VirSCAN VirSCAN

1, Puteți ÎNCĂRCA orice tip de fișier, însă limita este de 20Mb per fișier.
2, VirSCAN suportă decompresie Rar/Zip, însă arhiva nu trebuie să conțină mai mult de 20 fișiere.
3, VirSCAN poate scana fișiere arhivate cu parola 'infected' sau 'virus'

Limba
Nivelul de încărcare a serverului
Server Load



Informații Fișier
Nume Fișier : 刺激战场v4.0辅助.apk (File not down)
Mărime Fișier :2363979 byte
Tip Fișier :application/zip
MD5:def97f885bdd7b08b67ab54311bbdb10
SHA1:f7a4c7fefed17975dd3ef2d430b0b292be5e070d
  • 扫描结果
  • 权限
  • 文件行为分析
  • Rezultatele Scanării
    Rezultatele Scanării:6%din Scanere(2/32)au găsit viruși!        Behavior
    Timp: 2018-05-23 12:38:09 (CST)
    VirSCANVirSCAN
    Scaner Versiunea Motorului Versiunea Semnăturii Data Semnăturii Rezultatele Scanării Timp
    antiy AVL SDK 2.0 1970-01-01 Nu s-a găsit nimic 7
    asquared 9.0.0.4799 9.0.0.4799 2015-03-08 Nu s-a găsit nimic 2
    avast 170303-1 4.7.4 2017-03-03 Nu s-a găsit nimic 60
    avg 2109/15166 10.0.1405 2018-05-18 Nu s-a găsit nimic 60
    baidu 2.0.1.0 4.1.3.52192 2.0.1.0 Nu s-a găsit nimic 12
    baidusd 1.0 1.0 2017-03-22 Nu s-a găsit nimic 2
    bitdefender 7.58879 7.90123 2015-01-16 Nu s-a găsit nimic 60
    clamav 24593 0.97.5 2018-05-22 Nu s-a găsit nimic 60
    drweb 5.0.2.3300 5.0.1.1 2018-03-29 Nu s-a găsit nimic 60
    fortinet 1.000, 58.443, 58.279, 58.302 5.4.247 2018-05-23 Nu s-a găsit nimic 60
    fprot 4.6.2.117 6.5.1.5418 2016-02-05 Nu s-a găsit nimic 60
    fsecure 2015-08-01-02 9.13 2015-08-01 Nu s-a găsit nimic 60
    gdata 25.17133 25.17133 2018-05-21 Android.Riskware.Drolock.AH 14
    ikarus 4.00.06 V1.32.31.0 2018-05-22 Nu s-a găsit nimic 60
    jiangmin 16.0.100 1.0.0.0 2017-12-22 Nu s-a găsit nimic 2
    kaspersky 5.5.33 5.5.33 2014-04-01 Nu s-a găsit nimic 60
    kingsoft 2.1 2.1 2018-05-22 Nu s-a găsit nimic 5
    mcafee 8620 5400.1158 2017-08-12 Nu s-a găsit nimic 60
    nod32 7240 3.0.21 2018-04-18 Nu s-a găsit nimic 60
    panda 9.05.01 9.05.01 2018-05-22 Nu s-a găsit nimic 4
    pcc 13.302.06 9.500-1005 2017-03-27 Nu s-a găsit nimic 60
    qh360 1.0.1 1.0.1 1.0.1 Nu s-a găsit nimic 3
    qqphone 1.0.0.0 1.0.0.0 2015-12-30 Nu s-a găsit nimic 60
    quickheal 14.00 14.00 2017-11-18 Android.Agent.GEN1478 6
    rising 3608 3608 2017-12-26 Nu s-a găsit nimic 7
    sophos 5.32 3.65.2 2016-10-10 Nu s-a găsit nimic 60
    symantec 20151230.005 1.3.0.24 2015-12-30 Nu s-a găsit nimic 60
    tachyon 9.9.9 9.9.9 2013-12-27 Nu s-a găsit nimic 5
    thehacker 6.8.0.5 6.8.0.5 2018-05-15 Nu s-a găsit nimic 4
    tws 17.47.17308 1.0.2.2108 2018-05-22 Nu s-a găsit nimic 17
    vba 3.12.29.5 beta 3.12.29.5 beta 2018-04-10 Nu s-a găsit nimic 60
    virusbuster 15.0.985.0 5.5.2.13 2014-12-05 Nu s-a găsit nimic 60
    Heuristic/Suspicious Exact
    NOTĂ: Unele scanere ar putea da alarme false în legătură cu virușii detectați, deci ar trebui să judecați pe cont propriu.
    Copiază în Clipboard
  • 没有相关的权限信息

  • 文件信息
    安全评分 :
    基本信息
    MD5:def97f885bdd7b08b67ab54311bbdb10
    包名:
    最低运行环境:
    版权:
    关键行为
    行为描述:跨进程写入数据
    详情信息:TargetProcess = C:\Windows\explorer.exe, WriteAddress = 0x00050000, Size = 0x00000020 TargetPID = 0x00000ca8
    TargetProcess = C:\Windows\explorer.exe, WriteAddress = 0x00050020, Size = 0x00000034 TargetPID = 0x00000ca8
    TargetProcess = C:\Windows\explorer.exe, WriteAddress = 0x7ffdc238, Size = 0x00000004 TargetPID = 0x00000ca8
    TargetProcess = C:\Windows\System32\%temp%\****.exe, WriteAddress = 0x00330000, Size = 0x00000084 TargetPID = 0x000002a8
    TargetProcess = C:\Windows\System32\%temp%\****.exe, WriteAddress = 0x00330000, Size = 0x00000030 TargetPID = 0x000002a8
    TargetProcess = C:\Windows\System32\%temp%\****.exe, WriteAddress = 0x00340000, Size = 0x0000011e TargetPID = 0x000002a8
    TargetProcess = C:\Windows\System32\%temp%\****.exe, WriteAddress = 0x00340000, Size = 0x0000011a TargetPID = 0x000002a8
    TargetProcess = C:\Windows\System32\%temp%\****.exe, WriteAddress = 0x00340000, Size = 0x00000120 TargetPID = 0x000002a8
    TargetProcess = C:\Windows\System32\%temp%\****.exe, WriteAddress = 0x00340000, Size = 0x0000010a TargetPID = 0x000002a8
    TargetProcess = C:\Windows\System32\%temp%\****.exe, WriteAddress = 0x00340000, Size = 0x000000d4 TargetPID = 0x000002a8
    TargetProcess = C:\Windows\System32\%temp%\****.exe, WriteAddress = 0x00340000, Size = 0x00000100 TargetPID = 0x000002a8
    TargetProcess = C:\Windows\explorer.exe, WriteAddress = 0x00790000, Size = 0x00000050 TargetPID = 0x00000ca8
    TargetProcess = C:\Windows\explorer.exe, WriteAddress = 0x00790000, Size = 0x00000098 TargetPID = 0x00000ca8
    TargetProcess = C:\Windows\explorer.exe, WriteAddress = 0x00790000, Size = 0x00000084 TargetPID = 0x00000ca8
    TargetProcess = C:\Windows\explorer.exe, WriteAddress = 0x00790000, Size = 0x00000074 TargetPID = 0x00000ca8
    行为描述:获取硬件属性检测虚拟机
    详情信息:检测Vmware: 调用WMI接口获取硬件信息
    行为描述:查询注册表_检测虚拟机相关
    详情信息:\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
    行为描述:创建远程线程
    详情信息:C:\Windows\explorer.exe
    C:\Windows\System32\lsass.exe
    行为描述:设置线程上下文
    详情信息:C:\Windows\explorer.exe
    行为描述:设置特殊文件夹属性
    详情信息:C:\Users\Administrator\AppData\Local\Microsoft\Windows\Burn\Burn
    C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
    C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Cookies
    C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\History.IE5
    行为描述:直接调用系统关键API
    详情信息:Index = 0x00000062, Name: NtDelayExecution, Instruction Address = 0x00E03829
    Index = 0x000000BF, Name: NtOpenProcessToken, Instruction Address = 0x00E0384F
    Index = 0x000000ED, Name: NtQueryInformationToken, Instruction Address = 0x00E03872
    Index = 0x000000ED, Name: NtQueryInformationToken, Instruction Address = 0x00E0C858
    Index = 0x000000ED, Name: NtQueryInformationToken, Instruction Address = 0x00E0C889
    Index = 0x000000AF, Name: NtOpenDirectoryObject, Instruction Address = 0x00E0C227
    Index = 0x000000ED, Name: NtQueryInformationToken, Instruction Address = 0x00E0C2A9
    Index = 0x000000ED, Name: NtQueryInformationToken, Instruction Address = 0x00E0C2D9
    Index = 0x00000032, Name: NtClose, Instruction Address = 0x00E039AB
    Index = 0x00000187, Name: NtWaitForSingleObject, Instruction Address = 0x00E03AD4
    行为描述:通过内存映射跨进程修改内存
    详情信息:TargetProcess = explorer.exe
    TargetProcess = lsass.exe
    行为描述:修改注册表_启动项
    详情信息:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fe8f8cf45577f23c84e3b206f3d0601e
    进程行为
    行为描述:跨进程写入数据
    详情信息:TargetProcess = C:\Windows\explorer.exe, WriteAddress = 0x00050000, Size = 0x00000020 TargetPID = 0x00000ca8
    TargetProcess = C:\Windows\explorer.exe, WriteAddress = 0x00050020, Size = 0x00000034 TargetPID = 0x00000ca8
    TargetProcess = C:\Windows\explorer.exe, WriteAddress = 0x7ffdc238, Size = 0x00000004 TargetPID = 0x00000ca8
    TargetProcess = C:\Windows\System32\%temp%\****.exe, WriteAddress = 0x00330000, Size = 0x00000084 TargetPID = 0x000002a8
    TargetProcess = C:\Windows\System32\%temp%\****.exe, WriteAddress = 0x00330000, Size = 0x00000030 TargetPID = 0x000002a8
    TargetProcess = C:\Windows\System32\%temp%\****.exe, WriteAddress = 0x00340000, Size = 0x0000011e TargetPID = 0x000002a8
    TargetProcess = C:\Windows\System32\%temp%\****.exe, WriteAddress = 0x00340000, Size = 0x0000011a TargetPID = 0x000002a8
    TargetProcess = C:\Windows\System32\%temp%\****.exe, WriteAddress = 0x00340000, Size = 0x00000120 TargetPID = 0x000002a8
    TargetProcess = C:\Windows\System32\%temp%\****.exe, WriteAddress = 0x00340000, Size = 0x0000010a TargetPID = 0x000002a8
    TargetProcess = C:\Windows\System32\%temp%\****.exe, WriteAddress = 0x00340000, Size = 0x000000d4 TargetPID = 0x000002a8
    TargetProcess = C:\Windows\System32\%temp%\****.exe, WriteAddress = 0x00340000, Size = 0x00000100 TargetPID = 0x000002a8
    TargetProcess = C:\Windows\explorer.exe, WriteAddress = 0x00790000, Size = 0x00000050 TargetPID = 0x00000ca8
    TargetProcess = C:\Windows\explorer.exe, WriteAddress = 0x00790000, Size = 0x00000098 TargetPID = 0x00000ca8
    TargetProcess = C:\Windows\explorer.exe, WriteAddress = 0x00790000, Size = 0x00000084 TargetPID = 0x00000ca8
    TargetProcess = C:\Windows\explorer.exe, WriteAddress = 0x00790000, Size = 0x00000074 TargetPID = 0x00000ca8
    行为描述:创建进程
    详情信息:[0x00000ca8]ImagePath = C:\Windows\explorer.exe, CmdLine = "C:\Windows\explorer.exe"
    行为描述:创建远程线程
    详情信息:C:\Windows\explorer.exe
    C:\Windows\System32\lsass.exe
    行为描述:设置线程上下文
    详情信息:C:\Windows\explorer.exe
    行为描述:枚举进程
    详情信息:N/A
    行为描述:通过内存映射跨进程修改内存
    详情信息:TargetProcess = explorer.exe
    TargetProcess = lsass.exe
    文件行为
    行为描述:重命名文件
    详情信息:C:\Users\Administrator\AppData\Local\%temp%\b70c.exe ---> C:\Users\Administrator\AppData\Roaming\csrss.exe
    行为描述:设置特殊文件夹属性
    详情信息:C:\Users\Administrator\AppData\Local\Microsoft\Windows\Burn\Burn
    C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
    C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Cookies
    C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\History.IE5
    网络行为
    行为描述:打开HTTP连接
    详情信息:WinHttpOpen: UserAgent: Mozilla/5.0 (X11; Linux i586; rv:31.0) Gecko/20100101 Firefox/31.0, hSession = 0x002d4320
    注册表行为
    行为描述:修改注册表
    详情信息:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\StagingInfo\Volume{21405768-cb87-11e4-8598-806e6f6e6963}\DriveNumber
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{01979c6a-42fa-414c-b8aa-eee2c8202018}.check.100\CheckSetting
    \REGISTRY\MACHINE\SAM\SAM\Domains\Account\Users\000001F4\F
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count\P:\zbavgbe\DD.rkr
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{945a8954-c147-4acd-923f-40c45405a658}.check.42\CheckSetting
    行为描述:删除注册表键值
    详情信息:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\StagingInfo\Volume{21405768-cb87-11e4-8598-806e6f6e6963}\DriveNumber
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Explorer\CD Burning\CD Recorder Drive
    行为描述:查询注册表_检测虚拟机相关
    详情信息:\REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
    行为描述:修改注册表_启动项
    详情信息:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fe8f8cf45577f23c84e3b206f3d0601e
    其他行为
    行为描述:检测自身是否被调试
    详情信息:IsDebuggerPresent
    行为描述:创建互斥体
    详情信息:CDBurnNotify
    Global\CDBurnExclusive
    6A629661F0EA637362F35C636DFBEA1D
    行为描述:获取硬件属性检测虚拟机
    详情信息:检测Vmware: 调用WMI接口获取硬件信息
    行为描述:创建事件对象
    详情信息:EventName = A703EB833B9F37AFC76B03BBD3B72F47
    EventName = 7B437F07FF97FB134BE3877F178F93CB
    行为描述:直接调用系统关键API
    详情信息:Index = 0x00000062, Name: NtDelayExecution, Instruction Address = 0x00E03829
    Index = 0x000000BF, Name: NtOpenProcessToken, Instruction Address = 0x00E0384F
    Index = 0x000000ED, Name: NtQueryInformationToken, Instruction Address = 0x00E03872
    Index = 0x000000ED, Name: NtQueryInformationToken, Instruction Address = 0x00E0C858
    Index = 0x000000ED, Name: NtQueryInformationToken, Instruction Address = 0x00E0C889
    Index = 0x000000AF, Name: NtOpenDirectoryObject, Instruction Address = 0x00E0C227
    Index = 0x000000ED, Name: NtQueryInformationToken, Instruction Address = 0x00E0C2A9
    Index = 0x000000ED, Name: NtQueryInformationToken, Instruction Address = 0x00E0C2D9
    Index = 0x00000032, Name: NtClose, Instruction Address = 0x00E039AB
    Index = 0x00000187, Name: NtWaitForSingleObject, Instruction Address = 0x00E03AD4
    行为描述:查找指定窗口
    详情信息:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
    行为描述:调整进程token权限
    详情信息:SE_DEBUG_PRIVILEGE
    SE_SHUTDOWN_PRIVILEGE
    SE_AUDIT_PRIVILEGE
    行为描述:打开事件
    详情信息:HookSwitchHookEnabledEvent
    Global\SvcctrlStartEvent_A3752DX
    7B437F07FF97FB134BE3877F178F93CB
    Global\TermSrvReadyEvent
    \SECURITY\LSA_AUTHENTICATION_INITIALIZED
    \KernelObjects\MaximumCommitCondition
    MSFT.VSA.COM.DISABLE.3240
    MSFT.VSA.IEC.STATUS.6c736db0
    \INSTALLATION_SECURITY_HOLD
    {A1965210-3A9D-4bca-822B-433645B3F5A2}
    行为描述:直接操作物理设备
    详情信息:\??\PHYSICALDRIVE0
    行为描述:打开互斥体
    详情信息:6A629661F0EA637362F35C636DFBEA1D
    CDBurnNotify
    Global\CDBurnExclusive
    Local\_!MSFTHISTORY!_
    Local\c:!users!administrator!appdata!local!microsoft!windows!temporary internet files!content.ie5!
    Local\c:!users!administrator!appdata!roaming!microsoft!windows!cookies!
    Local\c:!users!administrator!appdata!local!microsoft!windows!history!history.ie5!
    运行截图
    VirSCAN

Despre VirSCAN | Politica de confidențialitate | Contact | 友情链接 | Ajută VirSCAN
Tradus de Viorel Petrișor Neculai & Mihai Chiş, România
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号