VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

文件信息
安全评分 :79
基本信息
MD5:10bdc4e4e9f95b860fc45d2c1c4776e7
文件类型:zip
出品公司:
版本:
壳或编译器信息:
子文件信息:gfienc.dll / c5a9d198eb5532174b075246fa2270cf / DLL
rditr.dll / ef46475224a17026846bcec3ce42efd3 / EXE
GetFlashInfo.exe / 346193c741c5336f17c857979f00e3db / EXE
ReadMe.txt / 6406a2515763f995cb2611097474fbbf / Unknown
File_id.diz / fc375cbf8fb4c220507728e86a099eb6 / Unknown
readme.txt / 7a70999f19336bf1c474867a085c2012 / Unknown
关键行为
行为描述:隐藏指定窗口
详情信息:[Window,Class] = [Flash Drive Information Extractor 8.4.0.587,TF1]
行为描述:屏蔽窗口关闭消息
详情信息:hWnd = 0x000302ca, Text = Flash Drive Information Extractor 8.4.0.587, ClassName = TF1.
行为描述:写权限映射文件
详情信息:CiceroSharedMemDefaultS-*
MSCTF.MarshalInterface.FileMap.IGE..FMOGH
MSCTF.MarshalInterface.FileMap.IGE.B.FMOGH
MSCTF.MarshalInterface.FileMap.IGE.C.FMOGH
MSCTF.MarshalInterface.FileMap.IGE.D.FMOGH
MSCTF.MarshalInterface.FileMap.IGE.E.FMOGH
MSCTF.MarshalInterface.FileMap.IGE.F.FMOGH
MSCTF.MarshalInterface.FileMap.IGE.G.FNOGH
MSCTF.Shared.SFM.IGE
行为描述:查询注册表_检测虚拟机相关
详情信息:\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
行为描述:查找指定内核模块
详情信息:lstrcmpiA: ntice.sys <------> ntkrnlpa.exe (ntice.sys)
lstrcmpiA: ntice.sys <------> hal.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> KDCOM.DLL (ntice.sys)
lstrcmpiA: ntice.sys <------> BOOTVID.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> ACPI.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> WMILIB.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> pci.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> isapnp.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> compbatt.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> BATTC.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> intelide.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> MountMgr.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> ftdisk.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> dmload.sys (ntice.sys)
行为描述:查找反病毒常用工具窗口
详情信息:NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
进程行为
行为描述:创建进程
详情信息:ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1444969702.518373.exe_7zdump\usbflashinfo\rditr.dll, CmdLine = rditr.dll
行为描述:枚举进程
详情信息:N/A
文件行为
行为描述:写权限映射文件
详情信息:CiceroSharedMemDefaultS-*
MSCTF.MarshalInterface.FileMap.IGE..FMOGH
MSCTF.MarshalInterface.FileMap.IGE.B.FMOGH
MSCTF.MarshalInterface.FileMap.IGE.C.FMOGH
MSCTF.MarshalInterface.FileMap.IGE.D.FMOGH
MSCTF.MarshalInterface.FileMap.IGE.E.FMOGH
MSCTF.MarshalInterface.FileMap.IGE.F.FMOGH
MSCTF.MarshalInterface.FileMap.IGE.G.FNOGH
MSCTF.Shared.SFM.IGE
行为描述:查找文件
详情信息:FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1444969705.879225.exe_7zdump\usbflashinfo\GetFlashInfo.exe
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1444969705.882729.exe_7zdump\usbflashinfo\*.dat
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1444969705.886232.exe_7zdump\usbflashinfo\*r.dll
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1444969705.889727.exe_7zdump\usbflashinfo\rditr.dll
注册表行为
行为描述:修改注册表
详情信息:\REGISTRY\USER\S-*\Software\AntSpec\GetFlashInfo\ReadMeWasShown
\REGISTRY\USER\S-*\Software\AntSpec\GetFlashInfo\FormLeft
\REGISTRY\USER\S-*\Software\AntSpec\GetFlashInfo\FormTop
\REGISTRY\USER\S-*\Software\AntSpec\GetFlashInfo\Version
\REGISTRY\USER\S-*\Software\AntSpec\GetFlashInfo\ContMeasID2
其他行为
行为描述:创建互斥体
详情信息:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
{C6384100-2F2D-4F8B-BAD4-4D5FFB35BA15}
{39F94AAA-3B79-420E-B49E-68EAF269A74C}
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.IGE
行为描述:隐藏指定窗口
详情信息:[Window,Class] = [Flash Drive Information Extractor 8.4.0.587,TF1]
行为描述:查找指定窗口
详情信息:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
行为描述:枚举窗口
详情信息:N/A
行为描述:尝试打开调试器或监控软件的驱动设备对象
详情信息:\??\SICE
\??\SIWVID
\??\NTICE
行为描述:屏蔽窗口关闭消息
详情信息:hWnd = 0x000302ca, Text = Flash Drive Information Extractor 8.4.0.587, ClassName = TF1.
行为描述:窗口信息
详情信息:Pid = 792, Hwnd=0x302c6, Text = To start the measurement, click the "Get USB Flash Drive Information" button. Be sure that all activities that have access to , ClassName = TMemo.
Pid = 792, Hwnd=0x302b6, Text = 橡钿铍骅螯, ClassName = TButton.
Pid = 792, Hwnd=0x702c0, Text = <镳邃忄痂蝈朦睇?蝈犟? , ClassName = TMemo.
Pid = 792, Hwnd=0x202ac, Text = Get USB Flash Drive Information, ClassName = TButton.
Pid = 792, Hwnd=0x202aa, Text = Get USB Flash Drive Information, ClassName = TButton.
Pid = 792, Hwnd=0x302ca, Text = Flash Drive Information Extractor 8.4.0.587, ClassName = TF1.
行为描述:查询注册表_检测虚拟机相关
详情信息:\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
行为描述:查找指定内核模块
详情信息:lstrcmpiA: ntice.sys <------> ntkrnlpa.exe (ntice.sys)
lstrcmpiA: ntice.sys <------> hal.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> KDCOM.DLL (ntice.sys)
lstrcmpiA: ntice.sys <------> BOOTVID.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> ACPI.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> WMILIB.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> pci.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> isapnp.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> compbatt.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> BATTC.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> intelide.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> MountMgr.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> ftdisk.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> dmload.sys (ntice.sys)
行为描述:查找反病毒常用工具窗口
详情信息:NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
运行截图
VirSCAN

About VirSCAN | Privacy Policy | Contact us | link | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号