VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:74
Behavior list
Basic Information
MD5:9b8c74ac26d7f29a2e068baabae6edff
file type:Rar
Production company:
version:
Shell or compiler information:PACKER:UPolyX v0.5
Subfile information:京东火牛-下单抢购软件1039.exe / 59eaa77324074cb91784d7c80d5e6f7c / EXE
CrackCaptchaAPI.dll / bea434be6a3019e0f9190294353e1ab3 / DLL
MayiAPI.dll / 27b1d31a38492bf067ee737eb4590c02 / DLL
yundamaAPI.dll / fff1dfa66b7ebf72c477df60bb6b62d7 / DLL
FastVerCode.dll / 9a9d4eb4671b83505bdbc23b19245b01 / DLL
UUWiseHelper.dll / afd14de763f7c540e686afdc55281039 / DLL
MiMidama.dll / 2db2810b0905089a6c18956cf81d9c1a / DLL
update.exe / ec533494d3299a28fa60084d93a87677 / EXE
dc.dll / f803ad370a8649a143429f179af5f3ab / DLL
woniu.dll / 9af719d4a2b40c18326708a175db7ded / DLL
SESDKDummy64.dll / bf3e0860ef672dbf0d831205c7ae7275 / DLL
SESDKDummy.dll / 66de92b4ef6b9dd67952f8aec842792f / DLL
systemvc.dll / 8fea41d07b5ffbb7f8ed5cab7594698f / DLL
gzip.dll / 5eb4e7c1a48e211c2645080d4fb9d7b4 / DLL
SESDKDummy.lib / 599d91e1e8cf3b5a5e4e6dc2d146aac1 / Ar
Key behavior
Behavior description:直接获取CPU时钟
details:EAX = 0x37440d8b, EDX = 0x000000b9
EAX = 0x37440dd7, EDX = 0x000000b9
EAX = 0x37440e23, EDX = 0x000000b9
EAX = 0x37440e6f, EDX = 0x000000b9
EAX = 0x37440ebb, EDX = 0x000000b9
EAX = 0x37440f07, EDX = 0x000000b9
EAX = 0x37440f53, EDX = 0x000000b9
EAX = 0x37440f9f, EDX = 0x000000b9
EAX = 0x37440feb, EDX = 0x000000b9
EAX = 0x37441037, EDX = 0x000000b9
Behavior description:尝试打开调试器或监控软件的驱动设备对象
details:\??\NTICE
Behavior description:获取窗口截图信息
details:Foreground window Info: HWND = 0x000103f4, DC = 0x03010812.
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:直接调用系统关键API
details:Index = 0x000000E5, Name: NtSetInformationThread, Instruction Address = 0x015B2BFE
Index = 0x0000009B, Name: NtQueryInformationThread, Instruction Address = 0x0150D1C0
Index = 0x000000E5, Name: NtSetInformationThread, Instruction Address = 0x0157EACB
Behavior description:查找反病毒常用工具窗口
details:NtUserFindWindowEx: [Class,Window] = [Regmonclass,]
NtUserFindWindowEx: [Class,Window] = [Filemonclass,]
Process behavior
Behavior description:创建本地线程
details:TargetProcess: 京东火牛-下单抢购软件1039.exe, InheritedFromPID = 2000, ProcessID = 3460, ThreadID = 3472, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: 京东火牛-下单抢购软件1039.exe, InheritedFromPID = 2000, ProcessID = 3460, ThreadID = 3652, StartAddress = 0150DD0D, Parameter = 001BAFE0
TargetProcess: 京东火牛-下单抢购软件1039.exe, InheritedFromPID = 2000, ProcessID = 3460, ThreadID = 3656, StartAddress = 0150DD0D, Parameter = 001BAFE0
TargetProcess: 京东火牛-下单抢购软件1039.exe, InheritedFromPID = 2000, ProcessID = 3460, ThreadID = 3660, StartAddress = 0150DD0D, Parameter = 001DA0D0
TargetProcess: 京东火牛-下单抢购软件1039.exe, InheritedFromPID = 2000, ProcessID = 3460, ThreadID = 3664, StartAddress = 0150DD0D, Parameter = 001BAFE0
TargetProcess: 京东火牛-下单抢购软件1039.exe, InheritedFromPID = 2000, ProcessID = 3460, ThreadID = 3668, StartAddress = 0150DD0D, Parameter = 001DA0D0
TargetProcess: 京东火牛-下单抢购软件1039.exe, InheritedFromPID = 2000, ProcessID = 3460, ThreadID = 3672, StartAddress = 0150DD0D, Parameter = 001BAFE0
TargetProcess: 京东火牛-下单抢购软件1039.exe, InheritedFromPID = 2000, ProcessID = 3460, ThreadID = 3676, StartAddress = 0150DD0D, Parameter = 001DA0D0
TargetProcess: 京东火牛-下单抢购软件1039.exe, InheritedFromPID = 2000, ProcessID = 3460, ThreadID = 3680, StartAddress = 0150DD0D, Parameter = 001BAFE0
TargetProcess: 京东火牛-下单抢购软件1039.exe, InheritedFromPID = 2000, ProcessID = 3460, ThreadID = 3684, StartAddress = 0150DD0D, Parameter = 001BAFE0
TargetProcess: 京东火牛-下单抢购软件1039.exe, InheritedFromPID = 2000, ProcessID = 3460, ThreadID = 3896, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: 京东火牛-下单抢购软件1039.exe, InheritedFromPID = 2000, ProcessID = 3460, ThreadID = 3900, StartAddress = 7C930230, Parameter = 00000000
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:创建文件
details:C:\kss.ini
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\io[1].php
Behavior description:删除文件
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\io[1].php
Behavior description:修改文件内容
details:C:\kss.ini ---> Offset = 0
C:\kss.ini ---> Offset = 21
C:\kss.ini ---> Offset = 160
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:查找文件
details:FileName = c:\windows\system32\drivers\etc\hosts
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\WINDOWS\system32\Ras\*.pbk
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\Documents and Settings\Administrator\Local Settings\History\History.IE5\MSHist012016091220160913\*.*
Network behavior
Behavior description:连接指定站点
details:InternetConnectA: ServerName = ww****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
Behavior description:打开HTTP连接
details:InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489), hSession = 0x00cc0004
Behavior description:建立到一个指定的套接字连接
details:URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000360
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000200
URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000374
Behavior description:读取网络文件
details:hFile = 0x00cc000c, BytesToRead =4096, BytesRead = 4096.
Behavior description:发送HTTP包
details:GET /kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000001&&lgid=0&f=&x=36545234578 HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSiE 6.0; Windows NT 5.1;) Accept-Encoding: gzip, deflate Host: ww****om Connection: Keep-Alive
GET /kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000001&lgid=0&f=&x=36545236343 HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSiE 6.0; Windows NT 5.1;) Accept-Encoding: gzip, deflate Host: ww****om Connection: Keep-Alive
POST /kss_api/io.php?apiver=905&&lgid=0&f=&x=36545237656 HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSiE 6.0; Windows NT 5.1;) Content-Type: application/x-www-form-urlencoded Accept-Encoding: gzip, deflate Host: ww****om Content-Length: 201 Connection: Keep-Alive Cache-Control: no-cache
Behavior description:打开HTTP请求
details:HttpOpenRequestA: ww****om:80/kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000001&&lgid=0&f=&x=36545234578, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400000
HttpOpenRequestA: ww****om:80/kss_api/io.php?a=uplog&apiver=905&c=0&gdata=1&softcode=1000001&lgid=0&f=&x=36545236343, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400000
HttpOpenRequestA: ww****om:80/kss_api/io.php?apiver=905&&lgid=0&f=&x=36545237656, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: POST, Referer: , Flags = 0x04600000
Behavior description:按名称获取主机地址
details:GetAddrInfoW: ww****om
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Multimedia\DrawDib\vga.drv 1920x973x32(BGR 0)
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Behavior description:删除注册表键值
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyOverride
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
\REGISTRY\MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW\DWFileTreeRoot
Behavior description:删除注册表键
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW\
Other behavior
Behavior description:直接调用系统关键API
details:Index = 0x000000E5, Name: NtSetInformationThread, Instruction Address = 0x015B2BFE
Index = 0x0000009B, Name: NtQueryInformationThread, Instruction Address = 0x0150D1C0
Index = 0x000000E5, Name: NtSetInformationThread, Instruction Address = 0x0157EACB
Behavior description:创建互斥体
details:RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
ini_read_write
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
MSCTF.Shared.MUTEX.IOH
Lock-d68e9c847211060c
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = Global\userenv: User Profile setup event
Behavior description:窗口信息
details:Pid = 3460, Hwnd=0x10410, Text = 网盘下载:http://pan.baidu.com/s/1mgkyEbY, ClassName = Edit.
Pid = 3460, Hwnd=0x1040e, Text = 火牛软件工作室(以下简称火牛)提醒您: 1.在使用本软件前,请您务必仔细阅读并透彻理解本声明。您可以选择不使用本软件,但如果您使用本软件,您的使用行为将被视为对本声明全部内容的认可。 2.本软件功能由客户定制开发,火牛只负责软件开发技术服务,您应该对使用本软件的结果自行承担风险,不得用于违法犯罪活动,火牛不做任何形式不包含在本协议内的保证,不承担任何法律责任。 3.本软件保证不含任何病毒、木马等破坏或者盗取用户数据的恶意代码,不会对计算机信息系统中存储、处理或者传输的数据和应用程序进行删除、修改, ClassName = _EL_Label.
Pid = 3460, Hwnd=0x1040c, Text = 软件试用账号:minibel 试用密码:minibel, ClassName = _EL_Label.
Pid = 3460, Hwnd=0x10406, Text = MZ?, ClassName = Edit.
Pid = 3460, Hwnd=0x10402, Text = 查 询, ClassName = Button.
Pid = 3460, Hwnd=0x10400, Text = 请输入用户名或注册卡号, ClassName = Edit.
Pid = 3460, Hwnd=0x103fc, Text = 1, ClassName = Edit.
Pid = 3460, Hwnd=0x103fa, Text = 通道号, ClassName = _EL_Label.
Pid = 3460, Hwnd=0x103f8, Text = 解除绑定, ClassName = Button.
Pid = 3460, Hwnd=0x103f6, Text = 记住密码, ClassName = Button(CheckBox).
Pid = 3460, Hwnd=0x103f4, Text = 登陆软件, ClassName = Button.
Pid = 3460, Hwnd=0x103f2, Text = 检查更新, ClassName = Button(CheckBox).
Pid = 3460, Hwnd=0x103ee, Text = 登陆密码:, ClassName = _EL_Label.
Pid = 3460, Hwnd=0x103ea, Text = 用户帐号:, ClassName = _EL_Label.
Pid = 3460, Hwnd=0x10408, Text = 确认登陆密码:, ClassName = _EL_Label.
Behavior description:打开互斥体
details:RasPbFile
ShimCacheMutex
Local\_!MSFTHISTORY!_
Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Local\c:!documents and settings!administrator!cookies!
Local\c:!documents and settings!administrator!local settings!history!history.ie5!
Local\WininetStartupMutex
Local\WininetConnectionMutex
Local\WininetProxyRegistryMutex
Local\!IETld!Mutex
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [4823-00000029,]
NtUserFindWindowEx: [Class,Window] = [18467-41,]
NtUserFindWindowEx: [Class,Window] = [,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
Behavior description:尝试打开调试器或监控软件的驱动设备对象
details:\??\NTICE
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Global\SvcctrlStartEvent_A3752DX
\INSTALLATION_SECURITY_HOLD
CTF.ThreadMIConnectionEvent.000007E8.00000000.0000000F
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.0000000F
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
Behavior description:获取窗口截图信息
details:Foreground window Info: HWND = 0x000103f4, DC = 0x03010812.
Behavior description:直接获取CPU时钟
details:EAX = 0x37440d8b, EDX = 0x000000b9
EAX = 0x37440dd7, EDX = 0x000000b9
EAX = 0x37440e23, EDX = 0x000000b9
EAX = 0x37440e6f, EDX = 0x000000b9
EAX = 0x37440ebb, EDX = 0x000000b9
EAX = 0x37440f07, EDX = 0x000000b9
EAX = 0x37440f53, EDX = 0x000000b9
EAX = 0x37440f9f, EDX = 0x000000b9
EAX = 0x37440feb, EDX = 0x000000b9
EAX = 0x37441037, EDX = 0x000000b9
Behavior description:查找反病毒常用工具窗口
details:NtUserFindWindowEx: [Class,Window] = [Regmonclass,]
NtUserFindWindowEx: [Class,Window] = [Filemonclass,]
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号