本帖最后由 sam.to 于 2010.9.13 17:02 编辑
56f2dd07e9857aa4876e8d1376a81d4e 1.Video.Converter.5.2.29.Crack.45231.exe8
a63bf206bba708f6a12efe58d9bf31ec 1.Video.Converter.5.2.29.Keygen.45231.exe8
0dff077c8cb2e418db431fab8c040ad5 LogoMaker.3.0.Crack.45231.exe8
9697578cbb762ada9e64ab1ea5610a3f LogoMaker.3.0.Keygen.45231.exe8
32787ebef63e5cce706b256c262ade0e MPEG4.Direct.Maker.6.3.0.220.Crack.45231.exe8
91b6d1057609fcba2f1f3d9892ab3470 MPEG4.Direct.Maker.6.3.0.220.Keygen.45231.exe8
c4d58060c725304458890abb098ebbbe Natura.Sound.Therapy.3.0.Crack.45231.exe8
5a480913c4e1e0311af211348a3ccc73 Natura.Sound.Therapy.3.0.Keygen.45231.exe8
d87185f2d4c981201a39b053c58117cd Power.Video.Converter.2.2.18.Crack.45231.exe8
93ed7cab06c17dd0e0090b9e31ef9864 Power.Video.Converter.2.2.18.Keygen.45231.exe8
46281fbfcddf6dc087d3f7e40d5ab89e Sun.River.Systems.Heatseek.Gold.1.4.2.0.Crack.45231.exe8
ad431de95b086fc5e68f7d54e11a757e Sun.River.Systems.Heatseek.Gold.1.4.2.0.Keygen.45231.exe8
to kl,ll,mcafee,comodo,avira
File ID | Filename | Size (Byte) | Result | 25880699 | 765735-138.rar | 100.76 KB | OK | A listing of files contained inside archives alongside their results can be found below:
File ID | Filename | Size (Byte) | Result | 25880700 | 1.Video.Converte...31.exe8 | 167.5 KB | UNDER ANALYSIS | 25880701 | 1.Video.Converte...31.exe8 | 167.5 KB | UNDER ANALYSIS | 25880702 | LogoMaker.3.0.Cr...31.exe8 | 167.5 KB | UNDER ANALYSIS | 25880703 | LogoMaker.3.0.Ke...31.exe8 | 167.5 KB | UNDER ANALYSIS | 25880704 | MPEG4.Direct.Mak...31.exe8 | 167.5 KB | UNDER ANALYSIS | 25880705 | MPEG4.Direct.Mak...31.exe8 | 167.5 KB | UNDER ANALYSIS | 25880706 | Natura.Sound.The...31.exe8 | 167.5 KB | UNDER ANALYSIS | 25880707 | Natura.Sound.The...31.exe8 | 167.5 KB | UNDER ANALYSIS | 25880708 | Power.Video.Conv...31.exe8 | 167.5 KB | UNDER ANALYSIS | 25880709 | Power.Video.Conv...31.exe8 | 167.5 KB | UNDER ANALYSIS | 25880710 | Sun.River.System...31.exe8 | 167.5 KB | UNDER ANALYSIS | 25880711 | Sun.River.System...31.exe8 | 167.5 KB | UNDER ANALYSIS |
Please find a detailed report concerning each individual sample below: Filename | Result | 1.Video.Converte...31.exe8 | MALWARE |
The file '1.Video.Converter.5.2.29.Crack.45231.exe8' has been determined to be 'MALWARE'.
Our analysts named the threat TR/Dldr.FakeAV.BJ.The term "TR/" denotes a trojan horse that is able to spy out data, to violate your privacy or carry out unwanted modifications to the system.Detection will be added to our virus definition file (VDF) with one of the next updates.
Filename | Result | 1.Video.Converte...31.exe8 | MALWARE |
The file '1.Video.Converter.5.2.29.Keygen.45231.exe8' has been determined to be 'MALWARE'.
Our analysts named the threat TR/Dldr.FakeAV.BJ.The term "TR/" denotes a trojan horse that is able to spy out data, to violate your privacy or carry out unwanted modifications to the system.Detection will be added to our virus definition file (VDF) with one of the next updates.
Filename | Result | LogoMaker.3.0.Cr...31.exe8 | MALWARE |
The file 'LogoMaker.3.0.Crack.45231.exe8' has been determined to be 'MALWARE'.
Our analysts named the threat TR/Dldr.FakeAV.BJ.The term "TR/" denotes a trojan horse that is able to spy out data, to violate your privacy or carry out unwanted modifications to the system.Detection will be added to our virus definition file (VDF) with one of the next updates.
Filename | Result | LogoMaker.3.0.Ke...31.exe8 | MALWARE |
The file 'LogoMaker.3.0.Keygen.45231.exe8' has been determined to be 'MALWARE'.
Our analysts named the threat TR/Dldr.FakeAV.BJ.The term "TR/" denotes a trojan horse that is able to spy out data, to violate your privacy or carry out unwanted modifications to the system.Detection will be added to our virus definition file (VDF) with one of the next updates.
Filename | Result | MPEG4.Direct.Mak...31.exe8 | MALWARE |
The file 'MPEG4.Direct.Maker.6.3.0.220.Crack.45231.exe8' has been determined to be 'MALWARE'.
Our analysts named the threat TR/Dldr.FakeAV.BJ.The term "TR/" denotes a trojan horse that is able to spy out data, to violate your privacy or carry out unwanted modifications to the system.Detection will be added to our virus definition file (VDF) with one of the next updates.
Filename | Result | MPEG4.Direct.Mak...31.exe8 | MALWARE |
The file 'MPEG4.Direct.Maker.6.3.0.220.Keygen.45231.exe8' has been determined to be 'MALWARE'.
Our analysts named the threat TR/Dldr.FakeAV.BJ.The term "TR/" denotes a trojan horse that is able to spy out data, to violate your privacy or carry out unwanted modifications to the system.Detection will be added to our virus definition file (VDF) with one of the next updates.
Filename | Result | Natura.Sound.The...31.exe8 | MALWARE |
The file 'Natura.Sound.Therapy.3.0.Crack.45231.exe8' has been determined to be 'MALWARE'.
Our analysts named the threat TR/Dldr.FakeAV.BJ.The term "TR/" denotes a trojan horse that is able to spy out data, to violate your privacy or carry out unwanted modifications to the system.Detection will be added to our virus definition file (VDF) with one of the next updates.
Filename | Result | Natura.Sound.The...31.exe8 | MALWARE |
The file 'Natura.Sound.Therapy.3.0.Keygen.45231.exe8' has been determined to be 'MALWARE'.
Our analysts named the threat TR/Dldr.FakeAV.BJ.The term "TR/" denotes a trojan horse that is able to spy out data, to violate your privacy or carry out unwanted modifications to the system.Detection will be added to our virus definition file (VDF) with one of the next updates.
Filename | Result | Power.Video.Conv...31.exe8 | MALWARE |
The file 'Power.Video.Converter.2.2.18.Crack.45231.exe8' has been determined to be 'MALWARE'.
Our analysts named the threat TR/Dldr.FakeAV.BJ.The term "TR/" denotes a trojan horse that is able to spy out data, to violate your privacy or carry out unwanted modifications to the system.Detection will be added to our virus definition file (VDF) with one of the next updates.
Filename | Result | Power.Video.Conv...31.exe8 | MALWARE |
The file 'Power.Video.Converter.2.2.18.Keygen.45231.exe8' has been determined to be 'MALWARE'.
Our analysts named the threat TR/Dldr.FakeAV.BJ.The term "TR/" denotes a trojan horse that is able to spy out data, to violate your privacy or carry out unwanted modifications to the system.Detection will be added to our virus definition file (VDF) with one of the next updates.
Filename | Result | Sun.River.System...31.exe8 | MALWARE |
The file 'Sun.River.Systems.Heatseek.Gold.1.4.2.0.Crack.45231.exe8' has been determined to be 'MALWARE'.
Our analysts named the threat TR/Dldr.FakeAV.BJ.The term "TR/" denotes a trojan horse that is able to spy out data, to violate your privacy or carry out unwanted modifications to the system.Detection will be added to our virus definition file (VDF) with one of the next updates.
Filename | Result | Sun.River.System...31.exe8 | MALWARE |
The file 'Sun.River.Systems.Heatseek.Gold.1.4.2.0.Keygen.45231.exe8' has been determined to be 'MALWARE'.
Our analysts named the threat TR/Dldr.FakeAV.BJ.The term "TR/" denotes a trojan horse that is able to spy out data, to violate your privacy or carry out unwanted modifications to the system.Detection will be added to our virus definition file (VDF) with one of the next updates.
|