VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
File Name :1.apk (File not down)
File Size :198171 byte
File Type :application/jar
MD5:adc02926dc8a4ef18447c59aa96e44c2
SHA1:ec3c5dc5736085794e98ac22d51c94f401dc1377
  • 扫描结果
  • 权限
  • 文件行为分析
  • Scanner results
    Scanner results:6%Scanner(s) (2/32)found malware!
    Behavior analysis report:         Habo file analysis
    Time: 2016-08-29 13:27:05 (CST)
    VirSCANVirSCAN
    Scanner Engine Ver Sig Ver Sig Date Scan result Time
    antiy AVL SDK 3.0 1970-01-01 Found nothing 5
    asquared 9.0.0.4324 9.0.0.4324 2014-07-03 Android.Adware.Youmi.A 1
    avast 150725-1 4.7.4 2015-07-25 Found nothing 60
    avg 2109/8133 10.0.1405 2014-11-26 Found nothing 60
    baidu 2.0.1.0 4.1.3.52192 2.0.1.0 Found nothing 9
    baidusd 1.0 1.0 2014-04-02 Found nothing 1
    bitdefender 7.58469 7.90123 2014-12-25 Found nothing 60
    clamav 19861 0.97.5 2014-12-31 Found nothing 60
    drweb 5.0.2.3300 5.0.1.1 2014-12-31 Found nothing 60
    fortinet 23.345, 23.345 5.1.158 2014-12-08 Found nothing 60
    fprot 4.6.2.117 6.5.1.5418 2014-12-31 Found nothing 60
    fsecure 2014-04-02-01 9.13 2014-04-02 Found nothing 60
    gdata 25.8072 25.8072 2016-08-28 Android.Adware.Youmi.A 9
    ikarus 1.06.01 V1.32.31.0 2014-12-08 Found nothing 60
    jiangmin 16.0.100 1.0.0.0 2015-07-25 Found nothing 45
    kaspersky 5.5.33 5.5.33 2014-04-01 Found nothing 60
    kingsoft 2.1 2.1 2013-09-22 Found nothing 4
    mcafee 7638 5400.1158 2014-11-30 Found nothing 60
    nod32 0920 3.0.21 2014-12-23 Found nothing 60
    panda 9.05.01 9.05.01 2015-07-26 Found nothing 5
    pcc 11.380.07 9.500-1005 2014-12-31 Found nothing 60
    qh360 1.0.1 1.0.1 1.0.1 Found nothing 3
    qqphone 1.0.0.0 1.0.0.0 2014-12-09 Found nothing 60
    quickheal 14.00 14.00 2015-07-25 Found nothing 2
    rising 25.76.04.01 25.76.04.01 2015-07-24 Found nothing 1
    sophos 5.08 3.55.0 2014-12-01 Found nothing 60
    symantec 20141230.001 1.3.0.24 2014-12-30 Found nothing 60
    tachyon 9.9.9 9.9.9 2013-12-27 Found nothing 4
    thehacker 6.8.0.5 6.8.0.5 2015-07-23 Found nothing 1
    tws 17.47.17308 1.0.2.2108 2014-12-08 Found nothing 14
    vba 3.12.26.3 3.12.26.3 2014-12-31 Found nothing 60
    virusbuster 15.0.985.0 5.5.2.13 2014-12-05 Found nothing 60
    Heuristic/Suspicious Exact
    NOTICE: Results are not 100% accurate and can be reported as a false positive by some scannerswhen and if malware is found. Please judge these results for yourself.
  • 权限列表
    许可名称信息
    android.permission.ACCESS_FINE_LOCATION获取精确的位置(通过GPS)
    android.permission.READ_PHONE_STATE读取电话状态
    android.permission.ACCESS_COARSE_LOCATION获取粗略的位置(通过wifi、基站)
    android.permission.ACCESS_WIFI_STATE读取wifi网络状态
    android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
    android.permission.CHANGE_WIFI_STATE改变WIFI连接状态
    android.permission.SYSTEM_ALERT_WINDOW显示系统窗口
    android.permission.GET_TASKS获取有关当前或最近运行的任务信息
    android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
    android.permission.INTERNET连接网络(2G或3G)
    android.permission.MOUNT_UNMOUNT_FILESYSTEMS挂载、反挂载外部文件系统
    android.permission.READ_LOGS读取系统日志
    android.permission.VIBRATE允许设备震动
    android.permission.WRITE_SETTINGS读写系统设置项
  • 文件信息
    安全评分 :
    基本信息
    MD5:adc02926dc8a4ef18447c59aa96e44c2
    包名:Android.Yapian.SignalInfo
    最低运行环境:Android 2.2.x
    版权:端州区
    关键行为
    行为描述:设置特殊文件夹属性
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
    C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
    C:\Documents and Settings\Administrator\Local Settings\History
    C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
    C:\Documents and Settings\Administrator\Cookies
    C:\Documents and Settings\Administrator\IETldCache
    进程行为
    行为描述:创建本地线程
    详情信息:TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 3180, ThreadID = 3204, StartAddress = 77DC845A, Parameter = 00000000
    TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 3180, ThreadID = 3224, StartAddress = 6359727B, Parameter = 001B08C8
    TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 3180, ThreadID = 3228, StartAddress = 7C947EBB, Parameter = 00000000
    TargetProcess: %temp%\****.exe, InheritedFromPID = 1944, ProcessID = 3180, ThreadID = 3232, StartAddress = 7C930230, Parameter = 00000000
    文件行为
    行为描述:设置特殊文件夹属性
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
    C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
    C:\Documents and Settings\Administrator\Local Settings\History
    C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
    C:\Documents and Settings\Administrator\Cookies
    C:\Documents and Settings\Administrator\IETldCache
    其他行为
    行为描述:创建互斥体
    详情信息:CTF.LBES.MutexDefaultS-*
    CTF.Compart.MutexDefaultS-*
    CTF.Asm.MutexDefaultS-*
    CTF.Layouts.MutexDefaultS-*
    CTF.TMD.MutexDefaultS-*
    CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
    Local\!PrivacIE!SharedMemory!Mutex
    Local\ZonesCounterMutex
    Local\ZoneAttributeCacheCounterMutex
    Local\ZonesCacheCounterMutex
    Local\ZonesLockedCacheCounterMutex
    Local\c:!documents and settings!administrator!ietldcache!
    MSCTF.Shared.MUTEX.ELH
    MSCTF.Shared.MUTEX.AHM
    行为描述:创建事件对象
    详情信息:EventName = MSCTF.SendReceive.Event.AHM.IC
    EventName = MSCTF.SendReceiveConection.Event.AHM.IC
    EventName = Global\crypt32LogoffEvent
    行为描述:查找指定窗口
    详情信息:NtUserFindWindowEx: [Class,Window] = [EDIT,]
    NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
    NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
    NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
    NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
    行为描述:打开事件
    详情信息:HookSwitchHookEnabledEvent
    \SECURITY\LSA_AUTHENTICATION_INITIALIZED
    CTF.ThreadMIConnectionEvent.000007B4.00000000.00000040
    CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000040
    MSCTF.SendReceiveConection.Event.ELH.IC
    MSCTF.SendReceive.Event.ELH.IC
    Global\crypt32LogoffEvent
    行为描述:窗口信息
    详情信息:Pid = 3180, Hwnd=0x1802fe, Text = TITLE_BMP, ClassName = Static.
    Pid = 3180, Hwnd=0xb032a, Text = 版權所有 ? 1993-2016, ClassName = Static.
    Pid = 3180, Hwnd=0x503b0, Text = 作者 Alexander Roshal, ClassName = Static.
    Pid = 3180, Hwnd=0x40392, Text = 目標資料夾(&D), ClassName = Static.
    Pid = 3180, Hwnd=0x403a2, Text = C:\Program Files\WinRAR, ClassName = ComboBox.
    Pid = 3180, Hwnd=0x7038a, Text = C:\Program Files\WinRAR, ClassName = Edit.
    Pid = 3180, Hwnd=0x7037c, Text = 瀏覽(&W)..., ClassName = Button.
    Pid = 3180, Hwnd=0x603ac, Text = 如果您同意使用者授權合約 (END USER LICENSE AGREEMENT, EULA),請按 [安裝]。如果不同意請按 [取消]。, ClassName = Static.
    Pid = 3180, Hwnd=0xc03a0, Text = 安裝, ClassName = Button.
    Pid = 3180, Hwnd=0x1302c4, Text = 取消, ClassName = Button.
    Pid = 3180, Hwnd=0xd035e, Text = WinRAR 5.31 中文版, ClassName = #32770.
    Pid = 3180, Hwnd=0x403a2, Text = 23456, ClassName = ComboBox.
    Pid = 3180, Hwnd=0x7038a, Text = 23456, ClassName = Edit.
    行为描述:隐藏指定窗口
    详情信息:[Window,Class] = [,ComboLBox]
    [Window,Class] = [,Auto-Suggest Dropdown]
    [Window,Class] = [,RichEdit20W]
    [Window,Class] = [如果您同意使用者授權合約 (END USER LICENSE AGREEMENT, EULA),請按 [安裝]。如果不同意請按 [取消]。,Static]
    [Window,Class] = [,Internet Explorer_Server]
    行为描述:打开互斥体
    详情信息:ShimCacheMutex
    Local\WininetStartupMutex
    Local\_!MSFTHISTORY!_
    Local\c:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
    Local\c:!documents and settings!administrator!cookies!
    Local\c:!documents and settings!administrator!local settings!history!history.ie5!
    Local\WininetConnectionMutex
    Local\WininetProxyRegistryMutex
    Local\!IETld!Mutex
    CtfmonInstMutexDefaultS-*
    Local\c:!documents and settings!administrator!ietldcache!
    Activities
    活动名类型
    .SignalInfoActivityandroid.intent.action.MAIN
    .SignalInfoActivityandroid.intent.category.LAUNCHER
    危险函数
    函数名称信息
    TelephonyManager;->getDeviceId搜集用户手机IMEI码、电话号码、系统版本号等信息
    java/net/URL;->openConnection连接URL
    HttpClient;->execute请求远程服务器
    DefaultHttpClient;->execute发送HTTP请求
    ContentResolver;->query读取联系人、短信等数据库
    启动方式
    名称信息
    a.b.c.AdReceiver应用安装时启动服务
    广告信息
    名称信息
    net.youmi有米广告
    com.baidu百度
    权限列表
    许可名称信息
    android.permission.ACCESS_FINE_LOCATION获取精确的位置(通过GPS)
    android.permission.READ_PHONE_STATE读取电话状态
    android.permission.ACCESS_COARSE_LOCATION获取粗略的位置(通过wifi、基站)
    android.permission.ACCESS_WIFI_STATE读取wifi网络状态
    android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
    android.permission.CHANGE_WIFI_STATE改变WIFI连接状态
    android.permission.SYSTEM_ALERT_WINDOW显示系统窗口
    android.permission.GET_TASKS获取有关当前或最近运行的任务信息
    android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
    android.permission.INTERNET连接网络(2G或3G)
    android.permission.MOUNT_UNMOUNT_FILESYSTEMS挂载、反挂载外部文件系统
    android.permission.READ_LOGS读取系统日志
    android.permission.VIBRATE允许设备震动
    android.permission.WRITE_SETTINGS读写系统设置项
    服务列表
    名称
    com.baidu.location.f
    Android.Yapian.SignalInfo.CellService
    a.b.c.AdService
    文件列表
    文件名 校验码
    assets/help.htm 0xf033f1a9
    res/color/colors.xml 0x2f1b87ba
    res/layout/about.xml 0x1e12aac1
    res/layout/addcid.xml 0x67ada2e4
    res/layout/basedatalist.xml 0x4f0c32a9
    res/layout/entering.xml 0xa0f493a9
    res/layout/enterwin.xml 0xbb5ea44a
    res/layout/folderview.xml 0xa60bef8d
    res/layout/helpview.xml 0xca80ff47
    res/layout/inputhelper.xml 0x48470485
    res/layout/inputone.xml 0xfb3a64a
    res/layout/listview.xml 0xbb4af50c
    res/layout/logtitle.xml 0x19ff2a88
    res/layout/logview.xml 0x4e72d6e8
    res/layout/logwin.xml 0x3271dd39
    res/layout/main.xml 0x2c6b0d32
    res/layout/neghlistview.xml 0x45d1a616
    res/layout/openfile.xml 0xdf91fca4
    res/layout/searchview.xml 0x2ac67ec0
    res/layout/select_title.xml 0xdf9cfd80
    res/layout/signalinfo_set.xml 0xb9393b1d
    res/layout/waringlayout.xml 0x1cbf076d
    res/layout/webmap.xml 0x46cd1485
    res/menu/actmenu.xml 0xa31435b8
    res/raw/doc.ico 0x4abd5f6
    res/raw/folder.ico 0x21a41db7
    res/raw/mhl.jpg 0x2fa9cf77
    res/raw/next.png 0xe5835468
    res/raw/point.png 0xddbdc9d6
    res/raw/pre.png 0xec684133
    res/raw/qq.mp3 0x29ae8083
    AndroidManifest.xml 0x821267df
    resources.arsc 0x9c79e74d
    res/drawable-hdpi/icon.png 0x2f170552
    res/drawable-ldpi/icon.png 0x7c6f4694
    res/drawable-mdpi/icon.png 0x46e73928
    classes.dex 0x79794313
    lib/armeabi/liblocSDK3.so 0xbbfb08a6
    lib/armeabi/libyapian.so 0xa8d6a39
    META-INF/MANIFEST.MF 0x85a732b6
    META-INF/CERT.SF 0xa1e5f094
    META-INF/CERT.RSA 0x6f8a437a
    运行截图
    VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号