Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked Saint Andrew’s Multi Stealer - Mod Strong


sQuo

Recommended Posts

This is the hidden content, please

 

 

Saint Andrew's Multi Stealer is coded in vb.net. This program is used for stealing saved passwords from victim's PC. It can steal saved password of the following programs:

 

 

  • Mozilla Firefox
  • Google Chrome
  • Windows Live Messenger
  • Opera
  • Internet Explorer

 

This is the hidden content, please

 

Pass:

This is the hidden content, please

 

 

This is the hidden content, please

 

Archivo: Server.exe

Tamaño: 1157854 Bytes

MD5: 5aef5b9992737119053779072ecfae56

SHA1: 50ca323d554d1b84de0458364844b70f5e69ef47

Resultado: 1/35

Estado: Infectado

 

AVG Free - OK

ArcaVir - OK

Avast 5 - OK

AntiVir (Avira) - TR/Spy.Gen

BitDefender - OK

VirusBuster Internet Security - OK

Clam Antivirus - OK

COMODO Internet Security - OK

Dr.Web - OK

eTrust-Vet - OK

F-PROT Antivirus - OK

F-Secure Internet Security - OK

G Data - OK

IKARUS Security - OK

Kaspersky Antivirus - OK

McAfee - OK

MS Security Essentials - OK

ESET NOD32 - OK

Norman - OK

Norton Antivirus - OK

Panda Security - OK

A-Squared - OK

Quick Heal Antivirus - OK

Rising Antivirus - OK

Solo Antivirus - OK

Sophos - OK

Trend Micro Internet Security - OK

VBA32 Antivirus - OK

Vexira Antivirus - OK

Zoner AntiVirus - OK

Ad-Aware - OK

BullGuard - OK

Immunet Antivirus - OK

K7 Ultimate - OK

VIPRE - OK

 

This is the hidden content, please

Link to comment
Share on other sites

Re: Saint Andrew’s Multi Stealer - Mod Strong

 

hi, and thanks for stuff, but.

 

i scanned this bar code, and it's wrong.. i have a code: 007******

 

what is the wrong in file?

 

decoder_2012 > Android tool

Link to comment
Share on other sites

  • 1 month later...
  • 2 weeks later...
  • 2 weeks later...
Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.