Trojaner-Board

Trojaner-Board (https://www.trojaner-board.de/)
-   Mülltonne (https://www.trojaner-board.de/muelltonne/)
-   -   Hilfe benötigt für eine Auswertung (https://www.trojaner-board.de/53987-hilfe-benoetigt-auswertung.html)

Keltenkreuz 15.06.2008 01:57

Hilfe benötigt für eine Auswertung
 
Bräuchte bitte eure Hilfe für diese Auswertung Danke im vorraus

Antivirus Version letzte aktualisierung Ergebnis
AhnLab-V3 2008.6.13.1 2008.06.13 -
AntiVir 7.8.0.55 2008.06.14 ADSPY/Agent.PB
Authentium 5.1.0.4 2008.06.14 W32/Adware-Vapsup!Maximus
Avast 4.8.1195.0 2008.06.14 Win32:Agent-LTS
AVG 7.5.0.516 2008.06.14 Downloader.Adload.LO
BitDefender 7.2 2008.06.15 -
CAT-QuickHeal 9.50 2008.06.14 -
ClamAV 0.92.1 2008.06.15 -
DrWeb 4.44.0.09170 2008.06.14 -
eSafe 7.0.15.0 2008.06.12 -
eTrust-Vet 31.6.5873 2008.06.14 Win32/Pripecs!generic
Ewido 4.0 2008.06.14 -
F-Prot 4.4.4.56 2008.06.12 W32/Adware-Vapsup!Maximus
F-Secure 6.70.13260.0 2008.06.14 Trojan.Win32.Vapsup.gra
Fortinet 3.14.0.0 2008.06.14 -
GData 2.0.7306.1023 2008.06.14 Trojan.Win32.Vapsup.gra
Ikarus T3.1.1.26.0 2008.06.15 AdWare.NetAdware.S
Kaspersky 7.0.0.125 2008.06.15 Trojan.Win32.Vapsup.gra
McAfee 5317 2008.06.13 -
Microsoft 1.3604 2008.06.15 TrojanDownloader:Win32/Zlob.IC
NOD32v2 3186 2008.06.13 -
Norman 5.80.02 2008.06.13 -
Panda 9.0.0.4 2008.06.14 -
Prevx1 V2 2008.06.15 -
Rising 20.48.52.00 2008.06.14 -
Sophos 4.30.0 2008.06.15 -
Sunbelt 3.0.1145.1 2008.06.05 -
Symantec 10 2008.06.15 -
TheHacker 6.2.92.350 2008.06.14 -
VBA32 3.12.6.7 2008.06.14 suspected of Downloader.Zlob.5
VirusBuster 4.3.26:9 2008.06.12 -
Webwasher-Gateway 6.6.2 2008.06.14 Ad-Spyware.Agent.PB
weitere Informationen
File size: 229376 bytes
MD5...: 5534997d7b1253a5e192a8ee1f974f65
SHA1..: 9fece23a84819201b3dd0f685391bfce47501935
SHA256: fd4606903d69796c3e45c0216614a73a7844d63258eb9cd5c0973b224cceaa17
SHA512: 34d020534d3fc3742675a580b639b4f949c01f45d4377e65a79d2b6a8e5f4ea6
8870e2f68f0868582050afc4968052722921b96d7b0514954c083c52be24d853
PEiD..: -
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x10018f1a
timedatestamp.....: 0x48520b0e (Fri Jun 13 05:52:14 2008)
machinetype.......: 0x14c (I386)

( 4 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x2bd6e 0x2c000 6.53 215028032f6b81ca4ab062ac491c0e0d
.data 0x2d000 0x3180 0x2000 2.43 293d388ac0d18e4b94892d0a1ea1586f
.rsrc 0x31000 0x51e0 0x6000 4.10 8cf026224ba2140eb7f55388d0e3f6b4
.reloc 0x37000 0x2536 0x3000 4.13 827554c4b0f0fed3f045c86b034cc47b

( 4 imports )
> KERNEL32.dll: CloseHandle, CreateDirectoryW, MoveFileW, WaitForSingleObject, Sleep, FindFirstFileW, FindClose, GetProcAddress, LoadLibraryW, GetLastError, MultiByteToWideChar, WriteFile, SetFilePointer, SystemTimeToFileTime, GetFileAttributesW, ReadFile, GetCurrentDirectoryW, LocalFileTimeToFileTime, WideCharToMultiByte, SetFileTime, SetEndOfFile, CreateFileW, lstrcpynW, GetSystemTime, GetLocaleInfoA, FindNextFileW, FileTimeToSystemTime, FileTimeToLocalFileTime, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapFree, HeapAlloc, GetCurrentThreadId, GetCommandLineA, GetVersionExA, GetProcessHeap, RaiseException, RtlUnwind, GetModuleHandleA, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, InterlockedDecrement, HeapSize, ExitProcess, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, GetConsoleCP, GetConsoleMode, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, GetCPInfo, GetACP, GetOEMCP, LCMapStringA, LCMapStringW, HeapDestroy, HeapCreate, VirtualFree, VirtualAlloc, HeapReAlloc, GetModuleFileNameA, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, GetTimeZoneInformation, LoadLibraryA, InitializeCriticalSection, CompareStringA, CompareStringW, SetEnvironmentVariableA, SetEnvironmentVariableW, SetStdHandle, FlushFileBuffers, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, GetStringTypeA, GetStringTypeW, CreateFileA
> USER32.dll: GetDesktopWindow, GetWindow, MessageBoxW
> ADVAPI32.dll: RegSetValueExW, RegQueryValueExW, RegDeleteValueW
> ole32.dll: CoInitialize

( 0 exports )

File size: 155648 bytes
MD5...: fb4259851720bf8f65414998c21b0f5e
SHA1..: ab6fa7f81cfc0253cfaefecbc515593ad0d5d134
SHA256: 5dbda975ca413f368b06ff09c1669e93cc1907e339d7d1533ffe05c9bc33313b
SHA512: f7c6e21a7bca1b9cecbe6a3775655d34282c0e59f9f2c48ea62ccd3b9f826595
76408402dd30d22d98ac170058f52088584adebec38a402ecead01af12d08626
PEiD..: -
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x1000ad07
timedatestamp.....: 0x48520d7c (Fri Jun 13 06:02:36 2008)
machinetype.......: 0x14c (I386)

( 5 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x16629 0x17000 6.59 97596180599577a93bc6804bdc55b914
.rdata 0x18000 0x63d5 0x7000 4.84 0e20ef3fe03f2498973a828e9ddcee31
.data 0x1f000 0x38a0 0x2000 3.65 44b5d8f3453dd1e316f354a62414d847
.rsrc 0x23000 0x1d20 0x2000 4.32 d14b1685aa4d1f4347be72d369ad03dd
.reloc 0x25000 0x254e 0x3000 4.02 4df417bb438fd91a6673520e17c75f8a

( 6 imports )
> COMCTL32.dll: ImageList_SetBkColor, ImageList_Destroy, ImageList_Create, ImageList_ReplaceIcon
> KERNEL32.dll: GetLastError, lstrcmpiW, GetModuleFileNameW, InterlockedIncrement, FreeLibrary, MultiByteToWideChar, SizeofResource, LoadResource, FindResourceW, LoadLibraryExW, GetModuleHandleW, DisableThreadLibraryCalls, FlushInstructionCache, GetCurrentProcess, DeleteCriticalSection, SetLastError, FlushFileBuffers, CloseHandle, CreateFileA, WriteConsoleW, GetConsoleOutputCP, WriteConsoleA, SetStdHandle, GetConsoleMode, GetConsoleCP, SetFilePointer, InitializeCriticalSection, LeaveCriticalSection, EnterCriticalSection, RaiseException, lstrlenW, InterlockedDecrement, LoadLibraryW, GetProcAddress, GetCurrentThreadId, GetStringTypeW, GetStringTypeA, GetSystemTimeAsFileTime, GetCurrentProcessId, GetTickCount, QueryPerformanceCounter, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsA, GetVersionExA, InterlockedCompareExchange, HeapFree, GetProcessHeap, HeapAlloc, LoadLibraryA, IsProcessorFeaturePresent, VirtualFree, VirtualAlloc, InterlockedExchange, GetACP, GetLocaleInfoA, GetThreadLocale, LocalFree, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlUnwind, HeapReAlloc, GetCommandLineA, GetModuleHandleA, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, Sleep, HeapSize, ExitProcess, HeapDestroy, HeapCreate, WriteFile, GetStdHandle, GetModuleFileNameA, GetCPInfo, GetOEMCP, LCMapStringA, WideCharToMultiByte, LCMapStringW, SetHandleCount, GetFileType, GetStartupInfoA
> USER32.dll: GetWindowLongW, ShowWindow, CreateWindowExW, UnregisterClassA, LoadCursorW, GetClassInfoExW, GetClientRect, CharNextW, GetSysColor, CallWindowProcW, RegisterClassExW, SetWindowLongW, DefWindowProcW, DestroyWindow, IsWindow, SendMessageW
> ADVAPI32.dll: RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegOpenKeyExW, RegEnumKeyExW, RegQueryInfoKeyW, RegSetValueExW, RegDeleteKeyW
> ole32.dll: CoTaskMemFree, CoCreateInstance, StringFromGUID2, CoTaskMemAlloc, CoTaskMemRealloc
> OLEAUT32.dll: -, -, -, -, -, -, -, -, -

( 4 exports )
DllCanUnloadNow, DllGetClassObject, DllRegisterServer, DllUnregisterServer

BataAlexander 15.06.2008 02:01

Da hast Du eine uns unbekannte, infizierte Datei bei Virustotal prüfen lassen.


Alle Zeitangaben in WEZ +1. Es ist jetzt 00:03 Uhr.

Copyright ©2000-2025, Trojaner-Board


Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131