VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:c829b684424de013bba5e4f3ba65c6a4
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 检测自身是否被调试
details: N/A
Behavior description: 探测 Virtual PC是否存在
details: N/A
Behavior description: 尝试打开调试器或监控软件的驱动设备对象
details: \??\SICE
\??\SIWVID
\??\NTICE
Behavior description: 获取TickCount值
details: TickCount = 5353893, SleepMilliseconds = 50.
TickCount = 5353909, SleepMilliseconds = 50.
TickCount = 5353940, SleepMilliseconds = 50.
TickCount = 5354003, SleepMilliseconds = 50.
TickCount = 5354018, SleepMilliseconds = 50.
TickCount = 5354112, SleepMilliseconds = 50.
TickCount = 5355393, SleepMilliseconds = 50.
TickCount = 5355409, SleepMilliseconds = 50.
TickCount = 5355440, SleepMilliseconds = 50.
TickCount = 5355768, SleepMilliseconds = 50.
TickCount = 5355831, SleepMilliseconds = 50.
TickCount = 5355878, SleepMilliseconds = 50.
TickCount = 5355893, SleepMilliseconds = 50.
TickCount = 5355909, SleepMilliseconds = 50.
TickCount = 5355925, SleepMilliseconds = 50.
Behavior description: 屏蔽窗口关闭消息
details: hWnd = 0x001902fe, Text = 自由门7.59专业版, ClassName = #32770.
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description: 查询注册表_检测虚拟机相关
details: \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
Behavior description: 查找指定内核模块
details: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> hal.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> KDCOM.DLL Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BOOTVID.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ACPI.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> WMILIB.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> pci.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> isapnp.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> compbatt.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BATTC.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> intelide.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> MountMgr.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ftdisk.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> dmload.sys Des: SoftICE驱动
Behavior description: 查找反病毒常用工具窗口
details: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]

Process behavior

Behavior description: 创建本地线程
details: TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 576, ThreadID = 896, StartAddress = 007005DF, Parameter = 00992CF2
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 576, ThreadID = 1552, StartAddress = 007005DF, Parameter = 009935C7
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 576, ThreadID = 1384, StartAddress = 007005DF, Parameter = 0099474E
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 576, ThreadID = 792, StartAddress = 007005DF, Parameter = 00995200
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 576, ThreadID = 1980, StartAddress = 007005DF, Parameter = 00995CD1
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 576, ThreadID = 388, StartAddress = 007005DF, Parameter = 009967A9
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 576, ThreadID = 164, StartAddress = 007005DF, Parameter = 00997249
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 576, ThreadID = 1996, StartAddress = 007005DF, Parameter = 00997D8B
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 576, ThreadID = 444, StartAddress = 007005DF, Parameter = 0099A1DB
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 576, ThreadID = 252, StartAddress = 007005DF, Parameter = 0099B12B
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 576, ThreadID = 1012, StartAddress = 007005DF, Parameter = 0099CBF8
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 576, ThreadID = 1360, StartAddress = 007005DF, Parameter = 0099DBFE
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 576, ThreadID = 1372, StartAddress = 007005DF, Parameter = 0099ED04
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 576, ThreadID = 556, StartAddress = 007005DF, Parameter = 0099FD0A
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 576, ThreadID = 764, StartAddress = 007005DF, Parameter = 009A0ED1
Behavior description: 枚举进程
details: N/A

File behavior

Behavior description: 创建文件
details: C:\Documents and Settings\Administrator\Local Settings\%temp%\fg.ini
C:\Documents and Settings\Administrator\Local Settings\%temp%\dtwpc.dat
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description: 修改文件内容
details: C:\Documents and Settings\Administrator\Local Settings\%temp%\fg.ini ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\%temp%\fg.ini ---> Offset = 27
C:\Documents and Settings\Administrator\Local Settings\%temp%\fg.ini ---> Offset = 39
C:\Documents and Settings\Administrator\Local Settings\%temp%\fg.ini ---> Offset = 55
C:\Documents and Settings\Administrator\Local Settings\%temp%\fg.ini ---> Offset = 71
C:\Documents and Settings\Administrator\Local Settings\%temp%\dtwpc.dat ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\%temp%\dtwpc.dat ---> Offset = 217
C:\Documents and Settings\Administrator\Local Settings\%temp%\dtwpc.dat ---> Offset = 270
C:\Documents and Settings\Administrator\Local Settings\%temp%\dtwpc.dat ---> Offset = 486
C:\Documents and Settings\Administrator\Local Settings\%temp%\dtwpc.dat ---> Offset = 499
C:\Documents and Settings\Administrator\Local Settings\%temp%\fg.ini ---> Offset = 84
C:\Documents and Settings\Administrator\Local Settings\%temp%\fg.ini ---> Offset = 125
Behavior description: 查找文件
details: FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\*.lang
FileName = C:\WINDOWS\*
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\fg.ini
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\WINDOWS\system32\Ras\*.pbk
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Network\Connections\Pbk\*.pbk

Network behavior

Behavior description: 建立到一个指定的套接字连接
details: URL: dv****et, IP: **.133.40.**:443, SOCKET = 0x00000464
URL: d2****et, IP: **.133.40.**:443, SOCKET = 0x00000454
URL: , IP: **.85.155.**:443, SOCKET = 0x00000450
URL: d2****et, IP: **.133.40.**:443, SOCKET = 0x00000448
URL: , IP: **.85.83.**:443, SOCKET = 0x0000044c
URL: dv****et, IP: **.133.40.**:443, SOCKET = 0x0000045c
URL: d2****et, IP: **.133.40.**:443, SOCKET = 0x0000044c
URL: , IP: **.85.83.**:443, SOCKET = 0x00000448
URL: , IP: **.85.82.**:443, SOCKET = 0x0000044c
URL: dv****et, IP: **.133.40.**:443, SOCKET = 0x00000448
URL: d2****et, IP: **.133.40.**:443, SOCKET = 0x00000444
URL: , IP: **.85.82.**:443, SOCKET = 0x00000440
URL: d2****et, IP: **.133.40.**:443, SOCKET = 0x00000440
URL: , IP: **.85.83.**:443, SOCKET = 0x00000444
Behavior description: 按名称获取主机地址
details: gethostbyname: computer
gethostbyname: d2****et
gethostbyname: dv****et

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Kufdufhz
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Behavior description: 删除注册表键值
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Run\~rkbavrd
Behavior description: 查询注册表_检测虚拟机相关
details: \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion

Other behavior

Behavior description: 探测 Virtual PC是否存在
details: N/A
Behavior description: 创建互斥体
details: RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.MIG
Behavior description: 窗口信息
details: Pid = 576, Hwnd=0x503b0, Text = 确定, ClassName = Button.
Pid = 576, Hwnd=0x703ba, Text = 取消, ClassName = Button.
Pid = 576, Hwnd=0x40392, Text = 所有网站都通过自由门代理访问, ClassName = Button(RadioButton).
Pid = 576, Hwnd=0x403a2, Text = 国内网站直通,不通过自由门代理 (访问国内网站,不隐藏IP), ClassName = Button(RadioButton).
Pid = 576, Hwnd=0x1702d8, Text = 添加, ClassName = Button.
Pid = 576, Hwnd=0x9039c, Text = 删除, ClassName = Button.
Pid = 576, Hwnd=0x1d02bc, Text = 添加, ClassName = Button.
Pid = 576, Hwnd=0x603ac, Text = 删除, ClassName = Button.
Pid = 576, Hwnd=0xc03a0, Text = 添加, ClassName = Button.
Pid = 576, Hwnd=0x1302c4, Text = 删除, ClassName = Button.
Pid = 576, Hwnd=0x10034c, Text = 只允许通过自由门代理访问安全白名单上的网站, ClassName = Button(RadioButton).
Pid = 576, Hwnd=0x13033a, Text = 保证以下网站通过自由门代理,即使在以上直通网站列表中有匹配, ClassName = Static.
Pid = 576, Hwnd=0xe039e, Text = 安全白名单网站列表, ClassName = Static.
Pid = 576, Hwnd=0xb0398, Text = 直通网站列表, ClassName = Static.
Pid = 576, Hwnd=0x110342, Text = 程序启动时不显示本窗口(可在设置窗口下修改选项), ClassName = Button(CheckBox).
Behavior description: 创建事件对象
details: EventName = DINPUTWINMM
EventName = Global\crypt32LogoffEvent
EventName = Global\userenv: User Profile setup event
EventName = 
EventName = MSCTF.SendReceive.Event.MIG.IC
EventName = MSCTF.SendReceiveConection.Event.MIG.IC
Behavior description: 检测自身是否被调试
details: N/A
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [18467-41,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description: 尝试打开调试器或监控软件的驱动设备对象
details: \??\SICE
\??\SIWVID
\??\NTICE
Behavior description: 搜索kernel32.dll基地址
details: Instruction Address = 0x00701a6b
Behavior description: 调整进程token权限
details: SE_LOAD_DRIVER_PRIVILEGE
Behavior description: 屏蔽窗口关闭消息
details: hWnd = 0x001902fe, Text = 自由门7.59专业版, ClassName = #32770.
Behavior description: 打开事件
details: HookSwitchHookEnabledEvent
Global\crypt32LogoffEvent
Global\SvcctrlStartEvent_A3752DX
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
\INSTALLATION_SECURITY_HOLD
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000041
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000041
MSCTF.SendReceiveConection.Event.ELH.IC
MSCTF.SendReceive.Event.ELH.IC
Behavior description: 调用Sleep函数
details: [1]: MilliSeconds = 500.
[2]: MilliSeconds = 500.
[3]: MilliSeconds = 500.
[4]: MilliSeconds = 500.
[5]: MilliSeconds = 500.
[6]: MilliSeconds = 500.
[7]: MilliSeconds = 500.
[8]: MilliSeconds = 500.
[9]: MilliSeconds = 500.
[10]: MilliSeconds = 500.
Behavior description: 隐藏指定窗口
details: [Window,Class] = [,ComboLBox]
[Window,Class] = [,tooltips_class32]
[Window,Class] = [ReSearch,Button]
[Window,Class] = [,#32770]
[Window,Class] = [,Static]
Behavior description: 获取TickCount值
details: TickCount = 5353893, SleepMilliseconds = 50.
TickCount = 5353909, SleepMilliseconds = 50.
TickCount = 5353940, SleepMilliseconds = 50.
TickCount = 5354003, SleepMilliseconds = 50.
TickCount = 5354018, SleepMilliseconds = 50.
TickCount = 5354112, SleepMilliseconds = 50.
TickCount = 5355393, SleepMilliseconds = 50.
TickCount = 5355409, SleepMilliseconds = 50.
TickCount = 5355440, SleepMilliseconds = 50.
TickCount = 5355768, SleepMilliseconds = 50.
TickCount = 5355831, SleepMilliseconds = 50.
TickCount = 5355878, SleepMilliseconds = 50.
TickCount = 5355893, SleepMilliseconds = 50.
TickCount = 5355909, SleepMilliseconds = 50.
TickCount = 5355925, SleepMilliseconds = 50.
Behavior description: 打开互斥体
details: DBWinMutex
RasPbFile
Local\_!MSFTHISTORY!_
Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Local\c:!documents and settings!administrator!cookies!
Local\c:!documents and settings!administrator!local settings!history!history.ie5!
Local\WininetStartupMutex
Local\WininetConnectionMutex
Local\WininetProxyRegistryMutex
ShimCacheMutex
Behavior description: 查找指定内核模块
details: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> hal.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> KDCOM.DLL Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BOOTVID.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ACPI.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> WMILIB.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> pci.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> isapnp.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> compbatt.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BATTC.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> intelide.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> MountMgr.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ftdisk.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> dmload.sys Des: SoftICE驱动
Behavior description: 查找反病毒常用工具窗口
details: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]
Behavior description: 枚举系统设备驱动
details: N/A