VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.
4, If your browser cannot upload files, please download VirSCAN uploader to upload.

Language
Server load
Server Load

VirSCAN
VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

   File information

Virscan.org multi-engine scan report
Behavior analysis report:         Habo file analysis

Basic Information

MD5:cf457949ec5cc735f36d9ed92f55ecf4
文件大小:5.58MB
上传时间: 2014-09-22 10:36:30 (CST)
Package names:
Minimum operating environment:
copyright:

Key behavior

Behavior description: 检测自身是否被调试
details: N/A

Process behavior

Behavior description: 创建本地线程
details: TargetProcess: Counter-Strike Global Offensive.exe, InheritedFromPID = 1944, ProcessID = 1664, ThreadID = 1924, StartAddress = 792A741C, Parameter = 00000000
TargetProcess: Counter-Strike Global Offensive.exe, InheritedFromPID = 1944, ProcessID = 1664, ThreadID = 1652, StartAddress = 791F59C0, Parameter = 001A0E90
TargetProcess: Counter-Strike Global Offensive.exe, InheritedFromPID = 1944, ProcessID = 1664, ThreadID = 1000, StartAddress = 77DC845A, Parameter = 00000000
TargetProcess: Counter-Strike Global Offensive.exe, InheritedFromPID = 1944, ProcessID = 1664, ThreadID = 148, StartAddress = 4AEA7456, Parameter = 00000000

File behavior

Behavior description: 覆盖已有文件
details: C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT
Behavior description: 修改文件内容
details: C:\Documents and Settings\Administrator\Local Settings\Application Data\GDIPFONTCACHEV1.DAT ---> Offset = 0
Behavior description: 查找文件
details: FileName = C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\mscoreei.dll
FileName = C:\WINDOWS\Microsoft.NET\Framework\\*
FileName = C:\WINDOWS\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.INI
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings

Other behavior

Behavior description: 检测自身是否被调试
details: N/A
Behavior description: 创建互斥体
details: CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
MSCTF.Shared.MUTEX.ELH
MSCTF.Shared.MUTEX.IEE
Behavior description: 隐藏指定窗口
details: [Window,Class] = [Preparing to install,WindowsForms10.Window.8.app.0.2bf8098_r19_ad1]
Behavior description: 查找指定窗口
details: NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description: 窗口信息
details: Pid = 1664, Hwnd=0xa0300, Text = Preparing files to install the application..., ClassName = WindowsForms10.RichEdit20W.app.0.2bf8098_r19_ad1.
Pid = 1664, Hwnd=0x80326, Text = Preparing to install, ClassName = WindowsForms10.Window.8.app.0.2bf8098_r19_ad1.
Pid = 1664, Hwnd=0x10394, Text = This will install Counter-Strike Global Offensive on your computer. It is recommended that you close all other applications b, ClassName = WindowsForms10.EDIT.app.0.2bf8098_r19_ad1.
Pid = 1664, Hwnd=0x10396, Text = Welcome to the Counter-Strike Global Offensive Setup Wizard., ClassName = WindowsForms10.EDIT.app.0.2bf8098_r19_ad1.
Pid = 1664, Hwnd=0x1039a, Text = Next >, ClassName = WindowsForms10.BUTTON.app.0.2bf8098_r19_ad1.
Pid = 1664, Hwnd=0x1039c, Text = Cancel, ClassName = WindowsForms10.BUTTON.app.0.2bf8098_r19_ad1.
Pid = 1664, Hwnd=0x10392, Text = Counter-Strike Global Offensive - Setup, ClassName = WindowsForms10.Window.8.app.0.2bf8098_r19_ad1.
Behavior description: 创建事件对象
details: EventName = Global\CPFATE_1664_v4.0.30319
EventName = MSCTF.SendReceive.Event.IEE.IC
EventName = MSCTF.SendReceiveConection.Event.IEE.IC