VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:0dafe9dad567e8059b1239b4d249a397
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 修改原系统的EXE文件
details: C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\zlib.dll
Behavior description: 获取窗口截图信息
details: Foreground window Info: HWND = 0x00000000, DC = 0xfa0105b3.
Foreground window Info: HWND = 0x00000000, DC = 0x18010469.
Foreground window Info: HWND = 0x00000000, DC = 0x21010237.
Foreground window Info: HWND = 0x00000000, DC = 0xe201020d.
Behavior description: 设置消息钩子
details: C:\WINDOWS\system32\DINPUT.DLL
Behavior description: 获取TickCount值
details: TickCount = 5494031, SleepMilliseconds = 60000.
TickCount = 5494062, SleepMilliseconds = 60000.
TickCount = 5494078, SleepMilliseconds = 60000.
TickCount = 5494093, SleepMilliseconds = 60000.
TickCount = 5495000, SleepMilliseconds = 60000.
TickCount = 5495046, SleepMilliseconds = 60000.
TickCount = 5495062, SleepMilliseconds = 60000.
TickCount = 5495078, SleepMilliseconds = 60000.
TickCount = 5495093, SleepMilliseconds = 60000.
TickCount = 5495109, SleepMilliseconds = 60000.
TickCount = 5504250, SleepMilliseconds = 60000.
TickCount = 5518015, SleepMilliseconds = 60000.

Process behavior

Behavior description: 创建本地线程
details: TargetProcess: NeoRAGEx.exe, InheritedFromPID = 1944, ProcessID = 3372, ThreadID = 3456, StartAddress = 76B1EC96, Parameter = 00000000

File behavior

Behavior description: 修改原系统的EXE文件
details: C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\zlib.dll
Behavior description: 修改文件内容
details: C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\zlib.dll ---> Offset = 0
Behavior description: 查找文件
details: FileName = ROMS\2020bb.zip
FileName = ROM\2020bb.zip
FileName = 2020bb.zip
FileName = ROMS\3countb.zip
FileName = ROM\3countb.zip
FileName = 3countb.zip
FileName = ROMS\sonicwi2.zip
FileName = ROM\sonicwi2.zip
FileName = sonicwi2.zip
FileName = ROMS\
FileName = ROM\
FileName =
FileName = ROMS\aodk.zip
FileName = ROM\aodk.zip
FileName = aodk.zip

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\MediaProperties\PrivateProperties\DirectInput\VID_80EE&PID_0021\Calibration\0\GUID
\REGISTRY\USER\S-*\Software\Microsoft\DirectInput\MostRecentApplication\Version
\REGISTRY\USER\S-*\Software\Microsoft\DirectInput\MostRecentApplication\Name
\REGISTRY\USER\S-*\Software\Microsoft\DirectInput\MostRecentApplication\Id
\REGISTRY\USER\S-*\Software\Microsoft\DirectInput\MostRecentApplication\MostRecentStart
\REGISTRY\MACHINE\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication\Name
\REGISTRY\MACHINE\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication\ID

Other behavior

Behavior description: 创建互斥体
details: DDrawWindowListMutex
DDrawDriverObjectListMutex
__DDrawExclMode__
__DDrawCheckExclMode__
DirectSound DllMain mutex (0x00000D2C)
DirectInput.{89521361-AA8A-11CF-BFC7-444553540000}
DirectInput.{5944E682-C92E-11CF-BFC7-444553540000}
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
DirectSound Administrator shared thread array (lock)
MSCTF.Shared.MUTEX.ELH
Behavior description: 创建事件对象
details: EventName = DINPUTWINMM
EventName = Global\crypt32LogoffEvent
EventName = MSCTF.SendReceive.Event.ADN.IC
EventName = MSCTF.SendReceiveConection.Event.ADN.IC
Behavior description: 修改后的可执行文件MD5
details: C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\zlib.dll ---> 4965107d112666d3835308a831a29274
Behavior description: 打开事件
details: HookSwitchHookEnabledEvent
DINPUTWINMM
Global\crypt32LogoffEvent
Global\SvcctrlStartEvent_A3752DX
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000051
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000051
MSCTF.SendReceiveConection.Event.ELH.IC
MSCTF.SendReceive.Event.ELH.IC
Behavior description: 获取TickCount值
details: TickCount = 5494031, SleepMilliseconds = 60000.
TickCount = 5494062, SleepMilliseconds = 60000.
TickCount = 5494078, SleepMilliseconds = 60000.
TickCount = 5494093, SleepMilliseconds = 60000.
TickCount = 5495000, SleepMilliseconds = 60000.
TickCount = 5495046, SleepMilliseconds = 60000.
TickCount = 5495062, SleepMilliseconds = 60000.
TickCount = 5495078, SleepMilliseconds = 60000.
TickCount = 5495093, SleepMilliseconds = 60000.
TickCount = 5495109, SleepMilliseconds = 60000.
TickCount = 5504250, SleepMilliseconds = 60000.
TickCount = 5518015, SleepMilliseconds = 60000.
Behavior description: 调整进程token权限
details: SE_LOAD_DRIVER_PRIVILEGE
Behavior description: 窗口信息
details: Pid = 3372, Hwnd=0xc02ae, Text = NeoRAGEx Emulator, ClassName = NeoRAGEx.
Behavior description: 修改后的可执行文件签名信息
details: C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\zlib.dll(签名验证: 未通过)
Behavior description: 获取窗口截图信息
details: Foreground window Info: HWND = 0x00000000, DC = 0xfa0105b3.
Foreground window Info: HWND = 0x00000000, DC = 0x18010469.
Foreground window Info: HWND = 0x00000000, DC = 0x21010237.
Foreground window Info: HWND = 0x00000000, DC = 0xe201020d.
Behavior description: 调用Sleep函数
details: [1]: MilliSeconds = 60000.
Behavior description: 打开互斥体
details: ShimCacheMutex
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]