VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:de0e5a3b987bd23dcb1152db220328ad
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 检测自身是否被调试
details: N/A
Behavior description: 探测 Virtual PC是否存在
details: N/A
Behavior description: 常规加载驱动
details: \??\C:\WINDOWS\system32\mydri.sys
Behavior description: 尝试打开调试器或监控软件的驱动设备对象
details: \??\SICE
\??\SIWVID
\??\NTICE
Behavior description: 创建系统服务
details: [服务创建成功]: DBKDRVR54, C:\WINDOWS\system32\.\mydri.sys
[服务创建成功]: WMIXCHMP, C:\WINDOWS\system32\drivers\WMIXCHMP.sys
Behavior description: 设置特殊文件属性
details: C:\WINDOWS\system32\mydri.sys
Behavior description: 获取TickCount值
details: TickCount = 487050, SleepMilliseconds = 50.
TickCount = 487096, SleepMilliseconds = 50.
TickCount = 487128, SleepMilliseconds = 50.
TickCount = 487175, SleepMilliseconds = 50.
TickCount = 488096, SleepMilliseconds = 50.
TickCount = 488175, SleepMilliseconds = 50.
TickCount = 488315, SleepMilliseconds = 50.
TickCount = 489300, SleepMilliseconds = 50.
TickCount = 489315, SleepMilliseconds = 50.
TickCount = 489471, SleepMilliseconds = 50.
TickCount = 489784, SleepMilliseconds = 50.
TickCount = 489846, SleepMilliseconds = 50.
TickCount = 489878, SleepMilliseconds = 50.
Behavior description: 查询注册表_检测虚拟机相关
details: \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
Behavior description: 查找指定内核模块
details: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> hal.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> KDCOM.DLL Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BOOTVID.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ACPI.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> WMILIB.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> pci.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> isapnp.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> compbatt.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BATTC.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> intelide.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> MountMgr.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ftdisk.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> dmload.sys Des: SoftICE驱动
Behavior description: 查找反病毒常用工具窗口
details: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]

Process behavior

Behavior description: 创建本地线程
details: TargetProcess: 先打开我1.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 252, StartAddress = 0095E3C7, Parameter = 00AF4840
TargetProcess: 先打开我1.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 1500, StartAddress = 0095E3C7, Parameter = 00AF6624
TargetProcess: 先打开我1.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 168, StartAddress = 0095E3C7, Parameter = 00AF7619
TargetProcess: 先打开我1.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 180, StartAddress = 0095E3C7, Parameter = 00AF8121
TargetProcess: 先打开我1.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 508, StartAddress = 0095E3C7, Parameter = 00AF8C6D
TargetProcess: 先打开我1.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 484, StartAddress = 0095E3C7, Parameter = 00AF98A4
TargetProcess: 先打开我1.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 1384, StartAddress = 0095E3C7, Parameter = 00AFA264
TargetProcess: 先打开我1.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 1356, StartAddress = 0095E3C7, Parameter = 00AFAD57
TargetProcess: 先打开我1.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 1980, StartAddress = 0095E3C7, Parameter = 00AFF90D
TargetProcess: 先打开我1.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 1160, StartAddress = 0095E3C7, Parameter = 00B006E5
TargetProcess: 先打开我1.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 1128, StartAddress = 0095E3C7, Parameter = 00B015D9
TargetProcess: 先打开我1.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 120, StartAddress = 0095E3C7, Parameter = 00B025F7
TargetProcess: 先打开我1.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 412, StartAddress = 0095E3C7, Parameter = 00B0371C
TargetProcess: 先打开我1.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 416, StartAddress = 0095E3C7, Parameter = 00B0480F
TargetProcess: 先打开我1.exe, InheritedFromPID = 1944, ProcessID = 1456, ThreadID = 1476, StartAddress = 0095E3C7, Parameter = 00B054EA
Behavior description: 枚举进程
details: N/A

File behavior

Behavior description: 创建文件
details: C:\WINDOWS\system32\mydri.sys
C:\WINDOWS\system32\drivers\WMIXCHMP.sys
Behavior description: 创建可执行文件
details: C:\WINDOWS\system32\mydri.sys
Behavior description: 查找文件
details: FileName = C:\WINDOWS\system32\.\mydri.sys
FileName = C:\WINDOWS\system32\drivers\WMIXCHMP.sys
Behavior description: 设置特殊文件属性
details: C:\WINDOWS\system32\mydri.sys
Behavior description: 删除文件
details: C:\WINDOWS\system32\drivers\WMIXCHMP.sys
Behavior description: 修改文件内容
details: C:\WINDOWS\system32\mydri.sys ---> Offset = 0
C:\WINDOWS\system32\drivers\WMIXCHMP.sys ---> Offset = 0

Registry behavior

Behavior description: 修改注册表
details: \REGISTRY\USER\S-*\Software\Microsoft\Multimedia\DrawDib\vga.drv 1920x973x16(565 0)
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WMIXCHMP\DisplayName
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WMIXCHMP\ErrorControl
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WMIXCHMP\Type
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WMIXCHMP\Security\Security
Behavior description: 修改注册表_服务项
details: \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WMIXCHMP\ImagePath
\REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\WMIXCHMP\Start
Behavior description: 查询注册表_检测虚拟机相关
details: \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion

Other behavior

Behavior description: 探测 Virtual PC是否存在
details: N/A
Behavior description: 创建互斥体
details: RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
Behavior description: 创建事件对象
details: EventName = DINPUTWINMM
Behavior description: 检测自身是否被调试
details: N/A
Behavior description: 常规加载驱动
details: \??\C:\WINDOWS\system32\mydri.sys
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [18467-41,]
NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
Behavior description: 启动系统服务
details: [服务启动成功]: , DBKDRVR54, \??\C:\WINDOWS\system32\mydri.sys
Behavior description: 尝试打开调试器或监控软件的驱动设备对象
details: \??\SICE
\??\SIWVID
\??\NTICE
Behavior description: 获取TickCount值
details: TickCount = 487050, SleepMilliseconds = 50.
TickCount = 487096, SleepMilliseconds = 50.
TickCount = 487128, SleepMilliseconds = 50.
TickCount = 487175, SleepMilliseconds = 50.
TickCount = 488096, SleepMilliseconds = 50.
TickCount = 488175, SleepMilliseconds = 50.
TickCount = 488315, SleepMilliseconds = 50.
TickCount = 489300, SleepMilliseconds = 50.
TickCount = 489315, SleepMilliseconds = 50.
TickCount = 489471, SleepMilliseconds = 50.
TickCount = 489784, SleepMilliseconds = 50.
TickCount = 489846, SleepMilliseconds = 50.
TickCount = 489878, SleepMilliseconds = 50.
Behavior description: 搜索kernel32.dll基地址
details: Instruction Address = 0x0095ea67
Behavior description: 创建系统服务
details: [服务创建成功]: DBKDRVR54, C:\WINDOWS\system32\.\mydri.sys
[服务创建成功]: WMIXCHMP, C:\WINDOWS\system32\drivers\WMIXCHMP.sys
Behavior description: 可执行文件签名信息
details: C:\WINDOWS\system32\mydri.sys(签名验证: 未通过)
Behavior description: 隐藏指定窗口
details: [Window,Class] = [,Button]
[Window,Class] = [游戏号转绑,Button]
[Window,Class] = [,_EL_Timer]
[Window,Class] = [点击下载最新版,_EL_Label]
Behavior description: 可执行文件MD5
details: C:\WINDOWS\system32\mydri.sys ---> 435ec7e71befba9ae1977ee640fcb6be
Behavior description: 查找指定内核模块
details: lstrcmpiA: ntice.sys <------> ntkrnlpa.exe Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> hal.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> KDCOM.DLL Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BOOTVID.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ACPI.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> WMILIB.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> pci.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> isapnp.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> compbatt.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BATTC.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> intelide.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> MountMgr.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ftdisk.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> dmload.sys Des: SoftICE驱动
Behavior description: 查找反病毒常用工具窗口
details: NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]