VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:
Behavior list
Basic Information
MD5:5cd3ba37332dded79b4901663f4822f6
Package names:com.drpe26.MemoryCleaner
Minimum operating environment:Android 2.1.x
copyright:Android
Key behavior
Behavior description:探测 Virtual PC是否存在
details:N/A
Behavior description:查询注册表_检测虚拟机相关
details:\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
Behavior description:尝试打开调试器或监控软件的驱动设备对象
details:\??\SICE
\??\SIWVID
\??\NTICE
Behavior description:获取TickCount值
details:TickCount = 5358721, SleepMilliseconds = 50.
TickCount = 5359534, SleepMilliseconds = 50.
TickCount = 5359596, SleepMilliseconds = 50.
TickCount = 5360378, SleepMilliseconds = 50.
TickCount = 5360862, SleepMilliseconds = 50.
TickCount = 5361612, SleepMilliseconds = 50.
TickCount = 5361628, SleepMilliseconds = 50.
TickCount = 5361643, SleepMilliseconds = 50.
TickCount = 5361659, SleepMilliseconds = 50.
TickCount = 5361675, SleepMilliseconds = 50.
TickCount = 5361690, SleepMilliseconds = 50.
TickCount = 5361706, SleepMilliseconds = 50.
TickCount = 5361721, SleepMilliseconds = 50.
TickCount = 5361737, SleepMilliseconds = 50.
TickCount = 5361753, SleepMilliseconds = 50.
Behavior description:直接获取CPU时钟
details:N/A
Behavior description:查找指定内核模块
details:lstrcmpiA: ntice.sys <------> ntkrnlpa.exe Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> hal.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> KDCOM.DLL Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BOOTVID.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ACPI.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> WMILIB.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> pci.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> isapnp.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> compbatt.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BATTC.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> intelide.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> MountMgr.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ftdisk.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> dmload.sys Des: SoftICE驱动
Behavior description:查找反病毒常用工具窗口
details:NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
Process behavior
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1372, ThreadID = 1856, StartAddress = 00DD1D8B, Parameter = 00F67B78
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1372, ThreadID = 1140, StartAddress = 00DD1D8B, Parameter = 00F6864C
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1372, ThreadID = 1872, StartAddress = 00DD1D8B, Parameter = 00F69751
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1372, ThreadID = 744, StartAddress = 00DD1D8B, Parameter = 00F6A254
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1372, ThreadID = 2044, StartAddress = 00DD1D8B, Parameter = 00F6ACDE
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1372, ThreadID = 160, StartAddress = 00DD1D8B, Parameter = 00F6B694
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1372, ThreadID = 1172, StartAddress = 00DD1D8B, Parameter = 00F6C18F
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1372, ThreadID = 280, StartAddress = 00DD1D8B, Parameter = 00F6CC6A
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1372, ThreadID = 1388, StartAddress = 00DD1D8B, Parameter = 00F70A4D
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1372, ThreadID = 1808, StartAddress = 00DD1D8B, Parameter = 00F71A18
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1372, ThreadID = 764, StartAddress = 00DD1D8B, Parameter = 00F729CB
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1372, ThreadID = 300, StartAddress = 00DD1D8B, Parameter = 00F73A86
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1372, ThreadID = 156, StartAddress = 00DD1D8B, Parameter = 00F74AB6
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1372, ThreadID = 1044, StartAddress = 00DD1D8B, Parameter = 00F75C06
TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 1372, ThreadID = 1128, StartAddress = 00DD1D8B, Parameter = 00F76E0D
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:覆盖已有文件
details:C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
Behavior description:修改文件内容
details:C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT ---> Offset = 0
Behavior description:查找文件
details:FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
Registry behavior
Behavior description:查询注册表_检测虚拟机相关
details:\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
Other behavior
Behavior description:探测 Virtual PC是否存在
details:N/A
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
ini_read_write
MSCTF.Shared.MUTEX.ELH
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
Behavior description:打开互斥体
details:DBWinMutex
ShimCacheMutex
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
Behavior description:尝试打开调试器或监控软件的驱动设备对象
details:\??\SICE
\??\SIWVID
\??\NTICE
Behavior description:搜索kernel32.dll基地址
details:Instruction Address = 0x00dd2a73
Behavior description:调整进程token权限
details:SE_DEBUG_PRIVILEGE
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000042
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000042
MSCTF.SendReceiveConection.Event.ELH.IC
MSCTF.SendReceive.Event.ELH.IC
CTF.ThreadMIConnectionEvent.000007B4.00000000.00000043
CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000043
Behavior description:隐藏指定窗口
details:[Window,Class] = [,WindowEx]
[Window,Class] = [,EditboxEx]
[Window,Class] = [,ButtonEx]
[Window,Class] = [,ChoiceboxEx]
Behavior description:获取光标位置
details:CursorPos = (71,18468), SleepMilliseconds = 50.
CursorPos = (6364,26501), SleepMilliseconds = 50.
Behavior description:获取TickCount值
details:TickCount = 5358721, SleepMilliseconds = 50.
TickCount = 5359534, SleepMilliseconds = 50.
TickCount = 5359596, SleepMilliseconds = 50.
TickCount = 5360378, SleepMilliseconds = 50.
TickCount = 5360862, SleepMilliseconds = 50.
TickCount = 5361612, SleepMilliseconds = 50.
TickCount = 5361628, SleepMilliseconds = 50.
TickCount = 5361643, SleepMilliseconds = 50.
TickCount = 5361659, SleepMilliseconds = 50.
TickCount = 5361675, SleepMilliseconds = 50.
TickCount = 5361690, SleepMilliseconds = 50.
TickCount = 5361706, SleepMilliseconds = 50.
TickCount = 5361721, SleepMilliseconds = 50.
TickCount = 5361737, SleepMilliseconds = 50.
TickCount = 5361753, SleepMilliseconds = 50.
Behavior description:直接获取CPU时钟
details:N/A
Behavior description:查找指定内核模块
details:lstrcmpiA: ntice.sys <------> ntkrnlpa.exe Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> hal.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> KDCOM.DLL Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BOOTVID.dll Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ACPI.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> WMILIB.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> pci.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> isapnp.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> compbatt.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> BATTC.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> intelide.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> PCIIDEX.SYS Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> MountMgr.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> ftdisk.sys Des: SoftICE驱动
lstrcmpiA: ntice.sys <------> dmload.sys Des: SoftICE驱动
Behavior description:查找反病毒常用工具窗口
details:NtUserFindWindowEx: [Class,Window] = [OLLYDBG,]
NtUserFindWindowEx: [Class,Window] = [GBDYLLO,]
NtUserFindWindowEx: [Class,Window] = [pediy06,]
Activities
Activity nameTypes of
com.n0n3m4.apkexport.ExportActivityandroid.intent.action.MAIN
com.n0n3m4.apkexport.ExportActivityandroid.intent.category.LAUNCHER
Dangerous function
Function nameinformation
android/app/NotificationManager;->notify信息通知栏
ContentResolver;->query读取联系人、短信等数据库
Permission list
License nameinformation
android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
android.permission.WAKE_LOCK手机屏幕关闭后后台进程仍运行
File List
file name Check code
AndroidManifest.xml 0x44487abe
assets/busybox 0x8ee15143
assets/executable 0xa4c21844
assets/terminfo.zip 0x2262288e
classes.dex 0x99015f7f
lib/armeabi/libc4droid.so 0x493b91c4
lib/armeabi/libcutehack.so 0x453c8bd9
lib/armeabi/libsdl2util.so 0x4d329c63
lib/armeabi/libterm4c.so 0xb4e911a9
lib/armeabi/libterm4c_dirty.so 0xb1094a7b
res/anim/slide_in_left.xml 0xd6053720
res/anim/slide_out_right.xml 0xe50cdf9d
res/drawable-nodpi-v4/atari_small_nodpi.png 0x3cfe4eac
res/drawable/atari_small.png 0x3cfe4eac
res/drawable/back.png 0xd9e4d781
res/drawable/button.png 0xe45830a3
res/drawable/icon.png 0xe818d4
res/drawable/joystick.png 0x38200772
res/drawable/kbd.png 0x8a82ba84
res/drawable/logo.png 0x93f56092
res/layout/main.xml 0x6a52e71b
res/layout/splash.xml 0xc1db1fe5
res/layout/term_activity.xml 0xb15d62b8
res/menu/main.xml 0x6e916796
res/menu/mainmenu.xml 0xb1d4d429
res/raw/qt_copyright.txt 0x256eccfc
res/xml/preferences.xml 0x53bfe15e
res/xml/sdlprefs.xml 0x2c85110f
resources.arsc 0x6ea5a9d4
META-INF/MANIFEST.MF 0x4228bf72
META-INF/CERT.SF 0xf6c5c67d
META-INF/CERT.RSA 0x28d00a50
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号