VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:19ea459addc64ed3d2405c257746facb
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 获取窗口截图信息
details: Foreground window Info: HWND = 0x00000000, DC = 0xb001057a.
Foreground window Info: HWND = 0x00000000, DC = 0x880104f9.

Process behavior

Behavior description: 创建新文件进程
details: ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\hdtach.exe, CmdLine = "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\hdtach.exe"

File behavior

Behavior description: 创建文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\__tmp_rar_sfx_access_check_5429593
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\00000002.hdl
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\00000003.hdl
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\license.rtf
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\readme.rtf
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\tests.rtf
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\hdtach.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\汉化说明.txt
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\init.log
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\tachinit.log
Behavior description: 删除文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\__tmp_rar_sfx_access_check_5429593
Behavior description: 修改文件内容
details: C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\00000002.hdl ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\00000002.hdl ---> Offset = 20480
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\00000002.hdl ---> Offset = 25088
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\00000002.hdl ---> Offset = 35072
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\00000002.hdl ---> Offset = 43008
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\00000003.hdl ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\00000003.hdl ---> Offset = 5888
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\00000003.hdl ---> Offset = 10752
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\00000003.hdl ---> Offset = 13824
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\00000003.hdl ---> Offset = 21760
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\license.rtf ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\readme.rtf ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\tests.rtf ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\hdtach.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\RarSFX0\hdtach.exe ---> Offset = 1536
Behavior description: 查找文件
details: FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\hdtach.exe
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\My Documents
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\Documents
FileName = C:\Documents and Settings\Administrator\桌面
FileName = C:\Documents and Settings\All Users\桌面
FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\hdtach.exe

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RarSFX0\hdtach.exe
Behavior description: 删除注册表键
details: \REGISTRY\MACHINE\SYSTEM\ControlSet002\TEST\

Other behavior

Behavior description: 创建互斥体
details: CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
Behavior description: 隐藏指定窗口
details: [Window,Class] = [,ComboLBox]
Behavior description: 窗口信息
details: Pid = 1172, Hwnd=0xb036a, Text = 启用写入测试(&E), ClassName = TCheckBox.
Pid = 1172, Hwnd=0x903a4, Text = 完全测试(变量区域,请查看文档)(&F), ClassName = TRadioButton.
Pid = 1172, Hwnd=0x1402ca, Text = 连续测试(32MB 区域)(&L), ClassName = TRadioButton.
Pid = 1172, Hwnd=0x1a031e, Text = 快速测试(8MB 区域)(&Q), ClassName = TRadioButton.
Pid = 1172, Hwnd=0x1702c4, Text = 图表数据(&G), ClassName = TButton.
Pid = 1172, Hwnd=0x1802b8, Text = 刷新(&E), ClassName = TButton.
Pid = 1172, Hwnd=0xf034e, Text = 联机帮助(&O), ClassName = TButton.
Pid = 1172, Hwnd=0x603c2, Text = 检查更新(&C), ClassName = TButton.
Pid = 1172, Hwnd=0x1202aa, Text = 开始测试(&R), ClassName = TButton.
Pid = 1172, Hwnd=0x503b2, Text = (C:) VBOX HARDDISK 1.0 (10.7GB), ClassName = TComboBox.
Pid = 1172, Hwnd=0x40382, Text = HD Tach RW 版本 3.0.1.0, ClassName = THdTachMain.
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [EDIT,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
Behavior description: 打开事件
details: HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000052
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000052
MSCTF.SendReceiveConection.Event.ELH.IC
MSCTF.SendReceive.Event.ELH.IC
_fCanRegisterWithShellService
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Global\crypt32LogoffEvent
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000053
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000053
Behavior description: 调整进程token权限
details: SE_LOAD_DRIVER_PRIVILEGE
SE_INC_BASE_PRIORITY_PRIVILEGE
Behavior description: 枚举窗口
details: N/A
Behavior description: 获取窗口截图信息
details: Foreground window Info: HWND = 0x00000000, DC = 0xb001057a.
Foreground window Info: HWND = 0x00000000, DC = 0x880104f9.
Behavior description: 直接操作物理设备
details: \??\PHYSICALDRIVE0
Behavior description: 创建事件对象
details: EventName = Global\crypt32LogoffEvent
Behavior description: 打开互斥体
details: ShimCacheMutex
Local\!IETld!Mutex