VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:51dcca5b97978818fee8189c172144f2
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 获取TickCount值
details: TickCount = 277484, SleepMilliseconds = 60000.
TickCount = 277593, SleepMilliseconds = 60000.
TickCount = 277609, SleepMilliseconds = 60000.
TickCount = 286140, SleepMilliseconds = 60000.
TickCount = 287375, SleepMilliseconds = 60000.
TickCount = 287390, SleepMilliseconds = 60000.
TickCount = 299734, SleepMilliseconds = 60000.
TickCount = 299750, SleepMilliseconds = 60000.
TickCount = 299765, SleepMilliseconds = 60000.
TickCount = 240015, SleepMilliseconds = 250.
TickCount = 239801, SleepMilliseconds = 20.

Process behavior

Behavior description: 创建本地线程
details: TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2616, ThreadID = 2636, StartAddress = 792A741C, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2616, ThreadID = 2640, StartAddress = 791F59C0, Parameter = 001B01D0
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2616, ThreadID = 2748, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2616, ThreadID = 2752, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2616, ThreadID = 2756, StartAddress = 77E56C7D, Parameter = 001E8F98
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2616, ThreadID = 2760, StartAddress = 769AE43B, Parameter = 001D86E8
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2616, ThreadID = 3200, StartAddress = 792F7F68, Parameter = 00000000

File behavior

Behavior description: 覆盖已有文件
details: C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
Behavior description: 查找文件
details: FileName = C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll
FileName = C:\WINDOWS\Microsoft.NET\Framework\\*
FileName = C:\WINDOWS\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.INI
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\996E.INI
FileName = C:\WINDOWS\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.INI
FileName = C:\WINDOWS\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.INI
FileName = C:\WINDOWS\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.INI
FileName = C:\WINDOWS\Microsoft.Net\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.INI

Other behavior

Behavior description: 检测自身是否被调试
details: IsDebuggerPresent
Behavior description: 创建互斥体
details: CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
MSCTF.Shared.MUTEX.MDK
Behavior description: 创建事件对象
details: EventName = Global\CPFATE_2616_v4.0.30319
EventName = MSCTF.SendReceive.Event.MDK.IC
EventName = MSCTF.SendReceiveConection.Event.MDK.IC
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description: 打开事件
details: Global\CLR_PerfMon_StartEnumEvent
\KernelObjects\LowMemoryCondition
HookSwitchHookEnabledEvent
MSFT.VSA.COM.DISABLE.2616
MSFT.VSA.IEC.STATUS.6c736db0
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
Behavior description: 获取TickCount值
details: TickCount = 277484, SleepMilliseconds = 60000.
TickCount = 277593, SleepMilliseconds = 60000.
TickCount = 277609, SleepMilliseconds = 60000.
TickCount = 286140, SleepMilliseconds = 60000.
TickCount = 287375, SleepMilliseconds = 60000.
TickCount = 287390, SleepMilliseconds = 60000.
TickCount = 299734, SleepMilliseconds = 60000.
TickCount = 299750, SleepMilliseconds = 60000.
TickCount = 299765, SleepMilliseconds = 60000.
TickCount = 240015, SleepMilliseconds = 250.
TickCount = 239801, SleepMilliseconds = 20.
Behavior description: 窗口信息
details: Pid = 2616, Hwnd=0x1034e, Text = . : Machine Key : . , ClassName = WindowsForms10.EDIT.app.0.bb8560_r19_ad1.
Pid = 2616, Hwnd=0x10350, Text = Please, select product ..., ClassName = WindowsForms10.COMBOBOX.app.0.bb8560_r19_ad1.
Pid = 2616, Hwnd=0x10354, Text = https://www.bytezoom.com/, ClassName = WindowsForms10.STATIC.app.0.bb8560_r19_ad1.
Pid = 2616, Hwnd=0x1034c, Text = Get Machine Key for ByteZoom products, ClassName = WindowsForms10.Window.8.app.0.bb8560_r19_ad1.
Behavior description: 调用Sleep函数
details: [1]: MilliSeconds = 60000.
[2]: MilliSeconds = 250.
[3]: MilliSeconds = -1.
[4]: MilliSeconds = 20.
Behavior description: 隐藏指定窗口
details: [Window,Class] = [,ComboLBox]
Behavior description: 打开互斥体
details: ShimCacheMutex
Behavior description: 导入密钥
details: [CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x00418A2B, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001C4164, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x0012E3BC, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x0012E594, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x0012EF90, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x0012ED08, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001BDC5C, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001DF1F4, DataLen: 148, Flags: 0x00000000
[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001BE7A4, DataLen: 148, Flags: 0x00000000