VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load



File information
File Name : 〖Mack大神破解〗:呼呼影音V1.0.1_超级会员破解版.apk (File not down)
File Size :12442715 byte
File Type :application/zip
MD5:766da91e6d7d604b175ae61e76bc8db9
SHA1:77ddee44e047a39a542d8508c4660afb0ed94070
  • 扫描结果
  • 权限
  • 文件行为分析
  • Scanner results
    Scanner results:3%Scanner(s) (1/32)found malware!        Behavior
    Time: 2018-02-16 00:22:42 (CST)
    VirSCANVirSCAN
    Scanner Engine Ver Sig Ver Sig Date Scan result Time
    antiy AVL SDK 2.0 1970-01-01 Found nothing 9
    asquared 9.0.0.4799 9.0.0.4799 2015-03-08 Found nothing 2
    avast 170303-1 4.7.4 2017-03-03 Found nothing 60
    avg 2109/14887 10.0.1405 2018-02-10 Found nothing 60
    baidu 2.0.1.0 4.1.3.52192 2.0.1.0 Found nothing 3
    baidusd 1.0 1.0 2017-03-22 Found nothing 1
    bitdefender 7.58879 7.90123 2015-01-16 Found nothing 60
    clamav 24314 0.97.5 2018-02-14 Found nothing 60
    drweb 5.0.2.3300 5.0.1.1 2018-02-02 Found nothing 60
    fortinet 5.4.247 2018-02-14 Found nothing 60
    fprot 4.6.2.117 6.5.1.5418 2016-02-05 Found nothing 60
    fsecure 2015-08-01-02 9.13 2015-08-01 Found nothing 60
    gdata 25.16030 25.16030 2018-02-15 Found nothing 16
    ikarus 4.00.06 V1.32.31.0 2018-02-14 Found nothing 60
    jiangmin 16.0.100 1.0.0.0 2017-12-22 Found nothing 2
    kaspersky 5.5.33 5.5.33 2014-04-01 Found nothing 60
    kingsoft 2.1 2.1 2018-02-14 Found nothing 7
    mcafee 8620 5400.1158 2017-08-12 Found nothing 60
    nod32 6898 3.0.21 2018-02-13 Found nothing 60
    panda 9.05.01 9.05.01 2018-02-14 Found nothing 16
    pcc 13.302.06 9.500-1005 2017-03-27 Found nothing 60
    qh360 1.0.1 1.0.1 1.0.1 Found nothing 3
    qqphone 1.0.0.0 1.0.0.0 2015-12-30 Found nothing 60
    quickheal 14.00 14.00 2017-11-18 Android.Styricka.GEN6254 9
    rising 3225 3225 2017-12-26 Found nothing 7
    sophos 5.32 3.65.2 2016-10-10 Found nothing 60
    symantec 20151230.005 1.3.0.24 2015-12-30 Found nothing 60
    tachyon 9.9.9 9.9.9 2013-12-27 Found nothing 4
    thehacker 6.8.0.5 6.8.0.5 2018-02-13 Found nothing 3
    tws 17.47.17308 1.0.2.2108 2018-02-14 Found nothing 15
    vba 3.12.29.5 beta 3.12.29.5 beta 2018-02-14 Found nothing 60
    virusbuster 15.0.985.0 5.5.2.13 2014-12-05 Found nothing 60
    Heuristic/Suspicious Exact
    NOTICE: Results are not 100% accurate and can be reported as a false positive by some scannerswhen and if malware is found. Please judge these results for yourself.
    Copy to clipboard
  • 权限列表
    许可名称信息
    com.android.launcher.permission.INSTALL_SHORTCUT创建快捷方式
    android.permission.GET_TASKS获取有关当前或最近运行的任务信息
    android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
    android.permission.ACCESS_WIFI_STATE读取wifi网络状态
    android.permission.ACCESS_COARSE_LOCATION获取粗略的位置(通过wifi、基站)
    android.permission.READ_PHONE_STATE读取电话状态
    android.permission.MOUNT_UNMOUNT_FILESYSTEMS挂载、反挂载外部文件系统
    android.permission.SYSTEM_ALERT_WINDOW显示系统窗口
    android.permission.INTERNET连接网络(2G或3G)
    android.permission.ACCESS_FINE_LOCATION获取精确的位置(通过GPS)
    com.android.launcher.permission.READ_SETTINGS读取快捷方式信息
    android.permission.WAKE_LOCK手机屏幕关闭后后台进程仍运行
    android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
    android.permission.CHANGE_CONFIGURATION修改当前设置(如:本地化)
    android.permission.VIBRATE允许设备震动
    android.permission.READ_EXTERNAL_STORAGE读外部存储器(如:SD卡)
    android.permission.WRITE_SETTINGS读写系统设置项
    android.permission.CHANGE_NETWORK_STATE变更网络状态
  • 文件信息
    安全评分 :
    基本信息
    MD5:766da91e6d7d604b175ae61e76bc8db9
    包名:com.fushishan
    最低运行环境:Android 2.2.x
    版权:E4A
    关键行为
    行为描述:跨进程写入数据
    详情信息:TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00040000, Size = 0x00000020 TargetPID = 0x00000a90
    TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00040020, Size = 0x00000034 TargetPID = 0x00000a90
    TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x7ffd5238, Size = 0x00000004 TargetPID = 0x00000a90
    TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00040000, Size = 0x00000020 TargetPID = 0x00000ce4
    TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00040020, Size = 0x00000034 TargetPID = 0x00000ce4
    TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x7ffdd238, Size = 0x00000004 TargetPID = 0x00000ce4
    行为描述:设置特殊文件夹属性
    详情信息:C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
    C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Cookies
    C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\History.IE5
    C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized
    C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\PrivacIE\Low
    C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IECompatCache\Low
    C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IETldCache\Low
    C:\Users\Administrator\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
    C:\Users\Administrator\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
    C:\Users\Administrator\AppData\Local\Microsoft\Feeds Cache
    C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IECompatCache
    C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012018022820180301
    行为描述:设置消息钩子
    详情信息:C:\Windows\system32\IEFRAME.dll
    进程行为
    行为描述:创建进程
    详情信息:[0x00000a90]ImagePath = C:\Program Files\Internet Explorer\iexplore.exe, CmdLine = "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2632 CREDAT:79873
    [0x00000ce4]ImagePath = C:\Program Files\Internet Explorer\iexplore.exe, CmdLine = "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2632 CREDAT:14342
    行为描述:跨进程写入数据
    详情信息:TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00040000, Size = 0x00000020 TargetPID = 0x00000a90
    TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00040020, Size = 0x00000034 TargetPID = 0x00000a90
    TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x7ffd5238, Size = 0x00000004 TargetPID = 0x00000a90
    TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00040000, Size = 0x00000020 TargetPID = 0x00000ce4
    TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x00040020, Size = 0x00000034 TargetPID = 0x00000ce4
    TargetProcess = C:\Program Files\Internet Explorer\iexplore.exe, WriteAddress = 0x7ffdd238, Size = 0x00000004 TargetPID = 0x00000ce4
    文件行为
    行为描述:创建文件
    详情信息:C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9B573145-1C6B-11E8-A49B-080027488980}.dat
    C:\Users\Administrator\AppData\Local\Temp\~DF2E114FAB92E1908D.TMP
    C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{9B573146-1C6B-11E8-A49B-080027488980}.dat
    C:\Users\Administrator\AppData\Local\Temp\~DF4D4FB90867D69591.TMP
    C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2KQWVTOD\qsml[1].aspx
    C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012018022820180301\index.dat
    C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2KQWVTOD\favicon[1].ico
    C:\Users\Administrator\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
    C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{9B573148-1C6B-11E8-A49B-080027488980}.dat
    C:\Users\Administrator\AppData\Local\Temp\~DF494CA549CF7BF852.TMP
    C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2KQWVTOD\yixun_com[1]
    C:\Users\Administrator\AppData\Local\Temp\~DFFDA8AA6702AE943F.TMP
    C:\Users\Administrator\AppData\Local\Temp\~DF421DBB5A0B2DB311.TMP
    C:\Users\Administrator\AppData\Local\Temp\~DF21B50073607C2576.TMP
    C:\Users\Administrator\AppData\Local\Temp\~DFF72CFBB5A58CCA8B.TMP
    行为描述:创建可执行文件
    详情信息:C:\Users\Administrator\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
    行为描述:查找文件
    详情信息:FileName = C:\Program Files\Common Files\Adobe
    FileName = C:\Program Files\Common Files\Adobe\Acrobat
    FileName = C:\Program Files\Common Files\Adobe\Acrobat\ActiveX
    FileName = C:\Program Files\Java
    FileName = C:\Program Files\Java\jre1.8.0_144\bin
    FileName = C:\Program Files\Java\jre1.8.0_144\bin\ssv.dll
    FileName = C:\Program Files\Java\jre1.8.0_144\bin\jp2ssv.dll
    FileName = C:\ProgramData\Microsoft\Network\Connections\Pbk\rasphone.pbk
    FileName = C:\ProgramData\Microsoft\Network\Connections\Pbk\*.pbk
    FileName = C:\Windows\system32\Ras\*.pbk
    FileName = C:\Users\Administrator\AppData\Roaming\Microsoft\Network\Connections\Pbk\rasphone.pbk
    FileName = C:\Users\Administrator\AppData\Roaming\Microsoft\Network\Connections\Pbk\*.pbk
    FileName = C:\Windows
    FileName = C:\Windows\WinSxS
    FileName = C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\MSVCR80.dll
    行为描述:删除文件
    详情信息:C:\Users\Administrator\AppData\Local\Temp\~DF2E114FAB92E1908D.TMP
    C:\Users\Administrator\AppData\Local\Temp\~DF4D4FB90867D69591.TMP
    C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2KQWVTOD\qsml[1].aspx
    C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012017110320171104\index.dat
    C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012017112320171124\index.dat
    C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2KQWVTOD\favicon[1].ico
    C:\Users\Administrator\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
    C:\Users\Administrator\AppData\Local\Temp\~DF494CA549CF7BF852.TMP
    C:\Users\Administrator\AppData\Local\Temp\~DFFDA8AA6702AE943F.TMP
    C:\Users\Administrator\AppData\Local\Temp\~DF421DBB5A0B2DB311.TMP
    C:\Users\Administrator\AppData\Local\Temp\~DF21B50073607C2576.TMP
    C:\Users\Administrator\AppData\Local\Temp\~DFF72CFBB5A58CCA8B.TMP
    C:\Users\Administrator\AppData\Local\Temp\~DF4DC4D1F76979B5A6.TMP
    C:\Users\Administrator\AppData\Local\Temp\~DFA3D81232B372585C.TMP
    行为描述:设置特殊文件夹属性
    详情信息:C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
    C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Cookies
    C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\History.IE5
    C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized
    C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\PrivacIE\Low
    C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IECompatCache\Low
    C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IETldCache\Low
    C:\Users\Administrator\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~
    C:\Users\Administrator\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~
    C:\Users\Administrator\AppData\Local\Microsoft\Feeds Cache
    C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IECompatCache
    C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012018022820180301
    行为描述:修改文件内容
    详情信息:C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9B573145-1C6B-11E8-A49B-080027488980}.dat ---> Offset = 512
    C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9B573145-1C6B-11E8-A49B-080027488980}.dat ---> Offset = 0
    C:\Users\Administrator\AppData\Local\Temp\~DF2E114FAB92E1908D.TMP ---> Offset = 16383
    C:\Users\Administrator\AppData\Local\Temp\~DF2E114FAB92E1908D.TMP ---> Offset = 12288
    C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9B573145-1C6B-11E8-A49B-080027488980}.dat ---> Offset = 3072
    C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9B573145-1C6B-11E8-A49B-080027488980}.dat ---> Offset = 1536
    C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{9B573146-1C6B-11E8-A49B-080027488980}.dat ---> Offset = 512
    C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{9B573146-1C6B-11E8-A49B-080027488980}.dat ---> Offset = 0
    C:\Users\Administrator\AppData\Local\Temp\~DF4D4FB90867D69591.TMP ---> Offset = 16383
    C:\Users\Administrator\AppData\Local\Temp\~DF4D4FB90867D69591.TMP ---> Offset = 12288
    C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{9B573146-1C6B-11E8-A49B-080027488980}.dat ---> Offset = 3072
    C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{9B573146-1C6B-11E8-A49B-080027488980}.dat ---> Offset = 1536
    C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012018022820180301\index.dat ---> Offset = 0
    C:\Users\Administrator\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico ---> Offset = 0
    C:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{9B573148-1C6B-11E8-A49B-080027488980}.dat ---> Offset = 512
    网络行为
    行为描述:下载文件
    详情信息:URLDownloadToFileW: http://ww****om/favicon.ico ---> C:\Users\Administrator\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
    C:\Users\Administrator\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
    行为描述:连接指定站点
    详情信息:InternetConnectA: ServerName = ap****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
    InternetConnectA: ServerName = ww****om, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
    InternetConnectA: ServerName = ur****om, PORT = 443, UserName = , Password = , hSession = 0x00cc0010, hConnect = 0x00cc0014, Flags = 0x00000200
    行为描述:打开HTTP连接
    详情信息:InternetOpenA: UserAgent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2), hSession = 0x00cc0004
    InternetOpenA: UserAgent: VCSoapClient, hSession = 0x00cc0010
    行为描述:建立到一个指定的套接字连接
    详情信息:URL: ap****om, IP: **.133.40.**:80, SOCKET = 0x00000510
    URL: ap****om, IP: **.133.40.**:80, SOCKET = 0x0000054c
    URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000524
    URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x00000440
    URL: ap****om, IP: **.133.40.**:80, SOCKET = 0x00000558
    URL: ww****om, IP: **.133.40.**:80, SOCKET = 0x000005a8
    URL: ur****om, IP: **.133.40.**:443, SOCKET = 0x00000604
    行为描述:读取网络文件
    详情信息:hFile = 0x00cc000c, BytesToRead =2048, BytesRead = 2048.
    hFile = 0x00cc0018, BytesToRead =4095, BytesRead = 4095.
    行为描述:发送HTTP包
    详情信息:GET /qsml.aspx?query=1&maxwidth=296&rowheight=21&sectionHeight=420&FORM=IE8SSC&market=zh-cn HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2) Accept-Encoding: gzip, deflate Host: ap****om Connection: Keep-Alive
    GET /qsml.aspx?query=123456&maxwidth=296&rowheight=21&sectionHeight=420&FORM=IE8SSC&market=zh-cn HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2) Accept-Encoding: gzip, deflate Host: ap****om Connection: Keep-Alive
    GET /favicon.ico HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2) Host: ww****om Connection: Keep-Alive
    GET / HTTP/1.1 Accept: */* Accept-Language: zh-cn User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2) Accept-Encoding: gzip, deflate Host: ww****om Connection: Keep-Alive
    行为描述:打开HTTP请求
    详情信息:HttpOpenRequestA: ap****om:80/qsml.aspx?query=1&maxwidth=296&rowheight=21&sectionheight=420&form=ie8ssc&market=zh-cn, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400210
    HttpOpenRequestA: ww****om:80/favicon.ico, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00600010
    HttpOpenRequestA: ap****om:80/qsml.aspx?query=123456&maxwidth=296&rowheight=21&sectionheight=420&form=ie8ssc&market=zh-cn, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400210
    HttpOpenRequestA: ww****om:80/, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00400200
    HttpOpenRequestA: ur****om:443/urs.asmx?msurs-client-key=pmil4soxbbe79iysyi5grq%3d%3d&msurs-patented-lock=m5alawhc5je%3d, hConnect = 0x00cc0014, hRequest = 0x00cc0018, Verb: POST, Referer: , Flags = 0x04880300
    行为描述:按名称获取主机地址
    详情信息:GetAddrInfoW: ww****om
    GetAddrInfoW: ap****om
    GetAddrInfoW: ur****om
    注册表行为
    行为描述:修改注册表
    详情信息:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
    \REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B573145-1C6B-11E8-A49B-080027488980}
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{92780B25-18CC-41C8-B9BE-3C9C571A8263}\iexplore\Count
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{92780B25-18CC-41C8-B9BE-3C9C571A8263}\iexplore\Time
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Count
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Time
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\LoadTime
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore\Count
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore\Time
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore\LoadTime
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore\Count
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore\Time
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore\LoadTime
    \REGISTRY\USER\S-*_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\LangID
    \REGISTRY\USER\S-*_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\C:\Program Files\Microsoft Office\OFFICE11\WINWORD.EXE
    行为描述:删除注册表键值
    详情信息:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass
    \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName
    \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyOverride
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
    \REGISTRY\USER\S-*\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0\Expiration
    行为描述:删除注册表键
    详情信息:\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012017110320171104\
    \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012017112320171124\
    其他行为
    行为描述:检测自身是否被调试
    详情信息:IsDebuggerPresent
    行为描述:创建互斥体
    详情信息:Local\_!MSFTHISTORY!_
    Local\c:!users!administrator!appdata!local!microsoft!windows!temporary internet files!content.ie5!
    Local\c:!users!administrator!appdata!roaming!microsoft!windows!cookies!
    Local\c:!users!administrator!appdata!local!microsoft!windows!history!history.ie5!
    Local\WininetStartupMutex
    Local\WininetConnectionMutex
    Local\WininetProxyRegistryMutex
    Local\!BrowserEmulation!SharedMemory!Mutex
    Local\ZoneAttributeCacheCounterMutex
    Local\ZonesCacheCounterMutex
    Local\ZonesLockedCacheCounterMutex
    RasPbFile
    ConnHashTable<2632>_HashTable_Mutex
    Local\ZonesCounterMutex
    Local\!IETld!Mutex
    行为描述:创建事件对象
    详情信息:EventName = Isolation Signal Registry Event (9B573143-1C6B-11E8-A49B-080027488980, 0)
    EventName = IE_EarlyTabStart_0xa5c
    EventName = Isolation Signal Registry Event (9B573144-1C6B-11E8-A49B-080027488980, 0)
    EventName = OleDfRoot49E89EDD6435C4A8
    EventName = OleDfRootA3E7F47107A48C5F
    EventName = Local\RSS Eventing Event Event 00000a48
    EventName = IEFrame.EventCheckDefaultBrowser
    EventName = IE_EarlyTabStart_0xcd4
    EventName = Isolation Signal Registry Event (9B573147-1C6B-11E8-A49B-080027488980, 0)
    EventName = OleDfRootAEA94705BE1CE5AD
    EventName = Local\ce4_18be
    EventName = Local\Feed Arbitration Lock Event [ Process : 0x00000a48 ]
    EventName = Local\Feed Arbitration Unlock Event [ Process : 0x00000a48 ]
    EventName = OleDfRootD176D3948477B839
    EventName = OleDfRootD65CB71856618DA5
    行为描述:查找指定窗口
    详情信息:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
    NtUserFindWindowEx: [Class,Window] = [MS_AutodialMonitor,]
    NtUserFindWindowEx: [Class,Window] = [MS_WebCheckMonitor,]
    NtUserFindWindowEx: [Class,Window] = [Static,]
    行为描述:窗口信息
    详情信息:Pid = 2632, Hwnd=0x101d4, Text = 导航栏, ClassName = WorkerW.
    Pid = 2632, Hwnd=0x101de, Text = 地址组合控制, ClassName = ToolbarWindow32.
    Pid = 2632, Hwnd=0x101e0, Text = 页面控制, ClassName = ToolbarWindow32.
    Pid = 2632, Hwnd=0x101f4, Text = 搜索组合控制, ClassName = ToolbarWindow32.
    Pid = 2632, Hwnd=0x101f6, Text = 搜索控制, ClassName = ToolbarWindow32.
    Pid = 2632, Hwnd=0x10214, Text = 命令栏, ClassName = ToolbarWindow32.
    Pid = 2632, Hwnd=0x1020c, Text = 收藏夹命令栏, ClassName = ToolbarWindow32.
    Pid = 2632, Hwnd=0x10200, Text = LinksBand, ClassName = LinksBandClass.
    Pid = 2632, Hwnd=0x10208, Text = 收藏夹栏, ClassName = ToolbarWindow32.
    Pid = 2632, Hwnd=0x10204, Text = 添加到收藏夹栏, ClassName = ToolbarWindow32.
    Pid = 2704, Hwnd=0x10232, Text = 菜单栏, ClassName = WorkerW.
    Pid = 2704, Hwnd=0x10244, Text = 缩放级别, ClassName = ToolbarWindow32.
    Pid = 2632, Hwnd=0x101b6, Text = Windows Internet Explorer, ClassName = IEFrame.
    Pid = 2632, Hwnd=0x101e2, Text = C:\Users\Administrator\AppData\Local\%temp%\%temp%\****.html, ClassName = Edit.
    Pid = 2632, Hwnd=0x101f0, Text = 123456, ClassName = Edit.
    行为描述:打开事件
    详情信息:\SECURITY\LSA_AUTHENTICATION_INITIALIZED
    Isolation Signal Registry Event (9B573143-1C6B-11E8-A49B-080027488980, 0)
    \KernelObjects\MaximumCommitCondition
    Global\SvcctrlStartEvent_A3752DX
    MSFT.VSA.COM.DISABLE.2632
    MSFT.VSA.IEC.STATUS.6c736db0
    Isolation Signal Registry Event (9B573144-1C6B-11E8-A49B-080027488980, 0)
    IE_EarlyTabStart_0xa5c
    Global\TabletHardwarePresent
    Local\MSCTF.CtfActivated.Default1
    Local\MSCTF.AsmCacheReady.Default1
    MSFT.VSA.COM.DISABLE.2704
    Local\RSS Eventing Event Event 00000a48
    Isolation Signal Registry Event (9B573147-1C6B-11E8-A49B-080027488980, 0)
    IE_EarlyTabStart_0xcd4
    行为描述:可执行文件签名信息
    详情信息:C:\Users\Administrator\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico(签名验证: 未通过)
    行为描述:隐藏指定窗口
    详情信息:[Window,Class] = [,BrowserFrameGripperClass]
    [Window,Class] = [缩放级别,ToolbarWindow32]
    [Window,Class] = [,msctls_progress32]
    [Window,Class] = [,AddressDisplay Control]
    [Window,Class] = [,CtrlNotifySink]
    [Window,Class] = [http://www.yixun.com/ - Windows Internet Explorer,IEFrame]
    [Window,Class] = [,DUIListViewHost]
    [Window,Class] = [,UniversalSearchBand]
    [Window,Class] = [,TravelBand]
    [Window,Class] = [,CommandBarClass]
    [Window,Class] = [,ReBarWindow32]
    [Window,Class] = [,TabBandClass]
    [Window,Class] = [,SysLink]
    [Window,Class] = [,Static]
    [Window,Class] = [文件大小未知,Static]
    行为描述:可执行文件MD5
    详情信息:C:\Users\Administrator\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico ---> d0966601ecd6239a9ce0241c9aa21571
    行为描述:打开互斥体
    详情信息:Local\_!MSFTHISTORY!_
    Local\c:!users!administrator!appdata!local!microsoft!windows!temporary internet files!content.ie5!
    Local\c:!users!administrator!appdata!roaming!microsoft!windows!cookies!
    Local\c:!users!administrator!appdata!local!microsoft!windows!history!history.ie5!
    Local\WininetStartupMutex
    Local\WininetConnectionMutex
    Local\WininetProxyRegistryMutex
    Local\!BrowserEmulation!SharedMemory!Mutex
    Local\!IETld!Mutex
    Local\MSCTF.Asm.MutexDefault1
    Local\RSS Eventing Connection Database Mutex 00000a48
    Local\c:!users!administrator!appdata!local!microsoft!feeds cache!
    DefaultTabtip-MainUI
    RasPbFile
    Local\!IECompat!Mutex
    行为描述:加载新释放的文件
    详情信息:Image: C:\Users\Administrator\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico.
    Activities
    活动名类型
    com.e4a.runtime.android.StartActivityandroid.intent.action.MAIN
    com.e4a.runtime.android.StartActivityandroid.intent.category.DEFAULT
    com.e4a.runtime.android.StartActivityandroid.intent.category.LAUNCHER
    com.e4a.runtime.android.mainActivityandroid.intent.action.MAIN
    com.e4a.runtime.android.mainActivityandroid.intent.category.DEFAULT
    广告信息
    名称信息
    com.baidu百度
    权限列表
    许可名称信息
    com.android.launcher.permission.INSTALL_SHORTCUT创建快捷方式
    android.permission.GET_TASKS获取有关当前或最近运行的任务信息
    android.permission.WRITE_EXTERNAL_STORAGE写外部存储器(如:SD卡)
    android.permission.ACCESS_WIFI_STATE读取wifi网络状态
    android.permission.ACCESS_COARSE_LOCATION获取粗略的位置(通过wifi、基站)
    android.permission.READ_PHONE_STATE读取电话状态
    android.permission.MOUNT_UNMOUNT_FILESYSTEMS挂载、反挂载外部文件系统
    android.permission.SYSTEM_ALERT_WINDOW显示系统窗口
    android.permission.INTERNET连接网络(2G或3G)
    android.permission.ACCESS_FINE_LOCATION获取精确的位置(通过GPS)
    com.android.launcher.permission.READ_SETTINGS读取快捷方式信息
    android.permission.WAKE_LOCK手机屏幕关闭后后台进程仍运行
    android.permission.ACCESS_NETWORK_STATE读取网络状态(2G或3G)
    android.permission.CHANGE_CONFIGURATION修改当前设置(如:本地化)
    android.permission.VIBRATE允许设备震动
    android.permission.READ_EXTERNAL_STORAGE读外部存储器(如:SD卡)
    android.permission.WRITE_SETTINGS读写系统设置项
    android.permission.CHANGE_NETWORK_STATE变更网络状态
    文件列表
    文件名 校验码
    META-INF/MANIFEST.MF 0xa89d5553
    META-INF/MYKEY.SF 0xc0930013
    META-INF/MYKEY.RSA 0x50edaeda
    assets/gg.png 0x3ebc1030
    assets/index.png 0xb2518498
    assets/lbsb.png 0x6c916e8e
    assets/new.gif 0x524d774a
    assets/tp.png 0x6541c484
    res/drawable/btn_back_white.png 0xfc4f2eb8
    res/drawable/btn_to_fullscreen.png 0x1da5cb57
    res/drawable/download.png 0x8ab1b695
    res/drawable/e4alistview_new_message.png 0x1cdc5409
    res/drawable/ic_launcher.png 0xa227fc8a
    res/drawable/icon.png 0xca52a5d3
    res/drawable/mn_palyer_black_bg.xml 0x6575b9ed
    res/drawable/mn_palyer_black_circle.xml 0x93386d1b
    res/drawable/mn_player_back.png 0xdccf25c5
    res/drawable/mn_player_backward.png 0x316a64c5
    res/drawable/mn_player_battery_01.png 0x2677a62c
    res/drawable/mn_player_battery_02.png 0x5df14288
    res/drawable/mn_player_battery_03.png 0x48cf761e
    res/drawable/mn_player_battery_04.png 0x1fc2c351
    res/drawable/mn_player_battery_05.png 0xd15d94ec
    res/drawable/mn_player_center_play.png 0xafa0d673
    res/drawable/mn_player_error.png 0x3721fb1f
    res/drawable/mn_player_forward.png 0xf00df4a2
    res/drawable/mn_player_ic_fullscreen.png 0x2a665f7d
    res/drawable/mn_player_ic_fullscreen_exit.png 0x2600ade1
    res/drawable/mn_player_landscape_screen_lock_close.png 0x3c4142ad
    res/drawable/mn_player_landscape_screen_lock_open.png 0x8ef7c381
    res/drawable/mn_player_light.png 0x1362679d
    res/drawable/mn_player_pause.png 0x13ad81a3
    res/drawable/mn_player_play.png 0xd9a50b3
    res/drawable/mn_player_play_center.png 0x1484089a
    res/drawable/mn_player_progress_diy.xml 0xbe4d8046
    res/drawable/mn_player_progress_no_net.png 0xaed2f7ef
    res/drawable/mn_player_thumb.xml 0xacd9b812
    res/drawable/mn_player_volume_close.png 0x1716a506
    res/drawable/mn_player_volume_open.png 0x24cbf57b
    res/drawable/sb.png 0x1c64af90
    res/drawable/shoucang.png 0xca862a4b
    res/drawable/zz.png 0xc1a4cea7
    res/layout/mn_gesture_light_layout.xml 0x24d83d2d
    res/layout/mn_gesture_progress_layout.xml 0xfdfcb2ca
    res/layout/mn_gesture_volume_layout.xml 0xd0d351c0
    res/layout/mn_player_progress_view.xml 0x5ce80421
    res/layout/mn_player_view.xml 0x46d5884c
    resources.arsc 0xe882071e
    lib/armeabi/libcyberplayer-core.so 0xe65c4104
    lib/armeabi/libcyberplayer.so 0x80bf7811
    lib/armeabi-v7a/libbdplayer.so 0x7852d2ab
    lib/armeabi-v7a/libbdsoundutils.so 0x1b2d6d06
    lib/armeabi-v7a/libhls-download.so 0xefd3c6b1
    lib/armeabi-v7a/libpcdn.so 0x18ef09c
    AndroidManifest.xml 0xc2eeb96e
    assets/icon/image_have_icon_x_id_file_png.png 0xf5b08b1f
    assets/icon/image_icon_constructor_encrypted.png 0xfe55d8c5
    assets/ijiami.ajm 0x2aa00eed
    assets/ijm_lib/armeabi/libexec.so 0xb8967c15
    assets/ijm_lib/armeabi/libexecmain.so 0xfb0cafea
    assets/ijm_lib/x86/libexec.so 0xa357d30c
    assets/ijm_lib/x86/libexecmain.so 0xae91a5d1
    assets/images/icon_titl_last_encrypted.png 0x1667d607
    classes.dex 0x20f691e9
    assets/signed.bin 0xd8807551
    assets/af.bin 0x223bf277
    运行截图
    VirSCAN

About VirSCAN | Privacy Policy | Contact us | link | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号