VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
File Name :tr.apk (File not down)
File Size :111652 byte
File Type :application/zip
MD5:2ee349f8087c8a69db101c4086460e14
SHA1:f679f9cf95c7abeea0fea1b1c1afa1076e2b2f79
  • 扫描结果
  • 权限
  • 文件行为分析
  • Scanner results
    Scanner results:13%Scanner(s) (5/38)found malware!
    Behavior analysis report:         Habo file analysis
    Time: 2014-06-27 22:23:40 (CST)
    VirSCANVirSCAN
    Scanner Engine Ver Sig Ver Sig Date Scan result Time
    ahnlab 9.9.9 9.9.9 2013-05-28 Found nothing 3
    antivir 1.9.2.0 1.9.159.0 7.11.157.32 Found nothing 13
    antiy 014621 AVL140512 2014-06-27 Found nothing 5
    arcavir 1.0 2011 2014-05-30 Found nothing 8
    asquared 9.0.0.4142 9.0.0.4142 2014-06-27 Found nothing 2
    avast 140626-1 4.7.4 2014-06-26 Android:TowelExploit-A [Trj] 26
    avg 2109/7210 10.0.1405 2014-06-20 Found nothing 1
    baidu 2.0.1.0 4.1.3.52192 2.0.1.0 Found nothing 4
    baidusd 1.0 1.0 2014-04-02 Found nothing 1
    bitdefender 7.55558 7.90123 2014-06-27 Found nothing 9
    clamav 19127 0.97.5 2014-06-26 Andr.Exploit.Ratc 1
    comodo 15023 5.1 2014-06-27 Found nothing 3
    ctch 4.6.5 5.3.14 2013-12-01 Found nothing 1
    drweb 5.0.2.3300 5.0.1.1 2014-06-20 Found nothing 29
    fortinet 22.389 5.1.153 2014-06-27 Found nothing 1
    fprot 4.6.2.117 6.5.1.5418 2014-06-26 Found nothing 1
    fsecure 2014-04-02-01 9.13 2014-04-02 Found nothing 5
    gdata 24.2881 24.2881 2014-06-27 Android:TowelExploit-A 9
    hauri 2.73 2.73 2014-06-13 Found nothing 1
    ikarus 1.06.01 V1.32.31.0 2014-06-27 Found nothing 14
    jiangmin 16.0.100 1.0.0.0 2014-06-26 Found nothing 14
    kaspersky 5.5.33 5.5.33 2014-04-01 Found nothing 20
    kingsoft 2.1 2.1 2013-09-22 Found nothing 3
    mcafee 7474 5400.1158 2014-06-19 Found nothing 11
    nod32 9809 3.0.21 2014-05-16 Android/Exploit.Towel.A trojan 1
    panda 9.05.01 9.05.01 2014-06-15 Found nothing 7
    pcc 10.886.07 9.500-1005 2014-06-26 Found nothing 1
    qh360 1.0.1 1.0.1 1.0.1 Found nothing 15
    quickheal 14.00 14.00 2014-06-14 Found nothing 2
    rising 25.17.00.04 25.17.00.04 2014-06-02 Found nothing 1
    sophos 5.02 3.51.0 2014-06-20 Andr/TowRoot-A 6
    sunbelt 3.9.2589.2 3.9.2589.2 2014-06-13 Found nothing 1
    symantec 1.3.0.24 Found nothing 56
    tachyon 9.9.9 9.9.9 2013-12-27 Found nothing 3
    thehacker 6.8.0.5 6.8.0.5 2014-06-12 Found nothing 1
    tws 17.47.17308 1.0.2.2108 2014-06-16 Found nothing 6
    vba 3.12.26.3 3.12.26.3 2014-06-26 Found nothing 3
    virusbuster 15.0.829.0 5.5.2.13 2014-06-26 Found nothing 13
    Heuristic/Suspicious Exact
    NOTICE: Results are not 100% accurate and can be reported as a false positive by some scannerswhen and if malware is found. Please judge these results for yourself.
  • 权限列表
    许可名称信息
    android.permission.INTERNET连接网络(2G或3G)
    android.permission.KILL_BACKGROUND_PROCESSES关闭后台进程
  • 文件信息
    安全评分 :84
    基本信息
    MD5:2ee349f8087c8a69db101c4086460e14
    包名:com.geohot.towelroot
    最低运行环境:Android 1.5
    版权:
    关键行为
    行为描述:跨进程写入数据
    详情信息:TargetProcess = sample.exe, WriteAddress = 0x00400000, Size = 1024
    TargetProcess = sample.exe, WriteAddress = 0x00401000, Size = 63488
    TargetProcess = sample.exe, WriteAddress = 0x00411000, Size = 13312
    TargetProcess = sample.exe, WriteAddress = 0x00415000, Size = 7680
    TargetProcess = sample.exe, WriteAddress = 0x0044c000, Size = 7168
    TargetProcess = sample.exe, WriteAddress = 0x7ffde008, Size = 4
    TargetProcess = System, WriteAddress = 0x00050000, Size = 784
    TargetProcess = smss.exe, WriteAddress = 0x00300000, Size = 784
    C:\WINDOWS\system32\smss.exe
    TargetProcess = smss.exe, WriteAddress = 0x00310000, Size = 319488
    TargetProcess = csrss.exe, WriteAddress = 0x03b90000, Size = 784
    C:\WINDOWS\system32\csrss.exe
    TargetProcess = csrss.exe, WriteAddress = 0x03ba0000, Size = 319488
    TargetProcess = winlogon.exe, WriteAddress = 0x00cc0000, Size = 784
    C:\WINDOWS\system32\winlogon.exe
    行为描述:隐藏指定窗口
    详情信息:[Window,Class] = [QQ2013,TXGuiFoundation]
    [Window,Class] = [OP_2269840561,CTXOPConntion_Class]
    [Window,Class] = [,BrowserFrameGripperClass]
    [Window,Class] = [Windows Internet Explorer,IEFrame]
    [Window,Class] = [缩放级别,ToolbarWindow32]
    [Window,Class] = [,msctls_progress32]
    行为描述:创建远程线程
    详情信息:C:\WINDOWS\system32\smss.exe
    C:\WINDOWS\system32\csrss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\Program Files\VMware\VMware Tools\vmacthlp.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\VMware\VMware Tools\VMUpgradeHelper.exe
    C:\WINDOWS\system32\alg.exe
    C:\WINDOWS\explorer.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Tencent\QQ\Bin\QQ.exe
    C:\Program Files\Tencent\QQ\Bin\TXPlatform.exe
    C:\%temp%\1413212988.118123.exe
    C:\WINDOWS\system32\taskmgr.exe
    行为描述:设置线程上下文
    详情信息:C:\%temp%\1413212989.298409.exe
    行为描述:设置特殊文件夹属性
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
    C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
    C:\Documents and Settings\Administrator\Local Settings\History
    C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
    C:\Documents and Settings\Administrator\Cookies
    C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
    C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
    C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache
    C:\Documents and Settings\Administrator\IECompatCache
    行为描述:按名称获取主机地址
    详情信息:wpad
    www.yixun.com
    行为描述:自删除
    详情信息:C:\%temp%\1413212997.996497.exe
    行为描述:修改注册表_启动项
    详情信息:\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Run\Pwmkmz
    进程行为
    行为描述:隐藏窗口创建进程
    详情信息:ImagePath = c:\program files\internet explorer\iexplore.exe, CmdLine = "c:\program files\internet explorer\iexplore.exe" http://www.yixun.com/
    行为描述:跨进程写入数据
    详情信息:TargetProcess = sample.exe, WriteAddress = 0x00400000, Size = 1024
    TargetProcess = sample.exe, WriteAddress = 0x00401000, Size = 63488
    TargetProcess = sample.exe, WriteAddress = 0x00411000, Size = 13312
    TargetProcess = sample.exe, WriteAddress = 0x00415000, Size = 7680
    TargetProcess = sample.exe, WriteAddress = 0x0044c000, Size = 7168
    TargetProcess = sample.exe, WriteAddress = 0x7ffde008, Size = 4
    TargetProcess = System, WriteAddress = 0x00050000, Size = 784
    TargetProcess = smss.exe, WriteAddress = 0x00300000, Size = 784
    C:\WINDOWS\system32\smss.exe
    TargetProcess = smss.exe, WriteAddress = 0x00310000, Size = 319488
    TargetProcess = csrss.exe, WriteAddress = 0x03b90000, Size = 784
    C:\WINDOWS\system32\csrss.exe
    TargetProcess = csrss.exe, WriteAddress = 0x03ba0000, Size = 319488
    TargetProcess = winlogon.exe, WriteAddress = 0x00cc0000, Size = 784
    C:\WINDOWS\system32\winlogon.exe
    行为描述:创建新文件进程
    详情信息:ImagePath = c:\%temp%\1413212986.561696.exe, CmdLine = c:\%temp%\1413212986.561696.exe
    行为描述:创建进程
    详情信息:ImagePath = C:\Program Files\Internet Explorer\IEXPLORE.EXE, CmdLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.yixun.com/
    ImagePath = C:\Program Files\Internet Explorer\IEXPLORE.EXE, CmdLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:79873
    ImagePath = C:\%temp%\1413213050.139165.exe, CmdLine = C:\%temp%\1413213050.139165.exe -d
    行为描述:创建远程线程
    详情信息:C:\WINDOWS\system32\smss.exe
    C:\WINDOWS\system32\csrss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\Program Files\VMware\VMware Tools\vmacthlp.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\VMware\VMware Tools\VMUpgradeHelper.exe
    C:\WINDOWS\system32\alg.exe
    C:\WINDOWS\explorer.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Tencent\QQ\Bin\QQ.exe
    C:\Program Files\Tencent\QQ\Bin\TXPlatform.exe
    C:\%temp%\1413212988.118123.exe
    C:\WINDOWS\system32\taskmgr.exe
    行为描述:设置线程上下文
    详情信息:C:\%temp%\1413212989.298409.exe
    行为描述:枚举进程
    详情信息:N/A
    文件行为
    行为描述:写权限映射文件
    详情信息:98683f26_0
    Local\UrlZonesSM_Administrator
    \WINDOWS\system32\zh-cn\ieframe.dll.mui
    Internet Explorer Immutable Application State (00000AB4-0000-0000-0000-000000000000)
    Local\SqmData_IESQM-2740_S-1-5-21-1482476501-1645522239-1417001333-500
    ie_lcie_main_ab4
    Isolation Process Registry (E5951499-52EA-11E4-B5D3-000C2938259F)
    Isolation Signal Registry (E5951499-52EA-11E4-B5D3-000C2938259F, 0)
    ie_lcie_LogonMedium
    Local\IEFrame!GetAsyncKeyStateSharedMem!2740
    ie_lcie_ConnHashTable<2740>
    AtlDebugAllocator_FileMappingNameStatic3_ab4
    DfRoot0000C217D
    CiceroSharedMemDefaultS-1-5-21-1482476501-1645522239-1417001333-500
    KERNEL32.DLL
    行为描述:设置特殊文件夹属性
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
    C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
    C:\Documents and Settings\Administrator\Local Settings\History
    C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
    C:\Documents and Settings\Administrator\Cookies
    C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
    C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
    C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache
    C:\Documents and Settings\Administrator\IECompatCache
    行为描述:创建可执行文件
    详情信息:C:\Documents and Settings\Administrator\Application Data\Pwmkmz.exe
    行为描述:修改文件内容
    详情信息:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\dnserrordiagoff[1]---> Offset = 0
    C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\ErrorPageTemplate[1]---> Offset = 0
    C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6P4O8QNJ\errorPageStrings[1]---> Offset = 0
    C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\6TLOMATB\httpErrorPagesScripts[1]---> Offset = 0
    C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\noConnect[1]---> Offset = 0
    C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\bullet[2]---> Offset = 0
    C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\background_gradient[2]---> Offset = 0
    C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\IUKHR8T2\down[1]---> Offset = 0
    C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\favcenter[2]---> Offset = 0
    C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\C1OS62RY\tools[1]---> Offset = 0
    行为描述:自删除
    详情信息:C:\%temp%\1413212997.996497.exe
    网络行为
    行为描述:联网打开网址
    详情信息:InternetOpenUrlA: http://api.wipmania.com/ hInternet = 0x00000768
    行为描述:下载文件
    详情信息:URLDownloadToFileW: http://www.live.com/favicon.ico ---> C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
    C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
    行为描述:读取网络文件
    详情信息:hFile = 0x00000768, BytesToRead =4088, BytesRead = 4088.
    行为描述:按名称获取主机地址
    详情信息:wpad
    www.yixun.com
    注册表行为
    行为描述:删除注册表键
    详情信息:\REGISTRY\MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW
    \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\{63800dac-e7ca-4df9-9a5c-20765055488d}
    \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000
    \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile
    \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}
    行为描述:删除注册表键值_IE连接设置
    详情信息:\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
    \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
    行为描述:删除注册表键值_删除启动项
    详情信息:\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Run\internat.exe
    行为描述:修改注册表
    详情信息:\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Prefetcher\TracesProcessed
    \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Prefetcher\TracesSuccessful
    \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\SessionInformation\ProgramCount
    \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\X\BaseClass
    \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Internet Explorer\SQM\PIDs\PID_2740
    \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
    \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Internet Explorer\Recovery\Active\{E595149C-52EA-11E4-B5D3-000C2938259F}
    \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\{63800dac-e7ca-4df9-9a5c-20765055488d}\Enable
    \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1EA4DBF0-3C3B-11CF-810C-00AA00389B71}\1.1\0\win32\
    \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Count
    \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Time
    \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTime
    \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTimeCount
    \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath
    \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0\DisplayName
    行为描述:删除注册表键值
    详情信息:\REGISTRY\MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW\DWFileTreeRoot
    \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0\Expiration
    \REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1\Expiration
    行为描述:修改注册表_启动项
    详情信息:\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Run\Pwmkmz
    其他行为
    行为描述:创建互斥体
    详情信息:98683f26-Mutex
    djQPssJO4SAQzkdw
    Local\ZonesCounterMutex
    Local\ZoneAttributeCacheCounterMutex
    Local\ZonesCacheCounterMutex
    Local\ZonesLockedCacheCounterMutex
    IESQM-2740_S-1-5-21-1482476501-1645522239-1417001333-500
    IExplore.Sqm.psenr
    Local\!BrowserEmulation!SharedMemory!Mutex
    RasPbFile
    ConnHashTable<2740>_HashTable_Mutex
    CTF.LBES.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
    CTF.Compart.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
    CTF.Asm.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
    CTF.Layouts.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
    行为描述:隐藏指定窗口
    详情信息:[Window,Class] = [QQ2013,TXGuiFoundation]
    [Window,Class] = [OP_2269840561,CTXOPConntion_Class]
    [Window,Class] = [,BrowserFrameGripperClass]
    [Window,Class] = [Windows Internet Explorer,IEFrame]
    [Window,Class] = [缩放级别,ToolbarWindow32]
    [Window,Class] = [,msctls_progress32]
    行为描述:查找指定窗口
    详情信息:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
    NtUserFindWindowEx: [Class,Window] = [Indicator,]
    NtUserFindWindowEx: [Class,Window] = [TXGuiFoundation,QQ2013]
    NtUserFindWindowEx: [Class,Window] = [CTXOPConntion_Class,OP_2269840561]
    NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
    NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
    NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
    NtUserFindWindowEx: [Class,Window] = [Static,]
    行为描述:获取系统权限
    详情信息:SE_DEBUG_PRIVILEGE
    SE_LOAD_DRIVER_PRIVILEGE
    SE_AUDIT_PRIVILEGE
    行为描述:枚举窗口
    详情信息:N/A
    行为描述:内联HOOK
    详情信息:C:\WINDOWS\system32\ntdll.dll--->NtEnumerateValueKey Offset = 0x0
    C:\WINDOWS\system32\ntdll.dll--->NtQueryDirectoryFile Offset = 0x0
    C:\WINDOWS\system32\kernel32.dll--->CopyFileA Offset = 0x0
    C:\WINDOWS\system32\kernel32.dll--->CopyFileW Offset = 0x0
    C:\WINDOWS\system32\kernel32.dll--->MoveFileA Offset = 0x0
    C:\WINDOWS\system32\kernel32.dll--->MoveFileW Offset = 0x0
    C:\WINDOWS\system32\kernel32.dll--->CreateFileA Offset = 0x0
    C:\WINDOWS\system32\kernel32.dll--->CreateFileW Offset = 0x0
    C:\WINDOWS\system32\WS2_32.dll--->send Offset = 0x0
    C:\WINDOWS\system32\WS2_32.dll--->GetAddrInfoW Offset = 0x0
    C:\WINDOWS\system32\ntdll.dll--->NtResumeThread Offset = 0x0
    C:\WINDOWS\system32\ntdll.dll--->LdrLoadDll Offset = 0x0
    c:\windows\system32\DNSAPI.dll--->DnsQuery_A Offset = 0x0
    c:\windows\system32\DNSAPI.dll--->DnsQuery_W Offset = 0x0
    c:\windows\system32\WS2_32.dll--->send Offset = 0x0
    异常崩溃
    行为描述:创建互斥体
    详情信息:98683f26-Mutex
    djQPssJO4SAQzkdw
    Local\ZonesCounterMutex
    Local\ZoneAttributeCacheCounterMutex
    Local\ZonesCacheCounterMutex
    Local\ZonesLockedCacheCounterMutex
    IESQM-2740_S-1-5-21-1482476501-1645522239-1417001333-500
    IExplore.Sqm.psenr
    Local\!BrowserEmulation!SharedMemory!Mutex
    RasPbFile
    ConnHashTable<2740>_HashTable_Mutex
    CTF.LBES.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
    CTF.Compart.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
    CTF.Asm.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
    CTF.Layouts.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
    行为描述:隐藏指定窗口
    详情信息:[Window,Class] = [QQ2013,TXGuiFoundation]
    [Window,Class] = [OP_2269840561,CTXOPConntion_Class]
    [Window,Class] = [,BrowserFrameGripperClass]
    [Window,Class] = [Windows Internet Explorer,IEFrame]
    [Window,Class] = [缩放级别,ToolbarWindow32]
    [Window,Class] = [,msctls_progress32]
    行为描述:查找指定窗口
    详情信息:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
    NtUserFindWindowEx: [Class,Window] = [Indicator,]
    NtUserFindWindowEx: [Class,Window] = [TXGuiFoundation,QQ2013]
    NtUserFindWindowEx: [Class,Window] = [CTXOPConntion_Class,OP_2269840561]
    NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
    NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
    NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
    NtUserFindWindowEx: [Class,Window] = [Static,]
    行为描述:获取系统权限
    详情信息:SE_DEBUG_PRIVILEGE
    SE_LOAD_DRIVER_PRIVILEGE
    SE_AUDIT_PRIVILEGE
    行为描述:枚举窗口
    详情信息:N/A
    行为描述:内联HOOK
    详情信息:C:\WINDOWS\system32\ntdll.dll--->NtEnumerateValueKey Offset = 0x0
    C:\WINDOWS\system32\ntdll.dll--->NtQueryDirectoryFile Offset = 0x0
    C:\WINDOWS\system32\kernel32.dll--->CopyFileA Offset = 0x0
    C:\WINDOWS\system32\kernel32.dll--->CopyFileW Offset = 0x0
    C:\WINDOWS\system32\kernel32.dll--->MoveFileA Offset = 0x0
    C:\WINDOWS\system32\kernel32.dll--->MoveFileW Offset = 0x0
    C:\WINDOWS\system32\kernel32.dll--->CreateFileA Offset = 0x0
    C:\WINDOWS\system32\kernel32.dll--->CreateFileW Offset = 0x0
    C:\WINDOWS\system32\WS2_32.dll--->send Offset = 0x0
    C:\WINDOWS\system32\WS2_32.dll--->GetAddrInfoW Offset = 0x0
    C:\WINDOWS\system32\ntdll.dll--->NtResumeThread Offset = 0x0
    C:\WINDOWS\system32\ntdll.dll--->LdrLoadDll Offset = 0x0
    c:\windows\system32\DNSAPI.dll--->DnsQuery_A Offset = 0x0
    c:\windows\system32\DNSAPI.dll--->DnsQuery_W Offset = 0x0
    c:\windows\system32\WS2_32.dll--->send Offset = 0x0
    动态列表行为
    行为描述:启动服务
    详情信息:com.android.musicfx.Compatibility$Service
    com.android.mms.transaction.SmsReceiverService
    行为描述:读取文件
    详情信息:path:/dev/urandom length:15
    path:/proc/783/cmdline length:105
    path:/proc/799/cmdline length:105
    path:/proc/811/cmdline length:105
    path:/proc/841/cmdline length:105
    path:/proc/852/cmdline length:105
    行为描述:类加载
    详情信息:path:/system/app/PicoTts.apk
    path:/system/app/MusicFX.apk
    path:/system/framework/am.jar
    path:/data/app/com.geohot.towelroot-1.apk
    行为描述:写入文件
    详情信息:path:/data/data/com.android.gallery3d/shared_prefs/com.android.gallery3d_preferences.xml length:105
    path:/data/data/com.android.musicfx/shared_prefs/musicfx.xml length:105
    path:/data/data/com.android.gallery3d/shared_prefs/com.android.gallery3d_preferences.xml length:105
    Activities
    活动名类型
    .TowelRootandroid.intent.action.MAIN
    .TowelRootandroid.intent.category.LAUNCHER
    危险函数
    函数名称信息
    HttpClient;->execute请求远程服务器
    权限列表
    许可名称信息
    android.permission.INTERNET连接网络(2G或3G)
    android.permission.KILL_BACKGROUND_PROCESSES关闭后台进程
    文件列表
    文件名 校验码
    META-INF/MANIFEST.MF 0x8674bc7f
    META-INF/GEOHOT.SF 0x368f123d
    META-INF/GEOHOT.RSA 0xa3a20a83
    res/layout/mainlayout.xml 0x8cd704c7
    AndroidManifest.xml 0x908b86aa
    resources.arsc 0x836c82db
    res/drawable-xxhdpi/icon.png 0x47ea7b84
    classes.dex 0xd457f55b
    lib/armeabi/libexploit.so 0xf4220bb
    运行截图
    VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号