VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:86
Behavior list
Basic Information
MD5:80db066a12c73e10de3c1193a1857ea1
file type:EXE
Production company:
version:
Shell or compiler information:COMPILER:Microsoft Visual Studio .NET 2005 -- 2008 -> Microsoft Corporation *
Subfile information:DECOMPRESSORdumpFile / a65c29111a4cf5a7fdd5a9d79f77bcab / EXE
Key behavior
Behavior description:查找PE资源信息
details:(FindResourceA) hModule = 0x00400000, ResName: DECOMPRESSOR, ResType:
Behavior description:获取TickCount值
details:TickCount = 223365, SleepMilliseconds = 100.
TickCount = 223725, SleepMilliseconds = 100.
TickCount = 223740, SleepMilliseconds = 100.
TickCount = 223896, SleepMilliseconds = 100.
TickCount = 223959, SleepMilliseconds = 100.
TickCount = 223943, SleepMilliseconds = 100.
Process behavior
Behavior description:创建新文件进程
details:[0x00000af8]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET3.tmp\%temp%\****.exe, CmdLine = "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET3.tmp\%temp%\****.exe" -ORIGIN:"C:\Documents and Settings\Administrator\Local Settings\%temp%\"
[0x00000b80]ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET3.tmp\extracted\%temp%\****.exe, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET3.tmp\extracted\%temp%\****.exe "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET3.tmp\extracted\CET_TRAINER.CETRAINER" "-ORIGIN:C:\Documents and Settings\Administrator\Local Settings\%temp%\"
Behavior description:枚举进程
details:N/A
Behavior description:创建本地线程
details:TargetProcess: %temp%\****.exe, InheritedFromPID = 2808, ProcessID = 2944, ThreadID = 2952, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: %temp%\****.exe, InheritedFromPID = 2808, ProcessID = 2944, ThreadID = 2956, StartAddress = 004135D0, Parameter = 000D8AD8
TargetProcess: %temp%\****.exe, InheritedFromPID = 2808, ProcessID = 2944, ThreadID = 2984, StartAddress = 004135D0, Parameter = 000D8A18
TargetProcess: %temp%\****.exe, InheritedFromPID = 2808, ProcessID = 2944, ThreadID = 2988, StartAddress = 004135D0, Parameter = 000D9408
File behavior
Behavior description:创建文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\CET_Archive.dat
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\%temp%\****.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\CET_TRAINER.CETRAINER
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\defines.lua
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\%temp%\****.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\lua53-32.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\win32\dbghelp.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\overlay.fx
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\d3dhook.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\ced3d9hook.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\ced3d10hook.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\ced3d11hook.dll
Behavior description:删除文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\CET_TRAINER.CETRAINER
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\ced3d10hook.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\ced3d11hook.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\ced3d9hook.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\d3dhook.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\defines.lua
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\lua53-32.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\overlay.fx
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\win32\dbghelp.dll
Behavior description:创建可执行文件
details:C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\%temp%\****.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\%temp%\****.exe
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\lua53-32.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\win32\dbghelp.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\d3dhook.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\ced3d9hook.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\ced3d10hook.dll
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\ced3d11hook.dll
Behavior description:修改文件内容
details:C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\CET_Archive.dat ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\%temp%\****.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\CET_TRAINER.CETRAINER ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\defines.lua ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\%temp%\****.exe ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\%temp%\****.exe ---> Offset = 131072
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\%temp%\****.exe ---> Offset = 262144
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\%temp%\****.exe ---> Offset = 393216
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\%temp%\****.exe ---> Offset = 524288
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\lua53-32.dll ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\lua53-32.dll ---> Offset = 131072
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\lua53-32.dll ---> Offset = 262144
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\lua53-32.dll ---> Offset = 393216
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\win32\dbghelp.dll ---> Offset = 0
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\win32\dbghelp.dll ---> Offset = 131072
Behavior description:查找文件
details:FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET3.tmp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET3.tmp\%temp%\****.exe
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET3.tmp\extracted\%temp%\****.exe
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET3.tmp\extracted\languages\*
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET3.tmp\extracted\autorun\*.lua
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET3.tmp\extracted\*.*
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET3.tmp\extracted\win32\*.*
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Cheat Engine\Window Positions 96\AdvancedOptions Position
\REGISTRY\USER\S-*\Software\Cheat Engine\Window Positions 96\frmAutoInject Position
Other behavior
Behavior description:获取光标位置
details:CursorPos = (80,18468), SleepMilliseconds = 100.
CursorPos = (6373,26501), SleepMilliseconds = 100.
CursorPos = (19208,15725), SleepMilliseconds = 100.
CursorPos = (11517,29359), SleepMilliseconds = 100.
CursorPos = (27001,24465), SleepMilliseconds = 100.
CursorPos = (5744,28146), SleepMilliseconds = 100.
CursorPos = (23320,16828), SleepMilliseconds = 100.
CursorPos = (10000,492), SleepMilliseconds = 100.
CursorPos = (3034,11943), SleepMilliseconds = 100.
CursorPos = (4866,5437), SleepMilliseconds = 100.
CursorPos = (32430,14605), SleepMilliseconds = 100.
CursorPos = (3941,154), SleepMilliseconds = 100.
CursorPos = (331,12383), SleepMilliseconds = 100.
CursorPos = (17460,18717), SleepMilliseconds = 100.
CursorPos = (19757,19896), SleepMilliseconds = 100.
Behavior description:创建互斥体
details:DDrawWindowListMutex
DDrawDriverObjectListMutex
__DDrawExclMode__
__DDrawCheckExclMode__
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.IOH
MSCTF.Shared.MUTEX.EIL
Behavior description:隐藏指定窗口
details:[Window,Class] = [Cheat Engine 6.6,Window]
[Window,Class] = [,ComboLBox]
[Window,Class] = [CETrainer,Window]
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:打开事件
details:HookSwitchHookEnabledEvent
Global\crypt32LogoffEvent
CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010
CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010
MSCTF.SendReceiveConection.Event.IOH.IC
MSCTF.SendReceive.Event.IOH.IC
Behavior description:获取TickCount值
details:TickCount = 223365, SleepMilliseconds = 100.
TickCount = 223725, SleepMilliseconds = 100.
TickCount = 223740, SleepMilliseconds = 100.
TickCount = 223896, SleepMilliseconds = 100.
TickCount = 223959, SleepMilliseconds = 100.
TickCount = 223943, SleepMilliseconds = 100.
Behavior description:调整进程token权限
details:SE_DEBUG_PRIVILEGE
SE_TCB_PRIVILEGE
SE_LOAD_DRIVER_PRIVILEGE
SE_SECURITY_PRIVILEGE
SE_TAKE_OWNERSHIP_PRIVILEGE
SE_MANAGE_VOLUME_PRIVILEGE
SE_BACKUP_PRIVILEGE
SE_CREATE_PAGEFILE_PRIVILEGE
SE_SHUTDOWN_PRIVILEGE
SE_RESTORE_PRIVILEGE
SE_INC_BASE_PRIORITY_PRIVILEGE
Behavior description:窗口信息
details:Pid = 2944, Hwnd=0x103d8, Text = 关闭, ClassName = Button.
Pid = 2944, Hwnd=0x103d4, Text = 关于, ClassName = Button.
Pid = 2944, Hwnd=0x103d0, Text = CETrainer, ClassName = Window.
Behavior description:查找PE资源信息
details:(FindResourceA) hModule = 0x00400000, ResName: DECOMPRESSOR, ResType:
Behavior description:可执行文件签名信息
details:C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\%temp%\****.exe(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\%temp%\****.exe(签名验证: 未通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\lua53-32.dll(签名验证: 通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\win32\dbghelp.dll(签名验证: 通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\d3dhook.dll(签名验证: 通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\ced3d9hook.dll(签名验证: 通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\ced3d10hook.dll(签名验证: 通过)
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\ced3d11hook.dll(签名验证: 通过)
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 100.
[2]: MilliSeconds = 100.
[3]: MilliSeconds = 100.
[4]: MilliSeconds = 100.
[5]: MilliSeconds = 100.
[6]: MilliSeconds = 100.
[7]: MilliSeconds = 2500.
[8]: MilliSeconds = 100.
[9]: MilliSeconds = 100.
[10]: MilliSeconds = 100.
[1]: MilliSeconds = 2000.
[2]: MilliSeconds = 10000.
[3]: MilliSeconds = 10000.
[4]: MilliSeconds = 10000.
[5]: MilliSeconds = 10000.
Behavior description:创建事件对象
details:EventName = Global\crypt32LogoffEvent
EventName = MSCTF.SendReceive.Event.EIL.IC
EventName = MSCTF.SendReceiveConection.Event.EIL.IC
Behavior description:可执行文件MD5
details:C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\%temp%\****.exe ---> a65c29111a4cf5a7fdd5a9d79f77bcab
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\%temp%\****.exe ---> 文件过大!
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\lua53-32.dll ---> 6dc19a76e755d0b54d9c6908e5512f43
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\win32\dbghelp.dll ---> 9139604740814e53298a5e8428ba29d7
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\d3dhook.dll ---> 0837dce36134483d2a3ec62fa5a0122b
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\ced3d9hook.dll ---> abc838d39000d914d663ee7400391292
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\ced3d10hook.dll ---> 8a97d3272a2464c8c9f92c54db49f0ae
C:\Documents and Settings\Administrator\Local Settings\Temp\cetrainers\CET3.tmp\extracted\ced3d11hook.dll ---> ca1322009d709ae5040ad4d827740058
Behavior description:打开互斥体
details:DBWinMutex
ShimCacheMutex
Behavior description:加载新释放的文件
details:Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET3.tmp\extracted\lua53-32.dll.
Image: C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET3.tmp\extracted\win32\dbghelp.dll.
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号