VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, VirSCAN can scan compressed files with password 'infected' or 'virus'.

Language
Server load
Server Load

File information
Safety rating:75
Behavior list
Basic Information
MD5:c144fe63b57b9ef9a0056b8c290ff241
file type:zip
Production company:
version:
Shell or compiler information:
Subfile information:Resident Evil Revelations 2 ALL DLC Trainer (+14) [ver 5.0] [32 Bit] {Baracuda}.EXE / febc2767a7a99e63c942e45a7035eb89 / EXE
Resident Evil Revelations 2 ALL DLC Trainer (+14) [ver 5.0] [64 Bit] {Baracuda}.EXE / fd62ea213fe5950aae53744650ec41fb / EXE
Key behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-*
\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET4.tmp\extracted\Resident Evil Revelations 2 ALL DLC Trainer (+14) [ver 5.0] [32 Bit] {Baracuda}.exe
\WINDOWS\system32\ntdll.dll
\WINDOWS\system32\kernel32.dll
\WINDOWS\system32\advapi32.dll
\WINDOWS\system32\rpcrt4.dll
\WINDOWS\system32\secur32.dll
\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.5512_x-ww_35d4ce83\comctl32.dll
\WINDOWS\system32\msvcrt.dll
\WINDOWS\system32\gdi32.dll
\WINDOWS\system32\user32.dll
\WINDOWS\system32\shlwapi.dll
\WINDOWS\system32\comdlg32.dll
\WINDOWS\system32\shell32.dll
\WINDOWS\system32\hhctrl.ocx
Behavior description:隐藏指定窗口
details:[Window,Class] = [Cheat Engine 6.4,Window]
[Window,Class] = [,ComboLBox]
[Window,Class] = [Resident Evil Revelations 2 ALL DLC Trainer (+14) [ver 5.0] [32 & 64 Bit] {Baracuda} Trainer Для Лицензии и Пиратки,Window]
Process behavior
Behavior description:创建新文件进程
details:ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET4.tmp\Resident Evil Revelations 2 ALL DLC Trainer (+14) [ver 5.0] [32 Bit] {Baracuda}.exe, CmdLine = "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET4.tmp\Resident Evil Revelations 2 ALL DLC Traine
ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET4.tmp\extracted\Resident Evil Revelations 2 ALL DLC Trainer (+14) [ver 5.0] [32 Bit] {Baracuda}.exe, CmdLine = "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET4.tmp\extracted\Resident Evil Revelati
Behavior description:枚举进程
details:N/A
File behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-*
\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET4.tmp\extracted\Resident Evil Revelations 2 ALL DLC Trainer (+14) [ver 5.0] [32 Bit] {Baracuda}.exe
\WINDOWS\system32\ntdll.dll
\WINDOWS\system32\kernel32.dll
\WINDOWS\system32\advapi32.dll
\WINDOWS\system32\rpcrt4.dll
\WINDOWS\system32\secur32.dll
\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.5512_x-ww_35d4ce83\comctl32.dll
\WINDOWS\system32\msvcrt.dll
\WINDOWS\system32\gdi32.dll
\WINDOWS\system32\user32.dll
\WINDOWS\system32\shlwapi.dll
\WINDOWS\system32\comdlg32.dll
\WINDOWS\system32\shell32.dll
\WINDOWS\system32\hhctrl.ocx
Behavior description:创建可执行文件
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET4.tmp\Resident Evil Revelations 2 ALL DLC Trainer (+14) [ver 5.0] [32 Bit] {Baracuda}.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET4.tmp\extracted\Resident Evil Revelations 2 ALL DLC Trainer (+14) [ver 5.0] [32 Bit] {Baracuda}.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET4.tmp\extracted\lua5.1-32.dll
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET4.tmp\extracted\win32\dbghelp.dll
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET4.tmp\extracted\vehdebug-i386.dll
Behavior description:修改文件内容
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET4.tmp\CET_Archive.dat---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET4.tmp\extracted\CET_TRAINER.CETRAINER---> Offset = 131072
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET4.tmp\extracted\defines.lua---> Offset = 0
Behavior description:查找文件
details:FileName = C:\DOCUME~1
FileName = C:\DOCUME~1\ADMINI~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET4.tmp
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET4.tmp\extracted\autorun\*.lua
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET4.tmp\extracted\*.*
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\cetrainers\CET4.tmp\extracted\win32\*.*
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-*\Software\Cheat Engine\Window Positions\AdvancedOptions Position
\REGISTRY\USER\S-*\Software\Cheat Engine\Window Positions\frmAutoInject Position
Behavior description:删除注册表键
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW
Behavior description:删除注册表键值
details:\REGISTRY\MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting\DW\DWFileTreeRoot
Other behavior
Behavior description:创建互斥体
details:DDrawWindowListMutex
DDrawDriverObjectListMutex
__DDrawExclMode__
__DDrawCheckExclMode__
CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.III
Behavior description:隐藏指定窗口
details:[Window,Class] = [Cheat Engine 6.4,Window]
[Window,Class] = [,ComboLBox]
[Window,Class] = [Resident Evil Revelations 2 ALL DLC Trainer (+14) [ver 5.0] [32 & 64 Bit] {Baracuda} Trainer Для Лицензии и Пиратки,Window]
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:获取系统权限
details:SE_DEBUG_PRIVILEGE
SE_LOAD_DRIVER_PRIVILEGE
SE_SECURITY_PRIVILEGE
SE_TAKE_OWNERSHIP_PRIVILEGE
SE_MANAGE_VOLUME_PRIVILEGE
SE_BACKUP_PRIVILEGE
SE_CREATE_PAGEFILE_PRIVILEGE
SE_SHUTDOWN_PRIVILEGE
SE_RESTORE_PRIVILEGE
SE_INC_BASE_PRIORITY_PRIVILEGE
Behavior description:窗口信息
details:Pid = 2180, Hwnd=0x10308, Text = Закрыть Trainer, ClassName = Button.
Pid = 2180, Hwnd=0x10304, Text = О Программе, ClassName = Button.
Pid = 2180, Hwnd=0x102fe, Text = Resident Evil Revelations 2 ALL DLC Trainer (+14) [ver 5.0] [32 & 64 Bit] {Baracuda} Trainer Для Лицензии и Пират, ClassName = Window.
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
Translated by Keith Miller, United States
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号