استخدم تدات لفك التشفير ~ Info
************************************************** **************
*** MD4/MD5/SHA1 GPU Password Recovery v0.70.48.4 ***
*** For ATI RV 7X0 cards and nVidia 'CUDA' ones (G80+) ***
*** (c) 2009-2010 Ivan Golubev, http://golubev.com ***
*** see "readme.htm" for more details ***
************************************************** **************
*** Any commercial use of this program is strictly forbidden ***
************************************************** **************
Found 2 CAL device(s)
Found 1 CUDA device(s)
Starting brute-force attack, Charset Len = 36, Min passlen = 4, Max passlen = 7
Charset (unicode -> 0) [abcdefghijklmnopqrstuvwxyz0123456789]
Charset in HEX: 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76 77 78 79 7a 30 31 32 33 34 35
36 37 38 39
Starting from [aaaa]
Hash type: MD5, Hash: cbe1d6d5800ec1e03a5f2a64882a0d41
We're running at ATI and NVIDIA GPUs simultaneously. It isn't that common situation, so some issues possible.
Device #0: [RV830] 850.00 Mhz 800 SP
Device #1: [RV7x0] 750.00 Mhz 640 SP
Device #2: [GeForce 8600 GT] 1188.00 Mhz 32 SP
Hardware monitoring disabled.
CURPWD: 66owsnc DONE: 51.02% ETA: 13s CURSPD: 2756.0M=1646.0M+1017.4M+92.6M
Found password: [roger15], HEX: 72 6f 67 65 72 31 35
Processed 42 228 252 672 passwords in 16s.
Thus, 2 731 452 307 password(s) per second in average.
-----------------------------------------------------------
>> لتحميل =مــن هنا