VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
File Name :美女来找茬(极品版).apk (File not down)
File Size :7913876 byte
File Type :application/jar
MD5:4b0821c9a23f9b029914c4228b28adab
SHA1:ea54fe28c2086929dce7bd2c15d7b578e7f309e7
  • 扫描结果
  • 权限
  • 文件行为分析
  • Scanner results
    Scanner results:9%Scanner(s) (3/32)found malware!
    Behavior analysis report:         Habo file analysis
    Time: 2016-08-25 11:12:02 (CST)
    VirSCANVirSCAN
    Scanner Engine Ver Sig Ver Sig Date Scan result Time
    antiy AVL SDK 3.0 1970-01-01 Found nothing 6
    asquared 9.0.0.4324 9.0.0.4324 2014-07-03 Found nothing 1
    avast 150725-1 4.7.4 2015-07-25 Found nothing 60
    avg 2109/8133 10.0.1405 2014-11-26 Found nothing 60
    baidu 2.0.1.0 4.1.3.52192 2.0.1.0 Found nothing 10
    baidusd 1.0 1.0 2014-04-02 Found nothing 4
    bitdefender 7.58469 7.90123 2014-12-25 Found nothing 60
    clamav 19861 0.97.5 2014-12-31 Found nothing 60
    drweb 5.0.2.3300 5.0.1.1 2014-12-31 Found nothing 60
    fortinet 23.345, 23.345 5.1.158 2014-12-08 Found nothing 60
    fprot 4.6.2.117 6.5.1.5418 2014-12-31 Found nothing 60
    fsecure 2014-04-02-01 9.13 2014-04-02 Found nothing 60
    gdata 25.8014 25.8014 2016-08-24 Android.Adware.Dowgin.KE 24
    ikarus 1.06.01 V1.32.31.0 2014-12-08 Found nothing 60
    jiangmin 16.0.100 1.0.0.0 2015-07-25 Found nothing 60
    kaspersky 5.5.33 5.5.33 2014-04-01 Found nothing 60
    kingsoft 2.1 2.1 2013-09-22 Android.Troj.Undef.a.(kcloud) 29
    mcafee 7638 5400.1158 2014-11-30 Found nothing 60
    nod32 0920 3.0.21 2014-12-23 Found nothing 60
    panda 9.05.01 9.05.01 2015-07-26 Found nothing 22
    pcc 11.380.07 9.500-1005 2014-12-31 Found nothing 60
    qh360 1.0.1 1.0.1 1.0.1 Found nothing 6
    qqphone 1.0.0.0 1.0.0.0 2014-12-09 Found nothing 60
    quickheal 14.00 14.00 2015-07-25 Found nothing 4
    rising 25.76.04.01 25.76.04.01 2015-07-24 Found nothing 13
    sophos 5.08 3.55.0 2014-12-01 Found nothing 60
    symantec 20141230.001 1.3.0.24 2014-12-30 Found nothing 60
    tachyon 9.9.9 9.9.9 2013-12-27 Found nothing 41
    thehacker 6.8.0.5 6.8.0.5 2015-07-23 Found nothing 36
    tws 17.47.17308 1.0.2.2108 2014-12-08 Adware.AndroidOS.Dowgin.a.konv 45
    vba 3.12.26.3 3.12.26.3 2014-12-31 Found nothing 60
    virusbuster 15.0.985.0 5.5.2.13 2014-12-05 Found nothing 60
    Heuristic/Suspicious Exact
    NOTICE: Results are not 100% accurate and can be reported as a false positive by some scannerswhen and if malware is found. Please judge these results for yourself.
  • 权限列表
    许可名称信息
    android.permission.READ_PHONE_STATE读取电话状态
    android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
    android.permission.INTERNET连接网络(2G或3G)
    android.permission.WAKE_LOCK手机屏幕关闭后后台进程仍运行
    android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
    android.permission.SYSTEM_ALERT_WINDOW显示系统窗口
    android.permission.GET_TASKS获取有关当前或最近运行的任务信息
    android.permission.ACCESS_COARSE_LOCATION获取粗略的位置(通过wifi、基站)
  • 文件信息
    安全评分 :
    基本信息
    MD5:4b0821c9a23f9b029914c4228b28adab
    包名:com.techone.photohunts
    最低运行环境:Android 1.5
    版权:CQ
    关键行为
    行为描述:尝试打开调试器或监控软件的驱动设备对象
    详情信息:\??\NTICE
    行为描述:查找反病毒常用工具窗口
    详情信息:NtUserFindWindowEx: [Class,Window] = [Regmonclass,]
    NtUserFindWindowEx: [Class,Window] = [Filemonclass,]
    进程行为
    行为描述:创建本地线程
    详情信息:TargetProcess: 侠客v1.0.2.9版本修改器.V3.1.4-XiaoXing.exe, InheritedFromPID = 1944, ProcessID = 3176, ThreadID = 3192, StartAddress = 77DC845A, Parameter = 00000000
    TargetProcess: 侠客v1.0.2.9版本修改器.V3.1.4-XiaoXing.exe, InheritedFromPID = 1944, ProcessID = 3176, ThreadID = 3548, StartAddress = 0071C011, Parameter = 001BBD88
    TargetProcess: 侠客v1.0.2.9版本修改器.V3.1.4-XiaoXing.exe, InheritedFromPID = 1944, ProcessID = 3176, ThreadID = 3552, StartAddress = 0071C011, Parameter = 001BBD88
    TargetProcess: 侠客v1.0.2.9版本修改器.V3.1.4-XiaoXing.exe, InheritedFromPID = 1944, ProcessID = 3176, ThreadID = 3556, StartAddress = 0071C011, Parameter = 001BBD88
    TargetProcess: 侠客v1.0.2.9版本修改器.V3.1.4-XiaoXing.exe, InheritedFromPID = 1944, ProcessID = 3176, ThreadID = 3560, StartAddress = 0071C011, Parameter = 001BBE28
    TargetProcess: 侠客v1.0.2.9版本修改器.V3.1.4-XiaoXing.exe, InheritedFromPID = 1944, ProcessID = 3176, ThreadID = 3564, StartAddress = 0071C011, Parameter = 001BBE28
    TargetProcess: 侠客v1.0.2.9版本修改器.V3.1.4-XiaoXing.exe, InheritedFromPID = 1944, ProcessID = 3176, ThreadID = 3568, StartAddress = 0071C011, Parameter = 001BBD88
    TargetProcess: 侠客v1.0.2.9版本修改器.V3.1.4-XiaoXing.exe, InheritedFromPID = 1944, ProcessID = 3176, ThreadID = 3572, StartAddress = 0071C011, Parameter = 001BBD88
    TargetProcess: 侠客v1.0.2.9版本修改器.V3.1.4-XiaoXing.exe, InheritedFromPID = 1944, ProcessID = 3176, ThreadID = 3604, StartAddress = 0044FF34, Parameter = 00359D9D
    TargetProcess: 侠客v1.0.2.9版本修改器.V3.1.4-XiaoXing.exe, InheritedFromPID = 1944, ProcessID = 3176, ThreadID = 3620, StartAddress = 0071C011, Parameter = 001B88C0
    TargetProcess: 侠客v1.0.2.9版本修改器.V3.1.4-XiaoXing.exe, InheritedFromPID = 1944, ProcessID = 3176, ThreadID = 3640, StartAddress = 0071C011, Parameter = 001B88C0
    TargetProcess: 侠客v1.0.2.9版本修改器.V3.1.4-XiaoXing.exe, InheritedFromPID = 1944, ProcessID = 3176, ThreadID = 3644, StartAddress = 0071C011, Parameter = 00224F20
    文件行为
    行为描述:修改文件内容
    详情信息:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe_7zdump\支持1.0.2.9(非steam)的修改器\wuxia.ini ---> Offset = 180
    其他行为
    行为描述:创建互斥体
    详情信息:RasPbFile
    CTF.LBES.MutexDefaultS-*
    CTF.Compart.MutexDefaultS-*
    CTF.Asm.MutexDefaultS-*
    CTF.Layouts.MutexDefaultS-*
    CTF.TMD.MutexDefaultS-*
    CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
    MSCTF.Shared.MUTEX.ELH
    行为描述:创建事件对象
    详情信息:EventName = DINPUTWINMM
    行为描述:查找指定窗口
    详情信息:NtUserFindWindowEx: [Class,Window] = [4823-00000029,]
    NtUserFindWindowEx: [Class,Window] = [18467-41,]
    NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
    行为描述:尝试打开调试器或监控软件的驱动设备对象
    详情信息:\??\NTICE
    行为描述:打开事件
    详情信息:HookSwitchHookEnabledEvent
    \SECURITY\LSA_AUTHENTICATION_INITIALIZED
    CTF.ThreadMIConnectionEvent.000007B4.00000000.00000041
    CTF.ThreadMarshalInterfaceEvent.000007B4.00000000.00000041
    MSCTF.SendReceive.Event.ELH.IC
    MSCTF.SendReceiveConection.Event.ELH.IC
    行为描述:打开互斥体
    详情信息:RasPbFile
    ShimCacheMutex
    行为描述:查找反病毒常用工具窗口
    详情信息:NtUserFindWindowEx: [Class,Window] = [Regmonclass,]
    NtUserFindWindowEx: [Class,Window] = [Filemonclass,]
    Activities
    活动名类型
    .Photohuntsandroid.intent.action.MAIN
    .Photohuntsandroid.intent.category.LAUNCHER
    危险函数
    函数名称信息
    java/net/URL;->openConnection连接URL
    java/net/HttpURLConnection;->connect连接URL
    TelephonyManager;->getLine1Number获取手机号
    TelephonyManager;->getSimSerialNumber获取SIM序列号
    启动方式
    名称信息
    com.ujsmple.inju.ujxxsbr屏幕解锁启动服务
    com.ujsmple.inju.ujxxsbr
    com.ujsmple.inju.ujxxsbr应用安装时启动服务
    com.wag.wagr应用安装时启动服务
    com.wag.wagr网络连接改变时启动服务
    com.wag.wagr屏幕解锁启动服务
    com.wag.wagr
    com.oib.vyso.BbafR应用安装时启动服务
    com.oib.vyso.BbafR网络连接改变时启动服务
    com.oib.vyso.BbafR屏幕解锁启动服务
    com.oib.vyso.BbafR
    com.lk.q.OJY应用安装时启动服务
    com.lk.q.OJY应用卸载时启动服务
    com.lk.q.OJY网络连接改变时启动服务
    com.lk.q.OJY屏幕解锁启动服务
    com.lk.q.OJY
    权限列表
    许可名称信息
    android.permission.READ_PHONE_STATE读取电话状态
    android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
    android.permission.INTERNET连接网络(2G或3G)
    android.permission.WAKE_LOCK手机屏幕关闭后后台进程仍运行
    android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
    android.permission.SYSTEM_ALERT_WINDOW显示系统窗口
    android.permission.GET_TASKS获取有关当前或最近运行的任务信息
    android.permission.ACCESS_COARSE_LOCATION获取粗略的位置(通过wifi、基站)
    服务列表
    名称
    com.ujsmple.inju.yjus
    com.lk.q.BN
    com.lk.q.LKF
    文件列表
    文件名 校验码
    META-INF/MANIFEST.MF 0x1a36f149
    META-INF/CERT.SF 0xaee7cf09
    META-INF/CERT.RSA 0x380f8e79
    res/drawable/p5.jpg 0x40c275b7
    lib/y.dat 0xc9c70943
    res/drawable/p2.jpg 0xec8fc597
    res/drawable/p4.jpg 0x28cb5a0c
    res/drawable/p21.jpg 0x3d42e467
    res/drawable/p10.jpg 0xd930c7ec
    res/drawable/p20.jpg 0xb0765481
    res/drawable/p25.jpg 0x55de5344
    res/drawable/splash.png 0x5669733c
    res/drawable-zh/help.png 0xeb703710
    res/drawable/p7.jpg 0x68213273
    res/drawable/p17.jpg 0xd0022ca6
    res/drawable-ja/start.png 0x1e601e8b
    res/layout/splash.xml 0xa00f0580
    res/drawable/p3.jpg 0x5cb7e7ad
    res/drawable-zh/start.png 0x4c9b472e
    res/drawable/p32.jpg 0x97459bcf
    res/drawable/p28.jpg 0x742d2f03
    res/drawable/p41.jpg 0xc9f4e060
    res/drawable/p42.jpg 0x54618d01
    res/drawable/p8.jpg 0x39d47639
    res/drawable/p29.jpg 0x77118ade
    res/drawable/help.png 0x4f290b57
    res/layout/main.xml 0xd02f670c
    res/drawable/p11.jpg 0x447a4267
    res/raw/wrong.mp3 0xa49f88cb
    res/drawable/p13.jpg 0xa95ba74a
    res/drawable/p37.jpg 0xd82826eb
    res/drawable/p31.jpg 0x74bc010c
    res/drawable/p26.jpg 0xcd5ab789
    lib/b.dat 0x2944c0e4
    res/drawable-ja/help.png 0x4cde3f16
    res/drawable/p24.jpg 0xb2b4b936
    res/drawable/p9.jpg 0x2cee8c25
    res/drawable/exit.png 0x7512c8c0
    assets/logo.png 0x1850c46d
    res/raw/backmusic.mp3 0xac2c92d3
    res/drawable/p19.jpg 0xa1f3ccf2
    assets/ua.properties 0x66eeda56
    resources.arsc 0x46984e4b
    lib/p.dat 0xcea15f7a
    res/layout/menu.xml 0x71c6cf8
    res/drawable/p36.jpg 0x7d756b90
    res/drawable/p6.jpg 0x8b1a9fda
    res/drawable/p39.jpg 0xbab9caf0
    AndroidManifest.xml 0x46c9698c
    res/drawable/p18.jpg 0xcddc1ce3
    lib/u.dat 0xf7102791
    res/drawable/p33.jpg 0x37ba00ca
    res/drawable/start.png 0x38ae8b56
    res/drawable/p44.jpg 0x666f14b9
    res/drawable/p15.jpg 0x747ae194
    res/drawable/p35.jpg 0x6d55d0cc
    res/drawable/back.png 0x2880ed52
    res/drawable/p38.jpg 0x178120f2
    res/drawable/p30.jpg 0x6b72bc6b
    res/drawable/p34.jpg 0x26833feb
    res/drawable/p16.jpg 0x81c481df
    classes.dex 0x1bd56421
    res/drawable/p23.jpg 0x18be95ab
    res/drawable/p40.jpg 0x79409420
    res/drawable/p45.jpg 0xbc185fff
    assets/btn.png 0x19dde463
    lib/c.dat 0xc52ea311
    res/drawable/p22.jpg 0xc5b5bb80
    res/drawable/p43.jpg 0xd9393533
    res/drawable/icon.png 0xc951a8d9
    res/drawable-zh/exit.png 0xe8b6cd6e
    res/drawable/p12.jpg 0xbdfed7a5
    res/drawable/p1.jpg 0xce8c1159
    res/raw/next.mp3 0x6a7cc7e4
    res/drawable/p14.jpg 0x85e0a550
    res/drawable-ja/exit.png 0xab7ea8fe
    res/raw/right.mp3 0x42eef62c
    res/drawable/p27.jpg 0x85f92d00
    运行截图
    VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号