VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

File information
Safety rating:
Behavior list
Basic Information
MD5:937bc58b001924c2afee96270e5349a1
Package names:com.internal.lock
Minimum operating environment:Android 4.0, 4.0.1, 4.0.2
copyright:
Key behavior
Behavior description:跨进程写入数据
details:TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x00050000, Size = 0x000005dc TargetPID = 0x00000dac
TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x7ffd31e8, Size = 0x00000004 TargetPID = 0x00000dac
TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x00060000, Size = 0x00000020 TargetPID = 0x00000dac
TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x00060020, Size = 0x00000034 TargetPID = 0x00000dac
TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x7ffd3238, Size = 0x00000004 TargetPID = 0x00000dac
Process behavior
Behavior description:创建进程
details:[0x00000dac]ImagePath = C:\Windows\System32\regsvr32.exe, CmdLine = Regsvr32.exe c:\users\administrator\appdata\local\%temp%\b70c.dll
Behavior description:跨进程写入数据
details:TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x00050000, Size = 0x000005dc TargetPID = 0x00000dac
TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x7ffd31e8, Size = 0x00000004 TargetPID = 0x00000dac
TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x00060000, Size = 0x00000020 TargetPID = 0x00000dac
TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x00060020, Size = 0x00000034 TargetPID = 0x00000dac
TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x7ffd3238, Size = 0x00000004 TargetPID = 0x00000dac
File behavior
Behavior description:创建文件
details:C:\Users\Administrator\AppData\Local\Temp\NEW260C.tmp
C:\Users\Administrator\AppData\Local\Temp\NEW260D.tmp
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db-journal
C:\Users\Administrator\AppData\Local\Temp\etilqs_jqzVKjzvjbQw5mE
C:\Users\Administrator\AppData\Local\Temp\etilqs_th7PoCjyoYaOsLD
C:\Users\Administrator\AppData\Local\Temp\NEW2747.tmp
C:\Users\Administrator\AppData\Local\Temp\NEW2754.tmp
C:\Users\Administrator\AppData\Local\Temp\NEW2755.tmp
C:\Users\Administrator\AppData\Local\Temp\etilqs_jQqcuZz6QEnB22D
C:\Users\Administrator\AppData\Local\Temp\etilqs_QCzmffLMaYJajf2
C:\Users\Administrator\AppData\Local\Temp\NEW2775.tmp
Behavior description:删除文件
details:C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db-journal
C:\Users\Administrator\AppData\Local\Temp\etilqs_jqzVKjzvjbQw5mE
C:\Users\Administrator\AppData\Local\Temp\etilqs_th7PoCjyoYaOsLD
C:\Users\Administrator\AppData\Local\Temp\etilqs_jQqcuZz6QEnB22D
C:\Users\Administrator\AppData\Local\Temp\etilqs_QCzmffLMaYJajf2
Behavior description:修改文件内容
details:C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db-journal ---> Offset = 0
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db ---> Offset = 0
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db ---> Offset = 1024
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db ---> Offset = 2048
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db ---> Offset = 3072
C:\Users\Administrator\AppData\Local\Temp\etilqs_jqzVKjzvjbQw5mE ---> Offset = 0
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db-journal ---> Offset = 512
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db-journal ---> Offset = 516
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db-journal ---> Offset = 1540
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db-journal ---> Offset = 1544
C:\Users\Administrator\AppData\Local\Temp\etilqs_th7PoCjyoYaOsLD ---> Offset = 0
C:\Users\Administrator\AppData\Local\Temp\etilqs_th7PoCjyoYaOsLD ---> Offset = 1024
C:\Users\Administrator\AppData\Local\Temp\etilqs_th7PoCjyoYaOsLD ---> Offset = 2048
C:\Users\Administrator\AppData\Local\Temp\etilqs_th7PoCjyoYaOsLD ---> Offset = 3072
C:\Users\Administrator\AppData\Local\Temp\etilqs_jQqcuZz6QEnB22D ---> Offset = 0
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.asf\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.wm\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.wma\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.wmv\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.avi\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.rm\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.rmvb\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.ra\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.ram\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.rp\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.rpm\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.rt\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.smil\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.dat\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.m1v\shellex\ContextMenuHandlers\pptvfilelink\
Other behavior
Behavior description:检测自身是否被调试
details:IsDebuggerPresent
Behavior description:创建互斥体
details:DBWinMutex
Behavior description:隐藏指定窗口
details:[Window,Class] = [,CtrlNotifySink]
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
SE_DEBUG_PRIVILEGE
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
Local\MSCTF.CtfActivated.Default1
Local\MSCTF.AsmCacheReady.Default1
Behavior description:打开互斥体
details:Local\MSCTF.Asm.MutexDefault1
Activities
Activity nameTypes of
com.internal.system.Entryandroid.intent.action.MAIN
com.internal.system.Entryandroid.intent.category.NOLAUNCHER
Dangerous function
Function nameinformation
TelephonyManager;->getDeviceId搜集用户手机IMEI码、电话号码、系统版本号等信息
java/net/URL;->openConnection连接URL
java/net/URLConnection;->connect连接URL
LocationManager;->getLastKnownLocation获取地址位置
ContentResolver;->query读取联系人、短信等数据库
getRuntime获取命令行环境
java/lang/Runtime;->exec执行字符串命令
java/net/HttpURLConnection;->connect连接URL
ContentResolver;->delete删除短信、联系人
HttpClient;->execute请求远程服务器
ActivityManager;->restartPackage中断进程,可用于关闭杀软
ActivityManager;->killBackgroundProcesses中断进程,可用于关闭杀软
Startup mode
nameinformation
com.receiver.BootReceiver
com.receiver.BootReceiver开机启动服务
com.receiver.BootReceiver网络连接改变时启动服务
com.wuli.go.KaReceiver
com.adxmi.android.AdReceiver应用安装时启动服务
com.adxmi.android.AdReceiver应用卸载时启动服务
com.inmobi.commons.core.utilities.uid.ImIdShareBroadCastReceiver
Permission list
License nameinformation
android.permission.INTERNET连接网络(2G或3G)
android.permission.ACCESS_WIFI_STATE读取wifi网络状态
android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
android.permission.READ_EXTERNAL_STORAGE读外部存储器(如:SD卡)
android.permission.READ_PHONE_STATE读取电话状态
android.permission.SYSTEM_ALERT_WINDOW显示系统窗口
android.permission.DISABLE_KEYGUARD禁用键盘锁
android.permission.RESTART_PACKAGES重启其他程序
android.permission.KILL_BACKGROUND_PROCESSES关闭后台进程
android.permission.GET_TASKS获取有关当前或最近运行的任务信息
com.android.launcher.permission.REAL_GET_TASKS
com.android.launcher.permission.OPSTR_GET_USAGE_STATS
android.permission.PACKAGE_USAGE_STATS
android.permission.ACCESS_FINE_LOCATION获取精确的位置(通过GPS)
android.permission.ACCESS_COARSE_LOCATION获取粗略的位置(通过wifi、基站)
android.permission.RECEIVE_BOOT_COMPLETED接收开机启动广播
com.android.launcher.permission.INSTALL_SHORTCUT创建快捷方式
com.android.launcher.permission.UNINSTALL_SHORTCUT删除快捷方式
com.android.launcher.permission.READ_SETTINGS读取快捷方式信息
com.android.launcher.permission.WRITE_SETTINGS
com.google.android.gms.permission.ACTIVITY_RECOGNITION
Service list
name
com.tribute.Vision
com.patent.sensitive.System
com.patent.sensitive.System$Inner
com.patent.sensitive.Job
com.test.T
com.wuli.go.KaService
com.soapp.config.Track
com.inmobi.signals.activityrecognition.ActivityRecognitionManager
File List
file name Check code
AndroidManifest.xml 0x6ebc2937
res/drawable/ic_delete.png 0x5581c322
res/drawable/ic_info.png 0x7914af20
res/drawable/ic_install_facebook_normal.9.png 0x9842af14
res/drawable/ic_install_facebook_press.9.png 0x8430ecc
res/drawable/icon_hot.png 0xf721f2a8
res/drawable/icon_launcher.png 0xa2837e35
res/drawable/icon_transparent.png 0x38bbc88d
res/drawable/launcher_icon_base.png 0x4a0ec7c
res/drawable/selector_install_facebook.xml 0x16a19faf
res/drawable/try_it_out.xml 0x434c7dbb
res/layout/activity_main.xml 0x421f4a1b
res/layout/activity_native.xml 0x3c74f7b9
res/layout/activity_shortcut.xml 0xfbeabcc8
res/layout/common_divider.xml 0x3ad195c
res/layout/layout_apps_header.xml 0xb362d456
res/layout/listitem_app.xml 0xb7450dd6
res/mipmap-hdpi-v4/ic_launcher.png 0xa2837e35
res/mipmap-hdpi-v4/ic_menu.png 0xb1f27ab5
res/mipmap-hdpi-v4/ic_more.png 0x2efc2b5b
res/mipmap-mdpi-v4/ic_launcher.png 0x3ce32aa9
res/mipmap-xhdpi-v4/ic_launcher.png 0xa9b28428
res/mipmap-xhdpi-v4/pollfish_star_off.png 0xff86ba8c
res/mipmap-xhdpi-v4/pollfish_star_on.png 0xe6372257
res/mipmap-xxhdpi-v4/ic_launcher.png 0xc137cca8
res/mipmap-xxxhdpi-v4/ic_launcher.png 0xd28c71b
res/raw/beep.ogg 0x1bac0bfc
res/raw/data.properties 0x6d498537
res/raw/realm_properties 0x76e960ad
resources.arsc 0x1a68d40c
classes.dex 0xa87674b9
jsr305_annotations/Jsr305_annotations.gwt.xml 0xda2c535b
build-data.properties 0xa8d83bd2
META-INF/services/com.google.protobuf.GeneratedExtensionRegistryLoader 0x8b7580d7
lib/armeabi-v7a/libBugly.so 0x5417155e
lib/armeabi-v7a/libhelper.so 0xa0c24443
lib/armeabi/libBugly.so 0xe04337e4
lib/armeabi/libhelper.so 0x36dc84c2
lib/arm64-v8a/libBugly.so 0x9b522e2c
lib/arm64-v8a/libhelper.so 0xe501e594
META-INF/MANIFEST.MF 0xeed6cf02
META-INF/CERT.SF 0x24822025
META-INF/CERT.RSA 0xf93f797a
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号