VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
File Name :GLTools_gfx_optimizer_v2.02.apk (File not down)
File Size :19238202 byte
File Type :Zip archive data
MD5:7773571ae4d30381c7882a8156f3b857
SHA1:6e0c2abb1c4b51846ba0a8c7c374c4d0e0c2abe6
SHA256:e936f4b2e8edb9137ec4b3577ba1489c126be480a1f85a26e707c6b256d06319
SSDEEP:393216:F/hiOZk9RftxPCrc6p2OyDJmQLLFR1qURy4NRc0irPhn3rsMzf5fwZkmDD7IuI:p0OZkz7CcMod1qay4Y5Nn3rsmBIZ9DD6
  • 扫描结果
  • 权限
  • 文件行为分析
  • Scanner results
    Scanner results:0%Scanner(s) (0/32)found malware!
    Behavior analysis report:         Habo file analysis
    Time: 2017-07-16 01:57:20 (CST)
    VirSCANVirSCAN
    Scanner Engine Ver Sig Ver Sig Date Scan result Time
    antiy AVL SDK 2.0 1970-01-01 Found nothing 12
    asquared 9.0.0.4799 9.0.0.4799 2015-03-08 Found nothing 2
    avast 170303-1 4.7.4 2017-03-03 Found nothing 60
    avg 2109/14149 10.0.1405 2017-07-04 Found nothing 60
    baidu 2.0.1.0 4.1.3.52192 2.0.1.0 Found nothing 3
    baidusd 1.0 1.0 2017-03-22 Found nothing 2
    bitdefender 7.58879 7.90123 2015-01-16 Found nothing 60
    clamav 23563 0.97.5 2017-07-15 Found nothing 60
    drweb 5.0.2.3300 5.0.1.1 2017-06-18 Found nothing 60
    fortinet 50.210, 50.114, 50.138 5.4.247 2017-07-16 Found nothing 60
    fprot 4.6.2.117 6.5.1.5418 2016-02-05 Found nothing 60
    fsecure 2015-08-01-02 9.13 2015-08-01 Found nothing 60
    gdata 25.13386 25.13386 2017-07-15 Found nothing 24
    ikarus 1.06.01 V1.32.31.0 2016-11-28 Found nothing 60
    jiangmin 16.0.100 1.0.0.0 2017-07-13 Found nothing 3
    kaspersky 5.5.33 5.5.33 2014-04-01 Found nothing 60
    kingsoft 2.1 2.1 2017-07-15 Found nothing 8
    mcafee 8261 5400.1158 2016-08-18 Found nothing 60
    nod32 1777 3.0.21 2015-06-12 Found nothing 60
    panda 9.05.01 9.05.01 2017-07-15 Found nothing 5
    pcc 13.302.06 9.500-1005 2017-03-27 Found nothing 60
    qh360 1.0.1 1.0.1 1.0.1 Found nothing 7
    qqphone 1.0.0.0 1.0.0.0 2015-12-30 Found nothing 60
    quickheal 14.00 14.00 2017-07-14 Found nothing 5
    rising 26.28.00.01 26.28.00.01 2016-07-18 Found nothing 4
    sophos 5.32 3.65.2 2016-10-10 Found nothing 60
    symantec 20151230.005 1.3.0.24 2015-12-30 Found nothing 60
    tachyon 9.9.9 9.9.9 2013-12-27 Found nothing 5
    thehacker 6.8.0.5 6.8.0.5 2017-07-12 Found nothing 4
    tws 17.47.17308 1.0.2.2108 2017-07-14 Found nothing 17
    vba 3.12.29.5 beta 3.12.29.5 beta 2017-07-13 Found nothing 60
    virusbuster 15.0.985.0 5.5.2.13 2014-12-05 Found nothing 60
    Heuristic/Suspicious Exact
    NOTICE: Results are not 100% accurate and can be reported as a false positive by some scannerswhen and if malware is found. Please judge these results for yourself.
  • 权限列表
    许可名称信息
    android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
    android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
    android.permission.ACCESS_SUPERUSER
    android.permission.INTERNET连接网络(2G或3G)
    com.android.vending.CHECK_LICENSE
  • 文件信息
    安全评分 :
    基本信息
    MD5:7773571ae4d30381c7882a8156f3b857
    包名:com.n0n3m4.gltools
    最低运行环境:Android 2.3, 2.3.1, 2.3.2
    版权:
    关键行为
    行为描述:直接调用系统关键API
    详情信息:Index = 0x0000009A, Name: NtQueryInformationProcess, Instruction Address = 0x0040ABF2
    Index = 0x0000009A, Name: NtQueryInformationProcess, Instruction Address = 0x0040AC5D
    行为描述:查找PE资源信息
    详情信息:(FindResourceA) hModule = 0x00400000, ResName: , ResType: FILE
    行为描述:屏蔽窗口关闭消息
    详情信息:hWnd = 0x0001033c, Text = 安装程序, ClassName = INSTALLEX.
    进程行为
    行为描述:隐藏窗口创建进程
    详情信息:ImagePath = , CmdLine = c:\ProgramFiles\7z.exe x INDOWS\Explorer.EXE敓瑴湩獧呜浥屰??????硥?畤灭\挮湯楦g -oc:\ProgramFiles\ -y
    行为描述:创建本地线程
    详情信息:TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2696, ThreadID = 2708, StartAddress = 77DC845A, Parameter = 00000000
    TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2696, ThreadID = 2712, StartAddress = 4AEA7456, Parameter = 00000000
    TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2696, ThreadID = 2804, StartAddress = 0040B550, Parameter = 00B852F0
    行为描述:创建新文件进程
    详情信息:[0x00000aec]ImagePath = C:\ProgramFiles\7z.exe, CmdLine = c:\ProgramFiles\7z.exe x INDOWS\Explorer.EXE敓瑴湩獧呜浥屰??????硥?畤灭\挮湯楦g -oc:\ProgramFiles\ -y
    文件行为
    行为描述:创建文件
    详情信息:C:\ProgramFiles\7z.exe
    行为描述:创建可执行文件
    详情信息:C:\ProgramFiles\7z.exe
    行为描述:修改文件内容
    详情信息:C:\ProgramFiles\7z.exe ---> Offset = 0
    C:\ProgramFiles\7z.exe ---> Offset = 4096
    C:\ProgramFiles\7z.exe ---> Offset = 8192
    C:\ProgramFiles\7z.exe ---> Offset = 10240
    C:\ProgramFiles\7z.exe ---> Offset = 14336
    行为描述:查找文件
    详情信息:FileName = C:\WINDOWS
    FileName = C:\WINDOWS\WinSxS
    FileName = C:\WINDOWS\WinSxS\x86_Microsoft.VC90.CRT_1fc8b3b9a1e18e3b_9.0.30729.1_x-ww_6f74963e\MSVCR90.dll
    FileName = C:\Documents and Settings
    FileName = C:\Documents and Settings\Administrator
    FileName = C:\Documents and Settings\Administrator\「开始」菜单
    FileName = C:\Documents and Settings\Administrator\「开始」菜单\程序
    FileName = C:\Documents and Settings\Administrator\Favorites
    FileName = C:\Documents and Settings\Administrator\「开始」菜单\程序\启动
    FileName = C:\Documents and Settings\Administrator\Recent
    FileName = C:\Documents and Settings\Administrator\SendTo
    FileName = C:\Documents and Settings\Administrator\My Documents
    FileName = C:\Documents and Settings\Administrator\My Documents\My Music
    FileName = C:\Documents and Settings\Administrator\桌面
    FileName = C:\Documents and Settings\Administrator\NetHood
    其他行为
    行为描述:创建互斥体
    详情信息:eb93a6c
    CTF.LBES.MutexDefaultS-*
    CTF.Compart.MutexDefaultS-*
    CTF.Asm.MutexDefaultS-*
    CTF.Layouts.MutexDefaultS-*
    CTF.TMD.MutexDefaultS-*
    CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
    MSCTF.Shared.MUTEX.IOH
    MSCTF.Shared.MUTEX.MIK
    行为描述:创建事件对象
    详情信息:EventName = Global\userenv: User Profile setup event
    EventName = MSCTF.SendReceive.Event.MIK.IC
    EventName = MSCTF.SendReceiveConection.Event.MIK.IC
    行为描述:直接调用系统关键API
    详情信息:Index = 0x0000009A, Name: NtQueryInformationProcess, Instruction Address = 0x0040ABF2
    Index = 0x0000009A, Name: NtQueryInformationProcess, Instruction Address = 0x0040AC5D
    行为描述:查找指定窗口
    详情信息:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
    NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
    行为描述:打开事件
    详情信息:HookSwitchHookEnabledEvent
    _fCanRegisterWithShellService
    CTF.ThreadMIConnectionEvent.000007E8.00000000.0000000F
    CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.0000000F
    MSCTF.SendReceiveConection.Event.IOH.IC
    MSCTF.SendReceive.Event.IOH.IC
    行为描述:调整进程token权限
    详情信息:SE_LOAD_DRIVER_PRIVILEGE
    行为描述:屏蔽窗口关闭消息
    详情信息:hWnd = 0x0001033c, Text = 安装程序, ClassName = INSTALLEX.
    行为描述:窗口信息
    详情信息:Pid = 2696, Hwnd=0x1033c, Text = 安装程序, ClassName = INSTALLEX.
    Pid = 2696, Hwnd=0x10348, Text = 123456, ClassName = Edit.
    Pid = 2696, Hwnd=0x1034e, Text = 123456, ClassName = Edit.
    Pid = 2696, Hwnd=0xd03ca, Text = 是(&Y), ClassName = Button.
    Pid = 2696, Hwnd=0x40418, Text = 否(&N), ClassName = Button.
    Pid = 2696, Hwnd=0x1041c, Text = 是否退出安装?, ClassName = Static.
    Pid = 2696, Hwnd=0x503b2, Text = 询问, ClassName = #32770.
    行为描述:查找PE资源信息
    详情信息:(FindResourceA) hModule = 0x00400000, ResName: , ResType: FILE
    行为描述:可执行文件签名信息
    详情信息:C:\ProgramFiles\7z.exe(签名验证: 未通过)
    行为描述:隐藏指定窗口
    详情信息:[Window,Class] = [,selectDlg]
    [Window,Class] = [,progressDlg]
    [Window,Class] = [,finishDlg]
    [Window,Class] = [,Edit]
    [Window,Class] = [,readyDlg]
    行为描述:可执行文件MD5
    详情信息:C:\ProgramFiles\7z.exe ---> 8a6297c3daad74837d59442d422f8b8d
    行为描述:打开互斥体
    详情信息:ShimCacheMutex
    Activities
    活动名类型
    com.n0n3m4.gltools.InstallActivityandroid.intent.action.MAIN
    com.n0n3m4.gltools.InstallActivityandroid.intent.category.LAUNCHER
    危险函数
    函数名称信息
    java/net/URL;->openConnection连接URL
    chmod 更改文件权限
    getRuntime获取命令行环境
    java/lang/Runtime;->exec执行字符串命令
    权限列表
    许可名称信息
    android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
    android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
    android.permission.ACCESS_SUPERUSER
    android.permission.INTERNET连接网络(2G或3G)
    com.android.vending.CHECK_LICENSE
    文件列表
    文件名 校验码
    AndroidManifest.xml 0xe9e0a2e2
    assets/arm64/as 0xf29259b1
    assets/arm64/crtbegin_so.o 0x83f161d6
    assets/arm64/crtend_so.o 0x7f97979
    assets/arm64/egl_gltools.o 0xa5b65a16
    assets/arm64/gles1_gltools.o 0x4db1174e
    assets/arm64/gles2_gltools.o 0xdbeef615
    assets/arm64/glsloptimize.o 0x9ed9a61a
    assets/arm64/ld 0x1eec87a
    assets/arm64/libgcc.a 0xf4130bdd
    assets/arm64/readelf 0x72f6e188
    assets/arm64/stubgen 0x2eca2cfe
    assets/arm64/texutils.o 0xecc6052d
    assets/arm/as 0xef485f09
    assets/arm/busybox 0x11fe6ba4
    assets/arm/crtbegin_so.o 0xaaa49e22
    assets/arm/crtend_so.o 0x78b8a276
    assets/arm/egl_gltools.o 0x63b558e
    assets/arm/gles1_gltools.o 0xcc3cda56
    assets/arm/gles2_gltools.o 0x184a5943
    assets/arm/glsloptimize.o 0xcc3971e4
    assets/arm/ld 0xcd413c6d
    assets/arm/libgcc.a 0xce788752
    assets/arm/measure 0x1a8854f
    assets/arm/readelf 0x72363d17
    assets/arm/stubgen 0x87ffc30
    assets/arm/texutils.o 0x9965aff8
    assets/arm/update-binary 0x63fae17c
    assets/templates/1cpupresent 0xf4dbdf21
    assets/templates/1gbmeminfo 0xd9dbce24
    assets/templates/2cpupresent 0xaade6657
    assets/templates/2gbmeminfo 0xd3d39a4e
    assets/templates/3gbmeminfo 0x8ba09a65
    assets/templates/4cpupresent 0x44d0077b
    assets/templates/4gbmeminfo 0x3c7e597
    assets/templates/8cpupresent 0x43bdc362
    assets/templates/t2configgz 0xe18b71e0
    assets/templates/t2cpuinfo 0x86197975
    assets/templates/t3configgz 0xffc7a0ab
    assets/templates/t3cpuinfo 0x78d57cc9
    assets/templates/t4configgz 0x49014eba
    assets/templates/t4cpuinfo 0xbb229e64
    assets/x86/as 0xcab37dba
    assets/x86/busybox 0xa877d7a1
    assets/x86/crtbegin_so.o 0xb2c951b3
    assets/x86/crtend_so.o 0x5a8b697
    assets/x86/egl_gltools.o 0x2a5f7d8c
    assets/x86/gles1_gltools.o 0x30a18c8f
    assets/x86/gles2_gltools.o 0x7da7d203
    assets/x86/glsloptimize.o 0x3e0d0c81
    assets/x86/ld 0xa130b578
    assets/x86/libgcc.a 0x29af7706
    assets/x86/measure 0xd2b71742
    assets/x86/readelf 0xe573d9c7
    assets/x86/stubgen 0x98fdc1c0
    assets/x86/texutils.o 0xc24c6d3e
    assets/x86/update-binary 0x965122c3
    assets/x86_64/as 0x55b89550
    assets/x86_64/crtbegin_so.o 0x3889a41f
    assets/x86_64/crtend_so.o 0x86074a64
    assets/x86_64/egl_gltools.o 0x87c54d74
    assets/x86_64/gles1_gltools.o 0x7873c351
    assets/x86_64/gles2_gltools.o 0xe374f904
    assets/x86_64/glsloptimize.o 0x59e315ca
    assets/x86_64/ld 0x139e2881
    assets/x86_64/libgcc.a 0x9eac52cf
    assets/x86_64/readelf 0x8bc01739
    assets/x86_64/stubgen 0x4031da7f
    assets/x86_64/texutils.o 0xa8edf73a
    res/color/selector.xml 0xcdbb1e28
    res/drawable-hdpi-v4/ic_launcher.png 0x9f9f1970
    res/drawable-ldpi-v4/ic_launcher.png 0x6d4e8e4b
    res/drawable-mdpi-v4/ic_launcher.png 0xeffdb479
    res/drawable-tvdpi-v4/ic_launcher.png 0x4b0b5f5
    res/drawable-xhdpi-v4/ic_launcher.png 0xa12bea35
    res/drawable-xxhdpi-v4/ic_launcher.png 0x45159ce0
    res/layout/activity_howlearntoreadfordummies.xml 0x8c7e2225
    res/layout/activity_install.xml 0x9294a6be
    res/layout/activity_main.xml 0xa2469a5c
    res/layout/activity_wrongroot.xml 0xff6d9cd3
    res/layout/appelement_view.xml 0xb19eb777
    res/layout/plugelement_view.xml 0xaa64f602
    res/layout/prefelement_view.xml 0x73db3ee5
    res/menu/main.xml 0xd7fec4c
    res/xml-v11/pref_headers.xml 0x56812da0
    res/xml/pref_expert.xml 0xe64d0398
    res/xml/pref_fakename.xml 0x3884d99a
    res/xml/pref_fpscounter.xml 0xae6a3ca6
    res/xml/pref_general.xml 0xc7f4482
    res/xml/pref_headers.xml 0x3f8f254a
    res/xml/pref_textures.xml 0xa8ce74f3
    resources.arsc 0x9413f5ac
    classes.dex 0x5daf0ed2
    lib/arm64-v8a/libgltools.so 0x93760f3
    lib/armeabi/libgltools.so 0x8f9e81ac
    lib/armeabi-v7a/libgltools.so 0x1cdb95e1
    lib/x86/libgltools.so 0x7693ff0c
    lib/x86_64/libgltools.so 0xcb1f980
    META-INF/MANIFEST.MF 0x64da2a19
    META-INF/CERT.SF 0x5b71ba2
    META-INF/CERT.RSA 0xecf2357e
    运行截图
    VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号