VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

virscan
VirSCAN
VirSCAN

Virus name Trojan/Generic.azrvz scan result

Virus name Trojan/Generic.azrvz find2012scan result.
If you know the information, hazards and prevention methods of the virus Trojan/Generic.azrvz, you are welcome to send it to us at contact@virscan.com so that we can display it on the relevant page.

virus Trojan/Generic.azrvz Description

VirSCANVirSCAN
Exploit:Java/CVE-2012-1723 is a malicious Java applet that attempts to exploit a vulnerability CVE-2012-1723 in the Java Runtime Environment JRE in order to download and install files of an attacker’s choice onto your computer. If you visit a website containing the malicious code while using a vulnerable version of Java, the exploit is loaded. It then attempts to download and execute files from a remote host/URL; the files that are downloaded and executed could include additional malware. The following versions of Java are vulnerable to this exploit: JDK and JRE 7 Update 4 and earlier Java SE JDK and JRE 6 Update 32 and earlier Java SE JDK and JRE 5.0 Update 35 and earlier Java SE SDK and JRE 1.4.2_37 and earlier Java SE
Powered By Google Translate

Related virus

Troajn-Ransom.Crypt8 Troajn.OnLineGames.I Troan.VB.Agent
Troan/Win32.Startpag Troi Troi.322
Troi.322.F Troi.322.G Troi.322.I
Troj.Adrd.a.(kcloud) Troj.FDoS-Beer Troj.Generic.(kcloud

Scan Result

File Name/MD5 File Size Scanner Check Date
1 File Name: 8d9df8d6c3c9dab79f16d9d8a01f94bc
MD5:8d9df8d6c3c9dab79f16d9d8a01f94bc
16066 jiangmin 2020-01-24 02:15:11
2 File Name: 8d48321fe5269396da1acc6f99bce556
MD5:8d48321fe5269396da1acc6f99bce556
10742 jiangmin 2020-01-24 01:45:54
3 File Name: File name not allowed
MD5:8929f8904af153fd69a27e4a35200824
13406 jiangmin 2020-01-23 22:10:00
4 File Name: File name not allowed
MD5:84d0b75be5c770a101ad9222abe9b947
14136 jiangmin 2020-01-23 19:36:10
5 File Name: 8162dfca2e62f22aabb2af06266d72d4
MD5:8162dfca2e62f22aabb2af06266d72d4
9816 jiangmin 2020-01-23 17:34:47
6 File Name: 810b680ae8bc2e3bed7b7802038fd29d
MD5:810b680ae8bc2e3bed7b7802038fd29d
9316 jiangmin 2020-01-23 17:19:55
7 File Name: File name not allowed
MD5:7c54b0193a4b3ec3b2996524629058dd
35976 jiangmin 2020-01-23 14:29:49
8 File Name: File name not allowed
MD5:791a4ad88ca8c46e4b01f3563f798075
12012 jiangmin 2020-01-23 12:31:16
9 File Name: File name not allowed
MD5:768b27b6c242730a745d89a2e7c11dea
31802 jiangmin 2020-01-23 10:57:17
10 File Name: 75ed531e0c0b38e3d9be3937713fe8ed
MD5:75ed531e0c0b38e3d9be3937713fe8ed
16826 jiangmin 2020-01-23 10:39:15
11 File Name: File name not allowed
MD5:720794dd32a7682179bd4bf563cfc5df
10310 jiangmin 2020-01-23 08:23:51
12 File Name: File name not allowed
MD5:6ef60ed11dbf3e8fb13115661f1f5930
16256 jiangmin 2020-01-23 06:32:52
13 File Name: File name not allowed
MD5:69b68fba4455c39e058b3bbcd15d9b54
10582 jiangmin 2020-01-23 03:31:12
14 File Name: File name not allowed
MD5:69981fc37729c12407915008e04141cb
27936 jiangmin 2020-01-23 03:26:07
15 File Name: File name not allowed
MD5:677e70471b1f75b84d647232843306e9
7228 jiangmin 2020-01-23 02:05:01
16 File Name: File name not allowed
MD5:65efb00695fc4908ddbd5225e9c7541e
25738 jiangmin 2020-01-23 01:10:14
17 File Name: 65384cf5a24b1229844f953251c99d1e
MD5:65384cf5a24b1229844f953251c99d1e
10832 jiangmin 2020-01-23 00:43:54
18 File Name: 6161dd4cf66c2aff0007b4bd8bee4637
MD5:6161dd4cf66c2aff0007b4bd8bee4637
12374 jiangmin 2020-01-22 22:27:07
19 File Name: File name not allowed
MD5:58f9d72cfb8c00879c442389061a27f7
25940 jiangmin 2020-01-22 17:19:17
20 File Name: 58e8de0145f18716c0a3b6385c109bda
MD5:58e8de0145f18716c0a3b6385c109bda
12588 jiangmin 2020-01-22 17:16:26