Virus scanner result overview of processes
The threat risk is displayed on the basis of the hash value (MD5 = 32 hex characters, SHA-1 = 40 hex characters, SHA256 = 64 hex characters). or this purpose, the result of various virus scanners is output whether they have found malicious code of viruses or malware in the respective process.
Virustotal result from 13 Days and 15 Hours ago
1 of 70 scanners have found threats!
1 threats found (positive)
69 negative results (negative)
Datei vc2008_freehash.exe
MD5 34deb232423a0e1c722d6073b4cb2c31
SHA1 93a41f43fa5e76c6f4f250539804c76a85fdcbc8
SHA-256 2bcb59848345d2d8a0c163321524989a10cf217e5cd7f2d0588e792280a2c9f9
Details https://www.virustotal.com/gui/file/2bcb59848345d2d8a0c163321524989a10cf217e5cd7f2d0588e792280a2c9f9/detection/f-2bcb59848345d2d8a0c163321524989a10cf217e5cd7f2d0588e792280a2c9f9-1745407385
Scan result:
Antivirus engine
Last update
Result
ALYac
14 Days ago (23.04.2025)
APEX
15 Days ago (22.04.2025)
AVG
14 Days ago (23.04.2025)
Acronis
1 Year ago (28.03.2024)
AhnLab-V3
14 Days ago (23.04.2025)
Alibaba
5 Years ago (27.05.2019)
Antiy-AVL
14 Days ago (23.04.2025)
Arcabit
14 Days ago (23.04.2025)
Avast
14 Days ago (23.04.2025)
Avira
14 Days ago (23.04.2025)
Baidu
6 Years ago (18.03.2019)
BitDefender
14 Days ago (23.04.2025)
Bkav
15 Days ago (22.04.2025)
W32.AIDetectMalware
CAT-QuickHeal
15 Days ago (22.04.2025)
CMC
16 Days ago (21.04.2025)
CTX
14 Days ago (23.04.2025)
ClamAV
14 Days ago (23.04.2025)
CrowdStrike
1 Year ago (26.10.2023)
Cylance
20 Days ago (17.04.2025)
DeepInstinct
14 Days ago (23.04.2025)
DrWeb
14 Days ago (23.04.2025)
ESET-NOD32
14 Days ago (23.04.2025)
Elastic
15 Days ago (22.04.2025)
Emsisoft
14 Days ago (23.04.2025)
F-Secure
14 Days ago (23.04.2025)
Fortinet
14 Days ago (23.04.2025)
GData
14 Days ago (23.04.2025)
Google
14 Days ago (23.04.2025)
Gridinsoft
14 Days ago (23.04.2025)
Ikarus
14 Days ago (23.04.2025)
Jiangmin
15 Days ago (22.04.2025)
K7AntiVirus
14 Days ago (23.04.2025)
K7GW
14 Days ago (23.04.2025)
Kaspersky
14 Days ago (23.04.2025)
Kingsoft
14 Days ago (23.04.2025)
Lionic
14 Days ago (23.04.2025)
Malwarebytes
14 Days ago (23.04.2025)
MaxSecure
14 Days ago (23.04.2025)
McAfee
15 Days ago (22.04.2025)
McAfeeD
14 Days ago (23.04.2025)
MicroWorld-eScan
14 Days ago (23.04.2025)
Microsoft
14 Days ago (23.04.2025)
NANO-Antivirus
14 Days ago (23.04.2025)
Paloalto
14 Days ago (23.04.2025)
Panda
15 Days ago (22.04.2025)
Rising
14 Days ago (23.04.2025)
SUPERAntiSpyware
14 Days ago (23.04.2025)
Sangfor
19 Days ago (18.04.2025)
SentinelOne
3 Months ago (14.01.2025)
Skyhigh
15 Days ago (22.04.2025)
Sophos
14 Days ago (23.04.2025)
Symantec
14 Days ago (23.04.2025)
TACHYON
14 Days ago (23.04.2025)
Tencent
14 Days ago (23.04.2025)
Trapmine
20 Days ago (17.04.2025)
TrendMicro-HouseCall
14 Days ago (23.04.2025)
VBA32
14 Days ago (23.04.2025)
VIPRE
14 Days ago (23.04.2025)
Varist
14 Days ago (23.04.2025)
ViRobot
14 Days ago (23.04.2025)
VirIT
15 Days ago (22.04.2025)
Webroot
2 Months ago (27.02.2025)
Xcitium
14 Days ago (23.04.2025)
Yandex
14 Days ago (23.04.2025)
Zillya
15 Days ago (22.04.2025)
ZoneAlarm
14 Days ago (23.04.2025)
Zoner
14 Days ago (23.04.2025)
alibabacloud
1 Month ago (21.03.2025)
huorong
15 Days ago (22.04.2025)
tehtris
14 Days ago (23.04.2025)
Last search results
vc2008_freehash.exe | 1 Threats
backgroundtaskhost.exe | 0 Threats
fdm.exe | 0 Threats
| 0 Threats
| 0 Threats
tcpipreg.sys | 0 Threats
svchost.exe'[0] | 0 Threats
nvhda64v.sys | 0 Threats
enterprise.exe | 0 Threats
vc2008_freehash.exe | 1 Threats
Relevant software to the hash values and process monitoring
abylon APP-BLOCKER
Monitor and block processes and spy functions
abylon FREEHASH
Create and compare hash values (checksums)
Partner Blog (german) Computer and Security
Beispiel-Artikel
Internettracking und Überwachung mittels nicht löschbarer EverCookies
... zur Identifikation des Nutzers verwendet. Die Werbeindustrie kann gezielt die Verbraucherinteressen verfolgen und so gezielt Werbung anzeigen. Geheimdienste und Ermittler können auch anonymisierte...
Read more (only in German)
Beweise und Forensik auf deinem PC, wie ein Fingerabdruck auf der Fensterscheibe
... forensische Methoden zur Beweisfindung und Sicherung auf deinem PC eingesetzt. Allein die Tatsache, dass du keinerlei kritische Daten speicherst oder regelmäßig Internetspuren vernichtest,...
Read more (only in German)
IP und Geolocation - gezielte Verfolgung
... IP-Adresse (Internet Protokoll) beispielsweise durch Abmahnanwälte wegen Filesharing auf unangenehme Art und Weise kennengelernt. Die IP-Adresse identifiziert zu einem bestimmten Zeitpunkt...
Read more (only in German)
Comment on hash value generator
Enter comment
Please use our support form for support requests Support form !