VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load



File information
File Name :绅士之城_v3.3_破解_VIP_会员版.apk (File not down)
File Size :2881831 byte
File Type :application/zip
MD5:5857988b858ab813cabcc3854ef71f88
SHA1:dee51e7228c95cf6c5821a16adf0e48688c7b48c
  • 扫描结果
  • 权限
  • 文件行为分析
  • Scanner results
    Scanner results:12%Scanner(s) (4/32)found malware!
    Behavior analysis report:         Habo file analysis
    Time: 2018-10-09 14:04:38 (CST)
    VirSCANVirSCAN
    Scanner Engine Ver Sig Ver Sig Date Scan result Time
    antiy AVL SDK 2.0 AVL SDK 2.0 2018-05-1 Found nothing 5
    avast 18.4.3895.0 18.4.3895.0 2018-10-09 Found nothing 36
    avg 10.0.1405 10.0.1405 2018-10-09 Found nothing 1
    baidu 2.0.1.0 4.1.3.52192 2018-06-20 Found nothing 11
    baidusd 1.0 1.0 2018-06-21 Found nothing 60
    bitdefender 7.141118 7.141118 2018-10-09 Found nothing 6
    clamav 25012 0.97.5 2018-10-06 Found nothing 1
    drweb 5.0.2.3300 5.0.1.1 2018-10-09 Found nothing 59
    emsisoft 9.0.0.4799 9.0.0.4799 2018-06-21 Found nothing 1
    fortinet 1.000, 63.250, 63.140, 63.163 5.4.247 2018-10-08 Found nothing 2
    fprot 4.6.2.117 6.5.1.5418 2014-12-31 Found nothing 1
    fsecure 2015-08-01-02 9.13 2018-10-09 Found nothing 9
    gdata 25.18820 25.18820 2018-10-08 Android.Riskware.Agent.gHIEE 14
    ikarus 4.00.09 V1.32.39.0 2018-10-08 Found nothing 1
    jiangmin 16.0.100 1.0.0.0 2018-07-11 Found nothing 2
    kaspersky 5.5.33 5.5.33 2014-04-01 Found nothing 20
    kingsoft 2.1 2.1 2018-06-20 Found nothing 60
    mcafee 8974 5400.1158 2018-08-03 Found nothing 12
    nod32 7844 3.0.21 2018-08-07 a variant of Android/Packed.TencentProtect.B application 1
    panda 9.05.01 9.05.01 2018-07-15 Found nothing 4
    pcc 11.380.07 9.500-1005 2014-12-31 Found nothing 2
    qh360 1.0.1 1.0.1 2018-06-20 Win32/Virus.DoS.6a0 3
    qqphone 2.0.0.0 2.0.0.0 2018-09-25 a.gray.andrsca.f 1
    quickheal 14.00 14.00 2018-08-07 Found nothing 3
    rising 4160 4160 2018-10-08 Found nothing 3
    sophos 4.62 3.16.1 2016-09-20 Found nothing 11
    symantec 20151230.005 1.3.0.24 2015-12-30 Found nothing 1
    tachyon 9.9.9 9.9.9 2013-12-27 Found nothing 3
    thehacker 6.8.0.5 6.8.0.5 2018-07-12 Found nothing 2
    tws 17.47.17308 1.0.2.2108 2018-10-08 Found nothing 15
    vba 3.12.29.3 beta 3.12.29.3 beta 2016-09-19 Found nothing 5
    virusbuster 15.0.985.0 5.5.2.13 2014-12-05 Found nothing 20
    Heuristic/Suspicious Exact
    NOTICE: Results are not 100% accurate and can be reported as a false positive by some scannerswhen and if malware is found. Please judge these results for yourself.
    Copy to clipboard
  • 权限列表
    许可名称信息
    android.permission.READ_LOGS读取系统日志
    android.permission.READ_PHONE_STATE读取电话状态
    com.android.launcher.permission.INSTALL_SHORTCUT创建快捷方式
    android.permission.MOUNT_UNMOUNT_FILESYSTEMS挂载、反挂载外部文件系统
    android.permission.SYSTEM_ALERT_WINDOW显示系统窗口
    android.permission.GET_TASKS获取有关当前或最近运行的任务信息
    android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
    android.permission.INTERNET连接网络(2G或3G)
    android.permission.ACCESS_WIFI_STATE读取wifi网络状态
    com.android.launcher.permission.READ_SETTINGS读取快捷方式信息
    android.permission.WAKE_LOCK手机屏幕关闭后后台进程仍运行
    android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
    android.permission.CHANGE_CONFIGURATION修改当前设置(如:本地化)
    android.permission.ACCESS_COARSE_LOCATION获取粗略的位置(通过wifi、基站)
    android.permission.READ_SETTINGS
    android.permission.WRITE_SETTINGS读写系统设置项
    android.permission.READ_EXTERNAL_STORAGE读外部存储器(如:SD卡)
  • 文件信息
    安全评分 :
    基本信息
    MD5:5857988b858ab813cabcc3854ef71f88
    包名:com.ssdy.www
    最低运行环境:Android 2.2.x
    版权:E4A
    进程行为
    行为描述:创建本地线程
    详情信息:TargetProcess: wscript.exe, InheritedFromPID = 2000, ProcessID = 2884, ThreadID = 2896, StartAddress = 01002FD4, Parameter = 008E44C0
    TargetProcess: wscript.exe, InheritedFromPID = 2000, ProcessID = 2884, ThreadID = 2900, StartAddress = 77DC845A, Parameter = 00000000
    TargetProcess: wscript.exe, InheritedFromPID = 2000, ProcessID = 2884, ThreadID = 2904, StartAddress = 765E964D, Parameter = 001C4470
    文件行为
    行为描述:查找文件
    详情信息:FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
    FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
    其他行为
    行为描述:创建互斥体
    详情信息:CTF.LBES.MutexDefaultS-*
    CTF.Compart.MutexDefaultS-*
    CTF.Asm.MutexDefaultS-*
    CTF.Layouts.MutexDefaultS-*
    CTF.TMD.MutexDefaultS-*
    CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
    MSCTF.Shared.MUTEX.IOH
    行为描述:创建事件对象
    详情信息:EventName = Global\crypt32LogoffEvent
    行为描述:查找指定窗口
    详情信息:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
    行为描述:打开事件
    详情信息:MSFT.VSA.COM.DISABLE.2884
    MSFT.VSA.IEC.STATUS.6c736db0
    Global\crypt32LogoffEvent
    CTF.ThreadMIConnectionEvent.000007E8.00000000.0000000F
    CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.0000000F
    MSCTF.SendReceiveConection.Event.IOH.IC
    MSCTF.SendReceive.Event.IOH.IC
    行为描述:窗口信息
    详情信息:Pid = 2884, Hwnd=0x10346, Text = 确定, ClassName = Button.
    Pid = 2884, Hwnd=0x1034a, Text = 脚本: C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\proxy_form_controller.js 行: 42 字符: 40 错误: 无效字符 代码: 800A03F6 源: Microsoft JScript 编译错误 , ClassName = Static.
    Pid = 2884, Hwnd=0x10342, Text = Windows Script Host, ClassName = #32770.
    行为描述:打开互斥体
    详情信息:ShimCacheMutex
    Activities
    活动名类型
    com.e4a.runtime.android.StartActivityandroid.intent.action.MAIN
    com.e4a.runtime.android.StartActivityandroid.intent.category.DEFAULT
    com.e4a.runtime.android.StartActivityandroid.intent.category.LAUNCHER
    com.e4a.runtime.android.mainActivityandroid.intent.action.MAIN
    com.e4a.runtime.android.mainActivityandroid.intent.category.DEFAULT
    com.tencent.smtt.sdk.VideoActivitycom.tencent.smtt.tbs.video.PLAY
    com.tencent.smtt.sdk.VideoActivityandroid.intent.category.DEFAULT
    危险函数
    函数名称信息
    getRuntime获取命令行环境
    java/lang/Runtime;->exec执行字符串命令
    TelephonyManager;->getDeviceId搜集用户手机IMEI码、电话号码、系统版本号等信息
    java/net/URL;->openConnection连接URL
    java/net/HttpURLConnection;->connect连接URL
    权限列表
    许可名称信息
    android.permission.READ_LOGS读取系统日志
    android.permission.READ_PHONE_STATE读取电话状态
    com.android.launcher.permission.INSTALL_SHORTCUT创建快捷方式
    android.permission.MOUNT_UNMOUNT_FILESYSTEMS挂载、反挂载外部文件系统
    android.permission.SYSTEM_ALERT_WINDOW显示系统窗口
    android.permission.GET_TASKS获取有关当前或最近运行的任务信息
    android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
    android.permission.INTERNET连接网络(2G或3G)
    android.permission.ACCESS_WIFI_STATE读取wifi网络状态
    com.android.launcher.permission.READ_SETTINGS读取快捷方式信息
    android.permission.WAKE_LOCK手机屏幕关闭后后台进程仍运行
    android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
    android.permission.CHANGE_CONFIGURATION修改当前设置(如:本地化)
    android.permission.ACCESS_COARSE_LOCATION获取粗略的位置(通过wifi、基站)
    android.permission.READ_SETTINGS
    android.permission.WRITE_SETTINGS读写系统设置项
    android.permission.READ_EXTERNAL_STORAGE读外部存储器(如:SD卡)
    文件列表
    文件名 校验码
    META-INF/MANIFEST.MF 0x18d11428
    META-INF/GEEKGO.SF 0x651a5b2f
    META-INF/GEEKGO.RSA 0x3607f145
    assets/9.9_a.png 0x4f945e3b
    assets/9.9_b.png 0x38e749f
    assets/Logo1.png 0xbbfbbe
    assets/PirnAV.png 0x459fc73f
    assets/Q.png 0x7e3d43c3
    assets/QQ.png 0xc5677c6d
    assets/an.png 0x37ecf9a0
    assets/bscd.png 0x7562330d
    assets/bsfh.png 0x710fcd45
    assets/bsgb.png 0x4d7878ce
    assets/cd.png 0x945cf85f
    assets/dengdai.png 0x80513868
    assets/dianshi.png 0x165c7760
    assets/dudu.png 0x185f6bed
    assets/fangyin.png 0x6b1af0f3
    assets/fhzy.png 0x894fe7c4
    assets/fl_a.png 0xf98946c5
    assets/fl_b.png 0x1f9ce4e5
    assets/fydt.png 0xc02142cd
    assets/gbrj.png 0xc4f204a1
    assets/gc0.png 0x35afa42c
    assets/gc1.png 0xd29aa5f0
    assets/gdrj.png 0xe1d16a08
    assets/gonggao.png 0xccb1c016
    assets/gwgj0.png 0xa2878ab2
    assets/gwgj1.png 0xf1c4a39
    assets/gwom0.png 0xaaa0a8d
    assets/gwom1.png 0x7b08ca04
    assets/gwrb0.png 0x8cdc59e9
    assets/gwrb1.png 0xcd3ff5da
    assets/gwzhibo.png 0x12b2c7d8
    assets/hcdm0.png 0xe7fce451
    assets/hcdm1.png 0x11545b51
    assets/hcgc0.png 0x9d1dec07
    assets/hcgc1.png 0xc8509a9e
    assets/hcom0.png 0x182f0611
    assets/hcom1.png 0x8670d809
    assets/hcrb0.png 0x58533f71
    assets/hcrb1.png 0xf40be99
    assets/hcsy0.png 0x955b7d48
    assets/hcsy1.png 0x69ca3882
    assets/hcyz0.png 0x193041e4
    assets/hcyz1.png 0x1e6711f7
    assets/home_a.png 0x455988e3
    assets/home_b.png 0x14667c3b
    assets/hot.gif 0xf256be03
    assets/huangchao.png 0x782a7b00
    assets/hyq.png 0xf60cf9a4
    assets/jing_gao_sha_bi.jpg 0xec0df37e
    assets/kaifazhong.png 0x9c30e001
    assets/kldy0.png 0x68de5879
    assets/kldy1.png 0xc87661ee
    assets/klsy0.png 0x692c3357
    assets/klsy1.png 0x51d1e379
    assets/kltp0.png 0x6eec5fa0
    assets/kltp1.png 0xcb1eb848
    assets/klxs0.png 0xc00f950f
    assets/klxs1.png 0x42bcf3a1
    assets/kthy.png 0x951373d7
    assets/lishijs.txt 0xf035a173
    assets/logo01.png 0xb49c41eb
    assets/love.png 0x9b2dee01
    assets/lrgc0.png 0x35afa42c
    assets/lrgc1.png 0x136b87d7
    assets/lrom0.png 0x3fee268e
    assets/lrom1.png 0xa679efc6
    assets/lrrh0.png 0x44fa237e
    assets/lrrh1.png 0x265d8dbc
    assets/lrsj0.png 0x7c2b74d9
    assets/lrsj1.png 0x10512d33
    assets/lrsy0.png 0x34d370be
    assets/lrsy1.png 0x6bd25c3d
    assets/manhua.png 0x67448360
    assets/menu_bg.jpg 0x22e07a93
    assets/mfq.png 0x34050383
    assets/mimao.png 0x30f3a5ad
    assets/mmcd.png 0xbdaf556a
    assets/mx1.png 0x8ac3f23e
    assets/om0.png 0x3fee268e
    assets/om1.png 0x4ed20d65
    assets/pinbao.jpg 0x6a20fb4b
    assets/q2.png 0x2b910048
    assets/qidongtu.png 0xc7a0649d
    assets/rh0.png 0x44fa237e
    assets/rh1.png 0x514cf719
    assets/sejie.png 0x533d279f
    assets/seku.png 0x105c404f
    assets/selang.png 0x33f35827
    assets/sj0.png 0x7c2b74d9
    assets/sj1.png 0xfefd92e5
    assets/sj_a.png 0x99598926
    assets/sj_b.png 0x1a529bec
    assets/skbq0.png 0x46ea53ca
    assets/skbq1.png 0x55c544ba
    assets/skdm0.png 0xd89c1e4c
    assets/skdm1.png 0xd33b6054
    assets/skgbrj.png 0xb31d6273
    assets/skgcyc0.png 0x33f67e7a
    assets/skgcyc1.png 0x997da947
    assets/skomwm0.png 0x325dcf92
    assets/skomwm1.png 0xe711d7a
    assets/sksy0.png 0xd5f60cb3
    assets/sksy1.png 0xb8452d4b
    assets/skyzwm0.png 0xd86a9cac
    assets/skyzwm1.png 0x6822d694
    assets/ss.png 0x93dfece3
    assets/sxvy0.png 0xa742293
    assets/sy0.png 0x34d370be
    assets/sy1.png 0xa7a67547
    assets/syxz.png 0x47f9fa53
    assets/tc.png 0xed793055
    assets/tg.png 0x8a78831d
    assets/tgan 0x8a78831d
    assets/tjq.png 0x6d794ab9
    assets/tp0.png 0xc4a24c77
    assets/tp1.png 0xb109a2f7
    assets/tyq.png 0x1e370d36
    assets/xVideos.png 0x9bb20e0c
    assets/xcd.png 0x5740c746
    assets/xf.png 0x6b42629
    assets/xiaoshuo.png 0x24df34f3
    assets/xs0.png 0x7fb3e031
    assets/xs1.png 0x9beac561
    assets/xvcd.png 0xce555792
    assets/xvcjwt.png 0xec877ad7
    assets/xvgbrj.png 0x949a7de7
    assets/xvgdrj.png 0x473670ce
    assets/xvhyq.png 0x81bbbf3b
    assets/xvmfq.png 0xca11f909
    assets/xvmx0.png 0x84c16014
    assets/xvmx1.png 0x8ac3f23e
    assets/xvpd0.png 0xbe2ee431
    assets/xvpd1.png 0x3aee58e2
    assets/xvsy0.png 0xa742293
    assets/xvsy1.png 0x89bb3bad
    assets/xvzj0.png 0x5539726
    assets/xvzj1.png 0x8182ae7b
    assets/yemao.png 0xd61ba54
    assets/youhuojuan.png 0x6df874b0
    assets/zj1.png 0x8182ae7b
    assets/ztl.png 0x6e5e6d97
    assets/zysm.png 0xa7d7f300
    classes.dex 0xf6f325ee
    lib/armeabi/liblbs.so 0xbe8edb00
    lib/armeabi/libshella-2.9.0.2.so 0x519b71f
    lib/armeabi/libshellx-2.9.0.2.so 0x908b6986
    lib/armeabi/mix.dex 0xa3517ce0
    lib/armeabi/mixz.dex 0xa67045c7
    res/anim/ok_xuanfucaidan_in_translate_top.xml 0x2ad2b2ea
    res/anim/ok_xuanfucaidan_out_translate_top.xml 0xe17648e2
    res/drawable/aa_dialog_bg.xml 0x33f52041
    res/drawable/an.xml 0x14274a73
    res/drawable/bg.png 0xe927418c
    res/drawable/bj.png 0x3d3abb79
    res/drawable/bkg.9.png 0x6e530870
    res/drawable/bq.png 0x396f745d
    res/drawable/cehngse_xiaoyuan.xml 0xd427dcdf
    res/drawable/e4alistview_new_message.png 0x1cdc5409
    res/drawable/icon.png 0xd25678f7
    res/drawable/jinduyanse.xml 0x3397291b
    res/drawable/menu_shape_bg.xml 0x3c272e65
    res/drawable/mmfl.png 0xca1e44f6
    res/drawable/moren.png 0x91252c3e
    res/drawable/srbg.xml 0x64b1ad37
    res/drawable/sx.png 0x365eceff
    res/drawable/tg.png 0x720b9657
    res/drawable/xiantiao.xml 0xd12e94e0
    res/drawable/xsearch_loading.png 0x575b24df
    res/drawable/xsearch_msg_pull_arrow_down.png 0xa94f8937
    res/layout/layout_dialog_wz.xml 0xd476b393
    res/layout/layout_tab.xml 0x6b4cd348
    res/layout/layout_tab_bj.xml 0x74a5a68f
    res/layout/layout_tab_bottom.xml 0xc284b1ab
    res/layout/layout_tab_left.xml 0x5851dd50
    res/layout/layout_tab_right.xml 0xc84668af
    res/layout/layout_tab_segment.xml 0xcd2e2b4c
    res/layout/layout_tab_top.xml 0x52930454
    res/layout/ok_baibian_jiazai.xml 0xe167dedb
    res/layout/ok_baibian_jiazai2.xml 0xfa898853
    res/layout/ok_qie_dibu.xml 0xb8316fc1
    res/layout/ok_xuanfucaidan_dialog_layout.xml 0xc1db751c
    res/layout/ok_xuangucaidan_liebiao_putong1.xml 0xac00c596
    resources.arsc 0xe0dff46c
    tencent_stub 0x55a7f2c4
    AndroidManifest.xml 0x269e4cf6
    lib/armeabi/libBugly.so 0x1ddd8547
    运行截图
    VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号