VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

File information
Safety rating:
Behavior list
Basic Information
MD5:4ef8a1d78742b7bfa31b11a427dac288
Package names:com.duckbonecallguard
Minimum operating environment:Android 3.0.x
copyright:Android
Key behavior
Behavior description:屏蔽窗口关闭消息
details:hWnd = 0x00020342, Text = 唱吧粉丝快手, ClassName = WTWindow.
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:获取TickCount值
details:TickCount = 306593, SleepMilliseconds = 60000.
TickCount = 306625, SleepMilliseconds = 60000.
TickCount = 306640, SleepMilliseconds = 60000.
TickCount = 306671, SleepMilliseconds = 60000.
TickCount = 306687, SleepMilliseconds = 60000.
TickCount = 247000, SleepMilliseconds = 250.
Process behavior
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2748, ThreadID = 2784, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2748, ThreadID = 2844, StartAddress = 7C947EBB, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2748, ThreadID = 2848, StartAddress = 7C930230, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2748, ThreadID = 2880, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2748, ThreadID = 3324, StartAddress = 77C0A341, Parameter = 00ADCB78
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2748, ThreadID = 3332, StartAddress = 77E56C7D, Parameter = 01566FE8
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2748, ThreadID = 3336, StartAddress = 769AE43B, Parameter = 014EEF80
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\config.ini
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\check_code[1].php
Behavior description:删除文件
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\check_code[1].php
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:修改文件内容
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\config.ini ---> Offset = 0
Behavior description:查找文件
details:FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\config.ini
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
FileName = C:\WINDOWS\system32\Ras\*.pbk
FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
Network behavior
Behavior description:连接指定站点
details:InternetConnectA: ServerName = ap****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
Behavior description:打开HTTP连接
details:InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; KB974489), hSession = 0x00cc0004
WinHttpOpen: UserAgent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5), hSession = 0x03323100
Behavior description:建立到一个指定的套接字连接
details:URL: ap****om, IP: **.133.40.**:80, SOCKET = 0x00000338
Behavior description:读取网络文件
details:hFile = 0x00cc000c, BytesToRead =4096, BytesRead = 4096.
Behavior description:发送HTTP包
details:GET /login/check_code.php?&action=llogin&method=ktv&macaddress=&channelsrc=changba&bless=1&version=8.6.2&deviceid= HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Android,iPhone Accept-Encoding: gzip, deflate Host: ap****om Connection: Keep-Alive
Behavior description:打开HTTP请求
details:HttpOpenRequestA: ap****om:80/login/check_code.php?&action=llogin&method=ktv&macaddress=&channelsrc=changba&bless=1&version=8.6.2&deviceid=, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400000
Behavior description:按名称获取主机地址
details:GetAddrInfoW: ap****om
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Microsoft\Multimedia\DrawDib\vga.drv 1920x973x32(BGR 0)
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Behavior description:删除注册表键值
details:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyOverride
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
RasPbFile
MSCTF.Shared.MUTEX.IOH
MSCTF.Shared.MUTEX.AMK
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = Global\userenv: User Profile setup event
EventName = MSCTF.SendReceive.Event.AMK.IC
EventName = MSCTF.SendReceiveConection.Event.AMK.IC
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:窗口信息
details:Pid = 2748, Hwnd=0x10372, Text = ..., ClassName = Afx:400000:b:10011:1900015:0.
Pid = 2748, Hwnd=0x1036e, Text = 在线客服, ClassName = _EL_HyperLinker.
Pid = 2748, Hwnd=0x1034c, Text = Ver:3.0, ClassName = _EL_Label.
Pid = 2748, Hwnd=0x10392, Text = 您的唱吧登录账号..., ClassName = _EL_Label.
Pid = 2748, Hwnd=0x10380, Text = 注册(Q), ClassName = _EL_HyperLinker.
Pid = 2748, Hwnd=0x1037e, Text = 充值(P), ClassName = _EL_HyperLinker.
Pid = 2748, Hwnd=0x20342, Text = 唱吧粉丝快手, ClassName = WTWindow.
Pid = 2748, Hwnd=0x10388, Text = 123456, ClassName = Edit.
Pid = 2748, Hwnd=0x10386, Text = 123456, ClassName = Edit.
Pid = 2748, Hwnd=0x10382, Text = 123456, ClassName = Edit.
Pid = 2748, Hwnd=0x1039e, Text = 123456, ClassName = Edit.
Behavior description:获取TickCount值
details:TickCount = 306593, SleepMilliseconds = 60000.
TickCount = 306625, SleepMilliseconds = 60000.
TickCount = 306640, SleepMilliseconds = 60000.
TickCount = 306671, SleepMilliseconds = 60000.
TickCount = 306687, SleepMilliseconds = 60000.
TickCount = 247000, SleepMilliseconds = 250.
Behavior description:屏蔽窗口关闭消息
details:hWnd = 0x00020342, Text = 唱吧粉丝快手, ClassName = WTWindow.
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Global\SvcctrlStartEvent_A3752DX
\INSTALLATION_SECURITY_HOLD
CTF.ThreadMIConnectionEvent.000007E8.00000000.0000000F
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.0000000F
MSCTF.SendReceive.Event.IOH.IC
MSCTF.SendReceiveConection.Event.IOH.IC
MSFT.VSA.COM.DISABLE.2748
MSFT.VSA.IEC.STATUS.6c736db0
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 60000.
[2]: MilliSeconds = 0.
[3]: MilliSeconds = 250.
Behavior description:隐藏指定窗口
details:[Window,Class] = [,_EL_RgnButton]
[Window,Class] = [,_EL_Label]
[Window,Class] = [,_EL_PicBox]
[Window,Class] = [,Edit]
[Window,Class] = [,WTWindow]
Behavior description:打开互斥体
details:ShimCacheMutex
Local\_!MSFTHISTORY!_
Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Local\c:!documents and settings!administrator!cookies!
Local\c:!documents and settings!administrator!local settings!history!history.ie5!
Local\WininetStartupMutex
Local\WininetConnectionMutex
Local\WininetProxyRegistryMutex
Local\!IETld!Mutex
RasPbFile
Activities
Activity nameTypes of
com.duckbonecallguard.Preferencesandroid.intent.action.MAIN
com.duckbonecallguard.Preferencesandroid.intent.category.LAUNCHER
Startup mode
nameinformation
com.duckbonecallguard.CallState
com.duckbonecallguard.OutgoingCallReceiver
Permission list
License nameinformation
android.permission.READ_PHONE_STATE读取电话状态
android.permission.SYSTEM_ALERT_WINDOW显示系统窗口
android.permission.PROCESS_OUTGOING_CALLS监视、修改有关拨出电话
Service list
name
com.duckbonecallguard.LockService
com.duckbonecallguard.ShowLockService
com.duckbonecallguard.SlideToUnlockService
com.duckbonecallguard.BasicLockService
File List
file name Check code
META-INF/MANIFEST.MF 0x112dd1a2
META-INF/CERT.SF 0xb4fc62a0
META-INF/CERT.RSA 0x42c241a1
AndroidManifest.xml 0x8031bcf2
classes.dex 0xbbd350b1
res/drawable-hdpi/ic_launcher.png 0x8eccf49d
res/drawable-hdpi/icon.png 0x2e542300
res/drawable-hdpi/slidetounlock_thumb.png 0x6bd61e8c
res/drawable-mdpi/ic_launcher.png 0xed7cde00
res/drawable-mdpi/slidetounlock_thumb.png 0xd333f776
res/drawable-xhdpi/ic_launcher.png 0x4abe55ca
res/drawable-xhdpi/slidetounlock_thumb.png 0x3cd273c2
res/drawable-xxhdpi/ic_launcher.png 0x1f4f37f4
res/drawable-xxxhdpi/ic_launcher.png 0xf71a63fe
res/drawable/black.png 0x939000ec
res/drawable/blue.png 0x20c0bc58
res/drawable/green.png 0x322c31c
res/drawable/grooved.png 0xa174ee5e
res/drawable/key.png 0x29997cb3
res/drawable/light_green_round_send.png 0x46928261
res/drawable/lock.png 0x2e542300
res/drawable/lock_control_black.png 0x12ebd42a
res/drawable/lock_control_blue.png 0xec135741
res/drawable/lock_control_green.png 0xe9c1f94b
res/drawable/lock_control_maroon.png 0xf6840bea
res/drawable/lock_control_pink.png 0x9b697166
res/drawable/lock_control_red.png 0xa8e64be
res/drawable/lock_large.png 0xaba14b3f
res/drawable/lock_maroon.png 0x7fa96f4d
res/drawable/maroon_circle.xml 0xfd1ffe8e
res/drawable/off.png 0x7b41940e
res/drawable/on.png 0xcad62e86
res/drawable/on_large.png 0x48df81e6
res/drawable/rounded_top_corner.xml 0x8b5126e
res/drawable/silver.png 0x5bcc841d
res/drawable/slide.png 0x898c7ade
res/drawable/slide64.png 0x24706dad
res/drawable/slidetounlock_bg.9.png 0x443d8db6
res/drawable/striped.png 0x836a0c96
res/drawable/striped_2.png 0x82ef1920
res/drawable/thumb_black.png 0x30d78c5e
res/drawable/thumb_blue.png 0xdfe6ea41
res/drawable/thumb_green.png 0x1a02690d
res/drawable/thumb_ios.png 0x515f0d33
res/drawable/thumb_maroon.png 0xab5ac0c8
res/drawable/thumb_pink.png 0xaf7bae17
res/drawable/thumb_red.png 0xdf22449e
res/drawable/track_ios.xml 0x3a51fbe6
res/drawable/unlocked64.png 0xd5c0dd87
res/drawable/white_lock96.png 0xaa819511
res/drawable/yellow.png 0x67bd4132
res/drawable/zebra.png 0x47f2e9c3
res/layout-ru/activity_change_log.xml 0x48daa1ff
res/layout-ru/activity_select_slider_style.xml 0x6278a7d2
res/layout/activity_change_log.xml 0xd2c0a70d
res/layout/activity_main.xml 0xd69d342
res/layout/activity_select_slider_style.xml 0x88abcfe9
res/layout/basic_lock_on_view.xml 0x776bcde
res/layout/guard_off.xml 0x6da992c2
res/layout/image.xml 0xd0da8e22
res/layout/listitem.xml 0x3f8aa2d
res/layout/lock.xml 0x304058cf
res/layout/on_bottom_left.xml 0x9e3603
res/layout/on_bottom_right.xml 0xed507980
res/layout/on_top_left.xml 0x171a9f09
res/layout/on_top_right.xml 0xf1456b5a
res/layout/slidetounlock_lt.xml 0xffab99e6
res/menu/main.xml 0xabbfbc98
res/menu/menu_change_log.xml 0xc53ff43b
res/menu/menu_select_slider_style.xml 0xc53ff43b
res/xml-ru/preference.xml 0xc446af21
res/xml/preference.xml 0x949df821
resources.arsc 0x43393bda
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号