大小:1,099.4M 语言: 中文
类型:桌游改编游戏 系统:macOS





ZBotTrojanRemover是一款可以检测并查杀ZBot变种木马病毒的查杀工具,ZBot变种木马会在电脑中潜伏,并且专门针对用户的各种银行账号,是一种威胁非常大的病毒,大家一定要小心防范。
MalwareAnalyzerbyHXiphone联系人恢复-苹果手机通讯录联系人恢复软件2.0 官方版
Analysisstarted
MD5:2BB9A1C4B35719ABD022C605A546D6C4
Executing->DeviceHarddiskVolume3UsersGatewayDesktop2BB9A1C4B35719ABD022C605A546D6C4.exe(PID:13440)
Command-line:"C:UsersGatewayDesktop2BB9A1C4B35719ABD022C605A546D6C4.exe"
C:UsersGatewayDesktop2BB9A1C4B35719ABD022C605A546D6C4.exe
WriteFile,C:UsersGatewayAppDataRoamingGolaxyeq.exe
C:UsersGatewayDesktop2BB9A1C4B35719ABD022C605A546D6C4.exe
WriteRegistryKey,SoftwareMicrosoft
C:UsersGatewayDesktop2BB9A1C4B35719ABD022C605A546D6C4.exe
WriteRegistryKey,Juat
C:UsersGatewayDesktop2BB9A1C4B35719ABD022C605A546D6C4.exe
DeleteFile,C:UsersGatewayAppDataRoamingGolaxyeq.exe
C:UsersGatewayDesktop2BB9A1C4B35719ABD022C605A546D6C4.exe
WriteFile,C:UsersGatewayAppDataRoamingGolaxyeq.exe
C:UsersGatewayDesktop2BB9A1C4B35719ABD022C605A546D6C4.exe
WriteFile,C:UsersGatewayAppDataRoamingGolaxyeq.exe
Executing->DeviceHarddiskVolume3SandboxGatewayAnalyzerusercurrentAppDataRoamingGolaxyeq.exe(PID:16540)
Command-line:"C:UsersGatewayAppDataRoamingGolaxyeq.exe"
C:UsersGatewayAppDataRoamingGolaxyeq.exe
WriteRegistryKey,SoftwareMicrosoftJuat
C:UsersGatewayAppDataRoamingGolaxyeq.exe
WriteRegistryKey,f62bfi
C:UsersGatewayAppDataRoamingGolaxyeq.exe(PID:16540)
AccessPROTECTEDProgram,C:WindowsSystem32 askhost.exe(PID:1992)
C:UsersGatewayAppDataRoamingGolaxyeq.exe(PID:16540)
AccessPROTECTEDProgram,C:WindowsSystem32dwm.exe(PID:2976)
C:UsersGatewayAppDataRoamingGolaxyeq.exe(PID:16540)
AccessPROTECTEDProgram,C:UsersGatewayAppDataLocalMicrosoftSkyDriveSkyDrive.exe(PID:3484)
C:UsersGatewayAppDataRoamingGolaxyeq.exe(PID:16540)
AccessPROTECTEDProgram,C:ProgramFiles(x86)GoogleDrivegoogledrivesync.exe(PID:3496)
C:UsersGatewayAppDataRoamingGolaxyeq.exe(PID:16540)
AccessPROTECTEDProgram,C:ProgramFilesSandboxieSbieCtrl.exe(PID:3524)
C:UsersGatewayAppDataRoamingGolaxyeq.exe(PID:16540)
AccessPROTECTEDProgram,C:ProgramFiles(x86)EvernoteEvernoteEvernoteClipper.exe(PID:3584)
C:UsersGatewayAppDataRoamingGolaxyeq.exe(PID:16540)
AccessPROTECTEDProgram,K:ProgramFiles(x86)KasperskyLabKasperskyEndpointSecurity8forWindowsavp.exe(PID:3592)
C:UsersGatewayAppDataRoamingGolaxyeq.exe(PID:16540)
AccessPROTECTEDProgram,C:UsersGatewayDesktopgoagent-goagent-a51d6a2localgoagent.exe(PID:3600)
C:UsersGatewayAppDataRoamingGolaxyeq.exe(PID:16540)
AccessPROTECTEDProgram,C:WindowsSystem32conhost.exe(PID:3608)
C:UsersGatewayAppDataRoamingGolaxyeq.exe(PID:16540)
AccessPROTECTEDProgram,C:ProgramFilesBOINCoincmgr.exe(PID:3696)
C:UsersGatewayAppDataRoamingGolaxyeq.exe(PID:16540)
AccessPROTECTEDProgram,C:UsersGatewayDesktopgoagent-goagent-a51d6a2localpython27.exe(PID:3704)
C:UsersGatewayAppDataRoamingGolaxyeq.exe(PID:16540)
AccessPROTECTEDProgram,C:ProgramFilesBOINCoinctray.exe(PID:3776)
C:UsersGatewayAppDataRoamingGolaxyeq.exe(PID:16540)
AccessPROTECTEDProgram,K:SkyDriveProgramsVBSherloggerSherlogger.exe(PID:3840)
C:UsersGatewayAppDataRoamingGolaxyeq.exe(PID:16540)
AccessPROTECTEDProgram,K:ProgramFiles(x86)BaiduYunaiduyun.exe(PID:3868)
C:UsersGatewayAppDataRoamingGolaxyeq.exe(PID:16540)
AccessPROTECTEDProgram,C:ProgramFiles(x86)GoogleDrivegoogledrivesync.exe(PID:3952)
C:UsersGatewayAppDataRoamingGolaxyeq.exe(PID:16540)
AccessPROTECTEDProgram,C:ProgramFilesBOINCoinc.exe(PID:3964)
C:UsersGatewayAppDataRoamingGolaxyeq.exe(PID:16540)
AccessPROTECTEDProgram,C:WindowsSystem32conhost.exe(PID:3972)
C:UsersGatewayAppDataRoamingGolaxyeq.exe(PID:16540)
AccessPROTECTEDProgram,C:ProgramFiles(x86)alipaySafeTransactionAlipaySafeTran.exe(PID:17800)
C:UsersGatewayAppDataRoamingGolaxyeq.exe(PID:16540)
AccessPROTECTEDProgram,C:ProgramDataBOINCprojectswww.worldcommunitygrid.orgwcgrid_dsfl_vina_6.25_windows_x86_64(PID:57092)
C:UsersGatewayAppDataRoamingGolaxyeq.exe(PID:16540)
AccessPROTECTEDProgram,C:WindowsSystem32conhost.exe(PID:58156)
Rollingback...
Analysisended
Reason:Malwaredetectedandrolledback
Anomalies:
-Modifiesprotectedresource.Theexecutablemodifiesimportantresources(files,processes,etc.)
2025/10/25 13:44/www/wwwroot/baoma/wp-admin/css/colors/red/template4.php on line 145
">
支持( 11 ) 盖楼(回复)
2025/10/18 11:52/www/wwwroot/baoma/wp-admin/css/colors/red/template4.php on line 145
">
支持( 27 ) 盖楼(回复)
2025/10/19 00:33/www/wwwroot/baoma/wp-admin/css/colors/red/template4.php on line 145
">
支持( 142 ) 盖楼(回复)
2025/10/23 15:28/www/wwwroot/baoma/wp-admin/css/colors/red/template4.php on line 145
">
支持( 195 ) 盖楼(回复)
2025/10/23 14:29/www/wwwroot/baoma/wp-admin/css/colors/red/template4.php on line 145
">
支持( 120 ) 盖楼(回复)
2025/11/08 22:48/www/wwwroot/baoma/wp-admin/css/colors/red/template4.php on line 145
">
支持( 75 ) 盖楼(回复)
2025/11/01 19:37/www/wwwroot/baoma/wp-admin/css/colors/red/template4.php on line 145
">
支持( 13 ) 盖楼(回复)
2025/10/30 03:20/www/wwwroot/baoma/wp-admin/css/colors/red/template4.php on line 145
">
支持( 36 ) 盖楼(回复)
2025/10/27 08:47/www/wwwroot/baoma/wp-admin/css/colors/red/template4.php on line 145
">
支持( 48 ) 盖楼(回复)
2025/10/22 02:42/www/wwwroot/baoma/wp-admin/css/colors/red/template4.php on line 145
">
支持( 152 ) 盖楼(回复)
2025/11/04 12:28/www/wwwroot/baoma/wp-admin/css/colors/red/template4.php on line 145
">
支持( 23 ) 盖楼(回复)
2025/11/03 14:32/www/wwwroot/baoma/wp-admin/css/colors/red/template4.php on line 145
">
支持( 43 ) 盖楼(回复)
/www/wwwroot/baoma/wp-admin/css/colors/red/template4.php on line 145
支持( 164 ) 盖楼(回复)
">