Home
Info info@electronicsandbooks.com
Electronics for sale
Change date = 20101024 16:18:50
 
Art.Nr.                    509
Type                   8050
Brand - Merk           Fluke
Article - Artikel      4.5 digit multimeter True RMS
Price - Prijs           100,00 Euro
Stock - Voorraad           1
Condition - Conditie   Tested









Title Fluke 8050 4.5 digit multimeter True RMS [509]
--------------------------------------------------------------------------------
Multimeter
Counts 20.000
V DC 200mV - 1000V 0.03%
V AC 200mV - 750V True RMS
R 200 - 20M
I DC 200uA - 2A
I AC 200uA - 2A True RMS
Meter is op specificatie

1x      Functie generator                               80 EUR
        Merk            Philips
        Type            PM5131
        Conditie        Gebruikt, Getest
        Inclusief copie handboek
1x      Service manual                                  30 EUR
        Brand   Fluke
        Type    105B
        Code    482287205368 19960424 92B,96B,99B,105B Service Manual
        Condition Retouched copy
http://www.threatexpert.com/report.aspx?md5=21aa3e9296f43b94061aa6561adbc9de

        File System Modifications

    * The following files were created in the system:

#       Filename(s)     File Size       File Hash       Alias
1       %Temp%\nsq9.tmp         0 bytes         MD5:
 0xD41D8CD98F00B204E9800998ECF8427E
SHA-1: 0xDA39A3EE5E6B4B0D3255BFEF95601890AFD80709       (not available)
2       %Temp%\rsvps.exe        2.305.387 bytes         MD5:
 0xCC714A048438B164537C137F10C71F3F
SHA-1: 0x279E1950A8C09C4541D12ECDBE5D136DEEFA51F0
        not-a-virus:AdWare.Win32.EZula [Ikarus]
3       %Temp%\SetupExe(20110425100119760).log  490 bytes       MD5:
 0xF0075ED381E72D9CBE21E92C645B5FC7
SHA-1: 0x7F28200677DF98975D855A2190EA117151528291       (not available)
4       %Temp%\vssrvc.exe       416.263 bytes   MD5:
 0xCB9F2ADDDDA02A22E78F084769665223
SHA-1: 0x53C64BEC697C78F419C8B721567EC33F29BFF84B       (not available)
5       %System%\35df04a0.dll   2.747.904 bytes         MD5:
 0x512703B8B77D24D4C943D28DF75756FB
SHA-1: 0x3BAA27BF378312C54DA0D06C0947639ED72D06A8       (not available)
6       %System%\brtirrbslahzt.dll      715.264 bytes   MD5:
 0x0A621AED00F756562526DB7ED8CF4585
SHA-1: 0xB467F2998E379B08AE1DB241EC117FFEE074FF1A       (not available)
7       %System%\d894f0e3.exe   121.381 bytes   MD5:
 0xB746A295D06B09966412882595343130
SHA-1: 0x678CBDF66972FE896D6608C321C2F0B761AA9CB0       (not available)
8       [file and pathname of the sample #1]    3.626.191 bytes         MD5:
 0x21AA3E9296F43B94061AA6561ADBC9DE
SHA-1: 0x62BA9732CB3C0B75979094A9F764FB7E3FDDA6AC
        not-a-virus:AdWare.Win32.EZula [Ikarus]
9       %System%\uzvweqqjqyslqtchd.exe  50.328 bytes    MD5:
 0xA06594AD5BE318F60F5073A09F9E4CA2
SHA-1: 0x303FF8679A46B169BF4EA7E62F559245A5A9E3A2       (not available)

    * Notes:
          o %Temp% is a variable that refers to the temporary folder in the
 short path form. By default, this is C:\Documents and Settings\[UserName]\Local
 Settings\Temp\ (Windows NT/2000/XP).
          o %System% is a variable that refers to the System folder. By default,
 this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows
 NT/2000), or C:\Windows\System32 (Windows XP).


        Memory Modifications

    * There was a new process created in the system:

Process Name    Process Filename        Main Module Size
setup.exe       %Temp%\setup.exe        1.150.976 bytes


        Registry Modifications

    * The following Registry Keys were created:
          o
 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{b33ee05e-0e9f-5672-5ac7-4fedac3dbf5c
}
          o
 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\d894f0e3
          o
 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\uzvweqqj
qyslqtchd
          o HKEY_LOCAL_MACHINE\SOFTWARE\wrar390Install
          o HKEY_LOCAL_MACHINE\SOFTWARE\wrar390Install\Components
          o HKEY_CURRENT_USER\Software\AppDataLow
          o HKEY_CURRENT_USER\Software\AppDataLow\Software
          o
 HKEY_CURRENT_USER\Software\AppDataLow\Software\{06B62C8E-CC2C-B5BF-E6A3-E20590C
3E067}

    * The newly created Registry Values are:
          o
 [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{b33ee05e-0e9f-5672-5ac7-4fedac3dbf5
c}]
                + 3140288821 = "����������ƽ�Æ/��"
          o
 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\d894f0e
3]
                + DisplayName = "Contextual Tool Yourprofitclub"
                + UninstallString = "%System%\d894f0e3.exe"
                + NoModify = 0x00000000
                + NoRepair = 0x00000000
          o
 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\uzvweqq
jqyslqtchd]
                + DisplayName = "Advanced Performance Platform
 Revenuestreaming."
                + UninstallString = "%System%\uzvweqqjqyslqtchd.exe
 /i="%System%\brtirrbslahzt.dll" /d="uzvweqqjqyslqtchd""
                + NoModify = 0x00000000
                + NoRepair = 0x00000000
          o [HKEY_LOCAL_MACHINE\SOFTWARE\wrar390Install\Components]
                + Main = "1"
          o
 [HKEY_CURRENT_USER\Software\AppDataLow\Software\{06B62C8E-CC2C-B5BF-E6A3-E20590
C3E067}]
                + aff_id = "revenuestreaming_4"


        Other details

    * There were registered attempts to establish connection with the remote
 hosts. The connection details are:

Remote Host     Port Number
80.87.199.15    80
93.158.114.96   80

    * The data identified by the following URLs was then requested from the
 remote web server:
          o
 http://yourcpmsolution.biz/cMhOLGEc/installer.cfc?res=success&hwid=802cc1c092da
cc6c89988c2c290eeecebeb7b40e
          o
 http://creativeadnetwork.net/bc/nsi_install.php?inst_result=success&aff_id=reve
nuestreaming_4&id=1bb541b518cd7fb0015a02b8a04799efa1288caf















Front
Back Kaartenbak home