Sarrymast | 19.09.2008 15:58 | 1. Code:
Antivirus Version letzte aktualisierung Ergebnis
AhnLab-V3 2008.9.19.2 2008.09.19 -
AntiVir 7.8.1.34 2008.09.19 -
Authentium 5.1.0.4 2008.09.19 -
Avast 4.8.1195.0 2008.09.18 -
AVG 8.0.0.161 2008.09.19 -
BitDefender 7.2 2008.09.19 -
CAT-QuickHeal 9.50 2008.09.19 -
ClamAV 0.93.1 2008.09.19 -
DrWeb 4.44.0.09170 2008.09.19 -
eSafe 7.0.17.0 2008.09.18 -
eTrust-Vet 31.6.6091 2008.09.16 -
Ewido 4.0 2008.09.19 -
F-Prot 4.4.4.56 2008.09.19 -
F-Secure 8.0.14332.0 2008.09.19 -
Fortinet 3.113.0.0 2008.09.19 -
GData 19 2008.09.19 -
Ikarus T3.1.1.34.0 2008.09.19 -
K7AntiVirus 7.10.461 2008.09.18 -
Kaspersky 7.0.0.125 2008.09.19 -
McAfee 5387 2008.09.18 -
Microsoft 1.3903 2008.09.19 Trojan:Win32/Skintrim.gen!D
NOD32v2 3455 2008.09.19 -
Norman 5.80.02 2008.09.18 -
Panda 9.0.0.4 2008.09.19 -
PCTools 4.4.2.0 2008.09.18 -
Prevx1 V2 2008.09.19 -
Rising 20.62.42.00 2008.09.19 -
Sophos 4.33.0 2008.09.19 -
Sunbelt 3.1.1647.1 2008.09.18 -
Symantec 10 2008.09.19 -
TheHacker 6.3.0.9.087 2008.09.18 -
TrendMicro 8.700.0.1004 2008.09.19 -
VBA32 3.12.8.5 2008.09.18 -
ViRobot 2008.9.19.1383 2008.09.19 -
VirusBuster 4.5.11.0 2008.09.18 -
Webwasher-Gateway 6.6.2 2008.09.19 -
weitere Informationen
File size: 299008 bytes
MD5...: 6c2f2884406824ccd1ed32e2e55c08f0
SHA1..: f292cefa833af8db5c3b9c811e2a37f40d2d17f6
SHA256: 383f114a1fbf4603c2f630684cebb79a534a3652fc9bf67f59a3b935faf2130b
SHA512: 4dd2759fcc41d900f49baedd692e10b7112fa2975072f88e3ecb21e9d4e09263
5c60af009c33a6d29fb1484c8aef94fda4a58966e5d61610efe8b94c72abbf12
PEiD..: -
TrID..: File type identification
Win32 Executable MS Visual C++ (generic) (65.2%)
Win32 Executable Generic (14.7%)
Win32 Dynamic Link Library (generic) (13.1%)
Generic Win/DOS Executable (3.4%)
DOS Executable Generic (3.4%)
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x401000
timedatestamp.....: 0x474957c3 (Sun Nov 25 11:08:51 2007)
machinetype.......: 0x14c (I386)
( 3 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x3a49f 0x3b000 7.37 ce524d1ca907af298157a36810dcea5c
.rdata 0x3c000 0x1120 0x2000 3.57 3b36c00b7e861af26ad3d5eefdc6f4f4
.data 0x3e000 0xa304 0xb000 3.98 f25f69b7c193257cf96425f8ba264a4f
( 10 imports )
> KERNEL32.dll: GetLargestConsoleWindowSize, GetBinaryTypeA, FindCloseChangeNotification, LocalReAlloc, FreeLibrary, GetDiskFreeSpaceW, SetCommTimeouts, ReadConsoleA, IsDBCSLeadByteEx, OpenSemaphoreW, SetEnvironmentVariableW, ExitProcess, MoveFileExA, LocalSize, SetFileAttributesA, LoadLibraryExA, PeekConsoleInputW, GlobalUnlock, _llseek, GetTickCount, SetConsoleOutputCP, LocalFileTimeToFileTime, lstrcmpA, GetShortPathNameA, GetDriveTypeW, GetStringTypeExW, FindFirstFileA, SetTimeZoneInformation, DuplicateHandle, SetupComm, ExpandEnvironmentStringsW, GetThreadPriority, GetLocaleInfoW, SetConsoleTitleA, GetPrivateProfileStringW, FindFirstFileW, FlushFileBuffers, IsBadReadPtr, DeleteCriticalSection, GetSystemDirectoryW, EnumCalendarInfoW, WritePrivateProfileStringA, ReadConsoleInputW, SetHandleCount, GetSystemDefaultLangID, ReadFileScatter, SetConsoleWindowInfo, GetEnvironmentStringsW, CloseHandle, MultiByteToWideChar, lstrcmpiA, GetFullPathNameA, SetThreadAffinityMask, SearchPathW, GetConsoleCursorInfo, GetCompressedFileSizeW, GlobalAddAtomA, SetThreadLocale, Beep, AllocConsole, _lclose, LocalAlloc, GetAtomNameA, VirtualProtect, GetVersionExA, FillConsoleOutputCharacterA, EnumResourceNamesW, FreeLibraryAndExitThread, GetNumberFormatW, GetCommandLineA, FormatMessageA, VirtualAlloc
> USER32.dll: GetWindowPlacement, GetMenuDefaultItem, AdjustWindowRect, DefMDIChildProcW, BeginDeferWindowPos, GetAsyncKeyState, GetParent, DrawCaption, AdjustWindowRectEx, SetWindowTextA, EndPaint, EnumDesktopsA, GetCapture, SetActiveWindow, EnumDisplaySettingsW, SetCaretBlinkTime, MessageBoxExA, ToUnicode, CreateDialogIndirectParamW, GetClipboardData, GetWindowInfo, CallWindowProcW, LoadAcceleratorsW, GetClassNameA, SetCapture, EnumWindows, SetMenuDefaultItem, OpenWindowStationW, InvertRect, GetCaretBlinkTime, CreateCursor, BeginPaint, ShowOwnedPopups, LoadBitmapW, SetClassLongW, MsgWaitForMultipleObjects, EnumDisplaySettingsExW, NotifyWinEvent, UnhookWindowsHookEx, LoadMenuIndirectA, GetKeyNameTextW, SetRectEmpty, CountClipboardFormats
> GDI32.dll: GetCurrentObject
> comdlg32.dll: GetSaveFileNameW, PageSetupDlgW, CommDlgExtendedError, ChooseFontW
> ADVAPI32.dll: GetSecurityDescriptorControl
> SHELL32.dll: SHBrowseForFolderA, SHAddToRecentDocs
> ole32.dll: OleCreateMenuDescriptor, ReadClassStg, CoInitializeEx
> OLEAUT32.dll: -, -, -, -, -, -, -
> COMCTL32.dll: ImageList_GetDragImage, ImageList_GetImageInfo
> SHLWAPI.dll: PathFindNextComponentW, UrlCanonicalizeW, SHCopyKeyA, PathIsFileSpecW, PathRelativePathToW, StrCatBuffW, ChrCmpIW, SHRegGetBoolUSValueA, StrTrimA, PathAddExtensionW, PathQuoteSpacesA, UrlCombineW, StrFormatByteSize64A, StrChrA, StrCmpNIW, StrToIntW
( 0 exports ) Das ist das erste..
Punkt 2 habe ich ausgefürt
MBR-Log Code:
Stealth MBR rootkit detector 0.2.4 by Gmer, http://www.gmer.net
device: opened successfully
user: MBR read successfully
kernel: MBR read successfully
user & kernel MBR OK |