VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:e4eb9839c6d0397da5cc49ba7b2c42ea
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 直接获取CPU时钟
details: EAX = 0xff9ef11b, EDX = 0x000000b4
EAX = 0xff9ef167, EDX = 0x000000b4
EAX = 0xff9ef1b3, EDX = 0x000000b4
EAX = 0xff9ef1ff, EDX = 0x000000b4
EAX = 0xff9ef24b, EDX = 0x000000b4
EAX = 0xff9ef297, EDX = 0x000000b4
EAX = 0xff9ef2e3, EDX = 0x000000b4
EAX = 0xff9ef32f, EDX = 0x000000b4
EAX = 0xff9ef37b, EDX = 0x000000b4
EAX = 0xff9ef3c7, EDX = 0x000000b4

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\Software\Microsoft\Multimedia\DrawDib\vga.drv 1920x973x32(BGR 0)

Other behavior

Behavior description: 创建互斥体
details: CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
MSCTF.Shared.MUTEX.MEK
Behavior description: 创建事件对象
details: EventName = DINPUTWINMM
EventName = MSCTF.SendReceive.Event.MEK.IC
EventName = MSCTF.SendReceiveConection.Event.MEK.IC
Behavior description: 打开互斥体
details: ShimCacheMutex
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description: 打开事件
details: HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
Behavior description: 窗口信息
details: Pid = 2632, Hwnd=0x10368, Text = 免费版1.6, ClassName = msctls_statusbar32.
Pid = 2632, Hwnd=0x1037c, Text = 体验3天授权版专区, ClassName = Button(GroupBox).
Pid = 2632, Hwnd=0x1037e, Text = 1元体验3天授权版通道, ClassName = Button.
Pid = 2632, Hwnd=0x1037a, Text = 授权密码:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2632, Hwnd=0x10378, Text = 授权帐号:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2632, Hwnd=0x10376, Text = 授权会员登录, ClassName = Button.
Pid = 2632, Hwnd=0x10370, Text = 购买授权账号联系客服QQ:421195687 授权账号 200元/一月, ClassName = Edit.
Pid = 2632, Hwnd=0x10356, Text = 清空列表, ClassName = Button.
Pid = 2632, Hwnd=0x10354, Text = 结束获取, ClassName = Button.
Pid = 2632, Hwnd=0x10352, Text = 开始云获取干净一手shell, ClassName = Button.
Pid = 2632, Hwnd=0x1034e, Text = 清空列表, ClassName = Button.
Pid = 2632, Hwnd=0x1034c, Text = 结束获取, ClassName = Button.
Pid = 2632, Hwnd=0x1034a, Text = 开始获取, ClassName = Button.
Pid = 2632, Hwnd=0x40346, Text = webshell云扫描器---自动化云扫描---[稳定 智能 简洁 高效], ClassName = WTWindow.
Pid = 2632, Hwnd=0x10372, Text = 123456, ClassName = Edit.
Behavior description: 隐藏指定窗口
details: [Window,Class] = [开始云获取干净一手shell,Button]
[Window,Class] = [结束获取,Button]
[Window,Class] = [清空列表,Button]
[Window,Class] = [,SysListView32]
[Window,Class] = [,_EL_Timer]
[Window,Class] = [,msctls_progress32]
[Window,Class] = [购买授权账号联系客服QQ:421195687 授权账号 200元/一月,Edit]
[Window,Class] = [,Edit]
[Window,Class] = [授权会员登录,Button]
[Window,Class] = [授权帐号:,Afx:400000:b:10011:1900015:0]
[Window,Class] = [授权密码:,Afx:400000:b:10011:1900015:0]
[Window,Class] = [体验3天授权版专区,Button]
Behavior description: 直接获取CPU时钟
details: EAX = 0xff9ef11b, EDX = 0x000000b4
EAX = 0xff9ef167, EDX = 0x000000b4
EAX = 0xff9ef1b3, EDX = 0x000000b4
EAX = 0xff9ef1ff, EDX = 0x000000b4
EAX = 0xff9ef24b, EDX = 0x000000b4
EAX = 0xff9ef297, EDX = 0x000000b4
EAX = 0xff9ef2e3, EDX = 0x000000b4
EAX = 0xff9ef32f, EDX = 0x000000b4
EAX = 0xff9ef37b, EDX = 0x000000b4
EAX = 0xff9ef3c7, EDX = 0x000000b4