VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load



File information
File Name : zimiao.apk (File not down)
File Size :2274289 byte
File Type :application/zip
MD5:39f0d6f028ccfb745c3feea1e1015994
SHA1:3db85262ef52c1b12ecf02bfb1e6501ca708133e
  • 扫描结果
  • 权限
  • 文件行为分析
  • Scanner results
    Scanner results:6%Scanner(s) (2/32)found malware!        Behavior
    Time: 2018-03-04 13:36:08 (CST)
    VirSCANVirSCAN
    Scanner Engine Ver Sig Ver Sig Date Scan result Time
    antiy AVL SDK 2.0 1970-01-01 Found nothing 5
    asquared 9.0.0.4799 9.0.0.4799 2015-03-08 Found nothing 2
    avast 170303-1 4.7.4 2017-03-03 Found nothing 60
    avg 2109/14933 10.0.1405 2018-02-26 Found nothing 60
    baidu 2.0.1.0 4.1.3.52192 2.0.1.0 Found nothing 8
    baidusd 1.0 1.0 2017-03-22 Found nothing 2
    bitdefender 7.58879 7.90123 2015-01-16 Found nothing 60
    clamav 24356 0.97.5 2018-03-02 Found nothing 60
    drweb 5.0.2.3300 5.0.1.1 2018-02-28 Found nothing 60
    fortinet 5.4.247 2018-03-04 Found nothing 60
    fprot 4.6.2.117 6.5.1.5418 2016-02-05 Found nothing 60
    fsecure 2015-08-01-02 9.13 2015-08-01 Found nothing 60
    gdata 25.16214 25.16214 2018-03-03 Android.Riskware.Drolock.AH 13
    ikarus 4.00.06 V1.32.31.0 2018-03-03 Found nothing 60
    jiangmin 16.0.100 1.0.0.0 2017-12-22 Found nothing 2
    kaspersky 5.5.33 5.5.33 2014-04-01 Found nothing 60
    kingsoft 2.1 2.1 2018-03-03 Found nothing 60
    mcafee 8620 5400.1158 2017-08-12 Found nothing 60
    nod32 6992 3.0.21 2018-03-02 Found nothing 60
    panda 9.05.01 9.05.01 2018-03-03 Found nothing 4
    pcc 13.302.06 9.500-1005 2017-03-27 Found nothing 60
    qh360 1.0.1 1.0.1 1.0.1 Found nothing 3
    qqphone 1.0.0.0 1.0.0.0 2015-12-30 Found nothing 60
    quickheal 14.00 14.00 2017-11-18 Android.Agent.GEN1478 3
    rising 3292 3292 2017-12-26 Found nothing 7
    sophos 5.32 3.65.2 2016-10-10 Found nothing 60
    symantec 20151230.005 1.3.0.24 2015-12-30 Found nothing 60
    tachyon 9.9.9 9.9.9 2013-12-27 Found nothing 4
    thehacker 6.8.0.5 6.8.0.5 2018-02-28 Found nothing 4
    tws 17.47.17308 1.0.2.2108 2018-03-03 Found nothing 16
    vba 3.12.29.5 beta 3.12.29.5 beta 2018-03-03 Found nothing 60
    virusbuster 15.0.985.0 5.5.2.13 2014-12-05 Found nothing 60
    Heuristic/Suspicious Exact
    NOTICE: Results are not 100% accurate and can be reported as a false positive by some scannerswhen and if malware is found. Please judge these results for yourself.
    Copy to clipboard
  • 没有相关的权限信息

  • 文件信息
    安全评分 :
    基本信息
    MD5:39f0d6f028ccfb745c3feea1e1015994
    包名:
    最低运行环境:
    版权:
    关键行为
    行为描述:设置特殊文件夹属性
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
    C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
    C:\Documents and Settings\Administrator\Local Settings\History
    C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
    C:\Documents and Settings\Administrator\Cookies
    进程行为
    行为描述:创建本地线程
    详情信息:TargetProcess: server.exe, InheritedFromPID = 2000, ProcessID = 2704, ThreadID = 2716, StartAddress = 77DC845A, Parameter = 00000000
    TargetProcess: server.exe, InheritedFromPID = 2000, ProcessID = 2704, ThreadID = 2744, StartAddress = 7C947EBB, Parameter = 00000000
    TargetProcess: server.exe, InheritedFromPID = 2000, ProcessID = 2704, ThreadID = 2748, StartAddress = 7C930230, Parameter = 00000000
    TargetProcess: server.exe, InheritedFromPID = 2000, ProcessID = 2704, ThreadID = 2896, StartAddress = 004023EC, Parameter = 00000000
    TargetProcess: server.exe, InheritedFromPID = 2000, ProcessID = 2704, ThreadID = 3072, StartAddress = 004023EC, Parameter = 00000000
    TargetProcess: server.exe, InheritedFromPID = 2000, ProcessID = 2704, ThreadID = 3280, StartAddress = 004023EC, Parameter = 00000000
    文件行为
    行为描述:设置特殊文件夹属性
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
    C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
    C:\Documents and Settings\Administrator\Local Settings\History
    C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
    C:\Documents and Settings\Administrator\Cookies
    行为描述:查找文件
    详情信息:FileName = C:\Documents and Settings
    FileName = C:\Documents and Settings\Administrator
    FileName = C:\Documents and Settings\Administrator\Local Settings
    FileName = C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
    FileName = C:\WINDOWS\system32\Ras\*.pbk
    FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Network\Connections\Pbk\*.pbk
    网络行为
    行为描述:连接指定站点
    详情信息:InternetConnectA: ServerName = cl****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
    行为描述:打开HTTP连接
    详情信息:InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0), hSession = 0x00cc0004
    行为描述:建立到一个指定的套接字连接
    详情信息:URL: cl****om, IP: **.133.40.**:80, SOCKET = 0x00000284
    行为描述:读取网络文件
    详情信息:hFile = 0x00cc000c, BytesToRead =102400, BytesRead = 102400.
    行为描述:发送HTTP包
    详情信息:GET /client/api.asp?code=10024 HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0) Accept: */* Host: cl****om Cache-Control: no-cache
    行为描述:打开HTTP请求
    详情信息:HttpOpenRequestA: cl****om:80/client/api.asp?code=10024, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x84000000
    行为描述:按名称获取主机地址
    详情信息:GetAddrInfoW: cl****om
    gethostbyname: ww****om
    注册表行为
    行为描述:修改注册表
    详情信息:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
    行为描述:删除注册表键值
    详情信息:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyOverride
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
    其他行为
    行为描述:创建互斥体
    详情信息:RasPbFile
    CTF.LBES.MutexDefaultS-*
    CTF.Compart.MutexDefaultS-*
    CTF.Asm.MutexDefaultS-*
    CTF.Layouts.MutexDefaultS-*
    CTF.TMD.MutexDefaultS-*
    CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
    Local\ZonesCounterMutex
    Local\ZoneAttributeCacheCounterMutex
    Local\ZonesCacheCounterMutex
    Local\ZonesLockedCacheCounterMutex
    MSCTF.Shared.MUTEX.IOH
    MSCTF.Shared.MUTEX.EJK
    行为描述:隐藏指定窗口
    详情信息:[Window,Class] = [,_EL_Timer]
    行为描述:查找指定窗口
    详情信息:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
    NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
    行为描述:窗口信息
    详情信息:Pid = 2704, Hwnd=0x1035c, Text = ms, ClassName = Afx:400000:b:10011:1900015:0.
    Pid = 2704, Hwnd=0x1035a, Text = 超时, ClassName = Afx:400000:b:10011:1900015:0.
    Pid = 2704, Hwnd=0x10358, Text = 300, ClassName = Edit.
    Pid = 2704, Hwnd=0x10354, Text = 秒/次, ClassName = Afx:400000:b:10011:1900015:0.
    Pid = 2704, Hwnd=0x10352, Text = 30, ClassName = Edit.
    Pid = 2704, Hwnd=0x1034e, Text = 开始, ClassName = Button.
    Pid = 2704, Hwnd=0x10346, Text = 服务器状态 - 吾爱破解 52pojie.cn, ClassName = WTWindow.
    Pid = 2704, Hwnd=0x1034e, Text = 停止, ClassName = Button.
    Pid = 2704, Hwnd=0x10356, Text = 2018年3月27日11时41分1秒 数据服务器100 离线 2018年3月27日11时41分2秒 路由器3号楼12 离线 2018年3月27日11时41分3秒 路由器后IP3.1 离线 2018年3月27日11时41分4秒 链接百度测试 离线, ClassName = Edit.
    行为描述:打开事件
    详情信息:HookSwitchHookEnabledEvent
    \SECURITY\LSA_AUTHENTICATION_INITIALIZED
    Global\SvcctrlStartEvent_A3752DX
    \INSTALLATION_SECURITY_HOLD
    CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
    CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
    MSCTF.SendReceiveConection.Event.IOH.IC
    MSCTF.SendReceive.Event.IOH.IC
    行为描述:创建事件对象
    详情信息:EventName = DINPUTWINMM
    EventName = Global\userenv: User Profile setup event
    EventName = MSCTF.SendReceiveConection.Event.EJK.IC
    EventName = MSCTF.SendReceive.Event.EJK.IC
    行为描述:打开互斥体
    详情信息:RasPbFile
    ShimCacheMutex
    Local\_!MSFTHISTORY!_
    Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
    Local\c:!documents and settings!administrator!cookies!
    Local\c:!documents and settings!administrator!local settings!history!history.ie5!
    Local\WininetStartupMutex
    Local\WininetConnectionMutex
    Local\WininetProxyRegistryMutex
    Local\!IETld!Mutex
    运行截图
    VirSCAN

About VirSCAN | Privacy Policy | Contact us | link | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号