CREDIT
SEANTERO
PASSWORD
SEANTEROISTHEBEST
NB:WINMODE BUKAN UNTUK GB
WINMODE KHUSUS UNTUK
OP.WARNET
NB :
[-]Kalo Bugtrap Gunakan Metode FD[-]
Download
Download Now
VIRUS TOTAL
Antivirus | Version | Last Update | Result |
---|---|---|---|
AhnLab-V3 | 2011.06.01.01 | 2011.06.01 | - |
AntiVir | 7.11.8.217 | 2011.06.01 | TR/Black.Gen2 |
Antiy-AVL | 2.0.3.7 | 2011.06.01 | - |
Avast | 4.8.1351.0 | 2011.06.01 | - |
Avast5 | 5.0.677.0 | 2011.06.01 | - |
AVG | 10.0.0.1190 | 2011.06.01 | Fat-Obfuscated |
BitDefender | 7.2 | 2011.06.01 | Gen:Trojan.Heur.VP.tC0@aiz7e7fi |
CAT-QuickHeal | 11.00 | 2011.06.01 | (Suspicious) - DNAScan |
ClamAV | 0.97.0.0 | 2011.06.01 | - |
Commtouch | 5.3.2.6 | 2011.06.01 | W32/SuspPack.BB.gen!Eldorado |
Comodo | 8910 | 2011.06.01 | - |
eSafe | 7.0.17.0 | 2011.05.31 | - |
eTrust-Vet | 36.1.8360 | 2011.06.01 | - |
F-Prot | 4.6.2.117 | 2011.05.31 | W32/SuspPack.BB.gen!Eldorado |
F-Secure | 9.0.16440.0 | 2011.06.01 | Gen:Trojan.Heur.VP.tC0@aiz7e7fi |
Fortinet | 4.2.257.0 | 2011.06.01 | - |
GData | 22 | 2011.06.01 | Gen:Trojan.Heur.VP.tC0@aiz7e7fi |
Ikarus | T3.1.1.104.0 | 2011.06.01 | Virus.Fat.Obfuscated |
Jiangmin | 13.0.900 | 2011.05.30 | - |
K7AntiVirus | 9.104.4745 | 2011.05.31 | Riskware |
Kaspersky | 9.0.0.837 | 2011.06.01 | HEUR:Trojan.Win32.Generic |
McAfee | 5.400.0.1158 | 2011.06.01 | - |
McAfee-GW-Edition | 2010.1D | 2011.06.01 | - |
Microsoft | 1.6903 | 2011.06.01 | VirTool:Win32/Obfuscator.XZ |
NOD32 | 6170 | 2011.06.01 | a variant of Win32/Packed.VMProtect.AAD |
Norman | 6.07.07 | 2011.05.31 | - |
nProtect | 2011-06-01.01 | 2011.06.01 | - |
Panda | 10.0.3.5 | 2011.05.31 | - |
PCTools | 7.0.3.5 | 2011.05.19 | HeurEngine.Vmpbad |
Prevx | 3.0 | 2011.06.01 | - |
Rising | 23.60.02.03 | 2011.06.01 | Trojan.Win32.VUNDO.biz |
Sophos | 4.65.0 | 2011.06.01 | Mal/Behav-363 |
SUPERAntiSpyware | 4.40.0.1006 | 2011.06.01 | - |
Symantec | 20111.1.0.186 | 2011.06.01 | Packed.Vmpbad!gen2 |
TheHacker | 6.7.0.1.215 | 2011.05.31 | - |
TrendMicro | 9.200.0.1012 | 2011.06.01 | - |
TrendMicro-HouseCall | 9.200.0.1012 | 2011.06.01 | - |
VBA32 | 3.12.16.0 | 2011.05.31 | - |
VIPRE | 9452 | 2011.06.01 | - |
ViRobot | 2011.6.1.4490 | 2011.06.01 | - |
VirusBuster | 14.0.60.0 | 2011.06.01 | Trojan.Zegost.Gen!Pac.8 |
Additional information |
---|
MD5 : 7a1246b9b5c454b4b73d7f99bda8e64e |
SHA1 : df49d8b7c987b6a89869570f3a70b10892d3a871 |
SHA256: 7232272f97c9cb4b53643ae07b0775cbfad238c027ae1848d59f84afcbfda492 |
ssdeep: 24576:KnJ84+cRMpCIUjnN+lFUWVzmxLryWhDgQEP+oVNkDXrZBsX52yeypObwslnHj8tE:KJV+ cRe6nVWloLrZh8Qros/Psp2GOb/R |
File size : 1527571 bytes |
First seen: 2011-06-01 11:23:33 |
Last seen : 2011-06-01 11:23:33 |
Magic: PE32 executable for MS Windows (GUI) Intel 80386 32-bit |
TrID: WinRAR Self Extracting archive (96.2%) Win32 Executable Generic (1.5%) Win32 Dynamic Link Library (generic) (1.4%) Generic Win/DOS Executable (0.3%) DOS Executable Generic (0.3%) |
sigcheck: publisher....: n/a copyright....: n/a product......: n/a description..: n/a original name: n/a internal name: n/a file version.: n/a comments.....: n/a signers......: - signing date.: - verified.....: Unsigned |
PEiD: - |
packers (F-Prot): RAR |
PEInfo: PE structure information [[ basic data ]] entrypointaddress: 0x1000 timedatestamp....: 0x43463A52 (Fri Oct 07 09:05:22 2005) machinetype......: 0x14C (Intel I386) [[ 4 section(s) ]] name, viradd, virsiz, rawdsiz, ntropy, md5 .text, 0x1000, 0x13000, 0x12600, 6.46, bcefd13d879b5aa1628d5731462b1935 .data, 0x14000, 0x7000, 0xA00, 4.73, 0eb9af4768d13f3fe805922a21fcbf55 .idata, 0x1B000, 0x1000, 0x1000, 5.02, 7f9440e32acb299f3bda96288136b63a .rsrc, 0x1C000, 0x16B54, 0x16C00, 5.72, 4c3663437786c3384268a65bf9f33e4c [[ 8 import(s) ]] advapi32.dll: AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, RegCloseKey, RegCreateKeyExA, RegOpenKeyExA, RegQueryValueExA, RegSetValueExA, SetFileSecurityA, SetFileSecurityW comctl32.dll: - comdlg32.dll: CommDlgExtendedError, GetOpenFileNameA gdi32.dll: DeleteObject kernel32.dll: CloseHandle, CompareStringA, CreateDirectoryA, CreateDirectoryW, CreateFileA, CreateFileW, DeleteFileA, DeleteFileW, DosDateTimeToFileTime, ExitProcess, ExpandEnvironmentStringsA, FileTimeToLocalFileTime, FileTimeToSystemTime, FindClose, FindFirstFileA, FindFirstFileW, FindNextFileA, FindNextFileW, FindResourceA, FreeLibrary, GetCPInfo, GetCommandLineA, GetCurrentDirectoryA, GetCurrentProcess, GetDateFormatA, GetFileAttributesA, GetFileAttributesW, GetFileType, GetFullPathNameA, GetLastError, GetLocaleInfoA, GetModuleFileNameA, GetModuleHandleA, GetNumberFormatA, GetProcAddress, GetProcessHeap, GetStdHandle, GetTempPathA, GetTickCount, GetTimeFormatA, GetVersionExA, GlobalAlloc, HeapAlloc, HeapFree, HeapReAlloc, IsDBCSLeadByte, LoadLibraryA, LocalFileTimeToFileTime, MoveFileA, MoveFileExA, MultiByteToWideChar, ReadFile, SetCurrentDirectoryA, SetEndOfFile, SetEnvironmentVariableA, SetFileAttributesA, SetFileAttributesW, SetFilePointer, SetFileTime, SetLastError, Sleep, SystemTimeToFileTime, WaitForSingleObject, WideCharToMultiByte, WriteFile, lstrcmpiA, lstrlenA ole32.dll: CLSIDFromString, CoCreateInstance, CreateStreamOnHGlobal, OleInitialize, OleUninitialize shell32.dll: SHBrowseForFolderA, SHChangeNotify, SHFileOperationA, SHGetFileInfoA, SHGetMalloc, SHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA user32.dll: CharToOemBuffA, CharUpperA, CopyRect, CreateWindowExA, DefWindowProcA, DestroyIcon, DestroyWindow, DialogBoxParamA, DispatchMessageA, EnableWindow, EndDialog, FindWindowExA, GetClassNameA, GetClientRect, GetDlgItem, GetDlgItemTextA, GetMessageA, GetParent, GetSysColor, GetSystemMetrics, GetWindow, GetWindowLongA, GetWindowRect, GetWindowTextA, IsWindow, IsWindowVisible, LoadBitmapA, LoadCursorA, LoadIconA, LoadStringA, MapWindowPoints, MessageBoxA, OemToCharA, OemToCharBuffA, PeekMessageA, PostMessageA, RegisterClassExA, SendDlgItemMessageA, SendMessageA, SetDlgItemTextA, SetFocus, SetMenu, SetWindowLongA, SetWindowPos, SetWindowTextA, ShowWindow, TranslateMessage, UpdateWindow, WaitForInputIdle, wsprintfA, wvsprintfA |
Androguard: - |
ExifTool: file metadata CodeSize: 77824 EntryPoint: 0x1000 FileSize: 1492 kB FileType: Win32 EXE ImageVersion: 0.0 InitializedDataSize: 99840 LinkerVersion: 5.0 MIMEType: application/octet-stream MachineType: Intel 386 or later, and compatibles OSVersion: 4.0 PEType: PE32 Subsystem: Windows GUI SubsystemVersion: 4.0 TimeStamp: 2005:10:07 11:05:22+02:00 UninitializedDataSize: 0 |
Symantec reputation:Suspicious.Insight |
cheat point blank 01 juni 2011, cheat PB 01 juni 2011 , cit PB 01-06-2011, cheat point blank, cheat point blank 01 juni, cheat point blank 01 juni 2011 terbaru, cheat one hit point blank 01 juni 2011, cit pb 01 juni 2011, cheat update 01062011, cheat point blank 01, cheat point blank 01062011, web 1 hit point blank 01 juni, n3 01 junii, download cheat pb 01 juni 2011 update, donwload cheat pb 01 juni 2011, cheat point blank 01-06-2011, cheat point blank terbaru, cit point blank 01-06-2011, cheat terbaru 01 juni 2011, cheat point blank 01 juni, 1 HIT 01062011, cara gunakan cheat PB 01-06-2011, Cheat 1 hit Dual kirss 01 juni 2011, cheat 1 hit point blank, cheat 1 hit point blank 01 juni, cheat 01 juni, cheat 01 juni 2011, Cheat kriss point blank 01 juni 2011, cheat one hit pb 01 juni 2011 blog, cheat pb, cheat pb 1 hit 01062011, cheat pb 01 juni, cheat pb 01-06-2011, cheat pb terbaru 01 juni 2011 , cheat pb update 01 juni 2011,gemscool
No comments:
Post a Comment
Mohon komentarnya gan, jangan lupa di share juga ke Facebook