VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:0e9e8978f85046dbefb6abb7fc34754a
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 直接获取CPU时钟
details: EAX = 0xeda7aa35, EDX = 0x00001197
EAX = 0xeda7aa81, EDX = 0x00001197
EAX = 0xf848779a, EDX = 0x00001197
EAX = 0xf84877e6, EDX = 0x00001197
EAX = 0xf8487832, EDX = 0x00001197
EAX = 0xf848787e, EDX = 0x00001197
EAX = 0x5717bc40, EDX = 0x00001198
EAX = 0x5717bc8c, EDX = 0x00001198
EAX = 0xbdd4cdeb, EDX = 0x00001198
EAX = 0xbdd4ce37, EDX = 0x00001198
Behavior description: 获取TickCount值
details: TickCount = 5495656, SleepMilliseconds = 60000.
TickCount = 5495703, SleepMilliseconds = 60000.
TickCount = 5496296, SleepMilliseconds = 60000.
TickCount = 5496406, SleepMilliseconds = 60000.
TickCount = 5496515, SleepMilliseconds = 60000.
TickCount = 5496593, SleepMilliseconds = 60000.
TickCount = 5496609, SleepMilliseconds = 60000.
TickCount = 5496640, SleepMilliseconds = 60000.
TickCount = 5496703, SleepMilliseconds = 60000.
TickCount = 5496718, SleepMilliseconds = 60000.
TickCount = 5496734, SleepMilliseconds = 60000.
TickCount = 5496750, SleepMilliseconds = 60000.
TickCount = 5496812, SleepMilliseconds = 60000.
TickCount = 5496859, SleepMilliseconds = 60000.
TickCount = 5497156, SleepMilliseconds = 60000.

Process behavior

Behavior description: 创建本地线程
details: TargetProcess: 仿站小工具 V8.1.exe, InheritedFromPID = 1944, ProcessID = 2804, ThreadID = 2840, StartAddress = 792A741C, Parameter = 00000000
TargetProcess: 仿站小工具 V8.1.exe, InheritedFromPID = 1944, ProcessID = 2804, ThreadID = 2844, StartAddress = 791F59C0, Parameter = 001A0408
TargetProcess: 仿站小工具 V8.1.exe, InheritedFromPID = 1944, ProcessID = 2804, ThreadID = 2884, StartAddress = 77E56C7D, Parameter = 001B40C8
TargetProcess: 仿站小工具 V8.1.exe, InheritedFromPID = 1944, ProcessID = 2804, ThreadID = 2888, StartAddress = 769AE43B, Parameter = 001B4328
TargetProcess: 仿站小工具 V8.1.exe, InheritedFromPID = 1944, ProcessID = 2804, ThreadID = 2904, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: 仿站小工具 V8.1.exe, InheritedFromPID = 1944, ProcessID = 2804, ThreadID = 2908, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: 仿站小工具 V8.1.exe, InheritedFromPID = 1944, ProcessID = 2804, ThreadID = 3240, StartAddress = 792F7F68, Parameter = 00000000

File behavior

Behavior description: 创建文件
details: C:\Documents and Settings\Administrator\Application Data\Microsoft\Crypto\DSS\S-*\9735c8ccbe1a386d8c47141585a8966b_dcff734b-bc3f-43cb-8911-9b5d467629cf
Behavior description: 覆盖已有文件
details: C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\Config.dll
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\Urls.dll
Behavior description: 修改文件内容
details: C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\IrisSkin2.dll ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\IrisSkin2.dll ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\IrisSkin2.dll ---> Offset = 131072
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\IrisSkin2.dll ---> Offset = 196608
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\IrisSkin2.dll ---> Offset = 262144
C:\Documents and Settings\Administrator\Application Data\Microsoft\Crypto\DSS\S-*\9735c8ccbe1a386d8c47141585a8966b_dcff734b-bc3f-43cb-8911-9b5d467629cf ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\Newtonsoft.Json.dll ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\Newtonsoft.Json.dll ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\Newtonsoft.Json.dll ---> Offset = 131072
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\Newtonsoft.Json.dll ---> Offset = 196608
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\Newtonsoft.Json.dll ---> Offset = 262144
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\Config.dll ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\Urls.dll ---> Offset = 0
Behavior description: 查找文件
details: FileName = C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll
FileName = C:\WINDOWS\Microsoft.NET\Framework\\*
FileName = C:\WINDOWS\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.INI
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\仿站小工具 V8.1.exe
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\仿站小工具 V8.1.INI
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\IrisSkin2.INI
FileName = C:\WINDOWS\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.INI
FileName = C:\WINDOWS\Microsoft.Net\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.INI
FileName = C:\WINDOWS\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.INI

Other behavior

Behavior description: 检测自身是否被调试
details: IsDebuggerPresent
Behavior description: 创建互斥体
details: CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.IPK
Behavior description: 创建事件对象
details: EventName = Global\CPFATE_2804_v4.0.30319
EventName = Global\userenv: User Profile setup event
EventName = Global\crypt32LogoffEvent
EventName = MSCTF.SendReceive.Event.IPK.IC
EventName = MSCTF.SendReceiveConection.Event.IPK.IC
Behavior description: 打开互斥体
details: ShimCacheMutex
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description: 打开事件
details: Global\CLR_PerfMon_StartEnumEvent
\KernelObjects\LowMemoryCondition
HookSwitchHookEnabledEvent
MSFT.VSA.COM.DISABLE.2804
MSFT.VSA.IEC.STATUS.6c736db0
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
\INSTALLATION_SECURITY_HOLD
Global\crypt32LogoffEvent
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000052
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000052
MSCTF.SendReceiveConection.Event.ELH.IC
MSCTF.SendReceive.Event.ELH.IC
Behavior description: 获取TickCount值
details: TickCount = 5495656, SleepMilliseconds = 60000.
TickCount = 5495703, SleepMilliseconds = 60000.
TickCount = 5496296, SleepMilliseconds = 60000.
TickCount = 5496406, SleepMilliseconds = 60000.
TickCount = 5496515, SleepMilliseconds = 60000.
TickCount = 5496593, SleepMilliseconds = 60000.
TickCount = 5496609, SleepMilliseconds = 60000.
TickCount = 5496640, SleepMilliseconds = 60000.
TickCount = 5496703, SleepMilliseconds = 60000.
TickCount = 5496718, SleepMilliseconds = 60000.
TickCount = 5496734, SleepMilliseconds = 60000.
TickCount = 5496750, SleepMilliseconds = 60000.
TickCount = 5496812, SleepMilliseconds = 60000.
TickCount = 5496859, SleepMilliseconds = 60000.
TickCount = 5497156, SleepMilliseconds = 60000.
Behavior description: 获取光标位置
details: CursorPos = (96,18500), SleepMilliseconds = 60000.
CursorPos = (6389,26533), SleepMilliseconds = 60000.
CursorPos = (19224,15757), SleepMilliseconds = 60000.
CursorPos = (11533,29391), SleepMilliseconds = 60000.
Behavior description: 窗口信息
details: Pid = 2804, Hwnd=0x603c6, Text = 第一步:添加网址(下载普通网站), ClassName = WindowsForms10.Window.8.app.0.2bf8098_r19_ad1.
Pid = 2804, Hwnd=0xc038a, Text = 共“0”项, ClassName = WindowsForms10.STATIC.app.0.2bf8098_r19_ad1.
Pid = 2804, Hwnd=0x403ca, Text = 转到下一步, ClassName = WindowsForms10.BUTTON.app.0.2bf8098_r19_ad1.
Pid = 2804, Hwnd=0x6037e, Text = 清空网址, ClassName = WindowsForms10.BUTTON.app.0.2bf8098_r19_ad1.
Pid = 2804, Hwnd=0x40394, Text = 添加, ClassName = WindowsForms10.BUTTON.app.0.2bf8098_r19_ad1.
Pid = 2804, Hwnd=0xb03ba, Text = default.html, ClassName = WindowsForms10.EDIT.app.0.2bf8098_r19_ad1.
Pid = 2804, Hwnd=0x40382, Text = /, ClassName = WindowsForms10.EDIT.app.0.2bf8098_r19_ad1.
Pid = 2804, Hwnd=0x503b2, Text = 文件名称:, ClassName = WindowsForms10.STATIC.app.0.2bf8098_r19_ad1.
Pid = 2804, Hwnd=0x1f02fe, Text = 相对路径:, ClassName = WindowsForms10.STATIC.app.0.2bf8098_r19_ad1.
Pid = 2804, Hwnd=0x100398, Text = 输入网址:, ClassName = WindowsForms10.STATIC.app.0.2bf8098_r19_ad1.
Pid = 2804, Hwnd=0x16032e, Text = menuStrip1, ClassName = WindowsForms10.Window.8.app.0.2bf8098_r19_ad1.
Pid = 2804, Hwnd=0x303dc, Text = 仿站小工具 V8.1, ClassName = WindowsForms10.Window.8.app.0.2bf8098_r19_ad1.
Behavior description: 调用Sleep函数
details: [1]: MilliSeconds = 60000.
[2]: MilliSeconds = 250.
[3]: MilliSeconds = 20.
Behavior description: 直接获取CPU时钟
details: EAX = 0xeda7aa35, EDX = 0x00001197
EAX = 0xeda7aa81, EDX = 0x00001197
EAX = 0xf848779a, EDX = 0x00001197
EAX = 0xf84877e6, EDX = 0x00001197
EAX = 0xf8487832, EDX = 0x00001197
EAX = 0xf848787e, EDX = 0x00001197
EAX = 0x5717bc40, EDX = 0x00001198
EAX = 0x5717bc8c, EDX = 0x00001198
EAX = 0xbdd4cdeb, EDX = 0x00001198
EAX = 0xbdd4ce37, EDX = 0x00001198