VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
File Name :com.shineinduction_2.0_3006.apk (File not down)
File Size :439568 byte
File Type :application/zip
MD5:cf9f7368a87307562ed033248f18f739
SHA1:1ee4480b0a9834d6d48fc029987f18bb0be270eb
  • 扫描结果
  • 权限
  • 文件行为分析
  • Scanner results
    Scanner results:0%Scanner(s) (0/32)found malware!
    Behavior analysis report:         Habo file analysis
    Time: 2017-09-18 19:26:23 (CST)
    VirSCANVirSCAN
    Scanner Engine Ver Sig Ver Sig Date Scan result Time
    antiy AVL SDK 2.0 1970-01-01 Found nothing 5
    asquared 9.0.0.4799 9.0.0.4799 2015-03-08 Found nothing 1
    avast 170303-1 4.7.4 2017-03-03 Found nothing 60
    avg 2109/14460 10.0.1405 2017-09-14 Found nothing 60
    baidu 2.0.1.0 4.1.3.52192 2.0.1.0 Found nothing 5
    baidusd 1.0 1.0 2017-03-22 Found nothing 1
    bitdefender 7.58879 7.90123 2015-01-16 Found nothing 60
    clamav 23840 0.97.5 2017-09-16 Found nothing 60
    drweb 5.0.2.3300 5.0.1.1 2017-09-11 Found nothing 60
    fortinet 1.000, 51.717, 51.597, 51.621 5.4.247 2017-09-18 Found nothing 60
    fprot 4.6.2.117 6.5.1.5418 2016-02-05 Found nothing 60
    fsecure 2015-08-01-02 9.13 2015-08-01 Found nothing 60
    gdata 25.14225 25.14225 2017-09-18 Found nothing 12
    ikarus 3.02.08 V1.32.31.0 2017-09-17 Found nothing 60
    jiangmin 16.0.100 1.0.0.0 2017-09-17 Found nothing 2
    kaspersky 5.5.33 5.5.33 2014-04-01 Found nothing 60
    kingsoft 2.1 2.1 2017-09-17 Found nothing 60
    mcafee 8620 5400.1158 2017-08-12 Found nothing 60
    nod32 6091 3.0.21 2017-09-16 Found nothing 60
    panda 9.05.01 9.05.01 2017-09-17 Found nothing 4
    pcc 13.302.06 9.500-1005 2017-03-27 Found nothing 60
    qh360 1.0.1 1.0.1 1.0.1 Found nothing 3
    qqphone 1.0.0.0 1.0.0.0 2015-12-30 Found nothing 60
    quickheal 14.00 14.00 2017-09-16 Found nothing 3
    rising 26.28.00.01 26.28.00.01 2016-07-18 Found nothing 2
    sophos 5.32 3.65.2 2016-10-10 Found nothing 60
    symantec 20151230.005 1.3.0.24 2015-12-30 Found nothing 60
    tachyon 9.9.9 9.9.9 2013-12-27 Found nothing 3
    thehacker 6.8.0.5 6.8.0.5 2017-09-16 Found nothing 2
    tws 17.47.17308 1.0.2.2108 2017-09-17 Found nothing 14
    vba 3.12.29.5 beta 3.12.29.5 beta 2017-09-15 Found nothing 60
    virusbuster 15.0.985.0 5.5.2.13 2014-12-05 Found nothing 60
    Heuristic/Suspicious Exact
    NOTICE: Results are not 100% accurate and can be reported as a false positive by some scannerswhen and if malware is found. Please judge these results for yourself.
  • 权限列表
    许可名称信息
    android.permission.INTERNET连接网络(2G或3G)
    android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
    android.permission.READ_PHONE_STATE读取电话状态
    android.permission.ACCESS_WIFI_STATE读取wifi网络状态
    android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
    android.permission.DEVICE_POWER电源管理
    android.permission.WAKE_LOCK手机屏幕关闭后后台进程仍运行
    android.permission.RECEIVE_BOOT_COMPLETED接收开机启动广播
    android.permission.GET_TASKS获取有关当前或最近运行的任务信息
    android.permission.DISABLE_KEYGUARD禁用键盘锁
  • 文件信息
    安全评分 :
    基本信息
    MD5:cf9f7368a87307562ed033248f18f739
    包名:com.ShineInduction
    最低运行环境:Android 2.2.x
    版权:yixiang
    关键行为
    行为描述:跨进程写入数据
    详情信息:TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\svhost.exe, WriteAddress = 0x00400000, Size = 0x00000200 TargetPID = 0x00000ad4
    TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\svhost.exe, WriteAddress = 0x00420000, Size = 0x00000200 TargetPID = 0x00000ad4
    TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\svhost.exe, WriteAddress = 0x00422000, Size = 0x00015e00 TargetPID = 0x00000ad4
    TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\svhost.exe, WriteAddress = 0x7ffd3008, Size = 0x00000004 TargetPID = 0x00000ad4
    行为描述:设置线程上下文
    详情信息:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\DRAWINGS AND SPECIFICATION.exe
    行为描述:获取TickCount值
    详情信息:TickCount = 278515, SleepMilliseconds = 60000.
    TickCount = 278546, SleepMilliseconds = 60000.
    TickCount = 278578, SleepMilliseconds = 60000.
    TickCount = 278671, SleepMilliseconds = 60000.
    TickCount = 278703, SleepMilliseconds = 60000.
    TickCount = 278718, SleepMilliseconds = 60000.
    TickCount = 278781, SleepMilliseconds = 60000.
    TickCount = 229546, SleepMilliseconds = 10000.
    TickCount = 221546, SleepMilliseconds = 2000.
    TickCount = 279656, SleepMilliseconds = 60000.
    TickCount = 219655, SleepMilliseconds = -1.
    TickCount = 240562, SleepMilliseconds = 20000.
    TickCount = 220561, SleepMilliseconds = -1.
    TickCount = 220577, SleepMilliseconds = -1.
    TickCount = 221578, SleepMilliseconds = 1000.
    行为描述:跨进程写代码段数据
    详情信息:TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\svhost.exe, WriteAddress = 0x00402000, Size = 0x0001c800 TargetPID = 0x00000ad4
    行为描述:直接获取CPU时钟
    详情信息:EAX = 0x056bdb39, EDX = 0x000000b5
    EAX = 0x056bdb85, EDX = 0x000000b5
    EAX = 0x056bdbd1, EDX = 0x000000b5
    EAX = 0x056bdc1d, EDX = 0x000000b5
    EAX = 0x1fbd147d, EDX = 0x000000b5
    EAX = 0xfd718a9a, EDX = 0x000000b5
    EAX = 0x30a750ce, EDX = 0x000000b7
    EAX = 0x30a7511a, EDX = 0x000000b7
    EAX = 0x30a75166, EDX = 0x000000b7
    EAX = 0x30a751b2, EDX = 0x000000b7
    EAX = 0x332f213b, EDX = 0x000000b7
    EAX = 0x332f2187, EDX = 0x000000b7
    行为描述:修改注册表_启动项
    详情信息:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WPA Service
    进程行为
    行为描述:隐藏窗口创建进程
    详情信息:ImagePath = , CmdLine = "cmd.exe"
    行为描述:创建进程
    详情信息:[0x00000a60]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = "cmd.exe"
    行为描述:创建新文件进程
    详情信息:[0x00000ad4]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\svhost.exe, CmdLine = "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\svhost.exe"
    行为描述:跨进程写入数据
    详情信息:TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\svhost.exe, WriteAddress = 0x00400000, Size = 0x00000200 TargetPID = 0x00000ad4
    TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\svhost.exe, WriteAddress = 0x00420000, Size = 0x00000200 TargetPID = 0x00000ad4
    TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\svhost.exe, WriteAddress = 0x00422000, Size = 0x00015e00 TargetPID = 0x00000ad4
    TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\svhost.exe, WriteAddress = 0x7ffd3008, Size = 0x00000004 TargetPID = 0x00000ad4
    行为描述:设置线程上下文
    详情信息:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\DRAWINGS AND SPECIFICATION.exe
    行为描述:枚举进程
    详情信息:N/A
    行为描述:跨进程写代码段数据
    详情信息:TargetProcess = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\svhost.exe, WriteAddress = 0x00402000, Size = 0x0001c800 TargetPID = 0x00000ad4
    行为描述:创建本地线程
    详情信息:TargetProcess: DRAWINGS AND SPECIFICATION.exe, InheritedFromPID = 2000, ProcessID = 2560, ThreadID = 2576, StartAddress = 79F0237F, Parameter = 00000000
    TargetProcess: DRAWINGS AND SPECIFICATION.exe, InheritedFromPID = 2000, ProcessID = 2560, ThreadID = 2580, StartAddress = 79F91FCF, Parameter = 001AF720
    TargetProcess: DRAWINGS AND SPECIFICATION.exe, InheritedFromPID = 2000, ProcessID = 2560, ThreadID = 2664, StartAddress = 77E56C7D, Parameter = 001D93B8
    TargetProcess: DRAWINGS AND SPECIFICATION.exe, InheritedFromPID = 2000, ProcessID = 2560, ThreadID = 2668, StartAddress = 769AE43B, Parameter = 001DE6D0
    TargetProcess: DRAWINGS AND SPECIFICATION.exe, InheritedFromPID = 2000, ProcessID = 2560, ThreadID = 2780, StartAddress = 79F91FCF, Parameter = 00208890
    TargetProcess: svhost.exe, InheritedFromPID = 2560, ProcessID = 2772, ThreadID = 2784, StartAddress = 79F0237F, Parameter = 00000000
    TargetProcess: svhost.exe, InheritedFromPID = 2560, ProcessID = 2772, ThreadID = 2788, StartAddress = 79F91FCF, Parameter = 001A5330
    TargetProcess: DRAWINGS AND SPECIFICATION.exe, InheritedFromPID = 2000, ProcessID = 2560, ThreadID = 2792, StartAddress = 79FDA29C, Parameter = 00000000
    TargetProcess: svhost.exe, InheritedFromPID = 2560, ProcessID = 2772, ThreadID = 2812, StartAddress = 79F91FCF, Parameter = 001EC820
    TargetProcess: svhost.exe, InheritedFromPID = 2560, ProcessID = 2772, ThreadID = 2816, StartAddress = 79FD8897, Parameter = 0012E9AC
    TargetProcess: svhost.exe, InheritedFromPID = 2560, ProcessID = 2772, ThreadID = 2820, StartAddress = 79F91FCF, Parameter = 001EC820
    TargetProcess: svhost.exe, InheritedFromPID = 2560, ProcessID = 2772, ThreadID = 2824, StartAddress = 79FCBA1E, Parameter = 00000000
    TargetProcess: svhost.exe, InheritedFromPID = 2560, ProcessID = 2772, ThreadID = 2828, StartAddress = 79F91FCF, Parameter = 001E0FF8
    TargetProcess: svhost.exe, InheritedFromPID = 2560, ProcessID = 2772, ThreadID = 2832, StartAddress = 79F91FCF, Parameter = 001E0FF8
    TargetProcess: svhost.exe, InheritedFromPID = 2560, ProcessID = 2772, ThreadID = 3104, StartAddress = 79F91FCF, Parameter = 001E0FF8
    文件行为
    行为描述:创建文件
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Temp\svhost.exe
    C:\Documents and Settings\Administrator\Application Data\DCFF734B-BC3F-43CB-8911-9B5D467629CF\run.dat
    C:\Program Files\WPA Service\wpasv.exe
    行为描述:创建可执行文件
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Temp\svhost.exe
    C:\Program Files\WPA Service\wpasv.exe
    行为描述:修改文件内容
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Temp\svhost.exe ---> Offset = 65536
    C:\Documents and Settings\Administrator\Local Settings\Temp\svhost.exe ---> Offset = 0
    C:\Documents and Settings\Administrator\Local Settings\Temp\svhost.exe ---> Offset = 4096
    C:\Documents and Settings\Administrator\Local Settings\Temp\svhost.exe ---> Offset = 8192
    C:\Documents and Settings\Administrator\Application Data\DCFF734B-BC3F-43CB-8911-9B5D467629CF\run.dat ---> Offset = 0
    C:\Program Files\WPA Service\wpasv.exe ---> Offset = 0
    C:\Program Files\WPA Service\wpasv.exe ---> Offset = 65536
    C:\Program Files\WPA Service\wpasv.exe ---> Offset = 4096
    C:\Program Files\WPA Service\wpasv.exe ---> Offset = 8192
    行为描述:查找文件
    详情信息:FileName = C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll
    FileName = C:\WINDOWS\Microsoft.NET\Framework\\*
    FileName = C:\WINDOWS
    FileName = C:\WINDOWS\WinSxS
    FileName = C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.4053_x-ww_e6967989\MSVCR80.dll
    FileName = C:\WINDOWS\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.INI
    FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
    FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
    FileName = C:\Documents and Settings
    FileName = C:\Documents and Settings\Administrator
    FileName = C:\Documents and Settings\Administrator\Local Settings
    FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump
    FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\DRAWINGS AND SPECIFICATION.exe
    FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\DRAWINGS AND SPECIFICATION.INI
    FileName = C:\WINDOWS\assembly\GAC_MSIL\Microsoft.VisualBasic\8.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.INI
    行为描述:复制文件
    详情信息:C:\WINDOWS\Microsoft.NET\Framework\v3.5\msbuild.exe ---> C:\Documents and Settings\Administrator\Local Settings\Temp\svhost.exe
    C:\Documents and Settings\Administrator\Local Settings\Temp\svhost.exe ---> C:\Program Files\WPA Service\wpasv.exe
    注册表行为
    行为描述:修改注册表_启动项
    详情信息:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WPA Service
    其他行为
    行为描述:检测自身是否被调试
    详情信息:IsDebuggerPresent
    行为描述:创建互斥体
    详情信息:CTF.LBES.MutexDefaultS-*
    CTF.Compart.MutexDefaultS-*
    CTF.Asm.MutexDefaultS-*
    CTF.Layouts.MutexDefaultS-*
    CTF.TMD.MutexDefaultS-*
    CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
    Global\{131a9db8-f6ed-4c2f-a492-75a241f710bc}
    Global\.net clr networking
    行为描述:创建事件对象
    详情信息:EventName = Global\CorDBIPCSetupSyncEvent_2560
    EventName = Global\CorDBIPCSetupSyncEvent_2772
    行为描述:打开互斥体
    详情信息:ShimCacheMutex
    Global\CLR_CASOFF_MUTEX
    Global\.net clr networking
    行为描述:加密数据
    详情信息:[CryptEncrypt] Data: 0x001C35A8, PlainTextLen: 16, CipherTextLen: 16, Flags: 0x00000000
    [CryptEncrypt] Data: 0x001DFD78, PlainTextLen: 16, CipherTextLen: 16, Flags: 0x00000000
    [CryptEncrypt] Data: 0x001D87F0, PlainTextLen: 16, CipherTextLen: 16, Flags: 0x00000000
    行为描述:获取TickCount值
    详情信息:TickCount = 278515, SleepMilliseconds = 60000.
    TickCount = 278546, SleepMilliseconds = 60000.
    TickCount = 278578, SleepMilliseconds = 60000.
    TickCount = 278671, SleepMilliseconds = 60000.
    TickCount = 278703, SleepMilliseconds = 60000.
    TickCount = 278718, SleepMilliseconds = 60000.
    TickCount = 278781, SleepMilliseconds = 60000.
    TickCount = 229546, SleepMilliseconds = 10000.
    TickCount = 221546, SleepMilliseconds = 2000.
    TickCount = 279656, SleepMilliseconds = 60000.
    TickCount = 219655, SleepMilliseconds = -1.
    TickCount = 240562, SleepMilliseconds = 20000.
    TickCount = 220561, SleepMilliseconds = -1.
    TickCount = 220577, SleepMilliseconds = -1.
    TickCount = 221578, SleepMilliseconds = 1000.
    行为描述:调整进程token权限
    详情信息:SE_DEBUG_PRIVILEGE
    行为描述:打开事件
    详情信息:Global\CLR_PerfMon_StartEnumEvent
    \KernelObjects\LowMemoryCondition
    HookSwitchHookEnabledEvent
    MSFT.VSA.COM.DISABLE.2560
    MSFT.VSA.IEC.STATUS.6c736db0
    \SECURITY\LSA_AUTHENTICATION_INITIALIZED
    行为描述:可执行文件签名信息
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Temp\svhost.exe(签名验证: 通过)
    C:\Program Files\WPA Service\wpasv.exe(签名验证: 通过)
    行为描述:调用Sleep函数
    详情信息:[1]: MilliSeconds = 60000.
    [3]: MilliSeconds = 100.
    [2]: MilliSeconds = 2000.
    [4]: MilliSeconds = 10000.
    [5]: MilliSeconds = 2000.
    [6]: MilliSeconds = 60000.
    [7]: MilliSeconds = -1.
    [1]: MilliSeconds = 20000.
    [2]: MilliSeconds = -1.
    [3]: MilliSeconds = 1000.
    [4]: MilliSeconds = 1000.
    [6]: MilliSeconds = 50.
    [5]: MilliSeconds = 500.
    [7]: MilliSeconds = 50.
    [8]: MilliSeconds = 50.
    行为描述:隐藏指定窗口
    详情信息:[Window,Class] = [,WindowsForms10.Window.8.app.0.378734a]
    行为描述:可执行文件MD5
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Temp\svhost.exe ---> 160ce92b1fc86b1c25297e5dfded3a77
    C:\Program Files\WPA Service\wpasv.exe ---> 160ce92b1fc86b1c25297e5dfded3a77
    行为描述:直接获取CPU时钟
    详情信息:EAX = 0x056bdb39, EDX = 0x000000b5
    EAX = 0x056bdb85, EDX = 0x000000b5
    EAX = 0x056bdbd1, EDX = 0x000000b5
    EAX = 0x056bdc1d, EDX = 0x000000b5
    EAX = 0x1fbd147d, EDX = 0x000000b5
    EAX = 0xfd718a9a, EDX = 0x000000b5
    EAX = 0x30a750ce, EDX = 0x000000b7
    EAX = 0x30a7511a, EDX = 0x000000b7
    EAX = 0x30a75166, EDX = 0x000000b7
    EAX = 0x30a751b2, EDX = 0x000000b7
    EAX = 0x332f213b, EDX = 0x000000b7
    EAX = 0x332f2187, EDX = 0x000000b7
    行为描述:解密数据
    详情信息:[CryptDecrypt] Data: 0x001C5658, CipherTextLen: 5056, PlainTextLen: 5056, Flags: 0x00000000
    [CryptDecrypt] Data: 0x001E7008, CipherTextLen: 224896, PlainTextLen: 224896, Flags: 0x00000000
    [CryptDecrypt] Data: 0x001E1008, CipherTextLen: 89352, PlainTextLen: 89352, Flags: 0x00000000
    行为描述:导入密钥
    详情信息:[CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x0041F6FB, DataLen: 148, Flags: 0x00000000
    [CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001C1FB4, DataLen: 148, Flags: 0x00000000
    [CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001C827C, DataLen: 148, Flags: 0x00000000
    [CryptImportKey] Algorithm: CALG_DES (0x00006601), Data: 0x001C9258, DataLen: 20, Flags: 0x00000001
    [CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x0019516C, DataLen: 148, Flags: 0x00000000
    [CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001C8324, DataLen: 148, Flags: 0x00000000
    [CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001DC6E4, DataLen: 148, Flags: 0x00000000
    [CryptImportKey] Algorithm: CALG_DES (0x00006601), Data: 0x001E01D8, DataLen: 20, Flags: 0x00000001
    [CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x010F068F, DataLen: 148, Flags: 0x00000000
    [CryptImportKey] Algorithm: CALG_RSA_SIGN (0x00002400), Data: 0x001BBFE4, DataLen: 148, Flags: 0x00000000
    [CryptImportKey] Algorithm: CALG_DES (0x00006601), Data: 0x001D8C48, DataLen: 20, Flags: 0x00000001
    [CryptImportKey] Algorithm: CALG_DES (0x00006601), Data: 0x001D87D0, DataLen: 20, Flags: 0x00000001
    Activities
    活动名类型
    .ShineInductionandroid.intent.action.MAIN
    .ShineInductionandroid.intent.category.LAUNCHER
    危险函数
    函数名称信息
    ContentResolver;->query读取联系人、短信等数据库
    TelephonyManager;->getDeviceId搜集用户手机IMEI码、电话号码、系统版本号等信息
    android/app/NotificationManager;->notify信息通知栏
    java/net/URL;->openConnection连接URL
    java/net/URLConnection;->connect连接URL
    java/net/HttpURLConnection;->connect连接URL
    HttpClient;->execute请求远程服务器
    LocationManager;->getLastKnownLocation获取地址位置
    启动方式
    名称信息
    com.ShineInduction.onDestroyStartService
    com.ShineInduction.onDestroyStartService
    com.ShineInduction.onDestroyStartService开机启动服务
    com.ShineInduction.LockScreenAdmin
    com.dtr.dvh应用安装时启动服务
    com.dtr.dvh应用卸载时启动服务
    com.dtr.dvh
    权限列表
    许可名称信息
    android.permission.INTERNET连接网络(2G或3G)
    android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
    android.permission.READ_PHONE_STATE读取电话状态
    android.permission.ACCESS_WIFI_STATE读取wifi网络状态
    android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
    android.permission.DEVICE_POWER电源管理
    android.permission.WAKE_LOCK手机屏幕关闭后后台进程仍运行
    android.permission.RECEIVE_BOOT_COMPLETED接收开机启动广播
    android.permission.GET_TASKS获取有关当前或最近运行的任务信息
    android.permission.DISABLE_KEYGUARD禁用键盘锁
    服务列表
    名称
    com.ShineInduction.LockService
    com.ShineInduction.whileService
    com.ShineInduction.ClickScreen
    com.dtr.eus
    文件列表
    文件名 校验码
    META-INF/MANIFEST.MF 0xd776810d
    META-INF/YIXIANG.SF 0x97846b80
    META-INF/YIXIANG.RSA 0xf3371242
    assets/help.htm 0xdd453d10
    assets/jyg_full.dll 0xbcb2d989
    res/anim/jyg_alpha_action.xml 0xdd594b37
    res/anim/rhatuk_fb_slide_in_from_left.xml 0xb0e4f2ac
    res/anim/rhatuk_fb_slide_in_from_right.xml 0xa0d92fcf
    res/anim/rhatuk_fb_slide_out_from_left.xml 0xf23ce3df
    res/anim/rhatuk_fb_slide_out_from_right.xml 0xf63e94fb
    res/drawable/android_bt.xml 0x6734c0a9
    res/drawable/android_bt_f.png 0x49f03709
    res/drawable/android_bt_n.png 0x8cf0c9f9
    res/drawable/bt.xml 0x522d96a0
    res/drawable/bt_f.png 0xcea02265
    res/drawable/bt_n.png 0x1c618535
    res/drawable/ic_tab.xml 0x222d7daa
    res/drawable/jyg_back_btn.xml 0x68e85a1
    res/drawable/jyg_check_btn.xml 0x2760728a
    res/drawable/jyg_dialog_bottom_bg.xml 0x7e82d681
    res/drawable/jyg_dialog_btn_selector.xml 0x652e7aae
    res/drawable/jyg_dialog_middle_bg.xml 0x4eb8daed
    res/drawable/jyg_dialog_top_bg.xml 0x190ea346
    res/drawable/jyg_fine_bt.xml 0x8d56c7bf
    res/drawable/jyg_progressdrawable.xml 0x159b133a
    res/drawable/main_title_bg9.png 0xf5cc9db5
    res/drawable/main_title_select9.png 0xc7d7f3f2
    res/drawable/rhatuk_common_gradient_green.xml 0xf20a5f8e
    res/drawable/rhatuk_common_gradient_orange.xml 0xb1318c6f
    res/drawable/rhatuk_common_gradient_red.xml 0x771b3885
    res/drawable/rhatuk_fb_arrow_right.png 0x7a1c5b28
    res/drawable/rhatuk_fb_back_normal.png 0xf037944c
    res/drawable/rhatuk_fb_back_selected.png 0x8c4fe8b
    res/drawable/rhatuk_fb_back_selector.xml 0x288174d7
    res/drawable/rhatuk_fb_bar_bg.9.png 0x382879f2
    res/drawable/rhatuk_fb_btn_bg_selector.xml 0x60e35ac
    res/drawable/rhatuk_fb_conversation_bg.png 0xdc739dc7
    res/drawable/rhatuk_fb_gradient_green.xml 0xf20a5f8e
    res/drawable/rhatuk_fb_gradient_orange.xml 0xb1318c6f
    res/drawable/rhatuk_fb_gray_frame.xml 0x66be4391
    res/drawable/rhatuk_fb_list_item.9.png 0x1dd77523
    res/drawable/rhatuk_fb_list_item_pressed.9.png 0xdcc0e0d
    res/drawable/rhatuk_fb_list_item_selector.xml 0xa52d7ece
    res/drawable/rhatuk_fb_logo.png 0x2d6a27be
    res/drawable/rhatuk_fb_point_new.xml 0xbe6555ba
    res/drawable/rhatuk_fb_point_normal.xml 0xdb9cc3ec
    res/drawable/rhatuk_fb_reply_left_bg.9.png 0xfa4a43b9
    res/drawable/rhatuk_fb_reply_right_bg.9.png 0x49b36368
    res/drawable/rhatuk_fb_see_list_normal.png 0x6d9ee2f3
    res/drawable/rhatuk_fb_see_list_pressed.png 0x3ff6d161
    res/drawable/rhatuk_fb_see_list_selector.xml 0x99aa4229
    res/drawable/rhatuk_fb_statusbar_icon.png 0x6eefda9a
    res/drawable/rhatuk_fb_submit_selector.xml 0x91dad12c
    res/drawable/rhatuk_fb_tick_normal.png 0xdea435dd
    res/drawable/rhatuk_fb_tick_selected.png 0x33316df3
    res/drawable/rhatuk_fb_tick_selector.xml 0xef05ed50
    res/drawable/rhatuk_fb_top_banner.xml 0xe6ffcfd6
    res/drawable/rhatuk_fb_user_bubble.9.png 0x23cfe9b2
    res/drawable/rhatuk_fb_write_normal.png 0xf3083af7
    res/drawable/rhatuk_fb_write_pressed.png 0x10dae61
    res/drawable/rhatuk_fb_write_selector.xml 0xd7099486
    res/drawable-hdpi/icon.png 0xac6e995c
    res/drawable-hdpi/jyg_backbutton_n.9.png 0x3b23472
    res/drawable-hdpi/jyg_backbutton_p.9.png 0x388a61a5
    res/drawable-hdpi/jyg_bar_bg.9.png 0xeb4a42c7
    res/drawable-hdpi/jyg_check_normal.9.png 0xca45793d
    res/drawable-hdpi/jyg_check_press.9.png 0xf1a870be
    res/drawable-hdpi/jyg_dialog_btn_n.9.png 0xfb20c0e3
    res/drawable-hdpi/jyg_dialog_btn_p.9.png 0x313fe0e9
    res/drawable-hdpi/jyg_fine_1.9.png 0xe100e79a
    res/drawable-hdpi/jyg_fine_2.9.png 0x36bd6a9c
    res/drawable-hdpi/jyg_horizontal_bg.png 0xcfb5270a
    res/drawable-hdpi/jyg_lefticon.png 0xa5674f40
    res/drawable-hdpi/jyg_list_divider_bg.png 0xcc44da67
    res/drawable-hdpi/jyg_progress_bg.9.png 0x9bbaee29
    res/drawable-hdpi/jyg_progressbitmap.png 0x9c4c5a2b
    res/drawable-hdpi/jyg_widget_free.png 0xa2426a8d
    res/layout/applist.xml 0xa03df7ff
    res/layout/applist1.xml 0x78dd568f
    res/layout/help.xml 0xeeef6f2
    res/layout/jyg_dialog.xml 0xcc64062d
    res/layout/jyg_show_box.xml 0x7e9d5cc5
    res/layout/jyg_show_box_item.xml 0xd00b1334
    res/layout/jyg_widget_layout.xml 0x6235e873
    res/layout/listitem.xml 0x74e2d712
    res/layout/listitem1.xml 0x4015f5ba
    res/layout/main.xml 0x3943a7a5
    res/layout/rhatuk_common_download_notification.xml 0x3e18148b
    res/layout/rhatuk_fb_activity_contact.xml 0xd94c52b4
    res/layout/rhatuk_fb_activity_conversation.xml 0xacb23269
    res/layout/rhatuk_fb_list_header.xml 0xfac83047
    res/layout/rhatuk_fb_list_item.xml 0x8fcefaed
    res/layout/rhatuk_fb_new_reply_alert_dialog.xml 0x14acb092
    res/xml/lock_screen_admin.xml 0xeab2c16b
    res/xml/mainactivity.xml 0x8e3779d5
    AndroidManifest.xml 0xd29182d4
    classes.dex 0xc949fb74
    resources.arsc 0x4d2c0abf
    运行截图
    VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号