VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:55
Behavior list
Basic Information
MD5:49afc123ca51c630ae4297d539d84064
file type:EXE
Production company:Www.NullTM.Com
version:1.2.0.0---1.2.0.0
Shell or compiler information:PACKER:UPolyX v0.5
Key behavior
Behavior description:直接调用系统关键API
details:Index = 0x0000009A, Name: NtQueryInformationProcess, Instruction Address = 0x009914D7
Index = 0x000000E5, Name: NtSetInformationThread, Instruction Address = 0x00997362
Index = 0x0000009A, Name: NtQueryInformationProcess, Instruction Address = 0x009A0C64
Behavior description:探测 Virtual PC是否存在
details:N/A
Behavior description:设置消息钩子
details:C:\WINDOWS\system32\dinput.dll
Behavior description:查询注册表_检测虚拟机相关
details:\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
Behavior description:尝试打开调试器或监控软件的驱动设备对象
details:\??\SICE
\??\SIWVID
\??\NTICE
Behavior description:获取TickCount值
details:TickCount = 219596, SleepMilliseconds = 50.
TickCount = 220362, SleepMilliseconds = 50.
TickCount = 220393, SleepMilliseconds = 50.
TickCount = 221284, SleepMilliseconds = 50.
TickCount = 221300, SleepMilliseconds = 50.
TickCount = 221331, SleepMilliseconds = 50.
TickCount = 221346, SleepMilliseconds = 50.
TickCount = 221378, SleepMilliseconds = 50.
TickCount = 221409, SleepMilliseconds = 50.
TickCount = 221440, SleepMilliseconds = 50.
TickCount = 221456, SleepMilliseconds = 50.
TickCount = 221503, SleepMilliseconds = 50.
TickCount = 221550, SleepMilliseconds = 50.
TickCount = 221565, SleepMilliseconds = 50.
TickCount = 221596, SleepMilliseconds = 50.
Behavior description:打开注册表_检测虚拟机相关
details:\REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Behavior description:屏蔽窗口关闭消息
details:hWnd = 0x00010362, Text = , ClassName = WTWindow.
Behavior description:直接获取CPU时钟
details:EAX = 0x8e6b25d2, EDX = 0x000000b5
EAX = 0x8e6b261e, EDX = 0x000000b5
EAX = 0x8e6b266a, EDX = 0x000000b5
EAX = 0x8e6b26b6, EDX = 0x000000b5
EAX = 0x8e6b2702, EDX = 0x000000b5
EAX = 0x8e6b274e, EDX = 0x000000b5
EAX = 0x8e6b279a, EDX = 0x000000b5
EAX = 0x8e6b27e6, EDX = 0x000000b5
EAX = 0x8e6b2832, EDX = 0x000000b5
EAX = 0x8e6b287e, EDX = 0x000000b5
Behavior description:查找指定内核模块
details:lstrcmpiA: ntice.sys <------> ntkrnlpa.exe Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> hal.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> KDCOM.DLL Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BOOTVID.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ACPI.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> WMILIB.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> pci.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> isapnp.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> compbatt.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BATTC.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> intelide.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> MountMgr.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ftdisk.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> dmload.sys Des: SoftICE驱动
Behavior description:查找反病毒常用工具窗口
details:NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]
Behavior description:VMWare特殊指令检测虚拟机
details:N/A
Process behavior
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2480, ThreadID = 2492, StartAddress = 007ED14F, Parameter = 00960E0B
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2480, ThreadID = 2496, StartAddress = 007ED14F, Parameter = 009617FF
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2480, ThreadID = 2500, StartAddress = 007ED14F, Parameter = 00962FDD
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2480, ThreadID = 2504, StartAddress = 007ED14F, Parameter = 00963A08
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2480, ThreadID = 2508, StartAddress = 007ED14F, Parameter = 00964585
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2480, ThreadID = 2512, StartAddress = 007ED14F, Parameter = 00965105
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2480, ThreadID = 2516, StartAddress = 007ED14F, Parameter = 00965B2E
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2480, ThreadID = 2520, StartAddress = 007ED14F, Parameter = 00966630
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2480, ThreadID = 2524, StartAddress = 007ED14F, Parameter = 00969384
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2480, ThreadID = 2528, StartAddress = 007ED14F, Parameter = 0096A395
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2480, ThreadID = 2532, StartAddress = 007ED14F, Parameter = 0096B90A
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2480, ThreadID = 2536, StartAddress = 007ED14F, Parameter = 0096C825
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2480, ThreadID = 2540, StartAddress = 007ED14F, Parameter = 0096D67B
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2480, ThreadID = 2544, StartAddress = 007ED14F, Parameter = 0096E664
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2480, ThreadID = 2548, StartAddress = 007ED14F, Parameter = 0096F6B3
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:覆盖已有文件
details:C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
Behavior description:查找文件
details:FileName = C:\Documents and Settings\Administrator\Application Data\\黑洞OCR小程序配置.ini
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\MediaProperties\PrivateProperties\DirectInput\VID_80EE&PID_0021\Calibration\0\GUID
\REGISTRY\USER\S-*\Software\Microsoft\DirectInput\MostRecentApplication\Version
\REGISTRY\USER\S-*\Software\Microsoft\DirectInput\MostRecentApplication\Name
\REGISTRY\USER\S-*\Software\Microsoft\DirectInput\MostRecentApplication\Id
\REGISTRY\USER\S-*\Software\Microsoft\DirectInput\MostRecentApplication\MostRecentStart
Behavior description:删除注册表键值
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\%temp%\****.exe
Behavior description:打开注册表_检测虚拟机相关
details:\REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Behavior description:查询注册表_检测虚拟机相关
details:\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
Other behavior
Behavior description:直接调用系统关键API
details:Index = 0x0000009A, Name: NtQueryInformationProcess, Instruction Address = 0x009914D7
Index = 0x000000E5, Name: NtSetInformationThread, Instruction Address = 0x00997362
Index = 0x0000009A, Name: NtQueryInformationProcess, Instruction Address = 0x009A0C64
Behavior description:探测 Virtual PC是否存在
details:N/A
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
DDrawWindowListMutex
DDrawDriverObjectListMutex
__DDrawExclMode__
__DDrawCheckExclMode__
DirectSound DllMain mutex (0x000009B0)
MSCTF.Shared.MUTEX.IOH
DirectInput.{89521361-AA8A-11CF-BFC7-444553540000}
DirectInput.{5944E682-C92E-11CF-BFC7-444553540000}
MSCTF.Shared.MUTEX.ELJ
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = __REALITYLAB_INIT_EVENT__
EventName = Global\crypt32LogoffEvent
EventName = MSCTF.SendReceive.Event.ELJ.IC
EventName = MSCTF.SendReceiveConection.Event.ELJ.IC
Behavior description:窗口信息
details:Pid = 2480, Hwnd=0x2034a, Text = 确定, ClassName = Button.
Pid = 2480, Hwnd=0x2034e, Text = 运行时出错! 错误信息:指定窗口或窗口组件不存在或尚未载入 , ClassName = Static.
Pid = 2480, Hwnd=0x20346, Text = 错误, ClassName = #32770.
Behavior description:打开互斥体
details:DBWinMutex
ShimCacheMutex
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [18467-41,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:尝试打开调试器或监控软件的驱动设备对象
details:\??\SICE
\??\SIWVID
\??\NTICE
Behavior description:搜索kernel32.dll基地址
details:Instruction Address = 0x007eead0
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:屏蔽窗口关闭消息
details:hWnd = 0x00010362, Text = , ClassName = WTWindow.
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
DINPUTWINMM
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
Global\crypt32LogoffEvent
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 50.
Behavior description:隐藏指定窗口
details:[Window,Class] = [,WindowEx]
[Window,Class] = [,LabelEx]
[Window,Class] = [,ButtonEx]
[Window,Class] = [,_EL_Timer]
[Window,Class] = [,PictureEx]
[Window,Class] = [,ChoiceboxEx]
[Window,Class] = [,Afx:400000:b:10011:0:0]
Behavior description:获取光标位置
details:CursorPos = (80,18468), SleepMilliseconds = 50.
CursorPos = (6373,26501), SleepMilliseconds = 50.
Behavior description:获取TickCount值
details:TickCount = 219596, SleepMilliseconds = 50.
TickCount = 220362, SleepMilliseconds = 50.
TickCount = 220393, SleepMilliseconds = 50.
TickCount = 221284, SleepMilliseconds = 50.
TickCount = 221300, SleepMilliseconds = 50.
TickCount = 221331, SleepMilliseconds = 50.
TickCount = 221346, SleepMilliseconds = 50.
TickCount = 221378, SleepMilliseconds = 50.
TickCount = 221409, SleepMilliseconds = 50.
TickCount = 221440, SleepMilliseconds = 50.
TickCount = 221456, SleepMilliseconds = 50.
TickCount = 221503, SleepMilliseconds = 50.
TickCount = 221550, SleepMilliseconds = 50.
TickCount = 221565, SleepMilliseconds = 50.
TickCount = 221596, SleepMilliseconds = 50.
Behavior description:直接获取CPU时钟
details:EAX = 0x8e6b25d2, EDX = 0x000000b5
EAX = 0x8e6b261e, EDX = 0x000000b5
EAX = 0x8e6b266a, EDX = 0x000000b5
EAX = 0x8e6b26b6, EDX = 0x000000b5
EAX = 0x8e6b2702, EDX = 0x000000b5
EAX = 0x8e6b274e, EDX = 0x000000b5
EAX = 0x8e6b279a, EDX = 0x000000b5
EAX = 0x8e6b27e6, EDX = 0x000000b5
EAX = 0x8e6b2832, EDX = 0x000000b5
EAX = 0x8e6b287e, EDX = 0x000000b5
Behavior description:查找指定内核模块
details:lstrcmpiA: ntice.sys <------> ntkrnlpa.exe Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> hal.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> KDCOM.DLL Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BOOTVID.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ACPI.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> WMILIB.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> pci.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> isapnp.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> compbatt.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BATTC.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> intelide.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> MountMgr.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ftdisk.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> dmload.sys Des: SoftICE驱动
Behavior description:查找反病毒常用工具窗口
details:NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]
Behavior description:VMWare特殊指令检测虚拟机
details:N/A
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号