VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:8816c088eb632ae0f92ca81339bf3153
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description: 获取窗口截图信息
details: Foreground window Info: HWND = 0x00000000, DC = 0x0e010495.

Process behavior

Behavior description: 创建本地线程
details: TargetProcess: apRWT.exe, InheritedFromPID = 1944, ProcessID = 1588, ThreadID = 440, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: apRWT.exe, InheritedFromPID = 1944, ProcessID = 1588, ThreadID = 348, StartAddress = 0041B885, Parameter = 00000000
TargetProcess: apRWT.exe, InheritedFromPID = 1944, ProcessID = 1588, ThreadID = 164, StartAddress = 00411752, Parameter = 00C38E50
TargetProcess: apRWT.exe, InheritedFromPID = 1944, ProcessID = 1588, ThreadID = 300, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: apRWT.exe, InheritedFromPID = 1944, ProcessID = 1588, ThreadID = 1956, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: apRWT.exe, InheritedFromPID = 1944, ProcessID = 1588, ThreadID = 876, StartAddress = 00411752, Parameter = 00C38E50
TargetProcess: apRWT.exe, InheritedFromPID = 1944, ProcessID = 1588, ThreadID = 1456, StartAddress = 00411752, Parameter = 00C38E50
TargetProcess: apRWT.exe, InheritedFromPID = 1944, ProcessID = 1588, ThreadID = 1868, StartAddress = 00411752, Parameter = 00C38E50
TargetProcess: apRWT.exe, InheritedFromPID = 1944, ProcessID = 1588, ThreadID = 328, StartAddress = 6359727B, Parameter = 027651E0
TargetProcess: apRWT.exe, InheritedFromPID = 1944, ProcessID = 1588, ThreadID = 1180, StartAddress = 00411752, Parameter = 00C38E50

File behavior

Behavior description: 创建文件
details: C:\Documents and Settings\Administrator\Local Settings\%temp%\1462257791.941074.exe_7zdump\ec.ini
C:\Documents and Settings\Administrator\Local Settings\Temp\RBAlarm.txt
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\3132538[1].html
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\3137207[1].html
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\2983468[1].html
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\3218095[1].html
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\2982125[1].html
Behavior description: 删除文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\RBAlarm.txt
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\3132538[1].html
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\3137207[1].html
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\2983468[1].html
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\3218095[1].html
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\2982125[1].html
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description: 修改文件内容
details: C:\Documents and Settings\Administrator\Local Settings\%temp%\1462257791.988770.exe_7zdump\ec.ini ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\%temp%\1462257791.989144.exe_7zdump\ec.ini ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\%temp%\1462257791.989486.exe_7zdump\ec.ini ---> Offset = 93
C:\Documents and Settings\Administrator\Local Settings\%temp%\1462257791.989824.exe_7zdump\ec.ini ---> Offset = 128
C:\Documents and Settings\Administrator\Local Settings\%temp%\1462257791.990163.exe_7zdump\ec.ini ---> Offset = 157
C:\Documents and Settings\Administrator\Local Settings\%temp%\1462257791.990503.exe_7zdump\ec.ini ---> Offset = 194
C:\Documents and Settings\Administrator\Local Settings\%temp%\1462257791.990843.exe_7zdump\ec.ini ---> Offset = 209
C:\Documents and Settings\Administrator\Local Settings\%temp%\1462257791.991182.exe_7zdump\ec.ini ---> Offset = 232
C:\Documents and Settings\Administrator\Local Settings\%temp%\1462257791.991519.exe_7zdump\ec.ini ---> Offset = 257
C:\Documents and Settings\Administrator\Local Settings\%temp%\1462257791.991860.exe_7zdump\ec.ini ---> Offset = 284
C:\Documents and Settings\Administrator\Local Settings\%temp%\1462257791.992200.exe_7zdump\ec.ini ---> Offset = 311
C:\Documents and Settings\Administrator\Local Settings\%temp%\1462257791.992537.exe_7zdump\ec.ini ---> Offset = 336
C:\Documents and Settings\Administrator\Local Settings\%temp%\1462257791.992880.exe_7zdump\ec.ini ---> Offset = 365
C:\Documents and Settings\Administrator\Local Settings\Temp\RBAlarm.txt ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\%temp%\1462257791.993676.exe_7zdump\ec.ini ---> Offset = 390
Behavior description: 查找文件
details: FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\1462257792.057525.exe_7zdump\MyRightBottomAlarmBigWinEdtion.txt
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\RBAlarm.txt
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\1462257792.058159.exe_7zdump\set.txt
FileName = C:\Documents and Settings\Administrator\桌面\apRWT.lnk
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\WINDOWS\system32\Ras\*.pbk
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\1462257792.060125.exe_7zdump\WebTxtB2M.txt

Network behavior

Behavior description: 连接指定站点
details: InternetConnectA: ServerName = ww***********om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
Behavior description: 打开HTTP连接
details: InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0), hSession = 0x00cc0004
Behavior description: 建立到一个指定的套接字连接
details: URL: ww***********om, IP: <FAKE_SERVER_IP>:80, SOCKET = 0x00000494
URL: ww***********om, IP: <FAKE_SERVER_IP>:80, SOCKET = 0x000005dc
URL: ww***********om, IP: <FAKE_SERVER_IP>:80, SOCKET = 0x00000498
URL: ww***********om, IP: <FAKE_SERVER_IP>:80, SOCKET = 0x00000454
URL: ww***********om, IP: <FAKE_SERVER_IP>:80, SOCKET = 0x00000424
Behavior description: 读取网络文件
details: hFile = 0x00cc000c, BytesToRead =512, BytesRead = 512.
Behavior description: 发送HTTP包
details: GET /commonaccount/archive/2013/06/12/3132538.html HTTP/1.1 Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */* Referer: http://www.cnblogs.com/commonaccount/archive/2013/06/12/3132538.html Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Host: ww***********om Cache-Control: no-cache
GET /commonaccount/archive/2013/06/15/3137207.html HTTP/1.1 Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */* Referer: http://www.cnblogs.com/commonaccount/archive/2013/06/15/3137207.html Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Host: ww***********om Cache-Control: no-cache
GET /commonaccount/archive/2013/03/26/2983468.html HTTP/1.1 Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */* Referer: http://www.cnblogs.com/commonaccount/archive/2013/03/26/2983468.html Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Host: ww***********om Cache-Control: no-cache
GET /commonaccount/p/3218095.html HTTP/1.1 Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */* Referer: http://www.cnblogs.com/commonaccount/p/3218095.html Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Host: ww***********om Cache-Control: no-cache
GET /commonaccount/archive/2013/03/26/2982125.html HTTP/1.1 Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */* Referer: http://www.cnblogs.com/commonaccount/archive/2013/03/26/2982125.html Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Host: ww***********om Cache-Control: no-cache
Behavior description: 打开HTTP请求
details: HttpOpenRequestA: ww***********om:80/commonaccount/archive/2013/06/12/3132538.html, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x80000000
HttpOpenRequestA: ww***********om:80/commonaccount/archive/2013/06/15/3137207.html, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x80000000
HttpOpenRequestA: ww***********om:80/commonaccount/archive/2013/03/26/2983468.html, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x80000000
HttpOpenRequestA: ww***********om:80/commonaccount/p/3218095.html, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x80000000
HttpOpenRequestA: ww***********om:80/commonaccount/archive/2013/03/26/2982125.html, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x80000000
Behavior description: 按名称获取主机地址
details: GetAddrInfoW: ww***********om

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Behavior description: 删除注册表键值
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL

Other behavior

Behavior description: 创建互斥体
details: RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
Local\!PrivacIE!SharedMemory!Mutex
MSCTF.Shared.MUTEX.ADG
Behavior description: 创建事件对象
details: EventName = DINPUTWINMM
EventName = Global\userenv: User Profile setup event
EventName = MSCTF.SendReceiveConection.Event.ADG.IC
EventName = MSCTF.SendReceive.Event.ADG.IC
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [,阿P软件之修改窗口标题 - 启动窗口]
NtUserFindWindowEx: [Class,Window] = [,cknhkdgwybdwbl]
NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description: 窗口信息
details: Pid = 1588, Hwnd=0x602ce, Text =   杀毒或安全类软件误报时,请放行并信任。   否则,本软件部分或全部功能得不到执行!   您也可以不信任本软件,完全删除即, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 1588, Hwnd=0x802c0, Text = 我知道了,今后不再提示, ClassName = Button(CheckBox).
Pid = 1588, Hwnd=0x402ae, Text = 重要提示:, ClassName = Afx:400000:b:10011:1900015:0.
Behavior description: 获取窗口截图信息
details: Foreground window Info: HWND = 0x00000000, DC = 0x0e010495.
Behavior description: 隐藏指定窗口
details: [Window,Class] = [标签_热键反馈,Afx:400000:b:10011:1900015:0]
[Window,Class] = [,Afx:400000:8:10011:1900015:0]
[Window,Class] = [,Afx:400000:b:10011:1900015:0]
[Window,Class] = [cknhkdgwybdwbl,ap_cknh]
[Window,Class] = [,Shell Embedding]
[Window,Class] = [,Internet Explorer_Server]