VirSCAN VirSCAN

1, คุณสามารถอัพโหลดไฟล์ไดๆก็ได้ที่มีขนาดไม่ใหญ่กว่า 20 เมกกะไบต์
2, VirSCAN สามารถสแกนไฟล์ที่ถูกบีบอัดในรูปแบบของ ZIP และ RAR โดยจะต้องมีไฟล์ในนั้นไม่สูงกว่า 20 ไฟล์
3, VirSCAN สามารถสแกนไฟล์บีบอัดที่มีรหัสผ่านด้วยคำว่า 'infected' และ 'virus' ได้
4, ถ้าเบราว์เซอร์ของคุณไม่สามารถอัปโหลดไฟล์กรุณาดาวน์โหลด Virscan uploader สำหรับการอัปโหลด

ภาษา
การทำงานของเซิฟเวอร์
Server Load

VirSCAN
VirSCAN

1, คุณสามารถอัพโหลดไฟล์ไดๆก็ได้ที่มีขนาดไม่ใหญ่กว่า 20 เมกกะไบต์
2, VirSCAN สามารถสแกนไฟล์ที่ถูกบีบอัดในรูปแบบของ ZIP และ RAR โดยจะต้องมีไฟล์ในนั้นไม่สูงกว่า 20 ไฟล์
3, VirSCAN สามารถสแกนไฟล์บีบอัดที่มีรหัสผ่านด้วยคำว่า 'infected' และ 'virus' ได้

ข้อมูลไฟล์

ชื่อไฟล์ :7665.apk (ไฟล์ไม่ลง)
ขนาดของไฟล์ :637199 byte
ประเภทของไฟล์ : application/jar
MD5:9b24685bbcd3c563606233554ba0679a
SHA1:87b7a8f46493770589896da74a775c7008243343
ผลสรุปการสแกน
ผลสรุปการสแกน:50%โปรแกรมแอนตี้ไวรัส(16/32)พบมัลแวร์!
รายงานการวิเคราะห์พฤติกรรม:         การวิเคราะห์ไฟล์ Habo
เวลา: 2019-06-17 05:02:29 (CST)
สแกนเนอร์ เวอร์ชั่นเอ็นจิน เวอร์ชั่นของฐานข้อมูล ฐานข้อมูลวันที่ ผลการสแกน เวลา
antiy AVL SDK 3.0 AVL SDK 3.0 2019-06-16 Trojan/Android.FakeDoc 1
avast 18.4.3895.0 18.4.3895.0 2019-06-17 ไม่พบอะไร 46
avg 10.0.1405 10.0.1405 2019-06-17 ไม่พบอะไร 1
baidu 2.0.1.0 4.1.3.52192 2.0.1.0 ไม่พบอะไร 2
baidusd 1.0 1.0 2019-06-16 ไม่พบอะไร 1
bitdefender 7.141118 7.141118 2019-06-16 ไม่พบอะไร 1
clamav 25481 0.100.2 2019-06-15 Andr.Malware.Agent-1500063 2
drweb 11.0.10.1810231600 11.0.10.1810231600 2019-06-16 Android.Fakedoc.origin 10
emsisoft 9.0.0.4324 9.0.0.4324 2014-07-03 ไม่พบอะไร 1
fortinet 1.000, 69.279, 69.184, 69.208 5.4.247 2019-06-17 Android/Generic.Z.435BB8!tr 1
fprot 4.6.2.117 6.5.1.5418 2014-12-31 ไม่พบอะไร 1
fsecure 2015-08-01-02 9.13 2019-06-17 ไม่พบอะไร 56
gdata 25.22397 25.22397 2019-06-16 Android.Trojan.FakeDoc.C 15
ikarus 5.01.05 V1.32.39.0 2019-06-16 PUA.AndroidOS.BatteryDoctor 4
jiangmin 16.0.100 1.0.0.0 2019-06-16 Trojan/AndroidOS.boe 2
kaspersky 5.5.33 5.5.33 2019-06-16 ไม่พบอะไร 20
kingsoft 2.1 2.1 2013-09-22 Android.Troj.FakeDoc.ya.(kcloud) 2
mcafee 9256 5400.1158 2019-05-13 ไม่พบอะไร 13
nod32 9516 4.5.15 2019-06-13 a variant of Android/AdDisplay.Mobsqueeze.A potentially unwanted application 1
panda 9.05.01 9.05.01 2019-05-29 ไม่พบอะไร 4
pcc 13.302.06 9.500-1005 2019-06-16 Android.BE276D44 2
qh360 1.0.1 1.0.1 2019-06-16 Trojan.Android.Gen 3
qqphone 2.0.0.0 2.0.0.0 2019-06-16 a.expense.fakebattery.f 1
quickheal 14.00 14.00 2019-02-10 Android.FakeDoc.A 3
rising 5169 5169 2019-06-16 ไม่พบอะไร 3
sophos 4.62 3.16.1 2016-09-20 Andr/BatteryD-C 11
symantec 20151230.005 1.3.0.24 2015-12-30 ไม่พบอะไร 1
tachyon 9.9.9 9.9.9 2013-12-27 ไม่พบอะไร 3
thehacker 6.8.0.5 6.8.0.5 2017-03-30 ไม่พบอะไร 1
tws 17.47.17308 1.0.2.2108 2019-06-16 Android.M.nqku 5
vba 4.0.0 4.0.0 2019-06-14 Trojan.AndroidOS.FakeDoc.a 4
virusbuster 15.0.985.0 5.5.2.13 2014-12-05 ไม่พบอะไร 4
权限列表
许可名称 信息
android.permission.GET_TASKS 获取有关当前或最近运行的任务信息
android.permission.RESTART_PACKAGES 重启其他程序
android.permission.ACCESS_WIFI_STATE 读取wifi网络状态
android.permission.BLUETOOTH 连接蓝牙设备
android.permission.CHANGE_WIFI_STATE 改变WIFI连接状态
android.permission.BLUETOOTH_ADMIN 搜寻蓝牙设备
android.permission.READ_PHONE_STATE 读取电话状态
android.permission.WRITE_SETTINGS 读写系统设置项
android.permission.WRITE_EXTERNAL_STORAGE 写外部存储器(如:SD卡)
android.permission.INTERNET 连接网络(2G或3G)
android.permission.ACCESS_NETWORK_STATE 读取网络状态(2G或3G)
android.permission.RECEIVE_BOOT_COMPLETED 接收开机启动广播
android.permission.VIBRATE 允许设备震动
android.permission.READ_SMS 读取短信
android.permission.RECEIVE_SMS 监控接收短信
android.permission.WRITE_SMS 写短信
android.permission.SEND_SMS 发送短信
android.permission.DISABLE_KEYGUARD 禁用键盘锁
android.permission.WAKE_LOCK 手机屏幕关闭后后台进程仍运行
android.permission.ACCESS_COARSE_LOCATION 获取粗略的位置(通过wifi、基站)
android.permission.ACCESS_FINE_LOCATION 获取精确的位置(通过GPS)
文件信息
VirSCANVirSCAN
安全评分 :
基本信息
VirSCANVirSCAN
MD5:9b24685bbcd3c563606233554ba0679a
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
包名:com.extend.battery
最低运行环境:Android 2.0
版权:
关键行为
VirSCANVirSCAN
行为描述: 跨进程写入数据
详情信息: TargetProcess = C:\Windows\System32\rundll32.exe, WriteAddress = 0x00050000, Size = 0x000005dc TargetPID = 0x00000a58
TargetProcess = C:\Windows\System32\rundll32.exe, WriteAddress = 0x7ffd81e8, Size = 0x00000004 TargetPID = 0x00000a58
TargetProcess = C:\Windows\System32\rundll32.exe, WriteAddress = 0x00060000, Size = 0x00000020 TargetPID = 0x00000a58
TargetProcess = C:\Windows\System32\rundll32.exe, WriteAddress = 0x00060020, Size = 0x00000034 TargetPID = 0x00000a58
TargetProcess = C:\Windows\System32\rundll32.exe, WriteAddress = 0x7ffd8238, Size = 0x00000004 TargetPID = 0x00000a58
TargetProcess = C:\Windows\System32\rundll32.exe, WriteAddress = 0x00050000, Size = 0x000005dc TargetPID = 0x00000a00
TargetProcess = C:\Windows\System32\rundll32.exe, WriteAddress = 0x7ffd71e8, Size = 0x00000004 TargetPID = 0x00000a00
TargetProcess = C:\Windows\System32\rundll32.exe, WriteAddress = 0x000a0000, Size = 0x00000020 TargetPID = 0x00000a00
TargetProcess = C:\Windows\System32\rundll32.exe, WriteAddress = 0x000a0020, Size = 0x00000034 TargetPID = 0x00000a00
TargetProcess = C:\Windows\System32\rundll32.exe, WriteAddress = 0x7ffd7238, Size = 0x00000004 TargetPID = 0x00000a00
行为描述: 获取文件属性探测虚拟机
详情信息: GetFileAttributes: FileName = C:\Program Files\Oracle\VirtualBox\
行为描述: 直接获取CPU时钟
详情信息: EAX = 0x778a062c, EDX = 0x0000039b
EAX = 0x7a3d05a8, EDX = 0x0000039b
EAX = 0x7a3d05f4, EDX = 0x0000039b
EAX = 0xa176cd62, EDX = 0x0000039b
EAX = 0xa176cdae, EDX = 0x0000039b
EAX = 0xa176cdfa, EDX = 0x0000039b
EAX = 0xa176ce46, EDX = 0x0000039b
EAX = 0xa176ce92, EDX = 0x0000039b
EAX = 0xa176cede, EDX = 0x0000039b
EAX = 0xa176cf2a, EDX = 0x0000039b
行为描述: 获取TickCount值
详情信息: TickCount = 1111322, SleepMilliseconds = 10.
TickCount = 1111338, SleepMilliseconds = 10.
TickCount = 1111369, SleepMilliseconds = 10.
TickCount = 1111416, SleepMilliseconds = 10.
TickCount = 1111463, SleepMilliseconds = 10.
TickCount = 1111510, SleepMilliseconds = 10.
TickCount = 1111556, SleepMilliseconds = 10.
TickCount = 1111603, SleepMilliseconds = 10.
TickCount = 1111650, SleepMilliseconds = 10.
TickCount = 1111681, SleepMilliseconds = 10.
TickCount = 1111697, SleepMilliseconds = 10.
TickCount = 1111744, SleepMilliseconds = 10.
TickCount = 1111791, SleepMilliseconds = 10.
TickCount = 1111838, SleepMilliseconds = 10.
TickCount = 1111885, SleepMilliseconds = 10.
行为描述: 设置特殊文件夹属性
详情信息: C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Cookies
C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\History.IE5
C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\PrivacIE\Low
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IECompatCache\Low
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IETldCache\Low
C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low
C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\Low
C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Cookies\Low
C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\Low\History.IE5
行为描述: 直接调用系统关键API
详情信息: Index = 0x00000190, Name: NtYieldExecution, Instruction Address = 0x002C0EF9
Index = 0x00000062, Name: NtDelayExecution, Instruction Address = 0x002C0EF9
行为描述: 查找文件方式探测虚拟机
详情信息: FindFirstFileEx: FileName = C:\Program Files\Oracle\VirtualBox\
进程行为
VirSCANVirSCAN
行为描述: 跨进程写入数据
详情信息: TargetProcess = C:\Windows\System32\rundll32.exe, WriteAddress = 0x00050000, Size = 0x000005dc TargetPID = 0x00000a58
TargetProcess = C:\Windows\System32\rundll32.exe, WriteAddress = 0x7ffd81e8, Size = 0x00000004 TargetPID = 0x00000a58
TargetProcess = C:\Windows\System32\rundll32.exe, WriteAddress = 0x00060000, Size = 0x00000020 TargetPID = 0x00000a58
TargetProcess = C:\Windows\System32\rundll32.exe, WriteAddress = 0x00060020, Size = 0x00000034 TargetPID = 0x00000a58
TargetProcess = C:\Windows\System32\rundll32.exe, WriteAddress = 0x7ffd8238, Size = 0x00000004 TargetPID = 0x00000a58
TargetProcess = C:\Windows\System32\rundll32.exe, WriteAddress = 0x00050000, Size = 0x000005dc TargetPID = 0x00000a00
TargetProcess = C:\Windows\System32\rundll32.exe, WriteAddress = 0x7ffd71e8, Size = 0x00000004 TargetPID = 0x00000a00
TargetProcess = C:\Windows\System32\rundll32.exe, WriteAddress = 0x000a0000, Size = 0x00000020 TargetPID = 0x00000a00
TargetProcess = C:\Windows\System32\rundll32.exe, WriteAddress = 0x000a0020, Size = 0x00000034 TargetPID = 0x00000a00
TargetProcess = C:\Windows\System32\rundll32.exe, WriteAddress = 0x7ffd7238, Size = 0x00000004 TargetPID = 0x00000a00
行为描述: 获取文件属性探测虚拟机
详情信息: GetFileAttributes: FileName = C:\Program Files\Oracle\VirtualBox\
行为描述: 直接获取CPU时钟
详情信息: EAX = 0x778a062c, EDX = 0x0000039b
EAX = 0x7a3d05a8, EDX = 0x0000039b
EAX = 0x7a3d05f4, EDX = 0x0000039b
EAX = 0xa176cd62, EDX = 0x0000039b
EAX = 0xa176cdae, EDX = 0x0000039b
EAX = 0xa176cdfa, EDX = 0x0000039b
EAX = 0xa176ce46, EDX = 0x0000039b
EAX = 0xa176ce92, EDX = 0x0000039b
EAX = 0xa176cede, EDX = 0x0000039b
EAX = 0xa176cf2a, EDX = 0x0000039b
行为描述: 获取TickCount值
详情信息: TickCount = 1111322, SleepMilliseconds = 10.
TickCount = 1111338, SleepMilliseconds = 10.
TickCount = 1111369, SleepMilliseconds = 10.
TickCount = 1111416, SleepMilliseconds = 10.
TickCount = 1111463, SleepMilliseconds = 10.
TickCount = 1111510, SleepMilliseconds = 10.
TickCount = 1111556, SleepMilliseconds = 10.
TickCount = 1111603, SleepMilliseconds = 10.
TickCount = 1111650, SleepMilliseconds = 10.
TickCount = 1111681, SleepMilliseconds = 10.
TickCount = 1111697, SleepMilliseconds = 10.
TickCount = 1111744, SleepMilliseconds = 10.
TickCount = 1111791, SleepMilliseconds = 10.
TickCount = 1111838, SleepMilliseconds = 10.
TickCount = 1111885, SleepMilliseconds = 10.
行为描述: 设置特殊文件夹属性
详情信息: C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Cookies
C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\History.IE5
C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\PrivacIE\Low
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IECompatCache\Low
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IETldCache\Low
C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low
C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\Low
C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Cookies\Low
C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\Low\History.IE5
行为描述: 直接调用系统关键API
详情信息: Index = 0x00000190, Name: NtYieldExecution, Instruction Address = 0x002C0EF9
Index = 0x00000062, Name: NtDelayExecution, Instruction Address = 0x002C0EF9
行为描述: 查找文件方式探测虚拟机
详情信息: FindFirstFileEx: FileName = C:\Program Files\Oracle\VirtualBox\
文件行为
VirSCANVirSCAN
行为描述: 创建文件
详情信息: C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2KQWVTOD\gpl-3.0[1].txt
C:\Users\Administrator\AppData\Local\%temp%\License.txt
C:\Users\Administrator\AppData\Local\%temp%\Languages\English.ini
C:\Users\Administrator\AppData\Local\%temp%\Profiles\profile.ini
C:\Users\Administrator\AppData\Local\%temp%\Profiles\MyVillage\stats_buildings.ini
C:\Users\Administrator\AppData\Local\%temp%\Profiles\MyVillage\building.ini
C:\Users\Administrator\AppData\Local\%temp%\Profiles\MyVillage\config.ini
C:\Users\Administrator\AppData\Local\%temp%\Profiles\MyVillage\config.ini.bak
行为描述: 获取文件属性探测虚拟机
详情信息: GetFileAttributes: FileName = C:\Program Files\Oracle\VirtualBox\
行为描述: 创建可执行文件
详情信息: C:\Users\Administrator\AppData\Local\%temp%\License.txt
行为描述: 覆盖已有文件
详情信息: C:\Users\Administrator\AppData\Local\%temp%\Profiles\MyVillage\config.ini
行为描述: 查找文件
详情信息: FileName = C:\Users
FileName = C:\Users\Administrator\AppData
FileName = C:\Users\Administrator\AppData\Local
FileName = C:\Users\Administrator\AppData\Local\Temp
FileName = C:\Users\Administrator\AppData\Local\%temp%
FileName = C:\Users\Administrator\AppData\Local\%temp%\b70c.exe
FileName = C:\Users\Administrator\AppData\Local\%temp%\Profiles\profile.ini
FileName = C:\Users\Administrator\AppData\Local\%temp%\EnableMBRDebug.txt
FileName = C:\Users\Administrator\AppData\Local\%temp%\Profiles\<No Profiles>\Logs\
FileName = C:\Users\Administrator\AppData\Local\%temp%\Languages\.ini
FileName = C:\Users\Administrator\AppData\Local\%temp%\Languages\/Chinese_S.ini
FileName = C:\Users\Administrator\AppData\Local\%temp%\Profiles\<No Profiles>\config.ini
FileName = C:\Users\Administrator\AppData\Local\%temp%\Profiles\<No Profiles>\building.ini
FileName = C:\Users\Administrator\AppData\Local\%temp%\License.txt
FileName = C:\ProgramData\Microsoft\Network\Connections\Pbk\rasphone.pbk
行为描述: 删除文件
详情信息: C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2KQWVTOD\gpl-3.0[1].txt
C:\Users\Administrator\AppData\Local\%temp%\Profiles\MyVillage\config.ini.bak
行为描述: 复制文件
详情信息: C:\Users\Administrator\AppData\Local\%temp%\Profiles\MyVillage\config.ini ---> C:\Users\Administrator\AppData\Local\%temp%\Profiles\MyVillage\config.ini.bak
行为描述: 设置特殊文件夹属性
详情信息: C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Cookies
C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\History.IE5
C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\PrivacIE\Low
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IECompatCache\Low
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\IETldCache\Low
C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low
C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\Low
C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Cookies\Low
C:\Users\Administrator\AppData\Local\Microsoft\Windows\History\Low\History.IE5
行为描述: 修改文件内容
详情信息: C:\Users\Administrator\AppData\Local\%temp%\License.txt ---> Offset = 0
C:\Users\Administrator\AppData\Local\%temp%\License.txt ---> Offset = 4096
C:\Users\Administrator\AppData\Local\%temp%\License.txt ---> Offset = 8192
C:\Users\Administrator\AppData\Local\%temp%\License.txt ---> Offset = 12288
C:\Users\Administrator\AppData\Local\%temp%\License.txt ---> Offset = 16384
C:\Users\Administrator\AppData\Local\%temp%\Languages\English.ini ---> Offset = 0
C:\Users\Administrator\AppData\Local\%temp%\Languages\English.ini ---> Offset = 34
C:\Users\Administrator\AppData\Local\%temp%\Languages\English.ini ---> Offset = 72
C:\Users\Administrator\AppData\Local\%temp%\Languages\English.ini ---> Offset = 369
C:\Users\Administrator\AppData\Local\%temp%\Languages\English.ini ---> Offset = 407
C:\Users\Administrator\AppData\Local\%temp%\Languages\English.ini ---> Offset = 1012
C:\Users\Administrator\AppData\Local\%temp%\Languages\English.ini ---> Offset = 1062
C:\Users\Administrator\AppData\Local\%temp%\Languages\English.ini ---> Offset = 1331
C:\Users\Administrator\AppData\Local\%temp%\Languages\English.ini ---> Offset = 1351
C:\Users\Administrator\AppData\Local\%temp%\Languages\English.ini ---> Offset = 1391
网络行为
VirSCANVirSCAN
行为描述: 下载文件
详情信息: C:\Users\Administrator\AppData\Local\%temp%\License.txt
行为描述: 连接指定站点
详情信息: InternetConnectA: ServerName = ww****rg, PORT = 80, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
InternetConnectA: ServerName = ap****om, PORT = 443, UserName = , Password = , hSession = 0x00cc0004, hConnect = 0x00cc0008, Flags = 0x00000000
行为描述: 打开HTTP连接
详情信息: InternetOpenA: UserAgent: AutoIt, hSession = 0x00cc0004
行为描述: 建立到一个指定的套接字连接
详情信息: URL: ww****rg, IP: **.133.40.**:80, SOCKET = 0x00000340
URL: ap****om, IP: **.133.40.**:443, SOCKET = 0x000003a8
行为描述: 读取网络文件
详情信息: hFile = 0x00cc000c, BytesToRead =1024, BytesRead = 1024.
行为描述: 发送HTTP包
详情信息: GET /licenses/gpl-3.0.txt HTTP/1.1 User-Agent: AutoIt Host: ww****rg
行为描述: 打开HTTP请求
详情信息: HttpOpenRequestA: ww****rg:80/licenses/gpl-3.0.txt, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00000000
HttpOpenRequestA: ap****om:443/repos/mybotrun/mybot/releases/latest, hConnect = 0x00cc0008, hRequest = 0x00cc000c, Verb: GET, Referer: , Flags = 0x00800000
行为描述: 按名称获取主机地址
详情信息: GetAddrInfoW: ww****rg
GetAddrInfoW: ap****om
注册表行为
VirSCANVirSCAN
行为描述: 修改注册表
详情信息: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\GlobalUserOffline
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASAPI32\EnableFileTracing
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASAPI32\EnableConsoleTracing
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASAPI32\FileTracingMask
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASAPI32\ConsoleTracingMask
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASAPI32\MaxFileSize
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASAPI32\FileDirectory
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASMANCS\EnableFileTracing
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASMANCS\EnableConsoleTracing
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASMANCS\FileTracingMask
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASMANCS\ConsoleTracingMask
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASMANCS\MaxFileSize
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Tracing\b70c_RASMANCS\FileDirectory
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
行为描述: 删除注册表键值
详情信息: \REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyOverride
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass
\REGISTRY\USER\S-*\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName
其他行为
VirSCANVirSCAN
行为描述: 直接调用系统关键API
详情信息: Index = 0x00000190, Name: NtYieldExecution, Instruction Address = 0x002C0EF9
Index = 0x00000062, Name: NtDelayExecution, Instruction Address = 0x002C0EF9
行为描述: 检测自身是否被调试
详情信息: IsDebuggerPresent
行为描述: 创建互斥体
详情信息: MyBot.run/Global/Launching.1
MyBot.run/ManageFarm/1.1
RasPbFile
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
Local\!IETld!Mutex
Local\_!MSFTHISTORY!_LOW!_
Local\c:!users!administrator!appdata!local!microsoft!windows!temporary internet files!low!content.ie5!
Local\c:!users!administrator!appdata!roaming!microsoft!windows!cookies!low!
Local\c:!users!administrator!appdata!local!microsoft!windows!history!low!history.ie5!
My Bot v7.7.5 (nox)
MyBot.run-Profile-<No Profiles>
MyBot.run
行为描述: 隐藏指定窗口
详情信息: [Window,Class] = [AutoIt v3,AutoIt v3]
[Window,Class] = [►,Static]
[Window,Class] = [█,Static]
[Window,Class] = [,Edit]
[Window,Class] = [Stop Bot,Button]
[Window,Class] = [Pause,Button]
[Window,Class] = [Resume,Button]
[Window,Class] = [DB Attack!,Button]
[Window,Class] = [LB Attack!,Button]
[Window,Class] = [TH Snipe!,Button]
[Window,Class] = [,Static]
[Window,Class] = [00:00:00,Static]
[Window,Class] = [0,Static]
[Window,Class] = [,ComboLBox]
[Window,Class] = [Halt Attack,Button]
行为描述: 窗口信息
详情信息: Pid = 4064, Hwnd=0x100284, Text = Please extract all files and folders and start this program again! , ClassName = Static.
Pid = 4064, Hwnd=0x700ce, Text = Ok, ClassName = Button.
Pid = 4064, Hwnd=0xf02a6, Text = Hey Chief, we are missing some files!, ClassName = AutoIt v3 GUI.
Pid = 4064, Hwnd=0x180162, Text = My Bot Title Buttons, ClassName = AutoIt v3 GUI.
Pid = 4064, Hwnd=0x8020c, Text = ◄, ClassName = Static.
Pid = 4064, Hwnd=0xf028c, Text = ►, ClassName = Static.
Pid = 4064, Hwnd=0xa0290, Text = ▄, ClassName = Static.
Pid = 4064, Hwnd=0x16017a, Text = █, ClassName = Static.
Pid = 4064, Hwnd=0xb021c, Text = ̶, ClassName = Static.
Pid = 4064, Hwnd=0x90216, Text = ×, ClassName = Static.
Pid = 4064, Hwnd=0x1001ee, Text = My Bot Controls, ClassName = AutoIt v3 GUI.
Pid = 4064, Hwnd=0xa02ca, Text = My Bot v7.7.5 (nox), ClassName = Static.
Pid = 4064, Hwnd=0x702d4, Text = [5:42:42] ====================== BOT LOG ====================== [5:42:42] Detected System Locale: Chinese_S [5:42:42] Language , ClassName = RICHEDIT50W.
Pid = 4064, Hwnd=0xb026a, Text = ============================= ATTACK LOG ============================== | ------- LOOT ------ --, ClassName = RICHEDIT50W.
Pid = 4064, Hwnd=0x402a2, Text = Log Style:, ClassName = Static.
行为描述: 打开互斥体
详情信息: Local\_!MSFTHISTORY!_
Local\c:!users!administrator!appdata!local!microsoft!windows!temporary internet files!content.ie5!
Local\c:!users!administrator!appdata!roaming!microsoft!windows!cookies!
Local\c:!users!administrator!appdata!local!microsoft!windows!history!history.ie5!
Local\WininetStartupMutex
Local\WininetConnectionMutex
Local\WininetProxyRegistryMutex
RasPbFile
Local\!IETld!Mutex
Local\_!MSFTHISTORY!_LOW!_
Local\c:!users!administrator!appdata!local!microsoft!windows!temporary internet files!low!content.ie5!
Local\c:!users!administrator!appdata!roaming!microsoft!windows!cookies!low!
Local\c:!users!administrator!appdata!local!microsoft!windows!history!low!history.ie5!
Local\MSCTF.Asm.MutexDefault1
行为描述: 查找指定窗口
详情信息: NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
行为描述: 打开事件
详情信息: HookSwitchHookEnabledEvent
\KernelObjects\MaximumCommitCondition
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Global\SvcctrlStartEvent_A3752DX
Local\MSCTF.CtfActivated.Default1
Local\MSCTF.AsmCacheReady.Default1
行为描述: 获取TickCount值
详情信息: TickCount = 1111322, SleepMilliseconds = 10.
TickCount = 1111338, SleepMilliseconds = 10.
TickCount = 1111369, SleepMilliseconds = 10.
TickCount = 1111416, SleepMilliseconds = 10.
TickCount = 1111463, SleepMilliseconds = 10.
TickCount = 1111510, SleepMilliseconds = 10.
TickCount = 1111556, SleepMilliseconds = 10.
TickCount = 1111603, SleepMilliseconds = 10.
TickCount = 1111650, SleepMilliseconds = 10.
TickCount = 1111681, SleepMilliseconds = 10.
TickCount = 1111697, SleepMilliseconds = 10.
TickCount = 1111744, SleepMilliseconds = 10.
TickCount = 1111791, SleepMilliseconds = 10.
TickCount = 1111838, SleepMilliseconds = 10.
TickCount = 1111885, SleepMilliseconds = 10.
行为描述: 获取光标位置
详情信息: CursorPos = (388,18506), SleepMilliseconds = 10.
CursorPos = (6681,26539), SleepMilliseconds = 10.
CursorPos = (19516,15763), SleepMilliseconds = 10.
CursorPos = (11825,29397), SleepMilliseconds = 10.
CursorPos = (27309,24503), SleepMilliseconds = 10.
CursorPos = (6052,28184), SleepMilliseconds = 250.
CursorPos = (23628,16866), SleepMilliseconds = 250.
CursorPos = (10308,530), SleepMilliseconds = 250.
CursorPos = (3342,11981), SleepMilliseconds = 250.
CursorPos = (5174,5475), SleepMilliseconds = 250.
CursorPos = (32738,14643), SleepMilliseconds = 250.
CursorPos = (4249,192), SleepMilliseconds = 250.
CursorPos = (639,12421), SleepMilliseconds = 250.
CursorPos = (17768,18755), SleepMilliseconds = 250.
CursorPos = (20065,19934), SleepMilliseconds = 250.
行为描述: 枚举窗口
详情信息: N/A
行为描述: 可执行文件签名信息
详情信息: C:\Users\Administrator\AppData\Local\%temp%\License.txt(签名验证: 未通过)
行为描述: 调用Sleep函数
详情信息: [1]: MilliSeconds = 10.
[2]: MilliSeconds = 10.
[3]: MilliSeconds = 10.
[4]: MilliSeconds = 10.
[5]: MilliSeconds = 10.
[6]: MilliSeconds = 10.
[7]: MilliSeconds = 10.
[8]: MilliSeconds = 10.
[9]: MilliSeconds = 10.
[10]: MilliSeconds = 10.
行为描述: 可执行文件MD5
详情信息: C:\Users\Administrator\AppData\Local\%temp%\License.txt ---> d0966601ecd6239a9ce0241c9aa21571
行为描述: 直接获取CPU时钟
详情信息: EAX = 0x778a062c, EDX = 0x0000039b
EAX = 0x7a3d05a8, EDX = 0x0000039b
EAX = 0x7a3d05f4, EDX = 0x0000039b
EAX = 0xa176cd62, EDX = 0x0000039b
EAX = 0xa176cdae, EDX = 0x0000039b
EAX = 0xa176cdfa, EDX = 0x0000039b
EAX = 0xa176ce46, EDX = 0x0000039b
EAX = 0xa176ce92, EDX = 0x0000039b
EAX = 0xa176cede, EDX = 0x0000039b
EAX = 0xa176cf2a, EDX = 0x0000039b
行为描述: 查找文件方式探测虚拟机
详情信息: FindFirstFileEx: FileName = C:\Program Files\Oracle\VirtualBox\
Activities
VirSCANVirSCAN
活动名 类型
.Splash android.intent.action.MAIN
.Splash android.intent.category.LAUNCHER
危险函数
VirSCANVirSCAN
函数名称 信息
HttpClient;->execute 请求远程服务器
DefaultHttpClient;->execute 发送HTTP请求
android/app/NotificationManager;->notify 信息通知栏
getRuntime 获取命令行环境
java/lang/Runtime;->exec 执行字符串命令
ActivityManager;->restartPackage 中断进程,可用于关闭杀软
WifiManager;->setWifiEnabled 变更WIFI状态
TelephonyManager;->getDeviceId 搜集用户手机IMEI码、电话号码、系统版本号等信息
ContentResolver;->query 读取联系人、短信等数据库
TelephonyManager;->getLine1Number 获取手机号
LocationManager;->getLastKnownLocation 获取地址位置
java/net/URL;->openConnection 连接URL
java/net/HttpURLConnection;->connect 连接URL
SmsReceiver;->abortBroadcast 拦截短信接收
SmsManager;->sendTextMessage 发送普通短信
ContentResolver;->delete 删除短信、联系人
启动方式
VirSCANVirSCAN
名称 信息
com.extend.battery.NotificationReceiver
com.extend.battery.BootReceiver 开机启动服务
com.zanalytics.sms.SmsReceiver 监控短信(收到短信)启动服务
com.zanalytics.sms.SmsReceiver
com.tapjoy.TapjoyReferralTracker
权限列表
VirSCANVirSCAN
许可名称 信息
android.permission.GET_TASKS 获取有关当前或最近运行的任务信息
android.permission.RESTART_PACKAGES 重启其他程序
android.permission.ACCESS_WIFI_STATE 读取wifi网络状态
android.permission.BLUETOOTH 连接蓝牙设备
android.permission.CHANGE_WIFI_STATE 改变WIFI连接状态
android.permission.BLUETOOTH_ADMIN 搜寻蓝牙设备
android.permission.READ_PHONE_STATE 读取电话状态
android.permission.WRITE_SETTINGS 读写系统设置项
android.permission.WRITE_EXTERNAL_STORAGE 写外部存储器(如:SD卡)
android.permission.INTERNET 连接网络(2G或3G)
android.permission.ACCESS_NETWORK_STATE 读取网络状态(2G或3G)
android.permission.RECEIVE_BOOT_COMPLETED 接收开机启动广播
android.permission.VIBRATE 允许设备震动
android.permission.READ_SMS 读取短信
android.permission.RECEIVE_SMS 监控接收短信
android.permission.WRITE_SMS 写短信
android.permission.SEND_SMS 发送短信
android.permission.DISABLE_KEYGUARD 禁用键盘锁
android.permission.WAKE_LOCK 手机屏幕关闭后后台进程仍运行
android.permission.ACCESS_COARSE_LOCATION 获取粗略的位置(通过wifi、基站)
android.permission.ACCESS_FINE_LOCATION 获取精确的位置(通过GPS)
服务列表
VirSCANVirSCAN
名称
com.extend.battery.BatteryService
com.zanalytics.sms.SmsReceiverService
文件列表
VirSCANVirSCAN
文件名 校验码
assets/MobileAppTracker.jar 0xb6265373
assets/appkeys.json 0xc6f67267
assets/bugsense-trace.jar 0xd0d22ad4
assets/cornerblue.json 0xc6f6b013
assets/upgrade.json 0x66ec1878
assets/version.json 0xf1b0e625
res/anim/alpha.xml 0x5fabe2a
res/anim/drop_down.xml 0x7fd0eaf6
res/anim/pull_up.xml 0x944d1df7
res/anim/scale.xml 0x5e88d162
res/drawable/battery.xml 0x232367eb
res/drawable/booster.xml 0xc6aba23a
res/drawable/caution.xml 0x75f08060
res/drawable/checkbox.xml 0xb7a06f19
res/drawable/cost.xml 0x62d5e7df
res/drawable/info.png 0xae488bf
res/drawable/installer.xml 0xa6a2047
res/drawable/network.xml 0x5b8c8eb
res/drawable/privacy.xml 0xe036ffee
res/drawable/rounded_bg.xml 0x30403194
res/drawable/rounded_bg_gray.xml 0x66ccb0e1
res/drawable/rounded_bg_green.xml 0x9dd06057
res/drawable/rounded_bg_yellow.xml 0xd5be198f
res/drawable/rounded_edges.xml 0x3995bd7f
res/drawable/security_audit.xml 0xad10e72d
res/drawable/settings.png 0xca3ba4f1
res/drawable/task_killer.xml 0x6976d5d7
res/drawable/uninstaller.xml 0xf60a341f
res/layout/app_installer.xml 0x777c9741
res/layout/app_uninstaller.xml 0x8ae9b82e
res/layout/battery_info.xml 0x33440512
res/layout/battery_manager.xml 0x10fc6da3
res/layout/battery_stats.xml 0x9731ac57
res/layout/battery_stats_before.xml 0x20ed113e
res/layout/booster.xml 0xab5df778
res/layout/features.xml 0x129a0b22
res/layout/feedback.xml 0x5fe0fc1f
res/layout/installer_entry.xml 0xe7a76d5c
res/layout/locked_battery.xml 0x853682c2
res/layout/locked_continue.xml 0x8ba9bf20
res/layout/locked_continue_button.xml 0xc52d7f43
res/layout/locked_continue_marketing.xml 0x9709be9a
res/layout/locked_continue_rate.xml 0x55bb8bbf
res/layout/locked_continue_terms.xml 0x5cc5f2a8
res/layout/locked_done.xml 0x68220aaa
res/layout/locked_done_button.xml 0x80265c60
res/layout/locked_done_last_step.xml 0x268a0750
res/layout/locked_done_terms.xml 0xf5ba425a
res/layout/locked_header.xml 0x17ad066b
res/layout/main.xml 0xc930ba42
res/layout/optimizing.xml 0x3779f952
res/layout/optimizing_pro.xml 0x9578cc41
res/layout/security_audit.xml 0x59f98ff4
res/layout/security_audit_entry.xml 0x6c026051
res/layout/settings.xml 0xab95bc04
res/layout/splash.xml 0xd8acb7af
res/layout/task_entry.xml 0x97aea1dc
res/layout/task_killer.xml 0x39603171
res/layout/uninstaller_entry.xml 0x3883684
res/raw/boost_sound.mp3 0xfbda2e33
AndroidManifest.xml 0x742bd60e
resources.arsc 0x5b9ad488
res/drawable-hdpi/background.jpg 0x3c4cbef8
res/drawable-hdpi/battery_boosted.png 0x968c2adf
res/drawable-hdpi/battery_bottom.png 0xa7141847
res/drawable-hdpi/battery_fill.png 0xf127f0f0
res/drawable-hdpi/battery_fill_glow.png 0xb963c6d0
res/drawable-hdpi/battery_level.png 0x989d371c
res/drawable-hdpi/battery_level1.png 0x1322075d
res/drawable-hdpi/battery_level2.png 0xddec7ea3
res/drawable-hdpi/battery_level3.png 0x90491e99
res/drawable-hdpi/battery_level4.png 0x614b6508
res/drawable-hdpi/battery_level5.png 0x715fe3a3
res/drawable-hdpi/battery_levelup.png 0x28280702
res/drawable-hdpi/battery_none.png 0x4641ca91
res/drawable-hdpi/battery_normal.png 0xec6e18cc
res/drawable-hdpi/battery_pressed.png 0xb145128c
res/drawable-hdpi/battery_save.png 0x1b25625e
res/drawable-hdpi/booster_normal.png 0xbd7ddb85
res/drawable-hdpi/booster_pressed.png 0x1d47d833
res/drawable-hdpi/caution_normal.png 0x3b913760
res/drawable-hdpi/caution_off.png 0x3ef94d
res/drawable-hdpi/caution_on.png 0xa0f0ef25
res/drawable-hdpi/caution_pressed.png 0x1a95e08c
res/drawable-hdpi/check_box_checked.png 0xb38f660a
res/drawable-hdpi/check_box_unchecked.png 0x785aca2a
res/drawable-hdpi/cost_money.png 0x5bea3810
res/drawable-hdpi/cost_off.png 0xcb990fa1
res/drawable-hdpi/cost_on.png 0xeb20a519
res/drawable-hdpi/costs_money_normal.png 0x54936692
res/drawable-hdpi/costs_money_pressed.png 0x886116ac
res/drawable-hdpi/cpu_chart.jpg 0x1b1bf552
res/drawable-hdpi/header.png 0xd763de80
res/drawable-hdpi/help.png 0x6a18655e
res/drawable-hdpi/help_button.png 0x88f75d69
res/drawable-hdpi/horizontal_line.png 0x5a8ee1af
res/drawable-hdpi/icon.png 0xab1a8421
res/drawable-hdpi/info_bg.png 0x575956e0
res/drawable-hdpi/info_title.png 0x278f4084
res/drawable-hdpi/installer_normal.png 0x8d2c58e1
res/drawable-hdpi/installer_pressed.png 0x5dc11654
res/drawable-hdpi/internet_off.png 0xa2435144
res/drawable-hdpi/internet_on.png 0x3a246adf
res/drawable-hdpi/kill_task.png 0x425523a9
res/drawable-hdpi/list_line.png 0x4c9a365c
res/drawable-hdpi/mem_chart.jpg 0xa401e599
res/drawable-hdpi/music.png 0x1f99ad6e
res/drawable-hdpi/network_normal.png 0x83164ee4
res/drawable-hdpi/network_pressed.png 0xd5d85e3c
res/drawable-hdpi/op_arrow.jpg 0x267b9e13
res/drawable-hdpi/op_check.jpg 0xbe48d2be
res/drawable-hdpi/op_cross.jpg 0xd3ce3a41
res/drawable-hdpi/op_yeild.jpg 0x5c5c8a60
res/drawable-hdpi/optimise.png 0x638d15b
res/drawable-hdpi/optimize.png 0xf9353ba9
res/drawable-hdpi/phone.png 0x4d324e19
res/drawable-hdpi/privacy_issues.png 0xeb085f71
res/drawable-hdpi/privacy_issues_normal.png 0xa1cbb9de
res/drawable-hdpi/privacy_issues_pressed.png 0x3dddde8f
res/drawable-hdpi/privacy_off.png 0x2d777fc8
res/drawable-hdpi/privacy_on.png 0x23114b71
res/drawable-hdpi/push.png 0xf025fcae
res/drawable-hdpi/searchicon.png 0xd012d05d
res/drawable-hdpi/security_normal.png 0x115d0027
res/drawable-hdpi/security_pressed.png 0x5d9f878
res/drawable-hdpi/splash.jpg 0x689793b7
res/drawable-hdpi/stat_sys_adb.png 0xfc0304b1
res/drawable-hdpi/stat_sys_battery_0.png 0xd77c535a
res/drawable-hdpi/submit.png 0x17b5c4be
res/drawable-hdpi/task_killer_normal.png 0xa199654c
res/drawable-hdpi/task_killer_pressed.png 0x64305d67
res/drawable-hdpi/task_killer_warning.png 0x5b62fcca
res/drawable-hdpi/turbo_boost.png 0x540ad671
res/drawable-hdpi/uninstall.png 0xff3cac2
res/drawable-hdpi/uninstaller_normal.png 0x78708a26
res/drawable-hdpi/uninstaller_pressed.png 0x48a54ab8
res/drawable-hdpi/upgrade_battery.png 0xf9464f60
res/drawable-hdpi/video.png 0x66ebc8a4
res/drawable-hdpi/web.png 0x6f35229
res/layout-mcc206/locked_header.xml 0x470ce219
res/layout-mcc222/locked_continue_button.xml 0x91de2924
res/layout-mcc222/locked_done_button.xml 0x8fa98a9e
res/layout-mcc272/locked_header.xml 0x579a3e52
classes.dex 0xfb05ecf0
META-INF/MANIFEST.MF 0x34882cee
META-INF/CERT.SF 0x9c8021de
META-INF/CERT.RSA 0xa84c7073
运行截图
VirSCANVirSCAN
VirSCAN