squirrel22 | 25.12.2008 08:43 | ...so, hier die nächsten..
habe beim durchsuchen noch ein paar mehr gefunden die alle 8 buchstaben haben und nach jedem zweiten buchstaben ein vokal. ist dadurch recht leicht erkennbar (habe aber nicht auf vollständigkeit überprüft).
robejaku: Code:
Datei robejaku.dll empfangen 2008.12.25 08:04:32 (CET)
Status: Beendet
Ergebnis: 3/38 (7.89%)
Filter
Drucken der Ergebnisse
Antivirus Version letzte aktualisierung Ergebnis
a-squared 4.0.0.73 2008.12.25 -
AhnLab-V3 2008.12.25.0 2008.12.25 -
AntiVir 7.9.0.45 2008.12.24 -
Authentium 5.1.0.4 2008.12.25 -
Avast 4.8.1281.0 2008.12.24 -
AVG 8.0.0.199 2008.12.24 -
BitDefender 7.2 2008.12.25 -
CAT-QuickHeal 10.00 2008.12.24 -
ClamAV 0.94.1 2008.12.24 -
Comodo 809 2008.12.24 -
DrWeb 4.44.0.09170 2008.12.25 -
eTrust-Vet 31.6.6276 2008.12.24 -
Ewido 4.0 2008.12.24 -
F-Prot 4.4.4.56 2008.12.24 -
F-Secure 8.0.14332.0 2008.12.25 -
Fortinet 3.117.0.0 2008.12.25 -
GData 19 2008.12.25 -
Ikarus T3.1.1.45.0 2008.12.25 -
K7AntiVirus 7.10.564 2008.12.24 -
Kaspersky 7.0.0.125 2008.12.25 -
McAfee 5474 2008.12.24 -
McAfee+Artemis 5474 2008.12.24 -
Microsoft 1.4205 2008.12.25 Trojan:Win32/Vundo.gen!G
NOD32 3716 2008.12.24 -
Norman 5.80.02 2008.12.24 -
Panda 9.0.0.4 2008.12.24 -
PCTools 4.4.2.0 2008.12.24 -
Prevx1 V2 2008.12.25 Fraudulent Security Program
Rising 21.09.31.00 2008.12.25 Trojan.DL.Win32.Undef.ctj
SecureWeb-Gateway 6.7.6 2008.12.24 -
Sophos 4.37.0 2008.12.25 -
Sunbelt 3.2.1809.2 2008.12.22 -
Symantec 10 2008.12.25 -
TheHacker 6.3.1.4.199 2008.12.23 -
TrendMicro 8.700.0.1004 2008.12.25 -
VBA32 3.12.8.10 2008.12.24 -
ViRobot 2008.12.24.1534 2008.12.24 -
VirusBuster 4.5.11.0 2008.12.24 -
weitere Informationen
File size: 99024 bytes
MD5...: 39a6930509e3e19af20c47a75095cf86
SHA1..: 06db7d46b3cd73ab222aabc15359def0e30aa4f6
SHA256: 3ff63593a89011ba70b7601c92b3869e15278bfb257c3c4fc8134577703d8a23
SHA512: 25171f13acac5963edede72aa31f3b53c54693947973d931c73aaee48bc048bae1686600354ccd87c779a21bb0d86e7edd35ea07ac7788c997adc1398d93cd48
ssdeep: 3072:sxqwssvJvZNRJCYnYvLuIU2qu0747Rhu5WtO:HwsshvZNRgYny1U747R0v
PEiD..: -
TrID..: File type identificationWin32 Executable Generic (42.3%)Win32 Dynamic Link Library (generic) (37.6%)Generic Win/DOS Executable (9.9%)DOS Executable Generic (9.9%)Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
PEInfo: PE Structure information( base data )entrypointaddress.: 0x1000546ctimedatestamp.....: 0x3f1c559e (Mon Jul 21 21:05:34 2003)machinetype.......: 0x14c (I386)( 3 sections )name viradd virsiz rawdsiz ntrpy md5.text 0x1000 0x6000 0x5200 6.83 5ce4f51b562d4ddee3793a3dd93aea3eDATA 0x7000 0x12000 0x11800 7.99 b559188c63af004c4a95a1c6b1ddab17.rdata 0x19000 0xa000 0xa00 3.24 ec529dcb3cbf186e50f7bb9c1293f240( 4 imports ) > msvcrt.dll: _controlfp, malloc, _cexit, _adjust_fdiv, _acmdln, wcslen, toupper, __setusermatherr, __p__fmode, __p__commode, __set_app_type, __getmainargs> user32.dll: OpenClipboard, TranslateMessage, DialogBoxParamW, LoadMenuW, LoadStringW, CreateDialogParamW, EnableMenuItem, SetDlgItemTextW, KillTimer, MessageBeep, DefWindowProcW, GetClientRect, WinHelpW, MessageBoxW, GetDlgCtrlID, GetDesktopWindow, DestroyMenu, LoadAcceleratorsW, CharNextW, CheckDlgButton, CheckMenuItem, GetWindowRect, CheckRadioButton, DrawTextW, SetFocus, CharNextA, SystemParametersInfoW, TrackPopupMenuEx, SendMessageW, GetSysColorBrush, OffsetRect, ShowWindow, RegisterClassExW, GetWindowTextW> MSVCRT.DLL: _wcsrev, __CxxFrameHandler> KERNEL32.DLL: GetModuleHandleA, GlobalAlloc, VirtualAlloc, lstrcatW, LocalReAlloc, LoadLibraryA, LocalFree, GlobalReAlloc, GetCommandLineW, SetEvent, GetStartupInfoA, WaitForSingleObject, GlobalFree, GetProfileIntW, lstrcpyW, Sleep, ExitProcess, lstrcpynW hatakuvu: Code:
Datei hatakuvu.dll empfangen 2008.12.25 08:09:04 (CET)
Status: Beendet
Ergebnis: 15/39 (38.47%)
Filter
Drucken der Ergebnisse
Email:
Antivirus Version letzte aktualisierung Ergebnis
a-squared 4.0.0.73 2008.12.25 -
AhnLab-V3 2008.12.25.0 2008.12.25 -
AntiVir 7.9.0.45 2008.12.24 -
Authentium 5.1.0.4 2008.12.25 -
Avast 4.8.1281.0 2008.12.24 Win32:Adware-gen
AVG 8.0.0.199 2008.12.24 Agent.APVZ
BitDefender 7.2 2008.12.25 Trojan.Vundo.GDI
CAT-QuickHeal 10.00 2008.12.24 -
ClamAV 0.94.1 2008.12.24 -
Comodo 809 2008.12.24 -
DrWeb 4.44.0.09170 2008.12.25 Trojan.Virtumod.1569
eSafe 7.0.17.0 2008.12.24 Suspicious File
eTrust-Vet 31.6.6276 2008.12.24 Win32/Vundo.BQJ
Ewido 4.0 2008.12.24 -
F-Prot 4.4.4.56 2008.12.24 -
F-Secure 8.0.14332.0 2008.12.25 -
Fortinet 3.117.0.0 2008.12.25 PossibleThreat
GData 19 2008.12.25 Trojan.Vundo.GDI
Ikarus T3.1.1.45.0 2008.12.25 -
K7AntiVirus 7.10.564 2008.12.24 -
Kaspersky 7.0.0.125 2008.12.25 -
McAfee 5474 2008.12.24 -
McAfee+Artemis 5474 2008.12.24 -
Microsoft 1.4205 2008.12.25 Trojan:Win32/Vundo.gen!G
NOD32 3716 2008.12.24 Win32/Adware.Virtumonde
Norman 5.80.02 2008.12.24 W32/Virtumonde.AIEE
Panda 9.0.0.4 2008.12.24 -
PCTools 4.4.2.0 2008.12.24 -
Prevx1 V2 2008.12.25 Fraudulent Security Program
Rising 21.09.31.00 2008.12.25 Trojan.Win32.Undef.uxs
SecureWeb-Gateway 6.7.6 2008.12.24 -
Sophos 4.37.0 2008.12.25 Troj/Virtum-Gen
Sunbelt 3.2.1809.2 2008.12.22 -
Symantec 10 2008.12.25 Trojan.Vundo
TheHacker 6.3.1.4.199 2008.12.23 -
TrendMicro 8.700.0.1004 2008.12.25 -
VBA32 3.12.8.10 2008.12.24 -
ViRobot 2008.12.24.1534 2008.12.24 -
VirusBuster 4.5.11.0 2008.12.24 -
weitere Informationen
File size: 94780 bytes
MD5...: 484684c7e6da41a3ad3ecd2e75b0f630
SHA1..: a086f494e7531a111dee8295be921a10112abcf4
SHA256: 1143531fa8c552b784d3ecddf308500bf31efe463ff98a5b063cbe96d3a5bd2b
SHA512: f20a9f57561852c97546bd114f017a74bf0c086a8710253703cafb00e0a1dc37b535150fd937d647267e63f6ce553ffac422530288ac16ad2bdb5af3ccd9b582
ssdeep: 1536:WIcRyBIy6dotWoXGTaIm4e87acO5vORRSFEpIY1Zb/LfYABoL7zZn:ORZ8WoX2aIm4PfYOREFqIAuLPZn
PEiD..: -
TrID..: File type identificationWin32 Executable Generic (51.3%)Win16/32 Executable Delphi generic (12.4%)Clipper DOS Executable (12.1%)Generic Win/DOS Executable (12.0%)DOS Executable Generic (12.0%)
PEInfo: PE Structure information( base data )entrypointaddress.: 0x100051e3timedatestamp.....: 0x17dacc27 (Tue Sep 07 02:51:19 1982)machinetype.......: 0x14c (I386)( 3 sections )name viradd virsiz rawdsiz ntrpy md5.text 0x1000 0x6000 0x4e00 6.80 24b345e494559b4d3a98b8e5438036c4.rdata 0x7000 0x12000 0x11600 7.99 e96b8cedd51bdcaf20e2de908942cc79.data 0x19000 0xa000 0x600 2.73 ae942720f65c09e5c58ddb98e91b9c81( 4 imports ) > MSVCRT.DLL: _errno, __setusermatherr, __CxxFrameHandler, _controlfp, _XcptFilter> GDI32.DLL: DeleteDC, SaveDC, TextOutW, DeleteObject, SelectPalette, ExtTextOutW> msvcrt.dll: __p__fmode, __1type_info@@UAE@XZ, _c_exit, __getmainargs, wcslen> KERNEL32.DLL: CreateThread, VirtualAlloc, lstrcmpW, LocalReAlloc, CloseHandle, LoadLibraryW, ExitProcess, WaitForSingleObject, GlobalReAlloc, GetCommandLineA, LocalAlloc, CreateEventW, GetStartupInfoA, WriteProfileStringW( 0 exports )
Prevx info: <a href='http://info.prevx.com/aboutprogramtext.asp?PX5=1C267DD33CA14FEB7249015467D6830019EA3708' target='_blank'>http://info.prevx.com/aboutprogramtext.asp?PX5=1C267DD33CA14FEB7249015467D6830019EA3708</a> hogumana: Code:
Datei hogumana.dll empfangen 2008.12.25 08:11:01 (CET)
Status: Beendet
Ergebnis: 7/39 (17.95%)
Filter
Drucken der Ergebnisse
Email:
Antivirus Version letzte aktualisierung Ergebnis
a-squared 4.0.0.73 2008.12.25 -
AhnLab-V3 2008.12.25.0 2008.12.25 -
AntiVir 7.9.0.45 2008.12.24 -
Authentium 5.1.0.4 2008.12.25 -
Avast 4.8.1281.0 2008.12.24 -
AVG 8.0.0.199 2008.12.24 -
BitDefender 7.2 2008.12.25 -
CAT-QuickHeal 10.00 2008.12.24 -
ClamAV 0.94.1 2008.12.24 -
Comodo 809 2008.12.24 -
DrWeb 4.44.0.09170 2008.12.25 -
eSafe 7.0.17.0 2008.12.24 Suspicious File
eTrust-Vet 31.6.6276 2008.12.24 -
Ewido 4.0 2008.12.24 -
F-Prot 4.4.4.56 2008.12.24 -
F-Secure 8.0.14332.0 2008.12.25 -
Fortinet 3.117.0.0 2008.12.25 -
GData 19 2008.12.25 -
Ikarus T3.1.1.45.0 2008.12.25 -
K7AntiVirus 7.10.564 2008.12.24 -
Kaspersky 7.0.0.125 2008.12.25 -
McAfee 5474 2008.12.24 -
McAfee+Artemis 5474 2008.12.24 -
Microsoft 1.4205 2008.12.25 Trojan:Win32/Vundo.gen!AH
NOD32 3716 2008.12.24 -
Norman 5.80.02 2008.12.24 -
Panda 9.0.0.4 2008.12.24 Suspicious file
PCTools 4.4.2.0 2008.12.24 -
Prevx1 V2 2008.12.25 Fraudulent Security Program
Rising 21.09.31.00 2008.12.25 Trojan.DL.Win32.Undef.ctm
SecureWeb-Gateway 6.7.6 2008.12.24 -
Sophos 4.37.0 2008.12.25 Troj/Virtum-Gen
Sunbelt 3.2.1809.2 2008.12.22 -
Symantec 10 2008.12.25 Trojan.Vundo
TheHacker 6.3.1.4.199 2008.12.23 -
TrendMicro 8.700.0.1004 2008.12.25 -
VBA32 3.12.8.10 2008.12.24 -
ViRobot 2008.12.24.1534 2008.12.24 -
VirusBuster 4.5.11.0 2008.12.24 -
weitere Informationen
File size: 65284 bytes
MD5...: 65f72043e8001668721cb10dd87a0517
SHA1..: 1da2dbc8c7371991861736b1ac798e9471e81ae0
SHA256: fd3389a5329112cc46816ea429c45147a315575071d219982b91f1060cb114ce
SHA512: a4072a8f9c61c36380f9f7504076edbeafb8d4b85ff6a92ce8112ef0538e7b5a60b4e2e56e2d57049c9a47dd18123efdf91ff7809b2c72c8de1e240dccc4751e
ssdeep: 1536:hg1vEWupSRmfnikKyBpuorQnMEb3nOqE5Z40VM:heju4Rm6kKqhO3njE5Z4YM
PEiD..: -
TrID..: File type identificationWin32 Executable Generic (58.6%)Clipper DOS Executable (13.8%)Generic Win/DOS Executable (13.7%)DOS Executable Generic (13.7%)
PEInfo: PE Structure information( base data )entrypointaddress.: 0x100059fbtimedatestamp.....: 0x45faf4ab (Fri Mar 16 19:48:59 2007)machinetype.......: 0x14c (I386)( 3 sections )name viradd virsiz rawdsiz ntrpy md5CODE 0x1000 0x7000 0x5200 6.89 e79e3bf814fb5098c38182c61ed3840d.data 0x8000 0xa000 0x9200 7.97 64e14db8248b387ddd5287df72a8f957DATA 0x12000 0xb000 0xa00 3.09 d314603be7438f557d60b04fc06baff2( 3 imports ) > USER32.DLL: SetWindowLongW, CheckMenuRadioItem, GetClientRect, SetWindowTextW, DestroyWindow, RegisterClassExW, GetDesktopWindow, ScreenToClient, TrackPopupMenuEx, CheckDlgButton, MapWindowPoints, CheckMenuItem, DispatchMessageW, LoadMenuW, TranslateMessage, DefWindowProcW, CreateWindowExW, IsChild, DestroyMenu, GetWindowRect, CharNextA, MessageBoxW, OpenClipboard, LoadIconW, GetClipboardData, CreateDialogParamW, CharNextW, EnableMenuItem, GetSysColor> MSVCRT.DLL: __CxxFrameHandler, __setusermatherr, exit, toupper, _terminate@@YAXXZ, _errno, wcslen, _exit, _initterm, _acmdln, __1type_info@@UAE@XZ, _wcsrev, __p__fmode, wcsspn, _adjust_fdiv, __3@YAXPAX@Z, __getmainargs, _CxxThrowException, wcschr> KERNEL32.DLL: Sleep, LocalReAlloc, lstrcpynW, GlobalFree, GetProcAddress, lstrcmpW, LocalAlloc, GetModuleHandleA, lstrcpyW, VirtualAlloc, ExitProcess, GetStartupInfoA, ResetEvent, GetProfileStringW( 0 exports )
Prevx info: <a href='http://info.prevx.com/aboutprogramtext.asp?PX5=2926DCFA0460C09CFFA100EA47CEFA002DE5FE5A' target='_blank'>http://info.prevx.com/aboutprogramtext.asp?PX5=2926DCFA0460C09CFFA100EA47CEFA002DE5FE5A</a>
honayoto: Code:
Datei honayoto.dll empfangen 2008.12.25 08:13:12 (CET)
Status: Beendet
Ergebnis: 6/39 (15.39%)
Filter
Drucken der Ergebnisse
Email:
Antivirus Version letzte aktualisierung Ergebnis
a-squared 4.0.0.73 2008.12.25 -
AhnLab-V3 2008.12.25.0 2008.12.25 -
AntiVir 7.9.0.45 2008.12.24 -
Authentium 5.1.0.4 2008.12.25 -
Avast 4.8.1281.0 2008.12.24 -
AVG 8.0.0.199 2008.12.24 -
BitDefender 7.2 2008.12.25 -
CAT-QuickHeal 10.00 2008.12.24 -
ClamAV 0.94.1 2008.12.24 -
Comodo 809 2008.12.24 -
DrWeb 4.44.0.09170 2008.12.25 -
eSafe 7.0.17.0 2008.12.24 Suspicious File
eTrust-Vet 31.6.6276 2008.12.24 -
Ewido 4.0 2008.12.24 -
F-Prot 4.4.4.56 2008.12.24 -
F-Secure 8.0.14332.0 2008.12.25 -
Fortinet 3.117.0.0 2008.12.25 -
GData 19 2008.12.25 -
Ikarus T3.1.1.45.0 2008.12.25 -
K7AntiVirus 7.10.564 2008.12.24 -
Kaspersky 7.0.0.125 2008.12.25 -
McAfee 5474 2008.12.24 -
McAfee+Artemis 5474 2008.12.24 -
Microsoft 1.4205 2008.12.25 Trojan:Win32/Vundo.gen!G
NOD32 3716 2008.12.24 -
Norman 5.80.02 2008.12.24 -
Panda 9.0.0.4 2008.12.24 -
PCTools 4.4.2.0 2008.12.24 -
Prevx1 V2 2008.12.25 Fraudulent Security Program
Rising 21.09.31.00 2008.12.25 Trojan.DL.Win32.Undef.ctg
SecureWeb-Gateway 6.7.6 2008.12.24 -
Sophos 4.37.0 2008.12.25 Troj/Virtum-Gen
Sunbelt 3.2.1809.2 2008.12.22 -
Symantec 10 2008.12.25 Trojan.Vundo
TheHacker 6.3.1.4.199 2008.12.23 -
TrendMicro 8.700.0.1004 2008.12.25 -
VBA32 3.12.8.10 2008.12.24 -
ViRobot 2008.12.24.1534 2008.12.24 -
VirusBuster 4.5.11.0 2008.12.24 -
weitere Informationen
File size: 99552 bytes
MD5...: 3bf3bfd38d6784fd893a2d66ac9a6a6a
SHA1..: 2132d33f834b9856a0855aa9aa7b0862b9f42dd6
SHA256: 9041a63aaff8d1382ddfd4590d3c138ee964239408095413a1f140ffbfa9aefa
SHA512: 20fcbe2151bf4aa0c4ab0ce7757f2d1069bc00a696ad50caaf69691e923173c73801d761614234880ac0c4b7cafce40d60310dccc4f34d50efc09a325b566810
ssdeep: 1536:TKF4OpaKKpGAGVk39sUn1oOD3jNsAR3az1wFtXAfX3HiqzKtBWxNUSBkdX++9T:TKF4OuWV67DD3jejf3Hic8B0j6T
PEiD..: -
TrID..: File type identificationWin32 Executable Generic (58.5%)Clipper DOS Executable (13.8%)Generic Win/DOS Executable (13.7%)DOS Executable Generic (13.7%)Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
PEInfo: PE Structure information( base data )entrypointaddress.: 0x10005944timedatestamp.....: 0x43f8b42a (Sun Feb 19 18:08:42 2006)machinetype.......: 0x14c (I386)( 3 sections )name viradd virsiz rawdsiz ntrpy md5CODE 0x1000 0x6000 0x5400 6.83 ac5fb8584f99de3edfc6370f0ca0ddde.data 0x7000 0x12000 0x11600 7.99 522fef6adb597d769e2908b233d57134DATA 0x19000 0xa000 0xa00 3.50 54c93a24f0a9438a1f94bf954b6638c1( 5 imports ) > KERNEL32.DLL: GetProfileStringW, ExitProcess, GetProfileIntW, VirtualAlloc, WriteProfileStringW, CloseHandle, GetStartupInfoW, GetCommandLineW, GetModuleHandleA> MSVCRT.DLL: _wcsrev, _c_exit, _terminate@@YAXXZ, __p__fmode, wcsspn, _XcptFilter, free, _exit, _errno, __p__commode> USER32.DLL: EnableWindow, SetDlgItemInt, DialogBoxParamW, GetClipboardData, TrackPopupMenuEx, DestroyMenu, SystemParametersInfoW, TranslateAcceleratorW, CharNextA, SetTimer, GetMenu, CallWindowProcW, GetMessageW, CheckMenuRadioItem, CheckMenuItem, IsDialogMessageW, GetClientRect, MapWindowPoints, ScreenToClient, CreateDialogParamW, EnableMenuItem, CheckDlgButton, RegisterClassExW, SetDlgItemTextW, DefWindowProcW, LoadStringW, GetDesktopWindow, PostQuitMessage, CreateWindowExW, SetCaretBlinkTime, CloseClipboard, GetSysColorBrush, ChildWindowFromPoint, CharNextW> gdi32.dll: GetTextMetricsW, BitBlt, RestoreDC, CreateFontIndirectW, GetTextExtentPoint32W, RealizePalette, SelectObject> msvcrt.dll: wcslen, _except_handler3, __set_app_type, _controlfp, __1type_info@@UAE@XZ, __3@YAXPAX@Z, exit( 0 exports )
Prevx info: <a href='http://info.prevx.com/aboutprogramtext.asp?PX5=94D0C56FE0C921528485018C699D38008463F605' target='_blank'>http://info.prevx.com/aboutprogramtext.asp?PX5=94D0C56FE0C921528485018C699D38008463F605</a> gozogipa Code:
Datei gozogipa empfangen 2008.12.25 08:15:40 (CET)
Status: Beendet
Ergebnis: 0/39 (0%)
Filter
Drucken der Ergebnisse
Email:
Antivirus Version letzte aktualisierung Ergebnis
a-squared 4.0.0.73 2008.12.25 -
AhnLab-V3 2008.12.25.0 2008.12.25 -
AntiVir 7.9.0.45 2008.12.24 -
Authentium 5.1.0.4 2008.12.25 -
Avast 4.8.1281.0 2008.12.24 -
AVG 8.0.0.199 2008.12.24 -
BitDefender 7.2 2008.12.25 -
CAT-QuickHeal 10.00 2008.12.24 -
ClamAV 0.94.1 2008.12.24 -
Comodo 809 2008.12.24 -
DrWeb 4.44.0.09170 2008.12.25 -
eSafe 7.0.17.0 2008.12.24 -
eTrust-Vet 31.6.6276 2008.12.24 -
Ewido 4.0 2008.12.24 -
F-Prot 4.4.4.56 2008.12.24 -
F-Secure 8.0.14332.0 2008.12.25 -
Fortinet 3.117.0.0 2008.12.25 -
GData 19 2008.12.25 -
Ikarus T3.1.1.45.0 2008.12.25 -
K7AntiVirus 7.10.564 2008.12.24 -
Kaspersky 7.0.0.125 2008.12.25 -
McAfee 5474 2008.12.24 -
McAfee+Artemis 5474 2008.12.24 -
Microsoft 1.4205 2008.12.25 -
NOD32 3716 2008.12.24 -
Norman 5.80.02 2008.12.24 -
Panda 9.0.0.4 2008.12.24 -
PCTools 4.4.2.0 2008.12.24 -
Prevx1 V2 2008.12.25 -
Rising 21.09.31.00 2008.12.25 -
SecureWeb-Gateway 6.7.6 2008.12.24 -
Sophos 4.37.0 2008.12.25 -
Sunbelt 3.2.1809.2 2008.12.22 -
Symantec 10 2008.12.25 -
TheHacker 6.3.1.4.199 2008.12.23 -
TrendMicro 8.700.0.1004 2008.12.25 -
VBA32 3.12.8.10 2008.12.24 -
ViRobot 2008.12.24.1534 2008.12.24 -
VirusBuster 4.5.11.0 2008.12.24 -
weitere Informationen
File size: 6456 bytes
MD5...: bffda2ecdace0b6948e256d895963b0d
SHA1..: 25c3052b1bdf18aa0dd9eea36631056f8697e9a8
SHA256: 17f3f735122293b29934525e8b3494f5da1af8a188f98b72a74e7932d013a439
SHA512: 96c7aeee212a532f009166728c209dcf57a92176c575bcf47ebaecc0345c48f6efbd31fab1e54b2f2ab299c2a59365e48cea116e08bc404c320a3154b0fc144a
ssdeep: 192:Dx0cXvgWmqQQna8+Ls2JmhbB7oGxKRCPMFOooz8N:DKcXvad4RFb+Kz8N
PEiD..: -
TrID..: File type identificationUnknown!
PEInfo: -
..so.. nächster schritt ist dann blacklight und malwarebytes.
:balla: |