VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
File Name :高级内存***.apk (File not down)
File Size :349693 byte
File Type :Zip archive data
MD5:61ae6638618fcb2c86590197c70642f0
SHA1:6bebfa1ab217cac200f33ea3af772547fc29ad62
SHA256:6c9321cf71683bc8cad403ab9207177a1e5f6028be15de9c08bf2148187ea26d
SSDEEP:6144:exCNhuwuAzsGvPsMz5YDLqAZdbJ60zFVKHduQI64OuviBt:exCr10q0GAR60p80Qhs6
  • 扫描结果
  • 权限
  • 文件行为分析
  • Scanner results
    Scanner results:0%Scanner(s) (0/32)found malware!
    Behavior analysis report:         Habo file analysis
    Time: 2017-07-12 08:45:47 (CST)
    VirSCANVirSCAN
    Scanner Engine Ver Sig Ver Sig Date Scan result Time
    antiy AVL SDK 2.0 1970-01-01 Found nothing 5
    asquared 9.0.0.4799 9.0.0.4799 2015-03-08 Found nothing 1
    avast 170303-1 4.7.4 2017-03-03 Found nothing 60
    avg 2109/14149 10.0.1405 2017-07-04 Found nothing 60
    baidu 2.0.1.0 4.1.3.52192 2.0.1.0 Found nothing 8
    baidusd 1.0 1.0 2017-03-22 Found nothing 1
    bitdefender 7.58879 7.90123 2015-01-16 Found nothing 60
    clamav 23551 0.97.5 2017-07-10 Found nothing 60
    drweb 5.0.2.3300 5.0.1.1 2017-06-18 Found nothing 60
    fortinet 50.115, 50.114, 49.970 5.4.247 2017-07-12 Found nothing 60
    fprot 4.6.2.117 6.5.1.5418 2016-02-05 Found nothing 60
    fsecure 2015-08-01-02 9.13 2015-08-01 Found nothing 60
    gdata 25.13323 25.13323 2017-07-11 Found nothing 11
    ikarus 1.06.01 V1.32.31.0 2016-11-28 Found nothing 60
    jiangmin 16.0.100 1.0.0.0 2017-07-10 Found nothing 2
    kaspersky 5.5.33 5.5.33 2014-04-01 Found nothing 60
    kingsoft 2.1 2.1 2017-07-11 Found nothing 4
    mcafee 8261 5400.1158 2016-08-18 Found nothing 60
    nod32 1777 3.0.21 2015-06-12 Found nothing 60
    panda 9.05.01 9.05.01 2017-07-11 Found nothing 4
    pcc 13.302.06 9.500-1005 2017-03-27 Found nothing 60
    qh360 1.0.1 1.0.1 1.0.1 Found nothing 4
    qqphone 1.0.0.0 1.0.0.0 2015-12-30 Found nothing 60
    quickheal 14.00 14.00 2017-07-11 Found nothing 2
    rising 26.28.00.01 26.28.00.01 2016-07-18 Found nothing 1
    sophos 5.32 3.65.2 2016-10-10 Found nothing 60
    symantec 20151230.005 1.3.0.24 2015-12-30 Found nothing 60
    tachyon 9.9.9 9.9.9 2013-12-27 Found nothing 3
    thehacker 6.8.0.5 6.8.0.5 2017-07-09 Found nothing 1
    tws 17.47.17308 1.0.2.2108 2017-07-11 Found nothing 14
    vba 3.12.29.5 beta 3.12.29.5 beta 2017-07-10 Found nothing 60
    virusbuster 15.0.985.0 5.5.2.13 2014-12-05 Found nothing 60
    Heuristic/Suspicious Exact
    NOTICE: Results are not 100% accurate and can be reported as a false positive by some scannerswhen and if malware is found. Please judge these results for yourself.
  • 权限列表
    许可名称信息
    android.permission.VIBRATE允许设备震动
    android.permission.KILL_BACKGROUND_PROCESSES关闭后台进程
    android.permission.GET_TASKS获取有关当前或最近运行的任务信息
    android.permission.SET_PROCESS_LIMIT限制进程数量
    android.permission.SIGNAL_PERSISTENT_PROCESSES获取驻留进程信号
    android.permission.USE_CREDENTIALS获取认证令牌
    android.permission.INTERNET连接网络(2G或3G)
    android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
    android.permission.RECEIVE_BOOT_COMPLETED接收开机启动广播
    android.permission.DELETE_PACKAGES删除应用
    android.permission.SET_ACTIVITY_WATCHER设置Activity观察器
  • 文件信息
    安全评分 :
    基本信息
    MD5:61ae6638618fcb2c86590197c70642f0
    包名:com.hala01.advancedmemoryboosteri
    最低运行环境:Android 2.2.x
    版权:hala01
    进程行为
    行为描述:创建本地线程
    详情信息:TargetProcess: WINWORD.EXE, InheritedFromPID = 2000, ProcessID = 2492, ThreadID = 2612, StartAddress = 77E56C7D, Parameter = 001BAC48
    TargetProcess: WINWORD.EXE, InheritedFromPID = 2000, ProcessID = 2492, ThreadID = 2616, StartAddress = 769AE43B, Parameter = 001BD590
    TargetProcess: WINWORD.EXE, InheritedFromPID = 2000, ProcessID = 2492, ThreadID = 2636, StartAddress = 77DC845A, Parameter = 00000000
    TargetProcess: WINWORD.EXE, InheritedFromPID = 2000, ProcessID = 2492, ThreadID = 2680, StartAddress = 30D5F014, Parameter = 0027C648
    TargetProcess: WINWORD.EXE, InheritedFromPID = 2000, ProcessID = 2492, ThreadID = 2712, StartAddress = 30072FB7, Parameter = 30AEA990
    文件行为
    行为描述:查找文件
    详情信息:FileName = C:\Program Files
    FileName = C:\Program Files\Microsoft Office
    FileName = C:\Program Files\Microsoft Office\OFFICE11\Normal.dot
    FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Templates\Normal.dot
    FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\Normal.dot
    FileName = C:\WINDOWS
    FileName = C:\WINDOWS\WinSxS
    FileName = C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll
    FileName = C:/Documents and Settings/Administrator/Local Settings/Temp/EB93A6/%temp%\****.exe_7zdump\应用商店搜索 - Chrome 网上应用店[被川普拉黑 推特用户控告总统侵犯第一修正案权利].doc
    FileName = C:\Documents and Settings
    FileName = C:\Documents and Settings\Administrator
    FileName = C:\Documents and Settings\Administrator\桌面
    FileName = C:\//Documents%20and%20Settings/Administrator/Local%20Settings/Temp/EB93A6/%temp%\****.exe_7zdump/应用商店搜索%20-%20Chrome%20网上应用店%5b被川普拉黑%20推特用户控告总统侵犯第一修正案权利%5d.doc
    FileName = C:\Documents and Settings\Administrator\Application Data\Microsoft\Word\STARTUP\*.*
    FileName = C:\Program Files\Microsoft Office\OFFICE11\STARTUP\*.*
    行为描述:复制文件
    详情信息:C:\Program Files\Microsoft Office\OFFICE11\opa11.bak ---> C:\Program Files\Microsoft Office\OFFICE11\opa11.dat
    注册表行为
    行为描述:修改注册表
    详情信息:\REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\StartupItems\I
    \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\StartupItems\ML
    \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\MTTT
    \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\MTTF
    \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\MTTA
    \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\StartupItems\SM
    \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\StartupItems\1N
    \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\StartupItems\/N
    \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\StartupItems\ O
    \REGISTRY\USER\S-*\Software\Microsoft\Office\Common\Assistant\CurrAsstState
    行为描述:删除注册表键值
    详情信息:\REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\MTTT
    \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\StartupItems\ML
    \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\StartupItems\SM
    \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\StartupItems\1N
    \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\StartupItems\/N
    \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\StartupItems\ O
    \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\StartupItems\I
    \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\WordName
    行为描述:删除注册表键
    详情信息:\REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\StartupItems\
    \REGISTRY\USER\S-*\Software\Microsoft\Office\11.0\Word\Resiliency\
    其他行为
    行为描述:创建互斥体
    详情信息:Local\Mutex_MSOSharedMem
    CTF.LBES.MutexDefaultS-*
    CTF.Compart.MutexDefaultS-*
    CTF.Asm.MutexDefaultS-*
    CTF.Layouts.MutexDefaultS-*
    CTF.TMD.MutexDefaultS-*
    CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
    Local\Mso97SharedDg19211108221Mutex
    Local\Mso97SharedDg20321108221Mutex
    MSCTF.GCompartListMUTEX.DefaultS-*
    Local\Mso97SharedDg19521108221Mutex
    MSCTF.Shared.MUTEX.IOH
    Local\Mso97SharedDg19531108221Mutex
    Local\Mso97SharedDg19541108221Mutex
    OfficeAssistantStateMutex
    行为描述:创建事件对象
    详情信息:EventName = Local\MsoTestEvent_e7cfc13c-a62c-4f86-ba37-b6f7163bc111
    EventName = PrimaryWord11Mutex
    EventName = MSCTF.SendReceiveConection.Event.AMJ.IC
    EventName = MSCTF.SendReceive.Event.AMJ.IC
    行为描述:查找指定窗口
    详情信息:NtUserFindWindowEx: [Class,Window] = [MSOBALLOON,]
    NtUserFindWindowEx: [Class,Window] = [MsoHelp10,]
    NtUserFindWindowEx: [Class,Window] = [AgentAnim,]
    NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
    NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
    NtUserFindWindowEx: [Class,Window] = [MsoHelp11,]
    行为描述:窗口信息
    详情信息:Pid = 2492, Hwnd=0x1034c, Text = MsoDockTop, ClassName = MsoCommandBarDock.
    Pid = 2492, Hwnd=0x10354, Text = 格式, ClassName = MsoCommandBar.
    Pid = 2492, Hwnd=0x10352, Text = 常用, ClassName = MsoCommandBar.
    Pid = 2492, Hwnd=0x10356, Text = 菜单栏, ClassName = MsoCommandBar.
    Pid = 2492, Hwnd=0x20344, Text = 文档 1, ClassName = _WwB.
    Pid = 2492, Hwnd=0x10368, Text = MSO Generic Control Container, ClassName = MsoCommandBar.
    Pid = 2492, Hwnd=0x1036c, Text = MSO Generic Control Container, ClassName = MsoCommandBar.
    Pid = 2492, Hwnd=0x10362, Text = Microsoft Word 文档, ClassName = _WwG.
    Pid = 2492, Hwnd=0x10340, Text = 文档 1 - Microsoft Word, ClassName = OpusApp.
    行为描述:调整进程token权限
    详情信息:SE_LOAD_DRIVER_PRIVILEGE
    行为描述:打开事件
    详情信息:Global\MsoTestEvent_e7cfc13c-a62c-4f86-ba37-b6f7163bc111
    MSFT.VSA.COM.DISABLE.2492
    MSFT.VSA.IEC.STATUS.6c736db0
    \SECURITY\LSA_AUTHENTICATION_INITIALIZED
    _fCanRegisterWithShellService
    CTF.ThreadMIConnectionEvent.000007E8.00000000.0000000F
    CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.0000000F
    MSCTF.SendReceiveConection.Event.IOH.IC
    MSCTF.SendReceive.Event.IOH.IC
    行为描述:隐藏指定窗口
    详情信息:[Window,Class] = [,ThunderRT6Main]
    行为描述:打开互斥体
    详情信息:ShimCacheMutex
    Local\Mutex_MSOSharedMem
    Local\Mso97SharedDg19211108221Mutex
    Local\Mso97SharedDg20321108221Mutex
    Local\MU_ACBPIDS08
    CtfmonInstMutexDefaultS-*
    Local\Mso97SharedDg19521108221Mutex
    Local\Mso97SharedDg19531108221Mutex
    Local\Mso97SharedDg19541108221Mutex
    OfficeAssistantStateMutex
    Activities
    活动名类型
    .MainActivityandroid.intent.action.MAIN
    .MainActivityandroid.intent.category.LAUNCHER
    危险函数
    函数名称信息
    java/net/URL;->openConnection连接URL
    java/net/HttpURLConnection;->connect连接URL
    ContentResolver;->query读取联系人、短信等数据库
    ActivityManager;->killBackgroundProcesses中断进程,可用于关闭杀软
    android/app/NotificationManager;->notify信息通知栏
    启动方式
    名称信息
    com.hala01.advancedmemoryboosteri.StartMyServiceAtBootReceiver开机启动服务
    com.hala01.advancedmemoryboosteri.StartMyServiceAtBootReceiver
    com.hala01.advancedmemoryboosteri.StartMyServiceAtBootReceiver
    com.hala01.advancedmemoryboosteri.StartMyServiceAtBootReceiver
    广告信息
    名称信息
    com.google.adsAdMob
    权限列表
    许可名称信息
    android.permission.VIBRATE允许设备震动
    android.permission.KILL_BACKGROUND_PROCESSES关闭后台进程
    android.permission.GET_TASKS获取有关当前或最近运行的任务信息
    android.permission.SET_PROCESS_LIMIT限制进程数量
    android.permission.SIGNAL_PERSISTENT_PROCESSES获取驻留进程信号
    android.permission.USE_CREDENTIALS获取认证令牌
    android.permission.INTERNET连接网络(2G或3G)
    android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
    android.permission.RECEIVE_BOOT_COMPLETED接收开机启动广播
    android.permission.DELETE_PACKAGES删除应用
    android.permission.SET_ACTIVITY_WATCHER设置Activity观察器
    服务列表
    名称
    com.hala01.advancedmemoryboosteri.TimeService
    文件列表
    文件名 校验码
    res/drawable/app.png 0x5f50e465
    res/drawable/border.xml 0x8fc15681
    res/drawable/border2.xml 0xf6aba73f
    res/drawable/border3.xml 0x9af352b8
    res/drawable/free.png 0xe47f1526
    res/drawable/kernel.png 0xad5d1248
    res/drawable/list_selector.xml 0x258be656
    res/drawable/ram.png 0xb96be58d
    res/drawable/scheduler.png 0xcc7f29ca
    res/drawable/shopping_cart.png 0xbbd47f57
    res/drawable/star.png 0xe54708c7
    res/drawable/task_freq.png 0x909a949c
    res/drawable/viewtask.png 0x9554a39f
    res/layout/activity_main.xml 0x4c0d9514
    res/layout/frequsedapp_main.xml 0x4cf798e5
    res/layout/frequsedlistview.xml 0x9a48d5a7
    res/layout/listview_main.xml 0xdc23da48
    res/layout/mylistview.xml 0x15f9b1ba
    res/layout/refresh.xml 0x7c45ec1b
    res/layout/scheduler.xml 0xf48ef282
    res/layout/shoppingcart.xml 0x5d1d082e
    res/menu/activity_main.xml 0xc4b74af0
    AndroidManifest.xml 0x9f059dbb
    resources.arsc 0x489e5389
    res/drawable-hdpi/ic_action_search.png 0x64275be8
    res/drawable-hdpi/ic_launcher.png 0x2aeab25f
    res/drawable-ldpi/ic_launcher.png 0x95f10314
    res/drawable-mdpi/ic_action_search.png 0xb4091fdc
    res/drawable-mdpi/ic_launcher.png 0xf4f97388
    res/drawable-xhdpi/ic_action_search.png 0x3294aee3
    res/drawable-xhdpi/ic_launcher.png 0x1cee3fbe
    classes.dex 0x3e411240
    lib/armeabi/libadvanced_memory_booster_i.so 0x60dcc6bf
    lib/armeabi-v7a/libadvanced_memory_booster_i.so 0xfd30f193
    lib/mips/libadvanced_memory_booster_i.so 0x8d4b3f06
    lib/x86/libadvanced_memory_booster_i.so 0xfe3c457a
    META-INF/MANIFEST.MF 0x1180d4f9
    META-INF/CERT.SF 0x216505cc
    META-INF/CERT.RSA 0xf4cf8a8c
    运行截图
    VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号