john.doe | 22.12.2008 20:01 | Zitat:
Erkannt von "ScanSpyware v3.8"
| Herzlichen Glückwunsch. Code:
Datei ss_install.exe empfangen 2008.12.22 19:47:23 (CET)
Status: Beendet
Ergebnis: 16/37 (43.25%)
Filter
Drucken der Ergebnisse Antivirus Version letzte aktualisierung Ergebnis
AhnLab-V3 2008.12.22.0 2008.12.22 -
AntiVir 7.9.0.45 2008.12.22 DR/Fraud.Devushka.B.2
Authentium 5.1.0.4 2008.12.22 W32/FakeAV.FC
Avast 4.8.1281.0 2008.12.21 Win32:Trojan-gen {Other}
AVG 8.0.0.199 2008.12.22 Fake_AntiSpyware.AAM
BitDefender 7.2 2008.12.22 -
CAT-QuickHeal 10.00 2008.12.22 -
ClamAV 0.94.1 2008.12.22 -
Comodo 800 2008.12.22 TrojWare.Win32.TrojanDownloader.Devushka.~A
DrWeb 4.44.0.09170 2008.12.22 -
eSafe 7.0.17.0 2008.12.21 -
eTrust-Vet 31.6.6271 2008.12.20 -
Ewido 4.0 2008.12.22 -
F-Prot 4.4.4.56 2008.12.22 W32/FakeAV.FC
F-Secure 8.0.14332.0 2008.12.22 FraudTool.Win32.Devushka.b
Fortinet 3.117.0.0 2008.12.22 Misc/ScanSpyware
GData 19 2008.12.22 Win32:Trojan-gen {Other}
Ikarus T3.1.1.45.0 2008.12.22 Downloader.Fraud.Devushka
K7AntiVirus 7.10.562 2008.12.22 -
Kaspersky 7.0.0.125 2008.12.22 not-a-virus:FraudTool.Win32.Devushka.b
McAfee 5472 2008.12.22 -
McAfee+Artemis 5472 2008.12.22 -
Microsoft 1.4205 2008.12.22 -
NOD32 3711 2008.12.22 -
Norman 5.80.02 2008.12.22 -
Panda 9.0.0.4 2008.12.22 Application/ScanSpyware
PCTools 4.4.2.0 2008.12.22 -
Prevx1 V2 2008.12.22 Malicious Software
Rising 21.09.02.00 2008.12.22 -
SecureWeb-Gateway 6.7.6 2008.12.22 Trojan.Dropper.Fraud.Devushka.B.2
Sophos 4.37.0 2008.12.22 -
Sunbelt 3.2.1809.2 2008.12.22 FraudTool.Win32.Devushka
TheHacker 6.3.1.4.195 2008.12.20 -
TrendMicro 8.700.0.1004 2008.12.22 -
VBA32 3.12.8.10 2008.12.22 -
ViRobot 2008.12.22.1530 2008.12.22 Adware.Devushka.R.3288661
VirusBuster 4.5.11.0 2008.12.22 -
weitere Informationen
File size: 3288661 bytes
MD5...: 582e75ff12605c9104eaae5bb9b74760
SHA1..: 9aa6f0a21cffa0b94b16e26d6e18e70cad9132c4
SHA256: 60240c2937f153db2b6fbe9bf70e83875a6563432cce80e63986ae6487795a12
SHA512: 0522af91502b1ed776f07202b4751ce9c67342a874ac17a2b14d008305181e10
9fad65dafe282d690262bab088cee7972cf56128740f9e5c0a0595516d62a339
ssdeep: 98304:MVAKxwu7XU1SSK26XOB6T2Z/0Mv32Lv2Xlaw:eAK+u7kTKPXOBBx0MP2b2
Xgw
PEiD..: -
TrID..: File type identification
Win32 Executable Generic (38.4%)
Win32 Dynamic Link Library (generic) (34.1%)
Win16/32 Executable Delphi generic (9.3%)
Generic Win/DOS Executable (9.0%)
DOS Executable Generic (9.0%)
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x40991c
timedatestamp.....: 0x2a425e19 (Fri Jun 19 22:22:17 1992)
machinetype.......: 0x14c (I386)
( 8 sections )
name viradd virsiz rawdsiz ntrpy md5
CODE 0x1000 0x9040 0x9200 6.54 3fc23a57f6f12a4277db04cb09d7c497
DATA 0xb000 0x248 0x400 2.70 ac282c636b8dc9d80279982f8dde9f24
BSS 0xc000 0xe34 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e
.idata 0xd000 0x950 0xa00 4.43 bb5485bf968b970e5ea81292af2acdba
.tls 0xe000 0x8 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e
.rdata 0xf000 0x18 0x200 0.20 9ba824905bf9c7922b6fc87a38b74366
.reloc 0x10000 0x8a4 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e
.rsrc 0x11000 0x2800 0x2800 4.47 e9a03ee9ab8b4ee2f580ba922828f486
( 8 imports )
> kernel32.dll: DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
> user32.dll: MessageBoxA
> oleaut32.dll: VariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
> advapi32.dll: RegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
> kernel32.dll: WriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
> user32.dll: TranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
> comctl32.dll: InitCommonControls
> advapi32.dll: AdjustTokenPrivileges
( 0 exports )
ThreatExpert info: <a href='http://www.threatexpert.com/report.aspx?md5=582e75ff12605c9104eaae5bb9b74760' target='_blank'>http://www.threatexpert.com/report.aspx?md5=582e75ff12605c9104eaae5bb9b74760</a>
CWSandbox info: <a href='http://research.sunbelt-software.com/partnerresource/MD5.aspx?md5=582e75ff12605c9104eaae5bb9b74760' target='_blank'>http://research.sunbelt-software.com/partnerresource/MD5.aspx?md5=582e75ff12605c9104eaae5bb9b74760</a>
Prevx info: <a href='http://info.prevx.com/aboutprogramtext.asp?PX5=14A6205A554CA6052E65324453270B005EE7401E' target='_blank'>http://info.prevx.com/aboutprogramtext.asp?PX5=14A6205A554CA6052E65324453270B005EE7401E</a> :headbang: andreas |