VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

File information

Scanner results
Scanner results:0%Antivirus software(0/32)found malware!
Behavior analysis report:         Habo file analysis
Time: 2015-10-17 21:46:30 (CST)
Scanner Engine Ver Sig Ver Sig Date Scan result Time
antiy AVL SDK 3.0 1970-01-01 Found nothing 5
asquared 9.0.0.4324 9.0.0.4324 2014-07-03 Found nothing 1
avast 150725-1 4.7.4 2015-07-25 Found nothing 0
avg 2109/8133 10.0.1405 2014-11-26 Found nothing 0
baidu 2.0.1.0 4.1.3.52192 2.0.1.0 Found nothing 7
baidusd 1.0 1.0 2014-04-02 Found nothing 1
bitdefender 7.58469 7.90123 2014-12-25 Found nothing 0
clamav 19861 0.97.5 2014-12-31 Found nothing 0
drweb 5.0.2.3300 5.0.1.1 2014-12-31 Found nothing 0
fortinet 23.345, 23.345 5.1.158 2014-12-08 Found nothing 0
fprot 4.6.2.117 6.5.1.5418 2014-12-31 Found nothing 0
fsecure 2014-04-02-01 9.13 2014-04-02 Found nothing 0
gdata 25.3911 25.3911 2015-10-17 Found nothing 9
ikarus 1.06.01 V1.32.31.0 2014-12-08 Found nothing 0
jiangmin 16.0.100 1.0.0.0 2015-07-25 Found nothing 60
kaspersky 5.5.33 5.5.33 2014-04-01 Found nothing 0
kingsoft 2.1 2.1 2013-09-22 Found nothing 15
mcafee 7638 5400.1158 2014-11-30 Found nothing 0
nod32 0920 3.0.21 2014-12-23 Found nothing 0
panda 9.05.01 9.05.01 2015-07-26 Found nothing 4
pcc 11.380.07 9.500-1005 2014-12-31 Found nothing 0
qh360 1.0.1 1.0.1 1.0.1 Found nothing 7
qqphone 1.0.0.0 1.0.0.0 2014-12-09 Found nothing 0
quickheal 14.00 14.00 2015-07-25 Found nothing 2
rising 25.76.04.01 25.76.04.01 2015-07-24 Found nothing 1
sophos 5.08 3.55.0 2014-12-01 Found nothing 0
symantec 20141230.001 1.3.0.24 2014-12-30 Found nothing 0
tachyon 9.9.9 9.9.9 2013-12-27 Found nothing 4
thehacker 6.8.0.5 6.8.0.5 2015-07-23 Found nothing 2
tws 17.47.17308 1.0.2.2108 2014-12-08 Found nothing 13
vba 3.12.26.3 3.12.26.3 2014-12-31 Found nothing 0
virusbuster 15.0.985.0 5.5.2.13 2014-12-05 Found nothing 0
权限列表
许可名称 信息
android.permission.RECEIVE_SMS 监控接收短信
android.permission.VIBRATE 允许设备震动
android.permission.RECEIVE_BOOT_COMPLETED 接收开机启动广播
android.permission.WRITE_SETTINGS 读写系统设置项
android.permission.INTERNET 连接网络(2G或3G)
android.permission.READ_PHONE_STATE 读取电话状态
android.permission.WRITE_EXTERNAL_STORAGE 写外部存储器(如:SD卡)
android.permission.ACCESS_FINE_LOCATION 获取精确的位置(通过GPS)
android.permission.ACCESS_NETWORK_STATE 读取网络状态(2G或3G)
文件信息
VirSCANVirSCAN
安全评分 :
基本信息
VirSCANVirSCAN
MD5:c30c589bcdaa89386677cc76121b7311
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
包名:TianMu_ModulecCntrol.main
最低运行环境:Android 1.5
版权:bj
关键行为
VirSCANVirSCAN
行为描述: 写权限映射文件
详情信息: CiceroSharedMemDefaultS-*
MSCTF.MarshalInterface.FileMap.EMF..GIOGH
MSCTF.MarshalInterface.FileMap.EMF.B.GIOGH
MSCTF.MarshalInterface.FileMap.EMF.C.GIOGH
MSCTF.MarshalInterface.FileMap.EMF.D.GIOGH
MSCTF.MarshalInterface.FileMap.EMF.E.GIOGH
MSCTF.MarshalInterface.FileMap.EMF.F.GIOGH
MSCTF.MarshalInterface.FileMap.EMF.G.GIOGH
MSCTF.Shared.SFM.EMF
行为描述: 隐藏指定窗口
详情信息: [Window,Class] = [,Button]
[Window,Class] = [,Edit]
进程行为
VirSCANVirSCAN
行为描述: 写权限映射文件
详情信息: CiceroSharedMemDefaultS-*
MSCTF.MarshalInterface.FileMap.EMF..GIOGH
MSCTF.MarshalInterface.FileMap.EMF.B.GIOGH
MSCTF.MarshalInterface.FileMap.EMF.C.GIOGH
MSCTF.MarshalInterface.FileMap.EMF.D.GIOGH
MSCTF.MarshalInterface.FileMap.EMF.E.GIOGH
MSCTF.MarshalInterface.FileMap.EMF.F.GIOGH
MSCTF.MarshalInterface.FileMap.EMF.G.GIOGH
MSCTF.Shared.SFM.EMF
行为描述: 隐藏指定窗口
详情信息: [Window,Class] = [,Button]
[Window,Class] = [,Edit]
文件行为
VirSCANVirSCAN
行为描述: 写权限映射文件
详情信息: CiceroSharedMemDefaultS-*
MSCTF.MarshalInterface.FileMap.EMF..GIOGH
MSCTF.MarshalInterface.FileMap.EMF.B.GIOGH
MSCTF.MarshalInterface.FileMap.EMF.C.GIOGH
MSCTF.MarshalInterface.FileMap.EMF.D.GIOGH
MSCTF.MarshalInterface.FileMap.EMF.E.GIOGH
MSCTF.MarshalInterface.FileMap.EMF.F.GIOGH
MSCTF.MarshalInterface.FileMap.EMF.G.GIOGH
MSCTF.Shared.SFM.EMF
行为描述: 重命名文件
详情信息: C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445021619.519654.exe_7zdump\VB34N64UK64UY3W1R654.exe ---> C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\1445021619.519654.exe_7zdump\E54TG13N35R.exe
行为描述: 查找文件
详情信息: FileName = c:\windows\system32\drivers\etc\hosts
注册表行为
VirSCANVirSCAN
行为描述: 修改注册表
详情信息: \REGISTRY\USER\S-*\Software\Microsoft\Multimedia\DrawDib\vga.drv 1920x973x16(565 0)
其他行为
VirSCANVirSCAN
行为描述: 内联HOOK
详情信息: C:\WINDOWS\system32\ntdll.dll--->LdrFindResource_U Offset = 0x0
C:\WINDOWS\system32\ntdll.dll--->LdrAccessResource Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->LoadStringA Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->LoadStringW Offset = 0x0
C:\WINDOWS\system32\GDI32.dll--->ExtTextOutA Offset = 0x0
C:\WINDOWS\system32\GDI32.dll--->ExtTextOutW Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetWindowLongA Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->SetWindowLongA Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->SetWindowLongW Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetWindowLongW Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->BeginPaint Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->EndPaint Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetDC Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->GetWindowDC Offset = 0x0
C:\WINDOWS\system32\USER32.dll--->ReleaseDC Offset = 0x0
行为描述: 窗口信息
详情信息: Pid = 284, Hwnd=0x102f8, Text = 确认修改, ClassName = Button.
Pid = 284, Hwnd=0x102f6, Text = 不修改可留空, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 284, Hwnd=0x102f4, Text = 不修改可留空, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 284, Hwnd=0x102f2, Text = *验证安全密码, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 284, Hwnd=0x102ee, Text = 绑定信息:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 284, Hwnd=0x102ea, Text = 登陆密码:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 284, Hwnd=0x102e8, Text = 安全密码:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 284, Hwnd=0x102e2, Text = 用户帐号:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 284, Hwnd=0x102e0, Text = 注册帐号, ClassName = Button.
Pid = 284, Hwnd=0x102de, Text = 充值, ClassName = Button(RadioButton).
Pid = 284, Hwnd=0x202d2, Text = 注册, ClassName = Button(RadioButton).
Pid = 284, Hwnd=0x302b6, Text = 推广帐号:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 284, Hwnd=0x702c0, Text = 绑定信息:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 284, Hwnd=0x202ac, Text = 安全密码:, ClassName = Afx:400000:b:10011:1900015:0.
Pid = 284, Hwnd=0x202ae, Text = 登陆密码:, ClassName = Afx:400000:b:10011:1900015:0.
行为描述: 隐藏指定窗口
详情信息: [Window,Class] = [,Button]
[Window,Class] = [,Edit]
行为描述: 创建互斥体
详情信息: RasPbFile
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
ini_read_write
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.EMF
行为描述: 查找指定窗口
详情信息: NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
动态列表行为
VirSCANVirSCAN
行为描述: 读取系统设置
详情信息: [u'android.app.ContextImpl$ApplicationContentResolver@41541670', u'airplane_mode_on']
[u'android.app.ContextImpl$ApplicationContentResolver@41541670', u'airplane_mode_on']
[u'android.app.ContextImpl$ApplicationContentResolver@41541670', u'airplane_mode_on']
[u'android.app.ContextImpl$ApplicationContentResolver@41541670', u'airplane_mode_on']
[u'android.app.ContextImpl$ApplicationContentResolver@41541670', u'airplane_mode_on']
[u'android.app.ContextImpl$ApplicationContentResolver@41541670', u'airplane_mode_on']
[u'android.app.ContextImpl$ApplicationContentResolver@41541670', u'airplane_mode_on']
[u'android.app.ContextImpl$ApplicationContentResolver@41541670', u'airplane_mode_on']
[u'android.app.ContextImpl$ApplicationContentResolver@41541670', u'airplane_mode_on']
行为描述: 窗口信息
详情信息: {"text": "模式切换器", "class": "android.widget.TextView"}
{"text": "产品说明", "class": "android.widget.TextView"}
{"text": "效果设置", "class": "android.widget.TextView"}
{"text": "手机定时切换模式器", "class": "android.widget.TextView"}
{"text": " 通过本软件您可设定有效时间段,和非有效时间段的手机模式,进行自动手机模式切换。免去了您不必要的烦恼。实乃享受生活、决胜职场的必备软件。", "class": "android.widget.TextView"}
行为描述: 启动服务
详情信息: {"FLAG":0,"COMPONENT_NAME":"ComponentInfo{TianMu_ModulecCntrol.main\/TianMu_ModulecCntrol.main.myServices2}"}
{"FLAG":0,"COMPONENT_NAME":"ComponentInfo{TianMu_ModulecCntrol.main\/TianMu_ModulecCntrol.main.myServices2}"}
行为描述: 添加View
详情信息: [u'com.android.internal.policy.impl.PhoneWindow$DecorView@41550fd8', u'WM.LayoutParams{(0,0)(fillxfill) sim=#100 ty=1 fl=#8010100 pfl=0x8 wanim=0x1030001}', u'android.view.CompatibilityInfoHolder@414af9c8']
行为描述: 初始化Intent
详情信息: [u'TianMu_ModulecCntrol.main.index@41546df0', u'class TianMu_ModulecCntrol.main.myServices2']
[u'android.os.Parcel@414ad1b8']
[u'android.os.Parcel@414ad1b8']
[u'android.os.Parcel@414ad1b8']
[u'android.app.ReceiverRestrictedContext@415350c0', u'class TianMu_ModulecCntrol.main.myServices2']
[u'android.os.Parcel@414ad178']
Activities
VirSCANVirSCAN
活动名 类型
.index android.intent.action.MAIN
.index android.intent.category.LAUNCHER
危险函数
VirSCANVirSCAN
函数名称 信息
HttpClient;->execute 请求远程服务器
DefaultHttpClient;->execute 发送HTTP请求
java/net/URL;->openConnection 连接URL
java/net/HttpURLConnection;->connect 连接URL
启动方式
VirSCANVirSCAN
名称 信息
TianMu_ModulecCntrol.main.myBroadcastReceiver 开机启动服务
TianMu_ModulecCntrol.main.myBroadcastReceiver 监控短信(收到短信)启动服务
权限列表
VirSCANVirSCAN
许可名称 信息
android.permission.RECEIVE_SMS 监控接收短信
android.permission.VIBRATE 允许设备震动
android.permission.RECEIVE_BOOT_COMPLETED 接收开机启动广播
android.permission.WRITE_SETTINGS 读写系统设置项
android.permission.INTERNET 连接网络(2G或3G)
android.permission.READ_PHONE_STATE 读取电话状态
android.permission.WRITE_EXTERNAL_STORAGE 写外部存储器(如:SD卡)
android.permission.ACCESS_FINE_LOCATION 获取精确的位置(通过GPS)
android.permission.ACCESS_NETWORK_STATE 读取网络状态(2G或3G)
服务列表
VirSCANVirSCAN
名称
TianMu_ModulecCntrol.main.myServices2
文件列表
VirSCANVirSCAN
文件名 校验码
META-INF/MANIFEST.MF 0x4125e4a9
META-INF/KEY-OPHO.SF 0x2a7e0b5c
META-INF/KEY-OPHO.RSA 0x9ec48dd8
res/drawable/icon.png 0x4cd43e10
res/drawable/index.png 0x8d76588
res/layout/main.xml 0x2c057679
res/layout/spinner.xml 0xe8d8cf6b
AndroidManifest.xml 0x53e9837e
resources.arsc 0xb07a299f
classes.dex 0xc0539ef3
运行截图
VirSCANVirSCAN
VirSCAN