VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:64e69cf36675709a2b220629c3da7bdf
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 探测 Virtual PC是否存在
details: N/A
Behavior description: 尝试打开调试器或监控软件的驱动设备对象
details: \??\SICE
\??\SIWVID
\??\NTICE
Behavior description: 获取TickCount值
details: TickCount = 486815, SleepMilliseconds = 50.
TickCount = 486878, SleepMilliseconds = 50.
TickCount = 486893, SleepMilliseconds = 50.
TickCount = 486940, SleepMilliseconds = 50.
TickCount = 487643, SleepMilliseconds = 50.
TickCount = 487800, SleepMilliseconds = 50.
TickCount = 487909, SleepMilliseconds = 50.
TickCount = 487925, SleepMilliseconds = 50.
TickCount = 487987, SleepMilliseconds = 50.
TickCount = 488096, SleepMilliseconds = 50.
TickCount = 490940, SleepMilliseconds = 50.
TickCount = 490987, SleepMilliseconds = 50.
TickCount = 491003, SleepMilliseconds = 50.
TickCount = 491018, SleepMilliseconds = 50.
TickCount = 491050, SleepMilliseconds = 50.
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description: 查找指定内核模块
details: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> hal.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> KDCOM.DLL Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BOOTVID.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ACPI.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> WMILIB.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> pci.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> isapnp.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> compbatt.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BATTC.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> intelide.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> MountMgr.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ftdisk.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> dmload.sys Des: SoftICE驱动
Behavior description: 查找反病毒常用工具窗口
details: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]

Process behavior

Behavior description: 创建本地线程
details: TargetProcess: 音符穿越.exe, InheritedFromPID = 1944, ProcessID = 824, ThreadID = 2044, StartAddress = 0050E1FF, Parameter = 00574044
TargetProcess: 音符穿越.exe, InheritedFromPID = 1944, ProcessID = 824, ThreadID = 440, StartAddress = 0050E1FF, Parameter = 00574990
TargetProcess: 音符穿越.exe, InheritedFromPID = 1944, ProcessID = 824, ThreadID = 348, StartAddress = 0050E1FF, Parameter = 00575958
TargetProcess: 音符穿越.exe, InheritedFromPID = 1944, ProcessID = 824, ThreadID = 164, StartAddress = 0050E1FF, Parameter = 005764E9
TargetProcess: 音符穿越.exe, InheritedFromPID = 1944, ProcessID = 824, ThreadID = 300, StartAddress = 0050E1FF, Parameter = 00577094
TargetProcess: 音符穿越.exe, InheritedFromPID = 1944, ProcessID = 824, ThreadID = 1956, StartAddress = 0050E1FF, Parameter = 00577B36
TargetProcess: 音符穿越.exe, InheritedFromPID = 1944, ProcessID = 824, ThreadID = 876, StartAddress = 0050E1FF, Parameter = 005786BE
TargetProcess: 音符穿越.exe, InheritedFromPID = 1944, ProcessID = 824, ThreadID = 1456, StartAddress = 0050E1FF, Parameter = 00579154
TargetProcess: 音符穿越.exe, InheritedFromPID = 1944, ProcessID = 824, ThreadID = 1868, StartAddress = 0050E1FF, Parameter = 0057C981
TargetProcess: 音符穿越.exe, InheritedFromPID = 1944, ProcessID = 824, ThreadID = 328, StartAddress = 0050E1FF, Parameter = 0057D930
TargetProcess: 音符穿越.exe, InheritedFromPID = 1944, ProcessID = 824, ThreadID = 1180, StartAddress = 0050E1FF, Parameter = 0057EAB9
TargetProcess: 音符穿越.exe, InheritedFromPID = 1944, ProcessID = 824, ThreadID = 632, StartAddress = 0050E1FF, Parameter = 0057FBFA
TargetProcess: 音符穿越.exe, InheritedFromPID = 1944, ProcessID = 824, ThreadID = 124, StartAddress = 0050E1FF, Parameter = 00580C1A
TargetProcess: 音符穿越.exe, InheritedFromPID = 1944, ProcessID = 824, ThreadID = 716, StartAddress = 0050E1FF, Parameter = 00581B74
TargetProcess: 音符穿越.exe, InheritedFromPID = 1944, ProcessID = 824, ThreadID = 252, StartAddress = 0050E1FF, Parameter = 00582C98
Behavior description: 枚举进程
details: N/A

File behavior

Behavior description: 创建文件
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\wpad[1].dat
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description: 删除文件
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\wpad[1].dat
Behavior description: 查找文件
details: FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\WINDOWS\system32\Ras\*.pbk
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Network\Connections\Pbk\*.pbk

Network behavior

Behavior description: 联网打开网址
details: InternetOpenUrlA: http://**.133.40.**:128/wpad.dat, hInternet = 0x00cc0010, Flags = 0x00000010
Behavior description: 连接指定站点
details: InternetConnectA: ServerName = pp****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = **.133.40.**, PORT = 128, UserName = , Password = , hSession = 0x00cc0010, hConnect = 0x00cc0014, Flags = 0x00000010
Behavior description: 打开HTTP连接
details: InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0), hSession = 0x00cc0004
InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0), hSession = 0x00cc0010
Behavior description: 建立到一个指定的套接字连接
details: URL: wpad, IP: **.133.40.**:128, SOCKET = 0x00000460
URL: pp****om, IP: **.133.40.**:80, SOCKET = 0x0000045c
URL: pp****om, IP: **.133.40.**:80, SOCKET = 0x00000460
URL: pp****om, IP: **.133.40.**:80, SOCKET = 0x00000508
Behavior description: 读取网络文件
details: hFile = 0x00cc0018, BytesToRead =4010, BytesRead = 4010.
hFile = 0x00cc000c, BytesToRead =102400, BytesRead = 102400.
Behavior description: 发送HTTP包
details: GET /wpad.dat HTTP/1.1 Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Win32; Trident/4.0) Host: **.133.40.**:128
GET /code.asp HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Accept: */* Host: pp****om Cache-Control: no-cache
Behavior description: 打开HTTP请求
details: HttpOpenRequestA: pp****om:80/code.asp, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x84000000
HttpOpenRequestA: **.133.40.**:128/wpad.dat, hConnect = 0x00cc0014, hRequest = 0x00cc0018, Verb: GET, Referer: , Flags = 0x00000010
Behavior description: 按名称获取主机地址
details: GetAddrInfoW: computer
GetAddrInfoW: wpad
GetAddrInfoW: pp****om

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\音符穿越\DEBUG\Trace Level
Behavior description: 删除注册表键值
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
\REGISTRY\MACHINE\SOFTWARE\Microsoft\ESENT\Process\音符穿越\DEBUG\Trace Level

Other behavior

Behavior description: 探测 Virtual PC是否存在
details: N/A
Behavior description: 创建互斥体
details: RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
MSCTF.Shared.MUTEX.EDG
Behavior description: 创建事件对象
details: EventName = DINPUTWINMM
EventName = Global\userenv: User Profile setup event
EventName = Global\crypt32LogoffEvent
EventName = MSCTF.SendReceive.Event.EDG.IC
EventName = MSCTF.SendReceiveConection.Event.EDG.IC
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [18467-41,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
NtUserFindWindowEx: [Class,Window] = [OleMainThreadWndClass,]
Behavior description: 尝试打开调试器或监控软件的驱动设备对象
details: \??\SICE
\??\SIWVID
\??\NTICE
Behavior description: 搜索kernel32.dll基地址
details: Instruction Address = 0x0050e990
Behavior description: 窗口信息
details: Pid = 824, Hwnd=0x202c6, Text = 音符官网:www.258591.com 更多软件在音符官网 网店中..., ClassName = _EL_Label.
Pid = 824, Hwnd=0x202ca, Text = 验证码获取:关注微信公众号----发送“穿越”的字样----自动回复当日验证码, ClassName = _EL_Label.
Pid = 824, Hwnd=0x202c8, Text = 验证, ClassName = Button.
Pid = 824, Hwnd=0x202c2, Text = 验证码:, ClassName = _EL_Label.
Pid = 824, Hwnd=0x202d6, Text = 验证界面, ClassName = WTWindow.
Pid = 824, Hwnd=0x160142, Text = 确定, ClassName = Button.
Pid = 824, Hwnd=0x3015a, Text = 验证码错误,清重新获取验证码, ClassName = Static.
Pid = 824, Hwnd=0x140134, Text = 信息:, ClassName = #32770.
Pid = 824, Hwnd=0x202c4, Text = 123456, ClassName = Edit.
Pid = 824, Hwnd=0x4015a, Text = 确定, ClassName = Button.
Pid = 824, Hwnd=0x502b0, Text = 验证码错误,清重新获取验证码, ClassName = Static.
Pid = 824, Hwnd=0x170142, Text = 信息:, ClassName = #32770.
Pid = 824, Hwnd=0x5015a, Text = 确定, ClassName = Button.
Pid = 824, Hwnd=0x602b0, Text = 验证码错误,清重新获取验证码, ClassName = Static.
Pid = 824, Hwnd=0x180142, Text = 信息:, ClassName = #32770.
Behavior description: 获取TickCount值
details: TickCount = 486815, SleepMilliseconds = 50.
TickCount = 486878, SleepMilliseconds = 50.
TickCount = 486893, SleepMilliseconds = 50.
TickCount = 486940, SleepMilliseconds = 50.
TickCount = 487643, SleepMilliseconds = 50.
TickCount = 487800, SleepMilliseconds = 50.
TickCount = 487909, SleepMilliseconds = 50.
TickCount = 487925, SleepMilliseconds = 50.
TickCount = 487987, SleepMilliseconds = 50.
TickCount = 488096, SleepMilliseconds = 50.
TickCount = 490940, SleepMilliseconds = 50.
TickCount = 490987, SleepMilliseconds = 50.
TickCount = 491003, SleepMilliseconds = 50.
TickCount = 491018, SleepMilliseconds = 50.
TickCount = 491050, SleepMilliseconds = 50.
Behavior description: 查找指定内核模块
details: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> hal.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> KDCOM.DLL Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BOOTVID.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ACPI.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> WMILIB.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> pci.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> isapnp.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> compbatt.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BATTC.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> intelide.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> MountMgr.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ftdisk.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> dmload.sys Des: SoftICE驱动
Behavior description: 查找反病毒常用工具窗口
details: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]