How to Remove “Dragon Ball Legend.exe”

4

Malware Entries

First Seen: 19 May 2010 at 12:19 am
No. Company File Type SHA1 MD5 Malware
Name
Digitally
Signed
File
Version
Product
Version
Submitted
From
Malware Behavior
1 CipSoft GmbH Executable f23479e1b01d68b2
50eb21394add2625
aa1d4227
1ca7c411bbd4e220
47da0ef85cb3d5cb
Virus.Win32.
Parite.gen
No 7.6 7.6 Germany N/A
2 N/A Executable 2b3d5c2f358ff86f
eeefe6a655294a5d
dc796635
6e0c0cf1c7f557be
2ad0e165664b853b
TrojWare.Win
32.Scar.~dy0
07
No N/A N/A Internal Submission N/A
3 CipSoft GmbH Executable 1933aadd9289306a
7498799a8af99d4e
d1ed4617
4d590bb74fb438fd
4be1142c8c3a4540
Virus.Win32.
Sality.gen
No 7.6 7.6 Poland N/A
4 CipSoft GmbH Executable 641046155f9905a8
a47ed5e4aa388031
da4b4f22
bbc6de36592b4b53
0ef7ce95e07af75d
Virus.Win32.
Parite.gen
No 7.6 7.6 10.224.1.116/32 N/A
Display 4 items per page
  • 4 items per page
  • 8 items per page
  • 16 items per page
  • 32 items per page
17

Safe Entries

First Seen: 11 July 2008 at 8:37 am
No. Company File Type SHA1 MD5 Digitally
Signed
File
Version
Product
Version
Submitted
From
1 Nilan GmbH Executable ed55d024a3e5d650
ed662a0c6ec8880d
82a4ab4a
c08e3c3097751bd3
5d1f96e246387155
No 8.54 8.54 10.224.1.117/32
2 CipSoft GmbH Executable dc70806c146319b6
eca7391fabb4834e
0e949507
N/A No 7.6 7.6 India
3 CipSoft GmbH Executable 51e1ce123fd271b2
c5c8c4b45ae6e44b
af4dd511
N/A No 7.6 7.6 Internal Submission
4 CipSoft GmbH Executable 5d6894b96477e7ba
07e9ccd31e5eccd1
45f79a50
a4a6994bd296bcf9
208b8d58c9c2c48c
No 7.6 7.6 Internal Submission
Display 4 items per page
  • 4 items per page
  • 8 items per page
  • 16 items per page
  • 32 items per page
 

Comodo Internet Security Pro

Free Antivirus protection from hackers! Get the ultimate Antivirus solution to keep your PC clean and to remove viruses from a slow or infected PC. Improve the PC performance at home or use it on-the-go!

Get Comodo Internet Security Comodo Internet Security
Exclusive Offer
Get Free Endpoint Protection
Get Advanced
Endpoint
Protection

Award-Winning Security to Protect Your Clients from Cyber Attacks