Also auch die zweite Hürde habe ich gemeistert.
Es wird folgendes angezeigt: Code:
Antivirus Version letzte aktualisierung Ergebnis
a-squared 4.5.0.41 2009.11.05 P2P-Worm.Win32.Nugg!IK
AhnLab-V3 5.0.0.2 2009.11.06 -
AntiVir 7.9.1.59 2009.11.05 -
Antiy-AVL 2.0.3.7 2009.11.05 -
Authentium 5.2.0.5 2009.11.05 -
Avast 4.8.1351.0 2009.11.05 -
AVG 8.5.0.423 2009.11.05 -
BitDefender 7.2 2009.11.05 -
CAT-QuickHeal 10.00 2009.11.05 -
ClamAV 0.94.1 2009.11.05 -
Comodo 2853 2009.11.05 -
DrWeb 5.0.0.12182 2009.11.05 -
eTrust-Vet 35.1.7106 2009.11.05 -
F-Prot 4.5.1.85 2009.11.05 -
F-Secure 9.0.15370.0 2009.11.04 -
Fortinet 3.120.0.0 2009.11.05 -
GData 19 2009.11.06 -
Ikarus T3.1.1.74.0 2009.11.05 P2P-Worm.Win32.Nugg
Jiangmin 11.0.800 2009.11.05 -
K7AntiVirus 7.10.889 2009.11.05 -
Kaspersky 7.0.0.125 2009.11.06 -
McAfee 5793 2009.11.05 -
McAfee+Artemis 5793 2009.11.05 -
McAfee-GW-Edition 6.8.5 2009.11.05 -
Microsoft 1.5202 2009.11.05 -
NOD32 4577 2009.11.05 -
Norman 6.03.02 2009.11.05 -
nProtect 2009.1.8.0 2009.11.05 -
Panda 10.0.2.2 2009.11.05 -
PCTools 7.0.3.5 2009.11.05 -
Prevx 3.0 2009.11.06 -
Rising 21.54.34.00 2009.11.05 -
Sophos 4.47.0 2009.11.05 -
Sunbelt 3.2.1858.2 2009.11.06 -
Symantec 1.4.4.12 2009.11.06 -
TheHacker 6.5.0.2.062 2009.11.05 -
TrendMicro 9.0.0.1003 2009.11.05 -
VBA32 3.12.10.11 2009.11.04 -
ViRobot 2009.11.5.2023 2009.11.05 -
VirusBuster 4.6.5.0 2009.11.05 -
weitere Informationen
File size: 122880 bytes
MD5 : 4604da6375b1b5b625136848f712fa5f
SHA1 : 047ff2b727e21656d609aef8f57598133cf35c1e
SHA256: c3229eb25ebde5837e3432e6acb937fc943d8fd1a67cf8aaff6cbb10d0a10651
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x1C0CF
timedatestamp.....: 0x28E31AAE (Fri Sep 27 13:49:02 1991)
machinetype.......: 0x14C (Intel I386)
( 5 sections )
name viradd virsiz rawdsiz ntrpy md5
CODE 0x1000 0x1B15B 0x1B200 7.97 4f391c043e4ff22122f4512f9457e295
DATA 0x1D000 0x2EDA 0x600 3.94 93543772d8068990e00e2d95598b44a2
BSS 0x20000 0xE3D 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e
.idata 0x21000 0x9DC 0xA00 4.72 b0ffe12015bc01590d6d5089038bdb73
.reloc 0x22000 0x19D1 0x1A00 6.68 f9be5fabc07d6b5bb9dc4cff5e719430
( 5 imports )
> advapi32.dll: RegQueryValueExA, RegOpenKeyExA, RegCloseKey
> dsound.dll: DirectSoundCreate
> kernel32.dll: DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle, TlsSetValue, TlsGetValue, TlsFree, TlsAlloc, LocalFree, LocalAlloc, WriteFile, WaitForSingleObject, VirtualQuery, SetFilePointer, SetEvent, SetEndOfFile, ResetEvent, ReadFile, LeaveCriticalSection, InitializeCriticalSection, GetVersionExA, GetThreadLocale, GetStringTypeExA, GetStdHandle, GetProcAddress, GetOEMCP, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCPInfo, GetACP, FormatMessageA, EnumCalendarInfoA, EnterCriticalSection, DeleteCriticalSection, CreateFileA, CreateEventA, CompareStringA, CloseHandle, Sleep
> oleaut32.dll: SysFreeString, SysReAllocStringLen, SysAllocStringLen, SafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
> user32.dll: GetKeyboardType, LoadStringA, MessageBoxA, CharNextA, MessageBoxA, LoadStringA, GetSystemMetrics, CharNextA, CharToOemA
( 0 exports )
TrID : File type identification
Win32 Executable Generic (42.3%)
Win32 Dynamic Link Library (generic) (37.6%)
Generic Win/DOS Executable (9.9%)
DOS Executable Generic (9.9%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
ssdeep: 3072:gNWRIJE8ZPVp8Er317yJvak4lO5mgrhUz/2HCI8iE:m8Z8ZPVpZyJvd4l/grhUb2iDi
PEiD : -
RDS : NSRL Reference Data Set |