VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:88f0958912fa8f4a058577b15109841a
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 屏蔽窗口关闭消息
details: hWnd = 0x00010346, Text = www.ali213.net 汉化安装包, ClassName = AAU_FORM[TID:3120].
Behavior description: 查找PE资源信息
details: (FindResourceA) hModule = 0x00400000, ResName: /RES/YXLOADDLL.DLL, ResType: RES
Behavior description: 获取TickCount值
details: TickCount = 222425, SleepMilliseconds = 50.
TickCount = 222440, SleepMilliseconds = 50.
TickCount = 222456, SleepMilliseconds = 50.
TickCount = 222471, SleepMilliseconds = 50.
TickCount = 222487, SleepMilliseconds = 50.
TickCount = 222503, SleepMilliseconds = 50.
TickCount = 222518, SleepMilliseconds = 50.
TickCount = 222534, SleepMilliseconds = 50.
TickCount = 222550, SleepMilliseconds = 50.
TickCount = 222565, SleepMilliseconds = 50.
TickCount = 222581, SleepMilliseconds = 50.
TickCount = 222596, SleepMilliseconds = 50.
TickCount = 223096, SleepMilliseconds = 50.
TickCount = 223112, SleepMilliseconds = 50.
TickCount = 223128, SleepMilliseconds = 50.

Process behavior

Behavior description: 创建本地线程
details: TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3116, ThreadID = 3152, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3116, ThreadID = 3160, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3116, ThreadID = 3176, StartAddress = 5FE01259, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3116, ThreadID = 3180, StartAddress = 02004FE0, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3116, ThreadID = 3184, StartAddress = 76B2AEAF, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3116, ThreadID = 3188, StartAddress = 0045E051, Parameter = 0131E740
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3116, ThreadID = 3192, StartAddress = 02040130, Parameter = 01ADF108
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3116, ThreadID = 3200, StartAddress = 02C70000, Parameter = 02C60000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3116, ThreadID = 3204, StartAddress = 02C90000, Parameter = 02C80000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3116, ThreadID = 3224, StartAddress = 02C90000, Parameter = 02C80000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3116, ThreadID = 3228, StartAddress = 02D30000, Parameter = 02D20000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3116, ThreadID = 3232, StartAddress = 02D10000, Parameter = 02D00000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3116, ThreadID = 3236, StartAddress = 02D10000, Parameter = 02D00000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3116, ThreadID = 3252, StartAddress = 02D10000, Parameter = 02D00000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 3116, ThreadID = 3268, StartAddress = 02D10000, Parameter = 02D00000
Behavior description: 枚举进程
details: N/A

File behavior

Behavior description: 创建文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\YXLoadDll_1775\RES\YXLOADDLL.DLL
Behavior description: 创建可执行文件
details: C:\Documents and Settings\Administrator\Local Settings\Temp\YXLoadDll_1775\RES\YXLOADDLL.DLL
Behavior description: 修改文件内容
details: C:\Documents and Settings\Administrator\Local Settings\Temp\YXLoadDll_1775\RES\YXLOADDLL.DLL ---> Offset = 0
Behavior description: 查找文件
details: FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
FileName = C:\WINDOWS
FileName = C:\WINDOWS\system32
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\YXLoadDll_1775\res\temp\
FileName = C:\*.*
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\YXLoadDll_1775
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\YXLoadDll_1775\*.*
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\YXLoadDll_1775\RES\*.*
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\YXLoadDll_1775\RES\temp\*.*

Network behavior

Behavior description: 打开指定IE网页
details: http://ga****et/
Behavior description: 建立到一个指定的套接字连接
details: URL: so****om, IP: **.133.40.**:128, SOCKET = 0x000001a4
Behavior description: 发送HTTP包
details: GET /info/installinfo.xml HTTP/1.1 Host: so****om Accept: */* Cookie: Name=0telecomadmin
Behavior description: 按名称获取主机地址
details: GetAddrInfoW: so****om

Other behavior

Behavior description: 获取光标位置
details: CursorPos = (80,18468), SleepMilliseconds = 50.
Behavior description: 创建互斥体
details: CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
oleacc-msaa-loaded
MSCTF.Shared.MUTEX.IOH
MSCTF.Shared.MUTEX.ADM
Behavior description: 创建事件对象
details: EventName = DINPUTWINMM
EventName = MSCTF.SendReceive.Event.ADM.IC
EventName = MSCTF.SendReceiveConection.Event.ADM.IC
EventName = ShellCopyEngineRunning
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description: 窗口信息
details: Pid = 3116, Hwnd=0x10346, Text = www.ali213.net 汉化安装包, ClassName = AAU_FORM[TID:3120].
Behavior description: 获取TickCount值
details: TickCount = 222425, SleepMilliseconds = 50.
TickCount = 222440, SleepMilliseconds = 50.
TickCount = 222456, SleepMilliseconds = 50.
TickCount = 222471, SleepMilliseconds = 50.
TickCount = 222487, SleepMilliseconds = 50.
TickCount = 222503, SleepMilliseconds = 50.
TickCount = 222518, SleepMilliseconds = 50.
TickCount = 222534, SleepMilliseconds = 50.
TickCount = 222550, SleepMilliseconds = 50.
TickCount = 222565, SleepMilliseconds = 50.
TickCount = 222581, SleepMilliseconds = 50.
TickCount = 222596, SleepMilliseconds = 50.
TickCount = 223096, SleepMilliseconds = 50.
TickCount = 223112, SleepMilliseconds = 50.
TickCount = 223128, SleepMilliseconds = 50.
Behavior description: 调整进程token权限
details: SE_DEBUG_PRIVILEGE
SE_LOAD_DRIVER_PRIVILEGE
Behavior description: 屏蔽窗口关闭消息
details: hWnd = 0x00010346, Text = www.ali213.net 汉化安装包, ClassName = AAU_FORM[TID:3120].
Behavior description: 打开事件
details: HookSwitchHookEnabledEvent
_fCanRegisterWithShellService
AtlTraceModuleManager_ProcessAddedStatic3
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
Behavior description: 查找PE资源信息
details: (FindResourceA) hModule = 0x00400000, ResName: /RES/YXLOADDLL.DLL, ResType: RES
Behavior description: 可执行文件签名信息
details: C:\Documents and Settings\Administrator\Local Settings\Temp\YXLoadDll_1775\RES\YXLOADDLL.DLL(签名验证: 未通过)
Behavior description: 调用Sleep函数
details: [1]: MilliSeconds = 0.
[2]: MilliSeconds = 50.
[3]: MilliSeconds = 50.
[4]: MilliSeconds = 50.
[5]: MilliSeconds = 50.
[6]: MilliSeconds = 50.
[7]: MilliSeconds = 50.
[8]: MilliSeconds = 50.
[9]: MilliSeconds = 50.
[10]: MilliSeconds = 50.
Behavior description: 可执行文件MD5
details: C:\Documents and Settings\Administrator\Local Settings\Temp\YXLoadDll_1775\RES\YXLOADDLL.DLL ---> a43bf0efe8b3dc0e6ae58ce7df563d0c
Behavior description: 打开互斥体
details: ShimCacheMutex
Local\!IETld!Mutex
DBWinMutex
Behavior description: 加载新释放的文件
details: Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\YXLoadDll_1775\RES\YXLOADDLL.DLL.