VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

virscan
VirSCAN
VirSCAN

Virus name DeepScan:Generic.MSIL.PasswordStealerA.26685368 scan result

Virus name DeepScan:Generic.MSIL.PasswordStealerA.26685368 find728scan result.
If you know the information, hazards and prevention methods of the virus DeepScan:Generic.MSIL.PasswordStealerA.26685368, you are welcome to send it to us at contact@virscan.com so that we can display it on the relevant page.

virus DeepScan:Generic.MSIL.PasswordStealerA.26685368 Description

VirSCANVirSCAN
TrojanSpy:Win32/Bancos.TA is a data-stealing trojan that captures online banking credentials, such as account login names and passwords, then relays the captured information to a remote attacker. Win32/Bancos.TA targets customers of the Brazilian bank Banco Bradesco.
Powered By Google Translate

Related virus

DeepScan:Generic.Adw DeepScan:Generic.Adw DeepScan:Generic.Adw
DeepScan:Generic.Adw DeepScan:Generic.Adw DeepScan:Generic.Adw
DeepScan:Generic.Adw DeepScan:Generic.Adw DeepScan:Generic.Adw
DeepScan:Generic.Adw DeepScan:Generic.Adw DeepScan:Generic.Adw

Scan Result

File Name/MD5 File Size Scanner Check Date
1 File Name: 745a9d1441fa1e652407d298f0f9d41b
MD5:745a9d1441fa1e652407d298f0f9d41b
464008 gdata 2020-01-19 23:58:20
2 File Name: 745a9d1441fa1e652407d298f0f9d41b
MD5:745a9d1441fa1e652407d298f0f9d41b
464008 alyac 2020-01-19 23:58:20
3 File Name: File name not allowed
MD5:4c6f92bef34f6cb48adb49e76427f223
463280 gdata 2020-01-19 06:00:54
4 File Name: File name not allowed
MD5:4c6f92bef34f6cb48adb49e76427f223
463280 alyac 2020-01-19 06:00:54
5 File Name: File name not allowed
MD5:fbc39407f5dc0b964ace15efb321bea0
463472 gdata 2020-01-14 03:46:07
6 File Name: File name not allowed
MD5:fbc39407f5dc0b964ace15efb321bea0
463472 alyac 2020-01-14 03:46:07
7 File Name: File name not allowed
MD5:f431651dcc53db5109b2c74afedf0ff9
463840 gdata 2020-01-13 19:17:43
8 File Name: File name not allowed
MD5:f431651dcc53db5109b2c74afedf0ff9
463840 alyac 2020-01-13 19:17:43
9 File Name: File name not allowed
MD5:f431651dcc53db5109b2c74afedf0ff9
463840 emsisoft 2020-01-13 19:17:43
10 File Name: File name not allowed
MD5:a4fc74c117e56e9311c98fe4e8b154a0
463768 gdata 2020-01-11 23:30:14
11 File Name: File name not allowed
MD5:a4fc74c117e56e9311c98fe4e8b154a0
463768 alyac 2020-01-11 23:30:14
12 File Name: File name not allowed
MD5:a4fc74c117e56e9311c98fe4e8b154a0
463768 emsisoft 2020-01-11 23:30:14
13 File Name: File name not allowed
MD5:8bd178271afa2ec9dfbe319f43b47d81
463496 gdata 2020-01-11 09:06:56
14 File Name: File name not allowed
MD5:8bd178271afa2ec9dfbe319f43b47d81
463496 alyac 2020-01-11 09:06:56
15 File Name: 2f6e326a5f0b43288b7bcbed86ba3b33
MD5:2f6e326a5f0b43288b7bcbed86ba3b33
463928 gdata 2020-01-09 02:21:52
16 File Name: 2f6e326a5f0b43288b7bcbed86ba3b33
MD5:2f6e326a5f0b43288b7bcbed86ba3b33
463928 alyac 2020-01-09 02:21:52
17 File Name: 2f6e326a5f0b43288b7bcbed86ba3b33
MD5:2f6e326a5f0b43288b7bcbed86ba3b33
463928 emsisoft 2020-01-09 02:21:52
18 File Name: cb0d05b97019ba7dfad3ad34337b2fb0
MD5:cb0d05b97019ba7dfad3ad34337b2fb0
463960 gdata 2020-01-02 03:09:29
19 File Name: cb0d05b97019ba7dfad3ad34337b2fb0
MD5:cb0d05b97019ba7dfad3ad34337b2fb0
463960 alyac 2020-01-02 03:09:29
20 File Name: cb0d05b97019ba7dfad3ad34337b2fb0
MD5:cb0d05b97019ba7dfad3ad34337b2fb0
463960 emsisoft 2020-01-02 03:09:29