SlideShare a Scribd company logo
VT Community Sign in ▼                                                            Languages ▼


                                           Virustotal is a
                                           service that analyzes
                                           suspicious files and
                                           URLs and
                                           facilitates the quick
                                           detection of
                                           viruses, worms,
                                           trojans, and all
                                           kinds of malware
                                           detected by
                                           antivirus engines.
                                           More
                                           information...
0 VT Community user(s) with a total of 0 reputation credit(s) say(s) this sample is
goodware. 0 VT Community user(s) with a total of 0 reputation credit(s) say(s) this
sample is malware.
File name:
                                                                      VT
7997d3d9e0fa3b0b2bd77e3d76a295a6f3264f91e0ae0b0780444e7cb[...].bin Community
Submission date:
2011-09-18 10:17:52 (UTC)
Current status:                                                                        not reviewed
                                                                                      Safety score: -
finished
Result:
20 /44 (45.5%)
                                                                                             Compact
                                                                                          Print results
Antivirus                Version        Last Update                           Result
AhnLab-V3             2011.09.17.00   2011.09.17     -
AntiVir               7.11.14.223     2011.09.16     -
Antiy-AVL             2.0.3.7         2011.09.18     -
Avast                 4.8.1351.0      2011.09.17     Win32:Sinowal-JE [Trj]
Avast5                5.0.677.0       2011.09.17     Win32:Sinowal-JE [Trj]
AVG                   10.0.0.1190     2011.09.18     Cryptic.DRM
BitDefender           7.2             2011.09.18     Gen:Variant.Kazy.37846
ByteHero              1.0.0.1         2011.09.13     -
CAT-QuickHeal         11.00           2011.09.16     -
ClamAV                0.97.0.0        2011.09.18     -
Commtouch             5.3.2.6         2011.09.17     W32/Sinowal.Z2.gen!Eldorado
Comodo                10153           2011.09.18     -
DrWeb                 5.0.2.03300     2011.09.18     -
Emsisoft              5.1.0.11        2011.09.18     Trojan-Downloader.Win32.Sinowal!IK
eSafe                 7.0.17.0        2011.09.15     -
eTrust-Vet            36.1.8566       2011.09.17     -
F-Prot                4.6.2.117       2011.09.17     W32/Sinowal.Z2.gen!Eldorado
F-Secure              9.0.16440.0     2011.09.18     Gen:Variant.Kazy.37846
Fortinet              4.3.370.0       2011.09.18     -
GData                 22              2011.09.18     Gen:Variant.Kazy.37846
Ikarus                T3.1.1.107.0    2011.09.18     Trojan-Downloader.Win32.Sinowal
Jiangmin              13.0.900        2011.09.17     -
K7AntiVirus           9.113.5150      2011.09.17     Trojan
Kaspersky             9.0.0.837       2011.09.18     HEUR:Trojan.Win32.Generic
McAfee                5.400.0.1158    2011.09.18     PWS-JA.gen.g
McAfee-GW-Edition     2010.1D         2011.09.17     -
Microsoft             1.7604          2011.09.18     PWS:Win32/Sinowal.gen!Y
NOD32                 6472            2011.09.18     -
Norman                6.07.11         2011.09.17     W32/Sinowal.FSW
nProtect              2011-09-18.01 2011.09.18       Gen:Variant.Kazy.37846
Panda                 10.0.3.5        2011.09.18     -
PCTools               8.0.0.5         2011.09.18     -
Prevx                 3.0             2011.09.18     -
Rising                23.75.04.02     2011.09.16     -
Sophos                4.69.0          2011.09.18     Mal/Sinowal-N
SUPERAntiSpyware      4.40.0.1006     2011.09.17     -
Symantec              20111.2.0.82    2011.09.18     -
TheHacker             6.7.0.1.298     2011.09.17     -
TrendMicro            9.500.0.1008    2011.09.18     PAK_Generic.012
TrendMicro-HouseCall  9.500.0.1008    2011.09.18     PAK_Generic.012
VBA32                 3.12.16.4       2011.09.16     suspected of Malware-Cryptor.General.5
VIPRE                 10509           2011.09.18     -
ViRobot               2011.9.17.4674 2011.09.18      -
VirusBuster           14.0.218.0      2011.09.17     -
                                    Additional information
MD5 : 5679496ec3770c295ea4f8229fd30a67
SHA1 : 03b1551e3d65ba5cd91929540554d31e3c743890
SHA256: 7997d3d9e0fa3b0b2bd77e3d76a295a6f3264f91e0ae0b0780444e7cb4f524ac
                                                     VT Community
          This file has never been reviewed by any VT Community member. Be the first one to
                                            comment on it!
                                           VirusTotal Team
        Add your comment... Remember that when you write comments as an anonymous user they receive the lowest
         possible reputation. So if you have not signed in yet don't forget to do so. How to markup your comments?

                                                      Goodware
                                                       Malware
                                                  Spam attachment/link

                                                     P2P download
                                                   Propagating via IM
                                                     Network worm

                                                   Drive-by-download




         ATTENTION: VirusTotal is a free service offered by Hispasec Sistemas. There are no
          guarantees about the availability and continuity of this service. Although the detection
        rate afforded by the use of multiple antivirus engines is far superior to that offered by just
          one product, these results DO NOT guarantee the harmlessness of a file. Currently,
          there is not any solution that offers a 100% effectiveness rate for detecting viruses and
                                                   malware.

         VirusTotal © Hispasec Sistemas - Blog - Twitter - Contact: info@virustotal.com - TOS
                                          & Privacy Policy

More Related Content

Viewers also liked

Fichas lectura tnhd
Fichas lectura tnhdFichas lectura tnhd
Fichas lectura tnhdpeliki
 
Libros, pocimas
Libros, pocimasLibros, pocimas
Libros, pocimas
peliki
 
How I Know God Exists
How I Know God ExistsHow I Know God Exists
How I Know God Exists
Spartan4ever
 
Ibrahim Sonatli Ceit 309 Sunumu
Ibrahim Sonatli Ceit 309 SunumuIbrahim Sonatli Ceit 309 Sunumu
Ibrahim Sonatli Ceit 309 Sunumuguest85b3d2
 
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
bhatiak997
 
Ibrahim Sonatli Ceit 309 Sunumu
Ibrahim Sonatli Ceit 309 SunumuIbrahim Sonatli Ceit 309 Sunumu
Ibrahim Sonatli Ceit 309 Sunumuguest85b3d2
 
人間の成長とユーザエクスペリエンス
人間の成長とユーザエクスペリエンス人間の成長とユーザエクスペリエンス
人間の成長とユーザエクスペリエンス
Masaya Ando
 
購入時のメンタルモデルが製品評価に及ぼす影響
購入時のメンタルモデルが製品評価に及ぼす影響購入時のメンタルモデルが製品評価に及ぼす影響
購入時のメンタルモデルが製品評価に及ぼす影響
Masaya Ando
 
私が考えるSocial Centered Design~社会的課題へのアプローチ
私が考えるSocial Centered Design~社会的課題へのアプローチ私が考えるSocial Centered Design~社会的課題へのアプローチ
私が考えるSocial Centered Design~社会的課題へのアプローチ
Masaya Ando
 
体験のモデリングとコンセプトデザイン
体験のモデリングとコンセプトデザイン体験のモデリングとコンセプトデザイン
体験のモデリングとコンセプトデザイン
Masaya Ando
 
サービスデザインとUXDそしてデザインプロセス
サービスデザインとUXDそしてデザインプロセスサービスデザインとUXDそしてデザインプロセス
サービスデザインとUXDそしてデザインプロセス
Masaya Ando
 
HCD-net Forum 2010
HCD-net Forum 2010 HCD-net Forum 2010
HCD-net Forum 2010
Masaya Ando
 
我々はどこへ行くのか: UXの誤解の先にある未来
我々はどこへ行くのか: UXの誤解の先にある未来我々はどこへ行くのか: UXの誤解の先にある未来
我々はどこへ行くのか: UXの誤解の先にある未来
Masaya Ando
 
Overmold Design Guide
Overmold Design GuideOvermold Design Guide
Overmold Design Guide
William 'Rob' Robinson
 
エスノグラフィック・デザインアプローチ
エスノグラフィック・デザインアプローチエスノグラフィック・デザインアプローチ
エスノグラフィック・デザインアプローチ
Masaya Ando
 
UXデザインとコンセプト評価 ~俺様企画はだめなのよ
UXデザインとコンセプト評価~俺様企画はだめなのよUXデザインとコンセプト評価~俺様企画はだめなのよ
UXデザインとコンセプト評価 ~俺様企画はだめなのよ
Masaya Ando
 
ユーザエクスペリエンスを正しく理解する-UXとUXデザイン
ユーザエクスペリエンスを正しく理解する-UXとUXデザインユーザエクスペリエンスを正しく理解する-UXとUXデザイン
ユーザエクスペリエンスを正しく理解する-UXとUXデザイン
Masaya Ando
 
UXデザインの上流工程の考え方とプロセス  ~リサーチからアイデア発想そしてUIデザインへ
UXデザインの上流工程の考え方とプロセス ~リサーチからアイデア発想そしてUIデザインへUXデザインの上流工程の考え方とプロセス ~リサーチからアイデア発想そしてUIデザインへ
UXデザインの上流工程の考え方とプロセス  ~リサーチからアイデア発想そしてUIデザインへ
Masaya Ando
 
110 problemas de matematicas pdf
110 problemas de matematicas pdf110 problemas de matematicas pdf
110 problemas de matematicas pdf
peliki
 

Viewers also liked (19)

Fichas lectura tnhd
Fichas lectura tnhdFichas lectura tnhd
Fichas lectura tnhd
 
Libros, pocimas
Libros, pocimasLibros, pocimas
Libros, pocimas
 
How I Know God Exists
How I Know God ExistsHow I Know God Exists
How I Know God Exists
 
Ibrahim Sonatli Ceit 309 Sunumu
Ibrahim Sonatli Ceit 309 SunumuIbrahim Sonatli Ceit 309 Sunumu
Ibrahim Sonatli Ceit 309 Sunumu
 
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
WEA-Final-Report-Geo-Targeting-Cell-Radio-RF-Field-Validation-042016
 
Ibrahim Sonatli Ceit 309 Sunumu
Ibrahim Sonatli Ceit 309 SunumuIbrahim Sonatli Ceit 309 Sunumu
Ibrahim Sonatli Ceit 309 Sunumu
 
人間の成長とユーザエクスペリエンス
人間の成長とユーザエクスペリエンス人間の成長とユーザエクスペリエンス
人間の成長とユーザエクスペリエンス
 
購入時のメンタルモデルが製品評価に及ぼす影響
購入時のメンタルモデルが製品評価に及ぼす影響購入時のメンタルモデルが製品評価に及ぼす影響
購入時のメンタルモデルが製品評価に及ぼす影響
 
私が考えるSocial Centered Design~社会的課題へのアプローチ
私が考えるSocial Centered Design~社会的課題へのアプローチ私が考えるSocial Centered Design~社会的課題へのアプローチ
私が考えるSocial Centered Design~社会的課題へのアプローチ
 
体験のモデリングとコンセプトデザイン
体験のモデリングとコンセプトデザイン体験のモデリングとコンセプトデザイン
体験のモデリングとコンセプトデザイン
 
サービスデザインとUXDそしてデザインプロセス
サービスデザインとUXDそしてデザインプロセスサービスデザインとUXDそしてデザインプロセス
サービスデザインとUXDそしてデザインプロセス
 
HCD-net Forum 2010
HCD-net Forum 2010 HCD-net Forum 2010
HCD-net Forum 2010
 
我々はどこへ行くのか: UXの誤解の先にある未来
我々はどこへ行くのか: UXの誤解の先にある未来我々はどこへ行くのか: UXの誤解の先にある未来
我々はどこへ行くのか: UXの誤解の先にある未来
 
Overmold Design Guide
Overmold Design GuideOvermold Design Guide
Overmold Design Guide
 
エスノグラフィック・デザインアプローチ
エスノグラフィック・デザインアプローチエスノグラフィック・デザインアプローチ
エスノグラフィック・デザインアプローチ
 
UXデザインとコンセプト評価 ~俺様企画はだめなのよ
UXデザインとコンセプト評価~俺様企画はだめなのよUXデザインとコンセプト評価~俺様企画はだめなのよ
UXデザインとコンセプト評価 ~俺様企画はだめなのよ
 
ユーザエクスペリエンスを正しく理解する-UXとUXデザイン
ユーザエクスペリエンスを正しく理解する-UXとUXデザインユーザエクスペリエンスを正しく理解する-UXとUXデザイン
ユーザエクスペリエンスを正しく理解する-UXとUXデザイン
 
UXデザインの上流工程の考え方とプロセス  ~リサーチからアイデア発想そしてUIデザインへ
UXデザインの上流工程の考え方とプロセス ~リサーチからアイデア発想そしてUIデザインへUXデザインの上流工程の考え方とプロセス ~リサーチからアイデア発想そしてUIデザインへ
UXデザインの上流工程の考え方とプロセス  ~リサーチからアイデア発想そしてUIデザインへ
 
110 problemas de matematicas pdf
110 problemas de matematicas pdf110 problemas de matematicas pdf
110 problemas de matematicas pdf
 

Similar to New microsoft word document

Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2
Scott Brown
 
Zlob Trojan
Zlob TrojanZlob Trojan
Zlob Trojan
cpavtsjoe
 
Breaking av software
Breaking av softwareBreaking av software
Breaking av software
Joxean Koret
 
Breaking av software
Breaking av softwareBreaking av software
Breaking av software
Thomas Pollet
 
Breaking Antivirus Software
Breaking Antivirus SoftwareBreaking Antivirus Software
Breaking Antivirus Software
rahmanprojectd
 
Breaking Antivirus Software - Joxean Koret (SYSCAN 2014)
Breaking Antivirus Software - Joxean Koret (SYSCAN 2014)Breaking Antivirus Software - Joxean Koret (SYSCAN 2014)
Breaking Antivirus Software - Joxean Koret (SYSCAN 2014)
Akmal Hisyam
 
Avtest Kasım 2011 Bedava Android Antivirüs Araştırması
Avtest Kasım 2011 Bedava Android Antivirüs AraştırmasıAvtest Kasım 2011 Bedava Android Antivirüs Araştırması
Avtest Kasım 2011 Bedava Android Antivirüs Araştırması
Erol Dizdar
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
Abhijeet Karve
 
Internet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareInternet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshare
Youngjun Chang
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
Alireza Ghahrood
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
Sejahtera Affif
 
Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010
nuttakorn nakkerd
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
Satria Ady Pradana
 
Malware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adwareMalware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adware
Cyphort
 
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
Orbid
 
Thou shalt not
Thou shalt notThou shalt not
Thou shalt not
taftosterone
 
Computer Security
Computer SecurityComputer Security
Computer Security
William Mann
 
News bytes Oct-2011
News bytes  Oct-2011News bytes  Oct-2011
News bytes Oct-2011
Ashwin Patil, GCIH, GCIA, GCFE
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
Computervirus
Computervirus Computervirus
Computervirus
Dushyant Shekhawat
 

Similar to New microsoft word document (20)

Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2
 
Zlob Trojan
Zlob TrojanZlob Trojan
Zlob Trojan
 
Breaking av software
Breaking av softwareBreaking av software
Breaking av software
 
Breaking av software
Breaking av softwareBreaking av software
Breaking av software
 
Breaking Antivirus Software
Breaking Antivirus SoftwareBreaking Antivirus Software
Breaking Antivirus Software
 
Breaking Antivirus Software - Joxean Koret (SYSCAN 2014)
Breaking Antivirus Software - Joxean Koret (SYSCAN 2014)Breaking Antivirus Software - Joxean Koret (SYSCAN 2014)
Breaking Antivirus Software - Joxean Koret (SYSCAN 2014)
 
Avtest Kasım 2011 Bedava Android Antivirüs Araştırması
Avtest Kasım 2011 Bedava Android Antivirüs AraştırmasıAvtest Kasım 2011 Bedava Android Antivirüs Araştırması
Avtest Kasım 2011 Bedava Android Antivirüs Araştırması
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
 
Internet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareInternet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshare
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Malware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adwareMalware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adware
 
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
 
Thou shalt not
Thou shalt notThou shalt not
Thou shalt not
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
News bytes Oct-2011
News bytes  Oct-2011News bytes  Oct-2011
News bytes Oct-2011
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computervirus
Computervirus Computervirus
Computervirus
 

Recently uploaded

5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 

Recently uploaded (20)

5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 

New microsoft word document

  • 1. VT Community Sign in ▼ Languages ▼ Virustotal is a service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by antivirus engines. More information... 0 VT Community user(s) with a total of 0 reputation credit(s) say(s) this sample is goodware. 0 VT Community user(s) with a total of 0 reputation credit(s) say(s) this sample is malware. File name: VT 7997d3d9e0fa3b0b2bd77e3d76a295a6f3264f91e0ae0b0780444e7cb[...].bin Community Submission date: 2011-09-18 10:17:52 (UTC) Current status: not reviewed Safety score: - finished Result: 20 /44 (45.5%) Compact Print results Antivirus Version Last Update Result
  • 2. AhnLab-V3 2011.09.17.00 2011.09.17 - AntiVir 7.11.14.223 2011.09.16 - Antiy-AVL 2.0.3.7 2011.09.18 - Avast 4.8.1351.0 2011.09.17 Win32:Sinowal-JE [Trj] Avast5 5.0.677.0 2011.09.17 Win32:Sinowal-JE [Trj] AVG 10.0.0.1190 2011.09.18 Cryptic.DRM BitDefender 7.2 2011.09.18 Gen:Variant.Kazy.37846 ByteHero 1.0.0.1 2011.09.13 - CAT-QuickHeal 11.00 2011.09.16 - ClamAV 0.97.0.0 2011.09.18 - Commtouch 5.3.2.6 2011.09.17 W32/Sinowal.Z2.gen!Eldorado Comodo 10153 2011.09.18 - DrWeb 5.0.2.03300 2011.09.18 - Emsisoft 5.1.0.11 2011.09.18 Trojan-Downloader.Win32.Sinowal!IK eSafe 7.0.17.0 2011.09.15 - eTrust-Vet 36.1.8566 2011.09.17 - F-Prot 4.6.2.117 2011.09.17 W32/Sinowal.Z2.gen!Eldorado F-Secure 9.0.16440.0 2011.09.18 Gen:Variant.Kazy.37846 Fortinet 4.3.370.0 2011.09.18 - GData 22 2011.09.18 Gen:Variant.Kazy.37846 Ikarus T3.1.1.107.0 2011.09.18 Trojan-Downloader.Win32.Sinowal Jiangmin 13.0.900 2011.09.17 - K7AntiVirus 9.113.5150 2011.09.17 Trojan Kaspersky 9.0.0.837 2011.09.18 HEUR:Trojan.Win32.Generic McAfee 5.400.0.1158 2011.09.18 PWS-JA.gen.g McAfee-GW-Edition 2010.1D 2011.09.17 - Microsoft 1.7604 2011.09.18 PWS:Win32/Sinowal.gen!Y NOD32 6472 2011.09.18 - Norman 6.07.11 2011.09.17 W32/Sinowal.FSW nProtect 2011-09-18.01 2011.09.18 Gen:Variant.Kazy.37846 Panda 10.0.3.5 2011.09.18 - PCTools 8.0.0.5 2011.09.18 - Prevx 3.0 2011.09.18 - Rising 23.75.04.02 2011.09.16 - Sophos 4.69.0 2011.09.18 Mal/Sinowal-N SUPERAntiSpyware 4.40.0.1006 2011.09.17 - Symantec 20111.2.0.82 2011.09.18 - TheHacker 6.7.0.1.298 2011.09.17 - TrendMicro 9.500.0.1008 2011.09.18 PAK_Generic.012 TrendMicro-HouseCall 9.500.0.1008 2011.09.18 PAK_Generic.012 VBA32 3.12.16.4 2011.09.16 suspected of Malware-Cryptor.General.5 VIPRE 10509 2011.09.18 - ViRobot 2011.9.17.4674 2011.09.18 - VirusBuster 14.0.218.0 2011.09.17 - Additional information MD5 : 5679496ec3770c295ea4f8229fd30a67
  • 3. SHA1 : 03b1551e3d65ba5cd91929540554d31e3c743890 SHA256: 7997d3d9e0fa3b0b2bd77e3d76a295a6f3264f91e0ae0b0780444e7cb4f524ac VT Community This file has never been reviewed by any VT Community member. Be the first one to comment on it! VirusTotal Team Add your comment... Remember that when you write comments as an anonymous user they receive the lowest possible reputation. So if you have not signed in yet don't forget to do so. How to markup your comments? Goodware Malware Spam attachment/link P2P download Propagating via IM Network worm Drive-by-download ATTENTION: VirusTotal is a free service offered by Hispasec Sistemas. There are no guarantees about the availability and continuity of this service. Although the detection rate afforded by the use of multiple antivirus engines is far superior to that offered by just one product, these results DO NOT guarantee the harmlessness of a file. Currently, there is not any solution that offers a 100% effectiveness rate for detecting viruses and malware. VirusTotal © Hispasec Sistemas - Blog - Twitter - Contact: info@virustotal.com - TOS & Privacy Policy