VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:4c56df24fead115207c6bda8069c0726
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 直接调用系统关键API
details: Index = 0x000000B2, Name: NtQueryVirtualMemory, Instruction Address = 0x0042E37E
Index = 0x0000010A, Name: NtUnlockVirtualMemory, Instruction Address = 0x0042E37E
Index = 0x00000053, Name: NtFreeVirtualMemory, Instruction Address = 0x004A3400
Index = 0x000000B2, Name: NtQueryVirtualMemory, Instruction Address = 0x0057E4C1
Index = 0x0000010A, Name: NtUnlockVirtualMemory, Instruction Address = 0x00408F74
Index = 0x000000AD, Name: NtQuerySystemInformation, Instruction Address = 0x0042E37E
Index = 0x00000080, Name: NtOpenThread, Instruction Address = 0x0042E37E
Behavior description: 直接获取CPU时钟
details: EAX = 0x3602015b, EDX = 0x000000b4
EAX = 0x38b500d7, EDX = 0x000000b4
EAX = 0x38b50123, EDX = 0x000000b4
EAX = 0x38b5016f, EDX = 0x000000b4
EAX = 0x38b501bb, EDX = 0x000000b4
EAX = 0x38b50207, EDX = 0x000000b4
EAX = 0x38b50253, EDX = 0x000000b4
EAX = 0x3b3cd1dc, EDX = 0x000000b4
EAX = 0x3b3cd228, EDX = 0x000000b4
EAX = 0x3b3cd274, EDX = 0x000000b4

Process behavior

Behavior description: 创建本地线程
details: TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2628, ThreadID = 2644, StartAddress = 0044C860, Parameter = 00ED80E0
Behavior description: 枚举进程
details: N/A

File behavior

Behavior description: 创建文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\3.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\4.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\5.tmp
Behavior description: 创建可执行文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\3.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\4.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\5.tmp
Behavior description: 覆盖已有文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\3.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\4.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\5.tmp
Behavior description: 复制文件
details: C:\WINDOWS\system32\ntdll.dll ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\3.tmp
C:\WINDOWS\system32\user32.dll ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\4.tmp
C:\WINDOWS\system32\gdi32.dll ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\5.tmp
Behavior description: 删除文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\3.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\4.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\5.tmp
Behavior description: 修改文件内容
details: C:\Documents and Settings\Administrator\Local Settings\Temp\3.tmp ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\3.tmp ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Temp\3.tmp ---> Offset = 131072
C:\Documents and Settings\Administrator\Local Settings\Temp\3.tmp ---> Offset = 196608
C:\Documents and Settings\Administrator\Local Settings\Temp\3.tmp ---> Offset = 262144
C:\Documents and Settings\Administrator\Local Settings\Temp\4.tmp ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\4.tmp ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Temp\4.tmp ---> Offset = 131072
C:\Documents and Settings\Administrator\Local Settings\Temp\4.tmp ---> Offset = 196608
C:\Documents and Settings\Administrator\Local Settings\Temp\4.tmp ---> Offset = 262144
C:\Documents and Settings\Administrator\Local Settings\Temp\5.tmp ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\5.tmp ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Temp\5.tmp ---> Offset = 131072
C:\Documents and Settings\Administrator\Local Settings\Temp\5.tmp ---> Offset = 196608
C:\Documents and Settings\Administrator\Local Settings\Temp\5.tmp ---> Offset = 262144

Other behavior

Behavior description: 直接调用系统关键API
details: Index = 0x000000B2, Name: NtQueryVirtualMemory, Instruction Address = 0x0042E37E
Index = 0x0000010A, Name: NtUnlockVirtualMemory, Instruction Address = 0x0042E37E
Index = 0x00000053, Name: NtFreeVirtualMemory, Instruction Address = 0x004A3400
Index = 0x000000B2, Name: NtQueryVirtualMemory, Instruction Address = 0x0057E4C1
Index = 0x0000010A, Name: NtUnlockVirtualMemory, Instruction Address = 0x00408F74
Index = 0x000000AD, Name: NtQuerySystemInformation, Instruction Address = 0x0042E37E
Index = 0x00000080, Name: NtOpenThread, Instruction Address = 0x0042E37E
Behavior description: 创建互斥体
details: CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
MSCTF.Shared.MUTEX.IEK
Behavior description: 创建事件对象
details: EventName = DINPUTWINMM
EventName = MSCTF.SendReceive.Event.IEK.IC
EventName = MSCTF.SendReceiveConection.Event.IEK.IC
Behavior description: 打开互斥体
details: ShimCacheMutex
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description: 打开事件
details: HookSwitchHookEnabledEvent
Global\SvcctrlStartEvent_A3752DX
CTF.ThreadMIConnectionEvent.000007E8.00000000.0000000F
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.0000000F
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
Behavior description: 调整进程token权限
details: SE_DEBUG_PRIVILEGE
Behavior description: 窗口信息
details: Pid = 2628, Hwnd=0x1034e, Text = 触发方式, ClassName = Button(GroupBox).
Pid = 2628, Hwnd=0x10354, Text = 开启则自动连发(Home键控制开关), ClassName = Button(RadioButton).
Pid = 2628, Hwnd=0x10352, Text = 自定义连发触发键:, ClassName = Button(RadioButton).
Pid = 2628, Hwnd=0x10350, Text = 按住空格键触发连发, ClassName = Button(RadioButton).
Pid = 2628, Hwnd=0x1034c, Text = Specher制作 吾爱破解 www.52pojie.cn 微信公众号:Sp软件, ClassName = _EL_Label.
Pid = 2628, Hwnd=0x10348, Text = 开启连发(Home键), ClassName = Button(CheckBox).
Pid = 2628, Hwnd=0x10344, Text = 连发设置, ClassName = Button(GroupBox).
Pid = 2628, Hwnd=0x10370, Text = 自定义键:, ClassName = Button(CheckBox).
Pid = 2628, Hwnd=0x1036e, Text = 自定义键:, ClassName = Button(CheckBox).
Pid = 2628, Hwnd=0x10368, Text = 自定义键:, ClassName = Button(CheckBox).
Pid = 2628, Hwnd=0x10366, Text = E键连发, ClassName = Button(CheckBox).
Pid = 2628, Hwnd=0x10364, Text = W键连发, ClassName = Button(CheckBox).
Pid = 2628, Hwnd=0x10362, Text = Q键连发, ClassName = Button(CheckBox).
Pid = 2628, Hwnd=0x10360, Text = 鼠标左键连发, ClassName = Button(CheckBox).
Pid = 2628, Hwnd=0x1035e, Text = 鼠标右键连发, ClassName = Button(CheckBox).
Behavior description: 可执行文件签名信息
details: C:\Documents and Settings\Administrator\Local Settings\Temp\3.tmp(签名验证: 通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\4.tmp(签名验证: 通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\5.tmp(签名验证: 通过)
Behavior description: 隐藏指定窗口
details: [Window,Class] = [,_EL_Timer]
Behavior description: 可执行文件MD5
details: C:\Documents and Settings\Administrator\Local Settings\Temp\3.tmp ---> 9e762b21dd4d10695799a9a6e9570b79
C:\Documents and Settings\Administrator\Local Settings\Temp\4.tmp ---> f697644d5f59050fbe6af896c19cca93
C:\Documents and Settings\Administrator\Local Settings\Temp\5.tmp ---> 2ccdf9fc160e3af611510decc1359516
Behavior description: 直接获取CPU时钟
details: EAX = 0x3602015b, EDX = 0x000000b4
EAX = 0x38b500d7, EDX = 0x000000b4
EAX = 0x38b50123, EDX = 0x000000b4
EAX = 0x38b5016f, EDX = 0x000000b4
EAX = 0x38b501bb, EDX = 0x000000b4
EAX = 0x38b50207, EDX = 0x000000b4
EAX = 0x38b50253, EDX = 0x000000b4
EAX = 0x3b3cd1dc, EDX = 0x000000b4
EAX = 0x3b3cd228, EDX = 0x000000b4
EAX = 0x3b3cd274, EDX = 0x000000b4