VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:
Behavior list
Basic Information
MD5:c43854ac91c9be8507d8ed646cd79927
Package names:com.o
Minimum operating environment:Android 2.2.x
copyright:Android
Key behavior
Behavior description:跨进程写入数据
details:TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00400000, Size = 0x00000400
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00404000, Size = 0x00000e00
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00405000, Size = 0x00000a00
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00406000, Size = 0x00000200
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00407000, Size = 0x00000200
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00408000, Size = 0x00000400
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00400000, Size = 0x00000400
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00404000, Size = 0x00000e00
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00405000, Size = 0x00000a00
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00406000, Size = 0x00000200
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00407000, Size = 0x00000200
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00408000, Size = 0x00000400
Behavior description:设置线程上下文
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe
C:\Documents and Settings\Administrator\WinHost32.exe
Behavior description:获取TickCount值
details:TickCount = 347215, SleepMilliseconds = 200.
TickCount = 357393, SleepMilliseconds = 50.
TickCount = 357471, SleepMilliseconds = 50.
TickCount = 357487, SleepMilliseconds = 50.
TickCount = 357503, SleepMilliseconds = 50.
TickCount = 357831, SleepMilliseconds = 50.
TickCount = 357878, SleepMilliseconds = 50.
TickCount = 357893, SleepMilliseconds = 50.
TickCount = 357925, SleepMilliseconds = 50.
TickCount = 357940, SleepMilliseconds = 50.
TickCount = 357956, SleepMilliseconds = 50.
TickCount = 357971, SleepMilliseconds = 50.
TickCount = 357987, SleepMilliseconds = 50.
TickCount = 358003, SleepMilliseconds = 50.
TickCount = 358034, SleepMilliseconds = 50.
Behavior description:跨进程写代码段数据
details:TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00401000, Size = 0x00002c00
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00401000, Size = 0x00002c00
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:修改注册表_启动项
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Run\WinHost32
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = /c del C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe >> NUL
Behavior description:创建进程
details:ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = /c del C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe >> NUL
Behavior description:创建本地线程
details:TargetProcess: WINWORD.EXE, InheritedFromPID = 2008, ProcessID = 1524, ThreadID = 1420, StartAddress = 02B41D6F, Parameter = 00000000
TargetProcess: WINWORD.EXE, InheritedFromPID = 2008, ProcessID = 1524, ThreadID = 1932, StartAddress = 65001FF8, Parameter = 00000000
TargetProcess: ge537.exe, InheritedFromPID = 1832, ProcessID = 2216, ThreadID = 2248, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: WINWORD.EXE, InheritedFromPID = 2008, ProcessID = 1524, ThreadID = 2356, StartAddress = 30D5CF6C, Parameter = 03C9E758
TargetProcess: WINWORD.EXE, InheritedFromPID = 2008, ProcessID = 1524, ThreadID = 2372, StartAddress = 30072FB7, Parameter = 30AEA990
TargetProcess: WINWORD.EXE, InheritedFromPID = 2008, ProcessID = 1524, ThreadID = 2476, StartAddress = 30072FB7, Parameter = 30AEA990
TargetProcess: WinHost32.exe, InheritedFromPID = 2516, ProcessID = 2568, ThreadID = 2576, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: WinHost32.exe, InheritedFromPID = 2516, ProcessID = 2568, ThreadID = 2604, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: WinHost32.exe, InheritedFromPID = 2516, ProcessID = 2568, ThreadID = 2608, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: WinHost32.exe, InheritedFromPID = 2516, ProcessID = 2568, ThreadID = 2612, StartAddress = 6302B849, Parameter = 001978B0
TargetProcess: WINWORD.EXE, InheritedFromPID = 2008, ProcessID = 1524, ThreadID = 2644, StartAddress = 30D72B9D, Parameter = 0B311FF0
Behavior description:跨进程写入数据
details:TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00400000, Size = 0x00000400
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00404000, Size = 0x00000e00
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00405000, Size = 0x00000a00
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00406000, Size = 0x00000200
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00407000, Size = 0x00000200
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00408000, Size = 0x00000400
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00400000, Size = 0x00000400
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00404000, Size = 0x00000e00
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00405000, Size = 0x00000a00
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00406000, Size = 0x00000200
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00407000, Size = 0x00000200
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00408000, Size = 0x00000400
Behavior description:设置线程上下文
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe
C:\Documents and Settings\Administrator\WinHost32.exe
Behavior description:枚举进程
details:N/A
Behavior description:跨进程写代码段数据
details:TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, WriteAddress = 0x00401000, Size = 0x00002c00
TargetProcess = C:\Documents and Settings\Administrator\WinHost32.exe, WriteAddress = 0x00401000, Size = 0x00002c00
Behavior description:创建新文件进程
details:ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, CmdLine = "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe"
ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe
ImagePath = C:\Documents and Settings\Administrator\WinHost32.exe, CmdLine = "C:\Documents and Settings\Administrator\WinHost32.exe"
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\~DFC2F1.tmp
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.doc
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.Word\~WRF0001.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFDA75.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\VBE\MSForms.exd
C:\Documents and Settings\Administrator\Application Data\Microsoft\Forms\WINWORD.box
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFE4B2.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFE4CC.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\ge537.exe
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\%temp%\****.doc.LNK
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\EB93A6.LNK
C:\Documents and Settings\Administrator\WinHost32.exe
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\wpad[1].dat
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\VB11.pip
Behavior description:创建可执行文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\ge537.exe
C:\Documents and Settings\Administrator\WinHost32.exe
Behavior description:覆盖已有文件
details:C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Word11.pip
Behavior description:复制文件
details:C:\DOCUME~1\ALLUSE~1\APPLIC~1\MICROS~1\OFFICE\DATA\OPA11.BAK ---> C:\DOCUME~1\ALLUSE~1\APPLIC~1\MICROS~1\OFFICE\DATA\opa11.dat
Behavior description:删除文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\~DFC2F1.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFDA75.tmp
C:\Documents and Settings\Administrator\Application Data\Microsoft\Forms\WINWORD.box
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFE4CC.tmp
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\wpad[1].dat
C:\Documents and Settings\Administrator\Local Settings\Temp\~DFE4B2.tmp
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.doc
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.Word\~WRS0000.tmp
C:\Documents and Settings\Administrator\Application Data\Microsoft\Templates\~$Normal.dot
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.Word\~WRF0001.tmp
Behavior description:查找文件
details:FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Application Data
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Templates
FileName = Normal
FileName = C:\Program Files\Microsoft Office 2007\Office12
FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\VBE
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\VBE\MSForms.exd
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ge537.exe
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:修改文件内容
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.doc ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.doc ---> Offset = 54
C:\Documents and Settings\Administrator\Local Settings\Temp\VBE\MSForms.exd ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\VBE\MSForms.exd ---> Offset = 4
C:\Documents and Settings\Administrator\Local Settings\Temp\VBE\MSForms.exd ---> Offset = 8
C:\Documents and Settings\Administrator\Local Settings\Temp\VBE\MSForms.exd ---> Offset = 12
C:\Documents and Settings\Administrator\Local Settings\Temp\VBE\MSForms.exd ---> Offset = 16
C:\Documents and Settings\Administrator\Local Settings\Temp\ge537.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\%temp%\****.doc.LNK ---> Offset = 0
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\index.dat ---> Offset = 55
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\EB93A6.LNK ---> Offset = 0
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\index.dat ---> Offset = 28
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\Recent\index.dat ---> Offset = 0
C:\Documents and Settings\Administrator\WinHost32.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Application Data\Microsoft\Office\VB11.pip ---> Offset = 0
Network behavior
Behavior description:联网打开网址
details:InternetOpenUrlA: http://**.133.40.**:128/wpad.dat, hInternet = 0x00cc0010, Flags = 0x00000010
Behavior description:连接指定站点
details:InternetConnectA: ServerName = go****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = **.133.40.**, PORT = 128, UserName = , Password = , hSession = 0x00cc0010, hConnect = 0x00cc0014, Flags = 0x00000010
Behavior description:打开HTTP连接
details:InternetOpenA: UserAgent: Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0, hSession = 0x00cc0004
InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0), hSession = 0x00cc0010
Behavior description:建立到一个指定的套接字连接
details:URL: wpad, IP: **.133.40.**:128, SOCKET = 0x000002ac
URL: go****om, IP: **.133.40.**:80, SOCKET = 0x000002b8
Behavior description:读取网络文件
details:hFile = 0x00cc0018, BytesToRead =4010, BytesRead = 4010.
hFile = 0x00cc000c, BytesToRead =256, BytesRead = 256.
Behavior description:发送HTTP包
details:GET /wpad.dat HTTP/1.1 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0) Host: **.133.40.**:128
GET / HTTP/1.1 Accept: */* Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0 Host: go****om Cache-Control: no-cache
Behavior description:打开HTTP请求
details:HttpOpenRequestA: **.133.40.**:128/wpad.dat, hConnect = 0x00cc0014, hRequest = 0x00cc0018, Verb: GET, Referer: , Flags = 0x00000010
Behavior description:按名称获取主机地址
details:GetAddrInfoW: computer
GetAddrInfoW: wpad
GetAddrInfoW: go****om
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4080110900063D11C8EF10054038389C\Usage\VBAFiles
\REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Common\ReviewCycle\ReviewToken
\REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\DocumentRecovery\4F6A2\4F6A2
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4080110900063D11C8EF10054038389C\Usage\WordEngWizDotFiles2
\REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{42D84CC3-5636-4BF9-8CB0-4DF7C22AD5C4}\2.0\
\REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{42D84CC3-5636-4BF9-8CB0-4DF7C22AD5C4}\2.0\FLAGS\
\REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{42D84CC3-5636-4BF9-8CB0-4DF7C22AD5C4}\2.0\0\win32\
\REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{42D84CC3-5636-4BF9-8CB0-4DF7C22AD5C4}\2.0\HELPDIR\
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4080110900063D11C8EF10054038389C\Usage\WORDHelpFiles
\REGISTRY\USER\S-*\Software\Microsoft\Office\Common\Assistant\CurrAsstState
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\4080110900063D11C8EF10054038389C\Usage\SpellingAndGrammarFiles_2052
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\WinHost32\DEBUG\Trace Level
\REGISTRY\USER\S-*\Software\Microsoft\VBA\6.0\Common\PropertiesWindow
\REGISTRY\USER\S-*\Software\Microsoft\VBA\6.0\Common\MainWindow
Behavior description:删除注册表键值
details:\REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\StartupItems\t
\REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\StartupItems\Es
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\MSSCIPY\Keyboard Mapping Version
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\MSSCIPY\Keyboard Mapping
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\WinHost32\DEBUG\Trace Level
\REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\DocumentRecovery\4F6A2\4F6A2
\REGISTRY\USER\S-*\Software\Microsoft\Office\Common\Assistant\CurrAsstState
\REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\MTTT
Behavior description:删除注册表键
details:\REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\StartupItems\
\REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\DocumentRecovery\4F6A2\
\REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\DocumentRecovery\
\REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\
Behavior description:修改注册表_启动项
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Run\WinHost32
Other behavior
Behavior description:创建互斥体
details:Global\MTX_MSO_Formal1_S-*
Global\MTX_MSO_AdHoc1_S-*
Local\Mso97SharedDg19521108172Mutex
LocalMutex2341MSPYhld23qwe2529
mscandui20.mutexDefault
GlobalUserFileMappingEudcMSPYhld23qwe_lock_SYNCROOT
_lock_SYNCROOT
GlobalUserFileMappingEudpMSPYhld23qwe_lock_SYNCROOT
PAdministratorLx.DAT!_SYNCROOT
CfgSyncMSPYqeuir9hj_SYNCROOT
PAdministratorSx.DAT!_SYNCROOT
MSCTF.Shared.MUTEX.APH
Local\Mso97SharedDg19531108172Mutex
Local\Mso97SharedDg19541108172Mutex
OfficeAssistantStateMutex
Behavior description:隐藏指定窗口
details:[Window,Class] = [,_WwB]
[Window,Class] = [,ComboLBox]
[Window,Class] = [lund,ThunderDFrame]
[Window,Class] = [,DesignerWindow]
[Window,Class] = [UserForm2,ThunderDFrame]
[Window,Class] = [,ThunderRT6Main]
[Window,Class] = [,Edit]
[Window,Class] = [,Button]
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [MSOBALLOON,]
NtUserFindWindowEx: [Class,Window] = [MsoHelp10,]
NtUserFindWindowEx: [Class,Window] = [AgentAnim,]
NtUserFindWindowEx: [Class,Window] = [MsoHelp11,]
Behavior description:窗口信息
details:Pid = 1524, Hwnd=0x130184, Text = MsoDockTop, ClassName = MsoCommandBarDock.
Pid = 1524, Hwnd=0x1201c8, Text = 格式, ClassName = MsoCommandBar.
Pid = 1524, Hwnd=0x120172, Text = 常用, ClassName = MsoCommandBar.
Pid = 1524, Hwnd=0x90260, Text = 菜单栏, ClassName = MsoCommandBar.
Pid = 1524, Hwnd=0xf01f0, Text = %temp%\****.doc, ClassName = _WwB.
Pid = 1524, Hwnd=0xe0216, Text = MSO Generic Control Container, ClassName = MsoCommandBar.
Pid = 1524, Hwnd=0x120160, Text = MSO Generic Control Container, ClassName = MsoCommandBar.
Pid = 1524, Hwnd=0xf01e6, Text = Microsoft Word 文档, ClassName = _WwG.
Pid = 1524, Hwnd=0x1001dc, Text = %temp%\****.doc - Microsoft Word, ClassName = OpusApp.
Pid = 1524, Hwnd=0x102f8, Text = 小四, ClassName = RichEdit20W.
Pid = 1524, Hwnd=0x102f6, Text = Times New Roman, ClassName = RichEdit20W.
Pid = 1524, Hwnd=0x102f4, Text = 正文, ClassName = RichEdit20W.
Pid = 1524, Hwnd=0x102f2, Text = 100%, ClassName = RichEdit20W.
Pid = 1524, Hwnd=0x202f0, Text = 键入需要帮助的问题, ClassName = RichEdit20W.
Behavior description:获取TickCount值
details:TickCount = 347215, SleepMilliseconds = 200.
TickCount = 357393, SleepMilliseconds = 50.
TickCount = 357471, SleepMilliseconds = 50.
TickCount = 357487, SleepMilliseconds = 50.
TickCount = 357503, SleepMilliseconds = 50.
TickCount = 357831, SleepMilliseconds = 50.
TickCount = 357878, SleepMilliseconds = 50.
TickCount = 357893, SleepMilliseconds = 50.
TickCount = 357925, SleepMilliseconds = 50.
TickCount = 357940, SleepMilliseconds = 50.
TickCount = 357956, SleepMilliseconds = 50.
TickCount = 357971, SleepMilliseconds = 50.
TickCount = 357987, SleepMilliseconds = 50.
TickCount = 358003, SleepMilliseconds = 50.
TickCount = 358034, SleepMilliseconds = 50.
Behavior description:打开事件
details:MSPY Non-PC softkbd
CTF.ThreadMIConnectionEvent.000007F0.00000000.0000001E
CTF.ThreadMarshalInterfaceEvent.000007F0.00000000.0000001E
CTF.ThreadMIConnectionEvent.000007F0.00000000.0000001F
CTF.ThreadMarshalInterfaceEvent.000007F0.00000000.0000001F
MSCTF.SendReceiveConection.Event.APH.IC
MSCTF.SendReceive.Event.APH.IC
HookSwitchHookEnabledEvent
AtlTraceModuleManager_ProcessAddedStatic3
CTF.ThreadMIConnectionEvent.000007F0.00000000.00000020
CTF.ThreadMarshalInterfaceEvent.000007F0.00000000.00000020
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Global\SvcctrlStartEvent_A3752DX
\INSTALLATION_SECURITY_HOLD
Global\crypt32LogoffEvent
Behavior description:枚举窗口
details:N/A
Behavior description:可执行文件签名信息
details:C:\Documents and Settings\Administrator\Local Settings\Temp\ge537.exe(签名验证: 未通过)
C:\Documents and Settings\Administrator\WinHost32.exe(签名验证: 未通过)
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 200.
[2]: MilliSeconds = 200.
[3]: MilliSeconds = 200.
[4]: MilliSeconds = 200.
[5]: MilliSeconds = 200.
[6]: MilliSeconds = 200.
[7]: MilliSeconds = 200.
[8]: MilliSeconds = 200.
[9]: MilliSeconds = 200.
[10]: MilliSeconds = 200.
[1]: MilliSeconds = 60000.
[2]: MilliSeconds = 60000.
[3]: MilliSeconds = 60000.
[4]: MilliSeconds = 60000.
[5]: MilliSeconds = 60000.
Behavior description:创建事件对象
details:EventName = MSPY Non-PC softkbd
EventName = Global\userenv: User Profile setup event
EventName = MSCTF.SendReceive.Event.ABF.IC
EventName = MSCTF.SendReceiveConection.Event.ABF.IC
EventName = DINPUTWINMM
EventName = Global\crypt32LogoffEvent
Behavior description:可执行文件MD5
details:C:\Documents and Settings\Administrator\Local Settings\Temp\ge537.exe ---> 19d360946bffa9b52662888f0524e3d5
C:\Documents and Settings\Administrator\WinHost32.exe ---> 19d360946bffa9b52662888f0524e3d5
Behavior description:打开互斥体
details:Global\MTX_MSO_Formal1_S-*
Global\MTX_MSO_AdHoc1_S-*
Local\Mso97SharedDg19521108172Mutex
Local\Mso97SharedDg19531108172Mutex
Local\Mso97SharedDg19541108172Mutex
OfficeAssistantStateMutex
ShimCacheMutex
Local\_!MSFTHISTORY!_
Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Local\c:!documents and settings!administrator!cookies!
Local\c:!documents and settings!administrator!local settings!history!history.ie5!
Local\WininetStartupMutex
Local\WininetConnectionMutex
Local\WininetProxyRegistryMutex
RasPbFile
Activities
Activity nameTypes of
com.e4a.runtime.android.StartActivityandroid.intent.action.MAIN
com.e4a.runtime.android.StartActivityandroid.intent.category.DEFAULT
com.e4a.runtime.android.StartActivityandroid.intent.category.LAUNCHER
com.e4a.runtime.android.mainActivityandroid.intent.action.MAIN
com.e4a.runtime.android.mainActivityandroid.intent.category.DEFAULT
Permission list
License nameinformation
com.android.launcher.permission.INSTALL_SHORTCUT创建快捷方式
android.permission.SET_WALLPAPER设置桌面壁纸
android.permission.GET_TASKS获取有关当前或最近运行的任务信息
android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
android.permission.ACCESS_WIFI_STATE读取wifi网络状态
android.permission.READ_PHONE_STATE读取电话状态
android.permission.DISABLE_KEYGUARD禁用键盘锁
android.permission.MOUNT_UNMOUNT_FILESYSTEMS挂载、反挂载外部文件系统
android.permission.SYSTEM_ALERT_WINDOW显示系统窗口
android.permission.WRITE_SETTINGS读写系统设置项
android.permission.INTERNET连接网络(2G或3G)
com.android.launcher.permission.READ_SETTINGS读取快捷方式信息
android.permission.WAKE_LOCK手机屏幕关闭后后台进程仍运行
android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
android.permission.CHANGE_CONFIGURATION修改当前设置(如:本地化)
Service list
name
com.o.后台服务操作
File List
file name Check code
songche/A/08c6efb1adbefb36620be3997bcfb791.jpg 0xaacf896
songche/A/0d564a77b02ad5f4865d47f456905d36.jpg 0xd455feea
songche/A/2a316148a73ee903393f6dfa00b8a32f.jpg 0xa6d4d3d2
songche/A/48e0ce7da7685f52f2371be084de5a90.jpg 0x7e881d8f
songche/A/48e3c9f79b5bc2ff083175e9bb7497f3.jpg 0xd043a5cd
songche/A/4da30d17469d7d8cd5baa4da772ec052.jpg 0xfad54426
songche/A/50b6507bf339edcf6336c52d2aa9ed14.jpg 0x56b07769
songche/A/639fda41268832a4040c9b4305f4eb6a.jpg 0x66b3696e
songche/A/6a7336d201937aa1d939efcb68fa538d.jpg 0x701f3c72
songche/A/ab796882c093ac51faa2e3283096036b.jpg 0x9278d92e
songche/A/ac8c0a857751a54d43c8159bb673e016.jpg 0xb4607206
songche/A/b6a38d70193b3b6429f89e87ab84d6fa.jpg 0x229cb4a8
songche/A/bc907c779187bfa2ea11f9525a2e875b.jpg 0x94de9180
songche/A/c68f46f0e70f6787203cce1344b2507e.jpg 0x6932601f
songche/AB/7ea18136a6b8f2ed2cd5da038a558db1.jpg 0x118d8ad8
songche/AB/9336e1a6ca44709fcc4e48315039ee29.jpg 0xc53b21c6
songche/AB/990e445cd5116e8ffffd26ca549611d4.jpg 0x7db9b70f
songche/AB/accfc7d8067ee280c9d297743ee77298.jpg 0xe083bdaf
songche/AB/aebfb26be0c57e804703f86fece96f8a.jpg 0x5a4fb4b6
songche/AB/c169fe13ce1b9f67ea8682debdb69789.jpg 0x4fdd992d
songche/AE/0162ae4fb503b1b17d69405c2c306c6b.jpg 0xb96853c2
songche/AE/0fdfdedc2017d9ee7430bd9367602dac.jpg 0x56a5e4ee
songche/AE/11983c5f3d7bf1db91768e36315575a0.jpg 0x89ef5a00
songche/AE/59500863c997475148a3621489240320.jpg 0xe30ecc79
songche/AE/5fb9d18464e3a14fbbbd32a718c66c2a.jpg 0xa45d363e
songche/AE/e163e73a3589bbc4f7337ba1aadb9184.jpg 0xc02987ff
songche/AE/e54d88754095ecb6972dadee89102105.jpg 0x99c4bf6d
songche/AI/0010473db963858cc4b6325a009e6d54.jpg 0x3abd9340
songche/AI/0dc1eb284c96e26cbbc829c3e9529a8b.jpg 0x59365c82
songche/AI/2539d83d1db637e590c9432337a7b8e3.jpg 0x359cdc25
songche/AI/311bf8e34cadcc41a5acd3d74a6a940c.jpg 0xa4288516
songche/AI/43f471982f1d380326ef6572f5e17b76.jpg 0xaff65785
songche/AI/ecdd509f3d994b52564a3880fab78c05.jpg 0x401bc068
songche/AJ/17719c65b08528e6cc94cda1396a8d13.jpg 0x106bfe90
songche/AJ/2d4e650695c198bbc3c5e81dfd6a87fa.jpg 0x647f4f1
songche/AJ/855058ce1fe0629a9e28321d1d9de32c.jpg 0x1510c6b6
songche/L/08f23ef33c08a620a8d194c11ef8c664.jpg 0xd79e9c69
songche/L/09e89d67d7e988afbe987f7bab6f506e.jpg 0x90611435
songche/L/0cf4322bd9cb539ce8be68eba099b74f.jpg 0xd15f47a3
songche/L/1904b0c484a39b1b151ad04a396f92a5.jpg 0x771323d6
songche/L/427bf380db6ec758617384bd8fc759c5.jpg 0x322790cf
songche/L/b4553aec6859dde13bc8f4309ac29e97.jpg 0x24fa5aeb
songche/L/cae966ccb2192b801a775185ed7aaf35.jpg 0xe1eeed42
songche/L/e05b26f0a1cfde7676a61df183f223d5.jpg 0x74280081
songche/M/10d69453b4aed0612bf8d7cccbccc5cf.jpg 0xd84818eb
songche/M/2c6e86df9f44b18389e1b2b16c5b99e2.jpg 0xc48195d
songche/M/522b9fdb2ec646a0b428b2c1b43977a2.jpg 0xe076b77c
songche/M/53ed1f09c18ba8cc5aaa9b1b32708880.jpg 0x4812e494
songche/M/5a27b9eac6aef464d3f5b10e25625174.jpg 0xf1af9608
songche/M/6510482f33cc84609134a36ab6aad870.jpg 0x71137925
songche/M/6af650038534e3324d3f68d9fafc1610.jpg 0x7ae1962f
songche/M/7a81a9609b0deb3aff94315bc44cd8b3.jpg 0x28f40a97
songche/M/7c765111651ce222a73b67f2bbe294a2.jpg 0x6f76fb06
songche/M/844bb00046f905ec033685b02db45ddb.jpg 0x7701a78e
songche/M/be4ee2964b924aba159e79397996bd44.jpg 0x2dff9e91
songche/M/c661f7fb990a3d32ed4a997451a6f0e3.jpg 0x7ff28c27
songche/M/c80c313962426ed75b1773371d93b28b.jpg 0x41907b34
songche/M/d6ff39bf8123fe766b9349165926212c.jpg 0xcb2d613e
songche/M/e7b5847e2cb54adcb43b119f1a339fd5.jpg 0x7a0ed91c
songche/M/f1cc2dd00aee35e13de5b834abefac13.jpg 0x4b1b5ae5
songche/New Folder 1neuk/02.jpg 0xe321182b
songche/New Folder 1neuk/03.jpg 0xe487ee35
songche/New Folder 1neuk/05.jpg 0x50ee8957
songche/New Folder 1neuk/06.jpg 0x5cba1fe8
res/drawable/icon.png 0x9788388b
assets/6M5UBF2J9ZI70.jpg 0x9a0e02e3
classes.dex 0xcc8991a5
AndroidManifest.xml 0xbe41de2f
assets/0.mp3 0x1ff1d27b
assets/0.wma 0x2458f853
resources.arsc 0x59374d2d
META-INF/MANIFEST.MF 0x18ef6f0a
META-INF/CERT.SF 0x9adfa46d
META-INF/CERT.RSA 0xd17dac7f
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号