VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

文件信息
安全评分 :
基本信息
MD5:937bc58b001924c2afee96270e5349a1
包名:com.internal.lock
最低运行环境:Android 4.0, 4.0.1, 4.0.2
版权:
关键行为
行为描述:跨进程写入数据
详情信息:TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x00050000, Size = 0x000005dc TargetPID = 0x00000dac
TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x7ffd31e8, Size = 0x00000004 TargetPID = 0x00000dac
TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x00060000, Size = 0x00000020 TargetPID = 0x00000dac
TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x00060020, Size = 0x00000034 TargetPID = 0x00000dac
TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x7ffd3238, Size = 0x00000004 TargetPID = 0x00000dac
进程行为
行为描述:创建进程
详情信息:[0x00000dac]ImagePath = C:\Windows\System32\regsvr32.exe, CmdLine = Regsvr32.exe c:\users\administrator\appdata\local\%temp%\b70c.dll
行为描述:跨进程写入数据
详情信息:TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x00050000, Size = 0x000005dc TargetPID = 0x00000dac
TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x7ffd31e8, Size = 0x00000004 TargetPID = 0x00000dac
TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x00060000, Size = 0x00000020 TargetPID = 0x00000dac
TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x00060020, Size = 0x00000034 TargetPID = 0x00000dac
TargetProcess = C:\Windows\System32\regsvr32.exe, WriteAddress = 0x7ffd3238, Size = 0x00000004 TargetPID = 0x00000dac
文件行为
行为描述:创建文件
详情信息:C:\Users\Administrator\AppData\Local\Temp\NEW260C.tmp
C:\Users\Administrator\AppData\Local\Temp\NEW260D.tmp
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db-journal
C:\Users\Administrator\AppData\Local\Temp\etilqs_jqzVKjzvjbQw5mE
C:\Users\Administrator\AppData\Local\Temp\etilqs_th7PoCjyoYaOsLD
C:\Users\Administrator\AppData\Local\Temp\NEW2747.tmp
C:\Users\Administrator\AppData\Local\Temp\NEW2754.tmp
C:\Users\Administrator\AppData\Local\Temp\NEW2755.tmp
C:\Users\Administrator\AppData\Local\Temp\etilqs_jQqcuZz6QEnB22D
C:\Users\Administrator\AppData\Local\Temp\etilqs_QCzmffLMaYJajf2
C:\Users\Administrator\AppData\Local\Temp\NEW2775.tmp
行为描述:删除文件
详情信息:C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db-journal
C:\Users\Administrator\AppData\Local\Temp\etilqs_jqzVKjzvjbQw5mE
C:\Users\Administrator\AppData\Local\Temp\etilqs_th7PoCjyoYaOsLD
C:\Users\Administrator\AppData\Local\Temp\etilqs_jQqcuZz6QEnB22D
C:\Users\Administrator\AppData\Local\Temp\etilqs_QCzmffLMaYJajf2
行为描述:修改文件内容
详情信息:C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db-journal ---> Offset = 0
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db ---> Offset = 0
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db ---> Offset = 1024
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db ---> Offset = 2048
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db ---> Offset = 3072
C:\Users\Administrator\AppData\Local\Temp\etilqs_jqzVKjzvjbQw5mE ---> Offset = 0
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db-journal ---> Offset = 512
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db-journal ---> Offset = 516
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db-journal ---> Offset = 1540
C:\ProgramData\PPLive\PPTV\Favorites\PPTVLnkUpdate.s3db-journal ---> Offset = 1544
C:\Users\Administrator\AppData\Local\Temp\etilqs_th7PoCjyoYaOsLD ---> Offset = 0
C:\Users\Administrator\AppData\Local\Temp\etilqs_th7PoCjyoYaOsLD ---> Offset = 1024
C:\Users\Administrator\AppData\Local\Temp\etilqs_th7PoCjyoYaOsLD ---> Offset = 2048
C:\Users\Administrator\AppData\Local\Temp\etilqs_th7PoCjyoYaOsLD ---> Offset = 3072
C:\Users\Administrator\AppData\Local\Temp\etilqs_jQqcuZz6QEnB22D ---> Offset = 0
注册表行为
行为描述:修改注册表
详情信息:\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.asf\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.wm\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.wma\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.wmv\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.avi\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.rm\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.rmvb\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.ra\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.ram\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.rp\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.rpm\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.rt\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.smil\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.dat\shellex\ContextMenuHandlers\pptvfilelink\
\REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.m1v\shellex\ContextMenuHandlers\pptvfilelink\
其他行为
行为描述:检测自身是否被调试
详情信息:IsDebuggerPresent
行为描述:创建互斥体
详情信息:DBWinMutex
行为描述:隐藏指定窗口
详情信息:[Window,Class] = [,CtrlNotifySink]
行为描述:调整进程token权限
详情信息:SE_LOAD_DRIVER_PRIVILEGE
SE_DEBUG_PRIVILEGE
行为描述:打开事件
详情信息:HookSwitchHookEnabledEvent
Local\MSCTF.CtfActivated.Default1
Local\MSCTF.AsmCacheReady.Default1
行为描述:打开互斥体
详情信息:Local\MSCTF.Asm.MutexDefault1
Activities
活动名类型
com.internal.system.Entryandroid.intent.action.MAIN
com.internal.system.Entryandroid.intent.category.NOLAUNCHER
危险函数
函数名称信息
TelephonyManager;->getDeviceId搜集用户手机IMEI码、电话号码、系统版本号等信息
java/net/URL;->openConnection连接URL
java/net/URLConnection;->connect连接URL
LocationManager;->getLastKnownLocation获取地址位置
ContentResolver;->query读取联系人、短信等数据库
getRuntime获取命令行环境
java/lang/Runtime;->exec执行字符串命令
java/net/HttpURLConnection;->connect连接URL
ContentResolver;->delete删除短信、联系人
HttpClient;->execute请求远程服务器
ActivityManager;->restartPackage中断进程,可用于关闭杀软
ActivityManager;->killBackgroundProcesses中断进程,可用于关闭杀软
启动方式
名称信息
com.receiver.BootReceiver
com.receiver.BootReceiver开机启动服务
com.receiver.BootReceiver网络连接改变时启动服务
com.wuli.go.KaReceiver
com.adxmi.android.AdReceiver应用安装时启动服务
com.adxmi.android.AdReceiver应用卸载时启动服务
com.inmobi.commons.core.utilities.uid.ImIdShareBroadCastReceiver
权限列表
许可名称信息
android.permission.INTERNET连接网络(2G或3G)
android.permission.ACCESS_WIFI_STATE读取wifi网络状态
android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
android.permission.READ_EXTERNAL_STORAGE读外部存储器(如:SD卡)
android.permission.READ_PHONE_STATE读取电话状态
android.permission.SYSTEM_ALERT_WINDOW显示系统窗口
android.permission.DISABLE_KEYGUARD禁用键盘锁
android.permission.RESTART_PACKAGES重启其他程序
android.permission.KILL_BACKGROUND_PROCESSES关闭后台进程
android.permission.GET_TASKS获取有关当前或最近运行的任务信息
com.android.launcher.permission.REAL_GET_TASKS
com.android.launcher.permission.OPSTR_GET_USAGE_STATS
android.permission.PACKAGE_USAGE_STATS
android.permission.ACCESS_FINE_LOCATION获取精确的位置(通过GPS)
android.permission.ACCESS_COARSE_LOCATION获取粗略的位置(通过wifi、基站)
android.permission.RECEIVE_BOOT_COMPLETED接收开机启动广播
com.android.launcher.permission.INSTALL_SHORTCUT创建快捷方式
com.android.launcher.permission.UNINSTALL_SHORTCUT删除快捷方式
com.android.launcher.permission.READ_SETTINGS读取快捷方式信息
com.android.launcher.permission.WRITE_SETTINGS
com.google.android.gms.permission.ACTIVITY_RECOGNITION
服务列表
名称
com.tribute.Vision
com.patent.sensitive.System
com.patent.sensitive.System$Inner
com.patent.sensitive.Job
com.test.T
com.wuli.go.KaService
com.soapp.config.Track
com.inmobi.signals.activityrecognition.ActivityRecognitionManager
文件列表
文件名 校验码
AndroidManifest.xml 0x6ebc2937
res/drawable/ic_delete.png 0x5581c322
res/drawable/ic_info.png 0x7914af20
res/drawable/ic_install_facebook_normal.9.png 0x9842af14
res/drawable/ic_install_facebook_press.9.png 0x8430ecc
res/drawable/icon_hot.png 0xf721f2a8
res/drawable/icon_launcher.png 0xa2837e35
res/drawable/icon_transparent.png 0x38bbc88d
res/drawable/launcher_icon_base.png 0x4a0ec7c
res/drawable/selector_install_facebook.xml 0x16a19faf
res/drawable/try_it_out.xml 0x434c7dbb
res/layout/activity_main.xml 0x421f4a1b
res/layout/activity_native.xml 0x3c74f7b9
res/layout/activity_shortcut.xml 0xfbeabcc8
res/layout/common_divider.xml 0x3ad195c
res/layout/layout_apps_header.xml 0xb362d456
res/layout/listitem_app.xml 0xb7450dd6
res/mipmap-hdpi-v4/ic_launcher.png 0xa2837e35
res/mipmap-hdpi-v4/ic_menu.png 0xb1f27ab5
res/mipmap-hdpi-v4/ic_more.png 0x2efc2b5b
res/mipmap-mdpi-v4/ic_launcher.png 0x3ce32aa9
res/mipmap-xhdpi-v4/ic_launcher.png 0xa9b28428
res/mipmap-xhdpi-v4/pollfish_star_off.png 0xff86ba8c
res/mipmap-xhdpi-v4/pollfish_star_on.png 0xe6372257
res/mipmap-xxhdpi-v4/ic_launcher.png 0xc137cca8
res/mipmap-xxxhdpi-v4/ic_launcher.png 0xd28c71b
res/raw/beep.ogg 0x1bac0bfc
res/raw/data.properties 0x6d498537
res/raw/realm_properties 0x76e960ad
resources.arsc 0x1a68d40c
classes.dex 0xa87674b9
jsr305_annotations/Jsr305_annotations.gwt.xml 0xda2c535b
build-data.properties 0xa8d83bd2
META-INF/services/com.google.protobuf.GeneratedExtensionRegistryLoader 0x8b7580d7
lib/armeabi-v7a/libBugly.so 0x5417155e
lib/armeabi-v7a/libhelper.so 0xa0c24443
lib/armeabi/libBugly.so 0xe04337e4
lib/armeabi/libhelper.so 0x36dc84c2
lib/arm64-v8a/libBugly.so 0x9b522e2c
lib/arm64-v8a/libhelper.so 0xe501e594
META-INF/MANIFEST.MF 0xeed6cf02
META-INF/CERT.SF 0x24822025
META-INF/CERT.RSA 0xf93f797a
运行截图
VirSCAN

About VirSCAN | Privacy Policy | Contact us | link | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号