VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:a8e1bb102cf7ffe5c7fc83117050016f
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description: 隐藏指定窗口
details: [Window,Class] = [,Afx:400000:8:10011:1900015:0]
[Window,Class] = [,Afx:400000:8]

Process behavior

Behavior description: 隐藏窗口创建进程
details: ImagePath = , CmdLine = c:\windows\自动更新.bat

File behavior

Behavior description: 写权限映射文件
details: \Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
VIDEOMEMORY
AMResourceMapping2-0x0000-0x0000051e
Local\UrlZonesSM_Administrator
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description: 修改文件内容
details: C:\WINDOWS\vb_uui.ini---> Offset = 0

Network behavior

Behavior description: 连接指定站点
details: InternetConnectA: ServerName = hi.baidu.com, PORT = 80
InternetConnectA: ServerName = 1.musql.sinaapp.com, PORT = 80
InternetConnectA: ServerName = www.baidu.com, PORT = 80
Behavior description: 读取网络文件
details: hFile = 0x00000688, BytesToRead =10240, BytesRead = 10240.
hFile = 0x00000568, BytesToRead =1024, BytesRead = 1024.
hFile = 0x000004e8, BytesToRead =10240, BytesRead = 10240.
Behavior description: 打开HTTP请求
details: HttpOpenRequestA: hi.baidu.com:80/119366862626/item/af3e7a89fd7d8ce7ef083d8e, hConnect = 0x0000068c
HttpOpenRequestA: 1.musql.sinaapp.com:80/now_set.php, hConnect = 0x00000564
HttpOpenRequestA: www.baidu.com:80/s?wd=aaa短信轰炸机, hConnect = 0x00000568

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\GDIPlus\FontCachePath
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Behavior description: 删除注册表键值_IE连接设置
details: \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL

Other behavior

Behavior description: 创建互斥体
details: RasPbFile
AMResourceMutex2
VideoRenderer
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
Behavior description: 窗口信息
details: Pid = 300, Hwnd=0xa0198, Text = 软件更新, ClassName = Ex_DirectUI.
Pid = 300, Hwnd=0xd01c8, Text = 标签, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 300, Hwnd=0xc01d6, Text = AAA短信轰炸机|最强品牌, ClassName = aaa_sms.
Behavior description: 隐藏指定窗口
details: [Window,Class] = [,Afx:400000:8:10011:1900015:0]
[Window,Class] = [,Afx:400000:8]
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]