0% found this document useful (0 votes)
81 views4 pages

DrWeb Crash

This document summarizes the configuration and status of the Dr.Web anti-virus software installed on an Android device. It lists details like the expired license key, installed version, last database update time, and number of virus records in the database. It also shows the paths of installed files and base directories, as well as log entries of the software starting up and then crashing due to a stack overflow error.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views4 pages

DrWeb Crash

This document summarizes the configuration and status of the Dr.Web anti-virus software installed on an Android device. It lists details like the expired license key, installed version, last database update time, and number of virus records in the database. It also shows the paths of installed files and base directories, as well as log entries of the software starting up and then crashing due to a stack overflow error.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 4

Dr.

Web anti-virus
License:Google Shareware
LicenseState:EXPIRED KEY
Activation Date:09/04/2022 22:14
Expiration Date:
Owner:'Doctor Web trial user: XXX'
UserNumber:149112518
Version: 12.8.1.19197
Device model: moto g(60)s
Firmware version: 11
Kernel version: Unavailable
Android OS build number: RRLS31.Q2X-70-39-5
Root: NO_ROOT
TestKeysBuild: no
TV: no
Language: pt
Last database update: 30/09/2022 19:02
Number of virus record in database: 285937
First virus database timestamp: 1518525683
Virus database compilation time: Tue Feb 13 10:41:23 2018 Wed Jul 17 11:49:26 2019
Tue Aug 6 08:37:13 2019 Tue Sep 3 03:26:46 2019 Tue Oct 1 03:28:25 2019 Tue Oct
22 03:28:30 2019 Tue Nov 12 03:29:59 2019 Wed Dec 11 09:15:42 2019 Wed Feb 26
17:55:13 2020 Tue Apr 21 03:29:58 2020 Tue Jun 9 03:29:00 2020 Tue Jul 21 03:26:48
2020 Tue Aug 4 03:27:19 2020 Tue Sep 8 03:27:32 2020 Tue Nov 17 03:29:45 2020 Tue
Jan 19 03:32:16 2021 Tue Mar 2 03:31:30 2021 Tue May 4 03:34:18 2021 Tue Jul 20
03:33:39 2021 Tue Aug 10 03:34:31 2021 Tue Sep 21 03:34:06 2021 Tue Oct 19 03:36:48
2021 Tue Dec 7 03:37:31 2021 Tue Jan 11 03:35:06 2022 Tue Jan 25 03:35:44 2022 Tue
Feb 8 03:34:21 2022 Tue Mar 1 03:35:37 2022 Tue Mar 22 03:36:05 2022 Tue May 3
03:36:59 2022 Fri Sep 30 17:30:25 2022 Tue Jun 28 03:36:30 2022 Tue Jul 19 03:35:09
2022
Virus bases:
m3addon00.vdb Tue Feb 13 10:41:23 2018 records: 177737 loaded
m3addon01.vdb Wed Jul 17 11:49:26 2019 records: 9274 loaded
m3addon02.vdb Tue Aug 6 08:37:13 2019 records: 3838 loaded
m3addon03.vdb Tue Sep 3 03:26:46 2019 records: 3032 loaded
m3addon04.vdb Tue Oct 1 03:28:25 2019 records: 2565 loaded
m3addon05.vdb Tue Oct 22 03:28:30 2019 records: 3424 loaded
m3addon06.vdb Tue Nov 12 03:29:59 2019 records: 3330 loaded
m3addon07.vdb Wed Dec 11 09:15:42 2019 records: 7455 loaded
m3addon08.vdb Wed Feb 26 17:55:13 2020 records: 7111 loaded
m3addon09.vdb Tue Apr 21 03:29:58 2020 records: 3031 loaded
m3addon10.vdb Tue Jun 9 03:29:00 2020 records: 2443 loaded
m3addon11.vdb Tue Jul 21 03:26:48 2020 records: 2237 loaded
m3addon12.vdb Tue Aug 4 03:27:19 2020 records: 2696 loaded
m3addon13.vdb Tue Sep 8 03:27:32 2020 records: 2761 loaded
m3addon14.vdb Tue Nov 17 03:29:45 2020 records: 2145 loaded
m3addon15.vdb Tue Jan 19 03:32:16 2021 records: 4276 loaded
m3addon16.vdb Tue Mar 2 03:31:30 2021 records: 2596 loaded
m3addon17.vdb Tue May 4 03:34:18 2021 records: 2847 loaded
m3addon18.vdb Tue Jul 20 03:33:39 2021 records: 2820 loaded
m3addon19.vdb Tue Aug 10 03:34:31 2021 records: 2562 loaded
m3addon20.vdb Tue Sep 21 03:34:06 2021 records: 3663 loaded
m3addon21.vdb Tue Oct 19 03:36:48 2021 records: 2858 loaded
m3addon22.vdb Tue Dec 7 03:37:31 2021 records: 3014 loaded
m3addon23.vdb Tue Jan 11 03:35:06 2022 records: 3793 loaded
m3addon24.vdb Tue Jan 25 03:35:44 2022 records: 3017 loaded
m3addon25.vdb Tue Feb 8 03:34:21 2022 records: 3065 loaded
m3addon26.vdb Tue Mar 1 03:35:37 2022 records: 3421 loaded
m3addon27.vdb Tue Mar 22 03:36:05 2022 records: 3124 loaded
m3addon28.vdb Tue May 3 03:36:59 2022 records: 4311 loaded
m3today.vdb Fri Sep 30 17:30:25 2022 records: 1983 loaded
m3addon29.vdb Tue Jun 28 03:36:30 2022 records: 2724 loaded
m3addon30.vdb Tue Jul 19 03:35:09 2022 records: 2784 loaded

InstallPath: /data/app/~~CxUjfoiKUWdZfdWMcyLCNA==/com.drweb.pro-
0OW1GGoNENjwv4GmoHgvMA==/base.apk
Setting: isOn = true; state = STARTED
Setting: AutomaticUpdate = true
Setting: SpIDer Guard check archives = false
Setting: SpIDer Guard SD-card mounting = false
Setting: Scanner check archives = false
Setting: StateSign = true
Setting: WidgetNotification = true
Setting: NoThreats = true
Monitor: LastRestart = 1664594493851
Monitor: RestartCount = 0
StandByBucket: active 10
Account Created = false
Antispam: isOn = false; state = STOPPED
URL Filter: isOn = false; state = STOPPED
Firewall = false; state = STOPPED
Antitheft: isOn = false
Parental Control = false; state = STOPPED
ES: isOn = false
Permissions: Accessibility false Admin false
--------- beginning of main
10-01 00:21:28.653 26808 26808 I InputTransport: Destroy ARC handle:
0xb400006fdfb15880
10-01 00:21:28.670 26808 26808 I InputTransport: Destroy ARC handle:
0xb400006fd1ec3fa0
10-01 00:21:28.687 26808 26808 I InputTransport: Destroy ARC handle:
0xb400006fd1c7e6c0
10-01 00:21:28.701 6968 6968 I DrWeb : DrWeb_645
10-01 00:21:28.737 26808 26808 I InputTransport: Destroy ARC handle:
0xb400006fd1c7e880
10-01 00:21:33.771 6968 6968 I DrWeb : DrWeb_647
10-01 00:21:33.806 26808 26808 I DrWeb : DrWeb_247
10-01 00:21:33.851 26808 26808 I DrWeb : DrWeb_249
10-01 00:21:33.868 26808 26808 I DrWeb : DrWeb_248
10-01 00:21:33.922 26808 26808 I DrWeb : DrWeb_87
10-01 00:21:33.926 26808 26808 I DrWeb : DrWeb_181
10-01 00:21:33.926 26808 26808 I DrWeb : DrWeb_99
/data/app/~~CxUjfoiKUWdZfdWMcyLCNA==/com.drweb.pro-0OW1GGoNENjwv4GmoHgvMA==/lib/
arm64
10-01 00:21:33.947 26808 31336 W com.drweb.pro: Attempt to remove invalid index 7
(bottom=7 top=7)
10-01 00:21:33.948 26808 26808 D AndroidRuntime: Shutting down VM
10-01 00:21:33.948 26808 31336 W com.drweb.pro: JNI WARNING: DeleteLocalRef(0x75)
failed to find entry
10-01 00:21:33.948 26808 31336 I DrWeb : DrWeb_42 /data/app/~~Re8MQJKs_40gAprd-
oKz_A==/com.google.android.apps.tachyon-8iTmpWyBnaKQdxUY4PC3kA==/base.apk!
--------- beginning of crash
10-01 00:21:33.948 26808 26808 E AndroidRuntime: FATAL EXCEPTION: main
10-01 00:21:33.948 26808 26808 E AndroidRuntime: Process: com.drweb.pro, PID: 26808
10-01 00:21:33.948 26808 26808 E AndroidRuntime: java.lang.StackOverflowError:
stack size 8192KB
10-01 00:21:33.948 26808 26808 E AndroidRuntime: at
android.os.BinderProxy.transactNative(Native Method)
10-01 00:21:33.948 26808 26808 E AndroidRuntime: at
android.os.BinderProxy.transact(BinderProxy.java:550)
10-01 00:21:33.948 26808 26808 E AndroidRuntime: at
android.app.IUiModeManager$Stub$Proxy.getCurrentModeType(IUiModeManager.java:437)
10-01 00:21:33.948 26808 26808 E AndroidRuntime: at
android.app.UiModeManager.getCurrentModeType(UiModeManager.java:395)
10-01 00:21:33.948 26808 26808 E AndroidRuntime: at àãåäà.åãààà(SourceFile:3)
10-01 00:21:33.948 26808 26808 E AndroidRuntime: at ããâäà.âàààà(SourceFile:3)
10-01 00:21:33.948 26808 26808 E AndroidRuntime: at ãåâàá.âàààà(SourceFile:1)
10-01 00:21:33.948 26808 26808 E AndroidRuntime: at ããâäà.ãàààà(SourceFile:1)
10-01 00:21:33.948 26808 26808 E AndroidRuntime: at ãàâàá.äàààà(SourceFile:6)
10-01 00:21:33.948 26808 26808 E AndroidRuntime: at
com.drweb.controlservice.ControlService.onCreate(SourceFile:13)
10-01 00:21:33.948 26808 26808 E AndroidRuntime: at
android.app.ActivityThread.handleCreateService(ActivityThread.java:4308)
10-01 00:21:33.948 26808 26808 E AndroidRuntime: at
android.app.ActivityThread.access$1700(ActivityThread.java:252)
10-01 00:21:33.948 26808 26808 E AndroidRuntime: at
android.app.ActivityThread$H.handleMessage(ActivityThread.java:2018)
10-01 00:21:33.948 26808 26808 E AndroidRuntime: at
android.os.Handler.dispatchMessage(Handler.java:106)
10-01 00:21:33.948 26808 26808 E AndroidRuntime: at
android.os.Looper.loop(Looper.java:250)
10-01 00:21:33.948 26808 26808 E AndroidRuntime: at
android.app.ActivityThread.main(ActivityThread.java:7886)
10-01 00:21:33.948 26808 26808 E AndroidRuntime: at
java.lang.reflect.Method.invoke(Native Method)
10-01 00:21:33.948 26808 26808 E AndroidRuntime: at
com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:592)
10-01 00:21:33.948 26808 26808 E AndroidRuntime: at
com.android.internal.os.ZygoteInit.main(ZygoteInit.java:958)
10-01 00:21:34.017 26808 26808 W System.err: java.lang.StackOverflowError: stack
size 8192KB
10-01 00:21:34.017 26808 26808 W System.err: at
android.os.BinderProxy.transactNative(Native Method)
10-01 00:21:34.018 26808 26808 W System.err: at
android.os.BinderProxy.transact(BinderProxy.java:550)
10-01 00:21:34.018 26808 26808 W System.err: at
android.app.IUiModeManager$Stub$Proxy.getCurrentModeType(IUiModeManager.java:437)
10-01 00:21:34.018 26808 26808 W System.err: at
android.app.UiModeManager.getCurrentModeType(UiModeManager.java:395)
10-01 00:21:34.019 26808 26808 W System.err: at àãåäà.åãààà(SourceFile:3)
10-01 00:21:34.019 26808 26808 W System.err: at ããâäà.âàààà(SourceFile:3)
10-01 00:21:34.019 26808 26808 W System.err: at ãåâàá.âàààà(SourceFile:1)
10-01 00:21:34.019 26808 26808 W System.err: at ããâäà.ãàààà(SourceFile:1)
10-01 00:21:34.019 26808 26808 W System.err: at ãàâàá.äàààà(SourceFile:6)
10-01 00:21:34.019 26808 26808 W System.err: at
com.drweb.controlservice.ControlService.onCreate(SourceFile:13)
10-01 00:21:34.019 26808 26808 W System.err: at
android.app.ActivityThread.handleCreateService(ActivityThread.java:4308)
10-01 00:21:34.019 26808 26808 W System.err: at
android.app.ActivityThread.access$1700(ActivityThread.java:252)
10-01 00:21:34.019 26808 26808 W System.err: at
android.app.ActivityThread$H.handleMessage(ActivityThread.java:2018)
10-01 00:21:34.019 26808 26808 W System.err: at
android.os.Handler.dispatchMessage(Handler.java:106)
10-01 00:21:34.019 26808 26808 W System.err: at
android.os.Looper.loop(Looper.java:250)
10-01 00:21:34.019 26808 26808 W System.err: at
android.app.ActivityThread.main(ActivityThread.java:7886)
10-01 00:21:34.019 26808 26808 W System.err: at
java.lang.reflect.Method.invoke(Native Method)
10-01 00:21:34.019 26808 26808 W System.err: at
com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:592)
10-01 00:21:34.019 26808 26808 W System.err: at
com.android.internal.os.ZygoteInit.main(ZygoteInit.java:958)
10-01 00:21:34.019 26808 26808 I DrWeb : stack size 8192KB
10-01 00:21:34.046 26808 26808 W com.drweb.pro: type=1400 audit(0.0:131519): avc:
denied { read } for name="version" dev="proc" ino=4026532224
scontext=u:r:untrusted_app:s0:c94,c257,c512,c768
tcontext=u:object_r:proc_version:s0 tclass=file permissive=0 app=com.drweb.pro
10-01 00:21:34.051 26808 26808 D DrWeb : IO Exception when getting kernel version
for Device Info screen
10-01 00:21:34.069 26808 26808 W com.drweb.pro: type=1400 audit(0.0:131520): avc:
denied { read } for name="cache" dev="dm-8" ino=16
scontext=u:r:untrusted_app:s0:c94,c257,c512,c768 tcontext=u:object_r:cache_file:s0
tclass=lnk_file permissive=0 app=com.drweb.pro
10-01 00:21:34.069 26808 26808 W com.drweb.pro: type=1400 audit(0.0:131521): avc:
denied { read } for name="cache" dev="dm-8" ino=16
scontext=u:r:untrusted_app:s0:c94,c257,c512,c768 tcontext=u:object_r:cache_file:s0
tclass=lnk_file permissive=0 app=com.drweb.pro
10-01 00:21:34.156 455 455 W logcat : type=1400 audit(0.0:131522): avc: denied
{ search } for name="mm" dev="sysfs" ino=7076
scontext=u:r:untrusted_app:s0:c94,c257,c512,c768 tcontext=u:object_r:sysfs_mm:s0
tclass=dir permissive=0 app=com.drweb.pro

You might also like