VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:
Behavior list
Basic Information
MD5:c8daa670487e5863aebfcd5db6866df2
Package names:de.mobilebits.soulcraftdefault
Minimum operating environment:Android 2.3.3, 2.3.4
copyright:
Key behavior
Behavior description:直接获取CPU时钟
details:EAX = 0xecbd62d1, EDX = 0x000000b3
EAX = 0xecbd631d, EDX = 0x000000b3
EAX = 0x3bdc3b98, EDX = 0x000000b4
EAX = 0x3bdc3be4, EDX = 0x000000b4
EAX = 0x3bdc3c30, EDX = 0x000000b4
EAX = 0x3bdc3c7c, EDX = 0x000000b4
EAX = 0x3bdc3cc8, EDX = 0x000000b4
EAX = 0x3bdc3d14, EDX = 0x000000b4
EAX = 0x3e8f3c90, EDX = 0x000000b4
EAX = 0x3e8f3cdc, EDX = 0x000000b4
Behavior description:获取TickCount值
details:TickCount = 217988, SleepMilliseconds = 20.
TickCount = 218020, SleepMilliseconds = 20.
TickCount = 218035, SleepMilliseconds = 20.
Process behavior
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2628, ThreadID = 2664, StartAddress = 79F0237F, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2628, ThreadID = 2680, StartAddress = 79F91FCF, Parameter = 00195778
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2628, ThreadID = 2748, StartAddress = 4AEA7456, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2628, ThreadID = 2760, StartAddress = 79FDA29C, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2628, ThreadID = 2772, StartAddress = 77E56C7D, Parameter = 001C31E0
TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2628, ThreadID = 2776, StartAddress = 769AE43B, Parameter = 001BB550
File behavior
Behavior description:覆盖已有文件
details:C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
Behavior description:查找文件
details:FileName = C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll
FileName = C:\WINDOWS\Microsoft.NET\Framework\\*
FileName = C:\WINDOWS
FileName = C:\WINDOWS\WinSxS
FileName = C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll
FileName = C:\WINDOWS\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.INI
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\996E.INI
FileName = C:\WINDOWS\assembly\GAC_MSIL\System.Windows.Forms\2.0.0.0__b77a5c561934e089\System.Windows.Forms.INI
FileName = C:\WINDOWS\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.INI
Other behavior
Behavior description:检测自身是否被调试
details:IsDebuggerPresent
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
Behavior description:创建事件对象
details:EventName = Global\CorDBIPCSetupSyncEvent_2628
Behavior description:打开互斥体
details:ShimCacheMutex
Global\CLR_CASOFF_MUTEX
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
Behavior description:打开事件
details:Global\CLR_PerfMon_StartEnumEvent
\KernelObjects\LowMemoryCondition
HookSwitchHookEnabledEvent
CTF.ThreadMIConnectionEvent.000007E8.00000000.0000000F
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.0000000F
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
MSFT.VSA.COM.DISABLE.2628
MSFT.VSA.IEC.STATUS.6c736db0
Behavior description:获取TickCount值
details:TickCount = 217988, SleepMilliseconds = 20.
TickCount = 218020, SleepMilliseconds = 20.
TickCount = 218035, SleepMilliseconds = 20.
Behavior description:窗口信息
details:Pid = 2628, Hwnd=0x1034a, Text = 确定, ClassName = Button.
Pid = 2628, Hwnd=0x1034c, Text = 版本:[V9],本程序自动更新,不需要手动打开!, ClassName = Static.
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = -1.
[2]: MilliSeconds = 20.
[3]: MilliSeconds = 20.
[4]: MilliSeconds = 20.
Behavior description:直接获取CPU时钟
details:EAX = 0xecbd62d1, EDX = 0x000000b3
EAX = 0xecbd631d, EDX = 0x000000b3
EAX = 0x3bdc3b98, EDX = 0x000000b4
EAX = 0x3bdc3be4, EDX = 0x000000b4
EAX = 0x3bdc3c30, EDX = 0x000000b4
EAX = 0x3bdc3c7c, EDX = 0x000000b4
EAX = 0x3bdc3cc8, EDX = 0x000000b4
EAX = 0x3bdc3d14, EDX = 0x000000b4
EAX = 0x3e8f3c90, EDX = 0x000000b4
EAX = 0x3e8f3cdc, EDX = 0x000000b4
Activities
Activity nameTypes of
delta.platforms.monodroid.downloader.DownloaderActivityandroid.intent.action.MAIN
delta.platforms.monodroid.downloader.DownloaderActivityandroid.intent.category.LAUNCHER
Dangerous function
Function nameinformation
android/app/NotificationManager;->notify信息通知栏
HttpClient;->execute请求远程服务器
DefaultHttpClient;->execute发送HTTP请求
getRuntime获取命令行环境
java/lang/Runtime;->exec执行字符串命令
java/net/URL;->openConnection连接URL
java/net/HttpURLConnection;->connect连接URL
ContentResolver;->query读取联系人、短信等数据库
TelephonyManager;->getDeviceId搜集用户手机IMEI码、电话号码、系统版本号等信息
java/net/URLConnection;->connect连接URL
Advertising information
nameinformation
com.google.adsAdMob
Permission list
License nameinformation
android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
android.permission.INTERNET连接网络(2G或3G)
android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
android.permission.WAKE_LOCK手机屏幕关闭后后台进程仍运行
android.permission.READ_PHONE_STATE读取电话状态
com.android.vending.CHECK_LICENSE
android.permission.ACCESS_WIFI_STATE读取wifi网络状态
com.android.vending.BILLING
Service list
name
delta.platforms.monodroid.downloader.SoulcraftDownloaderService
soulcraft.pushnotifications.android.NotificationServiceAndroid
de.mobilebits.soulcraftdefault.WtUDID_service
Providers
nameinformation
mono.MonoRuntimeProvider
File List
file name Check code
AndroidManifest.xml 0xc17fae15
META-INF/ 0x0
META-INF/CERT.RSA 0xce30023a
META-INF/CERT.SF 0xb4c6ace6
META-INF/MANIFEST.MF 0x92afeb7b
assemblies/ 0x0
assemblies/AdColonyBinding.dll 0xed04c6e4
assemblies/AdMobBinding.dll 0xbbc6d804
assemblies/BrandBoostBinding.dll 0xf44b3a6a
assemblies/BugSenseBinding.dll 0x3400ad71
assemblies/Delta.ContentSystem.Client.dll 0x80608ba2
assemblies/Delta.ContentSystem.Graphics.dll 0x45b8a103
assemblies/Delta.ContentSystem.dll 0x14eb0c32
assemblies/Delta.Engine.dll 0x62e95b6e
assemblies/Delta.Graphics.BaseOpenGL.dll 0x868b7ce3
assemblies/Delta.Graphics.OpenGLES20.dll 0xa90e363e
assemblies/Delta.Graphics.dll 0xfc0ac9aa
assemblies/Delta.InputSystem.MonoDroid.dll 0x20d7de86
assemblies/Delta.InputSystem.dll 0x33edaaa
assemblies/Delta.Multimedia.MonoDroid.dll 0x46afb5a6
assemblies/Delta.Multimedia.dll 0x38d0460e
assemblies/Delta.PhysicsEngine.Jitter.dll 0x6229e222
assemblies/Delta.PhysicsEngine.dll 0xca6a8e3f
assemblies/Delta.Platforms.MonoDroid.dll 0xf2e36f51
assemblies/Delta.Rendering.Basics.dll 0x4e0600d7
assemblies/Delta.Rendering.Cameras.dll 0xdfa9e379
assemblies/Delta.Rendering.Effects.dll 0xe9239d98
assemblies/Delta.Rendering.Models.dll 0x7690a7d4
assemblies/Delta.Rendering.dll 0x127439c5
assemblies/Delta.UserInterface.dll 0x915a4761
assemblies/Delta.Utilities.Achievements.dll 0x271eccce
assemblies/Delta.Utilities.Compression.dll 0x31610c5a
assemblies/Delta.Utilities.Datatypes.dll 0x48407101
assemblies/Delta.Utilities.Helpers.dll 0xfe000c44
assemblies/Delta.Utilities.Testing.dll 0x84e6764e
assemblies/Delta.Utilities.Tracker.dll 0x37f2673
assemblies/Delta.Utilities.Xml.dll 0x3edb640e
assemblies/ExpansionDownloader.dll 0xe078f670
assemblies/Jitter.dll 0x54048d18
assemblies/LicenseVerificationLibrary.dll 0x7a1fb4cd
assemblies/Mono.Android.dll 0x27e8ab33
assemblies/Mono.Security.dll 0xc5500b1f
assemblies/OpenTK.dll 0xedd507b
assemblies/Soulcraft.dll 0x1994257
assemblies/SoulcraftPhysics.dll 0x91a4f527
assemblies/SoulcraftVersionInfo.dll 0xd82c6bc
assemblies/System.Core.dll 0xad1b7219
assemblies/System.Runtime.Serialization.dll 0x50d87edd
assemblies/System.ServiceModel.Web.dll 0x64da3b67
assemblies/System.Web.Services.dll 0x6686d647
assemblies/System.Xml.Linq.dll 0xf9983110
assemblies/System.Xml.dll 0xf1d9e00
assemblies/System.dll 0xb1a724e6
assemblies/WPGInterfaces.dll 0xb0fe29
assemblies/mscorlib.dll 0xb34b2445
classes.dex 0x51d7ec3b
jsr305_annotations/ 0x0
jsr305_annotations/Jsr305_annotations.gwt.xml 0x8d4f3e59
jsr305_annotations/v0_r47/ 0x0
jsr305_annotations/v0_r47/V0_r47.gwt.xml 0x8b4479b0
lib/ 0x0
lib/armeabi/ 0x0
lib/armeabi/libmonodroid.so 0xb2e9b94c
lib/armeabi-v7a/ 0x0
lib/armeabi-v7a/libmonodroid.so 0x6eb5a2d1
lib/x86/ 0x0
lib/x86/libmonodroid.so 0x1f492a23
res/ 0x0
res/drawable-hdpi/ 0x0
res/drawable-hdpi/icon.png 0xa5bad9d1
res/drawable-hdpi/loadingbar.png 0x676fac16
res/drawable-hdpi/loadingcopyright.png 0x7a93dfc7
res/drawable-hdpi/loadingdeltaengine.png 0x1adafb06
res/drawable-hdpi/loadingkeyvisual.png 0x8f613360
res/drawable-hdpi/loadingmobilebits.png 0x6ca89676
res/drawable-hdpi/splash.png 0xe660e247
res/drawable-ldpi/ 0x0
res/drawable-ldpi/icon.png 0x1c9e860d
res/drawable-mdpi/ 0x0
res/drawable-mdpi/icon.png 0x850b0491
res/layout/ 0x0
res/layout/activity_soulcraft_downloader.xml 0xca67f8d
resources.arsc 0xecebd11a
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号