VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:
Behavior list
Basic Information
MD5:72bd270f9ab01599bc9ed698f027f957
Package names:com.h
Minimum operating environment:Android 2.2.x
copyright:Android
Process behavior
Behavior description:创建本地线程
details:TargetProcess: Pc去3N预测.exe, InheritedFromPID = 2000, ProcessID = 2712, ThreadID = 2724, StartAddress = 00403457, Parameter = 00000000
TargetProcess: Pc去3N预测.exe, InheritedFromPID = 2000, ProcessID = 2712, ThreadID = 2732, StartAddress = 00403418, Parameter = 00000000
TargetProcess: Pc去3N预测.exe, InheritedFromPID = 2000, ProcessID = 2712, ThreadID = 2736, StartAddress = 00403418, Parameter = 00000000
TargetProcess: Pc去3N预测.exe, InheritedFromPID = 2000, ProcessID = 2712, ThreadID = 2740, StartAddress = 00403418, Parameter = 00000000
TargetProcess: Pc去3N预测.exe, InheritedFromPID = 2000, ProcessID = 2712, ThreadID = 2744, StartAddress = 00403418, Parameter = 00000000
TargetProcess: Pc去3N预测.exe, InheritedFromPID = 2000, ProcessID = 2712, ThreadID = 2748, StartAddress = 00403418, Parameter = 00000000
TargetProcess: Pc去3N预测.exe, InheritedFromPID = 2000, ProcessID = 2712, ThreadID = 2752, StartAddress = 00403418, Parameter = 00000000
TargetProcess: Pc去3N预测.exe, InheritedFromPID = 2000, ProcessID = 2712, ThreadID = 2756, StartAddress = 00403418, Parameter = 00000000
TargetProcess: Pc去3N预测.exe, InheritedFromPID = 2000, ProcessID = 2712, ThreadID = 2760, StartAddress = 00403418, Parameter = 00000000
TargetProcess: Pc去3N预测.exe, InheritedFromPID = 2000, ProcessID = 2712, ThreadID = 2764, StartAddress = 00403418, Parameter = 00000000
TargetProcess: Pc去3N预测.exe, InheritedFromPID = 2000, ProcessID = 2712, ThreadID = 2768, StartAddress = 00403418, Parameter = 00000000
TargetProcess: Pc去3N预测.exe, InheritedFromPID = 2000, ProcessID = 2712, ThreadID = 2772, StartAddress = 00403418, Parameter = 00000000
TargetProcess: Pc去3N预测.exe, InheritedFromPID = 2000, ProcessID = 2712, ThreadID = 2776, StartAddress = 00403418, Parameter = 00000000
TargetProcess: Pc去3N预测.exe, InheritedFromPID = 2000, ProcessID = 2712, ThreadID = 2780, StartAddress = 00403418, Parameter = 00000000
TargetProcess: Pc去3N预测.exe, InheritedFromPID = 2000, ProcessID = 2712, ThreadID = 2784, StartAddress = 00403418, Parameter = 00000000
Network behavior
Behavior description:连接指定站点
details:WinHttpConnect: ServerName = ch****cn, PORT = 80, UserName = , Password = , hSession = 0x01003100, hConnect = 0x01003200, Flags = 0x00000000
WinHttpConnect: ServerName = ch****cn, PORT = 80, UserName = , Password = , hSession = 0x01002100, hConnect = 0x01002200, Flags = 0x00000000
WinHttpConnect: ServerName = ch****cn, PORT = 80, UserName = , Password = , hSession = 0x00e21100, hConnect = 0x00e21200, Flags = 0x00000000
WinHttpConnect: ServerName = ch****cn, PORT = 80, UserName = , Password = , hSession = 0x00e71100, hConnect = 0x00e71200, Flags = 0x00000000
WinHttpConnect: ServerName = ch****cn, PORT = 80, UserName = , Password = , hSession = 0x00e31100, hConnect = 0x00e31200, Flags = 0x00000000
WinHttpConnect: ServerName = ch****cn, PORT = 80, UserName = , Password = , hSession = 0x00e81100, hConnect = 0x00e81200, Flags = 0x00000000
Behavior description:打开HTTP连接
details:WinHttpOpen: UserAgent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5), hSession = 0x01003100
WinHttpOpen: UserAgent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5), hSession = 0x01002100
WinHttpOpen: UserAgent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5), hSession = 0x00e21100
WinHttpOpen: UserAgent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5), hSession = 0x00e71100
WinHttpOpen: UserAgent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5), hSession = 0x00e31100
WinHttpOpen: UserAgent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5), hSession = 0x00e81100
Behavior description:建立到一个指定的套接字连接
details:URL: ch****cn, IP: **.133.40.**:80, SOCKET = 0x00000170
URL: ch****cn, IP: **.133.40.**:80, SOCKET = 0x00000174
URL: ch****cn, IP: **.133.40.**:80, SOCKET = 0x0000011c
URL: ch****cn, IP: **.133.40.**:80, SOCKET = 0x00000150
URL: ch****cn, IP: **.133.40.**:80, SOCKET = 0x0000016c
URL: ch****cn, IP: **.133.40.**:80, SOCKET = 0x00000134
URL: ch****cn, IP: **.133.40.**:80, SOCKET = 0x00000164
URL: ch****cn, IP: **.133.40.**:80, SOCKET = 0x00000168
URL: ch****cn, IP: **.133.40.**:80, SOCKET = 0x00000184
URL: ch****cn, IP: **.133.40.**:80, SOCKET = 0x00000180
URL: ch****cn, IP: **.133.40.**:80, SOCKET = 0x00000160
URL: ch****cn, IP: **.133.40.**:80, SOCKET = 0x00000130
URL: ch****cn, IP: **.133.40.**:80, SOCKET = 0x00000188
URL: ch****cn, IP: **.133.40.**:80, SOCKET = 0x00000128
URL: ch****cn, IP: **.133.40.**:80, SOCKET = 0x00000178
Behavior description:发送HTTP包
details:GET /zst/getchartdata?sb_spm=9cefa284cbafa329f651e529d9d3049a&lotId=265108&chartType=zhzs&r=0.009212904376909137#roll_632 HTTP/1.1 Accept: */* User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) Host: ch****cn Connection: Keep-Alive
Behavior description:打开HTTP请求
details:WinHttpOpenRequest: ch****cn:80/zst/getchartdata?sb_spm=9cefa284cbafa329f651e529d9d3049a&lotid=265108&charttype=zhzs&r=0.009212904376909137#roll_632, hConnect = 0x01003200, hRequest = 0x01090000, Verb: GET, Referer: , Flags = 0x00000080
WinHttpOpenRequest: ch****cn:80/zst/getchartdata?sb_spm=9cefa284cbafa329f651e529d9d3049a&lotid=265108&charttype=zhzs&r=0.009212904376909137#roll_632, hConnect = 0x01002200, hRequest = 0x00db0000, Verb: GET, Referer: , Flags = 0x00000080
WinHttpOpenRequest: ch****cn:80/zst/getchartdata?sb_spm=9cefa284cbafa329f651e529d9d3049a&lotid=265108&charttype=zhzs&r=0.009212904376909137#roll_632, hConnect = 0x00e21200, hRequest = 0x00e60000, Verb: GET, Referer: , Flags = 0x00000080
WinHttpOpenRequest: ch****cn:80/zst/getchartdata?sb_spm=9cefa284cbafa329f651e529d9d3049a&lotid=265108&charttype=zhzs&r=0.009212904376909137#roll_632, hConnect = 0x00e71200, hRequest = 0x00e80000, Verb: GET, Referer: , Flags = 0x00000080
WinHttpOpenRequest: ch****cn:80/zst/getchartdata?sb_spm=9cefa284cbafa329f651e529d9d3049a&lotid=265108&charttype=zhzs&r=0.009212904376909137#roll_632, hConnect = 0x00e31200, hRequest = 0x00e80000, Verb: GET, Referer: , Flags = 0x00000080
WinHttpOpenRequest: ch****cn:80/zst/getchartdata?sb_spm=9cefa284cbafa329f651e529d9d3049a&lotid=265108&charttype=zhzs&r=0.009212904376909137#roll_632, hConnect = 0x01002200, hRequest = 0x00e30000, Verb: GET, Referer: , Flags = 0x00000080
WinHttpOpenRequest: ch****cn:80/zst/getchartdata?sb_spm=9cefa284cbafa329f651e529d9d3049a&lotid=265108&charttype=zhzs&r=0.009212904376909137#roll_632, hConnect = 0x00e81200, hRequest = 0x00e90000, Verb: GET, Referer: , Flags = 0x00000080
WinHttpOpenRequest: ch****cn:80/zst/getchartdata?sb_spm=9cefa284cbafa329f651e529d9d3049a&lotid=265108&charttype=zhzs&r=0.009212904376909137#roll_632, hConnect = 0x01002200, hRequest = 0x00e90000, Verb: GET, Referer: , Flags = 0x00000080
WinHttpOpenRequest: ch****cn:80/zst/getchartdata?sb_spm=9cefa284cbafa329f651e529d9d3049a&lotid=265108&charttype=zhzs&r=0.009212904376909137#roll_632, hConnect = 0x00e81200, hRequest = 0x00e30000, Verb: GET, Referer: , Flags = 0x00000080
WinHttpOpenRequest: ch****cn:80/zst/getchartdata?sb_spm=9cefa284cbafa329f651e529d9d3049a&lotid=265108&charttype=zhzs&r=0.009212904376909137#roll_632, hConnect = 0x00e21200, hRequest = 0x00e90000, Verb: GET, Referer: , Flags = 0x00000080
WinHttpOpenRequest: ch****cn:80/zst/getchartdata?sb_spm=9cefa284cbafa329f651e529d9d3049a&lotid=265108&charttype=zhzs&r=0.009212904376909137#roll_632, hConnect = 0x00e21200, hRequest = 0x00e30000, Verb: GET, Referer: , Flags = 0x00000080
Behavior description:按名称获取主机地址
details:GetAddrInfoW: ch****cn
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
MSCTF.Shared.MUTEX.MJK
Behavior description:创建事件对象
details:EventName = DINPUTWINMM
EventName = MSCTF.SendReceive.Event.MJK.IC
EventName = MSCTF.SendReceiveConection.Event.MJK.IC
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:窗口信息
details:Pid = 2712, Hwnd=0x1034c, Text = 期数:, ClassName = msctls_statusbar32.
Pid = 2712, Hwnd=0x10346, Text = Pc28 去3余N 预测 by 28客栈, ClassName = ArrtryPC28.
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceive.Event.IOH.IC
MSCTF.SendReceiveConection.Event.IOH.IC
Behavior description:隐藏指定窗口
details:[Window,Class] = [,_EL_Timer]
Behavior description:打开互斥体
details:ShimCacheMutex
Activities
Activity nameTypes of
.Mandroid.intent.action.MAIN
.Mandroid.intent.category.LAUNCHER
Dangerous function
Function nameinformation
getRuntime获取命令行环境
java/lang/Runtime;->exec执行字符串命令
Startup mode
nameinformation
com.h.bbb开机启动服务
com.h.MyAdmin
Permission list
License nameinformation
android.permission.SEND_SMS发送短信
android.permission.SYSTEM_ALERT_WINDOW显示系统窗口
android.permission.RECEIVE_BOOT_COMPLETED接收开机启动广播
android.permission.INTERNET连接网络(2G或3G)
android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
android.permission.MOUNT_UNMOUNT_FILESYSTEMS挂载、反挂载外部文件系统
android.permission.VIBRATE允许设备震动
Service list
name
com.h.s
File List
file name Check code
resources.arsc 0x715e468d
AndroidManifest.xml 0x642b9077
classes.dex 0x245123b6
res/anim/show1.xml 0xd6a4ac2e
res/anim/show2.xml 0x7654fed3
res/anim/show3.xml 0x6f1f70bf
res/anim/show4.xml 0x58501145
res/anim/tvanim.xml 0xa070c56a
res/drawable/button.xml 0x4870c4e2
res/drawable/icon.png 0x50c4fdb
res/drawable/image_1.png 0xbba22b48
res/drawable/image_10.png 0x1d8d0321
res/drawable/image_2.png 0xcc536973
res/drawable/image_3.png 0x5bf10fa0
res/drawable/image_4.png 0x177dfa26
res/drawable/image_5.png 0x847fb2e6
res/drawable/image_6.png 0xd02b3ade
res/drawable/tv.xml 0xa0b7382
res/drawable/youc1.xml 0x6f3a33c8
res/drawable/youc2.xml 0x8d4a9028
res/drawable/youc3.xml 0x589dcc4a
res/layout/main.xml 0xf41e2f66
res/layout/newone.xml 0x73d4d016
res/raw/a.mp3 0x6f0e4bb6
res/xml/my_admin.xml 0x980762b3
META-INF/MANIFEST.MF 0xbc329660
META-INF/CERT.SF 0x3f87fbe3
META-INF/CERT.RSA 0x8dcedc4c
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号