VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:55
Behavior list
Basic Information
MD5:eedeadf3d3e87c0cf0f4855ee7fae63e
file type:Rar
Production company:
version:
Shell or compiler information:
Subfile information:Domain.exedumpFile / 81f0fb11bd80498a62818f74c86ba118 / EXE
Domain.exe / 81f0fb11bd80498a62818f74c86ba118 / EXE
SetData.mdbdumpFile / 0137435608e2f0bffabfc2e0943944fd / Unknown
SetData.mdb / 0137435608e2f0bffabfc2e0943944fd / Unknown
奔放.skndumpFile / 5b845035b31570a54eeec6d7132b964a / Unknown
奔放.skn / 5b845035b31570a54eeec6d7132b964a / Unknown
古典.skndumpFile / ee3a19fbd1471be77c18493c5c07aa45 / Unknown
古典.skn / ee3a19fbd1471be77c18493c5c07aa45 / Unknown
斯文.skndumpFile / d38d5a2a38f7ec11661ba4d159a0f145 / Unknown
斯文.skn / d38d5a2a38f7ec11661ba4d159a0f145 / Unknown
稳重.skndumpFile / c7ee410edcfc5ccc5c74fead4eeed8fc / Unknown
稳重.skn / c7ee410edcfc5ccc5c74fead4eeed8fc / Unknown
安装前必看.txtdumpFile / 1e52ac90d2c1fef673ff0db529e533e6 / Unknown
安装前必看.txt / 1e52ac90d2c1fef673ff0db529e533e6 / Unknown
安装前必看 -.urldumpFile / 6ea0842fb13c113e1296abc2294125d2 / Unknown
安装前必看 -.url / 6ea0842fb13c113e1296abc2294125d2 / Unknown
最牛的单机游戏下载网站.urldumpFile / f3a3a75babaac3ba5ed8dddf5125d76d / Unknown
最牛的单机游戏下载网站.url / f3a3a75babaac3ba5ed8dddf5125d76d / Unknown
skinsdumpFile / d41d8cd98f00b204e9800998ecf8427e / Unknown
Key behavior
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ComboLBox]
[Window,Class] = [ToolBar1,TToolBar]
Behavior description:探测 Virtual PC 是否存在
details:N/A
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:查找指定内核模块
details:lstrcmpiA: ntice.sys <------> ntkrnlpa.exe (ntice.sys)
lstrcmpiA: ntice.sys <------> hal.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> KDCOM.DLL (ntice.sys)
lstrcmpiA: ntice.sys <------> BOOTVID.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> ACPI.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> WMILIB.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> pci.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> isapnp.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> compbatt.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> BATTC.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> intelide.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> MountMgr.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> ftdisk.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> dmload.sys (ntice.sys)
Behavior description:查找反病毒常用工具窗口
details:NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]
Behavior description:按名称获取主机地址
details:url.cn
Process behavior
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:写权限映射文件
details:\WINDOWS\system32\zh-cn\ieframe.dll.mui
Local\!PrivacIE!SharedMem!Counter
Local\UrlZonesSM_Administrator
CiceroSharedMemDefaultS-1-5-21-1482476501-1645522239-1417001333-500
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:修改文件内容
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ketix.ini---> Offset = 0
Network behavior
Behavior description:按名称获取主机地址
details:url.cn
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Jet\4.0\Engines\SandBoxMode
Behavior description:删除注册表键值_IE连接设置
details:\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
Other behavior
Behavior description:创建互斥体
details:RasPbFile
Local\!PrivacIE!SharedMemory!Mutex
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
CTF.LBES.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Compart.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Asm.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Layouts.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TMD.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TimListCache.FMPDefaultS-1-5-21-1482476501-1645522239-1417001333-500MUTEX.DefaultS-1-5-21-1482476501-1645522239-1417001333-500
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ComboLBox]
[Window,Class] = [ToolBar1,TToolBar]
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [18467-41,]
NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
NtUserFindWindowEx: [Class,Window] = [msctls_updown32,]
Behavior description:探测 Virtual PC 是否存在
details:N/A
Behavior description:尝试打开调试器或监控软件的驱动设备对象
details:\??\SICE
\??\SIWVID
\??\NTICE
Behavior description:窗口信息
details:Pid = 1952, Hwnd=0xb0184, Text = 旁注检测, ClassName = TRzTabSheet.
Pid = 1952, Hwnd=0x8038a, Text = 功能介绍, ClassName = TTabSheet.
Pid = 1952, Hwnd=0xb03c6, Text = 功能设置 , ClassName = TTabSheet.
Pid = 1952, Hwnd=0x703a0, Text = 浏览设置, ClassName = TRzGroupBox.
Pid = 1952, Hwnd=0x703a4, Text = 查询虚拟主机后,自动载入到网站批量检测, ClassName = TCheckBox.
Pid = 1952, Hwnd=0x803f8, Text = 浏览网页时检测是否存在注入点并提示, ClassName = TCheckBox.
Pid = 1952, Hwnd=0x803e0, Text = 浏览网页时检测网站排名, ClassName = TCheckBox.
Pid = 1952, Hwnd=0x90372, Text = 浏览网页时自动读取Cookies, ClassName = TCheckBox.
Pid = 1952, Hwnd=0xe016e, Text = 网站批量检测 , ClassName = TTabSheet.
Pid = 1952, Hwnd=0x80390, Text = 共56个页面, ClassName = TRzGroupBox.
Pid = 1952, Hwnd=0x803fe, Text = 数据库, ClassName = TRadioButton.
Pid = 1952, Hwnd=0x80392, Text = 上传, ClassName = TRadioButton.
Pid = 1952, Hwnd=0x803be, Text = 后台, ClassName = TRadioButton.
Pid = 1952, Hwnd=0xa0198, Text = 待检测网址:, ClassName = TRzGroupBox.
Pid = 1952, Hwnd=0x9036a, Text = 删除, ClassName = TButton.
Behavior description:查找指定内核模块
details:lstrcmpiA: ntice.sys <------> ntkrnlpa.exe (ntice.sys)
lstrcmpiA: ntice.sys <------> hal.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> KDCOM.DLL (ntice.sys)
lstrcmpiA: ntice.sys <------> BOOTVID.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> ACPI.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> WMILIB.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> pci.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> isapnp.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> compbatt.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> BATTC.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> intelide.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> MountMgr.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> ftdisk.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> dmload.sys (ntice.sys)
Behavior description:查找反病毒常用工具窗口
details:NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]
Abnormal crash
Behavior description:创建互斥体
details:RasPbFile
Local\!PrivacIE!SharedMemory!Mutex
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
CTF.LBES.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Compart.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Asm.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Layouts.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TMD.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TimListCache.FMPDefaultS-1-5-21-1482476501-1645522239-1417001333-500MUTEX.DefaultS-1-5-21-1482476501-1645522239-1417001333-500
Behavior description:隐藏指定窗口
details:[Window,Class] = [,ComboLBox]
[Window,Class] = [ToolBar1,TToolBar]
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [18467-41,]
NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
NtUserFindWindowEx: [Class,Window] = [msctls_updown32,]
Behavior description:探测 Virtual PC 是否存在
details:N/A
Behavior description:尝试打开调试器或监控软件的驱动设备对象
details:\??\SICE
\??\SIWVID
\??\NTICE
Behavior description:窗口信息
details:Pid = 1952, Hwnd=0xb0184, Text = 旁注检测, ClassName = TRzTabSheet.
Pid = 1952, Hwnd=0x8038a, Text = 功能介绍, ClassName = TTabSheet.
Pid = 1952, Hwnd=0xb03c6, Text = 功能设置 , ClassName = TTabSheet.
Pid = 1952, Hwnd=0x703a0, Text = 浏览设置, ClassName = TRzGroupBox.
Pid = 1952, Hwnd=0x703a4, Text = 查询虚拟主机后,自动载入到网站批量检测, ClassName = TCheckBox.
Pid = 1952, Hwnd=0x803f8, Text = 浏览网页时检测是否存在注入点并提示, ClassName = TCheckBox.
Pid = 1952, Hwnd=0x803e0, Text = 浏览网页时检测网站排名, ClassName = TCheckBox.
Pid = 1952, Hwnd=0x90372, Text = 浏览网页时自动读取Cookies, ClassName = TCheckBox.
Pid = 1952, Hwnd=0xe016e, Text = 网站批量检测 , ClassName = TTabSheet.
Pid = 1952, Hwnd=0x80390, Text = 共56个页面, ClassName = TRzGroupBox.
Pid = 1952, Hwnd=0x803fe, Text = 数据库, ClassName = TRadioButton.
Pid = 1952, Hwnd=0x80392, Text = 上传, ClassName = TRadioButton.
Pid = 1952, Hwnd=0x803be, Text = 后台, ClassName = TRadioButton.
Pid = 1952, Hwnd=0xa0198, Text = 待检测网址:, ClassName = TRzGroupBox.
Pid = 1952, Hwnd=0x9036a, Text = 删除, ClassName = TButton.
Behavior description:查找指定内核模块
details:lstrcmpiA: ntice.sys <------> ntkrnlpa.exe (ntice.sys)
lstrcmpiA: ntice.sys <------> hal.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> KDCOM.DLL (ntice.sys)
lstrcmpiA: ntice.sys <------> BOOTVID.dll (ntice.sys)
lstrcmpiA: ntice.sys <------> ACPI.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> WMILIB.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> pci.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> isapnp.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> compbatt.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> BATTC.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> intelide.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS (ntice.sys)
lstrcmpiA: ntice.sys <------> MountMgr.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> ftdisk.sys (ntice.sys)
lstrcmpiA: ntice.sys <------> dmload.sys (ntice.sys)
Behavior description:查找反病毒常用工具窗口
details:NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
NtUserFindWindowEx: [Class,Window] = [FilemonClass,]
NtUserFindWindowEx: [Class,Window] = [,File Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [PROCMON_WINDOW_CLASS,]
NtUserFindWindowEx: [Class,Window] = [,Process Monitor - Sysinternals: www.sysinternals.com]
NtUserFindWindowEx: [Class,Window] = [RegmonClass,]
NtUserFindWindowEx: [Class,Window] = [,Registry Monitor - Sysinternals: www.sysinternals.com]
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号