VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:d69e4aef1a614b5e88c9be6a78936267
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 探测 Virtual PC是否存在
details: N/A
Behavior description: 直接获取CPU时钟
details: EAX = 0xc42e703c, EDX = 0x00001192
EAX = 0xc42e7088, EDX = 0x00001192
EAX = 0xc42e70d4, EDX = 0x00001192
EAX = 0xc42e7120, EDX = 0x00001192
EAX = 0xc42e716c, EDX = 0x00001192
EAX = 0xc42e71b8, EDX = 0x00001192
EAX = 0xc42e7204, EDX = 0x00001192
EAX = 0xc42e7250, EDX = 0x00001192
EAX = 0xc42e729c, EDX = 0x00001192
EAX = 0xc42e72e8, EDX = 0x00001192
Behavior description: 尝试打开调试器或监控软件的驱动设备对象
details: \??\SICE
\??\SIWVID
\??\NTICE
Behavior description: 获取TickCount值
details: TickCount = 5429971, SleepMilliseconds = 50.
TickCount = 5430065, SleepMilliseconds = 50.
TickCount = 5430128, SleepMilliseconds = 50.
TickCount = 5430159, SleepMilliseconds = 50.
TickCount = 5430300, SleepMilliseconds = 50.
TickCount = 5431315, SleepMilliseconds = 50.
TickCount = 5431378, SleepMilliseconds = 50.
TickCount = 5431456, SleepMilliseconds = 50.
TickCount = 5433221, SleepMilliseconds = 50.
TickCount = 5433675, SleepMilliseconds = 50.
TickCount = 5434643, SleepMilliseconds = 50.
TickCount = 5434690, SleepMilliseconds = 50.
TickCount = 5434737, SleepMilliseconds = 50.
TickCount = 5434753, SleepMilliseconds = 50.
TickCount = 5434815, SleepMilliseconds = 50.
Behavior description: 打开注册表_检测虚拟机相关
details: \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Behavior description: 获取窗口截图信息
details: Foreground window Info: HWND = 0x00000000, DC = 0xf40102bb.
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description: 查询注册表_检测虚拟机相关
details: \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
Behavior description: 查找指定内核模块
details: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> hal.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> KDCOM.DLL Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BOOTVID.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ACPI.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> WMILIB.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> pci.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> isapnp.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> compbatt.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BATTC.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> intelide.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> MountMgr.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ftdisk.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> dmload.sys Des: SoftICE驱动
Behavior description: 查找反病毒常用工具窗口
details: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]
Behavior description: VMWare特殊指令检测虚拟机
details: N/A

Process behavior

Behavior description: 创建本地线程
details: TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1528, ThreadID = 160, StartAddress = 004F1A1F, Parameter = 0066A6DE
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1528, ThreadID = 1136, StartAddress = 004F1A1F, Parameter = 0066B8F2
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1528, ThreadID = 124, StartAddress = 004F1A1F, Parameter = 0066CB8E
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1528, ThreadID = 564, StartAddress = 004F1A1F, Parameter = 0066D5D5
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1528, ThreadID = 1952, StartAddress = 004F1A1F, Parameter = 0066E104
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1528, ThreadID = 1532, StartAddress = 004F1A1F, Parameter = 0066EBAF
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1528, ThreadID = 2044, StartAddress = 004F1A1F, Parameter = 0066F569
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1528, ThreadID = 1392, StartAddress = 004F1A1F, Parameter = 006700B6
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1528, ThreadID = 168, StartAddress = 004F1A1F, Parameter = 006744B6
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1528, ThreadID = 2012, StartAddress = 004F1A1F, Parameter = 006754EC
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1528, ThreadID = 468, StartAddress = 004F1A1F, Parameter = 0067649B
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1528, ThreadID = 412, StartAddress = 004F1A1F, Parameter = 006775EA
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1528, ThreadID = 1664, StartAddress = 004F1A1F, Parameter = 006785D7
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1528, ThreadID = 788, StartAddress = 004F1A1F, Parameter = 0067968C
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1528, ThreadID = 1412, StartAddress = 004F1A1F, Parameter = 0067A5CC
Behavior description: 枚举进程
details: N/A

File behavior

Behavior description: 创建文件
details: C:\WINDOWS\Help\data.txt
Behavior description: 设置特殊文件夹属性
details: C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description: 查找文件
details: FileName = C:\Windows\Help\system9\*.TXT
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\WINDOWS\system32\Ras\*.pbk
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Network\Connections\Pbk\*.pbk

Network behavior

Behavior description: 打开HTTP连接
details: InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0), hSession = 0x00cc0004
Behavior description: 建立到一个指定的套接字连接
details: URL: , IP: **.67.196.**:21, SOCKET = 0x000002ec

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1EA4DBF0-3C3B-11CF-810C-00AA00389B71}\1.1\0\win32\
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Behavior description: 删除注册表键值
details: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
Behavior description: 打开注册表_检测虚拟机相关
details: \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Behavior description: 查询注册表_检测虚拟机相关
details: \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion

Other behavior

Behavior description: 探测 Virtual PC是否存在
details: N/A
Behavior description: 创建互斥体
details: RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
oleacc-msaa-loaded
Behavior description: 创建事件对象
details: EventName = DINPUTWINMM
EventName = dadawdafawmrfoaiwo
EventName = Global\userenv: User Profile setup event
Behavior description: 打开事件
details: HookSwitchHookEnabledEvent
dadawdafawmrfoaiwo
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Global\SvcctrlStartEvent_A3752DX
\INSTALLATION_SECURITY_HOLD
Behavior description: 打开互斥体
details: DBWinMutex
RasPbFile
ShimCacheMutex
Local\_!MSFTHISTORY!_
Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Local\c:!documents and settings!administrator!cookies!
Local\c:!documents and settings!administrator!local settings!history!history.ie5!
Local\WininetStartupMutex
Local\WininetConnectionMutex
Local\WininetProxyRegistryMutex
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [18467-41,]
Behavior description: 尝试打开调试器或监控软件的驱动设备对象
details: \??\SICE
\??\SIWVID
\??\NTICE
Behavior description: 搜索kernel32.dll基地址
details: Instruction Address = 0x004f2a23
Behavior description: 获取光标位置
details: CursorPos = (96,18500), SleepMilliseconds = 50.
Behavior description: 枚举窗口
details: N/A
Behavior description: 获取窗口截图信息
details: Foreground window Info: HWND = 0x00000000, DC = 0xf40102bb.
Behavior description: 调用Sleep函数
details: [1]: MilliSeconds = 50.
Behavior description: 隐藏指定窗口
details: [Window,Class] = [,_EL_Timer]
Behavior description: 获取TickCount值
details: TickCount = 5429971, SleepMilliseconds = 50.
TickCount = 5430065, SleepMilliseconds = 50.
TickCount = 5430128, SleepMilliseconds = 50.
TickCount = 5430159, SleepMilliseconds = 50.
TickCount = 5430300, SleepMilliseconds = 50.
TickCount = 5431315, SleepMilliseconds = 50.
TickCount = 5431378, SleepMilliseconds = 50.
TickCount = 5431456, SleepMilliseconds = 50.
TickCount = 5433221, SleepMilliseconds = 50.
TickCount = 5433675, SleepMilliseconds = 50.
TickCount = 5434643, SleepMilliseconds = 50.
TickCount = 5434690, SleepMilliseconds = 50.
TickCount = 5434737, SleepMilliseconds = 50.
TickCount = 5434753, SleepMilliseconds = 50.
TickCount = 5434815, SleepMilliseconds = 50.
Behavior description: 直接获取CPU时钟
details: EAX = 0xc42e703c, EDX = 0x00001192
EAX = 0xc42e7088, EDX = 0x00001192
EAX = 0xc42e70d4, EDX = 0x00001192
EAX = 0xc42e7120, EDX = 0x00001192
EAX = 0xc42e716c, EDX = 0x00001192
EAX = 0xc42e71b8, EDX = 0x00001192
EAX = 0xc42e7204, EDX = 0x00001192
EAX = 0xc42e7250, EDX = 0x00001192
EAX = 0xc42e729c, EDX = 0x00001192
EAX = 0xc42e72e8, EDX = 0x00001192
Behavior description: 查找指定内核模块
details: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> hal.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> KDCOM.DLL Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BOOTVID.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ACPI.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> WMILIB.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> pci.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> isapnp.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> compbatt.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BATTC.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> intelide.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> MountMgr.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ftdisk.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> dmload.sys Des: SoftICE驱动
Behavior description: 查找反病毒常用工具窗口
details: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]
Behavior description: VMWare特殊指令检测虚拟机
details: N/A