VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:6bda02b5017230b4eb582b0b127cbb98
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 跨进程写入数据
details: TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\7ZipSfx.000\Setup32.exe, WriteAddress = 0x00010000, Size = 0x000026c4
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\7ZipSfx.000\Setup32.exe, WriteAddress = 0x00020000, Size = 0x000007b4
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\7ZipSfx.000\Setup32.exe, WriteAddress = 0x7ffde010, Size = 0x00000004
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\7ZipSfx.000\Setup32.exe, WriteAddress = 0x7ffde1e8, Size = 0x00000004
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup_x86.exe, WriteAddress = 0x00010000, Size = 0x000026c4
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup_x86.exe, WriteAddress = 0x00020000, Size = 0x00000884
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup_x86.exe, WriteAddress = 0x7ffd7010, Size = 0x00000004
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup_x86.exe, WriteAddress = 0x7ffd71e8, Size = 0x00000004
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\7zS4.tmp\Setup.exe, WriteAddress = 0x00010000, Size = 0x000026c4
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\7zS4.tmp\Setup.exe, WriteAddress = 0x00020000, Size = 0x00000734
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\7zS4.tmp\Setup.exe, WriteAddress = 0x7ffde010, Size = 0x00000004
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\7zS4.tmp\Setup.exe, WriteAddress = 0x00030000, Size = 0x00000184
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\7zS4.tmp\Setup.exe, WriteAddress = 0x7ffde1e8, Size = 0x00000004
Behavior description: 获取窗口截图信息
details: Foreground window Info: HWND = 0x00000000, DC = 0x7a010477.
Foreground window Info: HWND = 0x00000000, DC = 0x5e0104a7.
Foreground window Info: HWND = 0x00000000, DC = 0x6901033b.
Behavior description: 检测自身是否被调试
details: N/A

Process behavior

Behavior description: 跨进程写入数据
details: TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\7ZipSfx.000\Setup32.exe, WriteAddress = 0x00010000, Size = 0x000026c4
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\7ZipSfx.000\Setup32.exe, WriteAddress = 0x00020000, Size = 0x000007b4
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\7ZipSfx.000\Setup32.exe, WriteAddress = 0x7ffde010, Size = 0x00000004
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\7ZipSfx.000\Setup32.exe, WriteAddress = 0x7ffde1e8, Size = 0x00000004
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup_x86.exe, WriteAddress = 0x00010000, Size = 0x000026c4
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup_x86.exe, WriteAddress = 0x00020000, Size = 0x00000884
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup_x86.exe, WriteAddress = 0x7ffd7010, Size = 0x00000004
TargetProcess = C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup_x86.exe, WriteAddress = 0x7ffd71e8, Size = 0x00000004
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\7zS4.tmp\Setup.exe, WriteAddress = 0x00010000, Size = 0x000026c4
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\7zS4.tmp\Setup.exe, WriteAddress = 0x00020000, Size = 0x00000734
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\7zS4.tmp\Setup.exe, WriteAddress = 0x7ffde010, Size = 0x00000004
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\7zS4.tmp\Setup.exe, WriteAddress = 0x00030000, Size = 0x00000184
TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\7zS4.tmp\Setup.exe, WriteAddress = 0x7ffde1e8, Size = 0x00000004
Behavior description: 创建本地线程
details: TargetProcess: %temp%\1462182253.728913.exe, InheritedFromPID = 1944, ProcessID = 1656, ThreadID = 556, StartAddress = 00401283, Parameter = 009196A0
TargetProcess: %temp%\1462182253.729300.exe, InheritedFromPID = 1944, ProcessID = 1656, ThreadID = 1316, StartAddress = 77C0A341, Parameter = 0091EC60
TargetProcess: %temp%\1462182253.729680.exe, InheritedFromPID = 1944, ProcessID = 1656, ThreadID = 1884, StartAddress = 77C0A341, Parameter = 0091ECF0
TargetProcess: %temp%\1462182253.730065.exe, InheritedFromPID = 1944, ProcessID = 1656, ThreadID = 1352, StartAddress = 77C0A341, Parameter = 0091ED80
TargetProcess: %temp%\1462182253.730444.exe, InheritedFromPID = 1944, ProcessID = 1656, ThreadID = 788, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: Setup32.exe, InheritedFromPID = 1656, ProcessID = 1952, ThreadID = 1676, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: Setup_x86.exe, InheritedFromPID = 1952, ProcessID = 288, ThreadID = 2052, StartAddress = 77C0A341, Parameter = 003F3180
TargetProcess: Setup_x86.exe, InheritedFromPID = 1952, ProcessID = 288, ThreadID = 2068, StartAddress = 77C0A341, Parameter = 00C48F28
TargetProcess: Setup_x86.exe, InheritedFromPID = 1952, ProcessID = 288, ThreadID = 2072, StartAddress = 77C0A341, Parameter = 003FB358
TargetProcess: Setup_x86.exe, InheritedFromPID = 1952, ProcessID = 288, ThreadID = 2076, StartAddress = 77C0A341, Parameter = 003FB3E8
Behavior description: 创建新文件进程
details: ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\7ZipSfx.000\Setup32.exe, CmdLine = "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\7ZipSfx.000\Setup32.exe"
ImagePath = C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup_x86.exe, CmdLine = "C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup_x86.exe"
ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\7zS4.tmp\Setup.exe, CmdLine = .\Setup.exe

File behavior

Behavior description: 创建文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup32.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup64.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup_x64.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup_x86.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\Help.chm
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\CmdTool.txt
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\res.ini
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\eula.rtf
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\vssver2.scc
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\CmdTool.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\Commit.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\Daemon.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\Defender.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\Service.exe
Behavior description: 删除文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp
Behavior description: 创建可执行文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup32.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup64.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup_x64.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup_x86.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\CmdTool.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\Commit.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\Daemon.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\Defender.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\Service.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\Setup.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\Uninstall.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\ShellExt.dll
Behavior description: 修改文件内容
details: C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup32.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup32.exe ---> Offset = 65536
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup32.exe ---> Offset = 131072
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup32.exe ---> Offset = 196608
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup32.exe ---> Offset = 262144
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup64.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup64.exe ---> Offset = 52736
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup64.exe ---> Offset = 118272
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup64.exe ---> Offset = 183808
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup64.exe ---> Offset = 249344
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup_x64.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup_x64.exe ---> Offset = 52736
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup_x64.exe ---> Offset = 118272
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup_x64.exe ---> Offset = 183808
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup_x64.exe ---> Offset = 249344
Behavior description: 查找文件
details: FileName = C:\WINDOWS
FileName = C:\WINDOWS\system32
FileName = C:\WINDOWS\system32\msctfime.ime
FileName = C:\WINDOWS\system32\ieframe.dll
FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\7ZipSfx.000
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\7ZipSfx.000\Setup32.exe
FileName = C:\Documents and Settings\ADMINI~1
FileName = C:\Documents and Settings\Administrator\LOCALS~1
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup32.exe

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\7ZipSfx.000\Setup32.exe

Other behavior

Behavior description: 检测自身是否被调试
details: N/A
Behavior description: 创建互斥体
details: CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
MSCTF.Shared.MUTEX.ELH
SHIMLIB_LOG_MUTEX
Global\{44EE29B3-FD3D-4E65-BDFC-ABDA82EE76B0}
MSCTF.Shared.MUTEX.EGI
Behavior description: 创建事件对象
details: EventName = Global\userenv: User Profile setup event
EventName = DINPUTWINMM
EventName = MSCTF.SendReceive.Event.EGI.IC
EventName = MSCTF.SendReceiveConection.Event.EGI.IC
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [,Shadow Defender Daemon Window]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description: 窗口信息
details: Pid = 2144, Hwnd=0x5026e, Text = 下一步(&N) >, ClassName = Button.
Pid = 2144, Hwnd=0x5028c, Text = 取消, ClassName = Button.
Pid = 2144, Hwnd=0x50278, Text = 欢迎使用 Shadow Defender 安装向导, ClassName = Static.
Pid = 2144, Hwnd=0x5026c, Text = 本安装向导将安装 Shadow Defender 1.4.0.623 到您的计算机中。 建议您在安装之前退出所有正在运行的程序。 继续安装请点击“下一步”, , ClassName = Static.
Pid = 2144, Hwnd=0x130146, Text = 安装 - Shadow Defender, ClassName = #32770.
Pid = 2144, Hwnd=0x6026c, Text = 下一步(&N) >, ClassName = Button.
Pid = 2144, Hwnd=0x60278, Text = 取消, ClassName = Button.
Pid = 2144, Hwnd=0x60270, Text = 最终用户许可协议, ClassName = Static.
Pid = 2144, Hwnd=0x6028c, Text = 在继续操作之前,请阅读下面的重要信息:, ClassName = Static.
Pid = 2144, Hwnd=0x502a8, Text = Shadow Defender END-USER LICENSE AGREEMENT Shadow Defender is a shareware program · Anyone may use this software during an e, ClassName = RichEdit20W.
Pid = 2144, Hwnd=0x6028e, Text = 我接受这个协议(&A), ClassName = Button(CheckBox).
Pid = 2144, Hwnd=0x202c8, Text = < 上一步(&B), ClassName = Button.
Pid = 2144, Hwnd=0x140146, Text = 安装 - Shadow Defender, ClassName = #32770.
Behavior description: 调整进程token权限
details: SE_LOAD_DRIVER_PRIVILEGE
Behavior description: 枚举窗口
details: N/A
Behavior description: 获取窗口截图信息
details: Foreground window Info: HWND = 0x00000000, DC = 0x7a010477.
Foreground window Info: HWND = 0x00000000, DC = 0x5e0104a7.
Foreground window Info: HWND = 0x00000000, DC = 0x6901033b.
Behavior description: 可执行文件签名信息
details: C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup32.exe(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup64.exe(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup_x64.exe(签名验证: 通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup_x86.exe(签名验证: 通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\CmdTool.exe(签名验证: 通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\Commit.exe(签名验证: 通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\Daemon.exe(签名验证: 通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\Defender.exe(签名验证: 通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\Service.exe(签名验证: 通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\Setup.exe(签名验证: 通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\Uninstall.exe(签名验证: 通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\ShellExt.dll(签名验证: 通过)
Behavior description: 隐藏指定窗口
details: [Window,Class] = [AutoIt v3,AutoIt v3]
Behavior description: 可执行文件MD5
details: C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup32.exe ---> 37c60bfe6bd8c7d026ed02a92534d7b6
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup64.exe ---> 42df6c87d77dd54e384267a4f5bb091b
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup_x64.exe ---> 92bbba5c2dac306bf511785eedb7b962
C:\Documents and Settings\Administrator\Local Settings\Temp\7ZipSfx.000\Setup_x86.exe ---> ea5f8bbd53295a537eac0e7e54e05207
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\CmdTool.exe ---> fc2be2be51491fe312e1b01bcae23b45
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\Commit.exe ---> bfeaa2e3ec29e07cbf96bd73165abd00
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\Daemon.exe ---> 70796b91b45455af63b9a95a5bd4fff4
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\Defender.exe ---> dffd53e03b0d1d6e7aee22ee41f1d4c5
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\Service.exe ---> b3a8e8b6ecb8735076e2ee298fa4676a
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\Setup.exe ---> 34905455ba3aaaa75d8c21b9e704710e
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\Uninstall.exe ---> 5acd7e3fcaf89878597291b5ff154927
C:\Documents and Settings\Administrator\Local Settings\Temp\7zS4.tmp\ShellExt.dll ---> 5771bcae8320435e64e6879f4b9a4ca3