI~1
FileName = C:\Documents and Settings\Administrator\LOCALS~1
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\财富空间.exe
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\财富空间.exe\*.*
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\桌面
FileName = C:\Documents and Settings\Administrator\「开始」菜单
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\「开始」菜单
Other behavior
Behavior description:创建互斥体
details:RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.MFF
Behavior description:隐藏指定窗口
details:[Window,Class] = [,Afx:400000:8:10011:1900015:0]
[Window,Class] = [,Edit]
[Window,Class] = [您的注册码是:,Afx:400000:b:10011:1900015:0]
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [OleMainThreadWndClass,]
NtUserFindWindowEx: [Class,Window] = [,PTFrome.dll]
Behavior description:获取系统权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:窗口信息
details:Pid = 416, Hwnd=0x302da, Text = 您的注册码是:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 416, Hwnd=0x202c6, Text = 1112833141, ClassName = Edit.
Pid = 416, Hwnd=0x202ca, Text = 记住密码, ClassName = Button(CheckBox).
Pid = 416, Hwnd=0x202c8, Text = 记住账号, ClassName = Button(CheckBox).
Pid = 416, Hwnd=0x202c4, Text = 欢迎使用, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 416, Hwnd=0x202c2, Text = 财富空间高端机构看盘软件, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 416, Hwnd=0x302bc, Text = 密码:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 416, Hwnd=0x302ba, Text = 0D61F8370C, ClassName = Edit.
Pid = 416, Hwnd=0x202b2, Text = 账号:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 416, Hwnd=0x202b4, Text = 登陆, ClassName = Button.
Pid = 416, Hwnd=0x202cc, Text = 1, ClassName = Edit.
Pid = 416, Hwnd=0x202a8, Text = 账号验证, ClassName = WTWindow.
Pid = 416, Hwnd=0x202c4, Text = 请输入账号, ClassName = Afx:400000:b:10011:1900015:0.
Behavior description:直接操作物理设备
details:\??\PhysicalDrive0
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号