
I suggest running this In a controlled environment.By danny gomez, July 21, in Tools. You can see a significant difference In detection between my scanand the one above. Where applicable, always scan the executable rather than the archive. As a friendly heads-up, In compliance with forum rulesall files personally uploaded and contributed must accompany an online virus scan report. This post was last modified:AM by VirusPolice. Only a fool would take anything posted here as fact. October 7, October 7, - by blankhack - Leave a Comment.Login Register Remember me Lost Password? The stories and information posted here are artistic works of fiction and falsehood. Tip: Click an analysed process below to view more details.October 7, January 15, July 27, September 3, July 27, April 15, July 27, August 21, July 28, September 28, September 28, August 25, August 25, July 17, July 17, June 25, July 27, June 23, July 27, May 14, July 27, May 20, August 9, May 17, August 9, March 3, July 27, May 27, August 5, April 18, August 28, April 14, May 22, February 13, May 23, May 22, August 11, February 13, February 13, May 26, June 28, July 28, June 26, July 28, June 12, July 29, Skip to content Malicious Software. Classification TrID EXE Win32 Executable generic File Imports mscoree. Persistence Writes data to a remote process Fingerprint Reads the active computer name Reads the cryptographic machine GUID Evasive Tries to sleep for a long time more than two minutes Spreading Opens the MountPointManager often used to detect additional infection locations Network Behavior Contacts 12 domains and 8 hosts. External Reports VirusTotal Metadefender. Loading content, please wait Analysed 3 processes in total System Resource Monitor. Get your own cloud service or the full version to view all details. Not all malicious and suspicious indicators are displayed. Please note that by continuing to use this site you consent to the terms of our Data Protection Policy. Sign In Sign Up.This website uses cookies to enhance your browsing experience. Posted March 12, Posted June 16, Posted August 7. Share this post Link to post Share on other sites. Hidden Content Give reaction or reply to this topic to see the hidden content. A combo list is a simple text file with valid and invalid identifiers, for example: philipe. Posted February 8, Leecher V6 is a software that allows you to "leech" your own combo list. Welcome to Exploit Zone Become a ninja in the shadow! If your PC lacks power, the software may crash Save the Combo list. SLAYER Leecher v0.6.rarĭo the same with load links, you need to use the file you saved a few moments before. Choose Week or 24h instead of All results. Start by putting the software on your virtual machine Start Leecher V0. Combo list what is it? A combo list is a simple text file with valid and invalid identifiers, for example.
