VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load



File information
File Name : base.apk (File not down)
File Size :7188307 byte
File Type :application/zip
MD5:7418d838f46157bedb85518c71788f33
SHA1:6d4462f5448479c91d8f81b51fbf427bee36e080
  • 扫描结果
  • 权限
  • 文件行为分析
  • Scanner results
    Scanner results:0%Scanner(s) (0/32)found malware!        Behavior
    Time: 2018-02-22 23:11:53 (CST)
    VirSCANVirSCAN
    Scanner Engine Ver Sig Ver Sig Date Scan result Time
    antiy AVL SDK 2.0 1970-01-01 Found nothing 5
    asquared 9.0.0.4799 9.0.0.4799 2015-03-08 Found nothing 1
    avast 170303-1 4.7.4 2017-03-03 Found nothing 60
    avg 2109/14887 10.0.1405 2018-02-10 Found nothing 60
    baidu 2.0.1.0 4.1.3.52192 2.0.1.0 Found nothing 3
    baidusd 1.0 1.0 2017-03-22 Found nothing 1
    bitdefender 7.58879 7.90123 2015-01-16 Found nothing 60
    clamav 24332 0.97.5 2018-02-20 Found nothing 60
    drweb 5.0.2.3300 5.0.1.1 2018-02-21 Found nothing 60
    fortinet 1.000, 55.281, 55.162, 55.191 5.4.247 2018-02-20 Found nothing 60
    fprot 4.6.2.117 6.5.1.5418 2016-02-05 Found nothing 60
    fsecure 2015-08-01-02 9.13 2015-08-01 Found nothing 60
    gdata 25.16103 25.16103 2018-02-21 Found nothing 14
    ikarus 4.00.06 V1.32.31.0 2018-02-21 Found nothing 60
    jiangmin 16.0.100 1.0.0.0 2017-12-22 Found nothing 2
    kaspersky 5.5.33 5.5.33 2014-04-01 Found nothing 60
    kingsoft 2.1 2.1 2018-02-21 Found nothing 6
    mcafee 8620 5400.1158 2017-08-12 Found nothing 60
    nod32 6936 3.0.21 2018-02-20 Found nothing 60
    panda 9.05.01 9.05.01 2018-02-21 Found nothing 4
    pcc 13.302.06 9.500-1005 2017-03-27 Found nothing 60
    qh360 1.0.1 1.0.1 1.0.1 Found nothing 3
    qqphone 1.0.0.0 1.0.0.0 2015-12-30 Found nothing 60
    quickheal 14.00 14.00 2017-11-18 Found nothing 3
    rising 3252 3252 2017-12-26 Found nothing 2
    sophos 5.32 3.65.2 2016-10-10 Found nothing 60
    symantec 20151230.005 1.3.0.24 2015-12-30 Found nothing 60
    tachyon 9.9.9 9.9.9 2013-12-27 Found nothing 4
    thehacker 6.8.0.5 6.8.0.5 2018-02-19 Found nothing 2
    tws 17.47.17308 1.0.2.2108 2018-02-21 Found nothing 14
    vba 3.12.29.5 beta 3.12.29.5 beta 2018-02-21 Found nothing 60
    virusbuster 15.0.985.0 5.5.2.13 2014-12-05 Found nothing 60
    Heuristic/Suspicious Exact
    NOTICE: Results are not 100% accurate and can be reported as a false positive by some scannerswhen and if malware is found. Please judge these results for yourself.
    Copy to clipboard
  • 权限列表
    许可名称信息
    android.permission.READ_LOGS读取系统日志
    android.permission.ACCESS_WIFI_STATE读取wifi网络状态
    android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
    android.permission.VIBRATE允许设备震动
    android.permission.WRITE_SETTINGS读写系统设置项
    android.permission.DEVICE_POWER电源管理
    android.permission.GET_TASKS获取有关当前或最近运行的任务信息
    android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
    android.permission.INTERNET连接网络(2G或3G)
    android.permission.READ_PHONE_STATE读取电话状态
    com.android.vending.CHECK_LICENSE
    android.permission.RECEIVE_BOOT_COMPLETED接收开机启动广播
    android.permission.ACCESS_SUPERUSER
  • 文件信息
    安全评分 :
    基本信息
    MD5:7418d838f46157bedb85518c71788f33
    包名:com.swapit.expander.de
    最低运行环境:Android 1.6
    版权:Android
    关键行为
    行为描述:直接调用系统关键API
    详情信息:Index = 0x000000E5, Name: NtSetInformationThread, Instruction Address = 0x00544922
    Index = 0x0000009B, Name: NtQueryInformationThread, Instruction Address = 0x004DE644
    Index = 0x000000E5, Name: NtSetInformationThread, Instruction Address = 0x0051214B
    行为描述:直接获取CPU时钟
    详情信息:EAX = 0x830ee0ac, EDX = 0x000000b5
    EAX = 0x830ee0f8, EDX = 0x000000b5
    EAX = 0x830ee144, EDX = 0x000000b5
    EAX = 0x830ee190, EDX = 0x000000b5
    EAX = 0x830ee1dc, EDX = 0x000000b5
    EAX = 0x830ee228, EDX = 0x000000b5
    EAX = 0x830ee274, EDX = 0x000000b5
    EAX = 0x830ee2c0, EDX = 0x000000b5
    EAX = 0x830ee30c, EDX = 0x000000b5
    EAX = 0x830ee358, EDX = 0x000000b5
    进程行为
    行为描述:创建本地线程
    详情信息:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2860, StartAddress = 004A5EC5, Parameter = 001C6030
    TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2648, ThreadID = 2888, StartAddress = 004A5EC5, Parameter = 001B1420
    其他行为
    行为描述:直接调用系统关键API
    详情信息:Index = 0x000000E5, Name: NtSetInformationThread, Instruction Address = 0x00544922
    Index = 0x0000009B, Name: NtQueryInformationThread, Instruction Address = 0x004DE644
    Index = 0x000000E5, Name: NtSetInformationThread, Instruction Address = 0x0051214B
    行为描述:创建互斥体
    详情信息:CTF.LBES.MutexDefaultS-*
    CTF.Compart.MutexDefaultS-*
    CTF.Asm.MutexDefaultS-*
    CTF.Layouts.MutexDefaultS-*
    CTF.TMD.MutexDefaultS-*
    CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
    MSCTF.Shared.MUTEX.IOH
    MSCTF.Shared.MUTEX.MFK
    行为描述:隐藏指定窗口
    详情信息:[Window,Class] = [,ComboLBox]
    行为描述:打开互斥体
    详情信息:ShimCacheMutex
    行为描述:查找指定窗口
    详情信息:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
    NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
    行为描述:打开事件
    详情信息:HookSwitchHookEnabledEvent
    CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
    CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
    MSCTF.SendReceiveConection.Event.IOH.IC
    MSCTF.SendReceive.Event.IOH.IC
    行为描述:窗口信息
    详情信息:Pid = 2648, Hwnd=0x10344, Text = 超强SYN, ClassName = Button(RadioButton).
    Pid = 2648, Hwnd=0x10346, Text = ICMP碎片, ClassName = Button(RadioButton).
    Pid = 2648, Hwnd=0x10348, Text = 超强UDP, ClassName = Button(RadioButton).
    Pid = 2648, Hwnd=0x1034a, Text = TCP/STCP, ClassName = Button(RadioButton).
    Pid = 2648, Hwnd=0x1034c, Text = List1, ClassName = SysListView32.
    Pid = 2648, Hwnd=0x10352, Text = SYN攻击目标:, ClassName = Static.
    Pid = 2648, Hwnd=0x10354, Text = 127.0.0.1, ClassName = Edit.
    Pid = 2648, Hwnd=0x10356, Text = :, ClassName = Static.
    Pid = 2648, Hwnd=0x10358, Text = 80, ClassName = Edit.
    Pid = 2648, Hwnd=0x1035a, Text = 时间/秒:, ClassName = Static.
    Pid = 2648, Hwnd=0x1035c, Text = 6000, ClassName = Edit.
    Pid = 2648, Hwnd=0x1035e, Text = 伪造, ClassName = Button(CheckBox).
    Pid = 2648, Hwnd=0x10360, Text = 线程:, ClassName = Static.
    Pid = 2648, Hwnd=0x10362, Text = 2, ClassName = Edit.
    Pid = 2648, Hwnd=0x10364, Text = 添加任务, ClassName = Button.
    行为描述:创建事件对象
    详情信息:EventName = MSCTF.SendReceive.Event.MFK.IC
    EventName = MSCTF.SendReceiveConection.Event.MFK.IC
    行为描述:直接获取CPU时钟
    详情信息:EAX = 0x830ee0ac, EDX = 0x000000b5
    EAX = 0x830ee0f8, EDX = 0x000000b5
    EAX = 0x830ee144, EDX = 0x000000b5
    EAX = 0x830ee190, EDX = 0x000000b5
    EAX = 0x830ee1dc, EDX = 0x000000b5
    EAX = 0x830ee228, EDX = 0x000000b5
    EAX = 0x830ee274, EDX = 0x000000b5
    EAX = 0x830ee2c0, EDX = 0x000000b5
    EAX = 0x830ee30c, EDX = 0x000000b5
    EAX = 0x830ee358, EDX = 0x000000b5
    Activities
    活动名类型
    .mainandroid.intent.action.MAIN
    .mainandroid.intent.category.LAUNCHER
    危险函数
    函数名称信息
    getRuntime获取命令行环境
    java/lang/Runtime;->exec执行字符串命令
    TelephonyManager;->getDeviceId搜集用户手机IMEI码、电话号码、系统版本号等信息
    java/net/URL;->openConnection连接URL
    java/net/HttpURLConnection;->connect连接URL
    启动方式
    名称信息
    com.swapit.expander.de.srvc$srvc_BR开机启动服务
    com.swapit.expander.de.srvc$srvc_BR
    com.swapit.expander.de.srvc$srvc_BR
    com.swapit.expander.de.srvc$srvc_BR
    com.swapit.expander.de.srvc$srvc_BR开机启动服务
    com.swapit.expander.de.widget$widget_BR更新应用小部件时启动服务
    权限列表
    许可名称信息
    android.permission.READ_LOGS读取系统日志
    android.permission.ACCESS_WIFI_STATE读取wifi网络状态
    android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
    android.permission.VIBRATE允许设备震动
    android.permission.WRITE_SETTINGS读写系统设置项
    android.permission.DEVICE_POWER电源管理
    android.permission.GET_TASKS获取有关当前或最近运行的任务信息
    android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
    android.permission.INTERNET连接网络(2G或3G)
    android.permission.READ_PHONE_STATE读取电话状态
    com.android.vending.CHECK_LICENSE
    android.permission.RECEIVE_BOOT_COMPLETED接收开机启动广播
    android.permission.ACCESS_SUPERUSER
    服务列表
    名称
    com.swapit.expander.de.srvc
    com.swapit.expander.de.widget
    文件列表
    文件名 校验码
    META-INF/MANIFEST.MF 0xc5b3e13c
    META-INF/CERT.SF 0x21ddb634
    META-INF/CERT.RSA 0xe2017d18
    AndroidManifest.xml 0x5faaa582
    assets/arm_busybox.rsft.png 0xa7f6f261
    assets/check3.png 0xb09d16aa
    assets/cswap.bal 0x20d18248
    assets/drivesel.bal 0xd9f8230
    assets/logo-re.png 0x68a9571b
    assets/mainh.bal 0x3400a60d
    assets/mips_busybox.rsft.png 0x699bba9f
    assets/newborder2.png 0x7cb863fe
    assets/newborder3.png 0x45a7aa0d
    assets/r/u/a/n/z/h/o/n/g/h/u/a/zhonghua 0xe4032495
    assets/ramexp.png 0xd43d515
    assets/roehsoft.png 0x9d5eba48
    assets/sanduhr.png 0x6f761a33
    assets/sd2.png 0x22765960
    assets/sd2k.png 0x3b6db011
    assets/sd2pt.png 0xeeec3f56
    assets/slang.bal 0x4806cdca
    assets/speed.png 0xcee265f3
    assets/statemanager.bas 0xdb4c28cc
    assets/weiss-border-dis.png 0x8fdde760
    assets/widget.bal 0xc757700e
    assets/x86_busybox.rsft.png 0x1a418491
    assets/zhonghua 0xe4032495
    classes.dex 0x8b074a9a
    com/roehsoft/utils/swapusage.sh 0xcf3ffb94
    lib/armeabi-v7a/libBugly.so 0xbe5077f9
    lib/armeabi-v7a/libshella-2.10.7.1.so 0xde74b0f3
    lib/armeabi-v7a/libstat-jni.so 0x38a0ffee
    lib/armeabi-v7a/libsunmorning.so 0xa6a099bc
    lib/armeabi/libBugly.so 0x1ddd8547
    lib/armeabi/libshella-2.10.7.1.so 0xde74b0f3
    lib/armeabi/libstat-jni.so 0xc3a02346
    lib/armeabi/libsunmorning.so 0x5000b189
    lib/armeabi/mix.dex 0xa3517ce0
    lib/armeabi/mixz.dex 0xa67045c7
    lib/mips/libshella-2.10.7.1.so 0x43addc09
    lib/mips/libstat-jni.so 0x80cacb48
    lib/mips/libsunmorning.so 0x6eb18542
    lib/x86/libBugly.so 0x177d25e6
    lib/x86/libshellx-2.10.7.1.so 0x6790eaff
    lib/x86/libstat-jni.so 0x943d548e
    lib/x86/libsunmorning.so 0xfb4f9288
    res/drawable-hdpi-v4/icon.png 0xf72e983a
    res/drawable/icon.png 0xf72e983a
    res/drawable/notif.png 0x7f0ed1e7
    res/drawable/notif1.png 0x5898cf72
    res/drawable/widget_panel1_background.xml 0xbe63f108
    res/drawable/widget_panel2_background.xml 0xbe5d237d
    res/layout/widget_layout.xml 0xd1a640e
    res/xml/widget_info.xml 0xfe75c953
    resources.arsc 0xf37cf270
    tencent_stub 0x718f8aab
    运行截图
    VirSCAN

About VirSCAN | Privacy Policy | Contact us | link | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号