VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:60
Behavior list
Basic Information
MD5:f2575041782f7bdd980d0e6a5186f014
file type:EXE
Production company:
version:
Shell or compiler information:
Key behavior
Behavior description:隐藏指定窗口
details:[Window,Class] = [ ,Edit]
[Window,Class] = [,Afx:400000:8:10011:1900015:0]
File behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-1-5-21-1482476501-1645522239-1417001333-500
MSCTF.MarshalInterface.FileMap.MNJ..PMJFF
MSCTF.MarshalInterface.FileMap.MNJ.B.PNJFF
MSCTF.MarshalInterface.FileMap.MNJ.C.PNJFF
MSCTF.MarshalInterface.FileMap.MNJ.D.PNJFF
MSCTF.MarshalInterface.FileMap.MNJ.E.PNJFF
MSCTF.MarshalInterface.FileMap.MNJ.F.PNJFF
MSCTF.MarshalInterface.FileMap.MNJ.G.PNJFF
\WINDOWS\system32\zh-cn\ieframe.dll.mui
MSCTF.Shared.SFM.MNJ
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Multimedia\DrawDib\vga.drv 1920x973x16(565 0)
Other behavior
Behavior description:创建互斥体
details:RasPbFile
CTF.LBES.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Compart.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Asm.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Layouts.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TMD.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TimListCache.FMPDefaultS-1-5-21-1482476501-1645522239-1417001333-500MUTEX.DefaultS-1-5-21-1482476501-1645522239-1417001333-500
MSCTF.Shared.MUTEX.AEH
MSCTF.Shared.MUTEX.MNJ
Behavior description:内联HOOK
details:C:\WINDOWS\system32\GDI32.dll--->ExtTextOutA Offset = 0x0
C:\WINDOWS\system32\GDI32.dll--->ExtTextOutW Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetWindowLongA Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->SetWindowLongA Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->SetWindowLongW Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetWindowLongW Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->BeginPaint Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->EndPaint Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetDC Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetWindowDC Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->ReleaseDC Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->WindowFromDC Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetScrollInfo Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetScrollPos Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetScrollRange Offset = 0x0
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [,Microsoft Internet Explorer]
NtUserFindWindowEx: [Class,Window] = [,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:窗口信息
details:Pid = 2520, Hwnd=0x103ae, Text = 确定, ClassName = Button.
Pid = 2520, Hwnd=0x103b0, Text = 使用前请先关闭杀毒软件,并把软件解压到桌面上,否则无法生成木马!, ClassName = Static.
Pid = 2520, Hwnd=0x103ac, Text = 杰哥唯一QQ1546605717, ClassName = #32770.
Pid = 2520, Hwnd=0x103a2, Text = 联系杰哥, ClassName = Button.
Pid = 2520, Hwnd=0x103a0, Text = 其他版本, ClassName = Button.
Pid = 2520, Hwnd=0x1039e, Text = 恢复默认, ClassName = Button.
Pid = 2520, Hwnd=0x1039c, Text = 生成木马, ClassName = Button.
Pid = 2520, Hwnd=0x1039a, Text = 测试收信, ClassName = Button.
Pid = 2520, Hwnd=0x10382, Text = 收信方式选择(非传统邮箱收信), ClassName = Button(GroupBox).
Pid = 2520, Hwnd=0x103aa, Text = 1546605717@qq.com, ClassName = Edit.
Pid = 2520, Hwnd=0x103a8, Text = 邮箱账号(支持任意邮箱):, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2520, Hwnd=0x103a6, Text = 邮箱收信, ClassName = Button(RadioButton).
Pid = 2520, Hwnd=0x10398, Text = http://qq1546605717.tk/test.php, ClassName = Edit.
Pid = 2520, Hwnd=0x10396, Text = http://qq1546605717.tk/mail.asp, ClassName = Edit.
Pid = 2520, Hwnd=0x10394, Text = PHP地址:, ClassName = Afx:400000:b:10011:1900015:0.
Behavior description:打开指定IE网页
details:http://1546605717.qzone.qq.com
http://user.qzone.qq.com/2360891806/blog/1410798038
Behavior description:隐藏指定窗口
details:[Window,Class] = [ ,Edit]
[Window,Class] = [,Afx:400000:8:10011:1900015:0]
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号