VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:eae3e4f4daf0887f584e8682c3f9718c
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 连接邮件服务器
details: EHLO: SOCKET = 0x000006e0, IP: **.133.40.**:25, URL: smtp.qq.com
Behavior description: 获取邮件服务器地址
details: gethostbyname: smtp.qq.com

Process behavior

Behavior description: 创建本地线程
details: TargetProcess: 草帽变速齿轮.exe, InheritedFromPID = 1944, ProcessID = 2628, ThreadID = 2644, StartAddress = 77DC845A, Parameter = 00000000
Behavior description: 枚举进程
details: N/A

File behavior

Behavior description: 查找文件
details: FileName = C:\Documents and Settings\Administrator\桌面\*.txt
FileName = d:\*.txt
FileName = e:\*.txt
FileName = f:\*.txt
FileName = D:\My Documents\*.txt

Network behavior

Behavior description: 建立到一个指定的套接字连接
details: URL: sm****om, IP: **.133.40.**:25, SOCKET = 0x000006e0
Behavior description: 连接邮件服务器
details: EHLO: SOCKET = 0x000006e0, IP: **.133.40.**:25, URL: smtp.qq.com
Behavior description: 获取邮件服务器地址
details: gethostbyname: smtp.qq.com

Other behavior

Behavior description: 创建互斥体
details: RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.IEK
Behavior description: 隐藏指定窗口
details: [Window,Class] = [,Afx:400000:8:10011:1900015:0]
[Window,Class] = [,Edit]
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description: 窗口信息
details: Pid = 2628, Hwnd=0x9039c, Text = 命令行:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2628, Hwnd=0x1702d8, Text = 路 径:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2628, Hwnd=0x7037c, Text = 创建进程, ClassName = Button.
Pid = 2628, Hwnd=0x7038a, Text = ..., ClassName = Button.
Pid = 2628, Hwnd=0x1002c8, Text = 当前倍数:1(2^0), ClassName = Button(GroupBox).
Pid = 2628, Hwnd=0x1902ce, Text = 变速进程(DEL删除), ClassName = Button(GroupBox).
Pid = 2628, Hwnd=0x703ba, Text = 所有进程, ClassName = Button(GroupBox).
Pid = 2628, Hwnd=0x1d02bc, Text = 刷新, ClassName = Button.
Pid = 2628, Hwnd=0xd035e, Text = 草帽变速齿轮, ClassName = WTWindow.
Pid = 2628, Hwnd=0x503b0, Text = 123456, ClassName = Edit.
Pid = 2628, Hwnd=0xc03a0, Text = 123456, ClassName = Edit.
Behavior description: 打开事件
details: HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000042
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000042
MSCTF.SendReceiveConection.Event.ELH.IC
MSCTF.SendReceive.Event.ELH.IC
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000043
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000043
Behavior description: 创建事件对象
details: EventName = DINPUTWINMM
EventName = MSCTF.SendReceive.Event.IEK.IC
EventName = MSCTF.SendReceiveConection.Event.IEK.IC
Behavior description: 打开互斥体
details: RasPbFile
ShimCacheMutex