VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
File Name :5264.apk (File not down)
File Size :361012 byte
File Type :Zip archive data
MD5:8a7f6c451bcdfb199891048c5248e254
SHA1:2319ac96ca24f76d03c0fa3dabb242db85bd1dfe
SHA256:15d1fdc4b27509df6d31f851675d03a21939a165b2011bfe0db5eea69bbb6b3d
  • 扫描结果
  • 权限
  • 文件行为分析
  • Scanner results
    Scanner results:56%Scanner(s) (18/32)found malware!
    Behavior analysis report:         Habo file analysis
    Time: 2019-06-16 18:48:43 (CST)
    VirSCANVirSCAN
    Scanner Engine Ver Sig Ver Sig Date Scan result Time
    antiy AVL SDK 3.0 AVL SDK 3.0 2019-06-15 Trojan[Backdoor]/Android.KungFu 1
    avast 18.4.3895.0 18.4.3895.0 2019-06-16 Found nothing 46
    avg 10.0.1405 10.0.1405 2019-06-16 Found nothing 1
    baidu 2.0.1.0 4.1.3.52192 2.0.1.0 Found nothing 2
    baidusd 1.0 1.0 2019-06-15 Found nothing 1
    bitdefender 7.141118 7.141118 2019-06-15 Found nothing 1
    clamav 25480 0.100.2 2019-06-14 Andr.Trojan.DroidKungFu-1 1
    drweb 11.0.10.1810231600 11.0.10.1810231600 2019-06-14 Android.KungFu.2 10
    emsisoft 9.0.0.4324 9.0.0.4324 2014-07-03 Android.Adware.Adwo.A 2
    fortinet 1.000, 69.253, 69.184, 69.208 5.4.247 2019-06-16 Android/DroidKungFu.AW!tr.bdr 1
    fprot 4.6.2.117 6.5.1.5418 2014-12-31 Found nothing 1
    fsecure 2015-08-01-02 9.13 2019-06-16 Found nothing 56
    gdata 25.22387 25.22387 2019-06-16 Android.Adware.Adwo.A 13
    ikarus 5.01.05 V1.32.39.0 2019-06-15 Trojan.AndroidOS.DroidKungFu 5
    jiangmin 16.0.100 1.0.0.0 2019-06-15 Backdoor/AndroidOS.eu 2
    kaspersky 5.5.33 5.5.33 2019-06-15 Backdoor.AndroidOS.KungFu.gk 20
    kingsoft 2.1 2.1 2013-09-22 Found nothing 8
    mcafee 9256 5400.1158 2019-05-13 Found nothing 12
    nod32 9516 4.5.15 2019-06-13 multiple threats 1
    panda 9.05.01 9.05.01 2019-05-29 Found nothing 4
    pcc 13.302.06 9.500-1005 2019-06-15 ANDROID.DDA41826 2
    qh360 1.0.1 1.0.1 2019-06-15 Trojan.Android.Gen 2
    qqphone 2.0.0.0 2.0.0.0 2019-06-15 a.system.safesys.e 1
    quickheal 14.00 14.00 2019-02-10 Android.Kungfu.L 3
    rising 5165 5165 2019-06-15 System.Fokonge 3
    sophos 4.62 3.16.1 2016-09-20 Andr/KongFu-A 11
    symantec 20151230.005 1.3.0.24 2015-12-30 Found nothing 1
    tachyon 9.9.9 9.9.9 2013-12-27 Found nothing 3
    thehacker 6.8.0.5 6.8.0.5 2017-03-30 Found nothing 1
    tws 17.47.17308 1.0.2.2108 2019-06-15 Android.M.geet 7
    vba 4.0.0 4.0.0 2019-06-14 Backdoor.AndroidOS.KungFu.gk 4
    virusbuster 15.0.985.0 5.5.2.13 2014-12-05 Found nothing 3
    Heuristic/Suspicious Exact
    NOTICE: Results are not 100% accurate and can be reported as a false positive by some scannerswhen and if malware is found. Please judge these results for yourself.
  • 权限列表
    许可名称信息
    android.permission.INTERNET连接网络(2G或3G)
    android.permission.READ_PHONE_STATE读取电话状态
    android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
    android.permission.ACCESS_WIFI_STATE读取wifi网络状态
    android.permission.CHANGE_WIFI_STATE改变WIFI连接状态
    android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
    android.permission.INSTALL_PACKAGES安装应用
    android.permission.ACCESS_COARSE_LOCATION获取粗略的位置(通过wifi、基站)
    android.permission.READ_SMS读取短信
    android.permission.WRITE_SMS写短信
    android.permission.RECEIVE_BOOT_COMPLETED接收开机启动广播
    android.permission.READ_EXTERNAL_STORAGE读外部存储器(如:SD卡)
    android.permission.ACCESS_FINE_LOCATION获取精确的位置(通过GPS)
    android.permission.ACCESS_LOCATION_EXTRA_COMMANDS访问额外的定位指令
  • 文件信息
    安全评分 :
    基本信息
    MD5:8a7f6c451bcdfb199891048c5248e254
    包名:com.ps.yams
    最低运行环境:Android 1.5
    版权:Phone
    其他行为
    行为描述:打开互斥体
    详情信息:Local\ShimViewer
    Activities
    活动名类型
    com.ps.yams.Yamsandroid.intent.action.MAIN
    com.ps.yams.Yamsandroid.intent.category.LAUNCHER
    危险函数
    函数名称信息
    ContentResolver;->query读取联系人、短信等数据库
    TelephonyManager;->getDeviceId搜集用户手机IMEI码、电话号码、系统版本号等信息
    java/net/URL;->openConnection连接URL
    java/net/HttpURLConnection;->connect连接URL
    android/app/NotificationManager;->notify信息通知栏
    getRuntime获取命令行环境
    java/lang/Runtime;->exec执行字符串命令
    HttpClient;->execute请求远程服务器
    LocationManager;->getLastKnownLocation获取地址位置
    TelephonyManager;->getLine1Number获取手机号
    TelephonyManager;->getSimSerialNumber获取SIM序列号
    DefaultHttpClient;->execute发送HTTP请求
    WifiManager;->setWifiEnabled变更WIFI状态
    java/net/URLConnection;->connect连接URL
    启动方式
    名称信息
    com.google.update.Receiver
    com.google.update.Receiver
    com.google.update.Receiver开机启动服务
    广告信息
    名称信息
    cn.domob.android多盟
    com.adwo.adsdk安沃
    权限列表
    许可名称信息
    android.permission.INTERNET连接网络(2G或3G)
    android.permission.READ_PHONE_STATE读取电话状态
    android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
    android.permission.ACCESS_WIFI_STATE读取wifi网络状态
    android.permission.CHANGE_WIFI_STATE改变WIFI连接状态
    android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
    android.permission.INSTALL_PACKAGES安装应用
    android.permission.ACCESS_COARSE_LOCATION获取粗略的位置(通过wifi、基站)
    android.permission.READ_SMS读取短信
    android.permission.WRITE_SMS写短信
    android.permission.RECEIVE_BOOT_COMPLETED接收开机启动广播
    android.permission.READ_EXTERNAL_STORAGE读外部存储器(如:SD卡)
    android.permission.ACCESS_FINE_LOCATION获取精确的位置(通过GPS)
    android.permission.ACCESS_LOCATION_EXTRA_COMMANDS访问额外的定位指令
    服务列表
    名称
    com.google.update.UpdateService
    文件列表
    文件名 校验码
    META-INF/MANIFEST.MF 0x75a358c
    META-INF/PS.SF 0xc23c45bd
    META-INF/PS.RSA 0x8bd54362
    res/drawable/de1.png 0x27e3c867
    res/drawable/de1b.png 0x9f80be51
    res/drawable/de2.png 0xe0dae461
    res/drawable/de2b.png 0x83998ab7
    res/drawable/de3.png 0xe7a4a038
    res/drawable/de3b.png 0x6d48d9dc
    res/drawable/de4.png 0x1d8aeb28
    res/drawable/de4b.png 0xc8a66602
    res/drawable/de5.png 0x76604f97
    res/drawable/de5b.png 0xf8f64952
    res/drawable/de6.png 0x39c495fc
    res/drawable/de6b.png 0x8111e85c
    res/drawable/de_1.xml 0xae456f03
    res/drawable/de_2.xml 0x530a97b6
    res/drawable/de_3.xml 0x8fab9828
    res/drawable/de_4.xml 0x72e4609d
    res/drawable/de_5.xml 0xed988155
    res/drawable/de_6.xml 0x10d779e0
    res/drawable/elol.png 0x758d28d7
    res/drawable/icon.png 0x80a777ad
    res/drawable/score1.png 0xddbb28a3
    res/drawable/score_1.xml 0x408a9251
    res/drawable/score_bas.png 0xab4c9da2
    res/drawable/scoreland.png 0x8a8d9a1c
    res/drawable/scoreland_1.xml 0xd37047d3
    res/drawable/scoreland_bas.png 0x255b7ff1
    res/layout/about.xml 0x6ddcab45
    res/layout/main.xml 0x2bb6cefd
    AndroidManifest.xml 0x4b0f4e30
    resources.arsc 0x785dc9a9
    res/layout-land/about.xml 0x6c955eab
    res/layout-land/main.xml 0xd18371c8
    classes.dex 0xcf8d9864
    com/admogo/assets/ad_frame.gif 0x6315d212
    com/admogo/assets/close_btn.png 0x69ff6ace
    assets/adwo_left_arrow.png 0x54827195
    assets/adwo_logo.png 0x220dc9de
    assets/adwo_right_arrow.png 0xb16b8854
    assets/adwo_x.png 0x14e293ba
    assets/t1.png 0x84341ac5
    assets/t10.png 0xe9251ca8
    assets/t12.png 0xc9111b9e
    assets/t13.png 0x523b0a20
    assets/t3.png 0x175c3378
    assets/t8.png 0x7bbc78fa
    assets/t9.png 0x86363427
    assets/banner.png 0x2d824ee
    assets/close.png 0x4a21a776
    assets/def_0.png 0xd0e1aafa
    assets/def_0_32000048.png 0x5a7f9d1e
    assets/exit.png 0x6e628d21
    assets/loading.png 0x48342286
    assets/next.png 0xc667afa3
    assets/next_off.png 0x72b7a470
    assets/out.png 0x75b3379b
    assets/preview.png 0xe1ad2a0e
    assets/preview_off.png 0x2949548e
    assets/refresh.png 0x16696e6a
    I/I.gif 0xce4fd68b
    assets/db.init 0x92c96d6d
    assets/myicon 0xaaa6e076
    assets/secbino 0xb94f88d5
    assets/starter 0x5fcc6fc6
    lib/armeabi/libnative.so 0xb84e347f
    运行截图
    VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号