VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:25
Behavior list
Basic Information
MD5:e034d81c7bc0e4ed3adb9cd6768e45ab
file type:EXE
Production company:
version:
Shell or compiler information:COMPILER:Elan
Key behavior
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:获取TickCount值
details:TickCount = 5354065, SleepMilliseconds = 50.
TickCount = 5354143, SleepMilliseconds = 50.
TickCount = 5354159, SleepMilliseconds = 50.
TickCount = 5354175, SleepMilliseconds = 50.
TickCount = 5354487, SleepMilliseconds = 50.
TickCount = 5354534, SleepMilliseconds = 50.
TickCount = 5354565, SleepMilliseconds = 50.
TickCount = 5354581, SleepMilliseconds = 50.
TickCount = 5354596, SleepMilliseconds = 50.
TickCount = 5354628, SleepMilliseconds = 50.
TickCount = 5354643, SleepMilliseconds = 50.
TickCount = 5354675, SleepMilliseconds = 50.
TickCount = 5354690, SleepMilliseconds = 50.
TickCount = 5354721, SleepMilliseconds = 50.
TickCount = 5354737, SleepMilliseconds = 50.
Process behavior
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 392, ThreadID = 1396, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 392, ThreadID = 792, StartAddress = 00416093, Parameter = 00000001
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 392, ThreadID = 164, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 392, ThreadID = 1996, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 392, ThreadID = 1360, StartAddress = 6302B849, Parameter = 00227A60
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 392, ThreadID = 2308, StartAddress = 0040BE40, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 392, ThreadID = 2312, StartAddress = 0040C1BA, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 392, ThreadID = 2316, StartAddress = 0040D805, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 392, ThreadID = 2320, StartAddress = 0040BE34, Parameter = 00000001
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 392, ThreadID = 2328, StartAddress = 0040D7F9, Parameter = 00000001
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 392, ThreadID = 2340, StartAddress = 0040D7F9, Parameter = 00000001
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 392, ThreadID = 2352, StartAddress = 0040D7F9, Parameter = 00000001
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 392, ThreadID = 2356, StartAddress = 0040D7F9, Parameter = 00000001
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 392, ThreadID = 2360, StartAddress = 0040D7F9, Parameter = 00000001
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 392, ThreadID = 2364, StartAddress = 0040D7F9, Parameter = 00000001
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6P4O8QNJ\wpad[1].dat
C:\WINDOWS\system32\biaotixiugai
C:\WINDOWS\system32\biaotixiugai2
Behavior description:修改文件内容
details:C:\WINDOWS\system32\biaotixiugai ---> Offset = 0
C:\WINDOWS\system32\biaotixiugai2 ---> Offset = 0
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:删除文件
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6P4O8QNJ\wpad[1].dat
Behavior description:查找文件
details:FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\WINDOWS\system32\Ras\*.pbk
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
Network behavior
Behavior description:联网打开网址
details:InternetOpenUrlA: http://**.133.40.**:128/wpad.dat, hInternet = 0x00cc0018, Flags = 0x00000010
Behavior description:连接指定站点
details:InternetConnectA: ServerName = ww****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = ww****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc000c, Flags = 0x00000000
InternetConnectA: ServerName = **.133.40.**, PORT = 128, UserName = , Password = , hSession = 0x00cc0018, hConnect = 0x00cc001c, Flags = 0x00000010
Behavior description:打开HTTP连接
details:InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0), hSession = 0x00cc0004
InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0), hSession = 0x00cc0018
Behavior description:建立到一个指定的套接字连接
details:URL: wpad, IP: **.133.40.**:128, SOCKET = 0x00000440
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000434
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000438
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000648
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x000004c8
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x000004d8
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000444
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x000004e4
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000428
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000650
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x000004e0
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000430
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000424
Behavior description:读取网络文件
details:hFile = 0x00cc0020, BytesToRead =4010, BytesRead = 4010.
hFile = 0x00cc0010, BytesToRead =102400, BytesRead = 102400.
hFile = 0x00cc0014, BytesToRead =102400, BytesRead = 102400.
hFile = 0x00cc000c, BytesToRead =102400, BytesRead = 102400.
Behavior description:发送HTTP包
details:GET /wpad.dat HTTP/1.1 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0) Host: **.133.40.**:128
GET /users/get.asp?f_user=123456&f_code=123456&f_jiqima=3A83BD51870DA9A964B53F97F25526D5C99BE59E69E9838F1C&f_biaoming=biaotixiugai&sui1=7286&sui2=7691&sui3=8501&sui4=9285&sui5=1015 HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Accept: */* Host: ww****om Cache-Control: no-cache
GET /users/code.asp HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Accept: */* Host: ww****om Cache-Control: no-cache
GET /users/get.asp?f_user=123456&f_code=123456123456&f_jiqima=3A83BD51870DA9A964B53F97F25526D5C99BE59E69E9838F1C&f_biaoming=biaotixiugai&sui1=3062&sui2=3869&sui3=4646&sui4=5413&sui5=6063 HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Accept: */* Host: ww****om Cache-Control: no-cache
GET /users/get.asp?f_user=123456&f_code=123456123456123456&f_jiqima=3A83BD51870DA9A964B53F97F25526D5C99BE59E69E9838F1C&f_biaoming=biaotixiugai&sui1=2018&sui2=3171&sui3=3804&sui4=4235&sui5=5097 HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Accept: */* Host: ww****om Cache-Control: no-cache
GET /users/get.asp?f_user=123456&f_code=123456123456123456123456&f_jiqima=3A83BD51870DA9A964B53F97F25526D5C99BE59E69E9838F1C&f_biaoming=biaotixiugai&sui1=9178&sui2=9825&sui3=1229&sui4=2039&sui5=2822 HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Accept: */* Host: ww****om Cache-Control: no-cache
GET /users/get.asp?f_user=123456&f_code=123456123456123456123456123456&f_jiqima=3A83BD51870DA9A964B53F97F25526D5C99BE59E69E9838F1C&f_biaoming=biaotixiugai&sui1=7635&sui2=8128&sui3=9062&sui4=1093&sui5=1484 HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Accept: */* Host: ww****om Cache-Control: no-cache
GET /users/get.asp?f_user=123456&f_code=123456123456123456123456123456123456&f_jiqima=3A83BD51870DA9A964B53F97F25526D5C99BE59E69E9838F1C&f_biaoming=biaotixiugai&sui1=3472&sui2=4377&sui3=5350&sui4=6460&sui5=7009 HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Accept: */* Host: ww****om Cache-Control: no-cache
GET /users/get.asp?f_user=123456&f_code=123456123456123456123456123456123456123456&f_jiqima=3A83BD51870DA9A964B53F97F25526D5C99BE59E69E9838F1C&f_biaoming=biaotixiugai&sui1=3391&sui2=3986&sui3=5122&sui4=5723&sui5=6089 HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Accept: */* Host: ww****om Cache-Control: no-cache
GET /users/updateget.asp?gengxin=biaotixiugai12&sui1=9267&sui2=5719&sui3=2430&sui4=7861&sui5=9809 HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Accept: */* Host: ww****om Cache-Control: no-cache
GET /users/updateget.asp?gengxin=biaotixiugai12&sui1=4576&sui2=3337&sui3=6624&sui4=5662&sui5=3542 HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Accept: */* Host: ww****om Cache-Control: no-cache
GET /users/updateget.asp?gengxin=biaotixiugai12&sui1=6841&sui2=6044&sui3=9391&sui4=2145&sui5=4791 HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Accept: */* Host: ww****om Cache-Control: no-cache
GET /users/updateget.asp?gengxin=biaotixiugai12&sui1=8497&sui2=1232&sui3=4556&sui4=6784&sui5=9402 HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Accept: */* Host: ww****om Cache-Control: no-cache
GET /users/updateget.asp?gengxin=biaotixiugai12&sui1=9982&sui2=9325&sui3=6290&sui4=2078&sui5=7709 HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Accept: */* Host: ww****om Cache-Control: no-cache
GET /users/updateget.asp?gengxin=biaotixiugai12&sui1=2333&sui2=2717&sui3=5490&sui4=2818&sui5=9101 HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Accept: */* Host: ww****om Cache-Control: no-cache
Behavior description:打开HTTP请求
details:HttpOpenRequestA: ww****om:80/users/get.asp?f_user=123456&f_code=123456&f_jiqima=3a83bd51870da9a964b53f97f25526d5c99be59e69e9838f1c&f_biaoming=biaotixiugai&sui1=7286&sui2=7691&sui3=8501&sui4=9285&sui5=1015, hConnect = 0x00cc0008, hRequest = 0x00cc0010, Verb: GET, Referer: , Flags = 0x84000000
HttpOpenRequestA: ww****om:80/users/code.asp, hConnect = 0x00cc000c, hRequest = 0x00cc0014, Verb: GET, Referer: , Flags = 0x84000000
HttpOpenRequestA: **.133.40.**:128/wpad.dat, hConnect = 0x00cc001c, hRequest = 0x00cc0020, Verb: GET, Referer: , Flags = 0x00000010
HttpOpenRequestA: ww****om:80/users/get.asp?f_user=123456&f_code=123456123456&f_jiqima=3a83bd51870da9a964b53f97f25526d5c99be59e69e9838f1c&f_biaoming=biaotixiugai&sui1=3062&sui2=3869&sui3=4646&sui4=5413&sui5=6063, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x84000000
HttpOpenRequestA: ww****om:80/users/get.asp?f_user=123456&f_code=123456123456123456&f_jiqima=3a83bd51870da9a964b53f97f25526d5c99be59e69e9838f1c&f_biaoming=biaotixiugai&sui1=2018&sui2=3171&sui3=3804&sui4=4235&sui5=5097, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x84000000
HttpOpenRequestA: ww****om:80/users/get.asp?f_user=123456&f_code=123456123456123456123456&f_jiqima=3a83bd51870da9a964b53f97f25526d5c99be59e69e9838f1c&f_biaoming=biaotixiugai&sui1=9178&sui2=9825&sui3=1229&sui4=2039&sui5=2822, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x84000000
HttpOpenRequestA: ww****om:80/users/get.asp?f_user=123456&f_code=123456123456123456123456123456&f_jiqima=3a83bd51870da9a964b53f97f25526d5c99be59e69e9838f1c&f_biaoming=biaotixiugai&sui1=7635&sui2=8128&sui3=9062&sui4=1093&sui5=1484, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x84000000
HttpOpenRequestA: ww****om:80/users/get.asp?f_user=123456&f_code=123456123456123456123456123456123456&f_jiqima=3a83bd51870da9a964b53f97f25526d5c99be59e69e9838f1c&f_biaoming=biaotixiugai&sui1=3472&sui2=4377&sui3=5350&sui4=6460&sui5=7009, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x84000000
HttpOpenRequestA: ww****om:80/users/get.asp?f_user=123456&f_code=123456123456123456123456123456123456123456&f_jiqima=3a83bd51870da9a964b53f97f25526d5c99be59e69e9838f1c&f_biaoming=biaotixiugai&sui1=3391&sui2=3986&sui3=5122&sui4=5723&sui5=6089, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x84000000
HttpOpenRequestA: ww****om:80/users/updateget.asp?gengxin=biaotixiugai12&sui1=9267&sui2=5719&sui3=2430&sui4=7861&sui5=9809, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x84000000
HttpOpenRequestA: ww****om:80/users/updateget.asp?gengxin=biaotixiugai12&sui1=4576&sui2=3337&sui3=6624&sui4=5662&sui5=3542, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x84000000
HttpOpenRequestA: ww****om:80/users/updateget.asp?gengxin=biaotixiugai12&sui1=6841&sui2=6044&sui3=9391&sui4=2145&sui5=4791, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x84000000
HttpOpenRequestA: ww****om:80/users/updateget.asp?gengxin=biaotixiugai12&sui1=8497&sui2=1232&sui3=4556&sui4=6784&sui5=9402, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x84000000
HttpOpenRequestA: ww****om:80/users/updateget.asp?gengxin=biaotixiugai12&sui1=9982&sui2=9325&sui3=6290&sui4=2078&sui5=7709, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x84000000
HttpOpenRequestA: ww****om:80/users/updateget.asp?gengxin=biaotixiugai12&sui1=2333&sui2=2717&sui3=5490&sui4=2818&sui5=9101, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x84000000
Behavior description:按名称获取主机地址
details:GetAddrInfoW: computer
GetAddrInfoW: wpad
GetAddrInfoW: ww****om
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\996E\DEBUG\Trace Level
\REGISTRY\USER\S-*\Software\xiaobenniao\biaotixiugai\mima
\REGISTRY\USER\S-*\Software\xiaobenniao\biaotixiugai\zhanghao
\REGISTRY\USER\S-*\Software\360\niao\biaotixiugai
\REGISTRY\USER\S-*\Software\360\niao\biaotixiugai2
Behavior description:删除注册表键值
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\996E\DEBUG\Trace Level
Other behavior
Behavior description:创建互斥体
details:RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
MSCTF.Shared.MUTEX.AMF
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = Global\userenv: User Profile setup event
EventName = Global\crypt32LogoffEvent
EventName = MSCTF.SendReceive.Event.AMF.IC
EventName = MSCTF.SendReceiveConection.Event.AMF.IC
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000040
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000040
MSCTF.SendReceive.Event.ELH.IC
MSCTF.SendReceiveConection.Event.ELH.IC
Global\SvcctrlStartEvent_A3752DX
\INSTALLATION_SECURITY_HOLD
Global\crypt32LogoffEvent
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000041
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000041
Behavior description:获取TickCount值
details:TickCount = 5354065, SleepMilliseconds = 50.
TickCount = 5354143, SleepMilliseconds = 50.
TickCount = 5354159, SleepMilliseconds = 50.
TickCount = 5354175, SleepMilliseconds = 50.
TickCount = 5354487, SleepMilliseconds = 50.
TickCount = 5354534, SleepMilliseconds = 50.
TickCount = 5354565, SleepMilliseconds = 50.
TickCount = 5354581, SleepMilliseconds = 50.
TickCount = 5354596, SleepMilliseconds = 50.
TickCount = 5354628, SleepMilliseconds = 50.
TickCount = 5354643, SleepMilliseconds = 50.
TickCount = 5354675, SleepMilliseconds = 50.
TickCount = 5354690, SleepMilliseconds = 50.
TickCount = 5354721, SleepMilliseconds = 50.
TickCount = 5354737, SleepMilliseconds = 50.
Behavior description:窗口信息
details:Pid = 392, Hwnd=0xb0362, Text = 官方网站:www.xiaobenniao.com, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 392, Hwnd=0x503aa, Text = 未注册用户 未注册用户或密码错误,请免费注册 注册用户| True 终身用户 欢迎你(VIP用户网络版) 未过期 欢迎你(VIP用户网, ClassName = Edit.
Pid = 392, Hwnd=0x303ae, Text = 70?146?213?11?232?46?234?174?194?20?207?64?65?208?65?200?~38?150?37?121?49?44?207?242?211?164?111?8?68?44?134?115?238?47?249?81?2, ClassName = Edit.
Pid = 392, Hwnd=0x4037e, Text = 未注册用户 未注册用户或密码错误,请免费注册 注册用户| True 终身用户 欢迎你(VIP用户网络版) 未过期 欢迎你(VIP用户网, ClassName = Edit.
Pid = 392, Hwnd=0x20388, Text = 购买或定制软件请联系QQ:861666370, ClassName = Edit.
Pid = 392, Hwnd=0x30378, Text = 登陆, ClassName = Button.
Pid = 392, Hwnd=0x30374, Text = 注册, ClassName = Button.
Pid = 392, Hwnd=0x6036e, Text = 免费试用, ClassName = Button.
Pid = 392, Hwnd=0xc030e, Text = 密码:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 392, Hwnd=0xa0332, Text = 帐号:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 392, Hwnd=0x1a037a, Text = 记住密码, ClassName = Button(CheckBox).
Pid = 392, Hwnd=0x30380, Text = 用汉字不超过3个, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 392, Hwnd=0x403bc, Text = 点击进入官方网站, ClassName = Button.
Pid = 392, Hwnd=0xd033c, Text = 看不清楚 可以单击验证码刷新, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 392, Hwnd=0x30376, Text = 男, ClassName = ComboBox.
Behavior description:直接操作物理设备
details:\??\PhysicalDrive0
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 3000.
[2]: MilliSeconds = 5432.
[3]: MilliSeconds = 1000.
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ComboLBox]
[Window,Class] = [,Afx:400000:b:10011:1900010:0]
[Window,Class] = [,Afx:400000:8:10011:1900015:0]
[Window,Class] = [,Edit]
[Window,Class] = [标签,Afx:400000:b:10011:1900015:0]
[Window,Class] = [D8FDACEEADF9D9CCB3AA1D1A213EDDE2D4CCDCF6ABABD8FDACEEA1FADCF2B3BCAFD9C2C4DCF6ABAB292935A5D4D8FDACEEB3BCA0ECD0B8C2C1ACC3AFD7ACC3D3CCA5D4D8FDACEE1D1A223EAFD9C2C4D9F8C6D3DCFDACC3D8FDACEEA4E2AFBADDE8C6A7B3B8A5BFA4A0B3B9B3BCA0ECD0B8D6E4A6BFD8FDACE
[Window,Class] = [软件介绍: 1.万能替换软件标题,可以替换99%的软件,包括已加壳加密的软件 2.可以设置添加软件打开网址(弹窗),包括启动软件前或关闭软件后打开任意网址 3.可以设置添加软件闪屏,支持多种图片格式(BMP、JPG、GIF、ICO) 4.可以设置添加软件启动提示框(对话框),标题内容都可随意设置 免责声明: 不得非法使用本站软件进行任何商业盈利行为,使用本软件修改后的文件仅用于自己使用,不得将软件用于商业或者非法用途,否则,一切后果请用户自负 友情提示:
[Window,Class] = [帐号:,Afx:400000:b:10011:1900015:0]
[Window,Class] = [注册,Button]
[Window,Class] = [密码:,Afx:400000:b:10011:1900015:0]
[Window,Class] = [姓名:,Afx:400000:b:10011:1900015:0]
[Window,Class] = [性别:,Afx:400000:b:10011:1900015:0]
[Window,Class] = [邮箱:,Afx:400000:b:10011:1900015:0]
[Window,Class] = [验证码:,Afx:400000:b:10011:1900015:0]
[Window,Class] = [帐号一律用QQ,Afx:400000:b:10011:1900015:0]
Behavior description:打开互斥体
details:RasPbFile
ShimCacheMutex
Local\_!MSFTHISTORY!_
Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Local\c:!documents and settings!administrator!cookies!
Local\c:!documents and settings!administrator!local settings!history!history.ie5!
Local\WininetStartupMutex
Local\WininetConnectionMutex
Local\WininetProxyRegistryMutex
Local\!IETld!Mutex
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号