tm en ru
img

LATENT FILE THREATS DETECTOR

1) Scope, purpose and functionality: Any enterprise-organization, regardless of departmental affiliation and form of ownership. The purpose of the program is to carry out preventive measures and check before using a set of unknown files or files downloaded from the Internet for the presence of potential loaders and virus bodies among them. The programs can be used as a means of detecting the first stage of a cyber attack - espionage, as well as a means of complying with cybersecurity rules.

2) Main technical characteristics: The program is designed as a standard Windows application. The program sequentially opens each file located in the specified folder, reads the digital signature of the files using WinAPI functions, and if the file has a digital signature of the executable file, and its extension is different, then the program places it in the list of hidden programs (potential Trojans and virus downloaders), and on the contrary, if the file is not executable and has the extension of the executable file, then the program places it in the list of false programs (potential virus bodies). The program is able to "read" a folder containing about 100 files in 5-10 seconds. In addition, the program is able to determine the hash-sum of the specified file using the Mundan MD5 algorithm.

3) Programming language: Delphi.

4) Type of realizing computer: IBM PC compatible computer, processor: i3 1.7GHz, RAM: 2GB, HDD: 10GB.

5) The memory of the computer program: : 21 965 314 byte.